dkim signature fails to verify
We are implementing a High Assurance Domain project at NIST, which entails deploying SPF, DKIM and DMARC. I tried Greg Hewgill's original dkim.py, it failed to verify and I noticed that the dkimpy update has been created. I'm using that.
I'm extending PpyMilter and connecting it to Sendmail, to do the signing and the verification.
Applying the dkimpy sign at the Sender end and the dkimpy verify at the Receiver end, I get DKIM Signature fails to verify.
The Sender and Receiver bodyhashes are the same so I figure it's in the Header hashing.
So I tried tossing out one header at a time from 'include_headers'. When I get down to 'From' and 'Date', it still generates different signatures and fails to verify.
If I throw out all but 'From' Python raises an exception saying 'FROM has to be signed'.
It's only a short From line so I can't see that folding makes a difference.
Are there any other known bugs or asymmetries in dkim signing and/or verifying?
Cheers,
Stephen Nightingale, NIST.
Question information
- Language:
- English Edit question
- Status:
- Answered
- For:
- dkimpy Edit question
- Assignee:
- No assignee Edit question
- Last query:
- Last reply:
Can you help with this problem?
Provide an answer of your own, or ask Stephen Nightingale for more information if necessary.