Differences between revisions 1 and 4 (spanning 3 versions)
Revision 1 as of 2016-02-22 14:45:14
Size: 704
Comment: Begin translation
Revision 4 as of 2016-02-22 15:24:04
Size: 2160
Comment:
Deletions are marked like this. Additions are marked like this.
Line 17: Line 17:
Add to the Postfix signature opendkim. For convenience, I keep all the settings in /etc/postfix/dkim/, you can choose a different directory. {{{
  mkdir /etc/postfix/dkim/
}}}

Generate a key for mail.example.com server {{{
  opendkim-genkey -D /etc/postfix/dkim/ -d example.com -s mail
}}}

resulting in the directory /etc/postfix/dkim/ 2 files : mail.private and mail.txt (private and public key, respectively). The key file is necessary to allow read access for the group, which employs OpenDKIM : {{{
  chgrp opendkim /etc/postfix/dkim/ *
  chmod g+r /etc/postfix/dkim/ *
}}}

Setup the /etc/opendkim.conf :

All the available options can be found on the page: http://www.opendkim.org/opendkim.conf.5.html {{{
Syslog yes

# Signature mode and signature verification
Mode sv

# Specify the list of keys
KeyTable file:/etc/postfix/dkim/keytable
# Match keys and domains
SigningTable file:/etc/postfix/dkim/signingtable
}}}

Now in the file /etc/postfix/dkim/keytable, put information about the private key: {{{
mail._domainkey.example.com example.com:mail:/etc/postfix/dkim/mail.private
}}}

In the file /etc/postfix/dkim/signingtable, specify which key will sign a domain: {{{

# Domain example.com
example.com mail._domainkey.example.com
# You can specify multiple domains
# Example.net www._domainkey.example.net
}}}

To be continued...

== See also ==
 * http://www.opendkim.org/ : Official website

Translation(s): English - Русский


Domain Keys Identified Mail (DKIM) combines several existing antiphishing and antispam methods to improve the quality of the classification and identification of legitimate e-mail. Instead of the traditional IP-address, to determine the message sender DKIM adds a digital signature associated with the domain name of the organization.

dkim

Postfix and opendkim

Install the package:

  apt-get install opendkim opendkim-tools

Add to the Postfix signature opendkim. For convenience, I keep all the settings in /etc/postfix/dkim/, you can choose a different directory.

  mkdir /etc/postfix/dkim/ 

Generate a key for mail.example.com server

  opendkim-genkey -D /etc/postfix/dkim/ -d example.com -s mail 

resulting in the directory /etc/postfix/dkim/ 2 files : mail.private and mail.txt (private and public key, respectively). The key file is necessary to allow read access for the group, which employs OpenDKIM :

  chgrp opendkim /etc/postfix/dkim/ *
  chmod g+r /etc/postfix/dkim/ * 

Setup the /etc/opendkim.conf :

All the available options can be found on the page: http://www.opendkim.org/opendkim.conf.5.html

Syslog yes

# Signature mode and signature verification
Mode sv

# Specify the list of keys
KeyTable file:/etc/postfix/dkim/keytable
# Match keys and domains
SigningTable file:/etc/postfix/dkim/signingtable 

Now in the file /etc/postfix/dkim/keytable, put information about the private key:

mail._domainkey.example.com example.com:mail:/etc/postfix/dkim/mail.private 

In the file /etc/postfix/dkim/signingtable, specify which key will sign a domain:

# Domain example.com
example.com mail._domainkey.example.com
# You can specify multiple domains
# Example.net www._domainkey.example.net 

To be continued...

See also


CategoryNetwork