Skip to content
Bots!
Bots!
  • About
    • Myself
    • আমার দোয়া
  • Bookmarks
    • Bookmarks
    • My OCI Bookmarks
    • Useful Proxmox Commands & Links
    • Learning Nano
    • Useful Sites
    • Useful Virtualbox Command
    • Useful MySQL Command
    • Useful Linux Command
    • BTT-CAS
  • Resources
    • Webinar on Cloud Adoption for Project Managers
  • Photos
  • Videos
  • Downloads
Bots!

Configuring DKIM signing in MDaemon

Rumi, March 25, 2013March 25, 2013
DomainKeys Identified Mail (DKIM) is an open protocol for protecting email users against email address identity theft and email message content tampering. It does this by providing positive identification of the signer’s identity along with an encrypted “hash” of the message content.
To configure and use DKIM: 
  1. The system administrator creates a private/public key pair for the server and publishes the public key in the domain’s domain name server.
  2. Using the private key, the sending server creates a signature for each outgoing message. The resulting signature data is stored in a “DKIM-Signature” header within the message.
  3. The receiving server obtains the signature from the “DKIM-Signature” header and verifies it using the signer’s public key.
Procedure

To configure and use DKIM in MDaemon:
  1. Open the Security menu from the MDaemon interface
  2. Select SPF & SenderID / DomainKeys & DKIM / HashCash…
  3. Select the DK & DKIM (signing) tab
  4. Enable Sign outgoing messages with DomainKeys Identified Mail (DKIM)
  5. Click the Create new public and private keys to have MDaemon generate the public key your DNS server needs for DKIM checks and the private one that MDaemon uses. (If you have done this already for DomainKeys you will want to skip this step)
  6. A confirmation window will appear, click yes to continue.
  7. After MDaemon creates the key pair, the readme will display on screen showing the public keys that need to be entered into your DNS server.  It is also saved to \MDaemon\Pem\MDaemon\dns_readme.txt
  8. Enter this public key from the readme into your DNS server as a TXT record. The instructions on how to edit your DNS records will vary based on what DNS software you are using. Do NOT use the DKIM ssp record for DNS section of the file. Use the example information below as a template for creating your DNS entries. The DKIM standard has changed, and MDaemon 9.x and below generates outdated examples using SSP (Sender Signing Practices) rather than ADSP (Author Domain Signing Practices). 
There are different ways to set up your DNS record depending on how strict you want the DKIM policy for your domain to be. 
DKIM Legend (you can use these signing policies with DKIM):

      dkim=unknown     – The domain might sign some or all email
      dkim=all               – All mail from the domain is signed
      dkim=discardable – All mail from the domain is signed and receivers are
                                   encouraged to discard unsigned mail

Example DNS data for policy using DKIM:

  • If all outbound mail for domain.com is signed:
         _adsp._domainkey.domain.com. IN TXT 'dkim=all'
  • If all outbound mail for domain.com is signed and unsigned mail should be discarded:
         _adsp._domainkey.domain.com. IN TXT 'dkim=discardable'
  • If some outbound mail for domain.com might not be signed:
         _adsp._domainkey.domain.com. IN TXT 'dkim=unknown'

Src: http://www.altn.com/Support/KnowledgeBase/KnowledgeBaseResults/?Number=KBA-01744

Administrations Configurations (Windows) DKIMMDaemon

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Myself…

Hi, I am Hasan T. Emdad Rumi, an IT Project Manager & Consultant, Virtualization & Cloud Savvyfrom Dhaka, Bangladesh. I have prior experience in managing numerous local and international projects in the area of Telco VAS & NMC, National Data Center & PKI Naitonal Root and CA Infrastructure. Also engaged with several Offshore Software Development Team.

Worked with Orascom Telecom-Banglalink, Network Elites as VAS partner, BTRC, BTT (Turkey) , Mango Teleservices Limited and Access to Informaiton (A2I-UNDP)

Currently working at Oracle Corporation as Principal Technology Solution and Cloud Architect.

You can reach me [h.t.emdad at gmail.com] and I will be delighted to exchange my views.

Tags

Apache Bind Cacti CentOS CentOS 6 CentOS 7 Debain Debian Debian 10 Debian 11 Debian 12 DKIM Docker endian icinga iptables Jitsi LAMP Letsencrypt Linux Munin MySQL Nagios Nextcloud NFS nginx pfsense php Postfix powerdns Proxmox RDP squid SSH SSL Ubuntu Ubuntu 16 Ubuntu 18 Ubuntu 20 Varnish virtualbox vpn Webmin XCP-NG zimbra

Topics

Recent Posts

  • Install Jitsi on Ubuntu 22.04 / 22.10 April 30, 2025
  • Key Lessons in life April 26, 2025
  • Create Proxmox Backup Server (PBS) on Debian 12 April 19, 2025
  • Add Physical Drive in Proxmox VM Guest April 19, 2025
  • Mount a drive permanently with fstab in Linux April 16, 2025
  • Proxmox 1:1 NAT routing March 30, 2025
  • Installation steps of WSL – Windows Subsystem for Linux March 8, 2025
  • Enabling Nested Virtualization In Proxmox March 8, 2025
  • How to Modify/Change console/SSH login banner for Proxmox Virtual Environment (Proxmox VE / PVE) March 3, 2025
  • Install Proxmox Backup Server on Debian 12 February 12, 2025

Archives

Top Posts & Pages

  • Install Jitsi on Ubuntu 22.04 / 22.10
©2025 Bots! | WordPress Theme by SuperbThemes