Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
server:mail [2020/07/01 21:54] – grasshopper | server:mail [2020/07/07 21:27] – grasshopper | ||
---|---|---|---|
Line 213: | Line 213: | ||
| KILL_READ_SPAM | | KILL_READ_SPAM | ||
| MUTE | Disable all sound (WAV) files from playing | | | MUTE | Disable all sound (WAV) files from playing | | ||
- | |||
- | ===== Email Security ===== | ||
- | |||
- | In order to prevent one's emails from being labeled as SPAM, or worse, rejected, one can setup email security through a DNS. More and more Servers are starting to reject email that is not being secured to prove that it has come from a reliable source and not some spammer. This section will walk through the steps of securing your email server. | ||
- | |||
- | //Note: This section assumes one owns a domain name and that domain name is the name to be used for one's BBS. If one uses synchro.net for emailing purposes, this will not apply in that case.// | ||
- | |||
- | ==== Dynamic IP Address - No problem ==== | ||
- | - Find a Dynamic Domain Server (DDNS) provider | ||
- | - There are many out there. There are even some free ones that will give at least one address which is all that is needed | ||
- | - This provider should provide directions on this initial setup | ||
- | - Setup an " | ||
- | - This name won't be visible and serves as just a target for one's owned domain name to point to | ||
- | - Next step is to setup records on the owned Domain Name | ||
- | |||
- | ==== Domain Name Records Setup ==== | ||
- | - Log into one's provider of the domain name | ||
- | - Create an " | ||
- | - Create a " | ||
- | - This should point to the address created in the DDNS provider | ||
- | - Create another " | ||
- | - This should also point to the address created in the DDNS provider | ||
- | - Create a " | ||
- | - This should point to the ' | ||
- | - Next is to setup the " | ||
- | |||
- | ==== Creating the ' | ||
- | - Still logged into one's provider of the owned domain name, create a " | ||
- | - The host name should be the " | ||
- | - The TXT Value will contain the information that will state which domain names and IPs are OK if email comes from one of those. One will want to include all possible Domain Name/IP addresses that could serve up email. This part takes a little more effort to get the text right. Thankfully there are free tools available on the internet that will generate the SPF text for you. These are a couple of those sites. | ||
- | - https:// | ||
- | - https:// | ||
- | - Create another " | ||
- | - The host name for this record has to be _dmarc | ||
- | - The value specifies where to send reports of abuse of one's domain name. | ||
- | - There is an online tool to help with the creation of the value of this record: | ||
- | - https:// | ||
- | - Create yet another " | ||
- | - This record will allow for the verification of the signage on the email that is placed by the MTA((Mail Transport Agent)) using a private key and the DKIM record has the public key. Thus emails can be verified against the DNS record. | ||
- | - **Note:** DKIM capabilities is currently __not__ available in Synchronet. | ||
- | - None-the-less, | ||
- | |||
- | === Validation Check === | ||
- | * There are a couple of sites that can help with validating that the records are setup correctly: | ||
- | * https:// | ||
- | * https:// | ||
- | * Check for any errors and correct them. If most every check turns up ' | ||
- | * //Note: If your SPF record doesn' | ||