noc.social is part of the decentralized social network powered by Mastodon.
This instance is focused on technology, networking, linux, privacy, security, infosec, engineering, but open to anyone. Civil discourse, polite and open. Managed by the noc.org / trunc.org team.

Administered by:

Server stats:

674
active users

Learn more

Marc Tapages 🐰⏚🚲🎺<p><span class="h-card"><a href="https://mamot.fr/@bearstech" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bearstech</span></a></span> <br>trop bien cet outil, j'ai enfin à peu près compris ces mécanismes !<br><a href="https://framapiaf.org/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a> <a href="https://framapiaf.org/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://framapiaf.org/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> <a href="https://framapiaf.org/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> </p><p>Merci pour le partage !</p>
John Goerzen<p><span class="h-card"><a href="https://mastodon.social/@jeremiah_" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jeremiah_</span></a></span> <span class="h-card"><a href="https://social.sdf.org/@elb" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>elb</span></a></span> <a href="https://floss.social/tags/NNCPNET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NNCPNET</span></a>, the new <a href="https://floss.social/tags/NNCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NNCP</span></a>-based email network, now has a bidirectional, opt-in, Internet <a href="https://floss.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> bridge! <a href="https://salsa.debian.org/jgoerzen/docker-nncpnet-mailnode/-/wikis/bridge/intro" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">salsa.debian.org/jgoerzen/dock</span><span class="invisible">er-nncpnet-mailnode/-/wikis/bridge/intro</span></a></p><p>This gates Internet email to/from NNCP. The bridge is off by default. It is a full participant in <a href="https://floss.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, <a href="https://floss.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a>, <a href="https://floss.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>, and <a href="https://floss.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> in both directions.</p><p>Yes, now you can get Internet email straight to your <a href="https://floss.social/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaspberryPi</span></a> ! (And even without this, your Pis can email each other!)</p>
Erik van Straten<p><span class="h-card"><a href="https://troet.cafe/@patrickbenkoetter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>patrickbenkoetter</span></a></span> : SPF, DKIM und DMARC funktionieren nicht.</p><p>Impersonitation ist zu einfach und zu viel wird kaputt gemacht.</p><p><a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/Spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spam</span></a> <a href="https://infosec.exchange/tags/SpamBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpamBox</span></a> <a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a></p>
Afnic<p>🌐 L'Afnic est présente aujourd'hui jusqu'au 3 avril au Forum INCYBER Europe (FIC) au stand F-40 à Lille. </p><p>🛡️ Une belle opportunité d'échanger sur les enjeux DNS de la cybersécurité. </p><p>➡️ Découvrez également notre nouvelle formation NIS 2 Lead Implementer <a href="https://www.afnic.fr/produits-services/formations/formation-nis-2-lead-implementer/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/produits-services/for</span><span class="invisible">mations/formation-nis-2-lead-implementer/</span></a></p><p>Et explorer toutes nos formations sur la sécurisation du DNS <a href="https://www.afnic.fr/produits-services/formations/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/produits-services/for</span><span class="invisible">mations/</span></a></p><p>Venez rencontrer Lotfi Benyelles, Benoît Ampeau et Régis Massé au Stand F-40 !</p><p><a href="https://mastodon.social/tags/Afnic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Afnic</span></a> <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.social/tags/InCyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InCyber</span></a> <a href="https://mastodon.social/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a></p>
Jan Schaumann<p>System Administration</p><p>Week 8, The Simple Mail Transfer Protocol, Part III</p><p>In this video, we look at ways to combat Spam. In the process, we learn about email headers, the Sender Policy Framework (<a href="https://mstdn.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>), DomainKeys Identified Mail (<a href="https://mstdn.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a>), and Domain-based Message Authentication, Reporting and Conformance (<a href="https://mstdn.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>). <a href="https://mstdn.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> doesn't seem quite so simple any more...</p><p><a href="https://youtu.be/KwCmv3GHGfc" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/KwCmv3GHGfc</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://mstdn.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a></p>
