27.11.2012 Views

IronPort - advanced configuration guide

IronPort - advanced configuration guide

IronPort - advanced configuration guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5-2<br />

Cisco <strong>IronPort</strong> AsyncOS 7.6 for Email Advanced Configuration Guide<br />

Chapter 5 Email Authentication<br />

SPF and SIDF email authentication allow the owners of Internet domains to use a special format of DNS<br />

TXT records to specify which machines are authorized to transmit email for their domains. Compliant<br />

mail receivers then use the published SPF records to test the authorization of the sending Mail Transfer<br />

Agent’s identity during a mail transaction. For more information about SPF and SIDF, see Overview of<br />

SPF and SIDF Verification, page 5-22.<br />

DomainKeys and DKIM Authentication: Overview<br />

AsyncOS supports DomainKeys and DKIM authentication to prevent email forgery. DomainKeys and<br />

DKIM are mechanisms used to verify that the source of the email and the contents of the message were<br />

not altered during transit. DKIM is an enhanced protocol that combines DomainKeys specification with<br />

aspects of Identified Internet Mail to create an enhanced protocol called DomainKeys Identified Mail<br />

(DKIM). DomainKeys and DKIM consist of two main parts: signing and verification. The current<br />

version of AsyncOS supports the “signing” half of the process for DomainKeys, and it supports both<br />

signing and verification for DKIM. You can also enable bounce and delay messages to use DomainKeys<br />

and DKIM signing.<br />

When you use DomainKeys or DKIM authentication, the sender signs the email using public key<br />

cryptography. The verified domain can then be used to detect forgeries by comparing it with the domain<br />

in the From: (or Sender:) header of the email.<br />

Figure 5-1 Authentication Work Flow<br />

Step 1 Administrator (domain owner) publishes a public key into the DNS name space.<br />

Step 2 Administrator loads a private key in the outbound Mail Transfer Agent (MTA).<br />

Step 3 Email submitted by an authorized user of that domain is digitally signed with the respective private key.<br />

The signature is inserted in the email as a DomainKey or DKIM signature header and the email is<br />

transmitted.<br />

Step 4 Receiving MTA extracts the DomainKeys or DKIM signature from the header and the claimed sending<br />

domain (via the Sender: or From: header) from the email. The public key is retrieved from the claimed<br />

signing domain which is extracted from DomainKeys or DKIM signature header fields.<br />

Step 5 The public key is used to determine whether the DomainKeys or DKIM signature was generated with<br />

the appropriate private key.<br />

To test your outgoing DomainKeys signatures, you can use a Yahoo! or Gmail address, as these services<br />

are free and provide validation on incoming messages that are DomainKeys signed.<br />

OL-25137-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!