
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 06:12:05 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Launching email security insights on Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/email-security-insights-on-cloudflare-radar/</link>
            <pubDate>Fri, 08 Mar 2024 14:00:58 GMT</pubDate>
            <description><![CDATA[ The new Email Security section on Cloudflare Radar provides insights into the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67tt8jiqO9RDouWNc2IuIg/97e9e9233a7b20d7e134c0bc8083a014/image2-28.png" />
            
            </figure><p>During 2021's Birthday Week, we <a href="/introducing-email-routing">announced</a> our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">Email Routing</a> service, which allows users to direct different types of email messages (such as marketing, transactional, or administrative) to separate accounts based on criteria such as the recipient’s address or department. Its capabilities and the volume of messages routed have <a href="/email-routing-subdomains">grown significantly</a> since launch.</p><p>Just a few months later, on February 23, 2022, we announced our intent to acquire Area 1 Security to protect users from phishing attacks in email, web, and network environments. Since the completion of the acquisition on April 1, 2022, Area 1's email security capabilities have been integrated into Cloudflare's <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">secure access service edge (SASE)</a> solution portfolio, and now processes tens of millions of messages daily.</p><p>Processing millions of email messages each day on behalf of our customers gives us a unique perspective on the threats posed by malicious emails, spam volume, the adoption of <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">email authentication methods like SPF, DMARC, and DKIM</a>, and the use of IPv4/IPv6 and TLS by email servers. Today, we are launching a new <a href="https://radar.cloudflare.com/email-security">Email Security section</a> on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> to share these perspectives with you. The insights in this new section can help you better understand the state of email security as viewed across various metrics, as well as understanding real-time trends in email-borne threats. (For instance, correlating an observed increase within your organization in messages containing malicious links with a similar increase observed by Cloudflare.) Below, we review the new metrics that are now available on Radar.</p>
    <div>
      <h3>Tracking malicious email</h3>
      <a href="#tracking-malicious-email">
        
      </a>
    </div>
    <p>As Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> service processes email messages on behalf of customers, we are able to identify and classify offending messages as malicious. As examples, malicious emails may attempt to trick recipients into sharing personal information like login details, or the messages could attempt to spread malware through embedded images, links, or attachments. The new Email Security section on Cloudflare Radar now <a href="https://radar.cloudflare.com/email-security">provides insight</a> at a global level into the aggregate share of processed messages that we have classified as malicious over the selected timeframe. During <a href="https://radar.cloudflare.com/email-security?dateStart=2024-02-01&amp;dateEnd=2024-02-29">February 2024</a>, as shown in the figure below, we found that an average of 2.1% of messages were classified as being malicious. Spikes in malicious email volume were seen on February 10 and 11, accounting for as much as 29% of messages. These spikes occurred just ahead of the Super Bowl, in line with <a href="/super-bowl-lviii">previous observations</a> of increases in malicious email volume in the week ahead of the game. Other notable (but lower) spikes were seen on February 13, 15, 17, 24, and 25. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-malicious">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-malicious">time series</a> data for malicious email share are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39j34s8TPPt3cQj6j2ZTsF/73ec05c40f900a2c6f6ca37817fc2574/pasted-image-0-6.png" />
            
            </figure>
    <div>
      <h3>Threat categorization</h3>
      <a href="#threat-categorization">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/year-in-review/2023#top-email-threats">Cloudflare Radar 2023 Year in Review</a> highlighted some of the techniques used by attackers when carrying out attacks using malicious email messages. As noted above, these can include links or attachments leading to malware, as well as approaches like identity deception, where the message appears to be coming from a trusted contact, and brand impersonation, where the message appears to be coming from a trusted brand. In analyzing malicious email messages, Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> categorizes the threats that it finds these messages contain. (Note that a single message can contain multiple types of threats — the sender could be impersonating a trusted contact while the body of the email contains a link leading to a fake login page.)</p><p>Based on these assessments, Cloudflare Radar now <a href="https://radar.cloudflare.com/email-security#malicious-email-threat-categories">provides insights</a> into trends observed across several different groups of threat types including “Attachment”, “Link”, “Impersonation”, and “Other”. “Attachment” groups individual threat types where the attacker has attached a file to the email message, “Link” groups individual threat types where the attacker is trying to get the user to click on something, and “Impersonation” groups individual threat types where the attacker is impersonating a trusted brand or contact. The “Other” grouping includes other threat types not covered by the previous three.</p><p>During February 2024 for the “Link” grouping, as the figure below illustrates, link-based threats were unsurprisingly the most common, and were found in 58% of malicious emails. Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious. Nearly a third of malicious emails linked to something designed to harvest user credentials. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-threat-category">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-threat-category">time series</a> data for these threat categories are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ZVsVPQccuYKQjUpKcOoEq/88456640a317da1779b6867a77acdc64/pasted-image-0--1--3.png" />
            
            </figure><p>For the “Attachment” grouping, during February 2024, nearly 13% of messages were found to have a malicious attachment that when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker. The share spiked several times throughout the month, reaching as high as 70%. The attachments in nearly 6% of messages attempted to download additional software (presumably malware) once opened.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Akp5aqpIDDj99BdAsZ82C/f6dcf92dde82ff1fc72d58788b11240d/pasted-image-0--2--2.png" />
            
            </figure><p>If an email message appears to be coming from a trusted brand, users may be more likely to open it and take action, like checking the shipping status of a package or reviewing a financial transaction. During February 2024, on average, over a quarter of malicious emails were sent by attackers attempting to impersonate well-known brands. Similar to other threat categories, this one also saw a number of significant spikes, reaching as high as 88% of February 17. Just over 18% of messages were found to be trying to extort users in some fashion. It appears that such campaigns were very active in the week ahead of Valentine's Day (February 14), although the peak was seen on February 15, at over 95% of messages.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7H5mYJCU0Z2mWmY2zOoH7b/448feba0321f99e1079dc24db24e7911/Impersonation.png" />
            
            </figure><p>Identity deception occurs when an attacker or someone with malicious intent sends an email claiming to be someone else, whether through use of a similar-looking domain or display name manipulation. This was the top threat category for the “Other” grouping, seen in over 36% of malicious emails during February 2024. The figure below shows three apparent “waves” of the use of this technique — the first began at the start of the month, the second around February 9, and the third around February 20. Over 11% of messages were categorized as malicious because of the reputation of the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous system</a>) that they were sent from; some network providers are well-known sources of malicious and unwanted email.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3YFNUNtGqXHm2ORhNgIS0e/be2f047756c5bd6766c9336cb101d259/pasted-image-0--3--1.png" />
            
            </figure>
    <div>
      <h3>Dangerous domains</h3>
      <a href="#dangerous-domains">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/dns/top-level-domain/">Top-level domains, also known as TLDs</a>, are found in the right-most portion of a hostname. For example, <code>radar.cloudflare.com</code> is in the <code>.com</code> <a href="https://icannwiki.org/Generic_top-level_domain">generic Top Level Domain (gTLD)</a>, while <code>bbc.co.uk</code> is in the <code>.uk</code> <a href="https://icannwiki.org/Country_code_top-level_domain">country code Top Level Domain (ccTLD)</a>. As of February 2024, there are nearly 1600 Top Level Domains listed in the <a href="https://www.iana.org/domains/root/db">IANA Root Zone Database</a>. Over the last 15 years or so, several reports have been published that look at the “most dangerous TLDs” — that is, which TLDs are most favored by threat actors. The “top” TLDs in these reports are often a mix of ccTLDs from smaller counties and <a href="https://icannwiki.org/All_New_gTLD_Applications">newer gTLDs</a>. On Radar, we are now sharing our own perspective on these dangerous TLDs, highlighting those where we have observed the largest shares of malicious and spam emails. The analysis is based on the sending domain’s TLD, found in the <code>From:</code> header of an email message. For example, if a message came from <code>joe@example.com</code>, then <code>example.com</code> is the sending domain, and <code>.com</code> is the associated TLD.</p><p>On Radar, users can view shares of spam and malicious email, and can also filter by timeframe and “type” of TLD, with options to view all (the complete list), ccTLDs (country codes), or “classic” TLDs (the original set of gTLDs specified in <a href="https://www.rfc-editor.org/rfc/rfc1591.txt">RFC 1591</a>). Note that spam percentages shown here may be lower than those published in other industry analyses. Cloudflare cloud email security customers may be performing initial spam filtering before messages arrive at Cloudflare for processing, resulting in a lower percentage of messages characterized as spam by Cloudflare.</p><p>Looking back across February 2024, we found that new gTLD <code>associates</code> and the ccTLD <code>zw</code> (Zimbabwe) were the TLDs with domains originating the largest shares of malicious email, at over 85% each. New TLDs <code>academy</code>, <code>directory</code>, and <code>bar</code> had the largest shares of spam in email sent by associated domains, at upwards of 95%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2tvfVUvg028MjExbUn6DuB/bbe1206da0ba754aa03a41fcc87ab7f8/pasted-image-0--4-.png" />
            
