{"id":63,"date":"2012-02-25T15:56:00","date_gmt":"2012-02-25T15:56:00","guid":{"rendered":"http:\/\/pheonixsolutions.com\/?p=63"},"modified":"2012-02-25T15:56:00","modified_gmt":"2012-02-25T15:56:00","slug":"installing-domainkeys-dkim-in-postfix","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/","title":{"rendered":"Installing Domainkeys, DKIM in postfix"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\">How to install dkim and domainkeys in postfix? <\/p>\n<p>DomainKeys works by signing outbound e-mail messages with a cryptographic signature which can be verified by the recipient to determine if the messages originates from an authorized system.<\/p>\n<p>DKIM\u00e2\u20ac\u201cDomainKeys Identified Mail. DKIM is an extension of DomainKeys. It allows a recipient to verify that a message really does come from the sending domain. Senders publish a public key for their domain and then cryptographically sign their outgoing email, using the corresponding private key. Recipients can then verify the signature, typically as part of the spam filtering process.<\/p>\n<p><b>Prerequisites:<\/b><\/p>\n<p>We can use dkim proxy to configure domainkeys and dkim in the server. DKIMproxy is written in Perl. It requires additional modules Crypt::OpenSSL::RSA, Net::DNS etc., We can use the &#8220;cpan&#8221; to install these perl modules.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>cpan Crypt::OpenSSL::RSA<br \/>cpan Digest::SHA<br \/>cpan Mail::Address<br \/>cpan MIME::Base64<br \/>cpan Net::DNS<br \/>cpan Net::Server<br \/>cpan Error<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>The another perl module Mail::DKIM which is normally not available in cpan repository. We can download this module from source and installed it in the server.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>wget http:\/\/search.cpan.org\/CPAN\/authors\/id\/J\/JA\/JASLONG\/Mail-DKIM-0.39.tar.gz<br \/>tar -zxvf\u00c2\u00a0 Mail-DKIM-0.39.tar.gz<br \/>cd Mail-DKIM-0.39<br \/>perl Makefile.PL<br \/>make<br \/>make test<br \/>make install<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>We have completed the prerequisites for dkimproxy. Now, we would need to install dkim proxy to the server.<\/p>\n<p><b>Installation:<\/b><\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>wget http:\/\/downloads.sourceforge.net\/project\/dkimproxy\/dkimproxy\/1.4.1\/dkimproxy-1.4.1.tar.gz<br \/>tar -zxvf dkimproxy-1.4.1.tar.gz<br \/>cd dkimproxy-1.4.1<br \/>.\/configure &#8211;prefix=\/usr\/local\/dkimproxy<br \/>make install<br \/>&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>Copy the sample startup script to \/etc\/init.d.<\/p>\n<p>&#8212;&#8212;&#8212;-<br \/>cp sample-dkim-init-script.sh \/etc\/init.d\/dkimproxy<br \/>&#8212;&#8212;&#8212;-<\/p>\n<p>Now, create dkim user dedicated to running dkimproxy.<\/p>\n<p>&#8212;&#8212;&#8212;&#8211;<br \/>useradd -d \/usr\/local\/dkimproxy dkim<br \/>&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>The next step is to create private key and public key pair.<\/p>\n<p>&#8212;&#8212;&#8212;&#8211;<br \/>cd \/usr\/local\/dkimproxy\/<br \/>openssl genrsa -out private.key 1024<br \/>openssl rsa -in private.key -pubout -out public.key<br \/>&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>Now, we would need to add this public key in the DNS zone file of the domain. The public should be present in \/usr\/local\/dkimproxy\/public.key.<\/p>\n<p>&#8212;&#8212;&#8212;-<br \/>cat \/usr\/local\/dkimproxy\/public.key<br \/>&#8212;&#8212;&#8212;-<\/p>\n<p>We used the selector &#8220;selector1&#8221; for defining the TXT record. <\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>selector1._domainkey IN TXT &#8220;k=rsa; t=s; p=MHwwDQYJK &#8230; OprwIDAQAB&#8221;<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>There will be propagation delay of 24 to 48 hours for this DNS change to reflect all over the world. Once the DNS propagation completed, you can verify it by using the following command.<\/p>\n<p>&#8212;&#8212;&#8212;&#8211;<br \/>host -ttxt selector1._domainkey.domainname.com<br \/>&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>We have completed the installation of dkimproxy. Now, we would need to configure dkimproxy to sign the mails by DKIM.<\/p>\n<p><b>Configuration:<\/b><\/p>\n<p>Create a file \/usr\/local\/dkimproxy\/etc\/dkimproxy_out.conf with the following content.<\/p>\n<p>=====================<br \/># specify what address\/port DKIMproxy should listen on<br \/>listen\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 127.0.0.1:10037<\/p>\n<p># specify what address\/port DKIMproxy forwards mail to<br \/>relay\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 127.0.0.1:10038<\/p>\n<p># specify what domains DKIMproxy can sign for (comma-separated, no spaces)<br \/>domain\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 Domainname.com<\/p>\n<p># specify what signatures to add<br \/>signature dkim(c=relaxed)<br \/>signature domainkeys(c=nofws)<\/p>\n<p># specify location of the private key<br \/>keyfile\u00c2\u00a0\u00c2\u00a0 \/usr\/local\/dkimproxy\/private.key<\/p>\n<p># specify the selector (i.e. the name of the key record put in DNS)<br \/>selector\u00c2\u00a0 selector1<br \/>=====================<\/p>\n<p>Note that we have used &#8220;selector1&#8221; in DNS zone file for defining TXT record. So, we should use this as a selector.Make sure that private.key and public.key are available in &#8220;\/usr\/local\/dkimproxy&#8221;. In the &#8220;domain&#8221; field, we can mention what are the domains that will be signed by dkimproxy. <\/p>\n<p>Now, start the dkimproxy and configure it to start at boot:<\/p>\n<p>&#8212;&#8212;&#8212;<br \/>\/etc\/init.d\/dkimproxy start<br \/>chkconfig dkimproxy on<br \/>&#8212;&#8212;&#8212;<\/p>\n<p>The final step is to configure postfix to use dkimproxy for sending mails.<\/p>\n<p>Postfix configuration:<\/p>\n<p>Add the following content in postfix master configuration file(\/etc\/postfix\/master.cf). Make sure that you have taken the backup of this configuration before editing.<\/p>\n<p>===============<br \/># modify the default submission service to specify a content filter<br \/># and restrict it to local clients and SASL authenticated clients only<br \/>#<br \/>submission\u00c2\u00a0 inet\u00c2\u00a0 n\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 n\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 smtpd<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_etrn_restrictions=reject<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_sasl_auth_enable=yes<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o content_filter=dksign:[127.0.0.1]:10037<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o receive_override_options=no_address_mappings<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_recipient_restrictions=permit_mynetworks,permit_sasl_authenticated,reject<\/p>\n<p>#<br \/># specify the location of the DKIM signing proxy<br \/># Note: we allow &#8220;4&#8221; simultaneous deliveries here; high-volume sites may<br \/>#\u00c2\u00a0\u00c2\u00a0 want a number higher than 4.