| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806 | {% if ansible_prolog -%}{% from 'templates/ansible/prolog.j2' import prolog with context %}{{ prolog() }}{% endif -%}#### opendkim.conf -- configuration file for OpenDKIM filter#### Copyright (c) 2010-2014, The Trusted Domain Project.  All rights reserved.######  For settings that refer to a "dataset", see the opendkim(8) man page.####  AddAllSignatureResults { yes | no }##      default "no"####  If enabled, results for all signatures will be reported by an added##  Authentication-Results header field.  Otherwise, only one signature will##  be reported, and which one depends on the TrustSignaturesFrom##  setting or, in its absence, which one(s) passed first or, if none passed,##  which one was found first during message processing.# AddAllSignatureResults    no##  ADSPAction { continue | discard | reject }##      default "continue"####  Defines the action to be taken when a message is passed through the##  ADSP algorithm and found to be discardable.  By default, no action is##  taken, though the failure will be noted by the addition of an##  Authentication-Results report.# ADSPAction        continue##  ADSPNoSuchDomain { yes | no }##      default "no"####  Reject messages which are determined to be from nonexistent domains during##  the Author Domain Signing Practises (ADSP) check.# ADSPNoSuchDomain  No##  AllowSHA1Only { yes | no }##      default "no"####  By default, the filter will refuse to start if support for SHA256 is##  not available since this violates the strong recommendations of##  RFC6376 Section 3.3, which says:####  "Verifiers MUST implement both rsa-sha1 and rsa-sha256.  Signers MUST##   implement and SHOULD sign using rsa-sha256."####  This forces that violation to be explicitly selected by the administrator.# AllowSHA1Only     no##  AlwaysAddARHeader { yes | no }##      default "no"####  Add an "Authentication-Results:" header even to unsigned messages##  from domains with no "signs all" policy.  The reported DKIM result##  will be "none" in such cases.  Normally unsigned mail from non-strict##  domains does not cause the results header to be added.AlwaysAddARHeader yes##  AuthservID string##      default (local host name)####  Defines the "authserv-id" token to be used when generating ##  Authentication-Results headers after message verification.# AuthservID        example.com##  AuthservIDWithJobID##      default "no"####  Appends a "/" followed by the MTA's job ID to the "authserv-id" token##  when generating Authentication-Results headers after message verification.# AuthservIDWithJobId   no##  AutoRestart { yes | no }##      default "no"####  Indicate whether or not the filter should arrange to restart automatically##  if it crashes.# AutoRestart       No##  AutoRestartCount n##      default 0####  Sets the maximum automatic restart count.  After this number of##  automatic restarts, the filter will give up and terminate.  A value of 0##  implies no limit.# AutoRestartCount  0##  AutoRestartRate n/t[u]##      default (none)## ##  Sets the maximum automatic restart rate.  See the opendkim.conf(5)##  man page for the format of this parameter.# AutoRestartRate   n/tu##  Background { yes | no }##      default "yes"####  Indicate whether or not the filter should run in the background.# Background        Yes##  BaseDirectory path##      default (none)####  Causes the filter to change to the named directory before beginning##  operation.  Thus, cores will be dumped here and configuration files##  are read relative to this location.# BaseDirectory     /var/run/opendkim##  BodyLengthDB dataset##      default (none)####  A data set that is checked against envelope recipients to see if a##  body length tag should be included in the generated signature.##  This has security implications; see opendkim.conf(5) for details.# BodyLengthDB      dataset##  Canonicalization hdrcanon[/bodycanon]##      default "simple/simple"####  Select canonicalizations to use when signing.  If the "bodycanon" is##  omitted, "simple" is used.  Valid values for each are "simple" and##  "relaxed".# Canonicalization  simple/simple##  ClockDrift n##      default 300####  Specify the tolerance range for expired signatures or signatures##  which appear to have timestamps in the future, allowing for clock##  drift.# ClockDrift        300 ##  Diagnostics { yes | no }##      default "no"####  Specifies whether or not signatures with header diagnostic tags should##  be generated.# Diagnostics       No##  DisableADSP { yes | no }##      default "no"####  Suppresses Author Domain Signing Practices (ADSP) checks, which conduct##  additional DNS queries.# DisableADSP       No##  DNSTimeout n##      default 10####  Specify the time in seconds to wait for replies from the nameserver when##  requesting keys or signing policies.# DNSTimeout        10##  Domain dataset##      default (none)####  Specify for which domain(s) signing should be done.  No default; must##  be specified for signing.# Domain          example.com##  DomainKeysCompat { yes | no }##      default "no"####  When enabled, backward compatibility with DomainKeys (RFC4870) key##  records is enabled.  Otherwise, such key records are considered to be##  syntactically invalid.# DomainKeysCompat  no##  DontSignMailTo  dataset##      default (none)####  Gives a list of recipient addresses or address patterns whose mail should##  not be signed.# DontSignMailTo    addr1,addr2,...##  EnableCoredumps { yes | no }##      default "no"####  On systems which have support for such, requests that the kernel dump##  core even though the process may change user ID during its execution.# EnableCoredumps   no##  ExemptDomains dataset##      default (none)####  A data set of domain names that are checked against the message sender's##  domain.  If a match is found, the message is ignored by the filter.# ExemptDomains     domain1,domain2,...##  ExternalIgnoreList filename####  Names a file from which a list of externally-trusted hosts is read.##  These are hosts which are allowed to send mail through you for signing.##  Automatically contains 127.0.0.1.  See man page for file format.# ExternalIgnoreList    filename##  FixCRLF { yes | no }####  Requests that the library convert "naked" CR and LF characters to##  CRLFs during canonicalization.  The default is "no".# FixCRLF       no##  InternalHosts dataset##      default "127.0.0.1"####  Names a file from which a list of internal hosts is read.  These are##  hosts from which mail should be signed rather than verified.##  Automatically contains 127.0.0.1.InternalHosts     file:/etc/opendkim/InternalHosts##  KeepTemporaryFiles { yes | no }##      default "no"####  If set, causes temporary files generated during message signing or##  verifying to be left behind for debugging use.  Not for normal operation;##  can fill your disks quite fast on busy systems.# KeepTemporaryFiles    no##  KeyFile filename##      default (none)####  Specifies the path to the private key to use when signing.  Ignored if##  SigningTable and KeyTable are used.  No default; must be specified for ##  signing if SigningTable/KeyTable are not in use.#KeyFile         /var/db/dkim/example.private##  KeyTable dataset##      default (none)####  Defines a table that will be queried to convert key names to##  sets of data of the form (signing domain, signing selector, private key).##  The private key can either contain a PEM-formatted private key,##  a base64-encoded DER format private key, or a path to a file containing##  one of those.KeyTable      file:/etc/opendkim/KeyTable##  LocalADSP dataset##      default (none)####  Allows specification of local ADSP overrides for domains.  This should be##  a path to a file containing entries, one per line, with comments and##  blank lines allowed.  An entry is of the form "domain:policy" where##  "domain" is either a fully-qualified domain name (e.g. "foo.example.com")##  or a subdomain name preceded by a period (e.g. ".example.com"), and##  "policy" is either "unknown", "all", or "discardable", as per the current##  ADSP draft specification.  This allows local overrides of policies to##  enforce for domains which either don't publish ADSP or publish weaker##  policies than the verifier would like to enforce.# LocalADSP     /etc/mail/local-adsp-rules##  LogWhy { yes | no }##      default "no"####  If logging is enabled (see Syslog below), issues very detailed logging##  about the logic behind the filter's decision to either sign a message##  or verify it.  The logic behind the decision is non-trivial and can be##  confusing to administrators not familiar with its operation.  A##  description of how the decision is made can be found in the OPERATIONS##  section of the opendkim(8) man page.  This causes a large increase##  in the amount of log data generated for each message, so it should be##  limited to debugging use and not enabled for general operation.# LogWhy        no##  MacroList macro[=value][,...]####  Gives a set of MTA-provided macros which should be checked to see##  if the sender has been determined to be a local user and therefore##  whether or not signing should be done.  See opendkim.conf(5) for##  more information.# MacroList     foo=bar,baz=blivit##  MaximumHeaders n####  Disallow messages whose header blocks are bigger than "n" bytes.