1. Juliano Silva

    Juliano Silva Member

    Joined:
    Oct 15, 2017
    Messages:
    136
    Likes Received:
    0
    Hello

    After several testing DKIM 26 port not working how to solve this problem?

    Gmail, I asked DKIM settings
     
  2. ChFin

    ChFin Member
    Proxmox VE Subscriber

    Joined:
    Jan 30, 2018
    Messages:
    49
    Likes Received:
    11
    @tom I suppose that should be moved to the email forum.
     
  3. ChFin

    ChFin Member
    Proxmox VE Subscriber

    Joined:
    Jan 30, 2018
    Messages:
    49
    Likes Received:
    11
    What exactly is not working?
     
  4. tom

    tom Proxmox Staff Member
    Staff Member

    Joined:
    Aug 29, 2006
    Messages:
    12,899
    Likes Received:
    320
    yes, I moved the thread.
     
  5. snowman66

    snowman66 Member

    Joined:
    Dec 1, 2010
    Messages:
    253
    Likes Received:
    1
    Maybe this:

    DKIM keys works are like this: You create a public key and a private key. The public key is published on your DNS records as a TXT record, on the other side your emails are signed with your private key, when you send an email the recipient server check your DNS record for the public key for example "default._domainkey" and it verifies the DKIM. There is nothing related with connecting directly to the server. (source: https://serverfault.com/questions/594517/dkim-do-i-need-to-allow-port-8891-on-my-firewall )


    or this:
    https://forum.proxmox.com/threads/proxmox-dkim.41150/
     
  6. Juliano Silva

    Juliano Silva Member

    Joined:
    Oct 15, 2017
    Messages:
    136
    Likes Received:
    0
    Yes, I see that PMG does not support DKIM I'm going to cancel port 26, I'm having a lot of problems with gmail over DKIM
     
  7. Juliano Silva

    Juliano Silva Member

    Joined:
    Oct 15, 2017
    Messages:
    136
    Likes Received:
    0
  8. Juliano Silva

    Juliano Silva Member

    Joined:
    Oct 15, 2017
    Messages:
    136
    Likes Received:
    0
    Hello

    PMG /etc/postfix/main.cf does not accept custom settings? I'm having problems whenever I restart postfix by losing customization

    /etc/postfix/main.cf

    milter_protocol = 2
    milter_default_action = accept
    smtpd_milters = inet:localhost.:8891
    non_smtpd_milters = inet:localhotst:8891
     
  9. tom

    tom Proxmox Staff Member
    Staff Member

    Joined:
    Aug 29, 2006
    Messages:
    12,899
    Likes Received:
    320
    Read our documentation on chapter:

    "4.3 Service Configuration Templates"
     
  10. ChFin

    ChFin Member
    Proxmox VE Subscriber

    Joined:
    Jan 30, 2018
    Messages:
    49
    Likes Received:
    11
    use milter protocol 6 / put the smtpd_milter in master.conf / use local socket (see also /etc/default/opendkim)
    main.cf template:
    miler_default_action = accept
    milter_protocol = 6
    smtpd_milters =
    non_smtp_milters = local:/var/run/opendkim/opendkim.sock


    master.cf template:
    127.0.0.1:10025 . . .
    . . .
    -o smtpd_milters=local:/var/run/opendkim/opendkim.sock


    opendkim.conf:
    Code:
    Syslog               yes
    #SyslogSuccess       yes
    #LogWhy              yes
    UMask                002
    SigningTable         refile:/etc/opendkim/signing.table
    KeyTable             /etc/opendkim/key.table
    SignatureAlgorithm   rsa-sha256
    Canonicalization     relaxed/simple
    Mode                 s
    AutoRestart          yes
    AutoRestartRate      10/1h
    Socket               local:/var/run/opendkim/opendkim.sock
    PidFile              /var/run/opendkim/opendkim.pid
    OversignHeaders      From
    TrustAnchorFile      /usr/share/dns/root.key
    UserID               opendkim:opendkim            
    

    signing.table
    *@domain1.com key1
    *@domain2.com key2
    *@pmg.domain2.com key2


    key.table (e.g. selector 201802)
    key1 domain1.com:201802:/etc/dkimkeys/201802.domain1.com.private
    key2 domain2.com:201802:/etc/dkimkeys/201802.domain2.com.private


    Keys generation:
    cd /etc/dkimkeys
    opendkim-genkey -s 201802 -b 2048 -h sha256 -d domain1.com
    mv 201802.private 201802.domain1.com.private
    mv 201802.txt 201802.domain1.com.txt


    /etc/dkimkeys
    Code:
    chown -R opendkim:opendkim /etc/dkimkeys/
    *** InternalHosts is always 127.0.0.1 ***
    *** trys to sign every email (outgoing/incoming emails are both injected to 10025 / lookup for (incoming and) outgoing is done via signing table ***
    *** does not work for emails that were sent to external mailbox AND when you get them from that mailbox via fetchmail ***
     
    #10 ChFin, Feb 26, 2018
    Last edited: Feb 26, 2018
  11. Juliano Silva

    Juliano Silva Member

    Joined:
    Oct 15, 2017
    Messages:
    136
    Likes Received:
    0
    Hi

    How to create this main.cf template?


    root@security:/etc/postfix# ls
    clientaccess main.cf.proto postfix-files.d rcptaccess.db
    clientaccess.db main.cf.save postfix-script sasl
    dkim makedefs.out post-install senderaccess
    dynamicmaps.cf master.cf postscreen_access senderaccess.db
    dynamicmaps.cf.d master.cf.proto postscreen_access.db
    main.cf postfix-files rcptaccess
     
  12. ChFin

    ChFin Member
    Proxmox VE Subscriber

    Joined:
    Jan 30, 2018
    Messages:
    49
    Likes Received:
    11
    RTFM:
    You can find the default templates in /var/lib/pmg/templates/.
    Copy the templates you need to /etc/pmg/templates/, then apply your changes there.
    After that run:
    # pmgconfig sync --restart 1

    => see 4.3. Service Configuration Templates
     
  13. tom

    tom Proxmox Staff Member
    Staff Member

    Joined:
    Aug 29, 2006
    Messages:
    12,899
    Likes Received:
    320
  14. heutger

    heutger Active Member

    Joined:
    Apr 25, 2018
    Messages:
    206
    Likes Received:
    62
    Seems to be able to be done via CLI, however, some adjustments I accept via CLI, but that should be manageable via GUI
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice