Over the weekend, as I was updating DNS tables for a client, I thought I’d sharpen up my server mail settings to make the mail service more robust. I’ve seen (unrelated to this) an increase in spam recently and it had been on my mind to do more to combat it. These notes set out broadly how I configure my mail server.
Mail server settings
The mail server I use is Postfix/Dovecot. Using the Plesk control interface on my VPS1, there are a number of settings needed to mitigate the scourge that is spam emails. From Tools & Settings, select Server-wide mail settings make these changes.
Using DNS Blacklisting
The first thing to do is to switch on spam protection based on DNS blackhole lists such as zen.spamhaus.org, spam.abuse.ch and spamrbl.imp.ch. Also, when you do get spam in your inbox, report it immediately. This means just copying the message source2 into a form at somewhere like SpamCop.net, who will send abuse reports to the ISPs that allow the spammers access to the internet. What we hope is that these providers will shut them down, but some are repeat offenders: all of my recent reports have gone to CloudFlare who seem reluctant to combat internet abuse, perhaps because they are making money out of it.
Sender Policy Framework is designed to allow domain admins to authorise the servers that are allowed to use their domain names. Receiving mail servers can check that authorisation by looking up the SPF record of the domain claimed in the “from” field of an email.
Within the Plesk panel for the mail server, under
SPF spam protection, check
Enable SPF spam protection to check incoming mail and select
Only create Received-SPF headers, never block from the drop-down. Your domains should also have an SPF code in the DNS table. This acts like a return address on a snail-mail envelope. Servers can check the sender’s IP against this DNS record to check that it is allowed to send mail on behalf of the domain. This record identifies the version of SPF being used (always 1 at the moment), which records pertain and what policy should be applied to mail that fails to be verified when this record is checked by the receiving mail server.
-a is a hard fail setting which advises rejection of mail that doesn’t match the record parameters.
~a is a soft fail, and
+a is like leaving your keys in the front door. Use the hard fail setting.
DomainKeys Identified Mail (DKIM) is a system that allows the mail server to “certify” emails to assert their authenticity. This is achieved through a cryptographic signature and by querying the signer’s domain directly to retrieve a key. This requires another couple of entries in the DNS table to contain the keys (see table below for examples). Take care when entering your key that you do not inadvertently introduce spaces in the long key. They will invalidate your key.
To enable this on the VPS, in the server-wide mail settings interface in Plesk, check
Verify incoming mail and
Allow signing outgoing mail under DKIM spam protection. In the panel for each subscription (domain), in the Mail Settings tab, check
Use DKIM spam protection system to sign outgoing email messages.
Bringing the measures together, with a DNS-based reporting mechanism that closes the loop, is Domain-based Message Authentication, Reporting, and Conformance (DMARC). This helps protect the domain from unauthorized use. It also requires a DNS TXT entry which identifies policy for handling non-aligned (mail that looks like it might be spam) emails, and a place to send reports about incidents. Setting up needs the policy to be passive, or “reporting only”, set by
p-none in the DNS record. Increasing levels of confidence in the deliverability of email from the server allows organisations to increase this policy to “quarantine”, or even “reject”. Email reports are sent for authentication failure (forensic) and summary information (aggregate) to the email addresses in the record.
If you want to send your DMARC reports to an address at a different domain, then that domain needs a DNS record to authorize the the reports:
reportingdomain.tld._report._dmarc TXT v=DMARC1
If the target domain for the reports is being used for several domains (as in my case), then you can specify a wildcard entry:
*._report._dmarc TXT v=DMARC1
Within the Plesk server-wide mail settings panel, you can now check
Enable DMARC to check incoming mail.
The final DNS aligns with the server settings to provide a more robust and spam-free3 mail experience. An example DNS set of mail-related TXT entries:
|Host name||Record type||Address|
|@||TXT||v=spf1 +a +mx -all|
|_dmarc||TXT||v=DMARC1; p=none; rua=mailto:email@example.com; ruf=mailto:firstname.lastname@example.org; fo=1|
Thanks to mxtoolbox for providing a suite of extremely useful tools and information. Although there is RFC, this would have been much harder to do without your help. Most of the DKIM verifiers out there don’t actually check the validity of the signature key: DMARCAnalyzer does, thanks also to them for this service.
Virtual private server. Literally, a Dell server, in a rack, connected to the T1 backbone in London. Mine runs Centos, a variant of RedHat specifically designed for this kind of job. My ISP for the past 20 years has been Hosting UK, run by Phil Parry, who set the business up in his garage. It’s now part of the Scottish IT business IoMart. ↩
Not the body of the email. The DNS blacklisters need to see the contents of the email header, which reveals where it came from and how it was routed to your computer. Filter scores are also included here. On a mac, if you’re using Mail.app, just click in the body of the mail message and click cmd-alt-u to get a pop-up with the email message source. Cmd-a, cmd-c, and then paste it in the textbox on the spamcop form. ↩
Well, we will see how it goes. ↩