Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update goentri.com.sendmarc.json #412

Merged

Conversation

evelyndearaujo-goentri
Copy link
Contributor

No description provided.

@@ -23,7 +23,7 @@
"type": "SPFM",
"host": "@",
"groupId": "a2",
"spfRules": "include:%thirdPartyDomain%"
"spfRules": "redirect=%thirdPartyDomain%"
Copy link
Member

@pawel-kow pawel-kow Jul 27, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

redirect rules are not currently supported by SPFM, as those cannot be reliably merged with the other rules.
If this is what is needed (even though I would not encourage), the only option for now would be a regular TXT record with txtConflictMatchingPrefix configuration to avoid duplicate SPF.
The provider would be responsible for the merge of the record with existing service in this case. Any further service may also break the configuration - this is something to be aware of.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @pawel-kow, thank you for warning me about that.

What would be the right configuration for the following SPF?

{
"value": "v=spf1 redirect=_sokiruvgn.sdmarc.net",
"host": "@",
"ttl": 3600,
"type": "TXT"
}

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sth like:

    {
      "data": "v=spf1 redirect=%thirdPartyDomain%",
      "host": "@",
      "ttl": 3600,
      "type": "TXT",
      "txtConflictMatchingMode": "Prefix",
      "txtConflictMatchingPrefix": "v=spf1",
      "essential": "OnApply"
    }

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thank you

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

... and bump the version number

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pawel-kow considering Google Domains don't support "txtConflictMatchingMode": "Prefix","txtConflictMatchingPrefix": "v=spf1", "essential": "OnApply

Is there a different way to configure that record?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

txtConflictMatchingMode, txtConflictMatchingPrefix and essential have a semantic meaning which will make this alternative method secure to use.
Without txtConflictMatching* setting it will be possible to set up 2nd SPF, which will basically void it.
"essential" setting is only important for providers tracking the template usage and removing whole templates. So Google likely can tell if they are affected. If this setting is not there it would mean the template dropped if SPF is modified or deleted. Normally not a wanted behavior.

Functionally Google could onboard the template without these parameters and it would work for most of the cases.

Alternative is to convince the provider to use include instead of redirect, and keep using SPFM.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

txtConflictMatchingMode, txtConflictMatchingPrefix and essential have a semantic meaning which will make this alternative method secure to use.
Without txtConflictMatching* setting it will be possible to set up 2nd SPF, which will basically void it.
"essential" setting is only important for providers tracking the template usage and removing whole templates. So Google likely can tell if they are affected. If this setting is not there it would mean the template dropped if SPF is modified or deleted. Normally not a wanted behavior.

Functionally Google could onboard the template without these parameters and it would work for most of the cases.

Alternative is to convince the provider to use include instead of redirect, and keep using SPFM.

Copy link
Member

@pawel-kow pawel-kow left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@pawel-kow pawel-kow added this pull request to the merge queue Jul 27, 2023
Merged via the queue into Domain-Connect:master with commit ef30027 Jul 27, 2023
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants