<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: getdmarcly</title>
    <description>The latest articles on DEV Community by getdmarcly (@getdmarcly).</description>
    <link>https://dev.to/getdmarcly</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F296541%2Fa45bdbd9-672c-45e6-8935-4fd99ca5ec8f.png</url>
      <title>DEV Community: getdmarcly</title>
      <link>https://dev.to/getdmarcly</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/getdmarcly"/>
    <language>en</language>
    <item>
      <title>How to Receive DMARC Reports: DMARC Reporting Setup Guide</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Thu, 12 May 2022 09:16:47 +0000</pubDate>
      <link>https://dev.to/getdmarcly/how-to-receive-dmarc-reports-dmarc-reporting-setup-guide-1ojl</link>
      <guid>https://dev.to/getdmarcly/how-to-receive-dmarc-reports-dmarc-reporting-setup-guide-1ojl</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lahLkeQG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dwn1wd2od44gyn1txink.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lahLkeQG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dwn1wd2od44gyn1txink.jpeg" alt="How to Receive DMARC Reports: DMARC Reporting Setup Guide" width="880" height="478"&gt;&lt;/a&gt;&lt;br&gt;
DMARC reports on the current status of your email authentication program by sending DMARC reports to the specified mailboxes. We will go over how to set up DMARC reporting to receive DMARC reports in this post.&lt;/p&gt;

&lt;p&gt;When you publish a DMARC record in the DNS, not only can you specify the policy which instructs email servers how to dispose of unauthenticated emails, but also you can request mailbox providers to send DMARC reports via the rua and ruf tags.&lt;/p&gt;

&lt;p&gt;These reports contain information about your email streams or even individual email messages, which provides you with insights into the authentication statuses of your email streams. You should keep monitoring such information to properly authenticate all your legitimate email streams.&lt;/p&gt;
&lt;h4&gt;
  
  
  A typical DMARC reporting scenario
&lt;/h4&gt;

&lt;p&gt;First things first, let's take a look at the parties involved in a typical DMARC reporting scenario: brand, ESP, mailbox provider, and report recipient.&lt;/p&gt;

&lt;p&gt;The brand is the owner of the domain on which one implements DMARC to monitor the email authentication status. For example, if a company called AcmeCorp and it owns acmecorp.com, AcmeCorp is the brand.&lt;/p&gt;

&lt;p&gt;The ESP (Email Service Provider) provides an email delivery service through which the brand can send emails to its customers, partners, etc. For example, SendGrid is an ESP used by AcmeCorp to deliver emails.&lt;/p&gt;

&lt;p&gt;The mailbox provider hosts mailboxes for email end users. For example, Gmail, as a mailbox provider, hosts over 1 billion mailboxes for its whopping user base. Email messages from ESPs are delivered and saved in mailboxes and end users can view them later.&lt;/p&gt;

&lt;p&gt;The report recipient is the email address that the DMARC reporting emails will be sent to. The brand can choose an arbitrary email address as long as it's accessible to the brand. The brand's IT administrator will download and analyze the reports attached to the DMARC reporting emails.&lt;/p&gt;

&lt;p&gt;The scenario is illustrated below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--M1yMMLwU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ql4hfwf3fhl60yckl36f.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--M1yMMLwU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ql4hfwf3fhl60yckl36f.jpeg" alt="DMARC-reporting-illustrated" width="800" height="1132"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To string things together, picture this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AcmeCorp's IT administrator Adam publishes a DMARC record on domain acmecorp.com.&lt;/li&gt;
&lt;li&gt;The DMARC record points the rua (and possible ruf) tag to the email address &lt;a href="mailto:reports@acmecorp.org"&gt;reports@acmecorp.org&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;AcmeCorp (and possibly scammers) sends tons of business emails via domain acmecorp.com to its customers everyday.&lt;/li&gt;
&lt;li&gt;Mailbox providers like Gmail send DMARC reports on these business emails to &lt;a href="mailto:reports@acmecorp.org"&gt;reports@acmecorp.org&lt;/a&gt; as requested.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
  
  
  2 types of DMARC reports
&lt;/h4&gt;

&lt;p&gt;DMARC supports 2 types of reports: aggregate reports and failure (forensic) reports. These 2 reports serve different purposes.&lt;/p&gt;

&lt;p&gt;Aggregate reports contain information about groups of email messages, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;source IP;&lt;/li&gt;
&lt;li&gt;organization that sent the report;&lt;/li&gt;
&lt;li&gt;SPF domain;&lt;/li&gt;
&lt;li&gt;SPF outcome: pass or fail;&lt;/li&gt;
&lt;li&gt;SPF authentication result: none, neutral, pass, fail, softfail, temperror, or permerror;&lt;/li&gt;
&lt;li&gt;DKIM domain;&lt;/li&gt;
&lt;li&gt;DKIM outcome: pass or fail;&lt;/li&gt;
&lt;li&gt;DKIM authentication result: none, neutral, pass, fail, policy, temperror, permerror;&lt;/li&gt;
&lt;li&gt;disposition: none, quarantine, or reject;&lt;/li&gt;
&lt;li&gt;sent date.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For the most part, aggregate reports are used to analyze the authentication statuses of email streams and reach a full DMARC implementation (p=reject).&lt;/p&gt;

&lt;p&gt;Failure (forensic) reports contain all the information about individual email messages, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;arrival date;&lt;/li&gt;
&lt;li&gt;source IP;&lt;/li&gt;
&lt;li&gt;from;&lt;/li&gt;
&lt;li&gt;to;&lt;/li&gt;
&lt;li&gt;subject;&lt;/li&gt;
&lt;li&gt;content;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;and more...&lt;/p&gt;

&lt;p&gt;As you can see, failure reports contain &lt;a href="https://en.wikipedia.org/wiki/Personal_data"&gt;Personally Identifiable Information (PII)&lt;/a&gt;. Due to privacy concerns , many mailbox providers including Gmail have dropped support for DMARC failure reports. As a result, only a few mailbox providers still send failure reports, including LinkedIn and 163.com. Keep this in mind when you are not receiving failure reports as expected.&lt;/p&gt;
&lt;h4&gt;
  
  
  Request to send aggregate reports
&lt;/h4&gt;

&lt;p&gt;Requesting mailbox providers to send DMARC aggregate reports to your specified email addresses is a straightforward process. It's nothing more than specifying an email address in the rua tag of your DMARC record.&lt;/p&gt;

&lt;p&gt;For example, if you want to request that aggregate reports be sent to an email address that you have access to: &lt;a href="mailto:aggregate_reports@reporting.org"&gt;aggregate_reports@reporting.org&lt;/a&gt;, you can publish a DMARC record like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;v=DMARC1; p=none; rua=mailto:aggregate_reports@reporting.org;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Request to send failure reports
&lt;/h4&gt;

&lt;p&gt;Similar to requesting for aggregate reports, you can request to send failure reports to an arbitrary email address accessible to you.&lt;/p&gt;

&lt;p&gt;For example, if you want to request that failure reports be sent to: &lt;a href="mailto:failure_reports@reporting.org"&gt;failure_reports@reporting.org&lt;/a&gt;, you can add a ruf tag with that email to your DMARC record:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;v=DMARC1; p=none; rua=mailto:aggregate_reports@reporting.org; ruf=mailto:failure_reports@reporting.org;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Set up External Destination Verification (EDV)
&lt;/h4&gt;

&lt;p&gt;In the discussion above, I assume you own reporting.org, therefore it's completely legitimate for you to request to send reports to an email address on that domain. However, what if someone with malicious intent outside your organization requests to send DMARC reports to &lt;a href="mailto:aggregate_reports@reporting.org"&gt;aggregate_reports@reporting.org&lt;/a&gt;? Wouldn't that spam your mailbox allocated for receiving your own DMARC reports?&lt;/p&gt;

&lt;p&gt;The answer is yes. This is why DMARC won't send reports until the owners of the domains specified in rua and ruf tags have explicitly granted permissions.&lt;/p&gt;

&lt;p&gt;To learn how to set up EDV, refer to: &lt;a href="//../why-am-i-not-receiving-dmarc-aggregate-or-forensic-reports"&gt;Why Am I Not Receiving DMARC Aggregate or Forensic Reports?&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  DMARC reporting interval
&lt;/h4&gt;

&lt;p&gt;You can request DMARC to send reports at a certain interval via the optional ri tag. The value of the ri tag is in seconds.&lt;/p&gt;

&lt;p&gt;For example, the following DMARC record requests to send reports every 86400 seconds, which is 24 hours:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;v=DMARC1; p=none; rua=mailto:aggregate_reports@reporting.org; ruf=mailto:failure_reports@reporting.org; ri=86400;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note that not all mailbox providers honor requests with intervals shorter than 86400 seconds. If you specify an interval value under 86400, it's possible that the value is ignored and aggregate reports are sent daily instead.&lt;/p&gt;

&lt;h4&gt;
  
  
  Set up mailboxes for incoming DMARC reports
&lt;/h4&gt;

