Provided by: dkimpy-milter_1.2.2-2_all bug

NAME

       dkimpy-milter - Python milter for DKIM signing and validation

VERSION

       1.2.0

DESCRIPTION

       dkimpy-milter(8) implements the DKIM specification for signing and verifying e-mail
       messages on a per-domain basis.  This file is its configuration file.

       Blank lines are ignored.  Lines containing a hash ("#") character are truncated at the
       hash character to allow for comments in the file.

       Other content should be the name of a parameter, followed by white space, followed by the
       value of that parameter, each on a separate line.

       For parameters that are Boolean in nature, only the first byte of the value is processed.
       For positive values, the following are accepted: "T", "t", "Y", "y", "1".  For negative
       values, the following are accepted: "F", "f", "N", "n", "0".

       The provided setup.py installs this configuration file in /etc or /usr/local/etc based on
       the value of expand sysconfigdir= used when the package was installed.

       Command line invocation of parameters as is done by OpenDKIM is not supported.

USAGE

       Usage:
         dkimpy-milter [/etc/dkimpy-milter/dkimpy-milter.conf]

OTHER DOCUMENTATION

       This documentation assumes you have read Postfix's README_FILES/MILTER_README (or Sendmail
       equivalent) and are generally familiar with Domain Keys Identified Mail (DKIM).  See RFC
       6376 for details.

SYNOPSIS

       dkimpy-milter operates with a default installed configuration file and set of default
       configuration options that are used if the configuration file cannot be found.  These
       options can be changed by changing the installed configuration files.  For users
       transitioning from OpenDKIM, OpenDKIM config files can be used directly.  Not all OpenDKIM
       options are supported.  If an unsupported option from OpenDKIM is specified, an error will
       be raised.

DESCRIPTION

       Configuration options are described here and in the configuration file provided with the
       package.  The provided setup.py installs this configuration file in /etc or
       /usr/local/etc.

OPTIONS

       AuthservID (string)
              Sets the "authserv-id" to use when generating the Authentication-Results: header
              field after verifying a message.  The default is to use the name of the MTA
              processing the message.  If the string "HOSTNAME" is provided, the name of the host
              running the filter (as returned by the gethostname(3) function) will be used.

       Canonicalization (string)
              Selects the canonicalization method(s) to be used when signing messages.  When
              verifying, the message's DKIM-Signature: header field specifies the
              canonicalization method.  The recognized values are relaxed and simple as defined
              by the DKIM specification.  The default is relaxed / simple.  The value may include
              two different canonicalizations separated by a slash ("/") character, in which case
              the first will be applied to the header and the second to the body.

       DiagnosticDirectory (string)
              Directory into which to write diagnostic reports when message verification fails.
              If not set (the default), these files are not generated.  The directory must exist,
              dkimpy-milter will not create it and an error will be raised if it does not.
              [Unlike OpenDKIM, this applies to all messages, not just  on messages bearing a
              "z=" tag because dkimpy does not yet support "z=" processing.]

       Domain (dataset)
              A set of domains whose mail should be signed by this filter.  Mail from other
              domains will be verified rather than being signed.

              This parameter is not required if a SigningTable is in use; in that case, the list
              of signed domains is implied by the lines in that file.

              This parameter is ignored if a KeyTable or KeyTableD25119 is defined.

       InternalHosts (dataset)
              Identifies a set internal hosts whose mail should be signed rather than verified.
              Entries in this data set follow the same form as those of the PeerList option
              below.  If not specified, the default of "127.0.0.1" is applied.  Naturally,
              providing a value here overrides the default, so if mail from 127.0.0.1 should be
              signed, the list provided here should include that address explicitly. [PeerList
              NOT IMPLEMENTED]

       KeyFile (string)
              Gives the location of a PEM-formatted private key to be used for RSA signing all
              messages.  Ignored if a KeyTable is defined.

       KeyFileEd25519 (string)
              Gives the location of a Ed25519 private key to be used for Ed25519 signing all
              messages.  File is the Base64 encoded output of RFC 8032 Ed25519 private Key
              generation (as used in dkimpy).  Ignored if a KeyTableEd25519 is defined.

       KeyTable (dataset)
              Gives the location of a file mapping key names to RSA signing keys. If present,
              overrides any KeyFile setting in the configuration file. The data set named here
              maps each key name to three values: (a) the name of the domain to use in the
              signature’s "d=" value; (b) the name of the selector to use in the signature’s "s="
              value; and (c) the  path to a file containing a private key. If the first value
              consists solely of a percent sign ("%") character, it will be replaced by the
              apparent domain of the sender when generating a signature. The third value must
              start with a slash ("/") character, or "./" or "../" to indicate it refers to a
              file from which the private key should be read.  The SigningTable (see below) is
              used to select records from this table to be used to add signatures based on the
              message sender.

              See the COMPLEX SIGNING CONFIGURATIONS section of README.md for examples.

       KeyTableEd25519 (dataset)
              Gives the location of a file mapping key names to Ed25519 signing keys. If present,
              overrides any KeyFile setting in the configuration file. The data set named here
              maps each key name to three values: (a) the name of the domain to use in the
              signature’s "d=" value; (b) the name of the selector to use in the signature’s "s="
              value; and (c) the  path to a file containing a private key. If the first value
              consists solely of a percent sign ("%") character, it will be replaced by the
              apparent domain of the sender when generating a signature. The third value must
              start with a slash ("/") character, or "./" or "../" to indicate it refers to a
              file from which the private key should be read.  The SigningTable (see below) is
              used to select records from this table to be used to add signatures based on the
              message sender.  NOTE: There is a limitation of the current implementation that a
              private key can't be directly included in the file if it starts with '/', './', or
              '../'.  If you have such a key, you may store it in a file and reference the file
              in the table.

              See the COMPLEX SIGNING CONFIGURATIONS section of README.md for examples.

       MacroList (dataset)
              Defines a set of MTA-provided macros that should be checked to see if the sender
              has been determined to be a local user and therefore whether or not the message
              should be signed.  If a value is specified matching a macro name in the data set,
              the value of the macro must match a value specified (matching is case-sensitive),
              otherwise the macro must be defined but may contain any value.  The set is empty by
              default, meaning macros are not considered when making the sign-verify decision.
              The general format of the value is value1[|value2[|...]]; if one or more value is
              defined then the macro must be set to one of the listed values, otherwise the macro
              must be set but can contain any value.

              In order for the macro and its value to be available to the filter for checking,
              the MTA must send it during the protocol exchange.  This is either accomplished via
              manual configuration of the MTA to send the desired macros or, for MTA/filter
              combinations that support the feature, the filter can request those macros that are
              of interest.  The latter is a feature negotiated at the time the filter receives a
              connection from the MTA and its availability depends upon the version of milter
              used to compile the filter and the version of the MTA making the connection.

       MacroListVerify (dataset)
              Defines a set of MTA-provided macros that should be checked to see if the sender
              has been determined to be an external source and therefore whether or not the
              message should be signed.  Entries in this data set follow the same form as those
              of the MacroList option above.  [this option is not inhereted from OpenDKIM]

       Mode (string)
              Selects operating modes.  The string is a concatenation of characters that indicate
              which mode(s) of operation are desired.  Valid modes are s (signer) and v
              (verifier).  The default is sv except in test mode (see the opendkim(8) man page)
              in which case the default is v.  When signing mode is enabled, one of the following
              combinations must also be set: (a) Domain, KeyFile, Selector, no KeyTable, no
              SigningTable; (b) KeyTable, SigningTable, no Domain, no KeyFile, no Selector;

              TP MinimumKeyBits (integer) Establishes a minimum key size for acceptable RSA
              signatures.  Signatures with smaller key sizes, even if they otherwise pass DKIM
              validation, will me marked as invalid.  The default is 1024, which accepts all
              signatures.  A value of 0 causes the default to be used. Not Applicable to ed25519
              signatures.

