Conversation

You need to add the NULL MX and SPF records alongside every A and AAAA record. DMARC applies to subdomains unless they provide their own policy. Just make sure not to have a permissive policy for subdomains via the sp parameter. SPF hardly does anything. It's DMARC that matters.
1
3
DMARC requires valid, aligned SPF / DKIM. The policy specifies what to do when it fails to pass. A p=reject policy will prevent spoofed emails from the domain to providers enforcing DMARC. SPF itself doesn't stop spoofing since it does not need to be aligned with the FROM header.
2
3
Also, hardly anyone enforces SPF even with a hard fail policy, but it's not particularly relevant since it doesn't have to be aligned. SPF will pass with a spoofed FROM header as long as MAIL FROM (relay) passes. DMARC is what makes SPF and DKIM actually function properly.
2
2
In order of importance: set up DMARC and then set up DNSSEC. Fill in the NULL MX records and SPF records for every A and AAAA record if you want to go the extra mile. It's much less important than the baseline. DMARC will still reject spoofed mail without having an SPF record.
2
2
Iโ€™m aware of the difference. If I have control of my DNS, and the firewalls / daemons in the A / AAAA records that donโ€™t have a null MX, and MXs for the parent names are properly configured to not handle mail for child domains, then what is the effective difference?
1
Email for child names is still not going to come in. So I donโ€™t see a need for a null MX other than to indicate to others to not send email to the domain. Iโ€™m not aware of a sufficient number of receiving servers rejecting email if they canโ€™t send to the purported source.
2
Show replies