&lt;p&gt;There are a couple of ways to prepare mailboxes for receiving DMARC reports. You can choose the one that works the best for you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;use DMARCLY's auto-generated mailboxes; this is the simplest method as it handles the downloading, parsing and rendering of DMARC reports for you as well. &lt;a href="https://dmarcly.com/register"&gt;Sign up&lt;/a&gt; to use DMARCLY's mailboxes;&lt;/li&gt;
&lt;li&gt;use your own mailboxes; you will need to maintain your own mailboxes and handle report downloading, parsing and rendering.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Troubleshooting
&lt;/h4&gt;

&lt;p&gt;If you've set up DMARC reporting, and are not receiving reports after a few days, you might need to check your DMARC implementation.&lt;/p&gt;

&lt;p&gt;Check out this post &lt;a href="//../why-am-i-not-receiving-dmarc-aggregate-or-forensic-reports"&gt;Why Am I Not Receiving DMARC Aggregate or Forensic Reports?&lt;/a&gt; on how to troubleshoot DMARC reporting issues.&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/how-to-receive-dmarc-reports-dmarc-reporting-set-up-guide"&gt;How to Receive DMARC Reports: DMARC Reporting Setup Guide&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Everything about a DMARC Record</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Thu, 12 May 2022 09:00:10 +0000</pubDate>
      <link>https://dev.to/getdmarcly/everything-about-a-dmarc-record-3po3</link>
      <guid>https://dev.to/getdmarcly/everything-about-a-dmarc-record-3po3</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XPzFAav---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pxkc4mv8ky4ct6n5iyzd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XPzFAav---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pxkc4mv8ky4ct6n5iyzd.png" alt="Everything about a DMARC Record" width="880" height="440"&gt;&lt;/a&gt;&lt;br&gt;
A DMARC record lies at the center of every DMARC implementation, bearing crucial importance for the ultimate success of the implementation. In this post, we are going to take a deep dive into DMARC records.&lt;/p&gt;
&lt;h4&gt;
  
  
  What is a DMARC record?
&lt;/h4&gt;

&lt;p&gt;A DMARC record is a TXT record published in the DNS on your domain, under &lt;em&gt;dmarc.yourdomain.com&lt;/em&gt;, where “yourdomain.com” is your actual domain or subdomain. It tells the email receiver what to do when an email message fails DMARC authentication, and also where to send reports on email delivery statistics.&lt;/p&gt;

&lt;p&gt;A DMARC record consists of a list of DMARC tags. Each tag is a pair of key/value separated by =.The table below shows what each tag possibly found in a DMARC record means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;v: DMARC protocol version. The default is "DMARC1";&lt;/li&gt;
&lt;li&gt;p: Apply this policy to emails that fail the DMARC check. This policy can be set to 'none', 'quarantine', or 'reject'. 'none' is used to collect the DMARC report and gain insight into the current emailflows and their status;&lt;/li&gt;
&lt;li&gt;rua: A list of URIs for email service providers to send aggregate reports to. NOTE: this is not a list of email addresses. DMARC requires a list of URIs of the form 'mailto:&lt;a href="mailto:test@example.com"&gt;test@example.com&lt;/a&gt;';&lt;/li&gt;
&lt;li&gt;ruf: A list of URIs for ISPs to send forensic reports to. NOTE: this is not a list of email addresses. DMARC requires a list of URIs of the form 'mailto:&lt;a href="mailto:test@example.org"&gt;test@example.org&lt;/a&gt;';&lt;/li&gt;
&lt;li&gt;sp: This policy should be applied to email from a subdomain of this domain that fail the DMARC check. Using this tag domain owners can publish a 'wildcard' policy for all subdomains;&lt;/li&gt;
&lt;li&gt;fo: Forensic options. Allowed values: '0' to generate reports if both DKIM and SPF fail, '1' to generate reports if either DKIM or SPF fails to produce a DMARC pass result, 'd' to generate report if DKIM has failed or 's' if SPF failed;&lt;/li&gt;
&lt;li&gt;rf: The reporting format for forensic reports;&lt;/li&gt;
&lt;li&gt;pct: The percentage tag instructs ISPs to only apply the DMARC policy to a percentage of failing email's. 'pct = 50' will tell receivers to only apply the 'p = ' policy 50% of the time against email's that fail the DMARC check. NOTE: this will not work for the 'none' policy, but only for 'quarantine' or 'reject' policies;&lt;/li&gt;
&lt;li&gt;adkim: Specifies the 'Alignment Mode' for DKIM signatures, this can be either 'r' (Relaxed) or 's' (Strict). In Relaxed mode also authenticated DKIM signing domains (d=) that share a Organizational Domain with an emails From domain will pass the DMARC check. In Strict mode an exact match is required;&lt;/li&gt;
&lt;li&gt;aspf: Specifies the 'Alignment Mode' for SPF, this can be either 'r' (Relaxed) or 's' (Strict). In Relaxed mode also authenticated SPF domains that share a Organizational Domain with an emails From domain will pass the DMARC check. In Strict mode an exact match is required;&lt;/li&gt;
&lt;li&gt;ri: The reporting interval for how often you'd like to receive aggregate XML reports. This is a preference and ISPs could (and most likely will) send the report on different intervals (normally this will be daily).&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
  
  
  DMARC record VS DMARC policy
&lt;/h4&gt;

&lt;p&gt;A DMARC policy is an important part of a DMARC record: it's the value of the p= tag in the record. It specifies how an ESP (Email Service Provider) like Gmail should handle an incoming email message if it fails DMARC authentication. There are 3 options: none (monitor), quarantine, and reject, with each one representing a different level of protection against spoofing.&lt;/p&gt;
&lt;h4&gt;
  
  
  DMARC record examples
&lt;/h4&gt;

&lt;p&gt;Here are a few DMARC record examples:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;v=DMARC1; p=none; rua=mailto:&lt;a href="mailto:5b18acdef12f1@ag.dmarcly.com"&gt;5b18acdef12f1@ag.dmarcly.com&lt;/a&gt;; this DMARC record sets DMARC policy to monitoring mode (p=none), which allows you to monitor email delivery, without sending failed emails to spam or rejecting them; also, sends aggregate reports to &lt;a href="mailto:5b18acdef12f1@ag.dmarcly.com"&gt;5b18acdef12f1@ag.dmarcly.com&lt;/a&gt;;&lt;/li&gt;
&lt;li&gt;v=DMARC1; p=quarantine; rua=mailto:&lt;a href="mailto:5b18acdef12f1@ag.dmarcly.com"&gt;5b18acdef12f1@ag.dmarcly.com&lt;/a&gt;; this DMARC record sets DMARC policy to quarantine mode (p=quarantine), which allows you to monitor email delivery, and sends emails that fail DMARC authentication to spam; also, sends aggregate reports to &lt;a href="mailto:5b18acdef12f1@ag.dmarcly.com"&gt;5b18acdef12f1@ag.dmarcly.com&lt;/a&gt;;&lt;/li&gt;
&lt;li&gt;v=DMARC1; p=reject; rua=mailto:&lt;a href="mailto:5b18acdef12f1@ag.dmarcly.com"&gt;5b18acdef12f1@ag.dmarcly.com&lt;/a&gt;; this DMARC record sets DMARC policy to reject mode (p=reject), which allows you to monitor email delivery, and rejects emails that fail DMARC authentication; also, sends aggregate reports to &lt;a href="mailto:5b18acdef12f1@ag.dmarcly.com"&gt;5b18acdef12f1@ag.dmarcly.com&lt;/a&gt;. This DMARC record offers complete email protection against spoofing.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
  
  
  How is a DMARC record used?
&lt;/h4&gt;

&lt;p&gt;There are 2 aspects when a DMARC record is put to use: publishing and checking. The publishing part happens on the domain owner side, while the checking part happens on the ESP side.&lt;/p&gt;

&lt;p&gt;At implementation time, the domain owner publishes a DMARC record to the DNS, with DMARC tags appropriately set up. Each time the ESP receives an email, it looks up the DNS for the DMARC record, if any, and enforces the policy per the DMARC authentication result.&lt;/p&gt;

&lt;p&gt;Together, the domain owner and ESP work towards an ultimate reject DMARC policy, where any email that fails DMARC authentication is rejected.&lt;/p&gt;
&lt;h4&gt;
  
  
  How to generate a DMARC record?
&lt;/h4&gt;

&lt;p&gt;There are 2 ways to generate a DMARC record: manually and using a DMARC record generator.&lt;/p&gt;

&lt;p&gt;If you are generating a DMARC record manually, you can use any text editor to create the record. 3 tags are essential: v, p, and rua. The v tag must be DMARC1. Depending on the phase of your DMARC implementation, p can be none, quarantine, or reject. Finally you can specify the mailbox of your choice using rua.&lt;/p&gt;

&lt;p&gt;Using a tool like &lt;a href="https://dmarcly.com/tools/dmarc-generator"&gt;DMARC record generator&lt;/a&gt;, it's easier and less error-prone. Enter the settings like policy, aggregate email address, etc. and click the Generate DMARC Record button, like this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FsC3cEd2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ql4e8vom6id96wl90a6z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FsC3cEd2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ql4e8vom6id96wl90a6z.png" alt="Generate DMARC record" width="880" height="607"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A DMARC record will be generated instantly. If you make changes to the settings, make sure to generate the DMARC record again, so that it can be updated.&lt;/p&gt;
&lt;h4&gt;
  
  
  How to publish a DMARC record?
&lt;/h4&gt;