##  Intended to detect and block a denial-of-service attack.  The default##  is 65536.  A value of 0 disables this test.# MaximumHeaders    n##  MaximumSignaturesToVerify n##      (default 3)####  Verify no more than "n" signatures on an arriving message.##  A value of 0 means "no limit".# MaximumSignaturesToVerify n##  MaximumSignedBytes n####  Don't sign more than "n" bytes of the message.  The default is to ##  sign the entire message.  Setting this implies "BodyLengths".# MaximumSignedBytes    n##  MilterDebug n####  Request a debug level of "n" from the milter library.  The default is 0.# MilterDebug       0##  Minimum n[% | +]##      default 0####  Sets a minimum signing volume; one of the following formats:##  n   at least n bytes (or the whole message, whichever is less)##      must be signed##      n%  at least n% of the message must be signed##  n+  if a length limit was presented in the signature, no more than##          n bytes may have been added# Minimum       n##  MinimumKeyBits n##      default 1024####  Causes the library not to accept signatures matching keys made of fewer##  than the specified number of bits, even if they would otherwise pass##  DKIM signing.# MinimumKeyBits    1024##  Mode [sv]##      default sv####  Indicates which mode(s) of operation should be provided.  "s" means##  "sign", "v" means "verify".# Mode          sv##  MTA dataset##      default (none)##  ##  Specifies a list of MTAs whos mail should always be signed rather than##  verified.  The "mtaname" is extracted from the DaemonPortOptions line##  in effect.# MTA           name##  MultipleSignatures { yes | no }##      default no####  Allows multiple signatures to be added.  If set to "true" and a SigningTable##  is in use, all SigningTable entries that match the candidate message will##  cause a signature to be added.  Otherwise, only the first matching##  SigningTable entry will be added, or only the key defined by Domain,##  Selector and KeyFile will be added.# MultipleSignatures    no##  MustBeSigned dataset##      default (none)####  Defines a list of headers which, if present on a message, must be##  signed for the signature to be considered acceptable.# MustBeSigned      header1,header2,...##  Nameservers addr1[,addr2[,...]]##      default (none)####  Provides a comma-separated list of IP addresses that are to be used when##  doing DNS queries to retrieve DKIM keys, ADSP policies, VBR records, etc.##  These override any local defaults built in to the resolver in use, which##  may be defined in /etc/resolv.conf or hard-coded into the software.# Nameservers addr1,addr2,...##  NoHeaderB { yes | no }##      default "no"####  Suppresses addition of "header.b" tags on Authentication-Results##  header fields.# NoHeaderB     no##  OmitHeaders dataset##      default (none)####  Specifies a list of headers that should always be omitted when signing.##  Header names should be separated by commas.# OmitHeaders       header1,header2,...##  On-...####  Specifies what to do when certain error conditions are encountered.####  See opendkim.conf(5) for more information.# On-Default# On-BadSignature# On-DNSError# On-InternalError# On-NoSignature# On-Security# On-SignatureError##  OversignHeaders dataset##      default (none)####  Specifies a set of header fields that should be included in all signature##  header lists (the "h=" tag) once more than the number of times they were##  actually present in the signed message.  See opendkim.conf(5) for more##  information.# OverSignHeaders   header1,header2,...##  PeerList dataset##      default (none)####  Contains a list of IP addresses, CIDR blocks, hostnames or domain names##  whose mail should be neither signed nor verified by this filter.  See man##  page for file format.# PeerList      filename##  PidFile filename##      default (none)## ##  Name of the file where the filter should write its pid before beginning##  normal operations.# PidFile       filename##  POPDBFile dataset##      default (none)####  Names a database which should be checked for "POP before SMTP" records##  as a form of authentication of users who may be sending mail through##  the MTA for signing.  Requires special compilation of the filter.##  See opendkim.conf(5) for more information.# POPDBFile     filename##  Quarantine { yes | no }##      default "no"####  Indicates whether or not the filter should arrange to quarantine mail##  which fails verification.  Intended for diagnostic use only.# Quarantine        No##  QueryCache { yes | no }##      default "no"####  Instructs the DKIM library to maintain its own local cache of keys and##  policies retrieved from DNS, rather than relying on the nameserver for##  caching service.  