Inital commit
This commit is contained in:
parent
55164ab076
commit
ab817d8683
|
@ -0,0 +1,776 @@
|
|||
#
|
||||
# Managed by CFengine
|
||||
#
|
||||
#
|
||||
|
||||
##
|
||||
## opendkim.conf -- configuration file for OpenDKIM filter
|
||||
##
|
||||
## Copyright (c) 2010-2015, The Trusted Domain Project. All rights reserved.
|
||||
##
|
||||
|
||||
##
|
||||
## For settings that refer to a "dataset", see the opendkim(8) man page.
|
||||
##
|
||||
|
||||
## DEPRECATED CONFIGURATION OPTIONS
|
||||
##
|
||||
## The following configuration options are no longer valid. They should be
|
||||
## removed from your existing configuration file to prevent potential issues.
|
||||
## Failure to do so may result in opendkim being unable to start.
|
||||
##
|
||||
## Removed in 2.10.0:
|
||||
## AddAllSignatureResults
|
||||
## ADSPAction
|
||||
## ADSPNoSuchDomain
|
||||
## BogusPolicy
|
||||
## DisableADSP
|
||||
## LDAPSoftStart
|
||||
## LocalADSP
|
||||
## NoDiscardableMailTo
|
||||
## On-PolicyError
|
||||
## SendADSPReports
|
||||
## UnprotectedPolicy
|
||||
|
||||
## CONFIGURATION OPTIONS
|
||||
|
||||
## AllowSHA1Only { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## By default, the filter will refuse to start if support for SHA256 is
|
||||
## not available since this violates the strong recommendations of
|
||||
## RFC6376 Section 3.3, which says:
|
||||
##
|
||||
## "Verifiers MUST implement both rsa-sha1 and rsa-sha256. Signers MUST
|
||||
## implement and SHOULD sign using rsa-sha256."
|
||||
##
|
||||
## This forces that violation to be explicitly selected by the administrator.
|
||||
|
||||
# AllowSHA1Only no
|
||||
|
||||
## AlwaysAddARHeader { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Add an "Authentication-Results:" header even to unsigned messages
|
||||
## from domains with no "signs all" policy. The reported DKIM result
|
||||
## will be "none" in such cases. Normally unsigned mail from non-strict
|
||||
## domains does not cause the results header to be added.
|
||||
|
||||
# AlwaysAddARHeader no
|
||||
|
||||
## AuthservID string
|
||||
## default (local host name)
|
||||
##
|
||||
## Defines the "authserv-id" token to be used when generating
|
||||
## Authentication-Results headers after message verification.
|
||||
|
||||
# AuthservID example.com
|
||||
|
||||
## AuthservIDWithJobID
|
||||
## default "no"
|
||||
##
|
||||
## Appends a "/" followed by the MTA's job ID to the "authserv-id" token
|
||||
## when generating Authentication-Results headers after message verification.
|
||||
|
||||
# AuthservIDWithJobId no
|
||||
|
||||
## AutoRestart { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Indicate whether or not the filter should arrange to restart automatically
