diff options
author | Andreas Metzler <ametzler@downhill.at.eu.org> | 2013-09-29 14:39:44 +0200 |
---|---|---|
committer | Andreas Metzler <ametzler@downhill.at.eu.org> | 2013-09-29 14:39:44 +0200 |
commit | f86518405fe4817dc91553856c995c7482a1f4ce (patch) | |
tree | 6c646a36cf63a4828c75e145ba38550523354365 | |
parent | 95ddbb39c005c2a1aca7852ccbff2e1eef10aadc (diff) | |
download | exim4-f86518405fe4817dc91553856c995c7482a1f4ce.tar.gz |
Add txt docs.
80_addmanuallybuiltdocs.diff: Upstream rc tarball ships empty
filter.txt and spec.txt, replace these with correct handbuilt versions.
-rw-r--r-- | debian/changelog | 2 | ||||
-rw-r--r-- | debian/patches/80_addmanuallybuiltdocs.diff | 36053 | ||||
-rw-r--r-- | debian/patches/series | 1 |
3 files changed, 36056 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index 2f763ca..0892d3a 100644 --- a/debian/changelog +++ b/debian/changelog @@ -15,6 +15,8 @@ exim4 (4.82~rc1-1) UNRELEASED; urgency=low * Appling upstream's default configuration changes to Debian change 30_exim4-config_examples to use tls_in_cipher/tls_out_cipher instead of tls_out_cipher. - exim4-config therefore Breaks exim daemon << 4.82~rc1. + * 80_addmanuallybuiltdocs.diff: Upstream rc tarball ships empty filter.txt + and spec.txt, replace these with correct handbuilt versions. -- Andreas Metzler <ametzler@debian.org> Sat, 28 Sep 2013 13:13:38 +0200 diff --git a/debian/patches/80_addmanuallybuiltdocs.diff b/debian/patches/80_addmanuallybuiltdocs.diff new file mode 100644 index 0000000..45ae0c4 --- /dev/null +++ b/debian/patches/80_addmanuallybuiltdocs.diff @@ -0,0 +1,36053 @@ +Description: Add txt documentation. + Upstream rc tarball ships empty filter.txt and spec.txt, replace these + with correct handbuilt versions. +Author: Andreas Metzler <ametzler@debian.org> +Origin: vendor +Forwarded: http://article.gmane.org/gmane.mail.exim.devel/6412 +Last-Update: <YYYY-MM-DD> + +--- exim4-4.82~rc1.orig/doc/filter.txt ++++ exim4-4.82~rc1/doc/filter.txt +@@ -0,0 +1,1728 @@ ++Exim's interfaces to mail filtering ++ ++Philip Hazel ++ ++Copyright (c) 2010 University of Cambridge ++ ++Revision 4.82 29 Sep 2013 PH ++ ++Abstract ++ ++Exim filtering ++ ++------------------------------------------------------------------------------- ++ ++TABLE OF CONTENTS ++ ++1. Forwarding and filtering in Exim ++ ++ 1.1. Introduction ++ 1.2. Filter operation ++ 1.3. Testing a new filter file ++ 1.4. Installing a filter file ++ 1.5. Testing an installed filter file ++ 1.6. Details of filtering commands ++ ++2. Sieve filter files ++ ++ 2.1. Recognition of Sieve filters ++ 2.2. Saving to specified folders ++ 2.3. Strings containing header names ++ 2.4. Exists test with empty list of headers ++ 2.5. Header test with invalid MIME encoding in header ++ 2.6. Address test for multiple addresses per header ++ 2.7. Semantics of keep ++ 2.8. Semantics of fileinto ++ 2.9. Semantics of redirect ++ 2.10. String arguments ++ 2.11. Number units ++ 2.12. RFC compliance ++ ++3. Exim filter files ++ ++ 3.1. Format of Exim filter files ++ 3.2. Data values in filter commands ++ 3.3. String expansion ++ 3.4. Some useful general variables ++ 3.5. Header variables ++ 3.6. User variables ++ 3.7. Current directory ++ 3.8. Significant deliveries ++ 3.9. Filter commands ++ 3.10. The add command ++ 3.11. The deliver command ++ 3.12. The save command ++ 3.13. The pipe command ++ 3.14. Mail commands ++ 3.15. Logging commands ++ 3.16. The finish command ++ 3.17. The testprint command ++ 3.18. The fail command ++ 3.19. The freeze command ++ 3.20. The headers command ++ 3.21. Obeying commands conditionally ++ 3.22. String testing conditions ++ 3.23. Numeric testing conditions ++ 3.24. Testing for significant deliveries ++ 3.25. Testing for error messages ++ 3.26. Testing a list of addresses ++ 3.27. Testing for personal mail ++ 3.28. Alias addresses for the personal condition ++ 3.29. Details of the personal condition ++ 3.30. Testing delivery status ++ 3.31. Multiple personal mailboxes ++ 3.32. Ignoring delivery errors ++ 3.33. Examples of Exim filter commands ++ ++ ++ ++=============================================================================== ++1. FORWARDING AND FILTERING IN EXIM ++ ++This document describes the user interfaces to Exim's in-built mail filtering ++facilities, and is copyright (c) University of Cambridge 2010. It corresponds ++to Exim version 4.82. ++ ++ ++1.1 Introduction ++---------------- ++ ++Most Unix mail transfer agents (programs that deliver mail) permit individual ++users to specify automatic forwarding of their mail, usually by placing a list ++of forwarding addresses in a file called .forward in their home directories. ++Exim extends this facility by allowing the forwarding instructions to be a set ++of rules rather than just a list of addresses, in effect providing ".forward ++with conditions". Operating the set of rules is called filtering, and the file ++that contains them is called a filter file. ++ ++Exim supports two different kinds of filter file. An Exim filter contains ++instructions in a format that is unique to Exim. A Sieve filter contains ++instructions in the Sieve format that is defined by RFC 3028. As this is a ++standard format, Sieve filter files may already be familiar to some users. ++Sieve files should also be portable between different environments. However, ++the Exim filtering facility contains more features (such as variable ++expansion), and better integration with the host environment (such as the use ++of external processes and pipes). ++ ++The choice of which kind of filter to use can be left to the end-user, provided ++that the system administrator has configured Exim appropriately for both kinds ++of filter. However, if interoperability is important, Sieve is the only choice. ++ ++The ability to use filtering or traditional forwarding has to be enabled by the ++system administrator, and some of the individual facilities can be separately ++enabled or disabled. A local document should be provided to describe exactly ++what has been enabled. In the absence of this, consult your system ++administrator. ++ ++This document describes how to use a filter file and the format of its ++contents. It is intended for use by end-users. Both Sieve filters and Exim ++filters are covered. However, for Sieve filters, only issues that relate to the ++Exim implementation are discussed, since Sieve itself is described elsewhere. ++ ++The contents of traditional .forward files are not described here. They ++normally contain just a list of addresses, file names, or pipe commands, ++separated by commas or newlines, but other types of item are also available. ++The full details can be found in the chapter on the redirect router in the Exim ++specification, which also describes how the system administrator can set up and ++control the use of filtering. ++ ++ ++1.2 Filter operation ++-------------------- ++ ++It is important to realize that, in Exim, no deliveries are actually made while ++a filter or traditional .forward file is being processed. Running a filter or ++processing a traditional .forward file sets up future delivery operations, but ++does not carry them out. ++ ++The result of filter or .forward file processing is a list of destinations to ++which a message should be delivered. The deliveries themselves take place ++later, along with all other deliveries for the message. This means that it is ++not possible to test for successful deliveries while filtering. It also means ++that any duplicate addresses that are generated are dropped, because Exim never ++delivers the same message to the same address more than once. ++ ++ ++1.3 Testing a new filter file ++----------------------------- ++ ++Filter files, especially the more complicated ones, should always be tested, as ++it is easy to make mistakes. Exim provides a facility for preliminary testing ++of a filter file before installing it. This tests the syntax of the file and ++its basic operation, and can also be used with traditional .forward files. ++ ++Because a filter can do tests on the content of messages, a test message is ++required. Suppose you have a new filter file called myfilter and a test message ++in a file called test-message. Assuming that Exim is installed with the ++conventional path name /usr/sbin/sendmail (some operating systems use /usr/lib/ ++sendmail), the following command can be used: ++ ++/usr/sbin/sendmail -bf myfilter <test-message ++ ++The -bf option tells Exim that the following item on the command line is the ++name of a filter file that is to be tested. There is also a -bF option, which ++is similar, but which is used for testing system filter files, as opposed to ++user filter files, and which is therefore of use only to the system ++administrator. ++ ++The test message is supplied on the standard input. If there are no ++message-dependent tests in the filter, an empty file (/dev/null) can be used. A ++supplied message must start with header lines or the "From " message separator ++line that is found in many multi-message folder files. Note that blank lines at ++the start terminate the header lines. A warning is given if no header lines are ++read. ++ ++The result of running this command, provided no errors are detected in the ++filter file, is a list of the actions that Exim would try to take if presented ++with the message for real. For example, for an Exim filter, the output ++ ++Deliver message to: gulliver@lilliput.fict.example ++Save message to: /home/lemuel/mail/archive ++ ++means that one copy of the message would be sent to ++gulliver@lilliput.fict.example, and another would be added to the file /home/ ++lemuel/mail/archive, if all went well. ++ ++The actions themselves are not attempted while testing a filter file in this ++way; there is no check, for example, that any forwarding addresses are valid. ++For an Exim filter, if you want to know why a particular action is being taken, ++add the -v option to the command. This causes Exim to output the results of any ++conditional tests and to indent its output according to the depth of nesting of ++if commands. Further additional output from a filter test can be generated by ++the testprint command, which is described below. ++ ++When Exim is outputting a list of the actions it would take, if any text ++strings are included in the output, non-printing characters therein are ++converted to escape sequences. In particular, if any text string contains a ++newline character, this is shown as "\n" in the testing output. ++ ++When testing a filter in this way, Exim makes up an "envelope" for the message. ++The recipient is by default the user running the command, and so is the sender, ++but the command can be run with the -f option to supply a different sender. For ++example, ++ ++/usr/sbin/sendmail -bf myfilter \ ++ -f islington@never.where <test-message ++ ++Alternatively, if the -f option is not used, but the first line of the supplied ++message is a "From " separator from a message folder file (not the same thing ++as a From: header line), the sender is taken from there. If -f is present, the ++contents of any "From " line are ignored. ++ ++The "return path" is the same as the envelope sender, unless the message ++contains a Return-path: header, in which case it is taken from there. You need ++not worry about any of this unless you want to test out features of a filter ++file that rely on the sender address or the return path. ++ ++It is possible to change the envelope recipient by specifying further options. ++The -bfd option changes the domain of the recipient address, while the -bfl ++option changes the "local part", that is, the part before the @ sign. An ++adviser could make use of these to test someone else's filter file. ++ ++The -bfp and -bfs options specify the prefix or suffix for the local part. ++These are relevant only when support for multiple personal mailboxes is ++implemented; see the description in section 3.31 below. ++ ++ ++1.4 Installing a filter file ++---------------------------- ++ ++A filter file is normally installed under the name .forward in your home ++directory - it is distinguished from a conventional .forward file by its first ++line (described below). However, the file name is configurable, and some system ++administrators may choose to use some different name or location for filter ++files. ++ ++ ++1.5 Testing an installed filter file ++------------------------------------ ++ ++Testing a filter file before installation cannot find every potential problem; ++for example, it does not actually run commands to which messages are piped. ++Some "live" tests should therefore also be done once a filter is installed. ++ ++If at all possible, test your filter file by sending messages from some other ++account. If you send a message to yourself from the filtered account, and ++delivery fails, the error message will be sent back to the same account, which ++may cause another delivery failure. It won't cause an infinite sequence of such ++messages, because delivery failure messages do not themselves generate further ++messages. However, it does mean that the failure won't be returned to you, and ++also that the postmaster will have to investigate the stuck message. ++ ++If you have to test an Exim filter from the same account, a sensible precaution ++is to include the line ++ ++if error_message then finish endif ++ ++as the first filter command, at least while testing. This causes filtering to ++be abandoned for a delivery failure message, and since no destinations are ++generated, the message goes on to be delivered to the original address. Unless ++there is a good reason for not doing so, it is recommended that the above test ++be left in all Exim filter files. (This does not apply to Sieve files.) ++ ++ ++1.6 Details of filtering commands ++--------------------------------- ++ ++The filtering commands for Sieve and Exim filters are completely different in ++syntax and semantics. The Sieve mechanism is defined in RFC 3028; in the next ++chapter we describe how it is integrated into Exim. The subsequent chapter ++covers Exim filtering commands in detail. ++ ++ ++ ++=============================================================================== ++2. SIEVE FILTER FILES ++ ++The code for Sieve filtering in Exim was contributed by Michael Haardt, and ++most of the content of this chapter is taken from the notes he provided. Since ++Sieve is an extensible language, it is important to understand "Sieve" in this ++context as "the specific implementation of Sieve for Exim". ++ ++This chapter does not contain a description of Sieve, since that can be found ++in RFC 3028, which should be read in conjunction with these notes. ++ ++The Exim Sieve implementation offers the core as defined by RFC 3028, ++comparison tests, the subaddress parameter, the copy, envelope, fileinto, ++notify, and vacation extensions, but not the reject extension. Exim does not ++support message delivery notifications (MDNs), so adding it just to the Sieve ++filter (as required for reject) makes little sense. ++ ++In order for Sieve to work properly in Exim, the system administrator needs to ++make some adjustments to the Exim configuration. These are described in the ++chapter on the redirect router in the full Exim specification. ++ ++ ++2.1 Recognition of Sieve filters ++-------------------------------- ++ ++A filter file is interpreted as a Sieve filter if its first line is ++ ++# Sieve filter ++ ++This is what distinguishes it from a conventional .forward file or an Exim ++filter file. ++ ++ ++2.2 Saving to specified folders ++------------------------------- ++ ++If the system administrator has set things up as suggested in the Exim ++specification, and you use keep or fileinto to save a mail into a folder, ++absolute files are stored where specified, relative files are stored relative ++to $home, and inbox goes to the standard mailbox location. ++ ++ ++2.3 Strings containing header names ++----------------------------------- ++ ++RFC 3028 does not specify what happens if a string denoting a header field does ++not contain a valid header name, for example, it contains a colon. This ++implementation generates an error instead of ignoring the header field in order ++to ease script debugging, which fits in with the common picture of Sieve. ++ ++ ++2.4 Exists test with empty list of headers ++------------------------------------------ ++ ++The exists test succeeds only if all the specified headers exist. RFC 3028 does ++not explicitly specify what happens on an empty list of headers. This ++implementation evaluates that condition as true, interpreting the RFC in a ++strict sense. ++ ++ ++2.5 Header test with invalid MIME encoding in header ++---------------------------------------------------- ++ ++Some MUAs process invalid base64 encoded data, generating junk. Others ignore ++junk after seeing an equal sign in base64 encoded data. RFC 2047 does not ++specify how to react in this case, other than stating that a client must not ++forbid to process a message for that reason. RFC 2045 specifies that invalid ++data should be ignored (apparently looking at end of line characters). It also ++specifies that invalid data may lead to rejecting messages containing them (and ++there it appears to talk about true encoding violations), which is a clear ++contradiction to ignoring them. ++ ++RFC 3028 does not specify how to process incorrect MIME words. This ++implementation treats them literally, as it does if the word is correct but its ++character set cannot be converted to UTF-8. ++ ++ ++2.6 Address test for multiple addresses per header ++-------------------------------------------------- ++ ++A header may contain multiple addresses. RFC 3028 does not explicitly specify ++how to deal with them, but since the address test checks if anything matches ++anything else, matching one address suffices to satisfy the condition. That ++makes it impossible to test if a header contains a certain set of addresses and ++no more, but it is more logical than letting the test fail if the header ++contains an additional address besides the one the test checks for. ++ ++ ++2.7 Semantics of keep ++--------------------- ++ ++The keep command is equivalent to ++ ++fileinto "inbox"; ++ ++It saves the message and resets the implicit keep flag. It does not set the ++implicit keep flag; there is no command to set it once it has been reset. ++ ++ ++2.8 Semantics of fileinto ++------------------------- ++ ++RFC 3028 does not specify whether fileinto should try to create a mail folder ++if it does not exist. This implementation allows the sysadmin to configure that ++aspect using the appendfile transport options create_directory, create_file, ++and file_must_exist. See the appendfile transport in the Exim specification for ++details. ++ ++ ++2.9 Semantics of redirect ++------------------------- ++ ++Sieve scripts are supposed to be interoperable between servers, so this ++implementation does not allow mail to be redirected to unqualified addresses, ++because the domain would depend on the system being used. On systems with ++virtual mail domains, the default domain is probably not what the user expects ++it to be. ++ ++ ++2.10 String arguments ++--------------------- ++ ++There has been confusion if the string arguments to require are to be matched ++case-sensitively or not. This implementation matches them with the match type ++:is (default, see section 2.7.1 of the RFC) and the comparator i;ascii-casemap ++(default, see section 2.7.3 of the RFC). The RFC defines the command defaults ++clearly, so any different implementations violate RFC 3028. The same is valid ++for comparator names, also specified as strings. ++ ++ ++2.11 Number units ++----------------- ++ ++There is a mistake in RFC 3028: the suffix G denotes gibi-, not tebibyte. The ++mistake is obvious, because RFC 3028 specifies G to denote 2^30 (which is gibi, ++not tebi), and that is what this implementation uses as the scaling factor for ++the suffix G. ++ ++ ++2.12 RFC compliance ++------------------- ++ ++Exim requires the first line of a Sieve filter to be ++ ++# Sieve filter ++ ++Of course the RFC does not specify that line. Do not expect examples to work ++without adding it, though. ++ ++RFC 3028 requires the use of CRLF to terminate a line. The rationale was that ++CRLF is universally used in network protocols to mark the end of the line. This ++implementation does not embed Sieve in a network protocol, but uses Sieve ++scripts as part of the Exim MTA. Since all parts of Exim use LF as the newline ++character, this implementation does, too, by default, though the system ++administrator may choose (at Exim compile time) to use CRLF instead. ++ ++Exim violates RFC 2822, section 3.6.8, by accepting 8-bit header names, so this ++implementation repeats this violation to stay consistent with Exim. This is in ++preparation for UTF-8 data. ++ ++Sieve scripts cannot contain NUL characters in strings, but mail headers could ++contain MIME encoded NUL characters, which could never be matched by Sieve ++scripts using exact comparisons. For that reason, this implementation extends ++the Sieve quoted string syntax with \0 to describe a NUL character, violating \ ++0 being the same as 0 in RFC 3028. Even without using \0, the following tests ++are all true in this implementation. Implementations that use C-style strings ++will only evaluate the first test as true. ++ ++Subject: =?iso-8859-1?q?abc=00def ++ ++header :contains "Subject" ["abc"] ++header :contains "Subject" ["def"] ++header :matches "Subject" ["abc?def"] ++ ++Note that by considering Sieve to be an MUA, RFC 2047 can be interpreted in a ++way that NUL characters truncating strings is allowed for Sieve ++implementations, although not recommended. It is further allowed to use encoded ++NUL characters in headers, but that's not recommended either. The above example ++shows why. ++ ++RFC 3028 states that if an implementation fails to convert a character set to ++UTF-8, two strings cannot be equal if one contains octets greater than 127. ++Assuming that all unknown character sets are one-byte character sets with the ++lower 128 octets being US-ASCII is not sound, so this implementation violates ++RFC 3028 and treats such MIME words literally. That way at least something ++could be matched. ++ ++The folder specified by fileinto must not contain the character sequence ".." ++to avoid security problems. RFC 3028 does not specify the syntax of folders ++apart from keep being equivalent to ++ ++fileinto "INBOX"; ++ ++This implementation uses inbox instead. ++ ++Sieve script errors currently cause messages to be silently filed into inbox. ++RFC 3028 requires that the user is notified of that condition. This may be ++implemented in the future by adding a header line to mails that are filed into ++inbox due to an error in the filter. ++ ++ ++ ++=============================================================================== ++3. EXIM FILTER FILES ++ ++This chapter contains a full description of the contents of Exim filter files. ++ ++ ++3.1 Format of Exim filter files ++------------------------------- ++ ++Apart from leading white space, the first text in an Exim filter file must be ++ ++# Exim filter ++ ++This is what distinguishes it from a conventional .forward file or a Sieve ++filter file. If the file does not have this initial line (or the equivalent for ++a Sieve filter), it is treated as a conventional .forward file, both when ++delivering mail and when using the -bf testing mechanism. The white space in ++the line is optional, and any capitalization may be used. Further text on the ++same line is treated as a comment. For example, you could have ++ ++# Exim filter <<== do not edit or remove this line! ++ ++The remainder of the file is a sequence of filtering commands, which consist of ++keywords and data values. For example, in the command ++ ++deliver gulliver@lilliput.fict.example ++ ++the keyword is "deliver" and the data value is ++"gulliver@lilliput.fict.example". White space or line breaks separate the ++components of a command, except in the case of conditions for the if command, ++where round brackets (parentheses) also act as separators. Complete commands ++are separated from each other by white space or line breaks; there are no ++special terminators. Thus, several commands may appear on one line, or one ++command may be spread over a number of lines. ++ ++If the character # follows a separator anywhere in a command, everything from # ++up to the next newline is ignored. This provides a way of including comments in ++a filter file. ++ ++ ++3.2 Data values in filter commands ++---------------------------------- ++ ++There are two ways in which a data value can be input: ++ ++ * If the text contains no white space, it can be typed verbatim. However, if ++ it is part of a condition, it must also be free of round brackets ++ (parentheses), as these are used for grouping in conditions. ++ ++ * Otherwise, text must be enclosed in double quotation marks. In this case, ++ the character \ (backslash) is treated as an "escape character" within the ++ string, causing the following character or characters to be treated ++ specially: ++ ++ \n is replaced by a newline ++ \r is replaced by a carriage return ++ \t is replaced by a tab ++ ++Backslash followed by up to three octal digits is replaced by the character ++specified by those digits, and "\x" followed by up to two hexadecimal digits is ++treated similarly. Backslash followed by any other character is replaced by the ++second character, so that in particular, "\"" becomes """ and "\\" becomes "\". ++A data item enclosed in double quotes can be continued onto the next line by ++ending the first line with a backslash. Any leading white space at the start of ++the continuation line is ignored. ++ ++In addition to the escape character processing that occurs when strings are ++enclosed in quotes, most data values are also subject to string expansion (as ++described in the next section), in which case the characters "$" and "\" are ++also significant. This means that if a single backslash is actually required in ++such a string, and the string is also quoted, "\\\\" has to be entered. ++ ++The maximum permitted length of a data string, before expansion, is 1024 ++characters. ++ ++ ++3.3 String expansion ++-------------------- ++ ++Most data values are expanded before use. Expansion consists of replacing ++substrings beginning with "$" with other text. The full expansion facilities ++available in Exim are extensive. If you want to know everything that Exim can ++do with strings, you should consult the chapter on string expansion in the Exim ++documentation. ++ ++In filter files, by far the most common use of string expansion is the ++substitution of the contents of a variable. For example, the substring ++ ++$reply_address ++ ++is replaced by the address to which replies to the message should be sent. If ++such a variable name is followed by a letter or digit or underscore, it must be ++enclosed in curly brackets (braces), for example, ++ ++${reply_address} ++ ++If a "$" character is actually required in an expanded string, it must be ++escaped with a backslash, and because backslash is also an escape character in ++quoted input strings, it must be doubled in that case. The following two ++examples illustrate two different ways of testing for a "$" character in a ++message: ++ ++if $message_body contains \$ then ... ++if $message_body contains "\\$" then ... ++ ++You can prevent part of a string from being expanded by enclosing it between ++two occurrences of "\N". For example, ++ ++if $message_body contains \N$$$$\N then ... ++ ++tests for a run of four dollar characters. ++ ++ ++3.4 Some useful general variables ++--------------------------------- ++ ++A complete list of the available variables is given in the Exim documentation. ++This shortened list contains the ones that are most likely to be useful in ++personal filter files: ++ ++$body_linecount: The number of lines in the body of the message. ++ ++$body_zerocount: The number of binary zero characters in the body of the ++message. ++ ++$home: In conventional configurations, this variable normally contains the ++user's home directory. The system administrator can, however, change this. ++ ++$local_part: The part of the email address that precedes the @ sign - normally ++the user's login name. If support for multiple personal mailboxes is enabled ++(see section 3.31 below) and a prefix or suffix for the local part was ++recognized, it is removed from the string in this variable. ++ ++$local_part_prefix: If support for multiple personal mailboxes is enabled (see ++section 3.31 below), and a local part prefix was recognized, this variable ++contains the prefix. Otherwise it contains an empty string. ++ ++$local_part_suffix: If support for multiple personal mailboxes is enabled (see ++section 3.31 below), and a local part suffix was recognized, this variable ++contains the suffix. Otherwise it contains an empty string. ++ ++$message_body: The initial portion of the body of the message. By default, up ++to 500 characters are read into this variable, but the system administrator can ++configure this to some other value. Newlines in the body are converted into ++single spaces. ++ ++$message_body_end: The final portion of the body of the message, formatted and ++limited in the same way as $message_body. ++ ++$message_body_size: The size of the body of the message, in bytes. ++ ++$message_exim_id: The message's local identification string, which is unique ++for each message handled by a single host. ++ ++$message_headers: The header lines of the message, concatenated into a single ++string, with newline characters between them. ++ ++$message_size: The size of the entire message, in bytes. ++ ++$original_local_part: When an address that arrived with the message is being ++processed, this contains the same value as the variable $local_part. However, ++if an address generated by an alias, forward, or filter file is being ++processed, this variable contains the local part of the original address. ++ ++$reply_address: The contents of the Reply-to: header, if the message has one; ++otherwise the contents of the From: header. It is the address to which normal ++replies to the message should be sent. ++ ++$return_path: The return path - that is, the sender field that will be ++transmitted as part of the message's envelope if the message is sent to another ++host. This is the address to which delivery errors are sent. In many cases, ++this variable has the same value as $sender_address, but if, for example, an ++incoming message to a mailing list has been expanded, $return_path may have ++been changed to contain the address of the list maintainer. ++ ++$sender_address: The sender address that was received in the envelope of the ++message. This is not necessarily the same as the contents of the From: or ++Sender: header lines. For delivery error messages ("bounce messages") there is ++no sender address, and this variable is empty. ++ ++$tod_full: A full version of the time and date, for example: Wed, 18 Oct 1995 ++09:51:40 +0100. The timezone is always given as a numerical offset from GMT. ++ ++$tod_log: The time and date in the format used for writing Exim's log files, ++without the timezone, for example: 1995-10-12 15:32:29. ++ ++$tod_zone: The local timezone offset, for example: +0100. ++ ++ ++3.5 Header variables ++-------------------- ++ ++There is a special set of expansion variables containing the header lines of ++the message being processed. These variables have names beginning with $header_ ++followed by the name of the header line, terminated by a colon. For example, ++ ++$header_from: ++$header_subject: ++ ++The whole item, including the terminating colon, is replaced by the contents of ++the message header line. If there is more than one header line with the same ++name, their contents are concatenated. For header lines whose data consists of ++a list of addresses (for example, From: and To:), a comma and newline is ++inserted between each set of data. For all other header lines, just a newline ++is used. ++ ++Leading and trailing white space is removed from header line data, and if there ++are any MIME "words" that are encoded as defined by RFC 2047 (because they ++contain non-ASCII characters), they are decoded and translated, if possible, to ++a local character set. Translation is attempted only on operating systems that ++have the iconv() function. This makes the header line look the same as it would ++when displayed by an MUA. The default character set is ISO-8859-1, but this can ++be changed by means of the headers command (see below). ++ ++If you want to see the actual characters that make up a header line, you can ++specify $rheader_ instead of $header_. This inserts the "raw" header line, ++unmodified. ++ ++There is also an intermediate form, requested by $bheader_, which removes ++leading and trailing space and decodes MIME "words", but does not do any ++character translation. If an attempt to decode what looks superficially like a ++MIME "word" fails, the raw string is returned. If decoding produces a binary ++zero character, it is replaced by a question mark. ++ ++The capitalization of the name following $header_ is not significant. Because ++any printing character except colon may appear in the name of a message's ++header (this is a requirement of RFC 2822, the document that describes the ++format of a mail message) curly brackets must not be used in this case, as they ++will be taken as part of the header name. Two shortcuts are allowed in naming ++header variables: ++ ++ * The initiating $header_, $rheader_, or $bheader_ can be abbreviated to $h_, ++ $rh_, or $bh_, respectively. ++ ++ * The terminating colon can be omitted if the next character is white space. ++ The white space character is retained in the expanded string. However, this ++ is not recommended, because it makes it easy to forget the colon when it ++ really is needed. ++ ++If the message does not contain a header of the given name, an empty string is ++substituted. Thus it is important to spell the names of headers correctly. Do ++not use $header_Reply_to when you really mean $header_Reply-to. ++ ++ ++3.6 User variables ++------------------ ++ ++There are ten user variables with names $n0 - $n9 that can be incremented by ++the add command (see section 3.10). These can be used for "scoring" messages in ++various ways. If Exim is configured to run a "system filter" on every message, ++the values left in these variables are copied into the variables $sn0 - $sn9 at ++the end of the system filter, thus making them available to users' filter ++files. How these values are used is entirely up to the individual installation. ++ ++ ++3.7 Current directory ++--------------------- ++ ++The contents of your filter file should not make any assumptions about the ++current directory. It is best to use absolute paths for file names; you can ++normally make use of the $home variable to refer to your home directory. The ++save command automatically inserts $home at the start of non-absolute paths. ++ ++ ++3.8 Significant deliveries ++-------------------------- ++ ++When in the course of delivery a message is processed by a filter file, what ++happens next, that is, after the filter file has been processed, depends on ++whether or not the filter sets up any significant deliveries. If at least one ++significant delivery is set up, the filter is considered to have handled the ++entire delivery arrangements for the current address, and no further processing ++of the address takes place. If, however, no significant deliveries are set up, ++Exim continues processing the current address as if there were no filter file, ++and typically sets up a delivery of a copy of the message into a local mailbox. ++In particular, this happens in the special case of a filter file containing ++only comments. ++ ++The delivery commands deliver, save, and pipe are by default significant. ++However, if such a command is preceded by the word "unseen", its delivery is ++not considered to be significant. In contrast, other commands such as mail and ++vacation do not set up significant deliveries unless preceded by the word ++"seen". The following example commands set up significant deliveries: ++ ++deliver jack@beanstalk.example ++pipe $home/bin/mymailscript ++seen mail subject "message discarded" ++seen finish ++ ++The following example commands do not set up significant deliveries: ++ ++unseen deliver jack@beanstalk.example ++unseen pipe $home/bin/mymailscript ++mail subject "message discarded" ++finish ++ ++ ++3.9 Filter commands ++------------------- ++ ++The filter commands that are described in subsequent sections are listed below, ++with the section in which they are described in brackets: ++ ++add increment a user variable (section 3.10) ++deliver deliver to an email address (section 3.11) ++fail force delivery failure (sysadmin use) (section 3.18) ++finish end processing (section 3.16) ++freeze freeze message (sysadmin use) (section 3.19) ++headers set the header character set (section 3.20) ++if test condition(s) (section 3.21) ++logfile define log file (section 3.15) ++logwrite write to log file (section 3.15) ++mail send a reply message (section 3.14) ++pipe pipe to a command (section 3.13) ++save save to a file (section 3.12) ++testprint print while testing (section 3.17) ++vacation tailored form of mail (section 3.14) ++ ++The headers command has additional parameters that can be used only in a system ++filter. The fail and freeze commands are available only when Exim's filtering ++facilities are being used as a system filter, and are therefore usable only by ++the system administrator and not by ordinary users. They are mentioned only ++briefly in this document; for more information, see the main Exim ++specification. ++ ++ ++3.10 The add command ++-------------------- ++ ++ add <number> to <user variable> ++e.g. add 2 to n3 ++ ++There are 10 user variables of this type, with names $n0 - $n9. Their values ++can be obtained by the normal expansion syntax (for example $n3) in other ++commands. At the start of filtering, these variables all contain zero. Both ++arguments of the add command are expanded before use, making it possible to add ++variables to each other. Subtraction can be obtained by adding negative ++numbers. ++ ++ ++3.11 The deliver command ++------------------------ ++ ++ deliver <mail address> ++e.g. deliver "Dr Livingstone <David@somewhere.africa.example>" ++ ++This command provides a forwarding operation. The delivery that it sets up is ++significant unless the command is preceded by "unseen" (see section 3.8). The ++message is sent on to the given address, exactly as happens if the address had ++appeared in a traditional .forward file. If you want to deliver the message to ++a number of different addresses, you can use more than one deliver command ++(each one may have only one address). However, duplicate addresses are ++discarded. ++ ++To deliver a copy of the message to your normal mailbox, your login name can be ++given as the address. Once an address has been processed by the filtering ++mechanism, an identical generated address will not be so processed again, so ++doing this does not cause a loop. ++ ++However, if you have a mail alias, you should not refer to it here. For ++example, if the mail address L.Gulliver is aliased to lg303 then all references ++in Gulliver's .forward file should be to lg303. A reference to the alias will ++not work for messages that are addressed to that alias, since, like .forward ++file processing, aliasing is performed only once on an address, in order to ++avoid looping. ++ ++Following the new address, an optional second address, preceded by "errors_to" ++may appear. This changes the address to which delivery errors on the forwarded ++message will be sent. Instead of going to the message's original sender, they ++go to this new address. For ordinary users, the only value that is permitted ++for this address is the user whose filter file is being processed. For example, ++the user lg303 whose mailbox is in the domain lilliput.example could have a ++filter file that contains ++ ++deliver jon@elsewhere.example errors_to lg303@lilliput.example ++ ++Clearly, using this feature makes sense only in situations where not all ++messages are being forwarded. In particular, bounce messages must not be ++forwarded in this way, as this is likely to create a mail loop if something ++goes wrong. ++ ++ ++3.12 The save command ++--------------------- ++ ++ save <file name> ++e.g. save $home/mail/bookfolder ++ ++This command specifies that a copy of the message is to be appended to the ++given file (that is, the file is to be used as a mail folder). The delivery ++that save sets up is significant unless the command is preceded by "unseen" ++(see section 3.8). ++ ++More than one save command may be obeyed; each one causes a copy of the message ++to be written to its argument file, provided they are different (duplicate save ++commands are ignored). ++ ++If the file name does not start with a / character, the contents of the $home ++variable are prepended, unless it is empty, or the system administrator has ++disabled this feature. In conventional configurations, this variable is ++normally set in a user filter to the user's home directory, but the system ++administrator may set it to some other path. In some configurations, $home may ++be unset, or prepending may be disabled, in which case a non-absolute path name ++may be generated. Such configurations convert this to an absolute path when the ++delivery takes place. In a system filter, $home is never set. ++ ++The user must of course have permission to write to the file, and the writing ++of the file takes place in a process that is running as the user, under the ++user's primary group. Any secondary groups to which the user may belong are not ++normally taken into account, though the system administrator can configure Exim ++to set them up. In addition, the ability to use this command at all is ++controlled by the system administrator - it may be forbidden on some systems. ++ ++An optional mode value may be given after the file name. The value for the mode ++is interpreted as an octal number, even if it does not begin with a zero. For ++example: ++ ++save /some/folder 640 ++ ++This makes it possible for users to override the system-wide mode setting for ++file deliveries, which is normally 600. If an existing file does not have the ++correct mode, it is changed. ++ ++An alternative form of delivery may be enabled on your system, in which each ++message is delivered into a new file in a given directory. If this is the case, ++this functionality can be requested by giving the directory name terminated by ++a slash after the save command, for example ++ ++save separated/messages/ ++ ++There are several different formats for such deliveries; check with your system ++administrator or local documentation to find out which (if any) are available ++on your system. If this functionality is not enabled, the use of a path name ++ending in a slash causes an error. ++ ++ ++3.13 The pipe command ++--------------------- ++ ++ pipe <command> ++e.g. pipe "$home/bin/countmail $sender_address" ++ ++This command specifies that the message is to be delivered to the specified ++command using a pipe. The delivery that it sets up is significant unless the ++command is preceded by "unseen" (see section 3.8). Remember, however, that no ++deliveries are done while the filter is being processed. All deliveries happen ++later on. Therefore, the result of running the pipe is not available to the ++filter. ++ ++When the deliveries are done, a separate process is run, and a copy of the ++message is passed on its standard input. The process runs as the user, under ++the user's primary group. Any secondary groups to which the user may belong are ++not normally taken into account, though the system administrator can configure ++Exim to set them up. More than one pipe command may appear; each one causes a ++copy of the message to be written to its argument pipe, provided they are ++different (duplicate pipe commands are ignored). ++ ++When the time comes to transport the message, the command supplied to pipe is ++split up by Exim into a command name and a number of arguments. These are ++delimited by white space except for arguments enclosed in double quotes, in ++which case backslash is interpreted as an escape, or in single quotes, in which ++case no escaping is recognized. Note that as the whole command is normally ++supplied in double quotes, a second level of quoting is required for internal ++double quotes. For example: ++ ++pipe "$home/myscript \"size is $message_size\"" ++ ++String expansion is performed on the separate components after the line has ++been split up, and the command is then run directly by Exim; it is not run ++under a shell. Therefore, substitution cannot change the number of arguments, ++nor can quotes, backslashes or other shell metacharacters in variables cause ++confusion. ++ ++Documentation for some programs that are normally run via this kind of pipe ++often suggest that the command should start with ++ ++IFS=" " ++ ++This is a shell command, and should not be present in Exim filter files, since ++it does not normally run the command under a shell. ++ ++However, there is an option that the administrator can set to cause a shell to ++be used. In this case, the entire command is expanded as a single string and ++passed to the shell for interpretation. It is recommended that this be avoided ++if at all possible, since it can lead to problems when inserted variables ++contain shell metacharacters. ++ ++The default PATH set up for the command is determined by the system ++administrator, usually containing at least /bin and /usr/bin so that common ++commands are available without having to specify an absolute file name. ++However, it is possible for the system administrator to restrict the pipe ++facility so that the command name must not contain any / characters, and must ++be found in one of the directories in the configured PATH. It is also possible ++for the system administrator to lock out the use of the pipe command ++altogether. ++ ++When the command is run, a number of environment variables are set up. The ++complete list for pipe deliveries may be found in the Exim reference manual. ++Those that may be useful for pipe deliveries from user filter files are: ++ ++DOMAIN the domain of the address ++HOME your home directory ++LOCAL_PART see below ++LOCAL_PART_PREFIX see below ++LOCAL_PART_SUFFIX see below ++LOGNAME your login name ++MESSAGE_ID the unique id of the message ++PATH the command search path ++RECIPIENT the complete recipient address ++SENDER the sender of the message ++SHELL /bin/sh ++USER see below ++ ++LOCAL_PART, LOGNAME, and USER are all set to the same value, namely, your login ++id. LOCAL_PART_PREFIX and LOCAL_PART_SUFFIX may be set if Exim is configured to ++recognize prefixes or suffixes in the local parts of addresses. For example, a ++message addressed to pat-suf2@domain.example may cause the filter for user pat ++to be run. If this sets up a pipe delivery, LOCAL_PART_SUFFIX is "-suf2" when ++the pipe command runs. The system administrator has to configure Exim specially ++for this feature to be available. ++ ++If you run a command that is a shell script, be very careful in your use of ++data from the incoming message in the commands in your script. RFC 2822 is very ++generous in the characters that are permitted to appear in mail addresses, and ++in particular, an address may begin with a vertical bar or a slash. For this ++reason you should always use quotes round any arguments that involve data from ++the message, like this: ++ ++/some/command '$SENDER' ++ ++so that inserted shell meta-characters do not cause unwanted effects. ++ ++Remember that, as was explained earlier, the pipe command is not run at the ++time the filter file is interpreted. The filter just defines what deliveries ++are required for one particular addressee of a message. The deliveries ++themselves happen later, once Exim has decided everything that needs to be done ++for the message. ++ ++A consequence of this is that you cannot inspect the return code from the pipe ++command from within the filter. Nevertheless, the code returned by the command ++is important, because Exim uses it to decide whether the delivery has succeeded ++or failed. ++ ++The command should return a zero completion code if all has gone well. Most ++non-zero codes are treated by Exim as indicating a failure of the pipe. This is ++treated as a delivery failure, causing the message to be returned to its ++sender. However, there are some completion codes that are treated as temporary ++errors. The message remains on Exim's spool disk, and the delivery is tried ++again later, though it will ultimately time out if the delivery failures go on ++too long. The completion codes to which this applies can be specified by the ++system administrator; the default values are 73 and 75. ++ ++The pipe command should not normally write anything to its standard output or ++standard error file descriptors. If it does, whatever is written is normally ++returned to the sender of the message as a delivery error, though this action ++can be varied by the system administrator. ++ ++ ++3.14 Mail commands ++------------------ ++ ++There are two commands that cause the creation of a new mail message, neither ++of which count as a significant delivery unless the command is preceded by the ++word "seen" (see section 3.8). This is a powerful facility, but it should be ++used with care, because of the danger of creating infinite sequences of ++messages. The system administrator can forbid the use of these commands ++altogether. ++ ++To help prevent runaway message sequences, these commands have no effect when ++the incoming message is a bounce (delivery error) message, and messages sent by ++this means are treated as if they were reporting delivery errors. Thus, they ++should never themselves cause a bounce message to be returned. The basic ++mail-sending command is ++ ++mail [to <address-list>] ++ [cc <address-list>] ++ [bcc <address-list>] ++ [from <address>] ++ [reply_to <address>] ++ [subject <text>] ++ [extra_headers <text>] ++ [text <text>] ++ [[expand] file <filename>] ++ [return message] ++ [log <log file name>] ++ [once <note file name>] ++ [once_repeat <time interval>] ++e.g. mail text "Your message about $h_subject: has been received" ++ ++Each <address-list> can contain a number of addresses, separated by commas, in ++the format of a To: or Cc: header line. In fact, the text you supply here is ++copied exactly into the appropriate header line. It may contain additional ++information as well as email addresses. For example: ++ ++mail to "Julius Caesar <jc@rome.example>, \ ++ <ma@rome.example> (Mark A.)" ++ ++Similarly, the texts supplied for from and reply_to are copied into their ++respective header lines. ++ ++As a convenience for use in one common case, there is also a command called ++vacation. It behaves in the same way as mail, except that the defaults for the ++subject, file, log, once, and once_repeat options are ++ ++subject "On vacation" ++expand file .vacation.msg ++log .vacation.log ++once .vacation ++once_repeat 7d ++ ++respectively. These are the same file names and repeat period used by the ++traditional Unix vacation command. The defaults can be overridden by explicit ++settings, but if a file name is given its contents are expanded only if ++explicitly requested. ++ ++Warning: The vacation command should always be used conditionally, subject to ++at least the personal condition (see section 3.27 below) so as not to send ++automatic replies to non-personal messages from mailing lists or elsewhere. ++Sending an automatic response to a mailing list or a mailing list manager is an ++Internet Sin. ++ ++For both commands, the key/value argument pairs can appear in any order. At ++least one of text or file must appear (except with vacation, where there is a ++default for file); if both are present, the text string appears first in the ++message. If expand precedes file, each line of the file is subject to string ++expansion before it is included in the message. ++ ++Several lines of text can be supplied to text by including the escape sequence ++"\n" in the string wherever a newline is required. If the command is output ++during filter file testing, newlines in the text are shown as "\n". ++ ++Note that the keyword for creating a Reply-To: header is reply_to, because Exim ++keywords may contain underscores, but not hyphens. If the from keyword is ++present and the given address does not match the user who owns the forward ++file, Exim normally adds a Sender: header to the message, though it can be ++configured not to do this. ++ ++The extra_headers keyword allows you to add custom header lines to the message. ++The text supplied must be one or more syntactically valid RFC 2822 header ++lines. You can use "\n" within quoted text to specify newlines between headers, ++and also to define continued header lines. For example: ++ ++extra_headers "h1: first\nh2: second\n continued\nh3: third" ++ ++No newline should appear at the end of the final header line. ++ ++If no to argument appears, the message is sent to the address in the ++$reply_address variable (see section 3.3 above). An In-Reply-To: header is ++automatically included in the created message, giving a reference to the ++message identification of the incoming message. ++ ++If return message is specified, the incoming message that caused the filter ++file to be run is added to the end of the message, subject to a maximum size ++limitation. ++ ++If a log file is specified, a line is added to it for each message sent. ++ ++If a once file is specified, it is used to hold a database for remembering who ++has received a message, and no more than one message is ever sent to any ++particular address, unless once_repeat is set. This specifies a time interval ++after which another copy of the message is sent. The interval is specified as a ++sequence of numbers, each followed by the initial letter of one of "seconds", ++"minutes", "hours", "days", or "weeks". For example, ++ ++once_repeat 5d4h ++ ++causes a new message to be sent if at least 5 days and 4 hours have elapsed ++since the last one was sent. There must be no white space in a time interval. ++ ++Commonly, the file name specified for once is used as the base name for ++direct-access (DBM) file operations. There are a number of different DBM ++libraries in existence. Some operating systems provide one as a default, but ++even in this case a different one may have been used when building Exim. With ++some DBM libraries, specifying once results in two files being created, with ++the suffixes .dir and .pag being added to the given name. With some others a ++single file with the suffix .db is used, or the name is used unchanged. ++ ++Using a DBM file for implementing the once feature means that the file grows as ++large as necessary. This is not usually a problem, but some system ++administrators want to put a limit on it. The facility can be configured not to ++use a DBM file, but instead, to use a regular file with a maximum size. The ++data in such a file is searched sequentially, and if the file fills up, the ++oldest entry is deleted to make way for a new one. This means that some ++correspondents may receive a second copy of the message after an unpredictable ++interval. Consult your local information to see if your system is configured ++this way. ++ ++More than one mail or vacation command may be obeyed in a single filter run; ++they are all honoured, even when they are to the same recipient. ++ ++ ++3.15 Logging commands ++--------------------- ++ ++A log can be kept of actions taken by a filter file. This facility is normally ++available in conventional configurations, but there are some situations where ++it might not be. Also, the system administrator may choose to disable it. Check ++your local information if in doubt. ++ ++Logging takes place while the filter file is being interpreted. It does not ++queue up for later like the delivery commands. The reason for this is so that a ++log file need be opened only once for several write operations. There are two ++commands, neither of which constitutes a significant delivery. The first ++defines a file to which logging output is subsequently written: ++ ++ logfile <file name> ++e.g. logfile $home/filter.log ++ ++The file name must be fully qualified. You can use $home, as in this example, ++to refer to your home directory. The file name may optionally be followed by a ++mode for the file, which is used if the file has to be created. For example, ++ ++logfile $home/filter.log 0644 ++ ++The number is interpreted as octal, even if it does not begin with a zero. The ++default for the mode is 600. It is suggested that the logfile command normally ++appear as the first command in a filter file. Once a log file has been obeyed, ++the logwrite command can be used to write to it: ++ ++ logwrite "<some text string>" ++e.g. logwrite "$tod_log $message_id processed" ++ ++It is possible to have more than one logfile command, to specify writing to ++different log files in different circumstances. Writing takes place at the end ++of the file, and a newline character is added to the end of each string if ++there isn't one already there. Newlines can be put in the middle of the string ++by using the "\n" escape sequence. Lines from simultaneous deliveries may get ++interleaved in the file, as there is no interlocking, so you should plan your ++logging with this in mind. However, data should not get lost. ++ ++ ++3.16 The finish command ++----------------------- ++ ++The command finish, which has no arguments, causes Exim to stop interpreting ++the filter file. This is not a significant action unless preceded by "seen". A ++filter file containing only "seen finish" is a black hole. ++ ++ ++3.17 The testprint command ++-------------------------- ++ ++It is sometimes helpful to be able to print out the values of variables when ++testing filter files. The command ++ ++ testprint <text> ++e.g. testprint "home=$home reply_address=$reply_address" ++ ++does nothing when mail is being delivered. However, when the filtering code is ++being tested by means of the -bf option (see section 1.3 above), the value of ++the string is written to the standard output. ++ ++ ++3.18 The fail command ++--------------------- ++ ++When Exim's filtering facilities are being used as a system filter, the fail ++command is available, to force delivery failure. Because this command is ++normally usable only by the system administrator, and not enabled for use by ++ordinary users, it is described in more detail in the main Exim specification ++rather than in this document. ++ ++ ++3.19 The freeze command ++----------------------- ++ ++When Exim's filtering facilities are being used as a system filter, the freeze ++command is available, to freeze a message on the queue. Because this command is ++normally usable only by the system administrator, and not enabled for use by ++ordinary users, it is described in more detail in the main Exim specification ++rather than in this document. ++ ++ ++3.20 The headers command ++------------------------ ++ ++The headers command can be used to change the target character set that is used ++when translating the contents of encoded header lines for insertion by the ++$header_ mechanism (see section 3.5 above). The default can be set in the Exim ++configuration; if not specified, ISO-8859-1 is used. The only currently ++supported format for the headers command in user filters is as in this example: ++ ++headers charset "UTF-8" ++ ++That is, headers is followed by the word "charset" and then the name of a ++character set. This particular example would be useful if you wanted to compare ++the contents of a header to a UTF-8 string. ++ ++In system filter files, the headers command can be used to add or remove header ++lines from the message. These features are described in the main Exim ++specification. ++ ++ ++3.21 Obeying commands conditionally ++----------------------------------- ++ ++Most of the power of filtering comes from the ability to test conditions and ++obey different commands depending on the outcome. The if command is used to ++specify conditional execution, and its general form is ++ ++if <condition> ++then <commands> ++elif <condition> ++then <commands> ++else <commands> ++endif ++ ++There may be any number of elif and then sections (including none) and the else ++section is also optional. Any number of commands, including nested if commands, ++may appear in any of the <commands> sections. ++ ++Conditions can be combined by using the words and and or, and round brackets ++(parentheses) can be used to specify how several conditions are to combine. ++Without brackets, and is more binding than or. For example: ++ ++if ++$h_subject: contains "Make money" or ++$h_precedence: is "junk" or ++($h_sender: matches ^\\d{8}@ and not personal) or ++$message_body contains "this is not spam" ++then ++seen finish ++endif ++ ++A condition can be preceded by not to negate it, and there are also some ++negative forms of condition that are more English-like. ++ ++ ++3.22 String testing conditions ++------------------------------ ++ ++There are a number of conditions that operate on text strings, using the words ++"begins", "ends", "is", "contains" and "matches". If you want to apply the same ++test to more than one header line, you can easily concatenate them into a ++single string for testing, as in this example: ++ ++if "$h_to:, $h_cc:" contains me@domain.example then ... ++ ++If a string-testing condition name is written in lower case, the testing of ++letters is done without regard to case; if it is written in upper case (for ++example, "CONTAINS"), the case of letters is taken into account. ++ ++ <text1> begins <text2> ++ <text1> does not begin <text2> ++e.g. $header_from: begins "Friend@" ++ ++A "begins" test checks for the presence of the second string at the start of ++the first, both strings having been expanded. ++ ++ <text1> ends <text2> ++ <text1> does not end <text2> ++e.g. $header_from: ends "public.com.example" ++ ++An "ends" test checks for the presence of the second string at the end of the ++first, both strings having been expanded. ++ ++ <text1> is <text2> ++ <text1> is not <text2> ++e.g. $local_part_suffix is "-foo" ++ ++An "is" test does an exact match between the strings, having first expanded ++both strings. ++ ++ <text1> contains <text2> ++ <text1> does not contain <text2> ++e.g. $header_subject: contains "evolution" ++ ++A "contains" test does a partial string match, having expanded both strings. ++ ++ <text1> matches <text2> ++ <text1> does not match <text2> ++e.g. $sender_address matches "(bill|john)@" ++ ++For a "matches" test, after expansion of both strings, the second one is ++interpreted as a regular expression. Exim uses the PCRE regular expression ++library, which provides regular expressions that are compatible with Perl. ++ ++The match succeeds if the regular expression matches any part of the first ++string. If you want a regular expression to match only at the start or end of ++the subject string, you must encode that requirement explicitly, using the "^" ++or "$" metacharacters. The above example, which is not so constrained, matches ++all these addresses: ++ ++bill@test.example ++john@some.example ++spoonbill@example.com ++littlejohn@example.com ++ ++To match only the first two, you could use this: ++ ++if $sender_address matches "^(bill|john)@" then ... ++ ++Care must be taken if you need a backslash in a regular expression, because ++backslashes are interpreted as escape characters both by the string expansion ++code and by Exim's normal processing of strings in quotes. For example, if you ++want to test the sender address for a domain ending in .com the regular ++expression is ++ ++\.com$ ++ ++The backslash and dollar sign in that expression have to be escaped when used ++in a filter command, as otherwise they would be interpreted by the expansion ++code. Thus, what you actually write is ++ ++if $sender_address matches \\.com\$ ++ ++An alternative way of handling this is to make use of the "\N" expansion flag ++for suppressing expansion: ++ ++if $sender_address matches \N\.com$\N ++ ++Everything between the two occurrences of "\N" is copied without change by the ++string expander (and in fact you do not need the final one, because it is at ++the end of the string). If the regular expression is given in quotes (mandatory ++only if it contains white space) you have to write either ++ ++if $sender_address matches "\\\\.com\\$" ++ ++or ++ ++if $sender_address matches "\\N\\.com$\\N" ++ ++If the regular expression contains bracketed sub-expressions, numeric variable ++substitutions such as $1 can be used in the subsequent actions after a ++successful match. If the match fails, the values of the numeric variables ++remain unchanged. Previous values are not restored after endif. In other words, ++only one set of values is ever available. If the condition contains several ++sub-conditions connected by and or or, it is the strings extracted from the ++last successful match that are available in subsequent actions. Numeric ++variables from any one sub-condition are also available for use in subsequent ++sub-conditions, because string expansion of a condition occurs just before it ++is tested. ++ ++ ++3.23 Numeric testing conditions ++------------------------------- ++ ++The following conditions are available for performing numerical tests: ++ ++ <number1> is above <number2> ++ <number1> is not above <number2> ++ <number1> is below <number2> ++ <number1> is not below <number2> ++e.g. $message_size is not above 10k ++ ++The <number> arguments must expand to strings of digits, optionally followed by ++one of the letters K or M (upper case or lower case) which cause multiplication ++by 1024 and 1024x1024 respectively. ++ ++ ++3.24 Testing for significant deliveries ++--------------------------------------- ++ ++You can use the delivered condition to test whether or not any previously ++obeyed filter commands have set up a significant delivery. For example: ++ ++if not delivered then save mail/anomalous endif ++ ++"Delivered" is perhaps a poor choice of name for this condition, because the ++message has not actually been delivered; rather, a delivery has been set up for ++later processing. ++ ++ ++3.25 Testing for error messages ++------------------------------- ++ ++The condition error_message is true if the incoming message is a bounce (mail ++delivery error) message. Putting the command ++ ++if error_message then finish endif ++ ++at the head of your filter file is a useful insurance against things going ++wrong in such a way that you cannot receive delivery error reports. Note: ++error_message is a condition, not an expansion variable, and therefore is not ++preceded by "$". ++ ++ ++3.26 Testing a list of addresses ++-------------------------------- ++ ++There is a facility for looping through a list of addresses and applying a ++condition to each of them. It takes the form ++ ++foranyaddress <string> (<condition>) ++ ++where <string> is interpreted as a list of RFC 2822 addresses, as in a typical ++header line, and <condition> is any valid filter condition or combination of ++conditions. The "group" syntax that is defined for certain header lines that ++contain addresses is supported. ++ ++The parentheses surrounding the condition are mandatory, to delimit it from ++possible further sub-conditions of the enclosing if command. Within the ++condition, the expansion variable $thisaddress is set to the non-comment ++portion of each of the addresses in the string in turn. For example, if the ++string is ++ ++B.Simpson <bart@sfld.example>, lisa@sfld.example (his sister) ++ ++then $thisaddress would take on the values "bart@sfld.example" and ++"lisa@sfld.example" in turn. ++ ++If there are no valid addresses in the list, the whole condition is false. If ++the internal condition is true for any one address, the overall condition is ++true and the loop ends. If the internal condition is false for all addresses in ++the list, the overall condition is false. This example tests for the presence ++of an eight-digit local part in any address in a To: header: ++ ++if foranyaddress $h_to: ( $thisaddress