ToastingTechnology
New Pleskian
- Server operating system version
- Debian 12
- Plesk version and microupdate number
- Obsidian 18.0.61 Update 6
Hello,
I may have found a bug with the signing of DKIM. This occurs if the spoofed sender and the recipient are on the same server, then the mail is signed by Plesk via DKIM.
To explain it better an example: ([email protected] is a valid mailbox on the server.)
If a mail is send from any other device with the recipient [email protected] and the sender [email protected], for example with the following command:
The mail will be in the mailbox with a valid DKIM signature. This also works when sender and receiver are different, but still on the same server.
If this is intended behavior, I don't quite understand why it should be like this. Because a spam mail appears to be valid, apart from an SPF fail.
I may have found a bug with the signing of DKIM. This occurs if the spoofed sender and the recipient are on the same server, then the mail is signed by Plesk via DKIM.
To explain it better an example: ([email protected] is a valid mailbox on the server.)
If a mail is send from any other device with the recipient [email protected] and the sender [email protected], for example with the following command:
echo "Message body" | mail -s "Subject" -r "<[email protected]>" [email protected]
The mail will be in the mailbox with a valid DKIM signature. This also works when sender and receiver are different, but still on the same server.
If this is intended behavior, I don't quite understand why it should be like this. Because a spam mail appears to be valid, apart from an SPF fail.