On 28 Apr 2019, at 21:51, John Levine via mailop wrote:

Just to be clear, we all understand that these funky DKIM signatures
have nothing to do with the reason that Google is rejecting mailop
messages, right?

I think so...

I mean, I believe that you are correct in that a SPF record for the IPv6 output would fix the problem without anyone making DKIM changes.

HOWEVER: if I understand Simon's description of the rejection events correctly, the trigger was specifically a message with a broken DKIM signature which had not had its From munged (because the DMARC record had p=none,) and that changing Mailman to munge ALL From headers fixed the problem. This would imply that Google is doing something very dubious in looking for "authentication."




R's,
John


On 4/28/19 12:38 PM, Chris Adams via mailop wrote:
So should mailing lists reject such messages?

No.  Absolutely not.

The DKIM specification states that a failed DKIM-Signature validation
should be treated like a lack of a DKIM-Signature.

I think the list MTA should accept the messages with DKIM oversigned
headers, remove said DKIM-Signature headers, pass the DKIM-less message
into the mailing list for normal processing.

Ideally, the list MTA would add new DKIM-Signature header as messages
went outbound.

If they're going to add headers and the signing effectively says
"don't", why should the list accept the message?

The signing doesn't say "don't". The signing is a way to detect if the message has been modified in transit. IMHO DKIM is a trip wire of sorts
to detect modification, nothing more, nothing less.  Was the message
modified, yes or no.


_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to