opendkim.conf.j2 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806
  1. {% if ansible_prolog -%}
  2. {% from 'templates/ansible/prolog.j2' import prolog with context %}
  3. {{ prolog() }}
  4. {% endif -%}
  5. ##
  6. ## opendkim.conf -- configuration file for OpenDKIM filter
  7. ##
  8. ## Copyright (c) 2010-2014, The Trusted Domain Project. All rights reserved.
  9. ##
  10. ##
  11. ## For settings that refer to a "dataset", see the opendkim(8) man page.
  12. ##
  13. ## AddAllSignatureResults { yes | no }
  14. ## default "no"
  15. ##
  16. ## If enabled, results for all signatures will be reported by an added
  17. ## Authentication-Results header field. Otherwise, only one signature will
  18. ## be reported, and which one depends on the TrustSignaturesFrom
  19. ## setting or, in its absence, which one(s) passed first or, if none passed,
  20. ## which one was found first during message processing.
  21. # AddAllSignatureResults no
  22. ## ADSPAction { continue | discard | reject }
  23. ## default "continue"
  24. ##
  25. ## Defines the action to be taken when a message is passed through the
  26. ## ADSP algorithm and found to be discardable. By default, no action is
  27. ## taken, though the failure will be noted by the addition of an
  28. ## Authentication-Results report.
  29. # ADSPAction continue
  30. ## ADSPNoSuchDomain { yes | no }
  31. ## default "no"
  32. ##
  33. ## Reject messages which are determined to be from nonexistent domains during
  34. ## the Author Domain Signing Practises (ADSP) check.
  35. # ADSPNoSuchDomain No
  36. ## AllowSHA1Only { yes | no }
  37. ## default "no"
  38. ##
  39. ## By default, the filter will refuse to start if support for SHA256 is
  40. ## not available since this violates the strong recommendations of
  41. ## RFC6376 Section 3.3, which says:
  42. ##
  43. ## "Verifiers MUST implement both rsa-sha1 and rsa-sha256. Signers MUST
  44. ## implement and SHOULD sign using rsa-sha256."
  45. ##
  46. ## This forces that violation to be explicitly selected by the administrator.
  47. # AllowSHA1Only no
  48. ## AlwaysAddARHeader { yes | no }
  49. ## default "no"
  50. ##
  51. ## Add an "Authentication-Results:" header even to unsigned messages
  52. ## from domains with no "signs all" policy. The reported DKIM result
  53. ## will be "none" in such cases. Normally unsigned mail from non-strict
  54. ## domains does not cause the results header to be added.
  55. AlwaysAddARHeader yes
  56. ## AuthservID string
  57. ## default (local host name)
  58. ##
  59. ## Defines the "authserv-id" token to be used when generating
  60. ## Authentication-Results headers after message verification.
  61. # AuthservID example.com
  62. ## AuthservIDWithJobID
  63. ## default "no"
  64. ##
  65. ## Appends a "/" followed by the MTA's job ID to the "authserv-id" token
  66. ## when generating Authentication-Results headers after message verification.
  67. # AuthservIDWithJobId no
  68. ## AutoRestart { yes | no }
  69. ## default "no"
  70. ##
  71. ## Indicate whether or not the filter should arrange to restart automatically
  72. ## if it crashes.
  73. # AutoRestart No
  74. ## AutoRestartCount n
  75. ## default 0
  76. ##
  77. ## Sets the maximum automatic restart count. After this number of
  78. ## automatic restarts, the filter will give up and terminate. A value of 0
  79. ## implies no limit.
  80. # AutoRestartCount 0
  81. ## AutoRestartRate n/t[u]
  82. ## default (none)
  83. ##
  84. ## Sets the maximum automatic restart rate. See the opendkim.conf(5)
  85. ## man page for the format of this parameter.
  86. # AutoRestartRate n/tu
  87. ## Background { yes | no }
  88. ## default "yes"
  89. ##
  90. ## Indicate whether or not the filter should run in the background.
  91. # Background Yes
  92. ## BaseDirectory path
  93. ## default (none)
  94. ##
  95. ## Causes the filter to change to the named directory before beginning
  96. ## operation. Thus, cores will be dumped here and configuration files
  97. ## are read relative to this location.
  98. # BaseDirectory /var/run/opendkim
  99. ## BodyLengthDB dataset
  100. ## default (none)
  101. ##
  102. ## A data set that is checked against envelope recipients to see if a
  103. ## body length tag should be included in the generated signature.
  104. ## This has security implications; see opendkim.conf(5) for details.
  105. # BodyLengthDB dataset
  106. ## Canonicalization hdrcanon[/bodycanon]
  107. ## default "simple/simple"
  108. ##
  109. ## Select canonicalizations to use when signing. If the "bodycanon" is
  110. ## omitted, "simple" is used. Valid values for each are "simple" and
  111. ## "relaxed".
  112. # Canonicalization simple/simple
  113. ## ClockDrift n
  114. ## default 300
  115. ##
  116. ## Specify the tolerance range for expired signatures or signatures
  117. ## which appear to have timestamps in the future, allowing for clock
  118. ## drift.
  119. # ClockDrift 300
  120. ## Diagnostics { yes | no }
  121. ## default "no"
  122. ##
  123. ## Specifies whether or not signatures with header diagnostic tags should
  124. ## be generated.
  125. # Diagnostics No
  126. ## DisableADSP { yes | no }
  127. ## default "no"
  128. ##
  129. ## Suppresses Author Domain Signing Practices (ADSP) checks, which conduct
  130. ## additional DNS queries.
  131. # DisableADSP No
  132. ## DNSTimeout n
  133. ## default 10
  134. ##
  135. ## Specify the time in seconds to wait for replies from the nameserver when
  136. ## requesting keys or signing policies.
  137. # DNSTimeout 10
  138. ## Domain dataset
  139. ## default (none)
  140. ##
  141. ## Specify for which domain(s) signing should be done. No default; must
  142. ## be specified for signing.
  143. # Domain example.com
  144. ## DomainKeysCompat { yes | no }
  145. ## default "no"
  146. ##
  147. ## When enabled, backward compatibility with DomainKeys (RFC4870) key
  148. ## records is enabled. Otherwise, such key records are considered to be
  149. ## syntactically invalid.
  150. # DomainKeysCompat no
  151. ## DontSignMailTo dataset
  152. ## default (none)
  153. ##
  154. ## Gives a list of recipient addresses or address patterns whose mail should
  155. ## not be signed.
  156. # DontSignMailTo addr1,addr2,...
  157. ## EnableCoredumps { yes | no }
  158. ## default "no"
  159. ##
  160. ## On systems which have support for such, requests that the kernel dump
  161. ## core even though the process may change user ID during its execution.
  162. # EnableCoredumps no
  163. ## ExemptDomains dataset
  164. ## default (none)
  165. ##
  166. ## A data set of domain names that are checked against the message sender's
  167. ## domain. If a match is found, the message is ignored by the filter.
  168. # ExemptDomains domain1,domain2,...
  169. ## ExternalIgnoreList filename
  170. ##
  171. ## Names a file from which a list of externally-trusted hosts is read.
  172. ## These are hosts which are allowed to send mail through you for signing.
  173. ## Automatically contains 127.0.0.1. See man page for file format.
  174. # ExternalIgnoreList filename
  175. ## FixCRLF { yes | no }
  176. ##
  177. ## Requests that the library convert "naked" CR and LF characters to
  178. ## CRLFs during canonicalization. The default is "no".
  179. # FixCRLF no
  180. ## InternalHosts dataset
  181. ## default "127.0.0.1"
  182. ##
  183. ## Names a file from which a list of internal hosts is read. These are
  184. ## hosts from which mail should be signed rather than verified.
