Changes

|Scenario Task Parent=I want to be certain of the recipient's identity (and vice versa)
|Scenario Task Type=Impersonation
|Scenario Task Description=Several systems have been developed in recent years to help authenticate the sender of an email message. The most popular of which are providers [https://en.wikipedia.org/wiki/Email_authentication DKIM and SPFauthenticate]. These are network level protocols that either confirm the domain name (e.g. @equalit.ie) that the sender of an email message was sent from or check the sender's [https://learn.equalitMost providers currently use an email authentication system to filter spam.ie/wiki/How_does_the_Internet_actually_work%3F#Internet_Protocol_.28IP.29_Address IP address] against If you are a list of known malicious addresses. Gmail users should read the user, you can understand how this works by reading Gmail's [https://support.google.com/mail/answer/180707?hl=en Email email authentication] guide.  In general, you must rely on your email provider to perform sender authentication. Users who wish , but if you want to be sure and inspect received some of the messages you receive manually, you will need to [https://www.arclab.com/en/kb/email/how-to-read-and-analyze-the-email-header-fields-spf-dkim.html view the learn how to read message headerheaders] (or sometimes called "message source as its sometimes referred to") and authenticate it themselves. them yourself with these online tools:
* [http://dkimcore.org/tools/dkimrecordcheck.html DKIM authentication ]
* [http://mxtoolbox.com/spf.aspx SPF record lookup]
Users who If you would like to see if their check that your email provider runs provides DKIM and SPF offers email authentication (for emails that you send to others) , you can try the [http://dkimvalidator.com/ DKIM Validator] website. Simply send an email to the address on that page and then click to view the results. 
These systems either confirm the domain name (e.g. @equalit.ie) that the message was sent from or check the sender's [https://learn.equalit.ie/wiki/How_does_the_Internet_actually_work%3F#Internet_Protocol_.28IP.29_Address IP address] against a list of known malicious addresses.
}}
Bureaucrat, administrator
312
edits