Yes of course as that would be the original sender of the email and their
information would also be in your SPF policy. You can change the Sender and
Reply-to headers to be from your domain and mask it a bit better but the
 received by headers would show the alphazulu.com mail server.

On Mon, Aug 29, 2016 at 10:38 AM project722 <project...@gmail.com> wrote:

> Awesome, Actually one more question. If we allow folks from another domain
> to send as us is there a chance anywhere in any of the email "from" headers
> it would reveal the "true" domian?
>
> eg..
>
> folks at alphazulu send as @foxtrot.com.
>
> Would @alphazulu.com appear anywhere in the headers?
>
> On Mon, Aug 29, 2016 at 9:34 AM, Mike Ragusa <mrag...@gmail.com> wrote:
>
>> Glad to help! If you need a low cost DMARC reporting service, I would
>> recommend www.dmarcian.com
>>
>> On Mon, Aug 29, 2016 at 10:33 AM project722 <project...@gmail.com> wrote:
>>
>>> Thanks guys - very helpful information indeed.
>>>
>>> On Mon, Aug 29, 2016 at 9:08 AM, Mike Ragusa <mrag...@gmail.com> wrote:
>>>
>>>> Ideally it is best to use both technologies and then put DMARC on top
>>>> to ensure reporting and enforcement of the policies. DKIM cryptographically
>>>> signs your messages and SPF informs receiving mail servers of who is
>>>> allowed to send on your behalf.  You should not think of using only one or
>>>> the other as they work best together to accomplish the same goal. When
>>>> utilizing DMARC on top of it all, you get the added benefit of reporting
>>>> from over 200 different ISPs from around the world. In general, DKIM is
>>>> first used as the authentication method and SPF as a backup.
>>>>
>>>> If you have a valid DKIM key, then failed SPF should not matter but if
>>>> you have a failed DKIM key and SPF passes, there still may be
>>>> deliverability issues to account for. If you do enable DMARC, then your
>>>> DKIM and/or SPF headers must align with your domain or you will encounter
>>>> deliverability issues depending on how your policies are setup. DKIM in
>>>> relaxed mode allows for mail to pass the test with the same parent domain
>>>> but canonicalization requires that your domains match up exactly as stated
>>>> ie example.com and mail.example.com are not the same and will fail.
>>>> SPF with DMARC requires two or more FROM headers (
>>>> https://tools.ietf.org/html/rfc2822#section-3.6.2) match up exactly or
>>>> it will fail SPF checks but without DMARC anyone listed in the sender
>>>> policy can send on your behalf. While this may seem strange at first, this
>>>> is to prevent people from signing up to something like google and sending
>>>> on your behalf with the default google DKIM key and a wide open SPF policy.
>>>>
>>>> With DMARC:
>>>> DKIM : headers must match domain or else fail
>>>> SPF:  2 or more headers must match domain or else fail
>>>>
>>>> Without DMARC:
>>>> DKIM: just needs to be signed by sending mail server
>>>> SPF: just needs to be send from a valid sender
>>>>
>>>> Depending on your needs, I would recommend putting SPF in soft fail,
>>>> DKIM in relaxed mode and DMARC in reporting mode only for the first 15-30
>>>> days and see how your traffic looks and who is sending on your behalf. Once
>>>> you have a comfortable baseline, start to tighten up your policies.
>>>>
>>>>
>>>>
>>>>
>>>> On Mon, Aug 29, 2016 at 9:51 AM project722 <project...@gmail.com>
>>>> wrote:
>>>>
>>>>> What about DKIM only? Can it be used instead of, or, as a
>>>>> "replacement" for SPF? For example mails are signed with DKIM from the 
>>>>> SMTP
>>>>> servers, and the receiving servers are checking both SPF and DKIM. If the
>>>>> receiving server detected a missing SPF would it allow mail through if 
>>>>> DKIM
>>>>> is present and valid? I suppose a lot of this depends on the SPF policies
>>>>> enforced on the receiving side.
>>>>>
>>>>> On Mon, Aug 29, 2016 at 1:53 AM, Dave Warren <da...@hireahit.com>
>>>>> wrote:
>>>>>
>>>>>> The easiest answer is: Whatever you want. Strictly speaking,
>>>>>> alphazulu.com can send mail on behalf of foxtrot.com using a
>>>>>> alphazulu.com DKIM selector, and that's perfectly valid under DKIM.
