|
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980 |
- {{ansible_managed|comment}}
-
- # This is a basic configuration that can easily be adapted to suit a standard
- # installation. For more advanced options, see opendkim.conf(5) and/or
- # /usr/share/doc/opendkim/examples/opendkim.conf.sample.
-
- # Log to syslog
- Syslog yes
- # Required to use local socket with MTAs that access the socket as a non-
- # privileged user (e.g. Postfix)
- UMask 007
-
- #KeyTable /etc/opendkim/KeyTable
- #SigningTable /etc/opendkim/SigningTable
- #ExternalIgnoreList /etc/opendkim/TrustedHosts
- #InternalHosts /etc/opendkim/TrustedHosts
-
- # Commonly-used options; the commented-out versions show the defaults.
- #Canonicalization simple
- #Mode sv
- #SubDomains no
-
- # Socket smtp://localhost
- #
- # ## Socket socketspec
- # ##
- # ## Names the socket where this filter should listen for milter connections
- # ## from the MTA. Required. Should be in one of these forms:
- # ##
- # ## inet:port@address to listen on a specific interface
- # ## inet:port to listen on all interfaces
- # ## local:/path/to/socket to listen on a UNIX domain socket
- #
- #Socket inet:8892@localhost
- Socket local:/var/run/opendkim/opendkim.sock
-
- ## PidFile filename
- ### default (none)
- ###
- ### Name of the file where the filter should write its pid before beginning
- ### normal operations.
- #
- PidFile /var/run/opendkim/opendkim.pid
-
- # Always oversign From (sign using actual From and a null From to prevent
- # malicious signatures header fields (From and/or others) between the signer
- # and the verifier. From is oversigned by default in the Debian pacakge
- # because it is often the identity key used by reputation systems and thus
- # somewhat security sensitive.
- OversignHeaders From
-
- ## ResolverConfiguration filename
- ## default (none)
- ##
- ## Specifies a configuration file to be passed to the Unbound library that
- ## performs DNS queries applying the DNSSEC protocol. See the Unbound
- ## documentation at http://unbound.net for the expected content of this file.
- ## The results of using this and the TrustAnchorFile setting at the same
- ## time are undefined.
- ## In Debian, /etc/unbound/unbound.conf is shipped as part of the Suggested
- ## unbound package
-
- # ResolverConfiguration /etc/unbound/unbound.conf
-
- ## TrustAnchorFile filename
- ## default (none)
- ##
- ## Specifies a file from which trust anchor data should be read when doing
- ## DNS queries and applying the DNSSEC protocol. See the Unbound documentation
- ## at http://unbound.net for the expected format of this file.
-
- TrustAnchorFile /usr/share/dns/root.key
-
- ## Userid userid
- ### default (none)
- ###
- ### Change to user "userid" before starting normal operation? May include
- ### a group ID as well, separated from the userid by a colon.
- #
- UserID opendkim
|