(Intentionally top posting): Thanks to all who replied!
I expect (sooner or later) I will make a WikiLearn page summarizing what I've
learned, including possibly quoting some of the answers. In any case, I would
include the names of those who responded as contributors unless any of them
obje
Hi,
On Mon, Jul 21, 2025 at 09:10:08AM -0400, rhkra...@gmail.com wrote:
> (Extra points for anybody who can craft a somewhat similar simple explanation
> of DMARC.)
This whole topic is quite convoluted and only really relevant to the
tiny numbers of us who run our own mail servers. Everyone usin
On Jul 21, 2025, rhkra...@gmail.com wrote:
> Is it reasonably accurate (at a simple level) to say that dkim involves
> applying a digital signature to an email by the domain (as opposed to a
> digital signature applied by the user / sender of an email)?
>
> And that the domain uses the private k
On Mon, Jul 21, 2025 at 09:10:08AM -0400, rhkra...@gmail.com wrote:
> Is it reasonably accurate (at a simple level) to say that dkim involves
> applying a digital signature to an email by the domain (as opposed to a
> digital signature applied by the user / sender of an email)?
>
> And that the
Is it reasonably accurate (at a simple level) to say that dkim involves
applying a digital signature to an email by the domain (as opposed to a
digital signature applied by the user / sender of an email)?
And that the domain uses the private key of a public / private keypair?
E.g., if @.com sen
5 matches
Mail list logo