fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#dmarc

3 posts3 participants0 posts today

🌐 L'Afnic est présente aujourd'hui jusqu'au 3 avril au Forum INCYBER Europe (FIC) au stand F-40 à Lille.

🛡️ Une belle opportunité d'échanger sur les enjeux DNS de la cybersécurité.

➡️ Découvrez également notre nouvelle formation NIS 2 Lead Implementer afnic.fr/produits-services/for

Et explorer toutes nos formations sur la sécurisation du DNS afnic.fr/produits-services/for

Venez rencontrer Lotfi Benyelles, Benoît Ampeau et Régis Massé au Stand F-40 !

#Afnic#DNS#InCyber
Continued thread

System Administration

Week 8, The Simple Mail Transfer Protocol, Part III

In this video, we look at ways to combat Spam. In the process, we learn about email headers, the Sender Policy Framework (#SPF), DomainKeys Identified Mail (#DKIM), and Domain-based Message Authentication, Reporting and Conformance (#DMARC). #SMTP doesn't seem quite so simple any more...

youtu.be/KwCmv3GHGfc

"The stats we collect for the #SpamAssassin project (mass-scan results from participating sites) have long shown that spammers are more consistent at making #SPF, #DKIM, and #DMARC correct than are legitimate senders. DMARC in particular has no discernible benefit for most senders, so it is a useless signal.

Rejecting mail based solely on authentication failures of those deeply flawed authentication methods does more harm than good."

jwz.org/blog/2025/03/dmarc-and

EDIT: h/t @grumpybozo

Replied in thread

@grumpybozo : I definitely am not angry with you (I very much agree).

Unfortunately many admins treat security solutions like they're a religion.

Some time age there was a hefty debate on a Dutch "mostly admins" site (tweakers.net, I'd have to look up the exact thread) about the "correct" sending and receiving MTA configurations. There was no agreement.

Microsoft even used to ignore SPF/DKIM/DMARC if the sender was in the "safe senders" list (which the user's address book defaults to). What could possibly go wrong (later MS corrected that).

The screenshot below is from part of security.nl/posting/766069/DMA (I wrote that Sept. 14, 2022).

Edited 23:36 UTC to add: {
arxiv.org/abs/2302.07287
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy
Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage
}

#SPF#DKIM#DMARC
Replied in thread

@deepthoughts10 wrote: "email authentication like DMARC/SPF does one thing: it prevents impersonation of a specific domain (assuming policies are configured for reject or quarantine.)"

It does not even do that on my iPhone.

P.S. SPF was invented to prevent Joe Jobs (en.wikipedia.org/wiki/Joe_job). Marketing idiots (including Bill Gates) said that it would kill spam. It killed forwarding instead.

@grumpybozo @jwz

#SPF#DKIM#DMARC
I just found out that Dovecot 2.4 is a crippled version of Dovecot 2.3: no more clustering support, the director function has been removed. If you want to do clustering now, you'll have to buy a Pro license.

https://doc.dovecot.org/2.4.0/installation/upgrade/2.3-to-2.4.html#removed-features

So, although I've used Dovecot for years, both private and for work, it seems like this is the end of the line for me.

At the same time I see what @Stalwart Labs can do. Yes, clustering, for one. And a whole lot more, including bayesian classification, analysis of DMARC reports and even a reputation database.

I'm really impressed by what it can do. Bit hesitant about the fact that it's still only version 0.11.5 though, smells alpha...

Looks like Stalwart is the future for me.

https://stalw.art/docs/cluster/overview

#Dovecot #Stalwart #E-mail #DMARC
doc.dovecot.org2.3 to 2.4 | Dovecot CEDovecot CE Documentation

dmarc-subject = %x52.65.70.6f.72.74 1*FWS %x44.6f.6d.61.69.6e.3a 1*FWS domain-name 1*FWS %x53.75.62.6d.69.74.74.65.72.3a 1*FWS domain-name 1*FWS %x52.65.70.6f.72.74.2d.49.44.3a msg-id

Yes, it allows newlines. Tough luck, @towo. No, Google, the D is a capital letter. No, Microsoft, don't fucking put a '[Preview]' in front.

Has anyone here on #fedi figured out the correct recipe for dealing with #OpenPGP, #DMARC and #mailman ?

The problem, by default mailman will modify messages and this will break the dkim signature.
gitlab.com/mailman/mailman/-/i

Mailman provides two DMARC mitigation options (other option is reject or discard which is not useful in this case).

1. Replace the from address with list address
2. Wrap original message in an envelope

thunderbird flags 1 and fails 2.
#askfedi #gnupg #gpg #thunderbird

GitLabAdd DMARC conformity mode (do not modify DKIM signed headers and body) (#1079) · Issues · GNU Mailman / Mailman Core · GitLabCRITICAL I deployed mm3 to my e-mail server working with the large Linux developer community and we are facing DMARC issues [1]. It seems that...