similar to: Bug#478334: logcheck doesn't know about dkim-filter

Displaying 20 results from an estimated 300 matches similar to: "Bug#478334: logcheck doesn't know about dkim-filter"

2010 May 04
1
Bug#580260: logcheck-database: dkim-filter needs tweak
Package: logcheck-database Version: 1.3.8 11 hex digits, and "no" diff -ur logcheck-1.3.8.orig/rulefiles/linux/ignore.d.server/dkim-filter logcheck-1.3.8/rulefiles/linux/ignore.d.server/dkim-filter --- logcheck-1.3.8.orig/rulefiles/linux/ignore.d.server/dkim-filter 2008-05-22 04:20:58.000000000 -0400 +++ logcheck-1.3.8/rulefiles/linux/ignore.d.server/dkim-filter 2010-05-04
2002 Jun 28
2
ssh_rsa_verify: RSA_verify failed: error:
Host based authentication does not seem to be working for us after upgrading to openssh-3.4p1 (we were at openssh-3.1p1) (openssl is at 0.96d). Any time we try to connect from another unix box also running openssh-3.4p1, we get the following error (on the server side) and host based auth fails (it falls back to password prompt). sshd[15038]: error: ssh_rsa_verify: RSA_verify failed:
2001 Mar 26
2
Openssh-2.5.1p1 and Solaris 2.6 problem with ssh_rsa_verify
We recently upgraded from an older version of SSH to OpenSSH 2.5.1p1 (OpenSSH_2.5.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090600f) and are having problems on just a few hosts in our environment. The other 200 systems are working fine. Every once in a blue-moon it will connect with version 2. When I try to connect to or from one of these hosts using SSH2 I get the following error (I have sshd -d
2002 Jun 28
1
hostbased authentication problem in 3.4
I am seeing the same issues as another recent post, hostbased authentication in 3.4p1 not seeming to work. I tried the ssh-keysign.c patch posted, didn't seem to fix the problem. Details: Solaris 7, OpenSSH 3.4p1, OpenSSL 0.9.6d Key from client ssh_host_rsa_key.pub copied to server /etc/ssh/ssh_known_hosts2 with comma-separated client hostnames added to front and a blank space before rest of
2002 Apr 24
2
RSA_verify question on OpenSSH Client w/ OpenSSL0.9.6a
Using OpenSSH 2.3.1 client and OpenSSL 0.9.6a When trying to ssh to OpenSSH server of higher versions SSH-1.99-OpenSSH_2.5.2p2 or such, I see error in RSA key exchange: RSA_verify(..)routine. I see: error at:int RSA_verify(int dtype, unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) { int i,ret=0,sigtype; unsigned char *p,*s;
2008 May 15
1
Bug#471936: setting package to logcheck-database logtail logcheck, tagging 473619, tagging 478334, tagging 472368 ...
# Automatically generated email from bts, devscripts version 2.10.27 # # logcheck (1.2.64) unstable; urgency=low # # * ignore.d.server/dhcp # - Adding dhcp rules for DNS updates by ddns_remove_a() # (closes: #459875, #472368) # - Added dhcp "removed reverse map" rule, which occurs on DHCPRELEASE. # * ignore.d.server/spamd # - deal with socket connections by e.g. evolution
2011 Aug 18
1
RSA_public_decrypt and FIPS
Does anyone knows if there is a patch for OpenSSH in order to make it work with 0.9.8r OpenSSL in FIPS Mode ? I'm having problem with the RSA_public_decrypt() function that is failing in FIPS Mode, I changed it to use RSA_verify instead and setting the flag "RSA_FLAG_NON_FIPS_ALLOW", and it's working fine now, but I'm not sure if this is allowed in FIPS Mode, does anyone
2012 Apr 19
2
OpenSSL ASN.1 vulnerability: sshd not affected
Hi, Tavis Ormandy found some bugs in OpenSSL's ASN.1 and buffer code that can be exploited to cause a heap overflow: http://lists.grok.org.uk/pipermail/full-disclosure/2012-April/086585.html Fortunately OpenSSH's sshd is not vulnerable - it has avoided the use of ASN.1 parsing since 2002 when Markus wrote a custom RSA verification function (openssh_RSA_verify):
2008 Mar 25
0
ActionMailer and Sender validation frameworks ( DKIM or SPF )
What''s the directors'' take on ading DKIM or SPF functionality into ActionMailer. Is that a function that is better addressed via a plugin, or would an extension or a monkeypatch of this class be an appropriate avenue of pursuit? Steven --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby on
2009 Jan 18
0
exim rpm with DKIM support for CentOS?
I haven't learned a lot about DKIM yet, but I guess I'll need to implement it in the near future, at first for signing outgoing mail. I'm using exim as an MTA. I guess the standard exim 4.63 binary rpm from CentOS repos propably does not have DKIM support yet? Or does it, maybe? Provided the standard binary rpm does not provide this functionality, what would be the most decent
2010 May 31
0
hello cents os network proble dk dkim and dlv
hello all reader hello centos network I use to bind core fecora 12 http://jason.roysdon.net/2009/10/16/building-bind-9-6-on-rhel5-centos5-for-dnssec-nsec3-support/ I am having problems with my dk and dkim signature of my emails I have successfully made the process of verification of signatures dnssec all my domains are correct and good displays on dlv.isc.org the reason for my problem just the
2009 Aug 22
1
domainkeys, dkim, bind
Hello, I'm trying to implement domainkeys and dkim on my domain and then to get it set up with postfix. Currently i'm having difficulty with the first stage, adding the domainkey txt record to bind, is a special version of bind required to do this? The machine that handles dns is using bind 9.5.1-p3. Thanks. Dave.
2020 Sep 30
0
Mailman config needs updated to unbreak DKIM verification
Hello mail admin, Currently the nut-upsdev mailing list mail is mostly getting marked as SPAM (or SPOOF) due to failed DKIM. DKIM is trying to verify mail headers signed by the original sender, but using the mailing list DKIM key (or lack thereof). This occurs because the DKIM mail authentication looks for a authentication key for the headers based on the HELO/ELHO user, but the message is DKIM
2020 May 07
0
Testing email DKIM handling
Please ignore this test message. Validating whether the mailing list is still breaking DKIM signed messages.
2020 May 07
0
Further DKIM testing validation
Please ignore this mail too.
2020 May 13
0
Testing new email settings to fix DKIM
Testing
2020 May 13
0
Another DKIM test message
Testing
2020 Jul 02
1
Testing DKIM signatures
Please ignore this test message
2008 Dec 28
1
dkim-milter-2.7.2 and Centos 5.2
I am trying to install dkim-milter-2.7.2 on a Centos 5.2 system and keep getting the following errors. I have very little experience in C programing so I am at a loss as how to proceed. I have sendmail-devel installed Here is the tail of the result output of sh ./Build make[2]: cc: Command not found make[2]: *** [assert.o] Error 127 make[2]: Leaving directory
2010 Apr 14
0
Getting Domainkeys, dkim, and SMTP-AUTH/TLS to play nicely together in sendmail
A while back I struggled to get Domainkeys and DKIM to work properly on my little home server. While I'm sure they weren't necessary in a strict sense, it not only enabled me to learn about the technology but allowed for more of a verification of the email coming from my server. And so this week I figured: "Hey, this has been working without a problem for a while; it must be time to