Hacker News<p>Spammers are better at SPF, DKIM, and DMARC than everyone else</p><p><a href="https://toad.social/@grumpybozo/114213600922816869" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">toad.social/@grumpybozo/114213</span><span class="invisible">600922816869</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Spammers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spammers</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Erik van Straten<p><span class="h-card"><a href="https://toad.social/@grumpybozo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grumpybozo</span></a></span> : I definitely am not angry with you (I very much agree).</p><p>Unfortunately many admins treat security solutions like they're a religion.</p><p>Some time age there was a hefty debate on a Dutch "mostly admins" site (<a href="https://tweakers.net" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">tweakers.net</span><span class="invisible"></span></a>, I'd have to look up the exact thread) about the "correct" sending and receiving MTA configurations. There was no agreement.</p><p>Microsoft even used to ignore SPF/DKIM/DMARC if the sender was in the "safe senders" list (which the user's address book defaults to). What could possibly go wrong (later MS corrected that).</p><p>The screenshot below is from part of <a href="https://www.security.nl/posting/766069/DMARC+bypass+%28Outlook+only%3F%29#posting767981" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.nl/posting/766069/DMA</span><span class="invisible">RC+bypass+%28Outlook+only%3F%29#posting767981</span></a> (I wrote that Sept. 14, 2022).</p><p>Edited 23:36 UTC to add: {<br><a href="https://arxiv.org/abs/2302.07287" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2302.07287</span><span class="invisible"></span></a><br>Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy<br>Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage<br>}</p><p><a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://infosec.exchange/tags/Arc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arc</span></a> <a href="https://infosec.exchange/tags/WhatEver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatEver</span></a></p>
Erik van Straten<p><span class="h-card"><a href="https://infosec.exchange/@deepthoughts10" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>deepthoughts10</span></a></span> wrote: "email authentication like DMARC/SPF does one thing: it prevents impersonation of a specific domain (assuming policies are configured for reject or quarantine.)"</p><p>It does not even do that on my iPhone.</p><p>P.S. SPF was invented to prevent Joe Jobs (<a href="https://en.wikipedia.org/wiki/Joe_job" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">en.wikipedia.org/wiki/Joe_job</span><span class="invisible"></span></a>). Marketing idiots (including Bill Gates) said that it would kill spam. It killed forwarding instead.</p><p><span class="h-card"><a href="https://toad.social/@grumpybozo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grumpybozo</span></a></span> <span class="h-card"><a href="https://mastodon.social/@jwz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jwz</span></a></span> </p><p><a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://infosec.exchange/tags/ARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARC</span></a> <a href="https://infosec.exchange/tags/WhatEver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatEver</span></a></p>
Pyrzout :vm:<p>SingCERT Alerts Public on Fraudulent Emails Impersonating CSA and SPF <a href="https://thecyberexpress.com/fraudulent-emails-scam/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/fraudulent</span><span class="invisible">-emails-scam/</span></a> <a href="https://social.skynetcloud.site/tags/sensitiveinformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sensitiveinformation</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/fraudulentemails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fraudulentemails</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/SingCERT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingCERT</span></a> <a href="https://social.skynetcloud.site/tags/CSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSA</span></a> <a href="https://social.skynetcloud.site/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a></p>
Roman Schaller<p><span class="h-card"><a href="https://jawsome.nevy.xyz/@nev" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nev</span></a></span> Same here. <a href="https://stalw.art/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">stalw.art/</span><span class="invisible"></span></a> was my choice. Works so far. But be careful with <a href="https://mastodon.green/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> and <a href="https://mastodon.green/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a>. It is important to set those up correctly. Otherwise your mails will be marked as spam.</p>
