@@ -239,35 +239,37 @@ from the chatmail relay server.
239239Email domain authentication (DKIM)
240240~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
241241
242- Chatmail relays enforce
243- `DKIM <https://www.rfc-editor.org/rfc/rfc6376 >`_ to authenticate
244- incoming emails. Incoming emails must have a valid DKIM signature with
242+ Chatmail relays enforce :rfc: `DKIM <6376 >` to authenticate incoming emails.
243+ Incoming emails must have a valid DKIM signature with
245244Signing Domain Identifier (SDID, ``d= `` parameter in the DKIM-Signature
246245header) equal to the ``From: `` header domain. This property is checked
247246by OpenDKIM screen policy script before validating the signatures. This
248- correpsonds to strict `DMARC <https://www.rfc-editor.org/rfc/rfc7489 >`_
249- alignment (``adkim=s ``), but chatmail does not rely on DMARC and does
250- not consult the sender policy published in DMARC records. Other legacy
251- authentication mechanisms such as
252- `iprev <https://www.rfc-editor.org/rfc/rfc8601#section-2.7.3 >`_ and
253- `SPF <https://www.rfc-editor.org/rfc/rfc7208 >`_ are also not taken into
254- account. If there is no valid DKIM signature on the incoming email, the
247+ correpsonds to strict :rfc: `DMARC <7489 >` alignment (``adkim=s ``).
248+ If there is no valid DKIM signature on the incoming email, the
255249sender receives a “5.7.1 No valid DKIM signature found” error.
256250
251+ Note that chatmail relays
252+
253+ - do **not ** rely on DMARC and do not consult the sender policy published in DMARC records;
254+
255+ - do **not ** rely on legacy authentication mechanisms such as
256+ :rfc: `iprev <8601#section-2.7.3 >` and :rfc: `SPF <7208 >`.
257+ Any IP address is accepted if the DKIM signature was valid.
258+
257259Outgoing emails must be sent over authenticated connection with envelope
258- MAIL FROM (return path) corresponding to the login. This is ensured by
259- Postfix which maps login username to MAIL FROM with
260- `` ` smtpd_sender_login_maps`` <https://www.postfix.org/postconf.5.html#smtpd_sender_login_maps>`_
260+ `` MAIL FROM `` (return path) corresponding to the login.
261+ This is ensured by Postfix which maps login username to `` MAIL FROM `` with
262+ `smtpd_sender_login_maps <https://www.postfix.org/postconf.5.html#smtpd_sender_login_maps >`_
261263and rejects incorrectly authenticated emails with
262- `` ` reject_sender_login_mismatch`` < reject_sender_login_mismatch>`_
263- policy. ``From: `` header must correspond to envelope MAIL FROM, this is
264+ `reject_sender_login_mismatch < https://www.postfix.org/postconf.5.html# reject_sender_login_mismatch >`_ policy.
265+ ``From: `` header must correspond to envelope `` MAIL FROM `` , this is
264266ensured by ``filtermail `` proxy.
265267
266268TLS requirements
267269~~~~~~~~~~~~~~~~
268270
269271Postfix is configured to require valid TLS by setting
270- `` ` smtp_tls_security_level`` <https://www.postfix.org/postconf.5.html#smtp_tls_security_level>`_
272+ `smtp_tls_security_level <https://www.postfix.org/postconf.5.html#smtp_tls_security_level >`_
271273to ``verify ``. If emails don’t arrive at your chatmail relay server, the
272274problem is likely that your relay does not have a valid TLS certificate.
273275
@@ -290,7 +292,7 @@ actually it is a problem with your TLS certificate.
290292
291293
292294.. _dovecot : https://dovecot.org
293- .. _postfix : https://postfix.org
295+ .. _postfix : https://www. postfix.org
294296.. _nginx : https://nginx.org
295297.. _pyinfra : https://pyinfra.com
296298
0 commit comments