-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Details about verifed DKIM #160
Comments
The signing algorithm can be seen by looking at the source of the e-mail (The There is currently no easy way to see the key size (you need to use external tools). But the add-on warns if the key size is to low (currently 1024, in 2.1.0 it will be 2048). I may make it easier in the feature to see detail, but currently I see my priority for adding something like this as low. See also the related #143. |
Yes, I know how to examine the details, but add some info would be nice and it's pretty easy: |
Please be careful with key size, by itself its not a good marker of security. ECC is part of the 2017 DKIM draft[1] and ECC key lengths are way shorter than RSA keys. Algo dependent, but 256 ECC keys are roughly equivalent to 3072 bit RSA key length [1] https://tools.ietf.org/html/draft-ietf-dcrup-dkim-ecc-01#page-3 |
I have a first working draft for this. Please let me know if anyone is interested in trying it out and giving early feedback on it. |
Thank you for working on this - |
I can try it - let me know what to do. |
@xsistema A preview on how it currently looks: In particular I'm interested in:
|
Can not install - TB shows that it is not compatible with TB Beta 126.0 version.. |
Version marked to be compatible with up to TB 127: dkim_verifier@pl-2024-05-09-9e54739.zip |
New feature is excellent - main information of DKIM signature is shown. About UI - simple, and as should be - works without noticeable problems. But one thing - on some emails DKIM "Signed headers" (and some other fields) missing - only shows when button "Reverify DKIM signature" is pressed. Perhaps it should be fixed (but not critical). |
@xsistema Sounds, like DKIM verifier displays a cached result (which doesn't contain the needed data) @lieser I like the idea much and will try to backport it. I think:
|
Thank you both for the feedback.
Like @dodmi already mentioned this is currently the expected behavior if a result saved with an older version is viewed. The old result is simply missing the information.
Could you maybe elaborate on why you think it should be on the top?
I know the algorithm was probably the information most requested to see. But to me the algorithm is more of a technical detail than the SDID, AUID or the result.
The idea here was to make it possible to distinguish between the signature not having an expiration date, and the information not being available, e.g. because an older saved result is shown that did not save the expiration date or because of an parsing error.
Making all signatures visible for the users that are interested in it was one of the main reasons for this feature. A few already thought the add-on is not handling multiple signatures at all, because only one is visible. |
Well, in my point of view, the most important information of a signature, is if it's valid or not. And I'd place this information on top.
Point for you. All signatures should be visible. |
What about DNSSec information? Is it already included, but missing in your screenshot? I think it maybe be interesting. Also, while you're arguing against adding signature key length, I think, it may be valuable information, as it's important for assessing the quality of a RSA signature. |
I will probably move the result to the top, and the time also aboth the algorithm (so the order as in your screenshots). And I think I like the
It is not explicitly mentioned, but should show up similar to the normal view.
My point was more about the algorithm in general, not the key length in specific. And I still think that for most the important part should only be if it is secure, not what it is specific.
Did you check how that works with long domains? Doesn't look bad in your examples, but unsure if saving one line is worth the less structured view and longer lines. Maybe @xsistema could also say what he likes more.
In my draft I just printed the time without much considering the formatting, but yeah the long version is maybe a little overkill here.
Would have done it similar. And only show the key length for RSA. @dodmi Note that it would be OK for me if you make the advanced view for 2.x look more how you like it the most, instead of it needing to be a 1:1 copy. But you should know that I still value your input on how it will look in 5.x. So please keep the feedback coming, even if you decide to change some things for 2.x. |
@lieser: I'm happy to provide my input - I guess, I'll have to upgrade some time ;) I've implemented the following GUI options: If With Here for Google Groups - many signed headers and an expiration time: Here a signature without timestamp: Here, signature key length is not available, since an error was thrown, before the key was fetched: |
I tested this now myself for a while and although there are still some smaller issues I think it is already usable. Here is an example, with some of @dodmi suggested improvements included: For completeness and so that I don't forget it here are some possible open improvements/fixes:
For anything that someone wants to see implemented (regardless if included in the above list or not) and that is not so important what you think it must be changed in this first release, please create a new issue for it. |
Is it possible to see the details of verified DKIM? For example key size, algorithm? It would be nice to have such a feature in menu.
The text was updated successfully, but these errors were encountered: