We are receiving a couple of fraud message from yahoo.com each day.
These are genuine messages directly from yahoo, with their DK signature
valid according to Mail::DKIM, yet the dkim-milter 2.7.0 claims that
some of them have a broken signature:
Authentication-Results: mail.ijs.si; domainkeys=hardfail (testing)
[EMAIL PROTECTED]
The dkim-milter is compiled with DK verification support enabled.
It is a bit embarrassing to report them to yahoo as fraud and certified
by their valid signature, yet the Authentication-Results apparently
proving otherwise.
What these failed messages seem to have in common is they contain
some very long lines in body (like a 3500 characters line).
I know that RFC 2822 puts a limit at 1000 characters for a line
length, so garbage-in garbage-out principle applies, yet I don't
see a good reason why a milter could not process such longish lines.
Here is an example of such message:
http://filebin.ca/suknsx/msg-14510-1.txt.gz
(compressed just in case, to make sure its integrity is preserved).
Again, this message passes DK validation by Mail::DKIM module.
Is this a know limitation of dkim-milter, or a bug?
Mark
-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
dkim-milter-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dkim-milter-discuss