On Tue, Mar 24, 2009 at 7:39 AM, Robert Barty <[email protected]> wrote:
>
> In previous tests I found it did not matter how long I waited before trying
> again, POP mail  was verified and not signed. I sent many, many test emails
> and the longest time I waited 48hrs and it still refused to sign. Assigning
> new IP addresses and waiting also failed to sign mail even though  the IP
> appeared  in  the popauth.db.

These are wild guesses, don't be surprised if I'm totally in the wrong
direction.

Does the client which is writing the popauth.db write directly to the
file?  Does it make a copy, modify the copy, delete the original and
then rename the copy to the original? (check if the inode changes).
Does the client change the ownership or permissions of the file?  Is
the client chrooted? (meaning, is the client writing to the same file
as dkim-milter is reading)

-- 
Regards...      Todd
All truth passes through three stages. First, it is ridiculed. Second,
it is violently opposed. Third, it is accepted as being self-evident.

------------------------------------------------------------------------------
Apps built with the Adobe(R) Flex(R) framework and Flex Builder(TM) are
powering Web 2.0 with engaging, cross-platform capabilities. Quickly and
easily build your RIAs with Flex Builder, the Eclipse(TM)based development
software that enables intelligent coding and step-through debugging.
Download the free 60 day trial. http://p.sf.net/sfu/www-adobe-com
_______________________________________________
dkim-milter-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dkim-milter-discuss

Reply via email to