Java Reference
In-Depth Information
DKIM - Signature: v = 1 ;
a = rsa - sha256 ;
d = example . com ;
s = burke ;
c = simple / simple ;
h = Content - Type ;
x = 0023423111111 ;
bh = 2342322111 ;
b = M232234 =
While it's not that important to know the structure of the header, here's an explanation of
each parameter:
v
Protocol version. Always 1.
a
Algorithm used to hash and sign the message. RSA signing and SHA256 hashing is the
only supported algorithm at the moment by RESTEasy.
d
Domain of the signer. This is used to identify the signer as well as discover the public
key to use to verify the signature.
s
Selector of the domain. Also used to identify the signer and discover the public key.
c
Canonical algorithm. Only simple/simple is supported at the moment. Basically, this al-
lows you to transform the message body before calculating the hash.
h
Semicolon-delimited list of headers that are included in the signature calculation.
x
When the signature expires. This is a numeric long value of the time in seconds since
epoch. Allows the signer to control when a signed message's signature expires.
t
Timestamp of signature. Numeric long value of the time in seconds since epoch. Allows
the verifier to control when a signature expires.
bbh
Base 64-encoded hash of the message body.
Search WWH ::




Custom Search