You need to analyze the contents of a DKIM-Signature header in order to investigate an issue with Messaging Gateway DKIM signatures
DKIM Authentication operates by decrypting a cryptographic signature of the email message using a key stored in the DNS and comparing it to a hash of the message headers and body. In order for this to work the sender needs to not only include the signature with the message but details on how to find the correct public key, how it computed the hash and what information needs to be included when checking the signature. All that is wrapped up in the DKIM-Signature message header.DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=selector1;
c=relaxed/simple;q=dns/txt; [email protected]; t=1255993973;
h=From:Sender:Reply-To:Subject:Date:Message-Id:To:Cc:
MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
Content-Description:Resent-Date:Resent-From:Resent-Sender:
Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id:
List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:
List-Archive; bh=+7qxGePcmmrtZAIVQAtkSSGHfQ/ftNuvUTWJ3vXC9Zc=;
b=dB85+qM+If1KGQmqMLNpqLgNtUaG5dhGjYjQD6/QXtXmViJx8tf9gLEjcHr+musL
CAvr0Fsn1DA3ZLLlUxpf4ARCRftffOIp55Mj5EtDMm8v1UkcuftmgY9vcvpoPLDz
yV/7EG/Gnmat6N7qrlC5Ip5sQqSaaaDwenkvOGGuDqs=;
Separators: The DKIM signature header isn’t immediately clear but with a little slicing and dicing will tell us everything we need to know about how to validate the message but it’s important to know where to make the cuts. The header is composed of multiple “tag=value” pairs separated by the semicolon. When taking apart the header, always cut at the semicolon.
v=1
a=rsa-sha256
d=example.com
s=selector1
c=relaxed/simple
q=dns/txt
t=1255993973
h=From:…:List-Archive
bh=+7qxGePcmmrtZAIVQAtkWSGHfQ/ftNuvUTWJ3vXC9Zc=
b=dB85+qM+If1KGQmqMLNpqLgNtUaG5dhGjYjQD6/QXtXmViJx8tf9gLEjcHr+musL
CAvr0Fsn1DA3ZLLlUxpf4ARCRftffOIp55Mj5EtDMm8v1UkcuftmgY9vcvpoPLDz
yV/7EG/Gnmat6N7qrlC5Ip5sQqSaaaDwenkvOpGuDqs=;