Continuing the discussion from How to Define a DMARC Record in MIAB:
- Generate a key: http://dkimcore.org/tools/keys.html
- Create a custom text record TXT
- Name is box._domainkey
- Part One of the Value/Data is "v=DKIM1; k=rsa; s=email;
- Part Two includes the key you generated in step 1, with p=some long key
Further information: http://www.dkim.org/
What is DKIM?
DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message that is in transit.
How DKIM works
- attaches a new domain name identifier to a message
- validates the domain name identifier via cryptography
I have flagged your comment as inappropriate
Option #1: Use the DKIM records listed in your MIAB Admin Panel. Go to System -> External DNS, and copy the values into your DNS provider’s records. Note: DKIM can fail even if set up correctly in the DNS! See also: DKIM-Signature header exists but is not valid
My results from http://www.isnotspam.com/
ID(s) verified: header.Fromfirstname.lastname@example.org
DomainKeys DNS Record=box._domainkey.example.com
What Google Domains told me:
“I mean, the DNS are set up correctly so it shouldn’t have any issues with the DKIM. There’s a possibility that the mail server itself that is having an issue that’s why you’re getting this error…It seems the problem is with the email host. Please note that our scope of support is within Google Domains only. We do have limited information about how a mailserver work. The DNS is set up correctly, it’s best that you contact your mail host to check why you’re still getting this issues even if the DKIM record is already added.”
How DKIM works:
Step 1: Identifying what message elements to sign with DKIM
Step 2: The encryption process
Step 3: Validating the DKIM signature with a public key
Option#2: How to create a DKIM Record (the long way):
1.) Inventory all of your sending domains.
2.) Install and configure DKIM on your email server.
3.) Create a public and private key pair.
4.) Publish your public key.
5.) Store your private key.
6.) Configure your email server.
Is DKIM even worth it?
DKIM attempts to allow a recipient to verify that the domain from which the message is purported to originate is in fact the sender of that message. The sending domain digitally signs the message and specified parts of the message envelope using a private key, and puts the signature into a “DKIM-Signature” field. The recipient reads this field, which includes the name of the purported sending domain, and retrieves that domain’s public key from the DNS. It uses this to verify the signature against the contents of the message. This proves both that the message was in fact sent by the domain which claims to have sent it and that the signed parts of the message were not modified in transit.
This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.