&lt;p&gt;After a DMARC record is generated, you need to publish it to the DNS, so that the ESP can pick the DMARC record up and enforce it.&lt;/p&gt;

&lt;p&gt;To do so, log in to your DNS management console, choose the domain you need to publish the DMARC record on, e.g., mydomain.com.&lt;/p&gt;

&lt;p&gt;Create a TXT entry on mydomain.com with these settings:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Type: TXT
Host: _dmarc
TXT Value: (DMARC record generated above)
TTL: 1 hour
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For example, here is what it looks like in GoDaddy's DNS management console:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---2mrwswB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sbxumgdhzvl0ncqljxym.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---2mrwswB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sbxumgdhzvl0ncqljxym.png" alt="Publish DMARC Record In GoDaddy" width="880" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you are using CloudFlare, here is what it looks like:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_xipotho--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2dkpxkam8v18q4shvjgq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_xipotho--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2dkpxkam8v18q4shvjgq.png" alt="Publish DMARC Record In CloudFlare" width="880" height="47"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  How to check a DMARC record?
&lt;/h4&gt;

&lt;p&gt;After published, it takes up to 1 hour for the DMARC record to become accessible (usually much faster though). You can then use our DMARC checker to confirm that you have published the DMARC record successfully: &lt;a href="https://dmarcly.com/tools/dmarc-checker"&gt;DMARC Checker&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Use modern DMARC software to automate DMARC report analysis
&lt;/h4&gt;

&lt;p&gt;A few days into the deployment, you should be receiving DMARC aggregate reports in your mailbox. At this point, it's time to parse and analyze the reports to check if your email flow is set up correctly or not. It's recommended that you use modern DMARC software like DMARCLY to automate the steps required for DMARC report analysis: setting up mailbox, downloading reports, parsing and rendering reports. Here is an example screenshot of rendered DMARC chart:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--skVtTFCt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r95ugan8qhqta6vkrycl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--skVtTFCt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r95ugan8qhqta6vkrycl.png" alt="View DMARC aggregate reports as charts and tables" width="880" height="453"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Using DMARCLY, all you need to do is to log in to the dashboard, and view the chart readily available. No doubt it's a big time-saver!&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/everything-about-a-dmarc-record"&gt;Everything about a DMARC Record&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How to Check Email for Spam Using a Free Email Spam Checker?</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Thu, 12 May 2022 07:12:25 +0000</pubDate>
      <link>https://dev.to/getdmarcly/how-to-check-email-for-spam-using-a-free-email-spam-checker-415i</link>
      <guid>https://dev.to/getdmarcly/how-to-check-email-for-spam-using-a-free-email-spam-checker-415i</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_-bQ5MPs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/07lbf7e5g91iteuzyxkn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_-bQ5MPs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/07lbf7e5g91iteuzyxkn.png" alt="How to Check Email for Spam Using a Free Email Spam Checker" width="800" height="482"&gt;&lt;/a&gt;&lt;br&gt;
This post introduces a quick way to check for email spam by sending a test message to &lt;a href="mailto:check@dmarcly.com"&gt;check@dmarcly.com&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Why is email spam checking important?
&lt;/h4&gt;

&lt;p&gt;No matter how pretty your email template looks or how powerful your copy sounds, unless a significant portion of your messages land in the inbox, your campaign doesn't really matter.&lt;/p&gt;

&lt;p&gt;A quick check on your email comes in handy in this case before you send the email blast to your audience. Such a check returns information about email authentication, IP blacklisting, spam score, etc. It helps give confidence that your email infrastructure is in good standing and your messages will probably land properly.&lt;/p&gt;

&lt;h4&gt;
  
  
  How to use the free email spam checker?
&lt;/h4&gt;

&lt;p&gt;To use DMARCLY's free email spam checker, all it takes is to send an email message to &lt;a href="mailto:check@dmarcly.com"&gt;check@dmarcly.com&lt;/a&gt;. After DMARCLY receives the message, it will perform an fairly comprehensive analysis of the message and send a report back to your email address.&lt;/p&gt;

&lt;p&gt;In a matter of minutes (usually seconds), you will find the report in your inbox. Just open the email and make sure everything looks OK to you.&lt;/p&gt;

&lt;p&gt;An example email spam check report looks like this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BNDUeVpM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9fx18rw1tw6asvubcmih.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BNDUeVpM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9fx18rw1tw6asvubcmih.png" alt="Free Email Spam Check Results" width="800" height="2532"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Email spam report analysis
&lt;/h4&gt;

&lt;p&gt;Here is a breakdown of the above email spam check report.&lt;/p&gt;

&lt;p&gt;The report consists of a few sections covering email authentication, BIMI, MTA-STS, IP blacklists, and spam score.&lt;/p&gt;

&lt;p&gt;The email authentication sections, including DMARC, DKIM, and SPF indicate if your email authentication settings are correct and if your test email message was properly authenticated on the receiving server.&lt;/p&gt;

&lt;p&gt;Refer to this post on how to set up email authentication: &lt;a href="https://dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide"&gt;How to Implement DMARC/DKIM/SPF&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The BIMI section shows if you have BIMI set up on your domain. BIMI helps improves your click through rates (CTR) by displaying your brand logo next to your email messages.&lt;/p&gt;

&lt;p&gt;Learn more about BIMI here: &lt;a href="https://dmarcly.com/blog/what-is-bimi-bimi-explained"&gt;What is BIMI?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The MTA-STS/TLS-RPT section indicates if you have MTA-STS set up on your email domain. MTA-STS helps mitigate MiTM attacks by dictating that email servers that support MTA-STS will not send emails to their domain via an unencrypted connection.&lt;/p&gt;

&lt;p&gt;Learn more about MTA-STS/TLS-RPT here: &lt;a href="https://dmarcly.com/blog/how-to-set-up-mta-sts-and-tls-reporting"&gt;How to Set Up MTA-STS and TLS Reporting?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The IP blacklisting section indicates if your sending IP address is blacklisted by any of these mainstream blacklists: Spamhaus ZEN, SpamCop Blocking List, Barracuda Reputation Block List, and Passive Spam Block List.&lt;/p&gt;

&lt;p&gt;The spam score section shows the spam score returned by SpamAssassin, a popular email spam filter. Any email message with a spam score above 5 is considered spam, otherwise not.&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/how-to-check-email-for-spam-using-a-free-email-spam-checker"&gt;How to Check Email for Spam Using a Free Email Spam Checker?&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>No Auth, No Entry: Don't Let Your Email Go to Spam or Be Rejected</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Thu, 12 May 2022 00:55:45 +0000</pubDate>
      <link>https://dev.to/getdmarcly/no-auth-no-entry-dont-let-your-email-go-to-spam-or-be-rejected-176e</link>
      <guid>https://dev.to/getdmarcly/no-auth-no-entry-dont-let-your-email-go-to-spam-or-be-rejected-176e</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--AjWHtHn3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5916hafxm7d4kdx29hbc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--AjWHtHn3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5916hafxm7d4kdx29hbc.png" alt="No Auth, No Entry: Don't Let Your Email Go to Spam or Be Rejected" width="880" height="440"&gt;&lt;/a&gt;&lt;br&gt;
"No auth, no entry" is a catchy phrase commonly used in the email industry to mean an email won't be considered for delivery unless it's properly authenticated. "auth" here means email authentication based on modern email authentication technologies like SPF, DKIM, and DMARC.&lt;/p&gt;

&lt;p&gt;That's is to say, if your email is not authenticated, it will either go to spam or be rejected outright.&lt;/p&gt;

&lt;h4&gt;
  
  
  What is email authentication
&lt;/h4&gt;

&lt;p&gt;Email authentication is a DNS-based mechanism that allows the receiving email server to check if an email is actually from where it claims to have originated from. For example, if an email claims to have originated from (From address: &lt;a href="mailto:joe@example.com"&gt;joe@example.com&lt;/a&gt;) the domain example.com, AKA sender domain, with email authentication properly implemented, the receiving email server will be able to verify one of the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;the email is from one of the in-house email servers at example.com;&lt;/li&gt;
&lt;li&gt;the email is from one of the 3rd-party email servers authorized by example.com's administrator to deliver emails on behalf of example.com.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If either one of the above is true, we say the email passes email authentication; otherwise it fails.&lt;/p&gt;

&lt;p&gt;Email authentication can effectively prevent or stop email spoofing, a commonly used vehicle to initiate email-borne attacks like email phishing, business email compromise (BEC), malware, etc.&lt;/p&gt;

&lt;p&gt;Some email service providers (ESPs) like Gmail put unauthenticated emails in spam by default; while Microsoft Office 365 takes a step even further: they block email sender domains automatically if they fail DMARC authentication.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The Antispam policy allows administrators to “Allow” domains regardless of the reputation of the domain. We’re changing our policies to not honor Allow rules when the domain fails authentication.&lt;br&gt;&lt;br&gt;— Microsoft Office 365, April 2020&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Learn more about this &lt;a href="https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=&amp;amp;searchterms=62398"&gt;rollout&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Benefits of implementing email authentication
&lt;/h4&gt;

&lt;p&gt;As "no auth, no entry" indicates, email service providers are increasingly using email authentication technologies to verify that an email is really from the claimed source before even considering it for inbox placement.&lt;/p&gt;

