Cisco Cisco Email Security Appliance X1050 Guía Del Usuario
22-18
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
Chapter 22 Email Authentication
How to Verify Incoming Messages Using DKIM
Managing DKIM Verification Profiles
A DKIM verification profile is a list of parameters that the Email Security appliance’s mail flow policies
use for verifying DKIM signatures. For example, you can create two verification profiles, one that allows
30 seconds before a query times out and a second that allows only 3 seconds before a query times out.
You can assign the second verification profile to the Throttled mail flow policy to prevent connection
starvation in case of a DDoS. A verification profile consists of the following information:
use for verifying DKIM signatures. For example, you can create two verification profiles, one that allows
30 seconds before a query times out and a second that allows only 3 seconds before a query times out.
You can assign the second verification profile to the Throttled mail flow policy to prevent connection
starvation in case of a DDoS. A verification profile consists of the following information:
•
A name for the verification profile.
•
The smallest and largest acceptable public key size. The default key sizes are 512 and 2048,
respectively.
respectively.
•
The maximum number of signatures in the message to verify. If a message has more signatures than
the maximum amount you defined, the appliance skips verification of the remaining signatures and
continues to process the message. The default is 5 signatures.
the maximum amount you defined, the appliance skips verification of the remaining signatures and
continues to process the message. The default is 5 signatures.
•
The maximum allowed difference in time (in seconds) between the sender’s system time and
verifier’s. For example, if the message signature expires at 05:00:00 and the verifier’s system time
is 05:00:30, the message signature is still valid if the allowed difference in time is 60 seconds but it
is invalid if the allowed difference is 10 seconds. The default is 60 seconds.
verifier’s. For example, if the message signature expires at 05:00:00 and the verifier’s system time
is 05:00:30, the message signature is still valid if the allowed difference in time is 60 seconds but it
is invalid if the allowed difference is 10 seconds. The default is 60 seconds.
•
An option whether to use a body length parameter.
•
The SMTP action to take in case of a temporary failure.
•
The SMTP action to take in case of a permanent failure.
You can search through all of your existing verification profiles by the profile name.
You can export your DKIM verification profiles as a text file in your appliance’s configure directory.
When you export the verification profiles, all of the profiles existing on the appliance are put into a single
text file. See
When you export the verification profiles, all of the profiles existing on the appliance are put into a single
text file. See
You can import DKIM verification profiles that you previously exported. Importing DKIM verification
profiles causes all of the current DKIM verification profiles on the machine to be replaced. See
profiles causes all of the current DKIM verification profiles on the machine to be replaced. See
for more information.
Related Topics
•
•
•
•
•
Creating a DKIM Verification Profile
Procedure
Step 1
Click Mail Policies > Verification Profiles.
Step 2
Click Add Profile.
Step 3
Enter the name of the profile.
Step 4
Select the minimum key size you want the appliance to accept for signing keys.