Rolf E. Sonneveld wrote:
it seems to work OK, thanks. One suggestion for improvement: the
auto-reply message itself is not DKIM signed. I believe one or more of
the other reflectors do sign their response with DKIM.
/rolf
Ok thanks for noting this. Can you send me the headers that you
received so I can check the trace lines?
This was checked and confirmed to work yesterday (Tue Sep 21). Here is
test response as received from a customer beta site
(megabytecoffee.com). It has the d=isdg.net signature.
-----------------
Received: by megabytecoffee.com (Wildcat! SMTP Router v6.3.453.4)
for santronics(_at_)megabytecoffee(_dot_)com; Tue, 21 Sep 2010
12:08:06 -0500
Received: from mail.winserver.com ([208.247.131.9])
by megabytecoffee.com (Wildcat! SMTP v6.3.453.4) with ESMTP
id 13643207; Tue, 21 Sep 2010 12:08:04 -0500
DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=isdg.net; s=tms1;
t=1285088919; h=Date:From:Subject:Message-Id:Organization:To:
List-ID; bh=vFzcWTPbSfvt3XdEdL95t4xyHaw=; b=F3r8MZ56AGeAUvExAhwA
nizKEaYyEOQLtnRQEBnywUBD/R+BcVRgFPA2dBUyBxqR9P0/89cgDCUFB4A9H9Qg
9cmuRUfvUwXRp7jAvC+MW35kY9n/2E6Piu6A9+157BL1kQFdE5Q66hQ1p1UKRswU
e4zthS5Wl5uLOESI87rXmMk=
Received: by winserver.com (wcMail)
id 18580W Tue, 21 Sep 2010 13:08:33 -0400
Date: Tue, 21 Sep 2010 13:08:31 -0400
From: mailer-daemon(_at_)isdg(_dot_)net
SUBJECT: Your DKIM Verify Auto Response: 20100921 13:08
Message-Id: <1285088911(_at_)winserver(_dot_)com>
Organization: Santronics Software, Inc.
To: santronics(_at_)megabytecoffee(_dot_)com
X-Mailer: wcMail v6.3.453.4
X-Wildcat-Message-Id: <1285088911(_dot_)87(_dot_)0(_at_)winserver(_dot_)com>
X-VStream-Spam-Level: 1%
X-VStream-Engine: Content Based Antispam
X-Spam-Level: *
X-Spam-Flag: NO
This is an auto-response. Do not reply to this message.
*************** WCDKIM VERIFIER REPORT ********************
Arrival Date: 20100921 13:08
SMTP.From: <santronics(_at_)megabytecoffee(_dot_)com>
SMTP.To: <dkim-autorespond(_at_)isdg(_dot_)net>
Mail.From: santronics(_at_)megabytecoffee(_dot_)com
Mail.Sender:
Mail.List-Id:
----- Original Message Headers w/ Receiver SMTP Traces ------
Received: from megabytecoffee.com ([68.184.189.238])
by winserver.com (Wildcat! SMTP v6.3.453.4) with ESMTP
id 230668062; Tue, 21 Sep 2010 13:08:28 -0400
Received-SPF: pass (winserver.com: domain of
santronics(_at_)megabytecoffee(_dot_)com
designates 68.184.189.238 as permitted sender)
receiver=winserver.com;
client-ip=68.184.189.238;
envelope-from=santronics(_at_)megabytecoffee(_dot_)com;
helo=megabytecoffee.com;
DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=megabytecoffee.com;
s=tms1; t=1285088854; h=Date:From:Subject:Message-Id:
Organization:To:List-ID; bh=nofxpXrp52kmnjqfkfXhqfwI1SE=; b=Al4t
jQFRakEcfPLKiGEJQi4JfV3JRRBGegpCb4x2rfWlVfJIyh2VJHMGUw6jZO8Vd1QB
1tlFbyVbmHnqXYiKIDrM1rKAr5gV09kulGTH7jqHGxPS4j/nALFn6xZue+VQ3jM9
E/P9DawtE/yDHKksDYbfPH76XSU+SKa0yCT0A9w=
Received: by megabytecoffee.com (wcMail)
id 35026W Tue, 21 Sep 2010 12:07:22 -0500
Date: Tue, 21 Sep 2010 12:07:21 -0500
From: santronics(_at_)megabytecoffee(_dot_)com
Subject: test from mbc
Message-Id: <1285088841(_at_)megabytecoffee(_dot_)com>
Organization: MegaByteCoffee PC Repair services.
To: dkim-autorespond(_at_)isdg(_dot_)net
X-Mailer: wcMail v6.3.453.4
X-Wildcat-Message-Id: <1285088841(_dot_)0(_dot_)0(_at_)megabytecoffee(_dot_)com>
X-Attachment: WCDKIM-Drawing2.png
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===13600978WILDCAT==="
-------------- Verification Flags --------------
Subject Required : No
Check Granularity: Yes
Check ADSP Policy: Yes
Honor Body Length: Yes
-------------- Verification Results --------------
Total Signatures: 1
ADSP Policy: none
Verify Results: 0 SUCCESS
Signature #1 VALID
- Author Domain: megabytecoffee.com
- Signer Domain: megabytecoffee.com
- Selector: tms1
- Identity: megabytecoffee.com
- Hash Method: SHA1
- Signature Type: 1st Party Signature [2]
- Signature Protection: None
DKIM related documents:
[1] DomainKeys Identified Mail (DKIM) Signatures
http://tools.ietf.org/html/rfc4871
[2] Requirements for a DKIM Signing Practices Protocol
http://tools.ietf.org/html/rfc5016
[3] DKIM Author Domain Signing Practices (ADSP)
http://tools.ietf.org/html/rfc5617
[4] Analysis of Threats Motivating DKIM
http://tools.ietf.org/html/rfc4686
---------------
--
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com
_______________________________________________
dkim-ops mailing list
dkim-ops(_at_)mipassoc(_dot_)org
http://mipassoc.org/mailman/listinfo/dkim-ops