> On 15 Feb 2021, at 22:29, Vsevolod Stakhov via mailop <mailop@mailop.org> 
> wrote:
> On 15/02/2021 21:02, John Levine via mailop wrote:
>> In article <20210215085929.76srgtpbaqbms...@sys4.de> you write:
>>> Greetings,
>>> 
>>> is anyone using ed22519 for DKIM signatures yet and what do you see? Any
>>> interop problems?
>> 
>> Aside from the fact that approximately nobody can validate them yet, they're 
>> fine.
>> 
>> So long as you don't try to use the same selector you use with RSA signatures
>> they shouldn't cause any problems.
> 
> Well, Rspamd can validate them, but I'd suggest to use dual signatures
> for now (RSA + ed25519) when signing - it is also supported by Rspamd
> dkim_signing module, even for the keys rotation scenario.

Halon MTA (libdkim++) does support them as well. For about two years we've been 
collecting DKIM validation statistics for inbound traffic to our own company 
domains (approx 30M messages in total). We've not seen any differences in 
failed signatures depending on algorithms used.

 rsa-sha256                                     88.63%
 rsa-sha1                                               11.31%
 rsa-sha1 + rsa-sha256                  0.05%
 rsa-sha256 + ed25519-sha256    0.01%
 ed25519-sha256                         -
 rsa-sha1 + ed25519-sha256              -
 rsa-sha1 + rsa-sha256 + ed25519-sha256 -
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to