
Engineer's DNS Intelligence Report
| Parameter | Current | Suggested | Severity | Rationale |
|---|---|---|---|---|
| timeout_seconds | 5s |
8s |
low | Average scan duration is 44.0s, suggesting DNS responses are slow for this domain. Increasing timeout from 5s to 8s prevents premature resolution failures. RFC 8767 |
Your DMARC policy is monitor-only (p=none). Upgrade to p=quarantine or p=reject after reviewing reports to actively prevent spoofing.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _dmarc.isc.org (DMARC policy record) |
| Value | v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@isc.org |
MTA-STS enforces TLS encryption for inbound mail delivery, preventing downgrade attacks on your mail transport.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _mta-sts.isc.org (MTA-STS policy record) |
| Value | v=STSv1; id=isc.org |
Email Security Methodology Can this domain be impersonated by email? Yes DMARC is monitor-only (p=none)
SPF Record RFC 7208 §4 Verified
SPF valid with industry-standard soft fail (~all), 7/10 lookups
DMARC Policy RFC 7489 §6.3 Verified
DMARC in monitoring mode (p=none) - spoofed mail still delivered, no enforcement
pct= with t= (testing flag), add np= (non-existent subdomain policy), and mandate DNS tree walk for policy discovery instead of the Public Suffix List.DKIM Records RFC 6376 §3.6 Verified
Found DKIM records for 3 selector(s)
l= tag body length vulnerability (attacker appends unsigned content to signed mail),
weak key exploitation (keys below 1024-bit are cryptographically breakable per RFC 6376 §3.3.3),
DKIM replay attacks (re-sending legitimately signed messages at scale)
MTA-STS RFC 8461 §3 Verified
No MTA-STS record found
MTA-STS policy enforcement is evaluated in Mail Transport Security below.
TLS-RPT RFC 8460 §3 Verified
TLS-RPT configured - receiving TLS delivery reports
DMARC External Reporting Authorization RFC 7489 §7.1
All 2 external reporting domains properly authorized
| External Domain | Authorization | Auth Record |
|---|---|---|
ag.dmarcian.com |
Authorized |
v=DMARC1;
|
fr.dmarcian.com |
Authorized |
v=DMARC1;
|
DANE / TLSA Verified Recon Methodology Can mail servers establish identity without a public CA? Yes
DANE configured — TLSA records found for all 2 MX hosts
| MX Host | Usage | Selector | Match | Certificate Data |
|---|---|---|---|---|
mx.ams1.isc.org |
3 DANE-EE (Domain-issued certificate) | Public key only (SubjectPublicKeyInfo) | SHA-256 | 40f9c00cff49771c74615e4b366ec19e110928396904539b97878b6e6811bfe1 |
mx.pao1.isc.org |
3 DANE-EE (Domain-issued certificate) | Public key only (SubjectPublicKeyInfo) | SHA-256 | 865c0bc73ec3dac90f73b3d1cf6ba08ecb2848134aab479b6279fe7044a0fa89 |
Two mechanisms protect email in transit. DANE is the primary standard; MTA-STS is the alternative for domains that cannot deploy DNSSEC:
- DNSSEC + DANE (RFC 7672) — Cryptographic chain of trust from DNS root to mail server certificate. Eliminates reliance on certificate authorities. No trust-on-first-use weakness. Requires DNSSEC.
- MTA-STS (RFC 8461) — HTTPS-based policy requiring TLS for mail delivery. Works without DNSSEC but relies on CA trust and is vulnerable on first use (§10). Created for domains where “deploying DNSSEC is undesirable or impractical” (§2).
Industry trend: Microsoft Exchange Online enforces inbound DANE with DNSSEC (GA October 2024), and providers like Proton Mail and Fastmail also support DANE. Google Workspace does not support DANE and relies on MTA-STS. Both mechanisms coexist because DANE is backward-compatible — senders skip the check if the domain isn't DNSSEC-signed (RFC 7672 §1.3).
Brand Security Can this brand be convincingly faked? Likely DMARC is monitor-only (p=none) — spoofed mail is not blocked
BIMI BIMI Spec Verified Warning
No BIMI record found
CAA RFC 8659 §4 Verified
