lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

69
active users

#spf

0 posts0 participants0 posts today
Jan Schaumann<p>System Administration</p><p>Week 8, The Simple Mail Transfer Protocol, Part III</p><p>In this video, we look at ways to combat Spam. In the process, we learn about email headers, the Sender Policy Framework (<a href="https://mstdn.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>), DomainKeys Identified Mail (<a href="https://mstdn.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a>), and Domain-based Message Authentication, Reporting and Conformance (<a href="https://mstdn.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>). <a href="https://mstdn.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> doesn't seem quite so simple any more...</p><p><a href="https://youtu.be/KwCmv3GHGfc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/KwCmv3GHGfc</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://mstdn.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://toad.social/@grumpybozo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grumpybozo</span></a></span> : I definitely am not angry with you (I very much agree).</p><p>Unfortunately many admins treat security solutions like they're a religion.</p><p>Some time age there was a hefty debate on a Dutch "mostly admins" site (<a href="https://tweakers.net" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">tweakers.net</span><span class="invisible"></span></a>, I'd have to look up the exact thread) about the "correct" sending and receiving MTA configurations. There was no agreement.</p><p>Microsoft even used to ignore SPF/DKIM/DMARC if the sender was in the "safe senders" list (which the user's address book defaults to). What could possibly go wrong (later MS corrected that).</p><p>The screenshot below is from part of <a href="https://www.security.nl/posting/766069/DMARC+bypass+%28Outlook+only%3F%29#posting767981" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.nl/posting/766069/DMA</span><span class="invisible">RC+bypass+%28Outlook+only%3F%29#posting767981</span></a> (I wrote that Sept. 14, 2022).</p><p>Edited 23:36 UTC to add: {<br><a href="https://arxiv.org/abs/2302.07287" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2302.07287</span><span class="invisible"></span></a><br>Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy<br>Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage<br>}</p><p><a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://infosec.exchange/tags/Arc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arc</span></a> <a href="https://infosec.exchange/tags/WhatEver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatEver</span></a></p>
Peter N. M. Hansteen<p>Is SPF Simply Too Hard For Application Developers?<br>The Sender Policy Framework (SPF) is unloved by some, because it conflicts with some long-established SMTP email use cases. But is it also just too hard to understand and to use correctly for application developers? <a href="https://nxdomain.no/~peter/is_spf_too_hard_for_appdevs.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/is_spf_too_</span><span class="invisible">hard_for_appdevs.html</span></a><br>(2016 but still holds) <a href="https://mastodon.social/tags/smtp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smtp</span></a> <a href="https://mastodon.social/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://mastodon.social/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> <a href="https://mastodon.social/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://mastodon.social/tags/antispam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antispam</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/spamd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spamd</span></a></p>
Patrick Ben Koetter 🕺🏼<p>2025 frage ich Kunden nicht mehr ob sie <a href="https://troet.cafe/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>, <a href="https://troet.cafe/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> und <a href="https://troet.cafe/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> implementieren wollen, sondern wieso sie es noch nicht getan haben.</p>
Mike Kuketz 🛡<p>Warum du für ungenutzte Domains SPF- und DMARC-Records setzen solltest! 👇 </p><p><a href="https://www.kuketz-blog.de/warum-du-fuer-ungenutzte-domains-spf-und-dmarc-records-setzen-solltest/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">kuketz-blog.de/warum-du-fuer-u</span><span class="invisible">ngenutzte-domains-spf-und-dmarc-records-setzen-solltest/</span></a></p><p><a href="https://social.tchncs.de/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> <a href="https://social.tchncs.de/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a> <a href="https://social.tchncs.de/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://social.tchncs.de/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://social.tchncs.de/tags/schutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>schutz</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Afnic<p>🛡️ Cyber bonne pratique, cyber bonne nouvelle ! </p><p>🔐 La sécurité des emails se renforce, avec les protocoles SPF, DKIM et DMARC qui jouent un rôle crucial pour contrer la facilité d'usurpation d'adresse e-mail. </p><p>📊 Un an après notre premier état des lieux sur l’adoption de ces mécanismes dans la zone .fr, les résultats sont prometteurs !