Bonjour,
J’ai un problème avec la configuration du reverse dns de mon instance Yunohost, pour l’envoi de mail.
Je pense que je me suis un peu emmêler les pinceaux avec les enregistrements dns.
Je n’ai pas modifié de fichiers de configuration liés aux mails.
Je ne sais pas trop quoi modifier pour régler le problème.
Merci pour vos réponses.
Mon reverse dns est comme ceci :
hostname .domaine.fr
Mon fichier /etc/hostname :
hostname
Mon fichier /etc/hosts :
127.0.0.1 localhost.localdomain localhost
Ipv4 hostname .domain.fr hostname
J’ai bien 10/10 sur mail-tester, mais avec le message suivant :
La recherche ou la résolution de la reverse DNS (rDNS) permet de déterminer si un nom de domaine est associé à l'adresse IP donnée.
Quelques entreprises comme AOL rejetteront tout message envoyé d'un serveur sans rDNS, vous devez vous assurer d'en avoir une.
Vous ne pouvez pas associer plus d'un nom de domaine à une adresse IP unique.
Votre adresse IP **ipv4** est associée au nom de domaine **hostname.domain.fr** .
Néanmoins votre message semble être envoyé de **domain.fr** .
Vous devriez publier un enregistrement de pointeur DNS (Type PTR) avec la valeur suivante **domain.fr** ou utiliser **hostname.domain.fr** comme nom d'hôte dans votre logiciel de messagerie.
Voici les valeurs testées pour cette vérification :
IP: ipv4
HELO: domain.fr
rDNS: hostname.domain.fr
Sur mxtoolbox j’ai le message suivant :
Category | Host | Result | ||
---|---|---|---|---|
smtp | hostname .domain.fr | Reverse DNS does not match SMTP Banner |
Mon fichier /etc/postfix/main.cf :
See /usr/share/postfix/main.cf.dist for a commented, more complete version
Debian specific: Specifying a file name will cause the first
line of that file to be used as the name. The Debian default
is /etc/mailname.
#myorigin = /etc/mailname
smtpd_banner = $myhostname Service ready
biff = noappending .domain is the MUA’s job.
append_dot_mydomain = no
Uncomment the next line to generate “delayed mail” warnings
#delay_warning_time = 4h
readme_directory = no
– TLS for incoming connections
By default, TLS is disabled in the Postfix SMTP server, so no difference to
plain Postfix is visible. Explicitly switch it on with “smtpd_tls_security_level = may”.
smtpd_tls_security_level=may
Sending AUTH data over an unencrypted channel poses a security risk.
When TLS layer encryption is optional (“smtpd_tls_security_level = may”), it
may however still be useful to only offer AUTH when TLS is active. To maintain
compatibility with non-TLS clients, the default is to accept AUTH without
encryption. In order to change this behavior, we set “smtpd_tls_auth_only = yes”.
smtpd_tls_auth_only=yes
smtpd_tls_cert_file = /etc/yunohost/certs/domain.fr/crt.pem
smtpd_tls_key_file = /etc/yunohost/certs/domain.fr/key.pem
smtpd_tls_exclude_ciphers = aNULL, MD5, DES, ADH, RC4, 3DES
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtpd_tls_loglevel=1
smtpd_tls_mandatory_protocols=!SSLv2,!SSLv3
smtpd_tls_mandatory_ciphers=high
smtpd_tls_eecdh_grade = ultra– TLS for outgoing connections
Use TLS if this is supported by the remote SMTP server, otherwise use plaintext.
smtp_tls_security_level=may
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
smtp_tls_exclude_ciphers = $smtpd_tls_exclude_ciphers
smtp_tls_mandatory_ciphers= $smtpd_tls_mandatory_ciphers
smtp_tls_loglevel=1Configure Root CA certificates
(for example, avoids getting “Untrusted TLS connection established to” messages in logs)
smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crtSee /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for
information on enabling SSL in the smtp client.
