bind_-_senderid:senderid_introduction
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
bind_-_senderid:senderid_introduction [2016/11/29 10:48] – peter | bind_-_senderid:senderid_introduction [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Bind - SenderID - SenderID Introduction ====== | ====== Bind - SenderID - SenderID Introduction ====== | ||
- | SenderID | + | Sender ID is similar to Sender Policy Framework (SPF), but with one main difference; Sender ID verifies sender identity based on the Purported Responsible Address (PRA) using the From: or Sender: header fields. |
- | SenderID | + | SenderID |
- | The Exchange server MTA has its own built-in spam filter, Smartscreen. However, | + | Sender ID was developed by Microsoft to protect against spoofing the RFC5322.From address, the one that the user sees in their email client. However, |
+ | |||
+ | Sender ID is almost identical to SPF except that v=spf1 is replaced with one of: | ||
+ | |||
+ | * **spf2.0/ | ||
+ | * **spf2.0/ | ||
+ | * **spf2.0/ | ||
+ | |||
+ | ===== Examples ===== | ||
- | But if SenderID is not used by Hotmail and may or may not be used by on-premise Exchange installations, | ||
< | < | ||
Line 15: | Line 22: | ||
OR | OR | ||
- | news.example.com | + | For news.example.com, |
< | < | ||
Line 23: | Line 30: | ||
* **spf2.0/ | * **spf2.0/ | ||
* **pra** means to apply this to the domain in the Purported Responsible Address, which is either the domain in the Sender: (rarely) or RFC5322.From (usually)." | * **pra** means to apply this to the domain in the Purported Responsible Address, which is either the domain in the Sender: (rarely) or RFC5322.From (usually)." | ||
+ | |||
+ | |||
+ | ===== How Sender ID Works ===== | ||
+ | |||
+ | Sender ID verifies the origin of the email address based on IP address and domain, and then uses the validation results to determine email delivery. When a sender deploys a message, the inbound mail server checks the DNS entries to obtain the SPF Record. | ||
+ | |||
+ | |||
+ | ===== Sender ID vs. SPF ===== | ||
+ | |||
+ | Sender ID addresses a very different problem than SPF. | ||
+ | |||
+ | * SPF validates the HELO domain and the MAIL FROM address against the policies published via DNS (SPF record). | ||
+ | * Sender ID validates one of the message' | ||
+ | |||
+ | Unlike SPF which validates against the envelope’s return-path address which is the root or subdomain, Sender ID validates based on the PRA and uses the header field with the email address to identify the visible sender of the message. Since headers are not required by the SMTP protocol, Sender ID uses the content of the message to provide an extra layer of protection against spammers and phishers that is very different from SPF which validates on the domain or connection level. | ||
+ | |||
+ | Sender ID and SPF should both be adopted along with DKIM. These methodologies complement each other and in doing so, provide the best protection against phishing. | ||
+ | |||
+ | Neither is better because they solve different problems: | ||
+ | |||
+ | * SPF can be compared to other SMTP layer protocol like CSV/CSA. | ||
+ | * Sender ID can be compared to other RFC 2822 layer protocols like DomainKeys IM(DKIM) | ||
+ | |||
+ | |||
+ | ===== Advantages of using SenderID ===== | ||
It does mean that you must create and delegate a subdomain for 3rd parties to send on behalf of you and publish their SPF records in that subdomain' | It does mean that you must create and delegate a subdomain for 3rd parties to send on behalf of you and publish their SPF records in that subdomain' | ||
However, even if it does go rogue, it can only pass a SenderID check for this delegated subdomain. | However, even if it does go rogue, it can only pass a SenderID check for this delegated subdomain. | ||
- |
bind_-_senderid/senderid_introduction.1480416529.txt.gz · Last modified: 2020/07/15 09:30 (external edit)