User Tools

Site Tools


bind_-_senderid:senderid_introduction

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
bind_-_senderid:senderid_introduction [2016/11/29 12:08] – [Bind - SenderID - SenderID Introduction] peterbind_-_senderid:senderid_introduction [2020/07/15 09:30] (current) – external edit 127.0.0.1
Line 30: Line 30:
   * **spf2.0/pra** means that this is a SenderID record.   * **spf2.0/pra** means that this is a SenderID record.
   * **pra** means to apply this to the domain in the Purported Responsible Address, which is either the domain in the Sender: (rarely) or RFC5322.From (usually)."   * **pra** means to apply this to the domain in the Purported Responsible Address, which is either the domain in the Sender: (rarely) or RFC5322.From (usually)."
 +
 +
 +===== How Sender ID Works =====
 +
 +Sender ID verifies the origin of the email address based on IP address and domain, and then uses the validation results to determine email delivery. When a sender deploys a message, the inbound mail server checks the DNS entries to obtain the SPF Record.  It then checks the record to see if the IP address matches the sending server.  If there is a match, then the messages pass authentication and can be delivered.  However, if there is no match, authentication will fail and the email will either be rejected or delivered to the spam folder.
 +
 +
 +===== Sender ID vs. SPF =====
 +
 +Sender ID addresses a very different problem than SPF.
 +
 +  * SPF validates the HELO domain and the MAIL FROM address against the policies published via DNS (SPF record).
 +  * Sender ID validates one of the message's address header fields defined by [[http://tools.ietf.org/html/rfc2822|RFC 2822]].  Since it was derived from SPF, Sender ID can also validate the MAIL FROM.  But it defines the new PRA identity to validate, and defines new sender policy record tags that specify whether a policy covers MAIL FROM (called MFROM by Sender ID), PRA, or both.
 +
 +Unlike SPF which validates against the envelope’s return-path address which is the root or subdomain, Sender ID validates based on the PRA and uses the header field with the email address to identify the visible sender of the message. Since headers are not required by the SMTP protocol, Sender ID uses the content of the message to provide an extra layer of protection against spammers and phishers that is very different from SPF which validates on the domain or connection level.
 +
 +Sender ID and SPF should both be adopted along with DKIM.  These methodologies complement each other and in doing so, provide the best protection against phishing.
 +
 +Neither is better because they solve different problems:
 +
 +  * SPF can be compared to other SMTP layer protocol like CSV/CSA.
 +  * Sender ID can be compared to other RFC 2822 layer protocols like DomainKeys IM(DKIM)
 +
 +
 +===== Advantages of using SenderID =====
  
 It does mean that you must create and delegate a subdomain for 3rd parties to send on behalf of you and publish their SPF records in that subdomain's SenderID record.  If you ever change 3rd parties, you must update this SenderID record.  And if this 3rd party ever starts sending spam using your subdomain, it will pass a SenderID check (it can also pass an SPF check). It does mean that you must create and delegate a subdomain for 3rd parties to send on behalf of you and publish their SPF records in that subdomain's SenderID record.  If you ever change 3rd parties, you must update this SenderID record.  And if this 3rd party ever starts sending spam using your subdomain, it will pass a SenderID check (it can also pass an SPF check).
  
 However, even if it does go rogue, it can only pass a SenderID check for this delegated subdomain.  In this example, it can only SenderID pass news.example.com.  It will not pass example.com, confirmations.example.com, and so forth.  The damage is contained (and can be revoked by unpublishing the IPs from the SenderID record). However, even if it does go rogue, it can only pass a SenderID check for this delegated subdomain.  In this example, it can only SenderID pass news.example.com.  It will not pass example.com, confirmations.example.com, and so forth.  The damage is contained (and can be revoked by unpublishing the IPs from the SenderID record).
bind_-_senderid/senderid_introduction.1480421324.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki