FixVibe

// dns / spotlight

SPF / DKIM / DMARC

Without these three records, anyone can send email as you.

El gancho

Email authentication is decades old, well-understood, and routinely missed. The attacker doesn't break SMTP — SMTP was never designed to authenticate senders. Spoofing email from `support@yourdomain.com` is a one-line `mail` command unless your DNS tells receivers what's legitimate. The good news: SPF, DKIM, and DMARC together solve the problem, are supported by every major email provider, and cost nothing beyond DNS records and provider configuration. The bad news: the records are unforgiving — wrong by one character and they don't apply, and the failure mode is silent (your legitimate mail still flows; the spoof protection just doesn't work). 'Working email' is not the same as 'authenticated email.'

Com funciona

SPF (Sender Policy Framework) is a TXT record on your apex domain listing the IP addresses and hostnames authorized to send mail as you. Receivers check the envelope sender's IP against the SPF record; mismatches fail SPF. DKIM (DomainKeys Identified Mail) is a TXT record holding a public key (at `<selector>._domainkey.<domain>`) against which the signing private key — held by your sending infrastructure — generates per-message signatures. Receivers verify the signature against the public key; mismatches fail DKIM. DMARC (Domain-based Message Authentication, Reporting and Conformance) ties them together: a TXT record at `_dmarc.<domain>` tells receivers what to do when SPF or DKIM fails (none / quarantine / reject), what alignment to require between the From: header domain and SPF/DKIM domains, and where to report failures.

Las variantes

No SPF

Anyone can send mail with your domain in the From line and pass SPF (because there's no record to fail). Receivers may or may not penalize; major providers usually do.

SPF with ~all (soft fail)

`~all` instead of `-all` — receivers see soft-fail and may still deliver. Looks present but provides no enforcement.

DKIM signing missing or partial

Some senders (especially marketing platforms or older internal systems) don't sign. Receivers can't verify and DMARC enforcement falls back on SPF alone.

DMARC at p=none

DMARC published but in monitoring mode. Reports the spoofs but doesn't block them. Often left at p=none indefinitely after the initial setup.

El radio de impacto

Phishing emails appearing to come from you, sent at scale. Brand damage when customers receive spoofed messages and lose trust in your real ones. Sender reputation degradation when receivers can't reliably distinguish legitimate from spoofed mail and start junking everything from your domain. Business Email Compromise (BEC) preconditions: attackers spoof executives to social-engineer wire transfers, fake employee credentials, redirect invoices. The financial impact of BEC is staggering — FBI's IC3 puts annual losses in the billions, and missing email auth is the typical enabler.

// what fixvibe checks

What FixVibe checks

FixVibe checks DNS and takeover risk with non-destructive ownership, resolution, and service-state signals. Reports show the risky host or record and the cleanup path. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Defensas a prueba de balas

Set SPF strict — `-all` (hard fail), not `~all` (soft fail). Include only the senders you actually use (your transactional provider, Google Workspace if you use it, marketing platforms). Audit and remove old `include:` directives when you change providers. Sign with DKIM at every sender — Postmark, SendGrid, Resend, Mailgun, Google Workspace, Mailchimp all support it. Use 2048-bit keys; rotate annually. Set DMARC progressively: start at `p=none` for monitoring, watch the reports for two weeks to identify any legitimate sender that's failing alignment, fix those, then advance to `p=quarantine` (sends spoofs to spam), and ultimately `p=reject` (sends spoofs to /dev/null). Configure DMARC reporting (`rua=mailto:dmarc-reports@yourdomain.com`) and actually read the reports — services like Postmark's DMARC monitor or DMARCian aggregate them into something readable. As a final layer, publish BIMI records to display your logo in compliant inboxes — gives users a positive trust signal alongside the negative spoof-protection.

// ejecútalo en tu propia app

Sigue lanzando mientras FixVibe vigila.

FixVibe somete la superficie pública de tu app a la misma presión que un atacante — sin agente, sin instalación, sin tarjeta. Seguimos investigando nuevos patrones de vulnerabilidad y los convertimos en checks prácticos y fixes listos para Cursor, Claude y Copilot.

DNS
18
tests en esta categoría
módulos
2
checks dedicados de dns
cada scan
384+
tests en todas las categorías
  • Gratis — sin tarjeta, sin instalación, sin ping de Slack
  • Solo pega una URL — nosotros crawleamos, sondeamos y reportamos
  • Hallazgos clasificados por severidad, deduplicados al puro signal
  • Prompts de fix actuales, listos para Cursor, Claude, Copilot
Ejecutar un escaneo gratis

// checks actuales · fixes prácticos · lanza con confianza

SPF / DKIM / DMARC — Spotlight de Vulnerabilidad | FixVibe · FixVibe