Java Reference
In-Depth Information
DKIM
-
Signature:
v
=
1
;
a
=
rsa
-
sha256
;
d
=
example
.
com
;
s
=
burke
;
c
=
simple
/
simple
;
h
=
Content
-
Type
;
x
=
0023423111111
;
bh
=
2342322111
;
b
=
M232234
=
While it's not
that
important to know the structure of the header, here's an explanation of
each parameter:
v
Protocol version. Always 1.
a
Algorithm used to hash and sign the message. RSA signing and SHA256 hashing is the
only supported algorithm at the moment by RESTEasy.
d
Domain of the signer. This is used to identify the signer as well as discover the public
key to use to verify the signature.
s
Selector of the domain. Also used to identify the signer and discover the public key.
c
Canonical algorithm. Only simple/simple is supported at the moment. Basically, this al-
lows you to transform the message body before calculating the hash.
h
Semicolon-delimited list of headers that are included in the signature calculation.
x
When the signature expires. This is a numeric long value of the time in seconds since
epoch. Allows the signer to control when a signed message's signature expires.
t
Timestamp of signature. Numeric long value of the time in seconds since epoch. Allows
the verifier to control when a signature expires.
bbh
Base 64-encoded hash of the message body.