Skip to Main Content
Managing Mission - Critical Domains and DNS
book

Managing Mission - Critical Domains and DNS

by Mark E.Jeftovic
June 2018
Intermediate to advanced content levelIntermediate to advanced
368 pages
11h 1m
English
Packt Publishing
Content preview from Managing Mission - Critical Domains and DNS

DKIM

As with SPF, DKIM publishes its data via a TXT RR within the zone, in this case the public key used to verify the signed emails.

However, it doesn't end there; the other side of the equation requires that the originating mail server (MTA) also has the DKIM private key installed and signs each outbound message with it.

The receiving servers will them use the public key from the zone's DKIM TXT RR to authenticate the signature on the inbound email, and optionally refer to a DMARC policy to decide how to handle the message.

The DKIM record uses a selector to identify which public key should be used in verifying the signature. Organizations can use multiple selectors for multiple signatures corresponding to any logical distinction of their ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CCNP Enterprise Advanced Routing ENARSI 300-410 Official Cert Guide

CCNP Enterprise Advanced Routing ENARSI 300-410 Official Cert Guide

Raymond Lacoste, Ramiro Garza Rios, Bradley Edgeworth, Jasos Gooley
Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman
Cybersecurity - Attack and Defense Strategies

Cybersecurity - Attack and Defense Strategies

Yuri Diogenes, Dr. Erdal Ozkaya

Publisher Resources

ISBN: 9781789135077Other