{"id":2911,"date":"2025-12-05T13:04:52","date_gmt":"2025-12-05T10:04:52","guid":{"rendered":"https:\/\/www.dchost.com\/blog\/spf-dkim-ve-dmarc-nedir-ozel-alan-adi-ile-e-posta-dogrulamasini-cpanel-ve-vpste-sifirdan-kurmak\/"},"modified":"2025-12-05T13:04:52","modified_gmt":"2025-12-05T10:04:52","slug":"spf-dkim-ve-dmarc-nedir-ozel-alan-adi-ile-e-posta-dogrulamasini-cpanel-ve-vpste-sifirdan-kurmak","status":"publish","type":"post","link":"https:\/\/www.dchost.com\/blog\/spf-dkim-ve-dmarc-nedir-ozel-alan-adi-ile-e-posta-dogrulamasini-cpanel-ve-vpste-sifirdan-kurmak\/","title":{"rendered":"SPF, DKIM ve DMARC Nedir? \u00d6zel Alan Ad\u0131 ile E\u2011Posta Do\u011frulamas\u0131n\u0131 cPanel ve VPS\u2019te S\u0131f\u0131rdan Kurmak"},"content":{"rendered":"<div class=\"dchost-blog-content-wrapper\"><div id=\"toc_container\" class=\"toc_transparent no_bullets\"><p class=\"toc_title\">\u0130&ccedil;indekiler<\/p><ul class=\"toc_list\"><li><a href=\"#Neden_SPF_DKIM_ve_DMARC_Artik_Zorunlu_Hale_Geldi\"><span class=\"toc_number toc_depth_1\">1<\/span> Neden SPF, DKIM ve DMARC Art\u0131k Zorunlu Hale Geldi?<\/a><\/li><li><a href=\"#SPF_DKIM_ve_DMARC_Temelleri\"><span class=\"toc_number toc_depth_1\">2<\/span> SPF, DKIM ve DMARC Temelleri<\/a><ul><li><a href=\"#SPF_nedir_nasil_calisir\"><span class=\"toc_number toc_depth_2\">2.1<\/span> SPF nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/a><\/li><li><a href=\"#DKIM_nedir_nasil_calisir\"><span class=\"toc_number toc_depth_2\">2.2<\/span> DKIM nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/a><\/li><li><a href=\"#DMARC_nedir_neden_kritik\"><span class=\"toc_number toc_depth_2\">2.3<\/span> DMARC nedir, neden kritik?<\/a><\/li><\/ul><\/li><li><a href=\"#EPosta_Dogrulamasina_Gecmeden_Once_Hazirliklar\"><span class=\"toc_number toc_depth_1\">3<\/span> E\u2011Posta Do\u011frulamas\u0131na Ge\u00e7meden \u00d6nce Haz\u0131rl\u0131klar<\/a><\/li><li><a href=\"#cPanel_Uzerinde_SPF_DKIM_ve_DMARC_Kurulumu\"><span class=\"toc_number toc_depth_1\">4<\/span> cPanel \u00dczerinde SPF, DKIM ve DMARC Kurulumu<\/a><ul><li><a href=\"#1_cPanelde_SPF_kaydini_etkinlestirme_ve_kontrol\"><span class=\"toc_number toc_depth_2\">4.1<\/span> 1) cPanel\u2019de SPF kayd\u0131n\u0131 etkinle\u015ftirme ve kontrol<\/a><\/li><li><a href=\"#2_cPanelde_DKIM_kaydini_etkinlestirme\"><span class=\"toc_number toc_depth_2\">4.2<\/span> 2) cPanel\u2019de DKIM kayd\u0131n\u0131 etkinle\u015ftirme<\/a><\/li><li><a href=\"#3_cPanelde_DMARC_kaydi_ekleme\"><span class=\"toc_number toc_depth_2\">4.3<\/span> 3) cPanel\u2019de DMARC kayd\u0131 ekleme<\/a><\/li><li><a href=\"#4_cPanelde_test_ve_dogrulama\"><span class=\"toc_number toc_depth_2\">4.4<\/span> 4) cPanel\u2019de test ve do\u011frulama<\/a><\/li><\/ul><\/li><li><a href=\"#VPS_Uzerinde_SPF_DKIM_ve_DMARC_Kurulumu_Panelsiz_Senaryo\"><span class=\"toc_number toc_depth_1\">5<\/span> VPS \u00dczerinde SPF, DKIM ve DMARC Kurulumu (Panelsiz Senaryo)<\/a><ul><li><a href=\"#1_DNS_tarafinda_temel_SPF_kaydini_olusturma\"><span class=\"toc_number toc_depth_2\">5.1<\/span> 1) DNS taraf\u0131nda temel SPF kayd\u0131n\u0131 olu\u015fturma<\/a><\/li><li><a href=\"#2_VPSte_DKIM_icin_OpenDKIM_kurulumunun_iskeleti\"><span class=\"toc_number toc_depth_2\">5.2<\/span> 2) VPS\u2019te DKIM i\u00e7in OpenDKIM kurulumunun iskeleti<\/a><\/li><li><a href=\"#3_DKIM_genel_anahtarini_DNSe_ekleme\"><span class=\"toc_number toc_depth_2\">5.3<\/span> 3) DKIM genel anahtar\u0131n\u0131 DNS\u2019e ekleme<\/a><\/li><li><a href=\"#4_DMARC_kaydini_DNSte_eklemek\"><span class=\"toc_number toc_depth_2\">5.4<\/span> 4) DMARC kayd\u0131n\u0131 DNS\u2019te eklemek<\/a><\/li><li><a href=\"#5_Reverse_DNS_PTR_ve_hostname_kontrolu\"><span class=\"toc_number toc_depth_2\">5.5<\/span> 5) Reverse DNS (PTR) ve hostname kontrol\u00fc<\/a><\/li><li><a href=\"#6_Log_ve_test_tarafi\"><span class=\"toc_number toc_depth_2\">5.6<\/span> 6) Log ve test taraf\u0131<\/a><\/li><\/ul><\/li><li><a href=\"#Yaygin_Hatalar_Ince_Noktalar_ve_Iyi_Uygulamalar\"><span class=\"toc_number toc_depth_1\">6<\/span> Yayg\u0131n Hatalar, \u0130nce Noktalar ve \u0130yi Uygulamalar<\/a><ul><li><a href=\"#E-posta_yonlendirme_SPFDMARCi_neden_bozar\"><span class=\"toc_number toc_depth_2\">6.1<\/span> E-posta y\u00f6nlendirme SPF\/DMARC\u2019\u0131 neden bozar?<\/a><\/li><li><a href=\"#SPF_lookup_sinirina_takilmak\"><span class=\"toc_number toc_depth_2\">6.2<\/span> SPF lookup s\u0131n\u0131r\u0131na tak\u0131lmak<\/a><\/li><li><a href=\"#Yeni_IPde_aninda_8220reject8221_DMARC_kullanmak\"><span class=\"toc_number toc_depth_2\">6.3<\/span> Yeni IP\u2019de an\u0131nda &#8220;reject&#8221; DMARC kullanmak<\/a><\/li><li><a href=\"#SPF_DKIM_DMARC_ve_rDNSi_birlikte_dusunmek\"><span class=\"toc_number toc_depth_2\">6.4<\/span> SPF, DKIM, DMARC ve rDNS\u2019i birlikte d\u00fc\u015f\u00fcnmek<\/a><\/li><\/ul><\/li><li><a href=\"#DCHost_Tarafinda_Hangi_Altyapiyi_Secmeliyim\"><span class=\"toc_number toc_depth_1\">7<\/span> DCHost Taraf\u0131nda Hangi Altyap\u0131y\u0131 Se\u00e7meliyim?