       OmitHeaders (dataset)
              Specifies a set of header fields that should be omitted when generating signatures.
              If an entry in the list names any header field that is mandated by the DKIM
              specification, the entry is ignored.  A set of header fields is listed in the DKIM
              specification (RFC6376, Section 5.4) as "SHOULD NOT" be signed; the default list
              for this parameter contains those fields (Return-Path, Received, Comments,
              Keywords, Bcc, Resent-Bcc and DKIM-Signature).  To omit no headers, simply use the
              string "." (or any string that will match no header field names).  Specifying a
              list with this parameter replaces the default entirely, unless one entry is "*" in
              which case the list is interpreted as a delta to the default; for example,
              "*,+foobar" will use the entire default list plus the name "foobar", while "*,-Bcc"
              would use the entire default list except for the "Bcc" entry. [OmitHeaders NOT
              IMPLEMENTED - included for reference only]

       DNSOverride (string)
              Provide a text string that a verifying milter should use instead of consulting the
              DNS on each message.  This is useful primarily for testing purposes in environments
              where it is awkward to modify the system DNS resolution.  It should not be used in
              production.

       DNSTimeout (integer)
              Sets the DNS timeout in seconds.  A value of 0 causes no wait (this is different
              than opendkim).  The default is 5.  See also the NOTES section below.

       PeerList (dataset)
              Identifies a set of "peers" that identifies clients whose connections should be
              accepted without processing by this filter.  The set should contain on each line a
              hostname, domain name (e.g. ".example.com"), IP address, an IPv6 address (including
              an IPv4 mapped address), or a CIDR-style IP specification (e.g. "192.168.1.0/24").
              An entry beginning with a bang ("!") character means "not", allowing exclusions of
              specific hosts that are otherwise members of larger sets.  Host and domain names
              are matched first, then the IP or IPv6 address depending on the connection type.
              More precise entries are preferred over less precise ones, i.e.  "192.168.1.1" will
              match before "!192.168.1.0/24".  The text form of IPv6 addresses will be forced to
              lowercase when queried (RFC5952), so the contents of this data set should also use
              lowercase.  The IP address portion of an entry may optionally contain square
              brackets; both forms (with and without) will be checked. [PeerList NOT IMPLEMENTED
              - included for reference only]

       PidFile (string)
              Specifies the path to a file that should be created at process start containing the
              process ID.  If not specified, no such file will be created.

       Selector (string)
              Defines the name of the selector to be used when signing messages using RSA.  See
              the DKIM specification for details.  Used only when signing with a single key; see
              the SigningTable parameter below for more information.

              This parameter is ignored if a KeyTable is defined.

       SelectorEd25519 (string)
              Defines the name of the selector to be used when signing messages using Ed25519.
              See the DKIM specification for details.  Used only when signing with a single key;
              see the SigningTable parameter below for more information.

              This parameter is ignored if a KeyTableEd25519 is defined.

       SignHeaders (dataset)
              Specifies the set of header fields that should be included when generating
              signatures.  If the list omits any header field that is mandated by the DKIM
              specification, those fields are implicitly added.  By default, those fields listed
              in the DKIM specification as "SHOULD" be signed (RFC6376, Section 5.4) will be
              signed by the filter.  See the OmitHeaders configuration option for more
              information about the format and interpretation of this field.

       SigningTable (dataset)

              Defines a table used to select a signing identity to apply to a message based on
              the address found in the From: header field. Keys in this table vary depending on
              the type of table used; values in this data set should include one field that
              contains a name found in the KeyTable (see above) that identifies which key should
              be used in generating the signature, and an optional second field naming the signer
              of the message that will be included in the "i=" tag in the generated signature.
              Note that the "i=" value will not be included in the signature if it conflicts with
              the signing domain (the "d=" value).

              If the first field contains only a "%" character, it will be replaced by the domain
              found in the From: header field. Similarly, within the optional second field, any
              "%" character will be replaced by the domain found in the From: header field.

