Skip to main content

System Status: 

Email Fraud Defense

Learn how UC San Diego uses the SPF, DKIM, and DMARC email authentication protocols to help prevent email fraud.

Overview

Email addresses are easily spoofed. Spammers often take advantage of this to send email messages that impersonate trusted users, companies, organizations, and universities to mask their true identities. SPF, DKIM, and DMARC are all email authentication protocols that help prevent this type of email fraud.

Recent action taken by large commercial email providers to enforce the DMARC protocol means that UC San Diego affiliates may no longer use a non-university email account (e.g. Gmail) to 'send as' their university email alias (user@ucsd.edu) even with authentication to their campus account.

Sender Policy Framework (SPF)

Sender Policy Framework (SPF) allows a domain to define which mail systems are permitted to send emails on its behalf. SPF records may contain the mail system IP addresses of its domain as well as those of its partner domains that are trusted to send emails as the domain (such as a vended email system or a constituent relationship management (CRM) service like Salesforce). The SPF record is published in the domain's DNS records. An email server will query the SPF record from the domain's DNS records when it receives an email message with a sending address from that domain. A match authenticates the message as having originated from a trusted source on behalf of the sending domain.

DomainKeys Identified Mail (DKIM)

Using DomainKeys Identified Mail (DKIM), a domain provides a cryptographic signature in email messages it sends, and that signature can then be verified via a DNS record containing the public key. The DKIM signature contains both a domain identifier for the hosted public key record to query from DNS, and the selector to uniquely identify the email messages signed. This DKIM signature is added to the email headers of signed email messages.

A domain may publish multiple DKIM keys, and a domain may have multiple selectors. This permits the domain to configure multiple keys to distinguish and manage sending from different accounts and email servers. An email server receiving a signed email message will query the public DNS record according to the DKIM signature to verify that the domain from which it is purported to have been sent matches the signature.

Domain-based Message Authentication, Reporting & Conformance (DMARC)

Domain-based Message Authentication, Reporting & Conformance (DMARC) uses SPF and/or DKIM to verify that received email messages "align", and it also tells receiving email systems what action to take with received email messages based on what the domain publishes in the DMARC record. The DMARC record is published to the domain's DNS records. Without a DMARC record, email systems will act independently. Having a DMARC record puts the domain in control of how email messages are handled by other email systems.

DMARC permits a domain to tell email systems what to do with messages that do not "align" with their SPF and/or DKIM records. The three permitted options are:

  • Take no action: This option is often implemented during the information-gathering phase to collect reporting data from other domains about email messages being received.
  • Quarantine: This option recommends marking messages that do not align with SPF and/or DKIM as spam.
  • Reject: This option advises email servers not to accept email messages that do not align with SPF and/or DKIM.  

DMARC at UC San Diego

Information Technology Services (ITS) implemented DMARC to reduce phishing and expand our email security.

From early 2019, ITS monitored 'unauthenticated' email from the core @ucsd.edu email domain. This allowed ITS to identify sources of email using our domains, sort those sources for likely legitimate senders, and work with the senders to properly authenticate their use of our domain for DMARC compliance.  

In January 2020, DMARC was implemented in 'quarantine' mode. This means that @ucsd.edu email from unauthenticated sources will likely be classified as spam. ITS is closely monitoring for legitimate email coming from unauthenticated sources and will work with identified departments.

Emma External Email Service

While we previously took steps to authenticate identified external commercial email service vendors for department mailing purposes, UC San Diego now uses Emma for newsletters and email marketing campaigns.

You can create, share, and easily manage your mass email communications with Emma. It also allows you to reach specific groups of people and track your campaign's engagement with analytics. This service is provided at no cost as it was initially set up for the official campus notices, and we now offer the service to the rest of the university. We also provide pre-built templates with approved UCSD branding, which requires zero coding.

Please visit our email lists page to see Emma's key capabilities, find out how to request your own Emma subaccount, where to read their support articles, and review their email marketing guides.

Frequently Asked Questions

Q: I am not receiving important email from U.S. government agencies, including email from Department of Homeland Security and the National Science Foundation. I am being told that this is related to a DMARC policy.

A: DMARC was officially required by all U.S. government agencies in October 2018. Although, the implementation has been slow throughout these agencies, the pace has increased over the last six months. Most of the problems seen by UCSD faculty/staff/students is related to the forwarding of @ucsd.edu email to an external email account (personal Gmail, Hotmail, etc). 

It is important for you to know that if your campus email forwards to a personal email account, you may not receive emails from Federal agencies in that forwarded account. Any messages related to grants received, Federal grant opportunities, messages from government employees, etc., will not be delivered to your forwarded address. Please work with ITS or your local IT support to use a UCSD email account for this correspondence.