From ef10f547846f0e18231fc220b72166e29fa5614e Mon Sep 17 00:00:00 2001 From: polytan02 Date: Sun, 8 Feb 2015 18:12:25 +0000 Subject: [PATCH 1/3] Update dkim.md --- dkim.md | 125 ++++++++++++++++++++++++++++++++++++++------------------ 1 file changed, 86 insertions(+), 39 deletions(-) diff --git a/dkim.md b/dkim.md index 9caff281..fdd6c2d9 100644 --- a/dkim.md +++ b/dkim.md @@ -4,29 +4,45 @@ Hi, Please note that : - This is the revision 2 of this Work In Progress How-To - Until this is natively integrated in YnH core apps, it will mean to that postfix conf will be blocked (or each time there is a change some configuration lines will need to be added to the end of /etc/postfix/main.cf) - To be fully functionnal DKIM requires a modification of the DNS, which propagantion can take up to 24h - CREDIT : This tutorial has been initially based on the DKMI section of : http://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/ from Drew Crawford - CREDIT : This tutorial has been reviewed based on https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-dkim-with-postfix-on-debian-wheezy from Popute Sebastian Armin - Replace DOMAIN.TLD by your own domain name +This is the revision 2 of this Work In Progress How-To + +Until this is natively integrated in YnH core apps, it will mean to that postfix conf will be blocked (or each time there is a change some configuration lines will need to be added to the end of /etc/postfix/main.cf) + +To be fully functionnal DKIM requires a modification of the DNS, which propagantion can take up to 24h + +CREDIT : This tutorial has been initially based on the DKMI section of : http://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/ from Drew Crawford +CREDIT : This tutorial has been reviewed based on + +https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-dkim-with-postfix-on-debian-wheezy from Popute Sebastian Armin + +Replace DOMAIN.TLD by your own domain name Changes in rev 2 : - Much easier to manage more than one DOMAIN.TLD (future proof) - Updated configuration as it seemed that the previous one was based on old software +Much easier to manage more than one DOMAIN.TLD (future proof) +Updated configuration as it seemed that the previous one was based on old software So, here is the thing : +Solution 1 : Fully automatic script : (single domain) +```bash +git clone https://github.com/polytan02/yunohost_auto_config_basic +sudo ./yunohost_auto_config_basic/5_opendkim.sh +``` - We start by installing the right software : +Solution 2 : All by hand ! +We start by installing the right software : +```bash sudo aptitude install opendkim opendkim-tools +``` - Then we configure opendkim - +Then we configure opendkim +```bash sudo nano /etc/opendkim.conf -(Text to be placed in the text file: ) +``` +Text to be placed in the text file: +```bash AutoRestart Yes AutoRestartRate 10/1h UMask 022 @@ -50,70 +66,101 @@ UserID opendkim:opendkim Socket inet:8891@127.0.0.1 Selector mail +``` - Connect the milter to Postfix: - +Connect the milter to Postfix: +```bash sudo nano /etc/default/opendkim +``` -(Text to be placed in the text file: ) +Text to be placed in the text file: +```bash SOCKET="inet:8891@localhost" +``` - Configure postfix to use this milter: - +Configure postfix to use this milter: +```bash sudo nano /etc/postfix/main.cf +``` + +Text to be placed AT THE END in the text file: +```bash +# OpenDKIM milter -(Text to be placed AT THE END in the text file: ) milter_protocol = 2 milter_default_action = accept smtpd_milters = inet:127.0.0.1:8891 non_smtpd_milters = inet:127.0.0.1:8891 +``` - Create a directory structure that will hold the trusted hosts, key tables, signing tables and crypto keys: - +Create a directory structure that will hold the trusted hosts, key tables, signing tables and crypto keys: +```bash sudo mkdir -pv /etc/opendkim/keys/DOMAIN.TLD +``` - Specify trusted hosts: - +Specify trusted hosts: +```bash sudo nano /etc/opendkim/TrustedHosts +``` -(Text to be placed in the text file: ) +Text to be placed in the text file: +```bash 127.0.0.1 localhost 192.168.0.1/24 *.DOMAIN.TLD +``` - Create a key table: - +Create a key table: +```bash sudo nano /etc/opendkim/KeyTable +``` -(Text to be placed in the text file: Be very careful, it needs to be on a SINGLE LINE for each domain ) +Text to be placed in the text file: Be very careful, it