  185. ## Automatically contains 127.0.0.1.
  186. InternalHosts file:/etc/opendkim/InternalHosts
  187. ## KeepTemporaryFiles { yes | no }
  188. ## default "no"
  189. ##
  190. ## If set, causes temporary files generated during message signing or
  191. ## verifying to be left behind for debugging use. Not for normal operation;
  192. ## can fill your disks quite fast on busy systems.
  193. # KeepTemporaryFiles no
  194. ## KeyFile filename
  195. ## default (none)
  196. ##
  197. ## Specifies the path to the private key to use when signing. Ignored if
  198. ## SigningTable and KeyTable are used. No default; must be specified for
  199. ## signing if SigningTable/KeyTable are not in use.
  200. #KeyFile /var/db/dkim/example.private
  201. ## KeyTable dataset
  202. ## default (none)
  203. ##
  204. ## Defines a table that will be queried to convert key names to
  205. ## sets of data of the form (signing domain, signing selector, private key).
  206. ## The private key can either contain a PEM-formatted private key,
  207. ## a base64-encoded DER format private key, or a path to a file containing
  208. ## one of those.
  209. KeyTable file:/etc/opendkim/KeyTable
  210. ## LocalADSP dataset
  211. ## default (none)
  212. ##
  213. ## Allows specification of local ADSP overrides for domains. This should be
  214. ## a path to a file containing entries, one per line, with comments and
  215. ## blank lines allowed. An entry is of the form "domain:policy" where
  216. ## "domain" is either a fully-qualified domain name (e.g. "foo.example.com")
  217. ## or a subdomain name preceded by a period (e.g. ".example.com"), and
  218. ## "policy" is either "unknown", "all", or "discardable", as per the current
  219. ## ADSP draft specification. This allows local overrides of policies to
  220. ## enforce for domains which either don't publish ADSP or publish weaker
  221. ## policies than the verifier would like to enforce.
  222. # LocalADSP /etc/mail/local-adsp-rules
  223. ## LogWhy { yes | no }
  224. ## default "no"
  225. ##
  226. ## If logging is enabled (see Syslog below), issues very detailed logging
  227. ## about the logic behind the filter's decision to either sign a message
  228. ## or verify it. The logic behind the decision is non-trivial and can be
  229. ## confusing to administrators not familiar with its operation. A
  230. ## description of how the decision is made can be found in the OPERATIONS
  231. ## section of the opendkim(8) man page. This causes a large increase
  232. ## in the amount of log data generated for each message, so it should be
  233. ## limited to debugging use and not enabled for general operation.
  234. LogWhy yes
  235. ## MacroList macro[=value][,...]
  236. ##
  237. ## Gives a set of MTA-provided macros which should be checked to see
  238. ## if the sender has been determined to be a local user and therefore
  239. ## whether or not signing should be done. See opendkim.conf(5) for
  240. ## more information.
  241. # MacroList foo=bar,baz=blivit
  242. ## MaximumHeaders n
  243. ##
  244. ## Disallow messages whose header blocks are bigger than "n" bytes.
  245. ## Intended to detect and block a denial-of-service attack. The default
  246. ## is 65536. A value of 0 disables this test.
  247. # MaximumHeaders n
  248. ## MaximumSignaturesToVerify n
  249. ## (default 3)
  250. ##
  251. ## Verify no more than "n" signatures on an arriving message.
  252. ## A value of 0 means "no limit".
  253. # MaximumSignaturesToVerify n
  254. ## MaximumSignedBytes n
  255. ##
  256. ## Don't sign more than "n" bytes of the message. The default is to
  257. ## sign the entire message. Setting this implies "BodyLengths".
  258. # MaximumSignedBytes n
  259. ## MilterDebug n
  260. ##
  261. ## Request a debug level of "n" from the milter library. The default is 0.
