SPF how useful is it?
Chris wrote in and mentioned a talk at Auscert which highlighted that (Sender Policy Framework) SPF would have helped in the instance of an intrusion and suggested a diary outlining some of the things that can and can't be achieved using SPF. I have my own experiences with SPF and the effectiveness, but I'd like to hear you experiences with SPF, good or bad. so I can write a more complete diary on the topic.
For those that are not familiar with SPF. The idea behind it is to create a DNS entry that specifies those machines in your network that are allowed to send email from your domain. The receiving mail server checks this record and if it does not match it will drop the message. There is a little bit more to it, but hat is the crux of it. So if you have had any experiences with SPF (good or bad) please let me know via the contact form or directly markh.isc at gmail.com.
Thanks Chris for the idea and thanks in advance for your contributions. I'm aiming to get a diary out on this later this month.
Cheers
Mark H
Comments
Ask that question on slashdot and you'll have thousands of nerds telling you that SPF is a useless waste of time.
joeblow
Jun 1st 2010
1 decade ago
Yes, it could all be arranged so that the employee used authenticated SMTP via our servers and the family used the ISP's servers, but how many of you have ever tried to tell university faculty to do something? It's kind of like teaching a pig to sing...
Ken
Jun 1st 2010
1 decade ago
Fully adopting SPF (the o=- tag) may force everyone to authenticate with your own server[s] in order to send mail addressed from your domain. That applies to human users as well as any servers that send mail (such as website signup/registration/notification emails). You may as well require SMTPS, and authentication with either a passphrase or client certificate.
The immediate benefit to your own organisation is that you can completely lock out external mail purporting to be internal. This will stop some phishing emails, and all kinds of other spam too. The default heuristic scanning of SpamAssassin would mark such emails as SPF_FAIL but potentially allow them through if they seemed otherwise genuine, in which case you can review these to see if someone or some system is not properly configured.
And then you're also in a position to scan your outgoing mail for viruses, phishing scams, or whatever else. This is not due to SPF itself, but because all mail is probably going via one or more of your own server[s] now.
Finally, not to forget, any SPF-checking recipients of your mail can then be sure whether email addressed from your domain is just spam, or whether it came through systems under your careful control.
Steven Chamberlain
Jun 1st 2010
1 decade ago
Perry Veranoid
Jun 1st 2010
1 decade ago
re: NDR's - I'm amazed that any SMTP boxes that still do NDR's would be configured to correctly use SPF.
Brandioch Conner
Jun 1st 2010
1 decade ago
Steven
Jun 1st 2010
1 decade ago
If you're big enough, some of your users will want to have third parties send email as well. You need to find a solution for these users - although it can be as simple as splitting the sender (Return-Path) and From addresses for third party-sourced email. If you don't solve that issue, you'll never get SPF rolled in.
Bounce Address Tag Validation (BATV) will do far more to reduce your *own* backscatter.
One other key point - it should be useful (and completely harmless) to implement hardfail-only SPF rules (no legit senders!) for any non-email domains you run. Those should never have email in them, so make that point completely clear.
Chris S
Jun 1st 2010
1 decade ago
Charles Wastell
Jun 1st 2010
1 decade ago
it worked well when everyone was on board and trying to help, but there were a number of doctors who did not/would not adopt the system since they had to change mail servers to do so.
Ken mentioned university faculty....I think they are second behind doctors about being reluctant to do things differently than they already are.
husaragi
Jun 1st 2010
1 decade ago
husaragi
Jun 1st 2010
1 decade ago