<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to feature-requests</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/" rel="alternate"/><link href="https://sourceforge.net/p/dkimproxy/feature-requests/feed.atom" rel="self"/><id>https://sourceforge.net/p/dkimproxy/feature-requests/</id><updated>2010-11-18T12:28:35Z</updated><subtitle>Recent changes to feature-requests</subtitle><entry><title>Add support for Vbr-Info header</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/28/" rel="alternate"/><published>2010-11-18T12:28:35Z</published><updated>2010-11-18T12:28:35Z</updated><author><name>Patrick Vande Walle</name><uri>https://sourceforge.net/u/patrickvw/</uri></author><id>https://sourceforge.net8666477802397c64fbab464b122aa43e849c6cf8</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;This is defined in RFC 5518 :http://www.rfc-editor.org/rfc/rfc5518.txt&lt;br /&gt;
That would be particulary useful on outgoing messages.  While this header could be added by some MTAs, it seems that the DKIM signing program is the best place to inseert the Vouch By Reference header. See the RFC for more details.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>granularity compatibility - suggestion by dkim-deployment</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/27/" rel="alternate"/><published>2010-06-08T12:24:14Z</published><updated>2010-06-08T12:24:14Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.net4cb0dc9deeb9935c20328f41b7d191d211aaeb7e</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;The draft-ietf-dkim-deployment makes a compatibility suggestion,&lt;br /&gt;
perhaps it could be incorporated into Mail::DKIM.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://tools.ietf.org/id/draft-ietf-dkim-deployment-11.txt" rel="nofollow"&gt;http://tools.ietf.org/id/draft-ietf-dkim-deployment-11.txt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A.1.2.3.  DNS Selector Key Records&lt;/p&gt;
&lt;p&gt;The format of the DNS key record was intentionally meant to be&lt;br /&gt;
backwardly compatible between DK and DKIM, but not necessarily&lt;br /&gt;
upwardly compatible.  DKIM has enhanced the DK DNS key record format&lt;br /&gt;
by adding several optional parameters, which DK needs to ignore.&lt;br /&gt;
However, there is one key difference between DK and DKIM DNS key&lt;br /&gt;
records: the definitions of the g fields:&lt;/p&gt;
&lt;p&gt;g= granularity of the key  In both DK and DKIM, this is an optional&lt;br /&gt;
field that is used to constrain which sending address(es) can&lt;br /&gt;
legitimately use this selector.  Unfortunately, the treatment of&lt;br /&gt;
an empty field ("g=;") is different.  For DK, an empty field is&lt;br /&gt;
the same as a missing value, and is treated as allowing any&lt;br /&gt;
sending address.  For DKIM, an empty field only matches an empty&lt;br /&gt;
local part.&lt;/p&gt;
&lt;p&gt;v= version of the selector  It is advised that a DKIM selector have&lt;br /&gt;
"v=DKIM1;" at its beginning, but it is not required.&lt;/p&gt;
&lt;p&gt;If a DKIM verifier finds a selector record that has an empty "g"&lt;br /&gt;
field ("g=;") and it does not have a "v" field ("v=DKIM1;") at its&lt;br /&gt;
beginning, it is faced with deciding if this record was&lt;/p&gt;
&lt;p&gt;1.  from a DK signer that transitioned to supporting DKIM but forgot&lt;br /&gt;
to remove the "g" field (so that it could be used by both DK and&lt;br /&gt;
DKIM verifiers), or&lt;/p&gt;
&lt;p&gt;2.  from a DKIM signer that truly meant to use the empty "g" field&lt;br /&gt;
but forgot to put in the "v" field.  It is advised that you treat&lt;br /&gt;
such records using the first interpretation, and treat such&lt;br /&gt;
records as if the signer did not have a "g" field in the record.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>implement reset() for Signer object</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/26/" rel="alternate"/><published>2010-03-31T21:02:16Z</published><updated>2010-03-31T21:02:16Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.netca2dc69f9303b12c982d15cefcb45743e83d3614</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;See CPAN RT ticket 47925.&lt;/p&gt;