<\/a><\/li><li><a href=\"#Ozet_ve_Sonraki_Adimlar\"><span class=\"toc_number toc_depth_1\">8<\/span> \u00d6zet ve Sonraki Ad\u0131mlar<\/a><\/li><\/ul><\/div>\n<h2><span id=\"Neden_SPF_DKIM_ve_DMARC_Artik_Zorunlu_Hale_Geldi\">Neden SPF, DKIM ve DMARC Art\u0131k Zorunlu Hale Geldi?<\/span><\/h2>\n<p>Art\u0131k neredeyse her projede ayn\u0131 tabloyla kar\u015f\u0131la\u015f\u0131yoruz: Kurumsal bir alan ad\u0131, web sitesi yay\u0131nda, e\u2011ticaret sipari\u015fleri veya teklif formlar\u0131 \u00e7al\u0131\u015f\u0131yor; ama m\u00fc\u015fterilerden \u015fu geri bildirim geliyor: \u201cMailler ya hi\u00e7 gelmiyor ya da spam klas\u00f6r\u00fcne d\u00fc\u015f\u00fcyor.\u201d Teknik altyap\u0131n\u0131z ne kadar iyi olursa olsun, SPF, DKIM ve DMARC do\u011fru kurulmad\u0131ysa e\u2011posta taraf\u0131nda g\u00fcvenilir g\u00f6r\u00fcnm\u00fcyorsunuz.<\/p>\n<p>B\u00fcy\u00fck sa\u011flay\u0131c\u0131lar, spam ve kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131 azaltmak i\u00e7in g\u00f6nderen alan adlar\u0131ndan \u00e7ok daha s\u0131k\u0131 do\u011frulama istiyor. Yani \u201calan ad\u0131m\u0131 yazd\u0131m, MX kayd\u0131m\u0131 ekledim, bitti\u201d d\u00f6nemi biteli \u00e7ok oldu. \u015eimdi oyunun ad\u0131: <strong>SPF, DKIM ve DMARC ile \u00f6zel alan ad\u0131n\u0131z\u0131 kriptografik olarak ispatlamak<\/strong>.<\/p>\n<p>Bu yaz\u0131da, DCHost altyap\u0131s\u0131 veya ba\u015fka bir DNS sa\u011flay\u0131c\u0131s\u0131 fark etmeksizin, kendi alan ad\u0131n\u0131zla e\u2011posta g\u00f6nderirken SPF, DKIM ve DMARC\u2019\u0131 nas\u0131l s\u0131f\u0131rdan kuraca\u011f\u0131n\u0131z\u0131 ad\u0131m ad\u0131m g\u00f6sterece\u011fim. Hem <strong>cPanel \u00fczerinde <a href=\"https:\/\/www.dchost.com\/tr\/web-hosting\">payla\u015f\u0131ml\u0131 hosting<\/a><\/strong> kullananlar i\u00e7in t\u0131klamal\u0131 bir rehber, hem de <strong>VPS \u00fczerinde kendi MTA\u2019n\u0131z\u0131 y\u00f6netenler<\/strong> i\u00e7in komut sat\u0131r\u0131na yak\u0131n bir yol haritas\u0131 bulacaks\u0131n\u0131z.<\/p>\n<p>Daha \u00f6nce yay\u0131nlad\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/www.dchost.com\/blog\/spf-dkim-dmarc-ve-rdns-ile-e-posta-teslim-edilebilirligini-nasil-adim-adim-yukseltirsin\/\">SPF, DKIM, DMARC ve rDNS ile e-posta teslim edilebilirli\u011fini art\u0131rma rehberinde<\/a> daha stratejik bir \u00e7er\u00e7eve \u00e7izmi\u015ftik. Bu makalede ise oda\u011f\u0131m\u0131z tamamen pratik: DNS kay\u0131tlar\u0131n\u0131 tek tek yazaca\u011f\u0131z, cPanel ekranlar\u0131nda nereye t\u0131klayaca\u011f\u0131n\u0131z\u0131, <a href=\"https:\/\/www.dchost.com\/tr\/vps\">VPS<\/a> taraf\u0131nda hangi dosyalar\u0131 d\u00fczenleyece\u011finizi anlataca\u011f\u0131z.<\/p>\n<h2><span id=\"SPF_DKIM_ve_DMARC_Temelleri\">SPF, DKIM ve DMARC Temelleri<\/span><\/h2>\n<h3><span id=\"SPF_nedir_nasil_calisir\">SPF nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/span><\/h3>\n<p><strong>SPF (Sender Policy Framework)<\/strong>, alan ad\u0131n\u0131z ad\u0131na hangi sunucular\u0131n e\u2011posta g\u00f6ndermeye yetkili oldu\u011funu DNS \u00fczerinden ilan etmenizi sa\u011flayan bir mekanizmad\u0131r. Al\u0131c\u0131 sunucu, sizden gelen bir maili teslim etmeden \u00f6nce DNS\u2019e bakar ve \u201cBu IP, bu domain i\u00e7in mail g\u00f6ndermeye yetkili mi?\u201d diye kontrol eder.<\/p>\n<p>SPF kayd\u0131, alan ad\u0131n\u0131z\u0131n DNS\u2019inde bir <strong>TXT kayd\u0131<\/strong> olarak tutulur. \u00d6rne\u011fin:<\/p>\n<pre>example.com.  3600  IN  TXT  \"v=spf1 a mx ip4:203.0.113.10 -all\"<\/pre>\n<ul>\n<li><strong>v=spf1<\/strong>: SPF s\u00fcr\u00fcm\u00fc<\/li>\n<li><strong>a<\/strong>: Alan ad\u0131n\u0131z\u0131n A kayd\u0131ndaki IP, mail g\u00f6ndermeye yetkilidir<\/li>\n<li><strong>mx<\/strong>: MX kay\u0131tlar\u0131ndaki IP\u2019ler yetkilidir<\/li>\n<li><strong>ip4:&#8230;<\/strong>: Ek olarak bu IPv4 adresi yetkilidir<\/li>\n<li><strong>-all<\/strong>: Bunun d\u0131\u015f\u0131ndaki t\u00fcm IP\u2019ler yetkisizdir (fail)<\/li>\n<\/ul>\n<p>Al\u0131c\u0131 taraf bu kayd\u0131 yorumlayarak, gelen mailin ger\u00e7ekten yetkili bir IP\u2019den gelip gelmedi\u011fini anlar. SPF tek ba\u015f\u0131na imza atmaz, sadece yetkili IP listesidir. Bu y\u00fczden DKIM ve DMARC ile birlikte kullanmak gerekir.<\/p>\n<h3><span id=\"DKIM_nedir_nasil_calisir\">DKIM nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/span><\/h3>\n<p><strong>DKIM (DomainKeys Identified Mail)<\/strong>, g\u00f6nderdi\u011finiz maillerin g\u00f6vdesine ve baz\u0131 ba\u015fl\u0131klar\u0131na <strong>dijital imza<\/strong> ekler. Bu imza, sunucunuzdaki \u00f6zel anahtarla olu\u015fturulur. Al\u0131c\u0131 sunucu ise alan ad\u0131n\u0131z\u0131n DNS\u2019inde yay\u0131nlad\u0131\u011f\u0131n\u0131z <strong>genel anahtar\u0131<\/strong> kullanarak bu imzan\u0131n ge\u00e7erli olup olmad\u0131\u011f\u0131n\u0131 kontrol eder.<\/p>\n<p>Basit\u00e7e:<\/p>\n<ul>\n<li>Sunucunuz, maili g\u00f6nderirken g\u00f6vde + ba\u015fl\u0131klardan bir hash hesaplar.