Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Of course it's a security issue, because having neither SPF nor DKIM means that malicious actors can all too easily impersonate your email addresses and phish users with an email that apparently came from your domain.


I occasionally get what I'm sure are very well meaning SPF/DKIM-missing reports for a domain that has a null mx record.

It can basically be assumed that anyone trying to report that didn't do even a basic cursory look at the results. I don't need your automated scan, I have my own nessus deployment and already know what it's going to say.


People can still malicously send emails in your name, even without an mx record.

Don't trust my word for this, have a look at CloudFlares article about this:

"How to protect domains that do not send email"

https://www.cloudflare.com/learning/dns/dns-records/protect-...


"null record" is not "no record". It's an MX record of priority "0" and value "."

No MTA will try to deliver a message that is from or to a domain that has a null record. If you're the sender, your sending MTA might give you an NDR, but receiving infrastructure will just drop it.

Cloudflare actually has a wizard that implements it in addition to the items on the page you linked. And no offense to whoever wrote the CF article, but they are the new kids on the block relative to email.


No offense but I think you got the meaning of the record wrong:

https://community.cloudflare.com/t/keep-null-mx-in-addition-...

> Null MX does nothing to prevent spoofing. It is just to signal to mail senders that your domain does not receive email.

And I also found multiple other sources that specify that the null record only announces that the domain does not receive email. After some googling I didn't find a single source that shares your explanation.


Having SPF/DKIM in DNS records doesn't prevent that.


This is exactly what SPF and DKIM are designed to do. DMARC enforces this.

Obviously, this is opportunistic security, the receiver must support all this, but >99% does.


Yes, but the public testers are not testing the receive side, but the sending side.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: