Zimbra 8 on Ubuntu 14 with DKIM activation

Step 1 – connect to your server, get root privileges and install this package.

apt-get install libgmp10 libperl5.18 unzip pax sysstat sqlite3 dnsmasq wget

Configure hostname and DNS Server
In this tutorial will use the ‘dnsmasq’ resolving nameserver to speedup DNS lookups in Zimbra. Dnsmask has been installed as prerequisite in the first chapter, so we just have to configure it now:

Step 1 – Edit hostname and hosts

vim /etc/hostname

change your hostname with this ‘mail.sendaljepit.local’.

vim /etc/hosts

add this line:

192.168.1.101 mail.sendaljepit.local mail

Step 2 – Edit dnsmasq configuration

vim /etc/dnsmasq.conf
server=192.168.1.101
 domain=sendaljepit.local
 mx-host=sendaljepit.local, mail.sendaljepit.local, 5
 mx-host=mail.sendaljepit.local, mail.sendaljepit.local, 5
 listen-address=127.0.0.1

Step 3 – Reboot

sudo reboot

Installing Zimbra

Step 1 – Download Zimbra and extract it

wget https://files.zimbra.com/downloads/8.6.0_GA/zcs-8.6.0_GA_1153.UBUNTU14_64.20141215151116.tgz
 tar -xvf zcs-8.6.0_GA_1153.UBUNTU14_64.20141215151116.tgz
 cd zcs*

Step 2 – Run the Installer

./install.sh

At this step, zimbra will check the required packages and will ask you to agree to their installation and then choose the zimbra package :


here doesn`t need zimbra-dnscache, because in this tutorial use dnsmasq. You need to wait, because this installation takes some time. Next step is configure “zimbra-store” for getting admin password. See the picture:

Choose number “4” and enter. and then type your password:

Apply all Configuration:

and wait for Zimbra configuration finished.

Testing Zimbra

to test your zimbra server is running, you can type a command :

su - zimbra
zmcontrol status

try to access zimbra from web browser.  https://192.168.1.101/ or try admin page ” https://192.168.1.101:7071/ 

Zimbra Server with DKIM Signing

Starting with Zimbra 8.0, the ability to add DKIM signing to outgoing mail is available. Signing is done at the domain level, including alias domains. Setting up signing consists of two steps:

  1. Running zmdkimkeyutil to generate the DKIM keys and selector. The generated data is stored in the LDAP server as part of the domain LDAP entry.
  2. Updating the DNS server with the public DNS entry

The zmdkimkeyutility should be run on an MTA server.

The zmdkimkeyutil utility

The zmdkimkeyutil script allows you to do the following:

  • Add DKIM data to a domain that does not currently have DKIM enabled
  • Update DKIM data for a domain that already has DKIM enabled
  • Query the DKIM data for a domain
  • Remove the DKIM data for a domain
    The domain “example.com” will be used throughout this wiki. Substitute it with your domain.

Adding DKIM data to a domain with no existing DKIM configuration

/opt/zimbra/libexec/zmdkimkeyutil -a -d example.com

After the data is generated, the public DNS record data that must be added for the domain to your DNS server will be displayed:

zimbra@example.com:~$ /opt/zimbra/libexec/zmdkimkeyutil -a -d example.com
 DKIM Data added to LDAP for domain example.com with selector 0E9F184A-9577-11E1-AD0E-2A2FBBAC6BCB
 Public key to enter into DNS:
 0E9F184A-9577-11E1-AD0E-2A2FBBAC6BCB._domainkey IN TXT "v=DKIM1;=rsa;
 p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDY5CBg15nZ2vYnRmrNub6Jn6ghQ2DXQbQgOJ/E5IGziUYEuE2OnxkBm1h3jived21uHjpNy0naOZjLj0xLyyjclVy1chrhSbsGAhe8HLXUsdXyfRvNTq8NWLsUnMEsoomtJCJ
 /6LYWYU1whOQ9oKZVAwWHSovAWZpByqNMZmFg7QIDAQAB" ; ----- DKIM 0E9F184A-9577-11E1-AD0E-2A2FBBAC6BCB for example.com

Testing DKIM and SPG settings:

Now you can quickly view your DomainKeys, DKIM, and SPF validitay, and SpamAssassin score in one place. Just send an email to any address @dkimvalidator.com. Better visit- http://dkimvalidator.com/

Src:

https://www.howtoforge.com/tutorial/ubuntu-14-04-zimbra-server/

https://wiki.zimbra.com/wiki/Configuring_for_DKIM_Signing

http://dkimvalidator.com/

Share

Leave a Reply