![Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes] — Hacking Humans cover](https://megaphone.imgix.net/podcasts/a0ea60c4-715f-11f0-a2c4-63ede32d2fe3/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
Loading summary
A
You're listening to the Cyberwire Network. Powered by N2K CISOs and CIOs know machine identities now outnumber humans by more than 80 to 1, and without securing them trust, uptime, outages and compliance are at risk. Cyberark is leading the way with the only unified platform purpose built to secure every machine identity, certificates, secrets and workloads across all environments, all clouds and all AI agents. Designed for scale, automation and quantum readiness, Cyber ARC helps modern enterprises secure their machine future. Visit cyberark.com machines to see how.
B
The word is DMARC spelled D for domain based, M for message, A for authentication, R for reporting, and C for conformance Definition DMARC is an open source email authentication protocol designed to prevent email spoofing in phishing, business email compromise, or bec and other email based attacks. Example Sentence DMARC works with two other email authentication protocols, Sender Policy Framework, or spf, and Domain Keys Identified Mail, or dkim, to recognize when an inbound email isn't coming from an authoritative source, origin and context. According to Samuel Gibbs at the Guardian newspaper, DARPA proposed the first email standard in 1973 and finalized it in 1977. Ever since, email systems have been vulnerable to abuse, from attackers to claiming to be somebody they weren't and tricking users into doing things they shouldn't. That started to change in the 1990s, when RSA began development of the S MIME protocol. Secure Multipurpose Internet mail extensions in 1996, the IETF released the first standard as a way for users to sign and encrypt their own messages. Unfortunately, despite being technically sound, email encryption using S MIME was too difficult to use for the common user, and it never caught on, according to agari. In the mid-2000s, researchers began looking for two new protocols to solve the problem, the SPF standard and the DKIM standard. Domain keys identified email using the DNS, the domain name system, to store the information. The SPF standard allows email systems to specify which IP addresses are allowed to send email from their domains, and email receivers can check potentially spoofed email to make sure the source IPs are authoritative. The DKIM standard merged two new technologies, Domain Keys developed at Yahoo and Identified Internet Mail developed at Cisco. It allows email systems to digitally sign all outgoing messages and uses the DNS to store its public key. This lets the receiving email provider confirm the legitimacy of the email's origin. The beauty of both the SPF and DKIM protocols is that common email users didn't have to do a thing. The checking is all done by the email systems themselves. The problem is that both are just tools and not management platforms that allow for policy. That's where DMARC comes in. According to Agari, DMARC is another standard email authentication protocol that adds feedback, policy and identity alignment to the already deployed SPF and DKIM frameworks. It allows email senders to publish policies telling receivers when they should rely on dkim and SPF for a given domain and what to do when messages fail those tests. In other words, DMARC makes it possible for email receiving systems to make firm decisions about which messages to reject and which to deliver. For example, if an email receiver working in the domain Thanos.com rejects a message claiming to be from StarkEnterprises.com because it failed the DKIM test, Thanos is doing so because the Stark Enterprise DMARC policy says to do just that. DMARC provides a method for Stark Enterprise to tell the world that they sign all of their outgoing email and if anybody ever receives a message that isn't correctly signed by Stark Enterprise, they should delete it. This is a way for organizations like Stark Enterprise to protect its own brand from criminals and spies trying to use the brand in nefarious ways. Dmarc, SPF and DKIM provide amazing protections for email systems, but they can be intimidating to deploy. Incorrect implementation can lead to blocking legitimate email, and its unforgiving syntax can cause a host of errors if entered incorrectly. In response to this challenge, the Global Cyber alliance has been championing DMARC's adoption rate by supplying organizations with tools and resources to aid implementation. Due to their sustained efforts, thousands of organizations in over 180 countries have adopted DMARC and millions of dollars have been saved from limiting business email compromise. Nerd Reference in this clip taken from the 2018 RSA Security Conference, SC Media's executive editor Terry Robinson asked Philip Rettinger, the president and CEO of the Global Cyber alliance, why CEOs and CISOs should be thinking about DMARC.
C
It seems like it's almost a no brainer that you'd want to do dmarc. I think it is a no brainer. It can be a challenge to deploy, but it's not that much of a challenge and it does a really good job of protecting your customers. I think part of the problem is that for the smaller vendors it's not something they've gotten to yet. And for other folks they're worried about a lot of things and they're particularly worried about inbound attacks. And DMARC helps with that. But the thing it helps with most is protection, protecting your customers and the people you're sending email to. So there's a little bit of a market mismatch in the sense that the people who really ought to care about DMARC deployment are the CEOs and chief marketing officers and chief financial officers because it makes their email more trustworthy. But the CISOs who are the ones who really understand what DMARC is, they're just trying to deal with, you know, keeping their heads above water.
B
Word Notes is written by Nyla Genoi, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound, design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening.