  262. # MilterDebug 0
  263. ## Minimum n[% | +]
  264. ## default 0
  265. ##
  266. ## Sets a minimum signing volume; one of the following formats:
  267. ## n at least n bytes (or the whole message, whichever is less)
  268. ## must be signed
  269. ## n% at least n% of the message must be signed
  270. ## n+ if a length limit was presented in the signature, no more than
  271. ## n bytes may have been added
  272. # Minimum n
  273. ## MinimumKeyBits n
  274. ## default 1024
  275. ##
  276. ## Causes the library not to accept signatures matching keys made of fewer
  277. ## than the specified number of bits, even if they would otherwise pass
  278. ## DKIM signing.
  279. # MinimumKeyBits 1024
  280. ## Mode [sv]
  281. ## default sv
  282. ##
  283. ## Indicates which mode(s) of operation should be provided. "s" means
  284. ## "sign", "v" means "verify".
  285. # Mode sv
  286. ## MTA dataset
  287. ## default (none)
  288. ##
  289. ## Specifies a list of MTAs whos mail should always be signed rather than
  290. ## verified. The "mtaname" is extracted from the DaemonPortOptions line
  291. ## in effect.
  292. # MTA name
  293. ## MultipleSignatures { yes | no }
  294. ## default no
  295. ##
  296. ## Allows multiple signatures to be added. If set to "true" and a SigningTable
  297. ## is in use, all SigningTable entries that match the candidate message will
  298. ## cause a signature to be added. Otherwise, only the first matching
  299. ## SigningTable entry will be added, or only the key defined by Domain,
  300. ## Selector and KeyFile will be added.
  301. # MultipleSignatures no
  302. ## MustBeSigned dataset
  303. ## default (none)
  304. ##
  305. ## Defines a list of headers which, if present on a message, must be
  306. ## signed for the signature to be considered acceptable.
  307. # MustBeSigned header1,header2,...
  308. ## Nameservers addr1[,addr2[,...]]
  309. ## default (none)
  310. ##
  311. ## Provides a comma-separated list of IP addresses that are to be used when
  312. ## doing DNS queries to retrieve DKIM keys, ADSP policies, VBR records, etc.
  313. ## These override any local defaults built in to the resolver in use, which
  314. ## may be defined in /etc/resolv.conf or hard-coded into the software.
  315. # Nameservers addr1,addr2,...
  316. ## NoHeaderB { yes | no }
  317. ## default "no"
  318. ##
  319. ## Suppresses addition of "header.b" tags on Authentication-Results
  320. ## header fields.
  321. # NoHeaderB no
  322. ## OmitHeaders dataset
  323. ## default (none)
  324. ##
  325. ## Specifies a list of headers that should always be omitted when signing.
  326. ## Header names should be separated by commas.
  327. # OmitHeaders header1,header2,...
  328. ## On-...
  329. ##
  330. ## Specifies what to do when certain error conditions are encountered.
  331. ##
  332. ## See opendkim.conf(5) for more information.
  333. # On-Default
  334. # On-BadSignature
  335. # On-DNSError
  336. # On-InternalError
  337. # On-NoSignature
  338. # On-Security
  339. # On-SignatureError
  340. ## OversignHeaders dataset
  341. ## default (none)
  342. ##
  343. ## Specifies a set of header fields that should be included in all signature
  344. ## header lists (the "h=" tag) once more than the number of times they were
  345. ## actually present in the signed message. See opendkim.conf(5) for more
  346. ## information.
  347. # OverSignHeaders header1,header2,...
  348. ## PeerList dataset
  349. ## default (none)
  350. ##
  351. ## Contains a list of IP addresses, CIDR blocks, hostnames or domain names
  352. ## whose mail should be neither signed nor verified by this filter. See man
  353. ## page for file format.
  354. # PeerList filename
  355. ## PidFile filename
  356. ## default (none)
  357. ##
  358. ## Name of the file where the filter should write its pid before beginning
  359. ## normal operations.
