Guide to hardening DKIM

By

Seven points to avoid flawed DKIM deployments.

Messaging security experts have published best practice guidance on how to avoid flawed implementation of the DKIM anti-phishing standard.

Guide to hardening DKIM

Google was among companies caught out in October using DomainKeys Identified Mail (DKIM) keys that were too short, allowing a researcher to spoof emails to Sergey Brin and Larry Page, purportedly from each other.

The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), which counts Google as one of its sponsors, published guidance (PDF) calling on business enterprises to replace previously secure 512- and 768-bit verification keys with 1024-bit and higher encryption.

"Technology is advancing, and to keep pace with hackers, the industry needs to revisit its practices in light of their expanding capabilities," M3AAWG co-chairman Chris Roosenraad said in a statement.

The group recommended that keys be rotated quarterly, and that signatures should have an expiration period greater than the current key rotation period. Email services using DKIM should avoid sending messages in testing mode apart from during a testing period, and should monitor receiver performance using Domain-based Message Authentication, Reporting and Conformance (DMARC).

This article originally appeared at scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, UK edition
Tags:

Most Read Articles

Qantas facing 'significant' data theft after cyber attack

Qantas facing 'significant' data theft after cyber attack

Home Affairs officer accessed data on "friends and associates"

Home Affairs officer accessed data on "friends and associates"

Qantas contacted by "potential cyber criminal"

Qantas contacted by "potential cyber criminal"

SA Power Networks tackles IAM, cloud security under five-year strategy

SA Power Networks tackles IAM, cloud security under five-year strategy

Log In

  |  Forgot your password?