myhostname = domain .fr
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
mydomain = domain .fr
mydestination = localhost
relayhost =
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128
mailbox_command = procmail -a “$EXTENSION”
mailbox_size_limit = 0
recipient_delimiter = +
inet_interfaces = allFit to the maximum message size to 30mb, more than allowed by GMail or Yahoo
message_size_limit = 31457280
Virtual Domains Control
virtual_mailbox_domains = ldap:/etc/postfix/ldap-domains.cf
virtual_mailbox_maps = ldap:/etc/postfix/ldap-accounts.cf
virtual_mailbox_base =
virtual_alias_maps = ldap:/etc/postfix/ldap-aliases.cf
virtual_alias_domains =
virtual_minimum_uid = 100
virtual_uid_maps = static:vmail
virtual_gid_maps = static:mail
smtpd_sender_login_maps= ldap:/etc/postfix/ldap-accounts.cfDovecot LDA
virtual_transport = dovecot
dovecot_destination_recipient_limit = 1Enable SASL authentication for the smtpd daemon
smtpd_sasl_auth_enable = yes
smtpd_sasl_type = dovecot
smtpd_sasl_path = private/authFix some outlook’s bugs
broken_sasl_auth_clients = yes
Reject anonymous connections
smtpd_sasl_security_options = noanonymous
smtpd_sasl_local_domain =Wait until the RCPT TO command before evaluating restrictions
smtpd_delay_reject = yes
Basics Restrictions
smtpd_helo_required = yes
strict_rfc821_envelopes = yesRequirements for the connecting server
smtpd_client_restrictions =
permit_mynetworks,
permit_sasl_authenticated,
reject_rbl_client bl .spamcop.net,
reject_rbl_client cbl .abuseat.org,
reject_rbl_client zen .spamhaus.org,
permitRequirements for the HELO statement
smtpd_helo_restrictions =
permit_mynetworks,
permit_sasl_authenticated,
reject_non_fqdn_hostname,
reject_invalid_hostname,
permitRequirements for the sender address
smtpd_sender_restrictions =
reject_sender_login_mismatch,
permit_mynetworks,
permit_sasl_authenticated,
reject_non_fqdn_sender,
reject_unknown_sender_domain,
permitRequirement for the recipient address
smtpd_recipient_restrictions =
permit_mynetworks,
permit_sasl_authenticated,
reject_non_fqdn_recipient,
reject_unknown_recipient_domain,
reject_unauth_destination,
permitSRS
sender_canonical_maps = tcp:localhost:10001
sender_canonical_classes = envelope_sender
recipient_canonical_maps = tcp:localhost:10002
recipient_canonical_classes= envelope_recipient,header_recipientIgnore some headers
smtp_header_checks = regexp:/etc/postfix/header_checks
smtp_reply_filter = pcre:/etc/postfix/smtp_reply_filter
Rmilter
milter_mail_macros = i {mail_addr} {client_addr} {client_name} {auth_authen}
milter_protocol = 6
smtpd_milters = inet:localhost:11332Skip email without checking if milter has died
milter_default_action = accept
Mes enregistrements dns :
@ 3600 IN SOA ns0 .online.net. hostmaster .online.net. 20190417061003 10800 3600 604800 3600
@ 3600 IN CAA 128 issue “letsencrypt .org”
@ 3600 IN A ipv4
hostname 3600 IN A ipv4
** 3600 IN A ipv4
@ 3600 IN MX 10 hostname .domaine.fr.
@ 3600 IN TXT “v=spf1 a mx ip4:ipv4 ~all”
mail._domainkey 3600 IN TXT “v=DKIM1; h=sha256; k=rsa; p=clé”
_dmarc 3600 IN TXT “v=DMARC1; p=reject; XXXXX”
_domainkey 3600 IN TXT “o=-; r=postmaster @domain.fr”
Matériel: Serveur dédié Oneprovider Debian 9.8
Version de YunoHost:
yunohost3.5.2.1 (stable)
yunohost-admin 3.5.2 (stable)
moulinette 3.5.2 (stable)
ssowat 3.5.2.1 (stable)
Êtes-vous dans un contexte particulier ou avez-vous effectué des modificiations particulières sur votre instance ? : non