            </figure><p><i>TLDs with the highest percentage of malicious email in February 2024</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VeBDm1f5fYRJqZdq0ho3b/fa692e8a0ec2d3ec8970d838fdd7b0c0/pasted-image-0--5-.png" />
            
            </figure><p><i>TLDs with the highest percentage of spam email in February 2024</i></p><p>The figure below breaks out ccTLDs, where we found that at least half of the messages coming from domains in <code>zw</code> (Zimbabwe, at 85%) and <code>bd</code> (Bangladesh, at 50%) were classified as malicious. While the share of malicious email vastly outweighed the share of spam seen from <code>zw</code> domains, it was much more balanced in <code>bd</code> and <code>pw</code> (Palau). A total of 80 ccTLDs saw fewer than 1% of messages classified as malicious in February 2024.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ngA84qYZiS1djPnyAN9K9/e7ddc092a349634b6a934ee4b8a5755e/pasted-image-0--6-.png" />
            
            </figure><p><i>ccTLDs with the highest percentage of malicious email in February 2024</i></p><p>Among the “classic” TLDs, we can see that the shares of both malicious emails and spam are relatively low. Perhaps unsurprisingly, as the largest TLD, <code>com</code> has the largest shares of both in February 2024. Given the restrictions around registering <a href="https://www.iana.org/domains/int"><code>int</code></a> and <a href="https://get.gov/domains/requirements/"><code>gov</code></a> domains, it is interesting to see that even 2% of the messages from associated domains are classified as malicious.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2iWhtYDtbuSikcDtmgGtn4/9c370938fe219018a75c13380ecb7ec7/pasted-image-0--7-.png" />
            
            </figure><p><i>Classic TLDs with the highest percentage of malicious email in February 2024.</i></p><p>The reasons that some TLDs are responsible for a greater share of malicious and/or spam email vary — some may have loose or non-existent registration requirements, some may be more friendly to so-called “<a href="https://icannwiki.org/Domain_tasting">domain tasting</a>”, and some may have particularly low domain registration fees.The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-top-tlds-by-malicious">malicious</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-top-tlds-by-spam">spam</a> summary shares per TLD are available through the Radar API.</p>
    <div>
      <h3>Adoption of email authentication methods</h3>
      <a href="#adoption-of-email-authentication-methods">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/en-gb/learning/email-security/dmarc-dkim-spf/">SPF, DKIM, and DMARC</a> are three email <a href="https://www.cloudflare.com/learning/access-management/what-is-authentication/">authentication</a> methods and when used together, they help prevent spammers, <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishers</a>, and other unauthorized parties from sending <a href="https://www.cloudflare.com/learning/email-security/what-is-email/">emails</a> on behalf of a <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain</a> they do not own.</p><p>Sender Policy Framework (SPF) is a way for a domain to list all the servers they send emails from, with <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF records</a> in the DNS listing the <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-my-ip-address/">IP addresses</a> of all the servers that are allowed to send emails from the domain. Mail servers that receive an email message can check it against the SPF record before passing it on to the recipient's inbox. DomainKeys Identified Mail (DKIM) enables domain owners to automatically "sign" emails from their domain with a digital “signature” that uses cryptography to mathematically verify that the email came from the domain. Domain-based Message Authentication Reporting and Conformance (DMARC) tells a receiving email server what to do, given the results after checking SPF and DKIM. A domain's DMARC policy, stored in <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC records</a>, can be set in a variety of ways, instructing mail servers to quarantine emails that fail SPF or DKIM (or both), to reject such emails, or to deliver them.</p><p>These authentication methods have recently taken on increased importance, as both <a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/">Google</a> and <a href="https://blog.postmaster.yahooinc.com/post/730172167494483968/more-secure-less-spam">Yahoo!</a> have announced that during the first quarter of 2024, as part of a more aggressive effort to reduce spam, they will require bulk senders to follow <a href="https://senders.yahooinc.com/best-practices/">best practices</a> that include implementing stronger email authentication using standards like SPF, DKIM, and DMARC. When a given email message is evaluated against these three methods, the potential outcomes are PASS, FAIL, and NONE. The first two are self-explanatory, while NONE means that there was no associated SPF/DKIM/DMARC policy associated with the message’s sending domain.</p><p>Reviewing the average shares across February 2024, we find that over 93% of messages passed SPF authentication, while just 2.7% failed. When considering this metric, FAIL is the outcome of greater interest because SPF is easier to spoof than DKIM, and also because failure may be driven by “shadow IT” situations, such as when a company’s Marketing department uses a third party to send email on behalf of the company, but fails to add that third party to the associated SPF records. An average of 88.5% of messages passed DKIM evaluation in February, while just 2.1% failed. For DKIM, the focus should be on PASS, as there are potential non-malicious reasons that a given signature may fail to verify. For DMARC, 86.5% of messages passed authentication, while 4.2% failed, and the combination of PASS and FAIL is the focus, as the presence of an associated policy is of greatest interest for this metric, and whether the message passed or failed less so. For all three methods in this section, NONE indicates the lack of an associated policy. SPF (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-spf">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-spf">time series</a>), DKIM (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-dkim">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-dkim">time series</a>), and DMARC (<a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-dmarc">summary</a>, <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-dmarc">time series</a>) data is available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7D1Kfig1lHwIgoEJ3XGx8i/9ceba12b2bff559d648382e53e0412d2/Screenshot-2024-03-08-at-12.51.49.png" />
            
            </figure>
    <div>
      <h3>Protocol usage</h3>
      <a href="#protocol-usage">
        
      </a>
    </div>
    <p>Cloudflare has <a href="/introducing-cloudflares-automatic-ipv6-gatewa/">long evangelized IPv6 adoption</a>, although it has largely been focused on making Web resources available via this <a href="https://datatracker.ietf.org/doc/html/rfc2460">not-so-new version</a> of the protocol. However, it’s also important that other Internet services begin to support and use IPv6, and this is an area where <a href="/ipv6-from-dns-pov/">our recent research</a> shows that providers may be lacking.</p><p>Through analysis of inbound connections from senders’ mail servers to Cloudflare’s email servers, we can gain insight into the distribution of these connections across IPv4 and IPv6. Looking at this distribution for February 2024, we find that 95% of connections were made over IPv4, while only 5% used IPv6. This distribution is in sharp contrast to the share of IPv6 requests for IPv6-capable (dual stacked) Web content, which was 37% <a href="https://radar.cloudflare.com/adoption-and-usage?dateStart=2024-02-01&amp;dateEnd=2024-02-29#i-pv4-vs-i-pv6">for the same time period</a>. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-routing-summary-by-ip-version">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-routing-timeseries-group-by-ip-version">time series</a> data for IPv4/v6 distribution are available through the Radar API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BLLzGXJ18q7LFhuRteSmG/762a81b2a5a590a69c6efd6cf0e02f02/Screenshot-2024-03-08-at-12.52.26.png" />
            
            </figure><p>Cloudflare has also been a long-time advocate for secure connections, launching <a href="/introducing-universal-ssl/">Universal SSL</a> during 2014’s Birthday Week, to enable secure connections between end users and Cloudflare for all of our customers’ sites (which numbered ~2 million at the time). Over the last 10 years, SSL has completed its evolution to <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a>, and although many think of TLS as only being relevant for Web content, possibly due to years of being told to look for the 🔒 padlock in our browser’s address bar, TLS is also used to encrypt client/server connections across other protocols including SMTP (email), FTP (file transfer), and XMPP (messaging).</p><p>Similar to the IPv4/v6 analysis discussed above, we can also calculate the share of inbound connections to Cloudflare’s email servers that are using TLS. Messages are encrypted in transit when the connection is made over TLS, while messages sent over unencrypted connections can potentially be read or modified in transit. Fortunately, the vast majority of messages received by Cloudflare’s email servers are made over encrypted connections, with just 6% sent unencrypted during February 2024. The <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-summary-by-tls-version">summary</a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-email-security-timeseries-group-by-tls-version">time series</a> data for TLS usage are available through the Radar API.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Although younger Internet users may eschew email in favor of communicating through a variety of messaging apps, email remains an absolutely essential Internet service, relied on by individuals, enterprises, online and offline retailers, governments, and more. However, because email is so ubiquitous, important, and inexpensive, it has also become an attractive threat vector. Cloudflare’s email <a href="https://www.cloudflare.com/developer-platform/email-routing/">routing</a> and <a href="https://www.cloudflare.com/zero-trust/products/email-security/">security</a> services help customers manage and secure their email, and Cloudflare Radar’s new <a href="https://radar.cloudflare.com/email-security">Email Security section</a> can help security researchers, email administrators, and other interested parties understand the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email.</p><p>If you have any questions about this new section, you can contact the Cloudflare Radar team at <a>radar@cloudflare.com</a> or on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X/Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky).</p><div>
  