matches ^\\d{8}@ ) then ... ++ ++When the overall condition is true, the value of $thisaddress in the commands ++that follow then is the last value it took on inside the loop. At the end of ++the if command, the value of $thisaddress is reset to what it was before. It is ++best to avoid the use of multiple occurrences of foranyaddress, nested or ++otherwise, in a single if command, if the value of $thisaddress is to be used ++afterwards, because it isn't always clear what the value will be. Nested if ++commands should be used instead. ++ ++Header lines can be joined together if a check is to be applied to more than ++one of them. For example: ++ ++if foranyaddress $h_to:,$h_cc: .... ++ ++This scans through the addresses in both the To: and the Cc: headers. ++ ++ ++3.27 Testing for personal mail ++------------------------------ ++ ++A common requirement is to distinguish between incoming personal mail and mail ++from a mailing list, or from a robot or other automatic process (for example, a ++bounce message). In particular, this test is normally required for "vacation ++messages". ++ ++The personal condition checks that the message is not a bounce message and that ++the current user's email address appears in the To: header. It also checks that ++the sender is not the current user or one of a number of common daemons, and ++that there are no header lines starting List- in the message. Finally, it ++checks the content of the Precedence: header line, if there is one. ++ ++You should always use the personal condition when generating automatic ++responses. This example shows the use of personal in a filter file that is ++sending out vacation messages: ++ ++if personal then ++mail to $reply_address ++subject "I am on holiday" ++file $home/vacation/message ++once $home/vacation/once ++once_repeat 10d ++endif ++ ++It is tempting, when writing commands like the above, to quote the original ++subject in the reply. For example: ++ ++subject "Re: $h_subject:" ++ ++There is a danger in doing this, however. It may allow a third party to ++subscribe you to an opt-in mailing list, provided that the list accepts bounce ++messages as subscription confirmations. (Messages sent from filters are always ++sent as bounce messages.) Well-managed lists require a non-bounce message to ++confirm a subscription, so the danger is relatively small. ++ ++If prefixes or suffixes are in use for local parts - something which depends on ++the configuration of Exim (see section 3.31 below) - the tests for the current ++user are done with the full address (including the prefix and suffix, if any) ++as well as with the prefix and suffix removed. If the system is configured to ++rewrite local parts of mail addresses, for example, to rewrite "dag46" as ++"Dirk.Gently", the rewritten form of the address is also used in the tests. ++ ++ ++3.28 Alias addresses for the personal condition ++----------------------------------------------- ++ ++It is quite common for people who have mail accounts on a number of different ++systems to forward all their mail to one system, and in this case a check for ++personal mail should test all their various mail addresses. To allow for this, ++the personal condition keyword can be followed by ++ ++alias <address> ++ ++any number of times, for example: ++ ++if personal alias smith@else.where.example ++ alias jones@other.place.example ++then ... ++ ++The alias addresses are treated as alternatives to the current user's email ++address when testing the contents of header lines. ++ ++ ++3.29 Details of the personal condition ++-------------------------------------- ++ ++The basic personal test is roughly equivalent to the following: ++ ++not error_message and ++$message_headers does not contain "\nList-Id:" and ++$message_headers does not contain "\nList-Help:" and ++$message_headers does not contain "\nList-Subscribe:" and ++$message_headers does not contain "\nList-Unsubscribe:" and ++$message_headers does not contain "\nList-Post:" and ++$message_headers does not contain "\nList-Owner:" and ++$message_headers does not contain "\nList-Archive:" and ++( ++"${if def:h_auto-submitted:{present}{absent}}" is "absent" or ++$header_auto-submitted: is "no" ++) and ++$header_precedence: does not contain "bulk" and ++$header_precedence: does not contain "list" and ++$header_precedence: does not contain "junk" and ++foranyaddress $header_to: ++( $thisaddress contains "$local_part$domain" ) and ++not foranyaddress $header_from: ++( ++$thisaddress contains "$local_part@$domain" or ++$thisaddress contains "server@" or ++$thisaddress contains "daemon@" or ++$thisaddress contains "root@" or ++$thisaddress contains "listserv@" or ++$thisaddress contains "majordomo@" or ++$thisaddress contains "-request@" or ++$thisaddress matches "^owner-[^@]+@" ++) ++ ++The variable $local_part contains the local part of the mail address of the ++user whose filter file is being run - it is normally your login id. The $domain ++variable contains the mail domain. As explained above, if aliases or rewriting ++are defined, or if prefixes or suffixes are in use, the tests for the current ++user are also done with alternative addresses. ++ ++ ++3.30 Testing delivery status ++---------------------------- ++ ++There are two conditions that are intended mainly for use in system filter ++files, but which are available in users' filter files as well. The condition ++first_delivery is true if this is the first process that is attempting to ++deliver the message, and false otherwise. This indicator is not reset until the ++first delivery process successfully terminates; if there is a crash or a power ++failure (for example), the next delivery attempt is also a "first delivery". ++ ++In a user filter file first_delivery will be false if there was previously an ++error in the filter, or if a delivery for the user failed owing to, for ++example, a quota error, or if forwarding to a remote address was deferred for ++some reason. ++ ++The condition manually_thawed is true if the message was "frozen" for some ++reason, and was subsequently released by the system administrator. It is ++unlikely to be of use in users' filter files. ++ ++ ++3.31 Multiple personal mailboxes ++-------------------------------- ++ ++The system administrator can configure Exim so that users can set up variants ++on their email addresses and handle them separately. Consult your system ++administrator or local documentation to see if this facility is enabled on your ++system, and if so, what the details are. ++ ++The facility involves the use of a prefix or a suffix on an email address. For ++example, all mail addressed to lg303-<something> would be the property of user ++lg303, who could determine how it was to be handled, depending on the value of ++<something>. ++ ++There are two possible ways in which this can be set up. The first possibility ++is the use of multiple .forward files. In this case, mail to lg303-foo, for ++example, is handled by looking for a file called .forward-foo in lg303's home ++directory. If such a file does not exist, delivery fails and the message is ++returned to its sender. ++ ++The alternative approach is to pass all messages through a single .forward ++file, which must be a filter file so that it can distinguish between the ++different cases by referencing the variables $local_part_prefix or ++$local_part_suffix, as in the final example in section 3.33 below. ++ ++It is possible to configure Exim to support both schemes at once. In this case, ++a specific .forward-foo file is first sought; if it is not found, the basic ++.forward file is used. ++ ++The personal test (see section 3.27) includes prefixes and suffixes in its ++checking. ++ ++ ++3.32 Ignoring delivery errors ++----------------------------- ++ ++As was explained above, filtering just sets up addresses for delivery - no ++deliveries are actually done while a filter file is active. If any of the ++generated addresses subsequently suffers a delivery failure, an error message ++is generated in the normal way. However, if a filter command that sets up a ++delivery is preceded by the word "noerror", errors for that delivery, and any ++deliveries consequent on it (that is, from alias, forwarding, or filter files ++it invokes) are ignored. ++ ++ ++3.33 Examples of Exim filter commands ++------------------------------------- ++ ++Simple forwarding: ++ ++# Exim filter ++deliver baggins@rivendell.middle-earth.example ++ ++Vacation handling using traditional means, assuming that the .vacation.msg and ++other files have been set up in your home directory: ++ ++# Exim filter ++unseen pipe "/usr/ucb/vacation \"$local_part\"" ++ ++Vacation handling inside Exim, having first created a file called .vacation.msg ++in your home directory: ++ ++# Exim filter ++if personal then vacation endif ++ ++File some messages by subject: ++ ++# Exim filter ++if $header_subject: contains "empire" or ++$header_subject: contains "foundation" ++then ++save $home/mail/f+e ++endif ++ ++Save all non-urgent messages by weekday: ++ ++# Exim filter ++if $header_subject: does not contain "urgent" and ++$tod_full matches "^(...)," ++then ++save $home/mail/$1 ++endif ++ ++Throw away all mail from one site, except from postmaster: ++ ++# Exim filter ++if $reply_address contains "@spam.site.example" and ++$reply_address does not contain "postmaster@" ++then ++seen finish ++endif ++ ++Handle multiple personal mailboxes: ++ ++# Exim filter ++if $local_part_suffix is "-foo" ++then ++save $home/mail/foo ++elif $local_part_suffix is "-bar" ++then ++save $home/mail/bar ++endif ++ +--- exim4-4.82~rc1.orig/doc/spec.txt ++++ exim4-4.82~rc1/doc/spec.txt +@@ -0,0 +1,34311 @@ ++Specification of the Exim Mail Transfer Agent ++ ++Exim Maintainers ++ ++Copyright (c) 2012 University of Cambridge ++ ++Revision 4.82 29 Sep 2013 EM ++ ++Abstract ++ ++The Exim MTA ++ ++------------------------------------------------------------------------------- ++ ++TABLE OF CONTENTS ++ ++1. Introduction ++ ++ 1.1. Exim documentation ++ 1.2. FTP and web sites ++ 1.3. Mailing lists ++ 1.4. Exim training ++ 1.5. Bug reports ++ 1.6. Where to find the Exim distribution ++ 1.7. Limitations ++ 1.8. Run time configuration ++ 1.9. Calling interface ++ 1.10. Terminology ++ ++2. Incorporated code ++3. How Exim receives and delivers mail ++ ++ 3.1. Overall philosophy ++ 3.2. Policy control ++ 3.3. User filters ++ 3.4. Message identification ++ 3.5. Receiving mail ++ 3.6. Handling an incoming message ++ 3.7. Life of a message ++ 3.8. Processing an address for delivery ++ 3.9. Processing an address for verification ++ 3.10. Running an individual router ++ 3.11. Duplicate addresses ++ 3.12. Router preconditions ++ 3.13. Delivery in detail ++ 3.14. Retry mechanism ++ 3.15. Temporary delivery failure ++ 3.16. Permanent delivery failure ++ 3.17. Failures to deliver bounce messages ++ ++4. Building and installing Exim ++ ++ 4.1. Unpacking ++ 4.2. Multiple machine architectures and operating systems ++ 4.3. PCRE library ++ 4.4. DBM libraries ++ 4.5. Pre-building configuration ++ 4.6. Support for iconv() ++ 4.7. Including TLS/SSL encryption support ++ 4.8. Use of tcpwrappers ++ 4.9. Including support for IPv6 ++ 4.10. Dynamically loaded lookup module support ++ 4.11. The building process ++ 4.12. Output from "make" ++ 4.13. Overriding build-time options for Exim ++ 4.14. OS-specific header files ++ 4.15. Overriding build-time options for the monitor ++ 4.16. Installing Exim binaries and scripts ++ 4.17. Installing info documentation ++ 4.18. Setting up the spool directory ++ 4.19. Testing ++ 4.20. Replacing another MTA with Exim ++ 4.21. Upgrading Exim ++ 4.22. Stopping the Exim daemon on Solaris ++ ++5. The Exim command line ++ ++ 5.1. Setting options by program name ++ 5.2. Trusted and admin users ++ 5.3. Command line options ++ ++6. The Exim run time configuration file ++ ++ 6.1. Using a different configuration file ++ 6.2. Configuration file format ++ 6.3. File inclusions in the configuration file ++ 6.4. Macros in the configuration file ++ 6.5. Macro substitution ++ 6.6. Redefining macros ++ 6.7. Overriding macro values ++ 6.8. Example of macro usage ++ 6.9. Conditional skips in the configuration file ++ 6.10. Common option syntax ++ 6.11. Boolean options ++ 6.12. Integer values ++ 6.13. Octal integer values ++ 6.14. Fixed point numbers ++ 6.15. Time intervals ++ 6.16. String values ++ 6.17. Expanded strings ++ 6.18. User and group names ++ 6.19. List construction ++ 6.20. Changing list separators ++ 6.21. Empty items in lists ++ 6.22. Format of driver configurations ++ ++7. The default configuration file ++ ++ 7.1. Main configuration settings ++ 7.2. ACL configuration ++ 7.3. Router configuration ++ 7.4. Transport configuration ++ 7.5. Default retry rule ++ 7.6. Rewriting configuration ++ 7.7. Authenticators configuration ++ ++8. Regular expressions ++9. File and database lookups ++ ++ 9.1. Examples of different lookup syntax ++ 9.2. Lookup types ++ 9.3. Single-key lookup types ++ 9.4. Query-style lookup types ++ 9.5. Temporary errors in lookups ++ 9.6. Default values in single-key lookups ++ 9.7. Partial matching in single-key lookups ++ 9.8. Lookup caching ++ 9.9. Quoting lookup data ++ 9.10. More about dnsdb ++ 9.11. Pseudo dnsdb record types ++ 9.12. Multiple dnsdb lookups ++ 9.13. More about LDAP ++ 9.14. Format of LDAP queries ++ 9.15. LDAP quoting ++ 9.16. LDAP connections ++ 9.17. LDAP authentication and control information ++ 9.18. Format of data returned by LDAP ++ 9.19. More about NIS+ ++ 9.20. SQL lookups ++ 9.21. More about MySQL, PostgreSQL, Oracle, and InterBase ++ 9.22. Specifying the server in the query ++ 9.23. Special MySQL features ++ 9.24. Special PostgreSQL features ++ 9.25. More about SQLite ++ ++10. Domain, host, address, and local part lists ++ ++ 10.1. Expansion of lists ++ 10.2. Negated items in lists ++ 10.3. File names in lists ++ 10.4. An lsearch file is not an out-of-line list ++ 10.5. Named lists ++ 10.6. Named lists compared with macros ++ 10.7. Named list caching ++ 10.8. Domain lists ++ 10.9. Host lists ++ 10.10. Special host list patterns ++ 10.11. Host list patterns that match by IP address ++ 10.12. Host list patterns for single-key lookups by host address ++ 10.13. Host list patterns that match by host name ++ 10.14. Behaviour when an IP address or name cannot be found ++ 10.15. Temporary DNS errors when looking up host information ++ 10.16. Host list patterns for single-key lookups by host name ++ 10.17. Host list patterns for query-style lookups ++ 10.18. Mixing wildcarded host names and addresses in host lists ++ 10.19. Address lists ++ 10.20. Case of letters in address lists ++ 10.21. Local part lists ++ ++11. String expansions ++ ++ 11.1. Literal text in expanded strings ++ 11.2. Character escape sequences in expanded strings ++ 11.3. Testing string expansions ++ 11.4. Forced expansion failure ++ 11.5. Expansion items ++ 11.6. Expansion operators ++ 11.7. Expansion conditions ++ 11.8. Combining expansion conditions ++ 11.9. Expansion variables ++ ++12. Embedded Perl ++ ++ 12.1. Setting up so Perl can be used ++ 12.2. Calling Perl subroutines ++ 12.3. Calling Exim functions from Perl ++ 12.4. Use of standard output and error by Perl ++ ++13. Starting the daemon and the use of network interfaces ++ ++ 13.1. Starting a listening daemon ++ 13.2. Special IP listening addresses ++ 13.3. Overriding local_interfaces and daemon_smtp_ports ++ 13.4. Support for the obsolete SSMTP (or SMTPS) protocol ++ 13.5. IPv6 address scopes ++ 13.6. Disabling IPv6 ++ 13.7. Examples of starting a listening daemon ++ 13.8. Recognizing the local host ++ 13.9. Delivering to a remote host ++ ++14. Main configuration ++ ++ 14.1. Miscellaneous ++ 14.2. Exim parameters ++ 14.3. Privilege controls ++ 14.4. Logging ++ 14.5. Frozen messages ++ 14.6. Data lookups ++ 14.7. Message ids ++ 14.8. Embedded Perl Startup ++ 14.9. Daemon ++ 14.10. Resource control ++ 14.11. Policy controls ++ 14.12. Callout cache ++ 14.13. TLS ++ 14.14. Local user handling ++ 14.15. All incoming messages (SMTP and non-SMTP) ++ 14.16. Non-SMTP incoming messages ++ 14.17. Incoming SMTP messages ++ 14.18. SMTP extensions ++ 14.19. Processing messages ++ 14.20. System filter ++ 14.21. Routing and delivery ++ 14.22. Bounce and warning messages ++ 14.23. Alphabetical list of main options ++ ++15. Generic options for routers ++16. The accept router ++17. The dnslookup router ++ ++ 17.1. Problems with DNS lookups ++ 17.2. Declining addresses by dnslookup ++ 17.3. Private options for dnslookup ++ 17.4. Effect of qualify_single and search_parents ++ ++18. The ipliteral router ++19. The iplookup router ++20. The manualroute router ++ ++ 20.1. Private options for manualroute ++ 20.2. Routing rules in route_list ++ 20.3. Routing rules in route_data ++ 20.4. Format of the list of hosts ++ 20.5. Format of one host item ++ 20.6. How the list of hosts is used ++ 20.7. How the options are used ++ 20.8. Manualroute examples ++ ++21. The queryprogram router ++22. The redirect router ++ ++ 22.1. Redirection data ++ 22.2. Forward files and address verification ++ 22.3. Interpreting redirection data ++ 22.4. Items in a non-filter redirection list ++ 22.5. Redirecting to a local mailbox ++ 22.6. Special items in redirection lists ++ 22.7. Duplicate addresses ++ 22.8. Repeated redirection expansion ++ 22.9. Errors in redirection lists ++ 22.10. Private options for the redirect router ++ ++23. Environment for running local transports ++ ++ 23.1. Concurrent deliveries ++ 23.2. Uids and gids ++ 23.3. Current and home directories ++ 23.4. Expansion variables derived from the address ++ ++24. Generic options for transports ++25. Address batching in local transports ++26. The appendfile transport ++ ++ 26.1. The file and directory options ++ 26.2. Private options for appendfile ++ 26.3. Operational details for appending ++ 26.4. Operational details for delivery to a new file ++ 26.5. Maildir delivery ++ 26.6. Using tags to record message sizes ++ 26.7. Using a maildirsize file ++ 26.8. Mailstore delivery ++ 26.9. Non-special new file delivery ++ ++27. The autoreply transport ++ ++ 27.1. Private options for autoreply ++ ++28. The lmtp transport ++29. The pipe transport ++ ++ 29.1. Concurrent delivery ++ 29.2. Returned status and data ++ 29.3. How the command is run ++ 29.4. Environment variables ++ 29.5. Private options for pipe ++ 29.6. Using an external local delivery agent ++ ++30. The smtp transport ++ ++ 30.1. Multiple messages on a single connection ++ 30.2. Use of the $host and $host_address variables ++ 30.3. Use of $tls_cipher and $tls_peerdn ++ 30.4. Private options for smtp ++ 30.5. How the limits for the number of hosts to try are used ++ ++31. Address rewriting ++ ++ 31.1. Explicitly configured address rewriting ++ 31.2. When does rewriting happen? ++ 31.3. Testing the rewriting rules that apply on input ++ 31.4. Rewriting rules ++ 31.5. Rewriting patterns ++ 31.6. Rewriting replacements ++ 31.7. Rewriting flags ++ 31.8. Flags specifying which headers and envelope addresses to rewrite ++ 31.9. The SMTP-time rewriting flag ++ 31.10. Flags controlling the rewriting process ++ 31.11. Rewriting examples ++ ++32. Retry configuration ++ ++ 32.1. Changing retry rules ++ 32.2. Format of retry rules ++ 32.3. Choosing which retry rule to use for address errors ++ 32.4. Choosing which retry rule to use for host and message errors ++ 32.5. Retry rules for specific errors ++ 32.6. Retry rules for specified senders ++ 32.7. Retry parameters ++ 32.8. Retry rule examples ++ 32.9. Timeout of retry data ++ 32.10. Long-term failures ++ 32.11. Deliveries that work intermittently ++ ++33. SMTP authentication ++ ++ 33.1. Generic options for authenticators ++ 33.2. The AUTH parameter on MAIL commands ++ 33.3. Authentication on an Exim server ++ 33.4. Testing server authentication ++ 33.5. Authentication by an Exim client ++ ++34. The plaintext authenticator ++ ++ 34.1. Plaintext options ++ 34.2. Using plaintext in a server ++ 34.3. The PLAIN authentication mechanism ++ 34.4. The LOGIN authentication mechanism ++ 34.5. Support for different kinds of authentication ++ 34.6. Using plaintext in a client ++ ++35. The cram_md5 authenticator ++ ++ 35.1. Using cram_md5 as a server ++ 35.2. Using cram_md5 as a client ++ ++36. The cyrus_sasl authenticator ++ ++ 36.1. Using cyrus_sasl as a server ++ ++37. The dovecot authenticator ++38. The gsasl authenticator ++ ++ 38.1. gsasl auth variables ++ ++39. The heimdal_gssapi authenticator ++ ++ 39.1. heimdal_gssapi auth variables ++ ++40. The spa authenticator ++ ++ 40.1. Using spa as a server ++ 40.2. Using spa as a client ++ ++41. Encrypted SMTP connections using TLS/SSL ++ ++ 41.1. Support for the legacy "ssmtp" (aka "smtps") protocol ++ 41.2. OpenSSL vs GnuTLS ++ 41.3. GnuTLS parameter computation ++ 41.4. Requiring specific ciphers in OpenSSL ++ 41.5. Requiring specific ciphers or other parameters in GnuTLS ++ 41.6. Configuring an Exim server to use TLS ++ 41.7. Requesting and verifying client certificates ++ 41.8. Revoked certificates ++ 41.9. Configuring an Exim client to use TLS ++ 41.10. Use of TLS Server Name Indication ++ 41.11. Multiple messages on the same encrypted TCP/IP connection ++ 41.12. Certificates and all that ++ 41.13. Certificate chains ++ 41.14. Self-signed certificates ++ ++42. Access control lists ++ ++ 42.1. Testing ACLs ++ 42.2. Specifying when ACLs are used ++ 42.3. The non-SMTP ACLs ++ 42.4. The SMTP connect ACL ++ 42.5. The EHLO/HELO ACL ++ 42.6. The DATA ACLs ++ 42.7. The SMTP DKIM ACL ++ 42.8. The SMTP MIME ACL ++ 42.9. The QUIT ACL ++ 42.10. The not-QUIT ACL ++ 42.11. Finding an ACL to use ++ 42.12. ACL return codes ++ 42.13. Unset ACL options ++ 42.14. Data for message ACLs ++ 42.15. Data for non-message ACLs ++ 42.16. Format of an ACL ++ 42.17. ACL verbs ++ 42.18. ACL variables ++ 42.19. Condition and modifier processing ++ 42.20. ACL modifiers ++ 42.21. Use of the control modifier ++ 42.22. Summary of message fixup control ++ 42.23. Adding header lines in ACLs ++ 42.24. Removing header lines in ACLs ++ 42.25. ACL conditions ++ 42.26. Using DNS lists ++ 42.27. Specifying the IP address for a DNS list lookup ++ 42.28. DNS lists keyed on domain names ++ 42.29. Multiple explicit keys for a DNS list ++ 42.30. Data returned by DNS lists ++ 42.31. Variables set from DNS lists ++ 42.32. Additional matching conditions for DNS lists ++ 42.33. Negated DNS matching conditions ++ 42.34. Handling multiple DNS records from a DNS list ++ 42.35. Detailed information from merged DNS lists ++ 42.36. DNS lists and IPv6 ++ 42.37. Rate limiting incoming messages ++ 42.38. Ratelimit options for what is being measured ++ 42.39. Ratelimit update modes ++ 42.40. Ratelimit options for handling fast clients ++ 42.41. Limiting the rate of different events ++ 42.42. Using rate limiting ++ 42.43. Address verification ++ 42.44. Callout verification ++ 42.45. Additional parameters for callouts ++ 42.46. Callout caching ++ 42.47. Sender address verification reporting ++ 42.48. Redirection while verifying ++ 42.49. Client SMTP authorization (CSA) ++ 42.50. Bounce address tag validation ++ 42.51. Using an ACL to control relaying ++ 42.52. Checking a relay configuration ++ ++43. Content scanning at ACL time ++ ++ 43.1. Scanning for viruses ++ 43.2. Scanning with SpamAssassin ++ 43.3. Calling SpamAssassin from an Exim ACL ++ 43.4. Scanning MIME parts ++ 43.5. Scanning with regular expressions ++ 43.6. The demime condition ++ ++44. Adding a local scan function to Exim ++ ++ 44.1. Building Exim to use a local scan function ++ 44.2. API for local_scan() ++ 44.3. Configuration options for local_scan() ++ 44.4. Available Exim variables ++ 44.5. Structure of header lines ++ 44.6. Structure of recipient items ++ 44.7. Available Exim functions ++ 44.8. More about Exim's memory handling ++ ++45. System-wide message filtering ++ ++ 45.1. Specifying a system filter ++ 45.2. Testing a system filter ++ 45.3. Contents of a system filter ++ 45.4. Additional variable for system filters ++ 45.5. Defer, freeze, and fail commands for system filters ++ 45.6. Adding and removing headers in a system filter ++ 45.7. Setting an errors address in a system filter ++ 45.8. Per-address filtering ++ ++46. Message processing ++ ++ 46.1. Submission mode for non-local messages ++ 46.2. Line endings ++ 46.3. Unqualified addresses ++ 46.4. The UUCP From line ++ 46.5. Resent- header lines ++ 46.6. The Auto-Submitted: header line ++ 46.7. The Bcc: header line ++ 46.8. The Date: header line ++ 46.9. The Delivery-date: header line ++ 46.10. The Envelope-to: header line ++ 46.11. The From: header line ++ 46.12. The Message-ID: header line ++ 46.13. The Received: header line ++ 46.14. The References: header line ++ 46.15. The Return-path: header line ++ 46.16. The Sender: header line ++ 46.17. Adding and removing header lines in routers and transports ++ 46.18. Constructed addresses ++ 46.19. Case of local parts ++ 46.20. Dots in local parts ++ 46.21. Rewriting addresses ++ ++47. SMTP processing ++ ++ 47.1. Outgoing SMTP and LMTP over TCP/IP ++ 47.2. Errors in outgoing SMTP ++ 47.3. Incoming SMTP messages over TCP/IP ++ 47.4. Unrecognized SMTP commands ++ 47.5. Syntax and protocol errors in SMTP commands ++ 47.6. Use of non-mail SMTP commands ++ 47.7. The VRFY and EXPN commands ++ 47.8. The ETRN command ++ 47.9. Incoming local SMTP ++ 47.10. Outgoing batched SMTP ++ 47.11. Incoming batched SMTP ++ ++48. Customizing bounce and warning messages ++ ++ 48.1. Customizing bounce messages ++ 48.2. Customizing warning messages ++ ++49. Some common configuration settings ++ ++ 49.1. Sending mail to a smart host ++ 49.2. Using Exim to handle mailing lists ++ 49.3. Syntax errors in mailing lists ++ 49.4. Re-expansion of mailing lists ++ 49.5. Closed mailing lists ++ 49.6. Variable Envelope Return Paths (VERP) ++ 49.7. Virtual domains ++ 49.8. Multiple user mailboxes ++ 49.9. Simplified vacation processing ++ 49.10. Taking copies of mail ++ 49.11. Intermittently connected hosts ++ 49.12. Exim on the upstream server host ++ 49.13. Exim on the intermittently connected client host ++ ++50. Using Exim as a non-queueing client ++51. Log files ++ ++ 51.1. Where the logs are written ++ 51.2. Logging to local files that are periodically "cycled" ++ 51.3. Datestamped log files ++ 51.4. Logging to syslog ++ 51.5. Log line flags ++ 51.6. Logging message reception ++ 51.7. Logging deliveries ++ 51.8. Discarded deliveries ++ 51.9. Deferred deliveries ++ 51.10. Delivery failures ++ 51.11. Fake deliveries ++ 51.12. Completion ++ 51.13. Summary of Fields in Log Lines ++ 51.14. Other log entries ++ 51.15. Reducing or increasing what is logged ++ 51.16. Message log ++ ++52. Exim utilities ++ ++ 52.1. Finding out what Exim processes are doing (exiwhat) ++ 52.2. Selective queue listing (exiqgrep) ++ 52.3. Summarizing the queue (exiqsumm) ++ 52.4. Extracting specific information from the log (exigrep) ++ 52.5. Selecting messages by various criteria (exipick) ++ 52.6. Cycling log files (exicyclog) ++ 52.7. Mail statistics (eximstats) ++ 52.8. Checking access policy (exim_checkaccess) ++ 52.9. Making DBM files (exim_dbmbuild) ++ 52.10. Finding individual retry times (exinext) ++ 52.11. Hints database maintenance ++ 52.12. exim_dumpdb ++ 52.13. exim_tidydb ++ 52.14. exim_fixdb ++ 52.15. Mailbox maintenance (exim_lock) ++ ++53. The Exim monitor ++ ++ 53.1. Running the monitor ++ 53.2. The stripcharts ++ 53.3. Main action buttons ++ 53.4. The log display ++ 53.5. The queue display ++ 53.6. The queue menu ++ ++54. Security considerations ++ ++ 54.1. Building a more "hardened" Exim ++ 54.2. Root privilege ++ 54.3. Running Exim without privilege ++ 54.4. Delivering to local files ++ 54.5. Running local commands ++ 54.6. IPv4 source routing ++ 54.7. The VRFY, EXPN, and ETRN commands in SMTP ++ 54.8. Privileged users ++ 54.9. Spool files ++ 54.10. Use of argv[0] ++ 54.11. Use of %f formatting ++ 54.12. Embedded Exim path ++ 54.13. Dynamic module directory ++ 54.14. Use of sprintf() ++ 54.15. Use of debug_printf() and log_write() ++ 54.16. Use of strcat() and strcpy() ++ ++55. Format of spool files ++ ++ 55.1. Format of the -H file ++ ++56. Support for DKIM (DomainKeys Identified Mail) ++ ++ 56.1. Signing outgoing messages ++ 56.2. Verifying DKIM signatures in incoming mail ++ ++57. Adding new drivers or lookup types ++ ++ ++ ++=============================================================================== ++1. INTRODUCTION ++ ++Exim is a mail transfer agent (MTA) for hosts that are running Unix or ++Unix-like operating systems. It was designed on the assumption that it would be ++run on hosts that are permanently connected to the Internet. However, it can be ++used on intermittently connected hosts with suitable configuration adjustments. ++ ++Configuration files currently exist for the following operating systems: AIX, ++BSD/OS (aka BSDI), Darwin (Mac OS X), DGUX, Dragonfly, FreeBSD, GNU/Hurd, GNU/ ++Linux, HI-OSF (Hitachi), HI-UX, HP-UX, IRIX, MIPS RISCOS, NetBSD, OpenBSD, ++OpenUNIX, QNX, SCO, SCO SVR4.2 (aka UNIX-SV), Solaris (aka SunOS5), SunOS4, ++Tru64-Unix (formerly Digital UNIX, formerly DEC-OSF1), Ultrix, and Unixware. ++Some of these operating systems are no longer current and cannot easily be ++tested, so the configuration files may no longer work in practice. ++ ++There are also configuration files for compiling Exim in the Cygwin environment ++that can be installed on systems running Windows. However, this document does ++not contain any information about running Exim in the Cygwin environment. ++ ++The terms and conditions for the use and distribution of Exim are contained in ++the file NOTICE. Exim is distributed under the terms of the GNU General Public ++Licence, a copy of which may be found in the file LICENCE. ++ ++The use, supply or promotion of Exim for the purpose of sending bulk, ++unsolicited electronic mail is incompatible with the basic aims of the program, ++which revolve around the free provision of a service that enhances the quality ++of personal communications. The author of Exim regards indiscriminate ++mass-mailing as an antisocial, irresponsible abuse of the Internet. ++ ++Exim owes a great deal to Smail 3 and its author, Ron Karr. Without the ++experience of running and working on the Smail 3 code, I could never have ++contemplated starting to write a new MTA. Many of the ideas and user interfaces ++were originally taken from Smail 3, though the actual code of Exim is entirely ++new, and has developed far beyond the initial concept. ++ ++Many people, both in Cambridge and around the world, have contributed to the ++development and the testing of Exim, and to porting it to various operating ++systems. I am grateful to them all. The distribution now contains a file called ++ACKNOWLEDGMENTS, in which I have started recording the names of contributors. ++ ++ ++1.1 Exim documentation ++---------------------- ++ ++This edition of the Exim specification applies to version 4.82 of Exim. ++Substantive changes from the 4.80 edition are marked in some renditions of the ++document; this paragraph is so marked if the rendition is capable of showing a ++change indicator. ++ ++This document is very much a reference manual; it is not a tutorial. The reader ++is expected to have some familiarity with the SMTP mail transfer protocol and ++with general Unix system administration. Although there are some discussions ++and examples in places, the information is mostly organized in a way that makes ++it easy to look up, rather than in a natural order for sequential reading. ++Furthermore, the manual aims to cover every aspect of Exim in detail, including ++a number of rarely-used, special-purpose features that are unlikely to be of ++very wide interest. ++ ++An "easier" discussion of Exim which provides more in-depth explanatory, ++introductory, and tutorial material can be found in a book entitled The Exim ++SMTP Mail Server (second edition, 2007), published by UIT Cambridge (http:// ++www.uit.co.uk/exim-book/). ++ ++This book also contains a chapter that gives a general introduction to SMTP and ++Internet mail. Inevitably, however, the book is unlikely to be fully up-to-date ++with the latest release of Exim. (Note that the earlier book about Exim, ++published by O'Reilly, covers Exim 3, and many things have changed in Exim 4.) ++ ++If you are using a Debian distribution of Exim, you will find information about ++Debian-specific features in the file /usr/share/doc/exim4-base/README.Debian. ++The command man update-exim.conf is another source of Debian-specific ++information. ++ ++As the program develops, there may be features in newer versions that have not ++yet made it into this document, which is updated only when the most significant ++digit of the fractional part of the version number changes. Specifications of ++new features that are not yet in this manual are placed in the file doc/ ++NewStuff in the Exim distribution. ++ ++Some features may be classified as "experimental". These may change ++incompatibly while they are developing, or even be withdrawn. For this reason, ++they are not documented in this manual. Information about experimental features ++can be found in the file doc/experimental.txt. ++ ++All changes to the program (whether new features, bug fixes, or other kinds of ++change) are noted briefly in the file called doc/ChangeLog. ++ ++This specification itself is available as an ASCII file in doc/spec.txt so that ++it can easily be searched with a text editor. Other files in the doc directory ++are: ++ ++OptionLists.txt list of all options in alphabetical order ++dbm.discuss.txt discussion about DBM libraries ++exim.8 a man page of Exim's command line options ++experimental.txt documentation of experimental features ++filter.txt specification of the filter language ++Exim3.upgrade upgrade notes from release 2 to release 3 ++Exim4.upgrade upgrade notes from release 3 to release 4 ++ ++The main specification and the specification of the filtering language are also ++available in other formats (HTML, PostScript, PDF, and Texinfo). Section 1.6 ++below tells you how to get hold of these. ++ ++ ++1.2 FTP and web sites ++--------------------- ++ ++The primary site for Exim source distributions is currently the University of ++Cambridge's FTP site, whose contents are described in Where to find the Exim ++distribution below. In addition, there is a web site and an FTP site at ++exim.org. These are now also hosted at the University of Cambridge. The ++exim.org site was previously hosted for a number of years by Energis Squared, ++formerly Planet Online Ltd, whose support I gratefully acknowledge. ++ ++As well as Exim distribution tar files, the Exim web site contains a number of ++differently formatted versions of the documentation. A recent addition to the ++online information is the Exim wiki (http://wiki.exim.org), which contains what ++used to be a separate FAQ, as well as various other examples, tips, and ++know-how that have been contributed by Exim users. ++ ++An Exim Bugzilla exists at http://bugs.exim.org. You can use this to report ++bugs, and also to add items to the wish list. Please search first to check that ++you are not duplicating a previous entry. ++ ++ ++1.3 Mailing lists ++----------------- ++ ++The following Exim mailing lists exist: ++ ++exim-announce@exim.org Moderated, low volume announcements list ++exim-users@exim.org General discussion list ++exim-dev@exim.org Discussion of bugs, enhancements, etc. ++exim-cvs@exim.org Automated commit messages from the VCS ++ ++You can subscribe to these lists, change your existing subscriptions, and view ++or search the archives via the mailing lists link on the Exim home page. If you ++are using a Debian distribution of Exim, you may wish to subscribe to the ++Debian-specific mailing list pkg-exim4-users@lists.alioth.debian.org via this ++web page: ++ ++http://lists.alioth.debian.org/mailman/listinfo/pkg-exim4-users ++ ++Please ask Debian-specific questions on this list and not on the general Exim ++lists. ++ ++ ++1.4 Exim training ++----------------- ++ ++Training courses in Cambridge (UK) used to be run annually by the author of ++Exim, before he retired. At the time of writing, there are no plans to run ++further Exim courses in Cambridge. However, if that changes, relevant ++information will be posted at http://www-tus.csx.cam.ac.uk/courses/exim/. ++ ++ ++1.5 Bug reports ++--------------- ++ ++Reports of obvious bugs can be emailed to bugs@exim.org or reported via the ++Bugzilla (http://bugs.exim.org). However, if you are unsure whether some ++behaviour is a bug or not, the best thing to do is to post a message to the ++exim-dev mailing list and have it discussed. ++ ++ ++1.6 Where to find the Exim distribution ++--------------------------------------- ++ ++The master ftp site for the Exim distribution is ++ ++ftp://ftp.csx.cam.ac.uk/pub/software/email/exim ++ ++This is mirrored by ++ ++ftp://ftp.exim.org/pub/exim ++ ++The file references that follow are relative to the exim directories at these ++sites. There are now quite a number of independent mirror sites around the ++world. Those that I know about are listed in the file called Mirrors. ++ ++Within the exim directory there are subdirectories called exim3 (for previous ++Exim 3 distributions), exim4 (for the latest Exim 4 distributions), and Testing ++for testing versions. In the exim4 subdirectory, the current release can always ++be found in files called ++ ++exim-n.nn.tar.gz ++exim-n.nn.tar.bz2 ++ ++where n.nn is the highest such version number in the directory. The two files ++contain identical data; the only difference is the type of compression. The ++.bz2 file is usually a lot smaller than the .gz file. ++ ++The distributions will be PGP signed by an individual key of the Release ++Coordinator. This key will have a uid containing an email address in the ++exim.org domain and will have signatures from other people, including other ++Exim maintainers. We expect that the key will be in the "strong set" of PGP ++keys. There should be a trust path to that key from Nigel Metheringham's PGP ++key, a version of which can be found in the release directory in the file ++nigel-pubkey.asc. All keys used will be available in public keyserver pools, ++such as pool.sks-keyservers.net. ++ ++At time of last update, releases were being made by Phil Pennock and signed ++with key 0x403043153903637F, although that key is expected to be replaced in ++2013. A trust path from Nigel's key to Phil's can be observed at https:// ++www.security.spodhuis.org/exim-trustpath. ++ ++The signatures for the tar bundles are in: ++ ++exim-n.nn.tar.gz.asc ++exim-n.nn.tar.bz2.asc ++ ++For each released version, the log of changes is made separately available in a ++separate file in the directory ChangeLogs so that it is possible to find out ++what has changed without having to download the entire distribution. ++ ++The main distribution contains ASCII versions of this specification and other ++documentation; other formats of the documents are available in separate files ++inside the exim4 directory of the FTP site: ++ ++exim-html-n.nn.tar.gz ++exim-pdf-n.nn.tar.gz ++exim-postscript-n.nn.tar.gz ++exim-texinfo-n.nn.tar.gz ++ ++These tar files contain only the doc directory, not the complete distribution, ++and are also available in .bz2 as well as .gz forms. ++ ++ ++1.7 Limitations ++--------------- ++ ++ * Exim is designed for use as an Internet MTA, and therefore handles ++ addresses in RFC 2822 domain format only. It cannot handle UUCP "bang ++ paths", though simple two-component bang paths can be converted by a ++ straightforward rewriting configuration. This restriction does not prevent ++ Exim from being interfaced to UUCP as a transport mechanism, provided that ++ domain addresses are used. ++ ++ * Exim insists that every address it handles has a domain attached. For ++ incoming local messages, domainless addresses are automatically qualified ++ with a configured domain value. Configuration options specify from which ++ remote systems unqualified addresses are acceptable. These are then ++ qualified on arrival. ++ ++ * The only external transport mechanisms that are currently implemented are ++ SMTP and LMTP over a TCP/IP network (including support for IPv6). However, ++ a pipe transport is available, and there are facilities for writing ++ messages to files and pipes, optionally in batched SMTP format; these ++ facilities can be used to send messages to other transport mechanisms such ++ as UUCP, provided they can handle domain-style addresses. Batched SMTP ++ input is also catered for. ++ ++ * Exim is not designed for storing mail for dial-in hosts. When the volumes ++ of such mail are large, it is better to get the messages "delivered" into ++ files (that is, off Exim's queue) and subsequently passed on to the dial-in ++ hosts by other means. ++ ++ * Although Exim does have basic facilities for scanning incoming messages, ++ these are not comprehensive enough to do full virus or spam scanning. Such ++ operations are best carried out using additional specialized software ++ packages. If you compile Exim with the content-scanning extension, ++ straightforward interfaces to a number of common scanners are provided. ++ ++ ++1.8 Run time configuration ++-------------------------- ++ ++Exim's run time configuration is held in a single text file that is divided ++into a number of sections. The entries in this file consist of keywords and ++values, in the style of Smail 3 configuration files. A default configuration ++file which is suitable for simple online installations is provided in the ++distribution, and is described in chapter 7 below. ++ ++ ++1.9 Calling interface ++--------------------- ++ ++Like many MTAs, Exim has adopted the Sendmail command line interface so that it ++can be a straight replacement for /usr/lib/sendmail or /usr/sbin/sendmail when ++sending mail, but you do not need to know anything about Sendmail in order to ++run Exim. For actions other than sending messages, Sendmail-compatible options ++also exist, but those that produce output (for example, -bp, which lists the ++messages on the queue) do so in Exim's own format. There are also some ++additional options that are compatible with Smail 3, and some further options ++that are new to Exim. Chapter 5 documents all Exim's command line options. This ++information is automatically made into the man page that forms part of the Exim ++distribution. ++ ++Control of messages on the queue can be done via certain privileged command ++line options. There is also an optional monitor program called eximon, which ++displays current information in an X window, and which contains a menu ++interface to Exim's command line administration options. ++ ++ ++1.10 Terminology ++---------------- ++ ++The body of a message is the actual data that the sender wants to transmit. It ++is the last part of a message, and is separated from the header (see below) by ++a blank line. ++ ++When a message cannot be delivered, it is normally returned to the sender in a ++delivery failure message or a "non-delivery report" (NDR). The term bounce is ++commonly used for this action, and the error reports are often called bounce ++messages. This is a convenient shorthand for "delivery failure error report". ++Such messages have an empty sender address in the message's envelope (see ++below) to ensure that they cannot themselves give rise to further bounce ++messages. ++ ++The term default appears frequently in this manual. It is used to qualify a ++value which is used in the absence of any setting in the configuration. It may ++also qualify an action which is taken unless a configuration setting specifies ++otherwise. ++ ++The term defer is used when the delivery of a message to a specific destination ++cannot immediately take place for some reason (a remote host may be down, or a ++user's local mailbox may be full). Such deliveries are deferred until a later ++time. ++ ++The word domain is sometimes used to mean all but the first component of a ++host's name. It is not used in that sense here, where it normally refers to the ++part of an email address following the @ sign. ++ ++A message in transit has an associated envelope, as well as a header and a ++body. The envelope contains a sender address (to which bounce messages should ++be delivered), and any number of recipient addresses. References to the sender ++or the recipients of a message usually mean the addresses in the envelope. An ++MTA uses these addresses for delivery, and for returning bounce messages, not ++the addresses that appear in the header lines. ++ ++The header of a message is the first part of a message's text, consisting of a ++number of lines, each of which has a name such as From:, To:, Subject:, etc. ++Long header lines can be split over several text lines by indenting the ++continuations. The header is separated from the body by a blank line. ++ ++The term local part, which is taken from RFC 2822, is used to refer to that ++part of an email address that precedes the @ sign. The part that follows the @ ++sign is called the domain or mail domain. ++ ++The terms local delivery and remote delivery are used to distinguish delivery ++to a file or a pipe on the local host from delivery by SMTP over TCP/IP to ++another host. As far as Exim is concerned, all hosts other than the host it is ++running on are remote. ++ ++Return path is another name that is used for the sender address in a message's ++envelope. ++ ++The term queue is used to refer to the set of messages awaiting delivery, ++because this term is in widespread use in the context of MTAs. However, in ++Exim's case the reality is more like a pool than a queue, because there is ++normally no ordering of waiting messages. ++ ++The term queue runner is used to describe a process that scans the queue and ++attempts to deliver those messages whose retry times have come. This term is ++used by other MTAs, and also relates to the command runq, but in Exim the ++waiting messages are normally processed in an unpredictable order. ++ ++The term spool directory is used for a directory in which Exim keeps the ++messages on its queue - that is, those that it is in the process of delivering. ++This should not be confused with the directory in which local mailboxes are ++stored, which is called a "spool directory" by some people. In the Exim ++documentation, "spool" is always used in the first sense. ++ ++ ++ ++=============================================================================== ++2. INCORPORATED CODE ++ ++A number of pieces of external code are included in the Exim distribution. ++ ++ * Regular expressions are supported in the main Exim program and in the Exim ++ monitor using the freely-distributable PCRE library, copyright (c) ++ University of Cambridge. The source to PCRE is no longer shipped with Exim, ++ so you will need to use the version of PCRE shipped with your system, or ++ obtain and install the full version of the library from ftp:// ++ ftp.csx.cam.ac.uk/pub/software/programming/pcre. ++ ++ * Support for the cdb (Constant DataBase) lookup method is provided by code ++ contributed by Nigel Metheringham of (at the time he contributed it) Planet ++ Online Ltd. The implementation is completely contained within the code of ++ Exim. It does not link against an external cdb library. The code contains ++ the following statements: ++ ++ Copyright (c) 1998 Nigel Metheringham, Planet Online Ltd ++ ++ This program is free software; you can redistribute it and/or modify it ++ under the terms of the GNU General Public License as published by the ++ Free Software Foundation; either version 2 of the License, or (at your ++ option) any later version. This code implements Dan Bernstein's ++ Constant DataBase (cdb) spec. Information, the spec and sample code for ++ cdb can be obtained from http://www.pobox.com/~djb/cdb.html. This ++ implementation borrows some code from Dan Bernstein's implementation ++ (which has no license restrictions applied to it). ++ ++ * Client support for Microsoft's Secure Password Authentication is provided ++ by code contributed by Marc Prud'hommeaux. Server support was contributed ++ by Tom Kistner. This includes code taken from the Samba project, which is ++ released under the Gnu GPL. ++ ++ * Support for calling the Cyrus pwcheck and saslauthd daemons is provided by ++ code taken from the Cyrus-SASL library and adapted by Alexander S. ++ Sabourenkov. The permission notice appears below, in accordance with the ++ conditions expressed therein. ++ ++ Copyright (c) 2001 Carnegie Mellon University. All rights reserved. ++ ++ Redistribution and use in source and binary forms, with or without ++ modification, are permitted provided that the following conditions are ++ met: ++ ++ 1. Redistributions of source code must retain the above copyright ++ notice, this list of conditions and the following disclaimer. ++ ++ 2. Redistributions in binary form must reproduce the above copyright ++ notice, this list of conditions and the following disclaimer in the ++ documentation and/or other materials provided with the ++ distribution. ++ ++ 3. The name "Carnegie Mellon University" must not be used to endorse ++ or promote products derived from this software without prior ++ written permission. For permission or any other legal details, ++ please contact ++ ++ Office of Technology Transfer ++ Carnegie Mellon University ++ 5000 Forbes Avenue ++ Pittsburgh, PA 15213-3890 ++ (412) 268-4387, fax: (412) 268-7395 ++ tech-transfer@andrew.cmu.edu ++ ++ 4. Redistributions of any form whatsoever must retain the following ++ acknowledgment: ++ ++ "This product includes software developed by Computing Services at ++ Carnegie Mellon University (http://www.cmu.edu/computing/." ++ ++ CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO ++ THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY ++ AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE ++ FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES ++ WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN ++ AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING ++ OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS ++ SOFTWARE. ++ ++ * The Exim Monitor program, which is an X-Window application, includes ++ modified versions of the Athena StripChart and TextPop widgets. This code ++ is copyright by DEC and MIT, and their permission notice appears below, in ++ accordance with the conditions expressed therein. ++ ++ Copyright 1987, 1988 by Digital Equipment Corporation, Maynard, ++ Massachusetts, and the Massachusetts Institute of Technology, ++ Cambridge, Massachusetts. ++ ++ All Rights Reserved ++ ++ Permission to use, copy, modify, and distribute this software and its ++ documentation for any purpose and without fee is hereby granted, ++ provided that the above copyright notice appear in all copies and that ++ both that copyright notice and this permission notice appear in ++ supporting documentation, and that the names of Digital or MIT not be ++ used in advertising or publicity pertaining to distribution of the ++ software without specific, written prior permission. ++ ++ DIGITAL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, ++ INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO ++ EVENT SHALL DIGITAL BE LIABLE FOR ANY SPECIAL, INDIRECT OR ++ CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF ++ USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR ++ OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR ++ PERFORMANCE OF THIS SOFTWARE. ++ ++ * The DMARC implementation uses the OpenDMARC library which is Copyrighted by ++ The Trusted Domain Project. Portions of Exim source which use OpenDMARC ++ derived code are indicated in the respective source files. The full ++ OpenDMARC license is provided in the LICENSE.opendmarc file contained in ++ the distributed source code. ++ ++ * Many people have contributed code fragments, some large, some small, that ++ were not covered by any specific licence requirements. It is assumed that ++ the contributors are happy to see their code incorporated into Exim under ++ the GPL. ++ ++ ++ ++=============================================================================== ++3. HOW EXIM RECEIVES AND DELIVERS MAIL ++ ++ ++3.1 Overall philosophy ++---------------------- ++ ++Exim is designed to work efficiently on systems that are permanently connected ++to the Internet and are handling a general mix of mail. In such circumstances, ++most messages can be delivered immediately. Consequently, Exim does not ++maintain independent queues of messages for specific domains or hosts, though ++it does try to send several messages in a single SMTP connection after a host ++has been down, and it also maintains per-host retry information. ++ ++ ++3.2 Policy control ++------------------ ++ ++Policy controls are now an important feature of MTAs that are connected to the ++Internet. Perhaps their most important job is to stop MTAs being abused as ++"open relays" by misguided individuals who send out vast amounts of unsolicited ++junk, and want to disguise its source. Exim provides flexible facilities for ++specifying policy controls on incoming mail: ++ ++ * Exim 4 (unlike previous versions of Exim) implements policy controls on ++ incoming mail by means of Access Control Lists (ACLs). Each list is a ++ series of statements that may either grant or deny access. ACLs can be used ++ at several places in the SMTP dialogue while receiving a message from a ++ remote host. However, the most common places are after each RCPT command, ++ and at the very end of the message. The sysadmin can specify conditions for ++ accepting or rejecting individual recipients or the entire message, ++ respectively, at these two points (see chapter 42). Denial of access ++ results in an SMTP error code. ++ ++ * An ACL is also available for locally generated, non-SMTP messages. In this ++ case, the only available actions are to accept or deny the entire message. ++ ++ * When Exim is compiled with the content-scanning extension, facilities are ++ provided in the ACL mechanism for passing the message to external virus and ++ /or spam scanning software. The result of such a scan is passed back to the ++ ACL, which can then use it to decide what to do with the message. ++ ++ * When a message has been received, either from a remote host or from the ++ local host, but before the final acknowledgment has been sent, a locally ++ supplied C function called local_scan() can be run to inspect the message ++ and decide whether to accept it or not (see chapter 44). If the message is ++ accepted, the list of recipients can be modified by the function. ++ ++ * Using the local_scan() mechanism is another way of calling external scanner ++ software. The SA-Exim add-on package works this way. It does not require ++ Exim to be compiled with the content-scanning extension. ++ ++ * After a message has been accepted, a further checking mechanism is ++ available in the form of the system filter (see chapter 45). This runs at ++ the start of every delivery process. ++ ++ ++3.3 User filters ++---------------- ++ ++In a conventional Exim configuration, users are able to run private filters by ++setting up appropriate .forward files in their home directories. See chapter 22 ++(about the redirect router) for the configuration needed to support this, and ++the separate document entitled Exim's interfaces to mail filtering for user ++details. Two different kinds of filtering are available: ++ ++ * Sieve filters are written in the standard filtering language that is ++ defined by RFC 3028. ++ ++ * Exim filters are written in a syntax that is unique to Exim, but which is ++ more powerful than Sieve, which it pre-dates. ++ ++User filters are run as part of the routing process, described below. ++ ++ ++3.4 Message identification ++-------------------------- ++ ++Every message handled by Exim is given a message id which is sixteen characters ++long. It is divided into three parts, separated by hyphens, for example ++"16VDhn-0001bo-D3". Each part is a sequence of letters and digits, normally ++encoding numbers in base 62. However, in the Darwin operating system (Mac OS X) ++and when Exim is compiled to run under Cygwin, base 36 (avoiding the use of ++lower case letters) is used instead, because the message id is used to ++construct file names, and the names of files in those systems are not always ++case-sensitive. ++ ++The detail of the contents of the message id have changed as Exim has evolved. ++Earlier versions relied on the operating system not re-using a process id (pid) ++within one second. On modern operating systems, this assumption can no longer ++be made, so the algorithm had to be changed. To retain backward compatibility, ++the format of the message id was retained, which is why the following rules are ++somewhat eccentric: ++ ++ * The first six characters of the message id are the time at which the ++ message started to be received, to a granularity of one second. That is, ++ this field contains the number of seconds since the start of the epoch (the ++ normal Unix way of representing the date and time of day). ++ ++ * After the first hyphen, the next six characters are the id of the process ++ that received the message. ++ ++ * There are two different possibilities for the final two characters: ++ ++ 1. If localhost_number is not set, this value is the fractional part of ++ the time of reception, normally in units of 1/2000 of a second, but for ++ systems that must use base 36 instead of base 62 (because of ++ case-insensitive file systems), the units are 1/1000 of a second. ++ ++ 2. If localhost_number is set, it is multiplied by 200 (100) and added to ++ the fractional part of the time, which in this case is in units of 1/ ++ 200 (1/100) of a second. ++ ++After a message has been received, Exim waits for the clock to tick at the ++appropriate resolution before proceeding, so that if another message is ++received by the same process, or by another process with the same (re-used) ++pid, it is guaranteed that the time will be different. In most cases, the clock ++will already have ticked while the message was being received. ++ ++ ++3.5 Receiving mail ++------------------ ++ ++The only way Exim can receive mail from another host is using SMTP over TCP/IP, ++in which case the sender and recipient addresses are transferred using SMTP ++commands. However, from a locally running process (such as a user's MUA), there ++are several possibilities: ++ ++ * If the process runs Exim with the -bm option, the message is read ++ non-interactively (usually via a pipe), with the recipients taken from the ++ command line, or from the body of the message if -t is also used. ++ ++ * If the process runs Exim with the -bS option, the message is also read ++ non-interactively, but in this case the recipients are listed at the start ++ of the message in a series of SMTP RCPT commands, terminated by a DATA ++ command. This is so-called "batch SMTP" format, but it isn't really SMTP. ++ The SMTP commands are just another way of passing envelope addresses in a ++ non-interactive submission. ++ ++ * If the process runs Exim with the -bs option, the message is read ++ interactively, using the SMTP protocol. A two-way pipe is normally used for ++ passing data between the local process and the Exim process. This is "real" ++ SMTP and is handled in the same way as SMTP over TCP/IP. For example, the ++ ACLs for SMTP commands are used for this form of submission. ++ ++ * A local process may also make a TCP/IP call to the host's loopback address ++ (127.0.0.1) or any other of its IP addresses. When receiving messages, Exim ++ does not treat the loopback address specially. It treats all such ++ connections in the same way as connections from other hosts. ++ ++In the three cases that do not involve TCP/IP, the sender address is ++constructed from the login name of the user that called Exim and a default ++qualification domain (which can be set by the qualify_domain configuration ++option). For local or batch SMTP, a sender address that is passed using the ++SMTP MAIL command is ignored. However, the system administrator may allow ++certain users ("trusted users") to specify a different sender address ++unconditionally, or all users to specify certain forms of different sender ++address. The -f option or the SMTP MAIL command is used to specify these ++different addresses. See section 5.2 for details of trusted users, and the ++untrusted_set_sender option for a way of allowing untrusted users to change ++sender addresses. ++ ++Messages received by either of the non-interactive mechanisms are subject to ++checking by the non-SMTP ACL, if one is defined. Messages received using SMTP ++(either over TCP/IP, or interacting with a local process) can be checked by a ++number of ACLs that operate at different times during the SMTP session. Either ++individual recipients, or the entire message, can be rejected if local policy ++requirements are not met. The local_scan() function (see chapter 44) is run for ++all incoming messages. ++ ++Exim can be configured not to start a delivery process when a message is ++received; this can be unconditional, or depend on the number of incoming SMTP ++connections or the system load. In these situations, new messages wait on the ++queue until a queue runner process picks them up. However, in standard ++configurations under normal conditions, delivery is started as soon as a ++message is received. ++ ++ ++3.6 Handling an incoming message ++-------------------------------- ++ ++When Exim accepts a message, it writes two files in its spool directory. The ++first contains the envelope information, the current status of the message, and ++the header lines, and the second contains the body of the message. The names of ++the two spool files consist of the message id, followed by "-H" for the file ++containing the envelope and header, and "-D" for the data file. ++ ++By default all these message files are held in a single directory called input ++inside the general Exim spool directory. Some operating systems do not perform ++very well if the number of files in a directory gets large; to improve ++performance in such cases, the split_spool_directory option can be used. This ++causes Exim to split up the input files into 62 sub-directories whose names are ++single letters or digits. When this is done, the queue is processed one ++sub-directory at a time instead of all at once, which can improve overall ++performance even when there are not enough files in each directory to affect ++file system performance. ++ ++The envelope information consists of the address of the message's sender and ++the addresses of the recipients. This information is entirely separate from any ++addresses contained in the header lines. The status of the message includes a ++list of recipients who have already received the message. The format of the ++first spool file is described in chapter 55. ++ ++Address rewriting that is specified in the rewrite section of the configuration ++(see chapter 31) is done once and for all on incoming addresses, both in the ++header lines and the envelope, at the time the message is accepted. If during ++the course of delivery additional addresses are generated (for example, via ++aliasing), these new addresses are rewritten as soon as they are generated. At ++the time a message is actually delivered (transported) further rewriting can ++take place; because this is a transport option, it can be different for ++different forms of delivery. It is also possible to specify the addition or ++removal of certain header lines at the time the message is delivered (see ++chapters 15 and 24). ++ ++ ++3.7 Life of a message ++--------------------- ++ ++A message remains in the spool directory until it is completely delivered to ++its recipients or to an error address, or until it is deleted by an ++administrator or by the user who originally created it. In cases when delivery ++cannot proceed - for example, when a message can neither be delivered to its ++recipients nor returned to its sender, the message is marked "frozen" on the ++spool, and no more deliveries are attempted. ++ ++An administrator can "thaw" such messages when the problem has been corrected, ++and can also freeze individual messages by hand if necessary. In addition, an ++administrator can force a delivery error, causing a bounce message to be sent. ++ ++There are options called ignore_bounce_errors_after and timeout_frozen_after, ++which discard frozen messages after a certain time. The first applies only to ++frozen bounces, the second to any frozen messages. ++ ++While Exim is working on a message, it writes information about each delivery ++attempt to its main log file. This includes successful, unsuccessful, and ++delayed deliveries for each recipient (see chapter 51). The log lines are also ++written to a separate message log file for each message. These logs are solely ++for the benefit of the administrator, and are normally deleted along with the ++spool files when processing of a message is complete. The use of individual ++message logs can be disabled by setting no_message_logs; this might give an ++improvement in performance on very busy systems. ++ ++All the information Exim itself needs to set up a delivery is kept in the first ++spool file, along with the header lines. When a successful delivery occurs, the ++address is immediately written at the end of a journal file, whose name is the ++message id followed by "-J". At the end of a delivery run, if there are some ++addresses left to be tried again later, the first spool file (the "-H" file) is ++updated to indicate which these are, and the journal file is then deleted. ++Updating the spool file is done by writing a new file and renaming it, to ++minimize the possibility of data loss. ++ ++Should the system or the program crash after a successful delivery but before ++the spool file has been updated, the journal is left lying around. The next ++time Exim attempts to deliver the message, it reads the journal file and ++updates the spool file before proceeding. This minimizes the chances of double ++deliveries caused by crashes. ++ ++ ++3.8 Processing an address for delivery ++-------------------------------------- ++ ++The main delivery processing elements of Exim are called routers and transports ++, and collectively these are known as drivers. Code for a number of them is ++provided in the source distribution, and compile-time options specify which ++ones are included in the binary. Run time options specify which ones are ++actually used for delivering messages. ++ ++Each driver that is specified in the run time configuration is an instance of ++that particular driver type. Multiple instances are allowed; for example, you ++can set up several different smtp transports, each with different option values ++that might specify different ports or different timeouts. Each instance has its ++own identifying name. In what follows we will normally use the instance name ++when discussing one particular instance (that is, one specific configuration of ++the driver), and the generic driver name when discussing the driver's features ++in general. ++ ++A router is a driver that operates on an address, either determining how its ++delivery should happen, by assigning it to a specific transport, or converting ++the address into one or more new addresses (for example, via an alias file). A ++router may also explicitly choose to fail an address, causing it to be bounced. ++ ++A transport is a driver that transmits a copy of the message from Exim's spool ++to some destination. There are two kinds of transport: for a local transport, ++the destination is a file or a pipe on the local host, whereas for a remote ++transport the destination is some other host. A message is passed to a specific ++transport as a result of successful routing. If a message has several ++recipients, it may be passed to a number of different transports. ++ ++An address is processed by passing it to each configured router instance in ++turn, subject to certain preconditions, until a router accepts the address or ++specifies that it should be bounced. We will describe this process in more ++detail shortly. First, as a simple example, we consider how each recipient ++address in a message is processed in a small configuration of three routers. ++ ++To make this a more concrete example, it is described in terms of some actual ++routers, but remember, this is only an example. You can configure Exim's ++routers in many different