DomainKeys Identified Mail

DomainKeys Identified Mail (DKIM) is a cryptographic email verification system that can be utilized to prevent spoofing (forging another person's email address in order to pose as a different message sender). Additionally, because most junk email (spam) messages contain spoofed addresses, DKIM can help greatly in the reduction of spam even though the specifications weren't specifically designed to be an anti-spam tool. DKIM can also be used to ensure the integrity of incoming messages, or ensure that the message hasn't been tampered with between the time it left the signing mail server and arrived at yours. In other words, with DKIM cryptographic verification the receiving server can be certain that the arriving message is from the server that signed it, and that no one changed that message in any way.

In order to ensure the validity and integrity of messages, DKIM uses a public and private key-pairs system. An encrypted public key is published to the sending server's DNS records and then each outgoing message is signed by the server using the corresponding encrypted private key. For incoming messages, when the receiving server sees that a message has been signed, it will retrieve the public key from the sending server's DNS records and then compare that key with the message's cryptographic signature to determine its validity. If the incoming message cannot be verified then the receiving server knows it contains a spoofed address or has been tampered with or changed. A failed message can then be rejected, or it can be accepted but have its spam score adjusted.

To configure MDaemon to verify incoming cryptographically signed messages, use the options provided on the DKIM Verification screen. To configure MDaemon to sign outgoing messages, use the options provided on the DKIM Signing screen. Both are located under the Sender Authentication section of the Security Settings dialog, at: Security » Security Settings » Sender Authentication. MDaemon's main interface includes a "DKIM" tab (located under the Security tab) that can be used for monitoring DKIM activity in real time, and you can log DKIM activity using the option at: Setup » Server Settings » Logging » Settings.

See:

 

For more on DomainKeys Identified Mail, visit: http://www.dkim.org/.