Suped

Summary

The question of signing the MAIL FROM (or Return-Path) address using OpenDKIM is a common point of confusion for those new to email authentication. While OpenDKIM primarily focuses on signing header fields, the MAIL FROM address is part of the SMTP envelope, distinct from the email headers. Attempting to directly sign the MAIL FROM address with OpenDKIM in the same manner as the 'From' header is generally not supported and can lead to DMARC alignment issues. Best practices dictate that DKIM signing applies to the message headers, ensuring authenticity and preventing tampering during transit.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often encounter situations where they need to manage DKIM keys for multiple domains, especially when using third-party sending services or dealing with client-specific requirements. The discussion among marketers highlights the challenges of aligning customer expectations with technical limitations and best practices for email authentication. While there's a desire for flexible signing options, the consensus leans towards adhering to standard DKIM configurations to avoid deliverability pitfalls.

Marketer view

An email marketer from Email Geeks indicates a strong desire to sign the sender address via OpenDKIM, specifically the MAIL FROM, noting that PowerMTA allows this while OpenDKIM's capability is unknown to them. They are currently only able to sign the 'From' header.

16 May 2022 - Email Geeks

Marketer view

An email marketer from a Linux forum explains the process of generating both private and public keys for each domain intended for mail signing. They highlight the importance of securely storing the private key on the server and publishing the public key in the domain's DNS as a TXT record for verification by recipients.

21 Nov 2021 - NixDevs Official Beginner Tutorials, Reviews and Discussion

What the experts say

Experts in email deliverability emphasize the distinction between the SMTP MAIL FROM (Return-Path) and the 'From' header when it comes to DKIM signing. They highlight that standard DKIM protocols do not sign the MAIL FROM address directly, as it's an envelope address. Attempts to force this behavior, while possible with certain MTAs, often lead to DMARC alignment issues and are not considered best practice. The focus remains on correctly signing the 'From' header and ensuring proper alignment for robust email authentication.

Expert view

An expert from Email Geeks clarifies that the MAIL FROM address, also known as the Return-Path address, should not be included in the DKIM signature according to RFC 4871. This fundamental principle ensures the integrity of the signature while adhering to established standards.

16 May 2022 - Email Geeks

Expert view

An expert from Spam Resource recommends signing every domain with the same DKIM key on an OpenDKIM installation, despite the need to rotate multiple keys simultaneously. This approach simplifies the configuration process for managing mailing from multiple domains on a single Linux server using Postfix.

16 May 2022 - Spam Resource

What the documentation says

Official documentation and RFCs provide the foundational understanding for how DKIM is designed to function. They clearly differentiate between the various email addresses and headers, stipulating which elements are subject to cryptographic signing. This technical guidance is crucial for proper implementation and for ensuring that email authentication mechanisms work as intended across the internet.

Technical article

RFC 4871, Section 3.7 states that the 'Return-Path' header field, which is derived from the MAIL FROM address, is specifically excluded from the list of headers that must be signed. This ensures that changes to the envelope address by intermediate mail servers do not invalidate the DKIM signature.

May 2007 - RFC 4871

Technical article

The OpenDKIM documentation outlines the 'SignHeaders' configuration option, which specifies the list of message headers that should be included in the DKIM signature. This emphasizes that OpenDKIM operates on the email's header section.

20 Feb 2024 - OpenDKIM Official Documentation

8 resources

Start improving your email deliverability today

Get started