O'Reilly logo

Managing Mission - Critical Domains and DNS by Mark E. Jeftovic

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

DKIM

As with SPF, DKIM publishes its data via a TXT RR within the zone, in this case the public key used to verify the signed emails.

However, it doesn't end there; the other side of the equation requires that the originating mail server (MTA) also has the DKIM private key installed and signs each outbound message with it.

The receiving servers will them use the public key from the zone's DKIM TXT RR to authenticate the signature on the inbound email, and optionally refer to a DMARC policy to decide how to handle the message.

The DKIM record uses a selector to identify which public key should be used in verifying the signature. Organizations can use multiple selectors for multiple signatures corresponding to any logical distinction of their ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required