shaft, (edited ) to random French
@shaft@piaille.fr avatar

À la Une de Cosmétiquemag : « Nouvelle tendance du skincare [seuquinekère]: Le au quotidien »

Ok donc si SPF c'est pour la peau, quid de et ? 🤔

hisham_hm, to random
@hisham_hm@mastodon.social avatar

How spoofable is an email From: field nowadays?

I know that back in the days of POP3 and unencrypted email you could write anything in From: and one would have to cross-check with the other headers to see if the message at least went through the domain in the address.

I believe nowadays big servers like gmail are stricter in the email they accept (to the point of rejecting valid emails, which is super annoying, I know), but is there a standard in check that foo@bar.com comes from bar.com?

jomo, (edited )
@jomo@mstdn.io avatar

@kinnison @hisham_hm There's also which instructs servers how to interpret the SPF and DKIM rules. The important part here is called "alignment", where the domain in the "From:" header must match that of the MAIL FROM line and the signer of the DKIM signature. Otherwise SPF/DKIM wouldn't protect against spoofers authenticating themselves. It's noteworthy that Microsoft does not refuse mails as instructed.

tl;dr: it's complicated and email is a mess.

3/3

patrickbenkoetter, to email German

Inwiefern ist DMARC und insbesondere sind dessen Report-Formate aggregate und forensic mit den Anforderungen der DSGVO vereinbar? Katharina Küchler (Anwältin, eco Verband) und ich (E-Mail Experte, Leiter Kompetenzgruppe E-Mail eco) sind dieser Frage im vollständig überarbeiteten Rechtsgutachten des #eco Verbandes nachgegangen.

Möge es für alle hier von Nutzen sein!

Deutsch:
https://www.eco.de/download/238585/

Englisch:
https://international.eco.de/download/238605

#DMARC #SPF #DKIM #email #eco

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Si vous aimez analyser les en-têtes et le code source du courrier électronique, le message de Macron Travail prévenant que vos données ont été piratées est très intéressant.

jschauma, to random
@jschauma@mstdn.social avatar

Every so often, I need to chase down some aspect of email validation (, , , ...). This involves a number of records and queries, but I may forget just which ones. So here's a quick /DNS cheatsheet:

jik, to infosec
@jik@federate.social avatar

Hey @bitwarden! It's a tad worrisome when a security software company can't handle something as simple as ensuring that its record points to valid email addresses.

shaft, to random French
@shaft@piaille.fr avatar

Et encore une boîte mail pour les rapports pleine.

Aujourd'hui, Fedex. 🤔

Entre les boîtes pleines et les adresses qui n'existent pas / plus, grand succès les rapports

afnic, to random French

🗓️ Formation en ligne "Sécuriser son courrier électronique grâce au DNS avec DKIM, DMARC, SPF" avec @bortzmeyer les 28 et 29 mars 2024.

ℹ️ Programme et inscriptions sur https://www.afnic.fr/observatoire-ressources/agenda/formation-securiser-son-courrier-electronique-grace-au-dns-avec-dkim-dmarc-spf-4/

stuartl, to email
@stuartl@longlandclan.id.au avatar

Fun and games with email today… Yahoo and Google have stepped up their filtering game, requiring stricter DKIM/DMARC.

That broke my workplace email addresses.

Consequently, I wound up reviving my old yahoo.com.au email address… fun and games remembering the password to an account I haven't used regularly in the better part of 25 years.

Thankfully, I must've logged in more recently, and changed the password… and crucially, stored it in the password manager. So it's working again.

My home mail server: delivers to the old Yahoo account, no problems at all.

Meanwhile, Office365 + MailGuard… crickets chirping.

SPFv1 for both work's domains are correct, how the hell does a hobby server admin like me get something right that professionals like Microsoft get wrong?

patrickbenkoetter, to random German

An alle, die mit E-Mail zu tun haben und die es amtlich richtig™ machen wollen: Das @bsi hat die Technische Richtlinie BSI TR-03182 „Email Authentication“ https://bsi.bund.de/dok/tr-03182-en veröffentlicht, welche beschreibt wie , und eingesetzt werden müssen, damit sie konform mit der TR sind und einen Audit für eine BSI-Zertifizierung bestehen können.

Weshalb ich das schreibe? Ihr lest den troet des stolzen Autors, der 1,5 Jahre mit dem BSI an der TR getüftelt hat.

kikobar, to microsoft
@kikobar@acc4e.com avatar

Any clue why reports score so bad as at my server?

All other big and small email providers score way better than this.

Does anyone have a similar issue?

Return-Path: <dmarcreport@microsoft.com>  
Delivered-To: ******************************  
Received: from ***********************  
 by ************** (Dovecot) with LMTP id ************************  
 for **********************; Thu, 15 Feb 2024 22:09:03 +0800  
Received: from localhost (localhost [127.0.0.1])  
 by ***********************(Postfix) with ESMTP id *****************  
 for ******************; Thu, 15 Feb 2024 22:09:03 +0800 (+08)  
Authentication-Results: **************************;  
 dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=notification.microsoft.com header.i=@notification.microsoft.com header.b=ahN2emes;  
 dkim-atps=neutral  
X-Virus-Scanned: Debian amavisd-new at ****************************  
X-Spam-Flag: YES  
X-Spam-Score: 2.321  
X-Spam-Level: **  
X-Spam-Status: Yes, score=2.321 tagged_above=-9999 required=2  
 tests=[BASE64_LENGTH_78_79=0.1, BASE64_LENGTH_79_INF=1.502,  
 BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,  
 HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.741, MIME_HTML_MOSTLY=0.1,  
 MPART_ALT_DIFF=0.79, NO_RECEIVED=-0.001, NO_RELAYS=-0.001,  
 SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SCC_IS_DMARC_REP=-0.01,  
 T_TVD_MIME_NO_HEADERS=0.01, URIBL_BLOCKED=0.001]  
 autolearn=no autolearn_force=no  

shuttersparks, to random
@shuttersparks@qoto.org avatar

Seems odd to me that there are, apparently, no discussions on Mastodon about Zoho.

