1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85
|
; This is YOU. DMARC reports include information about the reports. Enter it here.
[organization]
domain = example.com
org_name = My Great Company
email = noreply@example.com
extra_contact_info = http://www.example.com/dmarc-policy/
; aggregate DMARC reports need to be stored somewhere. Any database
; with a DBI module (MySQL, SQLite, DBD, etc.) should work.
; SQLite, MySQL and Postgresql are supported.
; Default is sqlite.
[report_store]
backend = SQL
dsn = dbi:SQLite:dbname=dmarc_reports.sqlite
;dsn = dbi:mysql:database=dmarc_report;host=db;port=3306
;dsn = dbi:Pg:database=dmarc_report;port=5432
user =
pass =
; when validating DMARC messages, reports are not saved by default. This
; enables 'save by default'
auto_save = 0
; Sign outgoing report emails with DKIM
; Options match those which would be passed
; to Mail::DKIM::Signer
[report_sign]
algorithm = rsa-sha1
method = relaxed
domain = signer.example.com
selector = dkim
keyfile = /path/to/private.key
[report_sending]
; minimum reporting interval in seconds: default: none
; min_interval = 3600
;
; maximum reporting interval in seconds: default: none
; max_interval = 86400
; backend can be perl or libopendmarc
[dmarc]
backend = perl
[dns]
timeout = 5
; On Debian systems, the public suffix list is provided by the
; publicsuffix package and is used here. If you prefer to use a
; private copy of this file, update the path here and run
; dmarc_update_public_suffix_list to install the current content from
; https://publicsuffix.org/
public_suffix_list = /usr/share/publicsuffix/public_suffix_list.dat
[smtp]
; hostname is the external FQDN of this MTA
hostname = mail.example.com
cc = set.this@for.a.while.example.com
; list IP addresses to whitelist (bypass DMARC reject/quarantine)
; see sample whitelist in share/dmarc_whitelist
whitelist = /path/to/etc/dmarc_whitelist
; By default, we attempt to email directly to the report recipient.
; Set these to relay via a SMTP smart host.
smarthost =
smartuser =
smartpass =
[imap]
server = mail.example.com
user =
pass =
; the imap folder where new dmarc messages will be found
folder = dmarc
; the folders to store processed reports (a=aggregate, f=forensic)
f_done = dmarc.forensic
a_done = dmarc.aggregate
[http]
port = 8080
[https]
port = 8443
ssl_crt =
ssl_key =
|