This bug was fixed in the package dkimpy - 0.5.3-0ubuntu0.0.1

---------------
dkimpy (0.5.3-0ubuntu0.0.1) precise-proposed; urgency=medium

  * Urgency medium for multiple RC bug fixes
  * New upstream release (LP: #1072726):
  * Fix header unfolding and body hash calculation errors that cause
    correct DKIM signatures to fail to verify in many cases
    (Closes: #691663)
  * Add minimum key length requirement to prevent validation of signatures
    generated with insecure keys (Closes: #691662)

dkimpy (0.5.2-1) unstable; urgency=low

  * New upstream release
    - Change canonicalization defaults to work around issues with different
      verification implementations <https://launchpad.net/bugs/939128>
    - Fully fold DKIM-Signature on sign, and ignore FWS in b= value on verify
    - Fix hashing problem while signing using sha1
  * Add alternate depends on python3-dnspython for python3-dkim since it will
    enter the archive shortly
  * Install tests directory, including test data
  * Drop obsolete breaks on Lenny dkimproxy
  * Fix debian watch to work with package rename and  Launchpad changes
  * Bump standards version to 3.9.3 without further change
 -- Scott Kitterman <[email protected]>   Mon, 29 Oct 2012 14:31:35 +0100

** Changed in: dkimpy (Ubuntu Precise)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1072726

Title:
  Security and DKIM signature verification failure issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dkimpy/+bug/1072726/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to