Domain-based Message Authentication, Reporting and Conformance
(DMARC) is an email validation system designed to detect and prevent email spoofing.
It is intended to combat certain techniques often used in phishing and email spam,
such as email messages with forged sender addresses that appear to originate from
legitimate organizations. It provides a way to authenticate email messages for
specific domains, send feedback to senders, and conform to a published policy.
DMARC fits into the inbound email authentication process of Trend Micro Email
Security. The way it works, is to help email recipients to
determine if the purported message aligns with what the recipient knows about the
sender. If
not, DMARC provides guidance on how to handle the non-aligned messages. DMARC requires
either
of the following:
-
A message passes the SPF check, and its identifier domain is in alignment.
-
A message passes the DKIM signature check, and its identifier domain is in alignment.
Identifier alignment requires that the domain authenticated by SPF or DKIM be the
same as or belong to the same organizational domain as the message header domain.
If the
alignment mode is
s(strict), the two domains must be exactly the same; if the alignment mode is
r(relaxed), they must belong to the same organizational domain.
NoteIf an email message passes the Sender IP Match check, the message is also
considered as passing the SPF check of DMARC authentication.
|
However, some services like mailing lists or account forwarding (also known as
intermediaries) might make changes to a legitimate message before sending it on, potentially
resulting in SPF, DKIM, and/or DMARC alignment failure. Therefore, the message may
not get
delivered despite of its legitimacy.
Authenticated Received Chain (ARC) was designed to address such problem. ARC preserves
email
authentication results across subsequent intermediaries (“hops”) that may modify the
message,
and thus would cause email authentication measures to fail to verify when that message
reaches
its final destination. But if an ARC chain were present and validated, a receiver
who would
otherwise discard the messages might choose to evaluate the ARC results and make an
exception,
allowing legitimate messages to be delivered.
ARC-enabled intermediaries generally act as both ARC validators (when receiving messages)
and
ARC sealers (when sending messages onward, not originated locally).
When evaluating ARC results for validity as an ARC validator, Trend Micro Email
Security currently evaluates only the following third-party
ARC sealers:
-
Google
-
Microsoft
When signing the messages' validation results as an ARC sealer, Trend Micro Email
Security uses the domain name "d=tmes.trendmicro.com" in
the ARC headers. If the next hop intermediary is ARC-enabled, Trend Micro suggests that you enable the
intermediary to add Trend Micro to its ARC sealer
trust list.