Email authentication method designed to detect email spoofing
Internet protocol suite
Application layer
BGP
DHCP (v6)
DNS
FTP
HTTP (HTTP/3)
HTTPS
IMAP
IRC
LDAP
MGCP
MQTT
NNTP
NTP
OSPF
POP
PTP
ONC/RPC
RTP
RTSP
RIP
SIP
SMTP
SNMP
SSH
Telnet
TLS/SSL
XMPP
more...
Transport layer
TCP
UDP
DCCP
SCTP
RSVP
QUIC
more...
Internet layer
IP
v4
v6
ICMP (v6)
NDP
ECN
IGMP
IPsec
more...
Link layer
ARP
Tunnels
PPP
MAC
more...
v
t
e
DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam.
DKIM allows the receiver to check that an email that claimed to have come from a specific domain was indeed authorized by the owner of that domain.[1] It achieves this by affixing a digital signature, linked to a domain name, to each outgoing email message. The recipient system can verify this by looking up the sender's public key published in the DNS. A valid signature also guarantees that some parts of the email (possibly including attachments) have not been modified since the signature was affixed.[2] Usually, DKIM signatures are not visible to end-users, and are affixed or verified by the infrastructure rather than the message's authors and recipients.
DKIM is an Internet Standard.[3] It is defined in RFC 6376, dated September 2011, with updates in RFC 8301 and RFC 8463.
^Tony Hansen; Dave Crocker; Phillip Hallam-Baker (July 2009). DomainKeys Identified Mail (DKIM) Service Overview. IETF. doi:10.17487/RFC5585. RFC 5585. Retrieved 6 January 2016. Receivers who successfully verify a signature can use information about the signer as part of a program to limit spam, spoofing, phishing, or other undesirable behaviors. DKIM does not, itself, prescribe any specific actions by the recipient; rather, it is an enabling technology for services that do.
^Dave Crocker; Tony Hansen; Murray S. Kucherawy, eds. (September 2011). "Data Integrity". DomainKeys Identified Mail (DKIM) Signatures. IETF. sec. 1.5. doi:10.17487/RFC6376. RFC 6376. Retrieved 6 January 2016. Verifying the signature asserts that the hashed content has not changed since it was signed and asserts nothing else about "protecting" the end-to-end integrity of the message.
^Crocker, D.; Hansen, T.; Kucherawy, M. (September 2011). "DomainKeys Identified Mail (DKIM) Signatures". RFC Editor. ISSN 2070-1721. Retrieved 30 March 2020.
and 26 Related for: DomainKeys Identified Mail information
DomainKeysIdentifiedMail (DKIM) is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often...
Sender Policy Framework (SPF) and DomainKeysIdentifiedMail (DKIM). It allows the administrative owner of a domain to publish a policy in their DNS records...
detect forging sender addresses during the delivery of the email. DomainKeysIdentifiedMail (DKIM) – an email authentication method designed to detect forged...
paper about email authentication covering SPF, Sender ID, and DomainKeysIdentifiedMail (DKIM). In their "Sender Best Communication Practices" the MAAWG...
Sender Policy Framework (SPF) and DomainKeysIdentifiedMail (DKIM). It allows the administrative owner of a domain to publish a policy in their DNS records...
than Authentication-Results. DKIM-Signature: stores results of DomainKeysIdentifiedMail (DKIM) decryption to verify the message was not changed after...
Instead, mail servers now use a range of techniques, such as stricter enforcement of standards such as RFC 5322, DomainKeysIdentifiedMail, Sender Policy...
of TXT usage: Verification of domain ownership Implementation of Sender Policy Framework (SPF) DomainKeysIdentifiedMail (DKIM) records for verifying...
Levine (September 2018). A New Cryptographic Signature Method for DomainKeysIdentifiedMail (DKIM). IETF. doi:10.17487/RFC8463. RFC 8463. E Rescorla (September...
policy. The abuse POC of an authenticated domain who handled the reported message. DomainKeysIdentifiedMail (DKIM) is the usual authentication protocol...
or domains. Email spoofing and similar issues which facilitate phishing are addressed by the 'stack' of Sender Policy Framework (SPF), DomainKeys Identified...
to filter outgoing spam; however, other applications such as DomainKeysIdentifiedMail (DKIM) signing also exist SMTP proxies come in a few fundamental...
email stamps based on proof-of-work Sender Policy Framework and DomainKeysIdentifiedMail URI blacklists such as SURBL or URIBL which track spam websites...
DNS domain of an e-mail sender and the message integrity. Mark is one of the authors of DomainKeysIdentifiedMail, a development of DomainKeys. He was...
authentic by using the DomainKeysIdentifiedMail (DKIM) contained in these emails' signatures. However, not all of the emails have these keys in their signature...
data. Notes can function as an IMAP and POP email client with non-Domino mail servers. The system can retrieve recipient addresses from any LDAP server...
claims to be sent. For this, it uses the technology Sender ID and DomainKeysIdentifiedMail (DKIM). SmartScreen Filter also ensures that one email[clarification...
of a VBR email certification service signs its messages using DomainKeysIdentifiedMail (DKIM) and includes a VBR-Info field in the signed header. The...
and Service Management Tool DIVX—Digital Video Express DKIM—DomainKeysIdentifiedMail DL—Download DLL—Dynamic Link Library DLNA—Digital Living Network...
Permalink Scientific literature Universally unique identifier (UUID) Other registries are identified by other strings at the start of the prefix. "ISO...
specifically identified the need to secure DNS. Wide-scale deployment of DNSSEC could resolve many other security problems as well, such as secure key distribution...