Skip to main content

https://technology.blog.gov.uk/2024/05/10/missing-the-pointer/

Missing the Point(er)

Posted by: , Posted on: - Categories: Security, Tools, Transformation

Image of postcard with numbers>words>numbers written on it

Email security policy for the UK Government has been fairly consistent for a while, so we were pleased when Google and Yahoo decided to tighten their email authentication requirements that align closely to our own guidance. One element that stands out however, is their requirement that all IP addresses must have a PTR (‘Pointer’ or ‘reverse DNS’) record. This is also in our guidance, but was a little buried until a recent update. 

What is a PTR?

They are a less well known but important part of the anti-spam toolkit, and we probably ought to give them more attention than we have up to now. Google and Yahoo may be tightening their approach, but most other email providers use PTR records in their checks as well.

PTR records provide some reassurance that a sender is well established and trustworthy. When an email is received the IP address is checked for its PTR record. Google states:

Every IP address must map to a hostname in the PTR record. The hostname specified in the PTR record must have a forward DNS that refers to the sending IP address.

This means the sending service has control of the IP address, the DNS associated with the IP address, and the sending hostname. Spammers are more likely to use short lived domains for sending, and spoof IP addresses, meaning they won’t be able to get valid PTR records in place.

A lack of good PTR records won’t always cause an email to be rejected, but it adds to the overall spam score and could be the thing that tips a message into the spam folder.

PTR in government

Improving email security is a collective effort in the UK Government, across teams including the Government Security Group in Cabinet Office, the National Cyber Security Centre (NCSC), us in the Central Digital and Data Office (CDDO), and the Government Security Centre for Cyber. We also get help with implementation in the local sector from Information Security for London (ISfL).

Across these organisations we’ve looked at email sending IP addresses and at IP addresses in Sender Policy Framework (SPF) records. These records list the email sending sources approved to send email for a domain. A review of SPF records across the sector shows there are problems. Many include email sending services that are out of use, or have changed IP addresses.

It is vital that genuine messages from government to citizens are delivered, so in CDDO, NCSC, and ISfL we’ve been doing some outreach to the organisations explaining the problem and providing help on how to fix it.

Identifying the problem

Spotting when a PTR record is missing or broken can be difficult, particularly if you don’t have great visibility of the services you use to send email. People in your organisation may notice email failing to deliver. It could be when they send from a particular source, like a mailing list service, or when they send to a particular provider like Google or Yahoo.

If you’re signed up to the NCSC’s Mail Check service (and if you look after email for a public sector organisation you definitely should be) you can send them your DMARC reports. Mail Check can tell you where problems lie, and specifically calls out when PTR records aren’t set up correctly.

Looking up PTR records

You can also check your records for yourself. If you have an IP address in your SPF record that’s a good place to start. You can use dig (the Domain Information Groper) or a web-based dig-like tool like the Google Admin toolbox or Dig web interface.

Enter the IP address of your sending email service and lookup the PTR record:

dig -x <your_ip_address>

and it should return an in-addr.arpa record pointing to a valid domain.

For example, Mail Chimp sends some of its email on behalf of customers from 148.105.10.6.  If we look up the PTR record for this:

dig -x 148.105.10.6

we get:

6.10.105.148.in-addr.arpa. 86400 IN PTR mail6.sea172.mcdlv.net.

If we then look for an A record of mail6.sea172.mcdlv.net.:

dig a mail6.sea172.mcdlv.net

we get:

mail6.sea172.mcdlv.net. 86400 IN A 148.105.10.6

So the IP address points to a valid hostname AND that domain points back to the same IP address. This tells us that both the hostname and the IP address are linked and under some level of shared control, making email sent from this address more trustworthy.

What is in-addr.arpa?

.in-addr.arpa domains are delegated to the owners of a network range. The owner of the IP address range also controls the DNS of the respective .in-addr.arpa domain and can create DNS records on it, including the all important PTR record.

Fixing the problem

If you find an IP address that doesn’t have working PTR record somewhere in your email sending services, you can look up the owner with the WHOIS command:

whois <your_ip_address>

or use a web based WHOIS lookup. For example, looking up the IP 148.105.10.6 again tells us it is delegated by ARIN (the American Registry of Internet Numbers) to MailChimp. There are five Regional Internet Registries (RIRs) providing Internet resource allocations, registration services and coordination activities for the internet. 

Once you know who owns the IP address you’ll need to contact them and ask them to put the PTR record in place. Some larger organisations or service providers may  own their own IP addresses. Others may be owned by an Internet Service Provider and leased to the organisation running the email service. Whoever owns it, they’ll need to add the record. This is a standard part of running a reliable email service and should always be provided.

Read my previous blogs on

Sharing and comments

Share this page

Leave a comment

We only ask for your email address so we know you're a real person

By submitting a comment you understand it may be published on this public website. Please read our privacy notice to see how the GOV.UK blogging platform handles your information.