[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: BerkeleyLUG Google Groups (list) - backup(s) & ... (possibly) migrate to ...



On Thursday, May 6, 2021 at 10:29:49 PM UTC-7 goossbears wrote:
Chris and others,
From what I've been reading on other mailing lists, not all is sweet-smelling roses as far as migrating mailing-list(s) to Mailman using Yahoo.com addresses.
A big thorn with using Yahoo.com is its "DMARC badness" as Rick put it in his conspire mailing-list post '(forw) [skeptic] me.com is shooting Skeptic subscribers in the foot w/DMARC (was: I have questions...)' at http://linuxmafia.com/pipermail/conspire/2021-April/011582.html
Directly quoting Rick from that post:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DMARC is a badly designed antiforgery method designed by Yahoo that is built atop an equally badly designed earlier antiforgery method named DKIM. DKIM allows an individual user to cryptographically sign the composed contents of his/her message, including many of the internal SMTP headers. DMARC is a metastandard that includes DKIM, and adds a method (SPF) to determine whether the IP address attempting to deliver mail ostensibly from a claimed sending domain is among the IP addresses predeclared as authorised to issue mail from that domain onto the Internet.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

It may also help one or two persons following this thread to recognize further details about DMARC, DKIM, and SPF not only from Mailman's perspective but also directly from the fully non-ranting yet justifiably vilified "data-mining"  mouth of Auntie Google....

1. Google Workspace Admin Help's 'About DMARC' webpage https://support.google.com/a/answer/2466580?hl=en
Directly quoting the first section of that link :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Prevent spoofing and phishing with DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a standard email authentication method. DMARC helps mail administrators prevent hackers and other attackers from spoofing their organization and domain. Spoofing is a type of attack in which the From address of an email message is forged. A spoofed message appears to be from the impersonated organization or domain.

DMARC also lets you request reports from email servers that get messages from your organization or domain. These reports have information to help you identify possible authentication issues and malicious activity for messages sent from your domain.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Three other sections of that 'About DMARC' link are
o - Spooofing and Phishing
o - How DMARC prevents spoofing (including relevant expanded "zippys"; 'Authenticates messages (DMARC alignment)', 'Manages messages that fail authentication (receiver policy)', and 'Sends you reports so you can monitor and change your policy' )
o - What you need to do



2. Google Workspace Admin Help's 'Increase security for outgoing email with DKIM...Set up DKIM to prevent email spoofing' webpage https://support.google.com/a/answer/174124?hl=en
Directly quoting the first section of that link :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Make your email more secure and protect your domain

Use the DomainKeys Identified Mail (DKIM) standard to help prevent spoofing on outgoing messages sent from your domain.

Email spoofing is when email content is changed to make the message appear from someone or somewhere other than the actual source. Spoofing is a common unauthorized use of email, so some email servers require DKIM to prevent email spoofing.

DKIM adds an encrypted signature to the header of all outgoing messages. Email servers that get signed messages use DKIM to decrypt the message header,  and verify the message was not changed after it was sent. 

If you want more email security, we recommend setting up these security methods along with DKIM:

Three other sections of that 'Increase security for outgoing email with DKIM...' link are
o - If you don't set up DKIM, Gmail uses default DKIM
o - Steps to set up DKIM
o - Common questions about DKIM (including relevant expanded "zippys"; 'How does DKIM work?', 'What if my domain already has a DKIM key?' and 'How do I set up DKIM for a server that modifies the content of outgoing emails?' )


3. Google Workspace Admin Help's 'Ensure mail delivery & prevent spoofing (SPF)' webpage https://support.google.com/a/answer/33786?hl=en
Directly quoting the first section of that link :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Protect against forged emails & make sure messages aren't marked as spam

Using Sender Policy Framework (SPF), you can protect your domain from spoofing and help ensure that your messages are delivered correctly. You use SPF to authenticate email and specify the mail servers authorized to send email for your domain. Mail servers use SPF to verify that messages that appear to come from your domain actually are from your domain.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Six other expanded "zippy" sections of that 'Ensure mail delivery & prevent spoofing (SPF)' link are
o - Reasons to use SPF
o - Before you begin
o - Step 1: Create your TXT record for SPF
o - Step 2. Enable SPF for your domain
o - Follow other best practices for email authentication (partially covered in the DMARC and DKIM webpages of 1 and 2 above)
o - Troubleshoot SPF records

-------------------------------------------------------

Perhaps the Google "beast's" own more organized info will be easier to wade through? ;-)


-A





--
You received this message because you are subscribed to the Google Groups "BerkeleyLUG" group.
To unsubscribe from this group and stop receiving emails from it, send an email to berkeleylug+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/berkeleylug/e56996e7-7137-48f1-a5f3-5778d01af2d4n%40googlegroups.com.