              If this table specifies a regular expression file ("refile"), then the keys are
              wildcard patterns that are matched against the address found in the From: header
              field.  Entries are checked in the order in which they appear in the file.   Note:
              These are not true regular expressions.  The terminology is inherited from
              opendkim.  Only wildcards ("*") are supported.

              For all other database types, the full user@host is checked first, then simply
              host, then user@.domain (with all superdomains checked in sequence, so
              "foo.example.com" would first check "user@foo.example.com", then
              "user@.example.com", then "user@.com"), then .domain, then user@*, and finally *.

              In any case, only the first match is applied.

              See the COMPLEX SIGNING CONFIGURATIONS section of README.md for examples.

       Socket (string)
              Specifies the socket that should be established by the filter to receive
              connections from postfix(1) in order to provide service.  socketspec is in one of
              two forms: local:path, which creates a UNIX domain socket at the specified path, or
              inet:port[@host] or inet6:port[@host] which creates a TCP socket on the specified
              port and in the specified protocol family.  If the host is not given as either a
              hostname or an IP address, the socket will be listening on all interfaces.  A
              literal IP address must be enclosed in square brackets.  This option is mandatory
              in the configuration file.

       SubDomains (Boolean)
              Sign subdomains of those listed by the Domain parameter as well as the actual
              domains.

       Syslog (Boolean)
              Log via calls to syslog(3) any interesting activity.

       SyslogFacility (string)
              Log via calls to syslog(3) using the named facility.  The facility names are the
              same as the ones allowed in syslog.conf(5).  The default is "mail".

       SyslogSuccess (Boolean)
              Log via calls to syslog(3) additional entries indicating successful signing or
              verification of messages.

       UMask (integer)
              Requests a specific permissions mask to be used for file creation.  This only
              really applies to creation of the socket when Socket specifies a UNIX domain
              socket, and to the PidFile (if any); temporary files are created by the mkstemp(3)
              function that enforces a specific file mode on creation regardless of the process
              umask.  See umask(2) for more information.

       UserID (string)
              Attempts to become the specified userid before starting operations.  The value is
              of the form userid[:group].  The process will be assigned all of the groups and
              primary group ID of the named userid unless an alternate group is specified.

NOTES

       When using DNS timeouts (see the DNSTimeout option above), be sure not to use a timeout
       that is larger than the timeout being used for interaction between sendmail and the
       filter.  Otherwise, the MTA could abort a message while waiting for a reply from the
       filter, which in turn is still waiting for a DNS reply.  This must take into accout that
       the timeout is per DNS lookup so the total DNS wait time may be subustantially loner than
       the value specified in DNSTimeout InternalHosts option is in use and one for DKIM public
       key record lookup for each algorithm per signature per message (i.e. potentially two
       lookups per signature).

FILES

       /etc/dkimpy-milter/dkimpy-milter.conf
              Default location of this file.

AUTHORS

       dkimpy-milter was written by Scott Kitterman <scott@kitterman.com>.  It is based on dkim-
       milter.py  Copyright (c) 2001-2013 Business Management Systems, Inc.  Copyright (c)
       2013-2015 Stuart D. Gathman Copyright (c) 2018,2019 Scott Kitterman <scott@kitterman.com>.

       This man-page was created by Scott Kitterman <scott@kitterman.com>.

COPYRIGHT

       Configuration items derived from OpenDKIM 2.11.0 opendkim.conf.5.in: Copyright (c) 2007,
       2008, Sendmail, Inc. and its suppliers.  All rights reserved.  See LICENSE.Sendmail.

       Copyright (c) 2009-2015, The Trusted Domain Project.  All rights reserved.  See LICENSE.

       Updated for dkimpy-milter.  Updates licensed under the same terms as the rest of the
       package.  Copyright (c) 2018,2019 Scott Kitterman <scott@kitterman.com>

                                            2019-04-25                      dkimpy-milter.conf(5)