  360. # PidFile filename
  361. ## POPDBFile dataset
  362. ## default (none)
  363. ##
  364. ## Names a database which should be checked for "POP before SMTP" records
  365. ## as a form of authentication of users who may be sending mail through
  366. ## the MTA for signing. Requires special compilation of the filter.
  367. ## See opendkim.conf(5) for more information.
  368. # POPDBFile filename
  369. ## Quarantine { yes | no }
  370. ## default "no"
  371. ##
  372. ## Indicates whether or not the filter should arrange to quarantine mail
  373. ## which fails verification. Intended for diagnostic use only.
  374. # Quarantine No
  375. ## QueryCache { yes | no }
  376. ## default "no"
  377. ##
  378. ## Instructs the DKIM library to maintain its own local cache of keys and
  379. ## policies retrieved from DNS, rather than relying on the nameserver for
  380. ## caching service. Useful if the nameserver being used by the filter is
  381. ## not local. The filter must be compiled with the QUERY_CACHE flag to enable
  382. ## this feature, since it adds a library dependency.
  383. # QueryCache No
  384. ## RedirectFailuresTo address
  385. ## default (none)
  386. ##
  387. ## Redirects signed messages to the specified address if none of the
  388. ## signatures present failed to verify.
  389. # RedirectFailuresTo postmaster@example.com
  390. ## RemoveARAll { yes | no }
  391. ## default "no"
  392. ##
  393. ## Remove all Authentication-Results: headers on all arriving mail.
  394. # RemoveARAll No
  395. ## RemoveARFrom dataset
  396. ## default (none)
  397. ##
  398. ## Remove all Authentication-Results: headers on all arriving mail that
  399. ## claim to have been added by hosts listed in this parameter. The list
  400. ## should be comma-separated. Entire domains may be specified by preceding
  401. ## the dopmain name by a single dot (".") character.
  402. # RemoveARFrom host1,host2,.domain1,.domain2,...
  403. ## RemoveOldSignatures { yes | no }
  404. ## default "no"
  405. ##
  406. ## Remove old signatures on messages, if any, when generating a signature.
  407. # RemoveOldSignatures No
  408. ## ReportAddress addr
  409. ## default (executing user)@(hostname)
  410. ##
  411. ## Specifies the sending address to be used on From: headers of outgoing
  412. ## failure reports. By default, the e-mail address of the user executing
  413. ## the filter is used.
  414. # ReportAddress "DKIM Error Postmaster" <postmaster@example.com>
  415. ## ReportBccAddress addr
  416. ## default (none)
  417. ##
  418. ## Specifies additional recipient address(es) to receive outgoing failure
  419. ## reports.
  420. # ReportBccAddress postmaster@example.com, john@example.com
  421. ## RequiredHeaders { yes | no }
  422. ## default no
  423. ##
  424. ## Rejects messages which don't conform to RFC5322 header count requirements.
  425. # RequiredHeaders No
  426. ## RequireSafeKeys { yes | no }
  427. ## default yes
  428. ##
  429. ## Refuses to use key files that appear to have unsafe permissions.
  430. # RequireSafeKeys Yes
  431. ## ResignAll { yes | no }
  432. ## default no
  433. ##
  434. ## Where ResignMailTo triggers a re-signing action, this flag indicates
  435. ## whether or not all mail should be signed (if set) versus only verified
  436. ## mail being signed (if not set).
  437. # ResignAll No
  438. ## ResignMailTo dataset
  439. ## default (none)
  440. ##
  441. ## Checks each message recipient against the specified dataset for a
  442. ## matching record. The full address is checked in each case, then the
  443. ## hostname, then each domain preceded by ".". If there is a match, the
  444. ## value returned is presumed to be the name of a key in the KeyTable
  445. ## (if defined) to be used to re-sign the message in addition to
  446. ## verifying it. If there is a match without a KeyTable, the default key
  447. ## is applied.