|
||||
## if it crashes.
|
||||
|
||||
# AutoRestart No
|
||||
|
||||
## AutoRestartCount n
|
||||
## default 0
|
||||
##
|
||||
## Sets the maximum automatic restart count. After this number of
|
||||
## automatic restarts, the filter will give up and terminate. A value of 0
|
||||
## implies no limit.
|
||||
|
||||
# AutoRestartCount 0
|
||||
|
||||
## AutoRestartRate n/t[u]
|
||||
## default (none)
|
||||
##
|
||||
## Sets the maximum automatic restart rate. See the opendkim.conf(5)
|
||||
## man page for the format of this parameter.
|
||||
|
||||
# AutoRestartRate n/tu
|
||||
|
||||
## Background { yes | no }
|
||||
## default "yes"
|
||||
##
|
||||
## Indicate whether or not the filter should run in the background.
|
||||
|
||||
# Background Yes
|
||||
|
||||
## BaseDirectory path
|
||||
## default (none)
|
||||
##
|
||||
## Causes the filter to change to the named directory before beginning
|
||||
## operation. Thus, cores will be dumped here and configuration files
|
||||
## are read relative to this location.
|
||||
|
||||
# BaseDirectory /var/run/opendkim
|
||||
|
||||
## BodyLengthDB dataset
|
||||
## default (none)
|
||||
##
|
||||
## A data set that is checked against envelope recipients to see if a
|
||||
## body length tag should be included in the generated signature.
|
||||
## This has security implications; see opendkim.conf(5) for details.
|
||||
|
||||
# BodyLengthDB dataset
|
||||
|
||||
## Canonicalization hdrcanon[/bodycanon]
|
||||
## default "simple/simple"
|
||||
##
|
||||
## Select canonicalizations to use when signing. If the "bodycanon" is
|
||||
## omitted, "simple" is used. Valid values for each are "simple" and
|
||||
## "relaxed".
|
||||
|
||||
# Canonicalization simple/simple
|
||||
|
||||
## ClockDrift n
|
||||
## default 300
|
||||
##
|
||||
## Specify the tolerance range for expired signatures or signatures
|
||||
## which appear to have timestamps in the future, allowing for clock
|
||||
## drift.
|
||||
|
||||
# ClockDrift 300
|
||||
|
||||
## Diagnostics { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Specifies whether or not signatures with header diagnostic tags should
|
||||
## be generated.
|
||||
|
||||
# Diagnostics No
|
||||
|
||||
## DNSTimeout n
|
||||
## default 10
|
||||
##
|
||||
## Specify the time in seconds to wait for replies from the nameserver when
|
||||
## requesting keys or signing policies.
|
||||
|
||||
# DNSTimeout 10
|
||||
|
||||
## Domain dataset
|
||||
## default (none)
|
||||
##
|
||||
## Specify for which domain(s) signing should be done. No default; must
|
||||
## be specified for signing.
|
||||
|
||||
Domain {{#cfg.domains}} {{.}} {{/cfg.domains}}
|
||||
|
||||
## DomainKeysCompat { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## When enabled, backward compatibility with DomainKeys (RFC4870) key
|
||||
## records is enabled. Otherwise, such key records are considered to be
|
||||
## syntactically invalid.
|
||||
|
||||
# DomainKeysCompat no
|
||||
|
||||
## DontSignMailTo dataset
|
||||
## default (none)
|
||||
##
|
||||
## Gives a list of recipient addresses or address patterns whose mail should
|
||||
## not be signed.
|
||||
|
||||
# DontSignMailTo addr1,addr2,...
|
||||
|
||||
## EnableCoredumps { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## On systems which have support for such, requests that the kernel dump
|
||||
## core even though the process may change user ID during its execution.
|
||||
|
||||
# EnableCoredumps no
|
||||
|
||||
## ExemptDomains dataset
|
||||
## default (none)
|
||||
##
|
||||
## A data set of domain names that are checked against the message sender's
|
||||
## domain. If a match is found, the message is ignored by the filter.
|
||||
|
||||
# ExemptDomains domain1,domain2,...
|
||||
|
||||
## ExternalIgnoreList filename
|
||||
##
|
||||
## Names a file from which a list of externally-trusted hosts is read.
|
||||
## These are hosts which are allowed to send mail through you for signing.
|
||||
## Automatically contains 127.0.0.1. See man page for file format.
|
||||
|
||||
# ExternalIgnoreList filename
|
||||
|
||||
## FixCRLF { yes | no }
|
||||
##
|
||||
## Requests that the library convert "naked" CR and LF characters to
|
||||
## CRLFs during canonicalization. The default is "no".
|
||||
|
||||
# FixCRLF no
|
||||
|
||||
## IgnoreMalformedMail { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Silently passes malformed messages without alteration. This includes