&lt;p&gt;Use case:&lt;/p&gt;
&lt;p&gt;If we want to use the same signer (meaning the same key, the same&lt;br /&gt;
domain/selector, the same algrithm/method) to sign different message, we&lt;br /&gt;
would have to have a reset() function in Mail::DKIM::Signer.&lt;/p&gt;
&lt;p&gt;--- lib/Mail/DKIM/Signer.pm 2009-06-02 10:24:55.000000000 -0700&lt;br /&gt;
+++ /usr/lib/perl5/site_perl/5.8.0/Mail/DKIM/Signer.pm 2009-07-15&lt;br /&gt;
09:59:05.0000&lt;br /&gt;
@@ -174,6 +174,13 @@&lt;br /&gt;
}&lt;br /&gt;
}&lt;/p&gt;
&lt;p&gt;+sub reset&lt;br /&gt;
+{&lt;br /&gt;
+ my $self = shift;&lt;br /&gt;
+&lt;br /&gt;
+ $self-&amp;gt;SUPER::init;&lt;br /&gt;
+}&lt;br /&gt;
+&lt;br /&gt;
sub finish_header&lt;br /&gt;
{&lt;br /&gt;
my $self = shift;&lt;/p&gt;
&lt;p&gt;The test case is attached.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Log to separate syslog file</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/25/" rel="alternate"/><published>2010-03-08T14:06:49Z</published><updated>2010-03-08T14:06:49Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.netf09eda3a2f2852b39978607fc69128ca1b3899f5</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I try to log to a seperate syslog file for dkimproxy.out (it would be&lt;br /&gt;
the same as the second postfix instance, responsible for outgoing&lt;br /&gt;
traffic), but didn't fine any configuration directives for syslog.&lt;/p&gt;
&lt;p&gt;Any help is welcome,&lt;br /&gt;
Thanks,&lt;br /&gt;
Thomas&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>generate t= field (signature timestamp) on DKIM signatures</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/24/" rel="alternate"/><published>2009-10-26T16:15:17Z</published><updated>2009-10-26T16:15:17Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.neta35d968a3de3d497580fd62da579b62dfa32668a</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Jason Long &amp;lt;jlong@messiah.edu&amp;gt; writes:&lt;/p&gt;
&lt;p&gt;&amp;gt; 牛粥 wrote:&lt;br /&gt;
&amp;gt;&amp;gt; Signature Timestamp ("t=" field) is just optional. By the way, i wish to&lt;br /&gt;
&amp;gt;&amp;gt; add that into DKIM-Signature. For a while, i thought that "t=" field&lt;br /&gt;
&amp;gt;&amp;gt; will give folks the greatest confidence. &lt;br /&gt;
&amp;gt;&lt;br /&gt;
&amp;gt; This will require modification (patches welcome) to the Mail::DKIM&lt;br /&gt;
&amp;gt; library and the DKIMproxy program, since it currently does not have&lt;br /&gt;
&amp;gt; the programming needed to generate those timestamps.&lt;br /&gt;
&amp;gt; Jason&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Test suite not depending on Internet connectivity</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/23/" rel="alternate"/><published>2009-08-01T16:37:31Z</published><updated>2009-08-01T16:37:31Z</updated><author><name>Magnus Holmgren</name><uri>https://sourceforge.net/u/proffe/</uri></author><id>https://sourceforge.netf0f3226d91d5489aceb1337d34445df6060c7a1b</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;It would be nice if you could let policy.t and public_key.t share the "fake DNS" in verifier.t, such that the test suite doesn't depend on the Internet being available.&lt;/p&gt;
&lt;p&gt;(The build environment on Debian's autobuilders doesn't provide network connectivity, and anyway, Internet connections fail now and then and I don't think that should cause unit tests to fail.)&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Create "dkim_method", "domainkeys_method" options</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/22/" rel="alternate"/><published>2009-07-30T14:18:05Z</published><updated>2009-07-30T14:18:05Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.netdbcf30b98a7e540e40e86599d055fbf1a9a8ce30</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;For each of the main signing options, keyfile, selector, algorithm, and method (and domain and identity?), create additional options prefixed with domainkeys_ and dkim_ that will apply only for that signature type.&lt;/p&gt;
