Implement DKIM signing support

This support is based on github.com/foxcpp/go-msgauth fork until
emerison/go-msgauth#13 gets merged.

Further extensions are required to make sure only messages we can
actually "take responsibility for" are signed.

RSA-2048 is used as a default algorithm when generating new keys.
RSA-4096 can cause trouble with UDP-only DNS due to responses being
bigger than 512 octets. RSA-1024 is too weak and explicitly
disallowed in maddy for new keys. It could be possible to use Ed25519
but support is not widely deployed yet (according to warning in rspamd
docs dated 2019-09). Users concerned about security of RSA-2048 can
switch to RSA-4096 or Ed25519, keeping relevant problems in mind.

Ed25519 key format uses PKCS#8, this seems to be different from other
implementations that just dump key material into a file without any
wrapping. Interoperability is not considered to encourage key
rotation when migration, which is a good thing to do anyway.

There is no option to use "body limit", since it is dangerous
and go-msgauth/dkim does not support it for signing.

The default set of signed header fields is the list used by rspamd.
Most "core" fields are oversigned to provide strict integrity.
"Conditional oversigning" similar to rspamd is not implemented, though
it may be useful, further research is required.

Multi-tentant configuration with DKIM and DMARC is much more verbose,
configuration example is added to config.d/multitentant-dkim.conf to
explain how to make it work.
This commit is contained in:
fox.cpp 2019-10-27 18:13:58 +03:00
parent dd9f4da684
commit beef9e2455
No known key found for this signature in database
GPG key ID: E76D97CCEDE90B6C
12 changed files with 799 additions and 7 deletions

3
.gitignore vendored
View file

@ -25,9 +25,6 @@ cmd/maddy/maddy
cmd/maddyctl/maddyctl
cmd/maddy-*-helper/maddy-*-helper
# Config files
*.conf
# Certificates and private keys.
*.pem
*.crt