{"draft":"draft-ietf-dkim-base-10","doc_id":"RFC4871","title":"DomainKeys Identified Mail (DKIM) Signatures","authors":["E. Allman","J. Callas","M. Delany","M. Libbey","J. Fenton","M. Thomas"],"format":["ASCII","HTML"],"page_count":"71","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Domain Keys Identified Mail SEC","abstract":"DomainKeys Identified Mail (DKIM) defines a domain-level\r\nauthentication framework for email using public-key cryptography and\r\nkey server technology to permit verification of the source and\r\ncontents of messages by either Mail Transfer Agents (MTAs) or Mail\r\nUser Agents (MUAs). The ultimate goal of this framework is to permit\r\na signing domain to assert responsibility for a message, thus\r\nprotecting message signer identity and the integrity of the messages\r\nthey convey while retaining the functionality of Internet email as it\r\nis known today. Protection of email identity may assist in the\r\nglobal control of \"spam\" and \"phishing\". [STANDARDS-TRACK]","pub_date":"May 2007","keywords":["[--------|p]","internet mail","authentication","spam","phishing","spoofing","digital signature"],"obsoletes":["RFC4870"],"obsoleted_by":["RFC6376"],"updates":[],"updated_by":["RFC5672"],"see_also":[],"doi":"10.17487\/RFC4871","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4871"}