Eu tenho tentado fazer o opendkim / postfix trabalhar em um Ubuntu 16.04.3 LTS máquina por várias horas. Eu fiz isso antes em outros servidores e funcionou bem (seguindo este guia link ) mas eu não posso, para a vida de mim, trabalhar nisso. Eu recebo uma terminação com o sinal 11 do opendkim sempre que um email que precisa ser assinado é postado:
Syslog relevante:
tail -f syslog | grep opendkim
Oct 22 22:51:16 myserver opendkim[25800]: terminated with signal 11, restarting
Oct 22 22:51:16 myserver postfix/cleanup[26566]: warning: milter local:/opendkim/opendkim.sock: can't read SMFIC_EOH reply packet header: Succ ess
Oct 22 22:51:16 myserver kernel: opendkim[26031]: segfault at 0 ip 00007f5c36f4c746 sp 00007f5c31183098 error 4 in libc-2.23.so[7f5c36ec1000+1 c0000]
Oct 22 22:51:16 myserver opendkim[26658]: OpenDKIM Filter v2.10.3 starting (args: -x /etc/opendkim.conf -u opendkim -P /var/run/opendkim/opend kim.pid -p local:/var/spool/postfix/opendkim/opendkim.sock)
Oct 22 22:51:35 myserver opendkim[26658]: configuration reloaded from /etc/opendkim.conf
/etc/opendkim.conf
# This is a basic configuration that can easily be adapted to suit a standard
# installation. For more advanced options, see opendkim.conf(5) and/or
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.
# Log to syslog
Syslog yes
# Required to use local socket with MTAs that access the socket as a non-
# privileged user (e.g. Postfix)
UMask 002
# OpenDKIM user
# Remember to add user postfix to group opendkim
UserID opendkim
# Map domains in From addresses to keys used to sign messages
KeyTable /etc/opendkim/key.table
SigningTable refile:/etc/opendkim/signing.table
# Hosts to ignore when verifying signatures
ExternalIgnoreList /etc/opendkim/trusted.hosts
InternalHosts /etc/opendkim/trusted.hosts
# Commonly-used options; the commented-out versions show the defaults.
Canonicalization relaxed/simple
Mode sv
SubDomains no
#ADSPAction continue
AutoRestart yes
AutoRestartRate 10/1M
Background yes
DNSTimeout 5
SignatureAlgorithm rsa-sha256
# Always oversign From (sign using actual From and a null From to prevent
# malicious signatures header fields (From and/or others) between the signer
# and the verifier. From is oversigned by default in the Debian pacakge
# because it is often the identity key used by reputation systems and thus
# somewhat security sensitive.
OversignHeaders From
/ etc / default / opendkim
# Command-line options specified here will override the contents of
# /etc/opendkim.conf. See opendkim(8) for a complete list of options.
#DAEMON_OPTS=""
#
# Uncomment to specify an alternate socket
# Note that setting this will override any Socket value in opendkim.conf
# default:
SOCKET="local:/var/spool/postfix/opendkim/opendkim.sock"
# listen on all interfaces on port 54321:
#SOCKET="inet:54321"
# listen on loopback on port 12345:
#SOCKET="inet:12345@localhost"
# listen on 192.0.2.1 on port 12345:
#SOCKET="inet:[email protected]"
** bit relevante de /etc/postfix/main.cf
# Milter configuration
# OpenDKIM
milter_default_action = accept
# Postfix ≥ 2.6 milter_protocol = 6, Postfix ≤ 2.5 milter_protocol = 2
milter_protocol = 6
smtpd_milters = local:/opendkim/opendkim.sock
non_smtpd_milters = local:/opendkim/opendkim.sock
Estou no meu ponto de vista com este e estou sem ideias do que tentar em seguida.