<!-- NOTES - To make this 90% provide tests (testing through `dig` command)? --> <p>The <em>Sender Policy Framework</em> (SPF) is an open standard specifying a technical method to prevent sender address forgery.</p> <h2>DNS configuration</h2> <p>Set-up the following DNS record at your domain registrar:</p> <table> <thead> <tr> <th>Domain</th> <th style="text-align: center;">Type</th> <th style="text-align: right;">Content</th> </tr> </thead> <tbody> <tr> <td>@</td> <td style="text-align: center;">TXT</td> <td style="text-align: right;">v=spf1 mx -all</td> </tr> </tbody> </table> <blockquote> <p>:information_source: <em>The SPF record above tells that we use version <code>1</code> of <code>SPF</code>, that only the resolved <code>MX</code> address is allowed to send e-mails and that everything else should be blocked (<code>-all</code>)</em>.</p> <p>:information_source: Available options are explained on the <a href="http://www.openspf.org/SPF_Record_Syntax">Openspf site</a>.</p> </blockquote>