|
||||
## messages that fail the RequiredHeaders check, if enabled. The default is
|
||||
## to pass those messages but add an Authentication-Results field indicating
|
||||
## that they were malformed.
|
||||
|
||||
# IgnoreMalformedMail no
|
||||
|
||||
## InternalHosts dataset
|
||||
## default "127.0.0.1"
|
||||
##
|
||||
## Names a file from which a list of internal hosts is read. These are
|
||||
## hosts from which mail should be signed rather than verified.
|
||||
## Automatically contains 127.0.0.1.
|
||||
#
|
||||
InternalHosts {{mynetworks_head}} {{#mynetworks_tail}} ,{{.}}{{/mynetworks_tail}}
|
||||
|
||||
# InternalHosts dataset
|
||||
|
||||
## KeepTemporaryFiles { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## If set, causes temporary files generated during message signing or
|
||||
## verifying to be left behind for debugging use. Not for normal operation;
|
||||
## can fill your disks quite fast on busy systems.
|
||||
|
||||
# KeepTemporaryFiles no
|
||||
|
||||
## KeyFile filename
|
||||
## default (none)
|
||||
##
|
||||
## Specifies the path to the private key to use when signing. Ignored if
|
||||
## SigningTable and KeyTable are used. No default; must be specified for
|
||||
## signing if SigningTable/KeyTable are not in use.
|
||||
|
||||
#KeyFile /var/db/dkim/example.private
|
||||
KeyFile {{cfg.keyfile}}
|
||||
#/var/db/dkim/example.private
|
||||
|
||||
## KeyTable dataset
|
||||
## default (none)
|
||||
##
|
||||
## Defines a table that will be queried to convert key names to
|
||||
## sets of data of the form (signing domain, signing selector, private key).
|
||||
## The private key can either contain a PEM-formatted private key,
|
||||
## a base64-encoded DER format private key, or a path to a file containing
|
||||
## one of those.
|
||||
|
||||
# KeyTable dataset
|
||||
|
||||
## LogWhy { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## If logging is enabled (see Syslog below), issues very detailed logging