  448. # ResignMailTo dataset
  449. ## ResolverConfiguration string
  450. ##
  451. ## Passes arbitrary configuration data to the resolver. For the stock UNIX
  452. ## resolver, this is ignored; for Unbound, it names a resolv.conf(5)-style
  453. ## file that should be read for configuration information.
  454. # ResolverConfiguration string
  455. ## ResolverTracing { yes | no }
  456. ##
  457. ## Requests enabling of resolver trace features, if available. The effect
  458. ## of setting this flag depends on how trace features, if any, are implemented
  459. ## in the resolver in use. Currently only effective when used with the
  460. ## OpenDKIM asynchronous resolver.
  461. # ResolverTracing no
  462. ## Selector name
  463. ##
  464. ## The name of the selector to use when signing. No default; must be
  465. ## specified for signing.
  466. Selector default
  467. ## SendADSPReports { yes | no }
  468. ## default "no"
  469. ##
  470. ## Specifies whether or not the filter should generate report mail back
  471. ## to senders when the ADSP (Author Domain Signing Practises) check fails for
  472. ## a message. See opendkim.conf(5) for details.
  473. # SendADSPReports No
  474. ## SenderHeaders dataset
  475. ## default (none)
  476. ##
  477. ## Overrides the default list of headers that will be used to determine
  478. ## the sending domain for use when evaluating ADSP. See opendkim.conf(5)
  479. ## for details.
  480. SenderHeaders From
  481. ## SendReports { yes | no }
  482. ## default "no"
  483. ##
  484. ## Specifies whether or not the filter should generate report mail back
  485. ## to senders when verification fails and an address for such a purpose
  486. ## is provided. See opendkim.conf(5) for details.
  487. # SendReports No
  488. ## SignatureAlgorithm signalg
  489. ## default "rsa-sha256"
  490. ##
  491. ## Signature algorithm to use when generating signatures. Must be either
  492. ## "rsa-sha1" or "rsa-sha256".
  493. # SignatureAlgorithm rsa-sha256
  494. ## SignatureTTL seconds
  495. ## default "0"
  496. ##
  497. ## Specifies the lifetime in seconds of signatures generated by the
  498. ## filter. A value of 0 means no expiration time is included in the
  499. ## signature.
  500. # SignatureTTL 0
  501. ## SignHeaders dataset
  502. ## default (none)
  503. ##
  504. ## Specifies the list of headers which should be included when generating
  505. ## signatures. The string should be a comma-separated list of header names.
  506. ## See the opendkim.conf(5) man page for more information.
  507. # SignHeaders header1,header2,...
  508. ## SigningTable dataset
  509. ## default (none)
  510. ##
  511. ## Defines a dataset that will be queried for the message sender's address
  512. ## to determine which private key(s) (if any) should be used to sign the
  513. ## message. The sender is determined from the value of the sender
  514. ## header fields as described with SenderHeaders above. The key for this
  515. ## lookup should be an address or address pattern that matches senders;
  516. ## see the opendkim.conf(5) man page for more information. The value
  517. ## of the lookup should return the name of a key found in the KeyTable
  518. ## that should be used to sign the message. If MultipleSignatures
  519. ## is set, all possible lookup keys will be attempted which may result
  520. ## in multiple signatures being applied.
  521. SigningTable refile:/etc/opendkim/SigningTable
  522. ## SingleAuthResult { yes | no}
  523. ## default "no"
  524. ##
  525. ## When DomainKeys verification is enabled, multiple Authentication-Results
  526. ## will be added, one for DK and one for DKIM. With this enabled, only
  527. ## a DKIM result will be reported unless DKIM failed but DK passed, in which
  528. ## case only a DK result will be reported.
  529. # SingleAuthResult no
  530. ## SMTPURI uri
  531. ##
  532. ## Specifies a URI (e.g., "smtp://localhost") to which mail should be sent
  533. ## via SMTP when notifications are generated.
