"Fossies" - the Fresh Open Source Software Archive 
Member "opendkim-2.10.3/opendkim/opendkim.conf.sample" (11 May 2015, 21800 Bytes) of package /linux/misc/opendkim-2.10.3.tar.gz:
As a special service "Fossies" has tried to format the requested text file into HTML format (style:
standard) with prefixed line numbers.
Alternatively you can here
view or
download the uninterpreted source code file.
See also the last
Fossies "Diffs" side-by-side code changes report for "opendkim.conf.sample":
2.10.1_vs_2.10.2.
1 ##
2 ## opendkim.conf -- configuration file for OpenDKIM filter
3 ##
4 ## Copyright (c) 2010-2015, The Trusted Domain Project. All rights reserved.
5 ##
6
7 ##
8 ## For settings that refer to a "dataset", see the opendkim(8) man page.
9 ##
10
11 ## DEPRECATED CONFIGURATION OPTIONS
12 ##
13 ## The following configuration options are no longer valid. They should be
14 ## removed from your existing configuration file to prevent potential issues.
15 ## Failure to do so may result in opendkim being unable to start.
16 ##
17 ## Removed in 2.10.0:
18 ## AddAllSignatureResults
19 ## ADSPAction
20 ## ADSPNoSuchDomain
21 ## BogusPolicy
22 ## DisableADSP
23 ## LDAPSoftStart
24 ## LocalADSP
25 ## NoDiscardableMailTo
26 ## On-PolicyError
27 ## SendADSPReports
28 ## UnprotectedPolicy
29
30 ## CONFIGURATION OPTIONS
31
32 ## AllowSHA1Only { yes | no }
33 ## default "no"
34 ##
35 ## By default, the filter will refuse to start if support for SHA256 is
36 ## not available since this violates the strong recommendations of
37 ## RFC6376 Section 3.3, which says:
38 ##
39 ## "Verifiers MUST implement both rsa-sha1 and rsa-sha256. Signers MUST
40 ## implement and SHOULD sign using rsa-sha256."
41 ##
42 ## This forces that violation to be explicitly selected by the administrator.
43
44 # AllowSHA1Only no
45
46 ## AlwaysAddARHeader { yes | no }
47 ## default "no"
48 ##
49 ## Add an "Authentication-Results:" header even to unsigned messages
50 ## from domains with no "signs all" policy. The reported DKIM result
51 ## will be "none" in such cases. Normally unsigned mail from non-strict
52 ## domains does not cause the results header to be added.
53
54 # AlwaysAddARHeader no
55
56 ## AuthservID string
57 ## default (local host name)
58 ##
59 ## Defines the "authserv-id" token to be used when generating
60 ## Authentication-Results headers after message verification.
61
62 # AuthservID example.com
63
64 ## AuthservIDWithJobID
65 ## default "no"
66 ##
67 ## Appends a "/" followed by the MTA's job ID to the "authserv-id" token
68 ## when generating Authentication-Results headers after message verification.
69
70 # AuthservIDWithJobId no
71
72 ## AutoRestart { yes | no }
73 ## default "no"
74 ##
75 ## Indicate whether or not the filter should arrange to restart automatically
76 ## if it crashes.
77
78 # AutoRestart No
79
80 ## AutoRestartCount n
81 ## default 0
82 ##
83 ## Sets the maximum automatic restart count. After this number of
84 ## automatic restarts, the filter will give up and terminate. A value of 0
85 ## implies no limit.
86
87 # AutoRestartCount 0
88
89 ## AutoRestartRate n/t[u]
90 ## default (none)
91 ##
92 ## Sets the maximum automatic restart rate. See the opendkim.conf(5)
93 ## man page for the format of this parameter.
94
95 # AutoRestartRate n/tu
96
97 ## Background { yes | no }
98 ## default "yes"
99 ##
100 ## Indicate whether or not the filter should run in the background.
101
102 # Background Yes
103
104 ## BaseDirectory path
105 ## default (none)
106 ##
107 ## Causes the filter to change to the named directory before beginning
108 ## operation. Thus, cores will be dumped here and configuration files
109 ## are read relative to this location.
