This is all ridiculous.<p>Maybe I’m not that bright, but it seems like you don’t need <i>that much</i>.<p>1. A TXT record containing a public key and a unique identifier<p>2. Message Body and Headers hashed with SHA512, and then the hash is encrypted with the private key to the TXT record. This hash, and the address for the public key, is then added to the headers as the only permitted “untrusted” headers<p>3. Email receiver, if present, ignores all headers if the two are present. Looks up DNS public key, decrypts hash, removes the two headers, checks hash matches. If so, contents trusted if:<p>4. The domain the email was sent from, and claims to be sent from, is the same domain hosting the TXT record.<p>What did I miss?