</div><p>Tune in for more news, announcements and thought-provoking discussions! Don't miss the full <a href="https://cloudflare.tv/shows/security-week">Security Week hub page</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">7oGmED46jTkj7AiKDzGujo</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Routing subdomain support, new APIs and security protocols]]></title>
            <link>https://blog.cloudflare.com/email-routing-subdomains/</link>
            <pubDate>Thu, 26 Oct 2023 13:10:06 GMT</pubDate>
            <description><![CDATA[ It's been two years since we announced Email Routing, our solution to create custom email addresses for your domains and route incoming emails to your preferred mailbox. Since then, the team has worked hard to evolve the product and add more powerful features to meet our users' expectations.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>It's been two years since we announced Email Routing, our solution to create custom email addresses for your domains and route incoming emails to your preferred mailbox. Since then, the team has worked hard to evolve the product and add more powerful features to meet our users' expectations. Examples include <a href="/announcing-route-to-workers/">Route to Workers</a>, which allows you to <a href="https://developers.cloudflare.com/email-routing/email-workers/">process your Emails programmatically</a> using Workers scripts, <a href="/email-routing-leaves-beta/">Public APIs</a>, Audit Logs, or <a href="/dmarc-management/">DMARC Management</a>.</p><p>We also made significant progress in supporting more email security extensions and protocols, protecting our customers from unwanted traffic, and keeping our IP space reputation for email egress impeccable to maximize our deliverability rates to whatever inbox upstream provider you chose.</p><p>Since <a href="/email-routing-leaves-beta/">leaving beta</a>, Email Routing has grown into one of our most popular products; it’s used by more than one million different customer zones globally, and we forward around 20 million messages daily to every major email platform out there. Our product is mature, robust enough for general usage, and suitable for any production environment. And it keeps evolving: today, we announce three new features that will help make Email Routing more secure, flexible, and powerful than ever.</p>
    <div>
      <h2>New security protocols</h2>
      <a href="#new-security-protocols">
        
      </a>
    </div>
    <p>The SMTP email protocol has been around since the early 80s. Naturally, it wasn't designed with the best security practices and requirements in mind, at least not the ones that the Internet expects today. For that reason, several protocol revisions and extensions have been standardized and adopted by the community over the years. Cloudflare is known for being an early adopter of promising emerging technologies; Email Routing already <a href="https://developers.cloudflare.com/email-routing/postmaster/">supports</a> things like SPF, DKIM signatures, DMARC policy enforcement, TLS transport, STARTTLS, and IPv6 egress, to name a few. Today, we are introducing support for two new standards to help <a href="https://www.cloudflare.com/zero-trust/products/email-security/">increase email security</a> and improve deliverability to third-party upstream email providers.</p>
    <div>
      <h3>ARC</h3>
      <a href="#arc">
        
      </a>
    </div>
    <p><a href="https://arc-spec.org/">Authenticated Received Chain</a> (ARC) is an email authentication system designed to allow an intermediate email server (such as Email Routing) to preserve email authentication results. In other words, with ARC, we can securely preserve the results of validating sender authentication mechanisms like SPF and DKIM, which we support when the email is received, and transport that information to the upstream provider when we forward the message. ARC establishes a chain of trust with all the hops the message has passed through. So, if it was tampered with or changed in one of the hops, it is possible to see where by following that chain.</p><p>We began rolling out ARC support to Email Routing a few weeks ago. Here’s how it works:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67xk7IFzgYjOSwQEqUSbY/d48e08b735580f20fcafca988bb43748/pasted-image-0--1--2.png" />
            
            </figure><p>As you can see, <code>joe@example.com</code> sends an Email to <code>henry@domain.example</code>, an Email Routing address, which in turn is forwarded to the final address, <code>example@gmail.com</code>.</p><p>Email Routing will use <code>@example.com</code>’s DMARC policy to check the SPF and DKIM alignments (SPF, DKIM, and DMARC <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">help authenticate</a> email senders by verifying that the emails came from the domain that they claim to be from.) It then stores this authentication result by adding a <code>Arc-Authentication-Results</code> header in the message:</p>
            <pre><code>ARC-Authentication-Results: i=1; mx.cloudflare.net; dkim=pass header.d=cloudflare.com header.s=example09082023 header.b=IRdayjbb; dmarc=pass header.from=example.com policy.dmarc=reject; spf=none (mx.cloudflare.net: no SPF records found for postmaster@example.com) smtp.helo=smtp.example.com; spf=pass (mx.cloudflare.net: domain of joe@example.com designates 2a00:1440:4824:20::32e as permitted sender) smtp.mailfrom=joe@example.com; arc=none smtp.remote-ip=2a00:1440:4824:20::32e</code></pre>
            <p>Then we take a snapshot of all the headers and the body of the original message, and we generate an <code>Arc-Message-Signature</code> header with a DKIM-like cryptographic signature (in fact ARC uses the same DKIM keys):</p>
            <pre><code>ARC-Message-Signature: i=1; a=rsa-sha256; s=2022; d=email.cloudflare.net; c=relaxed/relaxed; h=To:Date:Subject:From:reply-to:cc:resent-date:resent-from:resent-to :resent-cc:in-reply-to:references:list-id:list-help:list-unsubscribe :list-subscribe:list-post:list-owner:list-archive; t=1697709687; bh=sN/+...aNbf==;</code></pre>
            <p>Finally, before forwarding the message to <code>example@gmail.com</code>, Email Routing generates the <code>Arc-Seal</code> header, another DKIM-like signature, composed out of the <code>Arc-Authentication-Results</code> and <code>Arc-Message-Signature</code>, and cryptographically “seals” the message:</p>
            <pre><code>ARC-Seal: i=1; a=rsa-sha256; s=2022; d=email.cloudflare.net; cv=none; b=Lx35lY6..t4g==;</code></pre>
            <p>When Gmail receives the message from Email Routing, it not only normally authenticates the last hop domain.example domain (Email Routing uses <a href="https://developers.cloudflare.com/email-routing/postmaster/#sender-rewriting">SRS</a>), but it also checks the ARC seal header, which provides the authentication results of the original sender.</p><p>ARC increases the traceability of the message path through email intermediaries, allowing for more informed delivery decisions by those who receive emails as well as higher deliverability rates for those who transport them, like Email Routing. It has been adopted by all the major email providers like <a href="https://support.google.com/a/answer/175365?hl=en">Gmail</a> and Microsoft. You can read more about the ARC protocol in the <a href="https://datatracker.ietf.org/doc/html/rfc8617">RFC8617</a>.</p>
    <div>
      <h3>MTA-STS</h3>
      <a href="#mta-sts">
        
      </a>
    </div>
    <p>As we said earlier, SMTP is an old protocol. Initially Email communications were done in the clear, in plain-text and unencrypted. At some point in time in the late 90s, the email providers community standardized STARTTLS, also known as Opportunistic TLS. The <a href="https://datatracker.ietf.org/doc/html/rfc3207">STARTTLS extension</a> allowed a client in a SMTP session to upgrade to TLS encrypted communications.</p><p>While at the time this seemed like a step forward in the right direction, we later found out that because STARTTLS can start with an unencrypted plain-text connection, and that can be hijacked, the protocol is <a href="https://lwn.net/Articles/866481/">susceptible to man-in-the-middle attacks</a>.</p><p>A few years ago MTA Strict Transport Security (<a href="https://datatracker.ietf.org/doc/html/rfc8461">MTA-STS</a>) was introduced by email service providers including Microsoft, Google and Yahoo as a solution to protect against downgrade and man-in-the-middle attacks in SMTP sessions, as well as solving the lack of security-first communication standards in email.</p><p>Suppose that <code>example.com</code> uses Email Routing. Here’s how you can enable MTA-STS for it.</p><p>First, log in to the <a href="https://dash.cloudflare.com/">Cloudflare dashboard</a> and select your account and zone. Then go to <b>DNS</b> &gt; <b>Records</b> and create a new CNAME record with the name “<code>_mta-sts</code>” that points to Cloudflare’s record “<code>_mta-sts.mx.cloudflare.net</code>”. Make sure to disable the proxy mode.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4czTYhSi9X5kPU3TZ0m861/e7d8162ff6f40494ce6d11fbf5899dad/pasted-image-0-2.png" />
            
