BITS Email Authentication Policy and Deployment Strategy for

Email Authentication Policy and
Deployment Strategy for
Financial Services Firms
A PUBLICATION OF THE BITS SECURITY PROGRAM
February 2013
BITS/The Financial Services Roundtable
1001 Pennsylvania Avenue NW
Suite 500 South
(202) 289-4322
Table of Contents
Executive Summary........................................................................................................................................ 4
Background....................................................................................................................................................... 5
Historical Perspective on Email Security ................................................................................................... 5
Emergence of DKIM and SPF ................................................................................................................ 5
Moving from Reactive to Proactive Security ............................................................................................. 6
Introduction of DMARC ......................................................................................................................... 6
Case Study for Email Authentication ......................................................................................................... 8
Very Large Bank ........................................................................................................................................ 9
Success.......................................................................................................................................................11
Implementation Approach .........................................................................................................................12
Five Phases of Deployment ...................................................................................................................12
Business and Process Considerations .....................................................................................................14
Identifying and Engaging Stakeholders ....................................................................................................14
Business Units ..........................................................................................................................................14
Enumerated Need Details ......................................................................................................................16
Policies...........................................................................................................................................................18
Implementing the Technology Recommendations ............................................................................23
Measuring Effectiveness .............................................................................................................................23
Metrics .......................................................................................................................................................23
BITS Trusted Email Registry .....................................................................................................................24
Responding to External Threats: Investigations and Takedowns ........................................................25
DKIM and SPF Implementation Guide .................................................................................................27
What Is Email Authentication And Why Is It Important? ....................................................................27
How Does Email Authentication Work? .................................................................................................27
General Considerations for Email Authentication Deployment ..........................................................27
Organizational Email Disciplines ..........................................................................................................27
Departmental Organization and Participation ....................................................................................28
Political Issues and Policy Determination............................................................................................29
Architectural and Technical Considerations ........................................................................................30
Third-Party Senders.................................................................................................................................31
Remote Employees..................................................................................................................................32
Domain Segmentation ............................................................................................................................33
Protecting Brand Domains That Do Not Send Email ......................................................................34
DomainKeys Identified Mail (DKIM) Implementation ........................................................................35
High-level Technical and Functional Overview..................................................................................35
Signing Versus Verifying ........................................................................................................................36
Technical Implementation and Best Practices ....................................................................................37
Sender Policy Framework (SPF) Implementation ..................................................................................40
High-level Technical and Functional Overview..................................................................................40
Publishing Considerations ......................................................................................................................42
The Forwarding Issue .............................................................................................................................43
Considerations for the Joint Use of SPF and DKIM .............................................................................44
Implementation tradeoffs .......................................................................................................................44
Combined DKIM/SPF use benefits ....................................................................................................44
Metrics and Reporting.................................................................................................................................46
Signing Validity ........................................................................................................................................46
Gathering Spoofing Data .......................................................................................................................47
Desirable Future Data .............................................................................................................................47
Technical Implementation of DMARC ...................................................................................................47
DMARC Overview..................................................................................................................................47
How DMARC Works: An Overview ...................................................................................................48
Anatomy of a DMARC Resource Record in the DNS ......................................................................48
Sender DMARC Implementation .........................................................................................................49
Appendix A Resources ...............................................................................................................................51
Appendix B Agari and Return Path Partnerships for Email Authentication .............................53
Appendix C Acknowledgements .............................................................................................................54
Executive Summary
The BITS Email Authentication Policy and Deployment Strategy for Financial Services Firms explains how
financial institutions can leverage several protocols and tools to detect and reduce the number of
spoofed email messages that reach consumers and business partners.
This paper was developed by the BITS Security Working Group and leverages previous papers
published in 2007 and 2009, and collaboration among technology leaders in financial institutions,
Internet Service Providers (ISPs), Email Service Providers (ESPs), and others to reduce the rampant
spoofing of email addresses. The paper discusses the Sender Policy Framework (SPF), Domain Keys
Identified Message (DKIM), and Domain-based Message Authentication, Reporting &
Conformance (DMARC) standards. Implementation of these standards provides a foundation for
building complete end-to-end email security solutions.
Email is a critical communications channel for business today. Fraudsters, criminals, and others have
learned how to create email messages that appear to come from another sender. Brands are regularly
and effectively abused by criminals who impersonate, or “spoof,” email addresses and Internet
domains of financial services and other companies. In a practice known as “phishing,” spoofed
email messages are sent in an attempt to persuade individuals to provide confidential personal or
company information to the spoofer. This information is then used to commit identity theft, gain
unauthorized access to computer systems, and other criminal acts.
Brands are regularly and effectively abused by criminals who spoof email addresses and Internet
domains of financial services and other companies. Email security has been a challenge, especially
when considering the original usage of the technology and the lack of security controls when email
was first created in 1971 to allow researchers to collaborate over the Advanced Research Projects
Agency Network (ARPANET). At the time, email security was not a priority because
communications occurred among a closed group of people over a trusted network. Today, email is
ubiquitous, travels across the open and unsecured Internet, and has become essential to personal,
consumer-to-business, and business-to-business communications.
This paper is designed as a guide for information security professionals to assist in developing
policies and procedures to implement the DMARC, SPF and DKIM protocols, and to leverage tools
such as the Trusted Email Registry. It discusses strategies for developing policies and procedures
and working with ISPs and ESPs, coordinating within large financial institutions to effectively
implement these protocols, and the benefits of adopting these protocols and metrics for measuring
success. Benefits include:
 Significant reduction in fraudulent email to customers and prospective customers
 Reduction in phishing attacks against high-value/trusted domains
 Increase in customer/partner confidence and trust in the authenticity of the sender’s email
 Enhanced brand and reducing the exposure of customers to phishing attacks that could lead
to fraud or malware infection.
Background
As email has evolved and become a ubiquitous business communication channel, the BITS Security
Working Group has actively tracked new developments and made recommendations to members on
best practices. This paper provides information about the BITS Trusted Email Registry1 and
guidance on how organizations can take advantage of new functionality to detect and reduce the
number of spoofed messages that reach consumers and business partners.
Historical Perspective on Email Security
Email security has been a challenge, especially when considering the original usage of the
technology. Modern email using a computer network was first established in 1971 to allow
researchers to collaborate over the Advanced Research Projects Agency Network (ARPANET). At
the time, email security was not a priority because communications occurred among a closed group
of people over a trusted network. Today, email is ubiquitous, travels across the open and unsecured
Internet, and has become essential to personal, consumer-to-business, and business-to-business
communications. Credit card numbers, social security numbers, intellectual property, and more are
sent using a technology that was never designed to be secure.
Figure 1 Merged Feedback Version – Lacking email authentication, ISPs are unable to reliably
determine the legitimacy of email.
Pranksters, criminals, and others have learned how to create email messages that appear to come
from another sender. In a practice known as “phishing,” spoofed email messages are sent in an
attempt to persuade individuals to provide confidential personal or company information to the
spoofer. This information is then used to commit identity theft, gain unauthorized access to
computer systems, and other criminal acts.
Emergence of DKIM and SPF
Efforts to reduce the rampant spoofing of email addresses began in earnest in the early 2000s and
resulted in the development of the Sender Policy Framework (SPF) in 2003. SPF provides a method
The BITS Trusted Email Registry provides complimentary domain-specific email reports to our member companies
that will help an institution strengthen the security of its email channel and reduce enterprise and consumer risks..
Information is available at http://www.bits.org/initiatives/trusted-email-registry.php.
1
that allows domain owners to publish lists of servers authorized to send emails on behalf of their
domains, granting receivers the ability to check emails against the authorized lists and easily detect
fraudulent messages. Several approaches based upon digital signatures emerged in 2004 and
culminated in the 2007 DomainKeys Identified Message (DKIM) standard. While SPF and DKIM
provide critical first steps towards improving email security, the effectiveness of these authentication
efforts is limited due to a lack of visibility as to who is sending email on behalf of an organization
and the lack of active policy enforcement to ensure receiving email service providers, such as
Google and Yahoo, are rejecting or quarantining suspicious messages.
Figure 2 Merged Feedback Version – With email authentication, ISPs can begin to determine the
legitimacy of email and reduce the volume of delivered fraudulent email.
Moving from Reactive to Proactive Security
In the past, detection of phishing attacks relied on mail receivers’ (ISPs) ability to perform statistical
analysis of large volumes of email. Unfortunately, most of the damage of a phishing campaign is
inflicted in the first few hours of an attack when email volumes remain low enough to avoid
detection by statistical analysis. The time difference between the initial phishing attack and eventual
detection forced organizations to respond reactively to phishing attacks, with response coming in
the form of remediating compromised accounts, cleaning up damage, and mitigating the breadth of
phishing attacks by attempting to shutdown infrastructure involved in an attack.
Introduction of DMARC
In January 2012, a consortium of email senders and receivers sought to address the continued
spoofing of high-value or trusted Internet domains by publishing a new specification: Domain-based
Message Authentication, Reporting & Conformance (DMARC). DMARC-based solutions, such as
the Trusted Email Registry, provide organizations with Internet-wide visibility into both legitimate
and malicious usage of an organization’s email domains, as well as the ability to direct receivers of
emails to enforce quarantine or reject policies against malicious messages. The DMARC
specification leverages the established technologies of SPF and DKIM and provides a foundation
for building complete end-to-end email security solutions. The DMARC specification builds upon
the successful prototype of an industry leading payments provider and is the result of a collaborative
effort between key members of the email ecosystem.
DMARC relies on SPF and DKIM to determine the authenticity of messages. When authenticity
cannot be established, a DMARC policy can cause inauthentic messages to be blocked before
reaching the inbox. Senders using DMARC see an increase in the value of email communication
through a significant reduction in the viability of phishing attacks against high-value/trusted
domains and an increase in customer/partner confidence in the authenticity of the sender’s email.
The Trusted Email Registry provides a convenient way to coordinate and visualize DMARC activity
across all of an institution’s domains and brands.
Figure 3 Merged Feedback Version – Audit/Detect/Remediate Phase.
Case Study for Email Authentication
In April of 2007, the BITS Security Working Group created a whitepaper titled BITS Email Security
Toolkit: Protocols and Recommendations for Reducing the Risks. The paper described technologies and
methods companies could use to mitigate the risks associated when using email to conduct business.
Although the paper’s core recommendations and observations remain relevant today, the email
ecosystem has evolved alongside increasingly sophisticated criminal attacks against institutions and
consumers.
Figure 4 Merged Feedback Version – Secure (Blocking) Phase.
Criminals have been relentlessly exploiting email’s weaknesses causing the amount of spam and
phishing to dramatically increase. The Gartner Group reports a 700% increase in email-based
phishing between 2008 - 2012, with 67% of those attacks targeting financial services and payment
firms, costing consumers and companies close to $8 billion. The estimated cost to victims by a single
phishing campaign is more than $1.4 million [Cyveillance (December, 2008)]. Credential theft also
occurs very quickly. For example, of all the credentials successfully obtained through criminal
phishing attacks, 50% are harvested in the first 60 minutes of a campaign [Trusteer].
The prevalence of phishing attacks has caused a decline in consumer trust of email. In a 2010
Identity Theft Resource Center survey, 81% of consumer respondents cited phishing emails as a
significant concern relating to the security of their personal and financial information when
conducting online transactions. Email continues to play a role as a significant propagation vector in
the spread of malware, causing 54 million U.S. adults in 2011 to report desktop malware infections.
The Gartner Group estimates that more than 40% of U.S. consumers have altered their level of trust
in email messages and online shopping as a result of this continuing threat (see Figure 5).
Figure 5 Security concerns have affected behaviors, Gartner Group.
Traditionally, email authentication has been an unreliable method of determining email legitimacy
due to complexities of deployment inconsistencies, gaps in coverage, and reliability concerns. As a
result, consumer mailbox providers (Hotmail/Outlook.com, AOL, GMail, Yahoo! Mail) have been
unable to leverage email authentication technologies when evaluating email that otherwise appears to
be legitimate – messages that are likely to be phishing attacks designed to fool consumers.