110
111 # BaseDirectory /var/run/opendkim
112
113 ## BodyLengthDB dataset
114 ## default (none)
115 ##
116 ## A data set that is checked against envelope recipients to see if a
117 ## body length tag should be included in the generated signature.
118 ## This has security implications; see opendkim.conf(5) for details.
119
120 # BodyLengthDB dataset
121
122 ## Canonicalization hdrcanon[/bodycanon]
123 ## default "simple/simple"
124 ##
125 ## Select canonicalizations to use when signing. If the "bodycanon" is
126 ## omitted, "simple" is used. Valid values for each are "simple" and
127 ## "relaxed".
128
129 # Canonicalization simple/simple
130
131 ## ClockDrift n
132 ## default 300
133 ##
134 ## Specify the tolerance range for expired signatures or signatures
135 ## which appear to have timestamps in the future, allowing for clock
136 ## drift.
137
138 # ClockDrift 300
139
140 ## Diagnostics { yes | no }
141 ## default "no"
142 ##
143 ## Specifies whether or not signatures with header diagnostic tags should
144 ## be generated.
145
146 # Diagnostics No
147
148 ## DNSTimeout n
149 ## default 10
150 ##
151 ## Specify the time in seconds to wait for replies from the nameserver when
152 ## requesting keys or signing policies.
153
154 # DNSTimeout 10
155
156 ## Domain dataset
157 ## default (none)
158 ##
159 ## Specify for which domain(s) signing should be done. No default; must
160 ## be specified for signing.
161
162 Domain example.com
163
164 ## DomainKeysCompat { yes | no }
165 ## default "no"
166 ##
167 ## When enabled, backward compatibility with DomainKeys (RFC4870) key
168 ## records is enabled. Otherwise, such key records are considered to be
169 ## syntactically invalid.
170
171 # DomainKeysCompat no
172
173 ## DontSignMailTo dataset
174 ## default (none)
175 ##
176 ## Gives a list of recipient addresses or address patterns whose mail should
177 ## not be signed.
178
179 # DontSignMailTo addr1,addr2,...
180
181 ## EnableCoredumps { yes | no }
182 ## default "no"
183 ##
184 ## On systems which have support for such, requests that the kernel dump
185 ## core even though the process may change user ID during its execution.
186
187 # EnableCoredumps no
188
189 ## ExemptDomains dataset
190 ## default (none)
191 ##
192 ## A data set of domain names that are checked against the message sender's
193 ## domain. If a match is found, the message is ignored by the filter.
194
195 # ExemptDomains domain1,domain2,...
196
197 ## ExternalIgnoreList filename
198 ##
199 ## Names a file from which a list of externally-trusted hosts is read.
200 ## These are hosts which are allowed to send mail through you for signing.
201 ## Automatically contains 127.0.0.1. See man page for file format.
202
203 # ExternalIgnoreList filename
204
205 ## FixCRLF { yes | no }
206 ##
207 ## Requests that the library convert "naked" CR and LF characters to
208 ## CRLFs during canonicalization. The default is "no".
209
210 # FixCRLF no
211
212 ## IgnoreMalformedMail { yes | no }
213 ## default "no"
214 ##
215 ## Silently passes malformed messages without alteration. This includes
216 ## messages that fail the RequiredHeaders check, if enabled. The default is
217 ## to pass those messages but add an Authentication-Results field indicating
218 ## that they were malformed.
219
220 # IgnoreMalformedMail no
221
222 ## InternalHosts dataset
223 ## default "127.0.0.1"
224 ##
225 ## Names a file from which a list of internal hosts is read. These are
226 ## hosts from which mail should be signed rather than verified.
227 ## Automatically contains 127.0.0.1.
228
229 # InternalHosts dataset
230
231 ## KeepTemporaryFiles { yes | no }
232 ## default "no"
233 ##
234 ## If set, causes temporary files generated during message signing or
235 ## verifying to be left behind for debugging use. Not for normal operation;
236 ## can fill your disks quite fast on busy systems.
237
238 # KeepTemporaryFiles no
239
240 ## KeyFile filename
241 ## default (none)
242 ##
243 ## Specifies the path to the private key to use when signing. Ignored if
244 ## SigningTable and KeyTable are used. No default; must be specified for
245 ## signing if SigningTable/KeyTable are not in use.
