“k=rsa; t=s; p=MIGf…long string of letters and numbers…AQAB”<\/p><\/blockquote>\n
Insert this as a TXT record on your domain. Do this by selecting TXT as the record type, and entering the string you were given into the Content field.<\/p>\n
You will also be provided with a specific subdomain to use. Something like:<\/p>\n
“something._domainkey”<\/p><\/blockquote>\n
Enter this subdomain in the \u201cName\u201d field.<\/p>\n
If your provider gives you a fully-qualified name that ends with your domain name, DO NOT<\/strong> include your domain name in the \u201cName\u201d field when you add the TXT record. So for example, if you\u2019re given example._domainkey.yourdomain.com, only enter example._domainkey in the \u201cName\u201d field.<\/p>\nDMARC enables you to define how you receive emails and check for spam<\/h2>\n
DMARC (Domain-based Message Authentication, Reporting, and Conformance): DMARC is a comprehensive email authentication protocol that builds upon SPF and DKIM. It enables domain owners to define policies for how receiving mail servers should handle emails that fail authentication or spam checks. DMARC records are published in the DNS and specify what you want to do with emails that fail SPF or DKIM checks. These records are added as a TXT record.<\/p>\n
They look something like this:<\/p>\n
“v=DMARC1;p=reject;pct=100;rua=mailto:postmaster@dmarcdomain.com”<\/p><\/blockquote>\n
You will also be provided with a specific hostname to use. Something like:<\/p>\n
“_dmarc.hostname.com”<\/p><\/blockquote>\n
Enter the subdomain part of the hostname in the \u201cName\u201d field. Remember, don’t add your domain into this section. The subdomain is everything to the left of your domain name.<\/p>\n
So what do all these things mean? So happy you asked. p=protocol. pct=percentage of emails the system will check. rua= who gets emailed the report about blocked messages.
\nThe three main protocols within DMARC are:<\/p>\n
\n- “None”: The DMARC policy is set to “none” when a domain owner wants to monitor email authentication failures but take no specific action to block these emails.<\/li>\n
- “Quarantine”: When the DMARC policy is set to “quarantine,” emails that fail authentication checks may be delivered to your spam or quarantine folder.<\/li>\n
- “Reject”: The “reject” policy instructs receiving mail servers to reject emails that fail authentication, ensuring they don’t even reach the recipient’s inbox.<\/li>\n<\/ul>\n
Changing the pct or percentage is an optional setting that tells the system how many emails it receives will be checked for spam. 0 means none will be checked, and 100 means all will be checked. This setting can be adjusted depending on how aggressive you want your spam checking to be.<\/p>\n
Finally rua sets who gets emailed a report about block messages or emails failing and passing the spam check. You can add multiple emails to this record, just make sure you append mailto:<\/strong> before the email address you are adding. So example@domain.com<\/strong> becomes mailto:example@domain.com<\/strong><\/p>\nSo what now?<\/h2>\n
To recap,\u00a0 SPF, DKIM, and DMARC protocols are crucial for securing and authenticating your email communication and preventing unauthorized use your domain. SPF verifies the sending server’s authority, DKIM adds digital signatures for message integrity, and DMARC provides policies for handling failed authentication. You should now know what each element is, how to correctly configure these protocols and how to add these settings to your domain to ensure you emails and domain are protected from spam and don’t get blocked.<\/p>\n
Happy emailing \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"
Ever experienced spam? Not the porky canned goodness. The all annoying scams and unwanted content that gets flung around the interwebs. What’s even worse is when your own legit emails get blocked as spam. Whether you’re sending from your email client or website, let’s breakdown how to ensure your emails get sent on time, straight […]<\/p>\n","protected":false},"author":2,"featured_media":2465,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[48,25],"tags":[52,53,50,49,51],"acf":[],"_links":{"self":[{"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/posts\/2464"}],"collection":[{"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/comments?post=2464"}],"version-history":[{"count":3,"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/posts\/2464\/revisions"}],"predecessor-version":[{"id":2468,"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/posts\/2464\/revisions\/2468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/media\/2465"}],"wp:attachment":[{"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/media?parent=2464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/categories?post=2464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ingot.nz\/wp-json\/wp\/v2\/tags?post=2464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}