Very Large Bank
To illustrate a success story, a BITS member has provided the following case-study so that others
may learn from their experience in coordinating within a large organization the deployment of
authentication technology and policies. This institution, hereafter known as Very Large Bank (VLB)
had participated in the drafting of the 2007 BITS whitepaper. The widely circulated paper influenced
numerous banks and other financial service organizations (including VLB’s senior management) to
adopt many of its recommendations. Despite these positive steps, the problem of trust-eroding
phishing attacks continued to worsen. VLB decided in 2011 to launch a project to address the
problem of consumer phishing.
Figure 6 VLB Merged Feedback Version – Threat Intelligence Phase.
Data for the initial business case was based on an early estimate of 600,000 annual emails sent by
unauthorized third parties that purported to be VLB. Unauthorized third-party sources were located
in almost every country, despite VLB having no business operation in most countries. Annually,
VLB sent approximately 4 billion legitimate emails, forcing customers and potential customers to
determine which 20% (1 in 5) of the emails purporting to be VLB were fraudulent. The large
volume of unauthorized email competed with legitimate VLB email for consumers’ attention and
caused significant brand erosion as consumers lost confidence in the email channel.
To meet business case requirements, the VLB project sought to meet three specific objectives:
 Improve the customer’s email experience by eliminating fraudulent email and resulting
phishing and malware attacks
 Lower customer service call volume attributed to phishing attacks
 Enhance the VLB brand by improving email campaign results
Eliminating fraudulent email required enabling receivers with a way to easily identify legitimate VLB
email by implementing SPF and DKIM across all legitimate email streams. Discovering the sources
of all legitimate email streams can be problematic as large companies such as VLB often consist of
multiple lines of business. Each line of business can communicate directly with customers via email,
employ third-party Email Service Providers (ESPs) to send email on behalf of the business, or
partner with small consulting or marketing operations that send email on behalf of the business.
The VLB project team leveraged vendor-provided email intelligence to identify the sources of all
email sent to consumers using VLB-owned domains. Based on this intelligence, VLB identified lines
of businesses, ESPs, and third parties sending on behalf of VLB. As the project progressed, the
process of discovering legitimate sources was occasionally complicated by ESPs using other third
parties to deliver email, individuals sending email using residential networks while working from
home, and the presence of external campaign management software platforms used both by VLB
staff and third parties that originated email to customers and prospects.
During the process of installing controls to eliminate fraudulent email, the project team contacted
ISPs and asked them to only deliver email that originated from an authenticated VLB domain. Based
on this action, the project team identified several third parties that sent low volumes of legitimate
email on behalf of VLB that had not been made aware of the project’s domain authentication
requirements. To address needs for ongoing internal education, the project team implemented a
communications plan to inform all line of business marketing groups and product teams of the new
requirements for email authentication. Marketing teams quickly recognized the potential benefits of
the project and worked with their contracted ESPs to implement the necessary changes. VLB was
then able to notify all ISPs of the policy to drop email purporting to be from VLB-owned domains
that failed authentication checks.
During the execution of the project, the DMARC.ORG working group produced a draft
specification to allow domain owners to request quarantine or rejection of unauthenticated email.
The DMARC specification, published in January 2012, standardizes the SPF, DKIM, and policy
deployment model implemented by the VLB project team during 2011.
Success
As of late 2012, VLB has eliminated close to 90% of fraudulent email to customers and prospective
customers using VLB-owned domains, significantly enhancing the VLB brand and reducing the
exposure of VLB customers to phishing attacks that would otherwise lead to fraud or malware
infection. This is likely to increase as additional ISPs implement DMARC (with most large ISPs
expected to be DMARC-compliant at the end of 2012). The VLB project team is currently seeking
to determine the specific benefit of email-based brand protection by measuring the potential lift in
response rates due to fraud reduction. The elimination of fraudulent email is now easy to measure
due, in large part, to the feedback mechanisms provided by DMARC, and is available in an
enhanced form through the BITS Trusted Email Registry.
VLB’s project required an active internal communication program to reach and work with the
diverse service providers that originated email on behalf of VLB. Based on the success of the
communication program, various marketing teams requested to directly participate in the project.
Figure 7 VLB Authenticated Email Controls.
Implementation Approach
To implement controls based on email authentication, financial services organizations can adopt a
deployment lifecycle consisting of five phases. A summary of each phase appears below. Please note
that this document focuses primarily on outbound authentication, or email from the financial
services organization to customers and business partners. The equally important subject of inbound
authentication is out of scope of this paper.
Five Phases of Deployment
Monitor
Audit
Secure
Detect
Remediate
Figure 8 The Five Phase Deployment Lifecycle.
Audit: The Audit phase consists of creating an inventory of an organization’s email domains, email
streams, and email types. The domain inventory includes all domains actively sending email as well
as inactive domains registered for defensive or brand protection purposes. Active domains can
contain multiple email streams originating from different groups or vendors. Email streams can
contain different types of messages (e.g., transactional, corporate, marketing). Domains, email
streams, and email types must be discovered and tracked in order to implement controls. While
most of this information can be found through in-house research, DMARC-provided data and/or
the Trusted Email Registry can augment in-house research and reduce the cost of discovering email
streams.
Detect: The Detect phase compares and contrasts real-world data against the organization’s stated
email authentication implementation strategy. The result of this analysis directly informs the next
phase.
Remediate: The Remediate phase aims to resolve any email authentication implementation issues
or operational issues uncovered during the Audit or Detect phases. During this phase, all issues with
authorized senders should be corrected to ensure that quarantine or reject policies can be enforced
without impacting the delivery of legitimate email.
Secure: During the Secure phase, blocking policies are implemented for both active and inactive
domains. Publishing a blocking policy allows participating ISPs to either quarantine or reject
unauthenticated email on behalf of the organization, allowing only legitimate email to be delivered to
end-users.
Monitor: Successful implementers continuously monitor their deployment state, looking for new
signs of abuse, operational issues with authorized senders, changes in network topology, and other
anomalies. Monitoring can be performed in-house or through a vendor. Abuse such as new phishing
campaigns will show up in the reporting and can be turned over for investigation and takedown.
Operational issues can consist of newly hired third party senders, company acquisitions, new or
replacement email servers, and changes to DKIM signatures and SPF records.
An organization can begin implementing email authentication by following the five phases in the
presented order. The phases also represent an on-going process that can be used to maintain an
implementation after initial deployment. The continuing process can be used to detect, remediate,
and secure email streams that change due in a fluid business and technology environment. For
example, as new products and services are introduced, contracts with third-party senders begin and
end, portions of the business are sold off or acquired, or threats from bad actors appear on the
scene, existing implementations will need to be updated.
Business and Process Considerations
Identifying and Engaging Stakeholders
Technical and business groups within a company must incorporate email authentication into their
policies and procedures in order to successfully implement and operate these technologies.
Business Units
Business units or product teams are usually responsible for the use of email communications related
to their product or service, acting as the source of internal funding to support these operations and
as the arbiter of business risk decisions affecting the product. Depending on the size of the
company, business units may be focused around single products or services, ranges of products and
services, or be comprised of a number of different product teams. Business units must be made
aware of the damage that phishing has on their products and on the company brand as a whole, and
of the measures that can be taken to combat this threat. Business units will often champion email
authentication efforts that can be shown to improve communication with customers and partners.
Marketing / Brand Management
In many organizations, marketing groups maintain overall responsibility for developing, delivering,
and determining the effectiveness of communications to customers, clients, and prospects. Email
remains an important conduit for communicating to these various audiences. Marketing groups are
often responsible for the day-to-day business management of both third-party email service
providers and in-house capabilities for both bulk and transactional communications. As such,
marketing groups are key partners in interfacing with vendors in the implementation of email
authentication. Marketing groups may find significant value in monitoring the general “health” of
their email channels through feedback mechanisms such as provided by DMARC and the Trusted
Email Registry.
As a brand-strengthening activity, organizations often seek to communicate directly with customers
regarding improvements to email security and reliability. Marketing groups, in partnership with or on
behalf of business units and product teams, are often the best coordinators for developing and
delivering these messages. In addition, marketing groups may help promote consistent policies and
usage of email authentication across the organization, and serve as a clearinghouse for internal
education.
Customer Service
Customer service teams are important stakeholders in any email security deployment initiative since
they are the first line of engagement with customers. Customer service teams can help spread
awareness and education regarding the implementation and meaning of email security measures to
customers. This function is critical during periods when email authentication is being introduced,
especially as established practices may unexpectedly break during a transition period. For example,
customer use of alumni or affiliate email addresses may cause email to be blocked due to strict
blocking policies and poor forwarding implementations. Frontline customer services teams should
be supplied with training and materials to explain how these initially inconvenient measures benefit
customers in the long run, and how to address issues in the short term.
Email Engineering / Operations
Email engineering is responsible for the deployment and operation of email infrastructure operated
within an organization. Responsibilities include operation of externally facing Message Transfer
Agents (MTAs), internal email servers (such as Microsoft’s Exchange), and other related systems
within the email traffic flow. This function may be responsible for monitoring and managing
externally hosted email service providers, including fully outsourced employee email (e.g. Google
Apps, Microsoft Office 365) and bulk mail providers (e.g. Acxiom, Epsilon, ExactTarget) as well as
consultative support to business partners utilizing these service providers. In the context of this
document, email engineering is responsible for supplying addresses for SPF records, implementing
DKIM on managed MTAs, and providing public keys to DNS engineering for publication. This
group may also provide analytical support for reviewing DMARC reports and making corrective
actions as appropriate.
Network / DNS Engineering
Network/DNS engineering is responsible for managing the Domain Name System records for an
organizations registered domains. This includes publishing and updating SPF records, associated
DKIM keys, and DMARC records for all email sending domains. Network engineering may also
publish null (empty) SPF records and DMARC reject policies for non-sending domains to address
domain hijacking concerns.
IT Risk and Compliance
The following functions can span across multiple areas of an enterprise: vendor management,
fraud/investigations, and security operations.
Vendor Management
Companies increasingly rely on vendors to provide service solutions. This may include
administrative (corporate) email as well as marketing and other external email communications.
Vendor contracts should contain language requiring support for the organization’s email
authentication deployment policy and contain clear escalation paths should problems be identified
from either partner.
Fraud / Investigations
Corporate fraud and associated investigation teams may find the feedback reporting resulting from
the deployment of email authentication protocols, especially DMARC, an important source of
intelligence related to investigating fraudulent activity. Phishing and other email-borne attacks are
commonly used to both defraud customers and also gain footholds in corporate networks.
Aggregated and real-time reporting can provide valuable information on the source of attacks and
ways to counteract them.
Ma
rke
tin
g/B
r an
dM
gm
Cu
t
sto
me
rS
er v
ic e
Op
era
t io
ns
Inf
ras
t ru
ctu
IT R
re
isk
&C
om
plia
n ce
Ve
nd
or
Ma
nag
em
en
t
Fra
ud
/ In
ves
tig
ati
on
Sec
s
uri
ty
Op
er a
tio
ns
Security Operations
Some organizations may integrate security operations with fraud investigation teams. For purposes
of this paper, the security operations function manages detective and preventative controls to
protect corporate assets, particularly those related to IT. Security operations will most likely find
value in the added detective capabilities as well as the customer and employee protective capabilities
provided by email security and authentication.
1 General Awareness - Inside
2 Awareness Material - Customer
3 Implementation Strategy
4 Technical Deployment Details
5 Email Security Metrics / Reports
6 Operational Documentation
7 Data Taxonomy
8 Training
9 Email Asset Inventory
High Need
Moderate Need
Low or No Need
Figure 9 Role of Various Business Teams in DMARC Implementation.
Enumerated Need Details
The following is a list of actions that may be taken to build a strong email authentication program
within an organization and forms the basis for cultural change to increase the likelihood of success
over the long-term.
Marketing



Awareness: The value email security provides to both financial institutions and their
customers are significant.