            </figure><p>Confirm that the record was created:</p>
            <pre><code>$ dig txt _mta-sts.example.com
_mta-sts.example.com.	300	IN	CNAME	_mta-sts.mx.cloudflare.net.
_mta-sts.mx.cloudflare.net. 300	IN	TXT	"v=STSv1; id=20230615T153000;"</code></pre>
            <p>This tells the other end client that is trying to connect to us that we support MTA-STS.</p><p>Next you need an HTTPS endpoint at <code>mta-sts.example.com</code> to serve your policy file. This file defines the mail servers in the domain that use MTA-STS. The reason why HTTPS is used here instead of DNS is because not everyone uses DNSSEC yet, so we want to avoid another MITM attack vector.</p><p>To do this you need to deploy a very simple Worker that allows Email clients to pull Cloudflare’s Email Routing <a href="https://mta-sts.mx.cloudflare.net/.well-known/mta-sts.txt">policy</a> file using the <a href="https://en.wikipedia.org/wiki/Well-known_URI">“well-known” URI</a> convention. Go to your <b>Account</b> &gt; <b>Workers &amp; Pages</b> and press <b>Create Application</b>. Pick the “MTA-STS” template from the list.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6BBFtG8hiHehJw74L2DbHX/d2afee1d61f266382082c08681e05e1a/pasted-image-0--2--2.png" />
            
            </figure><p>This Worker simply proxies <code>https://mta-sts.mx.cloudflare.net/.well-known/mta-sts.txt</code> to your own domain. After deploying it, go to the Worker configuration, then <b>Triggers</b> &gt; <b>Custom Domains</b> and <b>Add Custom Domain</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7MWHc7AuevDzxafJ0gfaFb/f659d8c0ae8c30f9a1457bc4b20f3535/customdomains.png" />
            
            </figure><p>You can then confirm that your policy file is working:</p>
            <pre><code>$ curl https://mta-sts.example.com/.well-known/mta-sts.txt
version: STSv1
mode: enforce
mx: *.mx.cloudflare.net
max_age: 86400</code></pre>
            <p>This says that we enforce MTA-STS. Capable email clients will only deliver email to this domain over a secure connection to the specified MX servers. If no secure connection can be established the email will not be delivered.</p><p>Email Routing also supports MTA-STS upstream, which greatly improves security when forwarding your Emails to service providers like <a href="https://support.google.com/a/answer/9261504?hl=en">Gmail</a> or <a href="https://learn.microsoft.com/en-us/purview/enhancing-mail-flow-with-mta-sts">Microsoft</a>, and others.</p><p>While enabling MTA-STS involves a few steps today, we plan to simplify things for you and automatically configure MTA-STS for your domains from the Email Routing dashboard as a future improvement.</p>
    <div>
      <h2>Sending emails and replies from Workers</h2>
      <a href="#sending-emails-and-replies-from-workers">
        
      </a>
    </div>
    <p>Last year we announced <a href="https://developers.cloudflare.com/email-routing/email-workers/">Email Workers</a>, allowing anyone using Email Routing to associate a Worker script to an Email address rule, and programmatically process their incoming emails in any way they want. <a href="https://developers.cloudflare.com/workers/">Workers</a> is our serverless compute platform, it provides hundreds of features and APIs, like <a href="https://developers.cloudflare.com/workers/databases/">databases</a> and <a href="https://developers.cloudflare.com/r2/api/workers/workers-api-reference/">storage</a>. Email Workers opened doors to a flood of use-cases and applications that weren’t possible before like implementing allow/block lists, advanced rules, notifications to messaging applications, honeypot aggregators and more.</p><p>Still, you could only act on the incoming email event. You could read and process the email message, you could even manipulate and create some headers, but you couldn’t rewrite the body of the message or create new emails from scratch.</p><p>Today we’re announcing two new powerful Email Workers APIs that will further enhance what you can do with Email Routing and Workers.</p>
    <div>
      <h3>Send emails from Workers</h3>
      <a href="#send-emails-from-workers">
        
      </a>
    </div>
    <p>Now you can send an email from any Worker, from scratch, whenever you want, not just when you receive incoming messages, to any email address verified on Email Routing under your account. Here are a few practical examples where sending email from Workers to your verified addresses can be helpful:</p><ul><li><p>Daily digests with the news from your favorite publications.</p></li><li><p>Alert messages whenever the weather conditions are adverse.</p></li><li><p>Automatic notifications when systems complete tasks.</p></li><li><p>Receive a message composed of the inputs of a form online on a contact page.</p></li></ul><p>Let's see a simple example of a Worker sending an email. First you need to create “<code>send_email</code>” bindings in your wrangler.toml configuration:</p>
            <pre><code>send_email = [
    {type = "send_email", name = "EMAIL_OUT"}
 ]</code></pre>
            <p>And then creating a new message and sending it in a Workers is as simple as:</p>
            <pre><code>import { EmailMessage } from "cloudflare:email";
import { createMimeMessage } from "mimetext";

export default {
 async fetch(request, env) {
   const msg = createMimeMessage();
   msg.setSender({ name: "Workers AI story", addr: "joe@example.com" });
   msg.setRecipient("mary@domain.example");
   msg.setSubject("An email generated in a worker");
   msg.addMessage({
       contentType: 'text/plain',
       data: `Congratulations, you just sent an email from a worker.`
   });

   var message = new EmailMessage(
     "joe@example.com",
     "mary@domain.example",
     msg.asRaw()
   );
   try {
     await env.EMAIL_OUT.send(message);
   } catch (e) {
     return new Response(e.message);
   }

   return new Response("email sent!");
 },
};</code></pre>
            <p>This example makes use of <a href="https://muratgozel.github.io/MIMEText/">mimetext</a>, an open-source raw email message generator.</p><p>Again, for security reasons, you can only send emails to the addresses for which you confirmed ownership in Email Routing under your Cloudflare account. If you’re looking for sending email campaigns or newsletters to destination addresses that you do not control or larger subscription groups, you should consider other options like our <a href="/sending-email-from-workers-with-mailchannels/">MailChannels integration</a>.</p><p>Since sending Emails from Workers is not tied to the EmailEvent, you can send them from any type of Worker, including <a href="https://developers.cloudflare.com/workers/configuration/cron-triggers/">Cron Triggers</a> and <a href="https://developers.cloudflare.com/durable-objects/">Durable Objects</a>, whenever you want, you control all the logic.</p>
    <div>
      <h3>Reply to emails</h3>
      <a href="#reply-to-emails">
        
      </a>
    </div>
    <p>One of our most-requested features has been to provide a way to programmatically respond to incoming emails. It has been possible to do this with Email Workers in a very limited capacity by returning a permanent SMTP error message — but this may or may not be visible to the end user depending on the client implementation.</p>
            <pre><code>export default {
  async email(message, env, ctx) {
      message.setReject("Address not allowed");
  }
}
</code></pre>
            <p>As of today, you can now truly reply to incoming emails with another new message and implement smart auto-responders programmatically, adding any content and context in the main body of the message. Think of a customer support email automatically generating a ticket and returning the link to the sender, an out-of-office reply with instructions when you're on vacation, or a detailed explanation of why you rejected an email. Here’s a code example:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NgbXFwy3Xw0VHLemZ4smZ/682a581c21af850880fada5bbc17e99f/Screenshot-2023-10-26-at-12.05.33.png" />
            
            </figure><p>To mitigate security risks and abuse, replying to incoming emails has a few requirements:</p><ul><li><p>The incoming email has to have valid DMARC.</p></li><li><p>The email can only be replied to once.</p></li><li><p>The <code>In-Reply-To</code> header of the reply message must match the <code>Message-ID</code> of the incoming message.</p></li><li><p>The recipient of the reply must match the incoming sender.</p></li><li><p>The outgoing sender domain must match the same domain that received the email.</p></li></ul><p>If these and other internal conditions are not met, then <code>reply()</code> will fail with an exception, otherwise you can freely compose your reply message and send it back to the original sender.</p><p>For more information the documentation to these APIs is available in our <a href="https://developers.cloudflare.com/email-routing/email-workers/runtime-api/">Developer Docs</a>.</p>
    <div>
      <h2>Subdomains support</h2>
      <a href="#subdomains-support">
        
      </a>
    </div>
    <p>This is a big one.</p><p>Email Routing is a <a href="https://developers.cloudflare.com/fundamentals/concepts/accounts-and-zones/#zones">zone-level</a> feature. A zone has a <a href="https://www.cloudflare.com/learning/dns/top-level-domain/">top-level domain</a> (the same as the zone name) and it can have subdomains (managed under the DNS feature.) As an example, I can have the <code>example.com</code>  zone, and then the <code>mail.example.com</code> and <code>corp.example.com</code> subdomains under it. However, we can only use Email Routing with the top-level domain of the zone, <code>example.com</code> in this example. While this is fine for the vast majority of use cases, some customers — particularly bigger organizations with complex email requirements — have asked for more flexibility.</p><p>This changes today. Now you can use Email Routing with any subdomain of any zone in your account. To make this possible we redesigned the dashboard UI experience to make it easier to get you started and manage all your Email Routing domains and subdomains, rules and destination addresses in one single place. Let’s see how it works.</p><p>To add Email Routing features to a new subdomain, log in to the <a href="https://dash.cloudflare.com/">Cloudflare dashboard</a> and select your account and zone. Then go to <b>Email</b> &gt; <b>Email Routing</b> &gt; <b>Settings</b> and click “Add subdomain”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1WwS0LP1o8Ijlk0IzcqzCE/8528ed0f90a34029777d66b411d9e696/prev-req-rec.png" />
            
