The first version of DKIM synthesized and enhanced Yahoo!
's Doman Keys and Cisco's Identified Internet Mail specifications.
Domain Keys Identified Mail (DKIM) lets an organization take responsibility for a message that is in transit.
The organization is a handler of the message, either as its originator or as an intermediary.
As an alternative cause of failure, consider that Jill might have instructed the library.example server to forward her mail to, say, [email protected], and that the latter server refused the message for whatever reason.
The library.example mail server then must send a bounce message to [email protected], informing Jack that his message to Jill's mailbox could not be delivered.
It was the result of a year-long collaboration among numerous industry players, during 2005, to develop an open-standard e-mail authentication specification.
Centralized authority-based trust relationships back most secure internet communication through known public certificate authorities; decentralized peer-based trust, also known as a web of trust, is used for personal services such as email or files (pretty good privacy, GNU Privacy Guard) and trust is established by known individuals signing each other's cryptographic key at Key signing parties, for instance.Their reputation is the basis for evaluating whether to trust the message for further handling, such as delivery.Technically DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.In contrast with identification, which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing's identity, authentication is the process of actually confirming that identity.