&lt;p&gt;If an email fails both the SPF and DKIM checks, it probably goes to spam or rejected outright, depending on your DMARC settings or the email service provider's policy. Either way, the intended recipient is unlikely to open and read it.&lt;/p&gt;

&lt;p&gt;Plus, if your sender domain is not protected by a DMARC p=quarantine or p=reject policy, chances are good that your domain is spoofed. A spoofed sender domain usually has a low sender reputation which results from low engagement rates. Consequently, even legitimate emails sent from your domain might end up going to spam due to the low sender reputation. &lt;/p&gt;

&lt;p&gt;Therefore, your best bet is to implement full email authentication using SPF, DKIM, and DMARC to fight off malicious email spoofing attacks, and improve deliverability for legitimate emails.&lt;/p&gt;

&lt;h4&gt;
  
  
  How to implement email authentication
&lt;/h4&gt;

&lt;p&gt;Implementing email authentication involves 2 things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;set up SPF and DKIM for your email domain; here are a few tutorials for common email delivery services:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/how-to-set-up-spf-and-dkim-for-amazon-ses"&gt;How to Set Up SPF and DKIM for Amazon SES&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/how-to-set-up-spf-and-dkim-for-mailchimp"&gt;How to Set Up SPF and DKIM for Mailchimp&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/how-to-set-up-spf-and-dkim-for-sendgrid"&gt;How to Set Up SPF and DKIM for SendGrid&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;set up DMARC monitoring to ensure all legitimate email streams are authorized, and authorize new email streams as they come in; here is a 5-minute guide:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/how-to-set-up-dmarc-in-3-easy-steps"&gt;How To Set Up DMARC In 3 Easy Steps&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To relieve the burden of having to receive and parse DMARC reports everyday, you can use a &lt;a href="https://dmarcly.com"&gt;dedicated DMARC monitoring service&lt;/a&gt; to ensure that all your legitimate email streams are properly authenticated.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What is BIMI: BIMI Explained.</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Wed, 11 May 2022 12:00:06 +0000</pubDate>
      <link>https://dev.to/getdmarcly/what-is-bimi-bimi-explained-5f6d</link>
      <guid>https://dev.to/getdmarcly/what-is-bimi-bimi-explained-5f6d</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3o5vVAGm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m5dlf5kyicqesebrw9t3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3o5vVAGm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m5dlf5kyicqesebrw9t3.png" alt="What is BIMI: BIMI Explained." width="880" height="440"&gt;&lt;/a&gt;&lt;br&gt;
This article explains what BIMI is, how to implement it to increase email credibility, boost engagement rate, and improve email deliverability and open rates.&lt;/p&gt;
&lt;h4&gt;
  
  
  What is BIMI?
&lt;/h4&gt;

&lt;p&gt;BIMI, short for Brand Indicator for Message Identification, allows domain owners to coordinate with email clients to display brand logos next to authenticated email messages.&lt;/p&gt;
&lt;h4&gt;
  
  
  Why BIMI?
&lt;/h4&gt;

&lt;p&gt;Without BIMI, email clients display a generic placeholder logo with brand initials. The recipient might have a hard time recognizing your brand without resorting to the brand name.&lt;/p&gt;

&lt;p&gt;However, with BIMI implemented, the brand logo is displayed next to your email message, boosting brand awareness.&lt;/p&gt;

&lt;p&gt;A comparison between email message without BIMI enabled and with BIMI enabled can be see from below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rlQIIKN---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pc3eh3a9ue2a53vbq7t2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rlQIIKN---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pc3eh3a9ue2a53vbq7t2.png" alt="No BIMI VS BIMI" width="880" height="120"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As you can see from the illustration, on the left where BIMI is not enabled, a generic logo is displayed, which is not very interesting. However, on the right where BIMI is enabled, a brand logo appears next to the email message, instantly boosting trust and invites the recipient to open the message.&lt;/p&gt;

&lt;p&gt;Here is what an email message with a trusted brand logo looks like, when BIMI is enabled:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RljhnZ6c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o6htdot15pj6u4hg6k6t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RljhnZ6c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o6htdot15pj6u4hg6k6t.png" alt="gmail-bimi-brand-logo" width="880" height="550"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In contrast, an email message sent from a domain without BIMI implemented displays no brand logo:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zkjymz-c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gk2bvwoyouiqqrwir6h9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zkjymz-c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gk2bvwoyouiqqrwir6h9.png" alt="gmail-no-bimi-brand-logo" width="880" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Obviously, BIMI helps build/increase brand awareness and user trust, and consequently boosts engagement rate, which ultimately improves email deliverability.&lt;/p&gt;
&lt;h4&gt;
  
  
  Prerequisites for BIMI
&lt;/h4&gt;

&lt;p&gt;Since brand logos are displayed only for authenticated messages, you need to set up SPF, DKIM and DMARC first.&lt;/p&gt;

&lt;p&gt;To set up SPF, DKIM and DMARC on your domain, refer to our &lt;a href="https://dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide"&gt;ultimate guide&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In addition, make sure your DMARC policy is either p=quarantine or p=reject.&lt;/p&gt;

&lt;p&gt;Once these requirements are met, you can proceed to implement BIMI.&lt;/p&gt;
&lt;h4&gt;
  
  
  How to implement BIMI?
&lt;/h4&gt;

&lt;p&gt;Implementing BIMI on your domain takes these steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;register a trademark for the brand logo;&lt;/li&gt;
&lt;li&gt;buy a Verified Mark Certificate (VMC);&lt;/li&gt;
&lt;li&gt;upload the VMC to your server;&lt;/li&gt;
&lt;li&gt;upload your brand logo;&lt;/li&gt;
&lt;li&gt;create a BIMI record;&lt;/li&gt;
&lt;li&gt;publish your BIMI record in the DNS;&lt;/li&gt;
&lt;li&gt;check the BIMI record to ensure success.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;We will walk through the steps in detail below.&lt;/p&gt;
&lt;h5&gt;
  
  
  1 Register a trademark for the brand logo
&lt;/h5&gt;

&lt;p&gt;Some mailbox service providers like Gmail require a Verified Mark Certificate (VMC) for a BIMI implementation. Before you buy and set up a VMC though, you must register your brand logo as a trademark with an intellectual property office recognized by VMC issuers like DigiCert and Entrust.&lt;/p&gt;

&lt;p&gt;You can search for your brand logo on this &lt;a href="https://www3.wipo.int/branddb/en/"&gt;Brand Database&lt;/a&gt; run by World Intellectual Property Organization (WIPO).&lt;/p&gt;
&lt;h5&gt;
  
  
  2 Buy a VMC
&lt;/h5&gt;

&lt;p&gt;Once your brand logo is registered as a trademark, you can navigate to one of the following VMC issuers' websites to acquire a VMC: &lt;a href="https://www.digicert.com/tls-ssl/verified-mark-certificates"&gt;DigiCert&lt;/a&gt; and &lt;a href="https://www.entrust.com/"&gt;Entrust&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;During this process, you will need to submit an SVG file of your brand logo, and obtain a PEM file referencing the SVG file from the issuer service.&lt;/p&gt;
&lt;h5&gt;
  
  
  3 Upload the VMC to your server
&lt;/h5&gt;

&lt;p&gt;After you obtain the PEM file from the Certificate Authority (CA) of your choice, you will need to upload it to your web server so that it becomes accessible to anyone.&lt;/p&gt;

&lt;p&gt;Note that your web server must be secured with HTTPS, and the url to the PEM file must start with &lt;strong&gt;https://&lt;/strong&gt;, otherwise it will fail.&lt;/p&gt;

&lt;p&gt;As a result, you will get a url to the PEM file that looks like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;https://yourserver.com/vmc.pem
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h5&gt;
  
  
  4 Upload your brand logo
&lt;/h5&gt;

&lt;p&gt;Similar to the PEM file, you need to upload your brand logo, in SVG format, to a server so that it's accessible from anywhere.&lt;/p&gt;

&lt;p&gt;As a result, you will get a url to the logo that looks like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;https://yourserver.com/logo.svg
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We will need this url when creating a BIMI record in step 5.&lt;/p&gt;

&lt;h5&gt;
  
  
  5 Create a BIMI record
&lt;/h5&gt;

&lt;p&gt;Similar to DMARC records, a BIMI record is a string that consists of multiple tags, separated by semicolons.&lt;/p&gt;

&lt;p&gt;There are 2 mandatory tags in a BIMI record: v and l.&lt;/p&gt;

&lt;p&gt;The v tag specifies the BIMI version. Currently it must be BIMI1.&lt;/p&gt;

&lt;p&gt;The l tag specifies the logo url.&lt;/p&gt;

&lt;p&gt;The a tag contains the url of the VMC PEM file. This tag is required by some mailbox service providers like Gmail.&lt;/p&gt;

&lt;p&gt;Here is an example BIMI record that specifies the logo SVG and the PEM file uploaded:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;v=BIMI1; l=https://yourserver.com/logo.svg;a=https://yourserver.com/vmc.pem
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;One thing to note here is that the content of the SVG that is referenced in the BIMI record should be identical to that of the SVG file that is referenced in your PEM file. Otherwise, BIMI can fail.&lt;/p&gt;