            </figure><p>Once the subdomain is added and the DNS records are configured, you can see it in the <b>Settings</b> list under the <b>Subdomains</b> section:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gwBTgYQ36QxcvCGHfBqEd/450707647df2a8277eb0dc66e966088e/Domain.png" />
            
            </figure><p>Now you can go to <b>Email</b> &gt; <b>Email Routing</b> &gt; <b>Routing rules</b> and create new custom addresses that will show you the option of using either the top domain of the zone or any other configured subdomain.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1KJ9AIM6MpcaYeV5IrVZQw/1e306de0bd46177eb2601e8e4e600930/Screenshot-2023-10-25-at-11.55.31-AM.png" />
            
            </figure><p>After the new custom address for the subdomain is created you can see it in the list with all the other addresses, and manage it from there.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vEJFroWoVivSr9n6SwPVl/28a4938f201e4153c964895d4687f1b2/custom-addresses.png" />
            
            </figure><p>It’s this easy.</p>
    <div>
      <h2>Final words</h2>
      <a href="#final-words">
        
      </a>
    </div>
    <p>We hope you enjoy the new features that we are announcing today. Still, we want to be clear: there are no changes in pricing, and Email Routing is still free for Cloudflare customers.</p><p>Ever since Email Routing was launched, we’ve been listening to customers’ feedback and trying to adjust our roadmap to both our requirements and their own ideas and requests. Email shouldn't be difficult; our goal is to listen, learn and keep improving the <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> with better, more powerful features.</p><p>You can find detailed information about the new features and more in our Email Routing <a href="https://developers.cloudflare.com/email-routing">Developer Docs</a>.</p><p>If you have any questions or feedback about Email Routing, please come see us in the <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">Cloudflare Community</a> and the <a href="https://discord.gg/cloudflaredev">Cloudflare Discord</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1OKqc3VieWKGRFBDtPU7io/18e8d2db548d341b0cb78a111aaa8480/Email-Routing-spot.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email Workers]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <category><![CDATA[Developers]]></category>
            <guid isPermaLink="false">54W5SKQEt6kELFJMaWSRyh</guid>
            <dc:creator>Celso Martinho</dc:creator>
            <dc:creator>André Cruz</dc:creator>
            <dc:creator>Nelson Duarte</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Routing leaves Beta]]></title>
            <link>https://blog.cloudflare.com/email-routing-leaves-beta/</link>
            <pubDate>Tue, 25 Oct 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today Email Routing leaves Beta and an update on all the new things we've been adding to the service, including behind-the-scenes and not-so-visible improvements ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Email Routing was <a href="/introducing-email-routing/">announced</a> during Birthday Week in 2021 and has been available for free to every Cloudflare customer since early this year. When we launched in beta, we set out to make a difference and provide the most <a href="/migrating-to-cloudflare-email-routing/">uncomplicated</a>, more powerful <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">email forwarding service</a> on the Internet for all our customers, for free.</p><p>We feel we've met and <a href="https://w3techs.com/technologies/details/em-cloudflare">surpassed</a> our goals for the first year. Cloudflare Email Routing is now one of our most popular features and a top leading email provider. We are processing email traffic for more than 550,000 inboxes and forwarding an average of two million messages daily, and still growing month to month.</p><p>In February, we also announced that we were <a href="/why-we-are-acquiring-area-1/">acquiring</a> Area1. Merging their team, products, and know-how with Cloudflare was a significant step in strengthening our <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Email Security</a> capabilities.</p><p>All this is good, but what about more features, you ask?</p><p>The team has been working hard to enhance Email Routing over the last few months. <b>Today Email Routing leaves beta.</b></p><p>Also, we feel that this could be a good time to give you an update on all the new things we've been adding to the service, including behind-the-scenes and not-so-visible improvements.</p><p>Let’s get started.</p>
    <div>
      <h3>Public API and Terraform</h3>
      <a href="#public-api-and-terraform">
        
      </a>
    </div>
    <p>Cloudflare has a strong API-first philosophy. All of our services expose their primitives in our vast API catalog and gateway, which we then “dogfood” extensively. For instance, our customer's configuration dashboard is built entirely on top of these APIs.</p><p>The Email Routing APIs didn't quite make it to this catalog on day one and were kept private and undocumented for a while. This summer we made those APIs <a href="https://api.cloudflare.com/#email-routing-destination-addresses-properties">available</a> on the public Cloudflare API catalog. You can programmatically use them to manage your destination emails, rules, and other Email Routing settings. The methods' definitions and parameters are documented, and we provide <a href="https://curl.se/">curl</a> examples if you want to get your hands dirty quickly.</p><p>Even better, if you're an infrastructure as code type of user and use Terraform to configure your systems automatically, we have you covered too. The latest releases of <a href="https://registry.terraform.io/providers/cloudflare/cloudflare/">Cloudflare's Terraform provider</a> now <a href="https://github.com/cloudflare/terraform-provider-cloudflare/tree/master/internal/provider">incorporate</a> the Email Routing API resources, which you can use with <a href="https://www.terraform.io/language/syntax/configuration">HCL</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/oPdbQSpCrGdInWwSmc3Gz/bfa929155775e78998b86f6149b6ed9d/image4-11.png" />
            
            </figure>
    <div>
      <h3>IPv6 egress</h3>
      <a href="#ipv6-egress">
        
      </a>
    </div>
    <p>IPv6 adoption is on a <a href="https://radar.cloudflare.com/reports/ipv6">sustained growth</a> path. Our latest IPv6 adoption report shows that we're nearing the 30% penetration figure globally, with some countries, where mobile usage is prevalent, exceeding the 50% mark. Cloudflare has offered full IPv6 support <a href="/introducing-cloudflares-automatic-ipv6-gatewa/">since 2011</a> as it aligns entirely with our mission to help build a better Internet.</p><p>We are IPv6-ready across the board in our network and our products, and Email Routing has had IPv6 ingress support since day one.</p>
            <pre><code>➜  ~ dig celso.io MX +noall +answer
celso.io.		300	IN	MX	91 isaac.mx.cloudflare.net.
celso.io.		300	IN	MX	2 linda.mx.cloudflare.net.
celso.io.		300	IN	MX	2 amir.mx.cloudflare.net.
➜  ~ dig linda.mx.cloudflare.net AAAA +noall +answer
linda.mx.cloudflare.net. 300	IN	AAAA	2606:4700:f5::b
linda.mx.cloudflare.net. 300	IN	AAAA	2606:4700:f5::c
linda.mx.cloudflare.net. 300	IN	AAAA	2606:4700:f5::d</code></pre>
            <p>More recently, we closed the loop and added egress IPv6 as well. Now we also use IPv6 when sending emails to upstream servers. If the MX server to which an email is being forwarded supports IPv6, then we will try to use it. <a href="https://en.wikipedia.org/wiki/Comparison_of_webmail_providers">Gmail</a> is one good example of a high traffic destination that has IPv6 MX records.</p>
            <pre><code>➜  ~ dig gmail.com MX +noall +answer
gmail.com.		3362	IN	MX	30 alt3.gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	5 gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	10 alt1.gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	20 alt2.gmail-smtp-in.l.google.com.
gmail.com.		3362	IN	MX	40 alt4.gmail-smtp-in.l.google.com.
➜  ~ dig gmail-smtp-in.l.google.com AAAA +noall +answer
gmail-smtp-in.l.google.com. 116	IN	AAAA	2a00:1450:400c:c03::1a</code></pre>
            <p>We’re happy to report that we’re now delivering most of our email to upstreams using IPv6.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fpqLS2x7AzUJBHUfBd1Vw/65e0089ca141515c51b2ff2df5a4716e/image1-22.png" />
            
            </figure>
    <div>
      <h3>Observability</h3>
      <a href="#observability">
        
      </a>
    </div>
    <p>Email Routing is effectively another system that sits in the middle of the life of an email message. No one likes to navigate blindly, especially when using and depending on critical services like email, so it's our responsibility to provide as much observability as possible about what's going on when messages are transiting through our network.</p><p>End to end email deliverability is a complex topic and often challenging to troubleshoot due to the nature of the protocol and the number of systems and hops involved. We added two widgets, Analytics and Detailed Logs, which will hopefully provide the needed <a href="/email-routing-insights/">insights</a> and help increase visibility.</p><p>The Analytics section of Email Routing shows general statistics about the number of emails received during the selected timeframe, how they got handled to the upstream destination addresses, and a convenient time-series chart.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5idsdXSP16hDLOxayDOGqi/6b62d3ce039cdd9d94abc0e69405594f/image5-4.png" />
            