Vendor Engagement: Develop plans to deploy email security mechanisms with existing
vendors and ensure future vendors support these tools from day one. Marketing should also
be the business gatekeeper to ensure appropriate oversight of all communication
engagements.
Customer Messaging for Email Security: Develop talking points and customer FAQs related
to the deployment of email security which may be shared with customers and clients.

Email Security Metrics: Partner with appropriate IT and/or risk staff to develop email
security metrics defining the “health” of the email channel which will assist in better
managing that resource.
Customer Service


Awareness: The implementation activities around email security that may change the
customer experience (e.g. my forwarded emails are being blocked…).
Training: How to answer customer questions regarding how to determine if an email is
legitimate. This may include training on the mechanisms deployed at major ISPs which may
leverage email authentication (e.g., new User Interface (UI) indicators).
Email Engineering / Operations




Inclusion in Planning: Email engineering should be included at the outset in any planning
and deployment of email authentication mechanisms. Email engineering provides expertise
as to the capabilities of various email platforms used in relation to email authentication, both
inbound and outbound.
Awareness: Raise awareness of business objectives related to email authentication. Providing
business context can help email engineering to solve business problems and reduces the risk
of inefficiently using finite organizational resources.
Data Analysis: Collect and analyze report data (both real-time and aggregate). Email
engineering should be provided with access to tools to fulfill this responsibility.
Service Management: Develop Service Level Agreements (SLAs) for making email platform
changes in support of email authentication, including business changes and tactical changes
addressing operational criteria and incidents.
Network / DNS Engineering




Domain Identification: Understand and document domain(s) subject to email
authentication.
Service Management: Service Levels for DNS-related changes for email authentication (e.g.
changes to SPF, DKIM keys, DMARC policies)
DNS Management: Coordination of DNS changes for domains with delegated authority,
such as may be in place with mail service providers.
Documentation: Operational documentation on the interpretation of email authentication
reports and response actions to address identified issues.
Vendor Management

Vendor Identification: Maintain an inventory of all vendors which may provide email
services directly (marketing email companies) or supplemental to their core services (e.g.
CRM, customer services, benefits, etc).



Vendor Communication: Document and convey to identified vendors expected best
practices to develop and maintain high levels of email reputation to support deployed email
authentication mechanisms.
Service Management: Develop and incorporate into business agreements expected Service
Level Agreements (SLAs) for important actions supporting email security. SLA items should
include problem resolution timelines dependent on defined severities, change requests (SPF
and DKIM record changes, DKIM key rotation, DMARC policy changes if not administered
internally).
Service Reporting: Define and document methods to deliver ongoing email authentication
reporting relevant to any given vendor.
Fraud/Investigations


Reporting: Access to regular and ad-hoc reporting capabilities, if available, related to email
authentication results.
Training: Training on the interpretation of provided reporting. Training on tools, both
internally developed and sourced as services, supporting the email security program.
Security Operations




Reporting: Access to regular and ad-hoc reporting capabilities, if available, related to email
authentication results.
Training: Training on the interpretation of provided reporting. Training on tools, both
internally developed and sourced as services, supporting the email security program.
Identification of Email Traffic Patterns: Profiles of normal email activity by source
including volumes.
Vendor Interaction: Operational contact information with email sending vendors. Work
with other security service providers, including integration of email authentication data with
phishing mitigation providers.
Policies
Successful email authentication deployments are achieved when organizations develop clear and
consistent policies across the entire enterprise. Clear and consistent policies allow various
stakeholders to coordinate activities between functions, maximizing the benefits of email
authentication while minimizing organizational friction. This section briefly touches on areas of
email governing policies to situate the additional policies needed to support email authentication.
Correspondence Versus Transactional Email
When the Internet was first opened to commercial use, companies commonly created one domain
and used it for all email communications – business correspondence, customer communications,
transactional email, etc. Companies largely continue to operate this way today, and often establish
separate domains or sub-domains to separate general correspondence from transactional email.
Separation may be done to simplify management and administration, to support regulatory
compliance and discovery, or to reflect internal administrative borders.
Domain / Sub-Domain Policies
Many companies initially allowed different internal groups to register new Internet domains with
little oversight or coordination. Over the course of several years, companies amassed large portfolios
of domains ranging from exact matches of major brands, to unwieldy constructs of product names,
business units, and overall brands. The variety of formats and conventions used to register domains
undermined customer attempts to discern imposters from legitimate senders, and on the whole
caused an increase in the attack surface for criminals trying to impersonate these companies.
Companies should employ consistent policies regarding how to map brands to domain names.
Policies may dictate when to create a sub-domain within a brand/domain for a new product or
service, versus creating a new Internet domain to support an advertising campaign lasting only a few
months or quarters. Overall brand management and marketing controls heavily influence policies
governing email domains, and can vary greatly from company to company.
Consistent Email “From” Addresses
The sending address and name shown on email coming from a company is part of the overall
impression a message delivers. Companies invest tremendous amounts of time and energy to create
and standardize logos and related colors, often concurrently standardizing policies to establish
consistency of email sending addresses.
Two different parts of the “From” line should be considered – the email address itself and the
display name (often called the “friendly from”). An example of an email address is
[email protected], and an example display name is “John Q Smith, Mortgage
Services.” Consistency allows customers to recognize and trust legitimate communications. Lastly,
consistent use of “From” addresses greatly eases the deployment of controls based on email
authentication.
Similar consideration should go into computer generated alert messages, marketing campaigns, and
other transactional communications.
Message Content Policies
The composition and design of the email content is often standardized within product groups, and,
depending on the company, across the enterprise. This is an extension of branding and
communications practices employed to create effective customer interaction. Depending on the
organization or business unit, these practices may be extended to correspondence.
An often overlooked facet of email content policy is the use of domain names in the hyperlinks and
graphical elements within the email body. Email containing links pointing to several different
domains can lead to the classification of such email as spam. Ideally, all elements of an email will
reference the same domain (or sub-domain), regardless if those elements are visible to the recipient.
An element containing an Internet domain, whether seen by the recipient or not, would optimally
use the same domain, or be sub-domains of the same parent domain.
Domain Inventory
Organizations possessing more than a few Internet domains should establish a central inventory
where individual domain status can be tracked. This inventory should identify all groups within the
organization that use the domain or sub-domain, regulatory status, whether the domain is
considered to be in a “production” state, the technical groups responsible for the operation of the
domain, etc. This inventory should be expanded to include the status of email authentication
measures implemented for all domains.
Static domain inventories quickly become outdated and therefore useless. Companies should modify
processes and activities that result in the creation of new domains or sub-domains to require those
domains to be added to a centralized domain inventory. This requirement should apply to any unit
within the enterprise, as well as third parties that may manage domains or sub-domains on behalf of
the company.
Authorized Third Parties
At some point, most companies will engage a third party to send email on their behalf. Contracts
with such entities should include provisions requiring third parties to implement any requisite email
authentication measures and to provide updates on operational matters that may impact any of these
measures or email delivery. For example, if an ESP begins sending email for a company from a
different IP address without notification, email sent from the new IP address could fail
authentication, impact delivery, and potentially disrupt business.
Third parties may be required to use addresses within one of the company’s domains, a separate
product or campaign-specific domain, or a sub-domain of one of the company’s domains. The exact
arrangement depends on the third party’s capabilities and will constrain a company’s operational
options, such as how to maintain or delegate control of DNS, how the necessary records are
published, and where reporting and analysis occur. Stakeholders should be aware of the operational
implications of these arrangements on change control, coordination of activity between operations
groups at each company, security and risk calculations, etc.
Domains and sub-domains used by third parties should always be included in the domain inventory.
Additional fields may be necessary to track external contacts, the business unit responsible for the
performance of the vendor, and the party managing the relationship.
Organizational Domains and Different Policies for Sub-Domains
In order to distinguish example.com from the top-level Internet domain .com, DMARC refers to the
domain owned by an email sender as the Organizational Domain (OD). Organizations typically publish
a DMARC policy at the Organizational Domain level. If sub-domains are in use, sub-domains would
normally inherit the policy published at the OD level. This feature allows a blocking policy to be
applied automatically to all sub-domains – including those invented or forged on-the-fly by
criminals.
This behavior may not be suitable for sub-domains that emit legitimate email, especially if subdomains are operated by different business units (or third parties) and maintain different timelines
for adopting email authentication. To provide flexibility, a flag may be set in the policy at the OD
level indicating an alternate policy to be applied to all sub-domains. For example, the policy
published for the OD example.com might be a quarantine policy, but a flag can be set to indicate that
a monitoring-only policy be applied to all sub-domains; or vice versa, depending on the needs of the
domain owner.
Organizations can also choose to publish a complete policy at the sub-domain level, which would
apply to any email using that sub-domain instead of the parent-domain’s policy. This allows for one
policy to be published for the domain and all sub-domains, but different policies to be published for
those sub-domains that require them. This works for sub-domains that are ready for blocking
policies before the rest of the domain, as well as for sub-domains that have not, or cannot, adopt
email authentication in time for a restrictive policy being applied to the parent domain.
Operations
Email authentication can provide data about a company’s email that was not available in the past, or
only available through special agreements and expensive services. This data can indicate when an
external attack is underway, when part of the legitimate infrastructure is misconfigured or broken, or
when an authorized third-party has failed to communicate a change in their infrastructure. Alerts to
the relevant operations teams can be triggered when this data exceeds baselines in different areas.
Reviews of the domain inventory and related contact information should be carried out periodically
to ensure the information is accurate.
Threat Response
Some of the raw data made available through email authentication technologies can identify
potential external threats before being reported by customers or partners. Clickable URLs found in
authentication-failing email can be sent to the company that owns the domain, or to a companydesignated third-party “mitigation provider.” Mitigation can dramatically decrease threats to brands
and customers and significantly shorten the time between when a phishing site first comes online
and when it is taken down.
Separating Correspondence and Transactional Messages
Email authentication is not a panacea. Even when a company has deployed DMARC, DKIM, and
SPF across the enterprise and third parties, some threat profiles are not covered. For example, email
that an employee sends to a mailing list, while legitimate, is likely to fail email authentication.
Forwarding means the email will not pass SPF, and the modifications will very likely cause the
DKIM check to fail.
However, failure of authentication does not mean non-delivery today. For example, most major ISPs
are able to identify mailing lists and after careful scrutiny and at their discretion, will allow delivery.
However, mixed use of the same domain or sub-domain might prevent a company from publishing
a more aggressive policy for that domain. Employees understandably become upset when messages
that were successfully sent to a mailing list yesterday stop working the day such a policy is published.
Therefore many companies should consider dividing these categories of traffic into separate
domains or sub-domains so the company can adopt stronger protections for transactional traffic
without impacting delivery of administrative/employee email.
Implementing the Technology Recommendations
Measuring Effectiveness
Metrics
Establishing baseline metrics is critical to ensuring the continued health of email authenticationbased control programs. Three distinct areas are described to help the reader assess the possible
scope, depth, and usefulness of metrics collection.
Scorecarding Technology Deployment
An important basic metric is assessment of the capabilities of the systems and services responsible
for your organization’s email. The results of an initial assessment will guide decision-making for
technology upgrades, required process changes, and partnership requirements.
When generating scorecards, consider creating one for each of the three distinct activities related to
email authentication-based controls, and including relevant questions and answers as part of the
scoring process:
 Outbound servers/services: Can they DKIM sign? Can your DNS publish SPF records and
related DKIM TXT records en masse? Can you monitor if outbound email is being rejected
due to authentication-based controls?
 Inbound servers: Check SPF? DKIM? DMARC? Act on auth. results?
 Partner capabilities: Do you know who your partners are? What are their outbound
practices? Can they perform inbound checks? Is there a (contractual) requirement in place to
do so?
Measuring Effectiveness Against Phishing Campaigns
A primary reason for deploying email authentication-based controls is to reduce the effectiveness of
phishing campaigns. To accomplish this, first determine the current impact of phishing, both on
your customers and on phishing attempts targeted at employees.
