Configure Sender Policy Framework (SPF) to detect email spoofing and to send emails securely using Oracle Cloud Infrastructure Email Delivery service.
Sender Policy Framework (SPF) is used by email receivers to detect email spoofing. Using SPF, an email receiver can check if the Internet Protocol (IP) is explicitly authorized to send for that domain. SPF is implemented by publishing a special TXT record to a domain's DNS records. The TXT record declares which hosts are allowed to send mail on behalf of this domain. Receiving mail servers check the SPF records of sending domains to verify that the email's source IP address is authorized to send from that domain. Without SPF, a spam or phishing email can be "spoofed" to appear that the email comes from a legitimate domain. Domains that implement SPF are much more likely to block emails attempting to spoof your domain. For an overview of how SPF works, see Sender Policy Framework. For details on SPF record syntax, see SPF Record Syntax.
Approved senders can use a DKIM-configured sending domain to become verified. See Managing Approved Senders for information on how to add an approved sender.
The Approved Senders section within the Console provides validation of an SPF record for each of your approved senders. SPF is required for subdomains of
oraclegovcloud.com and recommended in other cases.
Don't add a subdomain or name in the SPF text records on an existing DNS zone.
v=spf1 include:rp.oracleemaildelivery.com ~all
v=spf1 include:ap.rp.oracleemaildelivery.com ~all
v=spf1 include:eu.rp.oracleemaildelivery.com ~all
|All Commercial Regions
v=spf1 include:rp.oracleemaildelivery.com include:ap.rp.oracleemaildelivery.com include:eu.rp.oracleemaildelivery.com ~all
The following is an example of a command used to view an SPF record:
dig -t TXT +short syd1.rp.oracleemaildelivery.com
"v=spf1 ip4:192.168.0.2/25 -all"