            </figure><p>On the Activity Log, you can get detailed information about what happened to each individual message that was received and then delivered to the destination. That information includes the sender and the custom address used, the timestamp, and the delivery attempt result. It also has the details of our SPF, DMARC, and DKIM validations. We also provide filters to help you find what you're looking for in case your message volume is higher.</p><p>More recently, the Activity Log now also shows <a href="https://en.wikipedia.org/wiki/Bounce_message">bounces</a>. A bounce message happens when the upstream SMTP server accepts the delivery, but then, for any reason (exceeded quota, virus checks, forged messages, or other issues), the recipient inbox decides to reject it and return a new message back with an error to the latest <a href="https://en.wikipedia.org/wiki/Message_transfer_agent">MTA</a> in the chain, read from the <a href="https://www.rfc-editor.org/rfc/rfc5322.html#section-3.6.7">Return-Path</a> headers, which is us.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wyT0gd7l6GHjl7LVFjCUR/67628c835e2f8f76f0d6a16ef99011be/image8-4.png" />
            
            </figure>
    <div>
      <h3>Audit Logs</h3>
      <a href="#audit-logs">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/fundamentals/account-and-billing/account-security/review-audit-logs/">Audit Logs</a> are available on all plan types and summarize the history of events, like login and logout actions, or zone configuration changes, made within your Cloudflare account. Accounts with multiple members or companies that must comply with regulatory obligations rely on Audit logs for tracking and evidence reasons.</p><p>Email Routing now integrates with Audit Logs and records all configuration changes, like adding a new address, changing a rule, or editing the catch-all address. You can find the Audit Logs on the dashboard under "Manage Account" or use our API to download the list.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15USXKo9itSQkX8h8JS0kE/ea244f54b31e72c73be3416ee42ace4e/image6-7.png" />
            
            </figure>
    <div>
      <h3>Anti-spam</h3>
      <a href="#anti-spam">
        
      </a>
    </div>
    <p>Unsolicited and malicious messages plague the world of email and are a big problem for end users. They affect the user experience and efficiency of email, and often carry security risks that can lead to scams, identity theft, and manipulation.</p><p>Since day one, we have supported and validated <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a> (Sender Policy Framework) records,  <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a> (DomainKeys Identified Mail) signatures, and <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC</a> (Domain-based Message Authentication) policies in incoming messages. These steps are important and mitigate some risks associated with authenticating the origin of an email from a specific legitimate domain, but they don't solve the problem completely. You can still have bad actors generating spam or <a href="https://www.cloudflare.com/learning/email-security/how-to-identify-a-phishing-email/">phishing</a> Attacks from other domains who ignore SPF or DKIM completely.</p><p>Anti-spam techniques today are often based on blocking emails whose origin (the IP address of the client trying to deliver the message) confidence score isn't great. This is commonly known in the industry as IP reputation. Other companies specialize in maintaining reputation lists for IPs and email domains, also known as <a href="https://en.wikipedia.org/wiki/Domain_Name_System-based_blocklist">RBL</a> lists, which are then shared across providers and used widely.</p><p>Simply put, an IP or a domain gets a bad reputation when it starts sending unsolicited or malicious emails. If your IP or domain has a bad reputation, you'll have a hard time delivering Emails from them to any major email provider. A bad reputation goes away when the IP or domain stops acting bad.</p><p>Cloudflare is a security company that knows a few things about IP <a href="https://developers.cloudflare.com/ruleset-engine/rules-language/fields/#field-cf-threat_score">threat scores</a> and reputation. Working with the Area1 team and learning from them, we added support to flag and block emails received from what we consider bad IPs at the SMTP level. Our approach uses a combination of heuristics and reputation databases, including some RBL lists, which we constantly update.</p><p>This measure benefits not only those customers that receive a lot of spam, who will now get another layer of <a href="https://www.cloudflare.com/learning/dns/dns-records/protect-domains-without-email/">protection</a> and filtering, but also everyone else using Email Routing. The reputation of our own IP space and forwarding domain, which we use to deliver messages to other email providers, will improve, and with it, so will our deliverability success rate.</p>
    <div>
      <h3>IDN support</h3>
      <a href="#idn-support">
        
      </a>
    </div>
    <p><a href="https://datatracker.ietf.org/doc/html/rfc5891">Internationalized domain names</a>, or IDNs for short, are domains that contain at least one non-ASCII character. To accommodate backward compatibility with older Internet protocols and applications, the IETF approved the IDNA protocol (Internationalized Domain Names in Applications), which was then adopted by <a href="https://chromium.googlesource.com/chromium/src/+/main/docs/idn.md">many browsers</a>, <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">top-level domain registrars</a> and other service providers.</p><p>Cloudflare was <a href="/non-latinutf8-domains-now-fully-supported/">one of the first</a> platforms to adopt IDNs back in 2012.  Supporting internationalized domain names on email, though, is challenging. Email uses DNS, SMTP, and other standards (like TLS and DKIM signatures) stacked on top of each other. IDNA conversions need to work end to end, or something will break.</p><p>Email Routing didn’t support IDNs until now. Starting today, Email Routing can be used with IDNs and everything will work end to end as expected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2w5ochqMtILwVjTYbA0Pb/659ce2e551b0ea0e8540045dd48839e7/image3-10.png" />
            
            </figure>
    <div>
      <h3>8-bit MIME transport</h3>
      <a href="#8-bit-mime-transport">
        
      </a>
    </div>
    <p>The SMTP protocol supports extensions since the <a href="https://www.rfc-editor.org/rfc/rfc2821">RFC 2821</a> revision. When an email client connects to an SMTP server, it announces its capabilities on the EHLO command.</p>
            <pre><code>➜  ~ telnet linda.mx.cloudflare.net 25
Trying 162.159.205.24...
Connected to linda.mx.cloudflare.net.
Escape character is '^]'.
220 mx.cloudflare.net Cloudflare Email ESMTP Service ready
EHLO celso.io
250-mx.cloudflare.net greets celso.io
250-STARTTLS
250-8BITMIME
250 ENHANCEDSTATUSCODES</code></pre>
            <p>This tells our client that we support the <a href="https://www.ietf.org/rfc/rfc3207.txt">Secure SMTP</a> over TLS, <a href="https://www.rfc-editor.org/rfc/rfc2034.html">Enhanced Error Codes</a>, and the <a href="https://www.rfc-editor.org/rfc/rfc6152">8-bit MIME Transport</a>, our latest addition.</p><p>Most modern clients and servers support the 8BITMIME extension, making transmitting binary files easier and more efficient without additional conversions to and from 7-bit.</p><p>Email Routing now supports transmitting 8BITMIME SMTP messages end to end and handles DKIM signatures accordingly.</p>
    <div>
      <h3>Other fixes</h3>
      <a href="#other-fixes">
        
      </a>
    </div>
    <p>We’ve been making other smaller improvements to Email Routing too:</p><ul><li><p>We ported our SMTP server to use <a href="https://boringssl.googlesource.com/boringssl/">BoringSSL</a>, Cloudflare’s SSL/TLS <a href="/make-ssl-boring-again/">implementation of choice</a>, and now support more ciphers when clients connect to us using STARTTLS and when we connect to upstream servers.</p></li><li><p>We made a number of improvements when we added our own <a href="https://datatracker.ietf.org/doc/html/rfc6376">DKIM signatures</a> in the messages. We keep our <a href="https://www.rust-lang.org/">Rust</a> ?DKIM <a href="https://github.com/cloudflare/dkim">implementation</a> open source on GitHub, and we also <a href="https://github.com/lettre/lettre/commits/master">contribute</a> to <a href="https://github.com/lettre/lettre">Lettre</a>, a Rust mailer library that we use.</p></li><li><p>When a destination address domain has multiple MX records, we now try them all in their preference value order, as described in the <a href="https://datatracker.ietf.org/doc/html/rfc974">RFC</a>, until we get a good delivery, or we fail.</p></li></ul>
    <div>
      <h3>Route to Workers update</h3>
      <a href="#route-to-workers-update">
        
      </a>
    </div>
    <p>We announced <a href="/announcing-route-to-workers/">Route to Workers</a> in May this year. Route to Workers enables everyone to programmatically process their emails and use them as triggers for any other action. In other words, you can choose to process any incoming email with a Cloudflare Worker script and then implement any logic you wish before you deliver it to a destination address or drop it. Think about it as programmable email.</p><p>The good news, though, is that we're near completing the project. The APIs, the dashboard configuration screens, the SMTP service, and the necessary <a href="https://github.com/cloudflare/workerd/blob/main/src/workerd/io/worker-interface.capnp">Cap'n Proto interface</a> to Workers are mostly complete, and "all" we have left now is adding the Email Workers primitives to the runtime and testing the hell out of everything before we ship.</p><p>Thousands of users are waiting for Email Workers to start creating advanced email processing workflows, and we're excited about the possibilities this will open. We promise we're working hard to open the public beta as soon as possible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xNqMMpydzI8i8kWisriPT/d01bb6f42e9fe4bad92e8fec3796f6b4/image7-4.png" />
            