</p><p>🔗 Découvrez les résultats en détail : <a href="https://www.afnic.fr/observatoire-ressources/papier-expert/spf-dkim-et-dmarc-ladoption-monte-en-fleche-dans-la-zone-fr/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/observatoire-ressourc</span><span class="invisible">es/papier-expert/spf-dkim-et-dmarc-ladoption-monte-en-fleche-dans-la-zone-fr/</span></a></p><p><a href="https://mastodon.social/tags/Afnic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Afnic</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://mastodon.social/tags/BIMI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIMI</span></a> <a href="https://mastodon.social/tags/Innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Innovation</span></a> <a href="https://mastodon.social/tags/Formation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formation</span></a></p>
Afnic<p>🗓️ Formation Sécuriser son courrier électronique grâce au DNS avec DKIM, DMARC, SPF les 10 et 11 octobre ou 5 et 6 décembre 2024.</p><p>✅ Programme complet et inscriptions sur <a href="https://www.afnic.fr/produits-services/formations/dkim-dmarc-spf-securiser-son-courrier-electronique-grace-au-dns/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/produits-services/for</span><span class="invisible">mations/dkim-dmarc-spf-securiser-son-courrier-electronique-grace-au-dns/</span></a></p><p><a href="https://mastodon.social/tags/Formation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formation</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a></p>
yawnbox :rebel:<p>what <a href="https://disobey.net/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> providers do you trust, that supports the following?</p><p>1. bring your own domain.tld<br>2. supports <a href="https://disobey.net/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, <a href="https://disobey.net/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a>, <a href="https://disobey.net/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a><br>3. ideally: <a href="https://disobey.net/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>/#DANE</p><p>no, i do not want feedback about self-hosted options, thank you. </p><p><a href="https://disobey.net/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://disobey.net/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
Bob Young<p>It’s been an interesting couple of days. I’ve been doing a deep-dive into SPF, DKIM, and DMARC for a problem a client was having with their email. Lo and behold, I ended up learning that my own email could be better secured. Fixed it, and set up RUA and RUF logging. Now I’m wondering if I can sell setting up email correctly as a service. There must be lots of small businesses who are having trouble with some of their emails being rejected, and they don’t know how to fix it.</p><p><a href="https://infosec.exchange/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> <a href="https://infosec.exchange/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://infosec.exchange/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> <a href="https://infosec.exchange/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a></p>
Peter N. M. Hansteen<p>RFC7505 Means Yes, Your Domain Can Refuse to Handle Mail. Please Leave Us a TXT If You Do. </p><p>Reprise from 2021, now also trackerless - <a href="https://nxdomain.no/~peter/rfc7505_means_yes_you_can_refuse_to_handle_mail.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/rfc7505_mea</span><span class="invisible">ns_yes_you_can_refuse_to_handle_mail.html</span></a> <a href="https://mastodon.social/tags/NULLMX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NULLMX</span></a> <a href="https://mastodon.social/tags/antispam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antispam</span></a> <a href="https://mastodon.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> # security <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://mastodon.social/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://mastodon.social/tags/RFC7505" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC7505</span></a> <a href="https://mastodon.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> (and converting from G's wysiwyg editor droppings is painful fyi)</p>
