15 pointsby meysamazad9 hours ago1 comment
  • eqvinox6 hours ago
    > According to Validity’s analysis of 22 million sending domains, 84% have no DMARC record at all

    One of those is mine (I have SPF records but no DKIM or DMARC). I don't seem to have any issues. I'm not a "bulk sender" though, and my domain has existed since 2002.

    Meanwhile a whole lot of the spam I'm seeing comes either through gmail/outlook.com, or from domains with valid DKIM setups (either because the domain got owned, or because it was just 'correctly' set up... for spamming)

    • dwd4 hours ago
      Yes, good spammers make sure their DMARC, DKIM and SPF are correct.

      Most times I have to deal with issues are companies sending email enquiries from their website to their Office 365 hosted address when the sender is their own email address. Usually requires all 3 to avoid SPF/DMARC fails or mail going to Junk/Quarantine.

      • romaniitedomum4 hours ago
        > Yes, good spammers make sure their DMARC, DKIM and SPF are correct.

        Many do, but not all. One of the hats I wear at work is mail server administrator, and it's astonishing the number of spam and phish attempts using our company domains that I see from all over the world, all of which bounce off due to SPF.

        I've noticed too in recent years that some phishing spammers seek out established domains with liberal SPF (either no SPF or ~all) and use those for their phishing attempts. Some of the most common I've seen, ones that stuck in my mind, were secure.net, yale.edu, and servermail.com.

        A point I have to reiterate to colleagues over and over is that SPF and DKIM are a form of identity management for domains. They're designed for phishing prevention, not general spam prevention. If you register a domain for any purpose, the first thing you should do, in my opinion, is stick a "v=spf1 -all" in DNS for it. Otherwise, phishing spammers may ruin its reputation before you get a chance to use it.

    • brandonwindson30 minutes ago
      [dead]