Post by jabom on Dec 29, 2023 19:00:18 GMT -8
About the sender. Each tag includes details about the location of the public key used to encrypt the messages. DKIM Tag Types You can classify DKIM tags by ‘required tags’ and ‘optional tags’ and the value of each is important in generating a DKIM record. There are some other DKIM tags that are classified as ‘not required’ or ‘not recommended’. You can set them depending upon the instances of their utility or requirements of each domain. You require the right DKIM authentication tags while adding a DKIM record to your DNS.
Let’s know about these tags in detail. Required Job Function Email List Tags The Required DKIM tags are so important for the DKIM signature header that your message won’t pass the verification test without them. The recipient’s mailbox will discard emails without these tags. v= It is the version tag that denotes the DKIM standard being used. Its value is always set to . a= This DKIM tag indicates the cryptographic algorithm used for creating the signature. The value used is rsa-sha . If your computer has reduced CPU capabilities, you can use rsa-sha.
However, it isn’t recommended due to security reasons. s= It indicates the selector record name used for finding the public key in a domain’s DNS. You’ll enter a name or a number in this field. d= It displays the domain used with the selector record to locate public keys. Its value is the same as the domain name used by the sender. b= This DKIM tag is used for the header’s hash data. with the h= tag for drafting the DKIM signature. It’s always encoded in Base . bh= It has the computed hash of emails.
Let’s know about these tags in detail. Required Job Function Email List Tags The Required DKIM tags are so important for the DKIM signature header that your message won’t pass the verification test without them. The recipient’s mailbox will discard emails without these tags. v= It is the version tag that denotes the DKIM standard being used. Its value is always set to . a= This DKIM tag indicates the cryptographic algorithm used for creating the signature. The value used is rsa-sha . If your computer has reduced CPU capabilities, you can use rsa-sha.
However, it isn’t recommended due to security reasons. s= It indicates the selector record name used for finding the public key in a domain’s DNS. You’ll enter a name or a number in this field. d= It displays the domain used with the selector record to locate public keys. Its value is the same as the domain name used by the sender. b= This DKIM tag is used for the header’s hash data. with the h= tag for drafting the DKIM signature. It’s always encoded in Base . bh= It has the computed hash of emails.