246
247 KeyFile /var/db/dkim/example.private
248
249 ## KeyTable dataset
250 ## default (none)
251 ##
252 ## Defines a table that will be queried to convert key names to
253 ## sets of data of the form (signing domain, signing selector, private key).
254 ## The private key can either contain a PEM-formatted private key,
255 ## a base64-encoded DER format private key, or a path to a file containing
256 ## one of those.
257
258 # KeyTable dataset
259
260 ## LogWhy { yes | no }
261 ## default "no"
262 ##
263 ## If logging is enabled (see Syslog below), issues very detailed logging
264 ## about the logic behind the filter's decision to either sign a message
265 ## or verify it. The logic behind the decision is non-trivial and can be
266 ## confusing to administrators not familiar with its operation. A
267 ## description of how the decision is made can be found in the OPERATIONS
268 ## section of the opendkim(8) man page. This causes a large increase
269 ## in the amount of log data generated for each message, so it should be
270 ## limited to debugging use and not enabled for general operation.
271
272 # LogWhy no
273
274 ## MacroList macro[=value][,...]
275 ##
276 ## Gives a set of MTA-provided macros which should be checked to see
277 ## if the sender has been determined to be a local user and therefore
278 ## whether or not signing should be done. See opendkim.conf(5) for
279 ## more information.
280
281 # MacroList foo=bar,baz=blivit
282
283 ## MaximumHeaders n
284 ##
285 ## Disallow messages whose header blocks are bigger than "n" bytes.
286 ## Intended to detect and block a denial-of-service attack. The default
287 ## is 65536. A value of 0 disables this test.
288
289 # MaximumHeaders n
290
291 ## MaximumSignaturesToVerify n
292 ## (default 3)
293 ##
294 ## Verify no more than "n" signatures on an arriving message.
295 ## A value of 0 means "no limit".
296
297 # MaximumSignaturesToVerify n
298
299 ## MaximumSignedBytes n
300 ##
301 ## Don't sign more than "n" bytes of the message. The default is to
302 ## sign the entire message. Setting this implies "BodyLengths".
303
304 # MaximumSignedBytes n
305
306 ## MilterDebug n
307 ##
308 ## Request a debug level of "n" from the milter library. The default is 0.
309
310 # MilterDebug 0
311
312 ## Minimum n[% | +]
313 ## default 0
314 ##
315 ## Sets a minimum signing volume; one of the following formats:
316 ## n at least n bytes (or the whole message, whichever is less)
317 ## must be signed
318 ## n% at least n% of the message must be signed
319 ## n+ if a length limit was presented in the signature, no more than
320 ## n bytes may have been added
321
322 # Minimum n
323
324 ## MinimumKeyBits n
325 ## default 1024
326 ##
327 ## Causes the library not to accept signatures matching keys made of fewer
328 ## than the specified number of bits, even if they would otherwise pass
329 ## DKIM signing.
330
331 # MinimumKeyBits 1024
332
333 ## Mode [sv]
334 ## default sv
335 ##
336 ## Indicates which mode(s) of operation should be provided. "s" means
337 ## "sign", "v" means "verify".
338
339 # Mode sv
340
341 ## MTA dataset
342 ## default (none)
343 ##
344 ## Specifies a list of MTAs whos mail should always be signed rather than
345 ## verified. The "mtaname" is extracted from the DaemonPortOptions line
346 ## in effect.
347
348 # MTA name
349
350 ## MultipleSignatures { yes | no }
351 ## default no
352 ##
353 ## Allows multiple signatures to be added. If set to "true" and a SigningTable
354 ## is in use, all SigningTable entries that match the candidate message will
355 ## cause a signature to be added. Otherwise, only the first matching
356 ## SigningTable entry will be added, or only the key defined by Domain,
357 ## Selector and KeyFile will be added.
358
359 # MultipleSignatures no
360
361 ## MustBeSigned dataset
362 ## default (none)
363 ##
364 ## Defines a list of headers which, if present on a message, must be
365 ## signed for the signature to be considered acceptable.
366
367 # MustBeSigned header1,header2,...
368
369 ## Nameservers addr1[,addr2[,...]]
