FixVibe

// dns / 스포트라이트

SPF / DKIM / DMARC

이 세 가지 레코드가 없으면 누구나 여러분으로 가장해 메일을 보낼 수 있어요.

핵심

Email authentication is decades old, well-understood, and routinely missed. The attacker doesn't break SMTP — SMTP was never designed to authenticate senders. Spoofing email from `support@yourdomain.com` is a one-line `mail` command unless your DNS tells receivers what's legitimate. The good news: SPF, DKIM, and DMARC together solve the problem, are supported by every major email provider, and cost nothing beyond DNS records and provider configuration. The bad news: the records are unforgiving — wrong by one character and they don't apply, and the failure mode is silent (your legitimate mail still flows; the spoof protection just doesn't work). 'Working email' is not the same as 'authenticated email.'

어떻게 동작하나요

SPF (Sender Policy Framework) is a TXT record on your apex domain listing the IP addresses and hostnames authorized to send mail as you. Receivers check the envelope sender's IP against the SPF record; mismatches fail SPF. DKIM (DomainKeys Identified Mail) is a TXT record holding a public key (at `<selector>._domainkey.<domain>`) against which the signing private key — held by your sending infrastructure — generates per-message signatures. Receivers verify the signature against the public key; mismatches fail DKIM. DMARC (Domain-based Message Authentication, Reporting and Conformance) ties them together: a TXT record at `_dmarc.<domain>` tells receivers what to do when SPF or DKIM fails (none / quarantine / reject), what alignment to require between the From: header domain and SPF/DKIM domains, and where to report failures.

변종

No SPF

Anyone can send mail with your domain in the From line and pass SPF (because there's no record to fail). Receivers may or may not penalize; major providers usually do.

SPF with ~all (soft fail)

`~all` instead of `-all` — receivers see soft-fail and may still deliver. Looks present but provides no enforcement.

DKIM signing missing or partial

Some senders (especially marketing platforms or older internal systems) don't sign. Receivers can't verify and DMARC enforcement falls back on SPF alone.

DMARC at p=none

DMARC published but in monitoring mode. Reports the spoofs but doesn't block them. Often left at p=none indefinitely after the initial setup.

피해 범위

Phishing emails appearing to come from you, sent at scale. Brand damage when customers receive spoofed messages and lose trust in your real ones. Sender reputation degradation when receivers can't reliably distinguish legitimate from spoofed mail and start junking everything from your domain. Business Email Compromise (BEC) preconditions: attackers spoof executives to social-engineer wire transfers, fake employee credentials, redirect invoices. The financial impact of BEC is staggering — FBI's IC3 puts annual losses in the billions, and missing email auth is the typical enabler.

// what fixvibe checks

What FixVibe checks

FixVibe checks DNS and takeover risk with non-destructive ownership, resolution, and service-state signals. Reports show the risky host or record and the cleanup path. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

확실한 방어

Set SPF strict — `-all` (hard fail), not `~all` (soft fail). Include only the senders you actually use (your transactional provider, Google Workspace if you use it, marketing platforms). Audit and remove old `include:` directives when you change providers. Sign with DKIM at every sender — Postmark, SendGrid, Resend, Mailgun, Google Workspace, Mailchimp all support it. Use 2048-bit keys; rotate annually. Set DMARC progressively: start at `p=none` for monitoring, watch the reports for two weeks to identify any legitimate sender that's failing alignment, fix those, then advance to `p=quarantine` (sends spoofs to spam), and ultimately `p=reject` (sends spoofs to /dev/null). Configure DMARC reporting (`rua=mailto:dmarc-reports@yourdomain.com`) and actually read the reports — services like Postmark's DMARC monitor or DMARCian aggregate them into something readable. As a final layer, publish BIMI records to display your logo in compliant inboxes — gives users a positive trust signal alongside the negative spoof-protection.

// 내 앱에서 직접 실행해보세요

FixVibe가 지켜보는 동안 계속 배포하세요.

FixVibe는 공격자가 보는 것처럼 앱의 공개 영역을 압박 테스트합니다 — 에이전트도, 설치도, 카드도 필요 없어요. 새로운 취약점 패턴을 계속 연구해 실용적인 체크와 Cursor, Claude, Copilot에 바로 붙여넣을 수 있는 수정안으로 바꿉니다.

DNS
18
이 카테고리에서 실행되는 테스트
모듈
2
전용 dns 검사
매 스캔
384+
모든 카테고리 합계 테스트
  • 무료 — 카드 없이, 설치 없이, Slack 알림 없이
  • URL만 붙여넣으세요 — 크롤, 탐지, 보고는 저희가
  • 심각도별 분류, 중복 제거된 신호만
  • 최신 AI 수정 프롬프트를 Cursor, Claude, Copilot에 바로 붙여넣기
무료 스캔 실행

// 최신 체크 · 실용적인 수정 · 자신 있게 배포

SPF / DKIM / DMARC — 취약점 스포트라이트 | FixVibe · FixVibe