<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to feature-requests</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/</link><description>Recent changes to feature-requests</description><atom:link href="https://sourceforge.net/p/dkimproxy/feature-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Thu, 18 Nov 2010 12:28:35 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/dkimproxy/feature-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>Add support for Vbr-Info header</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/28/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;This is defined in RFC 5518 :http://www.rfc-editor.org/rfc/rfc5518.txt&lt;br /&gt;
That would be particulary useful on outgoing messages.  While this header could be added by some MTAs, it seems that the DKIM signing program is the best place to inseert the Vouch By Reference header. See the RFC for more details.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Patrick Vande Walle</dc:creator><pubDate>Thu, 18 Nov 2010 12:28:35 -0000</pubDate><guid>https://sourceforge.net8666477802397c64fbab464b122aa43e849c6cf8</guid></item><item><title>granularity compatibility - suggestion by dkim-deployment</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/27/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The draft-ietf-dkim-deployment makes a compatibility suggestion,&lt;br /&gt;
perhaps it could be incorporated into Mail::DKIM.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://tools.ietf.org/id/draft-ietf-dkim-deployment-11.txt" rel="nofollow"&gt;http://tools.ietf.org/id/draft-ietf-dkim-deployment-11.txt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A.1.2.3.  DNS Selector Key Records&lt;/p&gt;
&lt;p&gt;The format of the DNS key record was intentionally meant to be&lt;br /&gt;
backwardly compatible between DK and DKIM, but not necessarily&lt;br /&gt;
upwardly compatible.  DKIM has enhanced the DK DNS key record format&lt;br /&gt;
by adding several optional parameters, which DK needs to ignore.&lt;br /&gt;
However, there is one key difference between DK and DKIM DNS key&lt;br /&gt;
records: the definitions of the g fields:&lt;/p&gt;
&lt;p&gt;g= granularity of the key  In both DK and DKIM, this is an optional&lt;br /&gt;
field that is used to constrain which sending address(es) can&lt;br /&gt;
legitimately use this selector.  Unfortunately, the treatment of&lt;br /&gt;
an empty field ("g=;") is different.  For DK, an empty field is&lt;br /&gt;
the same as a missing value, and is treated as allowing any&lt;br /&gt;
sending address.  For DKIM, an empty field only matches an empty&lt;br /&gt;
local part.&lt;/p&gt;
&lt;p&gt;v= version of the selector  It is advised that a DKIM selector have&lt;br /&gt;
"v=DKIM1;" at its beginning, but it is not required.&lt;/p&gt;
&lt;p&gt;If a DKIM verifier finds a selector record that has an empty "g"&lt;br /&gt;
field ("g=;") and it does not have a "v" field ("v=DKIM1;") at its&lt;br /&gt;
beginning, it is faced with deciding if this record was&lt;/p&gt;
&lt;p&gt;1.  from a DK signer that transitioned to supporting DKIM but forgot&lt;br /&gt;
to remove the "g" field (so that it could be used by both DK and&lt;br /&gt;
DKIM verifiers), or&lt;/p&gt;
&lt;p&gt;2.  from a DKIM signer that truly meant to use the empty "g" field&lt;br /&gt;
but forgot to put in the "v" field.  It is advised that you treat&lt;br /&gt;
such records using the first interpretation, and treat such&lt;br /&gt;
records as if the signer did not have a "g" field in the record.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Tue, 08 Jun 2010 12:24:14 -0000</pubDate><guid>https://sourceforge.net4cb0dc9deeb9935c20328f41b7d191d211aaeb7e</guid></item><item><title>implement reset() for Signer object</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/26/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;See CPAN RT ticket 47925.&lt;/p&gt;
&lt;p&gt;Use case:&lt;/p&gt;
&lt;p&gt;If we want to use the same signer (meaning the same key, the same&lt;br /&gt;
domain/selector, the same algrithm/method) to sign different message, we&lt;br /&gt;
would have to have a reset() function in Mail::DKIM::Signer.&lt;/p&gt;
&lt;p&gt;--- lib/Mail/DKIM/Signer.pm 2009-06-02 10:24:55.000000000 -0700&lt;br /&gt;
+++ /usr/lib/perl5/site_perl/5.8.0/Mail/DKIM/Signer.pm 2009-07-15&lt;br /&gt;
09:59:05.0000&lt;br /&gt;
@@ -174,6 +174,13 @@&lt;br /&gt;
}&lt;br /&gt;
}&lt;/p&gt;
&lt;p&gt;+sub reset&lt;br /&gt;
+{&lt;br /&gt;
+ my $self = shift;&lt;br /&gt;
+&lt;br /&gt;
+ $self-&amp;gt;SUPER::init;&lt;br /&gt;
+}&lt;br /&gt;
+&lt;br /&gt;
sub finish_header&lt;br /&gt;
{&lt;br /&gt;
my $self = shift;&lt;/p&gt;
&lt;p&gt;The test case is attached.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Wed, 31 Mar 2010 21:02:16 -0000</pubDate><guid>https://sourceforge.netca2dc69f9303b12c982d15cefcb45743e83d3614</guid></item><item><title>Log to separate syslog file</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/25/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I try to log to a seperate syslog file for dkimproxy.out (it would be&lt;br /&gt;
the same as the second postfix instance, responsible for outgoing&lt;br /&gt;
traffic), but didn't fine any configuration directives for syslog.&lt;/p&gt;
&lt;p&gt;Any help is welcome,&lt;br /&gt;
Thanks,&lt;br /&gt;
Thomas&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Mon, 08 Mar 2010 14:06:49 -0000</pubDate><guid>https://sourceforge.netf09eda3a2f2852b39978607fc69128ca1b3899f5</guid></item><item><title>generate t= field (signature timestamp) on DKIM signatures</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/24/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Jason Long &amp;lt;jlong@messiah.edu&amp;gt; writes:&lt;/p&gt;
