27.11.2012 Views

IronPort - advanced configuration guide

IronPort - advanced configuration guide

IronPort - advanced configuration guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Overview of SPF and SIDF Verification<br />

5-22<br />

Cisco <strong>IronPort</strong> AsyncOS 7.6 for Email Advanced Configuration Guide<br />

Chapter 5 Email Authentication<br />

Cisco <strong>IronPort</strong> AsyncOS supports Sender Policy Framework (SPF) and Sender ID Framework (SIDF)<br />

verification. SPF and SIDF are methods for verifying authenticity of email based on DNS records. SPF<br />

and SIDF allow the owner of an Internet domain to use a special format of DNS TXT records to specify<br />

which machines are authorized to transmit email for that domain.<br />

When you use SPF/SIDF authentication, the senders publish SPF records specifying which hosts are<br />

permitted to use their names, and compliant mail receivers use the published SPF records to test the<br />

authorization of the sending Mail Transfer Agent’s identity during a mail transaction.<br />

Note Because SPF checks require parsing and evaluation, AsyncOS performance may be impacted. In<br />

addition, be aware that SPF checks increase the load on your DNS infrastructure.<br />

When you work with SPF and SIDF, note that SIDF is similar to SPF, but it has some differences. To get<br />

a full description of the differences between SIDF and SPF, see RFC 4406. For the purposes of this<br />

documentation, the two terms are discussed together except in the cases where only one type of<br />

verification applies.<br />

Note AsyncOS does not support SPF for incoming relays, and AsyncOS does not support SPF for IPv6.<br />

A Note About Valid SPF Records<br />

Valid SPF Records<br />

Valid SIDF Records<br />

To use SPF and SIDF with a Cisco <strong>IronPort</strong> appliance, publish the SPF record according to the RFCs<br />

4406 and 4408. Review RFC 4407 for a definition of how the PRA identity is determined. You may also<br />

want to refer to the following website to view common mistakes made when creating SPF and SIDF<br />

records:<br />

http://www.openspf.org/FAQ/Common_mistakes<br />

To pass the SPF HELO check, ensure that you include a “v=spf1 a –all” SPF record for each sending<br />

MTA (separate from the domain). If you do not include this record, the HELO check will likely result in<br />

a None verdict for the HELO identity. If you notice that SPF senders to your domain return a high<br />

number of None verdicts, these senders may not have included a “v=spf1 a –all” SPF record for each<br />

sending MTA.<br />

To support the SIDF framework, you need to publish both “v=spf1” and “spf2.0” records. For example,<br />

your DNS record may look like the following example:<br />

example.com. TXT "v=spf1 +mx a:colo.example.com/28 -all"<br />

smtp-out.example.com TXT "v=spf1 a -all"<br />

example.com. TXT "spf2.0/mfrom,pra +mx a:colo.example.com/28 -all"<br />

OL-25137-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!