Sender Policy Framework Overloading
Sender Policy Framework (SPF) is an example of a protocol that overloads existing DNS data types. SPF is an attempt to authenticate email and reduce undesirable email (spam). This protocol works by storing sender information in the TXT field. For example:
$ host -t txt abc.com
pobox.com descriptive text "v=spf1 mx mx:fallback-relay.%{d}
a:webmail.%{d} a:smtp.%{d} a:outgoing.smtp.%{d}
a:discard-reports.%{d} a:discards.%{d} mx:stor" "e.discard.%{d}
a:emerald.%{d} redirect=%{l1r+}._at_.%{o}._spf.%{d}"
The TXT field contains the SPF information. It specifies the authorized sources for email from the pobox.com domain.
In this tutorial:
- Domain Name System (DNS)
- DNS Common Uses
- Hostname-to-Address Mapping
- Common Lookup Tools
- Naming Confusion Attack Vectors
- Dotted Names
- Name Formatting
- Exploited Anonymity
- Mail Servers
- Sender Policy Framework Overloading
- Domain Keys Overloading
- DNS Protocol
- Packet Information
- Simple DNS Server
- Distributed Architecture
- Top Level Domain Servers
- Generic Top Level Domain (gTLD)
- Secondary Level Domain (SLD)
- Primary and Secondary Servers
- Caching Servers
- DNS Management
- DNS Direct Risks
- DNS Performance versus Security
- DNS Cache Poisoning
- Corrupt DNS Packets
- DNS Domain Hijacking
- DNS Server Hijacking
- Dynamic DNS
- Similar Hostnames
- Domain Renewals
- Hostnames
- Zone Transfers
- Host Listing
- DNS Fields
- Mitgation Option
- Technical Threat Mitigation
- Social Threat Mitigation
- Defining Trusted Replies