&lt;h5&gt;
  
  
  6 Publish your BIMI record in the DNS
&lt;/h5&gt;

&lt;p&gt;A BIMI record is a TXT record published in the DNS at default._bimi.yourdomain.com.&lt;/p&gt;

&lt;p&gt;A complete BIMI record in the DNS looks like this:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Record Type&lt;/th&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;th&gt;TTL&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;TXT&lt;/td&gt;
&lt;td&gt;default._bimi&lt;/td&gt;
&lt;td&gt;v=BIMI1; l=&lt;a href="https://yourserver.com/logo.svg;a=https://yourserver.com/vmc.pem"&gt;https://yourserver.com/logo.svg;a=https://yourserver.com/vmc.pem&lt;/a&gt;
&lt;/td&gt;
&lt;td&gt;Default&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h5&gt;
  
  
  7 Check the BIMI record
&lt;/h5&gt;

&lt;p&gt;It's always a good idea to check the validity of your BIMI record after you publish it.&lt;/p&gt;

&lt;p&gt;You can use our &lt;a href="https://dmarcly.com/tools/bimi-record-checker?target=_blank"&gt;free BIMI record checker&lt;/a&gt; to check if the BIMI record has been published correctly on your domain. Simply enter your domain and hit the Check Domain button.&lt;/p&gt;

&lt;p&gt;For example, checking BIMI on cnn.com returns:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Prw5euO5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lgi5kfm2kt5b8dweskne.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Prw5euO5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lgi5kfm2kt5b8dweskne.png" alt="bimi-record-checker" width="880" height="530"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If BIMI is set up, the checker will fetch the logo and display it, as shown above.&lt;/p&gt;

&lt;p&gt;It can take up to 48 hours before BIMI displays your brand logo in the mailbox, if set up correctly.&lt;/p&gt;

&lt;p&gt;That's it! You've successfully implemented BIMI on your domain.&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/what-is-bimi-bimi-explained"&gt;What is BIMI: BIMI Explained.&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What Is DKIM Selector and How Does It Work: DKIM Selector Explained</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Wed, 11 May 2022 08:53:47 +0000</pubDate>
      <link>https://dev.to/getdmarcly/what-is-dkim-selector-and-how-does-it-work-dkim-selector-explained-1mei</link>
      <guid>https://dev.to/getdmarcly/what-is-dkim-selector-and-how-does-it-work-dkim-selector-explained-1mei</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--29IgXijS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/drekh8c5ffaxno26egjv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--29IgXijS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/drekh8c5ffaxno26egjv.png" alt="What Is DKIM Selector and How Does It Work: DKIM Selector Explained" width="800" height="400"&gt;&lt;/a&gt;&lt;br&gt;
In this article we will explain various concepts related to DKIM selectors: what are they, why do we need them, and how they work in DKIM authentication.&lt;/p&gt;
&lt;h4&gt;
  
  
  What is DKIM selector?
&lt;/h4&gt;

&lt;p&gt;A DKIM selector, as indicated by the name, is a string used by the outgoing server to locate the private key to sign the email message, and by the receiving server to locate the public key in the DNS to verify the integrity of the email message.&lt;/p&gt;

&lt;p&gt;Each time a private/public key pair is generated, a tuple { selector, private key, public key } is created, where the selector is used to locate the private key and the public key.&lt;/p&gt;
&lt;h4&gt;
  
  
  How to choose a DKIM selector?
&lt;/h4&gt;

&lt;p&gt;A DKIM selector is specified when the user creates a private/public key pair with the email delivery service like SendGrid. It can be any arbitrary string.&lt;/p&gt;
&lt;h4&gt;
  
  
  How to find my DKIM selectors?
&lt;/h4&gt;

&lt;p&gt;When asked for the DKIM selectors on a domain in DMARCLY like this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PtyqHbmh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xxsnfg9cvokjtq9diy85.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PtyqHbmh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xxsnfg9cvokjtq9diy85.png" alt="Find DKIM selectors on domain" width="880" height="185"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;you need to log in to your ESP dashboard to find them, as these are ESP specific.&lt;/p&gt;

&lt;p&gt;For example, if you use Salesforce to deliver emails, you need to log in to their dashboard and find the DKIM selectors specified there.&lt;/p&gt;
&lt;h4&gt;
  
  
  Why do we need multiple DKIM selectors?
&lt;/h4&gt;

&lt;p&gt;Multiple private/public key pairs are required due to the following reasons:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DKIM key rotation which we will explain in the next section;&lt;/li&gt;
&lt;li&gt;setting up DKIM with multiple email delivery services on a single domain; each service can have their own separate selectors so that signing/verifying with one service doesn't interfere with that with another.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each time an email message is sent/verified, only one key pair is used. This is where a DKIM selector comes into play: the DKIM selector is chosen by the signing server to locate (select) the public key in the key pair; and the receiving server uses the same selector to find the public key in the key pair.&lt;/p&gt;
&lt;h4&gt;
  
  
  How do DKIM selectors work in DKIM authentication?
&lt;/h4&gt;

&lt;p&gt;Once the signing server has chosen the selector, the server uses it to find the private key only accessible to the server, to compute the signature. After the signature is computed, the DKIM selector is inserted into the email headers as an s= tag, then the email is sent.&lt;/p&gt;

&lt;p&gt;For example, let's assume that the selector chosen by the signing server is s1, the tag will look like s=s1. Again the selector can be any arbitrarily chosen string like thisismyselector1234, as long as it points to a valid private/public key pair.&lt;/p&gt;

&lt;p&gt;Here is a practical example of DKIM signature header:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dmarcly.com; h=content-transfer-encoding:content-type:from:mime-version:subject: x-feedback-id:to; s=s1; bh=jCC0oQBCKfJ10bCI3PCG52Zwowyeh1haGJPACkWN9F4=; b=GzLBVZ0M1hMt1Y7hVT+ajaNrswTv+/FFVMrcaixD70hpTJwAmNwZUKJIzLslSC+iWHby 9gm+yfx6Z1qnXIL6qgBPnlZD4zwyK4D3Umd1je82jniuD7RJWYDqJH0zL+EevCDdoVZGmT IlxzZB6v95bws6539z/5qee+Xmu5KYe4Y=
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The DKIM selector used in the above DKIM signature is s=s1.&lt;/p&gt;

&lt;p&gt;When the email hits the receiving server, the server looks at the email headers to find the s= tag. If the tag is present, the server extracts the selector from the tag, then looks up the DNS for the public key at the following location:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;s1._domainkey.example.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If the public key is found, the server uses it to decrypt the message to check its integrity. If the check passes, DKIM authentication succeeds; otherwise it fails.&lt;/p&gt;

&lt;p&gt;If no public key is found, DKIM authentication fails.&lt;/p&gt;

&lt;h4&gt;
  
  
  What is DKIM key rotation?
&lt;/h4&gt;

&lt;p&gt;DKIM has proven to be a highly effective means by which a receiver can verify that the signed fields of an email have not been modified in transit. DKIM is as secure as the weakest link - the private key, though. The private key of a DKIM keypair is vulnerable to being stolen if an attacker is able to compromise the system in which it is stored. Therefore, to minimize the risk of active DKIM keys being compromised, they should be changed frequently. This is a practice known as DKIM key rotation.&lt;/p&gt;

&lt;p&gt;Each time a key is rotated, a new {selector, private key, public key} tuple is created. Then the public key will need to be published in the DNS, and you need to re-configure the outgoing email server to use the new private key. After this is done, the outgoing email server will use the new private key to sign all outgoing email messages.&lt;/p&gt;

&lt;p&gt;The old key should be kept for a period of 7 days, after which it can be safely removed. The reason for that is there might be some delay between when an email leaves the originating server and when it's accepted by the receiving server. Sometimes this delay can be as long as several days due to some temporary errors on the receiving server. For DKIM authentication to pass though, the receiving server must be able to find the public key in the DNS using the selector set in the email headers.&lt;/p&gt;

&lt;p&gt;Note that manual DKIM key rotation is necessary only if you run your own email delivery service in-house. If you are using services like SendGrid, Office 365, or Google Workspace (formerly known as G Suite) to deliver emails, you don't have to do anything - DKIM key rotation is done automatically for you and is transparent to you.&lt;/p&gt;

&lt;h4&gt;
  
  
  DKIM selector VS DKIM record
&lt;/h4&gt;

&lt;p&gt;If you use an email delivery service like SendGrid, it creates CNAME-typed DKIM records for you when you set up DKIM with them. A CNAME-typed DKIM record looks like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;s1.domainkey.u5022280.wl431.sendgrid.net
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You will need to publish such records in the DNS so that the receiving server has access to them. Note that the s1 part in the record above: it's the DKIM selector the receiving server uses to fetch the record for the public key, which is in turn used for DKIM authentication.&lt;/p&gt;

&lt;h4&gt;
  
  
  How to check DKIM record by DKIM selector
&lt;/h4&gt;

&lt;p&gt;If you want to check if a DKIM record exists at a selector on a domain, you can use this &lt;a href="https://dmarcly.com/tools/dkim-record-checker"&gt;free DKIM record checker&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Simply enter the domain you want to check and the selector, as shown below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5AhCQvUP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ruhoo896y5ki77vvhzxl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5AhCQvUP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ruhoo896y5ki77vvhzxl.png" alt="Find DKIM record by DKIM selector on domain" width="880" height="837"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In this example, &lt;em&gt;salesforce.com&lt;/em&gt; has a DKIM record of 1024 bits in length created at selector s1.&lt;/p&gt;

&lt;p&gt;Refer to the DKIM RFC for more information: &lt;a href="https://tools.ietf.org/html/rfc6376"&gt;DKIM RFC6376&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/what-is-dkim-selector-and-how-does-it-work-dkim-selector-explained"&gt;What Is DKIM Selector and How Does It Work: DKIM Selector Explained&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>DKIM FAQs (Frequently Asked Questions)</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Wed, 11 May 2022 03:02:07 +0000</pubDate>
      <link>https://dev.to/getdmarcly/dkim-faqs-frequently-asked-questions-101g</link>
      <guid>https://dev.to/getdmarcly/dkim-faqs-frequently-asked-questions-101g</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zxb4jClS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cwaqofx1ndjwzd9hxa03.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zxb4jClS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cwaqofx1ndjwzd9hxa03.png" alt="DKIM FAQs (Frequently Asked Questions)" width="880" height="440"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;What is DKIM?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;DKIM, which stands for &lt;strong&gt;DomainKeys Identified Mail&lt;/strong&gt;, is an email authentication method designed to detect forged header fields and content in emails. DKIM enables the receiver to check if email headers and content have been altered in transit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Why use DKIM?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;DKIM enables the receiving email server to check if the email headers and content have been altered in transit. If that's true, a DKIM check will return the &lt;em&gt;fail&lt;/em&gt; result, indicating the message's integrity has been compromised.&lt;/p&gt;

&lt;p&gt;On the DMARC level, you can specify a p=reject policy to reject messages that have failed DKIM authentication (and SPF authentication). This way, you can prevent malicious emails from reaching your recipients' inboxes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Who signs the email message?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The outgoing server that actually sends the email message by initiating an SMTP session does. It signs the message using a private key saved locally on the same machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How does DKIM signing work?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;DKIM signing an email message on the originating email server involves these steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;choose which header fields and/or body to be included in the data;&lt;/li&gt;
&lt;li&gt;compute the hash sum of the data, including message headers and message body;&lt;/li&gt;
&lt;li&gt;encrypt the hash sum with the private key. The result is called the "signature";&lt;/li&gt;
&lt;li&gt;append a DKIM-Signature header containing the signature to the email.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Who verifies the email messages?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The receiving server of the email message does.&lt;/p&gt;

&lt;p&gt;After the verification, it returns one of these results (possibly to a controlling module like DMARC): &lt;em&gt;none&lt;/em&gt;, &lt;em&gt;pass&lt;/em&gt;, &lt;em&gt;fail&lt;/em&gt;, &lt;em&gt;policy&lt;/em&gt;, &lt;em&gt;neutral&lt;/em&gt;, &lt;em&gt;temperror&lt;/em&gt;, and &lt;em&gt;permerror&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How does DKIM verification work?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When the email reaches the destination, the receiver checks if a DKIM-Signature field exists in the header.&lt;/p&gt;

&lt;p&gt;If a DKIM-signature field is found, the server verifies the authenticity of the email:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;look up the DKIM record of the domain in the DNS, using the selector in DKIM-Signature specified by the s= tag;&lt;/li&gt;
&lt;li&gt;if found, extract the public key which is part of the keypair from the record;&lt;/li&gt;
&lt;li&gt;compute a hash sum using the algorithm specified by the a= tag, of the incoming data specified by the h= tag;&lt;/li&gt;
&lt;li&gt;decrypt the signature with the public key to reveal the hash sum computed by the sender;&lt;/li&gt;
&lt;li&gt;if hash sum in 4 is equal to hash sum in 3, it passes the check, meaning the message hasn't been tampered with; otherwise it fails.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Learn more about &lt;a href="https://dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide#dkim-verification"&gt;DKIM verification&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;What if there are multiple DKIM signatures?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Multiple DKIM signatures can be found if an email message is forwarded. Learn more &lt;a href="https://dmarcly.com/blog/multiple-dkim-signatures"&gt;here&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How DKIM Works With Subdomains?</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Wed, 11 May 2022 02:57:47 +0000</pubDate>
      <link>https://dev.to/getdmarcly/how-dkim-works-with-subdomains-2l5i</link>
      <guid>https://dev.to/getdmarcly/how-dkim-works-with-subdomains-2l5i</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--11HGlNrf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7zmdadshyy7ph9561zjv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--11HGlNrf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7zmdadshyy7ph9561zjv.png" alt="How DKIM Works With Subdomains?" width="880" height="440"&gt;&lt;/a&gt;&lt;br&gt;
We will go over how DKIM works with subdomains in this article.&lt;/p&gt;
&lt;h4&gt;
  
  
  How DKIM works in the subdomain scenario?
&lt;/h4&gt;

&lt;p&gt;If you want to send an email from a subdomain, like &lt;a href="mailto:bob@marketing.acmecorp.com"&gt;bob@marketing.acmecorp.com&lt;/a&gt;, you will need to create a private/public key pair for DKIM, save the private key on the sending server, and publish the public key on the subdomain in the DNS so that it becomes accessible to the receiving server.&lt;/p&gt;

&lt;p&gt;Before an email message leaves the sending server, the server uses the private key to generate a signature and insert it into the message along with the DKIM selector used for the signature.&lt;/p&gt;

&lt;p&gt;After the receiving server receives the message, it extracts the subdomain and the DKIM selector from the message, uses them to fetch the public key from the DNS, then performs DKIM verification as in the domain scenario.&lt;/p&gt;
&lt;h4&gt;
  
  
  How to publish an DKIM record on a subdomain
&lt;/h4&gt;

&lt;p&gt;Publishing an DKIM record on a subdomain is very similar to that on an organizational domain. All you need is to create a TXT record on that subdomain:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;selector._domainkey.subdomain IN TXT    &lt;span class="s2"&gt;"v=DKIM1; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQChO2bjcaTip6yeIZ0BDQ70YH+fzqqVeIOztZFQ8kZFqUSDwBhh3aad/3kGH95OQZyXCMv0DmrHa9z99c7p7VnOBtrZ6vkEv84kLabsNL//ABydUbxFT+8SSc0EJxXL6k9S3NEvbL+5rJGjcAtWMJSxj9rOZ79C8AoJEKVnk2m9awIDAQAB"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For example, here is how you publish the DKIM record under selector &lt;strong&gt;dkim&lt;/strong&gt; on subdomain &lt;strong&gt;mail.dmarcly.com&lt;/strong&gt; on CloudFlare:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NSEevp0l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kwpxnkgahn3jta3cmx67.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NSEevp0l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kwpxnkgahn3jta3cmx67.png" alt="publish-dkim-record-on-subdomain-cloudflare" width="880" height="282"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Related posts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/how-dmarc-works-with-subdomains-dmarc-sp-tag"&gt;How DMARC Works With Subdomains&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/how-spf-works-with-subdomains"&gt;How SPF Works With Subdomains&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/how-dkim-works-with-subdomains"&gt;How DKIM Works With Subdomains?&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Can I Have Multiple DKIM Records on My Domain?</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Tue, 10 May 2022 11:49:41 +0000</pubDate>
      <link>https://dev.to/getdmarcly/can-i-have-multiple-dkim-records-on-my-domain-1hgb</link>
      <guid>https://dev.to/getdmarcly/can-i-have-multiple-dkim-records-on-my-domain-1hgb</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dP7zbg1w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e3b4bnbm40egl8uinz0m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dP7zbg1w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e3b4bnbm40egl8uinz0m.png" alt="Multiple DKIM Records on Domain" width="880" height="587"&gt;&lt;/a&gt;&lt;br&gt;
Can you have multiple DKIM records on a single domain? The answer is yes, you can have as many DKIM records on your domain as allowed by your DNS provider.&lt;/p&gt;
&lt;h4&gt;
  
  
  What is DKIM?
&lt;/h4&gt;

&lt;p&gt;DKIM stands for DomainKeys Identified Mail. It is an email authentication method designed to detect forged header fields and content in emails. DKIM allows the receiving email server to check if email headers and content have been tampered with in transit.&lt;/p&gt;

&lt;p&gt;DKIM is based on asymmetric cryptography, which uses pairs of keys: private keys which are known only to the sending server, and public keys which are published in the DNS and accessible to the receiving server.&lt;/p&gt;

&lt;p&gt;Before leaving the outgoing email server, an email message is signed with the private key stashed on the server; upon arriving at the receiving server, the email message is checked by the server with the public key published in the DNS.&lt;/p&gt;
&lt;h4&gt;
  
  
  What is a DKIM record?
&lt;/h4&gt;

&lt;p&gt;A DKIM record is a TXT record published in the DNS. It consists of a list of tags, one of which is the "p=" tag, which contains the public DKIM key.&lt;/p&gt;

