DKIM Explained - How It Works | Mailtrap

preview_player
Показать описание
This video offers a step by step explanation on how DKIM protocol works for email authentication.

We answer the major questions concerning DKIM: what is DKIM, how do you create a DKIM record, and how it works to prevent email spoofing.

Along with other methods, such as SPF, BIMI, or DMARC, DKIM is one of the most common methods of email authentication. Below, we clarify why you should use DKIM DNS Text Record to improve email security and deliverability.

Contents

In just two minutes, you will learn the most important things you need to know about DKIM for email:

✅ What DKIM means and why it is important
✅ The pair of keys for signing the mail.
✅ What happens when you send the DKIM signed email
✅ How DKIM signature is verified and how it influences email deliverability.

Stay tuned!

Subscribe to our YouTube channel and other pages in social media:
Рекомендации по теме
Комментарии
Автор

We, at Mailtrap, are committed to enhancing your knowledge of email authentication. Dive into this tutorial to understand DKIM, how to create a DKIM record, and its role in preventing email spoofing. Do you have any other questions about DKIM? Let us know in the comments

mailtrap.
Автор

I think there's an issue here with the following statement "With the newly acquired public key, the receiving server builds its own hashes and compares them with the ones received in the message." The public key in this instance can't be used to "build" the same hash and do a comparison right? Rather the public key is used to decrypt the "hash" in order to verify it was encrypted using the correspondent private key. If anyone could build the same hash using the public key that existed in the DNS record, anyone could pretend to be the sending server. Also the use of the word "hash" in this context is incorrect in my opinion, since it implies a one-way function. More correct would be using "cipher text" as it indicates it can be decrypted (in this case using asymmetric cryptography.

ErfanImani
Автор

I have a question, for emails that are sent through multiple Smtp Relay servers, the Private key is setup in the first sending server or in each of the Smtp Relay servers? or in the final sending server?

novianindy
Автор

Basically it is an SSH (Secure Shell) key, one private key "the owner's key" and the other "Public" that will be sent to the other side, and if the other part has the public key, it can be open the email, if not received the key, they can't open the email.

alfredoolmedo
Автор

Very nice video! Can I have dkim and spf registers configured even if I don't have a A or NS register, right or? Thanks

testtest-cz
Автор

hi.. can i use DKIM key to white label email correspondence > thank you

Joker-Leto
Автор

How it understands what is the public key hostname?

raiyansarker