ways, and there may be any number of routers in a ++configuration. ++ ++The first router that is specified in a configuration is often one that handles ++addresses in domains that are not recognized specially by the local host. These ++are typically addresses for arbitrary domains on the Internet. A precondition ++is set up which looks for the special domains known to the host (for example, ++its own domain name), and the router is run for addresses that do not match. ++Typically, this is a router that looks up domains in the DNS in order to find ++the hosts to which this address routes. If it succeeds, the address is assigned ++to a suitable SMTP transport; if it does not succeed, the router is configured ++to fail the address. ++ ++The second router is reached only when the domain is recognized as one that ++"belongs" to the local host. This router does redirection - also known as ++aliasing and forwarding. When it generates one or more new addresses from the ++original, each of them is routed independently from the start. Otherwise, the ++router may cause an address to fail, or it may simply decline to handle the ++address, in which case the address is passed to the next router. ++ ++The final router in many configurations is one that checks to see if the ++address belongs to a local mailbox. The precondition may involve a check to see ++if the local part is the name of a login account, or it may look up the local ++part in a file or a database. If its preconditions are not met, or if the ++router declines, we have reached the end of the routers. When this happens, the ++address is bounced. ++ ++ ++3.9 Processing an address for verification ++------------------------------------------ ++ ++As well as being used to decide how to deliver to an address, Exim's routers ++are also used for address verification. Verification can be requested as one of ++the checks to be performed in an ACL for incoming messages, on both sender and ++recipient addresses, and it can be tested using the -bv and -bvs command line ++options. ++ ++When an address is being verified, the routers are run in "verify mode". This ++does not affect the way the routers work, but it is a state that can be ++detected. By this means, a router can be skipped or made to behave differently ++when verifying. A common example is a configuration in which the first router ++sends all messages to a message-scanning program, unless they have been ++previously scanned. Thus, the first router accepts all addresses without any ++checking, making it useless for verifying. Normally, the no_verify option would ++be set for such a router, causing it to be skipped in verify mode. ++ ++ ++3.10 Running an individual router ++--------------------------------- ++ ++As explained in the example above, a number of preconditions are checked before ++running a router. If any are not met, the router is skipped, and the address is ++passed to the next router. When all the preconditions on a router are met, the ++router is run. What happens next depends on the outcome, which is one of the ++following: ++ ++ * accept: The router accepts the address, and either assigns it to a ++ transport, or generates one or more "child" addresses. Processing the ++ original address ceases, unless the unseen option is set on the router. ++ This option can be used to set up multiple deliveries with different ++ routing (for example, for keeping archive copies of messages). When unseen ++ is set, the address is passed to the next router. Normally, however, an ++ accept return marks the end of routing. ++ ++ Any child addresses generated by the router are processed independently, ++ starting with the first router by default. It is possible to change this by ++ setting the redirect_router option to specify which router to start at for ++ child addresses. Unlike pass_router (see below) the router specified by ++ redirect_router may be anywhere in the router configuration. ++ ++ * pass: The router recognizes the address, but cannot handle it itself. It ++ requests that the address be passed to another router. By default the ++ address is passed to the next router, but this can be changed by setting ++ the pass_router option. However, (unlike redirect_router) the named router ++ must be below the current router (to avoid loops). ++ ++ * decline: The router declines to accept the address because it does not ++ recognize it at all. By default, the address is passed to the next router, ++ but this can be prevented by setting the no_more option. When no_more is ++ set, all the remaining routers are skipped. In effect, no_more converts ++ decline into fail. ++ ++ * fail: The router determines that the address should fail, and queues it for ++ the generation of a bounce message. There is no further processing of the ++ original address unless unseen is set on the router. ++ ++ * defer: The router cannot handle the address at the present time. (A ++ database may be offline, or a DNS lookup may have timed out.) No further ++ processing of the address happens in this delivery attempt. It is tried ++ again next time the message is considered for delivery. ++ ++ * error: There is some error in the router (for example, a syntax error in ++ its configuration). The action is as for defer. ++ ++If an address reaches the end of the routers without having been accepted by ++any of them, it is bounced as unrouteable. The default error message in this ++situation is "unrouteable address", but you can set your own message by making ++use of the cannot_route_message option. This can be set for any router; the ++value from the last router that "saw" the address is used. ++ ++Sometimes while routing you want to fail a delivery when some conditions are ++met but others are not, instead of passing the address on for further routing. ++You can do this by having a second router that explicitly fails the delivery ++when the relevant conditions are met. The redirect router has a "fail" facility ++for this purpose. ++ ++ ++3.11 Duplicate addresses ++------------------------ ++ ++Once routing is complete, Exim scans the addresses that are assigned to local ++and remote transports, and discards any duplicates that it finds. During this ++check, local parts are treated as case-sensitive. This happens only when ++actually delivering a message; when testing routers with -bt, all the routed ++addresses are shown. ++ ++ ++3.12 Router preconditions ++------------------------- ++ ++The preconditions that are tested for each router are listed below, in the ++order in which they are tested. The individual configuration options are ++described in more detail in chapter 15. ++ ++ * The local_part_prefix and local_part_suffix options can specify that the ++ local parts handled by the router may or must have certain prefixes and/or ++ suffixes. If a mandatory affix (prefix or suffix) is not present, the ++ router is skipped. These conditions are tested first. When an affix is ++ present, it is removed from the local part before further processing, ++ including the evaluation of any other conditions. ++ ++ * Routers can be designated for use only when not verifying an address, that ++ is, only when routing it for delivery (or testing its delivery routing). If ++ the verify option is set false, the router is skipped when Exim is ++ verifying an address. Setting the verify option actually sets two options, ++ verify_sender and verify_recipient, which independently control the use of ++ the router for sender and recipient verification. You can set these options ++ directly if you want a router to be used for only one type of verification. ++ Note that cutthrough delivery is classed as a recipient verification for ++ this purpose. ++ ++ * If the address_test option is set false, the router is skipped when Exim is ++ run with the -bt option to test an address routing. This can be helpful ++ when the first router sends all new messages to a scanner of some sort; it ++ makes it possible to use -bt to test subsequent delivery routing without ++ having to simulate the effect of the scanner. ++ ++ * Routers can be designated for use only when verifying an address, as ++ opposed to routing it for delivery. The verify_only option controls this. ++ Again, cutthrough delibery counts as a verification. ++ ++ * Individual routers can be explicitly skipped when running the routers to ++ check an address given in the SMTP EXPN command (see the expn option). ++ ++ * If the domains option is set, the domain of the address must be in the set ++ of domains that it defines. ++ ++ * If the local_parts option is set, the local part of the address must be in ++ the set of local parts that it defines. If local_part_prefix or ++ local_part_suffix is in use, the prefix or suffix is removed from the local ++ part before this check. If you want to do precondition tests on local parts ++ that include affixes, you can do so by using a condition option (see below) ++ that uses the variables $local_part, $local_part_prefix, and ++ $local_part_suffix as necessary. ++ ++ * If the check_local_user option is set, the local part must be the name of ++ an account on the local host. If this check succeeds, the uid and gid of ++ the local user are placed in $local_user_uid and $local_user_gid and the ++ user's home directory is placed in $home; these values can be used in the ++ remaining preconditions. ++ ++ * If the router_home_directory option is set, it is expanded at this point, ++ because it overrides the value of $home. If this expansion were left till ++ later, the value of $home as set by check_local_user would be used in ++ subsequent tests. Having two different values of $home in the same router ++ could lead to confusion. ++ ++ * If the senders option is set, the envelope sender address must be in the ++ set of addresses that it defines. ++ ++ * If the require_files option is set, the existence or non-existence of ++ specified files is tested. ++ ++ * If the condition option is set, it is evaluated and tested. This option ++ uses an expanded string to allow you to set up your own custom ++ preconditions. Expanded strings are described in chapter 11. ++ ++Note that require_files comes near the end of the list, so you cannot use it to ++check for the existence of a file in which to lookup up a domain, local part, ++or sender. However, as these options are all expanded, you can use the exists ++expansion condition to make such tests within each condition. The require_files ++option is intended for checking files that the router may be going to use ++internally, or which are needed by a specific transport (for example, ++.procmailrc). ++ ++ ++3.13 Delivery in detail ++----------------------- ++ ++When a message is to be delivered, the sequence of events is as follows: ++ ++ * If a system-wide filter file is specified, the message is passed to it. The ++ filter may add recipients to the message, replace the recipients, discard ++ the message, cause a new message to be generated, or cause the message ++ delivery to fail. The format of the system filter file is the same as for ++ Exim user filter files, described in the separate document entitled Exim's ++ interfaces to mail filtering. (Note: Sieve cannot be used for system filter ++ files.) ++ ++ Some additional features are available in system filters - see chapter 45 ++ for details. Note that a message is passed to the system filter only once ++ per delivery attempt, however many recipients it has. However, if there are ++ several delivery attempts because one or more addresses could not be ++ immediately delivered, the system filter is run each time. The filter ++ condition first_delivery can be used to detect the first run of the system ++ filter. ++ ++ * Each recipient address is offered to each configured router in turn, ++ subject to its preconditions, until one is able to handle it. If no router ++ can handle the address, that is, if they all decline, the address is ++ failed. Because routers can be targeted at particular domains, several ++ locally handled domains can be processed entirely independently of each ++ other. ++ ++ * A router that accepts an address may assign it to a local or a remote ++ transport. However, the transport is not run at this time. Instead, the ++ address is placed on a list for the particular transport, which will be run ++ later. Alternatively, the router may generate one or more new addresses ++ (typically from alias, forward, or filter files). New addresses are fed ++ back into this process from the top, but in order to avoid loops, a router ++ ignores any address which has an identically-named ancestor that was ++ processed by itself. ++ ++ * When all the routing has been done, addresses that have been successfully ++ handled are passed to their assigned transports. When local transports are ++ doing real local deliveries, they handle only one address at a time, but if ++ a local transport is being used as a pseudo-remote transport (for example, ++ to collect batched SMTP messages for transmission by some other means) ++ multiple addresses can be handled. Remote transports can always handle more ++ than one address at a time, but can be configured not to do so, or to ++ restrict multiple addresses to the same domain. ++ ++ * Each local delivery to a file or a pipe runs in a separate process under a ++ non-privileged uid, and these deliveries are run one at a time. Remote ++ deliveries also run in separate processes, normally under a uid that is ++ private to Exim ("the Exim user"), but in this case, several remote ++ deliveries can be run in parallel. The maximum number of simultaneous ++ remote deliveries for any one message is set by the remote_max_parallel ++ option. The order in which deliveries are done is not defined, except that ++ all local deliveries happen before any remote deliveries. ++ ++ * When it encounters a local delivery during a queue run, Exim checks its ++ retry database to see if there has been a previous temporary delivery ++ failure for the address before running the local transport. If there was a ++ previous failure, Exim does not attempt a new delivery until the retry time ++ for the address is reached. However, this happens only for delivery ++ attempts that are part of a queue run. Local deliveries are always ++ attempted when delivery immediately follows message reception, even if ++ retry times are set for them. This makes for better behaviour if one ++ particular message is causing problems (for example, causing quota ++ overflow, or provoking an error in a filter file). ++ ++ * Remote transports do their own retry handling, since an address may be ++ deliverable to one of a number of hosts, each of which may have a different ++ retry time. If there have been previous temporary failures and no host has ++ reached its retry time, no delivery is attempted, whether in a queue run or ++ not. See chapter 32 for details of retry strategies. ++ ++ * If there were any permanent errors, a bounce message is returned to an ++ appropriate address (the sender in the common case), with details of the ++ error for each failing address. Exim can be configured to send copies of ++ bounce messages to other addresses. ++ ++ * If one or more addresses suffered a temporary failure, the message is left ++ on the queue, to be tried again later. Delivery of these addresses is said ++ to be deferred. ++ ++ * When all the recipient addresses have either been delivered or bounced, ++ handling of the message is complete. The spool files and message log are ++ deleted, though the message log can optionally be preserved if required. ++ ++ ++3.14 Retry mechanism ++-------------------- ++ ++Exim's mechanism for retrying messages that fail to get delivered at the first ++attempt is the queue runner process. You must either run an Exim daemon that ++uses the -q option with a time interval to start queue runners at regular ++intervals, or use some other means (such as cron) to start them. If you do not ++arrange for queue runners to be run, messages that fail temporarily at the ++first attempt will remain on your queue for ever. A queue runner process works ++its way through the queue, one message at a time, trying each delivery that has ++passed its retry time. You can run several queue runners at once. ++ ++Exim uses a set of configured rules to determine when next to retry the failing ++address (see chapter 32). These rules also specify when Exim should give up ++trying to deliver to the address, at which point it generates a bounce message. ++If no retry rules are set for a particular host, address, and error ++combination, no retries are attempted, and temporary errors are treated as ++permanent. ++ ++ ++3.15 Temporary delivery failure ++------------------------------- ++ ++There are many reasons why a message may not be immediately deliverable to a ++particular address. Failure to connect to a remote machine (because it, or the ++connection to it, is down) is one of the most common. Temporary failures may be ++detected during routing as well as during the transport stage of delivery. ++Local deliveries may be delayed if NFS files are unavailable, or if a mailbox ++is on a file system where the user is over quota. Exim can be configured to ++impose its own quotas on local mailboxes; where system quotas are set they will ++also apply. ++ ++If a host is unreachable for a period of time, a number of messages may be ++waiting for it by the time it recovers, and sending them in a single SMTP ++connection is clearly beneficial. Whenever a delivery to a remote host is ++deferred, Exim makes a note in its hints database, and whenever a successful ++SMTP delivery has happened, it looks to see if any other messages are waiting ++for the same host. If any are found, they are sent over the same SMTP ++connection, subject to a configuration limit as to the maximum number in any ++one connection. ++ ++ ++3.16 Permanent delivery failure ++------------------------------- ++ ++When a message cannot be delivered to some or all of its intended recipients, a ++bounce message is generated. Temporary delivery failures turn into permanent ++errors when their timeout expires. All the addresses that fail in a given ++delivery attempt are listed in a single message. If the original message has ++many recipients, it is possible for some addresses to fail in one delivery ++attempt and others to fail subsequently, giving rise to more than one bounce ++message. The wording of bounce messages can be customized by the administrator. ++See chapter 48 for details. ++ ++Bounce messages contain an X-Failed-Recipients: header line that lists the ++failed addresses, for the benefit of programs that try to analyse such messages ++automatically. ++ ++A bounce message is normally sent to the sender of the original message, as ++obtained from the message's envelope. For incoming SMTP messages, this is the ++address given in the MAIL command. However, when an address is expanded via a ++forward or alias file, an alternative address can be specified for delivery ++failures of the generated addresses. For a mailing list expansion (see section ++49.2) it is common to direct bounce messages to the manager of the list. ++ ++ ++3.17 Failures to deliver bounce messages ++---------------------------------------- ++ ++If a bounce message (either locally generated or received from a remote host) ++itself suffers a permanent delivery failure, the message is left on the queue, ++but it is frozen, awaiting the attention of an administrator. There are options ++that can be used to make Exim discard such failed messages, or to keep them for ++only a short time (see timeout_frozen_after and ignore_bounce_errors_after). ++ ++ ++ ++=============================================================================== ++4. BUILDING AND INSTALLING EXIM ++ ++ ++4.1 Unpacking ++------------- ++ ++Exim is distributed as a gzipped or bzipped tar file which, when unpacked, ++creates a directory with the name of the current release (for example, ++exim-4.82) into which the following files are placed: ++ ++ ACKNOWLEDGMENTS contains some acknowledgments ++ CHANGES contains a reference to where changes are documented ++ LICENCE the GNU General Public Licence ++ Makefile top-level make file ++ NOTICE conditions for the use of Exim ++ README list of files, directories and simple build instructions ++ ++Other files whose names begin with README may also be present. The following ++subdirectories are created: ++ ++ Local an empty directory for local configuration files ++ OS OS-specific files ++ doc documentation files ++ exim_monitor source files for the Exim monitor ++ scripts scripts used in the build process ++ src remaining source files ++ util independent utilities ++ ++The main utility programs are contained in the src directory, and are built ++with the Exim binary. The util directory contains a few optional scripts that ++may be useful to some sites. ++ ++ ++4.2 Multiple machine architectures and operating systems ++-------------------------------------------------------- ++ ++The building process for Exim is arranged to make it easy to build binaries for ++a number of different architectures and operating systems from the same set of ++source files. Compilation does not take place in the src directory. Instead, a ++build directory is created for each architecture and operating system. Symbolic ++links to the sources are installed in this directory, which is where the actual ++building takes place. In most cases, Exim can discover the machine architecture ++and operating system for itself, but the defaults can be overridden if ++necessary. ++ ++ ++4.3 PCRE library ++---------------- ++ ++Exim no longer has an embedded PCRE library as the vast majority of modern ++systems include PCRE as a system library, although you may need to install the ++PCRE or PCRE development package for your operating system. If your system has ++a normal PCRE installation the Exim build process will need no further ++configuration. If the library or the headers are in an unusual location you ++will need to either set the PCRE_LIBS and INCLUDE directives appropriately, or ++set PCRE_CONFIG=yes to use the installed pcre-config command. If your operating ++system has no PCRE support then you will need to obtain and build the current ++PCRE from ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/. More ++information on PCRE is available at http://www.pcre.org/. ++ ++ ++4.4 DBM libraries ++----------------- ++ ++Even if you do not use any DBM files in your configuration, Exim still needs a ++DBM library in order to operate, because it uses indexed files for its hints ++databases. Unfortunately, there are a number of DBM libraries in existence, and ++different operating systems often have different ones installed. ++ ++If you are using Solaris, IRIX, one of the modern BSD systems, or a modern ++Linux distribution, the DBM configuration should happen automatically, and you ++may be able to ignore this section. Otherwise, you may have to learn more than ++you would like about DBM libraries from what follows. ++ ++Licensed versions of Unix normally contain a library of DBM functions operating ++via the ndbm interface, and this is what Exim expects by default. Free versions ++of Unix seem to vary in what they contain as standard. In particular, some ++early versions of Linux have no default DBM library, and different distributors ++have chosen to bundle different libraries with their packaged versions. ++However, the more recent releases seem to have standardized on the Berkeley DB ++library. ++ ++Different DBM libraries have different conventions for naming the files they ++use. When a program opens a file called dbmfile, there are several ++possibilities: ++ ++ 1. A traditional ndbm implementation, such as that supplied as part of ++ Solaris, operates on two files called dbmfile.dir and dbmfile.pag. ++ ++ 2. The GNU library, gdbm, operates on a single file. If used via its ndbm ++ compatibility interface it makes two different hard links to it with names ++ dbmfile.dir and dbmfile.pag, but if used via its native interface, the file ++ name is used unmodified. ++ ++ 3. The Berkeley DB package, if called via its ndbm compatibility interface, ++ operates on a single file called dbmfile.db, but otherwise looks to the ++ programmer exactly the same as the traditional ndbm implementation. ++ ++ 4. If the Berkeley package is used in its native mode, it operates on a single ++ file called dbmfile; the programmer's interface is somewhat different to ++ the traditional ndbm interface. ++ ++ 5. To complicate things further, there are several very different versions of ++ the Berkeley DB package. Version 1.85 was stable for a very long time, ++ releases 2.x and 3.x were current for a while, but the latest versions are ++ now numbered 4.x. Maintenance of some of the earlier releases has ceased. ++ All versions of Berkeley DB can be obtained from http://www.sleepycat.com/. ++ ++ 6. Yet another DBM library, called tdb, is available from http:// ++ download.sourceforge.net/tdb. It has its own interface, and also operates ++ on a single file. ++ ++Exim and its utilities can be compiled to use any of these interfaces. In order ++to use any version of the Berkeley DB package in native mode, you must set ++USE_DB in an appropriate configuration file (typically Local/Makefile). For ++example: ++ ++USE_DB=yes ++ ++Similarly, for gdbm you set USE_GDBM, and for tdb you set USE_TDB. An error is ++diagnosed if you set more than one of these. ++ ++At the lowest level, the build-time configuration sets none of these options, ++thereby assuming an interface of type (1). However, some operating system ++configuration files (for example, those for the BSD operating systems and ++Linux) assume type (4) by setting USE_DB as their default, and the ++configuration files for Cygwin set USE_GDBM. Anything you set in Local/Makefile ++, however, overrides these system defaults. ++ ++As well as setting USE_DB, USE_GDBM, or USE_TDB, it may also be necessary to ++set DBMLIB, to cause inclusion of the appropriate library, as in one of these ++lines: ++ ++DBMLIB = -ldb ++DBMLIB = -ltdb ++ ++Settings like that will work if the DBM library is installed in the standard ++place. Sometimes it is not, and the library's header file may also not be in ++the default path. You may need to set INCLUDE to specify where the header file ++is, and to specify the path to the library more fully in DBMLIB, as in this ++example: ++ ++INCLUDE=-I/usr/local/include/db-4.1 ++DBMLIB=/usr/local/lib/db-4.1/libdb.a ++ ++There is further detailed discussion about the various DBM libraries in the ++file doc/dbm.discuss.txt in the Exim distribution. ++ ++ ++4.5 Pre-building configuration ++------------------------------ ++ ++Before building Exim, a local configuration file that specifies options ++independent of any operating system has to be created with the name Local/ ++Makefile. A template for this file is supplied as the file src/EDITME, and it ++contains full descriptions of all the option settings therein. These ++descriptions are therefore not repeated here. If you are building Exim for the ++first time, the simplest thing to do is to copy src/EDITME to Local/Makefile, ++then read it and edit it appropriately. ++ ++There are three settings that you must supply, because Exim will not build ++without them. They are the location of the run time configuration file ++(CONFIGURE_FILE), the directory in which Exim binaries will be installed ++(BIN_DIRECTORY), and the identity of the Exim user (EXIM_USER and maybe ++EXIM_GROUP as well). The value of CONFIGURE_FILE can in fact be a ++colon-separated list of file names; Exim uses the first of them that exists. ++ ++There are a few other parameters that can be specified either at build time or ++at run time, to enable the same binary to be used on a number of different ++machines. However, if the locations of Exim's spool directory and log file ++directory (if not within the spool directory) are fixed, it is recommended that ++you specify them in Local/Makefile instead of at run time, so that errors ++detected early in Exim's execution (such as a malformed configuration file) can ++be logged. ++ ++Exim's interfaces for calling virus and spam scanning software directly from ++access control lists are not compiled by default. If you want to include these ++facilities, you need to set ++ ++WITH_CONTENT_SCAN=yes ++ ++in your Local/Makefile. For details of the facilities themselves, see chapter ++43. ++ ++If you are going to build the Exim monitor, a similar configuration process is ++required. The file exim_monitor/EDITME must be edited appropriately for your ++installation and saved under the name Local/eximon.conf. If you are happy with ++the default settings described in exim_monitor/EDITME, Local/eximon.conf can be ++empty, but it must exist. ++ ++This is all the configuration that is needed in straightforward cases for known ++operating systems. However, the building process is set up so that it is easy ++to override options that are set by default or by operating-system-specific ++configuration files, for example to change the name of the C compiler, which ++defaults to gcc. See section 4.13 below for details of how to do this. ++ ++ ++4.6 Support for iconv() ++----------------------- ++ ++The contents of header lines in messages may be encoded according to the rules ++described RFC 2047. This makes it possible to transmit characters that are not ++in the ASCII character set, and to label them as being in a particular ++character set. When Exim is inspecting header lines by means of the $h_ ++mechanism, it decodes them, and translates them into a specified character set ++(default ISO-8859-1). The translation is possible only if the operating system ++supports the iconv() function. ++ ++However, some of the operating systems that supply iconv() do not support very ++many conversions. The GNU libiconv library (available from http://www.gnu.org/ ++software/libiconv/) can be installed on such systems to remedy this deficiency, ++as well as on systems that do not supply iconv() at all. After installing ++libiconv, you should add ++ ++HAVE_ICONV=yes ++ ++to your Local/Makefile and rebuild Exim. ++ ++ ++4.7 Including TLS/SSL encryption support ++---------------------------------------- ++ ++Exim can be built to support encrypted SMTP connections, using the STARTTLS ++command as per RFC 2487. It can also support legacy clients that expect to ++start a TLS session immediately on connection to a non-standard port (see the ++tls_on_connect_ports runtime option and the -tls-on-connect command line ++option). ++ ++If you want to build Exim with TLS support, you must first install either the ++OpenSSL or GnuTLS library. There is no cryptographic code in Exim itself for ++implementing SSL. ++ ++If OpenSSL is installed, you should set ++ ++SUPPORT_TLS=yes ++TLS_LIBS=-lssl -lcrypto ++ ++in Local/Makefile. You may also need to specify the locations of the OpenSSL ++library and include files. For example: ++ ++SUPPORT_TLS=yes ++TLS_LIBS=-L/usr/local/openssl/lib -lssl -lcrypto ++TLS_INCLUDE=-I/usr/local/openssl/include/ ++ ++If you have pkg-config available, then instead you can just use: ++ ++SUPPORT_TLS=yes ++USE_OPENSSL_PC=openssl ++ ++If GnuTLS is installed, you should set ++ ++SUPPORT_TLS=yes ++USE_GNUTLS=yes ++TLS_LIBS=-lgnutls -ltasn1 -lgcrypt ++ ++in Local/Makefile, and again you may need to specify the locations of the ++library and include files. For example: ++ ++SUPPORT_TLS=yes ++USE_GNUTLS=yes ++TLS_LIBS=-L/usr/gnu/lib -lgnutls -ltasn1 -lgcrypt ++TLS_INCLUDE=-I/usr/gnu/include ++ ++If you have pkg-config available, then instead you can just use: ++ ++SUPPORT_TLS=yes ++USE_GNUTLS=yes ++USE_GNUTLS_PC=gnutls ++ ++You do not need to set TLS_INCLUDE if the relevant directory is already ++specified in INCLUDE. Details of how to configure Exim to make use of TLS are ++given in chapter 41. ++ ++ ++4.8 Use of tcpwrappers ++---------------------- ++ ++Exim can be linked with the tcpwrappers library in order to check incoming SMTP ++calls using the tcpwrappers control files. This may be a convenient alternative ++to Exim's own checking facilities for installations that are already making use ++of tcpwrappers for other purposes. To do this, you should set USE_TCP_WRAPPERS ++in Local/Makefile, arrange for the file tcpd.h to be available at compile time, ++and also ensure that the library libwrap.a is available at link time, typically ++by including -lwrap in EXTRALIBS_EXIM. For example, if tcpwrappers is installed ++in /usr/local, you might have ++ ++USE_TCP_WRAPPERS=yes ++CFLAGS=-O -I/usr/local/include ++EXTRALIBS_EXIM=-L/usr/local/lib -lwrap ++ ++in Local/Makefile. The daemon name to use in the tcpwrappers control files is ++"exim". For example, the line ++ ++exim : LOCAL 192.168.1. .friendly.domain.example ++ ++in your /etc/hosts.allow file allows connections from the local host, from the ++subnet 192.168.1.0/24, and from all hosts in friendly.domain.example. All other ++connections are denied. The daemon name used by tcpwrappers can be changed at ++build time by setting TCP_WRAPPERS_DAEMON_NAME in Local/Makefile, or by setting ++tcp_wrappers_daemon_name in the configure file. Consult the tcpwrappers ++documentation for further details. ++ ++ ++4.9 Including support for IPv6 ++------------------------------ ++ ++Exim contains code for use on systems that have IPv6 support. Setting ++"HAVE_IPV6=YES" in Local/Makefile causes the IPv6 code to be included; it may ++also be necessary to set IPV6_INCLUDE and IPV6_LIBS on systems where the IPv6 ++support is not fully integrated into the normal include and library files. ++ ++Two different types of DNS record for handling IPv6 addresses have been ++defined. AAAA records (analogous to A records for IPv4) are in use, and are ++currently seen as the mainstream. Another record type called A6 was proposed as ++better than AAAA because it had more flexibility. However, it was felt to be ++over-complex, and its status was reduced to "experimental". It is not known if ++anyone is actually using A6 records. Exim has support for A6 records, but this ++is included only if you set "SUPPORT_A6=YES" in Local/Makefile. The support has ++not been tested for some time. ++ ++ ++4.10 Dynamically loaded lookup module support ++--------------------------------------------- ++ ++On some platforms, Exim supports not compiling all lookup types directly into ++the main binary, instead putting some into external modules which can be loaded ++on demand. This permits packagers to build Exim with support for lookups with ++extensive library dependencies without requiring all users to install all of ++those dependencies. Most, but not all, lookup types can be built this way. ++ ++Set "LOOKUP_MODULE_DIR" to the directory into which the modules will be ++installed; Exim will only load modules from that directory, as a security ++measure. You will need to set "CFLAGS_DYNAMIC" if not already defined for your ++OS; see OS/Makefile-Linux for an example. Some other requirements for adjusting ++"EXTRALIBS" may also be necessary, see src/EDITME for details. ++ ++Then, for each module to be loaded dynamically, define the relevant "LOOKUP_"< ++lookup_type> flags to have the value "2" instead of "yes". For example, this ++will build in lsearch but load sqlite and mysql support on demand: ++ ++LOOKUP_LSEARCH=yes ++LOOKUP_SQLITE=2 ++LOOKUP_MYSQL=2 ++ ++ ++4.11 The building process ++------------------------- ++ ++Once Local/Makefile (and Local/eximon.conf, if required) have been created, run ++make at the top level. It determines the architecture and operating system ++types, and creates a build directory if one does not exist. For example, on a ++Sun system running Solaris 8, the directory build-SunOS5-5.8-sparc is created. ++Symbolic links to relevant source files are installed in the build directory. ++ ++Warning: The -j (parallel) flag must not be used with make; the building ++process fails if it is set. ++ ++If this is the first time make has been run, it calls a script that builds a ++make file inside the build directory, using the configuration files from the ++Local directory. The new make file is then passed to another instance of make. ++This does the real work, building a number of utility scripts, and then ++compiling and linking the binaries for the Exim monitor (if configured), a ++number of utility programs, and finally Exim itself. The command "make ++makefile" can be used to force a rebuild of the make file in the build ++directory, should this ever be necessary. ++ ++If you have problems building Exim, check for any comments there may be in the ++README file concerning your operating system, and also take a look at the FAQ, ++where some common problems are covered. ++ ++ ++4.12 Output from "make" ++----------------------- ++ ++The output produced by the make process for compile lines is often very ++unreadable, because these lines can be very long. For this reason, the normal ++output is suppressed by default, and instead output similar to that which ++appears when compiling the 2.6 Linux kernel is generated: just a short line for ++each module that is being compiled or linked. However, it is still possible to ++get the full output, by calling make like this: ++ ++FULLECHO='' make -e ++ ++The value of FULLECHO defaults to "@", the flag character that suppresses ++command reflection in make. When you ask for the full output, it is given in ++addition to the short output. ++ ++ ++4.13 Overriding build-time options for Exim ++------------------------------------------- ++ ++The main make file that is created at the beginning of the building process ++consists of the concatenation of a number of files which set configuration ++values, followed by a fixed set of make instructions. If a value is set more ++than once, the last setting overrides any previous ones. This provides a ++convenient way of overriding defaults. The files that are concatenated are, in ++order: ++ ++OS/Makefile-Default ++OS/Makefile-<ostype> ++Local/Makefile ++Local/Makefile-<ostype> ++Local/Makefile-<archtype> ++Local/Makefile-<ostype>-<archtype> ++OS/Makefile-Base ++ ++where <ostype> is the operating system type and <archtype> is the architecture ++type. Local/Makefile is required to exist, and the building process fails if it ++is absent. The other three Local files are optional, and are often not needed. ++ ++The values used for <ostype> and <archtype> are obtained from scripts called ++scripts/os-type and scripts/arch-type respectively. If either of the ++environment variables EXIM_OSTYPE or EXIM_ARCHTYPE is set, their values are ++used, thereby providing a means of forcing particular settings. Otherwise, the ++scripts try to get values from the uname command. If this fails, the shell ++variables OSTYPE and ARCHTYPE are inspected. A number of ad hoc transformations ++are then applied, to produce the standard names that Exim expects. You can run ++these scripts directly from the shell in order to find out what values are ++being used on your system. ++ ++OS/Makefile-Default contains comments about the variables that are set therein. ++Some (but not all) are mentioned below. If there is something that needs ++changing, review the contents of this file and the contents of the make file ++for your operating system (OS/Makefile-<ostype>) to see what the default values ++are. ++ ++If you need to change any of the values that are set in OS/Makefile-Default or ++in OS/Makefile-<ostype>, or to add any new definitions, you do not need to ++change the original files. Instead, you should make the changes by putting the ++new values in an appropriate Local file. For example, when building Exim in ++many releases of the Tru64-Unix (formerly Digital UNIX, formerly DEC-OSF1) ++operating system, it is necessary to specify that the C compiler is called cc ++rather than gcc. Also, the compiler must be called with the option -std1, to ++make it recognize some of the features of Standard C that Exim uses. (Most ++other compilers recognize Standard C by default.) To do this, you should create ++a file called Local/Makefile-OSF1 containing the lines ++ ++CC=cc ++CFLAGS=-std1 ++ ++If you are compiling for just one operating system, it may be easier to put ++these lines directly into Local/Makefile. ++ ++Keeping all your local configuration settings separate from the distributed ++files makes it easy to transfer them to new versions of Exim simply by copying ++the contents of the Local directory. ++ ++Exim contains support for doing LDAP, NIS, NIS+, and other kinds of file ++lookup, but not all systems have these components installed, so the default is ++not to include the relevant code in the binary. All the different kinds of file ++and database lookup that Exim supports are implemented as separate code modules ++which are included only if the relevant compile-time options are set. In the ++case of LDAP, NIS, and NIS+, the settings for Local/Makefile are: ++ ++LOOKUP_LDAP=yes ++LOOKUP_NIS=yes ++LOOKUP_NISPLUS=yes ++ ++and similar settings apply to the other lookup types. They are all listed in ++src/EDITME. In many cases the relevant include files and interface libraries ++need to be installed before compiling Exim. However, there are some optional ++lookup types (such as cdb) for which the code is entirely contained within ++Exim, and no external include files or libraries are required. When a lookup ++type is not included in the binary, attempts to configure Exim to use it cause ++run time configuration errors. ++ ++Many systems now use a tool called pkg-config to encapsulate information about ++how to compile against a library; Exim has some initial support for being able ++to use pkg-config for lookups and authenticators. For any given makefile ++variable which starts "LOOKUP_" or "AUTH_", you can add a new variable with the ++"_PC" suffix in the name and assign as the value the name of the package to be ++queried. The results of querying via the pkg-config command will be added to ++the appropriate Makefile variables with "+=" directives, so your version of ++make will need to support that syntax. For instance: ++ ++LOOKUP_SQLITE=yes ++LOOKUP_SQLITE_PC=sqlite3 ++AUTH_GSASL=yes ++AUTH_GSASL_PC=libgsasl ++AUTH_HEIMDAL_GSSAPI=yes ++AUTH_HEIMDAL_GSSAPI_PC=heimdal-gssapi ++ ++Exim can be linked with an embedded Perl interpreter, allowing Perl subroutines ++to be called during string expansion. To enable this facility, ++ ++EXIM_PERL=perl.o ++ ++must be defined in Local/Makefile. Details of this facility are given in ++chapter 12. ++ ++The location of the X11 libraries is something that varies a lot between ++operating systems, and there may be different versions of X11 to cope with. ++Exim itself makes no use of X11, but if you are compiling the Exim monitor, the ++X11 libraries must be available. The following three variables are set in OS/ ++Makefile-Default: ++ ++X11=/usr/X11R6 ++XINCLUDE=-I$(X11)/include ++XLFLAGS=-L$(X11)/lib ++ ++These are overridden in some of the operating-system configuration files. For ++example, in OS/Makefile-SunOS5 there is ++ ++X11=/usr/openwin ++XINCLUDE=-I$(X11)/include ++XLFLAGS=-L$(X11)/lib -R$(X11)/lib ++ ++If you need to override the default setting for your operating system, place a ++definition of all three of these variables into your Local/Makefile-<ostype> ++file. ++ ++If you need to add any extra libraries to the link steps, these can be put in a ++variable called EXTRALIBS, which appears in all the link commands, but by ++default is not defined. In contrast, EXTRALIBS_EXIM is used only on the command ++for linking the main Exim binary, and not for any associated utilities. ++ ++There is also DBMLIB, which appears in the link commands for binaries that use ++DBM functions (see also section 4.4). Finally, there is EXTRALIBS_EXIMON, which ++appears only in the link step for the Exim monitor binary, and which can be ++used, for example, to include additional X11 libraries. ++ ++The make file copes with rebuilding Exim correctly if any of the configuration ++files are edited. However, if an optional configuration file is deleted, it is ++necessary to touch the associated non-optional file (that is, Local/Makefile or ++Local/eximon.conf) before rebuilding. ++ ++ ++4.14 OS-specific header files ++----------------------------- ++ ++The OS directory contains a number of files with names of the form os.h- ++<ostype>. These are system-specific C header files that should not normally ++need to be changed. There is a list of macro settings that are recognized in ++the file OS/os.configuring, which should be consulted if you are porting Exim ++to a new operating system. ++ ++ ++4.15 Overriding build-time options for the monitor ++-------------------------------------------------- ++ ++A similar process is used for overriding things when building the Exim monitor, ++where the files that are involved are ++ ++OS/eximon.conf-Default ++OS/eximon.conf-<ostype> ++Local/eximon.conf ++Local/eximon.conf-<ostype> ++Local/eximon.conf-<archtype> ++Local/eximon.conf-<ostype>-<archtype> ++ ++As with Exim itself, the final three files need not exist, and in this case the ++OS/eximon.conf-<ostype> file is also optional. The default values in OS/ ++eximon.conf-Default can be overridden dynamically by setting environment ++variables of the same name, preceded by EXIMON_. For example, setting ++EXIMON_LOG_DEPTH in the environment overrides the value of LOG_DEPTH at run ++time. ++ ++ ++4.16 Installing Exim binaries and scripts ++----------------------------------------- ++ ++The command "make install" runs the exim_install script with no arguments. The ++script copies binaries and utility scripts into the directory whose name is ++specified by the BIN_DIRECTORY setting in Local/Makefile. The install script ++copies files only if they are newer than the files they are going to replace. ++The Exim binary is required to be owned by root and have the setuid bit set, ++for normal configurations. Therefore, you must run "make install" as root so ++that it can set up the Exim binary in this way. However, in some special ++situations (for example, if a host is doing no local deliveries) it may be ++possible to run Exim without making the binary setuid root (see chapter 54 for ++details). ++ ++Exim's run time configuration file is named by the CONFIGURE_FILE setting in ++Local/Makefile. If this names a single file, and the file does not exist, the ++default configuration file src/configure.default is copied there by the ++installation script. If a run time configuration file already exists, it is ++left alone. If CONFIGURE_FILE is a colon-separated list, naming several ++alternative files, no default is installed. ++ ++One change is made to the default configuration file when it is installed: the ++default configuration contains a router that references a system aliases file. ++The path to this file is set to the value specified by SYSTEM_ALIASES_FILE in ++Local/Makefile (/etc/aliases by default). If the system aliases file does not ++exist, the installation script creates it, and outputs a comment to the user. ++ ++The created file contains no aliases, but it does contain comments about the ++aliases a site should normally have. Mail aliases have traditionally been kept ++in /etc/aliases. However, some operating systems are now using /etc/mail/ ++aliases. You should check if yours is one of these, and change Exim's ++configuration if necessary. ++ ++The default configuration uses the local host's name as the only local domain, ++and is set up to do local deliveries into the shared directory /var/mail, ++running as the local user. System aliases and .forward files in users' home ++directories are supported, but no NIS or NIS+ support is configured. Domains ++other than the name of the local host are routed using the DNS, with delivery ++over SMTP. ++ ++It is possible to install Exim for special purposes (such as building a binary ++distribution) in a private part of the file system. You can do this by a ++command such as ++ ++make DESTDIR=/some/directory/ install ++ ++This has the effect of pre-pending the specified directory to all the file ++paths, except the name of the system aliases file that appears in the default ++configuration. (If a default alias file is created, its name is modified.) For ++backwards compatibility, ROOT is used if DESTDIR is not set, but this usage is ++deprecated. ++ ++Running make install does not copy the Exim 4 conversion script convert4r4. You ++will probably run this only once if you are upgrading from Exim 3. None of the ++documentation files in the doc directory are copied, except for the info files ++when you have set INFO_DIRECTORY, as described in section 4.17 below. ++ ++For the utility programs, old versions are renamed by adding the suffix .O to ++their names. The Exim binary itself, however, is handled differently. It is ++installed under a name that includes the version number and the compile number, ++for example exim-4.82-1. The script then arranges for a symbolic link called ++exim to point to the binary. If you are updating a previous version of Exim, ++the script takes care to ensure that the name exim is never absent from the ++directory (as seen by other processes). ++ ++If you want to see what the make install will do before running it for real, ++you can pass the -n option to the installation script by this command: ++ ++make INSTALL_ARG=-n install ++ ++The contents of the variable INSTALL_ARG are passed to the installation script. ++You do not need to be root to run this test. Alternatively, you can run the ++installation script directly, but this must be from within the build directory. ++For example, from the top-level Exim directory you could use this command: ++ ++(cd build-SunOS5-5.5.1-sparc; ../scripts/exim_install -n) ++ ++There are two other options that can be supplied to the installation script. ++ ++ * -no_chown bypasses the call to change the owner of the installed binary to ++ root, and the call to make it a setuid binary. ++ ++ * -no_symlink bypasses the setting up of the symbolic link exim to the ++ installed binary. ++ ++INSTALL_ARG can be used to pass these options to the script. For example: ++ ++make INSTALL_ARG=-no_symlink install ++ ++The installation script can also be given arguments specifying which files are ++to be copied. For example, to install just the Exim binary, and nothing else, ++without creating the symbolic link, you could use: ++ ++make INSTALL_ARG='-no_symlink exim' install ++ ++ ++4.17 Installing info documentation ++---------------------------------- ++ ++Not all systems use the GNU info system for documentation, and for this reason, ++the Texinfo source of Exim's documentation is not included in the main ++distribution. Instead it is available separately from the ftp site (see section ++1.6). ++ ++If you have defined INFO_DIRECTORY in Local/Makefile and the Texinfo source of ++the documentation is found in the source tree, running "make install" ++automatically builds the info files and installs them. ++ ++ ++4.18 Setting up the spool directory ++----------------------------------- ++ ++When it starts up, Exim tries to create its spool directory if it does not ++exist. The Exim uid and gid are used for the owner and group of the spool ++directory. Sub-directories are automatically created in the spool directory as ++necessary. ++ ++ ++4.19 Testing ++------------ ++ ++Having installed Exim, you can check that the run time configuration file is ++syntactically valid by running the following command, which assumes that the ++Exim binary directory is within your PATH environment variable: ++ ++exim -bV ++ ++If there are any errors in the configuration file, Exim outputs error messages. ++Otherwise it outputs the version number and build date, the DBM library that is ++being used, and information about which drivers and other optional code modules ++are included in the binary. Some simple routing tests can be done by using the ++address testing option. For example, ++ ++exim -bt <local username> ++ ++should verify that it recognizes a local mailbox, and ++ ++exim -bt <remote address> ++ ++a remote one. Then try getting it to deliver mail, both locally and remotely. ++This can be done by passing messages directly to Exim, without going through a ++user agent. For example: ++ ++exim -v postmaster@your.domain.example ++From: user@your.domain.example ++To: postmaster@your.domain.example ++Subject: Testing Exim ++ ++This is a test message. ++^D ++ ++The -v option causes Exim to output some verification of what it is doing. In ++this case you should see copies of three log lines, one for the message's ++arrival, one for its delivery, and one containing "Completed". ++ ++If you encounter problems, look at Exim's log files (mainlog and paniclog) to ++see if there is any relevant information there. Another source of information ++is running Exim with debugging turned on, by specifying the -d option. If a ++message is stuck on Exim's spool, you can force a delivery with debugging ++turned on by a command of the form ++ ++exim -d -M <exim-message-id> ++ ++You must be root or an "admin user" in order to do this. The -d option produces ++rather a lot of output, but you can cut this down to specific areas. For ++example, if you use -d-all+route only the debugging information relevant to ++routing is included. (See the -d option in chapter 5 for more details.) ++ ++One specific problem that has shown up on some sites is the inability to do ++local deliveries into a shared mailbox directory, because it does not have the ++"sticky bit" set on it. By default, Exim tries to create a lock file before ++writing to a mailbox file, and if it cannot create the lock file, the delivery ++is deferred. You can get round this either by setting the "sticky bit" on the ++directory, or by setting a specific group for local deliveries and allowing ++that group to create files in the directory (see the comments above the ++local_delivery transport in the default configuration file). Another approach ++is to configure Exim not to use lock files, but just to rely on fcntl() locking ++instead. However, you should do this only if all user agents also use fcntl() ++locking. For further discussion of locking issues, see chapter 26. ++ ++One thing that cannot be tested on a system that is already running an MTA is ++the receipt of incoming SMTP mail on the standard SMTP port. However, the -oX ++option can be used to run an Exim daemon that listens on some other port, or ++inetd can be used to do this. The -bh option and the exim_checkaccess utility ++can be used to check out policy controls on incoming SMTP mail. ++ ++Testing a new version on a system that is already running Exim can most easily ++be done by building a binary with a different CONFIGURE_FILE setting. From ++within the run time configuration, all other file and directory names that Exim ++uses can be altered, in order to keep it entirely clear of the production ++version. ++ ++ ++4.20 Replacing another MTA with Exim ++------------------------------------ ++ ++Building and installing Exim for the first time does not of itself put it in ++general use. The name by which the system's MTA is called by mail user agents ++is either /usr/sbin/sendmail, or /usr/lib/sendmail (depending on the operating ++system), and it is necessary to make this name point to the exim binary in ++order to get the user agents to pass messages to Exim. This is normally done by ++renaming any existing file and making /usr/sbin/sendmail or /usr/lib/sendmail a ++symbolic link to the exim binary. It is a good idea to remove any setuid ++privilege and executable status from the old MTA. It is then necessary to stop ++and restart the mailer daemon, if one is running. ++ ++Some operating systems have introduced alternative ways of switching MTAs. For ++example, if you are running FreeBSD, you need to edit the file /etc/mail/ ++mailer.conf instead of setting up a symbolic link as just described. A typical ++example of the contents of this file for running Exim is as follows: ++ ++sendmail /usr/exim/bin/exim ++send-mail /usr/exim/bin/exim ++mailq /usr/exim/bin/exim -bp ++newaliases /usr/bin/true ++ ++Once you have set up the symbolic link, or edited /etc/mail/mailer.conf, your ++Exim installation is "live". Check it by sending a message from your favourite ++user agent. ++ ++You should consider what to tell your users about the change of MTA. Exim may ++have different capabilities to what was previously running, and there are ++various operational differences such as the text of messages produced by ++command line options and in bounce messages. If you allow your users to make ++use of Exim's filtering capabilities, you should make the document entitled ++Exim's interface to mail filtering available to them. ++ ++ ++4.21 Upgrading Exim ++------------------- ++ ++If you are already running Exim on your host, building and installing a new ++version automatically makes it available to MUAs, or any other programs that ++call the MTA directly. However, if you are running an Exim daemon, you do need ++to send it a HUP signal, to make it re-execute itself, and thereby pick up the ++new binary. You do not need to stop processing mail in order to install a new ++version of Exim. The install script does not modify an existing runtime ++configuration file. ++ ++ ++4.22 Stopping the Exim daemon on Solaris ++---------------------------------------- ++ ++The standard command for stopping the mailer daemon on Solaris is ++ ++/etc/init.d/sendmail stop ++ ++If /usr/lib/sendmail has been turned into a symbolic link, this script fails to ++stop Exim because it uses the command ps -e and greps the output for the text ++"sendmail"; this is not present because the actual program name (that is, ++"exim") is given by the ps command with these options. A solution is to replace ++the line that finds the process id with something like ++ ++pid=`cat /var/spool/exim/exim-daemon.pid` ++ ++to obtain the daemon's pid directly from the file that Exim saves it in. ++ ++Note, however, that stopping the daemon does not "stop Exim". Messages can ++still be received from local processes, and if automatic delivery is configured ++(the normal case), deliveries will still occur. ++ ++ ++ ++=============================================================================== ++5. THE EXIM COMMAND LINE ++ ++Exim's command line takes the standard Unix form of a sequence of options, each ++starting with a hyphen character, followed by a number of arguments. The ++options are compatible with the main options of Sendmail, and there are also ++some additional options, some of which are compatible with Smail 3. Certain ++combinations of options do not make sense, and provoke an error if used. The ++form of the arguments depends on which options are set. ++ ++ ++5.1 Setting options by program name ++----------------------------------- ++ ++If Exim is called under the name mailq, it behaves as if the option -bp were ++present before any other options. The -bp option requests a listing of the ++contents of the mail queue on the standard output. This feature is for ++compatibility with some systems that contain a command of that name in one of ++the standard libraries, symbolically linked to /usr/sbin/sendmail or /usr/lib/ ++sendmail. ++ ++If Exim is called under the name rsmtp it behaves as if the option -bS were ++present before any other options, for compatibility with Smail. The -bS option ++is used for reading in a number of messages in batched SMTP format. ++ ++If Exim is called under the name rmail it behaves as if the -i and -oee options ++were present before any other options, for compatibility with Smail. The name ++rmail is used as an interface by some UUCP systems. ++ ++If Exim is called under the name runq it behaves as if the option -q were ++present before any other options, for compatibility with Smail. The -q option ++causes a single queue runner process to be started. ++ ++If Exim is called under the name newaliases it behaves as if the option -bi ++were present before any other options, for compatibility with Sendmail. This ++option is used for rebuilding Sendmail's alias file. Exim does not have the ++concept of a single alias file, but can be configured to run a given command if ++called with the -bi option. ++ ++ ++5.2 Trusted and admin users ++--------------------------- ++ ++Some Exim options are available only to trusted users and others are available ++only to admin users. In the description below, the phrases "Exim user" and ++"Exim group" mean the user and group defined by EXIM_USER and EXIM_GROUP in ++Local/Makefile or set by the exim_user and exim_group options. These do not ++necessarily have to use the name "exim". ++ ++ * The trusted users are root, the Exim user, any user listed in the ++ trusted_users configuration option, and any user whose current group or any ++ supplementary group is one of those listed in the trusted_groups ++ configuration option. Note that the Exim group is not automatically ++ trusted. ++ ++ Trusted users are always permitted to use the -f option or a leading ++ "From " line to specify the envelope sender of a message that is passed to ++ Exim through the local interface (see the -bm and -f options below). See ++ the untrusted_set_sender option for a way of permitting non-trusted users ++ to set envelope senders. ++ ++ For a trusted user, there is never any check on the contents of the From: ++ header line, and a Sender: line is never added. Furthermore, any existing ++ Sender: line in incoming local (non-TCP/IP) messages is not removed. ++ ++ Trusted users may also specify a host name, host address, interface ++ address, protocol name, ident value, and authentication data when ++ submitting a message locally. Thus, they are able to insert messages into ++ Exim's queue locally that have the characteristics of messages received ++ from a remote host. Untrusted users may in some circumstances use -f, but ++ can never set the other values that are available to trusted users. ++ ++ * The admin users are root, the Exim user, and any user that is a member of ++ the Exim group or of any group listed in the admin_groups configuration ++ option. The current group does not have to be one of these groups. ++ ++ Admin users are permitted to list the queue, and to carry out certain ++ operations on messages, for example, to force delivery failures. It is also ++ necessary to be an admin user in order to see the full information provided ++ by the Exim monitor, and full debugging output. ++ ++ By default, the use of the -M, -q, -R, and -S options to cause Exim to ++ attempt delivery of messages on its queue is restricted to admin users. ++ However, this restriction can be relaxed by setting the prod_requires_admin ++ option false (that is, specifying no_prod_requires_admin). ++ ++ Similarly, the use of the -bp option to list all the messages in the queue ++ is restricted to admin users unless queue_list_requires_admin is set false. ++ ++Warning: If you configure your system so that admin users are able to edit ++Exim's configuration file, you are giving those users an easy way of getting ++root. There is further discussion of this issue at the start of chapter 6. ++ ++ ++5.3 Command line options ++------------------------ ++ ++Exim's command line options are described in alphabetical order below. If none ++of the options that specifies a specific action (such as starting the daemon or ++a queue runner, or testing an address, or receiving a message in a specific ++format, or listing the queue) are present, and there is at least one argument ++on the command line, -bm (accept a local message on the standard input, with ++the arguments specifying the recipients) is assumed. Otherwise, Exim outputs a ++brief message about itself and exits. ++ ++-- ++ ++ This is a pseudo-option whose only purpose is to terminate the options and ++ therefore to cause subsequent command line items to be treated as arguments ++ rather than options, even if they begin with hyphens. ++ ++--help ++ ++ This option causes Exim to output a few sentences stating what it is. The ++ same output is generated if the Exim binary is called with no options and ++ no arguments. ++ ++--version ++ ++ This option is an alias for -bV and causes version information to be ++ displayed. ++ ++-Ac, -Am ++ ++ These options are used by Sendmail for selecting configuration files and ++ are ignored by Exim. ++ ++-B<type> ++ ++ This is a Sendmail option for selecting 7 or 8 bit processing. Exim is ++ 8-bit clean; it ignores this option. ++ ++-bd ++ ++ This option runs Exim as a daemon, awaiting incoming SMTP connections. ++ Usually the -bd option is combined with the -q<time> option, to specify ++ that the daemon should also initiate periodic queue runs. ++ ++ The -bd option can be used only by an admin user. If either of the -d ++ (debugging) or -v (verifying) options are set, the daemon does not ++ disconnect from the controlling terminal. When running this way, it can be ++ stopped by pressing ctrl-C. ++ ++ By default, Exim listens for incoming connections to the standard SMTP port ++ on all the host's running interfaces. However, it is possible to listen on ++ other ports, on multiple ports, and only on specific interfaces. Chapter 13 ++ contains a description of the options that control this. ++ ++ When a listening daemon is started without the use of -oX (that is, without ++ overriding the normal configuration), it writes its process id to a file ++ called exim-daemon.pid in Exim's spool directory. This location can be ++ overridden by setting PID_FILE_PATH in Local/Makefile. The file is written ++ while Exim is still running as root. ++ ++ When -oX is used on the command line to start a listening daemon, the ++ process id is not written to the normal pid file path. However, -oP can be ++ used to specify a path on the command line if a pid file is required. ++ ++ The SIGHUP signal can be used to cause the daemon to re-execute itself. ++ This should be done whenever Exim's configuration file, or any file that is ++ incorporated into it by means of the .include facility, is changed, and ++ also whenever a new version of Exim is installed. It is not necessary to do ++ this when other files that are referenced from the configuration (for ++ example, alias files) are changed, because these are reread each time they ++ are used. ++ ++-bdf ++ ++ This option has the same effect as -bd except that it never disconnects ++ from the controlling terminal, even when no debugging is specified. ++ ++-be ++ ++ Run Exim in expansion testing mode. Exim discards its root privilege, to ++ prevent ordinary users from using this mode to read otherwise inaccessible ++ files. If no arguments are given, Exim runs interactively, prompting for ++ lines of data. Otherwise, it processes each argument in turn. ++ ++ If Exim was built with USE_READLINE=yes in Local/Makefile, it tries to load ++ the libreadline library dynamically whenever the -be option is used without ++ command line arguments. If successful, it uses the readline() function, ++ which provides extensive line-editing facilities, for reading the test ++ data. A line history is supported. ++ ++ Long expansion expressions can be split over several lines by using ++ backslash continuations. As in Exim's run time configuration, white space ++ at the start of continuation lines is ignored. Each argument or data line ++ is passed through the string expansion mechanism, and the result is output. ++ Variable values from the configuration file (for example, $qualify_domain) ++ are available, but no message-specific values (such as $sender_domain) are ++ set, because no message is being processed (but see -bem and -Mset). ++ ++ Note: If you use this mechanism to test lookups, and you change the data ++ files or databases you are using, you must exit and restart Exim before ++ trying the same lookup again. Otherwise, because each Exim process caches ++ the results of lookups, you will just get the same result as before. ++ ++-bem <filename> ++ ++ This option operates like -be except that it must be followed by the name ++ of a file. For example: ++ ++ exim -bem /tmp/testmessage ++ ++ The file is read as a message (as if receiving a locally-submitted non-SMTP ++ message) before any of the test expansions are done. Thus, message-specific ++ variables such as $message_size and $header_from: are available. However, ++ no Received: header is added to the message. If the -t option is set, ++ recipients are read from the headers in the