OpenDKIM is failing signature verification on most incoming emails. Out of 1,146 incoming emails, 173 have been successfully verified and 973 have "bad signature data". The failing emails include email from google, amazon, sailthru, and many other reasonably technically capable firms that I would expect to verify successfully. I have tested DNS lookups and have found no issues with querying for the DKIM record. I have researched for hours trying to find something helpful, but the few posts that aren't specifically dealing with signing emails don't seem to address the issues I'm seeing. BTW ... outgoing emails are signed properly and passing DKIM validation.
I'm running: Rocky Linux release 9.5 Postfix 3.5.25 OpenDKIM 2.11.0-0.34 OpenDMARC 1.4.2-22 SpamAssassin 3.4.6-5 main.cf has the following milter declarations: milter_default_action = accept milter_protocol = 6 smtpd_milters = inet:127.0.0.1:8891,inet:127.0.0.1:8893,unix:/run/spamass-milter/spamass-milter.sock non_smtpd_milters = $smtpd_milters master.cf has: policyd-spf unix - n n - 0 spawn user=policyd-spf argv=/usr/libexec/postfix/policyd-sp I currently have opendmarc config RejectFailures set to false due to this issue. I would like to set it back to true. Here is an example DKIM failure from the maillog: May 8 14:40:44 primary postfix/smtpd[672210]: connect from maile-af.linkedin.com[108.174.3.198] May 8 14:40:45 primary postfix/smtpd[672210]: Anonymous TLS connection established from maile-af.linkedin.com[108.174.3.198]: TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits) May 8 14:40:45 primary policyd-spf[672216]: spfcheck: pyspf result: "['Pass', 'sender SPF authorized', 'helo']" May 8 14:40:45 primary policyd-spf[672216]: Pass; identity=helo; client-ip=108.174.3.198; helo=maile-af.linkedin.com; envelope-from=s-2kgdgjrbd5fxo2yedmgwvt5lispoakbzohsqk7jiokpemk84raucs...@bounce.linkedin.com; receiver=<UNKNOWN> May 8 14:40:45 primary policyd-spf[672216]: spfcheck: pyspf result: "['Pass', 'sender SPF authorized', 'mailfrom']" May 8 14:40:45 primary policyd-spf[672216]: Pass; identity=mailfrom; client-ip=108.174.3.198; helo=maile-af.linkedin.com; envelope-from=s-2kgdgjrbd5fxo2yedmgwvt5lispoakbzohsqk7jiokpemk84raucs...@bounce.linkedin.com; receiver=<UNKNOWN> May 8 14:40:45 primary policyd-spf[672216]: prepend Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=108.174.3.198; helo=maile-af.linkedin.com; envelope-from=s-2kgdgjrbd5fxo2yedmgwvt5lispoakbzohsqk7jiokpemk84raucs...@bounce.linkedin.com; receiver=<UNKNOWN> May 8 14:40:45 primary postfix/smtpd[672210]: 603932014E: client=maile-af.linkedin.com[108.174.3.198] May 8 14:40:45 primary postfix/cleanup[672217]: 603932014E: message-id=<1082066601.9633899.1746733244...@ltx1-app67844.prod.linkedin.com> May 8 14:40:45 primary opendkim[671562]: 603932014E: maile-af.linkedin.com [108.174.3.198] not internal May 8 14:40:45 primary opendkim[671562]: 603932014E: not authenticated May 8 14:40:45 primary opendkim[671562]: 603932014E: message has signatures from maile.linkedin.com, linkedin.com May 8 14:40:45 primary opendkim[671562]: 603932014E: signature=hpodGVG7 domain=maile.linkedin.com selector=d2048-202308-0e result="signature verification failed"; signature=c7qBDZxE domain=linkedin.com selector=d2048-202308-00 result="signature verification failed" May 8 14:40:45 primary opendkim[671562]: 603932014E: bad signature data May 8 14:40:45 primary opendmarc[754]: 603932014E: linkedin.com fail May 8 14:40:45 primary spamd[547780]: spamd: connection from ::1 [::1]:48946 to port 783, fd 5 May 8 14:40:45 primary spamd[547780]: spamd: setuid to sa-milt succeeded May 8 14:40:45 primary spamd[547780]: spamd: processing message <1082066601.9633899.1746733244...@ltx1-app67844.prod.linkedin.com> for sa-milt:988 May 8 14:40:46 primary spamd[547780]: spamd: clean message (-0.9/5.0) for sa-milt:988 in 0.4 seconds, 87062 bytes. May 8 14:40:46 primary spamd[547780]: spamd: result: . 0 - DKIM_ADSP_ALL,DKIM_INVALID,DKIM_SIGNED,HTML_IMAGE_RATIO_06,HTML_MESSAGE,LOTS_OF_MONEY,MIME_HEADER_CTYPE_ONLY,RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,RCVD_IN_VALIDIT Y_RPBL_BLOCKED,RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_HELO_PASS,SPF_PASS scantime=0.4,size=87062,user=sa-milt,uid=988,required_score=5.0,rhost=::1,raddr=::1,rport=48946,mid=<1082066601.9633899.1746733244...