&lt;p&gt;Here is an example DKIM record:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;k=rsa; t=s; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnVgd0NyrRE261IIiPqi+0H1baNyKcdj8Kea/VlSP4exzvKx8pJ01EWMwd094FV/6OCBIf7KGKgowMnWl3tW3Z5G++uZHkdgF+6xg7b9PynmX/NTo2kx92hlGgegwyulF5B7d2FM0doaCeoO4rD05jZzwi3cXx/156Gg9Xwd/Z/QIDAQAB
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The DKIM record above consists of a list of tags defining the parameters of the record. The p tag in the record specifies the base64 encoded public key, which is used by the receiving server to validate the DKIM signature.&lt;/p&gt;

&lt;p&gt;A DKIM record can also be a CNAME record, in which case, it maps the CNAME record to a TXT-typed DKIM record.&lt;/p&gt;

&lt;p&gt;For example, if you set up DKIM in SendGrid, it creates a CNAME-typed DKIM record which looks like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;s1.domainkey.uXXX.wlXXX.sendgrid.net
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This record maps to a TXT-typed DKIM record:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;k=rsa; t=s; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnVgd0NyrRE261IIiPqi+0H1baNyKcdj8Kea/VlSP4exzvKx8pJ01EWMwd094FV/6OCBIf7KGKgowMnWl3tW3Z5G++uZHkdgF+6xg7b9PynmX/NTo2kx92hlGgegwyulF5B7d2FM0doaCeoO4rD05jZzwi3cXx/156Gg9Xwd/Z/QIDAQAB
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;All DKIM records on domain example.com exist on xxx._domainkey.example.com, with xxx being the DKIM selector, regardless of the record type.&lt;/p&gt;

&lt;h4&gt;
  
  
  What is a DKIM selector?
&lt;/h4&gt;

&lt;p&gt;A DKIM selector is a string used to specify the location of the DKIM public key on a domain. The main purpose of DKIM selectors is to allow for multiple DKIM key pairs on the same organization's domain name.&lt;/p&gt;

&lt;p&gt;For example, you can choose a selector "may10" and create a DKIM public key at that selector on domain "example.com":&lt;br&gt;
may10._domainkey.example.com.&lt;/p&gt;

&lt;p&gt;You can also choose another selector "july29" and create a DKIM public key at that selector on domain "example.com":&lt;br&gt;
july29._domainkey.example.com.&lt;/p&gt;

&lt;p&gt;To learn more about DKIM selectors, refer to: &lt;a href="https://dmarcly.com/blog/what-is-dkim-selector-and-how-does-it-work-dkim-selector-explained"&gt;What is a DKIM selector&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Can I have multiple DKIM records on a single domain?
&lt;/h4&gt;

&lt;p&gt;As mentioned in the previous section, multiple DKIM records on a single domain are made possible by creating multiple DKIM selectors on that domain, with each selector pointing to a DKIM record.&lt;/p&gt;

&lt;p&gt;The possibility of having multiple DKIM records on a single domain is instrumental in the following scenarios:&lt;/p&gt;

&lt;p&gt;An organization uses multiple email delivery services to send emails on behalf of a single domain, in which case, multiple DKIM selectors and private/public key pairs must be used to separate these services.&lt;/p&gt;

&lt;p&gt;For example, if you authorize both SendGrid and Mailgun to send emails on behalf of your domain, you need to have at least one DKIM record for SendGrid and one for Mailgun. This way, the signing/verification servers of the two services can locate the their respective key pairs correctly.&lt;/p&gt;

&lt;p&gt;If you are using only one email delivery service, having multiple selectors/key pairs is essential to a DKIM security mechanism called "DKIM key rotation". This is basically a process where the key pairs are updated periodically to lower the risk of the key pairs being compromised.&lt;/p&gt;

&lt;p&gt;Learn more about this process in &lt;a href="https://dmarcly.com/blog/what-is-dkim-selector-and-how-does-it-work-dkim-selector-explained"&gt;What is a DKIM selector&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Unlike SPF and DMARC, having multiple DKIM records on a single domain is not only possible, but oftentimes necessary.&lt;/p&gt;

&lt;p&gt;Related posts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/can-i-have-multiple-dmarc-records-on-my-domain"&gt;Can I Have Multiple DMARC Records on My Domain?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/can-i-have-multiple-spf-records-on-my-domain"&gt;Can I Have Multiple SPF Records on My Domain?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/can-i-have-multiple-dkim-records-on-my-domain"&gt;Can I Have Multiple DKIM Records on My Domain?&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Which Domains Send DMARC Forensic (Failure) Reports?</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Tue, 10 May 2022 10:17:33 +0000</pubDate>
      <link>https://dev.to/getdmarcly/which-domains-send-dmarc-forensic-failure-reports-3ma</link>
      <guid>https://dev.to/getdmarcly/which-domains-send-dmarc-forensic-failure-reports-3ma</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4O4pYaf9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ddmzpnyzouqka6fj2v4f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4O4pYaf9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ddmzpnyzouqka6fj2v4f.png" alt="Which Domains Send DMARC Forensic (Failure) Reports?" width="880" height="496"&gt;&lt;/a&gt;&lt;br&gt;
As DMARC forensic (failure) reports leak Personally Identifiable Information (PII), many mainstream ESP's don't send forensic reports nowadays. As a result, you won't see any forensic reports in the DMARCLY dashboard if you don't send emails to any ESP that supports DMARC forensic reports.&lt;/p&gt;

&lt;p&gt;Notably, Gmail and Office 365 don't send DMARC forensic reports.&lt;/p&gt;

&lt;h4&gt;
  
  
  List of domains that send DMARC forensic (failure) reports
&lt;/h4&gt;

&lt;p&gt;Below is an incomplete list of the top domains that have sent DMARC forensic (failure) reports to us in the past:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;linkedin.com&lt;/li&gt;
&lt;li&gt;wrike.com&lt;/li&gt;
&lt;li&gt;laposte.net&lt;/li&gt;
&lt;li&gt;seznam.cz&lt;/li&gt;
&lt;li&gt;163.com&lt;/li&gt;
&lt;li&gt;emailsrvr.com&lt;/li&gt;
&lt;li&gt;ing.com&lt;/li&gt;
&lt;li&gt;clouduss.com&lt;/li&gt;
&lt;li&gt;vestel.com.tr&lt;/li&gt;
&lt;li&gt;dar.com&lt;/li&gt;
&lt;li&gt;kfmc.med.sa&lt;/li&gt;
&lt;li&gt;bankofsharjah.com&lt;/li&gt;
&lt;li&gt;bcb.gov.br&lt;/li&gt;
&lt;li&gt;icicibank.com&lt;/li&gt;
&lt;li&gt;and more...&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you want to test the forensic report feature of DMARCLY, you can send an unauthenticated email to a mailbox hosted on one of the above domains like linkedin.com, you should see a forensic report appear in the dashboard shortly after.&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/which-domains-send-dmarc-forensic-failure-reports"&gt;Which Domains Send DMARC Forensic (Failure) Reports?&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How To Set Up DMARC In 3 Easy Steps</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Tue, 10 May 2022 10:13:11 +0000</pubDate>
      <link>https://dev.to/getdmarcly/how-to-set-up-dmarc-in-3-easy-steps-214p</link>
      <guid>https://dev.to/getdmarcly/how-to-set-up-dmarc-in-3-easy-steps-214p</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--N0AWTFg---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xvtkx5tfrmelvissh9xi.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--N0AWTFg---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xvtkx5tfrmelvissh9xi.jpeg" alt="How To Set Up DMARC In 3 Easy Steps" width="880" height="587"&gt;&lt;/a&gt;&lt;br&gt;
Contrary to popular belief, setting up DMARC to protect your company email is much easier than it seems. In this post, we will show you 3 easy steps to set up DMARC: &lt;strong&gt;generate&lt;/strong&gt;, &lt;strong&gt;publish&lt;/strong&gt;, and &lt;strong&gt;analyze&lt;/strong&gt;, as illustrated below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KCck6-tb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a0yyyh0zxbxts5x2c1sh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KCck6-tb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a0yyyh0zxbxts5x2c1sh.png" alt="Set Up DMARC In 3 Steps" width="880" height="106"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;
  
  
  Step 1. Generate a DMARC record
&lt;/h4&gt;

&lt;p&gt;A DMARC record is a TXT record to be published to the DNS to instruct the mailbox service provider how to handle an incoming email that fails authentication, depending on SPF and DKIM check results. Here is a more detailed explanation on this topic: &lt;a href="https://dmarcly.com/blog/home/getting-started-with-dmarc"&gt;Getting Started With DMARC&lt;/a&gt;. However, you are not required to fully understand it here in order to proceed.&lt;/p&gt;

&lt;p&gt;To generate a DMARC record for your company domain to be protected, &lt;a href="https://dmarcly.com/login"&gt;log in&lt;/a&gt; to the DMARCLY dashboard. Then go to: &lt;strong&gt;DNS Records&lt;/strong&gt; -&amp;gt; &lt;strong&gt;Publish DMARC Record&lt;/strong&gt;, simply copy the snippet highlighted on the page in orange. Here is a screenshot of an example snippet:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HnwrqTz9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oyz49ekkfl7v0an5mhx4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HnwrqTz9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oyz49ekkfl7v0an5mhx4.png" alt="Generate DMARC Record" width="880" height="293"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;
  
  
  Step 2. Publish the DMARC record to DNS
&lt;/h4&gt;

