Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. can I remove `cloudron._domainkey`?

can I remove `cloudron._domainkey`?

Scheduled Pinned Locked Moved Solved Support
maildkim
13 Posts 5 Posters 2.4k Views 6 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • potemkin_aiP Offline
    potemkin_aiP Offline
    potemkin_ai
    wrote on last edited by girish
    #1

    Can I remove cloudron._domainkey or change replace 'cloudron' with something else?

    Don't want to expose the system I'm using via DNS name.

    girishG murgeroM 2 Replies Last reply
    0
    • potemkin_aiP potemkin_ai

      Can I remove cloudron._domainkey or change replace 'cloudron' with something else?

      Don't want to expose the system I'm using via DNS name.

      girishG Offline
      girishG Offline
      girish
      Staff
      wrote on last edited by
      #2

      @potemkin_ai the DNS entry is required for DKIM which is used to verify email signature when sending mails. If you don't need any of your apps sending email, you can delete the key. Otherwise, currently, it cannot be renamed but I guess you can raise a feature request to make it renameable.

      potemkin_aiP 1 Reply Last reply
      1
      • girishG girish

        @potemkin_ai the DNS entry is required for DKIM which is used to verify email signature when sending mails. If you don't need any of your apps sending email, you can delete the key. Otherwise, currently, it cannot be renamed but I guess you can raise a feature request to make it renameable.

        potemkin_aiP Offline
        potemkin_aiP Offline
        potemkin_ai
        wrote on last edited by
        #3

        @girish thank you. But why it has to have 'cloudron' prefix? It could be 'dkim._domainkey', isn't it?

        If so, where do I raise a feature request? And what are the chances it will be implemented anytime soon?

        nebulonN 1 Reply Last reply
        0
        • potemkin_aiP potemkin_ai

          @girish thank you. But why it has to have 'cloudron' prefix? It could be 'dkim._domainkey', isn't it?

          If so, where do I raise a feature request? And what are the chances it will be implemented anytime soon?

          nebulonN Offline
          nebulonN Offline
          nebulon
          Staff
          wrote on last edited by
          #4

          @girish correct me if I'm wrong, but I guess the cloudron tag is there to avoid potential overlap with existing DNS records. Adding cloudron makes it very unlikely that such a record already exists, which we would overwrite.

          potemkin_aiP girishG 2 Replies Last reply
          3
          • nebulonN nebulon

            @girish correct me if I'm wrong, but I guess the cloudron tag is there to avoid potential overlap with existing DNS records. Adding cloudron makes it very unlikely that such a record already exists, which we would overwrite.

            potemkin_aiP Offline
            potemkin_aiP Offline
            potemkin_ai
            wrote on last edited by
            #5

            @nebulon thank you for the explanation!
            If so, I guess it shall be indeed unique and to make sure it doesn't expose software running on the server - rename-able...

            1 Reply Last reply
            0
            • nebulonN nebulon

              @girish correct me if I'm wrong, but I guess the cloudron tag is there to avoid potential overlap with existing DNS records. Adding cloudron makes it very unlikely that such a record already exists, which we would overwrite.

              girishG Offline
              girishG Offline
              girish
              Staff
              wrote on last edited by
              #6

              @nebulon yes, pretty much. 'cloudron' is just a way to avoid conflicts with existing DNS keys.

              @potemkin_ai Can you raise a feature request here - https://forum.cloudron.io/category/97/feature-requests ? Also, see https://forum.cloudron.io/topic/4655/change-to-the-dkim-record-hostname-in-recent-version-caused-by-new-feature-or-from-using-no-ip-domain-provider for a previous related discussion.

              potemkin_aiP 1 Reply Last reply
              2
              • girishG girish

                @nebulon yes, pretty much. 'cloudron' is just a way to avoid conflicts with existing DNS keys.

                @potemkin_ai Can you raise a feature request here - https://forum.cloudron.io/category/97/feature-requests ? Also, see https://forum.cloudron.io/topic/4655/change-to-the-dkim-record-hostname-in-recent-version-caused-by-new-feature-or-from-using-no-ip-domain-provider for a previous related discussion.

                potemkin_aiP Offline
                potemkin_aiP Offline
                potemkin_ai
                wrote on last edited by
                #7

                @girish thank you! Done.

