c.im is one of the many independent Mastodon servers you can use to participate in the fediverse.
C.IM is a general, mainly English-speaking Mastodon instance.

Server stats:

2.8K
active users

#dkim

3 posts3 participants0 posts today
Marc Tapages 🐰⏚🚲🎺<p><span class="h-card" translate="no"><a href="https://mamot.fr/@bearstech" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bearstech</span></a></span> <br>trop bien cet outil, j'ai enfin à peu près compris ces mécanismes !<br><a href="https://framapiaf.org/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a> <a href="https://framapiaf.org/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://framapiaf.org/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> <a href="https://framapiaf.org/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> </p><p>Merci pour le partage !</p>
John Goerzen<p><span class="h-card" translate="no"><a href="https://mastodon.social/@jeremiah_" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jeremiah_</span></a></span> <span class="h-card" translate="no"><a href="https://social.sdf.org/@elb" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>elb</span></a></span> <a href="https://floss.social/tags/NNCPNET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NNCPNET</span></a>, the new <a href="https://floss.social/tags/NNCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NNCP</span></a>-based email network, now has a bidirectional, opt-in, Internet <a href="https://floss.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> bridge! <a href="https://salsa.debian.org/jgoerzen/docker-nncpnet-mailnode/-/wikis/bridge/intro" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">salsa.debian.org/jgoerzen/dock</span><span class="invisible">er-nncpnet-mailnode/-/wikis/bridge/intro</span></a></p><p>This gates Internet email to/from NNCP. The bridge is off by default. It is a full participant in <a href="https://floss.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, <a href="https://floss.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a>, <a href="https://floss.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>, and <a href="https://floss.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> in both directions.</p><p>Yes, now you can get Internet email straight to your <a href="https://floss.social/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaspberryPi</span></a> ! (And even without this, your Pis can email each other!)</p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://troet.cafe/@patrickbenkoetter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>patrickbenkoetter</span></a></span> : SPF, DKIM und DMARC funktionieren nicht.</p><p>Impersonitation ist zu einfach und zu viel wird kaputt gemacht.</p><p><a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/Spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spam</span></a> <a href="https://infosec.exchange/tags/SpamBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpamBox</span></a> <a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a></p>
Afnic<p>🌐 L'Afnic est présente aujourd'hui jusqu'au 3 avril au Forum INCYBER Europe (FIC) au stand F-40 à Lille. </p><p>🛡️ Une belle opportunité d'échanger sur les enjeux DNS de la cybersécurité. </p><p>➡️ Découvrez également notre nouvelle formation NIS 2 Lead Implementer <a href="https://www.afnic.fr/produits-services/formations/formation-nis-2-lead-implementer/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/produits-services/for</span><span class="invisible">mations/formation-nis-2-lead-implementer/</span></a></p><p>Et explorer toutes nos formations sur la sécurisation du DNS <a href="https://www.afnic.fr/produits-services/formations/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/produits-services/for</span><span class="invisible">mations/</span></a></p><p>Venez rencontrer Lotfi Benyelles, Benoît Ampeau et Régis Massé au Stand F-40 !</p><p><a href="https://mastodon.social/tags/Afnic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Afnic</span></a> <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.social/tags/InCyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InCyber</span></a> <a href="https://mastodon.social/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a></p>
Jan Schaumann<p>System Administration</p><p>Week 8, The Simple Mail Transfer Protocol, Part III</p><p>In this video, we look at ways to combat Spam. In the process, we learn about email headers, the Sender Policy Framework (<a href="https://mstdn.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>), DomainKeys Identified Mail (<a href="https://mstdn.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a>), and Domain-based Message Authentication, Reporting and Conformance (<a href="https://mstdn.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>). <a href="https://mstdn.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMTP</span></a> doesn't seem quite so simple any more...</p><p><a href="https://youtu.be/KwCmv3GHGfc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/KwCmv3GHGfc</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://mstdn.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a></p>
l<p>At least <a href="https://fosstodon.org/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> is an authentication mechanism designed to prevent email address spoofing, i.e. using a domain that you don't own in the From field that you send. It is not designed to prevent spam and it is clear from the specification that authors are aware of it: <a href="https://www.rfc-editor.org/rfc/rfc6376#section-8.6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">rfc-editor.org/rfc/rfc6376#sec</span><span class="invisible">tion-8.6</span></a></p>
