ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    SPF Records for Google Apps Mail

    IT Discussion
    5
    10
    2.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • RamblingBipedR
      RamblingBiped
      last edited by RamblingBiped

      We use Google Apps for email and I'm looking to put some SPF records in place for our email service to ensure we are not blacklisted by spoofing of our mail domain. From what I've researched is it really as simple as entering the following text record in my DNS provider's record entries for our domain?

      v=spf1 include:_spf.google.com ~all
      

      https://support.google.com/a/answer/178723?hl=en

      momurdaM 1 Reply Last reply Reply Quote 1
      • momurdaM
        momurda @RamblingBiped
        last edited by momurda

        @RamblingBiped
        Yes, but you may want to use - instead of ~
        a ~ is a softfail, will still allow messages through, just shows up as SPF failure in email headers.
        a - is hard fail, shuts those spoofers down.

        1 Reply Last reply Reply Quote 1
        • brianlittlejohnB
          brianlittlejohn
          last edited by

          If you do a hard fail, which I recommend, make sure you include any IP/host that legitimately send mail for your domain.

          1 Reply Last reply Reply Quote 2
          • RamblingBipedR
            RamblingBiped
            last edited by RamblingBiped

            So if I do the soft fail then it will just notify receivers whether or not the message is legitimate, but if I do a hard fail it will block any messages that are not legitimate?

            DashrenderD 1 Reply Last reply Reply Quote 0
            • momurdaM
              momurda
              last edited by momurda

              Yes, if the spoofing host is sending email from an address that isnt included in spf.google.com and you have hard fail on, that message should be dropped by the receiving email server when it does its spf check. Softfail leaves it up to the discretion of the receiving server, but usually will just tag the message with Softfail and deliver it.

              1 Reply Last reply Reply Quote 1
              • T
                TAHIN
                last edited by

                Our google record : v=spf1 a mx include:_spf.google.com ~all

                Soft fail aids troubleshooting when legitimate mail isn't being delivered. We're monitoring for the soft fail tag so we'll know right away if we're getting hit.

                RamblingBipedR 1 Reply Last reply Reply Quote 2
                • RamblingBipedR
                  RamblingBiped @TAHIN
                  last edited by

                  @TAHIN So I should be able to get away with the same entry as what you have then? What does the addition of "a mx" add?

                  DashrenderD T 2 Replies Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @RamblingBiped
                    last edited by

                    @RamblingBiped said in SPF Records for Google Apps Mail:

                    So if I do the soft fail then it will just notify receivers whether or not the message is legitimate, but if I do a hard fail it will block any messages that are not legitimate?

                    This assumes the receiving email server respects the SPF record.

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @RamblingBiped
                      last edited by

                      @RamblingBiped said in SPF Records for Google Apps Mail:

                      @TAHIN So I should be able to get away with the same entry as what you have then? What does the addition of "a mx" add?

                      The MX record is the original record for sending SMTP mail. SPF was added much later, and isn't supported by all systems.

                      1 Reply Last reply Reply Quote 1
                      • T
                        TAHIN @RamblingBiped
                        last edited by TAHIN

                        Sorry, was on vacation.

                        @RamblingBiped said in SPF Records for Google Apps Mail:

                        @TAHIN So I should be able to get away with the same entry as what you have then? What does the addition of "a mx" add?

                        Adding the 'a mx' parameters indicates that only servers that match a public A record or public MX record of your domain are allowed to send. Generally, just saying MX is enough - you're telling the recipient to fail the mail unless the sending IP matches the IP address of one of your domain's MX records, effectively eliminating spoofing. We added 'A' to give us the flexibility to source email from an application or DMZ server. The include: parameter overrides these defaults, allowing Google to proxy.

                        80% of the reason we (and most companies) implement SPF is to protect their own organization from incoming spearphishing via domain spoofing. The fact that it isn't 100% adopted by all organizations shouldn't be a deterrent to use it.

                        1 Reply Last reply Reply Quote 3
                        • 1 / 1
                        • First post
                          Last post