in Platform Updates

What is SPF - Sender Policy Framework

Grzegorz Wyszyński in Programming, on January 23, 2015

Spoofing is a type of a computer attack in which the attacker pretends to be someone else. In particular, email spoofing is an attack in which the attacker sends an email with a fake “From:” field. You can compare it to sending a traditional mail with forged return address.

If you are using one of the popular email services such as Gmail or Yahoo, you don’t need to worry about that. These providers keep security on the high level. But if you are just the owner of an internet domain, you should be aware of the spoofing vulnerability (even if you don’t send emails on your own).

What is SPF (Sender Policy Framework)?

SPF is an email protocol that prevents third parties from pretending to be the owner of the domain they do not actually own.

It boils down to placing a small piece of information in a DNS TXT field which defines which IP addresses are allowed to send emails from this domain.

Here’s a quick example of the Gmail’s DNS TXT record:

**>> dig TXT** 278 IN TXT "v=spf1"

The redirect attribute means that all SPF records for this domain are defined on another domain. The v attribute defines the SPF protocol version.

So let’s check the record of the domain:

**>> dig TXT** 109 IN TXT "v=spf1 ~all"

include means that the specified domain is searched for a match. If the lookup does not return a match or an error, processing proceeds to the next directive. If the domain does not have a valid SPF record, the result is a permanent error.

Let’s dig deeper:

**>> dig TXT** 3247 IN TXT "v=spf1 ip4: ip4: ip4: ip4: ip4: ip4: ip4: ip4: ip4: ip4: ~all"

SPF check is passed when sender’s IP matches one of the ranges. If not, it proceeds to the next directive.

Let’s check what’s returned in the next lookup:

**>> dig** 3599 IN TXT "v=spf1 ip6:2001:4860:4000::/36 ip6:2404:6800:4000::/36 ip6:2607:f8b0:4000::/36 ip6:2800:3f0:4000::/36 ip6:2a00:1450:4000::/36 ip6:2c0f:fb50:4000::/36 ~all"

This domain has directives for validating IPv6 protocol.

**>> dig** 3599 IN TXT "v=spf1 ~all"

If the sender’s IP is missed by all directives, the v=spf1 ~all flag comes into action. The flag means that even when the SPF fails, the domain holder doesn’t want to get rid of the message, but mark it as a possible fail instead.

The SPF protocol specifies 4 qualifiers:

+ pass
- fail
~ soft fail
? neutral

These qualifiers can by placed before any directive. The default qualifier is +. All directives are processed in order.

So if you spotted that someone is sending email from your domain, but you don’t send any email on your own, just use the "v=spf1 -all" SPF rule. It says that the domain does not send any mail at all. All servers that support SPF rules will reject emails coming from your domain.

There’s one important thing to be aware of when configuring SPF. Using SPF breaks plain message forwarding (Wikipedia explains that problem in details).

What’s interesting, Gmail uses a workaround when you forward a text email using their platform. They don’t stick to that buggy standard. Instead, they just send an email on your behalf, prepend the “Re: ” text to the email subject and quote previous emails in the body.

To read more about the syntax of SPF records, check out the following address:

See other Platform Updates

Installation and Update Systems for Windows (Part 1): The History of LiveChat Application

When looking at the history of LiveChat application one can easily notice that LiveChat desktop application for Windows took many shapes and….

Read more

C# library for LiveChat API

We have just published the C# library for the LiveChat API.

Read more
See all updates