>>>>>> However, it won't have DMARC alignment, which is becoming more and more
>>>>>> important, so if alignment is relevant, you'll need to use a
>>>>>> foxtrot.com selector.
>>>>>>
>>>>>> tl;dr: Use a foxtrot.com selector unless you simply can't.
>>>>>>
>>>>>> As for who generates it, it's irrelevant. The sending server will
>>>>>> need the private key, your DNS records will contain the public key, but 
>>>>>> it
>>>>>> makes no difference if foxtrot.com creates the keys and delivers
>>>>>> them to the appropriate parties, or if alphazulu.com generates
>>>>>> generates a private key and provides the alphazulu._
>>>>>> domainkey.foxtrot.com record to foxtrot.com.
>>>>>>
>>>>>> Remember that you can have as many selectors as you want, don't reuse
>>>>>> them across trust boundaries (in other words, consider that in the 
>>>>>> future,
>>>>>> foxtrot.com and alphazulu.com may part ways, when that happens, it's
>>>>>> ideal if you can remove the selector from your DNS (after a period of 
>>>>>> time,
>>>>>> at least a week), such that alphazulu.com cannot continue to sign
>>>>>> mail. It's also ideal if you don't have to update DKIM records elsewhere 
>>>>>> in
>>>>>> your infrastructure.
>>>>>>
>>>>>> I hope at least some of this makes sense, but if not, ask. DKIM and
>>>>>> DMARC are fiddly, and a lot of the DKIM advice out there isn't entirely
>>>>>> complete now that DMARC is on the scene and DMARC builds on top of DKIM 
>>>>>> and
>>>>>> SPF.
>>>>>>
>>>>>>
>>>>>> On Sun, Aug 28, 2016, at 16:13, project722 wrote:
>>>>>>
>>>>>> Lets say my domain is foxtrot.com and we have SPF records for the
>>>>>> SMTP servers on foxtrot.com. Now lets say I have decided I want to
>>>>>> allow alphazulu.com to send mail as foxtrot.I know how to add
>>>>>> alphazulu.com to the SPF but If I wanted to also use DomainKeys or
>>>>>> DKIM to authenticate alphazulu.com would the keys need to be in
>>>>>> foxtrots name or alphazulu? For example,
>>>>>> Would I use:
>>>>>>
>>>>>> _domainkey.foxtrot.com.                  IN TXT          "t=y\;
>>>>>> o=~\;"
>>>>>> xxxxxxx._domainkey.foxtrot.com.           IN TXT          "k=rsa\;
>>>>>> p=xxxxxxxxxxx
>>>>>>
>>>>>> or
>>>>>>
>>>>>> _domainkey.alphazulu.com.                  IN TXT          "t=y\;
>>>>>> o=~\;"
>>>>>> xxxxxxx._domainkey.alphazulu.com.           IN TXT          "k=rsa\;
>>>>>> p=xxxxxxxxxxx
>>>>>>
>>>>>> Also,
>>>>>> 1) Who generates the keys? Foxtrot or Alphazulu?
>>>>>> 2) Would I need both SPF and keys or would keys alone be enough to
>>>>>> authenticate the other domain? ( I am in a position where I would like to
>>>>>> use only keys)
>>>>>> 3) Which one is better to use in terms of provider checking? For
>>>>>> example, are providers even checking keys as much as they are SPF?
>>>>>>
>>>>>> *_______________________________________________*
>>>>>> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
>>>>>> unsubscribe from this list
>>>>>>
>>>>>> bind-users mailing list
>>>>>> bind-users@lists.isc.org
>>>>>> https://lists.isc.org/mailman/listinfo/bind-users
>>>>>>
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
>>>>>> unsubscribe from this list
>>>>>>
>>>>>> bind-users mailing list
>>>>>> bind-users@lists.isc.org
>>>>>> https://lists.isc.org/mailman/listinfo/bind-users
>>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
>>>>> unsubscribe from this list
>>>>>
>>>>> bind-users mailing list
>>>>> bind-users@lists.isc.org
>>>>> https://lists.isc.org/mailman/listinfo/bind-users
>>>>
>>>>
>>>
>
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to