Milter based implementation of DKIM

DomainKeys Identified Mail (DKIM) lets an organization take responsibility for
a message that is in transit. The organization is a handler of the message,
either as its originator or as an intermediary. Their reputation is the basis
for evaluating whether to trust the message for further handling, such as
delivery. Technically DKIM provides a method for validating a domain name
identity that is associated with a message through cryptographic

Source Files (show merged sources derived from linked package)
Filename Size Changed Actions
opendkim-2.10.3.tar.gz 0001210224 1.15 MB almost 4 years
opendkim-2.10.3.tar.gz.asc 0000000228 228 Bytes over 1 year
opendkim-2.9.2_compiler_warnings.patch 0000000718 718 Bytes over 4 years
opendkim-2.9.2_default_config.patch 0000002408 2.35 KB over 1 year
opendkim.changes 0000007678 7.5 KB over 1 year
opendkim.init 0000011219 11 KB almost 5 years
opendkim.keyring 0000001416 1.38 KB over 1 year
opendkim.service 0000000504 504 Bytes over 4 years
opendkim.spec 0000014223 13.9 KB 10 months
opendkim.ticket35+37.patch 0000005160 5.04 KB over 2 years
opendkim.tmpfiles.d 0000000119 119 Bytes over 2 years
Comments for opendkim 4

Karol Babioch's avatar

kbabioch wrote over 1 year ago

There seem's to be an dependency issue in regards to OpenSSL due to the unbound dependency.

Dirk Stoecker's avatar

dstoecker wrote over 1 year ago

Please add in the "Project Config": "Ignore: libopenssl-1_0_0-devel" to get rid of the "have choice" problem. I wonder why nobody noticed that before. I'm checking if fixing requires for unbound-devel and ldns-devel can solve that issue also without that Ignore line.

Dirk Stoecker's avatar

dstoecker wrote over 1 year ago

Or "Prefer: libopenssl-devel" for the other way round :-)

Ferdinand Thiessen's avatar

susnux wrote over 1 year ago

Using the openssl1.1 patch from upstream should resolve this