why should email authentication concern you?

advertisement
WHY SHOULD EMAIL AUTHENTICATION CONCERN YOU?
Authentication is one way of making email more reliable and secure. Authentication improves the likelihood that legitimate
email will get through to the intended recipient. Although authentication is currently a recommended practice, it won’t be
long before it is a required practice in order to have email delivered into the inbox. It could also potentially affect the
recipient experience through image rendering and security icons. Additionally, authentication may help to reduce spoofing
and phishing attacks against your domain, helping to protect your brand.
Good practice is to implement at least one of these standards. Best practice would be to implement all, if that is practical
for your business. If you are a member of the Direct Marketing Association (DMA) you are now required to implement at
least one method. The DMA, in partnership with Return Path, has created a Reputation Registry for its members to check
whether they are authenticated. It's a great resource and can really help you rally internal support for authentication.
WHAT IS EMAIL AUTHENTICATION?
Email authentication verifies the domain name, or identity, of the sender to protect the sender’s brand name and online
reputation, and helps ISPs remove spoofing and phishing messages. Spoofing refers to imitating a legitimate company or
source in an email or on the Web. Phishing wrongly “phishes” for a user’s private information by using deceptive
schemes,
In the future, ISPs may require email authentication to help other ISPs and reputation assessors evaluate the quality of
the sender’s reputation. Since spammers are also able to validate email, reputation assessors may be leery of senders
who do not certify email.
Email authentication is analogous to a driver’s license. Email authentication, just like a driver’s license, accurately
confirms your identity. But neither a driver’s license no an email authentication can confirm the quality for your driving
ability email reputation.
To facilitate email authentication, each technology publishes records using the Domain Name System (DNS), which
translates a hostname into an IP address such as www.example.com to 208.77.188.166. Sender Policy and Sender ID
designate the hosts authorized to send email for a specific domain. Before delivering a message to an inbox, ISPs try to
verify that the email is coming from an authorized source by checking email authentication records. With Domain Keys
Identification Mail (DKIM), the record carries a public encryption key, which receivers can retrieve via DNS and use to
decode the DKIM signature in a message and verify the message authenticity.
LEADING EMAIL SENDER AUTHENTICATION TECHNOLOGIES
Sender Policy Framework (SPF) grants the administrator the right to determine which hosts can send email for the
domain, filtering legitimate mail from illegitimate sources for their domain. SPF prevents the transmission of forged email.
Since not all spam is forged, it cannot stop spam, or junk email. The receiving mail server checks the sending domain's
record in the DNS zone file against the sender’s IP address. The Domain Name System (DNS) serves as the "phone
book" for the Internet by translating human-friendly computer hostnames into IP addresses. For example,
www.example.com translates to 208.77.188.166.

SenderID Framework (SIDF) verifies the sender’s IP address against the owner’s sending domain and helps
address the problem of spoofing and phishing.

Domain Keys (DK) are used mostly as an additional anti-spam and anti-phishing method for sending and
receiving email messages.
o Sending email messages

o

The domain owner generates a public / private key pair to use for signing all outgoing
messages. The public key is published in DNS, and the private key is made available to
their DomainKey-enabled outbound email servers.
 When each email is sent by an account within the domain, the DomainKey-enabled email
server automatically uses the stored private key to generate a digital signature of the
message. This signature is embedded as a header in the sent email, and the email is sent
on to the target recipient's mail server.
Receiving emails
 The DomainKeys-enabled receiving email server extracts the signature and claimed
From: domain from the email headers and fetches the public key from DNS for the
claimed From: domain.
 The public key from DNS is then used by the receiving mail server to verify that the
signature was generated by the matching private key. This proves that the email was
indeed sent by, and with the permission of, the claimed sending From: domain and that its
headers and content weren't altered during the transfer.
 The receiving email server applies the local policies based on the results of the signature
test. If the domain is verified and no other anti-spam tests catch it, the email can be
delivered to the user's inbox. If the signature fails to verify, or there isn't one, the email
can be dropped, flagged or quarantined.
Domain Keys Indentified Mail (DKIM) lets an organization handle and/or take responsibility for a message while
it is in transit. The reputation of the domain name is the basis for evaluating whether to trust the message for
delivery. Technically DKIM provides a method for validating a domain name identity that is associated with a
message through cryptographic authentication.
HOW DO YOU AUTHENTICATE?

You can find detailed information about the standards on the following Web sites:
 DKIM: http://www.dkim.org/
 SenderID: http://www.microsoft.com/senderid

SPF: http://www.openspf.org/

Make sure you take inventory of all mail servers that you send email from so that they are all included in your
authentication.

Create your authentication records. There are excellent online tools available for creating valid SPF and
Sender ID records. The following tools can help you:

DKIM: http://testing.dkim.org/

Sender ID: http://www.microsoft.com/senderid

SPF: www.openspf.org/wizard.html

Make sure you publish your authentication records. Work with whoever manages your DNS records to
publish the email authentication records you've collected. For DK and DKIM, your MTA administrator will need to
configure the server as well.

Test your authentication records. SPF, SenderID, and Domain Keys provide options to publish your records in
"test" mode. This provides the opportunity for testing without risking delivery failures for mistakes in your record.
Testing will ensure that the mail servers you've authorized are being verified by receivers and will determine if
you've missed identifying any mail servers in your inventory.

Don’t forget to check your authentication regularly, especially if you make any changes to your sending
infrastructure.
Download