Differences between revisions 3 and 5 (spanning 2 versions)
Revision 3 as of 2016-02-22 15:14:16
Size: 1749
Comment: Step 3
Revision 5 as of 2016-02-22 15:31:43
Size: 2479
Comment:
Deletions are marked like this. Additions are marked like this.
Line 30: Line 30:
Setup the /etc/opendkim.conf : Setup the /etc/opendkim.conf:
Line 44: Line 44:
Now in the file /etc/postfix/dkim/keytable, put information about the private key: {{{
mail._domainkey.example.com example.com:mail:/etc/postfix/dkim/mail.private
}}}

In the file /etc/postfix/dkim/signingtable, specify which key will sign a domain: {{{

# Domain example.com
example.com mail._domainkey.example.com
# You can specify multiple domains
# Example.net www._domainkey.example.net
}}}

In the file /etc/default/opendkim, specify daemon connection settings: {{{
SOCKET="inet:8891@localhost"
}}}

And add the line to the Postfix /etc/postfix/main.cf: {{{
  milter_default_action = accept
  milter_protocol = 2
  smtpd_milters = inet:localhost:8891
  non_smtpd_milters = inet:localhost:8891
}}}

Translation(s): English - Русский


Domain Keys Identified Mail (DKIM) combines several existing antiphishing and antispam methods to improve the quality of the classification and identification of legitimate e-mail. Instead of the traditional IP-address, to determine the message sender DKIM adds a digital signature associated with the domain name of the organization.

dkim

Postfix and opendkim

Install the package:

  apt-get install opendkim opendkim-tools

Add to the Postfix signature opendkim. For convenience, I keep all the settings in /etc/postfix/dkim/, you can choose a different directory.

  mkdir /etc/postfix/dkim/ 

Generate a key for mail.example.com server

  opendkim-genkey -D /etc/postfix/dkim/ -d example.com -s mail 

resulting in the directory /etc/postfix/dkim/ 2 files : mail.private and mail.txt (private and public key, respectively). The key file is necessary to allow read access for the group, which employs OpenDKIM :

  chgrp opendkim /etc/postfix/dkim/ *
  chmod g+r /etc/postfix/dkim/ * 

Setup the /etc/opendkim.conf:

All the available options can be found on the page: http://www.opendkim.org/opendkim.conf.5.html

Syslog yes

# Signature mode and signature verification
Mode sv

# Specify the list of keys
KeyTable file:/etc/postfix/dkim/keytable
# Match keys and domains
SigningTable file:/etc/postfix/dkim/signingtable 

Now in the file /etc/postfix/dkim/keytable, put information about the private key:

mail._domainkey.example.com example.com:mail:/etc/postfix/dkim/mail.private 

In the file /etc/postfix/dkim/signingtable, specify which key will sign a domain:

# Domain example.com
example.com mail._domainkey.example.com
# You can specify multiple domains
# Example.net www._domainkey.example.net 

In the file /etc/default/opendkim, specify daemon connection settings:

SOCKET="inet:8891@localhost" 

And add the line to the Postfix /etc/postfix/main.cf:

  milter_default_action = accept
  milter_protocol = 2
  smtpd_milters = inet:localhost:8891
  non_smtpd_milters = inet:localhost:8891 

To be continued...

See also


CategoryNetwork