Ways to measure phishing:
 Track number of reported phishing incidents per day/week. Note exact-domain phishing if
possible.
 Attempt to correlate actual incidents of account fraud to phishing campaigns.
 Track amount of incoming email that purports to be from your organization.
Once initial metrics are in place concerning the amount of both customer and organization-facing
phishing, the effectiveness of email authentication based controls can be measured.
Ongoing Management and Monitoring
Below is a list of metrics organizations are encourage to collect and analyze on a regular basis:
 Phishing campaign (in)effectiveness
 Email volumes, per domain
 Control coverage, per domain
 Sources of blocked email, per domain
 Incident response time – time from submission of item into internal investigation queue until
resolution
 Time to create new domains/sub-domains when requested bylines of business
 Acquisition management – process to integrate newly acquired domains
 Partner monitoring
 Inbound monitoring
 Authorized server onboarding – when adding/creating new servers, make sure checklist is in
place to keep SPF, DKIM, DMARC up to date
 Third-party onboarding – when new partners come online, make sure checklists are in place so
that partner is aware of controls
BITS Trusted Email Registry
Once an organization determines it wants to deploy the DMARC standard in order to better secure
its email channel, it will need to consider how proceed with implementation. Organizations have two
implementation options. The first option is to build out their own DMARC platform. Since
DMARC is an open standard, there are resources, including open source tools and development
communities, available through DMARC.org that provide information on how to proceed.
A second implementation option is to subscribe to one of the pre-built DMARC platforms offered
by Agari and Return Path. Through their partnerships with the Financial Service Information
Sharing and Analysis Center (FS-ISAC) and BITS, Agari and Return Path offer member
organizations additional DMARC services and deployment expertise in addition to their
commercial-grade DMARC platforms. Both vendors offer cloud-based services that can be quickly
deployed and integrated with your existing infrastructure. To learn about the Agari and Return Path
offerings and their Trusted Email Registry Programs, visit http://www.bits.org/initiatives/trustedemail-registry.php.
The following table was prepared by member organizations with assistance from Agari and Return
Path to identify the differences between building out your own platform and subscribing to a prebuilt service.
Table 1: Comparison DMARC Deployment Options
Capability
Reporting Data Sources
 DMARC Data
- Aggregate
- Forensic 2
 Private Channel Data
- Aggregate
- Forensic
Data Processing, Visualization and Reporting
 Commercial-grade data processing,
visualization & reporting platform
 Discovery & management of third party
senders
Alerting (threats, infrastructure, etc.)
 Commercial-grade alerting platform
 Real-time malicious URL identification &
alerts
Policy Enforcement
 Policy enforcement - DMARC
 Policy enforcement - Non-DMARC ISPs
Integration with in-house and third-party
vendors for threat mitigation (i.e. URL
takedown)
In-House DMARC
Deployment
Trusted Email Registry
(via Agari and Return
Path)
Included
Included
Included
Included
Build
Build
Included
Included
Build
Included
Build
Included
Build
Build
Included
Included
Included
Build
Included
Included
Build
Included
Responding to External Threats: Investigations and Takedowns
In addition to the defensive capabilities made available through the use of email authentication
mechanisms, email senders might consider other methods to reduce exposure to further risks from
those who use email for malicious purposes. One such category has often been referred to as
“takedown operations” or the taking active measures to stem the flow of these email threats at or
2
Availability of forensic data published using DMARC is limited. Publication of forensic data by ISPs is optional.
near the source. These actions may include cooperation with Internet Service Providers (ISPs),
Registrars, security service companies, and others to stop the flow of illegitimate messages.
Derived from DMARC aggregate and forensic reporting, institutions are provided with more
detailed and structured information regarding problematic messages to help determine the source of
abuses. Forensic reports may also contain additional data which can identify the source of the email
attacks. They may also contain links that can be used to identify fraudulent websites intended to
trick customers into providing personal information, including IDs and passwords.
Armed with this information, financial institutions may choose to work with ISPs and hosting
providers to block SMTP traffic from identified systems, or take such systems off-line. In addition,
investigations conducted on such systems may lead to other upstream sources of the attack such as
command and control hosts, which are used to direct the activities of compromised or “botted”
systems during the conduct of an attack campaign. In parallel, action can be taken to disable access
to identified fraudulent sites whether through hosting providers, registrars or even anti-phishing
tools operating at a browser level.
Figure 10 Merged Feedback Version Threat Intelligence Phase.
Often it is difficult to build and maintain affiliation with the many ISPs and related companies,
particularly across geographic and jurisdictional boundaries. Companies have formed to address
these challenges and mediate such actions on behalf of their customers, building upon established
relationships to ease the execution of reactive security measures, both for victims and service
providers alike. Through the leverage of scale, these security service companies can establish
operating “playbooks” to gain both efficiency and speed of execution in taking appropriate actions.
DKIM and SPF Implementation Guide
This section provides guidelines and recommendations for improving email deliverability rates and
protecting brands from domain forgery and phishing scams.
What Is Email Authentication And Why Is It Important?
Email authentication allows the receiver of an email and the Internet Service Provider (ISP) to
confirm the identity of the sender, addressing one of the fundamental security problems inherent
with email – spoofing. By exploiting the ability to send unauthenticated email, phishers and spoofers
have been able to thrive as ISPs are not able to authenticate the sender of an email and cannot reject
the message or put it through additional filters to determine if it should be delivered.
Not only is authentication integral to preventing phishing and other fraud, email authentication plays
a key role in the emerging reputation and accreditation systems that will drive the future of email. As
a legitimate business, authentication should not be optional as it is an essential tool for securing
brand and online reputation.
How Does Email Authentication Work?
ISPs are utilizing two primary methods of authentication: IP and cryptographic. The IP solution ties
a responsible sending domain back to a set of permitted IP addresses, which requires publishing text
(TXT) records in the Domain Name System (DNS) record for each of your domains. An example of
an IP-based solution is SPF. Cryptographic authentication signs each message in a way that is
difficult to forge, proving that the message came from the indicated sending domain. The industry
standard for the cryptographic authentication is DKIM (DomainKeys Identified Mail).
Today, companies are moving towards adoption of SPF, DKIM, or both. Major email providers like
AOL, Microsoft, Yahoo! and Gmail are using both SPF and DKIM to authenticate email senders. In
addition, businesses must broadly adopt authentication across all their domains, not just those
associated with a large volume of commercial email. This includes domains used for corporate email,
customer support and other services. While most online fraud is associated with high-profile
marketing domains, without authentication it is possible for any of your domains to be spoofed –
and for critical business functions to be compromised.
General Considerations for Email Authentication Deployment
Organizational Email Disciplines
Some companies maintain disparate technology groups responsible for network infrastructure or
email that may be based on lines of business, acquired subsidiaries, or other business factors. These
groups may even have independent control over the email services provided to their respective
companies, yet have overlapping responsibilities with the use of company brands and domains.
Other companies will consolidate email operations across the enterprise, centralizing responsibility
in one department to the greatest extent possible. However, even with one global email services
group, large enterprises typically still have informal (i.e., “rogue”) departmental email deployments
The disadvantages of having separate email groups is that they each have to carefully coordinate
together all the steps of email authentication deployment. This coordination is critically important
when these groups have common use over company brand domains as the deployment of sender
authentication by one group affects all the others.
Additionally, there will be situations where email delivery may be partially or completely outsourced
to a third-party information technology group. In these situations, it is important to include in the
discussions all necessary personnel from these groups, as well as business management responsible
for ongoing contract maintenance between the company and its IT vendor.
Departmental Organization and Participation
Since email is a communications channel leveraged throughout all lines of business, and in some
businesses is considered a “mission critical” or “tier 1” service, enterprises are particularly sensitive
to issues concerning email. When planning a sender authentication deployment, the company must
consider the teams across the organization that will need to be involved. It is always best to include
representatives from areas that have the potential to positively sponsor, or negatively impact, a
project of this magnitude.
These areas include:
Networking / Infrastructure / Operations
These teams are primarily responsible for email infrastructure and support – the systems that will be
DKIM signing email, as well as the hosting networks and Internet-facing systems for corporate
email. These groups may also manage the corporate and Internet DNS systems responsible for
hosting SPF TXT records and DKIM public keys.
Information Security
These teams are responsible for ensuring systems are properly protected. They also are often
responsible for drafting security policy across technology applications, including email.
Operational Risk
Within financial services, operational risk works closely with regulatory compliance and audit teams
to ensure that overall activities do not incur too much risk for any particular protect, or line of
business, which may cause businesses to be interrupted or the company reputation to be tarnished.
E-commerce / Online Properties
These areas typically manage the company’s web presence, notably online banking, credit card, and
mortgage application processes. E-commerce is generally responsible for most of the high-risk (from
a phishing perspective) transactional email that is delivered to customers. Examples include online
banking alerts, confirmations, and encrypted statement delivery.
Marketing
Marketing is usually the most prolific senders of email within an organization, because their job is to
market and sell company products and services using email and other channels. Marketing is also
potentially problematic because marketing groups tend to be distributed among lines of business and
typically will outsource campaigns to third-party vendors.
Supply Chain / Procurement / Vendor Management
This area is responsible for approving new vendor relationships, maintaining existing vendor
relationships, writing and enforcing supply contracts, and in some cases, for managing outsourced
contracting agencies. These groups will establish policies that require new and existing vendors, by
contract, to provide an email service to support your corporate email sender authentication
practices.
Corporate Communications / Public Relations
Communications/PR will approve all broad-reaching internal project communications to lines of
business, and also assist in determining the best way to reach deep into the enterprise to target
individuals and teams that need to know appropriate details and required actions of the project.
They will also provide support to deal with external requests for information from third-party
vendors and press.
Privacy and Legal
It will be important for Legal to understand the ramifications of the sender authentication program
– especially edge cases where lines of business may have email tagged as spam or dropped by an ISP
if they do not follow appropriate email authentication policies.
Political Issues and Policy Determination
Email is a tool that is deployed across the entire organization. It is generated by people as well as by
applications. It will be sent to other applications for processing and people external to the company
– the company’s customers, business partners and alumni. It is in the best interests of companies to
establish policies that govern email generation, appearance, and other conventions that will allow
their email to be recognized by its receivers. In many situations, in addition to the company website,
email is the “face” of the organization that is most familiar to its customers.
Email “from” Policy
It is important to establish conventions for how the header sender address, also known as the
“friendly from” or “from name,” is going to appear in recipients’ email clients. The header sender
address is the one most commonly displayed to the email recipient in their client interface. Although
the email may be sent from [email protected], the “from name” may be configured to
display Clark Gable or Example Bank, or Example Bank Inc. Companies that send email using the
envelope header examplebank.com but have no convention on the header will confuse customers,
especially those lines of business that use their line of business internal common name that is
relatively unknown outside their immediate business network or customer base. These conventions
and policies may be applied consistently across a brand, or a line of business, or across the entire
enterprise, as appropriate for each organization.
Email Content
In addition to what the customer typically first sees in their inbox (the “header sender address”),
once they open the message their first impression is made by the overall look and feel of the email.
Some companies have standard disclaimers, trade membership logos, and company logos. Some
companies use a generic salutation while others use a salutation that includes the recipient’s name.
Although there are innumerable options, the company should establish policy on how the email is
going to be presented, in a consistent way, across all business units that leverage a like brand. This
will establish a comfortable “look and feel” of the company’s communication, much like a business
that uses consistent letterhead, envelopes and format in written communications.
As with the email “from” policy, email content policy can be applied to maintain consistency across
an enterprise, or across a line of business (each business keeping its own look and feel “identity”), as
appropriate.
Some will argue that establishing a static, consistent look and feel with the header sender address
and the message body will allow phishers to more easily create recognizable and trusted fraud email.
The fact is, many times the phishers create email messages that look more professional and
believable than many of the organization’s own authorized communications. Creating email
consistency across a brand will enable a company (and a customer) to more easily spot a fraudulent
message sent by an amateur fraudster that contains typos and non-standard form.
Domain provisioning policy
Many companies have lax controls or no restrictions that prevent business units from registering
new Internet domains. Many times, a business will roll out a new brand or product and register a
domain to support the new products or services. They will often not think about the security
implications of how that new domain could be used as a conduit for fraudulent email to customers
of that service.
It is important for companies to write and enforce policies that require the proper vetting of new
domains (and sub-domains) for business use – especially those that will be used to send email. These
policies should establish the proper control points and approval steps required to maintain the
domain, as well as the information required to register the domain in the sender authentication
system.
Architectural and Technical Considerations
Companies should evaluate several architectural and technical issues, including the two below.
Message Transfer Agent (MTA) support
MTA support for sender authentication protocols is slowly increasing as vendors recognize the
importance of email security and developers write plug-ins for standards-based SMTP systems.
Nevertheless, slow demand growth, performance considerations, and gaps in authentication
capabilities have slowed some vendors in incorporating authentication into their roadmaps. In those
situations, it is best to leverage contract renewals with supply chain’s assistance to encourage the
MTA vendor to support SPF and DKIM.
Although for the financial institution, sender (outbound) DKIM and SPF authentication is the
highest priority, many companies will want to eventually, if not immediately, seek to leverage
inbound authentication to filter fraudulent email being sent to their associates. Because of this, it is
best to have an MTA that supports both DKIM signing and validation, as well as SPF validation
(there is no requirement for an MTA to support SPF outbound since it relies completely on DNS in
that direction).
What network layer to deploy
In nearly all situations, DKIM signatures will be applied to a message at the perimeter MTA. The
perimeter MTA is the email gateway server that is the last hop between the company and the
Internet. This approach allows the message to travel through the company without the need for
internal systems to preserve the DKIM signature, as modification of the message header will
necessitate the signature to be re-applied to reflect the change in message status.
For systems that validate inbound DKIM, the best place for this activity is either at the edge MTA
or an intermediate MTA that will perform other hygiene activities such as anti-virus and anti-spam.
In most cases, authentication check results will be an input into the antispam heuristics engine.
Third-Party Senders
Companies should construct an “email sender inventory” to capture all entities –applications,
systems, vendors – that send email on the company’s behalf.
The sender inventory may consist of the following fields:
Compliance level
Used to track overall compliance of the sending entity with corporate policies and technical protocol
support (DKIM, SPF, etc).
Priority
Used to indicate the relative importance of a sender entity. For example, the main corporate MTA
will take priority over a smaller application that may maintain its own MTA but rarely sends
customer e-mail.
Email domain
The domains the entity uses to send email. These may be major corporate brand domains, or subdomains.
Line of business and technical contact information
The internal “owner” of the system who has responsibility for complying with policy.
Third-party business and technical contact information
The external “owner” of the system who is responsible for complying with policy, if this is a system
that is managed by a vendor or subsidiary.
SPF status and details
Information on how far along the entity is with SPF compliance. Also contains the DNS TXT
record defined for the SPF record, which in turn delineates authorized systems and the SPF fail
indicator.
DKIM status
Information on how far along the entity is with DKIM compliance. Also contains the DKIM
selector designation and DKIM reflector test results. It may contain a copy of the DKIM public key
for reference.
Remote Employees
Remote employees may send email in a number of ways. These methods are described and discussed
as follows.
Sending email directly from the employee PC to the Internet
This method is sometimes, but rarely, used by companies that allow employees to send email using
their corporate brand domains using a telecommuting connection via an ISP, hotel, or kiosk.
Although it is technically possible to establish DKIM signing for this arrangement, pursuant to
having a compliant Message User Agent (MUA), the administrative overhead is much too difficult to
maintain given the sheer number of employees in a typical large company, as well as the
impossibility of maintaining an authorized list of sending IP host addresses for employees who
could be literally anywhere in the world on any network. The only SPF solution is to enable the
entire Internet as authoritative for the sending domain, which would negate any benefits of
authentication and most likely cause the domain to be blacklisted by reputation systems. In most
instances, this method is not practically feasible.
Using a third-party messaging application, such as a contact management system or web
email that spoofs the corporate email domain
This method can be handled the same way as third-party senders described above. This option has
the least control over SMTP traffic. The difficulty in administering this is directly proportional to the
number of allowed third-party messaging systems used by employees. In many cases, smaller thirdparty systems allow open spoofing, do not allow for static IP address assignments, and will not allow
a successful sender authentication deployment. It should be noted that some third-party senders may
not be technically capable of supporting authentication.
Using a local SMTP server that is connected directly to the Internet
For this case, each SMTP server will need to be treated as its own separate, authorized sending
entity. IP addresses for each SMTP server will need to be registered in the sender inventory and
added to SPF records. In cases where these machines are network access translated (NAT’ed)
behind a firewall and assigned private IP addresses, the public-facing address or address range will
need to be static and monitored for changes.
Each remote office SMTP server will need to run an MTA that is capable of signing messages with
DKIM; a public/private key policy will need to be applied to the server; private keys should be
distributed by IT to the remote server administration personnel; and public keys that are used to sign
mail on the server should be added to the inventory of DKIM selectors used for that domain or
sub-domain for which the remote office is responsible. There may be security disadvantages to this
option, as private keys will be stored in multiple locations that may not be safeguarded as well.
Using a local network SMTP server that routes email to corporate SMTP gateways which
connect directly to the Internet
This is the most common way companies deal with remote employees or satellite offices. The local
SMTP server simply does its job as a basic mail router and does not have to perform any kind of
signing or validation. The mail is routed to the corporate gateways, which are centrally managed and
have the appropriate software for signing and validation (and other important hygiene steps such as
anti-virus). This model is least efficient from a “hop count” model, but most efficient in every other
way, including administration, security, and cost. This method is also used for remote employees
that connect to the enterprise via VPN. They are essentially “internal” to the network and will send
email via their enterprise mail platform.
Domain Segmentation
Companies frequently use separate domains and sub-domains for corporate, transactional, and
marketing email. In addition, they may assign these domains to third-party senders for their use.
Email from a company can be broadly assigned to one of three categories:
• Marketing: Email that has a primary purpose of selling, cross-selling or informing customers
or potential customers of products and services.
• Transactional: Email that contains information about a transaction the customer is affected by
or has performed. Examples include alerts for direct deposit, payment confirmation, or
scheduled bill reminders. Transactional email has information that directly relates to the
customer in a unique and personal way.
• Corporate: Email sent and received in the normal course of business activity among employees,
business partners, vendors and personal email.
During a company’s inventory activity to determine which lines of business have their own email
systems or third-party email vendors, it will become apparent that there are several, if not dozens or
more, domains in use for sending email. There will be significant challenges for companies that
allow third parties to use their main corporate domain (e.g., examplebank.com) for sending email.
There will be issues related to SPF TXT record size, as well as defining selectors and building public
keys for companies that have email coming from one domain but several systems, some of which
may not be directly controlled.
It will be much easier to perform a controlled rollout if third parties and LOB-specific systems can
be delegated their own domain or sub-domain for email use. For example, the main domain for
Example Bank may be examplebank.com, but the following domains can be distributed for use by
the following lines of business:
• card.examplebank.com: credit card main domain
• studentcard.examplebank.com: credit card marketing campaign for students
• onlinealert.examplebank.com: transaction email for online alerts
Many companies will want to use their primary domain for as much email traffic as possible since
that domain is well known to customers. However, as email filtering systems include characteristics
such as reputation score for domains, in the absence of specialized services, having the primary
domain used for marketing as well as transactional mail may cause transactional mail to have a high
spam score since a high proportion of marketing email gets flagged as spam by customers, which in
turn causes ISPs to have a heavy-handed approach to future email from that domain.
In the context of sender authentication, it will be easier to maintain authorized host IP addresses for
SPF and selectors and keys for DKIM if segmentation is maintained for third parties and lines of
business. As authentication matures and systems are built to provide granular metrics and improved
quality of service for transactional and corporate email, business value will increase as a more
complete view of email delivery becomes available. The domain segmentation approach makes it
easier for ISPs to provide better reporting and for businesses to sort through the data to measure
specific and relevant success.
Protecting Brand Domains That Do Not Send Email
To specially protect brand domains that do not send mail, companies can proactively assign SPF
records to those domains with “no send” parameters. A common tactic of online fraudsters is to
send emails from esoteric domains that may be owned by the target company. These domains pass
lookup checks because they do exist, but they may never be used to send email from the company.
The customer doesn’t know this, and neither will the ISPs, so any email sent from the company may
pass an initial visual or machine inspection. With the advances of reputation systems, this problem is
mitigated somewhat, but the method will still be used by criminals. Companies can address this by
publishing SPF records for all their domains, even if they do not send email. The following syntax is
an example of this:
“v=spf1 –all”
This SPF syntax simply states that the domain for which the SPF record is contained, no email is
sent and the policy for any email purporting to be from the domain is hard fail.
This will cause any email (fraudulent as well as valid) from the domain to be classified as
unauthorized spoofed or phished email by an SPF validation.
The administrative cost of this activity is relatively low since it involves one extra task for the DNS
administrators to add the TXT record for new domains that have no email intention. Of course, if
the domain were to be used for email in the future, the SPF record would need to be updated to
reflect the valid hosts.
To the extent that services are available to publish information about domains for an institution,
these domains should be included.
DomainKeys Identified Mail (DKIM) Implementation
High-level Technical and Functional Overview
This document does not attempt to serve as an in-depth tutorial on DKIM and the intricacies of the
protocol.
DKIM allows an organization to claim responsibility for, and assert the identity of, a particular email
message that it, or a trusted third party, has sent. The responsible organization adds a digital
signature to the email message, tying it to a domain name the organization owns. Messages are
signed using public key cryptography (RSA algorithm). The signing action must be performed by any
system maintained by the responsible organization, including the Mail User Agent (MUA), Mail
Submission Agent (MSA), or, most often, the edge MTA-gateway SMTP router. After a message has
been signed, any device that message comes in contact with may validate the signature. Usually, this
validation will be done by the edge MTA or other MTA of the recipient. Typically, any heuristic or
policy determination on the disposition of an email will be made by one of these MTAs, and not by
the recipient’s MUA or by the recipient himself.
•
•
•
•
•
•
The high-level requirements of DKIM configuration and setup are:
The message body is made canonical, and then hashed (typically SHA-2569).
Canonicalization helps prevent signature breakage from minor changes incurred by the
message during transmission.
Message headers are included in the signature. The header fields that are included are
determined by the signing organization as part of DKIM configuration.
A new field is appended to the message header named DKIM-Signature that contains
important information required by the verifier, including the body hash, the selector name,
the list of headers in the signature, and the canonicalization algorithm.
The header fields and the DKIM signature field itself are canonicalized and a hash of them is
created.
An RSA signature is generated for the hash, and the signature is inserted back into the
DKIM-Signature field.
The full DKIM-Signature field is added to the header of the message, and the modified
message is ready for transmission.