            </figure>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We keep looking at ways to improve email and will add more features and support to emerging protocols and extensions. Two examples are <a href="https://en.wikipedia.org/wiki/Authenticated_Received_Chain">ARC</a> (Authenticated Received Chain), a new signature-based authentication system designed with email forwarding services in mind, and <a href="https://datatracker.ietf.org/doc/html/rfc4952">EAI</a> (Email Address Internationalization), which we will be supporting soon.</p><p>In the meantime, you can start using Email Routing with your own domain if you haven't yet, it only <a href="/migrating-to-cloudflare-email-routing/">takes a few minutes</a> to set up, and it's free. Our <a href="https://developers.cloudflare.com/email-routing/">Developers Documentation page</a> has details on how to get started, troubleshooting, and technical information.</p><p>Ping us on our <a href="https://discord.com/invite/cloudflaredev">Discord server</a>, <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">community forum</a>, or <a href="https://twitter.com/cloudflare">Twitter</a> if you have suggestions or questions, the team is listening.</p> ]]></content:encoded>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email Workers]]></category>
            <guid isPermaLink="false">eSf4sLZdb5Gb9Y7mVbjOl</guid>
            <dc:creator>Celso Martinho</dc:creator>
            <dc:creator>André Cruz</dc:creator>
            <dc:creator>Nelson Duarte</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Routing is now in open beta, available to everyone]]></title>
            <link>https://blog.cloudflare.com/email-routing-open-beta/</link>
            <pubDate>Tue, 08 Feb 2022 11:21:12 GMT</pubDate>
            <description><![CDATA[ Cloudflare Email Routing transitioned from closed beta to open beta. It’s now available to everyone, including free zones ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1AL0Vf9w01BxW3DaGrj0MV/cc1bd2060376015b62130232c01a5d9c/image2-8.png" />
            
            </figure><p>I won’t beat around the bush: we’ve moved <a href="/introducing-email-routing/">Cloudflare Email Routing</a> from closed beta to open beta ?</p><p>What does this mean? It means that there’s no waitlist anymore; every zone* in every Cloudflare account has Email Routing available to them.</p><p>To get started just open one of the zones in your <a href="https://dash.cloudflare.com/?to=/:account/:zone/email/overview">Cloudflare Dashboard</a> and click on <i>Email</i> in the navigation pane.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2H4sSM4n0aBeDZ08i7MQng/6a2890b943d472adb6b5a1e8212ac1b3/image1-2-3.png" />
            
            </figure>
    <div>
      <h3>Our journey so far</h3>
      <a href="#our-journey-so-far">
        
      </a>
    </div>
    <p>Back in September 2021, during Cloudflare’s Birthday Week, we <a href="/introducing-email-routing/">introduced</a> Email Routing as the simplest solution for creating <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">custom email addresses</a> for your domains without the hassle of managing multiple mailboxes.</p><p>Many of us at Cloudflare saw a need for this type of product, and we’ve been using it since before it had a UI. After Birthday Week, we started gradually opening it to Cloudflare customers that requested access through the wait list; starting with just a few users per week and gradually ramping up access as we found and fixed edge cases.</p><p>Most recently, with users wanting to set up Email Routing for more of their domains and with some of <a href="https://support.google.com/a/answer/2855120">G Suite legacy</a> users looking for an alternative to starting a subscription, we have been onboarding tens of thousands of new zones <i>every day</i> into the closed beta. We’re loving the adoption and the feedback!</p><p>Needless to say that with hundreds of thousands of zones from around the world in the Email Routing beta we uncovered many new use cases and a few limitations, <a href="https://developers.cloudflare.com/email-routing/known-limitations">a couple of which</a> still exist. But these few months of closed beta gave us the confidence to move to the next stage - open beta - which now makes <b>Cloudflare Email Routing available to everyone, including free zones</b>.</p><p>Thank you to all of you that were part of the closed beta and provided feedback. We couldn’t be more excited to welcome everyone else!</p><p>Check out this blog post for more details on <a href="/migrating-to-cloudflare-email-routing/">how to migrate to Cloudflare Email Routing</a>. And if you have any questions or feedback about this product, please come see us in the <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">Cloudflare Community</a> and the <a href="https://discord.gg/cloudflaredev">Cloudflare Discord</a>.</p><p>___</p><p><sup>*</sup>we do have a few limitations, such as not currently supporting Internationalized Domain Names (IDNs) and subdomains. Known limitations are listed in the documentation.</p> ]]></content:encoded>
            <category><![CDATA[Email Routing]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Beta]]></category>
            <category><![CDATA[Free]]></category>
            <guid isPermaLink="false">25BRZuxuAwucLlXzvr8fVL</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[Migrating to Cloudflare Email Routing]]></title>
            <link>https://blog.cloudflare.com/migrating-to-cloudflare-email-routing/</link>
            <pubDate>Thu, 27 Jan 2022 17:22:00 GMT</pubDate>
            <description><![CDATA[ With Email Routing, you can effectively start receiving Emails in any of your domains for any number of custom addresses you want and forward the messages to any existing destination mailboxes ]]></description>
            <content:encoded><![CDATA[ <p>A few days ago Google <a href="https://support.google.com/a/answer/60217">announced</a> that the users from the "G Suite legacy free edition" would need to switch to the paid edition before May 1, 2022, to maintain their services and accounts working. Because of this, many people are now considering alternatives.</p><p>One use case for G Suite legacy was <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">handling email for custom domains</a>.</p><p>In September, during Birthday Week, we <a href="/introducing-email-routing/">announced</a> Cloudflare Email Routing. This <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">service</a> allows you to create any number of custom email addresses you want on top of the domains you already have with Cloudflare and automatically forward the incoming traffic to any destination inboxes you wish.</p><p>Email Routing was designed to be privacy-first, secure, powerful, and very simple to use. Also, importantly, it’s available to all our customers for free.</p><p>The closed beta allowed us to keep improving the service and make it even more robust, compliant with all the technical nuances of email, and scalable. Today we're pleased to report that we have over two hundred thousand zones testing Email Routing in production, and we started the countdown to open beta and global availability.</p><p>With Email Routing, you can effectively start receiving Emails in any of your domains for any number of custom addresses you want and forward the messages to any existing destination mailboxes. We will automatically set up everything for you, and you can have it running in minutes today, at no cost.</p><p>Here's a step-by-step tutorial on how you can start receiving emails to <b>example.com</b>, forward them to Gmail (or any other email provider) at <a><b>username13335@gmail.com</b></a>.</p>
    <div>
      <h3>Using Cloudflare Email Routing with Gmail</h3>
      <a href="#using-cloudflare-email-routing-with-gmail">
        
      </a>
    </div>
    <p>First, login to your <a href="https://dash.cloudflare.com/?to=/:account/:zone/email/overview">Cloudflare Dashboard</a> and select your <b>example.com</b> zone. Click "Email (Beta)" in the left navigation panel, and request to join the Beta program. </p><p>Today it still takes a couple of days to get approved into the beta, but feel free to ping us on the <a href="https://discord.com/invite/cloudflaredev">Discord server</a> or <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">community forum</a> if you can't wait.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YqdIKA7lwIFKmCrmxwSIw/4a4a6f626ea86250d7a8d9b9c77dd3b6/image2-25.png" />
            
            </figure><p>Once you get invited to join Email Routing, we will take you to our three-step easy configuration wizard. The first step is to define the custom address <a><b>me@example.com</b></a> and the destination address <a><b>username13335@gmail.com</b></a>. Don’t worry too much, you can modify or add others later.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1QkbPIkP7C2xdnLjpiwjp9/4ea3489e2492af451b171328b52e492f/image5-17.png" />
            
            </figure><p>This step will trigger sending a confirmation email to <a><b>username13335@gmail.com</b></a> so that we can prove that the destination Inbox is yours. You need to open Gmail and press the verification link.</p><p>Then, on the last step, you need to configure your zone MX and SPF DNS records. We will do this automatically for you. Just press "<b>Add records automatically</b>". If you already have MX or SPF configured, we will guide you through the conflicts we find and help you solve them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ledgN9wWSVdbuafKEVC3R/391095c77cd7b60982b42a190c035489/image4-17.png" />
            
            </figure><p>That’s it, Email Routing is now configured, and you can start sending emails to <a><b>me@example.com</b></a> and read them at <a><b>username13335@gmail.com</b></a> in Gmail.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1h7VjUXWeRqPgW0JWh1Uxn/0047db9d54e08ac461db4e25cccade3f/image1-22.png" />
            
            </figure>
    <div>
      <h3>Gmail address conventions</h3>
      <a href="#gmail-address-conventions">
        