Useful if the nameserver being used by the filter is##  not local.  The filter must be compiled with the QUERY_CACHE flag to enable##  this feature, since it adds a library dependency.# QueryCache        No##  RedirectFailuresTo address##      default (none)####  Redirects signed messages to the specified address if none of the##  signatures present failed to verify.# RedirectFailuresTo    postmaster@example.com##  RemoveARAll { yes | no }##      default "no"####  Remove all Authentication-Results: headers on all arriving mail.# RemoveARAll       No##  RemoveARFrom dataset##      default (none)####  Remove all Authentication-Results: headers on all arriving mail that##  claim to have been added by hosts listed in this parameter.  The list##  should be comma-separated.  Entire domains may be specified by preceding##  the dopmain name by a single dot (".") character.# RemoveARFrom      host1,host2,.domain1,.domain2,...##  RemoveOldSignatures { yes | no }##      default "no"####  Remove old signatures on messages, if any, when generating a signature.# RemoveOldSignatures   No##  ReportAddress addr##      default (executing user)@(hostname)####  Specifies the sending address to be used on From: headers of outgoing##  failure reports.  By default, the e-mail address of the user executing##  the filter is used.# ReportAddress     "DKIM Error Postmaster" <postmaster@example.com>##  ReportBccAddress addr##      default (none)####  Specifies additional recipient address(es) to receive outgoing failure##  reports.# ReportBccAddress  postmaster@example.com, john@example.com##  RequiredHeaders { yes | no }##      default no####  Rejects messages which don't conform to RFC5322 header count requirements.# RequiredHeaders   No##  RequireSafeKeys { yes | no }##      default yes####  Refuses to use key files that appear to have unsafe permissions.# RequireSafeKeys   Yes##  ResignAll { yes | no }##      default no####  Where ResignMailTo triggers a re-signing action, this flag indicates##  whether or not all mail should be signed (if set) versus only verified##  mail being signed (if not set).# ResignAll     No##  ResignMailTo dataset##      default (none)####  Checks each message recipient against the specified dataset for a##  matching record.  The full address is checked in each case, then the##  hostname, then each domain preceded by ".".  If there is a match, the##  value returned is presumed to be the name of a key in the KeyTable##  (if defined) to be used to re-sign the message in addition to##  verifying it.  If there is a match without a KeyTable, the default key##  is applied.# ResignMailTo      dataset##  ResolverConfiguration string####  Passes arbitrary configuration data to the resolver.  For the stock UNIX##  resolver, this is ignored; for Unbound, it names a resolv.conf(5)-style##  file that should be read for configuration information.# ResolverConfiguration string##  ResolverTracing { yes | no }####  Requests enabling of resolver trace features, if available.  The effect##  of setting this flag depends on how trace features, if any, are implemented##  in the resolver in use.  Currently only effective when used with the##  OpenDKIM asynchronous resolver.# ResolverTracing   no##  Selector name####  The name of the selector to use when signing.  No default; must be##  specified for signing.Selector        default##  SendADSPReports { yes | no }##      default "no"####  Specifies whether or not the filter should generate report mail back##  to senders when the ADSP (Author Domain Signing Practises) check fails for##  a message.  See opendkim.conf(5) for details.# SendADSPReports   No##  SenderHeaders   dataset##      default (none)####  Overrides the default list of headers that will be used to determine##  the sending domain for use when evaluating ADSP.  See opendkim.conf(5)##  for details.SenderHeaders     From##  SendReports { yes | no }##      default "no"####  Specifies whether or not the filter should generate report mail back##  to senders when verification fails and an address for such a purpose##  is provided.  See opendkim.conf(5) for details.# SendReports       No##  SignatureAlgorithm signalg##      default "rsa-sha256"####  Signature algorithm to use when generating signatures.  Must be either##  "rsa-sha1" or "rsa-sha256".# SignatureAlgorithm    rsa-sha256##  SignatureTTL seconds##      default "0"####  Specifies the lifetime in seconds of signatures generated by the##  filter.  A value of 0 means no expiration time is included in the##  signature.# SignatureTTL      0##  SignHeaders dataset##      default (none)####  Specifies the list of headers which should be included when generating##  signatures.  The string should be a comma-separated list of header names.##  See the opendkim.conf(5) man page for more information.# SignHeaders       header1,header2,...##  SigningTable dataset##      default (none)####  Defines a dataset that will be queried for the message sender's address##  to determine which private key(s) (if any) should be used to sign the##  message.  The sender is determined from the value of the sender##  header fields as described with SenderHeaders above.  The key for this##  lookup should be an address or address pattern that matches senders;##  see the opendkim.conf(5) man page for more information.  The value##  of the lookup should return the name of a key found in the KeyTable##  that should be used to sign the message.  If MultipleSignatures##  is set, all possible lookup keys will be attempted which may result##  in multiple signatures being applied.SigningTable      refile:/etc/opendkim/SigningTable##  SingleAuthResult { yes | no}##      default "no"####  When DomainKeys verification is enabled, multiple Authentication-Results##  will be added, one for DK and one for DKIM.  With this enabled, only##  a DKIM result will be reported unless DKIM failed but DK passed, in which##  case only a DK result will be reported.# SingleAuthResult  no##  SMTPURI uri####  Specifies a URI (e.g., "smtp://localhost") to which mail should be sent##  via SMTP when notifications are generated.# Socket smtp://localhost##  Socket socketspec####  Names the socket where this filter should listen for milter connections##  from the MTA.  Required.  Should be in one of these forms:####  inet:port@address       to listen on a specific interface##  inet:port           to listen on all interfaces##  local:/path/to/socket   to listen on a UNIX domain socketSocket          inet:8891@localhost##  SoftwareHeader { yes | no }##      default "no"####  Add a DKIM-Filter header field to messages passing through this filter##  to identify messages it has processed.SoftwareHeader    yes##  StrictHeaders { yes | no }##      default "no"####  Requests that the DKIM library refuse to process a message whose##  header fields do not conform to the standards, in particular Section 3.6##  of RFC5322.# StrictHeaders     no##  StrictTestMode { yes | no }##      default "no"####  Selects strict CRLF mode during testing (see the "-t" command line##  flag in the opendkim(8) man page).  Messages for which all header##  fields and body lines are not CRLF-terminated are considered malformed##  and will produce an error.# StrictTestMode    no##  SubDomains { yes | no }##      default "no"####  Sign for subdomains as well?# SubDomains        No##  Syslog { yes | no }##      default "yes"####  Log informational and error activity to syslog?Syslog          Yes##  SyslogFacility      facility##      default "mail"####  Valid values are :##      auth cron daemon kern lpr mail news security syslog user uucp ##      local0 local1 local2 local3 local4 local5 local6 local7####  syslog facility to be usedSyslogFacility    mail##  SyslogSuccess { yes | no }##      default "no"####  Log success activity to syslog?# SyslogSuccess     No##  TemporaryDirectory path##      default /tmp####  Specifies which directory will be used for creating temporary files##  during message processing.# TemporaryDirectory    /tmp##  TestPublicKeys filename##      default (none)####  Names a file from which public keys should be read.  Intended for use##  only during automated testing.# TestPublicKeys    /tmp/testkeys##  TrustAnchorFile filename##      default (none)#### Specifies a file from which trust anchor data should be read when doing## DNS queries and applying the DNSSEC protocol.  See the Unbound documentation## at http://unbound.net for the expected format of this file.# TrustAnchorFile   /var/named/trustanchor##  UMask mask##      default (none)####  Change the process umask for file creation to the specified value.##  The system has its own default which will be used (usually 022).##  See the umask(2) man page for more information.# UMask         022##  UnboundConfigFile filename##      default (none)####  Specifies a configuration file to be passed to the Unbound library that##  performs DNS queries applying the DNSSEC protocol.  See the Unbound##  documentation at http://unbound.net for the expected content of this file.##  The results of using this and the TrustAnchorFile setting at the same## time are undefined.# UnboundConfigFile /var/named/unbound.conf##  Userid userid##      default (none)####  Change to user "userid" before starting normal operation?  May include##  a group ID as well, separated from the userid by a colon.# UserID        userid
 |