You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@spamassassin.apache.org by Michael Scheidell <sc...@secnap.net> on 2007/07/30 01:18:56 UTC

SOLVED: Re: SA/DKIM will segv on forged DomainKeys sig

This version of Crypt-OpenSSL-RSA is needed:
>
> p5-Crypt-OpenSSL-RSA>=0.24
>
> this won't work:
> p5-Crypt-OpenSSL-RSA-0.23_1
>   

> su vscan -c "spamassassin -t < sample.eml"
>  [650] warn: Premature end of base64 data at /usr/local/lib/perl5/site_perl/5.8.8/Mail/DKIM/Algorithm/dk_rsa_sha1.pm line 86.
>  [650] warn: Premature padding of base64 data at /usr/local/lib/perl5/site_perl/5.8.8/Mail/DKIM/Algorithm/dk_rsa_sha1.pm line 86.
> Segmentation fault
>
>   
I will submit a patch to freebsd ports to include dependency for 
p5-Mail-DKIM, and cc'd Jason Long (CPAN maintainer of Mail-DKIM).
if anyone wants a copy of the email with for broke DomainKeys, let me 
know. (or see below for 'that line', yes, it as two CWS and a ; at end 
of it!

I also have the SA 3.22 freebsd ports ready to test (and it has the 
above minimum dependency), anyone needing the freebsd 3.2.2 SA port pkg 
let me know.

DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
  s=s1024; d=yahoo.com;
 h=Received:X-YMail-OSG:Message-ID:Reply-To:From:To:References:Subject:Date:MIME-Version:Content-Type:X-Priority:X-MSMail-Priority:X-Mailer:X-MimeOLE;          
b=7e82t8HLAQ0qfIC5km5S508y4E7i95SO0lvW9PSA1Z15PuY223b5fHH1W4P9whTcIcS2S6K7ZM34Uc96rMowPL81M64g1wdmNPF4w47UC6l0S4A93rI13Ma8JK6Gw62ItYBgr6O5l
r2WRrw6M6V9XqMvXdw45uxAKTERTph61=  ;





_________________________________________________________________________
This email has been scanned and certified safe by SpammerTrap(tm). 
For Information please see http://www.spammertrap.com
_________________________________________________________________________