370 ## default (none)
371 ##
372 ## Provides a comma-separated list of IP addresses that are to be used when
373 ## doing DNS queries to retrieve DKIM keys, VBR records, etc.
374 ## These override any local defaults built in to the resolver in use, which
375 ## may be defined in /etc/resolv.conf or hard-coded into the software.
376
377 # Nameservers addr1,addr2,...
378
379 ## NoHeaderB { yes | no }
380 ## default "no"
381 ##
382 ## Suppresses addition of "header.b" tags on Authentication-Results
383 ## header fields.
384
385 # NoHeaderB no
386
387 ## OmitHeaders dataset
388 ## default (none)
389 ##
390 ## Specifies a list of headers that should always be omitted when signing.
391 ## Header names should be separated by commas.
392
393 # OmitHeaders header1,header2,...
394
395 ## On-...
396 ##
397 ## Specifies what to do when certain error conditions are encountered.
398 ##
399 ## See opendkim.conf(5) for more information.
400
401 # On-Default
402 # On-BadSignature
403 # On-DNSError
404 # On-InternalError
405 # On-NoSignature
406 # On-Security
407 # On-SignatureError
408
409 ## OversignHeaders dataset
410 ## default (none)
411 ##
412 ## Specifies a set of header fields that should be included in all signature
413 ## header lists (the "h=" tag) once more than the number of times they were
414 ## actually present in the signed message. See opendkim.conf(5) for more
415 ## information.
416
417 # OverSignHeaders header1,header2,...
418
419 ## PeerList dataset
420 ## default (none)
421 ##
422 ## Contains a list of IP addresses, CIDR blocks, hostnames or domain names
423 ## whose mail should be neither signed nor verified by this filter. See man
424 ## page for file format.
425
426 # PeerList filename
427
428 ## PidFile filename
429 ## default (none)
430 ##
431 ## Name of the file where the filter should write its pid before beginning
432 ## normal operations.
433
434 # PidFile filename
435
436 ## POPDBFile dataset
437 ## default (none)
438 ##
439 ## Names a database which should be checked for "POP before SMTP" records
440 ## as a form of authentication of users who may be sending mail through
441 ## the MTA for signing. Requires special compilation of the filter.
442 ## See opendkim.conf(5) for more information.
443
444 # POPDBFile filename
445
446 ## Quarantine { yes | no }
447 ## default "no"
448 ##
449 ## Indicates whether or not the filter should arrange to quarantine mail
450 ## which fails verification. Intended for diagnostic use only.
451
452 # Quarantine No
453
454 ## QueryCache { yes | no }
455 ## default "no"
456 ##
457 ## Instructs the DKIM library to maintain its own local cache of keys and
458 ## policies retrieved from DNS, rather than relying on the nameserver for
459 ## caching service. Useful if the nameserver being used by the filter is
460 ## not local. The filter must be compiled with the QUERY_CACHE flag to enable
461 ## this feature, since it adds a library dependency.
462
463 # QueryCache No
464
465 ## RedirectFailuresTo address
466 ## default (none)
467 ##
468 ## Redirects signed messages to the specified address if none of the
469 ## signatures present failed to verify.
470
471 # RedirectFailuresTo postmaster@example.com
472
473 ## RemoveARAll { yes | no }
474 ## default "no"
475 ##
476 ## Remove all Authentication-Results: headers on all arriving mail.
477
478 # RemoveARAll No
479
480 ## RemoveARFrom dataset
481 ## default (none)
482 ##
483 ## Remove all Authentication-Results: headers on all arriving mail that
484 ## claim to have been added by hosts listed in this parameter. The list
485 ## should be comma-separated. Entire domains may be specified by preceding
486 ## the dopmain name by a single dot (".") character.
487
488 # RemoveARFrom host1,host2,.domain1,.domain2,...
489
490 ## RemoveOldSignatures { yes | no }
491 ## default "no"
492 ##
493 ## Remove old signatures on messages, if any, when generating a signature.
494
495 # RemoveOldSignatures No
496
497 ## ReportAddress addr
498 ## default (executing user)@(hostname)
499 ##
500 ## Specifies the sending address to be used on From: headers of outgoing
501 ## failure reports. By default, the e-mail address of the user executing
502 ## the filter is used.
