我有一个小程序,旨在检查这三个邮件记录是否存在以对抗欺骗。它似乎适用于特定域,但它们似乎是根据具体情况设置的。我的问题是检查这些记录的更可靠的方法是什么。代码在这里: https ://gist.github.com/amlwwalker/f445932d2fdb0f9f9a5e457c1894bf7d 示例:
瑞安航空:
result: v=spf1 a mx include:mail1.ryanair.com include:mail2.ryanair.com ~all
err: lookup _dmarc.ryanair.com on 172.16.4.1:53: no such host
err: lookup dkim._domainkey.ryanair.com on 172.16.4.1:53: no such host
瑞安航空电子邮件标题:
Authentication-Results: mx.google.com;
dkim=pass header.i=@care.ryanair.com;
spf=pass (google.com: domain of info@care.ryanair.com designates 209.235.250.215 as permitted sender) smtp.mailfrom=info@care.ryanair.com
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=15below; d=care.ryanair.com; h=MIME-Version:From:To:Date:Subject:Message-ID:Content-Type; i=info@care.ryanair.com; bh=MCorT6FfWGOmISJQSzdv4YLmKfg=; b=eXcQvy0odmzIAYy11bfM8OsoiXziin5E1hbWHvxlY6Q+KSpZr6/5OiUZ4EiNoCpNwFrciKB9Yj8G
wmZOZwxQd3PW05+2bnu+8oKMPij/AyAEAi2tJ0TBEZxM7BOsno84L3eZ0BQFZvog6bW9UQE1fJCQ
aoQYXPgsHV6dzWjmHYo=
所以对我来说,它看起来有 DKIM 和 SPF。该代码虽然没有找到 DKIM 记录。
marvelapp.com
result: v=spf1 include:mailgun.org include:spf.mandrillapp.com include:spf1 include:mail.zendesk.com include:spf.mail.intercom.io -all
err: lookup _dmarc.marvelapp.com on 172.16.4.1:53: no such host
err: lookup dkim._domainkey.marvelapp.com on 172.16.4.1:53: no such host
Marvelapp 电子邮件标题:
Received-SPF: pass (google.com: domain of ml-bounce-newsletter@ml.mailersend.com designates 31.193.196.244 as permitted sender) client-ip=31.193.196.244;
Authentication-Results: mx.google.com;
dkim=pass header.i=@ml.mailersend.com;
spf=pass (google.com: domain of ml-bounce-newsletter@ml.mailersend.com designates 31.193.196.244 as permitted sender) smtp.mailfrom=ml-bounce-newsletter@ml.mailersend.com
所以我不明白为什么在某些情况下 dkim._domainkey.domain.TLD 是找到 dkim 密钥的正确方法,有时它显然不是(谷歌似乎找到它,但是如何找到它?什么是最好的查看方式dkim 键了?
我基本上希望该代码段返回与在 Gmail 中“显示原始”相同的结果
谢谢