Code: Alles auswählen
default._domainkey.meinedomain.com. 2994 IN TXT "v=DKIM1\; k=rsa\; " "p=MIGfMA0..."
Code: Alles auswählen
default._domainkey.simonszu.de. 3600 IN TXT "v=DKIM1\; k=rsa\; p=MIGfMA0...."
Code: Alles auswählen
default._domainkey.meinedomain.com. 2994 IN TXT "v=DKIM1\; k=rsa\; " "p=MIGfMA0..."
Code: Alles auswählen
default._domainkey.simonszu.de. 3600 IN TXT "v=DKIM1\; k=rsa\; p=MIGfMA0...."
Code: Alles auswählen
k=rsa; t=s; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCBuVStHqwOmbBS6gv09KrHzOeQ9v0Y8t2XGvVxAR6Cb8G6NQyf1C2bj2WuSjvSkEZu+xu817XZVZfM4RWfN83vYIdSV47dG6ctjQsMxvhtLPmS+uhKS6MG9KeN4fdTrXNOZNwp6nYEQciVS03jv6C3a3FQStFCGDsKcpKkz4ePwIDAQAB
Code: Alles auswählen
dig -t txt default._domainkey.simonszu.de.
; <<>> DiG 9.9.4-RedHat-9.9.4-38.el7_3.2 <<>> -t txt default._domainkey.simonszu .de.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52071
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;default._domainkey.simonszu.de. IN TXT
;; ANSWER SECTION:
default._domainkey.simonszu.de. 3600 IN TXT "k=rsa\; t=s\; p=MIGfMA0GCSqGSIb 3DQEBAQUAA4GNADCBiQKBgQDCBuVStHqwOmbBS6gv09KrHzOeQ9v0Y8t2XGvVxAR6Cb8G6NQyf1C2bj2 WuSjvSkEZu+xu817XZVZfM4RWfN83vYIdSV47dG6ctjQsMxvhtLPmS+uhKS6MG9KeN4fdTrXNOZNwp6n YEQciVS03jv6C3a3FQStFCGDsKcpKkz4ePwIDAQAB"
Aus irgendeinem Grund schickt mein Server die Mails also immer noch mit falschem Hostnamen raus. Ich habe keine Ahnung, wieso das so ist. Die Config vom dkimproxy kennst du ja schon, hier ist mal die Config von meinem OpenSMTPdDKIM Information:
DKIM Signature
Message contains this DKIM Signature:
DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=tharan.simonszu.de; h=
mime-version:frommessage-id:subject:to:content-type; s=
default; bh=ti3MGZZ3obJf8PQdoYdQDG2boeo=; b=ek6Q2yHAJSIxbLUlbTwg
eY5yHRzE1DAN5rDWBOH6iM+QR7w4LGIyJ10COJeKKWB1j+wZ6vnd6pd7UAosWk7A
OupGg/4xXVKFsi1odbURl/Zrflf+KxVCGvpMUh5tEHGi1Gn8rBDC1ZSxp19hN11U
xV1eU6bE7dKaabb73oxcGpI=
Signature Information:
v= Version: 1
a= Algorithm: rsa-sha1
c= Method: simple
d= Domain: tharan.simonszu.de
s= Selector: default
q= Protocol:
bh= ti3MGZZ3obJf8PQdoYdQDG2boeo=
h= Signed Headers: mime-version:frommessage-id:subject:to:content-type
b= Data: ek6Q2yHAJSIxbLUlbTwg
eY5yHRzE1DAN5rDWBOH6iM+QR7w4LGIyJ10COJeKKWB1j+wZ6vnd6pd7UAosWk7A
OupGg/4xXVKFsi1odbURl/Zrflf+KxVCGvpMUh5tEHGi1Gn8rBDC1ZSxp19hN11U
xV1eU6bE7dKaabb73oxcGpI=
Public Key DNS Lookup
Building DNS Query for default._domainkey.tharan.simonszu.de
Retrieved this publickey from DNS:
Validating Signature
result = invalid
Details: public key: not available
Code: Alles auswählen
# This is the smtpd server system-wide configuration file.
# See smtpd.conf(5) for more information.
# Load keys and certs for TLS
pki simonszu.de key "/etc/ssl/private/mail.key"
pki simonszu.de certificate "/etc/ssl/certs/mail.crt"
### INTERFACES LISTEN DIRECTIVES ###
# Listen on localhost
listen on localhost
# Listen on the port where dkimproxy will hand in dkim-ed mail and tag them as DKIM_OUT
listen on localhost port 10029 tag DKIM_OUT
# Listen on plain SMTP port 25
# Usually used for other MXes submitting their mails to us
listen on eth0 port 25 hostname tharan.simonszu.de tls pki simonszu.de
# Listen on SMTP with TLS port 587
# Usually used by our mailclients to connect with auth
listen on eth0 port 587 hostname tharan.simonszu.de tls-require pki simonszu.de auth mask-source
### VIRTUAL STUFF ###
# If you edit the file, you have to run "smtpctl update table aliases"
table valiases file:/etc/mail/valiases
table vdomains file:/etc/mail/vdomains
table aliases file:/etc/aliases
### RULES FOR ACCEPTING MAILS ###
# This catches from external submitted mails to any of our <valiases> and <vdomains> which are routed as these files say
# deliver to mbox is obsolete since the catchall in valiases forwards them to gmail but the syntax requires it anyways
accept from any for domain <vdomains> virtual <valiases> deliver to mbox
# This catches all mails (local generated or submitted via TLS-auth) wich are addressed to any of our local <valiases>
# They are delivered like the rules in <valiases> say
accept from local for local virtual <valiases> deliver to mbox
# This catches all local generated mails (or submitted via TLS-auth) which are not addressed to any of <valiases>
# They are relayed via DNS resolving and MX
# The from local is default and can be omitted but it is here for clearness
# Mails coming from dkimproxy are tagged DKIM_OUT. Only accept these
accept tagged DKIM_OUT from local for any relay
# Send un-dkim-ed mails to dkimproxy
accept from local for any relay via smtp://127.0.0.1:10028
# Relay any local generated mails
# accept from local for any relay
# Any mails from external sources which are also routed to external sources are not catched at all
# They are denied for spam prevention
### SNIPPETS FOR SPAMASSASSIN ###
# Listen on port 10026, where spamassassin dumps its checked mails and tag them
#listen on lo port 10026 tag Filtered
# Accept every external mail from us and forward them to spamassassin
#accept from any for domain "simonszu.de" relay via "smtp://127.0.0.1:10025"
# Accept filtered mails from spamassassin for us and deliver it
# accept tagged Filtered for any alias <aliases> deliver to mbox
Code: Alles auswählen
127.0.0.1 localhost
127.0.1.1 tharan.simonszu.de simonszu.de tharan
# The following lines are desirable for IPv6 capable hosts
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
Code: Alles auswählen
opendkim-genkey -s default -d simonszu.de
Code: Alles auswählen
DKIM Information:
DKIM Signature
Message contains this DKIM Signature:
DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=simonszu.de; h=mime-version
:from:date:message-id:subject:to:content-type; s=default; bh=3gQ
Q8wA8SviSLWSaJVKF+OJo7HE=; b=ojJppRW04OmKboJtD93fxskDE5C/tIp1hFZ
eUZp38jTuAz1iteuAvx3mHAfcTrRKiPcIU+efkgFHRt08XaFFdVtecm7veeRWkXy
YAUcGS3AmpuvUQeDGZROnYnQ7W5D4pWfda8OH686rbAzpv9GARPP40SOPNPflwD2
LsTubp+s=
Signature Information:
v= Version: 1
a= Algorithm: rsa-sha1
c= Method: simple
d= Domain: simonszu.de
s= Selector: default
q= Protocol:
bh= 3gQ
Q8wA8SviSLWSaJVKF+OJo7HE=
h= Signed Headers: mime-version
:from:date:message-id:subject:to:content-type
b= Data: ojJppRW04OmKboJtD93fxskDE5C/tIp1hFZ
eUZp38jTuAz1iteuAvx3mHAfcTrRKiPcIU+efkgFHRt08XaFFdVtecm7veeRWkXy
YAUcGS3AmpuvUQeDGZROnYnQ7W5D4pWfda8OH686rbAzpv9GARPP40SOPNPflwD2
LsTubp+s=
Public Key DNS Lookup
Building DNS Query for default._domainkey.simonszu.de
Retrieved this publickey from DNS: v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCphDkASrfcHfB+V1MJAf/uZQYG9YzSrUl6g2V47dZrgpF1TSG8ZyP9f8RVMyt7Q/67XLQxgWPvbcpnCakuHO88A5UE5xG3Ds+Dev6r/w70OnOvHOui4Y1egUJgX4pWyiaLwozRf54RtudjpH0/Ydm7DDIXtC3eE5QZbVi9uwqx3wIDAQAB
Validating Signature
result = fail
Details: bad RSA signature
Code: Alles auswählen
# opendkim-testkey -d simonszu.de -k private.key -s default -vvvvv
opendkim-testkey: key loaded from private.key
opendkim-testkey: checking key 'default._domainkey.simonszu.de'
opendkim-testkey: key not secure
opendkim-testkey: key OK