|
||||
## about the logic behind the filter's decision to either sign a message
|
||||
## or verify it. The logic behind the decision is non-trivial and can be
|
||||
## confusing to administrators not familiar with its operation. A
|
||||
## description of how the decision is made can be found in the OPERATIONS
|
||||
## section of the opendkim(8) man page. This causes a large increase
|
||||
## in the amount of log data generated for each message, so it should be
|
||||
## limited to debugging use and not enabled for general operation.
|
||||
|
||||
# LogWhy no
|
||||
|
||||
## MacroList macro[=value][,...]
|
||||
##
|
||||
## Gives a set of MTA-provided macros which should be checked to see
|
||||
## if the sender has been determined to be a local user and therefore
|
||||
## whether or not signing should be done. See opendkim.conf(5) for
|
||||
## more information.
|
||||
|
||||
# MacroList foo=bar,baz=blivit
|
||||
|
||||
## MaximumHeaders n
|
||||
##
|
||||
## Disallow messages whose header blocks are bigger than "n" bytes.
|
||||
## Intended to detect and block a denial-of-service attack. The default
|
||||
## is 65536. A value of 0 disables this test.
|
||||
|
||||
# MaximumHeaders n
|
||||
|
||||
## MaximumSignaturesToVerify n
|
||||
## (default 3)
|
||||
##
|
||||
## Verify no more than "n" signatures on an arriving message.
|
||||
## A value of 0 means "no limit".
|
||||
|
||||
# MaximumSignaturesToVerify n
|
||||
|
||||
## MaximumSignedBytes n
|
||||
##
|
||||
## Don't sign more than "n" bytes of the message. The default is to
|
||||
## sign the entire message. Setting this implies "BodyLengths".
|
||||
|
||||
# MaximumSignedBytes n
|
||||
|
||||
## MilterDebug n
|
||||
##
|
||||
## Request a debug level of "n" from the milter library. The default is 0.
|
||||
|
||||
# MilterDebug 0
|
||||
|
||||
## Minimum n[% | +]
|
||||
## default 0
|
||||
##
|
||||
## Sets a minimum signing volume; one of the following formats:
|
||||
## n at least n bytes (or the whole message, whichever is less)
|
||||
## must be signed
|
||||
## n% at least n% of the message must be signed
|
||||
## n+ if a length limit was presented in the signature, no more than
|
||||
## n bytes may have been added
|
||||
|
||||
# Minimum n
|
||||
|
||||
## MinimumKeyBits n
|
||||
## default 1024
|
||||
##
|
||||
## Causes the library not to accept signatures matching keys made of fewer
|
||||
## than the specified number of bits, even if they would otherwise pass
|
||||
## DKIM signing.
|
||||
|
||||
# MinimumKeyBits 1024
|
||||
|
||||
## Mode [sv]
|
||||
## default sv
|
||||
##
|
||||
## Indicates which mode(s) of operation should be provided. "s" means
|
||||
## "sign", "v" means "verify".
|
||||
|
||||
# Mode sv
|
||||
|
||||
## MTA dataset
|
||||
## default (none)
|
||||
##
|
||||
## Specifies a list of MTAs whos mail should always be signed rather than
|
||||
## verified. The "mtaname" is extracted from the DaemonPortOptions line
|
||||
## in effect.
|
||||
|
||||
# MTA name
|
||||
|
||||
## MultipleSignatures { yes | no }
|
||||
## default no
|
||||
##
|
||||
## Allows multiple signatures to be added. If set to "true" and a SigningTable
|
||||
## is in use, all SigningTable entries that match the candidate message will
|
||||
## cause a signature to be added. Otherwise, only the first matching
|
||||
## SigningTable entry will be added, or only the key defined by Domain,
|
||||
## Selector and KeyFile will be added.
|
||||
|
||||
# MultipleSignatures no
|
||||
|
||||
## MustBeSigned dataset
|
||||
## default (none)
|
||||
##
|
||||
## Defines a list of headers which, if present on a message, must be
|
||||
## signed for the signature to be considered acceptable.
|
||||
|
||||
# MustBeSigned header1,header2,...
|
||||
|
||||
## Nameservers addr1[,addr2[,...]]
|
||||
## default (none)
|
||||
##
|
||||
## Provides a comma-separated list of IP addresses that are to be used when
|
||||
## doing DNS queries to retrieve DKIM keys, VBR records, etc.
|
||||
## These override any local defaults built in to the resolver in use, which
|
||||
## may be defined in /etc/resolv.conf or hard-coded into the software.
|
||||
|
||||
# Nameservers addr1,addr2,...
|
||||
|
||||
## NoHeaderB { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Suppresses addition of "header.b" tags on Authentication-Results
