On 2022-01-25 20:26, Dan Mahoney wrote:
Sorry for the noise, attempting to validate a DKIM issue

Authentication-Results: lists.isc.org;
dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=isc.org header.i=@isc.org header.b=E7VfrLLS

unprotected means opendkim would like to see dnssec in verify :=)

basicly its possible forged dns here

i noted i get spf-helo-pass, spf-pass, dkim-pass, dmarc-pass before mailman screwed it all up in return, when dmarc policy is not reject, why is chaning from: header still done ?

mailman is worst case of fixing break of dkim ever writed, route to solve is

before mailman see any massage, make the ARC-seal, and ARC-sign, later when mailman comes to breaking dkim it does not matter becourse dkim from the origin poster can still be untrusted or trusted in opendmarc when opendmarc verify arc chains, still have to see spamassassin 4 here, so far only rspamd verifi it all, but there is perl software that does aswell

hope this can close this maillist breaks dkim, its not correct, i bet postfix maillist and dovecot does not
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to