diff --git a/_modules/index.html b/_modules/index.html index fa44567..b490e19 100644 --- a/_modules/index.html +++ b/_modules/index.html @@ -8,7 +8,7 @@ -
pasedmarc is a Python module and CLI utility for parsing aggregate DMARC reports.
usage: parsedmarc.py [-h] [-f FORMAT] [-o OUTPUT]
[-n NAMESERVER [NAMESERVER ...]] [-t TIMEOUT] [-v]
file_path [file_path ...]
@@ -210,7 +211,7 @@
Here are the results from parsing the example report from the dmarc.org wiki. It’s actually an older draft of the the 1.0 report schema standardized in @@ -218,7 +219,7 @@ report schema standardized in This draft schema is still in wide use.
parsedmarc produces consistent, normalized output, regardless of the report schema.
{
"xml_schema": "draft",
"report_metadata": {
@@ -282,7 +283,7 @@ This draft schema is still in wide use.
xml_schema,org_name,org_email,org_extra_contact_info,report_id,begin_date,end_date,errors,domain,adkim,aspf,p,sp,pct,fo,source_ip_address,source_country,source_reverse_dns,source_base_domain,count,disposition,dkim_alignment,spf_alignment,policy_override_reasons,policy_override_comments,envelope_from,header_from,envelope_to,dkim_domains,dkim_selectors,dkim_results,spf_domains,spf_scopes,spf_results
draft,acme.com,noreply-dmarc-support@acme.com,http://acme.com/dmarc/support,9391651994964116463,2012-04-27 20:00:00,2012-04-28 19:59:59,[],example.com,r,r,none,none,100,0,72.150.241.94,US,adsl-72-150-241-94.shv.bellsouth.net,bellsouth.net,2,none,fail,pass,,,example.com,example.com,,example.com,none,fail,example.com,mfrom,pass
Forensic DMARC reports are emails with an attached email sample that failed a DMARC check. You can parse them with any email message parser, such as mail-parser.
@@ -299,12 +300,12 @@ provide only the message headers, and not the message’s content, for privacy reasons.