|
||||
## header fields.
|
||||
|
||||
# NoHeaderB no
|
||||
|
||||
## OmitHeaders dataset
|
||||
## default (none)
|
||||
##
|
||||
## Specifies a list of headers that should always be omitted when signing.
|
||||
## Header names should be separated by commas.
|
||||
|
||||
# OmitHeaders header1,header2,...
|
||||
|
||||
## On-...
|
||||
##
|
||||
## Specifies what to do when certain error conditions are encountered.
|
||||
##
|
||||
## See opendkim.conf(5) for more information.
|
||||
|
||||
# On-Default
|
||||
# On-BadSignature
|
||||
# On-DNSError
|
||||
# On-InternalError
|
||||
# On-NoSignature
|
||||
# On-Security
|
||||
# On-SignatureError
|
||||
|
||||
## OversignHeaders dataset
|
||||
## default (none)
|
||||
##
|
||||
## Specifies a set of header fields that should be included in all signature
|
||||
## header lists (the "h=" tag) once more than the number of times they were
|
||||
## actually present in the signed message. See opendkim.conf(5) for more
|
||||
## information.
|
||||
|
||||
# OverSignHeaders header1,header2,...
|
||||
|
||||
## PeerList dataset
|
||||
## default (none)
|
||||
##
|
||||
## Contains a list of IP addresses, CIDR blocks, hostnames or domain names
|
||||
## whose mail should be neither signed nor verified by this filter. See man
|
||||
## page for file format.
|
||||
|
||||
# PeerList filename
|
||||
|
||||
## PidFile filename
|
||||
## default (none)
|
||||
##
|
||||
## Name of the file where the filter should write its pid before beginning
|
||||
## normal operations.
|
||||
|
||||
# PidFile filename
|
||||
PidFile {{cfg.pid_file}}
|
||||
|
||||
## POPDBFile dataset
|
||||
## default (none)
|
||||
##
|
||||
## Names a database which should be checked for "POP before SMTP" records
|
||||
## as a form of authentication of users who may be sending mail through
|
||||
## the MTA for signing. Requires special compilation of the filter.
|
||||
## See opendkim.conf(5) for more information.
|
||||
|
||||
# POPDBFile filename
|
||||
|
||||
## Quarantine { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Indicates whether or not the filter should arrange to quarantine mail
|
||||
## which fails verification. Intended for diagnostic use only.
|
||||
|
||||
# Quarantine No
|
||||
|
||||
## QueryCache { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Instructs the DKIM library to maintain its own local cache of keys and
|
||||
## policies retrieved from DNS, rather than relying on the nameserver for
|
||||
## caching service. Useful if the nameserver being used by the filter is
|
||||
## not local. The filter must be compiled with the QUERY_CACHE flag to enable
|
||||
## this feature, since it adds a library dependency.
|
||||
|
||||
# QueryCache No
|
||||
|
||||
## RedirectFailuresTo address
|
||||
## default (none)
|
||||
##
|
||||
## Redirects signed messages to the specified address if none of the
|
||||
## signatures present failed to verify.
|
||||
|
||||
# RedirectFailuresTo postmaster@example.com
|
||||
|
||||
## RemoveARAll { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Remove all Authentication-Results: headers on all arriving mail.
|
||||
|
||||
# RemoveARAll No
|
||||
|
||||
## RemoveARFrom dataset
|
||||
## default (none)
|
||||
##
|
||||
## Remove all Authentication-Results: headers on all arriving mail that
|
||||
## claim to have been added by hosts listed in this parameter. The list
|
||||
## should be comma-separated. Entire domains may be specified by preceding
|
||||
## the dopmain name by a single dot (".") character.
|
||||
|
||||
# RemoveARFrom host1,host2,.domain1,.domain2,...
|
||||
|
||||
## RemoveOldSignatures { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Remove old signatures on messages, if any, when generating a signature.