normal way, and are shown in ++ the $recipients variable. Note that recipients cannot be given on the ++ command line, because further arguments are taken as strings to expand ++ (just like -be). ++ ++-bF <filename> ++ ++ This option is the same as -bf except that it assumes that the filter being ++ tested is a system filter. The additional commands that are available only ++ in system filters are recognized. ++ ++-bf <filename> ++ ++ This option runs Exim in user filter testing mode; the file is the filter ++ file to be tested, and a test message must be supplied on the standard ++ input. If there are no message-dependent tests in the filter, an empty file ++ can be supplied. ++ ++ If you want to test a system filter file, use -bF instead of -bf. You can ++ use both -bF and -bf on the same command, in order to test a system filter ++ and a user filter in the same run. For example: ++ ++ exim -bF /system/filter -bf /user/filter </test/message ++ ++ This is helpful when the system filter adds header lines or sets filter ++ variables that are used by the user filter. ++ ++ If the test filter file does not begin with one of the special lines ++ ++ # Exim filter ++ # Sieve filter ++ ++ it is taken to be a normal .forward file, and is tested for validity under ++ that interpretation. See sections 22.4 to 22.6 for a description of the ++ possible contents of non-filter redirection lists. ++ ++ The result of an Exim command that uses -bf, provided no errors are ++ detected, is a list of the actions that Exim would try to take if presented ++ with the message for real. More details of filter testing are given in the ++ separate document entitled Exim's interfaces to mail filtering. ++ ++ When testing a filter file, the envelope sender can be set by the -f ++ option, or by a "From " line at the start of the test message. Various ++ parameters that would normally be taken from the envelope recipient address ++ of the message can be set by means of additional command line options (see ++ the next four options). ++ ++-bfd <domain> ++ ++ This sets the domain of the recipient address when a filter file is being ++ tested by means of the -bf option. The default is the value of ++ $qualify_domain. ++ ++-bfl <local part> ++ ++ This sets the local part of the recipient address when a filter file is ++ being tested by means of the -bf option. The default is the username of the ++ process that calls Exim. A local part should be specified with any prefix ++ or suffix stripped, because that is how it appears to the filter when a ++ message is actually being delivered. ++ ++-bfp <prefix> ++ ++ This sets the prefix of the local part of the recipient address when a ++ filter file is being tested by means of the -bf option. The default is an ++ empty prefix. ++ ++-bfs <suffix> ++ ++ This sets the suffix of the local part of the recipient address when a ++ filter file is being tested by means of the -bf option. The default is an ++ empty suffix. ++ ++-bh <IP address> ++ ++ This option runs a fake SMTP session as if from the given IP address, using ++ the standard input and output. The IP address may include a port number at ++ the end, after a full stop. For example: ++ ++ exim -bh 10.9.8.7.1234 ++ exim -bh fe80::a00:20ff:fe86:a061.5678 ++ ++ When an IPv6 address is given, it is converted into canonical form. In the ++ case of the second example above, the value of $sender_host_address after ++ conversion to the canonical form is ++ "fe80:0000:0000:0a00:20ff:fe86:a061.5678". ++ ++ Comments as to what is going on are written to the standard error file. ++ These include lines beginning with "LOG" for anything that would have been ++ logged. This facility is provided for testing configuration options for ++ incoming messages, to make sure they implement the required policy. For ++ example, you can test your relay controls using -bh. ++ ++ Warning 1: You can test features of the configuration that rely on ident ++ (RFC 1413) information by using the -oMt option. However, Exim cannot ++ actually perform an ident callout when testing using -bh because there is ++ no incoming SMTP connection. ++ ++ Warning 2: Address verification callouts (see section 42.44) are also ++ skipped when testing using -bh. If you want these callouts to occur, use ++ -bhc instead. ++ ++ Messages supplied during the testing session are discarded, and nothing is ++ written to any of the real log files. There may be pauses when DNS (and ++ other) lookups are taking place, and of course these may time out. The -oMi ++ option can be used to specify a specific IP interface and port if this is ++ important, and -oMaa and -oMai can be used to set parameters as if the SMTP ++ session were authenticated. ++ ++ The exim_checkaccess utility is a "packaged" version of -bh whose output ++ just states whether a given recipient address from a given host is ++ acceptable or not. See section 52.8. ++ ++ Features such as authentication and encryption, where the client input is ++ not plain text, cannot easily be tested with -bh. Instead, you should use a ++ specialized SMTP test program such as swaks. ++ ++-bhc <IP address> ++ ++ This option operates in the same way as -bh, except that address ++ verification callouts are performed if required. This includes consulting ++ and updating the callout cache database. ++ ++-bi ++ ++ Sendmail interprets the -bi option as a request to rebuild its alias file. ++ Exim does not have the concept of a single alias file, and so it cannot ++ mimic this behaviour. However, calls to /usr/lib/sendmail with the -bi ++ option tend to appear in various scripts such as NIS make files, so the ++ option must be recognized. ++ ++ If -bi is encountered, the command specified by the bi_command ++ configuration option is run, under the uid and gid of the caller of Exim. ++ If the -oA option is used, its value is passed to the command as an ++ argument. The command set by bi_command may not contain arguments. The ++ command can use the exim_dbmbuild utility, or some other means, to rebuild ++ alias files if this is required. If the bi_command option is not set, ++ calling Exim with -bi is a no-op. ++ ++-bI:help ++ ++ We shall provide various options starting "-bI:" for querying Exim for ++ information. The output of many of these will be intended for machine ++ consumption. This one is not. The -bI:help option asks Exim for a synopsis ++ of supported options beginning "-bI:". Use of any of these options shall ++ cause Exim to exit after producing the requested output. ++ ++-bI:dscp ++ ++ This option causes Exim to emit an alphabetically sorted list of all ++ recognised DSCP names. ++ ++-bI:sieve ++ ++ This option causes Exim to emit an alphabetically sorted list of all ++ supported Sieve protocol extensions on stdout, one per line. This is ++ anticipated to be useful for ManageSieve (RFC 5804) implementations, in ++ providing that protocol's "SIEVE" capability response line. As the precise ++ list may depend upon compile-time build options, which this option will ++ adapt to, this is the only way to guarantee a correct response. ++ ++-bm ++ ++ This option runs an Exim receiving process that accepts an incoming, ++ locally-generated message on the standard input. The recipients are given ++ as the command arguments (except when -t is also present - see below). Each ++ argument can be a comma-separated list of RFC 2822 addresses. This is the ++ default option for selecting the overall action of an Exim call; it is ++ assumed if no other conflicting option is present. ++ ++ If any addresses in the message are unqualified (have no domain), they are ++ qualified by the values of the qualify_domain or qualify_recipient options, ++ as appropriate. The -bnq option (see below) provides a way of suppressing ++ this for special cases. ++ ++ Policy checks on the contents of local messages can be enforced by means of ++ the non-SMTP ACL. See chapter 42 for details. ++ ++ The return code is zero if the message is successfully accepted. Otherwise, ++ the action is controlled by the -oex option setting - see below. ++ ++ The format of the message must be as defined in RFC 2822, except that, for ++ compatibility with Sendmail and Smail, a line in one of the forms ++ ++ From sender Fri Jan 5 12:55 GMT 1997 ++ From sender Fri, 5 Jan 97 12:55:01 ++ ++ (with the weekday optional, and possibly with additional text after the ++ date) is permitted to appear at the start of the message. There appears to ++ be no authoritative specification of the format of this line. Exim ++ recognizes it by matching against the regular expression defined by the ++ uucp_from_pattern option, which can be changed if necessary. ++ ++ The specified sender is treated as if it were given as the argument to the ++ -f option, but if a -f option is also present, its argument is used in ++ preference to the address taken from the message. The caller of Exim must ++ be a trusted user for the sender of a message to be set in this way. ++ ++-bmalware <filename> ++ ++ This debugging option causes Exim to scan the given file, using the malware ++ scanning framework. The option of av_scanner influences this option, so if ++ av_scanner's value is dependent upon an expansion then the expansion should ++ have defaults which apply to this invocation. ACLs are not invoked, so if ++ av_scanner references an ACL variable then that variable will never be ++ populated and -bmalware will fail. ++ ++ Exim will have changed working directory before resolving the filename, so ++ using fully qualified pathnames is advisable. Exim will be running as the ++ Exim user when it tries to open the file, rather than as the invoking user. ++ This option requires admin privileges. ++ ++ The -bmalware option will not be extended to be more generally useful, ++ there are better tools for file-scanning. This option exists to help ++ administrators verify their Exim and AV scanner configuration. ++ ++-bnq ++ ++ By default, Exim automatically qualifies unqualified addresses (those ++ without domains) that appear in messages that are submitted locally (that ++ is, not over TCP/IP). This qualification applies both to addresses in ++ envelopes, and addresses in header lines. Sender addresses are qualified ++ using qualify_domain, and recipient addresses using qualify_recipient ++ (which defaults to the value of qualify_domain). ++ ++ Sometimes, qualification is not wanted. For example, if -bS (batch SMTP) is ++ being used to re-submit messages that originally came from remote hosts ++ after content scanning, you probably do not want to qualify unqualified ++ addresses in header lines. (Such lines will be present only if you have not ++ enabled a header syntax check in the appropriate ACL.) ++ ++ The -bnq option suppresses all qualification of unqualified addresses in ++ messages that originate on the local host. When this is used, unqualified ++ addresses in the envelope provoke errors (causing message rejection) and ++ unqualified addresses in header lines are left alone. ++ ++-bP ++ ++ If this option is given with no arguments, it causes the values of all ++ Exim's main configuration options to be written to the standard output. The ++ values of one or more specific options can be requested by giving their ++ names as arguments, for example: ++ ++ exim -bP qualify_domain hold_domains ++ ++ However, any option setting that is preceded by the word "hide" in the ++ configuration file is not shown in full, except to an admin user. For other ++ users, the output is as in this example: ++ ++ mysql_servers = <value not displayable> ++ ++ If configure_file is given as an argument, the name of the run time ++ configuration file is output. If a list of configuration files was ++ supplied, the value that is output here is the name of the file that was ++ actually used. ++ ++ If the -n flag is given, then for most modes of -bP operation the name will ++ not be output. ++ ++ If log_file_path or pid_file_path are given, the names of the directories ++ where log files and daemon pid files are written are output, respectively. ++ If these values are unset, log files are written in a sub-directory of the ++ spool directory called log, and the pid file is written directly into the ++ spool directory. ++ ++ If -bP is followed by a name preceded by "+", for example, ++ ++ exim -bP +local_domains ++ ++ it searches for a matching named list of any type (domain, host, address, ++ or local part) and outputs what it finds. ++ ++ If one of the words router, transport, or authenticator is given, followed ++ by the name of an appropriate driver instance, the option settings for that ++ driver are output. For example: ++ ++ exim -bP transport local_delivery ++ ++ The generic driver options are output first, followed by the driver's ++ private options. A list of the names of drivers of a particular type can be ++ obtained by using one of the words router_list, transport_list, or ++ authenticator_list, and a complete list of all drivers with their option ++ settings can be obtained by using routers, transports, or authenticators. ++ ++ If invoked by an admin user, then macro, macro_list and macros are ++ available, similarly to the drivers. Because macros are sometimes used for ++ storing passwords, this option is restricted. The output format is one item ++ per line. ++ ++-bp ++ ++ This option requests a listing of the contents of the mail queue on the ++ standard output. If the -bp option is followed by a list of message ids, ++ just those messages are listed. By default, this option can be used only by ++ an admin user. However, the queue_list_requires_admin option can be set ++ false to allow any user to see the queue. ++ ++ Each message on the queue is displayed as in the following example: ++ ++ 25m 2.9K 0t5C6f-0000c8-00 <alice@wonderland.fict.example> ++ red.king@looking-glass.fict.example ++ <other addresses> ++ ++ The first line contains the length of time the message has been on the ++ queue (in this case 25 minutes), the size of the message (2.9K), the unique ++ local identifier for the message, and the message sender, as contained in ++ the envelope. For bounce messages, the sender address is empty, and appears ++ as "<>". If the message was submitted locally by an untrusted user who ++ overrode the default sender address, the user's login name is shown in ++ parentheses before the sender address. ++ ++ If the message is frozen (attempts to deliver it are suspended) then the ++ text "*** frozen ***" is displayed at the end of this line. ++ ++ The recipients of the message (taken from the envelope, not the headers) ++ are displayed on subsequent lines. Those addresses to which the message has ++ already been delivered are marked with the letter D. If an original address ++ gets expanded into several addresses via an alias or forward file, the ++ original is displayed with a D only when deliveries for all of its child ++ addresses are complete. ++ ++-bpa ++ ++ This option operates like -bp, but in addition it shows delivered addresses ++ that were generated from the original top level address(es) in each message ++ by alias or forwarding operations. These addresses are flagged with "+D" ++ instead of just "D". ++ ++-bpc ++ ++ This option counts the number of messages on the queue, and writes the ++ total to the standard output. It is restricted to admin users, unless ++ queue_list_requires_admin is set false. ++ ++-bpr ++ ++ This option operates like -bp, but the output is not sorted into ++ chronological order of message arrival. This can speed it up when there are ++ lots of messages on the queue, and is particularly useful if the output is ++ going to be post-processed in a way that doesn't need the sorting. ++ ++-bpra ++ ++ This option is a combination of -bpr and -bpa. ++ ++-bpru ++ ++ This option is a combination of -bpr and -bpu. ++ ++-bpu ++ ++ This option operates like -bp but shows only undelivered top-level ++ addresses for each message displayed. Addresses generated by aliasing or ++ forwarding are not shown, unless the message was deferred after processing ++ by a router with the one_time option set. ++ ++-brt ++ ++ This option is for testing retry rules, and it must be followed by up to ++ three arguments. It causes Exim to look for a retry rule that matches the ++ values and to write it to the standard output. For example: ++ ++ exim -brt bach.comp.mus.example ++ Retry rule: *.comp.mus.example F,2h,15m; F,4d,30m; ++ ++ See chapter 32 for a description of Exim's retry rules. The first argument, ++ which is required, can be a complete address in the form local_part@domain, ++ or it can be just a domain name. If the second argument contains a dot, it ++ is interpreted as an optional second domain name; if no retry rule is found ++ for the first argument, the second is tried. This ties in with Exim's ++ behaviour when looking for retry rules for remote hosts - if no rule is ++ found that matches the host, one that matches the mail domain is sought. ++ Finally, an argument that is the name of a specific delivery error, as used ++ in setting up retry rules, can be given. For example: ++ ++ exim -brt haydn.comp.mus.example quota_3d ++ Retry rule: *@haydn.comp.mus.example quota_3d F,1h,15m ++ ++-brw ++ ++ This option is for testing address rewriting rules, and it must be followed ++ by a single argument, consisting of either a local part without a domain, ++ or a complete address with a fully qualified domain. Exim outputs how this ++ address would be rewritten for each possible place it might appear. See ++ chapter 31 for further details. ++ ++-bS ++ ++ This option is used for batched SMTP input, which is an alternative ++ interface for non-interactive local message submission. A number of ++ messages can be submitted in a single run. However, despite its name, this ++ is not really SMTP input. Exim reads each message's envelope from SMTP ++ commands on the standard input, but generates no responses. If the caller ++ is trusted, or untrusted_set_sender is set, the senders in the SMTP MAIL ++ commands are believed; otherwise the sender is always the caller of Exim. ++ ++ The message itself is read from the standard input, in SMTP format (leading ++ dots doubled), terminated by a line containing just a single dot. An error ++ is provoked if the terminating dot is missing. A further message may then ++ follow. ++ ++ As for other local message submissions, the contents of incoming batch SMTP ++ messages can be checked using the non-SMTP ACL (see chapter 42). ++ Unqualified addresses are automatically qualified using qualify_domain and ++ qualify_recipient, as appropriate, unless the -bnq option is used. ++ ++ Some other SMTP commands are recognized in the input. HELO and EHLO act as ++ RSET; VRFY, EXPN, ETRN, and HELP act as NOOP; QUIT quits, ignoring the rest ++ of the standard input. ++ ++ If any error is encountered, reports are written to the standard output and ++ error streams, and Exim gives up immediately. The return code is 0 if no ++ error was detected; it is 1 if one or more messages were accepted before ++ the error was detected; otherwise it is 2. ++ ++ More details of input using batched SMTP are given in section 47.11. ++ ++-bs ++ ++ This option causes Exim to accept one or more messages by reading SMTP ++ commands on the standard input, and producing SMTP replies on the standard ++ output. SMTP policy controls, as defined in ACLs (see chapter 42) are ++ applied. Some user agents use this interface as a way of passing ++ locally-generated messages to the MTA. ++ ++ In this usage, if the caller of Exim is trusted, or untrusted_set_sender is ++ set, the senders of messages are taken from the SMTP MAIL commands. ++ Otherwise the content of these commands is ignored and the sender is set up ++ as the calling user. Unqualified addresses are automatically qualified ++ using qualify_domain and qualify_recipient, as appropriate, unless the -bnq ++ option is used. ++ ++ The -bs option is also used to run Exim from inetd, as an alternative to ++ using a listening daemon. Exim can distinguish the two cases by checking ++ whether the standard input is a TCP/IP socket. When Exim is called from ++ inetd, the source of the mail is assumed to be remote, and the comments ++ above concerning senders and qualification do not apply. In this situation, ++ Exim behaves in exactly the same way as it does when receiving a message ++ via the listening daemon. ++ ++-bt ++ ++ This option runs Exim in address testing mode, in which each argument is ++ taken as a recipient address to be tested for deliverability. The results ++ are written to the standard output. If a test fails, and the caller is not ++ an admin user, no details of the failure are output, because these might ++ contain sensitive information such as usernames and passwords for database ++ lookups. ++ ++ If no arguments are given, Exim runs in an interactive manner, prompting ++ with a right angle bracket for addresses to be tested. ++ ++ Unlike the -be test option, you cannot arrange for Exim to use the readline ++ () function, because it is running as root and there are security issues. ++ ++ Each address is handled as if it were the recipient address of a message ++ (compare the -bv option). It is passed to the routers and the result is ++ written to the standard output. However, any router that has ++ no_address_test set is bypassed. This can make -bt easier to use for ++ genuine routing tests if your first router passes everything to a scanner ++ program. ++ ++ The return code is 2 if any address failed outright; it is 1 if no address ++ failed outright but at least one could not be resolved for some reason. ++ Return code 0 is given only when all addresses succeed. ++ ++ Note: When actually delivering a message, Exim removes duplicate recipient ++ addresses after routing is complete, so that only one delivery takes place. ++ This does not happen when testing with -bt; the full results of routing are ++ always shown. ++ ++ Warning: -bt can only do relatively simple testing. If any of the routers ++ in the configuration makes any tests on the sender address of a message, ++ you can use the -f option to set an appropriate sender when running -bt ++ tests. Without it, the sender is assumed to be the calling user at the ++ default qualifying domain. However, if you have set up (for example) ++ routers whose behaviour depends on the contents of an incoming message, you ++ cannot test those conditions using -bt. The -N option provides a possible ++ way of doing such tests. ++ ++-bV ++ ++ This option causes Exim to write the current version number, compilation ++ number, and compilation date of the exim binary to the standard output. It ++ also lists the DBM library that is being used, the optional modules (such ++ as specific lookup types), the drivers that are included in the binary, and ++ the name of the run time configuration file that is in use. ++ ++ As part of its operation, -bV causes Exim to read and syntax check its ++ configuration file. However, this is a static check only. It cannot check ++ values that are to be expanded. For example, although a misspelt ACL verb ++ is detected, an error in the verb's arguments is not. You cannot rely on ++ -bV alone to discover (for example) all the typos in the configuration; ++ some realistic testing is needed. The -bh and -N options provide more ++ dynamic testing facilities. ++ ++-bv ++ ++ This option runs Exim in address verification mode, in which each argument ++ is taken as a recipient address to be verified by the routers. (This does ++ not involve any verification callouts). During normal operation, ++ verification happens mostly as a consequence processing a verify condition ++ in an ACL (see chapter 42). If you want to test an entire ACL, possibly ++ including callouts, see the -bh and -bhc options. ++ ++ If verification fails, and the caller is not an admin user, no details of ++ the failure are output, because these might contain sensitive information ++ such as usernames and passwords for database lookups. ++ ++ If no arguments are given, Exim runs in an interactive manner, prompting ++ with a right angle bracket for addresses to be verified. ++ ++ Unlike the -be test option, you cannot arrange for Exim to use the readline ++ () function, because it is running as exim and there are security issues. ++ ++ Verification differs from address testing (the -bt option) in that routers ++ that have no_verify set are skipped, and if the address is accepted by a ++ router that has fail_verify set, verification fails. The address is ++ verified as a recipient if -bv is used; to test verification for a sender ++ address, -bvs should be used. ++ ++ If the -v option is not set, the output consists of a single line for each ++ address, stating whether it was verified or not, and giving a reason in the ++ latter case. Without -v, generating more than one address by redirection ++ causes verification to end successfully, without considering the generated ++ addresses. However, if just one address is generated, processing continues, ++ and the generated address must verify successfully for the overall ++ verification to succeed. ++ ++ When -v is set, more details are given of how the address has been handled, ++ and in the case of address redirection, all the generated addresses are ++ also considered. Verification may succeed for some and fail for others. ++ ++ The return code is 2 if any address failed outright; it is 1 if no address ++ failed outright but at least one could not be resolved for some reason. ++ Return code 0 is given only when all addresses succeed. ++ ++ If any of the routers in the configuration makes any tests on the sender ++ address of a message, you should use the -f option to set an appropriate ++ sender when running -bv tests. Without it, the sender is assumed to be the ++ calling user at the default qualifying domain. ++ ++-bvs ++ ++ This option acts like -bv, but verifies the address as a sender rather than ++ a recipient address. This affects any rewriting and qualification that ++ might happen. ++ ++-bw ++ ++ This option runs Exim as a daemon, awaiting incoming SMTP connections, ++ similarly to the -bd option. All port specifications on the command-line ++ and in the configuration file are ignored. Queue-running may not be ++ specified. ++ ++ In this mode, Exim expects to be passed a socket as fd 0 (stdin) which is ++ listening for connections. This permits the system to start up and have ++ inetd (or equivalent) listen on the SMTP ports, starting an Exim daemon for ++ each port only when the first connection is received. ++ ++ If the option is given as -bw<time> then the time is a timeout, after which ++ the daemon will exit, which should cause inetd to listen once more. ++ ++-C <filelist> ++ ++ This option causes Exim to find the run time configuration file from the ++ given list instead of from the list specified by the CONFIGURE_FILE ++ compile-time setting. Usually, the list will consist of just a single file ++ name, but it can be a colon-separated list of names. In this case, the ++ first file that exists is used. Failure to open an existing file stops Exim ++ from proceeding any further along the list, and an error is generated. ++ ++ When this option is used by a caller other than root, and the list is ++ different from the compiled-in list, Exim gives up its root privilege ++ immediately, and runs with the real and effective uid and gid set to those ++ of the caller. However, if a TRUSTED_CONFIG_LIST file is defined in Local/ ++ Makefile, that file contains a list of full pathnames, one per line, for ++ configuration files which are trusted. Root privilege is retained for any ++ configuration file so listed, as long as the caller is the Exim user (or ++ the user specified in the CONFIGURE_OWNER option, if any), and as long as ++ the configuration file is not writeable by inappropriate users or groups. ++ ++ Leaving TRUSTED_CONFIG_LIST unset precludes the possibility of testing a ++ configuration using -C right through message reception and delivery, even ++ if the caller is root. The reception works, but by that time, Exim is ++ running as the Exim user, so when it re-executes to regain privilege for ++ the delivery, the use of -C causes privilege to be lost. However, root can ++ test reception and delivery using two separate commands (one to put a ++ message on the queue, using -odq, and another to do the delivery, using -M ++ ). ++ ++ If ALT_CONFIG_PREFIX is defined in Local/Makefile, it specifies a prefix ++ string with which any file named in a -C command line option must start. In ++ addition, the file name must not contain the sequence "/../". However, if ++ the value of the -C option is identical to the value of CONFIGURE_FILE in ++ Local/Makefile, Exim ignores -C and proceeds as usual. There is no default ++ setting for ALT_CONFIG_PREFIX; when it is unset, any file name can be used ++ with -C. ++ ++ ALT_CONFIG_PREFIX can be used to confine alternative configuration files to ++ a directory to which only root has access. This prevents someone who has ++ broken into the Exim account from running a privileged Exim with an ++ arbitrary configuration file. ++ ++ The -C facility is useful for ensuring that configuration files are ++ syntactically correct, but cannot be used for test deliveries, unless the ++ caller is privileged, or unless it is an exotic configuration that does not ++ require privilege. No check is made on the owner or group of the files ++ specified by this option. ++ ++-D<macro>=<value> ++ ++ This option can be used to override macro definitions in the configuration ++ file (see section 6.4). However, like -C, if it is used by an unprivileged ++ caller, it causes Exim to give up its root privilege. If DISABLE_D_OPTION ++ is defined in Local/Makefile, the use of -D is completely disabled, and its ++ use causes an immediate error exit. ++ ++ If WHITELIST_D_MACROS is defined in Local/Makefile then it should be a ++ colon-separated list of macros which are considered safe and, if -D only ++ supplies macros from this list, and the values are acceptable, then Exim ++ will not give up root privilege if the caller is root, the Exim run-time ++ user, or the CONFIGURE_OWNER, if set. This is a transition mechanism and is ++ expected to be removed in the future. Acceptable values for the macros ++ satisfy the regexp: "^[A-Za-z0-9_/.-]*$" ++ ++ The entire option (including equals sign if present) must all be within one ++ command line item. -D can be used to set the value of a macro to the empty ++ string, in which case the equals sign is optional. These two commands are ++ synonymous: ++ ++ exim -DABC ... ++ exim -DABC= ... ++ ++ To include spaces in a macro definition item, quotes must be used. If you ++ use quotes, spaces are permitted around the macro name and the equals sign. ++ For example: ++ ++ exim '-D ABC = something' ... ++ ++ -D may be repeated up to 10 times on a command line. ++ ++-d<debug options> ++ ++ This option causes debugging information to be written to the standard ++ error stream. It is restricted to admin users because debugging output may ++ show database queries that contain password information. Also, the details ++ of users' filter files should be protected. If a non-admin user uses -d, ++ Exim writes an error message to the standard error stream and exits with a ++ non-zero return code. ++ ++ When -d is used, -v is assumed. If -d is given on its own, a lot of ++ standard debugging data is output. This can be reduced, or increased to ++ include some more rarely needed information, by directly following -d with ++ a string made up of names preceded by plus or minus characters. These add ++ or remove sets of debugging data, respectively. For example, -d+filter adds ++ filter debugging, whereas -d-all+filter selects only filter debugging. Note ++ that no spaces are allowed in the debug setting. The available debugging ++ categories are: ++ ++ acl ACL interpretation ++ auth authenticators ++ deliver general delivery logic ++ dns DNS lookups (see also resolver) ++ dnsbl DNS black list (aka RBL) code ++ exec arguments for execv() calls ++ expand detailed debugging for string expansions ++ filter filter handling ++ hints_lookup hints data lookups ++ host_lookup all types of name-to-IP address handling ++ ident ident lookup ++ interface lists of local interfaces ++ lists matching things in lists ++ load system load checks ++ local_scan can be used by local_scan() (see chapter 44) ++ lookup general lookup code and all lookups ++ memory memory handling ++ pid add pid to debug output lines ++ process_info setting info for the process log ++ queue_run queue runs ++ receive general message reception logic ++ resolver turn on the DNS resolver's debugging output ++ retry retry handling ++ rewrite address rewriting ++ route address routing ++ timestamp add timestamp to debug output lines ++ tls TLS logic ++ transport transports ++ uid changes of uid/gid and looking up uid/gid ++ verify address verification logic ++ all almost all of the above (see below), and also -v ++ ++ The "all" option excludes "memory" when used as "+all", but includes it for ++ "-all". The reason for this is that "+all" is something that people tend to ++ use when generating debug output for Exim maintainers. If "+memory" is ++ included, an awful lot of output that is very rarely of interest is ++ generated, so it now has to be explicitly requested. However, "-all" does ++ turn everything off. ++ ++ The "resolver" option produces output only if the DNS resolver was compiled ++ with DEBUG enabled. This is not the case in some operating systems. Also, ++ unfortunately, debugging output from the DNS resolver is written to stdout ++ rather than stderr. ++ ++ The default (-d with no argument) omits "expand", "filter", "interface", ++ "load", "memory", "pid", "resolver", and "timestamp". However, the "pid" ++ selector is forced when debugging is turned on for a daemon, which then ++ passes it on to any re-executed Exims. Exim also automatically adds the pid ++ to debug lines when several remote deliveries are run in parallel. ++ ++ The "timestamp" selector causes the current time to be inserted at the ++ start of all debug output lines. This can be useful when trying to track ++ down delays in processing. ++ ++ If the debug_print option is set in any driver, it produces output whenever ++ any debugging is selected, or if -v is used. ++ ++-dd<debug options> ++ ++ This option behaves exactly like -d except when used on a command that ++ starts a daemon process. In that case, debugging is turned off for the ++ subprocesses that the daemon creates. Thus, it is useful for monitoring the ++ behaviour of the daemon without creating as much output as full debugging ++ does. ++ ++-dropcr ++ ++ This is an obsolete option that is now a no-op. It used to affect the way ++ Exim handled CR and LF characters in incoming messages. What happens now is ++ described in section 46.2. ++ ++-E ++ ++ This option specifies that an incoming message is a locally-generated ++ delivery failure report. It is used internally by Exim when handling ++ delivery failures and is not intended for external use. Its only effect is ++ to stop Exim generating certain messages to the postmaster, as otherwise ++ message cascades could occur in some situations. As part of the same ++ option, a message id may follow the characters -E. If it does, the log ++ entry for the receipt of the new message contains the id, following "R=", ++ as a cross-reference. ++ ++-ex ++ ++ There are a number of Sendmail options starting with -oe which seem to be ++ called by various programs without the leading o in the option. For ++ example, the vacation program uses -eq. Exim treats all options of the form ++ -ex as synonymous with the corresponding -oex options. ++ ++-F <string> ++ ++ This option sets the sender's full name for use when a locally-generated ++ message is being accepted. In the absence of this option, the user's gecos ++ entry from the password data is used. As users are generally permitted to ++ alter their gecos entries, no security considerations are involved. White ++ space between -F and the <string> is optional. ++ ++-f <address> ++ ++ This option sets the address of the envelope sender of a locally-generated ++ message (also known as the return path). The option can normally be used ++ only by a trusted user, but untrusted_set_sender can be set to allow ++ untrusted users to use it. ++ ++ Processes running as root or the Exim user are always trusted. Other ++ trusted users are defined by the trusted_users or trusted_groups options. ++ In the absence of -f, or if the caller is not trusted, the sender of a ++ local message is set to the caller's login name at the default qualify ++ domain. ++ ++ There is one exception to the restriction on the use of -f: an empty sender ++ can be specified by any user, trusted or not, to create a message that can ++ never provoke a bounce. An empty sender can be specified either as an empty ++ string, or as a pair of angle brackets with nothing between them, as in ++ these examples of shell commands: ++ ++ exim -f '<>' user@domain ++ exim -f "" user@domain ++ ++ In addition, the use of -f is not restricted when testing a filter file ++ with -bf or when testing or verifying addresses using the -bt or -bv ++ options. ++ ++ Allowing untrusted users to change the sender address does not of itself ++ make it possible to send anonymous mail. Exim still checks that the From: ++ header refers to the local user, and if it does not, it adds a Sender: ++ header, though this can be overridden by setting no_local_from_check. ++ ++ White space between -f and the <address> is optional (that is, they can be ++ given as two arguments or one combined argument). The sender of a ++ locally-generated message can also be set (when permitted) by an initial ++ "From " line in the message - see the description of -bm above - but if -f ++ is also present, it overrides "From ". ++ ++-G ++ ++ This option is equivalent to an ACL applying: ++ ++ control = suppress_local_fixups ++ ++ for every message received. Note that Sendmail will complain about such bad ++ formatting, where Exim silently just does not fix it up. This may change in ++ future. ++ ++ As this affects audit information, the caller must be a trusted user to use ++ this option. ++ ++-h <number> ++ ++ This option is accepted for compatibility with Sendmail, but has no effect. ++ (In Sendmail it overrides the "hop count" obtained by counting Received: ++ headers.) ++ ++-i ++ ++ This option, which has the same effect as -oi, specifies that a dot on a ++ line by itself should not terminate an incoming, non-SMTP message. I can ++ find no documentation for this option in Solaris 2.4 Sendmail, but the ++ mailx command in Solaris 2.4 uses it. See also -ti. ++ ++-L <tag> ++ ++ This option is equivalent to setting syslog_processname in the config file ++ and setting log_file_path to "syslog". Its use is restricted to ++ administrators. The configuration file has to be read and parsed, to ++ determine access rights, before this is set and takes effect, so early ++ configuration file errors will not honour this flag. ++ ++ The tag should not be longer than 32 characters. ++ ++-M <message id> <message id> ... ++ ++ This option requests Exim to run a delivery attempt on each message in ++ turn. If any of the messages are frozen, they are automatically thawed ++ before the delivery attempt. The settings of queue_domains, ++ queue_smtp_domains, and hold_domains are ignored. ++ ++ Retry hints for any of the addresses are overridden - Exim tries to deliver ++ even if the normal retry time has not yet been reached. This option ++ requires the caller to be an admin user. However, there is an option called ++ prod_requires_admin which can be set false to relax this restriction (and ++ also the same requirement for the -q, -R, and -S options). ++ ++ The deliveries happen synchronously, that is, the original Exim process ++ does not terminate until all the delivery attempts have finished. No output ++ is produced unless there is a serious error. If you want to see what is ++ happening, use the -v option as well, or inspect Exim's main log. ++ ++-Mar <message id> <address> <address> ... ++ ++ This option requests Exim to add the addresses to the list of recipients of ++ the message ("ar" for "add recipients"). The first argument must be a ++ message id, and the remaining ones must be email addresses. However, if the ++ message is active (in the middle of a delivery attempt), it is not altered. ++ This option can be used only by an admin user. ++ ++-MC <transport> <hostname> <sequence number> <message id> ++ ++ This option is not intended for use by external callers. It is used ++ internally by Exim to invoke another instance of itself to deliver a ++ waiting message using an existing SMTP connection, which is passed as the ++ standard input. Details are given in chapter 47. This must be the final ++ option, and the caller must be root or the Exim user in order to use it. ++ ++-MCA ++ ++ This option is not intended for use by external callers. It is used ++ internally by Exim in conjunction with the -MC option. It signifies that ++ the connection to the remote host has been authenticated. ++ ++-MCP ++ ++ This option is not intended for use by external callers. It is used ++ internally by Exim in conjunction with the -MC option. It signifies that ++ the server to which Exim is connected supports pipelining. ++ ++-MCQ <process id> <pipe fd> ++ ++ This option is not intended for use by external callers. It is used ++ internally by Exim in conjunction with the -MC option when the original ++ delivery was started by a queue runner. It passes on the process id of the ++ queue runner, together with the file descriptor number of an open pipe. ++ Closure of the pipe signals the final completion of the sequence of ++ processes that are passing messages through the same SMTP connection. ++ ++-MCS ++ ++ This option is not intended for use by external callers. It is used ++ internally by Exim in conjunction with the -MC option, and passes on the ++ fact that the SMTP SIZE option should be used on messages delivered down ++ the existing connection. ++ ++-MCT ++ ++ This option is not intended for use by external callers. It is used ++ internally by Exim in conjunction with the -MC option, and passes on the ++ fact that the host to which Exim is connected supports TLS encryption. ++ ++-Mc <message id> <message id> ... ++ ++ This option requests Exim to run a delivery attempt on each message in ++ turn, but unlike the -M option, it does check for retry hints, and respects ++ any that are found. This option is not very useful to external callers. It ++ is provided mainly for internal use by Exim when it needs to re-invoke ++ itself in order to regain root privilege for a delivery (see chapter 54). ++ However, -Mc can be useful when testing, in order to run a delivery that ++ respects retry times and other options such as hold_domains that are ++ overridden when -M is used. Such a delivery does not count as a queue run. ++ If you want to run a specific delivery as if in a queue run, you should use ++ -q with a message id argument. A distinction between queue run deliveries ++ and other deliveries is made in one or two places. ++ ++-Mes <message id> <address> ++ ++ This option requests Exim to change the sender address in the message to ++ the given address, which must be a fully qualified address or "<>" ("es" ++ for "edit sender"). There must be exactly two arguments. The first argument ++ must be a message id, and the second one an email address. However, if the ++ message is active (in the middle of a delivery attempt), its status is not ++ altered. This option can be used only by an admin user. ++ ++-Mf <message id> <message id> ... ++ ++ This option requests Exim to mark each listed message as "frozen". This ++ prevents any delivery attempts taking place until the message is "thawed", ++ either manually or as a result of the auto_thaw configuration option. ++ However, if any of the messages are active (in the middle of a delivery ++ attempt), their status is not altered. This option can be used only by an ++ admin user. ++ ++-Mg <message id> <message id> ... ++ ++ This option requests Exim to give up trying to deliver the listed messages, ++ including any that are frozen. However, if any of the messages are active, ++ their status is not altered. For non-bounce messages, a delivery error ++ message is sent to the sender, containing the text "cancelled by ++ administrator". Bounce messages are just discarded. This option can be used ++ only by an admin user. ++ ++-Mmad <message id> <message id> ... ++ ++ This option requests Exim to mark all the recipient addresses in the ++ messages as already delivered ("mad" for "mark all delivered"). However, if ++ any message is active (in the middle of a delivery attempt), its status is ++ not altered. This option can be used only by an admin user. ++ ++-Mmd <message id> <address> <address> ... ++ ++ This option requests Exim to mark the given addresses as already delivered ++ ("md" for "mark delivered"). The first argument must be a message id, and ++ the remaining ones must be email addresses. These are matched to recipient ++ addresses in the message in a case-sensitive manner. If the message is ++ active (in the middle of a delivery attempt), its status is not altered. ++ This option can be used only by an admin user. ++ ++-Mrm <message id> <message id> ... ++ ++ This option requests Exim to remove the given messages from the queue. No ++ bounce messages are sent; each message is simply forgotten. However, if any ++ of the messages are active, their status is not altered. This option can be ++ used only by an admin user or by the user who originally caused the message ++ to be placed on the queue. ++ ++-Mset <message id> ++ ++ This option is useful only in conjunction with -be (that is, when testing ++ string expansions). Exim loads the given message from its spool before ++ doing the test expansions, thus setting message-specific variables such as ++ $message_size and the header variables. The $recipients variable is made ++ available. This feature is provided to make it easier to test expansions ++ that make use of these variables. However, this option can be used only by ++ an admin user. See also -bem. ++ ++-Mt <message id> <message id> ... ++ ++ This option requests Exim to "thaw" any of the listed messages that are ++ "frozen", so that delivery attempts can resume. However, if any of the ++ messages are active, their status is not altered. This option can be used ++ only by an admin user. ++ ++-Mvb <message id> ++ ++ This option causes the contents of the message body (-D) spool file to be ++ written to the standard output. This option can be used only by an admin ++ user. ++ ++-Mvc <message id> ++ ++ This option causes a copy of the complete message (header lines plus body) ++ to be written to the standard output in RFC 2822 format. This option can be ++ used only by an admin user. ++ ++-Mvh <message id> ++ ++ This option causes the contents of the message headers (-H) spool file to ++ be written to the standard output. This option can be used only by an admin ++ user. ++ ++-Mvl <message id> ++ ++ This option causes the contents of the message log spool file to be written ++ to the standard output. This option can be used only by an admin user. ++ ++-m ++ ++ This is apparently a synonym for -om that is accepted by Sendmail, so Exim ++ treats it that way too. ++ ++-N ++ ++ This is a debugging option that inhibits delivery of a message at the ++ transport level. It implies -v. Exim goes through many of the motions of ++ delivery - it just doesn't actually transport the message, but instead ++ behaves as if it had successfully done so. However, it does not make any ++ updates to the retry database, and the log entries for deliveries are ++ flagged with "*>" rather than "=>". ++ ++ Because -N discards any message to which it applies, only root or the Exim ++ user are allowed to use it with -bd, -q, -R or -M. In other words, an ++ ordinary user can use it only when supplying an incoming message to which ++ it will apply. Although transportation never fails when -N is set, an ++ address may be deferred because of a configuration problem on a transport, ++ or a routing problem. Once -N has been used for a delivery attempt, it ++ sticks to the message, and applies to any subsequent delivery attempts that ++ may happen for that message. ++ ++-n ++ ++ This option is interpreted by Sendmail to mean "no aliasing". For normal ++ modes of operation, it is ignored by Exim. When combined with -bP it ++ suppresses the name of an option from being output. ++ ++-O <data> ++ ++ This option is interpreted by Sendmail to mean "set option". It is ignored ++ by Exim. ++ ++-oA <file name> ++ ++ This option is used by Sendmail in conjunction with -bi to specify an ++ alternative alias file name. Exim handles -bi differently; see the ++ description above. ++ ++-oB <n> ++ ++ This is a debugging option which limits the maximum number of messages that ++ can be delivered down one SMTP connection, overriding the value set in any ++ smtp transport. If <n> is omitted, the limit is set to 1. ++ ++-odb ++ ++ This option applies to all modes in which Exim accepts incoming messages, ++ including the listening daemon. It requests "background" delivery of such ++ messages, which means that the accepting process automatically starts a ++ delivery process for each message received, but does not wait for the ++ delivery processes to finish. ++ ++ When all the messages have been received, the reception process exits, ++ leaving the delivery processes to finish in their own time. The standard ++ output and error streams are closed at the start of each delivery process. ++ This is the default action if none of the -od options are present. ++ ++ If one of the queueing options in the configuration file (queue_only or ++ queue_only_file, for example) is in effect, -odb overrides it if ++ queue_only_override is set true, which is the default setting. If ++ queue_only_override is set false, -odb has no effect. ++ ++-odf ++ ++ This option requests "foreground" (synchronous) delivery when Exim has ++ accepted a locally-generated message. (For the daemon it is exactly the ++ same as -odb.) A delivery process is automatically started to deliver the ++ message, and Exim waits for it to complete before proceeding. ++ ++ The original Exim reception process does not finish until the delivery ++ process for the final message has ended. The standard error stream is left ++ open during deliveries. ++ ++ However, like -odb, this option has no effect if queue_only_override is ++ false and one of the queueing options in the configuration file is in ++ effect. ++ ++ If there is a temporary delivery error during foreground delivery, the ++ message is left on the queue for later delivery, and the original reception ++ process exits. See chapter 50 for a way of setting up a restricted ++ configuration that never queues messages. ++ ++-odi ++ ++ This option is synonymous with -odf. It is provided for compatibility with ++ Sendmail. ++ ++-odq ++ ++ This option applies to all modes in which Exim accepts incoming messages, ++ including the listening daemon. It specifies that the accepting process ++ should not automatically start a delivery process for each message ++ received. Messages are placed on the queue, and remain there until a ++ subsequent queue runner process encounters them. There are several ++ configuration options (such as queue_only) that can be used to queue ++ incoming messages under certain conditions. This option overrides all of ++ them and also -odqs. It always forces queueing. ++ ++-odqs ++ ++ This option is a hybrid between -odb/-odi and -odq. However, like -odb and ++ -odi, this option has no effect if queue_only_override is false and one of ++ the queueing options in the configuration file is in effect. ++ ++ When -odqs does operate, a delivery process is started for each incoming ++ message, in the background by default, but in the foreground if -odi is ++ also present. The recipient addresses are routed, and local deliveries are ++ done in the normal way. However, if any SMTP deliveries are required, they ++ are not done at this time, so the message remains on the queue until a ++ subsequent queue runner process encounters it. Because routing was done, ++ Exim knows which messages are waiting for which hosts, and so a number of ++ messages for the same host can be sent in a single SMTP connection. The ++ queue_smtp_domains configuration option has the same effect for specific ++ domains. See also the -qq option. ++ ++-oee ++ ++ If an error is detected while a non-SMTP message is being received (for ++ example, a malformed address), the error is reported to the sender in a ++ mail message. ++ ++ Provided this error message is successfully sent, the Exim receiving ++ process exits with a return code of zero. If not, the return code is 2 if ++ the problem is that the original message has no recipients, or 1 for any ++ other error. This is the default -oex option if Exim is called as rmail. ++ ++-oem ++ ++ This is the same as -oee, except that Exim always exits with a non-zero ++ return code, whether or not the error message was successfully sent. This ++ is the default -oex option, unless Exim is called as rmail. ++ ++-oep ++ ++ If an error is detected while a non-SMTP message is being received, the ++ error is reported by writing a message to the standard error file (stderr). ++ The return code is 1 for all errors. ++ ++-oeq ++ ++ This option is supported for compatibility with Sendmail, but has the same ++ effect as -oep. ++ ++-oew ++ ++ This option is supported for compatibility with Sendmail, but has the same ++ effect as -oem. ++ ++-oi ++ ++ This option, which has the same effect as -i, specifies that a dot on a ++ line by itself should not terminate an incoming, non-SMTP message. ++ Otherwise, a single dot does terminate, though Exim does no special ++ processing for other lines that start with a dot. This option is set by ++ default if Exim is called as rmail. See also -ti. ++ ++-oitrue ++ ++ This option is treated as synonymous with -oi. ++ ++-oMa <host address> ++ ++ A number of options starting with -oM can be used to set values associated ++ with remote hosts on locally-submitted messages (that is, messages not ++ received over TCP/IP). These options can be used by any caller in ++ conjunction with the -bh, -be, -bf, -bF, -bt, or -bv testing options. In ++ other circumstances, they are ignored unless the caller is trusted. ++ ++ The -oMa option sets the sender host address. This may include a port ++ number at the end, after a full stop (period). For example: ++ ++ exim -bs -oMa 10.9.8.7.1234 ++ ++ An alternative syntax is to enclose the IP address in square brackets, ++ followed by a colon and the port number: ++ ++ exim -bs -oMa [10.9.8.7]:1234 ++ ++ The IP address is placed in the $sender_host_address variable, and the ++ port, if present, in $sender_host_port. If both -oMa and -bh are present on ++ the command line, the sender host IP address is taken from whichever one is ++ last. ++ ++-oMaa <name> ++ ++ See -oMa above for general remarks about the -oM options. The -oMaa option ++ sets the value of $sender_host_authenticated (the authenticator name). See ++ chapter 33 for a discussion of SMTP authentication. This option can be used ++ with -bh and -bs to set up an authenticated SMTP session without actually ++ using the SMTP AUTH command. ++ ++-oMai <string> ++ ++ See -oMa above for general remarks about the -oM options. The -oMai option ++ sets the value of $authenticated_id (the id that was authenticated). This ++ overrides the default value (the caller's login id, except with -bh, where ++ there is no default) for messages from local sources. See chapter 33 for a ++ discussion of authenticated ids. ++ ++-oMas <address> ++ ++ See -oMa above for general remarks about the -oM options. The -oMas option ++ sets the authenticated sender value in $authenticated_sender. It overrides ++ the sender address that is created from the caller's login id for messages ++ from local sources, except when -bh is used, when there is no default. For ++ both -bh and -bs, an authenticated sender that is specified on a MAIL ++ command overrides this value. See chapter 33 for a discussion of ++ authenticated senders. ++ ++-oMi <interface address> ++ ++ See -oMa above for general remarks about the -oM options. The -oMi option ++ sets the IP interface address value. A port number may be included, using ++ the same syntax as for -oMa. The interface address is placed in ++ $received_ip_address and the port number, if present, in $received_port. ++ ++-oMr <protocol name> ++ ++ See -oMa above for general remarks about the -oM options. The -oMr option ++ sets the received protocol value that is stored in $received_protocol. ++ However, it does not apply (and is ignored) when -bh or -bs is used. For ++ -bh, the protocol is forced to one of the standard SMTP protocol names (see ++ the description of $received_protocol in section 11.9). For -bs, the ++ protocol is always "local-" followed by one of those same names. For -bS ++ (batched SMTP) however, the protocol can be set by -oMr. ++ ++-oMs <host name> ++ ++ See -oMa above for general remarks about the -oM options. The -oMs option ++ sets the sender host name in $sender_host_name. When this option is ++ present, Exim does not attempt to look up a host name from an IP address; ++ it uses the name it is given. ++ ++-oMt <ident string> ++ ++ See -oMa above for general remarks about the -oM options. The -oMt option ++ sets the sender ident value in $sender_ident. The default setting for local ++ callers is the login id of the calling process, except when -bh is used, ++ when there is no default. ++ ++-om ++ ++ In Sendmail, this option means "me too", indicating that the sender of a ++ message should receive a copy of the message if the sender appears in an ++ alias expansion. Exim always does this, so the option does nothing. ++ ++-oo ++ ++ This option is ignored. In Sendmail it specifies "old style headers", ++ whatever that means. ++ ++-oP <path> ++ ++ This option is useful only in conjunction with -bd or -q with a time value. ++ The option specifies the file to which the process id of the daemon is ++ written. When -oX is used with -bd, or when -q with a time is used without ++ -bd, this is the only way of causing Exim to write a pid file, because in ++ those cases, the normal pid file is not used. ++ ++-or <time> ++ ++ This option sets a timeout value for incoming non-SMTP messages. If it is ++ not set, Exim will wait forever for the standard input. The value can also ++ be set by the receive_timeout option. The format used for specifying times ++ is described in section 6.15. ++ ++-os <time> ++ ++ This option sets a timeout value for incoming SMTP messages. The timeout ++ applies to each SMTP command and block of data. The value can also be set ++ by the smtp_receive_timeout option; it defaults to 5 minutes. The format ++ used for specifying times is described in section 6.15. ++ ++-ov ++ ++ This option has exactly the same effect as -v. ++ ++-oX <number or string> ++ ++ This option is relevant only when the -bd (start listening daemon) option ++ is also given. It controls which ports and interfaces the daemon uses. ++ Details of the syntax, and how it interacts with configuration file ++ options, are given in chapter 13. When -oX is used to start a daemon, no ++ pid file is written unless -oP is also present to specify a pid file name. ++ ++-pd ++ ++ This option applies when an embedded Perl interpreter is linked with Exim ++ (see chapter 12). It overrides the setting of the perl_at_start option, ++ forcing the starting of the interpreter to be delayed until it is needed. ++ ++-ps ++ ++ This option applies when an embedded Perl interpreter is linked with Exim ++ (see chapter 12). It overrides the setting of the perl_at_start option, ++ forcing the starting of the interpreter to occur as soon as Exim is ++ started. ++ ++-p<rval>:<sval> ++ ++ For compatibility with Sendmail, this option is equivalent to ++ ++ -oMr <rval> -oMs <sval> ++ ++ It sets the incoming protocol and host name (for trusted callers). The host ++ name and its colon can be omitted when only the protocol is to be set. Note ++ the Exim already has two private options, -pd and -ps, that refer to ++ embedded Perl. It is therefore impossible to set a protocol value of "d" or ++ "s" using this option (but that does not seem a real limitation). ++ ++-q ++ ++ This option is normally restricted to admin users. However, there is a ++ configuration option called prod_requires_admin which can be set false to ++ relax this restriction (and also the same requirement for the -M, -R, and ++ -S options). ++ ++ The -q option starts one queue runner process. This scans the queue of ++ waiting messages, and runs a delivery process for each one in turn. It ++ waits for each delivery process to finish before starting the next one. A ++ delivery process may not actually do any deliveries if the retry times for ++ the addresses have not been reached. Use -qf (see below) if you want to ++ override this. ++ ++ If the delivery process spawns other processes to deliver other messages ++ down passed SMTP connections, the queue runner waits for these to finish ++ before proceeding. ++ ++ When all the queued messages have been considered, the original queue ++ runner process terminates. In other words, a single pass is made over the ++ waiting mail, one message at a time. Use -q with a time (see below) if you ++ want this to be repeated periodically. ++ ++ Exim processes the waiting messages in an unpredictable order. It isn't ++ very random, but it is likely to be different each time, which is all that ++ matters. If one particular message screws up a remote MTA, other messages ++ to the same MTA have a chance of getting through if they get tried first. ++ ++ It is possible to cause the messages to be processed in lexical message id ++ order, which is essentially the order in which they arrived, by setting the ++ queue_run_in_order option, but this is not recommended for normal use. ++ ++-q<qflags> ++ ++ The -q option may be followed by one or more flag letters that change its ++ behaviour. They are all optional, but if more than one is present, they ++ must appear in the correct order. Each flag is described in a separate item ++ below. ++ ++-qq... ++ ++ An option starting with -qq requests a two-stage queue run. In the first ++ stage, the queue is scanned as if the queue_smtp_domains option matched ++ every domain. Addresses are routed, local deliveries happen, but no remote ++ transports are run. ++ ++ The hints database that remembers which messages are waiting for specific ++ hosts is updated, as if delivery to those hosts had been deferred. After ++ this is complete, a second, normal queue scan happens, with routing and ++ delivery taking place as normal. Messages that are routed to the same host ++ should mostly be delivered down a single SMTP connection because of the ++ hints that were set up during the first queue scan. This option may be ++ useful for hosts that are connected to the Internet intermittently. ++ ++-q[q]i... ++ ++ If the i flag is present, the queue runner runs delivery processes only for ++ those messages that haven't previously been tried. (i stands for "initial ++ delivery".) This can be helpful if you are putting messages on the queue ++ using -odq and want a queue runner just to process the new messages. ++ ++-q[q][i]f... ++ ++ If one f flag is present, a delivery attempt is forced for each non-frozen ++ message, whereas without f only those non-frozen addresses that have passed ++ their retry times are tried. ++ ++-q[q][i]ff... ++ ++ If ff is present, a delivery attempt is forced for every message, whether ++ frozen or not. ++ ++-q[q][i][f[f]]l ++ ++ The l (the letter "ell") flag specifies that only local deliveries are to ++ be done. If a message requires any remote deliveries, it remains on the ++ queue for later delivery. ++ ++-q<qflags> <start id> <end id> ++ ++ When scanning the queue, Exim can be made to skip over messages whose ids ++ are lexically less than a given value by following the -q option with a ++ starting message id. For example: ++ ++ exim -q 0t5C6f-0000c8-00 ++ ++ Messages that arrived earlier than "0t5C6f-0000c8-00" are not inspected. If ++ a second message id is given, messages whose ids are lexically greater than ++ it are also skipped. If the same id is given twice, for example, ++ ++ exim -q 0t5C6f-0000c8-00 0t5C6f-0000c8-00 ++ ++ just one delivery process is started, for that message. This differs from ++ -M in that retry data is respected, and it also differs from -Mc in that it ++ counts as a delivery from a queue run. Note that the selection mechanism ++ does not affect the order in which the messages are scanned. There are also ++ other ways of selecting specific sets of messages for delivery in a queue ++ run - see -R and -S. ++ ++-q<qflags><time> ++ ++ When a time value is present, the -q option causes Exim to run as a daemon, ++ starting a queue runner process at intervals specified by the given time ++ value (whose format is described in section 6.15). This form of the -q ++ option is commonly combined with the -bd option, in which case a single ++ daemon process handles both functions. A common way of starting up a ++ combined daemon at system boot time is to use a command such as ++ ++ /usr/exim/bin/exim -bd -q30m ++ ++ Such a daemon listens for incoming SMTP calls, and also starts a queue ++ runner process every 30 minutes. ++ ++ When a daemon is started by -q with a time value, but without -bd, no pid ++ file is written unless one is explicitly requested by the -oP option. ++ ++-qR<rsflags> <string> ++ ++ This option is synonymous with -R. It is provided for Sendmail ++ compatibility. ++ ++-qS<rsflags> <string> ++ ++ This option is synonymous with -S. ++ ++-R<rsflags> <string> ++ ++ The <rsflags> may be empty, in which case the white space before the string ++ is optional, unless the string is f, ff, r, rf, or rff, which are the ++ possible values for <rsflags>. White space is required if <rsflags> is not ++ empty. ++ ++ This option is similar to -q with no time value, that is, it causes Exim to ++ perform a single queue run, except that, when scanning the messages on the ++ queue, Exim processes only those that have at least one undelivered ++ recipient address containing the given string, which is checked in a ++ case-independent way. If the <rsflags> start with r, <string> is ++ interpreted as a regular expression; otherwise it is a literal string. ++ ++ If you want to do periodic queue runs for messages with specific ++ recipients, you can combine -R with -q and a time value. For example: ++ ++ exim -q25m -R @special.domain.example ++ ++ This example does a queue run for messages with recipients in the given ++ domain every 25 minutes. Any additional flags that are specified with -q ++ are applied to each queue run. ++ ++ Once a message is selected for delivery by this mechanism, all its ++ addresses are processed. For the first selected message, Exim overrides any ++ retry information and forces a delivery attempt for each undelivered ++ address. This means that if delivery of any address in the first message is ++ successful, any existing retry information is deleted, and so delivery ++ attempts for that address in subsequently selected messages (which are ++ processed without forcing) will run. However, if delivery of any address ++ does not succeed, the retry information is updated, and in subsequently ++ selected messages, the failing address will be skipped. ++ ++ If the <rsflags> contain f or ff, the delivery forcing applies to all ++ selected messages, not just the first; frozen messages are included when ff ++ is present. ++ ++ The -R option makes it straightforward to initiate delivery of all messages ++ to a given domain after a host has been down for some time. When the SMTP ++ command ETRN is accepted by its ACL (see chapter 42), its default effect is ++ to run Exim with the -R option, but it can be configured to run an ++ arbitrary command instead. ++ ++-r ++ ++ This is a documented (for Sendmail) obsolete alternative name for -f. ++ ++-S<rsflags> <string> ++ ++ This option acts like -R except that it checks the string against each ++ message's sender instead of against the recipients. If -R is also set, both ++ conditions must be met for a message to be selected. If either of the ++ options has f or ff in its flags, the associated action is taken. ++ ++-Tqt <times> ++ ++ This is an option that is exclusively for use by the Exim testing suite. It ++ is not recognized when Exim is run normally. It allows for the setting up ++ of explicit "queue times" so that various warning/retry features can be ++ tested. ++ ++-t ++ ++ When Exim is receiving a locally-generated, non-SMTP message on its ++ standard input, the -t option causes the recipients of the message to be ++ obtained from the To:, Cc:, and Bcc: header lines in the message instead of ++ from the command arguments. The addresses are extracted before any ++ rewriting takes place and the Bcc: header line, if present, is then ++ removed. ++ ++ If the command has any arguments, they specify addresses to which the ++ message is not to be delivered. That is, the argument addresses are removed ++ from the recipients list obtained from the headers. This is compatible with ++ Smail 3 and in accordance with the documented behaviour of several versions ++ of Sendmail, as described in man pages on a number of operating systems ++ (e.g. Solaris 8, IRIX 6.5, HP-UX 11). However, some versions of Sendmail ++ add argument addresses to those obtained from the headers, and the O'Reilly ++ Sendmail book documents it that way. Exim can be made to add argument ++ addresses instead of subtracting them by setting the option ++ extract_addresses_remove_arguments false. ++ ++ If there are any Resent- header lines in the message, Exim extracts ++ recipients from all Resent-To:, Resent-Cc:, and Resent-Bcc: header lines ++ instead of from To:, Cc:, and Bcc:. This is for compatibility with Sendmail ++ and other MTAs. (Prior to release 4.20, Exim gave an error if -t was used ++ in conjunction with Resent- header lines.) ++ ++ RFC 2822 talks about different sets of Resent- header lines (for when a ++ message is resent several times). The RFC also specifies that they should ++ be added at the front of the message, and separated by Received: lines. It ++ is not at all clear how -t should operate in the present of multiple sets, ++ nor indeed exactly what constitutes a "set". In practice, it seems that ++ MUAs do not follow the RFC. The Resent- lines are often added at the end of ++ the header, and if a message is resent more than once, it is common for the ++ original set of Resent- headers to be renamed as X-Resent- when a new set ++ is added. This removes any possible ambiguity. ++ ++-ti ++ ++ This option is exactly equivalent to -t -i. It is provided for ++ compatibility with Sendmail. ++ ++-tls-on-connect ++ ++ This option is available when Exim is compiled with TLS support. It forces ++ all incoming SMTP connections to behave as if the incoming port is listed ++ in the tls_on_connect_ports option. See section 13.4 and chapter 41 for ++ further details. ++ ++-U ++ ++ Sendmail uses this option for "initial message submission", and its ++ documentation states that in future releases, it may complain about ++ syntactically invalid messages rather than fixing them when this flag is ++ not set. Exim ignores this option. ++ ++-v ++ ++ This option causes Exim to write information to the standard error stream, ++ describing what it is doing. In particular, it shows the log lines for ++ receiving and delivering a message, and if an SMTP connection is made, the ++ SMTP dialogue is shown. Some of the log lines shown may not actually be ++ written to the log if the setting of log_selector discards them. Any ++ relevant selectors are shown with each log line. If none are shown, the ++ logging is unconditional. ++ ++-x ++ ++ AIX uses -x for a private purpose ("mail from a local mail program has ++ National Language Support extended characters in the body of the mail ++ item"). It sets -x when calling the MTA from its mail command. Exim ignores ++ this option. ++ ++-X <logfile> ++ ++ This option is interpreted by Sendmail to cause debug information to be ++ sent to the named file. It is ignored by Exim. ++ ++ ++ ++=============================================================================== ++6. THE EXIM RUN TIME CONFIGURATION FILE ++ ++Exim uses a single run time configuration file that is read whenever an Exim ++binary is executed. Note that in normal operation, this happens frequently, ++because Exim is designed to operate in a distributed manner, without central ++control. ++ ++If a syntax error is detected while reading the configuration file, Exim writes ++a message on the standard error, and exits with a non-zero return code. The ++message is also written to the panic log. Note: Only simple syntax errors can ++be detected at this time. The values of any expanded options are not checked ++until the expansion happens, even when the expansion does not actually alter ++the string. ++ ++The name of the configuration file is compiled into the binary for security ++reasons, and is specified by the CONFIGURE_FILE compilation option. In most ++configurations, this specifies a single file. However, it is permitted to give ++a colon-separated list of file names, in which case Exim uses the first ++existing file in the list. ++ ++The run time configuration file must be owned by root or by the user that is ++specified at compile time by the CONFIGURE_OWNER option (if set). The ++configuration file must not be world-writeable, or group-writeable unless its ++group is the root group or the one specified at compile time by the ++CONFIGURE_GROUP option. ++ ++Warning: In a conventional configuration, where the Exim binary is setuid to ++root, anybody who is able to edit the run time configuration file has an easy ++way to run commands as root. If you specify a user or group in the ++CONFIGURE_OWNER or CONFIGURE_GROUP options, then that user and/or any users who ++are members of that group will trivially be able to obtain root privileges. ++ ++Up to Exim version 4.72, the run time configuration file was also permitted to ++be writeable by the Exim user and/or group. That has been changed in Exim 4.73 ++since it offered a simple privilege escalation for any attacker who managed to ++compromise the Exim user account. ++ ++A default configuration file, which will work correctly in simple situations, ++is provided in the file src/configure.default. If CONFIGURE_FILE defines just ++one file name, the installation process copies the default configuration to a ++new file of that name if it did not previously exist. If CONFIGURE_FILE is a ++list, no default is automatically installed. Chapter 7 is a "walk-through" ++discussion of the default configuration. ++ ++ ++6.1 Using a different configuration file ++---------------------------------------- ++ ++A one-off alternate configuration can be specified by the -C command line ++option, which may specify a single file or a list of files. However, when -C is ++used, Exim gives up its root privilege, unless called by root (or unless the ++argument for -C is identical to the built-in value from CONFIGURE_FILE), or is ++listed in the TRUSTED_CONFIG_LIST file and the caller is the Exim user or the ++user specified in the CONFIGURE_OWNER setting. -C is useful mainly for checking ++the syntax of configuration files before installing them. No owner or group ++checks are done on a configuration file specified by -C, if root privilege has ++been dropped. ++ ++Even the Exim user is not trusted to specify an arbitrary configuration file ++with the -C option to be used with root privileges, unless that file is listed ++in the TRUSTED_CONFIG_LIST file. This locks out the possibility of testing a ++configuration using -C right through message reception and delivery, even if ++the caller is root. The reception works, but by that time, Exim is running as ++the Exim user, so when it re-execs to regain privilege for the delivery, the ++use of -C causes privilege to be lost. However, root can test reception and ++delivery using two separate commands (one to put a message on the queue, using ++-odq, and another to do the delivery, using -M). ++ ++If ALT_CONFIG_PREFIX is defined in Local/Makefile, it specifies a prefix string ++with which any file named in a -C command line option must start. In addition, ++the file name must not contain the sequence "/../". There is no default setting ++for ALT_CONFIG_PREFIX; when it is unset, any file name can be used with -C. ++ ++One-off changes to a configuration can be specified by the -D command line ++option, which defines and overrides values for macros used inside the ++configuration file. However, like -C, the use of this option by a ++non-privileged user causes Exim to discard its root privilege. If ++DISABLE_D_OPTION is defined in Local/Makefile, the use of -D is completely ++disabled, and its use causes an immediate error exit. ++ ++The WHITELIST_D_MACROS option in Local/Makefile permits the binary builder to ++declare certain macro names trusted, such that root privilege will not ++necessarily be discarded. WHITELIST_D_MACROS defines a colon-separated list of ++macros which are considered safe and, if -D only supplies macros from this ++list, and the values are acceptable, then Exim will not give up root privilege ++if the caller is root, the Exim run-time user, or the CONFIGURE_OWNER, if set. ++This is a transition mechanism and is expected to be removed in the future. ++Acceptable values for the macros satisfy the regexp: "^[A-Za-z0-9_/.