Buying or Selling IPv4 Addresses?

Watch this video to discover how ACCELR/8, a transformative trading platform developed by industry veterans Marc Lindsey and Janine Goodman, enables organizations to buy or sell IPv4 blocks as small as /20s.

Avenue4 LLCRead Message Promoted Post

Home / Blogs

DKIM for Discussion Lists

J.D. Falk

There's a pernicious meme floating around that DomainKeys Identified Mail (DKIM) doesn't work with discussion lists, particularly those hosted on common open source software packages like MailMan. It's particularly odd to see this claim after I set it up successfully on a stock Debian server in less than half an hour, just a few weeks ago. Here's how it can, should, and does work:

1.  The inbound MTA handles DKIM signature verification, and applies an Authentication-Results header (or a custom X header.) For example, Sendmail's DKIM Milter does this out of the box for Sendmail, Postfix, and other popular MTAs.

2.  If the list /won't/ be modifying the message — in other words, if it acts like a simple forwarder — skip to step 5.

3.  Either the MDA or the list handler strips the DKIM-Signature header, effectively rendering the message unsigned.

4.  The list handler modifies the message in accordance with its configuration, often by adding a footer, placing a tag in the Subject: header, and adding List-* headers.

5.  The MSA or outbound MTA (re-)signs the message. This is appropriate because even if the message is passing through the system unchanged, the list handler is now the Originator, and thus responsible for that message (from a technical perspective, if not in a legal sense). I'd recommend using a different selector (perhaps a different subdomain) for each list, or at least for lists vs. non-list mail from that host, but that's not required.

6.  The outbound MTA transmits the message as per usual.

There's no wacky hacking required — it all works exactly as documented, and exactly as intended.

(Much of the terminology used in this article — MTA, MSA, Originator, et cetera — is defined in draft-crocker-email-arch-15.)

By J.D. Falk, Internet Standards and Governance
Related topics: Cybersecurity, Email, Spam
SHARE THIS POST

If you are pressed for time ...

... this is for you. More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Vinton Cerf, Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Share your comments

Oops, one correction: step #3 above doesn't J.D. Falk  –  Jun 02, 2009 2:38 PM PST

Oops, one correction: step #3 above doesn't happen by default, but MailMan and other list software can easily be configured to strip particular headers — or you can use procmail or other mail filtering software between the MTA and the list handler.

Works great John Levine  –  Jun 03, 2009 1:12 AM PST

I did the same thing for majordomo2, and it was similarly easy.

I don't bother to put in an authentication-results header since the list software has plenty of logs in the unlikely event that I need to track how a particular message got through a list.

Authentication-results Jim Fenton  –  Jun 04, 2009 10:38 AM PST

A couple of things relating to the application and use of the Authentication-Results header field in step 1:

- Does the signature applied in Step 5 include the Authentication-Results header field just added?  The signing of Authentication-Results header fields strikes me as implying somewhat different semantics (correctness of the header field) than a DKIM signature has (taking responsibility for the message, but saying nothing about its correctness) which makes me a bit conflicted on this idea.

- Prior to applying Authentication-Results, the list software should look for and remove any existing Authentication-Results header fields that purport to be from the list.  Otherwise it's possible for an attacker to spoof the A-R header field.

Are there any other recommendations on header fields that the list should sign, such as List-Id?

To my mind, signing the Authentication-Results header J.D. Falk  –  Jun 05, 2009 10:14 AM PST

To my mind, signing the Authentication-Results header still has the same concept of taking responsibility for that header.  Downstream entities will have to make up their own minds whether that responsibility is sufficient to denote correctness.  Even so, I'm also conflicted about whether it's a good idea.

Shouldn't hurt for the list software to remove it, though — or to remove any other Authentication-Results headers that might be lying around — because recipients will only be using the new signature to decide whether the message is trustworthy.

additional discussion J.D. Falk  –  Jun 13, 2009 4:52 AM PST

There's been some additional discussion about this on the ietf-dkim list, with a few people vehemently against the recipe above.  Hector Santos summed up the differences nicely in this message.  My reply is here.

If all you care about is making sure that your discussion list is signing effectively with DKIM, though, just read the original article above.  This particular debate is lost deep in the weeds.

draft-ietf-dkim-mailinglists J.D. Falk  –  Sep 01, 2010 10:12 AM PST

There's now an IETF draft being developed with additional advice for mailing list operators:

http://tools.ietf.org/html/draft-ietf-dkim-mailinglists

That draft has now been published as J.D. Falk  –  Sep 25, 2011 8:17 AM PST

That draft has now been published as RFC 6377.

https://tools.ietf.org/html/rfc6377

To post comments, please login or create an account.

Related

Topics

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byAfilias

Mobile Internet

Sponsored byAfilias

IP Addressing

Sponsored byAvenue4 LLC

Promoted Post

Buying or Selling IPv4 Addresses?

Watch this video to discover how ACCELR/8, a transformative trading platform developed by industry veterans Marc Lindsey and Janine Goodman, enables organizations to buy or sell IPv4 blocks as small as /20s.