|
||||
|
||||
# RemoveOldSignatures No
|
||||
|
||||
## ReportAddress addr
|
||||
## default (executing user)@(hostname)
|
||||
##
|
||||
## Specifies the sending address to be used on From: headers of outgoing
|
||||
## failure reports. By default, the e-mail address of the user executing
|
||||
## the filter is used.
|
||||
|
||||
# ReportAddress "DKIM Error Postmaster" <postmaster@example.com>
|
||||
|
||||
## ReportBccAddress addr
|
||||
## default (none)
|
||||
##
|
||||
## Specifies additional recipient address(es) to receive outgoing failure
|
||||
## reports.
|
||||
|
||||
# ReportBccAddress postmaster@example.com, john@example.com
|
||||
|
||||
## RequiredHeaders { yes | no }
|
||||
## default no
|
||||
##
|
||||
## Rejects messages which don't conform to RFC5322 header count requirements.
|
||||
|
||||
# RequiredHeaders No
|
||||
|
||||
## RequireSafeKeys { yes | no }
|
||||
## default yes
|
||||
##
|
||||
## Refuses to use key files that appear to have unsafe permissions.
|
||||
|
||||
# RequireSafeKeys Yes
|
||||
|
||||
## ResignAll { yes | no }
|
||||
## default no
|
||||
##
|
||||
## Where ResignMailTo triggers a re-signing action, this flag indicates
|
||||
## whether or not all mail should be signed (if set) versus only verified
|
||||
## mail being signed (if not set).
|
||||
|
||||
# ResignAll No
|
||||
|
||||
## ResignMailTo dataset
|
||||
## default (none)
|
||||
##
|
||||
## Checks each message recipient against the specified dataset for a
|
||||
## matching record. The full address is checked in each case, then the
|
||||
## hostname, then each domain preceded by ".". If there is a match, the
|
||||
## value returned is presumed to be the name of a key in the KeyTable
|
||||
## (if defined) to be used to re-sign the message in addition to
|
||||
## verifying it. If there is a match without a KeyTable, the default key
|
||||
## is applied.
|
||||
|
||||
# ResignMailTo dataset
|
||||
|
||||
## ResolverConfiguration string
|
||||
##
|
||||
## Passes arbitrary configuration data to the resolver. For the stock UNIX
|
||||
## resolver, this is ignored; for Unbound, it names a resolv.conf(5)-style
|
||||
## file that should be read for configuration information.
|
||||
|
||||
# ResolverConfiguration string
|
||||
|
||||
## ResolverTracing { yes | no }
|
||||
##
|
||||
## Requests enabling of resolver trace features, if available. The effect
|
||||
## of setting this flag depends on how trace features, if any, are implemented
|
||||
## in the resolver in use. Currently only effective when used with the
|
||||
## OpenDKIM asynchronous resolver.
|
||||
|
||||
# ResolverTracing no
|
||||
|
||||
## Selector name
|
||||
##
|
||||
## The name of the selector to use when signing. No default; must be
|
||||
## specified for signing.
|
||||
|
||||
Selector {{cfg.selector}}
|
||||
#my-selector-name
|
||||
|
||||
## SenderHeaders dataset
|
||||
## default (none)
|
||||
##
|
||||
## Overrides the default list of headers that will be used to determine
|
||||
## the sending domain when deciding whether to sign the message and with
|
||||
## with which key(s). See opendkim.conf(5) for details.
|
||||
|
||||
# SenderHeaders From
|
||||
|
||||
## SendReports { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Specifies whether or not the filter should generate report mail back
|
||||
## to senders when verification fails and an address for such a purpose
|
||||
## is provided. See opendkim.conf(5) for details.
|
||||
|
||||
# SendReports No
|
||||
|
||||
## SignatureAlgorithm signalg
|
||||
## default "rsa-sha256"
|
||||
##
|
||||
## Signature algorithm to use when generating signatures. Must be either
|
||||
## "rsa-sha1" or "rsa-sha256".
|
||||
|
||||
# SignatureAlgorithm rsa-sha256
|
||||
|
||||
## SignatureTTL seconds
|
||||
## default "0"
|
||||
##
|
||||
## Specifies the lifetime in seconds of signatures generated by the
|
||||
## filter. A value of 0 means no expiration time is included in the
|
||||
## signature.
|
||||
|
||||
# SignatureTTL 0
|
||||
|
||||
## SignHeaders dataset
|
||||
## default (none)
|
||||
##
|
||||
## Specifies the list of headers which should be included when generating
|
||||
## signatures. The string should be a comma-separated list of header names.
|
||||
## See the opendkim.conf(5) man page for more information.
|
||||
|
||||
# SignHeaders header1,header2,...
|
||||
|
||||
## SigningTable dataset
|
||||
## default (none)
|
||||
##
|
||||
## Defines a dataset that will be queried for the message sender's address
|
||||
## to determine which private key(s) (if any) should be used to sign the
|
||||
## message. The sender is determined from the value of the sender
|
||||
## header fields as described with SenderHeaders above. The key for this
|
||||
## lookup should be an address or address pattern that matches senders;
|
||||
## see the opendkim.conf(5) man page for more information. The value
|
||||
## of the lookup should return the name of a key found in the KeyTable
|
||||
## that should be used to sign the message. If MultipleSignatures
|
||||
## is set, all possible lookup keys will be attempted which may result
|
||||
## in multiple signatures being applied.
|
||||
|
||||
# SigningTable filename
|
||||
|
||||
## SingleAuthResult { yes | no}
|
||||
## default "no"
|
||||
##
|
||||
## When DomainKeys verification is enabled, multiple Authentication-Results
|
||||
## will be added, one for DK and one for DKIM. With this enabled, only
|
||||
## a DKIM result will be reported unless DKIM failed but DK passed, in which
|
||||
## case only a DK result will be reported.
|
||||
|
||||
# SingleAuthResult no
|
||||
|
||||
## SMTPURI uri
|
||||
##
|
||||
## Specifies a URI (e.g., "smtp://localhost") to which mail should be sent
|
||||
## via SMTP when notifications are generated.
|
||||
|
||||
# Socket smtp://localhost
|
||||
|
||||
## Socket socketspec
|
||||
##
|
||||
## Names the socket where this filter should listen for milter connections
|
||||
## from the MTA. Required. Should be in one of these forms:
|
||||
##
|
||||
## inet:port@address to listen on a specific interface
|
||||
## inet:port to listen on all interfaces
|
||||
## local:/path/to/socket to listen on a UNIX domain socket
|
||||
|
||||
# Socket inet:port@localhost
|
||||
Socket {{cfg..milter_sock}}
|
||||
|
||||
## SoftwareHeader { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Add a DKIM-Filter header field to messages passing through this filter
|
||||
## to identify messages it has processed.
|
||||
|
||||
# SoftwareHeader no
|
||||
|
||||
## StrictHeaders { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Requests that the DKIM library refuse to process a message whose
|
||||
## header fields do not conform to the standards, in particular Section 3.6
|
||||
## of RFC5322.
|
||||
|
||||
# StrictHeaders no
|
||||
|
||||
## StrictTestMode { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Selects strict CRLF mode during testing (see the "-t" command line
|
||||
## flag in the opendkim(8) man page). Messages for which all header
|
||||
## fields and body lines are not CRLF-terminated are considered malformed
|
||||
## and will produce an error.
|
||||
|
||||
# StrictTestMode no
|
||||
|
||||
## SubDomains { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Sign for subdomains as well?
|
||||
|
||||
# SubDomains No
|
||||
|
||||
## Syslog { yes | no }
|
||||
## default "yes"
|
||||
##
|
||||
## Log informational and error activity to syslog?
|
||||
|
||||
Syslog Yes
|
||||
|
||||
## SyslogFacility facility
|
||||
## default "mail"
|
||||
##
|
||||
## Valid values are :
|
||||
## auth cron daemon kern lpr mail news security syslog user uucp
|
||||
## local0 local1 local2 local3 local4 local5 local6 local7
|
||||
##
|
||||
## syslog facility to be used
|
||||
|
||||
# SyslogFacility mail
|
||||
|
||||
## SyslogSuccess { yes | no }
|
||||
## default "no"
|
||||
##
|
||||
## Log success activity to syslog?
|
||||
|
||||
# SyslogSuccess No
|
||||
|
||||
## TemporaryDirectory path
|
||||
## default /tmp
|
||||
##
|
||||
## Specifies which directory will be used for creating temporary files
|
||||
## during message processing.
|
||||
|
||||
# TemporaryDirectory /tmp
|
||||
|
||||
## TestPublicKeys filename
|
||||
## default (none)
|
||||
##
|
||||
## Names a file from which public keys should be read. Intended for use
|
||||
## only during automated testing.
|
||||
|
||||
# TestPublicKeys /tmp/testkeys
|
||||
|
||||
## TrustAnchorFile filename
|
||||
## default (none)
|
||||
##
|
||||
## Specifies a file from which trust anchor data should be read when doing
|
||||
## DNS queries and applying the DNSSEC protocol. See the Unbound documentation
|
||||
## at http://unbound.net for the expected format of this file.
|
||||
|
||||
# TrustAnchorFile /var/named/trustanchor
|
||||
|
||||
## UMask mask
|
||||
## default (none)
|
||||
##
|
||||
## Change the process umask for file creation to the specified value.
|
||||
## The system has its own default which will be used (usually 022).
|
||||
## See the umask(2) man page for more information.
|
||||
|
||||
# UMask 022
|
||||
#UMask 022
|
||||
|
||||
|
||||
# UnboundConfigFile /var/named/unbound.conf
|
||||
|
||||
## Userid userid
|
||||
## default (none)
|
||||
##
|
||||
## Change to user "userid" before starting normal operation? May include
|
||||
## a group ID as well, separated from the userid by a colon.
|
||||
UserID {{cfg.uid }}:{{cfg.gid}}
|
Loading…
Reference in New Issue