@ltx1-app67844.prod.linkedin.com>,aut olearn=ham autolearn_force=no May 8 14:40:46 primary postfix/qmgr[671668]: 603932014E: from=<s-2kgdgjrbd5fxo2yedmgwvt5lispoakbzohsqk7jiokpemk84raucs...@bounce.linkedin.com>, size=86355, nrcpt=1 (queue active) May 8 14:40:46 primary postfix/local[672219]: 603932014E: to=<y...@xxx.com>, orig_to=<x...@xxx.com>, relay=local, delay=0.88, delays=0.88/0/0/0, dsn=2.0.0, status=sent (delivered to mailbox) May 8 14:40:46 primary postfix/qmgr[671668]: 603932014E: removed Here are example headers from an email that failed: Return-Path: <delivery_20250508155820.39786194.374...@bouncest.seekingalpha.com> X-Original-To: x...@xxx.com Delivered-To: y...@xxx.com Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=192.64.236.197; helo=mta236-197.sailthru.com; envelope-from=delivery_20250508155820.39786194.374...@bouncest.seekingalpha.com; receiver=<UNKNOWN> DMARC-Filter: OpenDMARC Filter v1.4.2 xxx.xxx.com C93372014E Authentication-Results: OpenDMARC; dmarc=fail (p=quarantine dis=none) header.from=seekingalpha.com DKIM-Filter: OpenDKIM Filter v2.11.0 xxx.xxx.com C93372014E Authentication-Results: xxx.xxx.com; dkim=fail reason="signature verification failed" (1024-bit key, unprotected) header.d=seekingalpha.com header.i=acco...@seekingalpha.com header.a=rsa-sha256 header.s=sailthru header.b=TPGE51O3 Received: from mta236-197.sailthru.com (mta236-197.sailthru.com [192.64.236.197]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by xxx.xxx.com (Postfix) with ESMTPS id C93372014E for <x...@xxx.com>; Thu, 8 May 2025 14:58:21 -0500 (CDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; s=sailthru; d=seekingalpha.com; h=Date:From:Reply-To:To:Message-ID:Subject:MIME-Version:Content-Type: List-Unsubscribe-Post:List-Unsubscribe; i=acco...@seekingalpha.com; bh=FCQykKB53iTKMbiQdQIBzJJvCkiK62WqM9lvqYBuXiM=; b=TPGE51O33zqGWAvJNIIERbISsEQpXrB7745+sSy6Sq7ffVlQWE1iIklbwbw6DpM/jiNHN7+43iMw Ml6ciI9zHHVwHyKYw87syYir9iTPdPkt32EHJSWJ9Qwhf728j18JZQYIF99GbdQO7f8nv4i45H9m 3rh/kuJ2he9/dAB5UpI= Received: from aws1-mta-relay2.sailthru.cloud (10.55.73.49) by pmta39.sailthru.com id h3k6do3791s5 for <x...@xxx.com>; Thu, 8 May 2025 14:58:20 -0500 (envelope-from <delivery_20250508155820.39786194.374...@bouncest.seekingalpha.com>) Date: Thu, 8 May 2025 15:58:20 -0400 (EDT) From: Must Reads <acco...@seekingalpha.com> Reply-To: mustre...@seekingalpha.com To: x...@xxx.com Message-ID: <20250508155820.39786194.374...@sailthru.com> Subject: Must Reads: Build A 12%+ Yield On Cost By 2035 With May's Top 10 High-Yield Picks Content-Type: multipart/alternative; boundary="----=_Part_75818925_56239244.1746734300700" Precedence: bulk x-job: 9033-39786194-20250508 X-Feedback-ID: 9033:39786194:campaign:sailthru X-TM-ID: 20250508155820.39786194.374146 X-Info: Message sent by sailthru.com customer Seeking Alpha X-Info: We do not permit unsolicited commercial email X-Info: Please report abuse by forwarding complete headers to X-Info: ab...@sailthru.com X-JMailer: aws-campaign-mailer-24.sailthru.cloud List-Unsubscribe-Post: List-Unsubscribe=One-Click X-Unsubscribe-Web: https://email-st.seekingalpha.com/oc/60abf181ef8c55711e279b55nor82.80oy/5eec21d4 List-Unsubscribe: <https://email-st.seekingalpha.com/oc/60abf181ef8c55711e279b55nor82.80oy/5eec21d4>,<mailto:unsubscribe_20250508155820.39786194.374...@mx.sailthru.com> X-rpcampaign: stnjl39786194 X-Spam-Status: No, score=1.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, HTML_IMAGE_RATIO_08,HTML_MESSAGE,INVESTMENT_ADVICE, MIME_HEADER_CTYPE_ONLY,MIME_HTML_ONLY,MIME_HTML_ONLY_MULTI, MPART_ALT_DIFF,RCVD_IN_DNSWL_NONE,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: * X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on xxx.xxx.com Please let me know if I can provide any additional information that might help uncover the problem. THANK YOU in advance for any light you can shine on this issue!!! _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org