DKIM signing

modify.dkim module is a modifier that signs messages using DKIM protocol (RFC 6376).

Each configuration block specifies a single selector and one or more domains.

A key will be generated or read for each domain, the key to use for each message will be selected based on the SMTP envelope sender. Exception for that is that for domain-less postmaster address and null address, the key for the first domain will be used. If domain in envelope sender does not match any of loaded keys, message will not be signed. Additionally, for each messages From header is checked to match MAIL FROM and authorization identity (username sender is logged in as). This can be controlled using require_sender_match directive.

Generated private keys are stored in unencrypted PKCS#8 format in state_directory/dkim_keys (/var/lib/maddy/dkim_keys). In the same directory .dns files are generated that contain public key for each domain formatted in the form of a DNS record.

Arguments

domains and selector can be specified in arguments, so actual modify.dkim use can be shortened to the following:

modify {
    dkim example.org selector
}

Configuration directives

modify.dkim {
    debug no
    domains example.org example.com
    selector default
    key_path dkim-keys/{domain}-{selector}.key
    oversign_fields ...
    sign_fields ...
    header_canon relaxed
    body_canon relaxed
    sig_expiry 120h # 5 days
    hash sha256
    newkey_algo rsa2048
}

Syntax: debug boolean
Default: global directive value

Enable verbose logging.

Syntax: domains string list
Default: not specified

REQUIRED.

ADministrative Management Domains (ADMDs) taking responsibility for messages.

Should be specified either as a directive or as an argument.

Syntax: selector string
Default: not specified

REQUIRED.

Identifier of used key within the ADMD. Should be specified either as a directive or as an argument.

Syntax: key_path string
Default: dkim_keys/{domain}\_{selector}.key

Path to private key. It should be in PKCS#8 format wrapped in PAM encoding. If key does not exist, it will be generated using algorithm specified in newkey_algo.

Placeholders '{domain}' and '{selector}' will be replaced with corresponding values from domain and selector directives.

Additionally, keys in PKCS#1 ("RSA PRIVATE KEY") and RFC 5915 ("EC PRIVATE KEY") can be read by modify.dkim. Note, however that newly generated keys are always in PKCS#8.

Syntax: oversign_fields list...
Default: see below

Header fields that should be signed n+1 times where n is times they are present in the message. This makes it impossible to replace field value by prepending another field with the same name to the message.

Fields specified here don't have to be also specified in sign_fields.

Default set of oversigned fields: - Subject - To - From - Date - MIME-Version - Content-Type - Content-Transfer-Encoding - Reply-To - Message-Id - References - Autocrypt - Openpgp

Syntax: sign_fields list...
Default: see below

Header fields that should be signed n+1 times where n is times they are present in the message. For these fields, additional values can be prepended by intermediate relays, but existing values can't be changed.

Default set of signed fields: - List-Id - List-Help - List-Unsubscribe - List-Post - List-Owner - List-Archive - Resent-To - Resent-Sender - Resent-Message-Id - Resent-Date - Resent-From - Resent-Cc

Syntax: header_canon relaxed|simple
Default: relaxed

Canonicalization algorithm to use for header fields. With 'relaxed', whitespace within fields can be modified without breaking the signature, with 'simple' no modifications are allowed.

Syntax: body_canon relaxed|simple
Default: relaxed

Canonicalization algorithm to use for message body. With 'relaxed', whitespace within can be modified without breaking the signature, with 'simple' no modifications are allowed.

Syntax: sig_expiry duration
Default: 120h

Time for which signature should be considered valid. Mainly used to prevent unauthorized resending of old messages.

Syntax: hash hash
Default: sha256

Hash algorithm to use when computing body hash.

sha256 is the only supported algorithm now.

Syntax: newkey_algo rsa4096|rsa2048|ed25519
Default: rsa2048

Algorithm to use when generating a new key.

Currently ed25519 is NOT supported by most platforms.

Syntax: require_sender_match ids...
Default: envelope auth

Require specified identifiers to match From header field and key domain, otherwise - don't sign the message.

If From field contains multiple addresses, message will not be signed unless allow_multiple_from is also specified. In that case only first address will be compared.

Matching is done in a case-insensitive way.

Valid values: - off Disable check, always sign. - envelope Require MAIL FROM address to match From header. - auth If authorization identity contains @ - then require it to fully match From header. Otherwise, check only local-part (username).

Syntax: allow_multiple_from boolean
Default: no

Allow multiple addresses in From header field for purposes of require_sender_match checks. Only first address will be checked, however.

Syntax: sign_subdomains boolean
Default: no

Sign emails from subdomains using a top domain key.

Allows only one domain to be specified (can be workarounded using modify.dkim multiple times).