-]*$" ++ ++Some sites may wish to use the same Exim binary on different machines that ++share a file system, but to use different configuration files on each machine. ++If CONFIGURE_FILE_USE_NODE is defined in Local/Makefile, Exim first looks for a ++file whose name is the configuration file name followed by a dot and the ++machine's node name, as obtained from the uname() function. If this file does ++not exist, the standard name is tried. This processing occurs for each file ++name in the list given by CONFIGURE_FILE or -C. ++ ++In some esoteric situations different versions of Exim may be run under ++different effective uids and the CONFIGURE_FILE_USE_EUID is defined to help ++with this. See the comments in src/EDITME for details. ++ ++ ++6.2 Configuration file format ++----------------------------- ++ ++Exim's configuration file is divided into a number of different parts. General ++option settings must always appear at the start of the file. The other parts ++are all optional, and may appear in any order. Each part other than the first ++is introduced by the word "begin" followed by the name of the part. The ++optional parts are: ++ ++ * ACL: Access control lists for controlling incoming SMTP mail (see chapter ++ 42). ++ ++ * authenticators: Configuration settings for the authenticator drivers. These ++ are concerned with the SMTP AUTH command (see chapter 33). ++ ++ * routers: Configuration settings for the router drivers. Routers process ++ addresses and determine how the message is to be delivered (see chapters 15 ++ -22). ++ ++ * transports: Configuration settings for the transport drivers. Transports ++ define mechanisms for copying messages to destinations (see chapters 24-30 ++ ). ++ ++ * retry: Retry rules, for use when a message cannot be delivered immediately. ++ If there is no retry section, or if it is empty (that is, no retry rules ++ are defined), Exim will not retry deliveries. In this situation, temporary ++ errors are treated the same as permanent errors. Retry rules are discussed ++ in chapter 32. ++ ++ * rewrite: Global address rewriting rules, for use when a message arrives and ++ when new addresses are generated during delivery. Rewriting is discussed in ++ chapter 31. ++ ++ * local_scan: Private options for the local_scan() function. If you want to ++ use this feature, you must set ++ ++ LOCAL_SCAN_HAS_OPTIONS=yes ++ ++ in Local/Makefile before building Exim. Details of the local_scan() ++ facility are given in chapter 44. ++ ++Leading and trailing white space in configuration lines is always ignored. ++ ++Blank lines in the file, and lines starting with a # character (ignoring ++leading white space) are treated as comments and are ignored. Note: A # ++character other than at the beginning of a line is not treated specially, and ++does not introduce a comment. ++ ++Any non-comment line can be continued by ending it with a backslash. Note that ++the general rule for white space means that trailing white space after the ++backslash and leading white space at the start of continuation lines is ++ignored. Comment lines beginning with # (but not empty lines) may appear in the ++middle of a sequence of continuation lines. ++ ++A convenient way to create a configuration file is to start from the default, ++which is supplied in src/configure.default, and add, delete, or change settings ++as required. ++ ++The ACLs, retry rules, and rewriting rules have their own syntax which is ++described in chapters 42, 32, and 31, respectively. The other parts of the ++configuration file have some syntactic items in common, and these are described ++below, from section 6.10 onwards. Before that, the inclusion, macro, and ++conditional facilities are described. ++ ++ ++6.3 File inclusions in the configuration file ++--------------------------------------------- ++ ++You can include other files inside Exim's run time configuration file by using ++this syntax: ++ ++.include <file name> ++.include_if_exists <file name> ++ ++on a line by itself. Double quotes round the file name are optional. If you use ++the first form, a configuration error occurs if the file does not exist; the ++second form does nothing for non-existent files. In all cases, an absolute file ++name is required. ++ ++Includes may be nested to any depth, but remember that Exim reads its ++configuration file often, so it is a good idea to keep them to a minimum. If ++you change the contents of an included file, you must HUP the daemon, because ++an included file is read only when the configuration itself is read. ++ ++The processing of inclusions happens early, at a physical line level, so, like ++comment lines, an inclusion can be used in the middle of an option setting, for ++example: ++ ++hosts_lookup = a.b.c \ ++ .include /some/file ++ ++Include processing happens after macro processing (see below). Its effect is to ++process the lines of the included file as if they occurred inline where the ++inclusion appears. ++ ++ ++6.4 Macros in the configuration file ++------------------------------------ ++ ++If a line in the main part of the configuration (that is, before the first ++"begin" line) begins with an upper case letter, it is taken as a macro ++definition, and must be of the form ++ ++<name> = <rest of line> ++ ++The name must consist of letters, digits, and underscores, and need not all be ++in upper case, though that is recommended. The rest of the line, including any ++continuations, is the replacement text, and has leading and trailing white ++space removed. Quotes are not removed. The replacement text can never end with ++a backslash character, but this doesn't seem to be a serious limitation. ++ ++Macros may also be defined between router, transport, authenticator, or ACL ++definitions. They may not, however, be defined within an individual driver or ++ACL, or in the local_scan, retry, or rewrite sections of the configuration. ++ ++ ++6.5 Macro substitution ++---------------------- ++ ++Once a macro is defined, all subsequent lines in the file (and any included ++files) are scanned for the macro name; if there are several macros, the line is ++scanned for each in turn, in the order in which the macros are defined. The ++replacement text is not re-scanned for the current macro, though it is scanned ++for subsequently defined macros. For this reason, a macro name may not contain ++the name of a previously defined macro as a substring. You could, for example, ++define ++ ++ABCD_XYZ = <something> ++ABCD = <something else> ++ ++but putting the definitions in the opposite order would provoke a configuration ++error. Macro expansion is applied to individual physical lines from the file, ++before checking for line continuation or file inclusion (see above). If a line ++consists solely of a macro name, and the expansion of the macro is empty, the ++line is ignored. A macro at the start of a line may turn the line into a ++comment line or a ".include" line. ++ ++ ++6.6 Redefining macros ++--------------------- ++ ++Once defined, the value of a macro can be redefined later in the configuration ++(or in an included file). Redefinition is specified by using == instead of =. ++For example: ++ ++MAC = initial value ++... ++MAC == updated value ++ ++Redefinition does not alter the order in which the macros are applied to the ++subsequent lines of the configuration file. It is still the same order in which ++the macros were originally defined. All that changes is the macro's value. ++Redefinition makes it possible to accumulate values. For example: ++ ++MAC = initial value ++... ++MAC == MAC and something added ++ ++This can be helpful in situations where the configuration file is built from a ++number of other files. ++ ++ ++6.7 Overriding macro values ++--------------------------- ++ ++The values set for macros in the configuration file can be overridden by the -D ++command line option, but Exim gives up its root privilege when -D is used, ++unless called by root or the Exim user. A definition on the command line using ++the -D option causes all definitions and redefinitions within the file to be ++ignored. ++ ++ ++6.8 Example of macro usage ++-------------------------- ++ ++As an example of macro usage, consider a configuration where aliases are looked ++up in a MySQL database. It helps to keep the file less cluttered if long ++strings such as SQL statements are defined separately as macros, for example: ++ ++ALIAS_QUERY = select mailbox from user where \ ++ login='${quote_mysql:$local_part}'; ++ ++This can then be used in a redirect router setting like this: ++ ++data = ${lookup mysql{ALIAS_QUERY}} ++ ++In earlier versions of Exim macros were sometimes used for domain, host, or ++address lists. In Exim 4 these are handled better by named lists - see section ++10.5. ++ ++ ++6.9 Conditional skips in the configuration file ++----------------------------------------------- ++ ++You can use the directives ".ifdef", ".ifndef", ".elifdef", ".elifndef", ++".else", and ".endif" to dynamically include or exclude portions of the ++configuration file. The processing happens whenever the file is read (that is, ++when an Exim binary starts to run). ++ ++The implementation is very simple. Instances of the first four directives must ++be followed by text that includes the names of one or macros. The condition ++that is tested is whether or not any macro substitution has taken place in the ++line. Thus: ++ ++.ifdef AAA ++message_size_limit = 50M ++.else ++message_size_limit = 100M ++.endif ++ ++sets a message size limit of 50M if the macro "AAA" is defined, and 100M ++otherwise. If there is more than one macro named on the line, the condition is ++true if any of them are defined. That is, it is an "or" condition. To obtain an ++"and" condition, you need to use nested ".ifdef"s. ++ ++Although you can use a macro expansion to generate one of these directives, it ++is not very useful, because the condition "there was a macro substitution in ++this line" will always be true. ++ ++Text following ".else" and ".endif" is ignored, and can be used as comment to ++clarify complicated nestings. ++ ++ ++6.10 Common option syntax ++------------------------- ++ ++For the main set of options, driver options, and local_scan() options, each ++setting is on a line by itself, and starts with a name consisting of lower-case ++letters and underscores. Many options require a data value, and in these cases ++the name must be followed by an equals sign (with optional white space) and ++then the value. For example: ++ ++qualify_domain = mydomain.example.com ++ ++Some option settings may contain sensitive data, for example, passwords for ++accessing databases. To stop non-admin users from using the -bP command line ++option to read these values, you can precede the option settings with the word ++"hide". For example: ++ ++hide mysql_servers = localhost/users/admin/secret-password ++ ++For non-admin users, such options are displayed like this: ++ ++mysql_servers = <value not displayable> ++ ++If "hide" is used on a driver option, it hides the value of that option on all ++instances of the same driver. ++ ++The following sections describe the syntax used for the different data types ++that are found in option settings. ++ ++ ++6.11 Boolean options ++-------------------- ++ ++Options whose type is given as boolean are on/off switches. There are two ++different ways of specifying such options: with and without a data value. If ++the option name is specified on its own without data, the switch is turned on; ++if it is preceded by "no_" or "not_" the switch is turned off. However, boolean ++options may be followed by an equals sign and one of the words "true", "false", ++"yes", or "no", as an alternative syntax. For example, the following two ++settings have exactly the same effect: ++ ++queue_only ++queue_only = true ++ ++The following two lines also have the same (opposite) effect: ++ ++no_queue_only ++queue_only = false ++ ++You can use whichever syntax you prefer. ++ ++ ++6.12 Integer values ++------------------- ++ ++If an option's type is given as "integer", the value can be given in decimal, ++hexadecimal, or octal. If it starts with a digit greater than zero, a decimal ++number is assumed. Otherwise, it is treated as an octal number unless it starts ++with the characters "0x", in which case the remainder is interpreted as a ++hexadecimal number. ++ ++If an integer value is followed by the letter K, it is multiplied by 1024; if ++it is followed by the letter M, it is multiplied by 1024x1024. When the values ++of integer option settings are output, values which are an exact multiple of ++1024 or 1024x1024 are sometimes, but not always, printed using the letters K ++and M. The printing style is independent of the actual input format that was ++used. ++ ++ ++6.13 Octal integer values ++------------------------- ++ ++If an option's type is given as "octal integer", its value is always ++interpreted as an octal number, whether or not it starts with the digit zero. ++Such options are always output in octal. ++ ++ ++6.14 Fixed point numbers ++------------------------ ++ ++If an option's type is given as "fixed-point", its value must be a decimal ++integer, optionally followed by a decimal point and up to three further digits. ++ ++ ++6.15 Time intervals ++------------------- ++ ++A time interval is specified as a sequence of numbers, each followed by one of ++the following letters, with no intervening white space: ++ ++ s seconds ++ m minutes ++ h hours ++ d days ++ w weeks ++ ++For example, "3h50m" specifies 3 hours and 50 minutes. The values of time ++intervals are output in the same format. Exim does not restrict the values; it ++is perfectly acceptable, for example, to specify "90m" instead of "1h30m". ++ ++ ++6.16 String values ++------------------ ++ ++If an option's type is specified as "string", the value can be specified with ++or without double-quotes. If it does not start with a double-quote, the value ++consists of the remainder of the line plus any continuation lines, starting at ++the first character after any leading white space, with trailing white space ++removed, and with no interpretation of the characters in the string. Because ++Exim removes comment lines (those beginning with #) at an early stage, they can ++appear in the middle of a multi-line string. The following two settings are ++therefore equivalent: ++ ++trusted_users = uucp:mail ++trusted_users = uucp:\ ++ # This comment line is ignored ++ mail ++ ++If a string does start with a double-quote, it must end with a closing ++double-quote, and any backslash characters other than those used for line ++continuation are interpreted as escape characters, as follows: ++ ++ "\\" single backslash ++ "\n" newline ++ "\r" carriage return ++ "\t" tab ++ "\"<octal digits> up to 3 octal digits specify one character ++ "\x"<hex digits> up to 2 hexadecimal digits specify one character ++ ++If a backslash is followed by some other character, including a double-quote ++character, that character replaces the pair. ++ ++Quoting is necessary only if you want to make use of the backslash escapes to ++insert special characters, or if you need to specify a value with leading or ++trailing spaces. These cases are rare, so quoting is almost never needed in ++current versions of Exim. In versions of Exim before 3.14, quoting was required ++in order to continue lines, so you may come across older configuration files ++and examples that apparently quote unnecessarily. ++ ++ ++6.17 Expanded strings ++--------------------- ++ ++Some strings in the configuration file are subjected to string expansion, by ++which means various parts of the string may be changed according to the ++circumstances (see chapter 11). The input syntax for such strings is as just ++described; in particular, the handling of backslashes in quoted strings is done ++as part of the input process, before expansion takes place. However, backslash ++is also an escape character for the expander, so any backslashes that are ++required for that reason must be doubled if they are within a quoted ++configuration string. ++ ++ ++6.18 User and group names ++------------------------- ++ ++User and group names are specified as strings, using the syntax described ++above, but the strings are interpreted specially. A user or group name must ++either consist entirely of digits, or be a name that can be looked up using the ++getpwnam() or getgrnam() function, as appropriate. ++ ++ ++6.19 List construction ++---------------------- ++ ++The data for some configuration options is a list of items, with colon as the ++default separator. Many of these options are shown with type "string list" in ++the descriptions later in this document. Others are listed as "domain list", ++"host list", "address list", or "local part list". Syntactically, they are all ++the same; however, those other than "string list" are subject to particular ++kinds of interpretation, as described in chapter 10. ++ ++In all these cases, the entire list is treated as a single string as far as the ++input syntax is concerned. The trusted_users setting in section 6.16 above is ++an example. If a colon is actually needed in an item in a list, it must be ++entered as two colons. Leading and trailing white space on each item in a list ++is ignored. This makes it possible to include items that start with a colon, ++and in particular, certain forms of IPv6 address. For example, the list ++ ++local_interfaces = 127.0.0.1 : ::::1 ++ ++contains two IP addresses, the IPv4 address 127.0.0.1 and the IPv6 address ::1. ++ ++Note: Although leading and trailing white space is ignored in individual list ++items, it is not ignored when parsing the list. The space after the first colon ++in the example above is necessary. If it were not there, the list would be ++interpreted as the two items 127.0.0.1:: and 1. ++ ++ ++6.20 Changing list separators ++----------------------------- ++ ++Doubling colons in IPv6 addresses is an unwelcome chore, so a mechanism was ++introduced to allow the separator character to be changed. If a list begins ++with a left angle bracket, followed by any punctuation character, that ++character is used instead of colon as the list separator. For example, the list ++above can be rewritten to use a semicolon separator like this: ++ ++local_interfaces = <; 127.0.0.1 ; ::1 ++ ++This facility applies to all lists, with the exception of the list in ++log_file_path. It is recommended that the use of non-colon separators be ++confined to circumstances where they really are needed. ++ ++It is also possible to use newline and other control characters (those with ++code values less than 32, plus DEL) as separators in lists. Such separators ++must be provided literally at the time the list is processed. For options that ++are string-expanded, you can write the separator using a normal escape ++sequence. This will be processed by the expander before the string is ++interpreted as a list. For example, if a newline-separated list of domains is ++generated by a lookup, you can process it directly by a line such as this: ++ ++domains = <\n ${lookup mysql{.....}} ++ ++This avoids having to change the list separator in such data. You are unlikely ++to want to use a control character as a separator in an option that is not ++expanded, because the value is literal text. However, it can be done by giving ++the value in quotes. For example: ++ ++local_interfaces = "<\n 127.0.0.1 \n ::1" ++ ++Unlike printing character separators, which can be included in list items by ++doubling, it is not possible to include a control character as data when it is ++set as the separator. Two such characters in succession are interpreted as ++enclosing an empty list item. ++ ++ ++6.21 Empty items in lists ++------------------------- ++ ++An empty item at the end of a list is always ignored. In other words, trailing ++separator characters are ignored. Thus, the list in ++ ++senders = user@domain : ++ ++contains only a single item. If you want to include an empty string as one item ++in a list, it must not be the last item. For example, this list contains three ++items, the second of which is empty: ++ ++senders = user1@domain : : user2@domain ++ ++Note: There must be white space between the two colons, as otherwise they are ++interpreted as representing a single colon data character (and the list would ++then contain just one item). If you want to specify a list that contains just ++one, empty item, you can do it as in this example: ++ ++senders = : ++ ++In this case, the first item is empty, and the second is discarded because it ++is at the end of the list. ++ ++ ++6.22 Format of driver configurations ++------------------------------------ ++ ++There are separate parts in the configuration for defining routers, transports, ++and authenticators. In each part, you are defining a number of driver ++instances, each with its own set of options. Each driver instance is defined by ++a sequence of lines like this: ++ ++<instance name>: ++ <option> ++ ... ++ <option> ++ ++In the following example, the instance name is localuser, and it is followed by ++three options settings: ++ ++localuser: ++ driver = accept ++ check_local_user ++ transport = local_delivery ++ ++For each driver instance, you specify which Exim code module it uses - by the ++setting of the driver option - and (optionally) some configuration settings. ++For example, in the case of transports, if you want a transport to deliver with ++SMTP you would use the smtp driver; if you want to deliver to a local file you ++would use the appendfile driver. Each of the drivers is described in detail in ++its own separate chapter later in this manual. ++ ++You can have several routers, transports, or authenticators that are based on ++the same underlying driver (each must have a different instance name). ++ ++The order in which routers are defined is important, because addresses are ++passed to individual routers one by one, in order. The order in which ++transports are defined does not matter at all. The order in which ++authenticators are defined is used only when Exim, as a client, is searching ++them to find one that matches an authentication mechanism offered by the ++server. ++ ++Within a driver instance definition, there are two kinds of option: generic and ++private. The generic options are those that apply to all drivers of the same ++type (that is, all routers, all transports or all authenticators). The driver ++option is a generic option that must appear in every definition. The private ++options are special for each driver, and none need appear, because they all ++have default values. ++ ++The options may appear in any order, except that the driver option must precede ++any private options, since these depend on the particular driver. For this ++reason, it is recommended that driver always be the first option. ++ ++Driver instance names, which are used for reference in log entries and ++elsewhere, can be any sequence of letters, digits, and underscores (starting ++with a letter) and must be unique among drivers of the same type. A router and ++a transport (for example) can each have the same name, but no two router ++instances can have the same name. The name of a driver instance should not be ++confused with the name of the underlying driver module. For example, the ++configuration lines: ++ ++remote_smtp: ++ driver = smtp ++ ++create an instance of the smtp transport driver whose name is remote_smtp. The ++same driver code can be used more than once, with different instance names and ++different option settings each time. A second instance of the smtp transport, ++with different options, might be defined thus: ++ ++special_smtp: ++ driver = smtp ++ port = 1234 ++ command_timeout = 10s ++ ++The names remote_smtp and special_smtp would be used to reference these ++transport instances from routers, and these names would appear in log lines. ++ ++Comment lines may be present in the middle of driver specifications. The full ++list of option settings for any particular driver instance, including all the ++defaulted values, can be extracted by making use of the -bP command line ++option. ++ ++ ++ ++=============================================================================== ++7. THE DEFAULT CONFIGURATION FILE ++ ++The default configuration file supplied with Exim as src/configure.default is ++sufficient for a host with simple mail requirements. As an introduction to the ++way Exim is configured, this chapter "walks through" the default configuration, ++giving brief explanations of the settings. Detailed descriptions of the options ++are given in subsequent chapters. The default configuration file itself ++contains extensive comments about ways you might want to modify the initial ++settings. However, note that there are many options that are not mentioned at ++all in the default configuration. ++ ++ ++7.1 Main configuration settings ++------------------------------- ++ ++The main (global) configuration option settings must always come first in the ++file. The first thing you'll see in the file, after some initial comments, is ++the line ++ ++# primary_hostname = ++ ++This is a commented-out setting of the primary_hostname option. Exim needs to ++know the official, fully qualified name of your host, and this is where you can ++specify it. However, in most cases you do not need to set this option. When it ++is unset, Exim uses the uname() system function to obtain the host name. ++ ++The first three non-comment configuration lines are as follows: ++ ++domainlist local_domains = @ ++domainlist relay_to_domains = ++hostlist relay_from_hosts = 127.0.0.1 ++ ++These are not, in fact, option settings. They are definitions of two named ++domain lists and one named host list. Exim allows you to give names to lists of ++domains, hosts, and email addresses, in order to make it easier to manage the ++configuration file (see section 10.5). ++ ++The first line defines a domain list called local_domains; this is used later ++in the configuration to identify domains that are to be delivered on the local ++host. ++ ++There is just one item in this list, the string "@". This is a special form of ++entry which means "the name of the local host". Thus, if the local host is ++called a.host.example, mail to any.user@a.host.example is expected to be ++delivered locally. Because the local host's name is referenced indirectly, the ++same configuration file can be used on different hosts. ++ ++The second line defines a domain list called relay_to_domains, but the list ++itself is empty. Later in the configuration we will come to the part that ++controls mail relaying through the local host; it allows relaying to any ++domains in this list. By default, therefore, no relaying on the basis of a mail ++domain is permitted. ++ ++The third line defines a host list called relay_from_hosts. This list is used ++later in the configuration to permit relaying from any host or IP address that ++matches the list. The default contains just the IP address of the IPv4 loopback ++interface, which means that processes on the local host are able to submit mail ++for relaying by sending it over TCP/IP to that interface. No other hosts are ++permitted to submit messages for relaying. ++ ++Just to be sure there's no misunderstanding: at this point in the configuration ++we aren't actually setting up any controls. We are just defining some domains ++and hosts that will be used in the controls that are specified later. ++ ++The next two configuration lines are genuine option settings: ++ ++acl_smtp_rcpt = acl_check_rcpt ++acl_smtp_data = acl_check_data ++ ++These options specify Access Control Lists (ACLs) that are to be used during an ++incoming SMTP session for every recipient of a message (every RCPT command), ++and after the contents of the message have been received, respectively. The ++names of the lists are acl_check_rcpt and acl_check_data, and we will come to ++their definitions below, in the ACL section of the configuration. The RCPT ACL ++controls which recipients are accepted for an incoming message - if a ++configuration does not provide an ACL to check recipients, no SMTP mail can be ++accepted. The DATA ACL allows the contents of a message to be checked. ++ ++Two commented-out option settings are next: ++ ++# av_scanner = clamd:/tmp/clamd ++# spamd_address = 127.0.0.1 783 ++ ++These are example settings that can be used when Exim is compiled with the ++content-scanning extension. The first specifies the interface to the virus ++scanner, and the second specifies the interface to SpamAssassin. Further ++details are given in chapter 43. ++ ++Three more commented-out option settings follow: ++ ++# tls_advertise_hosts = * ++# tls_certificate = /etc/ssl/exim.crt ++# tls_privatekey = /etc/ssl/exim.pem ++ ++These are example settings that can be used when Exim is compiled with support ++for TLS (aka SSL) as described in section 4.7. The first one specifies the list ++of clients that are allowed to use TLS when connecting to this server; in this ++case the wildcard means all clients. The other options specify where Exim ++should find its TLS certificate and private key, which together prove the ++server's identity to any clients that connect. More details are given in ++chapter 41. ++ ++Another two commented-out option settings follow: ++ ++# daemon_smtp_ports = 25 : 465 : 587 ++# tls_on_connect_ports = 465 ++ ++These options provide better support for roaming users who wish to use this ++server for message submission. They are not much use unless you have turned on ++TLS (as described in the previous paragraph) and authentication (about which ++more in section 7.7). The usual SMTP port 25 is often blocked on end-user ++networks, so RFC 4409 specifies that message submission should use port 587 ++instead. However some software (notably Microsoft Outlook) cannot be configured ++to use port 587 correctly, so these settings also enable the non-standard ++"smtps" (aka "ssmtp") port 465 (see section 13.4). ++ ++Two more commented-out options settings follow: ++ ++# qualify_domain = ++# qualify_recipient = ++ ++The first of these specifies a domain that Exim uses when it constructs a ++complete email address from a local login name. This is often needed when Exim ++receives a message from a local process. If you do not set qualify_domain, the ++value of primary_hostname is used. If you set both of these options, you can ++have different qualification domains for sender and recipient addresses. If you ++set only the first one, its value is used in both cases. ++ ++The following line must be uncommented if you want Exim to recognize addresses ++of the form user@[10.11.12.13] that is, with a "domain literal" (an IP address ++within square brackets) instead of a named domain. ++ ++# allow_domain_literals ++ ++The RFCs still require this form, but many people think that in the modern ++Internet it makes little sense to permit mail to be sent to specific hosts by ++quoting their IP addresses. This ancient format has been used by people who try ++to abuse hosts by using them for unwanted relaying. However, some people ++believe there are circumstances (for example, messages addressed to postmaster) ++where domain literals are still useful. ++ ++The next configuration line is a kind of trigger guard: ++ ++never_users = root ++ ++It specifies that no delivery must ever be run as the root user. The normal ++convention is to set up root as an alias for the system administrator. This ++setting is a guard against slips in the configuration. The list of users ++specified by never_users is not, however, the complete list; the build-time ++configuration in Local/Makefile has an option called FIXED_NEVER_USERS ++specifying a list that cannot be overridden. The contents of never_users are ++added to this list. By default FIXED_NEVER_USERS also specifies root. ++ ++When a remote host connects to Exim in order to send mail, the only information ++Exim has about the host's identity is its IP address. The next configuration ++line, ++ ++host_lookup = * ++ ++specifies that Exim should do a reverse DNS lookup on all incoming connections, ++in order to get a host name. This improves the quality of the logging ++information, but if you feel it is too expensive, you can remove it entirely, ++or restrict the lookup to hosts on "nearby" networks. Note that it is not ++always possible to find a host name from an IP address, because not all DNS ++reverse zones are maintained, and sometimes DNS servers are unreachable. ++ ++The next two lines are concerned with ident callbacks, as defined by RFC 1413 ++(hence their names): ++ ++rfc1413_hosts = * ++rfc1413_query_timeout = 5s ++ ++These settings cause Exim to make ident callbacks for all incoming SMTP calls. ++You can limit the hosts to which these calls are made, or change the timeout ++that is used. If you set the timeout to zero, all ident calls are disabled. ++Although they are cheap and can provide useful information for tracing problem ++messages, some hosts and firewalls have problems with ident calls. This can ++result in a timeout instead of an immediate refused connection, leading to ++delays on starting up an incoming SMTP session. ++ ++When Exim receives messages over SMTP connections, it expects all addresses to ++be fully qualified with a domain, as required by the SMTP definition. However, ++if you are running a server to which simple clients submit messages, you may ++find that they send unqualified addresses. The two commented-out options: ++ ++# sender_unqualified_hosts = ++# recipient_unqualified_hosts = ++ ++show how you can specify hosts that are permitted to send unqualified sender ++and recipient addresses, respectively. ++ ++The percent_hack_domains option is also commented out: ++ ++# percent_hack_domains = ++ ++It provides a list of domains for which the "percent hack" is to operate. This ++is an almost obsolete form of explicit email routing. If you do not know ++anything about it, you can safely ignore this topic. ++ ++The last two settings in the main part of the default configuration are ++concerned with messages that have been "frozen" on Exim's queue. When a message ++is frozen, Exim no longer continues to try to deliver it. Freezing occurs when ++a bounce message encounters a permanent failure because the sender address of ++the original message that caused the bounce is invalid, so the bounce cannot be ++delivered. This is probably the most common case, but there are also other ++conditions that cause freezing, and frozen messages are not always bounce ++messages. ++ ++ignore_bounce_errors_after = 2d ++timeout_frozen_after = 7d ++ ++The first of these options specifies that failing bounce messages are to be ++discarded after 2 days on the queue. The second specifies that any frozen ++message (whether a bounce message or not) is to be timed out (and discarded) ++after a week. In this configuration, the first setting ensures that no failing ++bounce message ever lasts a week. ++ ++ ++7.2 ACL configuration ++--------------------- ++ ++In the default configuration, the ACL section follows the main configuration. ++It starts with the line ++ ++begin acl ++ ++and it contains the definitions of two ACLs, called acl_check_rcpt and ++acl_check_data, that were referenced in the settings of acl_smtp_rcpt and ++acl_smtp_data above. ++ ++The first ACL is used for every RCPT command in an incoming SMTP message. Each ++RCPT command specifies one of the message's recipients. The ACL statements are ++considered in order, until the recipient address is either accepted or ++rejected. The RCPT command is then accepted or rejected, according to the ++result of the ACL processing. ++ ++acl_check_rcpt: ++ ++This line, consisting of a name terminated by a colon, marks the start of the ++ACL, and names it. ++ ++accept hosts = : ++ ++This ACL statement accepts the recipient if the sending host matches the list. ++But what does that strange list mean? It doesn't actually contain any host ++names or IP addresses. The presence of the colon puts an empty item in the ++list; Exim matches this only if the incoming message did not come from a remote ++host, because in that case, the remote hostname is empty. The colon is ++important. Without it, the list itself is empty, and can never match anything. ++ ++What this statement is doing is to accept unconditionally all recipients in ++messages that are submitted by SMTP from local processes using the standard ++input and output (that is, not using TCP/IP). A number of MUAs operate in this ++manner. ++ ++deny message = Restricted characters in address ++ domains = +local_domains ++ local_parts = ^[.] : ^.*[@%!/|] ++ ++deny message = Restricted characters in address ++ domains = !+local_domains ++ local_parts = ^[./|] : ^.*[@%!] : ^.*/\\.\\./ ++ ++These statements are concerned with local parts that contain any of the ++characters "@", "%", "!", "/", "|", or dots in unusual places. Although these ++characters are entirely legal in local parts (in the case of "@" and leading ++dots, only if correctly quoted), they do not commonly occur in Internet mail ++addresses. ++ ++The first three have in the past been associated with explicitly routed ++addresses (percent is still sometimes used - see the percent_hack_domains ++option). Addresses containing these characters are regularly tried by spammers ++in an attempt to bypass relaying restrictions, and also by open relay testing ++programs. Unless you really need them it is safest to reject these characters ++at this early stage. This configuration is heavy-handed in rejecting these ++characters for all messages it accepts from remote hosts. This is a deliberate ++policy of being as safe as possible. ++ ++The first rule above is stricter, and is applied to messages that are addressed ++to one of the local domains handled by this host. This is implemented by the ++first condition, which restricts it to domains that are listed in the ++local_domains domain list. The "+" character is used to indicate a reference to ++a named list. In this configuration, there is just one domain in local_domains, ++but in general there may be many. ++ ++The second condition on the first statement uses two regular expressions to ++block local parts that begin with a dot or contain "@", "%", "!", "/", or "|". ++If you have local accounts that include these characters, you will have to ++modify this rule. ++ ++Empty components (two dots in a row) are not valid in RFC 2822, but Exim allows ++them because they have been encountered in practice. (Consider the common ++convention of local parts constructed as " ++first-initial.second-initial.family-name" when applied to someone like the ++author of Exim, who has no second initial.) However, a local part starting with ++a dot or containing "/../" can cause trouble if it is used as part of a file ++name (for example, for a mailing list). This is also true for local parts that ++contain slashes. A pipe symbol can also be troublesome if the local part is ++incorporated unthinkingly into a shell command line. ++ ++The second rule above applies to all other domains, and is less strict. This ++allows your own users to send outgoing messages to sites that use slashes and ++vertical bars in their local parts. It blocks local parts that begin with a ++dot, slash, or vertical bar, but allows these characters within the local part. ++However, the sequence "/../" is barred. The use of "@", "%", and "!" is ++blocked, as before. The motivation here is to prevent your users (or your ++users' viruses) from mounting certain kinds of attack on remote sites. ++ ++accept local_parts = postmaster ++ domains = +local_domains ++ ++This statement, which has two conditions, accepts an incoming address if the ++local part is postmaster and the domain is one of those listed in the ++local_domains domain list. The "+" character is used to indicate a reference to ++a named list. In this configuration, there is just one domain in local_domains, ++but in general there may be many. ++ ++The presence of this statement means that mail to postmaster is never blocked ++by any of the subsequent tests. This can be helpful while sorting out problems ++in cases where the subsequent tests are incorrectly denying access. ++ ++require verify = sender ++ ++This statement requires the sender address to be verified before any subsequent ++ACL statement can be used. If verification fails, the incoming recipient ++address is refused. Verification consists of trying to route the address, to ++see if a bounce message could be delivered to it. In the case of remote ++addresses, basic verification checks only the domain, but callouts can be used ++for more verification if required. Section 42.43 discusses the details of ++address verification. ++ ++accept hosts = +relay_from_hosts ++ control = submission ++ ++This statement accepts the address if the message is coming from one of the ++hosts that are defined as being allowed to relay through this host. Recipient ++verification is omitted here, because in many cases the clients are dumb MUAs ++that do not cope well with SMTP error responses. For the same reason, the ++second line specifies "submission mode" for messages that are accepted. This is ++described in detail in section 46.1; it causes Exim to fix messages that are ++deficient in some way, for example, because they lack a Date: header line. If ++you are actually relaying out from MTAs, you should probably add recipient ++verification here, and disable submission mode. ++ ++accept authenticated = * ++ control = submission ++ ++This statement accepts the address if the client host has authenticated itself. ++Submission mode is again specified, on the grounds that such messages are most ++likely to come from MUAs. The default configuration does not define any ++authenticators, though it does include some nearly complete commented-out ++examples described in 7.7. This means that no client can in fact authenticate ++until you complete the authenticator definitions. ++ ++require message = relay not permitted ++ domains = +local_domains : +relay_to_domains ++ ++This statement rejects the address if its domain is neither a local domain nor ++one of the domains for which this host is a relay. ++ ++require verify = recipient ++ ++This statement requires the recipient address to be verified; if verification ++fails, the address is rejected. ++ ++# deny message = rejected because $sender_host_address \ ++# is in a black list at $dnslist_domain\n\ ++# $dnslist_text ++# dnslists = black.list.example ++# ++# warn dnslists = black.list.example ++# add_header = X-Warning: $sender_host_address is in \ ++# a black list at $dnslist_domain ++# log_message = found in $dnslist_domain ++ ++These commented-out lines are examples of how you could configure Exim to check ++sending hosts against a DNS black list. The first statement rejects messages ++from blacklisted hosts, whereas the second just inserts a warning header line. ++ ++# require verify = csa ++ ++This commented-out line is an example of how you could turn on client SMTP ++authorization (CSA) checking. Such checks do DNS lookups for special SRV ++records. ++ ++accept ++ ++The final statement in the first ACL unconditionally accepts any recipient ++address that has successfully passed all the previous tests. ++ ++acl_check_data: ++ ++This line marks the start of the second ACL, and names it. Most of the contents ++of this ACL are commented out: ++ ++# deny malware = * ++# message = This message contains a virus \ ++# ($malware_name). ++ ++These lines are examples of how to arrange for messages to be scanned for ++viruses when Exim has been compiled with the content-scanning extension, and a ++suitable virus scanner is installed. If the message is found to contain a ++virus, it is rejected with the given custom error message. ++ ++# warn spam = nobody ++# message = X-Spam_score: $spam_score\n\ ++# X-Spam_score_int: $spam_score_int\n\ ++# X-Spam_bar: $spam_bar\n\ ++# X-Spam_report: $spam_report ++ ++These lines are an example of how to arrange for messages to be scanned by ++SpamAssassin when Exim has been compiled with the content-scanning extension, ++and SpamAssassin has been installed. The SpamAssassin check is run with ++"nobody" as its user parameter, and the results are added to the message as a ++series of extra header line. In this case, the message is not rejected, ++whatever the spam score. ++ ++accept ++ ++This final line in the DATA ACL accepts the message unconditionally. ++ ++ ++7.3 Router configuration ++------------------------ ++ ++The router configuration comes next in the default configuration, introduced by ++the line ++ ++begin routers ++ ++Routers are the modules in Exim that make decisions about where to send ++messages. An address is passed to each router in turn, until it is either ++accepted, or failed. This means that the order in which you define the routers ++matters. Each router is fully described in its own chapter later in this ++manual. Here we give only brief overviews. ++ ++# domain_literal: ++# driver = ipliteral ++# domains = !+local_domains ++# transport = remote_smtp ++ ++This router is commented out because the majority of sites do not want to ++support domain literal addresses (those of the form user@[10.9.8.7]). If you ++uncomment this router, you also need to uncomment the setting of ++allow_domain_literals in the main part of the configuration. ++ ++dnslookup: ++ driver = dnslookup ++ domains = ! +local_domains ++ transport = remote_smtp ++ ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8 ++ no_more ++ ++The first uncommented router handles addresses that do not involve any local ++domains. This is specified by the line ++ ++domains = ! +local_domains ++ ++The domains option lists the domains to which this router applies, but the ++exclamation mark is a negation sign, so the router is used only for domains ++that are not in the domain list called local_domains (which was defined at the ++start of the configuration). The plus sign before local_domains indicates that ++it is referring to a named list. Addresses in other domains are passed on to ++the following routers. ++ ++The name of the router driver is dnslookup, and is specified by the driver ++option. Do not be confused by the fact that the name of this router instance is ++the same as the name of the driver. The instance name is arbitrary, but the ++name set in the driver option must be one of the driver modules that is in the ++Exim binary. ++ ++The dnslookup router routes addresses by looking up their domains in the DNS in ++order to obtain a list of hosts to which the address is routed. If the router ++succeeds, the address is queued for the remote_smtp transport, as specified by ++the transport option. If the router does not find the domain in the DNS, no ++further routers are tried because of the no_more setting, so the address fails ++and is bounced. ++ ++The ignore_target_hosts option specifies a list of IP addresses that are to be ++entirely ignored. This option is present because a number of cases have been ++encountered where MX records in the DNS point to host names whose IP addresses ++are 0.0.0.0 or are in the 127 subnet (typically 127.0.0.1). Completely ignoring ++these IP addresses causes Exim to fail to route the email address, so it ++bounces. Otherwise, Exim would log a routing problem, and continue to try to ++deliver the message periodically until the address timed out. ++ ++system_aliases: ++ driver = redirect ++ allow_fail ++ allow_defer ++ data = ${lookup{$local_part}lsearch{/etc/aliases}} ++# user = exim ++ file_transport = address_file ++ pipe_transport = address_pipe ++ ++Control reaches this and subsequent routers only for addresses in the local ++domains. This router checks to see whether the local part is defined as an ++alias in the /etc/aliases file, and if so, redirects it according to the data ++that it looks up from that file. If no data is found for the local part, the ++value of the data option is empty, causing the address to be passed to the next ++router. ++ ++/etc/aliases is a conventional name for the system aliases file that is often ++used. That is why it is referenced by from the default configuration file. ++However, you can change this by setting SYSTEM_ALIASES_FILE in Local/Makefile ++before building Exim. ++ ++userforward: ++ driver = redirect ++ check_local_user ++# local_part_suffix = +* : -* ++# local_part_suffix_optional ++ file = $home/.forward ++# allow_filter ++ no_verify ++ no_expn ++ check_ancestor ++ file_transport = address_file ++ pipe_transport = address_pipe ++ reply_transport = address_reply ++ ++This is the most complicated router in the default configuration. It is another ++redirection router, but this time it is looking for forwarding data set up by ++individual users. The check_local_user setting specifies a check that the local ++part of the address is the login name of a local user. If it is not, the router ++is skipped. The two commented options that follow check_local_user, namely: ++ ++# local_part_suffix = +* : -* ++# local_part_suffix_optional ++ ++show how you can specify the recognition of local part suffixes. If the first ++is uncommented, a suffix beginning with either a plus or a minus sign, followed ++by any sequence of characters, is removed from the local part and placed in the ++variable $local_part_suffix. The second suffix option specifies that the ++presence of a suffix in the local part is optional. When a suffix is present, ++the check for a local login uses the local part with the suffix removed. ++ ++When a local user account is found, the file called .forward in the user's home ++directory is consulted. If it does not exist, or is empty, the router declines. ++Otherwise, the contents of .forward are interpreted as redirection data (see ++chapter 22 for more details). ++ ++Traditional .forward files contain just a list of addresses, pipes, or files. ++Exim supports this by default. However, if allow_filter is set (it is commented ++out by default), the contents of the file are interpreted as a set of Exim or ++Sieve filtering instructions, provided the file begins with "#Exim filter" or " ++#Sieve filter", respectively. User filtering is discussed in the separate ++document entitled Exim's interfaces to mail filtering. ++ ++The no_verify and no_expn options mean that this router is skipped when ++verifying addresses, or when running as a consequence of an SMTP EXPN command. ++There are two reasons for doing this: ++ ++ 1. Whether or not a local user has a .forward file is not really relevant when ++ checking an address for validity; it makes sense not to waste resources ++ doing unnecessary work. ++ ++ 2. More importantly, when Exim is verifying addresses or handling an EXPN ++ command during an SMTP session, it is running as the Exim user, not as ++ root. The group is the Exim group, and no additional groups are set up. It ++ may therefore not be possible for Exim to read users' .forward files at ++ this time. ++ ++The setting of check_ancestor prevents the router from generating a new address ++that is the same as any previous address that was redirected. (This works round ++a problem concerning a bad interaction between aliasing and forwarding - see ++section 22.5). ++ ++The final three option settings specify the transports that are to be used when ++forwarding generates a direct delivery to a file, or to a pipe, or sets up an ++auto-reply, respectively. For example, if a .forward file contains ++ ++a.nother@elsewhere.example, /home/spqr/archive ++ ++the delivery to /home/spqr/archive is done by running the address_file ++transport. ++ ++localuser: ++ driver = accept ++ check_local_user ++# local_part_suffix = +* : -* ++# local_part_suffix_optional ++ transport = local_delivery ++ ++The final router sets up delivery into local mailboxes, provided that the local ++part is the name of a local login, by accepting the address and assigning it to ++the local_delivery transport. Otherwise, we have reached the end of the ++routers, so the address is bounced. The commented suffix settings fulfil the ++same purpose as they do for the userforward router. ++ ++ ++7.4 Transport configuration ++--------------------------- ++ ++Transports define mechanisms for actually delivering messages. They operate ++only when referenced from routers, so the order in which they are defined does ++not matter. The transports section of the configuration starts with ++ ++begin transports ++ ++One remote transport and four local transports are defined. ++ ++remote_smtp: ++ driver = smtp ++ ++This transport is used for delivering messages over SMTP connections. All its ++options are defaulted. The list of remote hosts comes from the router. ++ ++local_delivery: ++ driver = appendfile ++ file = /var/mail/$local_part ++ delivery_date_add ++ envelope_to_add ++ return_path_add ++# group = mail ++# mode = 0660 ++ ++This appendfile transport is used for local delivery to user mailboxes in ++traditional BSD mailbox format. By default it runs under the uid and gid of the ++local user, which requires the sticky bit to be set on the /var/mail directory. ++Some systems use the alternative approach of running mail deliveries under a ++particular group instead of using the sticky bit. The commented options show ++how this can be done. ++ ++Exim adds three headers to the message as it delivers it: Delivery-date:, ++Envelope-to: and Return-path:. This action is requested by the three ++similarly-named options above. ++ ++address_pipe: ++ driver = pipe ++ return_output ++ ++This transport is used for handling deliveries to pipes that are generated by ++redirection (aliasing or users' .forward files). The return_output option ++specifies that any output generated by the pipe is to be returned to the ++sender. ++ ++address_file: ++ driver = appendfile ++ delivery_date_add ++ envelope_to_add ++ return_path_add ++ ++This transport is used for handling deliveries to files that are generated by ++redirection. The name of the file is not specified in this instance of ++appendfile, because it comes from the redirect router. ++ ++address_reply: ++ driver = autoreply ++ ++This transport is used for handling automatic replies generated by users' ++filter files. ++ ++ ++7.5 Default retry rule ++---------------------- ++ ++The retry section of the configuration file contains rules which affect the way ++Exim retries deliveries that cannot be completed at the first attempt. It is ++introduced by the line ++ ++begin retry ++ ++In the default configuration, there is just one rule, which applies to all ++errors: ++ ++* * F,2h,15m; G,16h,1h,1.5; F,4d,6h ++ ++This causes any temporarily failing address to be retried every 15 minutes for ++2 hours, then at intervals starting at one hour and increasing by a factor of ++1.5 until 16 hours have passed, then every 6 hours up to 4 days. If an address ++is not delivered after 4 days of temporary failure, it is bounced. ++ ++If the retry section is removed from the configuration, or is empty (that is, ++if no retry rules are defined), Exim will not retry deliveries. This turns ++temporary errors into permanent errors. ++ ++ ++7.6 Rewriting configuration ++--------------------------- ++ ++The rewriting section of the configuration, introduced by ++ ++begin rewrite ++ ++contains rules for rewriting addresses in messages as they arrive. There are no ++rewriting rules in the default configuration file. ++ ++ ++7.7 Authenticators configuration ++-------------------------------- ++ ++The authenticators section of the configuration, introduced by ++ ++begin authenticators ++ ++defines mechanisms for the use of the SMTP AUTH command. The default ++configuration file contains two commented-out example authenticators which ++support plaintext username/password authentication using the standard PLAIN ++mechanism and the traditional but non-standard LOGIN mechanism, with Exim ++acting as the server. PLAIN and LOGIN are enough to support most MUA software. ++ ++The example PLAIN authenticator looks like this: ++ ++#PLAIN: ++# driver = plaintext ++# server_set_id = $auth2 ++# server_prompts = : ++# server_condition = Authentication is not yet configured ++# server_advertise_condition = ${if def:tls_in_cipher } ++ ++And the example LOGIN authenticator looks like this: ++ ++#LOGIN: ++# driver = plaintext ++# server_set_id = $auth1 ++# server_prompts = <| Username: | Password: ++# server_condition = Authentication is not yet configured ++# server_advertise_condition = ${if def:tls_in_cipher } ++ ++The server_set_id option makes Exim remember the authenticated username in ++$authenticated_id, which can be used later in ACLs or routers. The ++server_prompts option configures the plaintext authenticator so that it ++implements the details of the specific authentication mechanism, i.e. PLAIN or ++LOGIN. The server_advertise_condition setting controls when Exim offers ++authentication to clients; in the examples, this is only when TLS or SSL has ++been started, so to enable the authenticators you also need to add support for ++TLS as described in section 7.1. ++ ++The server_condition setting defines how to verify that the username and ++password are correct. In the examples it just produces an error message. To ++make the authenticators work, you can use a string expansion expression like ++one of the examples in chapter 34. ++ ++Beware that the sequence of the parameters to PLAIN and LOGIN differ; the ++usercode and password are in different positions. Chapter 34 covers both. ++ ++ ++ ++=============================================================================== ++8. REGULAR EXPRESSIONS ++ ++Exim supports the use of regular expressions in many of its options. It uses ++the PCRE regular expression library; this provides regular expression matching ++that is compatible with Perl 5. The syntax and semantics of regular expressions ++is discussed in many Perl reference books, and also in Jeffrey Friedl's ++Mastering Regular Expressions, which is published by O'Reilly (see http:// ++www.oreilly.com/catalog/regex2/). ++ ++The documentation for the syntax and semantics of the regular expressions that ++are supported by PCRE is included in the PCRE distribution, and no further ++description is included here. The PCRE functions are called from Exim using the ++default option settings (that is, with no PCRE options set), except that the ++PCRE_CASELESS option is set when the matching is required to be ++case-insensitive. ++ ++In most cases, when a regular expression is required in an Exim configuration, ++it has to start with a circumflex, in order to distinguish it from plain text ++or an "ends with" wildcard. In this example of a configuration setting, the ++second item in the colon-separated list is a regular expression. ++ ++domains = a.b.c : ^\\d{3} : *.y.z : ... ++ ++The doubling of the backslash is required because of string expansion that ++precedes interpretation - see section 11.1 for more discussion of this issue, ++and a way of avoiding the need for doubling backslashes. The regular expression ++that is eventually used in this example contains just one backslash. The ++circumflex is