Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1Z5t27-0002pM-Hk for bitcoin-development@lists.sourceforge.net; Fri, 19 Jun 2015 09:56:23 +0000 Received-SPF: pass (sog-mx-3.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.212.174 as permitted sender) client-ip=209.85.212.174; envelope-from=mh.in.england@gmail.com; helo=mail-wi0-f174.google.com; Received: from mail-wi0-f174.google.com ([209.85.212.174]) by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1Z5t26-0005ES-E1 for bitcoin-development@lists.sourceforge.net; Fri, 19 Jun 2015 09:56:23 +0000 Received: by wicgi11 with SMTP id gi11so13619660wic.0 for ; Fri, 19 Jun 2015 02:56:16 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.194.59.98 with SMTP id y2mr24440751wjq.42.1434707776430; Fri, 19 Jun 2015 02:56:16 -0700 (PDT) Sender: mh.in.england@gmail.com Received: by 10.28.14.196 with HTTP; Fri, 19 Jun 2015 02:56:16 -0700 (PDT) In-Reply-To: References: Date: Fri, 19 Jun 2015 11:56:16 +0200 X-Google-Sender-Auth: T5f4Kr3uSUNzZKnU10MwtrE4uRU Message-ID: From: Mike Hearn To: "Warren Togami Jr." Content-Type: multipart/alternative; boundary=047d7ba978a05ee7240518dbef29 X-Spam-Score: -0.5 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (mh.in.england[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1Z5t26-0005ES-E1 Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] Mailman incompatibility with DKIM ... X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Jun 2015 09:56:23 -0000 --047d7ba978a05ee7240518dbef29 Content-Type: text/plain; charset=UTF-8 > > We already removed the footer because it was incompatible with DKIM > signing. Keeping the "[Bitcoin-dev] " prepend tag in subject is compatible > with DKIM header signing only if the poster manually prepends it in their > subject header. > I still see footers being added to this list by SourceForge? > Opinions? > I've asked Jeff to not use his @bitpay.com account for now. The only real fix is to use a mailing list operator that is designed to operate correctly with DKIM/DMARC, either by not modifying messages in transit, or by re-sending (and ideally re-signing) under their own identity. Though I'm sure this won't be an issue for the Linux Foundation, the latter approach is dangerous because it means the list operator takes full responsibility for any spamming that occurs from that domain. If the mail server is ever hacked or spammers start posting to the lists themselves, all that spam will be seen as originating from the listserv itself and the reputation will be degraded. It can end with everyone's mail going to the spam folder. --047d7ba978a05ee7240518dbef29 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
We already removed the footer b= ecause it was incompatible with DKIM signing.=C2=A0 Keeping the "[Bitc= oin-dev] " prepend tag in subject is compatible with DKIM header signi= ng only if the poster manually prepends it in their subject header.

I still see footers being added to this list= by SourceForge?
=C2=A0
Opinions?

= I've asked Jeff to not use his @bitpay.co= m account for now.

The only real fix is to use= a mailing list operator that is designed to operate correctly with DKIM/DM= ARC, either by not modifying messages in transit, or by re-sending (and ide= ally re-signing) under their own identity.

Though = I'm sure this won't be an issue for the Linux Foundation, the latte= r approach is dangerous because it means the list operator takes full respo= nsibility for any spamming that occurs from that domain. If the mail server= is ever hacked or spammers start posting to the lists themselves, all that= spam will be seen as originating from the listserv itself and the reputati= on will be degraded. It can end with everyone's mail going to the spam = folder.

--047d7ba978a05ee7240518dbef29--