parvXtl<p>The State of <a href="https://tech.lgbt/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> By: Michael Lucas <span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mwl</span></a></span>, 20240629,<br>during <a href="https://tech.lgbt/tags/BSDCan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSDCan</span></a> 2024,<br><a href="https://www.youtube.com/watch?v=HT3N8YWaGsg" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=HT3N8YWaGs</span><span class="invisible">g</span></a></p><p><a href="https://tech.lgbt/tags/selfHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfHost</span></a> <a href="https://tech.lgbt/tags/emailServer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>emailServer</span></a> <a href="https://tech.lgbt/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://tech.lgbt/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://tech.lgbt/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://tech.lgbt/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://tech.lgbt/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://tech.lgbt/tags/BigEmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BigEmail</span></a> etc</p>
Patrick Ben Koetter 🕺🏼<p>An alle, die mit E-Mail zu tun haben und die es amtlich richtig™ machen wollen: Das <span class="h-card"><a href="https://social.bund.de/@bsi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bsi</span></a></span> hat die Technische Richtlinie BSI TR-03182 „Email Authentication“ <a href="https://bsi.bund.de/dok/tr-03182-en" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">bsi.bund.de/dok/tr-03182-en</span><span class="invisible"></span></a> veröffentlicht, welche beschreibt wie <a href="https://troet.cafe/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a>, <a href="https://troet.cafe/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> und <a href="https://troet.cafe/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a> eingesetzt werden müssen, damit sie konform mit der TR sind und einen Audit für eine BSI-Zertifizierung bestehen können.</p><p>Weshalb ich das schreibe? Ihr lest den troet des stolzen Autors, der 1,5 Jahre mit dem BSI an der TR getüftelt hat.</p>
Sean Whalen 👨🏼‍🦼🏳️‍🌈🇺🇦🕊️<p>A rebuttal to the "STOP USING DMARC" meme by <span class="h-card" translate="no"><a href="https://fosstodon.org/@link2xt" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>link2xt</span></a></span> making the rounds in IT mastodon. DMARC absolutely has a real-world uses.</p><ul><li>Identifying message sources sending as your domains, so you can see what services your organization is using to send email, which isn't always obvious, particularly in large organizations</li><li>Identifying which email sending services aren't configured to be authenticated, which more important now that Google and Yahoo are <a href="https://seanthegeek.net/1338/how-to-comply-with-google-and-yahoos-requirements-for-bulk-email-senders/" rel="nofollow noopener noreferrer" target="_blank">going to require authentication</a>, including a published DMARC policy record when using bulk email senders</li><li>Once you have all legitimate sources properly authenticated, setting a DMARC policy to <code>p=quarantine</code> or <code>p=reject</code> prevents malicious spoofing and prevents the organization from going out and using whatever service the organization wants without making proper DNS change requests</li><li>I have never seen the <code>pct</code> option at less than <code>100</code> (the default) because anything else makes policy enforcement inconsistent</li><li>If the <a href="https://www.cisa.gov/news-events/directives/bod-18-01-enhance-email-and-web-security" rel="nofollow noopener noreferrer" target="_blank">entire US federal government</a> can implement an enforced DMARC policy, you can too<br></li></ul><p>For information about DMARC, it's benefits, and how to properly use it, check out <a href="https://seanthegeek.net/459/demystifying-dmarc/" rel="nofollow noopener noreferrer" target="_blank">Demystifying DMARC</a></p><p><a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/ShadowIT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShadowIT</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a></p>
Romain Tartière<p>Dear fellow sysadmins, you are running mail servers, have implemented <a href="https://mamot.fr/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, and your SPF "all" qualifier is … (please vote).</p><p>If different from "-", what is the rationale behind this choice (please comment).</p><p>Please boost for better sampling. Thanks!</p>
Harry Sintonen<p><a href="https://infosec.exchange/tags/Gmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gmail</span></a> started to silently reject my sent emails since the domain I used does not have <a href="https://infosec.exchange/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> - Apparently <a href="https://infosec.exchange/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> has now nuked the exception they had for iki.fi email redirection service. This necessitated me to change my Pine/Alpine configuration first time in about 20 years.</p><p>Updated to note: The email does not even land to some spam folder, it just completely disappears. Also, there is no delivery error notification sent to the sender.</p>