jordan<p>Hey <a href="https://mastodon.jordanwages.com/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://mastodon.jordanwages.com/tags/nerds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nerds</span></a> and <a href="https://mastodon.jordanwages.com/tags/ServerAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ServerAdmin</span></a> people, I know about <a href="https://mastodon.jordanwages.com/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>, <a href="https://mastodon.jordanwages.com/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, and <a href="https://mastodon.jordanwages.com/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> and stuff. BUT.</p><p>Idea: system where email servers generate a <a href="https://mastodon.jordanwages.com/tags/GUID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GUID</span></a> identifier for that specific email and keep it in a database. Other servers and email clients can then just ping the <a href="https://mastodon.jordanwages.com/tags/domain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>domain</span></a> that the email says its from and confirm the real domain sent it.</p><p>Like, why couldn't this be a thing? Seems like it would completely stop those <a href="https://mastodon.jordanwages.com/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> emails that pretend to be from <a href="https://mastodon.jordanwages.com/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a> or <a href="https://mastodon.jordanwages.com/tags/banks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>banks</span></a>.</p>
nan0<p>Does anyone has a contact to the Joint Research Centre (<a href="https://chaos.social/tags/JRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JRC</span></a>) [0] or My Email Communications Security Assessment (<a href="https://chaos.social/tags/MECSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MECSA</span></a>) [1] (both from the <a href="https://chaos.social/tags/EU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EU</span></a>)?</p><p>I find the tool great... if it would parse <a href="https://chaos.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>/#IPv6 correctly und actually check for <a href="https://chaos.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>...</p><p>I've tried emailing them, but no response :/</p><p>Links:<br>[0]: <a href="https://joint-research-centre.ec.europa.eu/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">joint-research-centre.ec.europ</span><span class="invisible">a.eu/</span></a><br>[1]: <a href="https://mecsa.jrc.ec.europa.eu/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">mecsa.jrc.ec.europa.eu/</span><span class="invisible"></span></a></p>
🚲 Elizabeth :flag_bisexual:<p>J'ai un nom de domaine chez <a href="https://piaille.fr/tags/o2switch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>o2switch</span></a> et depuis quelques jours, je ne peux plus envoyer de mails à mes contacts Gmail, à cause d'un problème de configuration SPF* ou DKIM. </p><p>Quand je lis cet article <br><a href="https://faq.o2switch.fr/hebergement-mutualise/tutoriels-cpanel/authentification-email-spf-dkim" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">faq.o2switch.fr/hebergement-mu</span><span class="invisible">tualise/tutoriels-cpanel/authentification-email-spf-dkim</span></a> <br>Ça n'a pas l'air simple à résoudre. </p><p>Parmi vous, les personnes qui lisez ce message, vous avez réussi à résoudre ce problème facilement chez o2switch ? Comment on fait ? 😬</p><p>* jusqu'à présent, le SPF était uniquement l'indice de protection d'une crème solaire 😁</p><p><a href="https://piaille.fr/tags/gmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gmail</span></a> <a href="https://piaille.fr/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://piaille.fr/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a></p>
kuijsten<p>I've released an SPF filter for OpenSMTPD: <a class="mention u-url" href="https://netsend.nl/opensmtpd-filter-spf/" rel="nofollow noopener noreferrer" target="_blank">https://netsend.nl/opensmtpd-filter-spf/</a></p> <p><a class="mention u-url" href="https://honk.netsend.nl/o/opensmtpd" rel="nofollow noopener noreferrer" target="_blank">#opensmtpd</a> <a class="mention u-url" href="https://honk.netsend.nl/o/milter" rel="nofollow noopener noreferrer" target="_blank">#milter</a> <a class="mention u-url" href="https://honk.netsend.nl/o/spf" rel="nofollow noopener noreferrer" target="_blank">#spf</a></p>
Afnic<p>✉️ Le courrier électronique est une cible privilégiée pour le spam, le phishing et autres formes d'escroqueries. </p><p>👩‍🏫 Découvrez DKIM, DMARC et SPF, trois techniques d’authentification de l’émetteur qui s’inscrivent dans la boîte à outils des organisations qui cherchent à lutter durablement contre ces abus.</p><p>Prochaines sessions :<br>📅 27 et 28 mars 2025<br>📅 22 et 23 mai 2025</p><p>➡️ Découvrez le programme complet et inscrivez-vous ici : <a href="https://www.afnic.fr/produits-services/formations/dkim-dmarc-spf-securiser-son-courrier-electronique-grace-au-dns/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/produits-services/for</span><span class="invisible">mations/dkim-dmarc-spf-securiser-son-courrier-electronique-grace-au-dns/</span></a></p><p><a href="https://mastodon.social/tags/Afnic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Afnic</span></a> <a href="https://mastodon.social/tags/Formation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formation</span></a> <a href="https://mastodon.social/tags/Courrier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Courrier</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a></p>
