Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

81 rinda
2.8KB

  1. {{ansible_managed|comment}}
  2. # This is a basic configuration that can easily be adapted to suit a standard
  3. # installation. For more advanced options, see opendkim.conf(5) and/or
  4. # /usr/share/doc/opendkim/examples/opendkim.conf.sample.
  5. # Log to syslog
  6. Syslog yes
  7. # Required to use local socket with MTAs that access the socket as a non-
  8. # privileged user (e.g. Postfix)
  9. UMask 007
  10. #KeyTable /etc/opendkim/KeyTable
  11. #SigningTable /etc/opendkim/SigningTable
  12. #ExternalIgnoreList /etc/opendkim/TrustedHosts
  13. #InternalHosts /etc/opendkim/TrustedHosts
  14. # Commonly-used options; the commented-out versions show the defaults.
  15. #Canonicalization simple
  16. #Mode sv
  17. #SubDomains no
  18. # Socket smtp://localhost
  19. #
  20. # ## Socket socketspec
  21. # ##
  22. # ## Names the socket where this filter should listen for milter connections
  23. # ## from the MTA. Required. Should be in one of these forms:
  24. # ##
  25. # ## inet:port@address to listen on a specific interface
  26. # ## inet:port to listen on all interfaces
  27. # ## local:/path/to/socket to listen on a UNIX domain socket
  28. #
  29. #Socket inet:8892@localhost
  30. Socket local:/var/run/opendkim/opendkim.sock
  31. ## PidFile filename
  32. ### default (none)
  33. ###
  34. ### Name of the file where the filter should write its pid before beginning
  35. ### normal operations.
  36. #
  37. PidFile /var/run/opendkim/opendkim.pid
  38. # Always oversign From (sign using actual From and a null From to prevent
  39. # malicious signatures header fields (From and/or others) between the signer
  40. # and the verifier. From is oversigned by default in the Debian pacakge
  41. # because it is often the identity key used by reputation systems and thus
  42. # somewhat security sensitive.
  43. OversignHeaders From
  44. ## ResolverConfiguration filename
  45. ## default (none)
  46. ##
  47. ## Specifies a configuration file to be passed to the Unbound library that
  48. ## performs DNS queries applying the DNSSEC protocol. See the Unbound
  49. ## documentation at http://unbound.net for the expected content of this file.
  50. ## The results of using this and the TrustAnchorFile setting at the same
  51. ## time are undefined.
  52. ## In Debian, /etc/unbound/unbound.conf is shipped as part of the Suggested
  53. ## unbound package
  54. # ResolverConfiguration /etc/unbound/unbound.conf
  55. ## TrustAnchorFile filename
  56. ## default (none)
  57. ##
  58. ## Specifies a file from which trust anchor data should be read when doing
  59. ## DNS queries and applying the DNSSEC protocol. See the Unbound documentation
  60. ## at http://unbound.net for the expected format of this file.
  61. TrustAnchorFile /usr/share/dns/root.key
  62. ## Userid userid
  63. ### default (none)
  64. ###
  65. ### Change to user "userid" before starting normal operation? May include
  66. ### a group ID as well, separated from the userid by a colon.
  67. #
  68. UserID opendkim