Hacker News<p>Spammers are better at SPF, DKIM, and DMARC than everyone else</p><p><a href="https://toad.social/@grumpybozo/114213600922816869" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">toad.social/@grumpybozo/114213</span><span class="invisible">600922816869</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Spammers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spammers</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Marcos Dione<p>"The stats we collect for the <a href="https://en.osm.town/tags/SpamAssassin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpamAssassin</span></a> project (mass-scan results from participating sites) have long shown that spammers are more consistent at making <a href="https://en.osm.town/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, <a href="https://en.osm.town/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a>, and <a href="https://en.osm.town/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> correct than are legitimate senders. DMARC in particular has no discernible benefit for most senders, so it is a useless signal.</p><p>Rejecting mail based solely on authentication failures of those deeply flawed authentication methods does more harm than good."</p><p><a href="https://www.jwz.org/blog/2025/03/dmarc-and-spf/#comment-257743" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">jwz.org/blog/2025/03/dmarc-and</span><span class="invisible">-spf/#comment-257743</span></a></p><p>EDIT: h/t <span class="h-card" translate="no"><a href="https://toad.social/@grumpybozo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grumpybozo</span></a></span></p><p><a href="https://en.osm.town/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://toad.social/@grumpybozo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grumpybozo</span></a></span> : I definitely am not angry with you (I very much agree).</p><p>Unfortunately many admins treat security solutions like they're a religion.</p><p>Some time age there was a hefty debate on a Dutch "mostly admins" site (<a href="https://tweakers.net" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">tweakers.net</span><span class="invisible"></span></a>, I'd have to look up the exact thread) about the "correct" sending and receiving MTA configurations. There was no agreement.</p><p>Microsoft even used to ignore SPF/DKIM/DMARC if the sender was in the "safe senders" list (which the user's address book defaults to). What could possibly go wrong (later MS corrected that).</p><p>The screenshot below is from part of <a href="https://www.security.nl/posting/766069/DMARC+bypass+%28Outlook+only%3F%29#posting767981" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.nl/posting/766069/DMA</span><span class="invisible">RC+bypass+%28Outlook+only%3F%29#posting767981</span></a> (I wrote that Sept. 14, 2022).</p><p>Edited 23:36 UTC to add: {<br><a href="https://arxiv.org/abs/2302.07287" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2302.07287</span><span class="invisible"></span></a><br>Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy<br>Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage<br>}</p><p><a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://infosec.exchange/tags/Arc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arc</span></a> <a href="https://infosec.exchange/tags/WhatEver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatEver</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@deepthoughts10" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>deepthoughts10</span></a></span> wrote: "email authentication like DMARC/SPF does one thing: it prevents impersonation of a specific domain (assuming policies are configured for reject or quarantine.)"</p><p>It does not even do that on my iPhone.</p><p>P.S. SPF was invented to prevent Joe Jobs (<a href="https://en.wikipedia.org/wiki/Joe_job" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">en.wikipedia.org/wiki/Joe_job</span><span class="invisible"></span></a>). Marketing idiots (including Bill Gates) said that it would kill spam. It killed forwarding instead.</p><p><span class="h-card" translate="no"><a href="https://toad.social/@grumpybozo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grumpybozo</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@jwz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jwz</span></a></span> </p><p><a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://infosec.exchange/tags/ARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARC</span></a> <a href="https://infosec.exchange/tags/WhatEver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatEver</span></a></p>
Large Format Projectionist<p><a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> experts, is there a good <a href="https://mastodon.social/tags/ELI5" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ELI5</span></a> for <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> ?</p><p>DNS=Domain Name System, turning www.bloopforb.net to 534.678.12.983</p><p>ELI5=Explan it Like I was 5 years old</p><p>DKIM=?</p>
Martin Schmitt<p><a href="https://mastodon.online/tags/Datev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datev</span></a> hat Probleme, <a href="https://mastodon.online/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> eines Kunden von mir zu validieren. Es steht die Vermutung im Raum, dass das daran liegen könnte, dass einer meiner authoritativen Nameserver auch <a href="https://mastodon.online/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a>-Relay (ohne Exit) ist. Wir testen deshalb jetzt mal 4 Wochen ohne ihn. Welche Gründe könnte es geben, auf Enterprise-Ebene die Firewall mit irgendwelchen Just-because-I-can-RBLs von Hobbyisten zu betanken? BITTE NUR FALSCHE ANTWORTEN.</p>