Wulfy<p>I am <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> a new <a href="https://infosec.exchange/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> engine on a new domain.<br>In preparation for a personal <a href="https://infosec.exchange/tags/Googlemail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Googlemail</span></a> exodus.</p><p>But even though I have my <a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> and <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> record proper<br><a href="https://infosec.exchange/tags/Gmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gmail</span></a> reject the test emails.<br>Without any bounces either, it just black holes them.</p><p>So over this week, I have a small script that randomly email random emails to Gmail to "build reputation".<br>We will see how that goes.</p>
Lukas Beran<p>𝐇𝐨𝐰 𝐭𝐨 𝐬𝐞𝐜𝐮𝐫𝐞 𝐲𝐨𝐮𝐫 𝐞𝐦𝐚𝐢𝐥 𝐰𝐢𝐭𝐡 𝐒𝐏𝐅, 𝐃𝐊𝐈𝐌 𝐚𝐧𝐝 𝐃𝐌𝐀𝐑𝐂</p><p>Email is usually a critical part of corporate communication these days. Without a functional email, companies can lose orders and therefore money for example. Therefore, email security should be a very high priority. But equally, increasing email deliverability should be very important.</p><p>In today's video, we'll look at how to increase email security from the perspective of protecting your domain. In other words, so that an outsider can't impersonate you, send emails under your domain, and thereby damage your company's reputation or credibility by, for example, sending out spam or, heaven forbid, fake invoices for payment from your domain.</p><p>We'll also look at how to increase the deliverability of your messages. That is to say, so that regular emails leaving your domain are delivered to the recipient, and don't fall into spam or get completely thrown away by the recipient's mail server.</p><p>We'll focus on three basic options for email security and deliverability that every organization should have implemented.</p><p>📺 Watch my YouTube video bellow 👇 👇 <br><a href="https://youtu.be/xtmDDl1rjOc" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/xtmDDl1rjOc</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cswrld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cswrld</span></a> <a href="https://infosec.exchange/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://infosec.exchange/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> <a href="https://infosec.exchange/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://infosec.exchange/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> <a href="https://infosec.exchange/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a> <a href="https://infosec.exchange/tags/exchangeonline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exchangeonline</span></a> <a href="https://infosec.exchange/tags/office365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>office365</span></a></p>
Stephen Bannasch (316 ppm)<p>Got SPF, DKIM, and DMARC working … took a bit longer than I wanted because the domain is hosted on a separate larger server I don’t have direct control over and dns is on cloudflare so iteration is slower. Email is now making it successfully though to gmail and proton and no longer identified as spam.</p><p>1/x</p><p><a href="https://ruby.social/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> <a href="https://ruby.social/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://ruby.social/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a></p>
Peter N. M. Hansteen<p>Is SPF Simply Too Hard For Application Developers?<br>The Sender Policy Framework (SPF) is unloved by some, because it conflicts with some long-established SMTP email use cases. But is it also just too hard to understand and to use correctly for application developers? <a href="https://nxdomain.no/~peter/is_spf_too_hard_for_appdevs.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/is_spf_too_</span><span class="invisible">hard_for_appdevs.html</span></a><br>(2016 but still holds) <a href="https://mastodon.social/tags/smtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smtp</span></a> <a href="https://mastodon.social/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://mastodon.social/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> <a href="https://mastodon.social/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://mastodon.social/tags/antispam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antispam</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/spamd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spamd</span></a></p>
circl<p>TR-92 - Unused Domain Names and the Risks of Missing DNS SPF Records</p><p>Many organizations maintain a broad portfolio of domain names, acquired for branding, strategic planning, or defensive purposes. However, a significant portion of these domains often remains unused or lacks proper DNS configurations...</p><p>Read more <a href="https://www.circl.lu/pub/tr-92/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">circl.lu/pub/tr-92/</span><span class="invisible"></span></a></p><p><a href="https://social.circl.lu/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.circl.lu/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://social.circl.lu/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://social.circl.lu/tags/domain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>domain</span></a> <a href="https://social.circl.lu/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://social.circl.lu/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://social.circl.lu/tags/netsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netsec</span></a></p>