Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
opendkim /
[ HOME SHELL ]
Name
Size
Permission
Action
examples
[ DIR ]
drwxr-xr-x
FEATURES.gz
1.89
KB
-rw-r--r--
KNOWNBUGS
1.01
KB
-rw-r--r--
NEWS.Debian.gz
1.41
KB
-rw-r--r--
README.Debian.gz
2.34
KB
-rw-r--r--
README.LDAP.gz
1.79
KB
-rw-r--r--
README.SQL.gz
1.81
KB
-rw-r--r--
README.Sendmail
297
B
-rw-r--r--
README.gz
5.1
KB
-rw-r--r--
README.opendkim.gz
13.03
KB
-rw-r--r--
README.specs.html
4.2
KB
-rw-r--r--
changelog.Debian.gz
2.69
KB
-rw-r--r--
chroot
2.75
KB
-rw-r--r--
copyright
9.71
KB
-rw-r--r--
opendkim.ldif
1020
B
-rw-r--r--
opendkim.schema
1.13
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : chroot
OPENDKIM CHROOT NOTES ===================== Contributed by Andreas Schulze Running opendkim chroot adds an additional layer of complexity. It is disabled by default. Only advanced users only should try to enable that special configuration. To successfull setup a chroot jail you must configure opendkim to run *without* that restriction first! enabling chroot jail ==================== chroot is enabled by adding "ChangeRootDirectory /path/to/chroot" to opendkim.conf. Then you must restart opendkim. setting up syslog ================= opendkim requieres a syslog socket inside the chroot. You have to edit your syslog daemon configuration. for rsyslog: $AddUnixListenSocket /path/to/chroot/dev/log" for syslog-ng: unix-dgram("/path/to/chroot/dev/log"); After restarting the syslog daemon you may want to check if the syslog socket is really present. test -S /path/to/chroot/dev/log || echo "socket missing" setting up resolving ==================== The next point is only required if opendkim is compiled with the optional code option "USE_UNBOUND" and you activated "ResolverConfiguration" in opendkim.conf. Then you must place the unbound configuration file inside /path/to/chroot. If your unbound.conf includes other files such dnssec keys, these file must also be placed inside /path/to/chroot. opendkim.conf: ResolverConfiguration /inside_chroot/unbound.conf setup entropie ============== opendkim needs access to /dev/random or a similiar random generator. for linux: install -d /path/to/chroot/dev/ mknod --mode 666 /path/to/chroot/dev/random c 1 8 simple signing setup ==================== opendkim.conf: Mode s Domain example.org Selector default KeyFile /real/path/to/keyfile In this case no further action is required. more complex signing setup ========================== opendkim.conf: Mode s SigningTable refile:/real/path/to/signingtable KeyTable file:/real/path/to/keytable /real/path/to/signingtable: *@example.org examplekey /real/path/to/keytable: examplekey example.org:default:/inside_chroot/key.private You have to put your signing keys inside /path/to/chroot. Validation ========== validation requires additional libraries to fetch keys from dns. To copy the right libraries into the chroot you may use scripts provided by postfix. download the postfix source tarball from a mirror listed at www.postfix.org/download.html. The directory examples/chroot-setup contain scripts to setup a postfixchroot for many platforms. At least the script LINUX2 is perfect to setup a chroot for opendkim too: POSTFIX_DIR=/path/to/dkim-chroot export POSTFIX_DIR sh -x /path/to/postfix-source/examples/chroot-setup/LINUX2 Users of other platforms are invided to share their solution on the opendkim-users mailing-list. ==
Close