Skip to content
Philippe Lieser edited this page Nov 16, 2023 · 18 revisions

A description of the available DKIM Verifier options. A description of the account specific Options can be found here.

General

Verify DKIM signatures

If enabled the add-on verifies the DKIM signatures. This option does not affect the reading of the Authentication-Results header.

In the account specific options, this behavior can be changed for each account.

Option available since version 1.5.0.

Caching of the DKIM keys

Set whether DKIM keys should be cached. Available options:

  • Don't store DKIM keys
  • Store DKIM keys
  • Store DKIM keys and compare them with the current key

If storing is enabled the stored keys can be viewed by pressing the DKIM keys button. There keys can also be deleted or changed. To update the used DKIM key of the currently viewed e-mail select Update DKIM key in the DKIM drop-down menu in the e-mail header (although this should almost never be necessary).

Versions before 4.x stored the keys in the dkimKey.sqlite SQLite database in the profile directory.

Save result of the verification

If enabled the results of the verification is saved.

The saved result of the currently viewed e-mail can be updated by selecting Reverify DKIM signature in the DKIM drop-down menu in the e-mail header.

Read Authentication-Results header

If enabled the add-on first tries to read the DKIM, SPF and DMARC results from the Authentication-Results header instead of verifying the DKIM signature.

In the account specific options, this behavior can be changed for each account. It is also possible to only trust specific servers.

DKIM header with SPF and DMARC result

Option available since version 1.3.0 (prior to 1.4.0 in Advanced).

DNS

DNS specific options. More Information can be found in DNS Options.

Policy

Check if e-mail should be signed

Enable this if the add-on should try to determine based on sign rules whether an e-mail should be signed.

Use default rules

If enabled the default sign rules are used in addition to the ones created by the user.

Automatically add rules based on viewed DKIM signed e-mails

If this is enabled the add-on adds a sign rule for every viewed e-mail with a valid DKIM signature for which no sign rule yet exist.

Only if the From address is in the SDID

If this is enabled sign rules are only automatically added if the From address is in the SDID.

Option available since version 1.1.0.

Reach of automatically added sign rules

Slecte which addresses the automatically added sign rule should affect.

Available options (example for an e-mail from from@subdomain.example.com):

  • for From address effects only e-mails from from@subdomain.example.com
  • for subdomain effects all e-mails from subdomain.example.com
  • for base domain effects all e-mails from example.com

Option available since version 1.1.0.

Allow also subdomains of the SDIDs

If enabled, the SDID in the DKIM signature must not be exactly the same as the one specified in the sign rule, but can also be a subdomain.

Option available since version 1.2.0.

Treat wrong SDID as a warning instead of an error

Normally a SDID different from the one specified in the matched sign rule results in an invalid DKIM signature. Enable this it should be treated as a warning instead.

Use DMARC to heuristically determine if an e-mail should be signed

If this is enabled and no matching sign rule was found for an e-mail, the add-on tries to determine if the e-mail should be signed based on DMARC. As this uses DMARC in a non standard conform way the result may not always be right.

It works in the following way: If a valid DMARC entry is found for the domain or base domain of the From address of the e-mail the e-mail is marked as should be signed. extensions.dkim_verifier.policy.DMARC.shouldBeSigned.neededPolicy can be set to none, quarantine or reject. If set to quarantine the e-mail is only marked as should be signed if the domain specifies in DMARC that invalid e-mails should be flaged as suspicious or be rejected, with reject only if they should be rejected. With the default none the e-mail is always marked as should be signed if a DMARC entry was found.

Option available since version 1.1.0.

"Signers rules" and "Default signers rules" button

By pressing the Signers rules or Default signers rules button the user specific and the default sign rules can be viewed. At the Signers rules button the user specific sign rules can also be added, modified or deleted.

Warn about unsigned headers that are recommended to be signed

This options warns about headers that are unsigned but are either shown directly, affect how the body of the e-mail is shown or affect how Thunderbird behaves.

  • relaxed mode: Will try to avoid showing warnings and only require the most important headers to be signed.
  • recommended mode: Enforce signing of relevant headers without showing to many warnings.
  • strict mode: Enforce signing of all relevant headers.

Note that besides the From header the DKIM standard itself does not require any other header to be signed.

Option available since version 5.1.0.

Display

With this options it can be specified how the result for the DKIM signature should be shown. More Information can be found in Display Options.

Advanced

Enable debugging

If enabled not only errors but debugging information too is shown in the Error Console. Details about the available debug options can be found here.

Show detailed error reasons

Show more detailed error reasons for why a signature verification failed. This can be very technical, so a deeper knowledge of the DKIM standard is required to understand them.

Option available since version 1.4.0.

Still verify the signature, if a domain is only testing DKIM

Normally an e-mail signed by a domain which is only testing DKIM is treated as not being signed. Only if this is enabled will the DKIM signature be verified and the result shown. A warning will be added if the domain is testing DKIM.

Indicate successful DNSSEC validation with a lock after the SDID

If the DKIM key was successfully validated by DNSSEC, a Lock is shown after the SDID. This only works if the selected DNS resolver supports DNSSEC.

Image of Lock after the SDID

Option available since version 1.6.0.

Reading the Authentication-Results header replaces the add-ons verification

If disabled, the result of the Authentication-Results header is shown in addition to the DKIM verification result of the add-on. Note that the reading of the Authentication-Results must be enabled separately.

Image of add-ons result and Authentication-Results header shown alongside

Option available since version 1.6.0.

Try to read non RFC compliant Authentication-Results header

If enabled, the following violations of the RFC 7601 are ignored while parsing the Authentication-Results header:

  • trailing ; at the end of the header
  • / in the header.b (or another) property, even if it is not in a quoted-string
  • : in the header.b (or another) property, even if it is not in a quoted-string (since version 5.4.0)

Option available since version 2.0.0.

Treat ill-formed AUID tag as

Specify how an ill-formed AUID tag should be treated. According to the RFC 6376 this is an error. The default is warning because this is only a violation with small effect and some legitimate DKIM signature are violating this.

Treat ill-formed selector tag as

Specify how an ill-formed but still usable selector tag should be treated. According to the RFC 6376 this is an error. The default is warning because this is only a violation with small effect and some legitimate DKIM signature are violating this.

Option available since version 1.3.0.

Treat DKIM key not signed by DNSSEC as

Specify how an DKIM key not not signed by DNSSEC should be treated. This only works if the selected DNS resolver supports DNSSEC.

If the DKIM keys are stored they can be set to secure manually in the options or by selecting Mark DKIM key as secure in the DKIM drop-down menu in the e-mail header.

Treat rsa-sha1 sign algorithm as

Specify how the usage of the rsa-sha1 algorithm for signing is treated. As SHA-1 is no longer considered secure, usage of rsa-sha1 in DKIM was forbidden by the RFC 8301.

The default is warning only because rsa-sha1 seems to be still widely used, and not because this is not considered a security risk.

Option available since version 2.1.0.

Treat weak RSA keys (<2048 bits) as

Specify how the usage of an RSA key with less than 2048 bits for signing is treated. According to RFC 8301, keys should be at least 2048 bits.

Keys with less than 1024 bits will always be treated as an error.

The default is nothing only because 1024 bit keys seems to be still widely used, and not because this key size is still recommended to use.

Option available since version 2.2.0/3.1.0.