needs to be on a SINGLE LINE for each domain +```bash mail._domainkey.DOMAIN.TLD DOMAIN.TLD:mail:/etc/opendkim/keys/DOMAIN.TLD/mail.private +``` - Create a signing table: - +Create a signing table: +```bash sudo nano /etc/opendkim/SigningTable +``` -(Text to be placed in the text file: ) +Text to be placed in the text file: +```bash *@DOMAIN.TLD mail._domainkey.DOMAIN.TLD +``` - Now we generate the keys ! smile - +Now we generate the keys ! smile +```bash sudo cd /etc/opendkim/keys/DOMAIN.TLD sudo opendkim-genkey -s mail -d DOMAIN.TLD +``` - Output the DKIM DNS line to the terminal. Then, we install it on our DNS server. My ZONE file looks like this. (Be very careful with the formatting, the "p=...." needs to be in a single line. - +Output the DKIM DNS line to the terminal. Then, we install it on our DNS server. My ZONE file looks like this. (Be very careful with the formatting, the "p=...." needs to be in a single line. +```bash cat mail.txt mail._domainkey IN TXT "v=DKIM1; k=rsa; p=AAAKKUHGCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPFrBM54eXlZPXLJ7EFphiA8qGAcgu4lWuzhzxDDcIHcnA/fdklG2gol1B4r27p87rExxz9hZehJclaiqlaD8otWt8r/UdrAUYNLKNBFGHJ875467jstoAQAB" ; ----- DKIM key mail for DOMAIN.TLD +``` - And we don't forget to put the right rights otherwise opendkim will get grumpy... - +And we don't forget to put the right rights otherwise opendkim will get grumpy... +```bash chown -Rv opendkim:opendkim /etc/opendkim* +``` - And finally, we restart everything : - sudo service opendkim restart - sudo service postfix restart +And finally, we restart everything : +```bash +sudo service opendkim restart +sudo service postfix restart +``` - To test if it is all working well (don't forget that the DNS propagation can take a bit of take....) you can simply send an email to check-auth@verifier.port25.com and a reply will be received. If everything works correctly you should see DKIM check: pass under Summary of Results. +To test if it is all working well (don't forget that the DNS propagation can take a bit of take....) you can simply send an email to check-auth@verifier.port25.com and a reply will be received. If everything works correctly you should see DKIM check: pass under Summary of Results. + +You can also go to http://www.mail-tester.com + +Lastly, don't forget to add a SPF key in your DNS such as : +```bash +DOMAIN.TLD 300 TXT "v=spf1 a:DOMAIN.TLD mx ?all" +``` From 18b54f34f7b702170e4a0a1868ef28b6e72c35f8 Mon Sep 17 00:00:00 2001 From: M5oul Date: Sun, 8 Feb 2015 20:43:27 +0100 Subject: [PATCH 2/3] Update dkim.md Relecture --- dkim.md | 49 +++++++++++++++++++++++-------------------------- 1 file changed, 23 insertions(+), 26 deletions(-) diff --git a/dkim.md b/dkim.md index fdd6c2d9..3c784cae 100644 --- a/dkim.md +++ b/dkim.md @@ -1,37 +1,34 @@ - - -Hi, +# DKIM Please note that : -This is the revision 2 of this Work In Progress How-To +This is the revision 2 of this Work In Progress How-To. -Until this is natively integrated in YnH core apps, it will mean to that postfix conf will be blocked (or each time there is a change some configuration lines will need to be added to the end of /etc/postfix/main.cf) +Until this is natively integrated in YunoHost core apps, it will mean to that Postfix configuration will be blocked (or each time there is a change some configuration lines will need to be added to the end of /etc/postfix/main.cf). -To be fully functionnal DKIM requires a modification of the DNS, which propagantion can take up to 24h +To be fully functionnal DKIM requires a modification of the DNS, which propagantion can take up to 24h. -CREDIT : This tutorial has been initially based on the DKMI section of : http://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/ from Drew Crawford -CREDIT : This tutorial has been reviewed based on +Source: This tutorial has been initially based on the DKMI section of: http://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/ from Drew Crawford. -https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-dkim-with-postfix-on-debian-wheezy from Popute Sebastian Armin +Source: This tutorial has been reviewed based on https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-dkim-with-postfix-on-debian-wheezy from Popute Sebastian Armin -Replace DOMAIN.TLD by your own domain name +Replace DOMAIN.TLD by your own domain name. -Changes