summaryrefslogtreecommitdiffstats
path: root/opendkim (follow)
AgeCommit message (Collapse)AuthorFilesLines
2024-07-13opendkim: Check additional headers to determine senderMalfurious1-0/+1
Despite the default semantics for `InternalHosts` option in opendkim.conf, OpenDKIM seems to generally only consider the labeled sender of a message when deciding whether to sign a message or validate. This means that previously, when a message was sent to a mailing list from a domain outside of the mailnode host, the copies of this message that the list sent out did not get a signature applied to them. Since we will usually be injecting headers for mailing list information, we can search these first to determine the message envelope sender. X-Mailing-List will be the list's full address. Sender is added just in case. Advice is taken from the "Mailing Lists" section of http://www.opendkim.org/opendkim-README Signed-off-by: Malfurious <m@lfurio.us>
2024-07-09opendkim: Disable syslogMalfurious1-2/+2
Signed-off-by: Malfurious <m@lfurio.us>
2024-07-09opendkim: Configure postfix milter socketMalfurious1-5/+1
Signed-off-by: Malfurious <m@lfurio.us>
2024-07-09opendkim: Configure signing parametersMalfurious1-3/+3
We use a hard-coded key selector of "default" and store keyfiles in the dkim volume. `Domain` indicates the mail sources for which mail should be signed rather than verified. Because we are using ENV_VIRTUAL_DOMAINS in this context, we now require the variable to be comma separated (no whitespace), as that is what this file requires. All previous usages of ENV_VIRTUAL_DOMAINS are compatible with comma separation. Signed-off-by: Malfurious <m@lfurio.us>
2024-07-09opendkim: Add default config fileMalfurious1-0/+51
Signed-off-by: Malfurious <m@lfurio.us>