included in the regular expression, and has the normal effect of ++"anchoring" it to the start of the string that is being matched. ++ ++There are, however, two cases where a circumflex is not required for the ++recognition of a regular expression: these are the match condition in a string ++expansion, and the matches condition in an Exim filter file. In these cases, ++the relevant string is always treated as a regular expression; if it does not ++start with a circumflex, the expression is not anchored, and can match anywhere ++in the subject string. ++ ++In all cases, if you want a regular expression to match at the end of a string, ++you must code the $ metacharacter to indicate this. For example: ++ ++domains = ^\\d{3}\\.example ++ ++matches the domain 123.example, but it also matches 123.example.com. You need ++to use: ++ ++domains = ^\\d{3}\\.example\$ ++ ++if you want example to be the top-level domain. The backslash before the $ is ++needed because string expansion also interprets dollar characters. ++ ++ ++ ++=============================================================================== ++9. FILE AND DATABASE LOOKUPS ++ ++Exim can be configured to look up data in files or databases as it processes ++messages. Two different kinds of syntax are used: ++ ++ 1. A string that is to be expanded may contain explicit lookup requests. These ++ cause parts of the string to be replaced by data that is obtained from the ++ lookup. Lookups of this type are conditional expansion items. Different ++ results can be defined for the cases of lookup success and failure. See ++ chapter 11, where string expansions are described in detail. ++ ++ 2. Lists of domains, hosts, and email addresses can contain lookup requests as ++ a way of avoiding excessively long linear lists. In this case, the data ++ that is returned by the lookup is often (but not always) discarded; whether ++ the lookup succeeds or fails is what really counts. These kinds of list are ++ described in chapter 10. ++ ++String expansions, lists, and lookups interact with each other in such a way ++that there is no order in which to describe any one of them that does not ++involve references to the others. Each of these three chapters makes more sense ++if you have read the other two first. If you are reading this for the first ++time, be aware that some of it will make a lot more sense after you have read ++chapters 10 and 11. ++ ++ ++9.1 Examples of different lookup syntax ++--------------------------------------- ++ ++It is easy to confuse the two different kinds of lookup, especially as the ++lists that may contain the second kind are always expanded before being ++processed as lists. Therefore, they may also contain lookups of the first kind. ++Be careful to distinguish between the following two examples: ++ ++domains = ${lookup{$sender_host_address}lsearch{/some/file}} ++domains = lsearch;/some/file ++ ++The first uses a string expansion, the result of which must be a domain list. ++No strings have been specified for a successful or a failing lookup; the ++defaults in this case are the looked-up data and an empty string, respectively. ++The expansion takes place before the string is processed as a list, and the ++file that is searched could contain lines like this: ++ ++192.168.3.4: domain1:domain2:... ++192.168.1.9: domain3:domain4:... ++ ++When the lookup succeeds, the result of the expansion is a list of domains (and ++possibly other types of item that are allowed in domain lists). ++ ++In the second example, the lookup is a single item in a domain list. It causes ++Exim to use a lookup to see if the domain that is being processed can be found ++in the file. The file could contains lines like this: ++ ++domain1: ++domain2: ++ ++Any data that follows the keys is not relevant when checking that the domain ++matches the list item. ++ ++It is possible, though no doubt confusing, to use both kinds of lookup at once. ++Consider a file containing lines like this: ++ ++192.168.5.6: lsearch;/another/file ++ ++If the value of $sender_host_address is 192.168.5.6, expansion of the first ++domains setting above generates the second setting, which therefore causes a ++second lookup to occur. ++ ++The rest of this chapter describes the different lookup types that are ++available. Any of them can be used in any part of the configuration where a ++lookup is permitted. ++ ++ ++9.2 Lookup types ++---------------- ++ ++Two different types of data lookup are implemented: ++ ++ * The single-key type requires the specification of a file in which to look, ++ and a single key to search for. The key must be a non-empty string for the ++ lookup to succeed. The lookup type determines how the file is searched. ++ ++ * The query-style type accepts a generalized database query. No particular ++ key value is assumed by Exim for query-style lookups. You can use whichever ++ Exim variables you need to construct the database query. ++ ++The code for each lookup type is in a separate source file that is included in ++the binary of Exim only if the corresponding compile-time option is set. The ++default settings in src/EDITME are: ++ ++LOOKUP_DBM=yes ++LOOKUP_LSEARCH=yes ++ ++which means that only linear searching and DBM lookups are included by default. ++For some types of lookup (e.g. SQL databases), you need to install appropriate ++libraries and header files before building Exim. ++ ++ ++9.3 Single-key lookup types ++--------------------------- ++ ++The following single-key lookup types are implemented: ++ ++ * cdb: The given file is searched as a Constant DataBase file, using the key ++ string without a terminating binary zero. The cdb format is designed for ++ indexed files that are read frequently and never updated, except by total ++ re-creation. As such, it is particularly suitable for large files ++ containing aliases or other indexed data referenced by an MTA. Information ++ about cdb can be found in several places: ++ ++ http://www.pobox.com/~djb/cdb.html ++ ftp://ftp.corpit.ru/pub/tinycdb/ ++ http://packages.debian.org/stable/utils/freecdb.html ++ ++ A cdb distribution is not needed in order to build Exim with cdb support, ++ because the code for reading cdb files is included directly in Exim itself. ++ However, no means of building or testing cdb files is provided with Exim, ++ so you need to obtain a cdb distribution in order to do this. ++ ++ * dbm: Calls to DBM library functions are used to extract data from the given ++ DBM file by looking up the record with the given key. A terminating binary ++ zero is included in the key that is passed to the DBM library. See section ++ 4.4 for a discussion of DBM libraries. ++ ++ For all versions of Berkeley DB, Exim uses the DB_HASH style of database ++ when building DBM files using the exim_dbmbuild utility. However, when ++ using Berkeley DB versions 3 or 4, it opens existing databases for reading ++ with the DB_UNKNOWN option. This enables it to handle any of the types of ++ database that the library supports, and can be useful for accessing DBM ++ files created by other applications. (For earlier DB versions, DB_HASH is ++ always used.) ++ ++ * dbmjz: This is the same as dbm, except that the lookup key is interpreted ++ as an Exim list; the elements of the list are joined together with ASCII ++ NUL characters to form the lookup key. An example usage would be to ++ authenticate incoming SMTP calls using the passwords from Cyrus SASL's /etc ++ /sasldb2 file with the gsasl authenticator or Exim's own cram_md5 ++ authenticator. ++ ++ * dbmnz: This is the same as dbm, except that a terminating binary zero is ++ not included in the key that is passed to the DBM library. You may need ++ this if you want to look up data in files that are created by or shared ++ with some other application that does not use terminating zeros. For ++ example, you need to use dbmnz rather than dbm if you want to authenticate ++ incoming SMTP calls using the passwords from Courier's /etc/ ++ userdbshadow.dat file. Exim's utility program for creating DBM files ( ++ exim_dbmbuild) includes the zeros by default, but has an option to omit ++ them (see section 52.9). ++ ++ * dsearch: The given file must be a directory; this is searched for an entry ++ whose name is the key by calling the lstat() function. The key may not ++ contain any forward slash characters. If lstat() succeeds, the result of ++ the lookup is the name of the entry, which may be a file, directory, ++ symbolic link, or any other kind of directory entry. An example of how this ++ lookup can be used to support virtual domains is given in section 49.7. ++ ++ * iplsearch: The given file is a text file containing keys and data. A key is ++ terminated by a colon or white space or the end of the line. The keys in ++ the file must be IP addresses, or IP addresses with CIDR masks. Keys that ++ involve IPv6 addresses must be enclosed in quotes to prevent the first ++ internal colon being interpreted as a key terminator. For example: ++ ++ 1.2.3.4: data for 1.2.3.4 ++ 192.168.0.0/16: data for 192.168.0.0/16 ++ "abcd::cdab": data for abcd::cdab ++ "abcd:abcd::/32" data for abcd:abcd::/32 ++ ++ The key for an iplsearch lookup must be an IP address (without a mask). The ++ file is searched linearly, using the CIDR masks where present, until a ++ matching key is found. The first key that matches is used; there is no ++ attempt to find a "best" match. Apart from the way the keys are matched, ++ the processing for iplsearch is the same as for lsearch. ++ ++ Warning 1: Unlike most other single-key lookup types, a file of data for ++ iplsearch can not be turned into a DBM or cdb file, because those lookup ++ types support only literal keys. ++ ++ Warning 2: In a host list, you must always use net-iplsearch so that the ++ implicit key is the host's IP address rather than its name (see section ++ 10.12). ++ ++ * lsearch: The given file is a text file that is searched linearly for a line ++ beginning with the search key, terminated by a colon or white space or the ++ end of the line. The search is case-insensitive; that is, upper and lower ++ case letters are treated as the same. The first occurrence of the key that ++ is found in the file is used. ++ ++ White space between the key and the colon is permitted. The remainder of ++ the line, with leading and trailing white space removed, is the data. This ++ can be continued onto subsequent lines by starting them with any amount of ++ white space, but only a single space character is included in the data at ++ such a junction. If the data begins with a colon, the key must be ++ terminated by a colon, for example: ++ ++ baduser: :fail: ++ ++ Empty lines and lines beginning with # are ignored, even if they occur in ++ the middle of an item. This is the traditional textual format of alias ++ files. Note that the keys in an lsearch file are literal strings. There is ++ no wildcarding of any kind. ++ ++ In most lsearch files, keys are not required to contain colons or # ++ characters, or white space. However, if you need this feature, it is ++ available. If a key begins with a doublequote character, it is terminated ++ only by a matching quote (or end of line), and the normal escaping rules ++ apply to its contents (see section 6.16). An optional colon is permitted ++ after quoted keys (exactly as for unquoted keys). There is no special ++ handling of quotes for the data part of an lsearch line. ++ ++ * nis: The given file is the name of a NIS map, and a NIS lookup is done with ++ the given key, without a terminating binary zero. There is a variant called ++ nis0 which does include the terminating binary zero in the key. This is ++ reportedly needed for Sun-style alias files. Exim does not recognize NIS ++ aliases; the full map names must be used. ++ ++ * wildlsearch or nwildlsearch: These search a file linearly, like lsearch, ++ but instead of being interpreted as a literal string, each key in the file ++ may be wildcarded. The difference between these two lookup types is that ++ for wildlsearch, each key in the file is string-expanded before being used, ++ whereas for nwildlsearch, no expansion takes place. ++ ++ Like lsearch, the testing is done case-insensitively. However, keys in the ++ file that are regular expressions can be made case-sensitive by the use of ++ "(-i)" within the pattern. The following forms of wildcard are recognized: ++ ++ 1. The string may begin with an asterisk to mean "ends with". For example: ++ ++ *.a.b.c data for anything.a.b.c ++ *fish data for anythingfish ++ ++ 2. The string may begin with a circumflex to indicate a regular ++ expression. For example, for wildlsearch: ++ ++ ^\N\d+\.a\.b\N data for <digits>.a.b ++ ++ Note the use of "\N" to disable expansion of the contents of the ++ regular expression. If you are using nwildlsearch, where the keys are ++ not string-expanded, the equivalent entry is: ++ ++ ^\d+\.a\.b data for <digits>.a.b ++ ++ The case-insensitive flag is set at the start of compiling the regular ++ expression, but it can be turned off by using "(-i)" at an appropriate ++ point. For example, to make the entire pattern case-sensitive: ++ ++ ^(?-i)\d+\.a\.b data for <digits>.a.b ++ ++ If the regular expression contains white space or colon characters, you ++ must either quote it (see lsearch above), or represent these characters ++ in other ways. For example, "\s" can be used for white space and "\x3A" ++ for a colon. This may be easier than quoting, because if you quote, you ++ have to escape all the backslashes inside the quotes. ++ ++ Note: It is not possible to capture substrings in a regular expression ++ match for later use, because the results of all lookups are cached. If ++ a lookup is repeated, the result is taken from the cache, and no actual ++ pattern matching takes place. The values of all the numeric variables ++ are unset after a (n)wildlsearch match. ++ ++ 3. Although I cannot see it being of much use, the general matching ++ function that is used to implement (n)wildlsearch means that the string ++ may begin with a lookup name terminated by a semicolon, and followed by ++ lookup data. For example: ++ ++ cdb;/some/file data for keys that match the file ++ ++ The data that is obtained from the nested lookup is discarded. ++ ++ Keys that do not match any of these patterns are interpreted literally. The ++ continuation rules for the data are the same as for lsearch, and keys may ++ be followed by optional colons. ++ ++ Warning: Unlike most other single-key lookup types, a file of data for (n) ++ wildlsearch can not be turned into a DBM or cdb file, because those lookup ++ types support only literal keys. ++ ++ ++9.4 Query-style lookup types ++---------------------------- ++ ++The supported query-style lookup types are listed below. Further details about ++many of them are given in later sections. ++ ++ * dnsdb: This does a DNS search for one or more records whose domain names ++ are given in the supplied query. The resulting data is the contents of the ++ records. See section 9.10. ++ ++ * ibase: This does a lookup in an InterBase database. ++ ++ * ldap: This does an LDAP lookup using a query in the form of a URL, and ++ returns attributes from a single entry. There is a variant called ldapm ++ that permits values from multiple entries to be returned. A third variant ++ called ldapdn returns the Distinguished Name of a single entry instead of ++ any attribute values. See section 9.13. ++ ++ * mysql: The format of the query is an SQL statement that is passed to a ++ MySQL database. See section 9.20. ++ ++ * nisplus: This does a NIS+ lookup using a query that can specify the name of ++ the field to be returned. See section 9.19. ++ ++ * oracle: The format of the query is an SQL statement that is passed to an ++ Oracle database. See section 9.20. ++ ++ * passwd is a query-style lookup with queries that are just user names. The ++ lookup calls getpwnam() to interrogate the system password data, and on ++ success, the result string is the same as you would get from an lsearch ++ lookup on a traditional /etc/passwd file, though with "*" for the password ++ value. For example: ++ ++ *:42:42:King Rat:/home/kr:/bin/bash ++ ++ * pgsql: The format of the query is an SQL statement that is passed to a ++ PostgreSQL database. See section 9.20. ++ ++ * sqlite: The format of the query is a file name followed by an SQL statement ++ that is passed to an SQLite database. See section 9.25. ++ ++ * testdb: This is a lookup type that is used for testing Exim. It is not ++ likely to be useful in normal operation. ++ ++ * whoson: Whoson (http://whoson.sourceforge.net) is a protocol that allows a ++ server to check whether a particular (dynamically allocated) IP address is ++ currently allocated to a known (trusted) user and, optionally, to obtain ++ the identity of the said user. For SMTP servers, Whoson was popular at one ++ time for "POP before SMTP" authentication, but that approach has been ++ superseded by SMTP authentication. In Exim, Whoson can be used to implement ++ "POP before SMTP" checking using ACL statements such as ++ ++ require condition = \ ++ ${lookup whoson {$sender_host_address}{yes}{no}} ++ ++ The query consists of a single IP address. The value returned is the name ++ of the authenticated user, which is stored in the variable $value. However, ++ in this example, the data in $value is not used; the result of the lookup ++ is one of the fixed strings "yes" or "no". ++ ++ ++9.5 Temporary errors in lookups ++------------------------------- ++ ++Lookup functions can return temporary error codes if the lookup cannot be ++completed. For example, an SQL or LDAP database might be unavailable. For this ++reason, it is not advisable to use a lookup that might do this for critical ++options such as a list of local domains. ++ ++When a lookup cannot be completed in a router or transport, delivery of the ++message (to the relevant address) is deferred, as for any other temporary ++error. In other circumstances Exim may assume the lookup has failed, or may ++give up altogether. ++ ++ ++9.6 Default values in single-key lookups ++---------------------------------------- ++ ++In this context, a "default value" is a value specified by the administrator ++that is to be used if a lookup fails. ++ ++Note: This section applies only to single-key lookups. For query-style lookups, ++the facilities of the query language must be used. An attempt to specify a ++default for a query-style lookup provokes an error. ++ ++If "*" is added to a single-key lookup type (for example, lsearch*) and the ++initial lookup fails, the key "*" is looked up in the file to provide a default ++value. See also the section on partial matching below. ++ ++Alternatively, if "*@" is added to a single-key lookup type (for example dbm*@) ++then, if the initial lookup fails and the key contains an @ character, a second ++lookup is done with everything before the last @ replaced by *. This makes it ++possible to provide per-domain defaults in alias files that include the domains ++in the keys. If the second lookup fails (or doesn't take place because there is ++no @ in the key), "*" is looked up. For example, a redirect router might ++contain: ++ ++data = ${lookup{$local_part@$domain}lsearch*@{/etc/mix-aliases}} ++ ++Suppose the address that is being processed is jane@eyre.example. Exim looks up ++these keys, in this order: ++ ++jane@eyre.example ++*@eyre.example ++* ++ ++The data is taken from whichever key it finds first. Note: In an lsearch file, ++this does not mean the first of these keys in the file. A complete scan is done ++for each key, and only if it is not found at all does Exim move on to try the ++next key. ++ ++ ++9.7 Partial matching in single-key lookups ++------------------------------------------ ++ ++The normal operation of a single-key lookup is to search the file for an exact ++match with the given key. However, in a number of situations where domains are ++being looked up, it is useful to be able to do partial matching. In this case, ++information in the file that has a key starting with "*." is matched by any ++domain that ends with the components that follow the full stop. For example, if ++a key in a DBM file is ++ ++*.dates.fict.example ++ ++then when partial matching is enabled this is matched by (amongst others) ++2001.dates.fict.example and 1984.dates.fict.example. It is also matched by ++dates.fict.example, if that does not appear as a separate key in the file. ++ ++Note: Partial matching is not available for query-style lookups. It is also not ++available for any lookup items in address lists (see section 10.19). ++ ++Partial matching is implemented by doing a series of separate lookups using ++keys constructed by modifying the original subject key. This means that it can ++be used with any of the single-key lookup types, provided that partial matching ++keys beginning with a special prefix (default "*.") are included in the data ++file. Keys in the file that do not begin with the prefix are matched only by ++unmodified subject keys when partial matching is in use. ++ ++Partial matching is requested by adding the string "partial-" to the front of ++the name of a single-key lookup type, for example, partial-dbm. When this is ++done, the subject key is first looked up unmodified; if that fails, "*." is ++added at the start of the subject key, and it is looked up again. If that ++fails, further lookups are tried with dot-separated components removed from the ++start of the subject key, one-by-one, and "*." added on the front of what ++remains. ++ ++A minimum number of two non-* components are required. This can be adjusted by ++including a number before the hyphen in the search type. For example, ++partial3-lsearch specifies a minimum of three non-* components in the modified ++keys. Omitting the number is equivalent to "partial2-". If the subject key is ++2250.dates.fict.example then the following keys are looked up when the minimum ++number of non-* components is two: ++ ++2250.dates.fict.example ++*.2250.dates.fict.example ++*.dates.fict.example ++*.fict.example ++ ++As soon as one key in the sequence is successfully looked up, the lookup ++finishes. ++ ++The use of "*." as the partial matching prefix is a default that can be ++changed. The motivation for this feature is to allow Exim to operate with file ++formats that are used by other MTAs. A different prefix can be supplied in ++parentheses instead of the hyphen after "partial". For example: ++ ++domains = partial(.)lsearch;/some/file ++ ++In this example, if the domain is a.b.c, the sequence of lookups is "a.b.c", ++".a.b.c", and ".b.c" (the default minimum of 2 non-wild components is ++unchanged). The prefix may consist of any punctuation characters other than a ++closing parenthesis. It may be empty, for example: ++ ++domains = partial1()cdb;/some/file ++ ++For this example, if the domain is a.b.c, the sequence of lookups is "a.b.c", ++"b.c", and "c". ++ ++If "partial0" is specified, what happens at the end (when the lookup with just ++one non-wild component has failed, and the original key is shortened right down ++to the null string) depends on the prefix: ++ ++ * If the prefix has zero length, the whole lookup fails. ++ ++ * If the prefix has length 1, a lookup for just the prefix is done. For ++ example, the final lookup for "partial0(.)" is for "." alone. ++ ++ * Otherwise, if the prefix ends in a dot, the dot is removed, and the ++ remainder is looked up. With the default prefix, therefore, the final ++ lookup is for "*" on its own. ++ ++ * Otherwise, the whole prefix is looked up. ++ ++If the search type ends in "*" or "*@" (see section 9.6 above), the search for ++an ultimate default that this implies happens after all partial lookups have ++failed. If "partial0" is specified, adding "*" to the search type has no effect ++with the default prefix, because the "*" key is already included in the ++sequence of partial lookups. However, there might be a use for lookup types ++such as "partial0(.)lsearch*". ++ ++The use of "*" in lookup partial matching differs from its use as a wildcard in ++domain lists and the like. Partial matching works only in terms of ++dot-separated components; a key such as "*fict.example" in a database file is ++useless, because the asterisk in a partial matching subject key is always ++followed by a dot. ++ ++ ++9.8 Lookup caching ++------------------ ++ ++Exim caches all lookup results in order to avoid needless repetition of ++lookups. However, because (apart from the daemon) Exim operates as a collection ++of independent, short-lived processes, this caching applies only within a ++single Exim process. There is no inter-process lookup caching facility. ++ ++For single-key lookups, Exim keeps the relevant files open in case there is ++another lookup that needs them. In some types of configuration this can lead to ++many files being kept open for messages with many recipients. To avoid hitting ++the operating system limit on the number of simultaneously open files, Exim ++closes the least recently used file when it needs to open more files than its ++own internal limit, which can be changed via the lookup_open_max option. ++ ++The single-key lookup files are closed and the lookup caches are flushed at ++strategic points during delivery - for example, after all routing is complete. ++ ++ ++9.9 Quoting lookup data ++----------------------- ++ ++When data from an incoming message is included in a query-style lookup, there ++is the possibility of special characters in the data messing up the syntax of ++the query. For example, a NIS+ query that contains ++ ++[name=$local_part] ++ ++will be broken if the local part happens to contain a closing square bracket. ++For NIS+, data can be enclosed in double quotes like this: ++ ++[name="$local_part"] ++ ++but this still leaves the problem of a double quote in the data. The rule for ++NIS+ is that double quotes must be doubled. Other lookup types have different ++rules, and to cope with the differing requirements, an expansion operator of ++the following form is provided: ++ ++${quote_<lookup-type>:<string>} ++ ++For example, the safest way to write the NIS+ query is ++ ++[name="${quote_nisplus:$local_part}"] ++ ++See chapter 11 for full coverage of string expansions. The quote operator can ++be used for all lookup types, but has no effect for single-key lookups, since ++no quoting is ever needed in their key strings. ++ ++ ++9.10 More about dnsdb ++--------------------- ++ ++The dnsdb lookup type uses the DNS as its database. A simple query consists of ++a record type and a domain name, separated by an equals sign. For example, an ++expansion string could contain: ++ ++${lookup dnsdb{mx=a.b.example}{$value}fail} ++ ++If the lookup succeeds, the result is placed in $value, which in this case is ++used on its own as the result. If the lookup does not succeed, the "fail" ++keyword causes a forced expansion failure - see section 11.4 for an explanation ++of what this means. ++ ++The supported DNS record types are A, CNAME, MX, NS, PTR, SPF, SRV, and TXT, ++and, when Exim is compiled with IPv6 support, AAAA (and A6 if that is also ++configured). If no type is given, TXT is assumed. When the type is PTR, the ++data can be an IP address, written as normal; inversion and the addition of ++in-addr.arpa or ip6.arpa happens automatically. For example: ++ ++${lookup dnsdb{ptr=192.168.4.5}{$value}fail} ++ ++If the data for a PTR record is not a syntactically valid IP address, it is not ++altered and nothing is added. ++ ++For an MX lookup, both the preference value and the host name are returned for ++each record, separated by a space. For an SRV lookup, the priority, weight, ++port, and host name are returned for each record, separated by spaces. ++ ++For any record type, if multiple records are found (or, for A6 lookups, if a ++single record leads to multiple addresses), the data is returned as a ++concatenation, with newline as the default separator. The order, of course, ++depends on the DNS resolver. You can specify a different separator character ++between multiple records by putting a right angle-bracket followed immediately ++by the new separator at the start of the query. For example: ++ ++${lookup dnsdb{>: a=host1.example}} ++ ++It is permitted to specify a space as the separator character. Further white ++space is ignored. ++ ++For TXT records with multiple items of data, only the first item is returned, ++unless a separator for them is specified using a comma after the separator ++character followed immediately by the TXT record item separator. To concatenate ++items without a separator, use a semicolon instead. For SPF records the default ++behaviour is to concatenate multiple items without using a separator. ++ ++${lookup dnsdb{>\n,: txt=a.b.example}} ++${lookup dnsdb{>\n; txt=a.b.example}} ++${lookup dnsdb{spf=example.org}} ++ ++It is permitted to specify a space as the separator character. Further white ++space is ignored. ++ ++ ++9.11 Pseudo dnsdb record types ++------------------------------ ++ ++By default, both the preference value and the host name are returned for each ++MX record, separated by a space. If you want only host names, you can use the ++pseudo-type MXH: ++ ++${lookup dnsdb{mxh=a.b.example}} ++ ++In this case, the preference values are omitted, and just the host names are ++returned. ++ ++Another pseudo-type is ZNS (for "zone NS"). It performs a lookup for NS records ++on the given domain, but if none are found, it removes the first component of ++the domain name, and tries again. This process continues until NS records are ++found or there are no more components left (or there is a DNS error). In other ++words, it may return the name servers for a top-level domain, but it never ++returns the root name servers. If there are no NS records for the top-level ++domain, the lookup fails. Consider these examples: ++ ++${lookup dnsdb{zns=xxx.quercite.com}} ++${lookup dnsdb{zns=xxx.edu}} ++ ++Assuming that in each case there are no NS records for the full domain name, ++the first returns the name servers for quercite.com, and the second returns the ++name servers for edu. ++ ++You should be careful about how you use this lookup because, unless the ++top-level domain does not exist, the lookup always returns some host names. The ++sort of use to which this might be put is for seeing if the name servers for a ++given domain are on a blacklist. You can probably assume that the name servers ++for the high-level domains such as com or co.uk are not going to be on such a ++list. ++ ++A third pseudo-type is CSA (Client SMTP Authorization). This looks up SRV ++records according to the CSA rules, which are described in section 42.49. ++Although dnsdb supports SRV lookups directly, this is not sufficient because of ++the extra parent domain search behaviour of CSA. The result of a successful ++lookup such as: ++ ++${lookup dnsdb {csa=$sender_helo_name}} ++ ++has two space-separated fields: an authorization code and a target host name. ++The authorization code can be "Y" for yes, "N" for no, "X" for explicit ++authorization required but absent, or "?" for unknown. ++ ++The pseudo-type A+ performs an A6 lookup (if configured) followed by an AAAA ++and then an A lookup. All results are returned; defer processing (see below) is ++handled separately for each lookup. Example: ++ ++${lookup dnsdb {>; a+=$sender_helo_name}} ++ ++ ++9.12 Multiple dnsdb lookups ++--------------------------- ++ ++In the previous sections, dnsdb lookups for a single domain are described. ++However, you can specify a list of domains or IP addresses in a single dnsdb ++lookup. The list is specified in the normal Exim way, with colon as the default ++separator, but with the ability to change this. For example: ++ ++${lookup dnsdb{one.domain.com:two.domain.com}} ++${lookup dnsdb{a=one.host.com:two.host.com}} ++${lookup dnsdb{ptr = <; 1.2.3.4 ; 4.5.6.8}} ++ ++In order to retain backwards compatibility, there is one special case: if the ++lookup type is PTR and no change of separator is specified, Exim looks to see ++if the rest of the string is precisely one IPv6 address. In this case, it does ++not treat it as a list. ++ ++The data from each lookup is concatenated, with newline separators by default, ++in the same way that multiple DNS records for a single item are handled. A ++different separator can be specified, as described above. ++ ++The dnsdb lookup fails only if all the DNS lookups fail. If there is a ++temporary DNS error for any of them, the behaviour is controlled by an optional ++keyword followed by a comma that may appear before the record type. The ++possible keywords are "defer_strict", "defer_never", and "defer_lax". With ++"strict" behaviour, any temporary DNS error causes the whole lookup to defer. ++With "never" behaviour, a temporary DNS error is ignored, and the behaviour is ++as if the DNS lookup failed to find anything. With "lax" behaviour, all the ++queries are attempted, but a temporary DNS error causes the whole lookup to ++defer only if none of the other lookups succeed. The default is "lax", so the ++following lookups are equivalent: ++ ++${lookup dnsdb{defer_lax,a=one.host.com:two.host.com}} ++${lookup dnsdb{a=one.host.com:two.host.com}} ++ ++Thus, in the default case, as long as at least one of the DNS lookups yields ++some data, the lookup succeeds. ++ ++ ++9.13 More about LDAP ++-------------------- ++ ++The original LDAP implementation came from the University of Michigan; this has ++become "Open LDAP", and there are now two different releases. Another ++implementation comes from Netscape, and Solaris 7 and subsequent releases ++contain inbuilt LDAP support. Unfortunately, though these are all compatible at ++the lookup function level, their error handling is different. For this reason ++it is necessary to set a compile-time variable when building Exim with LDAP, to ++indicate which LDAP library is in use. One of the following should appear in ++your Local/Makefile: ++ ++LDAP_LIB_TYPE=UMICHIGAN ++LDAP_LIB_TYPE=OPENLDAP1 ++LDAP_LIB_TYPE=OPENLDAP2 ++LDAP_LIB_TYPE=NETSCAPE ++LDAP_LIB_TYPE=SOLARIS ++ ++If LDAP_LIB_TYPE is not set, Exim assumes "OPENLDAP1", which has the same ++interface as the University of Michigan version. ++ ++There are three LDAP lookup types in Exim. These behave slightly differently in ++the way they handle the results of a query: ++ ++ * ldap requires the result to contain just one entry; if there are more, it ++ gives an error. ++ ++ * ldapdn also requires the result to contain just one entry, but it is the ++ Distinguished Name that is returned rather than any attribute values. ++ ++ * ldapm permits the result to contain more than one entry; the attributes ++ from all of them are returned. ++ ++For ldap and ldapm, if a query finds only entries with no attributes, Exim ++behaves as if the entry did not exist, and the lookup fails. The format of the ++data returned by a successful lookup is described in the next section. First we ++explain how LDAP queries are coded. ++ ++ ++9.14 Format of LDAP queries ++--------------------------- ++ ++An LDAP query takes the form of a URL as defined in RFC 2255. For example, in ++the configuration of a redirect router one might have this setting: ++ ++data = ${lookup ldap \ ++ {ldap:///cn=$local_part,o=University%20of%20Cambridge,\ ++ c=UK?mailbox?base?}} ++ ++The URL may begin with "ldap" or "ldaps" if your LDAP library supports secure ++(encrypted) LDAP connections. The second of these ensures that an encrypted TLS ++connection is used. ++ ++With sufficiently modern LDAP libraries, Exim supports forcing TLS over regular ++LDAP connections, rather than the SSL-on-connect "ldaps". See the ++ldap_start_tls option. ++ ++ ++9.15 LDAP quoting ++----------------- ++ ++Two levels of quoting are required in LDAP queries, the first for LDAP itself ++and the second because the LDAP query is represented as a URL. Furthermore, ++within an LDAP query, two different kinds of quoting are required. For this ++reason, there are two different LDAP-specific quoting operators. ++ ++The quote_ldap operator is designed for use on strings that are part of filter ++specifications. Conceptually, it first does the following conversions on the ++string: ++ ++* => \2A ++( => \28 ++) => \29 ++\ => \5C ++ ++in accordance with RFC 2254. The resulting string is then quoted according to ++the rules for URLs, that is, all non-alphanumeric characters except ++ ++! $ ' - . _ ( ) * + ++ ++are converted to their hex values, preceded by a percent sign. For example: ++ ++${quote_ldap: a(bc)*, a<yz>; } ++ ++yields ++ ++%20a%5C28bc%5C29%5C2A%2C%20a%3Cyz%3E%3B%20 ++ ++Removing the URL quoting, this is (with a leading and a trailing space): ++ ++a\28bc\29\2A, a<yz>; ++ ++The quote_ldap_dn operator is designed for use on strings that are part of base ++DN specifications in queries. Conceptually, it first converts the string by ++inserting a backslash in front of any of the following characters: ++ ++, + " \ < > ; ++ ++It also inserts a backslash before any leading spaces or # characters, and ++before any trailing spaces. (These rules are in RFC 2253.) The resulting string ++is then quoted according to the rules for URLs. For example: ++ ++${quote_ldap_dn: a(bc)*, a<yz>; } ++ ++yields ++ ++%5C%20a(bc)*%5C%2C%20a%5C%3Cyz%5C%3E%5C%3B%5C%20 ++ ++Removing the URL quoting, this is (with a trailing space): ++ ++\ a(bc)*\, a\<yz\>\;\ ++ ++There are some further comments about quoting in the section on LDAP ++authentication below. ++ ++ ++9.16 LDAP connections ++--------------------- ++ ++The connection to an LDAP server may either be over TCP/IP, or, when OpenLDAP ++is in use, via a Unix domain socket. The example given above does not specify ++an LDAP server. A server that is reached by TCP/IP can be specified in a query ++by starting it with ++ ++ldap://<hostname>:<port>/... ++ ++If the port (and preceding colon) are omitted, the standard LDAP port (389) is ++used. When no server is specified in a query, a list of default servers is ++taken from the ldap_default_servers configuration option. This supplies a ++colon-separated list of servers which are tried in turn until one successfully ++handles a query, or there is a serious error. Successful handling either ++returns the requested data, or indicates that it does not exist. Serious errors ++are syntactical, or multiple values when only a single value is expected. ++Errors which cause the next server to be tried are connection failures, bind ++failures, and timeouts. ++ ++For each server name in the list, a port number can be given. The standard way ++of specifying a host and port is to use a colon separator (RFC 1738). Because ++ldap_default_servers is a colon-separated list, such colons have to be doubled. ++For example ++ ++ldap_default_servers = ldap1.example.com::145:ldap2.example.com ++ ++If ldap_default_servers is unset, a URL with no server name is passed to the ++LDAP library with no server name, and the library's default (normally the local ++host) is used. ++ ++If you are using the OpenLDAP library, you can connect to an LDAP server using ++a Unix domain socket instead of a TCP/IP connection. This is specified by using ++"ldapi" instead of "ldap" in LDAP queries. What follows here applies only to ++OpenLDAP. If Exim is compiled with a different LDAP library, this feature is ++not available. ++ ++For this type of connection, instead of a host name for the server, a pathname ++for the socket is required, and the port number is not relevant. The pathname ++can be specified either as an item in ldap_default_servers, or inline in the ++query. In the former case, you can have settings such as ++ ++ldap_default_servers = /tmp/ldap.sock : backup.ldap.your.domain ++ ++When the pathname is given in the query, you have to escape the slashes as ++"%2F" to fit in with the LDAP URL syntax. For example: ++ ++${lookup ldap {ldapi://%2Ftmp%2Fldap.sock/o=... ++ ++When Exim processes an LDAP lookup and finds that the "hostname" is really a ++pathname, it uses the Unix domain socket code, even if the query actually ++specifies "ldap" or "ldaps". In particular, no encryption is used for a socket ++connection. This behaviour means that you can use a setting of ++ldap_default_servers such as in the example above with traditional "ldap" or ++"ldaps" queries, and it will work. First, Exim tries a connection via the Unix ++domain socket; if that fails, it tries a TCP/IP connection to the backup host. ++ ++If an explicit "ldapi" type is given in a query when a host name is specified, ++an error is diagnosed. However, if there are more items in ldap_default_servers ++, they are tried. In other words: ++ ++ * Using a pathname with "ldap" or "ldaps" forces the use of the Unix domain ++ interface. ++ ++ * Using "ldapi" with a host name causes an error. ++ ++Using "ldapi" with no host or path in the query, and no setting of ++ldap_default_servers, does whatever the library does by default. ++ ++ ++9.17 LDAP authentication and control information ++------------------------------------------------ ++ ++The LDAP URL syntax provides no way of passing authentication and other control ++information to the server. To make this possible, the URL in an LDAP query may ++be preceded by any number of <name>=<value> settings, separated by spaces. If a ++value contains spaces it must be enclosed in double quotes, and when double ++quotes are used, backslash is interpreted in the usual way inside them. The ++following names are recognized: ++ ++DEREFERENCE set the dereferencing parameter ++NETTIME set a timeout for a network operation ++USER set the DN, for authenticating the LDAP bind ++PASS set the password, likewise ++REFERRALS set the referrals parameter ++SIZE set the limit for the number of entries returned ++TIME set the maximum waiting time for a query ++ ++The value of the DEREFERENCE parameter must be one of the words "never", ++"searching", "finding", or "always". The value of the REFERRALS parameter must ++be "follow" (the default) or "nofollow". The latter stops the LDAP library from ++trying to follow referrals issued by the LDAP server. ++ ++The name CONNECT is an obsolete name for NETTIME, retained for backwards ++compatibility. This timeout (specified as a number of seconds) is enforced from ++the client end for operations that can be carried out over a network. ++Specifically, it applies to network connections and calls to the ldap_result() ++function. If the value is greater than zero, it is used if ++LDAP_OPT_NETWORK_TIMEOUT is defined in the LDAP headers (OpenLDAP), or if ++LDAP_X_OPT_CONNECT_TIMEOUT is defined in the LDAP headers (Netscape SDK 4.1). A ++value of zero forces an explicit setting of "no timeout" for Netscape SDK; for ++OpenLDAP no action is taken. ++ ++The TIME parameter (also a number of seconds) is passed to the server to set a ++server-side limit on the time taken to complete a search. ++ ++Here is an example of an LDAP query in an Exim lookup that uses some of these ++values. This is a single line, folded to fit on the page: ++ ++${lookup ldap ++ {user="cn=manager,o=University of Cambridge,c=UK" pass=secret ++ ldap:///o=University%20of%20Cambridge,c=UK?sn?sub?(cn=foo)} ++ {$value}fail} ++ ++The encoding of spaces as "%20" is a URL thing which should not be done for any ++of the auxiliary data. Exim configuration settings that include lookups which ++contain password information should be preceded by "hide" to prevent non-admin ++users from using the -bP option to see their values. ++ ++The auxiliary data items may be given in any order. The default is no ++connection timeout (the system timeout is used), no user or password, no limit ++on the number of entries returned, and no time limit on queries. ++ ++When a DN is quoted in the USER= setting for LDAP authentication, Exim removes ++any URL quoting that it may contain before passing it LDAP. Apparently some ++libraries do this for themselves, but some do not. Removing the URL quoting has ++two advantages: ++ ++ * It makes it possible to use the same quote_ldap_dn expansion for USER= DNs ++ as with DNs inside actual queries. ++ ++ * It permits spaces inside USER= DNs. ++ ++For example, a setting such as ++ ++USER=cn=${quote_ldap_dn:$1} ++ ++should work even if $1 contains spaces. ++ ++Expanded data for the PASS= value should be quoted using the quote expansion ++operator, rather than the LDAP quote operators. The only reason this field ++needs quoting is to ensure that it conforms to the Exim syntax, which does not ++allow unquoted spaces. For example: ++ ++PASS=${quote:$3} ++ ++The LDAP authentication mechanism can be used to check passwords as part of ++SMTP authentication. See the ldapauth expansion string condition in chapter 11. ++ ++ ++9.18 Format of data returned by LDAP ++------------------------------------ ++ ++The ldapdn lookup type returns the Distinguished Name from a single entry as a ++sequence of values, for example ++ ++cn=manager, o=University of Cambridge, c=UK ++ ++The ldap lookup type generates an error if more than one entry matches the ++search filter, whereas ldapm permits this case, and inserts a newline in the ++result between the data from different entries. It is possible for multiple ++values to be returned for both ldap and ldapm, but in the former case you know ++that whatever values are returned all came from a single entry in the ++directory. ++ ++In the common case where you specify a single attribute in your LDAP query, the ++result is not quoted, and does not contain the attribute name. If the attribute ++has multiple values, they are separated by commas. ++ ++If you specify multiple attributes, the result contains space-separated, quoted ++strings, each preceded by the attribute name and an equals sign. Within the ++quotes, the quote character, backslash, and newline are escaped with ++backslashes, and commas are used to separate multiple values for the attribute. ++Apart from the escaping, the string within quotes takes the same form as the ++output when a single attribute is requested. Specifying no attributes is the ++same as specifying all of an entry's attributes. ++ ++Here are some examples of the output format. The first line of each pair is an ++LDAP query, and the second is the data that is returned. The attribute called ++attr1 has two values, whereas attr2 has only one value: ++ ++ldap:///o=base?attr1?sub?(uid=fred) ++value1.1, value1.2 ++ ++ldap:///o=base?attr2?sub?(uid=fred) ++value two ++ ++ldap:///o=base?attr1,attr2?sub?(uid=fred) ++attr1="value1.1, value1.2" attr2="value two" ++ ++ldap:///o=base??sub?(uid=fred) ++objectClass="top" attr1="value1.1, value1.2" attr2="value two" ++ ++The extract operator in string expansions can be used to pick out individual ++fields from data that consists of key=value pairs. You can make use of Exim's ++-be option to run expansion tests and thereby check the results of LDAP ++lookups. ++ ++ ++9.19 More about NIS+ ++-------------------- ++ ++NIS+ queries consist of a NIS+ indexed name followed by an optional colon and ++field name. If this is given, the result of a successful query is the contents ++of the named field; otherwise the result consists of a concatenation of ++field-name=field-value pairs, separated by spaces. Empty values and values ++containing spaces are quoted. For example, the query ++ ++[name=mg1456],passwd.org_dir ++ ++might return the string ++ ++name=mg1456 passwd="" uid=999 gid=999 gcos="Martin Guerre" ++home=/home/mg1456 shell=/bin/bash shadow="" ++ ++(split over two lines here to fit on the page), whereas ++ ++[name=mg1456],passwd.org_dir:gcos ++ ++would just return ++ ++Martin Guerre ++ ++with no quotes. A NIS+ lookup fails if NIS+ returns more than one table entry ++for the given indexed key. The effect of the quote_nisplus expansion operator ++is to double any quote characters within the text. ++ ++ ++9.20 SQL lookups ++---------------- ++ ++Exim can support lookups in InterBase, MySQL, Oracle, PostgreSQL, and SQLite ++databases. Queries for these databases contain SQL statements, so an example ++might be ++ ++${lookup mysql{select mailbox from users where id='userx'}\ ++ {$value}fail} ++ ++If the result of the query contains more than one field, the data for each ++field in the row is returned, preceded by its name, so the result of ++ ++${lookup pgsql{select home,name from users where id='userx'}\ ++ {$value}} ++ ++might be ++ ++home=/home/userx name="Mister X" ++ ++Empty values and values containing spaces are double quoted, with embedded ++quotes escaped by a backslash. If the result of the query contains just one ++field, the value is passed back verbatim, without a field name, for example: ++ ++Mister X ++ ++If the result of the query yields more than one row, it is all concatenated, ++with a newline between the data for each row. ++ ++ ++9.21 More about MySQL, PostgreSQL, Oracle, and InterBase ++-------------------------------------------------------- ++ ++If any MySQL, PostgreSQL, Oracle, or InterBase lookups are used, the ++mysql_servers, pgsql_servers, oracle_servers, or ibase_servers option (as ++appropriate) must be set to a colon-separated list of server information. (For ++MySQL and PostgreSQL only, the global option need not be set if all queries ++contain their own server information - see section 9.22.) Each item in the list ++is a slash-separated list of four items: host name, database name, user name, ++and password. In the case of Oracle, the host name field is used for the ++"service name", and the database name field is not used and should be empty. ++For example: ++ ++hide oracle_servers = oracle.plc.example//userx/abcdwxyz ++ ++Because password data is sensitive, you should always precede the setting with ++"hide", to prevent non-admin users from obtaining the setting via the -bP ++option. Here is an example where two MySQL servers are listed: ++ ++hide mysql_servers = localhost/users/root/secret:\ ++ otherhost/users/root/othersecret ++ ++For MySQL and PostgreSQL, a host may be specified as <name>:<port> but because ++this is a colon-separated list, the colon has to be doubled. For each query, ++these parameter groups are tried in order until a connection is made and a ++query is successfully processed. The result of a query may be that no data is ++found, but that is still a successful query. In other words, the list of ++servers provides a backup facility, not a list of different places to look. ++ ++The quote_mysql, quote_pgsql, and quote_oracle expansion operators convert ++newline, tab, carriage return, and backspace to \n, \t, \r, and \b ++respectively, and the characters single-quote, double-quote, and backslash ++itself are escaped with backslashes. The quote_pgsql expansion operator, in ++addition, escapes the percent and underscore characters. This cannot be done ++for MySQL because these escapes are not recognized in contexts where these ++characters are not special. ++ ++ ++9.22 Specifying the server in the query ++--------------------------------------- ++ ++For MySQL and PostgreSQL lookups (but not currently for Oracle and InterBase), ++it is possible to specify a list of servers with an individual query. This is ++done by starting the query with ++ ++servers=server1:server2:server3:...; ++ ++Each item in the list may take one of two forms: ++ ++ 1. If it contains no slashes it is assumed to be just a host name. The ++ appropriate global option (mysql_servers or pgsql_servers) is searched for ++ a host of the same name, and the remaining parameters (database, user, ++ password) are taken from there. ++ ++ 2. If it contains any slashes, it is taken as a complete parameter set. ++ ++The list of servers is used in exactly the same way as the global list. Once a ++connection to a server has happened and a query has been successfully executed, ++processing of the lookup ceases. ++ ++This feature is intended for use in master/slave situations where updates are ++occurring and you want to update the master rather than a slave. If the master ++is in the list as a backup for reading, you might have a global setting like ++this: ++ ++mysql_servers = slave1/db/name/pw:\ ++ slave2/db/name/pw:\ ++ master/db/name/pw ++ ++In an updating lookup, you could then write: ++ ++${lookup mysql{servers=master; UPDATE ...} } ++ ++That query would then be sent only to the master server. If, on the other hand, ++the master is not to be used for reading, and so is not present in the global ++option, you can still update it by a query of this form: ++ ++${lookup pgsql{servers=master/db/name/pw; UPDATE ...} } ++ ++ ++9.23 Special MySQL features ++--------------------------- ++ ++For MySQL, an empty host name or the use of "localhost" in mysql_servers causes ++a connection to the server on the local host by means of a Unix domain socket. ++An alternate socket can be specified in parentheses. The full syntax of each ++item in mysql_servers is: ++ ++<hostname>::<port>(<socket name>)/<database>/<user>/<password> ++ ++Any of the three sub-parts of the first field can be omitted. For normal use on ++the local host it can be left blank or set to just "localhost". ++ ++No database need be supplied - but if it is absent here, it must be given in ++the queries. ++ ++If a MySQL query is issued that does not request any data (an insert, update, ++or delete command), the result of the lookup is the number of rows affected. ++ ++Warning: This can be misleading. If an update does not actually change anything ++(for example, setting a field to the value it already has), the result is zero ++because no rows are affected. ++ ++ ++9.24 Special PostgreSQL features ++-------------------------------- ++ ++PostgreSQL lookups can also use Unix domain socket connections to the database. ++This is usually faster and costs less CPU time than a TCP/IP connection. ++However it can be used only if the mail server runs on the same machine as the ++database server. A configuration line for PostgreSQL via Unix domain sockets ++looks like this: ++ ++hide pgsql_servers = (/tmp/.s.PGSQL.5432)/db/user/password : ... ++ ++In other words, instead of supplying a host name, a path to the socket is ++given. The path name is enclosed in parentheses so that its slashes aren't ++visually confused with the delimiters for the other server parameters. ++ ++If a PostgreSQL query is issued that does not request any data (an insert, ++update, or delete command), the result of the lookup is the number of rows ++affected. ++ ++ ++9.25 More about SQLite ++---------------------- ++ ++SQLite is different to the other SQL lookups because a file name is required in ++addition to the SQL query. An SQLite database is a single file, and there is no ++daemon as in the other SQL databases. The interface to Exim requires the name ++of the file, as an absolute path, to be given at the start of the query. It is ++separated from the query by white space. This means that the path name cannot ++contain white space. Here is a lookup expansion example: ++ ++${lookup sqlite {/some/thing/sqlitedb \ ++ select name from aliases where id='userx';}} ++ ++In a list, the syntax is similar. For example: ++ ++domainlist relay_to_domains = sqlite;/some/thing/sqlitedb \ ++ select * from relays where ip='$sender_host_address'; ++ ++The only character affected by the quote_sqlite operator is a single quote, ++which it doubles. ++ ++The SQLite library handles multiple simultaneous accesses to the database ++internally. Multiple readers are permitted, but only one process can update at ++once. Attempts to access the database while it is being updated are rejected ++after a timeout period, during which the SQLite library waits for the lock to ++be released. In Exim, the default timeout is set to 5 seconds, but it can be ++changed by means of the sqlite_lock_timeout option. ++ ++ ++ ++=============================================================================== ++10. DOMAIN, HOST, ADDRESS, AND LOCAL PART LISTS ++ ++A number of Exim configuration options contain lists of domains, hosts, email ++addresses, or local parts. For example, the hold_domains option contains a list ++of domains whose delivery is currently suspended. These lists are also used as ++data in ACL statements (see chapter 42), and as arguments to expansion ++conditions such as match_domain. ++ ++Each item in one of these lists is a pattern to be matched against a domain, ++host, email address, or local part, respectively. In the sections below, the ++different types of pattern for each case are described, but first we cover some ++general facilities that apply to all four kinds of list. ++ ++ ++10.1 Expansion of lists ++----------------------- ++ ++Each list is expanded as a single string before it is used. The result of ++expansion must be a list, possibly containing empty items, which is split up ++into separate items for matching. By default, colon is the separator character, ++but this can be varied if necessary. See sections 6.19 and 6.21 for details of ++the list syntax; the second of these discusses the way to specify empty list ++items. ++ ++If the string expansion is forced to fail, Exim behaves as if the item it is ++testing (domain, host, address, or local part) is not in the list. Other ++expansion failures cause temporary errors. ++ ++If an item in a list is a regular expression, backslashes, dollars and possibly ++other special characters in the expression must be protected against ++misinterpretation by the string expander. The easiest way to do this is to use ++the "\N" expansion feature to indicate that the contents of the regular ++expression should not be expanded. For example, in an ACL you might have: ++ ++deny senders = \N^\d{8}\w@.*\.baddomain\.example$\N : \ ++ ${lookup{$domain}lsearch{/badsenders/bydomain}} ++ ++The first item is a regular expression that is protected from expansion by "\ ++N", whereas the second uses the expansion to obtain a list of unwanted senders ++based on the receiving domain. ++ ++ ++10.2 Negated items in lists ++--------------------------- ++ ++Items in a list may be positive or negative. Negative items are indicated by a ++leading exclamation mark, which may be followed by optional white space. A list ++defines a set of items (domains, etc). When Exim processes one of these lists, ++it is trying to find out whether a domain, host, address, or local part ++(respectively) is in the set that is defined by the list. It works like this: ++ ++The list is scanned from left to right. If a positive item is matched, the ++subject that is being checked is in the set; if a negative item is matched, the ++subject is not in the set. If the end of the list is reached without the ++subject having matched any of the patterns, it is in the set if the last item ++was a negative one, but not if it was a positive one. For example, the list in ++ ++domainlist relay_to_domains = !a.b.c : *.b.c ++ ++matches any domain ending in .b.c except for a.b.c. Domains that match neither ++a.b.c nor *.b.c do not match, because the last item in the list is positive. ++However, if the setting were ++ ++domainlist relay_to_domains = !a.b.c ++ ++then all domains other than a.b.c would match because the last item in the list ++is negative. In other words, a list that ends with a negative item behaves as ++if it had an extra item ":*" on the end. ++ ++Another way of thinking about positive and negative items in lists is to read ++the connector as "or" after a positive item and as "and" after a negative item. ++ ++ ++10.3 File names in lists ++------------------------ ++ ++If an item in a domain, host, address, or local part list is an absolute file ++name (beginning with a slash character), each line of the file is read and ++processed as if it were an independent item in the list, except that further ++file names are not allowed, and no expansion of the data from the file takes ++place. Empty lines in the file are ignored, and the file may also contain ++comment lines: ++ ++ * For domain and host lists, if a # character appears anywhere in a line of ++ the file, it and all following characters are ignored. ++ ++ * Because local parts may legitimately contain # characters, a comment in an ++ address list or local part list file is recognized only if # is preceded by ++ white space or the start of the line. For example: ++ ++ not#comment@x.y.z # but this is a comment ++ ++Putting a file name in a list has the same effect as inserting each line of the ++file as an item in the list (blank lines and comments excepted). However, there ++is one important difference: the file is read each time the list is processed, ++so if its contents vary over time, Exim's behaviour changes. ++ ++If a file name is preceded by an exclamation mark, the sense of any match ++within the file is inverted. For example, if ++ ++hold_domains = !/etc/nohold-domains ++ ++and the file contains the lines ++ ++!a.b.c ++*.b.c ++ ++then a.b.c is in the set of domains defined by hold_domains, whereas any domain ++matching "*.b.c" is not. ++ ++ ++10.4 An lsearch file is not an out-of-line list ++----------------------------------------------- ++ ++As will be described in the sections that follow, lookups can be used in lists ++to provide indexed methods of checking list membership. There has been some ++confusion about the way lsearch lookups work in lists. Because an lsearch file ++contains plain text and is scanned sequentially, it is sometimes thought that ++it is allowed to contain wild cards and other kinds of non-constant pattern. ++This is not the case. The keys in an lsearch file are always fixed strings, ++just as for any other single-key lookup type. ++ ++If you want to use a file to contain wild-card patterns that form part of a ++list, just give the file name on its own, without a search type, as described ++in the previous section. You could also use the wildlsearch or nwildlsearch, ++but there is no advantage in doing this. ++ ++ ++10.5 Named lists ++---------------- ++ ++A list of domains, hosts, email addresses, or local parts can be given a name ++which is then used to refer to the list elsewhere in the configuration. This is ++particularly convenient if the same list is required in several different ++places. It also allows lists to be given meaningful names, which can improve ++the readability of the configuration. For example, it is conventional to define ++a domain list called local_domains for all the domains that are handled locally ++on a host, using a configuration line such as ++ ++domainlist local_domains = localhost:my.dom.example ++ ++Named lists are referenced by giving their name preceded by a plus sign, so, ++for example, a router that is intended to handle local domains would be ++configured with the line ++ ++domains = +local_domains ++ ++The first router in a configuration is often one that handles all domains ++except the local ones, using a configuration with a negated item like this: ++ ++dnslookup: ++ driver = dnslookup ++ domains = ! +local_domains ++ transport = remote_smtp ++ no_more ++ ++The four kinds of named list are created by configuration lines starting with ++the words domainlist, hostlist, addresslist, or localpartlist, respectively. ++Then there follows the name that you are defining, followed by an equals sign ++and the list itself. For example: ++ ++hostlist relay_from_hosts = 192.168.23.0/24 : my.friend.example ++addresslist bad_senders = cdb;/etc/badsenders ++ ++A named list may refer to other named lists: ++ ++domainlist dom1 = first.example : second.example ++domainlist dom2 = +dom1 : third.example ++domainlist dom3 = fourth.example : +dom2 : fifth.example ++ ++Warning: If the last item in a referenced list is a negative one, the effect ++may not be what you intended, because the negation does not propagate out to ++the higher level. For example, consider: ++ ++domainlist dom1 = !a.b ++domainlist dom2 = +dom1 : *.b ++ ++The second list specifies "either in the dom1 list or *.b". The first list ++specifies just "not a.b", so the domain x.y matches it. That means it matches ++the second list as well. The effect is not the same as ++ ++domainlist dom2 = !a.b : *.b ++ ++where x.y does not match. It's best to avoid negation altogether in referenced ++lists if you can. ++ ++Named lists may have a performance advantage. When Exim is routing an address ++or checking an incoming message, it caches the result of tests on named lists. ++So, if you have a setting such as ++ ++domains = +local_domains ++ ++on several of your routers or in several ACL statements, the actual test is ++done only for the first one. However, the caching works only if there are no ++expansions within the list itself or any sublists that it references. In other ++words, caching happens only for lists that are known to be the same each time ++they are referenced. ++ ++By default, there may be up to 16 named lists of each type. This limit can be ++extended by changing a compile-time variable. The use of domain and host lists ++is recommended for concepts such as local domains, relay domains, and relay ++hosts. The default configuration is set up like this. ++ ++ ++10.6 Named lists compared with macros ++------------------------------------- ++ ++At first sight, named lists might seem to be no different from macros in the ++configuration file. However, macros are just textual substitutions. If you ++write ++ ++ALIST = host1 : host2 ++auth_advertise_hosts = !ALIST ++ ++it probably won't do what you want, because that is exactly the same as ++ ++auth_advertise_hosts = !host1 : host2 ++ ++Notice that the second host name is not negated. However, if you use a host ++list, and write ++ ++hostlist alist = host1 : host2 ++auth_advertise_hosts = ! +alist ++ ++the negation applies to the whole list, and so that is equivalent to ++ ++auth_advertise_hosts = !host1 : !host2 ++ ++ ++10.7 Named list caching ++----------------------- ++ ++While processing a message, Exim caches the result of checking a named list if ++it is sure that the list is the same each time. In practice, this means that ++the cache operates only if the list contains no $ characters, which guarantees ++that it will not change when it is expanded. Sometimes, however, you may have ++an expanded list that you know will be the same each time within a given ++message. For example: ++ ++domainlist special_domains = \ ++ ${lookup{$sender_host_address}cdb{/some/file}} ++ ++This provides a list of domains that depends only on the sending host's IP ++address. If this domain list is referenced a number of times (for example, in ++several ACL lines, or in several routers) the result of the check is not cached ++by default, because Exim does not know that it is going to be the same list ++each time. ++ ++By appending "_cache" to "domainlist" you can tell Exim to go ahead and cache ++the result anyway. For example: ++ ++domainlist_cache special_domains = ${lookup{... ++ ++If you do this, you should be absolutely sure that caching is going to do the ++right thing in all cases. When in doubt, leave it out. ++ ++ ++10.8 Domain lists ++----------------- ++ ++Domain lists contain patterns that are to be matched against a mail domain. The ++following types of item may appear in domain lists: ++ ++ * If a pattern consists of a single @ character, it matches the local host ++ name, as set by the primary_hostname option (or defaulted). This makes it ++ possible to use the same configuration file on several different hosts that ++ differ only in their names. ++ ++ * If a pattern consists of the string "@[]" it matches an IP address enclosed ++ in square brackets (as in an email address that contains a domain literal), ++ but only if that IP address is recognized as local for email routing ++ purposes. The local_interfaces and extra_local_interfaces options can be ++ used to control which of a host's several IP addresses are treated as ++ local. In today's Internet, the use of domain literals is controversial. ++ ++ * If a pattern consists of the string "@mx_any" it matches any domain that ++ has an MX record pointing to the local host or to any host that is listed ++ in hosts_treat_as_local. The items "@mx_primary" and "@mx_secondary" are ++ similar, except that the first matches only when a primary MX target is the ++ local host, and the second only when no primary MX target is the local ++ host, but a secondary MX target is. "Primary" means an MX record with the ++ lowest preference value - there may of course be more than one of them. ++ ++ The MX lookup that takes place when matching a pattern of this type is ++ performed with the resolver options for widening names turned off. Thus, ++ for example, a single-component domain will not be expanded by adding the ++ resolver's default domain. See the qualify_single and search_parents ++ options of the dnslookup router for a discussion of domain widening. ++ ++ Sometimes you may want to ignore certain IP addresses when using one of ++ these patterns. You can specify this by following the pattern with "/ignore ++ ="<ip list>, where <ip list> is a list of IP addresses. These addresses are ++ ignored when processing the pattern (compare the ignore_target_hosts option ++ on a router). For example: ++ ++ domains = @mx_any/ignore=127.0.0.1 ++ ++ This example matches any domain that has an MX record pointing to one of ++ the local host's IP addresses other than 127.0.0.1. ++ ++ The list of IP addresses is in fact processed by the same code that ++ processes host lists, so it may contain CIDR-coded network specifications ++ and it may also contain negative items. ++ ++ Because the list of IP addresses is a sublist within a domain list, you ++ have to be careful about delimiters if there is more than one address. Like ++ any other list, the default delimiter can be changed. Thus, you might have: ++ ++ domains = @mx_any/ignore=<;127.0.0.1;0.0.0.0 : \ ++ an.other.domain : ... ++ ++ so that the sublist uses semicolons for delimiters. When IPv6 addresses are ++ involved, it is easiest to change the delimiter for the main list as well: ++ ++ domains = <? @mx_any/ignore=<;127.0.0.1;::1 ? \ ++ an.other.domain ? ... ++ ++ * If a pattern starts with an asterisk, the remaining characters of the ++ pattern are compared with the terminating characters of the domain. The use ++ of "*" in domain lists differs from its use in partial matching lookups. In ++ a domain list, the character following the asterisk need not be a dot, ++ whereas partial matching works only in terms of dot-separated components. ++ For example, a domain list item such as "*key.ex" matches donkey.ex as well ++ as cipher.key.ex. ++ ++ * If a pattern starts with a circumflex character, it is treated as a regular ++ expression, and matched against the domain using a regular expression ++ matching function. The circumflex is treated as part of the regular ++ expression. Email domains are case-independent, so this regular expression ++ match is by default case-independent, but you can make it case-dependent by ++ starting it with "(?