Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

dkim: consider setting a default MaxVerifications #35

Open
emersion opened this issue Oct 14, 2020 · 2 comments
Open

dkim: consider setting a default MaxVerifications #35

emersion opened this issue Oct 14, 2020 · 2 comments

Comments

@emersion
Copy link
Owner

We'll probably want to expose a DefaultVerifyOptions variable to allow users to easily customize the defaults (e.g. keeping the default MaxVerifications but change the default LookupTXT).

@foxcpp
Copy link
Contributor

foxcpp commented Oct 14, 2020

The amount of signatures attached to the message is directly related to the amount of servers that processed it. I believe allowing up to 15 signatures per message is a reasonably safe bet.

@emersion
Copy link
Owner Author

emersion commented Oct 15, 2020

The amount of signatures attached to the message is directly related to the amount of servers that processed it.

I don't think so. Only authoritative servers should sign the message (ie. servers which have control over the sender's domain name). Intermediary servers (e.g. mailing lists) shouldn't.

So only a single server in the chain should sign the message. Note that allowing multiple signatures is still useful to allow cryptographic primitives to be gradually deployed (e.g. having messages double-signed with both RSA and ECDSA).

FWIW, OpenDKIM's default is 3.

@emersion emersion added the dkim label Jan 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants