Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1140
 
19-16
Cisco AsyncOS 8.5.5 for Email Security User Guide
 
Chapter 19      Email Authentication
  How to Verify Incoming Messages Using DKIM
header.from=From:user123@example.com; dkim=permfail (body hash did not verify)
Note
Current DKIM verification stops at the first valid signature. It is not possible to verify using the last 
signature encountered. This functionality may be available in a later release.
Managing DKIM Verification Profiles
A DKIM verification profile is a list of parameters that the Email Security appliance’s mail flow policies 
use for verifying DKIM signatures. For example, you can create two verification profiles, one that allows 
30 seconds before a query times out and a second that allows only 3 seconds before a query times out. 
You can assign the second verification profile to the Throttled mail flow policy to prevent connection 
starvation in case of a DDoS. A verification profile consists of the following information:
A name for the verification profile.
The smallest and largest acceptable public key size. The default key sizes are 512 and 2048, 
respectively.
The maximum number of signatures in the message to verify. If a message has more signatures than 
the maximum amount you defined, the appliance skips verification of the remaining signatures and 
continues to process the message. The default is 5 signatures.
The maximum allowed difference in time (in seconds) between the sender’s system time and 
verifier’s. For example, if the message signature expires at 05:00:00 and the verifier’s system time 
is 05:00:30, the message signature is still valid if the allowed difference in time is 60 seconds but it 
is invalid if the allowed difference is 10 seconds. The default is 60 seconds.
An option whether to use a body length parameter.
The SMTP action to take in case of a temporary failure.
The SMTP action to take in case of a permanent failure.
You can search through all of your existing verification profiles by the profile name.
You can export your DKIM verification profiles as a text file in your appliance’s configure directory. 
When you export the verification profiles, all of the profiles existing on the appliance are put into a single 
text file. See 
You can import DKIM verification profiles that you previously exported. Importing DKIM verification 
profiles causes all of the current DKIM verification profiles on the machine to be replaced. See 
 for more information.
Creating a DKIM Verification Profile
Procedure 
Step 1
Click Mail Policies > Verification Profiles.
Step 2
Click Add Profile
Step 3
Enter the name of the profile.
Step 4
Select the minimum key size you want the appliance to accept for signing keys.