Below is an example of a DKIM header included in an SMTP message transmission from an
example bank’s domain, examplebank.com, using the selector 09-tx-lob. Note the selector (s=),
domain (d=), and the hashed (h=):
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
d=examplebank.com;
s= 09-tx-lob; t=1233611805;
bh=IohO4h5JgZbIJn2plMBlowgxB/SCuKtsFlU/iK3Ke
TI=; h=Date:From:Subject:To:Message-id:MIME-version:Content-type:
Content-language:Importance:Accept-Language:Thread-topic:
Thread-index:X-MS-Has-Attach:X-MS-TNEF-Correlator:
X-Proofpoint-Virus-Version;
b=bNzxG87h1dKpa/TX8B5tPY3K3Cw3qX8zDJnc
EIcBB/wNprTHYoQGFdxZ0uP+XN1Fk9QmXrAPx2oTewuH0WNpnvBeozVUo9qpw8VUT
3O
e6KZMC231Uo7ZaYbcvDb6aPflndyZX8oav5JnXr33GXX1pa2dLZCDdJxUUP5ZWBrA
Ieo=
Compare the above signature to the one below, which is also from examplebank.com, but from their
online banking alert system. Note the selector (=09-txt-alerts) and the subdomain
(=marketing.examplebank.com):
DKIM-Signature: v=1; a= rsa-sha256; c=relaxed/relaxed; s=09-txalerts;
d=marketing.examplebank.com;
h=From:To:Subject:Date:List-Unsubscribe:MIME-Version:ReplyTo:Content-Type:Content-Transfer-Encoding:Message-Id;
[email protected];
bh=ov0qr9N5GvayX1kfPyuljOL2ySE=;
b=LxCF+L+F6ltgxfker9eFHqZ1D4dgVpAIjkTz4veTpH8wnTk//jOVkevejjkOGKs
OYVqzubSF4TQO
wlhwjqONKbmkMKJjj9phfBTTwjZQb7uSd8rUbmkqPFhhrfqR4cS3zpy46S+/L5mIT
9mYEY7EDf1/
HYv0Mfvlwovgx23qi8M=
Signing Versus Verifying
The act of signing a message asserts the “ownership” or identity of the message as being sent from
the authorized sender. Because the sender has created the DKIM header information based on the
public/private key-encoded hash, and the public key is kept in DNS, only the owner of the domain
for which the message is identified can correctly sign messages for that domain.
The owner of the domain name used for a DKIM signature puts their reputation on the line for the
veracity of that message. Verifying a message can be done by any system that may have access to
that message because it has been routed to (or through) it. Verification means that the message’s
DKIM header has been identified, and the recipient system has fetched the purporting domain’s
appropriate DKIM public key from DNS based on the selector information contained in the header.
Receivers who validate a signature may then use the information on the sender’s domain as part of
anti-spam heuristics, which may include reputation data collected about that sender from other
parties.
Technical Implementation and Best Practices
This document does not serve as a technical deep-dive manual on deploying DKIM. For technical
details, refer to the Resources Appendix A. Where appropriate, certain steps of the deployment process
may include some technical information in order to provide the reader with enough background
information to understand the steps involved, as well as what kind of technical resources they
should have at their disposal for a successful deployment.
Creating Selectors
Selectors, which are mechanisms to subdivide the key namespace, allow a single domain to utilize
multiple keys to support periodic key changes and overlap of keys while old ones are phased out,
which are recommended security practices. Support of multiple keys for the same domain is also
useful for organizations that must support third-party use of the domain. Since the corporation will
not want any third parties to obtain their private keys, a special signing key may be created for the
third party, or the third party may create their own if they have access to OpenSSL or other
company-approved key generating mechanisms. Having a third party use a dedicated and unique key
pair assigned by the domain owner, selectors allow the domain owner more flexibility in dealing with
a security breach in the event the third-party systems are compromised and their private key
exposed. As an alternative, companies can also allow third parties to create their own keys, as the
company will still have control over the DNS publishing of the public key.
There should be consistent naming around selectors across the organization and its authorized third
parties. Naming conventions should be communicated as part of the project plan in order to prevent
any entities from creating selectors outside the standard, which would then need to be recreated or
grandfathered.
Selector names should contain information on the creation date (which allows for key rotation), as
well as administrative responsibility.
For example, the scheme: date.purpose.admin
• Date: used to delineate the creation date for selector rotation scheduling
• Purpose: the primary purpose of the domain: marketing, transactional, or corporate
• Admin: the administrative entity responsible for the domain or sub-domain, which may be a
designation of the company itself or a third-party agency.
The selector name can only contain dots, letters, numbers or the hyphen character, although
hyphens cannot be the first or last character.
Creating a Public/Private Key Pair
Keys pairs may be created using OpenSSL or purchased through a certificate authority. OpenSSL
documentation is available at www.openssl.org or contact a certificate issuer for more information.
Signing Policy Designation
Companies will want to consider the following steps for signing policy designation.
• Determine the selector naming conventions and inventory the selectors associated with each
sending entity (see Creating Selectors above).
• Canonicalization settings should be set to relaxed, at least during testing and through the
beginning of production. This will allow toleration of minor modifications such as header
line wrapping changes, capitalization, and whitespace replacement. Changing
canonicalization to simple is more secure, but tolerates almost no modification and may
result in invalidated signatures. Each organization will need to determine which setting
works best in their environment.
• Signing and verification algorithms will be rsa-sha1, which is the default if no algorithm is
specified and MUST be supported by all implementations.
• Key sizes should be no less than 1024-bit and the largest practical key size is 2048-bit. (2048
is the largest key that fits within a 512-byte DNS UDP response packet).
• Length tag (L=) is not recommended used for security purposes10
• Required tags include:
- a= : algorithm used to generate the signature (plain-text: rsa-sha1)
- b= : signature data (base64)
- c= : Header/body canonicalization (plain text: relaxed/simple; simple/simple)
- d= : domain of signing entity (plain text: company.com)
- h= : signed header fields (plain text: a colon-separated list of headers presented to
the signing algorithm)
o FROM, SUBJECT, DATE – must be included
o All MIME header fields should also be included
o Any other header field that describes the role of the signer (e.g., SENDER or
o RESENT-FROM must be included)
o Any header fields that are transient (perhaps added by an application to be
later removed by a downstream application) or likely to be modified or
removed in transit should NOT be included
o The DKIM-Signature header field is always implicitly signed and must not be
included in the h= tag; for further information on header tag, refer to the
header tag section of the DKIM specification11.
- s= : selector (plain text: date.purpose.admin: the selector subdividing the namespace
for the d= domain tag
• Optional tags should be researched prior to use, especially x= (signature expiration) and t=
(signature timestamp)
Install and Configure Supported Software
Upgrade or install software for the MTA(s) that will be signing the messages. Depending on the size
of the organization, and whether this is a test or production deployment, this process can take a few
minutes, or several weeks. For production deployment, this step should have a formal project
framework and consultation of the MTA vendor. See Appendix A for links to configuration
information for some common MTAs.
Test and Record Results
10 RFC 4871, Section 3.4.5 Body Length Limits http://www.ietf.org/rfc/rfc4871.txt
11 RFC 4871, Section 5.4 http://www.ietf.org/rfc/rfc4871.txt
Typically, most installations will cause all messages passing through the signing MTA to be DKIM
signed.
The following test cases can be used as a starting point to develop your own testing routine:
• Send a message to an external account that passes through the signing MTA and visually
inspect the message for the presence of a DKIM header and corresponding message hash.
• Send a message the same way to an external DKIM mirror site that will perform a DKIM
validation and display, or email back, results.
• Testing should be done to validate DKIM results for every domain, and all selectors for
domains, on all MTAs that are signing mail.
• Create a script or other automated system that periodically checks email sent from various
systems and campaigns, including third-party email that should be signed, from various
systems, to monitor for broken or missing signatures, etc.
Infrastructure Impact
Since DKIM is a cryptographically-based digital signature solution, there will be some CPU
processing overhead associated with the activity of canonicalization, hashing, and signing. Email
systems by nature tend to be more I/O intensive than CPU intensive, so most SMTP servers will
have the necessary free overhead to handle DKIM signing.
If the SMTP system is already delegated to some CPU-intensive activity such as anti-virus, antispam, or encryption, then it is recommended that performance testing be done on similarly
configured lab hardware. Also, if the performance of the MTA hardware is already at the limits of its
capability, then implementing DKIM may be enough to push it over the edge and experience
performance problems such as queuing.
It is impractical to outline a rule of thumb for performance, since overhead impact will depend
heavily on the hardware available as well as the MTA software (and even the MTA version) and how
it is configured. However, anecdotal evidence to date suggests that DKIM signing adds 1% or less
additional strain on system CPU performance, and some even suggest that it is a “drop in the
bucket” compared to processes like anti-spam which may be running on the same machine.
Performance will vary from product to product. It is important to test DKIM signing in a lab
environment to determine performance impact and whether additional system capacity will be
needed.
Selector and Key Rotation
The purpose of selector and key rotation is to augment security and mitigate breaches in the event
keys are compromised. In some organizations, key may “leak” as administrators move from job to
job, may not be secured properly, or may be maliciously shipped to individuals with criminal intent.
There will be two ways to rotate keys: either via prearranged schedule, or ad-hoc. Ad-hoc should be
done if there is any suspicion that a key has been compromised. Not only should the affected key be
replaced, but any key that is under similar storage conditions. The same process for key and selector
replacement should be followed for scheduled maintenance, as well as if it is being done to address a
sudden security concern (unscheduled maintenance). Key replacement allows a company to move, in
a controlled manner, from one selector naming routine to another, change the strength of key
encryption, or enforce security policy around key retention.
As described above, a selector is created for a domain (or multiple per domain) which specifies the
public key to retrieve from DNS. When keys are rotated, there will be a period of time when
messages signed by the new selector/key will exist on the Internet alongside the old selector/key. It
is important to keep the transition period where both selectors/keys are supported until the
organization determines the population of old selectors/keys have aged enough to be removed from
DNS with minimal disruption. Some security groups indicate this can be as long as several months,
but the timeline can be accelerated under exigent circumstances.
Since DKIM can be validated at the MUA, allowing keys to deprecate can result in valid messages
being considered invalid if a key is expired and the MUA tries to validate an old message. To date,
we see very little validation being performed by the MUA, but rather the MTA while messages are in
active transit. This being the most common case, it makes sense that a company determine for itself
when old keys and selectors can be retired by simply monitoring what they see in transit using
automated tests and monitoring described above. In other words, as part of routine testing, a
company should be able to determine the state of DKIM signatures on its own messages, as well as
determine that old selectors/keys are no longer being detected by test systems. At that point, it is
safe to retire the old keys.
Sender Policy Framework (SPF) Implementation
High-level Technical and Functional Overview
Sender Policy Framework (SPF) is a path-based authentication protocol that also communicates
policy, and is intended to prevent unauthorized spoofing of the envelope sender address in an email.
SPF provides the framework for domain owners to specify which mail servers (hosts) are allowed to
send email from those domains. The domain owner publishes information into an SPF record in the
domain’s DNS. Then, when the recipient’s mail system receives the message, it checks whether the
message actually was delivered to it by an authorized host, thereby checking the “path” the message
traveled. A message that originated from an unauthorized host, that is, one that is not specific in the
SPF DNS record, would be considered spoofed.
Contained within the SPF record is also policy information to instruct the receiving MTA on how to
dispose of the message. Today, most systems use SPF policy information to inform heuristics
(combined with reputation and other data) for filtering messages. In fact, systems can use SPF
information to improve existing reputation data by aggregating over time the sending pattern of
specific hosts and domains. The policy information integrated into SPF protocol is simple, yet
allows receiving systems a way to gradually “turn up the heat” on fraudulent messages.
Today, however, policy is not directly enforced by receivers due to concerns about deployment
inconsistencies leading to unacceptable rates of false positives. There have been examples where a
company deployed SPF, but they did not adequately collect metrics for what the Internet was seeing
regarding the company’s email status and SPF pass/fail results. For example, a company may
publish SPF hard-fail too soon, not realizing that a large and important line of business, which
maintained a separate email infrastructure, was not accounted for. That line of business will
experience loss of email service when some ISPs obey the hard-fail policy and reject all nonvalidated SPF. This situation may result in a reputation loss for the company, and an embarrassing
retreat from their sender authentication effort.
Due to the implications of the ascribed example above, ISPs have been reluctant to apply SPF
policy, mainly because a company may indicate a fail policy without adequate testing, resulting in
valid messages being dropped if the ISP enforces the fail indicator. Therefore it is very important to
coordinate uniform deployment and to test thoroughly before moving from neutral (?all) or soft-fail
(~all) to hard-fail (-all).
For this reason, most ISPs will not obey SPF policy. They are correct in assuming that if a company
does not publish SPF correctly and email is rejected (as is the correct policy with hard fail), then
their customers will hold the ISP responsible for missing email. However, it is the goal of most
financial institutions to encourage ISPs to enforce fail policies in order to provide a mechanism to
block unauthorized messages from arriving at customer inboxes. Coordinated efforts to improve the
validation of successful deployments should lead to SPF policy enforcement that supports automatic
dropping for messages that fail authentication.
Publishing Considerations
Keep host IP address inventory and SPF records updated
Special attention must be paid to the inventory process for sending hosts, as well as the ongoing
process to track sending host IP address changes. A common mistake is having a sending host IP
address change that is not updated in the SPF record, effectively putting that host “outside” the list
of approved systems. This situation will cause email received from that host to fail an SPF check. It
is important to ensure that when third-party senders make a change to their host addresses, bring up
a new host, or shift sending responsibility from one host to another, they communicate the changes
well in advance so the SPF records can be modified and DNS given enough time to propagate
changes.
Publish on the correct DNS server
Since SPF lookups are conducted over the Internet, it is important to publish SPF records on DNS
servers that are authoritative for the domains on the Internet. These are not internal DNS servers.
Use sub-domains to help segmentation
For each sub-domain that has an A or MX record in DNS, there should be corresponding SPF
records. Sites with wildcarded A or MX records should have corresponding wildcarded SPF records
in the form:
* IN TXT "v=spf1 -all"
This strategy fits nicely with DKIM practices of creating separate key pairs and selectors for subdomains used by third-party senders and special campaigns.
Establish SPF records for non-sending domains
Companies may use only a handful of domains to send email, but they may also own several
“brand” domains for online web presence or marketing that never send email. Preemptively
establishing “null” SPF records for those domains will prevent fraudsters from flying under the
radar by using them to send unauthorized spoofed email. For example, consider the following the
SPF record:
“v=spf1 –all”
This record indicates that the domain does not send any email, and any email received will be
fraudulent. Companies should also be sure to include third-party domain considerations as
appropriate.
Includes are useful, but be careful when using them
The SPF specification allows for the inclusion of another domain’s SPF TXT as a way of chaining
authoritative responsibility. While this can be a helpful administrative shortcut, it is important to
ensure the domain that is being included is set up correctly.
For example, SPF lookups that cause more than ten DNS requests violate the SPF specification.
SPF adopters should ensure their SPF records, especially with the recursion that occurs with the use
of “include” mechanism, do not require more than ten DNS requests as per the SPF RFC.
Do not publish hard fail too soon
It is important to establish SPF, test using neutral records, and then analyze traffic to determine if
there are any authorized hosts that are sending email that are not included in the SPF record.
Publishing hard fail indicates that it is acceptable for a receiving MTA to take an aggressive approach
to mail that fails an SPF check, including deleting the offending messages.
Publish SPF records for HELO names
The HELO command is used as part of the SMTP process. SPF lookups are performed on the
HELO domain name used in the HELO command by the Message Transfer Agent (MTA) sending
the email, in addition to SPF lookups on the email sender’s domain name. The HELO domain
names should be identified and SPF records published.
SPF syntax components are referred to as “mechanisms.” For a comprehensive description of the
syntax, refer to OpenSPF.org’s mechanism discussion. For each domain/sub-domain entity that will
have an SPF record, all mechanisms of the syntax must be defined and tracked as the company
implements SPF form test phase, through neutral and soft-fail policy, and finally to hard-fail (if
appropriate):
-
-
Policy: “+” (Pass) | “-“(Fail) | “~” (SoftFail) | “?” (Neutral)
all: The mechanism that indicates set of email (all is default and only choice).
ip: IP4 or IP6, depending on IP addressing numbering used for indicating host
addresses. May be single addresses or address ranges.
a: All the A records for domain are tested. If the client IP is found among them, this
mechanism matches. If domain is not specified, the current-domains used. The A
records have to match the client IP exactly, unless a prefix-length is provided, in which
case each IP address returned by the A lookup will be expanded to its corresponding
CIDR prefix, and the client IP will be sought within that subnet.
mx: Denotes the MX record for specified domain should be used, also can be used in
the form mx/24 where /24 denotes adjacent address range of potential sending hosts.
Other mechanisms that should be avoided, or will be used more rarely, include "ptr:", "exists:",
"include=", and modifiers such as redirect and exp=.
The Forwarding Issue
One of the more controversial aspects of SPF concerns forwarded mail. Some mail systems, most
notably list servers, will sometimes change header information and indicate that they are sending
mail on behalf of the original envelope sender. When this happens, this receiving MTA will perform
the SPF check and fail the authentication on the technical grounds that the “new” sending MTA is
not authoritative for the domain.
This will also be a common occurrence with those who set up forwarding or redirecting from a
“parked” email account such as a university alumni email system. For example, a graduate of MIT
will be allowed an alum.mit.edu email address. Many people will keep that email address and set their
mail settings at MIT to simply forward any mail delivered to their current “live” email address.
When a message is sent to them, it is sent first to MIT, which then re-delivers it (and takes
responsibility for sending it) and causes an SPF check to fail at the receiving MTA.
Over time, system administrators will increasingly update their MTAs to switch from forwarding,
where the envelope sender headers are preserved, to re-mailing. This switch requires changing the
envelope sender to that of the forwarding system (which will publish its own SPF records).
In the meantime, ISPs should take into consideration the major systems that serve as forwarders and
whitelist them. Additionally, senders (such as financial institutions) should carefully monitor test
email corpi for messages that fail due to forwarding issues.
Considerations for the Joint Use of SPF and DKIM
Companies that decide to implement both SPF and DKIM will find many areas of overlap in the
organizational preparations that must occur. Areas such as domain inventory, communication with
all relevant groups, and dealing with third-party senders, apply to both DKIM and SPF. However,
the technical implementation of each is unique and must be approached appropriately given that
protocol’s specific requirements.
Implementation tradeoffs
Each protocol provides its own set of benefits and drawbacks. With SPF, companies will have to
manage the message forwarding issue and risk of false positives from mailing lists and other
forwarders. With DKIM, companies will have to monitor for problems with MTAs, such as
“leaking” messages (i.e., the MTA is not signing all its messages). In either case, there is the potential
for false positives and possibly for false negatives.
Combined DKIM/SPF use benefits
Companies that use both SPF and DKIM can mitigate many of the perils inherent in using either
protocol alone. For example, messages from a leaking MTA that “breaks” the DKIM authentication
process for those messages can still be authenticated via SPF, assuming the SPF record has been
appropriately published. Likewise, a forwarded message that fails SPF authentication can still be
appropriately authenticated using DKIM. The combined use of the two protocols reduces the
number of false positives and can increase the receiving network’s confidence in authentication, to
the point of being willing to start blocking messages that fail both authentication processes.
Note that for these benefits to accrue, the receiving network must approve messages that pass either
DKIM or SPF (or both), and only fail a message if it fails both authentication processes. The
experiences of companies and ISPs who have begun to implement both protocols suggest that this
strategy is likely to result in the least number of errors. This approach also enables companies to
work more flexibly with third-party senders, who need implement only one of the two protocols to
be able to send messages (although third-party senders should ultimately support both protocols). In
addition, this strategy enables companies to have their messages authenticated at ISPs that only
support one of the two protocols, as ISP support of both protocols is not currently available in
many cases. ISPs today have not yet implemented blocking/failure based on authentication results.
Some improved policy capabilities may be required at ISPs to support the most beneficial dual
failure model for companies.
While the recommendation of this paper is for companies to implement both protocols (DKIM and
SPF), it is recognized that some companies may have limited resources for this initiative and must
decide what protocol to implement first. In that case, the company should take into account several
tradeoffs for the implementation of each in its decision. In some cases, implementing DKIM first
makes sense as it avoids a number of false positive risks associated with SPF and thus ensures the
highest rate of accuracy for authentication. However, it should be noted that DKIM is operationally
more complex to implement than SPF and thus the company’s technical expertise and available
resources should be taken into consideration. DKIM requires a much broader range of testing than
SPF, since SPF only requires DNS testing, and DKIM can have a high false positive rate if messages
are not being signed correctly. Please see a summary of these issues in the following table.
In addition, companies considering implementation should review the current relative levels of
support for DKIM and SPF by the ISPs that are most represented in their customer base.
DKIM Only
SPF Only
Combined DKIM and SPF
•
Advantages
Supported by major ISPs
• (excluding Microsoft)
• Signature stays with
message over
• multiple hops
• • Validates message
content as well as path
• Only requires DNSbased testing; no
additional software
required
• All advantages of DKIM
Only
• implementation
• Minimizes false positive
rate
Disadvantages
• Operationally complex to
implement and test
• False positive risk due to
message signing errors or
leakage
•
•
• Increased false positive
risk due to path-based
authentication breaking
on message forwarding
Requires additional
resources to implement
both protocols
Advantages
• (assuming receiver
network
• requires only one
protocol to pass)
Disadvantages
Metrics and Reporting
For effective deployment and use of authentication, it is important to gather data on authentication
results and email disposition outcomes. Today, however, there are fundamental limitations to the
data available, so it is important to leverage those capabilities that are possible.
Signing Validity
Companies may use test accounts to determine the validity of SPF and DKIM signing. End-user test
accounts can be set up across multiple ISP systems to establish a view into how those ISPs are
presenting the messages.
Evaluating outcomes
•
•
•
•
It is generally recommended that at least two test accounts are set up at each ISP.
In most cases, the validity of the DKIM check can be determined by examination of the
message header (this is difficult to automate because each ISP uses a different designation).
In some cases, it is possible to infer the overall disposition of a message based on the
heuristics scoring for the ISPs email hygiene process (approximation based on reputation).
Trends can be created and analyzed over time to approximate the efficacy of authentication
for messages delivered to the ISP that is hosting the test account.
Drawbacks
•
•
•
•
•
•
Using test accounts will not result in complete coverage of the company’s sending universe
as it will not be possible to cover every possible receiver; corporate accounts, in particular,
will not allow test accounts.
Every ISP system is different and can change without notice. Since this is a manual
procedure, it requires a great deal of administration to maintain test accounts across multiple
ISPs with email messages going in from multiple systems and third parties.
ISPs may drop messages for reasons unrelated to the authentication protocols, so it is
difficult to know what happened to messages that do not appear in the test accounts. Where
possible, it is recommended that the receiving networks whitelist the senders in order to
avoid these issues to minimize false positive risk.
It is also administratively difficult to have third-party senders routinely send email into test
accounts for analysis.
There is no way to detect non-participating third-party or internal systems.
Without special relationships with the ISP or with third-party data providers, it can be
difficult to know what happened to messages at the ISP. Overall, this procedure is
recommended today as the best available approach, but it is manually labor intensive,
difficult to automate, and frequently subject to change.
Gathering Spoofing Data
Data on the origins of spoof traffic is contained in the SMTP interactions and email messages from
senders. Today there are a several post-facto methods of gathering information:
•
•
•
Analysis of customer feedback: Some customers who receive suspicious emails forward
them to relevant support addresses at institutions or ISPs. Companies may wish to create an
abuse mailbox (for example, [email protected]) for the receipt of emails. These
emails can be processed for data on phishing sites, spoofing domains and IPs, and some
information on internal systems that are not sending email correctly. This method is
disadvantageous as a primary source of data since it allows spoof traffic to reach endrecipients prior to detection, and relies on end-recipients’ ability to identify suspicious traffic
and their reliability in reporting it accurately.
Honeypots: Honeypots can be established to draw phishing and spoofing traffic for
detection.
Third-party data phishing services: A number of third-party services collate data from
various sources to detect phishing traffic across the Internet.
All of these methods detect spoofing after it has occurred at some destinations, but it is
recommended that institutions support all of them.
Desirable Future Data
For accurate, timely, granular analysis of authentication and delivery, the following additional data
from receivers is desirable.
