On Tue, Mar 24, 2009 at 7:39 AM, Robert Barty <[email protected]> wrote: > > In previous tests I found it did not matter how long I waited before trying > again, POP mail was verified and not signed. I sent many, many test emails > and the longest time I waited 48hrs and it still refused to sign. Assigning > new IP addresses and waiting also failed to sign mail even though the IP > appeared in the popauth.db.
These are wild guesses, don't be surprised if I'm totally in the wrong direction. Does the client which is writing the popauth.db write directly to the file? Does it make a copy, modify the copy, delete the original and then rename the copy to the original? (check if the inode changes). Does the client change the ownership or permissions of the file? Is the client chrooted? (meaning, is the client writing to the same file as dkim-milter is reading) -- Regards... Todd All truth passes through three stages. First, it is ridiculed. Second, it is violently opposed. Third, it is accepted as being self-evident. ------------------------------------------------------------------------------ Apps built with the Adobe(R) Flex(R) framework and Flex Builder(TM) are powering Web 2.0 with engaging, cross-platform capabilities. Quickly and easily build your RIAs with Flex Builder, the Eclipse(TM)based development software that enables intelligent coding and step-through debugging. Download the free 60 day trial. http://p.sf.net/sfu/www-adobe-com _______________________________________________ dkim-milter-discuss mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/dkim-milter-discuss