<\/li>\n<li>Bu hash\u2019i, sunucuda saklanan <strong>\u00f6zel anahtar\u0131n\u0131z<\/strong> ile imzalar.<\/li>\n<li>\u0130mza, mail ba\u015fl\u0131klar\u0131na <code>DKIM-Signature:<\/code> sat\u0131r\u0131 olarak eklenir.<\/li>\n<li>Al\u0131c\u0131, DNS\u2019te <code>selector._domainkey.example.com<\/code> alt\u0131nda yay\u0131nlad\u0131\u011f\u0131n\u0131z <strong>genel anahtar\u0131<\/strong> bulur ve imzay\u0131 do\u011frular.<\/li>\n<\/ul>\n<p>B\u00f6ylece iki \u015fey elde edilir: Mailin ger\u00e7ekten sizin alan ad\u0131n\u0131zdan geldi\u011fi (en az\u0131ndan sizin DKIM anahtar\u0131n\u0131zla imzaland\u0131\u011f\u0131) ve <strong>yolda de\u011fi\u015ftirilmedi\u011fi<\/strong> ispatlanm\u0131\u015f olur.<\/p>\n<h3><span id=\"DMARC_nedir_neden_kritik\">DMARC nedir, neden kritik?<\/span><\/h3>\n<p><strong>DMARC (Domain-based Message Authentication, Reporting and Conformance)<\/strong>, SPF ve DKIM sonu\u00e7lar\u0131n\u0131 bir politika alt\u0131nda toplayan ve bu sonu\u00e7lara g\u00f6re al\u0131c\u0131 sunuculara ne yapmas\u0131 gerekti\u011fini s\u00f6yleyen standartt\u0131r.<\/p>\n<p>DMARC ile:<\/p>\n<ul>\n<li>SPF ve\/veya DKIM <strong>ba\u015far\u0131s\u0131z oldu\u011funda<\/strong> al\u0131c\u0131n\u0131n ne yapmas\u0131n\u0131 istedi\u011finizi belirler (<code>none<\/code>, <code>quarantine<\/code>, <code>reject<\/code>).<\/li>\n<li><strong>Alignment<\/strong> (hizalama) kurallar\u0131 ile, kullan\u0131lan alan ad\u0131n\u0131n From: ba\u015fl\u0131\u011f\u0131yla ne kadar \u00f6rt\u00fc\u015fmesi gerekti\u011fini tan\u0131mlars\u0131n\u0131z.<\/li>\n<li><strong>RUA\/RUF<\/strong> adresleri ile toplu ve ayr\u0131nt\u0131l\u0131 <strong>DMARC raporlar\u0131<\/strong> al\u0131rs\u0131n\u0131z.<\/li>\n<\/ul>\n<p>\u00d6rnek bir DMARC kayd\u0131:<\/p>\n<pre>_dmarc.example.com.  3600  IN  TXT  \"v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com; fo=1\"<\/pre>\n<p>DMARC\u2019\u0131 daha ileri seviyede kullanmak, BIMI gibi marka g\u00f6sterimlerine girmek isterseniz, <a href=\"https:\/\/www.dchost.com\/blog\/gelismis-dmarc-ve-bimi-rua-ruf-raporlarindan-marka-gostergesine-nasil-yol-alinir\/\">Geli\u015fmi\u015f DMARC ve BIMI rehberimizde<\/a> raporlar\u0131n nas\u0131l analiz edilece\u011fini ve politika s\u0131k\u0131la\u015ft\u0131rmay\u0131 detayl\u0131 anlatt\u0131k.<\/p>\n<h2><span id=\"EPosta_Dogrulamasina_Gecmeden_Once_Hazirliklar\">E\u2011Posta Do\u011frulamas\u0131na Ge\u00e7meden \u00d6nce Haz\u0131rl\u0131klar<\/span><\/h2>\n<p>SPF, DKIM ve DMARC ayarlar\u0131na girmeden \u00f6nce, altyap\u0131n\u0131zda baz\u0131 temel noktalar\u0131n net olmas\u0131 gerekiyor:<\/p>\n<ul>\n<li><strong>Alan ad\u0131n\u0131z\u0131n DNS y\u00f6netimine eri\u015febiliyor musunuz?<\/strong> (DCHost paneli veya domain registrar paneli)<\/li>\n<li><strong>MX kay\u0131tlar\u0131n\u0131z do\u011fru mu?<\/strong> Mailleri hangi sunucu al\u0131yor?<\/li>\n<li><strong>Mail g\u00f6nderilen IP\u2019lerin listesi net mi?<\/strong> (cPanel hosting IP\u2019si, VPS IP\u2019si, \u00fc\u00e7\u00fcnc\u00fc parti servisler vb.)<\/li>\n<li><strong>Reverse DNS (PTR) kayd\u0131n\u0131z<\/strong> mail i\u00e7in kulland\u0131\u011f\u0131n\u0131z IP\u2019de do\u011fru tan\u0131ml\u0131 m\u0131?<\/li>\n<\/ul>\n<p>DNS taraf\u0131na h\u00e2kim de\u011filseniz, \u00f6nce <a href=\"https:\/\/www.dchost.com\/blog\/dns-kayitlari-adan-zye-a-aaaa-cname-mx-txt-srv-caa-ve-sizi-yakan-o-kucuk-hatalar\/\">DNS kay\u0131tlar\u0131 A\u2019dan Z\u2019ye rehberimizi<\/a> okuman\u0131z\u0131 \u00f6neririm. Oradaki temel bilgiler, SPF\/DKIM\/DMARC kurarken hangi kayd\u0131, hangi isimle ve hangi i\u00e7erikle girdi\u011finizi zihninizde daha net oturtacakt\u0131r.<\/p>\n<h2><span id=\"cPanel_Uzerinde_SPF_DKIM_ve_DMARC_Kurulumu\">cPanel \u00dczerinde SPF, DKIM ve DMARC Kurulumu<\/span><\/h2>\n<p>DCHost payla\u015f\u0131ml\u0131 hosting veya reseller hizmeti kullan\u0131yorsan\u0131z, b\u00fcy\u00fck ihtimalle cPanel \u00fczerinden y\u00f6netim yap\u0131yorsunuz. \u0130yi haber: SPF ve DKIM i\u00e7in i\u015fin \u00e7o\u011funu cPanel zaten otomatik yap\u0131yor. Bizim esas dokunaca\u011f\u0131m\u0131z yer DMARC.<\/p>\n<h3><span id=\"1_cPanelde_SPF_kaydini_etkinlestirme_ve_kontrol\">1) cPanel\u2019de SPF kayd\u0131n\u0131 etkinle\u015ftirme ve kontrol<\/span><\/h3>\n<p>cPanel s\u00fcr\u00fcm\u00fcne g\u00f6re men\u00fc isimleri k\u00fc\u00e7\u00fck farkl\u0131l\u0131klar g\u00f6sterebilir, ama mant\u0131k ayn\u0131d\u0131r:<\/p>\n<ol>\n<li>cPanel hesab\u0131n\u0131za giri\u015f yap\u0131n.<\/li>\n<li><strong>E-posta<\/strong> b\u00f6l\u00fcm\u00fcnde <strong>&#8220;E-posta Da\u011f\u0131t\u0131m\u0131&#8221; (Email Deliverability)<\/strong> veya benzeri men\u00fcy\u00fc a\u00e7\u0131n.<\/li>\n<li>Alan ad\u0131n\u0131z\u0131 listede bulun, yan\u0131nda &#8220;Eksik DNS kay\u0131tlar\u0131&#8221; gibi bir uyar\u0131 g\u00f6r\u00fcyorsan\u0131z, &#8220;Onar&#8221; veya &#8220;Repair&#8221; butonuna t\u0131klay\u0131n.