Delta Chat<p><span class="h-card" translate="no"><a href="https://jura.social/@mathilde" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mathilde</span></a></span> <a href="https://chaos.social/tags/chatmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chatmail</span></a> server users don't have these problems because they don't even need to know their password or email address. Messages in delta chat are stored locally and the server only stores them for a limited time, up to 20 days by default, so all devices have a chance to download the message. Blocklists are also not used, the only requirements are <a href="https://chaos.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> signature and <a href="https://chaos.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> encryption.</p>
Julien Riou<p>I've Got Mail <a href="https://bonesmoses.org/2025/ive-got-mail/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bonesmoses.org/2025/ive-got-ma</span><span class="invisible">il/</span></a></p><p><a href="https://hachyderm.io/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://hachyderm.io/tags/postfix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postfix</span></a> <a href="https://hachyderm.io/tags/postgrey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postgrey</span></a> <a href="https://hachyderm.io/tags/dovecot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dovecot</span></a> <a href="https://hachyderm.io/tags/roundcube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>roundcube</span></a> <a href="https://hachyderm.io/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://hachyderm.io/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a> <a href="https://hachyderm.io/tags/dmarc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmarc</span></a> <a href="https://hachyderm.io/tags/mailinabox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailinabox</span></a> <a href="https://hachyderm.io/tags/mailu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailu</span></a> <a href="https://hachyderm.io/tags/mailcow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailcow</span></a> <a href="https://hachyderm.io/tags/stalwart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stalwart</span></a> <a href="https://hachyderm.io/tags/protonmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protonmail</span></a> <a href="https://hachyderm.io/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a></p>
Несерьёзный Выдумщик<p>Всегда делайте бэкапы корпоративной эл.почты. Например, используя почтовый клиент с настройкой выкачивать письма, делая offline-копии папок.</p><p>Какой-нибудь <a class="hashtag" href="https://idealists.su/tag/clawsmail" rel="nofollow noopener noreferrer" target="_blank">#clawsmail</a> или <a class="hashtag" href="https://idealists.su/tag/thunderbird" rel="nofollow noopener noreferrer" target="_blank">#thunderbird</a>. Держать его запущенным весь день смысла нету, но утром и вечером запускать, ждать пока засинкает почту и выключать.</p><p>Важно, чтобы письма удалённые в папках на сервере почтовый клиент не торопился удалять и у вас в локальной базе.<br>Потому, возможно, придётся использовать из-за этого не imap, а какой-нибудь древний pop3.<br>Или же две иерархии папок — одна архивная копия, а вторая отображает текущее состояние папок на сервере.</p><p>Если на тебя вдруг начинают натравливать юристов, перекладывая ответственность за чьи-то косяки или же предлагая самому уйти по-хорошему. То этот локальный архив рабочей эл.почты очень пригождается в общении с адвокатом. Правда давать его надо лишь за конкретный период и лишь тому, с кем заключено соглашение (об абонентском юридическом обслуживании и на ведение дела в суде).</p><p>Как правило компании используют сервера эл.почты с <a class="hashtag" href="https://idealists.su/tag/dkim" rel="nofollow noopener noreferrer" target="_blank">#DKIM</a> подписями всего того, что проходит через почтовый сервер — это и заголовок и тела письма. В архиве таком эта подпись сохраняется, так же как и вся остальная служебная информация из полей заголовка.<br>Доказательная база писем складывается с того, что это криптографически стойкая подпись ключом сервера.<br>И что в случае обострения противостояний вся переписка якобы должна быть поднята с архива.</p><p>Именно по этому, есть практика рассылать некую резолюцию по итогам любой встречи или совещания. Тот самый meeting result, о котором часто упоминают как и про executive summary. Записывать встречи лишний раз не стоит, муторно это, а вот фиксировать договорённости на горячее теми или иными письмами очень даже полезно.</p><p>Ветра часто меняют направления и тот, кто был вчера героем сегодня может стать основным источником проблем и неурядиц. А потому должен быть наказан в назидание другим, согласно процедуре награждения непричастных и наказания невиновных.</p><p>Это не описуемо, сколько нервов и сил сохраняется демонстрацией того или иного письма в подходящий момент нужному человеку.</p><p><a class="hashtag" href="https://idealists.su/tag/корпоративизмы" rel="nofollow noopener noreferrer" target="_blank">#корпоративизмы</a> <a class="hashtag" href="https://idealists.su/tag/email" rel="nofollow noopener noreferrer" target="_blank">#email</a></p>