      </a>
    </div>
    <p>Gmail and G suite, now Google Workspace, support two email address conventions that help organize your messages and fight spam.</p><p>The first one is the plus ("+") sign. If you append a "+" sign and any combination of words after your email address, it will still get delivered to your inbox. For example, you can use <a><b>username13335+finance@gmail.com</b></a>, and it will get delivered at <a><b>username13335@gmail.com</b></a> and automatically get tagged “finance”. You can then use this to set up filters in Gmail.</p><p>The second one is Gmail ignores dots (".") in addresses entirely. For instance, sending an email to <a><b>username.13335@gmail.com</b></a>, <a><b>user.name.13335@gmail.com</b></a>, or <a><b>username13335@gmail.com</b></a> is all the same.</p><p>If you want to use these conventions with Cloudflare Email Routing, you can. Enable the "Catch-all address" feature and forward every incoming address for which there's no other rule configured to the verified destination address of your choice (<a><b>username13335@gmail.com</b></a> in this example).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64SEk5XKelDXh1blIwkpx4/ca59c4269410e563d2086f99c50144cd/PastedGraphic-6.png" />
            
            </figure>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>This is only one small example of what you can do with Email Routing today. We hope you find it helpful if you're looking for a new home for your email. For more information see our <a href="https://developers.cloudflare.com/email-routing/">documentation pages</a>.</p><p>Email needs more innovation. We're immensely excited about <a href="https://www.cloudflare.com/products/email-routing/">Email Routing</a> and our ideas for it in the roadmap. Expect improved metrics and advanced routing options in our rules engine in the near future.</p><p>Feel free to join the Beta today and ping us in our <a href="https://discord.com/invite/cloudflaredev">Discord server</a> or <a href="https://community.cloudflare.com/new-topic?category=Feedback/Previews%20%26%20Betas&amp;tags=email">community forum</a> if you can't wait; we'll do our best to prioritize the community requests before we open the service.</p> ]]></content:encoded>
            <category><![CDATA[Email Routing]]></category>
            <guid isPermaLink="false">4qRDvKhVV1iX0xpX2pXNJc</guid>
            <dc:creator>Celso Martinho</dc:creator>
        </item>
        <item>
            <title><![CDATA[Easily creating and routing email addresses with Cloudflare Email Routing]]></title>
            <link>https://blog.cloudflare.com/introducing-email-routing/</link>
            <pubDate>Mon, 27 Sep 2021 12:59:43 GMT</pubDate>
            <description><![CDATA[ You can now easily and quickly create email addresses for domain, and forward to them all to your preferred inbox, like Gmail or Outlook. Cloudflare Email Forwarding is completely free, and always res ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Note: Cloudflare Email Routing is</i> <a href="/email-routing-open-beta/"><i>now in open Beta</i></a><i>, available to everyone. You no longer need to join a waitlist to use it.</i></p><p>Over <a href="https://www.statista.com/statistics/255080/number-of-e-mail-users-worldwide/">four billion people</a> — or half of the world’s population — have at least one email address, many of whom use it as an essential tool to stay on top of their personal and professional matters. More than 300 billion emails are sent and received every day, but seeing email as just a communications tool wouldn’t do it justice. Its impact in our lives goes far beyond being a vessel for messages — its use cases also cover being a common way of validating one’s identity online, and serving as the gateway for other communication platforms.</p><p>Today, most people use their email for sensitive purposes, such as logging in to their bank account, or communicating with governmental entities. At the same time, they will use that email to sign up for a 10% off coupon they found online, which will surely spam them for months to come. Despite these two use cases being polar opposites in relation to importance and security, people take the risk, usually for the sake of conveniently managing one account.</p><p>Much in the same way, businesses want to have different email addresses for different types of inquiries, such as sales and support, but often find it cumbersome to control who receives these emails. And as the business evolves, matters that were handled by the owner often need to be handed off to other people. But for <a href="https://www.cloudflare.com/small-business/">small businesses</a> it’s not usually straightforward to configure mailboxes and aliases.</p><p>And then there are countless individuals and families that juggle multiple mailboxes to handle the Internet identities that they use, to represent their various online presences.</p><p>We understand these challenges, and that’s why we’re launching Cloudflare Email Routing, the most straightforward way to create any number of email addresses that are <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">redirected to the mailbox</a> you, your family or your team are already using.</p>
    <div>
      <h3>Cloudflare Email Routing</h3>
      <a href="#cloudflare-email-routing">
        
      </a>
    </div>
    <p>Cloudflare Email Routing is designed to simplify the way you create and manage email addresses, without needing to keep an eye on additional mailboxes.</p><p>The process is simple:</p><ol><li><p>You enter the email address you want to create on your domain</p></li><li><p>You enter the email address you want it forwarded to</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6E8ZYEuNNh10CJ1efw187m/e4c07f6a07494483c75d727183a6271c/image1-33.png" />
            
            </figure><p>As some of you already know, email consists of the envelope, the header, and its body.</p><p>The envelope is part of the SMTP transport protocol and tells the servers where the email is coming from and where it's supposed to be delivered.</p><p>The headers contain structured information like the message traveled path, date, the sender and recipients' addresses, subject, and other technical metadata like SPF pass results, DKIM signatures, and anti-spam scores. Every time the message goes through a server, it can add new headers or modify the existing ones until it reaches the final inbox.</p><p>And finally, there's the body of the message, where the actual content resides. The body can be plain text, rich HTML, it can contain file attachments, and in some cases, it can be signed or even encrypted.</p><p>Here’s a simplified diagram of how the SMTP protocol works and how the three steps of an Email message fit together:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62d9wOWIhSHT8G8RAL6CDW/3ed756ad38d8f0dcde734bc7ae4ce46f/unnamed.png" />
            
            </figure><p>Cloudflare Email Routing service acts as an intelligent router at the transport layer, handling and modifying the SMTP envelope to deliver the message at its final destination but preserving the original headers and keeping the body intact. This approach ensures that things like SPF, DKIM, and other security or anti-spam protocols don't break and the recipient stays <a href="https://www.cloudflare.com/learning/dns/dns-records/protect-domains-without-email/">protected</a>.</p><p>Furthermore, following the same privacy-first approach we use in other products, we don't look into, queue, or store emails at any point. Messages are received, handled according to the configured rules, and delivered to their final destinations in real-time.</p>
    <div>
      <h3>Private Beta access</h3>
      <a href="#private-beta-access">
        
      </a>
    </div>
    <p>Email Forwarding is now in private beta, and you can save your place in line through <a href="https://www.cloudflare.com/email-forwarding-waitlist-sign-up/">this sign-up form</a>.</p><p>Then, to start using Email Routing, all you need to do is to add your domain to <a href="https://www.cloudflare.com/dns/">Cloudflare DNS</a>.</p><p>If you don’t currently own a domain, you can buy one right here on our <a href="https://www.cloudflare.com/products/registrar/">registrar</a>.</p>
    <div>
      <h3>Step-by-Step Configuration</h3>
      <a href="#step-by-step-configuration">
        
      </a>
    </div>
    <p>Then there are only a few steps to creating a new email address and setting up forwarding:</p><ol><li><p>Go to the email page on the <a href="https://dash.cloudflare.com/?to=/:account/:zone/email/overview">Cloudflare dashboard</a>.</p></li><li><p>Select <b>Configure.</b></p></li><li><p>Enter the email address you want to create (remember, this is for <b>your</b> domain, so you can pick anything you like). Alternatively, you can choose to use a <i>catch-all</i> so that all possible emails addresses in your domain are considered valid and forwarded.</p></li><li><p>The DNS configuration step is automatic if you don’t have email configured for your domain. Otherwise, we provide straightforward guidance on how to best configure it for your needs.</p></li><li><p>Lastly, you just need to validate that the destination email belongs to you. Super simple, and exactly the same as you’ve done a million times before.</p></li></ol><p>We did say we made it straightforward!</p><div></div>
<p></p><p>With efficiency and simplicity in mind, we're launching Email Routing with support for multiple rules and message forwarding to any upstream inbox of your choice.</p><p>However, we feel like the email scene has been long-dormant, and we have exciting new features coming soon that take advantage of the Cloudflare platform, resources, and know-how.</p><p>We're also listening. If you have questions, suggestions, or new ideas, share them in the <a href="https://community.cloudflare.com/">community forum</a>. We'll be around.</p><p>To start using Cloudflare Email Routing just join the waitlist today through <a href="https://www.cloudflare.com/email-forwarding-waitlist-sign-up/">this form</a>. We will be opening up this <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">service</a> to more users on a daily basis, and promise the short wait will be worth it!</p><p>If you want to read more, refer to our <a href="https://developers.cloudflare.com/email-routing/">documentation</a>.</p><p>
</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Email Routing]]></category>
            <guid isPermaLink="false">2He8mmrUHIVyu5BESkYi9c</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Steven Raden</dc:creator>
            <dc:creator>Celso Martinho</dc:creator>
        </item>
    </channel>
</rss>