&lt;p&gt;E.g. so instead of having to say "dkim(c=relaxed,a=rsa_sha256),domainkeys(c=nofws)" in the sender map file, I could specify --dkim_method=relaxed --dkim_algorithm=rsa_sha256 --domainkeys_method=nofws in the main config file, and then simply specify "dkim,domainkeys" in the sender map file.&lt;/p&gt;
&lt;p&gt;Note: there is not currently an "algorithm" option. Since domainkeys only supports one algorithm, perhaps I can simply implement a dkim_algorithm option and not worry about making an "algorithm" option.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>generate signature based on List-Id header</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/21/" rel="alternate"/><published>2009-07-28T13:39:01Z</published><updated>2009-07-28T13:39:01Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.netedfffe6376e5f6e1e5a80973af22562b0dd53903</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Dear Jason,&lt;/p&gt;
&lt;p&gt;Thanks muchly for your help. I spent some more hours but could not&lt;br /&gt;
solve the issue.&lt;br /&gt;
BTW, I have a friend who is running some dozen of mailing-lists also,&lt;br /&gt;
so we both need this signing feature based on List-ID's domain with&lt;br /&gt;
both DKIM and Domainkeys.&lt;br /&gt;
We think this feature would benefit a lot of people running mailing&lt;br /&gt;
lists around the world. As long as you are very kind to provide the&lt;br /&gt;
software as opensource. We'd like to ask if you have time/interest to&lt;br /&gt;
make a new feature available in dkimproxy? For example add a&lt;br /&gt;
configuration parameter (--addon-header=list-id) that tell dkimproxy&lt;br /&gt;
to sign emails based on the domain specified in the addon-header&lt;br /&gt;
field.&lt;br /&gt;
We'll be very happy if we can show our gratitude by donating money or&lt;br /&gt;
resource to the project, show the links to dkimproxy in our websites&lt;br /&gt;
and recommend our friends (for example FreeBSD community) to use&lt;br /&gt;
dkimproxy.&lt;/p&gt;
&lt;p&gt;Please kindly let me know your opinion.&lt;/p&gt;
&lt;p&gt;--&lt;br /&gt;
With best regards,&lt;br /&gt;
Chinh&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Provide instructions for Upgrading</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/20/" rel="alternate"/><published>2009-07-12T12:11:38Z</published><updated>2009-07-12T12:11:38Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.net4e25fe3afba404e41dd8bdd76c614c99a6c36ee9</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;To upgrade, all you need to do is download the new version, run ./configure with the same arguments as before, then make install,&lt;br /&gt;
then restart DKIMproxy.&lt;/p&gt;
&lt;p&gt;But this should probably be spelled out in the INSTALL file (or in a new UPGRADE file).&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>More standard installation layout</title><link href="https://sourceforge.net/p/dkimproxy/feature-requests/19/" rel="alternate"/><published>2009-04-30T13:55:44Z</published><updated>2009-04-30T13:55:44Z</updated><author><name>Jason Long</name><uri>https://sourceforge.net/u/jasonlong/</uri></author><id>https://sourceforge.netb8fc6292765055aa795c88cd898bf3aaf26dd9dc</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Currently, installing with --prefix=/usr/local/dkimproxy is recommended since it puts some files in $prefix/lib which might clobber other files.&lt;br /&gt;
I want to change things so that --prefix=/usr/local can be the default,&lt;br /&gt;
and the library files will be stored in /usr/local/lib/dkimproxy or something like that.&lt;/p&gt;
&lt;p&gt;(This will make the man pages I'm working on show up at the right spot.)&lt;/p&gt;&lt;/div&gt;</summary></entry></feed>