You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@spamassassin.apache.org by Michael Scheidell <sc...@secnap.net> on 2007/07/30 01:18:56 UTC
SOLVED: Re: SA/DKIM will segv on forged DomainKeys sig
This version of Crypt-OpenSSL-RSA is needed:
>
> p5-Crypt-OpenSSL-RSA>=0.24
>
> this won't work:
> p5-Crypt-OpenSSL-RSA-0.23_1
>
> su vscan -c "spamassassin -t < sample.eml"
> [650] warn: Premature end of base64 data at /usr/local/lib/perl5/site_perl/5.8.8/Mail/DKIM/Algorithm/dk_rsa_sha1.pm line 86.
> [650] warn: Premature padding of base64 data at /usr/local/lib/perl5/site_perl/5.8.8/Mail/DKIM/Algorithm/dk_rsa_sha1.pm line 86.
> Segmentation fault
>
>
I will submit a patch to freebsd ports to include dependency for
p5-Mail-DKIM, and cc'd Jason Long (CPAN maintainer of Mail-DKIM).
if anyone wants a copy of the email with for broke DomainKeys, let me
know. (or see below for 'that line', yes, it as two CWS and a ; at end
of it!
I also have the SA 3.22 freebsd ports ready to test (and it has the
above minimum dependency), anyone needing the freebsd 3.2.2 SA port pkg
let me know.
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=s1024; d=yahoo.com;
h=Received:X-YMail-OSG:Message-ID:Reply-To:From:To:References:Subject:Date:MIME-Version:Content-Type:X-Priority:X-MSMail-Priority:X-Mailer:X-MimeOLE;
b=7e82t8HLAQ0qfIC5km5S508y4E7i95SO0lvW9PSA1Z15PuY223b5fHH1W4P9whTcIcS2S6K7ZM34Uc96rMowPL81M64g1wdmNPF4w47UC6l0S4A93rI13Ma8JK6Gw62ItYBgr6O5l
r2WRrw6M6V9XqMvXdw45uxAKTERTph61= ;
_________________________________________________________________________
This email has been scanned and certified safe by SpammerTrap(tm).
For Information please see http://www.spammertrap.com
_________________________________________________________________________