in rev 2 : +Changes in rev 2: -Much easier to manage more than one DOMAIN.TLD (future proof) -Updated configuration as it seemed that the previous one was based on old software +Much easier to manage more than one DOMAIN.TLD (future proof). +Updated configuration as it seemed that the previous one was based on old software. -So, here is the thing : -Solution 1 : Fully automatic script : (single domain) +So, here is the thing: +### With a script +Fully automatic script: (single domain) ```bash git clone https://github.com/polytan02/yunohost_auto_config_basic sudo ./yunohost_auto_config_basic/5_opendkim.sh ``` -Solution 2 : All by hand ! - -We start by installing the right software : +### Manually +We start by installing the right software: ```bash sudo aptitude install opendkim opendkim-tools ``` @@ -78,12 +75,12 @@ Text to be placed in the text file: SOCKET="inet:8891@localhost" ``` -Configure postfix to use this milter: +Configure Postfix to use this milter: ```bash sudo nano /etc/postfix/main.cf ``` -Text to be placed AT THE END in the text file: +Text to be placed **at the end** in the text file: ```bash # OpenDKIM milter @@ -116,7 +113,7 @@ Create a key table: sudo nano /etc/opendkim/KeyTable ``` -Text to be placed in the text file: Be very careful, it needs to be on a SINGLE LINE for each domain +Text to be placed in the text file: be very careful, it needs to be on a **single line** for each domain. ```bash mail._domainkey.DOMAIN.TLD DOMAIN.TLD:mail:/etc/opendkim/keys/DOMAIN.TLD/mail.private ``` @@ -131,13 +128,13 @@ Text to be placed in the text file: *@DOMAIN.TLD mail._domainkey.DOMAIN.TLD ``` -Now we generate the keys ! smile +Now we generate the keys! smile ```bash sudo cd /etc/opendkim/keys/DOMAIN.TLD sudo opendkim-genkey -s mail -d DOMAIN.TLD ``` -Output the DKIM DNS line to the terminal. Then, we install it on our DNS server. My ZONE file looks like this. (Be very careful with the formatting, the "p=...." needs to be in a single line. +Output the DKIM DNS line to the terminal. Then, we install it on our DNS server. My ZONE file looks like this. (Be very careful with the formatting, the "p=...." needs to be in a single line.) ```bash cat mail.txt @@ -149,17 +146,17 @@ And we don't forget to put the right rights otherwise opendkim will get grumpy.. chown -Rv opendkim:opendkim /etc/opendkim* ``` -And finally, we restart everything : +And finally, we restart everything: ```bash sudo service opendkim restart sudo service postfix restart ``` -To test if it is all working well (don't forget that the DNS propagation can take a bit of take....) you can simply send an email to check-auth@verifier.port25.com and a reply will be received. If everything works correctly you should see DKIM check: pass under Summary of Results. +To test if it is all working well (don't forget that the DNS propagation can take a bit of takeā€¦) you can simply send an email to check-auth@verifier.port25.com and a reply will be received. If everything works correctly you should see DKIM check: pass under Summary of Results. You can also go to http://www.mail-tester.com -Lastly, don't forget to add a SPF key in your DNS such as : +Lastly, don't forget to add a SPF key in your DNS such as: ```bash DOMAIN.TLD 300 TXT "v=spf1 a:DOMAIN.TLD mx ?all" ``` From 34d22a1af9c727bdd7b13631794fb3e5f7bb9786 Mon Sep 17 00:00:00 2001 From: bacardi55 Date: Thu, 12 Feb 2015 13:37:12 +0100 Subject: [PATCH 3/3] add apps to wishlist wisemapping and hi buddy --- apps.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/apps.md b/apps.md index fff6d8f0..f838078f 100644 --- a/apps.md +++ b/apps.md @@ -195,6 +195,7 @@ The following list is a compiled wishlist of applications that would be nice-to- * [Guacamole](http://guac-dev.org/) * [h5ai](http://larsjung.de/h5ai/) * [Headphones](https://github.com/rembo10/headphones) +* [Hi Buddy](http://hibuddy.monkeypatch.me/) * [ikiwiki](http://ikiwiki.info/) * [img.bi](https://img.bi/) * [Inbox](https://www.inboxapp.com/) @@ -239,4 +240,5 @@ The following list is a compiled wishlist of applications that would be nice-to- * [Webmpc](https://github.com/ushis/webmpc) * [WebODF](http://webodf.org/) * [webSync](http://furier.github.io/websync/) -* [ZNC](http://wiki.znc.in/ZNC) \ No newline at end of file +* [Wisemapping](http://www.wisemapping.com/) +* [ZNC](http://wiki.znc.in/ZNC)