Your message dated Sat, 11 Jan 2020 13:28:35 +0100 with message-id <20200111122834.GA9963@azadi> and subject line opendkim: Signing via TCP socket works, unix socket fails with SSL error has caused the Debian Bug report #944513, regarding opendkim: Signing via TCP socket works, unix socket fails with SSL error to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 944513: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944513 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: opendkim Version: 2.11.0~alpha-12 Severity: normal Dear Maintainer, I'm using opendkim to sign outbound messages in Postfix. My previous installation used a TCP socket, that configuration still works. According to Debian Wiki and upstream, we should use a unix socket now, not TCP. Postfix is in a chroot at /var/spool/postfix. I switched the socket, as advised, to local:/var/spool/postfix/var/run/opendkim/opendkim.sock in /etc/opendkim.conf and gave smtpd_milters = unix:/var/run/opendkim/opendkim.sock non_smtpd_milters = unix:/var/run/opendkim/opendkim.sock in /etc/postfix/main.cf. After restarting postfix and opendkim, signing outbound messages fails. The postfix submission process returns an error to the client. The error message in /var/log/mail.info is Nov 10 20:47:03 seed10 opendkim[24709]: 120F6205B0: SSL error:0D06B08E:asn1 encoding routines:asn1_d2i_read_bio:not enough data Nov 10 20:47:03 seed10 opendkim[24709]: 120F6205B0: dkim_eom(): resource unavailable: d2i_PrivateKey_bio() failed I expected a localhost:TCP socket and a unix socket would behave the same. It looks as if SSL is not receiving all the information it needs from opendkim. I worked around the failure by reverting the socket change. -- System Information: Debian Release: 10.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-cloud-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages opendkim depends on: ii adduser 3.118 ii dns-root-data 2019031302 ii libbsd0 0.9.1-2 ii libc6 2.28-10 ii libdb5.3 5.3.28+dfsg1-0.5 ii libldap-2.4-2 2.4.47+dfsg-3+deb10u1 ii liblua5.1-0 5.1.5-8.1+b2 ii libmemcached11 1.0.18-4.2 ii libmemcachedutil2 1.0.18-4.2 ii libmilter1.0.1 8.15.2-14~deb10u1 ii libopendbx1 1.4.6-13+b1 ii libopendkim11 2.11.0~alpha-12 ii librbl1 2.11.0~alpha-12 ii libssl1.1 1.1.1d-0+deb10u2 ii libunbound8 1.9.0-2+deb10u1 ii libvbr2 2.11.0~alpha-12 ii lsb-base 10.2019051400 opendkim recommends no packages. Versions of packages opendkim suggests: ii opendkim-tools 2.11.0~alpha-12 pn unbound <none> -- Configuration Files: /etc/default/opendkim changed: RUNDIR=/var/spool/postfix/var/run/opendkim SOCKET=local:$RUNDIR/opendkim.sock USER=opendkim GROUP=opendkim PIDFILE=$RUNDIR/$NAME.pid EXTRAAFTER= /etc/dkimkeys/README.PrivateKeys [Errno 13] Permission denied: '/etc/dkimkeys/README.PrivateKeys' /etc/opendkim.conf changed: Syslog yes UMask 007 KeyFile /etc/dkimkeys/truffula.private Domain truffula.us Selector mail Socket inet:12301@localhost PidFile /run/opendkim/opendkim.pid OversignHeaders From TrustAnchorFile /usr/share/dns/root.key UserID opendkim -- no debconf information
--- End Message ---
--- Begin Message ---Searching for the OpenSSL error message online yields a number of hits all pointing to corruption or format error of public or private key. I suggest double-checking the key, and perhaps regenerate. In the meantime, the Debian wiki page has been thoroughly overhauled and now contains the most up-to-date information regarding socket config. It is unlikely that this problem is related to the UNIX domain socket. This functionality is stable and generally working well, and so I’m closing this bug. We can of course reopen if necessary.
--- End Message ---

