<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DNS on Sender Audit Blog</title><link>https://senderaudit.com/blog/en/tags/dns/</link><description>Recent content in DNS on Sender Audit Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 26 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://senderaudit.com/blog/en/tags/dns/index.xml" rel="self" type="application/rss+xml"/><item><title>Email and DNS: Every Record You Need to Know</title><link>https://senderaudit.com/blog/en/email-and-dns/</link><pubDate>Sun, 26 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-and-dns/</guid><description>&lt;p&gt;DNS is the invisible foundation of email. Without the right records, your emails won&amp;rsquo;t be delivered, authenticated, or encrypted. Here are &lt;strong&gt;all the DNS records&lt;/strong&gt; a sending domain needs to know and configure.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Record&lt;/th&gt;
 &lt;th&gt;Type&lt;/th&gt;
 &lt;th&gt;Role&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MX&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;MX&lt;/td&gt;
 &lt;td&gt;Where to deliver emails for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;SPF&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Who can send for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DKIM&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT/CNAME&lt;/td&gt;
 &lt;td&gt;Public key for verifying signatures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DMARC&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;SPF + DKIM alignment policy&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MTA-STS&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT + HTTPS&lt;/td&gt;
 &lt;td&gt;Enforce TLS encryption&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;TLS-RPT&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Reports on TLS failures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;BIMI&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Verified logo in the inbox&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;PTR&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;PTR&lt;/td&gt;
 &lt;td&gt;Reverse DNS for your sending IPs&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="mx-where-to-deliver-emails"&gt;MX: Where to Deliver Emails&lt;/h2&gt;
&lt;p&gt;The MX (Mail Exchange) record specifies which servers receive emails for your domain.&lt;/p&gt;</description></item><item><title>Reading and Understanding DMARC Reports (RUA)</title><link>https://senderaudit.com/blog/en/understanding-dmarc-reports/</link><pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/understanding-dmarc-reports/</guid><description>&lt;p&gt;You&amp;rsquo;ve configured &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt; with a &lt;code&gt;rua=&lt;/code&gt; tag and reports are starting to arrive. But what do you do with these often incomprehensible XML files? This guide teaches you how to read them, interpret them, and take concrete action.&lt;/p&gt;
&lt;h2 id="what-is-a-dmarc-rua-report"&gt;What Is a DMARC RUA Report&lt;/h2&gt;
&lt;p&gt;An RUA (Report URI Aggregate) report is an XML file sent daily by mailbox providers (Google, Microsoft, Yahoo, etc.) to the address defined in your DMARC record.&lt;/p&gt;</description></item><item><title>DKIM RSA Key Size: 1024 vs 2048 Bits and the Future with Ed25519</title><link>https://senderaudit.com/blog/en/dkim-rsa-key-size/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-rsa-key-size/</guid><description>&lt;p&gt;Your DKIM setup works, signatures pass. But have you checked the &lt;strong&gt;size of your RSA key&lt;/strong&gt;? A key that&amp;rsquo;s too short is a ticking time bomb: it could be cracked, allowing an attacker to sign emails on your behalf.&lt;/p&gt;
&lt;h2 id="the-history-of-dkim-keys-from-512-to-2048-bits"&gt;The History of DKIM Keys: From 512 to 2048 Bits&lt;/h2&gt;
&lt;h3 id="2012-the-end-of-512-bit-keys"&gt;2012: The End of 512-Bit Keys&lt;/h3&gt;
&lt;p&gt;In 2012, researchers demonstrated that a 512-bit RSA key could be cracked in &lt;strong&gt;under 72 hours&lt;/strong&gt; using cheap cloud computing power. The result: anyone could impersonate a domain using a 512-bit key and send perfectly DKIM-signed emails.&lt;/p&gt;</description></item><item><title>How to Configure DMARC to Protect Your Domain</title><link>https://senderaudit.com/blog/en/configure-dmarc/</link><pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dmarc/</guid><description>&lt;p&gt;DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that protects your domain against spoofing and phishing. In this guide, we&amp;rsquo;ll walk through how to set it up properly.&lt;/p&gt;
&lt;h2 id="why-dmarc-is-essential"&gt;Why DMARC Is Essential&lt;/h2&gt;
&lt;p&gt;Without DMARC, anyone can send emails pretending to be your domain. The consequences are serious:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Phishing&lt;/strong&gt;: malicious actors can impersonate your brand&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Damaged reputation&lt;/strong&gt;: ISPs may penalize your domain&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lost trust&lt;/strong&gt;: your recipients can no longer tell which emails are legitimate&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;According to the FBI, business email compromise (BEC) scams, many of which exploit missing DMARC, caused over $2.7 billion in losses in 2022 alone.&lt;/p&gt;</description></item><item><title>DKIM: Sign Your Emails to Prove Their Authenticity</title><link>https://senderaudit.com/blog/en/configure-dkim/</link><pubDate>Sat, 24 Jan 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dkim/</guid><description>&lt;p&gt;DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every outgoing email. The receiving server can verify that the message wasn&amp;rsquo;t altered in transit and that it came from an authorized sender. It&amp;rsquo;s the second pillar of email authentication, after &lt;a href="https://senderaudit.com/blog/en/configure-spf/"&gt;SPF&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="how-dkim-works-the-simple-version"&gt;How DKIM Works, The Simple Version&lt;/h2&gt;
&lt;p&gt;Think of it like sending a letter with a wax seal. The recipient can verify the seal isn&amp;rsquo;t broken (the message is intact) and that the seal matches your crest (you&amp;rsquo;re the legitimate sender).&lt;/p&gt;</description></item><item><title>SPF: The Complete Guide to Authorizing Your Sending Servers</title><link>https://senderaudit.com/blog/en/configure-spf/</link><pubDate>Sat, 17 Jan 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-spf/</guid><description>&lt;p&gt;SPF (Sender Policy Framework) is the first line of defense in email authentication. It lets you declare in your DNS which servers are allowed to send email for your domain. Simple on the surface, it hides subtleties that trip up even experienced admins.&lt;/p&gt;
&lt;h2 id="what-does-spf-actually-do"&gt;What Does SPF Actually Do?&lt;/h2&gt;
&lt;p&gt;When a receiving server gets an email from &lt;code&gt;contact@yourdomain.com&lt;/code&gt;, it asks one question: &lt;em&gt;&amp;ldquo;Is this server allowed to send for this domain?&amp;rdquo;&lt;/em&gt;&lt;/p&gt;</description></item></channel></rss>