&lt;p&gt;&amp;gt; 牛粥 wrote:&lt;br /&gt;
&amp;gt;&amp;gt; Signature Timestamp ("t=" field) is just optional. By the way, i wish to&lt;br /&gt;
&amp;gt;&amp;gt; add that into DKIM-Signature. For a while, i thought that "t=" field&lt;br /&gt;
&amp;gt;&amp;gt; will give folks the greatest confidence. &lt;br /&gt;
&amp;gt;&lt;br /&gt;
&amp;gt; This will require modification (patches welcome) to the Mail::DKIM&lt;br /&gt;
&amp;gt; library and the DKIMproxy program, since it currently does not have&lt;br /&gt;
&amp;gt; the programming needed to generate those timestamps.&lt;br /&gt;
&amp;gt; Jason&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Mon, 26 Oct 2009 16:15:17 -0000</pubDate><guid>https://sourceforge.neta35d968a3de3d497580fd62da579b62dfa32668a</guid></item><item><title>Test suite not depending on Internet connectivity</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/23/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;It would be nice if you could let policy.t and public_key.t share the "fake DNS" in verifier.t, such that the test suite doesn't depend on the Internet being available.&lt;/p&gt;
&lt;p&gt;(The build environment on Debian's autobuilders doesn't provide network connectivity, and anyway, Internet connections fail now and then and I don't think that should cause unit tests to fail.)&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Magnus Holmgren</dc:creator><pubDate>Sat, 01 Aug 2009 16:37:31 -0000</pubDate><guid>https://sourceforge.netf0f3226d91d5489aceb1337d34445df6060c7a1b</guid></item><item><title>Create "dkim_method", "domainkeys_method" options</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/22/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;For each of the main signing options, keyfile, selector, algorithm, and method (and domain and identity?), create additional options prefixed with domainkeys_ and dkim_ that will apply only for that signature type.&lt;/p&gt;
&lt;p&gt;E.g. so instead of having to say "dkim(c=relaxed,a=rsa_sha256),domainkeys(c=nofws)" in the sender map file, I could specify --dkim_method=relaxed --dkim_algorithm=rsa_sha256 --domainkeys_method=nofws in the main config file, and then simply specify "dkim,domainkeys" in the sender map file.&lt;/p&gt;
&lt;p&gt;Note: there is not currently an "algorithm" option. Since domainkeys only supports one algorithm, perhaps I can simply implement a dkim_algorithm option and not worry about making an "algorithm" option.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Thu, 30 Jul 2009 14:18:05 -0000</pubDate><guid>https://sourceforge.netdbcf30b98a7e540e40e86599d055fbf1a9a8ce30</guid></item><item><title>generate signature based on List-Id header</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/21/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Dear Jason,&lt;/p&gt;
&lt;p&gt;Thanks muchly for your help. I spent some more hours but could not&lt;br /&gt;
solve the issue.&lt;br /&gt;
BTW, I have a friend who is running some dozen of mailing-lists also,&lt;br /&gt;
so we both need this signing feature based on List-ID's domain with&lt;br /&gt;
both DKIM and Domainkeys.&lt;br /&gt;
We think this feature would benefit a lot of people running mailing&lt;br /&gt;
lists around the world. As long as you are very kind to provide the&lt;br /&gt;
software as opensource. We'd like to ask if you have time/interest to&lt;br /&gt;
make a new feature available in dkimproxy? For example add a&lt;br /&gt;
configuration parameter (--addon-header=list-id) that tell dkimproxy&lt;br /&gt;
to sign emails based on the domain specified in the addon-header&lt;br /&gt;
field.&lt;br /&gt;
We'll be very happy if we can show our gratitude by donating money or&lt;br /&gt;
resource to the project, show the links to dkimproxy in our websites&lt;br /&gt;
and recommend our friends (for example FreeBSD community) to use&lt;br /&gt;
dkimproxy.&lt;/p&gt;
&lt;p&gt;Please kindly let me know your opinion.&lt;/p&gt;
&lt;p&gt;--&lt;br /&gt;
With best regards,&lt;br /&gt;
Chinh&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Tue, 28 Jul 2009 13:39:01 -0000</pubDate><guid>https://sourceforge.netedfffe6376e5f6e1e5a80973af22562b0dd53903</guid></item><item><title>Provide instructions for Upgrading</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/20/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;To upgrade, all you need to do is download the new version, run ./configure with the same arguments as before, then make install,&lt;br /&gt;
then restart DKIMproxy.&lt;/p&gt;
&lt;p&gt;But this should probably be spelled out in the INSTALL file (or in a new UPGRADE file).&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Sun, 12 Jul 2009 12:11:38 -0000</pubDate><guid>https://sourceforge.net4e25fe3afba404e41dd8bdd76c614c99a6c36ee9</guid></item><item><title>More standard installation layout</title><link>https://sourceforge.net/p/dkimproxy/feature-requests/19/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Currently, installing with --prefix=/usr/local/dkimproxy is recommended since it puts some files in $prefix/lib which might clobber other files.&lt;br /&gt;
I want to change things so that --prefix=/usr/local can be the default,&lt;br /&gt;
and the library files will be stored in /usr/local/lib/dkimproxy or something like that.&lt;/p&gt;
&lt;p&gt;(This will make the man pages I'm working on show up at the right spot.)&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Long</dc:creator><pubDate>Thu, 30 Apr 2009 13:55:44 -0000</pubDate><guid>https://sourceforge.netb8fc6292765055aa795c88cd898bf3aaf26dd9dc</guid></item></channel></rss>