Afnic<p>L’Afnic publie un tutoriel SPF, DKIM et DMARC en logiciel libre pour sécuriser ses e-mails <a href="https://www.afnic.fr/observatoire-ressources/actualites/lafnic-publie-un-tutoriel-spf-dkim-et-dmarc-en-logiciel-libre-pour-securiser-ses-e-mails/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/observatoire-ressourc</span><span class="invisible">es/actualites/lafnic-publie-un-tutoriel-spf-dkim-et-dmarc-en-logiciel-libre-pour-securiser-ses-e-mails/</span></a></p><p>Afnic publishes a tutorial on SPF, DKIM and DMARC as free software to secure users’ emails <a href="https://www.afnic.fr/en/observatory-and-resources/news/afnic-publishes-a-tutorial-on-spf-dkim-and-dmarc-as-free-software-to-secure-users-emails/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/en/observatory-and-re</span><span class="invisible">sources/news/afnic-publishes-a-tutorial-on-spf-dkim-and-dmarc-as-free-software-to-secure-users-emails/</span></a></p><p><a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.social/tags/Afnic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Afnic</span></a> <a href="https://mastodon.social/tags/InternetMadeInFrance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetMadeInFrance</span></a></p>
Andy Smith<p>Microsoft updated the SPF record for hotmail.com in the last 24 hours but forgot to keep their IPv6 addresses in it, so as a result places all over the world are rejecting emails sent from Hotmail as forgeries.</p><p>EDIT: Removed my comment about not rejecting for SPF failure. Microsoft are requesting rejection of their own email here (-all).</p><p><a href="https://www.reddit.com/r/sysadmin/comments/15u28tw/microsoft_seems_to_have_broken_spf_for_hotmailcom/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reddit.com/r/sysadmin/comments</span><span class="invisible">/15u28tw/microsoft_seems_to_have_broken_spf_for_hotmailcom/</span></a><br><a href="https://social.bitfolk.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <a href="https://social.bitfolk.com/tags/Hotmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hotmail</span></a> <a href="https://social.bitfolk.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.bitfolk.com/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a></p>
Schenkl<p>Hat ein Wesen auf der <a href="https://chaos.social/tags/GPN21" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPN21</span></a> ein <a href="https://chaos.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> Modul auf RJ-45 dabei?</p>
FredOnline<p>Want email you can feel good about? I use Fastmail for my email. Save 10% on your first year when you sign up with this link: <a href="https://ref.fm/u15257689" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">ref.fm/u15257689</span><span class="invisible"></span></a> <a href="https://fosstodon.org/tags/Fastmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fastmail</span></a> <a href="https://fosstodon.org/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://fosstodon.org/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://fosstodon.org/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> <a href="https://fosstodon.org/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a> <a href="https://fosstodon.org/tags/calendar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>calendar</span></a> <a href="https://fosstodon.org/tags/caldav" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>caldav</span></a></p>
Kevin Karhan :verified:<p><span class="h-card"><a href="https://mstdn.social/@rmdes" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rmdes</span></a></span> *nodds in agreement*</p><p>The problem is when some providers become "too big to ban" and act maliciously.</p><p>For example, due to <a href="https://mstdn.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, basically all <a href="https://mstdn.social/tags/Spammers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spammers</span></a> use <a href="https://mstdn.social/tags/GMail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GMail</span></a>, <a href="https://mstdn.social/tags/YahooMail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YahooMail</span></a> and <a href="https://mstdn.social/tags/Outlook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Outlook</span></a>.com.</p><p><a href="https://mstdn.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a>, <a href="https://mstdn.social/tags/Yahoo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yahoo</span></a> &amp; <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> are notorious for ignoring <a href="https://mstdn.social/tags/abuse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>abuse</span></a> reports and not giving any shit, yet instantly &amp; silently block mailservers if they don't setup SPF the way they want it.</p>