<br \/># Note: the smtp_discard_ehlo_keywords option requires Postfix 2.2 or<br \/>#\u00c2\u00a0\u00c2\u00a0 better. Leave it off if your version does not support it.<br \/>#<br \/>dksign\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 unix\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 n\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 4\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 smtp<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtp_send_xforward_command=yes<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtp_discard_ehlo_keywords=8bitmime,starttls<\/p>\n<p>#<br \/># service for accepting messages FROM the DKIM signing proxy<br \/>#<br \/>127.0.0.1:10038 inet\u00c2\u00a0 n\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 n\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 10\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 smtpd<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o content_filter=<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_helo_restrictions=<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_client_restrictions=<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_sender_restrictions=<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_recipient_restrictions=permit_mynetworks,reject<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o mynetworks=127.0.0.0\/8<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o smtpd_authorized_xforward_hosts=127.0.0.0\/8<br \/>pickup\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 fifo\u00c2\u00a0 n\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 n\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 60\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 1\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 pickup<br \/>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 -o content_filter=dksign:[127.0.0.1]:10037<br \/>===============<\/p>\n<p>Reload the postfix service.<\/p>\n<p>&#8212;&#8212;&#8212;<br \/>postfix reload<br \/>&#8212;&#8212;&#8212;<\/p>\n<p>Dkimproxy is installed in the server. We have used the port 10037 for dkimproxy service. <\/p>\n<p>&#8212;&#8212;&#8212;<br \/>[root@server ~]# netstat -plan |grep perl|grep 10037<br \/>tcp\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 0 127.0.0.1:10037\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 0.0.0.0:*\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 LISTEN\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 17783\/perl\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 <br \/>[root@server ~]# <br \/>&#8212;&#8212;&#8212;<\/p>\n<p>Verification:<\/p>\n<p>You can verify the dkim signature by sending an email to verifier.port25.com. The authentication result will be send it to the mail account that we mentioned. <\/p>\n<p>mail -v check-auth-username=gmail.com@verifier.port25.com<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>How to install dkim and domainkeys in postfix? DomainKeys works by signing outbound e-mail messages with a cryptographic signature which can be verified by the recipient to determine if the messages originates from an authorized system. DKIM\u00e2\u20ac\u201cDomainKeys Identified Mail. DKIM is an extension of DomainKeys. It allows a recipient to&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\">Installing Domainkeys, DKIM in postfix<\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-63","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-uncategorized","7":"h-entry","9":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"How to install dkim and domainkeys in postfix? DomainKeys works by signing outbound e-mail messages with a cryptographic signature which can be verified by the recipient to determine if the messages originates from an authorized system. DKIM\u00e2\u20ac\u201cDomainKeys Identified Mail. DKIM is an extension of DomainKeys. It allows a recipient to&hellip; Continue Reading Installing Domainkeys, DKIM in postfix\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-02-25T15:56:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3837\" \/>\n\t<meta property=\"og:image:height\" content=\"2540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\"},\"headline\":\"Installing Domainkeys, DKIM in postfix\",\"datePublished\":\"2012-02-25T15:56:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/\"},\"wordCount\":879,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"datePublished\":\"2012-02-25T15:56:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/installing-domainkeys-dkim-in-postfix\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Installing Domainkeys, DKIM in postfix\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/blog.pheonixsolutions.com\"],\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"How to install dkim and domainkeys in postfix? DomainKeys works by signing outbound e-mail messages with a cryptographic signature which can be verified by the recipient to determine if the messages originates from an authorized system. DKIM\u00e2\u20ac\u201cDomainKeys Identified Mail. DKIM is an extension of DomainKeys. It allows a recipient to&hellip; Continue Reading Installing Domainkeys, DKIM in postfix","og_url":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2012-02-25T15:56:00+00:00","og_image":[{"width":3837,"height":2540,"url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/"},"author":{"name":"admin","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503"},"headline":"Installing Domainkeys, DKIM in postfix","datePublished":"2012-02-25T15:56:00+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/"},"wordCount":879,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/","url":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"datePublished":"2012-02-25T15:56:00+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/installing-domainkeys-dkim-in-postfix\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Installing Domainkeys, DKIM in postfix"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","caption":"admin"},"sameAs":["http:\/\/blog.pheonixsolutions.com"],"url":"https:\/\/pheonixsolutions.com\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-11","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/63","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":0,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}