                1 Reply Last reply
                0
                • potemkin_aiP potemkin_ai

                  Can I remove cloudron._domainkey or change replace 'cloudron' with something else?

                  Don't want to expose the system I'm using via DNS name.

                  murgeroM Offline
                  murgeroM Offline
                  murgero
                  App Dev
                  wrote on last edited by
                  #8

                  @potemkin_ai There is no security risk by having the name "Cloudron" in a dns record - cloudron is pretty branded and emails, apps, etc all have cloudron somewhere on them. Not to mention the login screen which is accessible everywhere.

                  --
                  https://urgero.org
                  ~ Professional Nerd. Freelance Programmer. ~

                  scookeS potemkin_aiP 2 Replies Last reply
                  1
                  • murgeroM murgero

                    @potemkin_ai There is no security risk by having the name "Cloudron" in a dns record - cloudron is pretty branded and emails, apps, etc all have cloudron somewhere on them. Not to mention the login screen which is accessible everywhere.

                    scookeS Offline
                    scookeS Offline
                    scooke
                    wrote on last edited by
                    #9

                    @murgero It may not be for risk-aversion, but more that the person is providing a service without telling the customers that it is Cloudron (I'm not judging here, just postulating). So if customers could see that it was a Cloudron, and how simple it is, hey... they might skip the provider and use Cloudron themselves!

                    A life lived in fear is a life half-lived

                    potemkin_aiP 1 Reply Last reply
                    2
                    • scookeS scooke

                      @murgero It may not be for risk-aversion, but more that the person is providing a service without telling the customers that it is Cloudron (I'm not judging here, just postulating). So if customers could see that it was a Cloudron, and how simple it is, hey... they might skip the provider and use Cloudron themselves!

                      potemkin_aiP Offline
                      potemkin_aiP Offline
                      potemkin_ai
                      wrote on last edited by
                      #10

                      @scooke negative; customers knowing how to query DNS to see DKIM and understand that ‘cloudron’ is not some other tech voodoo is not my client; and those who won’t, won’t bother either.

                      1 Reply Last reply
                      1
                      • murgeroM murgero

                        @potemkin_ai There is no security risk by having the name "Cloudron" in a dns record - cloudron is pretty branded and emails, apps, etc all have cloudron somewhere on them. Not to mention the login screen which is accessible everywhere.

                        potemkin_aiP Offline
                        potemkin_aiP Offline
                        potemkin_ai
                        wrote on last edited by
                        #11

                        @murgero there is always a security risk; no software is safe from vulnerabilities, especially if security is not it’s primary focus (for example, like OpenBSD or qmail)

                        murgeroM 1 Reply Last reply
                        0
                        • potemkin_aiP potemkin_ai

                          @murgero there is always a security risk; no software is safe from vulnerabilities, especially if security is not it’s primary focus (for example, like OpenBSD or qmail)

                          murgeroM Offline
                          murgeroM Offline
                          murgero
                          App Dev
                          wrote on last edited by
                          #12

                          @potemkin_ai I would recommend you re-read my response to you my friend. I did not say there was "no security risk in Cloudron".

                          --
                          https://urgero.org
                          ~ Professional Nerd. Freelance Programmer. ~

                          potemkin_aiP 1 Reply Last reply
                          0
                          • murgeroM murgero

                            @potemkin_ai I would recommend you re-read my response to you my friend. I did not say there was "no security risk in Cloudron".

                            potemkin_aiP Offline
                            potemkin_aiP Offline
                            potemkin_ai
                            wrote on last edited by
                            #13

                            @murgero re-read, my response remains the same, sorry.

                            You know the way security scanners (or script-kiddies) works, it's to scan the network (Internet), get hosts and they software; if there is zero-day on CloudRon or other not disclosed vulnerability, apply it across the hosts.
                            Having DNS records showing that there is CloudRon here means you don't even need to scan for the ports, which just simplify things.

                            Hope that helps to understand my response here.

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • Bookmarks
                            • Search