# DKIM signing modify.dkim module is a modifier that signs messages using DKIM protocol (RFC 6376). Each configuration block specifies a single selector and one or more domains. A key will be generated or read for each domain, the key to use for each message will be selected based on the SMTP envelope sender. Exception for that is that for domain-less postmaster address and null address, the key for the first domain will be used. If domain in envelope sender does not match any of loaded keys, message will not be signed. Additionally, for each messages From header is checked to match MAIL FROM and authorization identity (username sender is logged in as). This can be controlled using require\_sender\_match directive. Generated private keys are stored in unencrypted PKCS#8 format in state_directory/dkim_keys (/var/lib/maddy/dkim_keys). In the same directory .dns files are generated that contain public key for each domain formatted in the form of a DNS record. ## Arguments domains and selector can be specified in arguments, so actual modify.dkim use can be shortened to the following: ``` modify { dkim example.org selector } ``` ## Configuration directives ``` modify.dkim { debug no domains example.org example.com selector default key_path dkim-keys/{domain}-{selector}.key oversign_fields ... sign_fields ... header_canon relaxed body_canon relaxed sig_expiry 120h # 5 days hash sha256 newkey_algo rsa2048 } ``` **Syntax**: debug _boolean_
**Default**: global directive value Enable verbose logging. **Syntax**: domains _string list_
**Default**: not specified **REQUIRED.** ADministrative Management Domains (ADMDs) taking responsibility for messages. Should be specified either as a directive or as an argument. **Syntax**: selector _string_
**Default**: not specified **REQUIRED.** Identifier of used key within the ADMD. Should be specified either as a directive or as an argument. **Syntax**: key\_path _string_
**Default**: dkim\_keys/{domain}\\_{selector}.key Path to private key. It should be in PKCS#8 format wrapped in PAM encoding. If key does not exist, it will be generated using algorithm specified in newkey\_algo. Placeholders '{domain}' and '{selector}' will be replaced with corresponding values from domain and selector directives. Additionally, keys in PKCS#1 ("RSA PRIVATE KEY") and RFC 5915 ("EC PRIVATE KEY") can be read by modify.dkim. Note, however that newly generated keys are always in PKCS#8. **Syntax**: oversign\_fields _list..._
**Default**: see below Header fields that should be signed n+1 times where n is times they are present in the message. This makes it impossible to replace field value by prepending another field with the same name to the message. Fields specified here don't have to be also specified in sign\_fields. Default set of oversigned fields: - Subject - To - From - Date - MIME-Version - Content-Type - Content-Transfer-Encoding - Reply-To - Message-Id - References - Autocrypt - Openpgp **Syntax**: sign\_fields _list..._
**Default**: see below Header fields that should be signed n+1 times where n is times they are present in the message. For these fields, additional values can be prepended by intermediate relays, but existing values can't be changed. Default set of signed fields: - List-Id - List-Help - List-Unsubscribe - List-Post - List-Owner - List-Archive - Resent-To - Resent-Sender - Resent-Message-Id - Resent-Date - Resent-From - Resent-Cc **Syntax**: header\_canon relaxed|simple
**Default**: relaxed Canonicalization algorithm to use for header fields. With 'relaxed', whitespace within fields can be modified without breaking the signature, with 'simple' no modifications are allowed. **Syntax**: body\_canon relaxed|simple
**Default**: relaxed Canonicalization algorithm to use for message body. With 'relaxed', whitespace within can be modified without breaking the signature, with 'simple' no modifications are allowed. **Syntax**: sig\_expiry _duration_
**Default**: 120h Time for which signature should be considered valid. Mainly used to prevent unauthorized resending of old messages. **Syntax**: hash _hash_
**Default**: sha256 Hash algorithm to use when computing body hash. sha256 is the only supported algorithm now. **Syntax**: newkey\_algo rsa4096|rsa2048|ed25519
**Default**: rsa2048 Algorithm to use when generating a new key. Currently ed25519 is NOT supported by most platforms. **Syntax**: require\_sender\_match _ids..._
**Default**: envelope auth Require specified identifiers to match From header field and key domain, otherwise - don't sign the message. If From field contains multiple addresses, message will not be signed unless allow\_multiple\_from is also specified. In that case only first address will be compared. Matching is done in a case-insensitive way. Valid values: - off Disable check, always sign. - envelope Require MAIL FROM address to match From header. - auth If authorization identity contains @ - then require it to fully match From header. Otherwise, check only local-part (username). **Syntax**: allow\_multiple\_from _boolean_
**Default**: no Allow multiple addresses in From header field for purposes of require\_sender\_match checks. Only first address will be checked, however. **Syntax**: sign\_subdomains _boolean_
**Default**: no Sign emails from subdomains using a top domain key. Allows only one domain to be specified (can be workarounded using modify.dkim multiple times).