dkimpy 1.1.0

Milestone information

Project:
dkimpy
Series:
1.1
Version:
1.1.0
Released:
 
Registrant:
Scott Kitterman
Release registered:
Active:
No. Drivers cannot target bugs and blueprints to this milestone.  

Download RDF metadata

Activities

Assigned to you:
No blueprints or bugs assigned to you.
Assignees:
3 Scott Kitterman
Blueprints:
No blueprints are targeted to this milestone.
Bugs:
5 Fix Released

Download files for this release

After you've downloaded a file, you can verify its authenticity using its MD5 sum or signature. (How do I verify a download?)

File Description Downloads
download icon dkimpy-1.1.0.tar.gz (md5, sig) 1.1.0 28
last downloaded 19 weeks ago
Total downloads: 28

Release notes 

This release does not have release notes.

Changelog 

View the full changelog

2023-02-25 Version 1.1.0
    - Add domain validity check for ascii domains (no specials)
    - Add option to specify index number of signature to verify to dkimverify
      (Thanks to Nick Baugh for the change)
    - Correct signature indexing error introduced in 1.0.0 that prevents
      verification of multiple signatures in a single message
    - Correct dkim.verify processing to avoid errors when verifying messages
      with no DKIM signatures
    - Update dnsplug for DNS Python (dns) 2.0 compatibility (LP: #1888583)
    - Fix @param srv_id typos (LP: #1890532)
    - Provide more specific error message when ed25519 private key is invalid
      (See LP 1901569 for background)
    - Add support for PKCS#8 for private keys, openssl 3 default (LP:
      #1978835) - Thanks to Adrien (spitap) for the change
    - Add limitations section to README to document current IDN status
    - Add USE_ASYNC flag to allow async to be disabled when aiodns is
      installed (LP: #1954331) - see README.md for details
    - Add new dkim.DnsTimeoutError class to report queried domain and selector
      along with timeout error from dnspython (LP: #1873449)
    - Invalid Authentication-Results header fields are ignored for ARC signing
      (LP: #1884044)
    - Correct base64 validation regexp so that valid signature with == split
      between two lines are not incorrectly evaluated as invalid (LP:
      #2002295) - Thanks to <https://launchpad.net/~obadz> for the report and
      the proposed fix

0 blueprints and 5 bugs targeted

Bug report Importance Assignee Status
2002295 #2002295 base64 validation rejects (~1.5% of) valid signatures 3 High Scott Kitterman  10 Fix Released
1873449 #1873449 Error raisedin resolver when DNS key is missing 4 Medium Scott Kitterman  10 Fix Released
1884044 #1884044 ARC sign "AuthenticationResultsHeader.parse" should not be responsible for invalid headers 4 Medium   10 Fix Released
1954331 #1954331 Silent failure if async DNS is available but async dkimpy is not used 4 Medium Scott Kitterman  10 Fix Released
1978835 #1978835 dknewkey & OpenSSL 3 generated RSA key doesn't work 4 Medium   10 Fix Released
This milestone contains Public information
Everyone can see this information.