• Number of messages that arrived at each ISP/receiver for specified domains
• Number of messages that are unauthorized spoof for specified domains
• Origin of unauthorized spoof messages
• Breakdown of messages from authorized sources and their origins
• Percentage representation of the disposition of messages in each group for each specified
domain (what happened to the messages)
• For messages that fail authentication, granular results (why were they classified that way)
• Consistent and normalized standards and statistical presentation across ISPs/receivers
Technical Implementation of DMARC
DMARC Overview
To address the direct domain phishing and spoofing problem successfully, senders and ISPs need to
share information about what email is being authenticated and how the sender wants
unauthenticated email handled. DMARC (Domain-based Message Authentication, Reporting and
Conformance) allows senders to tell ISPs how they would prefer them to handle messages that do
not properly authenticate. It also allows ISPs to supply senders with information about the health of
their email authentication deployment. DMARC makes it possible for ISPs to use DKIM and/or
SPF to:
• Separate legitimate and fraudulent email
• Act appropriately on what they have found
• Report to senders on the effectiveness of their email authentication efforts, thereby
• Increasing the percentage of email that is authenticated and can be properly separated
The DMARC standard was developed by a group consisting of leading ISPs, financial institutions
and other high-profile senders, email service providers (ESPs), as well as Return Path and Agari with
the intent of building upon earlier work by Yahoo! Mail, Gmail and PayPal. The DMARC standard:
• Tells the ISPs, via a DNS record, what the sender wants done with any non-authenticated
email from their domains (monitor, quarantine, reject), eliminating ISP guesswork
• Provides ISPs with a standardized way to report to senders on authenticated and
unauthenticated emails purporting to be coming from the sender’s domains
How DMARC Works: An Overview
At the heart of DMARC is a new type of text resource record that the sender adds to its DNS
record. This record specifies the sender’s email authentication enforcement policies, including:
• What the ISP should do with non-authenticated mail from the domain (monitor, quarantine,
reject)
• Whether the process of matching the domain name to the sender name under SPF and/or
DKIM should be handled in a strict or relaxed way.
• An optional “percent” tag which indicates the maximum percent of mail from the domain
that the policy should be applied to (this allows senders to test and monitor the results of
applying the policy)
• The sender’s URI or URIs to which ISPs can send aggregate and forensic reporting data so
that senders can monitor and improve their email authentication deployment.
Typically, the sender will start by setting a policy of “monitor” so that they can assess the
performance of their email infrastructure. As the sender gains confidence that their entire
mailstream is authenticated, they can move their policy from “monitor” to “quarantine” (sending
email to users’ junk or bulk mail folders) and then to “reject” (blocking all unauthenticated mail).
The end goal for a sender that implements DMARC is to monitor their authentication results and
eventually authenticate their entire email stream, providing ability to implement a reject policy with
ISPs.
Anatomy of a DMARC Resource Record in the DNS3
DMARC policies are published in the DNS as text (TXT) resource records (RR) and announce what
an email receiver should do with non-aligned mail it receives.
3
Information in this section courtesy of DMARC (http://www.dmarc.org/overview.html).
Consider an example DMARC TXT RR for the domain “sender.dmarcdomain.com” that reads:
"v=DMARC1;p=reject;pct=100;rua=mailto:[email protected]"
In this example, the sender requests that the receiver outright reject all non-aligned messages and
send a report, in a specified aggregate format, about the rejections to a specified address. If the
sender was testing its configuration, it could replace “reject” with “quarantine” which would tell the
receiver they shouldn't necessarily reject the message, but consider quarantining it.
DMARC records follow the extensible “tag-value” syntax for DNS-based key records defined in
DKIM. The following chart illustrates some of the available tags:
Tag Name
v
pct
ruf
rua
p
sp
adkim
aspf
Purpose
Protocol version
Percentage of messages subjected to
filtering
Reporting URI for forensic reports
Reporting URI of aggregate reports
Policy for organizational domain
Policy for subdomains of the OD
Alignment mode for DKIM
Alignment mode for SPF
Sample
v=DMARC1
pct=20
ruf=mailto:[email protected]
rua=mailto:[email protected]
p=quarantine
sp=reject
adkim=s
aspf=r
Sender DMARC Implementation
Deploy DKIM and SPF
While not a requirement to begin using DMARC, a Domain Owner that wants to leverage DMARC
as a means to enforce blocking policies at ISPs should have already deployed and tested SPF and
DKIM. Simple deployment of a DMARC record can provide valuable insight into a company’s mail
streams and any server configuration issues.
Align Identifiers
Audit internal systems to ensure that mail received by ISPs will observe that all Authenticated
Identifiers (RFC5322.From domain and the SPF and DKIM domains) within messages are in
alignment. Senders can specify a "strict" or "relaxed" mode in terms of enforcing identifier checks.
In “strict” mode, all identifiers from authentication systems upon which DMARC is predicated must
match the RFC5322.From domain. In "relaxed" mode, the organizational domains must match.
The "relaxed" mode is the DMARC default.
Create a DMARC record and append to DNS
Publish a DMARC policy of “none” and include a feedback reporting email address to receive
aggregate feedback data from Mail Receivers. See sample record below.
_dmarc.senderdomain.com:
"v=DMARC1; p=none; rua=mailto:[email protected];
ruf=mailto:[email protected]; rf=afrf; pct=100“
Analyze the data and modify your mail streams as appropriate
Review and tune authentication deployments. Use the provided feedback data to remediate
unauthenticated email streams and correct identifier alignment issues. This is a good opportunity to
discover email that, for example, passes SPF checks but is missing DKIM signatures, since such
email will inevitably fail authentication when forwarded.
Modify your DMARC policy flags from “monitor” to “quarantine” to “reject” as you gain
experience
When confidence of authentication accuracy is gained, publish a DMARC policy of "quarantine"
with a reasonably small value for "pct". Debug false positives (due to missed unsigned mailstreams)
while gradually increasing the value of "pct" to 100. Fully secure mail streams. When "pct" reaches
100 with no observed ill effects, publish a DMARC policy of "reject" with a reasonably small value
for "pct". Repeat debugging and corrective process as necessary.
Appendix A
Resources
Authentication Guidelines for Financial Institutions
• BITS Email Security Toolkit: Protocols and Recommendations for Reducing the Risks (April, 2007):
http://www.bits.org/downloads/Publications%20Page/BITSSecureEmailFINALAPRIL1507.p
df
DomainKeys Identified Mail (DKIM) Information
• DKIM Overview: http://tools.ietf.org/html/draft-ietf-dkim-overview-10
• DKIM Signatures (RFC 4871): http://www.apps.ietf.org/rfc/rfc4871.html
• ADSP Draft Memo (Expired): http://www.dkim.org/specs/draft-ietf-dkim-ssp-04.html
Reflectors (Verifiers)
• DKIM.org: http://testing.dkim.org/reflector.html
• Sendmail: Send an email to [email protected] (supports DK, DKIM, SIDF and SPF)
• Port25: http://www.port25.com/domainkeys/
Sendmail
• Sendmail and DKIM: http://www.sendmail.org/dkim
• Eland’s Sendmail/DKIM Overview: http://www.elandsys.com/resources/sendmail/dkim.html
• Erik Berg’s Sendmail/DKIM/SIDF Overview: http://www.erikberg.com/notes/milters.html
Postfix
• Postfix MILTER support: http://www.postfix.org/MILTER_README.html
• DKIM with Postfix using dkimproxy:
http://anothersysadmin.wordpress.com/2008/01/16/domainkeysdkim-with-postfix/
Microsoft Exchange
• DKIM for IIS SMTP Service and Exchange Server:
http://www.emailarchitect.net/domainkeys/
• Exchange Server and SenderID:
http://technet.microsoft.com/enus/magazine/2006.12.sidf.aspx
Sender Policy Framework (SPF) Information
• SPF (RFC 4408): http://www.ietf.org/rfc/rfc4408.txt
• OpenSPF.org Syntax Discussion: http://www.openspf.org/SPF_Record_Syntax
• SPF Common Mistakes: http://www.openspf.org/FAQ/Common_mistakes
MTA Vendor Listings
• Online Trust Alliance (OTA) directory: https://otalliance.org/resources/2009OTADirect61HR.pdf
• DKIM.org’s vendor listing: http://www.dkim.org/deploy/
Industry Groups
•
•
•
•
•
BITS (a division of the Financial Services Roundtable): http://www.bits.org
The Financial Services Roundtable: http://www.fsround.org
Messaging Anti-Abuse Working Group (MAAWG): http://www.maawg.org
Anti-Phishing Working Group (APWG): http://www.antiphishing.org
Online Trust Alliance (OTA): https://otalliance.org/resources/authentication/index.html
Appendix B
Agari and Return Path Partnerships for Email Authentication
Agari and Return Path are proud to partner with BITS to produce the “Email Authentication Policy
and Deployment Strategy for Financial Services Firms.” The goal of this paper is to educate security
personnel at financial services firms on the best ways to authenticate their outbound email traffic to
prevent phishing attacks.
Agari is an innovator in email security and DMARC
compliance, providing protection to the world’s most trusted
brands. By collecting terabytes of email data from sources
across the Internet to create a hosted, cloud-based solution,
Agari offers the highest level of security against phishing and
other email fraud. Agari blocks over 4 million malicious
emails and identifies more than 40,000 malicious URLS every
day on behalf of the brands it has been entrusted to guard.
Agari ensures that the only emails that your customers receive
are the ones you send.
As an FS-ISAC or BITS member, Agari provides you with a
number of complimentary services, access to our staff of
email security experts and exclusive discounts on our Trusted
Registry service:
Instant Online Domain Analysis
Are your domains secure? Use Agari’s online domain analyzer
to assess domain vulnerability and standards-based
compliance
Schedule an Assessment
Are your customers exposed? Schedule a risk assessment with
an Agari expert to measure email channel vulnerability and
learn how to better protect your customers from email
threats.
Test Drive Agari Today
With Agari technology and expert guidance, you’ll have
the analytics and controls needed to properly protect
your brand and customers.
Learn more about Agari and its partnership with FS-ISAC
and BITS: http://agari.com/trustedregistry
Return Path is worldwide leader in email intelligence. We
analyze more data about email than anyone else in the world
and use that data to power products that ensure the safety
and security of the inbox. Our anti-phishing solution,
Domain Secure, proactively protects financial services
organizations and their customers against fraudulent email
activity. By blocking phishing and spoofing attacks before
they ever reach your customers’ inbox, Domain Secure places
trust back in the email channel.
Return Path is also proud to be part of the Trusted Email
Registry. As a member of BITS / FS-ISAC, you are entitled
to the following Return Path services, free of charge:
• Complimentary 90 Day Access to Domain Secure Includes technical support.
• Complimentary Email Authentication Scorecard –
Using data sources from over 70 ISP partners and 2+ billion
mailboxes worldwide, we prepare a custom scorecard with a
prioritized action list to improve your email security.
• Complimentary Inbox Placement and Email
Reputation Audit Across Your Network - In depth review
of whether email is being delivered across Return Path’s ISP
network and if there are any reputation issues (end-user
complaints, spam trap hits, high unknown user rates, low end
user engagement and other factors).
• Complimentary Fraudcasting Feeds – URLs and IP
addresses used in phishing attacks are automatically submitted
to security vendor partners providing the broadest protection
against emerging attacks.
Learn more about Return Path:
http://www.returnpath.com/solution-content/domainsecure/financial-services/
Appendix C
Acknowledgements
BITS would like to thank the following contributors to this paper.
Keith Gordon, Bank of America
Steven Jones, Bank of America
Jeff Laughton, Bank of America
Robert Reh, Nassau Financial
Alex Popowycz, Fidelity Investments
Jim Routh, JPMorgan Chase & Co.
Victor Talamo, JPMorgan Chase & Co.
David Johnson, U.S. Bancorp
Jim Pearsall, U.S. Bancorp
We would also like to thank the following individual for coordinating this effort:
Andrew Kennedy, BITS/Financial Service Roundtable
Tim Draegen, BITS Liaison to DMARC
Ann Brennan-Hecht, Agari
Mike Jones, Agari
Jesse McCabe, Return Path
Ken Takahashi, Return Path