jordan<p>Hey <a href="https://mastodon.jordanwages.com/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://mastodon.jordanwages.com/tags/nerds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nerds</span></a> and <a href="https://mastodon.jordanwages.com/tags/ServerAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ServerAdmin</span></a> people, I know about <a href="https://mastodon.jordanwages.com/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a>, <a href="https://mastodon.jordanwages.com/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>, and <a href="https://mastodon.jordanwages.com/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> and stuff. BUT.</p><p>Idea: system where email servers generate a <a href="https://mastodon.jordanwages.com/tags/GUID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GUID</span></a> identifier for that specific email and keep it in a database. Other servers and email clients can then just ping the <a href="https://mastodon.jordanwages.com/tags/domain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>domain</span></a> that the email says its from and confirm the real domain sent it.</p><p>Like, why couldn't this be a thing? Seems like it would completely stop those <a href="https://mastodon.jordanwages.com/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> emails that pretend to be from <a href="https://mastodon.jordanwages.com/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a> or <a href="https://mastodon.jordanwages.com/tags/banks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>banks</span></a>.</p>
🚲 Elizabeth :flag_bisexual:<p>J'ai un nom de domaine chez <a href="https://piaille.fr/tags/o2switch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>o2switch</span></a> et depuis quelques jours, je ne peux plus envoyer de mails à mes contacts Gmail, à cause d'un problème de configuration SPF* ou DKIM. </p><p>Quand je lis cet article <br><a href="https://faq.o2switch.fr/hebergement-mutualise/tutoriels-cpanel/authentification-email-spf-dkim" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">faq.o2switch.fr/hebergement-mu</span><span class="invisible">tualise/tutoriels-cpanel/authentification-email-spf-dkim</span></a> <br>Ça n'a pas l'air simple à résoudre. </p><p>Parmi vous, les personnes qui lisez ce message, vous avez réussi à résoudre ce problème facilement chez o2switch ? Comment on fait ? 😬</p><p>* jusqu'à présent, le SPF était uniquement l'indice de protection d'une crème solaire 😁</p><p><a href="https://piaille.fr/tags/gmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gmail</span></a> <a href="https://piaille.fr/tags/spf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spf</span></a> <a href="https://piaille.fr/tags/dkim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dkim</span></a></p>
viq<p>Since I'm currently reading <a href="https://social.hackerspace.pl/tags/RunYourOwnMailServer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunYourOwnMailServer</span></a> <a href="https://social.hackerspace.pl/tags/RYOMS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RYOMS</span></a>, the part about <a href="https://social.hackerspace.pl/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> reminded me about something I heard some time ago, and I managed to find it again. Concept somewhat similar to what <a href="https://social.hackerspace.pl/tags/OTR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTR</span></a> does. <br><a href="https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cryptographyengineering.c</span><span class="invisible">om/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/</span></a><br><a href="https://rya.nc/dkim-privates.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">rya.nc/dkim-privates.html</span><span class="invisible"></span></a></p><p>With greetings and thanks to <span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mwl</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@ryanc" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ryanc</span></a></span> 😅</p><p><a href="https://social.hackerspace.pl/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://social.hackerspace.pl/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> <a href="https://social.hackerspace.pl/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.hackerspace.pl/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
Dave Moskovitz (((❤️)))<p>Kind of weird that <a href="https://mastodon.nz/tags/Orcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Orcon</span></a> does not <a href="https://mastodon.nz/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> sign outgoing emails.</p><p>X-Spam-Status: Yes, score=5.15 tagged_above=-10 required=3<br> tests=[DKIM_UNSIGNED=2, DMARC_NONE=0.898, FREEMAIL_FROM=0.001,<br> HTML_IMAGE_RATIO_06=0.001, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=2.234,<br> MIME_QP_LONG_LINE=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001,RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01]</p>
Afnic<p>✉️ Le courrier électronique est une cible privilégiée pour le spam, le phishing et autres formes d'escroqueries. </p><p>👩‍🏫 Découvrez DKIM, DMARC et SPF, trois techniques d’authentification de l’émetteur qui s’inscrivent dans la boîte à outils des organisations qui cherchent à lutter durablement contre ces abus.</p><p>Prochaines sessions :<br>📅 27 et 28 mars 2025<br>📅 22 et 23 mai 2025</p><p>➡️ Découvrez le programme complet et inscrivez-vous ici : <a href="https://www.afnic.fr/produits-services/formations/dkim-dmarc-spf-securiser-son-courrier-electronique-grace-au-dns/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/produits-services/for</span><span class="invisible">mations/dkim-dmarc-spf-securiser-son-courrier-electronique-grace-au-dns/</span></a></p><p><a href="https://mastodon.social/tags/Afnic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Afnic</span></a> <a href="https://mastodon.social/tags/Formation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formation</span></a> <a href="https://mastodon.social/tags/Courrier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Courrier</span></a> <a href="https://mastodon.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> <a href="https://mastodon.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> <a href="https://mastodon.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a></p>