503
504 # ReportAddress "DKIM Error Postmaster" <postmaster@example.com>
505
506 ## ReportBccAddress addr
507 ## default (none)
508 ##
509 ## Specifies additional recipient address(es) to receive outgoing failure
510 ## reports.
511
512 # ReportBccAddress postmaster@example.com, john@example.com
513
514 ## RequiredHeaders { yes | no }
515 ## default no
516 ##
517 ## Rejects messages which don't conform to RFC5322 header count requirements.
518
519 # RequiredHeaders No
520
521 ## RequireSafeKeys { yes | no }
522 ## default yes
523 ##
524 ## Refuses to use key files that appear to have unsafe permissions.
525
526 # RequireSafeKeys Yes
527
528 ## ResignAll { yes | no }
529 ## default no
530 ##
531 ## Where ResignMailTo triggers a re-signing action, this flag indicates
532 ## whether or not all mail should be signed (if set) versus only verified
533 ## mail being signed (if not set).
534
535 # ResignAll No
536
537 ## ResignMailTo dataset
538 ## default (none)
539 ##
540 ## Checks each message recipient against the specified dataset for a
541 ## matching record. The full address is checked in each case, then the
542 ## hostname, then each domain preceded by ".". If there is a match, the
543 ## value returned is presumed to be the name of a key in the KeyTable
544 ## (if defined) to be used to re-sign the message in addition to
545 ## verifying it. If there is a match without a KeyTable, the default key
546 ## is applied.
547
548 # ResignMailTo dataset
549
550 ## ResolverConfiguration string
551 ##
552 ## Passes arbitrary configuration data to the resolver. For the stock UNIX
553 ## resolver, this is ignored; for Unbound, it names a resolv.conf(5)-style
554 ## file that should be read for configuration information.
555
556 # ResolverConfiguration string
557
558 ## ResolverTracing { yes | no }
559 ##
560 ## Requests enabling of resolver trace features, if available. The effect
561 ## of setting this flag depends on how trace features, if any, are implemented
562 ## in the resolver in use. Currently only effective when used with the
563 ## OpenDKIM asynchronous resolver.
564
565 # ResolverTracing no
566
567 ## Selector name
568 ##
569 ## The name of the selector to use when signing. No default; must be
570 ## specified for signing.
571
572 Selector my-selector-name
573
574 ## SenderHeaders dataset
575 ## default (none)
576 ##
577 ## Overrides the default list of headers that will be used to determine
578 ## the sending domain when deciding whether to sign the message and with
579 ## with which key(s). See opendkim.conf(5) for details.
580
581 # SenderHeaders From
582
583 ## SendReports { yes | no }
584 ## default "no"
585 ##
586 ## Specifies whether or not the filter should generate report mail back
587 ## to senders when verification fails and an address for such a purpose
588 ## is provided. See opendkim.conf(5) for details.
589
590 # SendReports No
591
592 ## SignatureAlgorithm signalg
593 ## default "rsa-sha256"
594 ##
595 ## Signature algorithm to use when generating signatures. Must be either
596 ## "rsa-sha1" or "rsa-sha256".
597
598 # SignatureAlgorithm rsa-sha256
599
600 ## SignatureTTL seconds
601 ## default "0"
602 ##
603 ## Specifies the lifetime in seconds of signatures generated by the
604 ## filter. A value of 0 means no expiration time is included in the
605 ## signature.
606
607 # SignatureTTL 0
608
609 ## SignHeaders dataset
610 ## default (none)
611 ##
612 ## Specifies the list of headers which should be included when generating
613 ## signatures. The string should be a comma-separated list of header names.
614 ## See the opendkim.conf(5) man page for more information.
615
616 # SignHeaders header1,header2,...
617
618 ## SigningTable dataset
619 ## default (none)
620 ##
621 ## Defines a dataset that will be queried for the message sender's address
622 ## to determine which private key(s) (if any) should be used to sign the
623 ## message. The sender is determined from the value of the sender
624 ## header fields as described with SenderHeaders above. The key for this
625 ## lookup should be an address or address pattern that matches senders;
626 ## see the opendkim.conf(5) man page for more information. The value
627 ## of the lookup should return the name of a key found in the KeyTable
628 ## that should be used to sign the message. If MultipleSignatures
629 ## is set, all possible lookup keys will be attempted which may result
630 ## in multiple signatures being applied.
