Email Spf Dkim Dmarc

email-delivery

https://www.emailarchitect.net/domainkeys/doc/html/object_test.htm
https://www.mail-tester.com/spf-dkim-check
https://mxtoolbox.com/dkim.aspx
http://dkimvalidator.com/
http://www.appmaildev.com/en/dkim/
http://support.postmarkapp.com/article/796-how-can-i-check-if-my-dkim-and-spf-records-are-valid
http://dkimcore.org/tools/keycheck.html
http://dkimcore.org/tools/dkimrecordcheck.html
https://protodave.com/tools/dkim-key-checker/
https://www.dmarcanalyzer.com/how-to-validate-a-domainkey-dkim-record/

https://www.wired.com/2010/02/stop_spam_on_your_mail_server/
http://www.inmotionhosting.com/support/email/fighting-spam/stop-emails-being-labeled-spam

How to keep my mail server from being spammed.
How to secure protect my mail server
https://www.vircom.com/blog/top-10-tips-to-secure-your-email-server/ - printed
https://blog.returnpath.com/5-tips-on-how-to-secure-your-mail-server/ - printed
https://www.howtoforge.com/effective_mail_server_defense - printed
https://serverfault.com/questions/93703/how-do-i-secure-my-mail-server
https://www.digitalocean.com/community/tutorials/why-you-may-not-want-to-run-your-own-mail-server
http://www.techworld.com/tutorial/security/securing-smtp-mail-servers-408/
http://emailsecuritygrader.com/

host -t txt yahoo.com

verp-default

If you enable VERP by setting verp-default to yes or true, PowerMTA will create
a customized SMTP MAIL FROM address for the message based on the original
SMTP MAIL FROM address and the RCPT TO addresses in the message. Since
one can then identify the original RCPT TO address in this new encoded SMTP
MAIL FROM address, this may make tracking bounces easier for you. 

The format is fixed, and can be see in the following example:

Original SMTP MAIL FROM: jsmith@example.com
SMTP RCPT TO: jdoe@yahoo.com
VERPed SMTP MAIL FROM: jsmith-jdoe=yahoo.com@example.com

check-domainkeys-inbound (default is false)

Specifies whether to perform a DomainKeys check. If the message has
DomainKeys and it passes, PowerMTA will add an Authentication-Results
header stating the passing results. 

check-dkim-inbound 

Specifies whether or not PowerMTA should enable checking DKIM signatures
on inbound messages. If the message has DKIM and it passes, PowerMTA will
add an Authentication-Results header stating the passing results. 

trace-domainkeys-check

Allows selecting whether the trace data (currently including all the DNS data
looked up) is included in the Authentication-Results headers for the domainkey
check. 

trace-dkim-check

Allows selecting whether the trace data (currently including all the DNS data
looked up) is included in the Authentication-Results headers for the dkim check.

trace-pra-check 

Allows selecting whether the trace data (currently including all the DNS data
looked up) is included in the Authentication-Results headers for the pra check. 

trace-mfrom-check

Allows selecting whether the trace data (currently including all the DNS data
looked up) is included in the Authentication-Results headers for the mfrom
check. 

check-mfrom-inbound

Specifies whether to perform an SPF/mfrom check on in bound messages. If the
message has the mfrom and it passes, PowerMTA will add an AuthenticationResults
header stating the passing results. 

check-pra-inbound

Specifies whether to perform a pra check. If the message has the pra and it
passes, PowerMTA will add an Authentication-Results header stating the passing
results.

reject-mfrom-check-temperror
reject-mfrom-check-permerror
reject-mfrom-check-fail

deliver-local-dsn no
retry-upon-new-mail
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License