<\/li>\n<li>cPanel, hem <strong>SPF<\/strong> hem de <strong>DKIM<\/strong> i\u00e7in \u00f6nerilen kay\u0131tlar\u0131 \u00e7\u0131karacakt\u0131r. SPF kayd\u0131n\u0131 inceleyin.<\/li>\n<\/ol>\n<p>Olu\u015fan SPF kayd\u0131 genelde \u015fu mant\u0131kta olur:<\/p>\n<pre>v=spf1 +a +mx +ip4:IP_ADRESINIZ ~all<\/pre>\n<p>Burada <code>~all<\/code> (softfail) varsay\u0131lan olarak biraz daha yumu\u015fakt\u0131r. \u0130leride DMARC ile birlikte politikay\u0131 s\u0131k\u0131la\u015ft\u0131rmak isterseniz, deneyim ve rapor toplad\u0131ktan sonra <code>-all<\/code> kullanmay\u0131 d\u00fc\u015f\u00fcnebilirsiniz.<\/p>\n<p>E\u011fer alan ad\u0131n\u0131z ad\u0131na ba\u015fka servisler de mail g\u00f6nderiyorsa (\u00f6rne\u011fin bir e\u2011posta pazarlama platformu veya fatura sistemi), ilgili servislerin SPF y\u00f6nergelerini bu kayda <code>include:<\/code> \u015feklinde eklemeniz gerekir. SPF\u2019te <strong>10 adet DNS lookup s\u0131n\u0131r\u0131<\/strong> oldu\u011funu unutmay\u0131n. \u00c7ok par\u00e7al\u0131 SPF kay\u0131tlar\u0131n\u0131 optimize etmek i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/spf-flattening-ile-10-lookup-duvarini-nasil-asarsin-ci-cd-ve-workers-ile-yasayan-spf\/\">SPF flattening stratejilerini anlatt\u0131\u011f\u0131m\u0131z yaz\u0131ya<\/a> g\u00f6z atabilirsiniz.<\/p>\n<h3><span id=\"2_cPanelde_DKIM_kaydini_etkinlestirme\">2) cPanel\u2019de DKIM kayd\u0131n\u0131 etkinle\u015ftirme<\/span><\/h3>\n<p>Ayn\u0131 &#8220;E-posta Da\u011f\u0131t\u0131m\u0131&#8221; ekran\u0131nda veya baz\u0131 eski s\u00fcr\u00fcmlerde &#8220;Kimlik Do\u011frulama&#8221; (Authentication) men\u00fcs\u00fcnde <strong>DKIM<\/strong> b\u00f6l\u00fcm\u00fcn\u00fc g\u00f6receksiniz. Burada:<\/p>\n<ul>\n<li>Alan ad\u0131n\u0131z i\u00e7in DKIM <strong>etkin mi<\/strong> kontrol edin.<\/li>\n<li>Etkin de\u011filse, &#8220;Etkinle\u015ftir&#8221; (Enable) veya &#8220;Onar&#8221; butonu ile otomatik olu\u015fturun.<\/li>\n<\/ul>\n<p>cPanel, sizin i\u00e7in bir <code>default._domainkey.example.com<\/code> TXT kayd\u0131 olu\u015fturarak genel anahtar\u0131 DNS\u2019e yazar. E\u011fer DNS de cPanel\u2019den y\u00f6netiliyorsa (DCHost nameserver\u2019lar\u0131n\u0131 kullan\u0131yorsan\u0131z) bu kay\u0131tlar otomatik i\u015flenecektir. Harici DNS kullan\u0131yorsan\u0131z, cPanel\u2019in size g\u00f6sterdi\u011fi DKIM TXT kayd\u0131n\u0131, alan ad\u0131n\u0131z\u0131n DNS paneline <strong>birebir<\/strong> kopyalaman\u0131z gerekir.<\/p>\n<h3><span id=\"3_cPanelde_DMARC_kaydi_ekleme\">3) cPanel\u2019de DMARC kayd\u0131 ekleme<\/span><\/h3>\n<p>cPanel \u00e7o\u011fu kurulumda DMARC\u2019\u0131 otomatik eklemez, bu k\u0131sm\u0131 biz manuel yapaca\u011f\u0131z:<\/p>\n<ol>\n<li>cPanel ana sayfada <strong>&#8220;Zone Editor&#8221; (B\u00f6lge Edit\u00f6r\u00fc)<\/strong> men\u00fcs\u00fcn\u00fc a\u00e7\u0131n.<\/li>\n<li>Alan ad\u0131n\u0131z\u0131n yan\u0131nda &#8220;Manage&#8221; (Y\u00f6net) butonuna t\u0131klay\u0131n.<\/li>\n<li>Sa\u011f \u00fcstten &#8220;Add Record&#8221; veya &#8220;+ Add Record&#8221; diyerek yeni bir <strong>TXT<\/strong> kayd\u0131 ekleyin.<\/li>\n<\/ol>\n<p>\u0130lk a\u015famada <strong>izleme (monitoring)<\/strong> modunda ba\u015flamak en sa\u011fl\u0131kl\u0131s\u0131d\u0131r. \u00d6rne\u011fin:<\/p>\n<pre>Ad (Name): _dmarc\nT\u00fcr (Type): TXT\nTTL: 3600\nKay\u0131t (Record): \"v=DMARC1; p=none; rua=mailto:dmarc@example.com; fo=1\"<\/pre>\n<ul>\n<li><strong>p=none<\/strong>: \u015eimdilik yanl\u0131\u015f mailleri karantinaya alma veya reddetme, sadece raporla.<\/li>\n<li><strong>rua=&#8230;<\/strong>: Toplu DMARC raporlar\u0131 i\u00e7in e\u2011posta adresiniz.<\/li>\n<li><strong>fo=1<\/strong>: SPF <em>veya<\/em> DKIM\u2019ten biri bile ba\u015far\u0131s\u0131z olursa rapor g\u00f6nder.<\/li>\n<\/ul>\n<p>Birka\u00e7 hafta rapor toplay\u0131p sorunlu kaynaklar\u0131 temizledikten sonra, politikay\u0131 ad\u0131m ad\u0131m s\u0131k\u0131la\u015ft\u0131rabilirsiniz:<\/p>\n<ul>\n<li><code>p=quarantine<\/code>: \u015e\u00fcpheli mailleri al\u0131c\u0131n\u0131n spam\/junk klas\u00f6r\u00fcne it<\/li>\n<li><code>p=reject<\/code>: \u015e\u00fcpheli mailleri tamamen reddet (en sert seviye)<\/li>\n<\/ul>\n<p>Bu s\u0131k\u0131la\u015ft\u0131rma s\u00fcrecini ve RUA\/RUF raporlar\u0131n\u0131 okuma taraf\u0131n\u0131 detayl\u0131 \u00f6\u011frenmek i\u00e7in yine <a href=\"https:\/\/www.dchost.com\/blog\/gelismis-dmarc-ve-bimi-rua-ruf-raporlarindan-marka-gostergesine-nasil-yol-alinir\/\">geli\u015fmi\u015f DMARC ve BIMI rehberimize<\/a> bakabilirsiniz.<\/p>\n<h3><span id=\"4_cPanelde_test_ve_dogrulama\">4) cPanel\u2019de test ve do\u011frulama<\/span><\/h3>\n<p>Ayarlardan sonra mutlaka test edin:<\/p>\n<ul>\n<li>Kendinize veya bir test adresine mail g\u00f6nderin.<\/li>\n<li>Gelen mailin <strong>orijinal kayna\u011f\u0131n\u0131 (message source \/ original)<\/strong> a\u00e7\u0131n.