Open In App

Domain based Message Authentication, Reporting and Conformance (DMARC)

Gestation period of “@” : 
In 1970’s, there weren’t more awareness about threats and malicious activities. cybersecurity which was formally known as computer security was gradually progressing. Even before that Electronic Mail (E-mail) was equivalent to sticking note on someone’s computer. Because, who wouldn’t trust any message from their colleagues? Until, “@”-apt came in the picture.

How ‘@’ came into existence : 



Derivation of SPF and DKIM to form a robust DMARC standard :

Need of DMARC :



Working of nitty-gritty :

  1. Domain owner who wishes to deploy DMARC must have deployed SPF and DKIM on its messaging infrastructure.
  2. For successfully publishing DMARC records, it is very important that SPF and DKIM records are published already. Once those records are in place one can configure DMARC record. One can use an external guide/wizard to create SPF and DKIM records. For passing the DMARC authentication, message must pass and aligned for either SPF or DKIM.
  3. When message is aligned recipient know who really sent the message. DMARC policies are published by domain owners and applied by mail recipients. DMARC policies are published as TXT records. If a message fails DMARC authentication, the receiving organization should honor the “disposition” you publish in your DMARC policy. 
  4. This is the p= value in your DMARC record as follows.

DMARC WORK FLOW

Description :
DMARC record looks like as follows.

v=DMARC1; p=reject; pct=100; rua=mailto:postmaster@dmarcdomain.com" 

Where,  

Conclusion :

Article Tags :