On Monday, November 26, 2018 08:24:29 AM Alice Wonder wrote: > On 11/26/2018 07:46 AM, Viktor Dukhovni wrote: > >> On Nov 26, 2018, at 8:44 AM, Alice Wonder <al...@domblogger.net> wrote: > >> > >> I realize it would mean mail sent by the host itself via sendmail command > >> is not DKIM signed but I'm not really worried about that. > >> > >> It appears that when e-mail is sent from a user to a mail list that is > >> set up in a way to break DKIM (as many are), the mail from the list to > >> the user that comes in via the MX on port 25 then gets signed again even > >> though it was technically sent by the list and not the user. > >> > >> That itself probably isn't bad but I still don't like the idea of DKIM > >> signing happening on mail that comes in on port 25 even if the From: > >> header matches.> > > With DKIM, you typically arrange to *verify* email that comes in on port > > 25, and sign email that originates locally or comes in on 587. > > > > On dedicated relays whose port 25 traffic is outbound, you'd also sign > > port > > 25 traffic. > > > > The purpose of the "-o milter_macro_daemon_name=ORIGINATING" in the > > master.cf submission service (commented out by default) is to inform the > > milter that mail arriving on that port is outbound. > > Okay I see that and will uncomment. Thank you. > > I'll have to look again at the OpenDKIM conf/documentation to see how to > make sure it only signs with that flag as it seems to be signing > anything where the From: matches the Domain = pattern regardless of > originating or incoming now.
See MacroList in opendkim.conf (5) [1]. Scott K [1] http://www.opendkim.org/opendkim.conf.5.html