Skip to main content

Name

ec_dkim_sign — Sign a message with the DKIM protocol

Synopsis

ec_dkim_sign [ parameters_hash ]

Description

ec_dkim_sign signs the current message with a DKIM signature. By default it uses the configured parameters on the DKIM module configuration stanza. If desired, a hash table of parameter overrides may be passed as the only argument to the Sieve extension. It may contain the following parameters:

Note

This feature requires the DKIM module. See “dkim – DomainKeys Identified Mail Signatures” for more information.

base_domain/signing_domain

Override the default signing domain. These two parameters are synonyms for one another, each will have the same effect.

header_canon

Override the default header canonicalization setting.

body_canon

Override the default body canonicalization setting.

digest

Override the default digest setting.

headerlist

Override the default list of headers to sign.

identity

Override the default signing identity.

selector

Override the default signing selector.

keyfile

Override the default signing key file, which may be parameterized as defined in the “dkim – DomainKeys Identified Mail Signatures” configuration documentation.

keybuf

Override the default signing key. This hash entry must contain the PEM encoded private key to use for signing the messages. This must be a contiguous string, with no line breaks and no white space, without the --BEGIN and --END tags that are found in the key file itself. The format is similar to the format used to store the public key in the DKIM DNS records.

body_length_limit

Override the default body_length_limit setting.

lifetime

**Configuration Change. ** This feature is available starting from Momentum 3.1.

Override the default lifetime setting.

The core_final_validation hook is triggered from the SWAPOUT pool as the last step before journaling the message to spool. Because you are guaranteed that nothing will change the message contents, it is best to execute ec_dkim_sign in the core_final_validation hook. This is important because message modifications that occur after a signature is computed will render the signature invalid. This hook point must run synchronously; doing otherwise will lead to undefined behavior.

Warning

While it is possible to use this function in the data phase, doing so will have a massive impact on performance, as the system would be occupied with signing instead of processing mail, and the throughput would suffer tremendously. However, there can only be one Sieve script bound to the core_final_validation hook. If you want to sign both DKIM and DomainKeys, put your code into the same file.

Set the sieve async option to false when using the core_final_validation_hook otherwise you may experience spool corruption.

Sieve scripts implementing the core_final_validation hook should not modify the message since it may have already been written to the spool.

Find a sample sieve configuration below:

sieve "sieve1" {
  hook "core_final_validation" {
    source = "/path/to/dkim_sign_script.siv"
    async = "false"
  }
}

Documentation for how to execute a Sieve script at a hook point can be found on the “sieve – The Sieve Module” documentation page.

$params = hash_create;
hash_set $params "selector" "myselector";
hash_set $params "signing_domain" "my.signing.domain.com";
ec_dkim_sign $params;
Was this page helpful?