<\/li>\n<li>A\u015fa\u011f\u0131daki ba\u015fl\u0131klara bak\u0131n:\n<ul>\n<li><code>Received-SPF: pass<\/code> (veya benzeri)<\/li>\n<li><code>Authentication-Results:<\/code> sat\u0131r\u0131nda <code>dkim=pass<\/code> ve <code>dmarc=pass<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>E\u011fer SPF veya DKIM ba\u015far\u0131s\u0131z g\u00f6r\u00fcn\u00fcyorsa, DNS yay\u0131l\u0131m s\u00fcresini (genelde 5\u201330 dakika) bekleyin ve tekrar deneyin. Sorun devam ederse, TXT kay\u0131tlar\u0131n\u0131zda fazla t\u0131rnak, bo\u015fluk veya sat\u0131r sonu hatas\u0131 olup olmad\u0131\u011f\u0131n\u0131 kontrol edin.<\/p>\n<h2><span id=\"VPS_Uzerinde_SPF_DKIM_ve_DMARC_Kurulumu_Panelsiz_Senaryo\">VPS \u00dczerinde SPF, DKIM ve DMARC Kurulumu (Panelsiz Senaryo)<\/span><\/h2>\n<p>Bir\u00e7ok m\u00fc\u015fterimiz, DCHost VPS \u00fczerinde kendi Postfix\/Dovecot altyap\u0131s\u0131n\u0131 kurup y\u00f6netmeyi tercih ediyor. Bu senaryoda, i\u015fin hem MTA (posta sunucusu) taraf\u0131na hem de DNS taraf\u0131na daha yak\u0131ndan dokunman\u0131z gerekiyor. A\u015fa\u011f\u0131daki ad\u0131mlar, panel kullanmayan tipik bir Linux VPS (Ubuntu\/Debian\/AlmaLinux) + Postfix + Dovecot + OpenDKIM kombinasyonu i\u00e7in genel bir yol haritas\u0131d\u0131r.<\/p>\n<p>VPS\u2019te eksiksiz bir e\u2011posta sistemi kurmak i\u00e7in Postfix, Dovecot, spam filtresi ve IP \u0131s\u0131nmas\u0131 gibi konulara da girmeniz gerekiyorsa, <a href=\"https:\/\/www.dchost.com\/blog\/vpste-e%E2%80%91posta-sunucusu-kurulumu-postfix-dovecot-rspamd-ile-teslim-edilebilirlik-ve-ip-isitma-adim-adim\/\">Postfix + Dovecot + rspamd ile VPS \u00fczerinde e\u2011posta sunucusu kurulum rehberimizi<\/a> mutlaka okuyun.<\/p>\n<h3><span id=\"1_DNS_tarafinda_temel_SPF_kaydini_olusturma\">1) DNS taraf\u0131nda temel SPF kayd\u0131n\u0131 olu\u015fturma<\/span><\/h3>\n<p>\u00d6nce, alan ad\u0131n\u0131z\u0131n DNS y\u00f6netim paneline (DCHost DNS veya registrar paneli) girin ve SPF TXT kayd\u0131n\u0131 ekleyin. \u00d6rne\u011fin yaln\u0131zca VPS IP\u2019nizden mail g\u00f6nderiyorsan\u0131z:<\/p>\n<pre>Ad (Name): @  (veya alan ad\u0131n\u0131z bo\u015f b\u0131rak\u0131l\u0131r)\nT\u00fcr (Type): TXT\nKay\u0131t (Record): \"v=spf1 a mx ip4:203.0.113.10 -all\"<\/pre>\n<p>Burada:<\/p>\n<ul>\n<li><code>a<\/code>: Alan ad\u0131n\u0131n A kayd\u0131ndaki IP (\u00e7o\u011fu zaman VPS\u2019iniz)<\/li>\n<li><code>mx<\/code>: MX kay\u0131tlar\u0131ndaki IP\u2019ler (mail.example.com gibi)<\/li>\n<li><code>ip4:203.0.113.10<\/code>: VPS IP\u2019nizi a\u00e7\u0131k\u00e7a yetkili ilan eder<\/li>\n<li><code>-all<\/code>: Di\u011fer t\u00fcm IP\u2019ler reddedilsin<\/li>\n<\/ul>\n<p>Hem <code>a<\/code> hem de <code>mx<\/code> kullan\u0131yorsan\u0131z, A ve MX kay\u0131tlar\u0131n\u0131z\u0131n ger\u00e7ekten VPS IP\u2019nize i\u015faret etti\u011finden emin olun.<\/p>\n<h3><span id=\"2_VPSte_DKIM_icin_OpenDKIM_kurulumunun_iskeleti\">2) VPS\u2019te DKIM i\u00e7in OpenDKIM kurulumunun iskeleti<\/span><\/h3>\n<p>Detaylar da\u011f\u0131t\u0131ma g\u00f6re de\u011fi\u015fmekle birlikte, genel yakla\u015f\u0131m \u015fu \u015fekildedir:<\/p>\n<ol>\n<li>Gerekli paketleri kurun (\u00f6rnek):\n<pre># Debian\/Ubuntu\napt install opendkim opendkim-tools\n\n# AlmaLinux\/Rocky\nyum install opendkim opendkim-tools<\/pre>\n<\/li>\n<li>DKIM anahtarlar\u0131n\u0131 \u00fcretmek i\u00e7in bir dizin olu\u015fturun:\n<pre>mkdir -p \/etc\/opendkim\/keys\/example.com\ncd \/etc\/opendkim\/keys\/example.com\nopendkim-genkey -s default -d example.com\nchown opendkim:opendkim default.private<\/pre>\n<\/li>\n<li><code>\/etc\/opendkim\/KeyTable<\/code> dosyas\u0131na anahtar\u0131 tan\u0131mlay\u0131n:\n<pre>default._domainkey.example.com example.com:default:\/etc\/opendkim\/keys\/example.com\/default.private<\/pre>\n<\/li>\n<li><code>\/etc\/opendkim\/SigningTable<\/code> i\u00e7ine imzalanacak alan ad\u0131n\u0131 ekleyin:\n<pre>*@example.com default._domainkey.example.com<\/pre>\n<\/li>\n<li><code>\/etc\/opendkim\/TrustedHosts<\/code> i\u00e7ine localhost ve sunucu IP\u2019lerini ekleyin.<\/li>\n<li><code>\/etc\/opendkim.conf<\/code> dosyas\u0131nda a\u015fa\u011f\u0131daki gibi ayarlar\u0131 yapt\u0131\u011f\u0131n\u0131zdan emin olun:\n<pre>Syslog          yes\nUMask           002\nMode            sv\nCanonicalization        relaxed\/simple\nSubDomains      no\nAutoRestart     yes\nAutoRestartRate 10\/1M\nKeyTable        \/etc\/opendkim\/KeyTable\nSigningTable    refile:\/etc\/opendkim\/SigningTable\nExternalIgnoreList      \/etc\/opendkim\/TrustedHosts\nInternalHosts   \/etc\/opendkim\/TrustedHosts\nSocket          inet:8891@localhost<\/pre>\n<\/li>\n<li>Postfix ile entegrasyon i\u00e7in <code>\/etc\/postfix\/main.cf<\/code> i\u00e7ine \u015funlar\u0131 ekleyin:\n<pre>milter_default_action = accept\nmilter_protocol = 6\nsmtpd_milters = inet:localhost:8891\nnon_smtpd_milters = inet:localhost:8891<\/pre>\n<\/li>\n<li>Hizmetleri yeniden ba\u015flat\u0131n:\n<pre>systemctl restart opendkim\nsystemctl restart postfix<\/pre>\n<\/li>\n<\/ol>\n<p>Bu yap\u0131land\u0131rma sonras\u0131, Postfix \u00fczerinden \u00e7\u0131kan e\u2011postalar DKIM ile imzalanacakt\u0131r. \u015eimdi kalan, genel anahtar\u0131 DNS\u2019e ta\u015f\u0131mak.