{"id":2843,"date":"2021-03-18T10:33:32","date_gmt":"2021-03-18T10:33:32","guid":{"rendered":"https:\/\/prodmarc.com\/knowledge\/?p=134"},"modified":"2021-03-18T10:33:32","modified_gmt":"2021-03-18T10:33:32","slug":"importance-of-dkim-2","status":"publish","type":"post","link":"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/importance-of-dkim-2\/","title":{"rendered":"The importance of DKIM in email authentication and passing DMARC?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2843\" class=\"elementor elementor-2843\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ee8f9aa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ee8f9aa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39f103d3\" data-id=\"39f103d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-897c788 elementor-widget elementor-widget-text-editor\" data-id=\"897c788\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>DKIM (DomainKeys Identified Mail):<\/strong><\/p>\n<p>DKIM stands for DomainKeys Identified Mail and is used for the authentication of an email that\u2019s being sent. It is an email security standard designed to make sure messages aren\u2019t altered in transit between the sending and recipient servers.<\/p>\n<p>It uses public-key cryptography to sign email with a private key as it leaves a sending server. Recipient servers then use a public key published to a domain\u2019s DNS to verify the source of the message, and that the body of the message hasn\u2019t changed during transit. Once the signature is verified with the public key by the recipient server, the message passes DKIM and is considered authentic.<\/p>\n<p>The DMARC protocol relies on SPF and DKIM to function.<\/p>\n<p><\/p>\n<p><\/p>\n<p>SPF authenticates the sending server of an email based on the sending IPv4 or IPv6 address. Therefore, when that email gets auto-forwarded, the IP address changes, causing SPF to fail. This is one of the limitations of SPF, hence you should not rely simply on SPF but also configure DKIM.<\/p>\n<p>DKIM, on the other hand, authenticates the email based on the sending domain, as well as the email content, using a digital signature. Since the verification of this Public\/Private key pair is performed via lookups of the sending domain&#8217;s DNS records, it can be performed at any point along the forwarding, and therefore will survive forwarding.<\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DKIM (DomainKeys Identified Mail): DKIM stands for DomainKeys Identified Mail and is used for the authentication of an email that\u2019s being sent. It is an email security standard designed to<\/p>\n<p><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/importance-of-dkim-2\/\" class=\"more-link\">Continue Reading<span class=\"screen-reader-text\">The importance of DKIM in email authentication and passing DMARC?<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[6],"tags":[39,56,68,103],"class_list":["post-2843","post","type-post","status-publish","format-standard","hentry","category-dkim","tag-dkim","tag-dmarc","tag-email-authentication","tag-passing-dmarc"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts\/2843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/comments?post=2843"}],"version-history":[{"count":0,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts\/2843\/revisions"}],"wp:attachment":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/media?parent=2843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/categories?post=2843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/tags?post=2843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}