631
632 # SigningTable filename
633
634 ## SingleAuthResult { yes | no}
635 ## default "no"
636 ##
637 ## When DomainKeys verification is enabled, multiple Authentication-Results
638 ## will be added, one for DK and one for DKIM. With this enabled, only
639 ## a DKIM result will be reported unless DKIM failed but DK passed, in which
640 ## case only a DK result will be reported.
641
642 # SingleAuthResult no
643
644 ## SMTPURI uri
645 ##
646 ## Specifies a URI (e.g., "smtp://localhost") to which mail should be sent
647 ## via SMTP when notifications are generated.
648
649 # Socket smtp://localhost
650
651 ## Socket socketspec
652 ##
653 ## Names the socket where this filter should listen for milter connections
654 ## from the MTA. Required. Should be in one of these forms:
655 ##
656 ## inet:port@address to listen on a specific interface
657 ## inet:port to listen on all interfaces
658 ## local:/path/to/socket to listen on a UNIX domain socket
659
660 Socket inet:port@localhost
661
662 ## SoftwareHeader { yes | no }
663 ## default "no"
664 ##
665 ## Add a DKIM-Filter header field to messages passing through this filter
666 ## to identify messages it has processed.
667
668 # SoftwareHeader no
669
670 ## StrictHeaders { yes | no }
671 ## default "no"
672 ##
673 ## Requests that the DKIM library refuse to process a message whose
674 ## header fields do not conform to the standards, in particular Section 3.6
675 ## of RFC5322.
676
677 # StrictHeaders no
678
679 ## StrictTestMode { yes | no }
680 ## default "no"
681 ##
682 ## Selects strict CRLF mode during testing (see the "-t" command line
683 ## flag in the opendkim(8) man page). Messages for which all header
684 ## fields and body lines are not CRLF-terminated are considered malformed
685 ## and will produce an error.
686
687 # StrictTestMode no
688
689 ## SubDomains { yes | no }
690 ## default "no"
691 ##
692 ## Sign for subdomains as well?
693
694 # SubDomains No
695
696 ## Syslog { yes | no }
697 ## default "yes"
698 ##
699 ## Log informational and error activity to syslog?
700
701 Syslog Yes
702
703 ## SyslogFacility facility
704 ## default "mail"
705 ##
706 ## Valid values are :
707 ## auth cron daemon kern lpr mail news security syslog user uucp
708 ## local0 local1 local2 local3 local4 local5 local6 local7
709 ##
710 ## syslog facility to be used
711
712 # SyslogFacility mail
713
714 ## SyslogSuccess { yes | no }
715 ## default "no"
716 ##
717 ## Log success activity to syslog?
718
719 # SyslogSuccess No
720
721 ## TemporaryDirectory path
722 ## default /tmp
723 ##
724 ## Specifies which directory will be used for creating temporary files
725 ## during message processing.
726
727 # TemporaryDirectory /tmp
728
729 ## TestPublicKeys filename
730 ## default (none)
731 ##
732 ## Names a file from which public keys should be read. Intended for use
733 ## only during automated testing.
734
735 # TestPublicKeys /tmp/testkeys
736
737 ## TrustAnchorFile filename
738 ## default (none)
739 ##
740 ## Specifies a file from which trust anchor data should be read when doing
741 ## DNS queries and applying the DNSSEC protocol. See the Unbound documentation
742 ## at http://unbound.net for the expected format of this file.
743
744 # TrustAnchorFile /var/named/trustanchor
745
746 ## UMask mask
747 ## default (none)
748 ##
749 ## Change the process umask for file creation to the specified value.
750 ## The system has its own default which will be used (usually 022).
751 ## See the umask(2) man page for more information.
752
753 # UMask 022
754
755 # UnboundConfigFile /var/named/unbound.conf
756
757 ## Userid userid
758 ## default (none)
759 ##
760 ## Change to user "userid" before starting normal operation? May include
761 ## a group ID as well, separated from the userid by a colon.
762
763 # UserID userid