Back | Home
الـ Path الحالي: /home/picotech/domains/instantly.picotech.app/public_html/public/uploads/../../../../../../.././etc
الملفات الموجودة في هذا الـ Path:
.
..
.etckeeper
.git
.gitignore
.pwd.lock
ImageMagick-6
NetworkManager
PackageKit
UPower
X11
acpi
adduser.conf
aliases
aliases.db
alternatives
apache2
apparmor
apparmor.d
apport
apt
awstats
bash.bashrc
bash_completion
bash_completion.d
bind
bindresvport.blacklist
binfmt.d
byobu
ca-certificates
ca-certificates.conf
ca-certificates.conf.dpkg-old
clamav
cloud
console-setup
cron.d
cron.daily
cron.hourly
cron.monthly
cron.weekly
crontab
cruft
cryptsetup-initramfs
crypttab
dbus-1
dconf
debconf.conf
debian_version
default
deluser.conf
depmod.d
dhcp
dictionaries-common
dkim-domains.txt
dkim-keytable
dkim-signingtable
dkim.key
dkimkeys
dovecot
dpkg
e2scrub.conf
emacs
environment
environment.d
etckeeper
ethertypes
fail2ban
firewalld
fonts
fstab
ftpusers
fuse.conf
fwupd
gai.conf
ghostscript
groff
group
group-
grub.d
gshadow
gshadow-
gss
gtk-3.0
hdparm.conf
host.conf
hostname
hosts
hosts.allow
hosts.deny
init.d
initramfs-tools
inputrc
insserv.conf.d
iproute2
iscsi
issue
issue.net
jailkit
kernel
ld.so.cache
ld.so.conf
ld.so.conf.d
ldap
legal
letsencrypt
libaudit.conf
libblockdev
libnl-3
libpaper.d
lighttpd
locale.alias
locale.gen
localtime
logcheck
login.defs
logrotate.conf
logrotate.d
lsb-release
lvm
lynx
machine-id
magic
magic.mime
mail
mailcap
mailcap.order
mailname
manpath.config
mdadm
milter-greylist
mime.types
mke2fs.conf
modprobe.d
modules
modules-load.d
monit
mtab
multipath
multipath.conf
mysql
nanorc
needrestart
netconfig
netplan
network
networkd-dispatcher
networks
newt
nftables.conf
nsswitch.conf
opendkim.conf
opt
os-release
overlayroot.conf
pam.conf
pam.d
papersize
passwd
passwd-
perl
php
pki
pm
polkit-1
pollinate
postfix
postgrey
ppp
procmailrc
profile
profile.d
proftpd
protocols
python3
python3.10
qemu
quotagrpadmins
quotatab
rc0.d
rc1.d
rc2.d
rc3.d
rc4.d
rc5.d
rc6.d
rcS.d
redis
resolv.conf
resolvconf
rmt
rpc
rsyslog.conf
rsyslog.d
sasldb2
screenrc
security
selinux
sensors.d
sensors3.conf
services
sgml
shadow
shadow-
shells
skel
sos
spamassassin
ssh
ssl
subgid
subuid
sudo.conf
sudo_logsrvd.conf
sudoers
sudoers.d
supervisor
sysctl.conf
sysctl.d
systemd
terminfo
thermald
timezone
tmpfiles.d
ubuntu-advantage
ucf.conf
udev
udisks2
ufw
update-manager
update-motd.d
usb_modeswitch.conf
usermin
vim
virtualmin-license
vmware-tools
vtrgb
warnquota.conf
webmin
wgetrc
xattr.conf
xdg
xml
zsh_command_not_found
مشاهدة ملف: opendkim.conf
# This is a basic configuration for signing and verifying. It can easily be
# adapted to suit a basic installation. See opendkim.conf(5) and
# /usr/share/doc/opendkim/examples/opendkim.conf.sample for complete
# documentation of available configuration parameters.
Syslog yes
SyslogSuccess yes
#LogWhy no
# Common signing and verification parameters. In Debian, the "From" header is
# oversigned, because it is often the identity key used by reputation systems
# and thus somewhat security sensitive.
Canonicalization relaxed/simple
#Mode sv
#SubDomains no
OversignHeaders From
# Signing domain, selector, and key (required). For example, perform signing
# for domain "example.com" with selector "2020" (2020._domainkey.example.com),
# using the private key stored in /etc/dkimkeys/example.private. More granular
# setup options can be found in /usr/share/doc/opendkim/README.opendkim.
Domain /etc/dkim-domains.txt
Selector 202408
KeyFile /etc/dkim.key
# In Debian, opendkim runs as user "opendkim". A umask of 007 is required when
# using a local socket with MTAs that access the socket as a non-privileged
# user (for example, Postfix). You may need to add user "postfix" to group
# "opendkim" in that case.
UserID opendkim
UMask 007
# Socket for the MTA connection (required). If the MTA is inside a chroot jail,
# it must be ensured that the socket is accessible. In Debian, Postfix runs in
# a chroot in /var/spool/postfix, therefore a Unix socket would have to be
# configured as shown on the last line below.
Socket inet:8891@127.0.0.1
#Socket inet:8891@localhost
#Socket inet:8891
#Socket local:/var/spool/postfix/opendkim/opendkim.sock
PidFile /run/opendkim/opendkim.pid
# Hosts for which to sign rather than verify, default is 127.0.0.1. See the
# OPERATION section of opendkim(8) for more information.
#InternalHosts 192.168.0.0/16, 10.0.0.0/8, 172.16.0.0/12
# The trust anchor enables DNSSEC. In Debian, the trust anchor file is provided
# by the package dns-root-data.
TrustAnchorFile /usr/share/dns/root.key
#Nameservers 127.0.0.1
SigningTable refile:/etc/dkim-signingtable
KeyTable /etc/dkim-keytable