taquiones.net is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Mi instancia en el fediverso
Admin email
root@taquiones.net
Admin account
@victor@taquiones.net

Search results for tag #dmarc

The New Oil Β» 🤖
@thenewoil@mastodon.thenewoil.org

Jan Schaumann Β»
@jschauma@mstdn.social

How a receiving mail server should treat messages based on the and results is defined in the TXT record:

$ dig +short txt _dmarc.netmeister.org
"v=DMARC1; p=reject; pct=100; aspf=s; adkim=s; rua=mailto:[...]; ruf=mailto:[...]"

rfc-editor.org/rfc/rfc7489.htm

Jan Schaumann Β»
@jschauma@mstdn.social

Every so often, I need to chase down some aspect of email validation (, , , ...). This involves a number of records and queries, but I may forget just which ones. So here's a quick /DNS cheatsheet:

Table:
Record / Type 	Example
-------------------------------------------
MX 	dig +short MX example.com
SPF 	dig +short TXT example.com | grep spf
DKIM 	dig +short TXT selector._domainkey.example.com
DMARC 	dig +short TXT _dmarc.example.com
MTA-STS 	dig +short TXT _mta-sts.example.com
curl https://mta-sts.example.com/.well-known/mta-sts.txt
TLS-RPT 	dig +short TXT _smtp._tls.example.com
DANE 	dig +short TLSA _port._tcp.example.com
BIMI 	dig +short TXT default._bimi.example.com

Jan Schaumann Β»
@jschauma@mstdn.social

After this week's Spring Break, we return in my class to dive into .

We start with an overview of the ecosystem consisting of MUAs, MTAs, MDAs, Access Agents, and tcpdump a simple manual SMTP session over telnet. We then talk about STARTTLS, MTA-STS and , before diving into defenses, including , , and , all with practical examples, tracking lookups and traffic on the sender and receiver.

Video lectures here:
youtu.be/Ai8rjqelwsI?si=7_4Jnf

Sean Whalen πŸ‘¨πŸΌβ€πŸ¦ΌπŸ³οΈβ€πŸŒˆπŸ‡ΊπŸ‡¦πŸ•ŠοΈ Β»
@seanthegeek@infosec.exchange

@patrickbenkoetter @lairsdragon @bsi I saw this thread because I follow the hashtag. Message forwarding works fine as long as the original message is signed and the forwarding service does not tamper with the email. never works with a forwarded message.

You are right that there are many other ways to impersonate an identity, like display name spoofing, but it does prevent from address spoofing. Good security awareness programs train users to look at the from address when checking for impersonation. There are also free DMARC solutions, like the open source software I wrote.

I wrote a detailed blog post about DMARC here: Demystifying DMARC: A guide to preventing email spoofing

0 ★ 0 ↺

Victor Moral Β»
@victor@taquiones.net