
Engineer's DNS Intelligence Report
| Parameter | Current | Suggested | Severity | Rationale |
|---|---|---|---|---|
| timeout_seconds | 5s |
8s |
low | Average scan duration is 39.5s, suggesting DNS responses are slow for this domain. Increasing timeout from 5s to 8s prevents premature resolution failures. RFC 8767 |
DNSSEC is not enabled for this domain. DNSSEC provides cryptographic authentication of DNS responses, preventing cache poisoning and DNS spoofing attacks.
Your domain has DMARC reject — you qualify for BIMI, which displays your brand logo in receiving email clients that support it (Gmail, Apple Mail, Yahoo).
| Field | Value |
|---|---|
| Type | TXT |
| Host | default._bimi.fugro.com (BIMI default record) |
| Value | v=BIMI1; l=https://fugro.com/brand/logo.svg |
CAA records specify which Certificate Authorities may issue certificates for your domain, reducing the risk of unauthorized certificate issuance.
| Field | Value |
|---|---|
| Type | CAA |
| Host | fugro.com (root of domain — adjust CA to match your provider) |
| Value | 0 issue "letsencrypt.org" |
TLS-RPT (TLS Reporting) sends you reports about TLS connection failures when other servers try to deliver mail to your domain.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _smtp._tls.fugro.com (SMTP TLS reporting record) |
| Value | v=TLSRPTv1; rua=mailto:tls-reports@fugro.com |
MTA-STS enforces TLS encryption for inbound mail delivery, preventing downgrade attacks on your mail transport.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _mta-sts.fugro.com (MTA-STS policy record) |
| Value | v=STSv1; id=fugro.com |
Email Security Methodology Can this domain be impersonated by email? No SPF and DMARC reject policy enforced
SPF Record RFC 7208 §4 Verified
SPF valid with strict enforcement (-all), 2/10 lookups
DMARC is set to reject — enforcement is strong. However, some receivers may still reject messages on SPF hard fail before DKIM alignment is checked. Switching to ~all + p=reject would provide the same enforcement with full DMARC compatibility.
DMARC Policy RFC 7489 §6.3 Verified
DMARC policy reject (100%) - excellent protection
pct= with t= (testing flag), add np= (non-existent subdomain policy), and mandate DNS tree walk for policy discovery instead of the Public Suffix List.DKIM Records RFC 6376 §3.6 Verified
Found DKIM records for 5 selector(s)
l= tag body length vulnerability (attacker appends unsigned content to signed mail),
weak key exploitation (keys below 1024-bit are cryptographically breakable per RFC 6376 §3.3.3),
DKIM replay attacks (re-sending legitimately signed messages at scale)
MTA-STS RFC 8461 §3 Verified
No MTA-STS record found
MTA-STS policy enforcement is evaluated in Mail Transport Security below.
TLS-RPT RFC 8460 §3 Verified
No TLS-RPT record found
DMARC External Reporting Authorization RFC 7489 §7.1
All 1 external reporting domains properly authorized
| External Domain | Authorization | Auth Record |
|---|---|---|
inbox.ondmarc.com |
Authorized |
v=DMARC1;
|
DANE / TLSA Verified Recon Methodology Can mail servers establish identity without a public CA? No
DANE not available — Proofpoint does not support inbound DANE/TLSA on its MX infrastructure
Proofpoint is a security gateway with shared MX infrastructure. It does not publish per-customer TLSA records.
Recommended alternative: MTA-STS
Two mechanisms protect email in transit. DANE is the primary standard; MTA-STS is the alternative for domains that cannot deploy DNSSEC:
- DNSSEC + DANE (RFC 7672) — Cryptographic chain of trust from DNS root to mail server certificate. Eliminates reliance on certificate authorities. No trust-on-first-use weakness. Requires DNSSEC.
- MTA-STS (RFC 8461) — HTTPS-based policy requiring TLS for mail delivery. Works without DNSSEC but relies on CA trust and is vulnerable on first use (§10). Created for domains where “deploying DNSSEC is undesirable or impractical” (§2).
Industry trend: Microsoft Exchange Online enforces inbound DANE with DNSSEC (GA October 2024), and providers like Proton Mail and Fastmail also support DANE. Google Workspace does not support DANE and relies on MTA-STS. Both mechanisms coexist because DANE is backward-compatible — senders skip the check if the domain isn't DNSSEC-signed (RFC 7672 §1.3).
Brand Security Can this brand be convincingly faked? Unlikely DMARC reject policy blocks email spoofing, but no BIMI brand verification and no CAA certificate restriction — visual and certificate-based brand faking remains possible
BIMI BIMI Spec Verified Warning
No BIMI record found
CAA RFC 8659 §4 Verified