-i)". References to descriptions of the syntax of ++ regular expressions are given in chapter 8. ++ ++ Warning: Because domain lists are expanded before being processed, you must ++ escape any backslash and dollar characters in the regular expression, or ++ use the special "\N" sequence (see chapter 11) to specify that it is not to ++ be expanded (unless you really do want to build a regular expression by ++ expansion, of course). ++ ++ * If a pattern starts with the name of a single-key lookup type followed by a ++ semicolon (for example, "dbm;" or "lsearch;"), the remainder of the pattern ++ must be a file name in a suitable format for the lookup type. For example, ++ for "cdb;" it must be an absolute path: ++ ++ domains = cdb;/etc/mail/local_domains.cdb ++ ++ The appropriate type of lookup is done on the file using the domain name as ++ the key. In most cases, the data that is looked up is not used; Exim is ++ interested only in whether or not the key is present in the file. However, ++ when a lookup is used for the domains option on a router or a domains ++ condition in an ACL statement, the data is preserved in the $domain_data ++ variable and can be referred to in other router options or other statements ++ in the same ACL. ++ ++ * Any of the single-key lookup type names may be preceded by "partial"<n>"-", ++ where the <n> is optional, for example, ++ ++ domains = partial-dbm;/partial/domains ++ ++ This causes partial matching logic to be invoked; a description of how this ++ works is given in section 9.7. ++ ++ * Any of the single-key lookup types may be followed by an asterisk. This ++ causes a default lookup for a key consisting of a single asterisk to be ++ done if the original lookup fails. This is not a useful feature when using ++ a domain list to select particular domains (because any domain would ++ match), but it might have value if the result of the lookup is being used ++ via the $domain_data expansion variable. ++ ++ * If the pattern starts with the name of a query-style lookup type followed ++ by a semicolon (for example, "nisplus;" or "ldap;"), the remainder of the ++ pattern must be an appropriate query for the lookup type, as described in ++ chapter 9. For example: ++ ++ hold_domains = mysql;select domain from holdlist \ ++ where domain = '${quote_mysql:$domain}'; ++ ++ In most cases, the data that is looked up is not used (so for an SQL query, ++ for example, it doesn't matter what field you select). Exim is interested ++ only in whether or not the query succeeds. However, when a lookup is used ++ for the domains option on a router, the data is preserved in the ++ $domain_data variable and can be referred to in other options. ++ ++ * If none of the above cases apply, a caseless textual comparison is made ++ between the pattern and the domain. ++ ++Here is an example that uses several different kinds of pattern: ++ ++domainlist funny_domains = \ ++ @ : \ ++ lib.unseen.edu : \ ++ *.foundation.fict.example : \ ++ \N^[1-2]\d{3}\.fict\.example$\N : \ ++ partial-dbm;/opt/data/penguin/book : \ ++ nis;domains.byname : \ ++ nisplus;[name=$domain,status=local],domains.org_dir ++ ++There are obvious processing trade-offs among the various matching modes. Using ++an asterisk is faster than a regular expression, and listing a few names ++explicitly probably is too. The use of a file or database lookup is expensive, ++but may be the only option if hundreds of names are required. Because the ++patterns are tested in order, it makes sense to put the most commonly matched ++patterns earlier. ++ ++ ++10.9 Host lists ++--------------- ++ ++Host lists are used to control what remote hosts are allowed to do. For ++example, some hosts may be allowed to use the local host as a relay, and some ++may be permitted to use the SMTP ETRN command. Hosts can be identified in two ++different ways, by name or by IP address. In a host list, some types of pattern ++are matched to a host name, and some are matched to an IP address. You need to ++be particularly careful with this when single-key lookups are involved, to ++ensure that the right value is being used as the key. ++ ++ ++10.10 Special host list patterns ++-------------------------------- ++ ++If a host list item is the empty string, it matches only when no remote host is ++involved. This is the case when a message is being received from a local ++process using SMTP on the standard input, that is, when a TCP/IP connection is ++not used. ++ ++The special pattern "*" in a host list matches any host or no host. Neither the ++IP address nor the name is actually inspected. ++ ++ ++10.11 Host list patterns that match by IP address ++------------------------------------------------- ++ ++If an IPv4 host calls an IPv6 host and the call is accepted on an IPv6 socket, ++the incoming address actually appears in the IPv6 host as "::ffff:"<v4address>. ++When such an address is tested against a host list, it is converted into a ++traditional IPv4 address first. (Not all operating systems accept IPv4 calls on ++IPv6 sockets, as there have been some security concerns.) ++ ++The following types of pattern in a host list check the remote host by ++inspecting its IP address: ++ ++ * If the pattern is a plain domain name (not a regular expression, not ++ starting with *, not a lookup of any kind), Exim calls the operating system ++ function to find the associated IP address(es). Exim uses the newer ++ getipnodebyname() function when available, otherwise gethostbyname(). This ++ typically causes a forward DNS lookup of the name. The result is compared ++ with the IP address of the subject host. ++ ++ If there is a temporary problem (such as a DNS timeout) with the host name ++ lookup, a temporary error occurs. For example, if the list is being used in ++ an ACL condition, the ACL gives a "defer" response, usually leading to a ++ temporary SMTP error code. If no IP address can be found for the host name, ++ what happens is described in section 10.14 below. ++ ++ * If the pattern is "@", the primary host name is substituted and used as a ++ domain name, as just described. ++ ++ * If the pattern is an IP address, it is matched against the IP address of ++ the subject host. IPv4 addresses are given in the normal "dotted-quad" ++ notation. IPv6 addresses can be given in colon-separated format, but the ++ colons have to be doubled so as not to be taken as item separators when the ++ default list separator is used. IPv6 addresses are recognized even when ++ Exim is compiled without IPv6 support. This means that if they appear in a ++ host list on an IPv4-only host, Exim will not treat them as host names. ++ They are just addresses that can never match a client host. ++ ++ * If the pattern is "@[]", it matches the IP address of any IP interface on ++ the local host. For example, if the local host is an IPv4 host with one ++ interface address 10.45.23.56, these two ACL statements have the same ++ effect: ++ ++ accept hosts = 127.0.0.1 : 10.45.23.56 ++ accept hosts = @[] ++ ++ * If the pattern is an IP address followed by a slash and a mask length (for ++ example 10.11.42.0/24), it is matched against the IP address of the subject ++ host under the given mask. This allows, an entire network of hosts to be ++ included (or excluded) by a single item. The mask uses CIDR notation; it ++ specifies the number of address bits that must match, starting from the ++ most significant end of the address. ++ ++ Note: The mask is not a count of addresses, nor is it the high number of a ++ range of addresses. It is the number of bits in the network portion of the ++ address. The above example specifies a 24-bit netmask, so it matches all ++ 256 addresses in the 10.11.42.0 network. An item such as ++ ++ 192.168.23.236/31 ++ ++ matches just two addresses, 192.168.23.236 and 192.168.23.237. A mask value ++ of 32 for an IPv4 address is the same as no mask at all; just a single ++ address matches. ++ ++ Here is another example which shows an IPv4 and an IPv6 network: ++ ++ recipient_unqualified_hosts = 192.168.0.0/16: \ ++ 3ffe::ffff::836f::::/48 ++ ++ The doubling of list separator characters applies only when these items ++ appear inline in a host list. It is not required when indirecting via a ++ file. For example: ++ ++ recipient_unqualified_hosts = /opt/exim/unqualnets ++ ++ could make use of a file containing ++ ++ 172.16.0.0/12 ++ 3ffe:ffff:836f::/48 ++ ++ to have exactly the same effect as the previous example. When listing IPv6 ++ addresses inline, it is usually more convenient to use the facility for ++ changing separator characters. This list contains the same two networks: ++ ++ recipient_unqualified_hosts = <; 172.16.0.0/12; \ ++ 3ffe:ffff:836f::/48 ++ ++ The separator is changed to semicolon by the leading "<;" at the start of ++ the list. ++ ++ ++10.12 Host list patterns for single-key lookups by host address ++--------------------------------------------------------------- ++ ++When a host is to be identified by a single-key lookup of its complete IP ++address, the pattern takes this form: ++ ++net-<single-key-search-type>;<search-data> ++ ++For example: ++ ++hosts_lookup = net-cdb;/hosts-by-ip.db ++ ++The text form of the IP address of the subject host is used as the lookup key. ++IPv6 addresses are converted to an unabbreviated form, using lower case ++letters, with dots as separators because colon is the key terminator in lsearch ++files. [Colons can in fact be used in keys in lsearch files by quoting the ++keys, but this is a facility that was added later.] The data returned by the ++lookup is not used. ++ ++Single-key lookups can also be performed using masked IP addresses, using ++patterns of this form: ++ ++net<number>-<single-key-search-type>;<search-data> ++ ++For example: ++ ++net24-dbm;/networks.db ++ ++The IP address of the subject host is masked using <number> as the mask length. ++A textual string is constructed from the masked value, followed by the mask, ++and this is used as the lookup key. For example, if the host's IP address is ++192.168.34.6, the key that is looked up for the above example is "192.168.34.0/ ++24". ++ ++When an IPv6 address is converted to a string, dots are normally used instead ++of colons, so that keys in lsearch files need not contain colons (which ++terminate lsearch keys). This was implemented some time before the ability to ++quote keys was made available in lsearch files. However, the more recently ++implemented iplsearch files do require colons in IPv6 keys (notated using the ++quoting facility) so as to distinguish them from IPv4 keys. For this reason, ++when the lookup type is iplsearch, IPv6 addresses are converted using colons ++and not dots. In all cases, full, unabbreviated IPv6 addresses are always used. ++ ++Ideally, it would be nice to tidy up this anomalous situation by changing to ++colons in all cases, given that quoting is now available for lsearch. However, ++this would be an incompatible change that might break some existing ++configurations. ++ ++Warning: Specifying net32- (for an IPv4 address) or net128- (for an IPv6 ++address) is not the same as specifying just net- without a number. In the ++former case the key strings include the mask value, whereas in the latter case ++the IP address is used on its own. ++ ++ ++10.13 Host list patterns that match by host name ++------------------------------------------------ ++ ++There are several types of pattern that require Exim to know the name of the ++remote host. These are either wildcard patterns or lookups by name. (If a ++complete hostname is given without any wildcarding, it is used to find an IP ++address to match against, as described in section 10.11 above.) ++ ++If the remote host name is not already known when Exim encounters one of these ++patterns, it has to be found from the IP address. Although many sites on the ++Internet are conscientious about maintaining reverse DNS data for their hosts, ++there are also many that do not do this. Consequently, a name cannot always be ++found, and this may lead to unwanted effects. Take care when configuring host ++lists with wildcarded name patterns. Consider what will happen if a name cannot ++be found. ++ ++Because of the problems of determining host names from IP addresses, matching ++against host names is not as common as matching against IP addresses. ++ ++By default, in order to find a host name, Exim first does a reverse DNS lookup; ++if no name is found in the DNS, the system function (gethostbyaddr() or ++getipnodebyaddr() if available) is tried. The order in which these lookups are ++done can be changed by setting the host_lookup_order option. For security, once ++Exim has found one or more names, it looks up the IP addresses for these names ++and compares them with the IP address that it started with. Only those names ++whose IP addresses match are accepted. Any other names are discarded. If no ++names are left, Exim behaves as if the host name cannot be found. In the most ++common case there is only one name and one IP address. ++ ++There are some options that control what happens if a host name cannot be ++found. These are described in section 10.14 below. ++ ++As a result of aliasing, hosts may have more than one name. When processing any ++of the following types of pattern, all the host's names are checked: ++ ++ * If a pattern starts with "*" the remainder of the item must match the end ++ of the host name. For example, "*.b.c" matches all hosts whose names end in ++ .b.c. This special simple form is provided because this is a very common ++ requirement. Other kinds of wildcarding require the use of a regular ++ expression. ++ ++ * If the item starts with "^" it is taken to be a regular expression which is ++ matched against the host name. Host names are case-independent, so this ++ regular expression match is by default case-independent, but you can make ++ it case-dependent by starting it with "(?-i)". References to descriptions ++ of the syntax of regular expressions are given in chapter 8. For example, ++ ++ ^(a|b)\.c\.d$ ++ ++ is a regular expression that matches either of the two hosts a.c.d or b.c.d ++ . When a regular expression is used in a host list, you must take care that ++ backslash and dollar characters are not misinterpreted as part of the ++ string expansion. The simplest way to do this is to use "\N" to mark that ++ part of the string as non-expandable. For example: ++ ++ sender_unqualified_hosts = \N^(a|b)\.c\.d$\N : .... ++ ++ Warning: If you want to match a complete host name, you must include the ++ "$" terminating metacharacter in the regular expression, as in the above ++ example. Without it, a match at the start of the host name is all that is ++ required. ++ ++ ++10.14 Behaviour when an IP address or name cannot be found ++---------------------------------------------------------- ++ ++While processing a host list, Exim may need to look up an IP address from a ++name (see section 10.11), or it may need to look up a host name from an IP ++address (see section 10.13). In either case, the behaviour when it fails to ++find the information it is seeking is the same. ++ ++Note: This section applies to permanent lookup failures. It does not apply to ++temporary DNS errors, whose handling is described in the next section. ++ ++By default, Exim behaves as if the host does not match the list. This may not ++always be what you want to happen. To change Exim's behaviour, the special ++items "+include_unknown" or "+ignore_unknown" may appear in the list (at top ++level - they are not recognized in an indirected file). ++ ++ * If any item that follows "+include_unknown" requires information that ++ cannot found, Exim behaves as if the host does match the list. For example, ++ ++ host_reject_connection = +include_unknown:*.enemy.ex ++ ++ rejects connections from any host whose name matches "*.enemy.ex", and also ++ any hosts whose name it cannot find. ++ ++ * If any item that follows "+ignore_unknown" requires information that cannot ++ be found, Exim ignores that item and proceeds to the rest of the list. For ++ example: ++ ++ accept hosts = +ignore_unknown : friend.example : \ ++ 192.168.4.5 ++ ++ accepts from any host whose name is friend.example and from 192.168.4.5, ++ whether or not its host name can be found. Without "+ignore_unknown", if no ++ name can be found for 192.168.4.5, it is rejected. ++ ++Both "+include_unknown" and "+ignore_unknown" may appear in the same list. The ++effect of each one lasts until the next, or until the end of the list. ++ ++ ++10.15 Temporary DNS errors when looking up host information ++----------------------------------------------------------- ++ ++A temporary DNS lookup failure normally causes a defer action (except when ++dns_again_means_nonexist converts it into a permanent error). However, host ++lists can include "+ignore_defer" and "+include_defer", analagous to ++"+ignore_unknown" and "+include_unknown", as described in the previous section. ++These options should be used with care, probably only in non-critical host ++lists such as whitelists. ++ ++ ++10.16 Host list patterns for single-key lookups by host name ++------------------------------------------------------------ ++ ++If a pattern is of the form ++ ++<single-key-search-type>;<search-data> ++ ++for example ++ ++dbm;/host/accept/list ++ ++a single-key lookup is performed, using the host name as its key. If the lookup ++succeeds, the host matches the item. The actual data that is looked up is not ++used. ++ ++Reminder: With this kind of pattern, you must have host names as keys in the ++file, not IP addresses. If you want to do lookups based on IP addresses, you ++must precede the search type with "net-" (see section 10.12). There is, ++however, no reason why you could not use two items in the same list, one doing ++an address lookup and one doing a name lookup, both using the same file. ++ ++ ++10.17 Host list patterns for query-style lookups ++------------------------------------------------ ++ ++If a pattern is of the form ++ ++<query-style-search-type>;<query> ++ ++the query is obeyed, and if it succeeds, the host matches the item. The actual ++data that is looked up is not used. The variables $sender_host_address and ++$sender_host_name can be used in the query. For example: ++ ++hosts_lookup = pgsql;\ ++ select ip from hostlist where ip='$sender_host_address' ++ ++The value of $sender_host_address for an IPv6 address contains colons. You can ++use the sg expansion item to change this if you need to. If you want to use ++masked IP addresses in database queries, you can use the mask expansion ++operator. ++ ++If the query contains a reference to $sender_host_name, Exim automatically ++looks up the host name if it has not already done so. (See section 10.13 for ++comments on finding host names.) ++ ++Historical note: prior to release 4.30, Exim would always attempt to find a ++host name before running the query, unless the search type was preceded by ++"net-". This is no longer the case. For backwards compatibility, "net-" is ++still recognized for query-style lookups, but its presence or absence has no ++effect. (Of course, for single-key lookups, "net-" is important. See section ++10.12.) ++ ++ ++10.18 Mixing wildcarded host names and addresses in host lists ++-------------------------------------------------------------- ++ ++If you have name lookups or wildcarded host names and IP addresses in the same ++host list, you should normally put the IP addresses first. For example, in an ++ACL you could have: ++ ++accept hosts = 10.9.8.7 : *.friend.example ++ ++The reason for this lies in the left-to-right way that Exim processes lists. It ++can test IP addresses without doing any DNS lookups, but when it reaches an ++item that requires a host name, it fails if it cannot find a host name to ++compare with the pattern. If the above list is given in the opposite order, the ++accept statement fails for a host whose name cannot be found, even if its IP ++address is 10.9.8.7. ++ ++If you really do want to do the name check first, and still recognize the IP ++address, you can rewrite the ACL like this: ++ ++accept hosts = *.friend.example ++accept hosts = 10.9.8.7 ++ ++If the first accept fails, Exim goes on to try the second one. See chapter 42 ++for details of ACLs. ++ ++ ++10.19 Address lists ++------------------- ++ ++Address lists contain patterns that are matched against mail addresses. There ++is one special case to be considered: the sender address of a bounce message is ++always empty. You can test for this by providing an empty item in an address ++list. For example, you can set up a router to process bounce messages by using ++this option setting: ++ ++senders = : ++ ++The presence of the colon creates an empty item. If you do not provide any ++data, the list is empty and matches nothing. The empty sender can also be ++detected by a regular expression that matches an empty string, and by a ++query-style lookup that succeeds when $sender_address is empty. ++ ++Non-empty items in an address list can be straightforward email addresses. For ++example: ++ ++senders = jbc@askone.example : hs@anacreon.example ++ ++A certain amount of wildcarding is permitted. If a pattern contains an @ ++character, but is not a regular expression and does not begin with a ++semicolon-terminated lookup type (described below), the local part of the ++subject address is compared with the local part of the pattern, which may start ++with an asterisk. If the local parts match, the domain is checked in exactly ++the same way as for a pattern in a domain list. For example, the domain can be ++wildcarded, refer to a named list, or be a lookup: ++ ++deny senders = *@*.spamming.site:\ ++ *@+hostile_domains:\ ++ bozo@partial-lsearch;/list/of/dodgy/sites:\ ++ *@dbm;/bad/domains.db ++ ++If a local part that begins with an exclamation mark is required, it has to be ++specified using a regular expression, because otherwise the exclamation mark is ++treated as a sign of negation, as is standard in lists. ++ ++If a non-empty pattern that is not a regular expression or a lookup does not ++contain an @ character, it is matched against the domain part of the subject ++address. The only two formats that are recognized this way are a literal ++domain, or a domain pattern that starts with *. In both these cases, the effect ++is the same as if "*@" preceded the pattern. For example: ++ ++deny senders = enemy.domain : *.enemy.domain ++ ++The following kinds of more complicated address list pattern can match any ++address, including the empty address that is characteristic of bounce message ++senders: ++ ++ * If (after expansion) a pattern starts with "^", a regular expression match ++ is done against the complete address, with the pattern as the regular ++ expression. You must take care that backslash and dollar characters are not ++ misinterpreted as part of the string expansion. The simplest way to do this ++ is to use "\N" to mark that part of the string as non-expandable. For ++ example: ++ ++ deny senders = \N^.*this.*@example\.com$\N : \ ++ \N^\d{8}.+@spamhaus.example$\N : ... ++ ++ The "\N" sequences are removed by the expansion, so these items do indeed ++ start with "^" by the time they are being interpreted as address patterns. ++ ++ * Complete addresses can be looked up by using a pattern that starts with a ++ lookup type terminated by a semicolon, followed by the data for the lookup. ++ For example: ++ ++ deny senders = cdb;/etc/blocked.senders : \ ++ mysql;select address from blocked where \ ++ address='${quote_mysql:$sender_address}' ++ ++ Both query-style and single-key lookup types can be used. For a single-key ++ lookup type, Exim uses the complete address as the key. However, empty keys ++ are not supported for single-key lookups, so a match against the empty ++ address always fails. This restriction does not apply to query-style ++ lookups. ++ ++ Partial matching for single-key lookups (section 9.7) cannot be used, and ++ is ignored if specified, with an entry being written to the panic log. ++ However, you can configure lookup defaults, as described in section 9.6, ++ but this is useful only for the "*@" type of default. For example, with ++ this lookup: ++ ++ accept senders = lsearch*@;/some/file ++ ++ the file could contains lines like this: ++ ++ user1@domain1.example ++ *@domain2.example ++ ++ and for the sender address nimrod@jaeger.example, the sequence of keys that ++ are tried is: ++ ++ nimrod@jaeger.example ++ *@jaeger.example ++ * ++ ++ Warning 1: Do not include a line keyed by "*" in the file, because that ++ would mean that every address matches, thus rendering the test useless. ++ ++ Warning 2: Do not confuse these two kinds of item: ++ ++ deny recipients = dbm*@;/some/file ++ deny recipients = *@dbm;/some/file ++ ++ The first does a whole address lookup, with defaulting, as just described, ++ because it starts with a lookup type. The second matches the local part and ++ domain independently, as described in a bullet point below. ++ ++The following kinds of address list pattern can match only non-empty addresses. ++If the subject address is empty, a match against any of these pattern types ++always fails. ++ ++ * If a pattern starts with "@@" followed by a single-key lookup item (for ++ example, "@@lsearch;/some/file"), the address that is being checked is ++ split into a local part and a domain. The domain is looked up in the file. ++ If it is not found, there is no match. If it is found, the data that is ++ looked up from the file is treated as a colon-separated list of local part ++ patterns, each of which is matched against the subject local part in turn. ++ ++ The lookup may be a partial one, and/or one involving a search for a ++ default keyed by "*" (see section 9.6). The local part patterns that are ++ looked up can be regular expressions or begin with "*", or even be further ++ lookups. They may also be independently negated. For example, with ++ ++ deny senders = @@dbm;/etc/reject-by-domain ++ ++ the data from which the DBM file is built could contain lines like ++ ++ baddomain.com: !postmaster : * ++ ++ to reject all senders except postmaster from that domain. ++ ++ If a local part that actually begins with an exclamation mark is required, ++ it has to be specified using a regular expression. In lsearch files, an ++ entry may be split over several lines by indenting the second and ++ subsequent lines, but the separating colon must still be included at line ++ breaks. White space surrounding the colons is ignored. For example: ++ ++ aol.com: spammer1 : spammer2 : ^[0-9]+$ : ++ spammer3 : spammer4 ++ ++ As in all colon-separated lists in Exim, a colon can be included in an item ++ by doubling. ++ ++ If the last item in the list starts with a right angle-bracket, the ++ remainder of the item is taken as a new key to look up in order to obtain a ++ continuation list of local parts. The new key can be any sequence of ++ characters. Thus one might have entries like ++ ++ aol.com: spammer1 : spammer 2 : >* ++ xyz.com: spammer3 : >* ++ *: ^\d{8}$ ++ ++ in a file that was searched with @@dbm*, to specify a match for 8-digit ++ local parts for all domains, in addition to the specific local parts listed ++ for each domain. Of course, using this feature costs another lookup each ++ time a chain is followed, but the effort needed to maintain the data is ++ reduced. ++ ++ It is possible to construct loops using this facility, and in order to ++ catch them, the chains may be no more than fifty items long. ++ ++ * The @@<lookup> style of item can also be used with a query-style lookup, ++ but in this case, the chaining facility is not available. The lookup can ++ only return a single list of local parts. ++ ++Warning: There is an important difference between the address list items in ++these two examples: ++ ++senders = +my_list ++senders = *@+my_list ++ ++In the first one, "my_list" is a named address list, whereas in the second ++example it is a named domain list. ++ ++ ++10.20 Case of letters in address lists ++-------------------------------------- ++ ++Domains in email addresses are always handled caselessly, but for local parts ++case may be significant on some systems (see caseful_local_part for how Exim ++deals with this when routing addresses). However, RFC 2505 (Anti-Spam ++Recommendations for SMTP MTAs) suggests that matching of addresses to blocking ++lists should be done in a case-independent manner. Since most address lists in ++Exim are used for this kind of control, Exim attempts to do this by default. ++ ++The domain portion of an address is always lowercased before matching it to an ++address list. The local part is lowercased by default, and any string ++comparisons that take place are done caselessly. This means that the data in ++the address list itself, in files included as plain file names, and in any file ++that is looked up using the "@@" mechanism, can be in any case. However, the ++keys in files that are looked up by a search type other than lsearch (which ++works caselessly) must be in lower case, because these lookups are not ++case-independent. ++ ++To allow for the possibility of caseful address list matching, if an item in an ++address list is the string "+caseful", the original case of the local part is ++restored for any comparisons that follow, and string comparisons are no longer ++case-independent. This does not affect the domain, which remains in lower case. ++However, although independent matches on the domain alone are still performed ++caselessly, regular expressions that match against an entire address become ++case-sensitive after "+caseful" has been seen. ++ ++ ++10.21 Local part lists ++---------------------- ++ ++Case-sensitivity in local part lists is handled in the same way as for address ++lists, as just described. The "+caseful" item can be used if required. In a ++setting of the local_parts option in a router with caseful_local_part set ++false, the subject is lowercased and the matching is initially ++case-insensitive. In this case, "+caseful" will restore case-sensitive matching ++in the local part list, but not elsewhere in the router. If caseful_local_part ++is set true in a router, matching in the local_parts option is case-sensitive ++from the start. ++ ++If a local part list is indirected to a file (see section 10.3), comments are ++handled in the same way as address lists - they are recognized only if the # is ++preceded by white space or the start of the line. Otherwise, local part lists ++are matched in the same way as domain lists, except that the special items that ++refer to the local host ("@", "@[]", "@mx_any", "@mx_primary", and ++"@mx_secondary") are not recognized. Refer to section 10.8 for details of the ++other available item types. ++ ++ ++ ++=============================================================================== ++11. STRING EXPANSIONS ++ ++Many strings in Exim's run time configuration are expanded before use. Some of ++them are expanded every time they are used; others are expanded only once. ++ ++When a string is being expanded it is copied verbatim from left to right except ++when a dollar or backslash character is encountered. A dollar specifies the ++start of a portion of the string that is interpreted and replaced as described ++below in section 11.5 onwards. Backslash is used as an escape character, as ++described in the following section. ++ ++Whether a string is expanded depends upon the context. Usually this is solely ++dependent upon the option for which a value is sought; in this documentation, ++options for which string expansion is performed are marked with * after the ++data type. ACL rules always expand strings. A couple of expansion conditions do ++not expand some of the brace-delimited branches, for security reasons. ++ ++ ++11.1 Literal text in expanded strings ++------------------------------------- ++ ++An uninterpreted dollar can be included in an expanded string by putting a ++backslash in front of it. A backslash can be used to prevent any special ++character being treated specially in an expansion, including backslash itself. ++If the string appears in quotes in the configuration file, two backslashes are ++required because the quotes themselves cause interpretation of backslashes when ++the string is read in (see section 6.16). ++ ++A portion of the string can specified as non-expandable by placing it between ++two occurrences of "\N". This is particularly useful for protecting regular ++expressions, which often contain backslashes and dollar signs. For example: ++ ++deny senders = \N^\d{8}[a-z]@some\.site\.example$\N ++ ++On encountering the first "\N", the expander copies subsequent characters ++without interpretation until it reaches the next "\N" or the end of the string. ++ ++ ++11.2 Character escape sequences in expanded strings ++--------------------------------------------------- ++ ++A backslash followed by one of the letters "n", "r", or "t" in an expanded ++string is recognized as an escape sequence for the character newline, carriage ++return, or tab, respectively. A backslash followed by up to three octal digits ++is recognized as an octal encoding for a single character, and a backslash ++followed by "x" and up to two hexadecimal digits is a hexadecimal encoding. ++ ++These escape sequences are also recognized in quoted strings when they are read ++in. Their interpretation in expansions as well is useful for unquoted strings, ++and for other cases such as looked-up strings that are then expanded. ++ ++ ++11.3 Testing string expansions ++------------------------------ ++ ++Many expansions can be tested by calling Exim with the -be option. This takes ++the command arguments, or lines from the standard input if there are no ++arguments, runs them through the string expansion code, and writes the results ++to the standard output. Variables based on configuration values are set up, but ++since no message is being processed, variables such as $local_part have no ++value. Nevertheless the -be option can be useful for checking out file and ++database lookups, and the use of expansion operators such as sg, substr and ++nhash. ++ ++Exim gives up its root privilege when it is called with the -be option, and ++instead runs under the uid and gid it was called with, to prevent users from ++using -be for reading files to which they do not have access. ++ ++If you want to test expansions that include variables whose values are taken ++from a message, there are two other options that can be used. The -bem option ++is like -be except that it is followed by a file name. The file is read as a ++message before doing the test expansions. For example: ++ ++exim -bem /tmp/test.message '$h_subject:' ++ ++The -Mset option is used in conjunction with -be and is followed by an Exim ++message identifier. For example: ++ ++exim -be -Mset 1GrA8W-0004WS-LQ '$recipients' ++ ++This loads the message from Exim's spool before doing the test expansions, and ++is therefore restricted to admin users. ++ ++ ++11.4 Forced expansion failure ++----------------------------- ++ ++A number of expansions that are described in the following section have ++alternative "true" and "false" substrings, enclosed in brace characters (which ++are sometimes called "curly brackets"). Which of the two strings is used ++depends on some condition that is evaluated as part of the expansion. If, ++instead of a "false" substring, the word "fail" is used (not in braces), the ++entire string expansion fails in a way that can be detected by the code that ++requested the expansion. This is called "forced expansion failure", and its ++consequences depend on the circumstances. In some cases it is no different from ++any other expansion failure, but in others a different action may be taken. ++Such variations are mentioned in the documentation of the option that is being ++expanded. ++ ++ ++11.5 Expansion items ++-------------------- ++ ++The following items are recognized in expanded strings. White space may be used ++between sub-items that are keywords or substrings enclosed in braces inside an ++outer set of braces, to improve readability. Warning: Within braces, white ++space is significant. ++ ++$<variable name> or ${<variable name>} ++ ++ Substitute the contents of the named variable, for example: ++ ++ $local_part ++ ${domain} ++ ++ The second form can be used to separate the name from subsequent ++ alphanumeric characters. This form (using braces) is available only for ++ variables; it does not apply to message headers. The names of the variables ++ are given in section 11.9 below. If the name of a non-existent variable is ++ given, the expansion fails. ++ ++${<op>:<string>} ++ ++ The string is first itself expanded, and then the operation specified by < ++ op> is applied to it. For example: ++ ++ ${lc:$local_part} ++ ++ The string starts with the first character after the colon, which may be ++ leading white space. A list of operators is given in section 11.6 below. ++ The operator notation is used for simple expansion items that have just one ++ argument, because it reduces the number of braces and therefore makes the ++ string easier to understand. ++ ++$bheader_<header name>: or $bh_<header name>: ++ ++ This item inserts "basic" header lines. It is described with the header ++ expansion item below. ++ ++${acl{<name>}{<arg>}...} ++ ++ The name and zero to nine argument strings are first expanded separately. ++ The expanded arguments are assigned to the variables $acl_arg1 to $acl_arg9 ++ in order. Any unused are made empty. The variable $acl_narg is set to the ++ number of arguments. The named ACL (see chapter 42) is called and may use ++ the variables; if another acl expansion is used the values are restored ++ after it returns. If the ACL sets a value using a "message =" modifier and ++ returns accept or deny, the value becomes the result of the expansion. If ++ no message is set and the ACL returns accept or deny the expansion result ++ is an empty string. If the ACL returns defer the result is a forced-fail. ++ Otherwise the expansion fails. ++ ++${dlfunc{<file>}{<function>}{<arg>}{<arg>}...} ++ ++ This expansion dynamically loads and then calls a locally-written C ++ function. This functionality is available only if Exim is compiled with ++ ++ EXPAND_DLFUNC=yes ++ ++ set in Local/Makefile. Once loaded, Exim remembers the dynamically loaded ++ object so that it doesn't reload the same object file in the same Exim ++ process (but of course Exim does start new processes frequently). ++ ++ There may be from zero to eight arguments to the function. When compiling a ++ local function that is to be called in this way, local_scan.h should be ++ included. The Exim variables and functions that are defined by that API are ++ also available for dynamically loaded functions. The function itself must ++ have the following type: ++ ++ int dlfunction(uschar **yield, int argc, uschar *argv[]) ++ ++ Where "uschar" is a typedef for "unsigned char" in local_scan.h. The ++ function should return one of the following values: ++ ++ "OK": Success. The string that is placed in the variable yield is put into ++ the expanded string that is being built. ++ ++ "FAIL": A non-forced expansion failure occurs, with the error message taken ++ from yield, if it is set. ++ ++ "FAIL_FORCED": A forced expansion failure occurs, with the error message ++ taken from yield if it is set. ++ ++ "ERROR": Same as "FAIL", except that a panic log entry is written. ++ ++ When compiling a function that is to be used in this way with gcc, you need ++ to add -shared to the gcc command. Also, in the Exim build-time ++ configuration, you must add -export-dynamic to EXTRALIBS. ++ ++${extract{<key>}{<string1>}{<string2>}{<string3>}} ++ ++ The key and <string1> are first expanded separately. Leading and trailing ++ white space is removed from the key (but not from any of the strings). The ++ key must not consist entirely of digits. The expanded <string1> must be of ++ the form: ++ ++ <key1> = <value1> <key2> = <value2> ... ++ ++ where the equals signs and spaces (but not both) are optional. If any of ++ the values contain white space, they must be enclosed in double quotes, and ++ any values that are enclosed in double quotes are subject to escape ++ processing as described in section 6.16. The expanded <string1> is searched ++ for the value that corresponds to the key. The search is case-insensitive. ++ If the key is found, <string2> is expanded, and replaces the whole item; ++ otherwise <string3> is used. During the expansion of <string2> the variable ++ $value contains the value that has been extracted. Afterwards, it is ++ restored to any previous value it might have had. ++ ++ If {<string3>} is omitted, the item is replaced by an empty string if the ++ key is not found. If {<string2>} is also omitted, the value that was ++ extracted is used. Thus, for example, these two expansions are identical, ++ and yield "2001": ++ ++ ${extract{gid}{uid=1984 gid=2001}} ++ ${extract{gid}{uid=1984 gid=2001}{$value}} ++ ++ Instead of {<string3>} the word "fail" (not in curly brackets) can appear, ++ for example: ++ ++ ${extract{Z}{A=... B=...}{$value} fail } ++ ++ This forces an expansion failure (see section 11.4); {<string2>} must be ++ present for "fail" to be recognized. ++ ++${extract{<number>}{<separators>}{<string1>}{<string2>}{<string3>}} ++ ++ The <number> argument must consist entirely of decimal digits, apart from ++ leading and trailing white space, which is ignored. This is what ++ distinguishes this form of extract from the previous kind. It behaves in ++ the same way, except that, instead of extracting a named field, it extracts ++ from <string1> the field whose number is given as the first argument. You ++ can use $value in <string2> or "fail" instead of <string3> as before. ++ ++ The fields in the string are separated by any one of the characters in the ++ separator string. These may include space or tab characters. The first ++ field is numbered one. If the number is negative, the fields are counted ++ from the end of the string, with the rightmost one numbered -1. If the ++ number given is zero, the entire string is returned. If the modulus of the ++ number is greater than the number of fields in the string, the result is ++ the expansion of <string3>, or the empty string if <string3> is not ++ provided. For example: ++ ++ ${extract{2}{:}{x:42:99:& Mailer::/bin/bash}} ++ ++ yields "42", and ++ ++ ${extract{-4}{:}{x:42:99:& Mailer::/bin/bash}} ++ ++ yields "99". Two successive separators mean that the field between them is ++ empty (for example, the fifth field above). ++ ++${filter{<string>}{<condition>}} ++ ++ After expansion, <string> is interpreted as a list, colon-separated by ++ default, but the separator can be changed in the usual way. For each item ++ in this list, its value is place in $item, and then the condition is ++ evaluated. If the condition is true, $item is added to the output as an ++ item in a new list; if the condition is false, the item is discarded. The ++ separator used for the output list is the same as the one used for the ++ input, but a separator setting is not included in the output. For example: ++ ++ ${filter{a:b:c}{!eq{$item}{b}} ++ ++ yields "a:c". At the end of the expansion, the value of $item is restored ++ to what it was before. See also the map and reduce expansion items. ++ ++${hash{<string1>}{<string2>}{<string3>}} ++ ++ This is a textual hashing function, and was the first to be implemented in ++ early versions of Exim. In current releases, there are other hashing ++ functions (numeric, MD5, and SHA-1), which are described below. ++ ++ The first two strings, after expansion, must be numbers. Call them <m> and ++ <n>. If you are using fixed values for these numbers, that is, if <string1> ++ and <string2> do not change when they are expanded, you can use the simpler ++ operator notation that avoids some of the braces: ++ ++ ${hash_<n>_<m>:<string>} ++ ++ The second number is optional (in both notations). If <n> is greater than ++ or equal to the length of the string, the expansion item returns the ++ string. Otherwise it computes a new string of length <n> by applying a ++ hashing function to the string. The new string consists of characters taken ++ from the first <m> characters of the string ++ ++ abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQWRSTUVWXYZ0123456789 ++ ++ If <m> is not present the value 26 is used, so that only lower case letters ++ appear. For example: ++ ++ $hash{3}{monty}} yields jmg ++ $hash{5}{monty}} yields monty ++ $hash{4}{62}{monty python}} yields fbWx ++ ++$header_<header name>: or $h_<header name>:, $bheader_<header name>: or $bh_< ++ header name>:, $rheader_<header name>: or $rh_<header name>: ++ ++ Substitute the contents of the named message header line, for example ++ ++ $header_reply-to: ++ ++ The newline that terminates a header line is not included in the expansion, ++ but internal newlines (caused by splitting the header line over several ++ physical lines) may be present. ++ ++ The difference between rheader, bheader, and header is in the way the data ++ in the header line is interpreted. ++ ++ + rheader gives the original "raw" content of the header line, with no ++ processing at all, and without the removal of leading and trailing ++ white space. ++ ++ + bheader removes leading and trailing white space, and then decodes ++ base64 or quoted-printable MIME "words" within the header text, but ++ does no character set translation. If decoding of what looks ++ superficially like a MIME "word" fails, the raw string is returned. If ++ decoding produces a binary zero character, it is replaced by a question ++ mark - this is what Exim does for binary zeros that are actually ++ received in header lines. ++ ++ + header tries to translate the string as decoded by bheader to a ++ standard character set. This is an attempt to produce the same string ++ as would be displayed on a user's MUA. If translation fails, the ++ bheader string is returned. Translation is attempted only on operating ++ systems that support the iconv() function. This is indicated by the ++ compile-time macro HAVE_ICONV in a system Makefile or in Local/Makefile ++ . ++ ++ In a filter file, the target character set for header can be specified by a ++ command of the following form: ++ ++ headers charset "UTF-8" ++ ++ This command affects all references to $h_ (or $header_) expansions in ++ subsequently obeyed filter commands. In the absence of this command, the ++ target character set in a filter is taken from the setting of the ++ headers_charset option in the runtime configuration. The value of this ++ option defaults to the value of HEADERS_CHARSET in Local/Makefile. The ++ ultimate default is ISO-8859-1. ++ ++ Header names follow the syntax of RFC 2822, which states that they may ++ contain any printing characters except space and colon. Consequently, curly ++ brackets do not terminate header names, and should not be used to enclose ++ them as if they were variables. Attempting to do so causes a syntax error. ++ ++ Only header lines that are common to all copies of a message are visible to ++ this mechanism. These are the original header lines that are received with ++ the message, and any that are added by an ACL statement or by a system ++ filter. Header lines that are added to a particular copy of a message by a ++ router or transport are not accessible. ++ ++ For incoming SMTP messages, no header lines are visible in ACLs that are ++ obeyed before the DATA ACL, because the header structure is not set up ++ until the message is received. Header lines that are added in a RCPT ACL ++ (for example) are saved until the message's incoming header lines are ++ available, at which point they are added. When a DATA ACL is running, ++ however, header lines added by earlier ACLs are visible. ++ ++ Upper case and lower case letters are synonymous in header names. If the ++ following character is white space, the terminating colon may be omitted, ++ but this is not recommended, because you may then forget it when it is ++ needed. When white space terminates the header name, it is included in the ++ expanded string. If the message does not contain the given header, the ++ expansion item is replaced by an empty string. (See the def condition in ++ section 11.7 for a means of testing for the existence of a header.) ++ ++ If there is more than one header with the same name, they are all ++ concatenated to form the substitution string, up to a maximum length of ++ 64K. Unless rheader is being used, leading and trailing white space is ++ removed from each header before concatenation, and a completely empty ++ header is ignored. A newline character is then inserted between non-empty ++ headers, but there is no newline at the very end. For the header and ++ bheader expansion, for those headers that contain lists of addresses, a ++ comma is also inserted at the junctions between headers. This does not ++ happen for the rheader expansion. ++ ++${hmac{<hashname>}{<secret>}{<string>}} ++ ++ This function uses cryptographic hashing (either MD5 or SHA-1) to convert a ++ shared secret and some text into a message authentication code, as ++ specified in RFC 2104. This differs from "${md5:secret_text...}" or "$ ++ {sha1:secret_text...}" in that the hmac step adds a signature to the ++ cryptographic hash, allowing for authentication that is not possible with ++ MD5 or SHA-1 alone. The hash name must expand to either "md5" or "sha1" at ++ present. For example: ++ ++ ${hmac{md5}{somesecret}{$primary_hostname $tod_log}} ++ ++ For the hostname mail.example.com and time 2002-10-17 11:30:59, this ++ produces: ++ ++ dd97e3ba5d1a61b5006108f8c8252953 ++ ++ As an example of how this might be used, you might put in the main part of ++ an Exim configuration: ++ ++ SPAMSCAN_SECRET=cohgheeLei2thahw ++ ++ In a router or a transport you could then have: ++ ++ headers_add = \ ++ X-Spam-Scanned: ${primary_hostname} ${message_exim_id} \ ++ ${hmac{md5}{SPAMSCAN_SECRET}\ ++ {${primary_hostname},${message_exim_id},$h_message-id:}} ++ ++ Then given a message, you can check where it was scanned by looking at the ++ X-Spam-Scanned: header line. If you know the secret, you can check that ++ this header line is authentic by recomputing the authentication code from ++ the host name, message ID and the Message-id: header line. This can be done ++ using Exim's -be option, or by other means, for example by using the ++ hmac_md5_hex() function in Perl. ++ ++${if <condition> {<string1>}{<string2>}} ++ ++ If <condition> is true, <string1> is expanded and replaces the whole item; ++ otherwise <string2> is used. The available conditions are described in ++ section 11.7 below. For example: ++ ++ ${if eq {$local_part}{postmaster} {yes}{no} } ++ ++ The second string need not be present; if it is not and the condition is ++ not true, the item is replaced with nothing. Alternatively, the word "fail" ++ may be present instead of the second string (without any curly brackets). ++ In this case, the expansion is forced to fail if the condition is not true ++ (see section 11.4). ++ ++ If both strings are omitted, the result is the string "true" if the ++ condition is true, and the empty string if the condition is false. This ++ makes it less cumbersome to write custom ACL and router conditions. For ++ example, instead of ++ ++ condition = ${if >{$acl_m4}{3}{true}{false}} ++ ++ you can use ++ ++ condition = ${if >{$acl_m4}{3}} ++ ++${length{<string1>}{<string2>}} ++ ++ The length item is used to extract the initial portion of a string. Both ++ strings are expanded, and the first one must yield a number, <n>, say. If ++ you are using a fixed value for the number, that is, if <string1> does not ++ change when expanded, you can use the simpler operator notation that avoids ++ some of the braces: ++ ++ ${length_<n>:<string>} ++ ++ The result of this item is either the first <n> characters or the whole of ++ <string2>, whichever is the shorter. Do not confuse length with strlen, ++ which gives the length of a string. ++ ++${lookup{<key>} <search type> {<file>} {<string1>} {<string2>}} ++ ++ This is the first of one of two different types of lookup item, which are ++ both described in the next item. ++ ++${lookup <search type> {<query>} {<string1>} {<string2>}} ++ ++ The two forms of lookup item specify data lookups in files and databases, ++ as discussed in chapter 9. The first form is used for single-key lookups, ++ and the second is used for query-style lookups. The <key>, <file>, and < ++ query> strings are expanded before use. ++ ++ If there is any white space in a lookup item which is part of a filter ++ command, a retry or rewrite rule, a routing rule for the manualroute ++ router, or any other place where white space is significant, the lookup ++ item must be enclosed in double quotes. The use of data lookups in users' ++ filter files may be locked out by the system administrator. ++ ++ If the lookup succeeds, <string1> is expanded and replaces the entire item. ++ During its expansion, the variable $value contains the data returned by the ++ lookup. Afterwards it reverts to the value it had previously (at the outer ++ level it is empty). If the lookup fails, <string2> is expanded and replaces ++ the entire item. If {<string2>} is omitted, the replacement is the empty ++ string on failure. If <string2> is provided, it can itself be a nested ++ lookup, thus providing a mechanism for looking up a default value when the ++ original lookup fails. ++ ++ If a nested lookup is used as part of <string1>, $value contains the data ++ for the outer lookup while the parameters of the second lookup are ++ expanded, and also while <string2> of the second lookup is expanded, should ++ the second lookup fail. Instead of {<string2>} the word "fail" can appear, ++ and in this case, if the lookup fails, the entire expansion is forced to ++ fail (see section 11.4). If both {<string1>} and {<string2>} are omitted, ++ the result is the looked up value in the case of a successful lookup, and ++ nothing in the case of failure. ++ ++ For single-key lookups, the string "partial" is permitted to precede the ++ search type in order to do partial matching, and * or *@ may follow a ++ search type to request default lookups if the key does not match (see ++ sections 9.6 and 9.7 for details). ++ ++ If a partial search is used, the variables $1 and $2 contain the wild and ++ non-wild parts of the key during the expansion of the replacement text. ++ They return to their previous values at the end of the lookup item. ++ ++ This example looks up the postmaster alias in the conventional alias file: ++ ++ ${lookup {postmaster} lsearch {/etc/aliases} {$value}} ++ ++ This example uses NIS+ to look up the full name of the user corresponding ++ to the local part of an address, forcing the expansion to fail if it is not ++ found: ++ ++ ${lookup nisplus {[name=$local_part],passwd.org_dir:gcos} \ ++ {$value}fail} ++ ++${map{<string1>}{<string2>}} ++ ++ After expansion, <string1> is interpreted as a list, colon-separated by ++ default, but the separator can be changed in the usual way. For each item ++ in this list, its value is place in $item, and then <string2> is expanded ++ and added to the output as an item in a new list. The separator used for ++ the output list is the same as the one used for the input, but a separator ++ setting is not included in the output. For example: ++ ++ ${map{a:b:c}{[$item]}} ${map{<- x-y-z}{($item)}} ++ ++ expands to "[a]:[b]:[c] (x)-(y)-(z)". At the end of the expansion, the ++ value of $item is restored to what it was before. See also the filter and ++ reduce expansion items. ++ ++${nhash{<string1>}{<string2>}{<string3>}} ++ ++ The three strings are expanded; the first two must yield numbers. Call them ++ <n> and <m>. If you are using fixed values for these numbers, that is, if < ++ string1> and <string2> do not change when they are expanded, you can use ++ the simpler operator notation that avoids some of the braces: ++ ++ ${nhash_<n>_<m>:<string>} ++ ++ The second number is optional (in both notations). If there is only one ++ number, the result is a number in the range 0-<n>-1. Otherwise, the string ++ is processed by a div/mod hash function that returns two numbers, separated ++ by a slash, in the ranges 0 to <n>-1 and 0 to <m>-1, respectively. For ++ example, ++ ++ ${nhash{8}{64}{supercalifragilisticexpialidocious}} ++ ++ returns the string "6/33". ++ ++${perl{<subroutine>}{<arg>}{<arg>}...} ++ ++ This item is available only if Exim has been built to include an embedded ++ Perl interpreter. The subroutine name and the arguments are first ++ separately expanded, and then the Perl subroutine is called with those ++ arguments. No additional arguments need be given; the maximum number ++ permitted, including the name of the subroutine, is nine. ++ ++ The return value of the subroutine is inserted into the expanded string, ++ unless the return value is undef. In that case, the expansion fails in the ++ same way as an explicit "fail" on a lookup item. The return value is a ++ scalar. Whatever you return is evaluated in a scalar context. For example, ++ if you return the name of a Perl vector, the return value is the size of ++ the vector, not its contents. ++ ++ If the subroutine exits by calling Perl's die function, the expansion fails ++ with the error message that was passed to die. More details of the embedded ++ Perl facility are given in chapter 12. ++ ++ The redirect router has an option called forbid_filter_perl which locks out ++ the use of this expansion item in filter files. ++ ++${prvs{<address>}{<secret>}{<keynumber>}} ++ ++ The first argument is a complete email address and the second is secret ++ keystring. The third argument, specifying a key number, is optional. If ++ absent, it defaults to 0. The result of the expansion is a prvs-signed ++ email address, to be typically used with the return_path option on an smtp ++ transport as part of a bounce address tag validation (BATV) scheme. For ++ more discussion and an example, see section 42.50. ++ ++${prvscheck{<address>}{<secret>}{<string>}} ++ ++ This expansion item is the complement of the prvs item. It is used for ++ checking prvs-signed addresses. If the expansion of the first argument does ++ not yield a syntactically valid prvs-signed address, the whole item expands ++ to the empty string. When the first argument does expand to a syntactically ++ valid prvs-signed address, the second argument is expanded, with the ++ prvs-decoded version of the address and the key number extracted from the ++ address in the variables $prvscheck_address and $prvscheck_keynum, ++ respectively. ++ ++ These two variables can be used in the expansion of the second argument to ++ retrieve the secret. The validity of the prvs-signed address is then ++ checked against the secret. The result is stored in the variable ++ $prvscheck_result, which is empty for failure or "1" for success. ++ ++ The third argument is optional; if it is missing, it defaults to an empty ++ string. This argument is now expanded. If the result is an empty string, ++ the result of the expansion is the decoded version of the address. This is ++ the case whether or not the signature was valid. Otherwise, the result of ++ the expansion is the expansion of the third argument. ++ ++ All three variables can be used in the expansion of the third argument. ++ However, once the expansion is complete, only $prvscheck_result remains ++ set. For more discussion and an example, see section 42.50. ++ ++${readfile{<file name>}{<eol string>}} ++ ++ The file name and end-of-line string are first expanded separately. The ++ file is then read, and its contents replace the entire item. All newline ++ characters in the file are replaced by the end-of-line string if it is ++ present. Otherwise, newlines are left in the string. String expansion is ++ not applied to the contents of the file. If you want this, you must wrap ++ the item in an expand operator. If the file cannot be read, the string ++ expansion fails. ++ ++ The redirect router has an option called forbid_filter_readfile which locks ++ out the use of this expansion item in filter files. ++ ++${readsocket{<name>}{<request>}{<timeout>}{<eol string>}{<fail string>}} ++ ++ This item inserts data from a Unix domain or Internet socket into the ++ expanded string. The minimal way of using it uses just two arguments, as in ++ these examples: ++ ++ ${readsocket{/socket/name}{request string}} ++ ${readsocket{inet:some.host:1234}{request string}} ++ ++ For a Unix domain socket, the first substring must be the path to the ++ socket. For an Internet socket, the first substring must contain "inet:" ++ followed by a host name or IP address, followed by a colon and a port, ++ which can be a number or the name of a TCP port in /etc/services. An IP ++ address may optionally be enclosed in square brackets. This is best for ++ IPv6 addresses. For example: ++ ++ ${readsocket{inet:[::1]:1234}{request string}} ++ ++ Only a single host name may be given, but if looking it up yields more than ++ one IP address, they are each tried in turn until a connection is made. For ++ both kinds of socket, Exim makes a connection, writes the request string ++ (unless it is an empty string) and reads from the socket until an ++ end-of-file is read. A timeout of 5 seconds is applied. Additional, ++ optional arguments extend what can be done. Firstly, you can vary the ++ timeout. For example: ++ ++ ${readsocket{/socket/name}{request string}{3s}} ++ ++ A fourth argument allows you to change any newlines that are in the data ++ that is read, in the same way as for readfile (see above). This example ++ turns them into spaces: ++ ++ ${readsocket{inet:127.0.0.1:3294}{request string}{3s}{ }} ++ ++ As with all expansions, the substrings are expanded before the processing ++ happens. Errors in these sub-expansions cause the expansion to fail. In ++ addition, the following errors can occur: ++ ++ + Failure to create a socket file descriptor; ++ ++ + Failure to connect the socket; ++ ++ + Failure to write the request string; ++ ++ + Timeout on reading from the socket. ++ ++ By default, any of these errors causes the expansion to fail. However, if ++ you supply a fifth substring, it is expanded and used when any of the above ++ errors occurs. For example: ++ ++ ${readsocket{/socket/name}{request string}{3s}{\n}\ ++ {socket failure}} ++ ++ You can test for the existence of a Unix domain socket by wrapping this ++ expansion in "${if exists", but there is a race condition between that test ++ and the actual opening of the socket, so it is safer to use the fifth ++ argument if you want to be absolutely sure of avoiding an expansion error ++ for a non-existent Unix domain socket, or a failure to connect to an ++ Internet socket. ++ ++ The redirect router has an option called forbid_filter_readsocket which ++ locks out the use of this expansion item in filter files. ++ ++${reduce{<string1>}{<string2>}{<string3>}} ++ ++ This operation reduces a list to a single, scalar string. After expansion, ++ <string1> is interpreted as a list, colon-separated by default, but the ++ separator can be changed in the usual way. Then <string2> is expanded and ++ assigned to the $value variable. After this, each item in the <string1> ++ list is assigned to $item in turn, and <string3> is expanded for each of ++ them. The result of that expansion is assigned to $value before the next ++ iteration. When the end of the list is reached, the final value of $value ++ is added to the expansion output. The reduce expansion item can be used in ++ a number of ways. For example, to add up a list of numbers: ++ ++ ${reduce {<, 1,2,3}{0}{${eval:$value+$item}}} ++ ++ The result of that expansion would be "6". The maximum of a list of numbers ++ can be found: ++ ++ ${reduce {3:0:9:4:6}{0}{${if >{$item}{$value}{$item}{$value}}}} ++ ++ At the end of a reduce expansion, the values of $item and $value are ++ restored to what they were before. See also the filter and map expansion ++ items. ++ ++$rheader_<header name>: or $rh_<header name>: ++ ++ This item inserts "raw" header lines. It is described with the header ++ expansion item above. ++ ++${run{<command> <args>}{<string1>}{<string2>}} ++ ++ The command and its arguments are first expanded separately, and then the ++ command is run in a separate process, but under the same uid and gid. As in ++ other command executions from Exim, a shell is not used by default. If you ++ want a shell, you must explicitly code it. ++ ++ The standard input for the command exists, but is empty. The standard ++ output and standard error are set to the same file descriptor. If the ++ command succeeds (gives a zero return code) <string1> is expanded and ++ replaces the entire item; during this expansion, the standard output/error ++ from the command is in the variable $value. If the command fails, <string2 ++ >, if present, is expanded and used. Once again, during the expansion, the ++ standard output/error from the command is in the variable $value. ++ ++ If <string2> is absent, the result is empty. Alternatively, <string2> can ++ be the word "fail" (not in braces) to force expansion failure if the ++ command does not succeed. If both strings are omitted, the result is ++ contents of the standard output/error on success, and nothing on failure. ++ ++ The standard output/error of the command is put in the variable $value. In ++ this ACL example, the output of a command is logged for the admin to ++ troubleshoot: ++ ++ warn condition = ${run{/usr/bin/id}{yes}{no}} ++ log_message = Output of id: $value ++ ++ If the command requires shell idioms, such as the > redirect operator, the ++ shell must be invoked directly, such as with: ++ ++ ${run{/bin/bash -c "/usr/bin/id >/tmp/id"}{yes}{yes}} ++ ++ The return code from the command is put in the variable $runrc, and this ++ remains set afterwards, so in a filter file you can do things like this: ++ ++ if "${run{x y z}{}}$runrc" is 1 then ... ++ elif $runrc is 2 then ... ++ ... ++ endif ++ ++ If execution of the command fails (for example, the command does not ++ exist), the return code is 127 - the same code that shells use for ++ non-existent commands. ++ ++ Warning: In a router or transport, you cannot assume the order in which ++ option values are expanded, except for those preconditions whose order of ++ testing is documented. Therefore, you cannot reliably expect to set $runrc ++ by the expansion of one option, and use it in another. ++ ++ The redirect router has an option called forbid_filter_run which locks out ++ the use of this expansion item in filter files. ++ ++${sg{<subject>}{<regex>}{<replacement>}} ++ ++ This item works like Perl's substitution operator (s) with the global (/g) ++ option; hence its name. However, unlike the Perl equivalent, Exim does not ++ modify the subject string; instead it returns the modified string for ++ insertion into the overall expansion. The item takes three arguments: the ++ subject string, a regular expression, and a substitution string. For ++ example: ++ ++ ${sg{abcdefabcdef}{abc}{xyz}} ++ ++ yields "xyzdefxyzdef". Because all three arguments are expanded before use, ++ if any $ or \ characters are required in the regular expression or in the ++ substitution string, they have to be escaped. For example: ++ ++ ${sg{abcdef}{^(...)