From d3e7ea5389a31cc6e3eade27acb57f81aac82682 Mon Sep 17 00:00:00 2001 From: Florent Daigniere Date: Sat, 19 Feb 2022 13:30:36 +0100 Subject: [PATCH] spell it out --- core/admin/start.py | 4 ++-- docs/faq.rst | 20 +++++++++++++++++++- 2 files changed, 21 insertions(+), 3 deletions(-) diff --git a/core/admin/start.py b/core/admin/start.py index dd4f5b35..3470cff4 100755 --- a/core/admin/start.py +++ b/core/admin/start.py @@ -37,11 +37,11 @@ def test_DNS(): try: result = resolver.resolve('example.org', dns.rdatatype.A, dns.rdataclass.IN, lifetime=10) except Exception as e: - log.critical("Your DNS resolver at %s is not working (%s). Please use another resolver or enable unbound via https://setup.mailu.io.", ns, e); + log.critical("Your DNS resolver at %s is not working (%s). Please see https://mailu.io/1.9/faq.html#the-admin-container-won-t-start-and-its-log-says-critical-your-dns-resolver-isn-t-doing-dnssec-validation", ns, e); else: if result.response.flags & dns.flags.AD: break - log.critical("Your DNS resolver at %s isn't doing DNSSEC validation; Please use another resolver or enable unbound via https://setup.mailu.io.", ns) + log.critical("Your DNS resolver at %s isn't doing DNSSEC validation; Please see https://mailu.io/1.9/faq.html#the-admin-container-won-t-start-and-its-log-says-critical-your-dns-resolver-isn-t-doing-dnssec-validation.", ns) time.sleep(5) test_DNS() diff --git a/docs/faq.rst b/docs/faq.rst index 626f92ad..fe105403 100644 --- a/docs/faq.rst +++ b/docs/faq.rst @@ -493,7 +493,7 @@ The syntax and options are as described in `postfix's documentation`_. Re-creati .. _`postfix's documentation`: http://www.postfix.org/postconf.5.html#smtp_tls_policy_maps 403 - Access Denied Errors ---------------------------- +`````````````````````````` While this may be due to several issues, check to make sure your ``DOMAIN=`` entry is the **first** entry in your ``HOSTNAMES=``. @@ -864,4 +864,22 @@ iptables -t nat -A POSTROUTING -o eth0 -p tcp --dport 25 -j SNAT --to +adflag example.org A + +We recommend that you run your own DNS resolver (enable unbound and update your docker-compose.yml when you update from older versions) instead of relying on publicly available ones. It's better security-wise (you don't have to trust them) and RBLs used by rspamd are known to rate-limit per source-ip address. + +We have seen a fair amount of support requests related to the following: + +- dnsmasq won't forward DNSSEC results unless instructed to do so. If you are running openwrt or pi-hole, you do need to enable DNSSEC. +- `coredns has a bug`_ that we have now worked around + +.. _`coredns has a bug`: https://github.com/coredns/coredns/issues/5189