A
And now a word from our sponsor. ThreatLocker the powerful Zero Trust Enterprise solution that stops ransomware in its tracks. Allow Listing is a deny by default software that makes application control simple and fast. Ring Fencing is an application containment strategy ensuring apps can only access the files, registry keys, network resources and other applications they truly need to function. Shut out cybercriminals with world class endpoint protection from threat locker.
Podcast Title: Hacking Humans
Host/Author: N2K Networks
Episode: Domain-based Message Authentication Reporting Conformance (DMARC)
Release Date: August 5, 2025
In this insightful episode of Hacking Humans, N2K Networks delves into the intricacies of Domain-based Message Authentication Reporting Conformance (DMARC), a pivotal protocol in the realm of email security. The episode meticulously explores DMARC's evolution, functionality, benefits, and the challenges surrounding its implementation, providing listeners with a comprehensive understanding of how this protocol fortifies email systems against various cyber threats.
The episode begins with a detailed definition of DMARC, emphasizing its role in combating email-based threats. DMARC stands for Domain-based Message Authentication Reporting Conformance, and it serves as an open-source email authentication protocol designed to prevent email spoofing, phishing, business email compromise (BEC), and other related attacks. The host, identified as Speaker B, articulates:
"DMARC works with two other email authentication protocols, Sender Policy Framework, or SPF, and Domain Keys Identified Mail, or DKIM, to recognize when an inbound email isn't coming from an authoritative source, origin and context." (01:15)
A significant portion of the discussion is dedicated to the historical context of email authentication standards. Samuel Gibbs from The Guardian is cited, highlighting that DARPA introduced the first email standard in 1973, which was finalized in 1977. Despite these early efforts, email systems remained susceptible to abuse for decades. The narrative progresses through the 1990s when RSA developed the S/MIME protocol (Secure Multipurpose Internet Mail Extensions) in 1996. This protocol aimed to enable users to sign and encrypt their messages, enhancing security. However, Speaker B notes:
"Despite being technically sound, email encryption using S/MIME was too difficult to use for the common user, and it never caught on." (02:45)
The mid-2000s saw a resurgence of innovation with the introduction of SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail). SPF allows email systems to specify authorized IP addresses for sending emails from their domains, while DKIM enables the digital signing of outgoing messages using DNS-stored public keys. These protocols were lauded for their seamless integration, requiring no action from end-users, as:
"The beauty of both the SPF and DKIM protocols is that common email users didn't have to do a thing. The checking is all done by the email systems themselves." (03:30)
While SPF and DKIM provided foundational security measures, they lacked comprehensive management and policy enforcement capabilities. DMARC was introduced to bridge this gap by adding feedback, policy, and identity alignment to the existing frameworks. Speaker B elaborates:
"DMARC makes it possible for email receiving systems to make firm decisions about which messages to reject and which to deliver." (04:05)
An illustrative example is provided where an email receiver at Thanos.com rejects a message purportedly from StarkEnterprises.com due to DMARC policies enforcing strict DKIM validation. This mechanism allows organizations to protect their brands from criminals and spies attempting to misuse their identities.
The implementation of DMARC offers multifaceted benefits:
Despite its advantages, DMARC implementation is not without challenges. Speaker B acknowledges that:
"DMARC, SPF, and DKIM can be intimidating to deploy. Incorrect implementation can lead to blocking legitimate email, and its unforgiving syntax can cause a host of errors if entered incorrectly." (05:20)
These complexities often deter organizations from adopting DMARC, as the potential for errors can disrupt legitimate email flow, impacting business operations.
To address the deployment hurdles, the Global Cyber Alliance has been instrumental in promoting DMARC adoption. By providing tools and resources, the alliance has facilitated the implementation of DMARC across thousands of organizations in over 180 countries, resulting in substantial savings by curbing business email compromises. This proactive approach underscores the collective effort required to enhance global email security standards.
A pivotal moment in the episode features insights from Philip Rettinger, the President and CEO of the Global Cyber Alliance. During the 2018 RSA Security Conference, Rettinger elucidates the strategic importance of DMARC for organizational leaders. He asserts:
"It seems like it's almost a no brainer that you'd want to do DMARC. I think it is a no brainer. It can be a challenge to deploy, but it's not that much of a challenge and it does a really good job of protecting your customers." (06:11)
Rettinger emphasizes that DMARC is particularly beneficial for CEOs, Chief Marketing Officers, and Chief Financial Officers, as it enhances the trustworthiness of their organization's email communications. However, he also highlights a market mismatch, pointing out that while CISOs understand the technical merits of DMARC, smaller vendors may delay adoption due to limited resources or competing priorities.
The episode of Hacking Humans provides an in-depth exploration of DMARC, elucidating its critical role in fortifying email security against sophisticated cyber threats. Through historical context, technical explanations, expert opinions, and real-world examples, listeners gain a holistic understanding of why DMARC is indispensable in today's digital communication landscape. The discussion underscores the necessity for organizations of all sizes to embrace DMARC, leveraging the support of alliances like the Global Cyber Alliance to navigate the complexities of its implementation and reap the substantial security benefits it offers.