<\/p>\n<h3><span id=\"3_DKIM_genel_anahtarini_DNSe_ekleme\">3) DKIM genel anahtar\u0131n\u0131 DNS\u2019e ekleme<\/span><\/h3>\n<p>Az \u00f6nce olu\u015fturdu\u011funuz dizinde bir <code>default.txt<\/code> dosyas\u0131 olu\u015ftu. \u0130\u00e7inde a\u015fa\u011f\u0131ya benzer bir sat\u0131r g\u00f6r\u00fcrs\u00fcn\u00fcz:<\/p>\n<pre>default._domainkey IN TXT ( \"v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFA...\" ) ; ----- DKIM key default for example.com<\/pre>\n<p>DNS panelinizde yeni bir <strong>TXT kayd\u0131<\/strong> ekleyin:<\/p>\n<ul>\n<li><strong>Ad (Name)<\/strong>: <code>default._domainkey<\/code><\/li>\n<li><strong>T\u00fcr (Type)<\/strong>: TXT<\/li>\n<li><strong>De\u011fer (Record)<\/strong>: <code>\"v=DKIM1; k=rsa; p=...\"<\/code> k\u0131sm\u0131n\u0131 sat\u0131r sonlar\u0131 olmadan tek sat\u0131r yaparak girin.<\/li>\n<\/ul>\n<p>TXT de\u011ferini eklerken sat\u0131r sonlar\u0131, gereksiz bo\u015fluklar veya yorum (<code>;<\/code> sonras\u0131) kopmamal\u0131. En garanti y\u00f6ntem, sadece t\u0131rnak i\u00e7indeki <code>v=DKIM1; ...<\/code> k\u0131sm\u0131n\u0131 al\u0131p, tek sat\u0131r \u015feklinde yap\u0131\u015ft\u0131rmakt\u0131r.<\/p>\n<h3><span id=\"4_DMARC_kaydini_DNSte_eklemek\">4) DMARC kayd\u0131n\u0131 DNS\u2019te eklemek<\/span><\/h3>\n<p>VPS \u00fczerinde olsan\u0131z da DMARC tamamen DNS taraf\u0131nda \u00e7al\u0131\u015f\u0131r. Temel bir DMARC kayd\u0131:<\/p>\n<pre>Ad (Name): _dmarc\nT\u00fcr (Type): TXT\nKay\u0131t (Record): \"v=DMARC1; p=none; rua=mailto:dmarc@example.com; fo=1\"<\/pre>\n<p>Ba\u015flang\u0131\u00e7ta <code>p=none<\/code> ile ba\u015flamak, hatal\u0131 kaynaklar\u0131 raporlar \u00fczerinden tespit etmenizi sa\u011flar. Postfix loglar\u0131 ve DMARC raporlar\u0131n\u0131 birlikte okuyarak:<\/p>\n<ul>\n<li>Yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f script veya uygulamalar\u0131<\/li>\n<li>Yetkisiz IP\u2019lerden yap\u0131lan denemeleri<\/li>\n<li>Alan ad\u0131n\u0131z\u0131 taklit eden phishing sald\u0131r\u0131lar\u0131n\u0131<\/li>\n<\/ul>\n<p>ad\u0131m ad\u0131m temizleyebilirsiniz. \u0130lerleyen a\u015famada DMARC\u2019\u0131 <code>quarantine<\/code> ve <code>reject<\/code> politikalar\u0131na \u00e7ekmek i\u00e7in yine geli\u015fmi\u015f rehberimize d\u00f6nebilirsiniz.<\/p>\n<h3><span id=\"5_Reverse_DNS_PTR_ve_hostname_kontrolu\">5) Reverse DNS (PTR) ve hostname kontrol\u00fc<\/span><\/h3>\n<p>Teknik olarak SPF\/DKIM\/DMARC d\u0131\u015f\u0131nda kalsa da, <strong>rDNS (PTR) kayd\u0131<\/strong> neredeyse her ciddi al\u0131c\u0131 sunucu i\u00e7in kritik bir sinyal.<\/p>\n<ul>\n<li>VPS IP\u2019niz i\u00e7in PTR kayd\u0131n\u0131n <strong>mail.example.com<\/strong> gibi anlaml\u0131 bir ana makine ad\u0131na i\u015faret etmesi gerekir.<\/li>\n<li>Bu hostname\u2019in A kayd\u0131 da ayn\u0131 IP\u2019ye d\u00f6nmelidir (forward ve reverse tutarl\u0131 olmal\u0131).<\/li>\n<li>Postfix <code>myhostname<\/code> de\u011feriyle bu hostname uyumlu olmal\u0131d\u0131r.<\/li>\n<\/ul>\n<p>DCHost VPS hizmetlerinde PTR kayd\u0131 genellikle m\u00fc\u015fteri paneli \u00fczerinden ayarlanabilir. IPv6 kullan\u0131yorsan\u0131z, <a href=\"https:\/\/www.dchost.com\/blog\/ipv6-ile-e%E2%80%91posta-teslimi-nasil-rayina-oturur-ptr-helo-spf-ve-rbllerle-saha-rehberi\/\">IPv6 ile e-posta teslimi rehberimizde<\/a> PTR, HELO ve SPF ili\u015fkisinin IPv6 taraf\u0131ndaki n\u00fcanslar\u0131n\u0131 detayl\u0131 anlatt\u0131k.<\/p>\n<h3><span id=\"6_Log_ve_test_tarafi\">6) Log ve test taraf\u0131<\/span><\/h3>\n<p>VPS \u00fczerinde sorun ay\u0131klarken en b\u00fcy\u00fck yard\u0131mc\u0131n\u0131z log dosyalar\u0131d\u0131r:<\/p>\n<ul>\n<li>Debian\/Ubuntu: <code>\/var\/log\/mail.log<\/code><\/li>\n<li>RHEL\/AlmaLinux\/Rocky: <code>\/var\/log\/maillog<\/code><\/li>\n<\/ul>\n<p>DKIM taraf\u0131nda OpenDKIM loglar\u0131n\u0131, Postfix taraf\u0131nda ise <code>status=sent<\/code> gibi sat\u0131rlar\u0131 takip edin. Test i\u00e7in:<\/p>\n<ul>\n<li>B\u00fcy\u00fck e\u2011posta sa\u011flay\u0131c\u0131lar\u0131nda birka\u00e7 test hesab\u0131 olu\u015fturup oraya mail g\u00f6nderin.<\/li>\n<li>Gelen mailin source\u2019unu a\u00e7arak <code>spf=pass<\/code>, <code>dkim=pass<\/code>, <code>dmarc=pass<\/code> sat\u0131rlar\u0131n\u0131 kontrol edin.<\/li>\n<li>DMARC RUA raporlar\u0131n\u0131 g\u00fcnl\u00fck\/haftal\u0131k takip ederek yanl\u0131\u015f yap\u0131land\u0131rmalar\u0131 tespit edin.<\/li>\n<\/ul>\n<h2><span id=\"Yaygin_Hatalar_Ince_Noktalar_ve_Iyi_Uygulamalar\">Yayg\u0131n Hatalar, \u0130nce Noktalar ve \u0130yi Uygulamalar<\/span><\/h2>\n<h3><span id=\"E-posta_yonlendirme_SPFDMARCi_neden_bozar\">E-posta y\u00f6nlendirme SPF\/DMARC\u2019\u0131 neden bozar?<\/span><\/h3>\n<p>En klasik sorunlardan biri \u015fudur: Alan ad\u0131n\u0131z i\u00e7in SPF\/DMARC kurars\u0131n\u0131z, kendi g\u00f6nderdi\u011finiz maillerde sorun yoktur; ama bir kullan\u0131c\u0131, adresini ba\u015fka bir posta kutusuna <strong>forward<\/strong> ediyordur ve o adrese giden mailler SPF\/DMARC hatas\u0131yla reddedilir.