&lt;p&gt;Now you have the DMARC record, let's publish it to the DNS, so that it becomes accessible to email service provides to perform DMARC checks.&lt;/p&gt;

&lt;p&gt;To do so, log in to your DNS management console, choose the domain you need to publish the DMARC record on, e.g., mydomain.com.&lt;/p&gt;

&lt;p&gt;Create a TXT entry on mydomain.com with these settings:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Type: TXT
Host: _dmarc
TXT Value: (DMARC record generated above)
TTL: 1 hour
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For example, here is what it looks like in GoDaddy's DNS management console:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CPESv3Kt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1uwcvl9k8g9ezukjr6ru.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CPESv3Kt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1uwcvl9k8g9ezukjr6ru.png" alt="Publish DMARC Record In GoDaddy" width="880" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It looks like below in Cloudflare:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ttDm3PoS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x3ysao702761g02betke.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ttDm3PoS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x3ysao702761g02betke.png" alt="Publish DMARC Record In CloudFlare" width="880" height="47"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After published, it takes up to 1 hour for the DMARC record to become accessible (usually much faster though). You can then use our tool to confirm that you have published it successfully: &lt;a href="https://dmarcly.com/tools/dmarc-checker"&gt;DMARC Checker&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  Step 3. Analyze aggregate reports
&lt;/h4&gt;

&lt;p&gt;Many email service providers send aggregate reports daily. This means you might get aggregate reports the day you publish the DMARC record.&lt;/p&gt;

&lt;p&gt;However, it could take up to 72 hours before your first aggregate reports arrive. If you are not seeing any report after 72 hours, refer to &lt;a href="https://dmarcly.com/blog/why-am-i-not-receiving-dmarc-aggregate-or-forensic-reports"&gt;this post&lt;/a&gt; for troubleshooting tips.&lt;/p&gt;

&lt;p&gt;Once you've got the data, you need to use it to &lt;a href="https://dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide#step-5-rectify-email-streams"&gt;rectify your email streams&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Sparky! You have now set up DMARC for your domain.&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/how-to-set-up-dmarc-in-3-easy-steps"&gt;How To Set Up DMARC In 3 Easy Steps&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What is DMARC (Domain-based Message Authentication, Reporting &amp; Conformance)?</title>
      <dc:creator>getdmarcly</dc:creator>
      <pubDate>Tue, 10 May 2022 00:05:25 +0000</pubDate>
      <link>https://dev.to/getdmarcly/what-is-dmarc-domain-based-message-authentication-reporting-conformance-2bha</link>
      <guid>https://dev.to/getdmarcly/what-is-dmarc-domain-based-message-authentication-reporting-conformance-2bha</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hYQzvegk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7tsjkdjruidxwq0acp64.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hYQzvegk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7tsjkdjruidxwq0acp64.jpeg" alt="What is DMARC" width="880" height="587"&gt;&lt;/a&gt;&lt;br&gt;
DMARC, short for &lt;strong&gt;Domain-based Message Authentication, Reporting &amp;amp; Conformance&lt;/strong&gt;, is an email authentication protocol to check if an email message really originates from where it claims to have, based on SPF and DKIM, another two email authentication protocols. In addition to email authentication, it also adds reporting capabilities, so that domain owners can examine email authentication statistics on their domains.&lt;/p&gt;

&lt;h4&gt;
  
  
  What's the purpose of DMARC?
&lt;/h4&gt;

&lt;p&gt;The main purpose of DMARC is to prevent email spoofing and phishing. Email phishing has been a major security issue in recent years. Research shows that over 90 percent of network breaches start with a phishing email and almost 50 percent of cyberattacks targeting small businesses. Once a business falls victim to a security breach, many things are suddenly at risk: blemished brand reputation, intellectual property stolen, direct financial loss, etc.&lt;/p&gt;

&lt;p&gt;DMARC is designed to be a strong line of defense against email spoofing and phishing. If properly implemented in the p=reject mode, DMARC can thwart all unauthenticated emails from the subject domain, while allowing all legitimate emails through.&lt;/p&gt;

&lt;h4&gt;
  
  
  How does DMARC work?
&lt;/h4&gt;

&lt;p&gt;On a high level, there are two aspects in a typical DMARC implementation: DMARC record publication on the domain owner's end, and DMARC policy enforcement and reporting on the receiving email server's end. These two parts need to collaborate for DMARC to take effect.&lt;/p&gt;

&lt;p&gt;On the domain owner's end, he publishes a DMARC record on the domain in the domain name system (DNS) with proper settings, mainly the DMARC policy and aggregate report recipient mailboxes. The DMARC policy has 3 options, indicating how the receiving email server should handle unauthenticated emails: none (monitoring), quarantine, and reject.&lt;/p&gt;

&lt;p&gt;On the receiving email server's end, whenever an email that claims to have originated from that domain comes in, the server calls the DMARC module to check the email based on the connecting host's IP address, envelope from address, header from address, and the d= tag inside the DKIM signature if any. The result is called DMARC authentication result, which can be pass or failure. If the result is failure, the server consults the DMARC policy for the disposition of the email message. Here is how DMARC handles unauthenticated email messages:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;none&lt;/strong&gt; (monitoring): this is the monitoring mode, meaning nothing is done about unauthenticated email messages. This mode is mainly used to request DMARC aggregate reports, so that domain owners have a clear idea what the email streams on their domain look like;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;quarantine&lt;/strong&gt;: this is the quarantine mode, in which an unauthenticated email is placed in the spam folder; this is a more stringent mode than the monitoring mode, in that the end user does get some protection by moving the email from the inbox;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;reject&lt;/strong&gt;: this is the reject mode, which is the most stringent mode of all three. In the reject mode, any unauthenticated email is rejected outright in the SMTP session, therefore the email never hits the end user's mailbox, not even the spam folder. The result is that the end user will never see any unauthenticated email.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What does DMARC offer on top of SPF and DKIM?
&lt;/h4&gt;

&lt;p&gt;DMARC works by evaluating SPF and DKIM authentication results. DMARC authentication result is pass when one of the following is true:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SPF authentication result is pass, and has SPF identifier alignment;&lt;/li&gt;
&lt;li&gt;DKIM authentication result is pass, and has DKIM identifier alignment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Note that there is the "identifier alignment" concept in both of the options above: DMARC introduces the identifier alignment concept to ensure that what the end user perceives as the email sender in his email agent is indeed authenticated. SPF by itself doesn't authenticate the header from address, neither does DKIM.&lt;/p&gt;

&lt;p&gt;What's more, neither SPF nor DKIM has reporting capabilities built in, therefore, it's hard for implementers to know the percentages of authenticated and unauthenticated emails. This lack of reporting capabilities has hindered SPF and DKIM implementations in the past.&lt;/p&gt;

&lt;p&gt;DMARC has reporting capabilities for both aggregate and forensic reports. DMARC aggregate reports contain aggregate statistics on email authentication, and are sent periodically to the designated mailbox specified by the rua tag in the DMARC record. DMARC forensic (failure) reports are sent almost immediately after an email fails authentication, to the mailbox specified by the ruf tag in the DMARC record. Please bear in mind though, only a few email service providers support forensic reports, while all mainstream email service providers now support aggregate reports.&lt;/p&gt;

&lt;h4&gt;
  
  
  How effective is DMARC?
&lt;/h4&gt;

&lt;p&gt;In short, very effective. If properly implemented in the reject mode, DMARC should be 100% effective in rejecting spoofing emails on the subject domain, providing that neither SPF nor DKIM is compromised.&lt;/p&gt;

&lt;h4&gt;
  
  
  Should every business implement DMARC?
&lt;/h4&gt;

&lt;p&gt;Most businesses nowadays haven't caught up on DMARC. They might have SPF or DKIM implemented, but not DMARC. This still leaves huge security loopholes for email spoofing/phishing, as neither SPF nor DKIM has identifier alignment.&lt;/p&gt;

&lt;p&gt;If your business hasn't implemented DMARC, I suggest that you do so as soon as possible. Implementing DMARC is not hard. You can simply start by generating a DMARC record in the monitoring mode, and publish it in the DNS. Then you can check the aggregate reports to see how the email authentication statistics on your domain look like.&lt;/p&gt;

&lt;p&gt;Once you are getting hang of it, move on to the quarantine mode, and ultimately to the reject mode for full protection.&lt;/p&gt;

&lt;p&gt;Lock down your business domain tight. Don't let cyberattackers spoof it!&lt;/p&gt;

&lt;p&gt;To get started with DMARC, you can read our complete guide to DMARC here: &lt;a href="https://dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide"&gt;How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definitive Guide&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Here are a few DMARC deployment tools you will find useful during your implementation: &lt;a href="https://dmarcly.com/tools"&gt;DMARC/DKIM/SPF deployment tools&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;To get the quickest result possible, try this all-in-one, end-to-end &lt;a href="https://dmarcly.com/tools/spf-dkim-dmarc-wizard/"&gt;SPF/DKIM/DMARC wizard&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Original post: &lt;a href="https://dmarcly.com/blog/what-is-dmarc-domain-based-message-authentication-reporting-and-conformance"&gt;What is DMARC (Domain-based Message Authentication, Reporting &amp;amp; Conformance)?&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
