Zitat von Benny Pedersen <me_at_junc.eu>:
> Benny Pedersen skrev den 2013-12-13 03:14:
> it failed
>
> Authentication-Results: duggi.junc.org/0F0B425C04F; dmarc=fail
> header.from=junc.eu
> Authentication-Results: duggi.junc.org; dkim=pass reason="1024-bit key"
> header.d=opendkim.org header.i=opendkim-users-bounce_at_lists.opendkim.org
> header.b=TyQEuq1S; dkim-atps=neutral
not here ...
Authentication-Results: taro; dmarc=pass header.from=junc.eu
Authentication-Results: taro;
dkim=pass (1024-bit key; unprotected) header.d=opendkim.org
header.i=opendkim-users-bounce_at_lists.opendkim.org header.b=AaKTUpQK;
dkim=pass (1024-bit key; secure) header.d=junc.eu header.i=_at_junc.eu
header.b=bC/dR/tb
Authentication-Results: taro; spf=none
smtp.mailfrom=<opendkim-users-bounce_at_lists.opendkim.org>
smtp.helo=mx.ipv6.elandsys.com
Received: from lists.opendkim.org (IDENT:nobody_at_localhost [127.0.0.1])
by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id rBD2Ye4T002733;
Thu, 12 Dec 2013 18:34:41 -0800 (PST)
I have "AddAllSignatureResults yes" in opendkim.conf
That let opendkim insert an dkim=pass for junc.eu and *this* is needed
to dmarc=pass for junc.eu as your message via listservers
obviously will not pass spf.
Again: I suggest to switch default in next release
see
http://lists.opendkim.org/archive/opendkim/dev/2013/06/1877.html
Andreas
Received on Fri Dec 13 2013 - 06:52:23 PST