<\/p>\n<p>\u00c7\u00fcnk\u00fc klasik y\u00f6nlendirme, maili farkl\u0131 bir IP \u00fczerinden, orijinal g\u00f6ndereni koruyarak iletir. Bu da SPF uyumsuzlu\u011fu yarat\u0131r. Bu sorunu \u00e7\u00f6zmek i\u00e7in <strong>SRS<\/strong> ve <strong>ARC<\/strong> gibi mekanizmalar kullan\u0131l\u0131r. Detayl\u0131 senaryolar i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/e%E2%80%91posta-yonlendirmede-spf-dmarc-neden-kiriliyor-srs-ve-arc-ile-nasil-tatli-tatli-onarirsin\/\">e-posta y\u00f6nlendirmede SPF\/DMARC neden k\u0131r\u0131l\u0131yor rehberimize<\/a> mutlaka g\u00f6z at\u0131n.<\/p>\n<h3><span id=\"SPF_lookup_sinirina_takilmak\">SPF lookup s\u0131n\u0131r\u0131na tak\u0131lmak<\/span><\/h3>\n<p>Bir\u00e7ok servis i\u00e7in <code>include:<\/code> ekledi\u011finizde, SPF kayd\u0131n\u0131z h\u0131zla \u015fi\u015fer. SPF standard\u0131, DNS lookup say\u0131s\u0131n\u0131 10 ile s\u0131n\u0131rlar. Bu s\u0131n\u0131r\u0131 a\u015ft\u0131\u011f\u0131n\u0131zda, SPF kayd\u0131n\u0131z <strong>permerror<\/strong> verir ve pratikte yok say\u0131l\u0131r.<\/p>\n<p>Bu noktada yapman\u0131z gerekenler:<\/p>\n<ul>\n<li>Kulland\u0131\u011f\u0131n\u0131z servisleri ger\u00e7ekten gerekli olanlarla s\u0131n\u0131rlamak<\/li>\n<li>Gereksiz <code>include:<\/code> sat\u0131rlar\u0131n\u0131 kald\u0131rmak<\/li>\n<li>SPF flattening gibi tekniklerle kay\u0131tlar\u0131 sadele\u015ftirmek<\/li>\n<\/ul>\n<p>Bu konuyu pratik \u00f6rneklerle <a href=\"https:\/\/www.dchost.com\/blog\/spf-flattening-ile-10-lookup-duvarini-nasil-asarsin-ci-cd-ve-workers-ile-yasayan-spf\/\">SPF flattening yaz\u0131m\u0131zda<\/a> detayl\u0131 ele ald\u0131k.<\/p>\n<h3><span id=\"Yeni_IPde_aninda_8220reject8221_DMARC_kullanmak\">Yeni IP\u2019de an\u0131nda &#8220;reject&#8221; DMARC kullanmak<\/span><\/h3>\n<p>Yeni bir VPS veya yeni bir IP ile sahneye \u00e7\u0131k\u0131yorsan\u0131z, IP\u2019niz hen\u00fcz al\u0131c\u0131lar g\u00f6z\u00fcnde bir &#8220;itibar&#8221; in\u015fa etmemi\u015ftir. B\u00f6yle bir ortamda direkt <code>p=reject<\/code> DMARC politikas\u0131 ile ba\u015flamak, ufak hatalarda bile maillerinizin topluca reddedilmesine neden olabilir.<\/p>\n<p>\u0130yi pratik \u015fudur:<\/p>\n<ol>\n<li>SPF ve DKIM\u2019i eksiksiz kurun.<\/li>\n<li>DMARC\u2019\u0131 <code>p=none<\/code> ile devreye al\u0131n ve birka\u00e7 hafta\/ay rapor toplay\u0131n.<\/li>\n<li>IP \u0131s\u0131nmas\u0131, kara liste kontrol\u00fc ve postmaster ara\u00e7lar\u0131yla itibar\u0131n\u0131z\u0131 g\u00fc\u00e7lendirin.<\/li>\n<li>\u00d6nce <code>p=quarantine<\/code>, sonra <code>p=reject<\/code> seviyesine kademeli ge\u00e7i\u015f yap\u0131n.<\/li>\n<\/ol>\n<p>IP \u0131s\u0131nmas\u0131 ve kara listelerden \u00e7\u0131kma s\u00fcre\u00e7leri i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/e-posta-itibarini-kurtarma-rehberi-blacklist-delisting-postmaster-araclari-ve-guvenli-ip-isitma-nasil-kurtarici-olur\/\">e-posta itibar\u0131n\u0131 kurtarma rehberimizde<\/a> ger\u00e7ek\u00e7i bir yol haritas\u0131 payla\u015ft\u0131k.<\/p>\n<h3><span id=\"SPF_DKIM_DMARC_ve_rDNSi_birlikte_dusunmek\">SPF, DKIM, DMARC ve rDNS\u2019i birlikte d\u00fc\u015f\u00fcnmek<\/span><\/h3>\n<p>Tek ba\u015f\u0131na SPF veya tek ba\u015f\u0131na DKIM, bug\u00fcn \u00e7o\u011fu b\u00fcy\u00fck sa\u011flay\u0131c\u0131 i\u00e7in yeterli de\u011fil. Sa\u011flam bir kurulumda en az\u0131ndan:<\/p>\n<ul>\n<li>SPF: Do\u011fru IP listesini i\u00e7ermeli, permerror vermemeli<\/li>\n<li>DKIM: Tutarl\u0131 selector ve imzalarla t\u00fcm \u00e7\u0131k\u0131\u015f maillerini imzalamal\u0131<\/li>\n<li>DMARC: En az\u0131ndan <code>p=none<\/code> ile devrede olmal\u0131<\/li>\n<li>rDNS (PTR): IP \u2192 hostname \u2192 IP \u00fc\u00e7geni tutarl\u0131 olmal\u0131<\/li>\n<\/ul>\n<p>Bunlar\u0131 u\u00e7tan uca g\u00f6rmek isterseniz, <a href=\"https:\/\/www.dchost.com\/blog\/spf-dkim-dmarc-ve-rdns-ile-e-posta-teslim-edilebilirligini-nasil-adim-adim-yukseltirsin\/\">SPF, DKIM, DMARC ve rDNS ile teslim edilebilirli\u011fi y\u00fckseltme makalemizde<\/a> farkl\u0131 senaryolar \u00fczerinden ge\u00e7tik.<\/p>\n<h2><span id=\"DCHost_Tarafinda_Hangi_Altyapiyi_Secmeliyim\">DCHost Taraf\u0131nda Hangi Altyap\u0131y\u0131 Se\u00e7meliyim?<\/span><\/h2>\n<p>E-posta do\u011frulama taraf\u0131 netle\u015ftikten sonra, s\u0131ra \u015fu soruya geliyor: &#8220;Bu sistemi nerede \u00e7al\u0131\u015ft\u0131ray\u0131m?&#8221;<\/p>\n<ul>\n<li><strong>K\u00fc\u00e7\u00fck i\u015fletmeler, portf\u00f6y siteleri, bloglar<\/strong>: Genellikle <strong>payla\u015f\u0131ml\u0131 hosting<\/strong> \u00fczerinde cPanel ile gelen mail hizmeti yeterli olur. SPF ve DKIM, birka\u00e7 t\u0131klama ile devreye al\u0131n\u0131r; DMARC ise bu yaz\u0131daki gibi manuel bir TXT kayd\u0131yla eklenir.<\/li>\n<li><strong>Daha y\u00fcksek hacimli g\u00f6nderim yapan SaaS, e\u2011ticaret veya kurumsal yap\u0131lar<\/strong>: IP itibar\u0131n\u0131 kendiniz y\u00f6netmek, \u00f6zel filtreleme ve kuyruklama kurallar\u0131 yazmak istiyorsan\u0131z, <strong>DCHost VPS<\/strong> veya <strong>dedicated sunucu<\/strong> \u00fczerinde kendi MTA\u2019n\u0131z\u0131 kurmak mant\u0131kl\u0131d\u0131r.