Differences between revisions 5 and 6
Revision 5 as of 2016-02-22 15:31:43
Size: 2479
Comment:
Revision 6 as of 2016-02-24 16:35:32
Size: 2837
Comment: Continue translation. (not finished)
Deletions are marked like this. Additions are marked like this.
Line 67: Line 67:
To be continued... The setup of opendkim and postfix is complete. Now we must configure the DNS.

=== DNS Configuration ===

Add a TXT record for your example.com domain

||<#80FF80>'''recording Name'''||<#80FF80>'''record Type'''||<#80FF80>'''Text'''||
|| mail._domainkey || TXT || v=DKIM1;g=*;k=rsa;p=MI***** (take it from /etc/postfix/mail.txt file) ||

To be continued and tested...

Translation(s): English - Русский


Domain Keys Identified Mail (DKIM) combines several existing antiphishing and antispam methods to improve the quality of the classification and identification of legitimate e-mail. Instead of the traditional IP-address, to determine the message sender DKIM adds a digital signature associated with the domain name of the organization.

dkim

Postfix and opendkim

Install the package:

  apt-get install opendkim opendkim-tools

Add to the Postfix signature opendkim. For convenience, I keep all the settings in /etc/postfix/dkim/, you can choose a different directory.

  mkdir /etc/postfix/dkim/ 

Generate a key for mail.example.com server

  opendkim-genkey -D /etc/postfix/dkim/ -d example.com -s mail 

resulting in the directory /etc/postfix/dkim/ 2 files : mail.private and mail.txt (private and public key, respectively). The key file is necessary to allow read access for the group, which employs OpenDKIM :

  chgrp opendkim /etc/postfix/dkim/ *
  chmod g+r /etc/postfix/dkim/ * 

Setup the /etc/opendkim.conf:

All the available options can be found on the page: http://www.opendkim.org/opendkim.conf.5.html

Syslog yes

# Signature mode and signature verification
Mode sv

# Specify the list of keys
KeyTable file:/etc/postfix/dkim/keytable
# Match keys and domains
SigningTable file:/etc/postfix/dkim/signingtable 

Now in the file /etc/postfix/dkim/keytable, put information about the private key:

mail._domainkey.example.com example.com:mail:/etc/postfix/dkim/mail.private 

In the file /etc/postfix/dkim/signingtable, specify which key will sign a domain:

# Domain example.com
example.com mail._domainkey.example.com
# You can specify multiple domains
# Example.net www._domainkey.example.net 

In the file /etc/default/opendkim, specify daemon connection settings:

SOCKET="inet:8891@localhost" 

And add the line to the Postfix /etc/postfix/main.cf:

  milter_default_action = accept
  milter_protocol = 2
  smtpd_milters = inet:localhost:8891
  non_smtpd_milters = inet:localhost:8891 

The setup of opendkim and postfix is complete. Now we must configure the DNS.

DNS Configuration

Add a TXT record for your example.com domain

recording Name

record Type

Text

mail._domainkey

TXT

v=DKIM1;g=*;k=rsa;p=MI***** (take it from /etc/postfix/mail.txt file)

To be continued and tested...

See also


CategoryNetwork