Powerful new antiphishing weapon DKIM emerges

DKIM standard attracts Cisco, Google, PayPal and more

How DKIM Works

DKIM allows an organization to insert a cryptographic signature in outbound e-mail and associate that signature with its domain name. The signature travels with the e-mail regardless of its path across the Internet. The recipient of the e-mail can use the signature to validate that the message came from the organization's domain name.

"Right now, a receiver of a message has no confidence that the message they are receiving is from whom it claims to be from," Olson explains. "DKIM is a way to permit a receiver of a message to validate that a message is, in fact, from whom it claims to be from."

DKIM won't eliminate e-mail fraud altogether, but it will help companies that are targets of phishing scams to give their customers a way of ensuring they sent a particular message.

"If the receiver has confidence that an e-mail that claims to be from Bank of America is from Bank of America, then they are not going to worry that someone is trying to steal their Social Security number," Olson says.

DKIM is a merger of two protocols: DomainKeys, which was created by Yahoo, and Identified Internet Mail, which was created by Cisco. These companies along with other messaging vendors and ISPs are working with the IETF's DKIM working group on technical specifications, which are almost done.

"DKIM is a stable specification," Fenton says. "The DKIM base specification, which is how you sign a message and how you verify the signature, is very well defined. It's not a moving target."

The IETF's DKIM working group is still tweaking the Sender Signing Practices, which is a document that will describe how senders can provide information in their DKIM records for recipients to use in deciding what steps to take with messages received from the sender.

"If I sign all my mail and you get a message that purports to come from me that's not signed, then you can assume that message is not from me," Olson explains. "That policy would be in the DNS record associated with the sender. The SSP is in its 10th draft right now...I hope it will be done soon."

Network vendors say DKIM is ready for deployment. In November, 20 ISPs and messaging vendors conducted an interoperability test of their DKIM deployments.

Vendors that participated in the DKIM interoperability test say the standard works, and that no technical stumbling blocks were discovered.

"We did find some cases where the RFCs need some clarification," Olson says. "But the test showed that multiple people working independently have been able to interoperate with DKIM."

DKIM-compliant software and appliances are available from Sendmail, IronPort, Alt-N Technologies, Message Systems, Port25 Solutions, StrongMail Systems and others.

"It's pretty easy for a corporation to go out and deploy DKIM because there are enough commercial products that have DKIM support," Fenton says.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Carolyn Duffy Marsan

Network World
Show Comments

Essentials

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Michael Hargreaves

Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?