{"id":122,"date":"2021-03-18T10:13:58","date_gmt":"2021-03-18T10:13:58","guid":{"rendered":"https:\/\/prodmarc.com\/knowledge\/?p=122"},"modified":"2021-03-18T10:13:58","modified_gmt":"2021-03-18T10:13:58","slug":"how-dkim-protects","status":"publish","type":"post","link":"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/how-dkim-protects\/","title":{"rendered":"How DKIM protects?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"122\" class=\"elementor elementor-122\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ba08b15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ba08b15\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d0e989\" data-id=\"2d0e989\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b71398d elementor-widget elementor-widget-text-editor\" data-id=\"3b71398d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<div class=\"accordion-item-header active\"><strong>What is DKIM?<\/strong><\/div>\n<div>\u00a0<\/div>\n<div class=\"accordion-item-header active\">DKIM stands for DomainKeys Identified Mail and is used for the authentication of an email that\u2019s being sent. It is an email security standard designed to make sure messages aren\u2019t altered in transit between the sending and recipient servers.<\/div>\n<div>\u00a0<\/div>\n<div class=\"accordion-item-header active\">It uses public-key cryptography to sign email with a private key as it leaves a sending server. Recipient servers then use a public key published to a domain\u2019s DNS to verify the source of the message, and that the body of the message hasn\u2019t changed during transit. Once the signature is verified with the public key by the recipient server, the message passes DKIM and is considered authentic.<\/div>\n<div>\u00a0<\/div>\n<div class=\"accordion-item-header active\">DomainKeys Identified Mail(DKIM) protects against spoofing of the content of the email(both body and headers), by adding a cryptographic hash of the entire email as an SMTP header. If a message passes DKIM, then you know that the body of the message hasn\u2019t been modified since the message was cryptographically signed.<\/div>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is DKIM? \u00a0 DKIM stands for DomainKeys Identified Mail and is used for the authentication of an email that\u2019s being sent. It is an email security standard designed to<\/p>\n<p><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/how-dkim-protects\/\" class=\"more-link\">Continue Reading<span class=\"screen-reader-text\">How DKIM protects?<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[6],"tags":[39,56,106,134],"class_list":["post-122","post","type-post","status-publish","format-standard","hentry","category-dkim","tag-dkim","tag-dmarc","tag-protect-against-spoofing","tag-spoofing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts\/122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/comments?post=122"}],"version-history":[{"count":0,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts\/122\/revisions"}],"wp:attachment":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/media?parent=122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/categories?post=122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/tags?post=122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}