DKIM Explained - How It Works | Mailtrap

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ธ.ค. 2024

ความคิดเห็น •

  • @ErfanImani
    @ErfanImani ปีที่แล้ว +13

    I think there's an issue here with the following statement "With the newly acquired public key, the receiving server builds its own hashes and compares them with the ones received in the message." The public key in this instance can't be used to "build" the same hash and do a comparison right? Rather the public key is used to decrypt the "hash" in order to verify it was encrypted using the correspondent private key. If anyone could build the same hash using the public key that existed in the DNS record, anyone could pretend to be the sending server. Also the use of the word "hash" in this context is incorrect in my opinion, since it implies a one-way function. More correct would be using "cipher text" as it indicates it can be decrypted (in this case using asymmetric cryptography.

    • @mailtrap.
      @mailtrap.  ปีที่แล้ว +1

      Thank you for noticing the details!

    • @mailtrap.
      @mailtrap.  ปีที่แล้ว +1

      Please, attend to our Mailtrap blog article for specific details on DKIM: mailtrap.io/blog/dkim/
      Hope you will find it helpful!

  • @mailtrap.
    @mailtrap.  ปีที่แล้ว +1

    We, at Mailtrap, are committed to enhancing your knowledge of email authentication. Dive into this tutorial to understand DKIM, how to create a DKIM record, and its role in preventing email spoofing. Do you have any other questions about DKIM? Let us know in the comments

    • @novianindy887
      @novianindy887 4 หลายเดือนก่อน +1

      I have a question, for emails that are sent through multiple Smtp Relay servers, the Private key is setup in the first sending server or in each of the Smtp Relay servers? or in the final sending server?

  • @novianindy887
    @novianindy887 4 หลายเดือนก่อน +1

    I have a question, for emails that are sent through multiple Smtp Relay servers, the Private key is setup in the first sending server or in each of the Smtp Relay servers? or in the final sending server?

    • @mailtrap.
      @mailtrap.  4 หลายเดือนก่อน

      Hello. Thanks for watching and for your question!
      The private key should be set up in the final sending server that dispatches the email to the recipient's mail server. The DKIM signature is then validated by the recipient's server using the corresponding public key published in your DNS records.
      We hope this helps!

    • @novianindy887
      @novianindy887 4 หลายเดือนก่อน

      @@mailtrap. but since it's a relay smtp server, we should give our private key to the smtp relay?

  • @alfredoolmedo744
    @alfredoolmedo744 6 หลายเดือนก่อน

    Basically it is an SSH (Secure Shell) key, one private key "the owner's key" and the other "Public" that will be sent to the other side, and if the other part has the public key, it can be open the email, if not received the key, they can't open the email.

    • @mailtrap.
      @mailtrap.  6 หลายเดือนก่อน

      Hello. Thank you for watching our video and for your comment. Yes, mostly you are right indeed.
      Stay with out channel for all things email! There's more to come!

  • @raiyansarker
    @raiyansarker ปีที่แล้ว +1

    How it understands what is the public key hostname?

    • @ErfanImani
      @ErfanImani ปีที่แล้ว +1

      Does it not just use the sender hostname?

    • @cpurickyahoo
      @cpurickyahoo ปีที่แล้ว +2

      I believe it queries the domain from one of the headers that has the sender's email address in it. The process is trying to prove that the sender is really sending from that domain.

    • @mailtrap.
      @mailtrap.  ปีที่แล้ว

      We have a very detailed overview for DKIM in Mailtrap blog article: mailtrap.io/blog/dkim/
      This video is just a quick overview for the key points.
      Hope you will find our article helpful!

  • @narrowjay0
    @narrowjay0 12 วันที่ผ่านมา

    I fail to see how this stops phishing. Spoofing, yes.

    • @mailtrap.
      @mailtrap.  10 วันที่ผ่านมา

      Thank you for watching, and for your question. The thing is spoofing and phishing are a double-bind.
      Phishing is a type of attack. It uses deception, manipulation, etc. to induce the recipient to perform some action that the attacker wants, such as clicking on a link or opening a malicious attachment. Spoofing is a means for making certain types of attacks - such as phishing - more believable or effective. For example, an attacker performing a phishing attack may use email spoofing to make the malicious email appear to originate from a trusted source, increasing the probability that the recipient will trust the email and do what the attacker wants.
      Thus, by DKIM MEANS we prevent the TYPE of attack.

  • @testtest-c4z
    @testtest-c4z ปีที่แล้ว

    Very nice video! Can I have dkim and spf registers configured even if I don't have a A or NS register, right or? Thanks

    • @mailtrap.
      @mailtrap.  ปีที่แล้ว

      Yes, absolutely

  • @Joker-Leto
    @Joker-Leto ปีที่แล้ว

    hi.. can i use DKIM key to white label email correspondence > thank you

    • @mailtrap.
      @mailtrap.  ปีที่แล้ว

      At the moment, at Mailtrap, we don’t allow using customers DKIM for this purpose. Otherwise, in a broad sense, it might be posiible.