opendkim terminado com sinal 11

0

Eu tenho tentado fazer o opendkim / postfix trabalhar em um Ubuntu 16.04.3 LTS máquina por várias horas. Eu fiz isso antes em outros servidores e funcionou bem (seguindo este guia link ) mas eu não posso, para a vida de mim, trabalhar nisso. Eu recebo uma terminação com o sinal 11 do opendkim sempre que um email que precisa ser assinado é postado:

Syslog relevante:

tail -f syslog | grep opendkim
Oct 22 22:51:16 myserver opendkim[25800]: terminated with signal 11, restarting
Oct 22 22:51:16 myserver postfix/cleanup[26566]: warning: milter local:/opendkim/opendkim.sock: can't read SMFIC_EOH reply packet header: Succ                                                              ess
Oct 22 22:51:16 myserver kernel: opendkim[26031]: segfault at 0 ip 00007f5c36f4c746 sp 00007f5c31183098 error 4 in libc-2.23.so[7f5c36ec1000+1                                                              c0000]
Oct 22 22:51:16 myserver opendkim[26658]: OpenDKIM Filter v2.10.3 starting (args: -x /etc/opendkim.conf -u opendkim -P /var/run/opendkim/opend                                                              kim.pid -p local:/var/spool/postfix/opendkim/opendkim.sock)
Oct 22 22:51:35 myserver opendkim[26658]: configuration reloaded from /etc/opendkim.conf

/etc/opendkim.conf

# This is a basic configuration that can easily be adapted to suit a standard
# installation. For more advanced options, see opendkim.conf(5) and/or
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.

# Log to syslog
Syslog                  yes
# Required to use local socket with MTAs that access the socket as a non-
# privileged user (e.g. Postfix)
UMask                   002
# OpenDKIM user
# Remember to add user postfix to group opendkim
UserID                  opendkim

# Map domains in From addresses to keys used to sign messages
KeyTable                /etc/opendkim/key.table
SigningTable            refile:/etc/opendkim/signing.table

# Hosts to ignore when verifying signatures
ExternalIgnoreList      /etc/opendkim/trusted.hosts
InternalHosts           /etc/opendkim/trusted.hosts

# Commonly-used options; the commented-out versions show the defaults.
Canonicalization        relaxed/simple
Mode                    sv
SubDomains              no
#ADSPAction             continue
AutoRestart             yes
AutoRestartRate         10/1M
Background              yes
DNSTimeout              5
SignatureAlgorithm      rsa-sha256

# Always oversign From (sign using actual From and a null From to prevent
# malicious signatures header fields (From and/or others) between the signer
# and the verifier.  From is oversigned by default in the Debian pacakge
# because it is often the identity key used by reputation systems and thus
# somewhat security sensitive.
OversignHeaders         From

/ etc / default / opendkim

# Command-line options specified here will override the contents of
# /etc/opendkim.conf. See opendkim(8) for a complete list of options.
#DAEMON_OPTS=""
#
# Uncomment to specify an alternate socket
# Note that setting this will override any Socket value in opendkim.conf
# default:
SOCKET="local:/var/spool/postfix/opendkim/opendkim.sock"
# listen on all interfaces on port 54321:
#SOCKET="inet:54321"
# listen on loopback on port 12345:
#SOCKET="inet:12345@localhost"
# listen on 192.0.2.1 on port 12345:
#SOCKET="inet:[email protected]"

** bit relevante de /etc/postfix/main.cf

# Milter configuration
# OpenDKIM
milter_default_action = accept
# Postfix ≥ 2.6 milter_protocol = 6, Postfix ≤ 2.5 milter_protocol = 2
milter_protocol = 6
smtpd_milters = local:/opendkim/opendkim.sock
non_smtpd_milters = local:/opendkim/opendkim.sock

Estou no meu ponto de vista com este e estou sem ideias do que tentar em seguida.

    
por nemmy 23.10.2017 / 05:01

0 respostas