Line 764: |
Line 764: |
| Set "Select Sort Method (for multi-drop) to 'Received' or 'for' | | Set "Select Sort Method (for multi-drop) to 'Received' or 'for' |
| As described at [[bugzilla:5602]] [[bugzilla:6483]] | | As described at [[bugzilla:5602]] [[bugzilla:6483]] |
| + | |
| + | {{WIP box|trex1512}} |
| + | ===Domain Authentication=== |
| + | Major mail hosting companies (Google, Yahoo, Microsoft) have made domain-authentication mandatory so as to not mark incoming mail as spam. |
| + | |
| + | To facilitate this support for DomainKeys and DKIM signing needs to be enabled in SME's mail subsystem. These techniques require the adding of records in the DNS zone for the user's domain. The DKIM/DK/SPF/SenderID configuration has to be added to your your DNS server / registrar. |
| + | |
| + | A plugin has been written and is available in SME |
| + | to activate it: |
| + | |
| + | create a folder |
| + | mkdir /var/service/qpsmtpd/config/dkimkeys/ |
| + | and then |
| + | cd /var/service/qpsmtpd/config/dkimkeys/ |
| + | openssl genrsa -out dkim.private 1024 |
| + | openssl rsa -in dkim.private -pubout -out dkim.public |
| + | chown qpsmtpd:qpsmtp -R /var/service/qpsmtpd/config/dkimkeys/ |
| + | chmod 0700 dkim.private |
| + | and for each domain you want to sign |
| + | cp -a dkim.private domainename.ext.private |
| + | then create a fragment: |
| + | mkdir --parent /etc/e-smith/templates-custom/var/service/qpsmtpd/config/peers/local |
| + | echo "dkim_sign">/etc/e-smith/templates-custom/var/service/qpsmtpd/config/peers/local/69dkim_sign |
| + | signal-event email-update |
| + | |
| + | finally propagate your public key "dkim.public" content (<key text>) your DNS, check with your DNS server / registrar |
| + | |
| + | default._domainkey.domain.ext IN TXT "k=rsa; p=<key text>; t=y" |
| | | |
| ==External Access== | | ==External Access== |