<\/li>\n<li><strong>Kritik kesintisizlik ve \u00f6zel donan\u0131m isteyenler<\/strong>: Mevcut fiziksel sunucular\u0131n\u0131z\u0131 <strong>colocation<\/strong> ile veri merkezimize getirip, e\u2011posta altyap\u0131n\u0131z\u0131 tamamen kendi donan\u0131m\u0131n\u0131z \u00fczerinde \u00e7al\u0131\u015ft\u0131rabilirsiniz.<\/li>\n<\/ul>\n<p>VPS taraf\u0131nda kaynak planlamas\u0131, IP se\u00e7imi ve g\u00fcvenlik ayarlar\u0131yla ilgili daha geni\u015f bir bak\u0131\u015f a\u00e7\u0131s\u0131 i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/vps-hosting-nedir-kucuk-isletmeler-icin-avantajlari-ve-kullanim-alanlari\/\">VPS hosting nedir ve avantajlar\u0131<\/a> ile <a href=\"https:\/\/www.dchost.com\/blog\/vps-sunucu-guvenligi-nasil-saglanir-kapiyi-acik-birakmadan-yasamanin-sirri\/\">VPS sunucu g\u00fcvenli\u011fi rehberlerimize<\/a> g\u00f6z atabilirsiniz.<\/p>\n<h2><span id=\"Ozet_ve_Sonraki_Adimlar\">\u00d6zet ve Sonraki Ad\u0131mlar<\/span><\/h2>\n<p>\u00d6zel alan ad\u0131n\u0131zla kurumsal e\u2011posta kullanmak, art\u0131k sadece MX kayd\u0131 eklemekten ibaret de\u011fil. Sa\u011flam bir e\u2011posta kimlik do\u011frulamas\u0131 i\u00e7in:<\/p>\n<ul>\n<li><strong>SPF<\/strong> ile hangi IP\u2019lerin sizin ad\u0131n\u0131za mail g\u00f6ndermeye yetkili oldu\u011funu ilan ediyor,<\/li>\n<li><strong>DKIM<\/strong> ile g\u00f6nderdi\u011finiz her maili kriptografik olarak imzal\u0131yor,<\/li>\n<li><strong>DMARC<\/strong> ile SPF\/DKIM sonu\u00e7lar\u0131na g\u00f6re al\u0131c\u0131lara net bir politika sunuyor ve rapor al\u0131yorsunuz.<\/li>\n<\/ul>\n<p>cPanel ortam\u0131nda \u00e7o\u011fu ad\u0131m t\u0131klamal\u0131 ekranlarla birka\u00e7 dakikada tamamlan\u0131yor; VPS taraf\u0131nda ise biraz daha fazla dosya d\u00fczenleyip, komut sat\u0131r\u0131na girmeniz gerekiyor. Ama kar\u015f\u0131l\u0131\u011f\u0131nda ne al\u0131yorsunuz? Daha az spam kutusu \u015fik\u00e2yeti, daha g\u00fc\u00e7l\u00fc bir marka alg\u0131s\u0131 ve alan ad\u0131n\u0131z k\u00f6t\u00fc niyetli ki\u015filer taraf\u0131ndan taklit edilmeye \u00e7al\u0131\u015f\u0131ld\u0131\u011f\u0131nda dahi elinizde somut veriler.<\/p>\n<p>Sonraki ad\u0131m olarak \u015funlar\u0131 yapman\u0131z\u0131 \u00f6neririm:<\/p>\n<ol>\n<li>Alan ad\u0131n\u0131z i\u00e7in mevcut SPF, DKIM ve DMARC durumunu kontrol edin.<\/li>\n<li>cPanel veya VPS ortam\u0131n\u0131zda bu yaz\u0131daki ad\u0131mlarla eksikleri kapat\u0131n.<\/li>\n<li>DMARC\u2019\u0131 <code>p=none<\/code> ile devreye al\u0131p en az birka\u00e7 hafta rapor toplay\u0131n.<\/li>\n<li>Rapor ve log analizlerini oturttuktan sonra politikalar\u0131 kademeli s\u0131k\u0131la\u015ft\u0131r\u0131n.<\/li>\n<\/ol>\n<p>E\u011fer altyap\u0131n\u0131z\u0131 ta\u015f\u0131may\u0131, yeni bir VPS\u2019e ge\u00e7meyi veya IP de\u011fi\u015fikli\u011fi yapmay\u0131 planl\u0131yorsan\u0131z, ge\u00e7i\u015f s\u0131ras\u0131nda e\u2011posta taraf\u0131nda kesinti ya\u015famamak i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/e-posta-altyapisini-tasirken-kesinti-yasamamak\/\">e-posta altyap\u0131s\u0131n\u0131 ta\u015f\u0131rken kesinti ya\u015famamak rehberimizi<\/a> mutlaka okuyun. DCHost ekibi olarak, alan ad\u0131ndan DNS\u2019e, hosting\u2019den VPS ve <a href=\"https:\/\/www.dchost.com\/tr\/fiziksel-sunucu\">dedicated sunucu<\/a>lara kadar t\u00fcm katmanda ayn\u0131 masada oturuyoruz; e\u2011posta do\u011frulamas\u0131n\u0131 da bu b\u00fct\u00fcn resmin do\u011fal bir par\u00e7as\u0131 olarak g\u00f6rmenizde fayda var.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u0130&ccedil;indekiler1 Neden SPF, DKIM ve DMARC Art\u0131k Zorunlu Hale Geldi?2 SPF, DKIM ve DMARC Temelleri2.1 SPF nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r?2.2 DKIM nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r?2.3 DMARC nedir, neden kritik?3 E\u2011Posta Do\u011frulamas\u0131na Ge\u00e7meden \u00d6nce Haz\u0131rl\u0131klar4 cPanel \u00dczerinde SPF, DKIM ve DMARC Kurulumu4.1 1) cPanel\u2019de SPF kayd\u0131n\u0131 etkinle\u015ftirme ve kontrol4.2 2) cPanel\u2019de DKIM kayd\u0131n\u0131 etkinle\u015ftirme4.3 3) cPanel\u2019de DMARC kayd\u0131 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2912,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-2911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji"],"_links":{"self":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/2911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/comments?post=2911"}],"version-history":[{"count":0,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/2911\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media\/2912"}],"wp:attachment":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media?parent=2911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/categories?post=2911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/tags?post=2911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}