mouss wrote:
> > So is there anyway we can achieve domainkeys authentication on port 25?
>
> smtpd_client_restrictions =
>       check_client_access pcre:/etc/postfix/filter_outbound
>       permit_mynetworks
>       permit_sasl_authenticated
>       check_client_access pcre:/etc/postfix/filter_inbound
>
> == filter_outbound
> # pass to "outbound" filter
> /./   FILTER scan:[127.0.0.1]:10586
>
> == filter_inbound
> # pass to "inbound" filter
> /./   FILTER scan:[127.0.0.1]:10024
>
> if you wonder what that does:
> - if mail comes from mynetworks or is sasl authenticated, then it is
> passed to port 10586
> - otherwise, it is passed to port 10024


Right. Then on the amavisd-new side (amavisd.conf):

$inet_socket_port = [10024,10586];
$interface_policy{'10586'} = 'ORIGINATING';

$enable_dkim_signing = 1;
$enable_dkim_verification = 1;
dkim_key('example.org', 'myselector', '/var/db/dkim/mykey1.pem');
dkim_key('example.net', 'mysel2',     '/var/db/dkim/mykey2.pem');

$policy_bank{'ORIGINATING'} = {  # mail originates from our users
  originating => 1,  # permits DKIM signing (among other things)
    # force MTA conversion to 7-bit before DKIM signing
    # to avoid later conversions, destroying signature:
  smtpd_discard_ehlo_keywords => ['8BITMIME'],
}


If you haven't already made DKIM signing keys, amavisd can
do it for you:

# amavisd genrsa /var/db/dkim/mykey1.pem
# amavisd genrsa /var/db/dkim/mykey2.pem

and after adding dkim_key() lines to amavisd.conf, show them in
a format directly suitable for inclusion into a DNS zone file:

# amavisd showkeys

and after updating DNS zone file and reloading zone:

# amavisd testkeys

Reload amavisd, all done. More in RELEASE_NOTES.


  Mark

Reply via email to