Email Authentication Check

crewportal.ca

This gap analysis verifies compliance with email authentication standards to protect against spoofing and phishing.

All data displayed is public and provided by the DNS system.

Last checked 2 days ago

0 out of 110
Needs Work

Domain Health Score

Your email authentication needs attention. Important security measures are missing or misconfigured.

Top Recommendation

+16

Upgrade DMARC policy to quarantine or reject for stronger protection

DMARC improvement

0

DMARC Check Results

19 / 50 points

Score Breakdown

DMARC record published
+10
Syntax valid
+5
None policy (monitoring only)
+4 / 20
Aggregate reporting (rua) not configured
0 / 10
Forensic reporting (ruf) not configured (optional)
0 / 5

Configuration issues detected

DMARC record is valid but no reporting email is configured.

Entry:

v=DMARC1; p=none

Without a reporting address (rua), you won't receive aggregate reports from email providers. These reports show who is sending email as your domain and whether authentication passes or fails.

Enable Reports Now

Great! You have a DMARC policy in place. Now start receiving reports in your own monitoring inbox to track email authentication results and identify potential issues.

  • Automated DMARC report processing every 5 minutes
  • Track all sending sources and authentication results
  • Email alerts when your DNS records change
0

BIMI Check (default selector)

0 / 20 points

Score Breakdown

BIMI record published (optional)
0 / 5

No BIMI Record Found

Publish a TXT record at default._bimi.crewportal.ca with v=BIMI1, logo URL (l=) and optional verified mark certificate (a=).

0

SPF Record Check Results

26 / 30 points

Score Breakdown

SPF record published
+10
Syntax valid
+5
Soft fail policy (~all)
+6 / 10
No configuration warnings
+5

SPF record is valid.

crewportal.ca TXT SPF Entry:

v=spf1 ip4:24.79.51.180 include:shaw.ca ~all

Syntax Check

OK

DNS Lookup Count

4 / 10 max

Root-level mechanisms requiring DNS queries: 1.

Void Lookups

0 / 2 max

Default Policy

~all

Soft fail: Mark emails from unauthorized servers as suspicious but don't reject

All Authorized IP Addresses

Grouped by DNS record source (includes and sub-includes)

crewportal.ca (Root SPF Record)
24.79.51.180

This record also contains:

include:shaw.ca
include:shaw.ca
3.97.99.32/31
3.97.99.42/31
64.59.134.0/25
64.59.136.128/27
204.209.208.40/31
204.209.208.150/28

This record also contains:

include:amazonses.com - Amazon SES
include:amazonses.com | Amazon SES
199.255.192.0/22
199.127.232.0/22
54.240.0.0/18
69.169.224.0/20
23.249.208.0/20
23.251.224.0/19
76.223.176.0/20
54.240.64.0/18
76.223.128.0/19
216.221.160.0/19
206.55.144.0/20
24.110.64.0/18

DNS Lookup Details

1
include:
shaw.ca
Valid

SPF record found

Lookup cost: 2
Included by crewportal.ca

TXT Record

v=spf1 mx ip4:3.97.99.32/31 ip4:3.97.99.42/31 ip4:64.59.134.0/25 ip4:64.59.136.128/27 ip4:204.209.208.40/31 ip4:204.209.208.150/28 include:amazonses.com ~all

Processed recursively per RFC 7208

2
mx:
shaw.ca
Resolved

MX records found: 1

Lookup cost: 2

MX Records:

shw-central.mx.a.cloudfilter.net (priority: 0) - A: 2, AAAA: 0
3
include:
amazonses.com | Amazon SES
Valid

SPF record found

Lookup cost: 0
Included by shaw.ca

TXT Record

v=spf1 ip4:199.255.192.0/22 ip4:199.127.232.0/22 ip4:54.240.0.0/18 ip4:69.169.224.0/20 ip4:23.249.208.0/20 ip4:23.251.224.0/19 ip4:76.223.176.0/20 ip4:54.240.64.0/18 ip4:76.223.128.0/19 ip4:216.221.160.0/19 ip4:206.55.144.0/20 ip4:24.110.64.0/18 -all

Processed recursively per RFC 7208

0

TLS Security

0 / 10 points

Score Breakdown

TLS-RPT record configured (optional)
0 / 5
MTA-STS policy configured (optional)
0 / 5

TLS-RPT (Reporting)

TLS-RPT Not Configured

Publish a TXT record at _smtp._tls.crewportal.ca with v=TLSRPTv1 and reporting URI (rua=).

MTA-STS (Policy)

MTA-STS Not Configured

Publish a TXT record at _mta-sts.crewportal.ca with v=STSv1 and policy ID (id=).

Know when your DNS records change

The check you just ran shows your current configuration. But DNS records change, sometimes without you knowing. A well-meaning IT change, a third-party provider update, or an unauthorized modification can break your email delivery overnight.

Configuration Drift

IT changes that accidentally break authentication

Provider Updates

Third-party services changing their SPF includes

Unauthorized Changes

Attackers modifying records to send as you

DMARCTrust monitors your DNS records continuously. When something changes, you get an email alert with exactly what changed and why it matters. No more surprises when customers complain their emails bounced.

Check Another Domain

Run a free email authentication check (DMARC, SPF, BIMI).

We will generate a shareable URL for your domain.

Try popular examples: google.com, amazon.com, booking.com

Explore other domains

Discover how other organizations configure their email authentication

Popular Domains

Frequently checked

Well-Configured

Reject policy + valid SPF

Showing domains checked by our users. All data is from public DNS records.

About This Checker

What we check

We analyze your domain's email authentication: DMARC policy and alignment, SPF record and includes, and BIMI logo/CV when present.

Why it matters

Healthy authentication improves delivery and blocks spoofing. Major inbox providers increasingly require DMARC and robust SPF/DKIM practices for senders.

Included features

  • DMARC syntax, policy, and reporting validation
  • SPF record evaluation and include analysis
  • DKIM/SPF alignment interpretation
  • BIMI record and VMC detection
  • Clear setup and remediation guidance

Related Tools

Monitor your email authentication 24/7

This check shows a snapshot. With DMARCTrust, you get continuous monitoring of your DMARC reports and DNS records, with instant alerts when something changes.