On 10/05/2014 08:47 PM, A. Schulze wrote:
>> Do you have a so-called security appliance in the path? Many have
>> a history of tampering with email.
> 
>> Do you have other anti-spam software in the path that modifies
>> mail headers such as X-Spam:?
> 
> To be complete: there is an easy way to invalidate DKIM-Signatures:
> don't announce SMTP extension 8BITMIME ...
> That way the sender must recode this destroy the signature. Most MTA
> do that recode just before transmission. So it's likely to occur /after/
> signing the message.

That's why email should be downgraded to 7 bit before creating the
DKIM-Signature. From http://www.ietf.org/rfc/rfc4871.txt:

5.3.  Normalize the Message to Prevent Transport Conversions

   Some messages, particularly those using 8-bit characters, are subject
   to modification during transit, notably conversion to 7-bit form.
   Such conversions will break DKIM signatures.  In order to minimize
   the chances of such breakage, signers SHOULD convert the message to a
   suitable MIME content transfer encoding such as quoted-printable or
   base64 as described in MIME Part One [RFC2045] before signing.

Kind regards,

Martijn Brinkers

-- 
CipherMail email encryption

Open source email encryption gateway with support for S/MIME, OpenPGP
and PDF messaging.

http://www.ciphermail.com

Twitter: http://twitter.com/CipherMail

Reply via email to