I've been using them for 14 years and they have about 100 million users.

fredonline,
@fredonline@fosstodon.org avatar

@shuttersparks I've mentioned Zoho recently. 🙂

I suspect that, with both Gmail and Yahoo recently tightening up on authenticated emails, some Zoho users may begin to notice their emails are being rejected and may no doubt blame Zoho for the problems!

coxn, to email

if you get DMARC reports to you instead of some service, and you use something semi-automated to extract the .zip or .xml.gz and shove it into something more readable to a human, please hit me up and/or just reply with links.

I only want replies with things that are (a) F/LOSS, and (b) things you have actually personally used. It's fine if you know of something you haven't used, but instead of tagging me, boost this or send this to a person you know who uses that thing.

I'm also uninterested in replies that say "here's this software as a service that we use" because I'm aware of several of those and they're on the table for my chunk of the org. Right now I'm looking to evaluate things we can manage locally. Thanks!

lukasberancz, to Cybersecurity

The DMARC record is used to authenticate mail to ensure that the message is not fraudulent. But did you know that you can also set a DMARC record for the default onmicrosoft.com domain?

The onmicrosoft.com (also called MOERA) domain can be spoofed as well, so it is recommended to set DMARC record for the domain as well. More in my today's blog post 👇

https://www.cswrld.com/2024/02/how-to-create-a-dmarc-record-for-the-onmicrosoft-com-domain/

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Tiens, Framalistes (de @Framasoft ) envoie maintenant des rapports .

thunfisch, to email
@thunfisch@chaos.social avatar

Sooo. reports. Anyone doing anything useful with them? We have tons of legitimate mails with failing SPF/DKIM checks due to $reasons so filtering out the noise is going to be a big pain. Wondering if it’s worth it and there is usable OSS tooling for that - first look was quite underwhelming. :BoostOK:

link2xt, to email
jschauma, to sysadmin
@jschauma@mstdn.social avatar

Hey Fediverse! The Spring semester is about to start, and I'll be teaching System Administration again:

https://stevens.netmeister.org/615/

Topics covered include: basic operating system & filesystem concepts, software installation & package management, config management, automation, tools development, TCP/IP networking, common services, system security.

All lectures are online as free videos; if you'd like to follow along, here's the playlist for Week 1:

https://www.youtube.com/playlist?list=PLDadzdouM0VCV7tjurqM8FHY6APK9wvJl

jschauma,
@jschauma@mstdn.social avatar

After this week's Spring Break, we return in my class to dive into .

We start with an overview of the ecosystem consisting of MUAs, MTAs, MDAs, Access Agents, and tcpdump a simple manual SMTP session over telnet. We then talk about STARTTLS, MTA-STS and , before diving into defenses, including , , and , all with practical examples, tracking lookups and traffic on the sender and receiver.

Video lectures here:
https://youtu.be/Ai8rjqelwsI?si=7_4JnfwHwvFDShx_

cjerrington, to email
@cjerrington@mstdn.social avatar

Anyone know how to properly read a DMARC Aggregate Report?

#email #dmarc #dns #domain

EMDiscussions,
jschauma, to random
@jschauma@mstdn.social avatar

Heh, request smuggling is no longer just for HTTP. Circumvent , , by smuggling commands (and thus spoof mail), because some MTAs don't strictly require \r\n.\r\n :

https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/

For , set smtpd_forbid_unauth_pipelining=yes:
https://www.postfix.org/smtp-smuggling.html

iammannyj, to random
@iammannyj@fosstodon.org avatar

In the wake of Google’s announcement of new rules for bulk senders, Microsoft is urging Microsoft 365 email senders to implement SPF, DKIM and DMARC email authentication methods.

https://www.helpnetsecurity.com/2023/10/09/microsoft-365-bulk-email/

fell, to sysadmin
@fell@ma.fellr.net avatar

I've successfully set up Mox by Mechiel Lukkien as my new mail server. It handles SMTP, IMAP, SPF, DKIM, and DMARC. It has a built-in spam filter, a web interface, webmail, autoconfiguration and it can show a checklist whether your DNS is set up correctly or not. All in a single binary! Pretty cool stuff. I'm planning to test various other solutions and document it on my blog soon.

afnic, to random French
thisismissem, to email
@thisismissem@hachyderm.io avatar

It kinda surprises me that the DMARC RFC didn't declare a simple HTTP based transport for reports, and instead they're all transported via email attachments.

I receive DMARC reports on a bunch of my domains but don't have any way to do anything with them (I know there are paid services, but really?)

fredonline,
@fredonline@fosstodon.org avatar

@thisismissem I use this:

https://dmarcian.com/xml-to-human-converter/

Just drag/drop the attachment, upload, then view the report. Expand all fields for full information.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • InstantRegret
  • ethstaker
  • osvaldo12
  • magazineikmin
  • GTA5RPClips
  • rosin
  • mdbf
  • Youngstown
  • Durango
  • slotface
  • everett
  • kavyap
  • DreamBathrooms
  • JUstTest
  • thenastyranch
  • tacticalgear
  • modclub
  • cisconetworking
  • tester
  • cubers
  • khanakhh
  • ngwrru68w68
  • normalnudes
  • megavids
  • anitta
  • Leos
  • lostlight
  • All magazines