mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-03 21:27:35 +03:00
199 lines
5.5 KiB
Markdown
199 lines
5.5 KiB
Markdown
# DKIM signing
|
|
|
|
modify.dkim module is a modifier that signs messages using DKIM
|
|
protocol (RFC 6376).
|
|
|
|
Each configuration block specifies a single selector
|
|
and one or more domains.
|
|
|
|
A key will be generated or read for each domain, the key to use
|
|
for each message will be selected based on the SMTP envelope sender. Exception
|
|
for that is that for domain-less postmaster address and null address, the
|
|
key for the first domain will be used. If domain in envelope sender
|
|
does not match any of loaded keys, message will not be signed.
|
|
Additionally, for each messages From header is checked to
|
|
match MAIL FROM and authorization identity (username sender is logged in as).
|
|
This can be controlled using require\_sender\_match directive.
|
|
|
|
Generated private keys are stored in unencrypted PKCS#8 format
|
|
in state_directory/dkim_keys (/var/lib/maddy/dkim_keys).
|
|
In the same directory .dns files are generated that contain
|
|
public key for each domain formatted in the form of a DNS record.
|
|
|
|
## Arguments
|
|
|
|
domains and selector can be specified in arguments, so actual modify.dkim use can
|
|
be shortened to the following:
|
|
```
|
|
modify {
|
|
dkim example.org selector
|
|
}
|
|
```
|
|
|
|
## Configuration directives
|
|
|
|
```
|
|
modify.dkim {
|
|
debug no
|
|
domains example.org example.com
|
|
selector default
|
|
key_path dkim-keys/{domain}-{selector}.key
|
|
oversign_fields ...
|
|
sign_fields ...
|
|
header_canon relaxed
|
|
body_canon relaxed
|
|
sig_expiry 120h # 5 days
|
|
hash sha256
|
|
newkey_algo rsa2048
|
|
}
|
|
```
|
|
|
|
**Syntax**: debug _boolean_ <br>
|
|
**Default**: global directive value
|
|
|
|
Enable verbose logging.
|
|
|
|
**Syntax**: domains _string list_ <br>
|
|
**Default**: not specified
|
|
|
|
**REQUIRED.**
|
|
|
|
ADministrative Management Domains (ADMDs) taking responsibility for messages.
|
|
|
|
Should be specified either as a directive or as an argument.
|
|
|
|
**Syntax**: selector _string_ <br>
|
|
**Default**: not specified
|
|
|
|
**REQUIRED.**
|
|
|
|
Identifier of used key within the ADMD.
|
|
Should be specified either as a directive or as an argument.
|
|
|
|
**Syntax**: key\_path _string_ <br>
|
|
**Default**: dkim\_keys/{domain}\\_{selector}.key
|
|
|
|
Path to private key. It should be in PKCS#8 format wrapped in PAM encoding.
|
|
If key does not exist, it will be generated using algorithm specified
|
|
in newkey\_algo.
|
|
|
|
Placeholders '{domain}' and '{selector}' will be replaced with corresponding
|
|
values from domain and selector directives.
|
|
|
|
Additionally, keys in PKCS#1 ("RSA PRIVATE KEY") and
|
|
RFC 5915 ("EC PRIVATE KEY") can be read by modify.dkim. Note, however that
|
|
newly generated keys are always in PKCS#8.
|
|
|
|
**Syntax**: oversign\_fields _list..._ <br>
|
|
**Default**: see below
|
|
|
|
Header fields that should be signed n+1 times where n is times they are
|
|
present in the message. This makes it impossible to replace field
|
|
value by prepending another field with the same name to the message.
|
|
|
|
Fields specified here don't have to be also specified in sign\_fields.
|
|
|
|
Default set of oversigned fields:
|
|
- Subject
|
|
- To
|
|
- From
|
|
- Date
|
|
- MIME-Version
|
|
- Content-Type
|
|
- Content-Transfer-Encoding
|
|
- Reply-To
|
|
- Message-Id
|
|
- References
|
|
- Autocrypt
|
|
- Openpgp
|
|
|
|
**Syntax**: sign\_fields _list..._ <br>
|
|
**Default**: see below
|
|
|
|
Header fields that should be signed n+1 times where n is times they are
|
|
present in the message. For these fields, additional values can be prepended
|
|
by intermediate relays, but existing values can't be changed.
|
|
|
|
Default set of signed fields:
|
|
- List-Id
|
|
- List-Help
|
|
- List-Unsubscribe
|
|
- List-Post
|
|
- List-Owner
|
|
- List-Archive
|
|
- Resent-To
|
|
- Resent-Sender
|
|
- Resent-Message-Id
|
|
- Resent-Date
|
|
- Resent-From
|
|
- Resent-Cc
|
|
|
|
**Syntax**: header\_canon relaxed|simple <br>
|
|
**Default**: relaxed
|
|
|
|
Canonicalization algorithm to use for header fields. With 'relaxed', whitespace within
|
|
fields can be modified without breaking the signature, with 'simple' no
|
|
modifications are allowed.
|
|
|
|
**Syntax**: body\_canon relaxed|simple <br>
|
|
**Default**: relaxed
|
|
|
|
Canonicalization algorithm to use for message body. With 'relaxed', whitespace within
|
|
can be modified without breaking the signature, with 'simple' no
|
|
modifications are allowed.
|
|
|
|
**Syntax**: sig\_expiry _duration_ <br>
|
|
**Default**: 120h
|
|
|
|
Time for which signature should be considered valid. Mainly used to prevent
|
|
unauthorized resending of old messages.
|
|
|
|
**Syntax**: hash _hash_ <br>
|
|
**Default**: sha256
|
|
|
|
Hash algorithm to use when computing body hash.
|
|
|
|
sha256 is the only supported algorithm now.
|
|
|
|
**Syntax**: newkey\_algo rsa4096|rsa2048|ed25519 <br>
|
|
**Default**: rsa2048
|
|
|
|
Algorithm to use when generating a new key.
|
|
|
|
Currently ed25519 is NOT supported by most platforms.
|
|
|
|
**Syntax**: require\_sender\_match _ids..._ <br>
|
|
**Default**: envelope auth
|
|
|
|
Require specified identifiers to match From header field and key domain,
|
|
otherwise - don't sign the message.
|
|
|
|
If From field contains multiple addresses, message will not be
|
|
signed unless allow\_multiple\_from is also specified. In that
|
|
case only first address will be compared.
|
|
|
|
Matching is done in a case-insensitive way.
|
|
|
|
Valid values:
|
|
- off
|
|
Disable check, always sign.
|
|
- envelope
|
|
Require MAIL FROM address to match From header.
|
|
- auth
|
|
If authorization identity contains @ - then require it to
|
|
fully match From header. Otherwise, check only local-part
|
|
(username).
|
|
|
|
**Syntax**: allow\_multiple\_from _boolean_ <br>
|
|
**Default**: no
|
|
|
|
Allow multiple addresses in From header field for purposes of
|
|
require\_sender\_match checks. Only first address will be checked, however.
|
|
|
|
**Syntax**: sign\_subdomains _boolean_ <br>
|
|
**Default**: no
|
|
|
|
Sign emails from subdomains using a top domain key.
|
|
|
|
Allows only one domain to be specified (can be worked around by using modify.dkim
|
|
multiple times).
|