We are receiving a couple of fraud message from yahoo.com each day.
These are genuine messages directly from yahoo, with their DK signature
valid according to Mail::DKIM, yet the dkim-milter 2.7.0 claims that
some of them have a broken signature:

  Authentication-Results: mail.ijs.si; domainkeys=hardfail (testing)
    [EMAIL PROTECTED]

The dkim-milter is compiled with DK verification support enabled.

It is a bit embarrassing to report them to yahoo as fraud and certified
by their valid signature, yet the Authentication-Results apparently
proving otherwise.

What these failed messages seem to have in common is they contain
some very long lines in body (like a 3500 characters line).
I know that RFC 2822 puts a limit at 1000 characters for a line
length, so garbage-in garbage-out principle applies, yet I don't
see a good reason why a milter could not process such longish lines.

Here is an example of such message:
  http://filebin.ca/suknsx/msg-14510-1.txt.gz
(compressed just in case, to make sure its integrity is preserved).
Again, this message passes DK validation by Mail::DKIM module.

Is this a know limitation of dkim-milter, or a bug?

  Mark

-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
dkim-milter-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dkim-milter-discuss

Reply via email to