  534. # Socket smtp://localhost
  535. ## Socket socketspec
  536. ##
  537. ## Names the socket where this filter should listen for milter connections
  538. ## from the MTA. Required. Should be in one of these forms:
  539. ##
  540. ## inet:port@address to listen on a specific interface
  541. ## inet:port to listen on all interfaces
  542. ## local:/path/to/socket to listen on a UNIX domain socket
  543. Socket inet:8891@localhost
  544. ## SoftwareHeader { yes | no }
  545. ## default "no"
  546. ##
  547. ## Add a DKIM-Filter header field to messages passing through this filter
  548. ## to identify messages it has processed.
  549. SoftwareHeader yes
  550. ## StrictHeaders { yes | no }
  551. ## default "no"
  552. ##
  553. ## Requests that the DKIM library refuse to process a message whose
  554. ## header fields do not conform to the standards, in particular Section 3.6
  555. ## of RFC5322.
  556. # StrictHeaders no
  557. ## StrictTestMode { yes | no }
  558. ## default "no"
  559. ##
  560. ## Selects strict CRLF mode during testing (see the "-t" command line
  561. ## flag in the opendkim(8) man page). Messages for which all header
  562. ## fields and body lines are not CRLF-terminated are considered malformed
  563. ## and will produce an error.
  564. # StrictTestMode no
  565. ## SubDomains { yes | no }
  566. ## default "no"
  567. ##
  568. ## Sign for subdomains as well?
  569. # SubDomains No
  570. ## Syslog { yes | no }
  571. ## default "yes"
  572. ##
  573. ## Log informational and error activity to syslog?
  574. Syslog Yes
  575. ## SyslogFacility facility
  576. ## default "mail"
  577. ##
  578. ## Valid values are :
  579. ## auth cron daemon kern lpr mail news security syslog user uucp
  580. ## local0 local1 local2 local3 local4 local5 local6 local7
  581. ##
  582. ## syslog facility to be used
  583. SyslogFacility mail
  584. ## SyslogSuccess { yes | no }
  585. ## default "no"
  586. ##
  587. ## Log success activity to syslog?
  588. # SyslogSuccess No
  589. ## TemporaryDirectory path
  590. ## default /tmp
  591. ##
  592. ## Specifies which directory will be used for creating temporary files
  593. ## during message processing.
  594. # TemporaryDirectory /tmp
  595. ## TestPublicKeys filename
  596. ## default (none)
  597. ##
  598. ## Names a file from which public keys should be read. Intended for use
  599. ## only during automated testing.
  600. # TestPublicKeys /tmp/testkeys
  601. ## TrustAnchorFile filename
  602. ## default (none)
  603. ##
  604. ## Specifies a file from which trust anchor data should be read when doing
  605. ## DNS queries and applying the DNSSEC protocol. See the Unbound documentation
  606. ## at http://unbound.net for the expected format of this file.
  607. # TrustAnchorFile /var/named/trustanchor
  608. ## UMask mask
  609. ## default (none)
  610. ##
  611. ## Change the process umask for file creation to the specified value.
  612. ## The system has its own default which will be used (usually 022).
  613. ## See the umask(2) man page for more information.
  614. # UMask 022
  615. ## UnboundConfigFile filename
  616. ## default (none)
  617. ##
  618. ## Specifies a configuration file to be passed to the Unbound library that
  619. ## performs DNS queries applying the DNSSEC protocol. See the Unbound
  620. ## documentation at http://unbound.net for the expected content of this file.
  621. ## The results of using this and the TrustAnchorFile setting at the same
  622. ## time are undefined.
  623. # UnboundConfigFile /var/named/unbound.conf
  624. ## Userid userid
  625. ## default (none)
  626. ##
  627. ## Change to user "userid" before starting normal operation? May include
  628. ## a group ID as well, separated from the userid by a colon.
  629. # UserID userid