bind_-_senderid:senderid_introduction
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
bind_-_senderid:senderid_introduction [2016/11/29 11:53] – peter | bind_-_senderid:senderid_introduction [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 5: | Line 5: | ||
SenderID tries to improve on a principal deficiency in SPF: that SPF does not verify the header addresses that indicates the sending party. | SenderID tries to improve on a principal deficiency in SPF: that SPF does not verify the header addresses that indicates the sending party. | ||
- | Sender ID was developed by Microsoft to protect against spoofing the RFC5322.From address, the one that the user sees in their email client. | + | Sender ID was developed by Microsoft to protect against spoofing the RFC5322.From address, the one that the user sees in their email client. |
- | + | ||
- | SenderID | + | |
Sender ID is almost identical to SPF except that v=spf1 is replaced with one of: | Sender ID is almost identical to SPF except that v=spf1 is replaced with one of: | ||
Line 14: | Line 12: | ||
* **spf2.0/ | * **spf2.0/ | ||
* **spf2.0/ | * **spf2.0/ | ||
- | |||
===== Examples ===== | ===== Examples ===== | ||
Line 25: | Line 22: | ||
OR | OR | ||
- | news.example.com | + | For news.example.com, |
< | < | ||
Line 33: | Line 30: | ||
* **spf2.0/ | * **spf2.0/ | ||
* **pra** means to apply this to the domain in the Purported Responsible Address, which is either the domain in the Sender: (rarely) or RFC5322.From (usually)." | * **pra** means to apply this to the domain in the Purported Responsible Address, which is either the domain in the Sender: (rarely) or RFC5322.From (usually)." | ||
+ | |||
+ | |||
+ | ===== How Sender ID Works ===== | ||
+ | |||
+ | Sender ID verifies the origin of the email address based on IP address and domain, and then uses the validation results to determine email delivery. When a sender deploys a message, the inbound mail server checks the DNS entries to obtain the SPF Record. | ||
+ | |||
+ | |||
+ | ===== Sender ID vs. SPF ===== | ||
+ | |||
+ | Sender ID addresses a very different problem than SPF. | ||
+ | |||
+ | * SPF validates the HELO domain and the MAIL FROM address against the policies published via DNS (SPF record). | ||
+ | * Sender ID validates one of the message' | ||
+ | |||
+ | Unlike SPF which validates against the envelope’s return-path address which is the root or subdomain, Sender ID validates based on the PRA and uses the header field with the email address to identify the visible sender of the message. Since headers are not required by the SMTP protocol, Sender ID uses the content of the message to provide an extra layer of protection against spammers and phishers that is very different from SPF which validates on the domain or connection level. | ||
+ | |||
+ | Sender ID and SPF should both be adopted along with DKIM. These methodologies complement each other and in doing so, provide the best protection against phishing. | ||
+ | |||
+ | Neither is better because they solve different problems: | ||
+ | |||
+ | * SPF can be compared to other SMTP layer protocol like CSV/CSA. | ||
+ | * Sender ID can be compared to other RFC 2822 layer protocols like DomainKeys IM(DKIM) | ||
+ | |||
+ | |||
+ | ===== Advantages of using SenderID ===== | ||
It does mean that you must create and delegate a subdomain for 3rd parties to send on behalf of you and publish their SPF records in that subdomain' | It does mean that you must create and delegate a subdomain for 3rd parties to send on behalf of you and publish their SPF records in that subdomain' | ||
However, even if it does go rogue, it can only pass a SenderID check for this delegated subdomain. | However, even if it does go rogue, it can only pass a SenderID check for this delegated subdomain. |
bind_-_senderid/senderid_introduction.1480420404.txt.gz · Last modified: 2020/07/15 09:30 (external edit)