MDaemon 13.x - Configuring DKIM signing in MDaemon
DomainKeys Identified Mail (DKIM) is an open protocol for protecting email users against email address identity theft and email message content tampering. It does this by providing positive identification of the signer’s identity along with an encrypted “hash” of the message content.
To configure and use DKIM:
- The system administrator creates a private/public key pair for the server and publishes the public key in the domain’s domain name server.
- Using the private key, the sending server creates a signature for each outgoing message. The resulting signature data is stored in a “DKIM-Signature” header within the message.
- The receiving server obtains the signature from the “DKIM-Signature” header and verifies it using the signer’s public key.
To configure and use DKIM in MDaemon:
- Select Security
- Select Security Settings
- Expand Sender Authentication
- Select DKIM Signing
- Select Sign outbound messages using DomainKeys Identified Mail (DKIM)
- Click the Create new public and private keys to have MDaemon generate the public key your DNS server needs for DKIM checks and the private one that MDaemon uses. (If you have done this already for DomainKeys you will want to skip this step)
- A confirmation window will appear, select Yes to continue
- After MDaemon creates the key pair, the readme will display on screen showing the public keys that need to be entered into your DNS server. It is also saved to \MDaemon\Pem\MDaemon\dns_readme.txt
- Enter this public key from the readme into your DNS server as a TXT record. The instructions to do this will vary based on what software you are using.
There are different ways to set up your DNS record depending on how strict you want the DKIM policy for your domain to be.
DKIM Legend (you can use these signing policies with DKIM):
o=~ NEUTRAL or RELAXED (signature optional)
o=- STRONG (signature required, but not necessarily from my domain)
o=! EXCLUSIVE (signature required, and it must be from my domain) *
o=. NEVER (this site doesn't send mail)
o=^ USER (reserved for future use)
Example DNS data for policy using DKIM:
(Testing and using NEUTRAL signing policy)
_policy._domainkey.altn.com. IN TXT 't=y; o=~;'
(Not testing and using STRONG signing policy)
_policy._domainkey.altn.com. IN TXT 'o=-;'
Do not go out of DKIM testing mode ('t=y') until your DNS records have propogated (3-5 days). Failure to wait for this to take place could cause delivery failures.
*Exclusive mode will not work with mailing lists so use this with caution.
In order for their messages to be eligible for signing, local users must authenticate when sending mail.