(...)\$}{\$2\$1}} ++ ++ yields "defabc", and ++ ++ ${sg{1=A 4=D 3=C}{\N(\d+)=\N}{K\$1=}} ++ ++ yields "K1=A K4=D K3=C". Note the use of "\N" to protect the contents of ++ the regular expression from string expansion. ++ ++${substr{<string1>}{<string2>}{<string3>}} ++ ++ The three strings are expanded; the first two must yield numbers. Call them ++ <n> and <m>. If you are using fixed values for these numbers, that is, if < ++ string1> and <string2> do not change when they are expanded, you can use ++ the simpler operator notation that avoids some of the braces: ++ ++ ${substr_<n>_<m>:<string>} ++ ++ The second number is optional (in both notations). If it is absent in the ++ simpler format, the preceding underscore must also be omitted. ++ ++ The substr item can be used to extract more general substrings than length. ++ The first number, <n>, is a starting offset, and <m> is the length ++ required. For example ++ ++ ${substr{3}{2}{$local_part}} ++ ++ If the starting offset is greater than the string length the result is the ++ null string; if the length plus starting offset is greater than the string ++ length, the result is the right-hand part of the string, starting from the ++ given offset. The first character in the string has offset zero. ++ ++ The substr expansion item can take negative offset values to count from the ++ right-hand end of its operand. The last character is offset -1, the ++ second-last is offset -2, and so on. Thus, for example, ++ ++ ${substr{-5}{2}{1234567}} ++ ++ yields "34". If the absolute value of a negative offset is greater than the ++ length of the string, the substring starts at the beginning of the string, ++ and the length is reduced by the amount of overshoot. Thus, for example, ++ ++ ${substr{-5}{2}{12}} ++ ++ yields an empty string, but ++ ++ ${substr{-3}{2}{12}} ++ ++ yields "1". ++ ++ When the second number is omitted from substr, the remainder of the string ++ is taken if the offset is positive. If it is negative, all characters in ++ the string preceding the offset point are taken. For example, an offset of ++ -1 and no length, as in these semantically identical examples: ++ ++ ${substr_-1:abcde} ++ ${substr{-1}{abcde}} ++ ++ yields all but the last character of the string, that is, "abcd". ++ ++${tr{<subject>}{<characters>}{<replacements>}} ++ ++ This item does single-character translation on its subject string. The ++ second argument is a list of characters to be translated in the subject ++ string. Each matching character is replaced by the corresponding character ++ from the replacement list. For example ++ ++ ${tr{abcdea}{ac}{13}} ++ ++ yields "1b3de1". If there are duplicates in the second character string, ++ the last occurrence is used. If the third string is shorter than the ++ second, its last character is replicated. However, if it is empty, no ++ translation takes place. ++ ++ ++11.6 Expansion operators ++------------------------ ++ ++For expansion items that perform transformations on a single argument string, ++the "operator" notation is used because it is simpler and uses fewer braces. ++The substring is first expanded before the operation is applied to it. The ++following operations can be performed: ++ ++${address:<string>} ++ ++ The string is interpreted as an RFC 2822 address, as it might appear in a ++ header line, and the effective address is extracted from it. If the string ++ does not parse successfully, the result is empty. ++ ++${addresses:<string>} ++ ++ The string (after expansion) is interpreted as a list of addresses in RFC ++ 2822 format, such as can be found in a To: or Cc: header line. The ++ operative address (local-part@domain) is extracted from each item, and the ++ result of the expansion is a colon-separated list, with appropriate ++ doubling of colons should any happen to be present in the email addresses. ++ Syntactically invalid RFC2822 address items are omitted from the output. ++ ++ It is possible to specify a character other than colon for the output ++ separator by starting the string with > followed by the new separator ++ character. For example: ++ ++ ${addresses:>& Chief <ceo@up.stairs>, sec@base.ment (dogsbody)} ++ ++ expands to "ceo@up.stairs&sec@base.ment". Compare the address (singular) ++ expansion item, which extracts the working address from a single RFC2822 ++ address. See the filter, map, and reduce items for ways of processing ++ lists. ++ ++${base62:<digits>} ++ ++ The string must consist entirely of decimal digits. The number is converted ++ to base 62 and output as a string of six characters, including leading ++ zeros. In the few operating environments where Exim uses base 36 instead of ++ base 62 for its message identifiers (because those systems do not have ++ case-sensitive file names), base 36 is used by this operator, despite its ++ name. Note: Just to be absolutely clear: this is not base64 encoding. ++ ++${base62d:<base-62 digits>} ++ ++ The string must consist entirely of base-62 digits, or, in operating ++ environments where Exim uses base 36 instead of base 62 for its message ++ identifiers, base-36 digits. The number is converted to decimal and output ++ as a string. ++ ++${domain:<string>} ++ ++ The string is interpreted as an RFC 2822 address and the domain is ++ extracted from it. If the string does not parse successfully, the result is ++ empty. ++ ++${escape:<string>} ++ ++ If the string contains any non-printing characters, they are converted to ++ escape sequences starting with a backslash. Whether characters with the ++ most significant bit set (so-called "8-bit characters") count as printing ++ or not is controlled by the print_topbitchars option. ++ ++${eval:<string>} and ${eval10:<string>} ++ ++ These items supports simple arithmetic and bitwise logical operations in ++ expansion strings. The string (after expansion) must be a conventional ++ arithmetic expression, but it is limited to basic arithmetic operators, ++ bitwise logical operators, and parentheses. All operations are carried out ++ using integer arithmetic. The operator priorities are as follows (the same ++ as in the C programming language): ++ ++ highest: not (~), negate (-) ++ multiply (*), divide (/), remainder (%) ++ plus (+), minus (-) ++ shift-left (<<), shift-right (>>) ++ and (&) ++ xor (^) ++ lowest: or (|) ++ ++ Binary operators with the same priority are evaluated from left to right. ++ White space is permitted before or after operators. ++ ++ For eval, numbers may be decimal, octal (starting with "0") or hexadecimal ++ (starting with "0x"). For eval10, all numbers are taken as decimal, even if ++ they start with a leading zero; hexadecimal numbers are not permitted. This ++ can be useful when processing numbers extracted from dates or times, which ++ often do have leading zeros. ++ ++ A number may be followed by "K", "M" or "G" to multiply it by 1024, ++ 1024*1024 or 1024*1024*1024, respectively. Negative numbers are supported. ++ The result of the computation is a decimal representation of the answer ++ (without "K", "M" or "G"). For example: ++ ++ ${eval:1+1} yields 2 ++ ${eval:1+2*3} yields 7 ++ ${eval:(1+2)*3} yields 9 ++ ${eval:2+42%5} yields 4 ++ ${eval:0xc&5} yields 4 ++ ${eval:0xc|5} yields 13 ++ ${eval:0xc^5} yields 9 ++ ${eval:0xc>>1} yields 6 ++ ${eval:0xc<<1} yields 24 ++ ${eval:~255&0x1234} yields 4608 ++ ${eval:-(~255&0x1234)} yields -4608 ++ ++ As a more realistic example, in an ACL you might have ++ ++ deny message = Too many bad recipients ++ condition = \ ++ ${if and { \ ++ {>{$rcpt_count}{10}} \ ++ { \ ++ < \ ++ {$recipients_count} \ ++ {${eval:$rcpt_count/2}} \ ++ } \ ++ }{yes}{no}} ++ ++ The condition is true if there have been more than 10 RCPT commands and ++ fewer than half of them have resulted in a valid recipient. ++ ++${expand:<string>} ++ ++ The expand operator causes a string to be expanded for a second time. For ++ example, ++ ++ ${expand:${lookup{$domain}dbm{/some/file}{$value}}} ++ ++ first looks up a string in a file while expanding the operand for expand, ++ and then re-expands what it has found. ++ ++${from_utf8:<string>} ++ ++ The world is slowly moving towards Unicode, although there are no standards ++ for email yet. However, other applications (including some databases) are ++ starting to store data in Unicode, using UTF-8 encoding. This operator ++ converts from a UTF-8 string to an ISO-8859-1 string. UTF-8 code values ++ greater than 255 are converted to underscores. The input must be a valid ++ UTF-8 string. If it is not, the result is an undefined sequence of bytes. ++ ++ Unicode code points with values less than 256 are compatible with ASCII and ++ ISO-8859-1 (also known as Latin-1). For example, character 169 is the ++ copyright symbol in both cases, though the way it is encoded is different. ++ In UTF-8, more than one byte is needed for characters with code values ++ greater than 127, whereas ISO-8859-1 is a single-byte encoding (but thereby ++ limited to 256 characters). This makes translation from UTF-8 to ISO-8859-1 ++ straightforward. ++ ++${hash_<n>_<m>:<string>} ++ ++ The hash operator is a simpler interface to the hashing function that can ++ be used when the two parameters are fixed numbers (as opposed to strings ++ that change when expanded). The effect is the same as ++ ++ ${hash{<n>}{<m>}{<string>}} ++ ++ See the description of the general hash item above for details. The ++ abbreviation h can be used when hash is used as an operator. ++ ++${hex2b64:<hexstring>} ++ ++ This operator converts a hex string into one that is base64 encoded. This ++ can be useful for processing the output of the MD5 and SHA-1 hashing ++ functions. ++ ++${hexquote:<string>} ++ ++ This operator converts non-printable characters in a string into a hex ++ escape form. Byte values between 33 (!) and 126 (~) inclusive are left as ++ is, and other byte values are converted to "\xNN", for example a byt value ++ 127 is converted to "\x7f". ++ ++${lc:<string>} ++ ++ This forces the letters in the string into lower-case, for example: ++ ++ ${lc:$local_part} ++ ++${length_<number>:<string>} ++ ++ The length operator is a simpler interface to the length function that can ++ be used when the parameter is a fixed number (as opposed to a string that ++ changes when expanded). The effect is the same as ++ ++ ${length{<number>}{<string>}} ++ ++ See the description of the general length item above for details. Note that ++ length is not the same as strlen. The abbreviation l can be used when ++ length is used as an operator. ++ ++${listcount:<string>} ++ ++ The string is interpreted as a list and the number of items is returned. ++ ++${listnamed:<name>} and ${list_<type>name>} ++ ++ The name is interpreted as a named list and the content of the list is ++ returned, expanding any referenced lists, re-quoting as needed for ++ colon-separation. If the optional type if given it must be one of "a", "d", ++ "h" or "l" and selects address-, domain-, host- or localpart- lists to ++ search among respectively. Otherwise all types are searched in an undefined ++ order and the first matching list is returned. ++ ++${local_part:<string>} ++ ++ The string is interpreted as an RFC 2822 address and the local part is ++ extracted from it. If the string does not parse successfully, the result is ++ empty. ++ ++${mask:<IP address>/<bit count>} ++ ++ If the form of the string to be operated on is not an IP address followed ++ by a slash and an integer (that is, a network address in CIDR notation), ++ the expansion fails. Otherwise, this operator converts the IP address to ++ binary, masks off the least significant bits according to the bit count, ++ and converts the result back to text, with mask appended. For example, ++ ++ ${mask:10.111.131.206/28} ++ ++ returns the string "10.111.131.192/28". Since this operation is expected to ++ be mostly used for looking up masked addresses in files, the result for an ++ IPv6 address uses dots to separate components instead of colons, because ++ colon terminates a key string in lsearch files. So, for example, ++ ++ ${mask:3ffe:ffff:836f:0a00:000a:0800:200a:c031/99} ++ ++ returns the string ++ ++ 3ffe.ffff.836f.0a00.000a.0800.2000.0000/99 ++ ++ Letters in IPv6 addresses are always output in lower case. ++ ++${md5:<string>} ++ ++ The md5 operator computes the MD5 hash value of the string, and returns it ++ as a 32-digit hexadecimal number, in which any letters are in lower case. ++ ++${nhash_<n>_<m>:<string>} ++ ++ The nhash operator is a simpler interface to the numeric hashing function ++ that can be used when the two parameters are fixed numbers (as opposed to ++ strings that change when expanded). The effect is the same as ++ ++ ${nhash{<n>}{<m>}{<string>}} ++ ++ See the description of the general nhash item above for details. ++ ++${quote:<string>} ++ ++ The quote operator puts its argument into double quotes if it is an empty ++ string or contains anything other than letters, digits, underscores, dots, ++ and hyphens. Any occurrences of double quotes and backslashes are escaped ++ with a backslash. Newlines and carriage returns are converted to "\n" and " ++ \r", respectively For example, ++ ++ ${quote:ab"*"cd} ++ ++ becomes ++ ++ "ab\"*\"cd" ++ ++ The place where this is useful is when the argument is a substitution from ++ a variable or a message header. ++ ++${quote_local_part:<string>} ++ ++ This operator is like quote, except that it quotes the string only if ++ required to do so by the rules of RFC 2822 for quoting local parts. For ++ example, a plus sign would not cause quoting (but it would for quote). If ++ you are creating a new email address from the contents of $local_part (or ++ any other unknown data), you should always use this operator. ++ ++${quote_<lookup-type>:<string>} ++ ++ This operator applies lookup-specific quoting rules to the string. Each ++ query-style lookup type has its own quoting rules which are described with ++ the lookups in chapter 9. For example, ++ ++ ${quote_ldap:two * two} ++ ++ returns ++ ++ two%20%5C2A%20two ++ ++ For single-key lookup types, no quoting is ever necessary and this operator ++ yields an unchanged string. ++ ++${randint:<n>} ++ ++ This operator returns a somewhat random number which is less than the ++ supplied number and is at least 0. The quality of this randomness depends ++ on how Exim was built; the values are not suitable for keying material. If ++ Exim is linked against OpenSSL then RAND_pseudo_bytes() is used. If Exim is ++ linked against GnuTLS then gnutls_rnd(GNUTLS_RND_NONCE) is used, for ++ versions of GnuTLS with that function. Otherwise, the implementation may be ++ arc4random(), random() seeded by srandomdev() or srandom(), or a custom ++ implementation even weaker than random(). ++ ++${reverse_ip:<ipaddr>} ++ ++ This operator reverses an IP address; for IPv4 addresses, the result is in ++ dotted-quad decimal form, while for IPv6 addreses the result is in ++ dotted-nibble hexadecimal form. In both cases, this is the "natural" form ++ for DNS. For example, ++ ++ ${reverse_ip:192.0.2.4} ++ ${reverse_ip:2001:0db8:c42:9:1:abcd:192.0.2.127} ++ ++ returns ++ ++ 4.2.0.192 ++ f.7.2.0.0.0.0.c.d.c.b.a.1.0.0.0.9.0.0.0.2.4.c.0.8.b.d.0.1.0.0.2 ++ ++${rfc2047:<string>} ++ ++ This operator encodes text according to the rules of RFC 2047. This is an ++ encoding that is used in header lines to encode non-ASCII characters. It is ++ assumed that the input string is in the encoding specified by the ++ headers_charset option, which defaults to ISO-8859-1. If the string ++ contains only characters in the range 33-126, and no instances of the ++ characters ++ ++ ? = ( ) < > @ , ; : \ " . [ ] _ ++ ++ it is not modified. Otherwise, the result is the RFC 2047 encoding of the ++ string, using as many "encoded words" as necessary to encode all the ++ characters. ++ ++${rfc2047d:<string>} ++ ++ This operator decodes strings that are encoded as per RFC 2047. Binary zero ++ bytes are replaced by question marks. Characters are converted into the ++ character set defined by headers_charset. Overlong RFC 2047 "words" are not ++ recognized unless check_rfc2047_length is set false. ++ ++ Note: If you use $header_xxx: (or $h_xxx:) to access a header line, RFC ++ 2047 decoding is done automatically. You do not need to use this operator ++ as well. ++ ++${rxquote:<string>} ++ ++ The rxquote operator inserts a backslash before any non-alphanumeric ++ characters in its argument. This is useful when substituting the values of ++ variables or headers inside regular expressions. ++ ++${sha1:<string>} ++ ++ The sha1 operator computes the SHA-1 hash value of the string, and returns ++ it as a 40-digit hexadecimal number, in which any letters are in upper ++ case. ++ ++${stat:<string>} ++ ++ The string, after expansion, must be a file path. A call to the stat() ++ function is made for this path. If stat() fails, an error occurs and the ++ expansion fails. If it succeeds, the data from the stat replaces the item, ++ as a series of <name>=<value> pairs, where the values are all numerical, ++ except for the value of "smode". The names are: "mode" (giving the mode as ++ a 4-digit octal number), "smode" (giving the mode in symbolic format as a ++ 10-character string, as for the ls command), "inode", "device", "links", ++ "uid", "gid", "size", "atime", "mtime", and "ctime". You can extract ++ individual fields using the extract expansion item. ++ ++ The use of the stat expansion in users' filter files can be locked out by ++ the system administrator. Warning: The file size may be incorrect on 32-bit ++ systems for files larger than 2GB. ++ ++${str2b64:<string>} ++ ++ This operator converts a string into one that is base64 encoded. ++ ++${strlen:<string>} ++ ++ The item is replace by the length of the expanded string, expressed as a ++ decimal number. Note: Do not confuse strlen with length. ++ ++${substr_<start>_<length>:<string>} ++ ++ The substr operator is a simpler interface to the substr function that can ++ be used when the two parameters are fixed numbers (as opposed to strings ++ that change when expanded). The effect is the same as ++ ++ ${substr{<start>}{<length>}{<string>}} ++ ++ See the description of the general substr item above for details. The ++ abbreviation s can be used when substr is used as an operator. ++ ++${time_eval:<string>} ++ ++ This item converts an Exim time interval such as "2d4h5m" into a number of ++ seconds. ++ ++${time_interval:<string>} ++ ++ The argument (after sub-expansion) must be a sequence of decimal digits ++ that represents an interval of time as a number of seconds. It is converted ++ into a number of larger units and output in Exim's normal time format, for ++ example, "1w3d4h2m6s". ++ ++${uc:<string>} ++ ++ This forces the letters in the string into upper-case. ++ ++ ++11.7 Expansion conditions ++------------------------- ++ ++The following conditions are available for testing by the ${if construct while ++expanding strings: ++ ++!<condition> ++ ++ Preceding any condition with an exclamation mark negates the result of the ++ condition. ++ ++<symbolic operator> {<string1>}{<string2>} ++ ++ There are a number of symbolic operators for doing numeric comparisons. ++ They are: ++ ++ = equal ++ == equal ++ > greater ++ >= greater or equal ++ < less ++ <= less or equal ++ ++ For example: ++ ++ ${if >{$message_size}{10M} ... ++ ++ Note that the general negation operator provides for inequality testing. ++ The two strings must take the form of optionally signed decimal integers, ++ optionally followed by one of the letters "K", "M" or "G" (in either upper ++ or lower case), signifying multiplication by 1024, 1024*1024 or ++ 1024*1024*1024, respectively. As a special case, the numerical value of an ++ empty string is taken as zero. ++ ++ In all cases, a relative comparator OP is testing if <string1> OP <string2 ++ >; the above example is checking if $message_size is larger than 10M, not ++ if 10M is larger than $message_size. ++ ++acl {{<name>}{<arg1>}{<arg2>}...} ++ ++ The name and zero to nine argument strings are first expanded separately. ++ The expanded arguments are assigned to the variables $acl_arg1 to $acl_arg9 ++ in order. Any unused are made empty. The variable $acl_narg is set to the ++ number of arguments. The named ACL (see chapter 42) is called and may use ++ the variables; if another acl expansion is used the values are restored ++ after it returns. If the ACL sets a value using a "message =" modifier the ++ variable $value becomes the result of the expansion, otherwise it is empty. ++ If the ACL returns accept the condition is true; if deny, false. If the ACL ++ returns defer the result is a forced-fail. ++ ++bool {<string>} ++ ++ This condition turns a string holding a true or false representation into a ++ boolean state. It parses "true", "false", "yes" and "no" ++ (case-insensitively); also positive integer numbers map to true if ++ non-zero, false if zero. An empty string is treated as false. Leading and ++ trailing whitespace is ignored; thus a string consisting only of whitespace ++ is false. All other string values will result in expansion failure. ++ ++ When combined with ACL variables, this expansion condition will let you ++ make decisions in one place and act on those decisions in another place. ++ For example: ++ ++ ${if bool{$acl_m_privileged_sender} ... ++ ++bool_lax {<string>} ++ ++ Like bool, this condition turns a string into a boolean state. But where ++ bool accepts a strict set of strings, bool_lax uses the same loose ++ definition that the Router condition option uses. The empty string and the ++ values "false", "no" and "0" map to false, all others map to true. Leading ++ and trailing whitespace is ignored. ++ ++ Note that where "bool{00}" is false, "bool_lax{00}" is true. ++ ++crypteq {<string1>}{<string2>} ++ ++ This condition is included in the Exim binary if it is built to support any ++ authentication mechanisms (see chapter 33). Otherwise, it is necessary to ++ define SUPPORT_CRYPTEQ in Local/Makefile to get crypteq included in the ++ binary. ++ ++ The crypteq condition has two arguments. The first is encrypted and ++ compared against the second, which is already encrypted. The second string ++ may be in the LDAP form for storing encrypted strings, which starts with ++ the encryption type in curly brackets, followed by the data. If the second ++ string does not begin with "{" it is assumed to be encrypted with crypt() ++ or crypt16() (see below), since such strings cannot begin with "{". ++ Typically this will be a field from a password file. An example of an ++ encrypted string in LDAP form is: ++ ++ {md5}CY9rzUYh03PK3k6DJie09g== ++ ++ If such a string appears directly in an expansion, the curly brackets have ++ to be quoted, because they are part of the expansion syntax. For example: ++ ++ ${if crypteq {test}{\{md5\}CY9rzUYh03PK3k6DJie09g==}{yes}{no}} ++ ++ The following encryption types (whose names are matched case-independently) ++ are supported: ++ ++ + {md5} computes the MD5 digest of the first string, and expresses this ++ as printable characters to compare with the remainder of the second ++ string. If the length of the comparison string is 24, Exim assumes that ++ it is base64 encoded (as in the above example). If the length is 32, ++ Exim assumes that it is a hexadecimal encoding of the MD5 digest. If ++ the length not 24 or 32, the comparison fails. ++ ++ + {sha1} computes the SHA-1 digest of the first string, and expresses ++ this as printable characters to compare with the remainder of the ++ second string. If the length of the comparison string is 28, Exim ++ assumes that it is base64 encoded. If the length is 40, Exim assumes ++ that it is a hexadecimal encoding of the SHA-1 digest. If the length is ++ not 28 or 40, the comparison fails. ++ ++ + {crypt} calls the crypt() function, which traditionally used to use ++ only the first eight characters of the password. However, in modern ++ operating systems this is no longer true, and in many cases the entire ++ password is used, whatever its length. ++ ++ + {crypt16} calls the crypt16() function, which was originally created to ++ use up to 16 characters of the password in some operating systems. ++ Again, in modern operating systems, more characters may be used. ++ ++ Exim has its own version of crypt16(), which is just a double call to crypt ++ (). For operating systems that have their own version, setting HAVE_CRYPT16 ++ in Local/Makefile when building Exim causes it to use the operating system ++ version instead of its own. This option is set by default in the ++ OS-dependent Makefile for those operating systems that are known to support ++ crypt16(). ++ ++ Some years after Exim's crypt16() was implemented, a user discovered that ++ it was not using the same algorithm as some operating systems' versions. It ++ turns out that as well as crypt16() there is a function called bigcrypt() ++ in some operating systems. This may or may not use the same algorithm, and ++ both of them may be different to Exim's built-in crypt16(). ++ ++ However, since there is now a move away from the traditional crypt() ++ functions towards using SHA1 and other algorithms, tidying up this area of ++ Exim is seen as very low priority. ++ ++ If you do not put a encryption type (in curly brackets) in a crypteq ++ comparison, the default is usually either "{crypt}" or "{crypt16}", as ++ determined by the setting of DEFAULT_CRYPT in Local/Makefile. The default ++ default is "{crypt}". Whatever the default, you can always use either ++ function by specifying it explicitly in curly brackets. ++ ++def:<variable name> ++ ++ The def condition must be followed by the name of one of the expansion ++ variables defined in section 11.9. The condition is true if the variable ++ does not contain the empty string. For example: ++ ++ ${if def:sender_ident {from $sender_ident}} ++ ++ Note that the variable name is given without a leading $ character. If the ++ variable does not exist, the expansion fails. ++ ++def:header_<header name>: or def:h_<header name>: ++ ++ This condition is true if a message is being processed and the named header ++ exists in the message. For example, ++ ++ ${if def:header_reply-to:{$h_reply-to:}{$h_from:}} ++ ++ Note: No $ appears before header_ or h_ in the condition, and the header ++ name must be terminated by a colon if white space does not follow. ++ ++eq {<string1>}{<string2>}, eqi {<string1>}{<string2>} ++ ++ The two substrings are first expanded. The condition is true if the two ++ resulting strings are identical. For eq the comparison includes the case of ++ letters, whereas for eqi the comparison is case-independent. ++ ++exists {<file name>} ++ ++ The substring is first expanded and then interpreted as an absolute path. ++ The condition is true if the named file (or directory) exists. The ++ existence test is done by calling the stat() function. The use of the ++ exists test in users' filter files may be locked out by the system ++ administrator. ++ ++first_delivery ++ ++ This condition, which has no data, is true during a message's first ++ delivery attempt. It is false during any subsequent delivery attempts. ++ ++forall{<a list>}{<a condition>}, forany{<a list>}{<a condition>} ++ ++ These conditions iterate over a list. The first argument is expanded to ++ form the list. By default, the list separator is a colon, but it can be ++ changed by the normal method. The second argument is interpreted as a ++ condition that is to be applied to each item in the list in turn. During ++ the interpretation of the condition, the current list item is placed in a ++ variable called $item. ++ ++ + For forany, interpretation stops if the condition is true for any item, ++ and the result of the whole condition is true. If the condition is ++ false for all items in the list, the overall condition is false. ++ ++ + For forall, interpretation stops if the condition is false for any ++ item, and the result of the whole condition is false. If the condition ++ is true for all items in the list, the overall condition is true. ++ ++ Note that negation of forany means that the condition must be false for all ++ items for the overall condition to succeed, and negation of forall means ++ that the condition must be false for at least one item. In this example, ++ the list separator is changed to a comma: ++ ++ ${if forany{<, $recipients}{match{$item}{^user3@}}{yes}{no}} ++ ++ The value of $item is saved and restored while forany or forall is being ++ processed, to enable these expansion items to be nested. ++ ++ To scan a named list, expand it with the listnamed operator. ++ ++ge {<string1>}{<string2>}, gei {<string1>}{<string2>} ++ ++ The two substrings are first expanded. The condition is true if the first ++ string is lexically greater than or equal to the second string. For ge the ++ comparison includes the case of letters, whereas for gei the comparison is ++ case-independent. ++ ++gt {<string1>}{<string2>}, gti {<string1>}{<string2>} ++ ++ The two substrings are first expanded. The condition is true if the first ++ string is lexically greater than the second string. For gt the comparison ++ includes the case of letters, whereas for gti the comparison is ++ case-independent. ++ ++inlist {<string1>}{<string2>}, inlisti {<string1>}{<string2>} ++ ++ Both strings are expanded; the second string is treated as a list of simple ++ strings; if the first string is a member of the second, then the condition ++ is true. ++ ++ These are simpler to use versions of the more powerful forany condition. ++ Examples, and the forany equivalents: ++ ++ ${if inlist{needle}{foo:needle:bar}} ++ ${if forany{foo:needle:bar}{eq{$item}{needle}}} ++ ${if inlisti{Needle}{fOo:NeeDLE:bAr}} ++ ${if forany{fOo:NeeDLE:bAr}{eqi{$item}{Needle}}} ++ ++isip {<string>}, isip4 {<string>}, isip6 {<string>} ++ ++ The substring is first expanded, and then tested to see if it has the form ++ of an IP address. Both IPv4 and IPv6 addresses are valid for isip, whereas ++ isip4 and isip6 test specifically for IPv4 or IPv6 addresses. ++ ++ For an IPv4 address, the test is for four dot-separated components, each of ++ which consists of from one to three digits. For an IPv6 address, up to ++ eight colon-separated components are permitted, each containing from one to ++ four hexadecimal digits. There may be fewer than eight components if an ++ empty component (adjacent colons) is present. Only one empty component is ++ permitted. ++ ++ Note: The checks are just on the form of the address; actual numerical ++ values are not considered. Thus, for example, 999.999.999.999 passes the ++ IPv4 check. The main use of these tests is to distinguish between IP ++ addresses and host names, or between IPv4 and IPv6 addresses. For example, ++ you could use ++ ++ ${if isip4{$sender_host_address}... ++ ++ to test which IP version an incoming SMTP connection is using. ++ ++ldapauth {<ldap query>} ++ ++ This condition supports user authentication using LDAP. See section 9.13 ++ for details of how to use LDAP in lookups and the syntax of queries. For ++ this use, the query must contain a user name and password. The query itself ++ is not used, and can be empty. The condition is true if the password is not ++ empty, and the user name and password are accepted by the LDAP server. An ++ empty password is rejected without calling LDAP because LDAP binds with an ++ empty password are considered anonymous regardless of the username, and ++ will succeed in most configurations. See chapter 33 for details of SMTP ++ authentication, and chapter 34 for an example of how this can be used. ++ ++le {<string1>}{<string2>}, lei {<string1>}{<string2>} ++ ++ The two substrings are first expanded. The condition is true if the first ++ string is lexically less than or equal to the second string. For le the ++ comparison includes the case of letters, whereas for lei the comparison is ++ case-independent. ++ ++lt {<string1>}{<string2>}, lti {<string1>}{<string2>} ++ ++ The two substrings are first expanded. The condition is true if the first ++ string is lexically less than the second string. For lt the comparison ++ includes the case of letters, whereas for lti the comparison is ++ case-independent. ++ ++match {<string1>}{<string2>} ++ ++ The two substrings are first expanded. The second is then treated as a ++ regular expression and applied to the first. Because of the pre-expansion, ++ if the regular expression contains dollar, or backslash characters, they ++ must be escaped. Care must also be taken if the regular expression contains ++ braces (curly brackets). A closing brace must be escaped so that it is not ++ taken as a premature termination of <string2>. The easiest approach is to ++ use the "\N" feature to disable expansion of the regular expression. For ++ example, ++ ++ ${if match {$local_part}{\N^\d{3}\N} ... ++ ++ If the whole expansion string is in double quotes, further escaping of ++ backslashes is also required. ++ ++ The condition is true if the regular expression match succeeds. The regular ++ expression is not required to begin with a circumflex metacharacter, but if ++ there is no circumflex, the expression is not anchored, and it may match ++ anywhere in the subject, not just at the start. If you want the pattern to ++ match at the end of the subject, you must include the "$" metacharacter at ++ an appropriate point. ++ ++ At the start of an if expansion the values of the numeric variable ++ substitutions $1 etc. are remembered. Obeying a match condition that ++ succeeds causes them to be reset to the substrings of that condition and ++ they will have these values during the expansion of the success string. At ++ the end of the if expansion, the previous values are restored. After ++ testing a combination of conditions using or, the subsequent values of the ++ numeric variables are those of the condition that succeeded. ++ ++match_address {<string1>}{<string2>} ++ ++ See match_local_part. ++ ++match_domain {<string1>}{<string2>} ++ ++ See match_local_part. ++ ++match_ip {<string1>}{<string2>} ++ ++ This condition matches an IP address to a list of IP address patterns. It ++ must be followed by two argument strings. The first (after expansion) must ++ be an IP address or an empty string. The second (not expanded) is a ++ restricted host list that can match only an IP address, not a host name. ++ For example: ++ ++ ${if match_ip{$sender_host_address}{1.2.3.4:5.6.7.8}{...}{...}} ++ ++ The specific types of host list item that are permitted in the list are: ++ ++ + An IP address, optionally with a CIDR mask. ++ ++ + A single asterisk, which matches any IP address. ++ ++ + An empty item, which matches only if the IP address is empty. This ++ could be useful for testing for a locally submitted message or one from ++ specific hosts in a single test such as ++ ++ ${if match_ip{$sender_host_address}{:4.3.2.1:...}{...}{...}} ++ ++ where the first item in the list is the empty string. ++ ++ + The item @[] matches any of the local host's interface addresses. ++ ++ + Single-key lookups are assumed to be like "net-" style lookups in host ++ lists, even if "net-" is not specified. There is never any attempt to ++ turn the IP address into a host name. The most common type of linear ++ search for match_ip is likely to be iplsearch, in which the file can ++ contain CIDR masks. For example: ++ ++ ${if match_ip{$sender_host_address}{iplsearch;/some/file}... ++ ++ It is of course possible to use other kinds of lookup, and in such a ++ case, you do need to specify the "net-" prefix if you want to specify a ++ specific address mask, for example: ++ ++ ${if match_ip{$sender_host_address}{net24-dbm;/some/file}... ++ ++ However, unless you are combining a match_ip condition with others, it ++ is just as easy to use the fact that a lookup is itself a condition, ++ and write: ++ ++ ${lookup{${mask:$sender_host_address/24}}dbm{/a/file}... ++ ++ Note that <string2> is not itself subject to string expansion, unless Exim ++ was built with the EXPAND_LISTMATCH_RHS option. ++ ++ Consult section 10.11 for further details of these patterns. ++ ++match_local_part {<string1>}{<string2>} ++ ++ This condition, together with match_address and match_domain, make it ++ possible to test domain, address, and local part lists within expansions. ++ Each condition requires two arguments: an item and a list to match. A ++ trivial example is: ++ ++ ${if match_domain{a.b.c}{x.y.z:a.b.c:p.q.r}{yes}{no}} ++ ++ In each case, the second argument may contain any of the allowable items ++ for a list of the appropriate type. Also, because the second argument ++ (after expansion) is a standard form of list, it is possible to refer to a ++ named list. Thus, you can use conditions like this: ++ ++ ${if match_domain{$domain}{+local_domains}{... ++ ++ For address lists, the matching starts off caselessly, but the "+caseful" ++ item can be used, as in all address lists, to cause subsequent items to ++ have their local parts matched casefully. Domains are always matched ++ caselessly. ++ ++ Note that <string2> is not itself subject to string expansion, unless Exim ++ was built with the EXPAND_LISTMATCH_RHS option. ++ ++ Note: Host lists are not supported in this way. This is because hosts have ++ two identities: a name and an IP address, and it is not clear how to ++ specify cleanly how such a test would work. However, IP addresses can be ++ matched using match_ip. ++ ++pam {<string1>:<string2>:...} ++ ++ Pluggable Authentication Modules (http://www.kernel.org/pub/linux/libs/pam/ ++ ) are a facility that is available in the latest releases of Solaris and in ++ some GNU/Linux distributions. The Exim support, which is intended for use ++ in conjunction with the SMTP AUTH command, is available only if Exim is ++ compiled with ++ ++ SUPPORT_PAM=yes ++ ++ in Local/Makefile. You probably need to add -lpam to EXTRALIBS, and in some ++ releases of GNU/Linux -ldl is also needed. ++ ++ The argument string is first expanded, and the result must be a ++ colon-separated list of strings. Leading and trailing white space is ++ ignored. The PAM module is initialized with the service name "exim" and the ++ user name taken from the first item in the colon-separated data string (< ++ string1>). The remaining items in the data string are passed over in ++ response to requests from the authentication function. In the simple case ++ there will only be one request, for a password, so the data consists of ++ just two strings. ++ ++ There can be problems if any of the strings are permitted to contain colon ++ characters. In the usual way, these have to be doubled to avoid being taken ++ as separators. If the data is being inserted from a variable, the sg ++ expansion item can be used to double any existing colons. For example, the ++ configuration of a LOGIN authenticator might contain this setting: ++ ++ server_condition = ${if pam{$auth1:${sg{$auth2}{:}{::}}}} ++ ++ For a PLAIN authenticator you could use: ++ ++ server_condition = ${if pam{$auth2:${sg{$auth3}{:}{::}}}} ++ ++ In some operating systems, PAM authentication can be done only from a ++ process running as root. Since Exim is running as the Exim user when ++ receiving messages, this means that PAM cannot be used directly in those ++ systems. A patched version of the pam_unix module that comes with the Linux ++ PAM package is available from http://www.e-admin.de/pam_exim/. The patched ++ module allows one special uid/gid combination, in addition to root, to ++ authenticate. If you build the patched module to allow the Exim user and ++ group, PAM can then be used from an Exim authenticator. ++ ++pwcheck {<string1>:<string2>} ++ ++ This condition supports user authentication using the Cyrus pwcheck daemon. ++ This is one way of making it possible for passwords to be checked by a ++ process that is not running as root. Note: The use of pwcheck is now ++ deprecated. Its replacement is saslauthd (see below). ++ ++ The pwcheck support is not included in Exim by default. You need to specify ++ the location of the pwcheck daemon's socket in Local/Makefile before ++ building Exim. For example: ++ ++ CYRUS_PWCHECK_SOCKET=/var/pwcheck/pwcheck ++ ++ You do not need to install the full Cyrus software suite in order to use ++ the pwcheck daemon. You can compile and install just the daemon alone from ++ the Cyrus SASL library. Ensure that exim is the only user that has access ++ to the /var/pwcheck directory. ++ ++ The pwcheck condition takes one argument, which must be the user name and ++ password, separated by a colon. For example, in a LOGIN authenticator ++ configuration, you might have this: ++ ++ server_condition = ${if pwcheck{$auth1:$auth2}} ++ ++ Again, for a PLAIN authenticator configuration, this would be: ++ ++ server_condition = ${if pwcheck{$auth2:$auth3}} ++ ++queue_running ++ ++ This condition, which has no data, is true during delivery attempts that ++ are initiated by queue runner processes, and false otherwise. ++ ++radius {<authentication string>} ++ ++ Radius authentication (RFC 2865) is supported in a similar way to PAM. You ++ must set RADIUS_CONFIG_FILE in Local/Makefile to specify the location of ++ the Radius client configuration file in order to build Exim with Radius ++ support. ++ ++ With just that one setting, Exim expects to be linked with the radiusclient ++ library, using the original API. If you are using release 0.4.0 or later of ++ this library, you need to set ++ ++ RADIUS_LIB_TYPE=RADIUSCLIENTNEW ++ ++ in Local/Makefile when building Exim. You can also link Exim with the ++ libradius library that comes with FreeBSD. To do this, set ++ ++ RADIUS_LIB_TYPE=RADLIB ++ ++ in Local/Makefile, in addition to setting RADIUS_CONFIGURE_FILE. You may ++ also have to supply a suitable setting in EXTRALIBS so that the Radius ++ library can be found when Exim is linked. ++ ++ The string specified by RADIUS_CONFIG_FILE is expanded and passed to the ++ Radius client library, which calls the Radius server. The condition is true ++ if the authentication is successful. For example: ++ ++ server_condition = ${if radius{<arguments>}} ++ ++saslauthd {{<user>}{<password>}{<service>}{<realm>}} ++ ++ This condition supports user authentication using the Cyrus saslauthd ++ daemon. This replaces the older pwcheck daemon, which is now deprecated. ++ Using this daemon is one way of making it possible for passwords to be ++ checked by a process that is not running as root. ++ ++ The saslauthd support is not included in Exim by default. You need to ++ specify the location of the saslauthd daemon's socket in Local/Makefile ++ before building Exim. For example: ++ ++ CYRUS_SASLAUTHD_SOCKET=/var/state/saslauthd/mux ++ ++ You do not need to install the full Cyrus software suite in order to use ++ the saslauthd daemon. You can compile and install just the daemon alone ++ from the Cyrus SASL library. ++ ++ Up to four arguments can be supplied to the saslauthd condition, but only ++ two are mandatory. For example: ++ ++ server_condition = ${if saslauthd{{$auth1}{$auth2}}} ++ ++ The service and the realm are optional (which is why the arguments are ++ enclosed in their own set of braces). For details of the meaning of the ++ service and realm, and how to run the daemon, consult the Cyrus ++ documentation. ++ ++ ++11.8 Combining expansion conditions ++----------------------------------- ++ ++Several conditions can be tested at once by combining them using the and and or ++combination conditions. Note that and and or are complete conditions on their ++own, and precede their lists of sub-conditions. Each sub-condition must be ++enclosed in braces within the overall braces that contain the list. No ++repetition of if is used. ++ ++or {{<cond1>}{<cond2>}...} ++ ++ The sub-conditions are evaluated from left to right. The condition is true ++ if any one of the sub-conditions is true. For example, ++ ++ ${if or {{eq{$local_part}{spqr}}{eq{$domain}{testing.com}}}... ++ ++ When a true sub-condition is found, the following ones are parsed but not ++ evaluated. If there are several "match" sub-conditions the values of the ++ numeric variables afterwards are taken from the first one that succeeds. ++ ++and {{<cond1>}{<cond2>}...} ++ ++ The sub-conditions are evaluated from left to right. The condition is true ++ if all of the sub-conditions are true. If there are several "match" ++ sub-conditions, the values of the numeric variables afterwards are taken ++ from the last one. When a false sub-condition is found, the following ones ++ are parsed but not evaluated. ++ ++ ++11.9 Expansion variables ++------------------------ ++ ++This section contains an alphabetical list of all the expansion variables. Some ++of them are available only when Exim is compiled with specific options such as ++support for TLS or the content scanning extension. ++ ++$0, $1, etc ++ ++ When a match expansion condition succeeds, these variables contain the ++ captured substrings identified by the regular expression during subsequent ++ processing of the success string of the containing if expansion item. ++ However, they do not retain their values afterwards; in fact, their ++ previous values are restored at the end of processing an if item. The ++ numerical variables may also be set externally by some other matching ++ process which precedes the expansion of the string. For example, the ++ commands available in Exim filter files include an if command with its own ++ regular expression matching condition. ++ ++$acl_c... ++ ++ Values can be placed in these variables by the set modifier in an ACL. They ++ can be given any name that starts with $acl_c and is at least six ++ characters long, but the sixth character must be either a digit or an ++ underscore. For example: $acl_c5, $acl_c_mycount. The values of the ++ $acl_c... variables persist throughout the lifetime of an SMTP connection. ++ They can be used to pass information between ACLs and between different ++ invocations of the same ACL. When a message is received, the values of ++ these variables are saved with the message, and can be accessed by filters, ++ routers, and transports during subsequent delivery. ++ ++$acl_m... ++ ++ These variables are like the $acl_c... variables, except that their values ++ are reset after a message has been received. Thus, if several messages are ++ received in one SMTP connection, $acl_m... values are not passed on from ++ one message to the next, as $acl_c... values are. The $acl_m... variables ++ are also reset by MAIL, RSET, EHLO, HELO, and after starting a TLS session. ++ When a message is received, the values of these variables are saved with ++ the message, and can be accessed by filters, routers, and transports during ++ subsequent delivery. ++ ++$acl_verify_message ++ ++ After an address verification has failed, this variable contains the ++ failure message. It retains its value for use in subsequent modifiers. The ++ message can be preserved by coding like this: ++ ++ warn !verify = sender ++ set acl_m0 = $acl_verify_message ++ ++ You can use $acl_verify_message during the expansion of the message or ++ log_message modifiers, to include information about the verification ++ failure. ++ ++$address_data ++ ++ This variable is set by means of the address_data option in routers. The ++ value then remains with the address while it is processed by subsequent ++ routers and eventually a transport. If the transport is handling multiple ++ addresses, the value from the first address is used. See chapter 15 for ++ more details. Note: The contents of $address_data are visible in user ++ filter files. ++ ++ If $address_data is set when the routers are called from an ACL to verify a ++ recipient address, the final value is still in the variable for subsequent ++ conditions and modifiers of the ACL statement. If routing the address ++ caused it to be redirected to just one address, the child address is also ++ routed as part of the verification, and in this case the final value of ++ $address_data is from the child's routing. ++ ++ If $address_data is set when the routers are called from an ACL to verify a ++ sender address, the final value is also preserved, but this time in ++ $sender_address_data, to distinguish it from data from a recipient address. ++ ++ In both cases (recipient and sender verification), the value does not ++ persist after the end of the current ACL statement. If you want to preserve ++ these values for longer, you can save them in ACL variables. ++ ++$address_file ++ ++ When, as a result of aliasing, forwarding, or filtering, a message is ++ directed to a specific file, this variable holds the name of the file when ++ the transport is running. At other times, the variable is empty. For ++ example, using the default configuration, if user r2d2 has a .forward file ++ containing ++ ++ /home/r2d2/savemail ++ ++ then when the address_file transport is running, $address_file contains the ++ text string "/home/r2d2/savemail". For Sieve filters, the value may be ++ "inbox" or a relative folder name. It is then up to the transport ++ configuration to generate an appropriate absolute path to the relevant ++ file. ++ ++$address_pipe ++ ++ When, as a result of aliasing or forwarding, a message is directed to a ++ pipe, this variable holds the pipe command when the transport is running. ++ ++$auth1 - $auth3 ++ ++ These variables are used in SMTP authenticators (see chapters 34-40). ++ Elsewhere, they are empty. ++ ++$authenticated_id ++ ++ When a server successfully authenticates a client it may be configured to ++ preserve some of the authentication information in the variable ++ $authenticated_id (see chapter 33). For example, a user/password ++ authenticator configuration might preserve the user name for use in the ++ routers. Note that this is not the same information that is saved in ++ $sender_host_authenticated. When a message is submitted locally (that is, ++ not over a TCP connection) the value of $authenticated_id is normally the ++ login name of the calling process. However, a trusted user can override ++ this by means of the -oMai command line option. ++ ++$authenticated_fail_id ++ ++ When an authentication attempt fails, the variable $authenticated_fail_id ++ will contain the failed authentication id. If more than one authentication ++ id is attempted, it will contain only the last one. The variable is ++ available for processing in the ACL's, generally the quit or notquit ACL. A ++ message to a local recipient could still be accepted without requiring ++ authentication, which means this variable could also be visible in all of ++ the ACL's as well. ++ ++$authenticated_sender ++ ++ When acting as a server, Exim takes note of the AUTH= parameter on an ++ incoming SMTP MAIL command if it believes the sender is sufficiently ++ trusted, as described in section 33.2. Unless the data is the string "<>", ++ it is set as the authenticated sender of the message, and the value is ++ available during delivery in the $authenticated_sender variable. If the ++ sender is not trusted, Exim accepts the syntax of AUTH=, but ignores the ++ data. ++ ++ When a message is submitted locally (that is, not over a TCP connection), ++ the value of $authenticated_sender is an address constructed from the login ++ name of the calling process and $qualify_domain, except that a trusted user ++ can override this by means of the -oMas command line option. ++ ++$authentication_failed ++ ++ This variable is set to "1" in an Exim server if a client issues an AUTH ++ command that does not succeed. Otherwise it is set to "0". This makes it ++ possible to distinguish between "did not try to authenticate" ( ++ $sender_host_authenticated is empty and $authentication_failed is set to ++ "0") and "tried to authenticate but failed" ($sender_host_authenticated is ++ empty and $authentication_failed is set to "1"). Failure includes any ++ negative response to an AUTH command, including (for example) an attempt to ++ use an undefined mechanism. ++ ++$av_failed ++ ++ This variable is available when Exim is compiled with the content-scanning ++ extension. It is set to "0" by default, but will be set to "1" if any ++ problem occurs with the virus scanner (specified by av_scanner) during the ++ ACL malware condition. ++ ++$body_linecount ++ ++ When a message is being received or delivered, this variable contains the ++ number of lines in the message's body. See also $message_linecount. ++ ++$body_zerocount ++ ++ When a message is being received or delivered, this variable contains the ++ number of binary zero bytes (ASCII NULs) in the message's body. ++ ++$bounce_recipient ++ ++ This is set to the recipient address of a bounce message while Exim is ++ creating it. It is useful if a customized bounce message text file is in ++ use (see chapter 48). ++ ++$bounce_return_size_limit ++ ++ This contains the value set in the bounce_return_size_limit option, rounded ++ up to a multiple of 1000. It is useful when a customized error message text ++ file is in use (see chapter 48). ++ ++$caller_gid ++ ++ The real group id under which the process that called Exim was running. ++ This is not the same as the group id of the originator of a message (see ++ $originator_gid). If Exim re-execs itself, this variable in the new ++ incarnation normally contains the Exim gid. ++ ++$caller_uid ++ ++ The real user id under which the process that called Exim was running. This ++ is not the same as the user id of the originator of a message (see ++ $originator_uid). If Exim re-execs itself, this variable in the new ++ incarnation normally contains the Exim uid. ++ ++$compile_date ++ ++ The date on which the Exim binary was compiled. ++ ++$compile_number ++ ++ The building process for Exim keeps a count of the number of times it has ++ been compiled. This serves to distinguish different compilations of the ++ same version of the program. ++ ++$demime_errorlevel ++ ++ This variable is available when Exim is compiled with the content-scanning ++ extension and the obsolete demime condition. For details, see section 43.6. ++ ++$demime_reason ++ ++ This variable is available when Exim is compiled with the content-scanning ++ extension and the obsolete demime condition. For details, see section 43.6. ++ ++$dnslist_domain, $dnslist_matched, $dnslist_text, $dnslist_value ++ ++ When a DNS (black) list lookup succeeds, these variables are set to contain ++ the following data from the lookup: the list's domain name, the key that ++ was looked up, the contents of any associated TXT record, and the value ++ from the main A record. See section 42.31 for more details. ++ ++$domain ++ ++ When an address is being routed, or delivered on its own, this variable ++ contains the domain. Uppercase letters in the domain are converted into ++ lower case for $domain. ++ ++ Global address rewriting happens when a message is received, so the value ++ of $domain during routing and delivery is the value after rewriting. ++ $domain is set during user filtering, but not during system filtering, ++ because a message may have many recipients and the system filter is called ++ just once. ++ ++ When more than one address is being delivered at once (for example, several ++ RCPT commands in one SMTP delivery), $domain is set only if they all have ++ the same domain. Transports can be restricted to handling only one domain ++ at a time if the value of $domain is required at transport time - this is ++ the default for local transports. For further details of the environment in ++ which local transports are run, see chapter 23. ++ ++ At the end of a delivery, if all deferred addresses have the same domain, ++ it is set in $domain during the expansion of delay_warning_condition. ++ ++ The $domain variable is also used in some other circumstances: ++ ++ + When an ACL is running for a RCPT command, $domain contains the domain ++ of the recipient address. The domain of the sender address is in ++ $sender_address_domain at both MAIL time and at RCPT time. $domain is ++ not normally set during the running of the MAIL ACL. However, if the ++ sender address is verified with a callout during the MAIL ACL, the ++ sender domain is placed in $domain during the expansions of hosts, ++ interface, and port in the smtp transport. ++ ++ + When a rewrite item is being processed (see chapter 31), $domain ++ contains the domain portion of the address that is being rewritten; it ++ can be used in the expansion of the replacement address, for example, ++ to rewrite domains by file lookup. ++ ++ + With one important exception, whenever a domain list is being scanned, ++ $domain contains the subject domain. Exception: When a domain list in a ++ sender_domains condition in an ACL is being processed, the subject ++ domain is in $sender_address_domain and not in $domain. It works this ++ way so that, in a RCPT ACL, the sender domain list can be dependent on ++ the recipient domain (which is what is in $domain at this time). ++ ++ + When the smtp_etrn_command option is being expanded, $domain contains ++ the complete argument of the ETRN command (see section 47.8). ++ ++$domain_data ++ ++ When the domains option on a router matches a domain by means of a lookup, ++ the data read by the lookup is available during the running of the router ++ as $domain_data. In addition, if the driver routes the address to a ++ transport, the value is available in that transport. If the transport is ++ handling multiple addresses, the value from the first address is used. ++ ++ $domain_data is also set when the domains condition in an ACL matches a ++ domain by means of a lookup. The data read by the lookup is available ++ during the rest of the ACL statement. In all other situations, this ++ variable expands to nothing. ++ ++$exim_gid ++ ++ This variable contains the numerical value of the Exim group id. ++ ++$exim_path ++ ++ This variable contains the path to the Exim binary. ++ ++$exim_uid ++ ++ This variable contains the numerical value of the Exim user id. ++ ++$found_extension ++ ++ This variable is available when Exim is compiled with the content-scanning ++ extension and the obsolete demime condition. For details, see section 43.6. ++ ++$header_<name> ++ ++ This is not strictly an expansion variable. It is expansion syntax for ++ inserting the message header line with the given name. Note that the name ++ must be terminated by colon or white space, because it may contain a wide ++ variety of characters. Note also that braces must not be used. ++ ++$headers_added ++ ++ Within an ACL this variable contains the headers added so far by the ACL ++ modifier add_header (section 42.23). The headers are a newline-separated ++ list. ++ ++$home ++ ++ When the check_local_user option is set for a router, the user's home ++ directory is placed in $home when the check succeeds. In particular, this ++ means it is set during the running of users' filter files. A router may ++ also explicitly set a home directory for use by a transport; this can be ++ overridden by a setting on the transport itself. ++ ++ When running a filter test via the -bf option, $home is set to the value of ++ the environment variable HOME. ++ ++$host ++ ++ If a router assigns an address to a transport (any transport), and passes a ++ list of hosts with the address, the value of $host when the transport ++ starts to run is the name of the first host on the list. Note that this ++ applies both to local and remote transports. ++ ++ For the smtp transport, if there is more than one host, the value of $host ++ changes as the transport works its way through the list. In particular, ++ when the smtp transport is expanding its options for encryption using TLS, ++ or for specifying a transport filter (see chapter 24), $host contains the ++ name of the host to which it is connected. ++ ++ When used in the client part of an authenticator configuration (see chapter ++ 33), $host contains the name of the server to which the client is ++ connected. ++ ++$host_address ++ ++ This variable is set to the remote host's IP address whenever $host is set ++ for a remote connection. It is also set to the IP address that is being ++ checked when the ignore_target_hosts option is being processed. ++ ++$host_data ++ ++ If a hosts condition in an ACL is satisfied by means of a lookup, the ++ result of the lookup is made available in the $host_data variable. This ++ allows you, for example, to do things like this: ++ ++ deny hosts = net-lsearch;/some/file ++ message = $host_data ++ ++$host_lookup_deferred ++ ++ This variable normally contains "0", as does $host_lookup_failed. When a ++ message comes from a remote host and there is an attempt to look up the ++ host's name from its IP address, and the attempt is not successful, one of ++ these variables is set to "1". ++ ++ + If the lookup receives a definite negative response (for example, a DNS ++ lookup succeeded, but no records were found), $host_lookup_failed is ++ set to "1". ++ ++ + If there is any kind of problem during the lookup, such that Exim ++ cannot tell whether or not the host name is defined (for example, a ++ timeout for a DNS lookup), $host_lookup_deferred is set to "1". ++ ++ Looking up a host's name from its IP address consists of more than just a ++ single reverse lookup. Exim checks that a forward lookup of at least one of ++ the names it receives from a reverse lookup yields the original IP address. ++ If this is not the case, Exim does not accept the looked up name(s), and ++ $host_lookup_failed is set to "1". Thus, being able to find a name from an ++ IP address (for example, the existence of a PTR record in the DNS) is not ++ sufficient on its own for the success of a host name lookup. If the reverse ++ lookup succeeds, but there is a lookup problem such as a timeout when ++ checking the result, the name is not accepted, and $host_lookup_deferred is ++ set to "1". See also $sender_host_name. ++ ++$host_lookup_failed ++ ++ See $host_lookup_deferred. ++ ++$inode ++ ++ The only time this variable is set is while expanding the directory_file ++ option in the appendfile transport. The variable contains the inode number ++ of the temporary file which is about to be renamed. It can be used to ++ construct a unique name for the file. ++ ++$interface_address ++ ++ This is an obsolete name for $received_ip_address. ++ ++$interface_port ++ ++ This is an obsolete name for $received_port. ++ ++$item ++ ++ This variable is used during the expansion of forall and forany conditions ++ (see section 11.7), and filter, map, and reduce items (see section 11.7). ++ In other circumstances, it is empty. ++ ++$ldap_dn ++ ++ This variable, which is available only when Exim is compiled with LDAP ++ support, contains the DN from the last entry in the most recently ++ successful LDAP lookup. ++ ++$load_average ++ ++ This variable contains the system load average, multiplied by 1000 so that ++ it is an integer. For example, if the load average is 0.21, the value of ++ the variable is 210. The value is recomputed every time the variable is ++ referenced. ++ ++$local_part ++ ++ When an address is being routed, or delivered on its own, this variable ++ contains the local part. When a number of addresses are being delivered ++ together (for example, multiple RCPT commands in an SMTP session), ++ $local_part is not set. ++ ++ Global address rewriting happens when a message is received, so the value ++ of $local_part during routing and delivery is the value after rewriting. ++ $local_part is set during user filtering, but not during system filtering, ++ because a message may have many recipients and the system filter is called ++ just once. ++ ++ If a local part prefix or suffix has been recognized, it is not included in ++ the value of $local_part during routing and subsequent delivery. The values ++ of any prefix or suffix are in $local_part_prefix and $local_part_suffix, ++ respectively. ++ ++ When a message is being delivered to a file, pipe, or autoreply transport ++ as a result of aliasing or forwarding, $local_part is set to the local part ++ of the parent address, not to the file name or command (see $address_file ++ and $address_pipe). ++ ++ When an ACL is running for a RCPT command, $local_part contains the local ++ part of the recipient address. ++ ++ When a rewrite item is being processed (see chapter 31), $local_part ++ contains the local part of the address that is being rewritten; it can be ++ used in the expansion of the replacement address, for example. ++ ++ In all cases, all quoting is removed from the local part. For example, for ++ both the addresses ++ ++ "abc:xyz"@test.example ++ abc\:xyz@test.example ++ ++ the value of $local_part is ++ ++ abc:xyz ++ ++ If you use $local_part to create another address, you should always wrap it ++ inside a quoting operator. For example, in a redirect router you could ++ have: ++ ++ data = ${quote_local_part:$local_part}@new.domain.example ++ ++ Note: The value of $local_part is normally lower cased. If you want to ++ process local parts in a case-dependent manner in a router, you can set the ++ caseful_local_part option (see chapter 15). ++ ++$local_part_data ++ ++ When the local_parts option on a router matches a local part by means of a ++ lookup, the data read by the lookup is available during the running of the ++ router as $local_part_data. In addition, if the driver routes the address ++ to a transport, the value is available in that transport. If the transport ++ is handling multiple addresses, the value from the first address is used. ++ ++ $local_part_data is also set when the local_parts condition in an ACL ++ matches a local part by means of a lookup. The data read by the lookup is ++ available during the rest of the ACL statement. In all other situations, ++ this variable expands to nothing. ++ ++$local_part_prefix ++ ++ When an address is being routed or delivered, and a specific prefix for the ++ local part was recognized, it is available in this variable, having been ++ removed from $local_part. ++ ++$local_part_suffix ++ ++ When an address is being routed or delivered, and a specific suffix for the ++ local part was recognized, it is available in this variable, having been ++ removed from $local_part. ++ ++$local_scan_data ++ ++ This variable contains the text returned by the local_scan() function when ++ a message is received. See chapter 44 for more details. ++ ++$local_user_gid ++ ++ See $local_user_uid. ++ ++$local_user_uid ++ ++ This variable and $local_user_gid are set to the uid and gid after the ++ check_local_user router precondition succeeds. This means that their values ++ are available for the remaining preconditions (senders, require_files, and ++ condition), for the address_data expansion, and for any router-specific ++ expansions. At all other times, the values in these variables are "(uid_t) ++ (-1)" and "(gid_t)(-1)", respectively. ++ ++$localhost_number ++ ++ This contains the expanded value of the localhost_number option. The ++ expansion happens after the main options have been read. ++ ++$log_inodes ++ ++ The number of free inodes in the disk partition where Exim's log files are ++ being written. The value is recalculated whenever the variable is ++ referenced. If the relevant file system does not have the concept of ++ inodes, the value of is -1. See also the check_log_inodes option. ++ ++$log_space ++ ++ The amount of free space (as a number of kilobytes) in the disk partition ++ where Exim's log files are being written. The value is recalculated ++ whenever the variable is referenced. If the operating system does not have ++ the ability to find the amount of free space (only true for experimental ++ systems), the space value is -1. See also the check_log_space option. ++ ++$mailstore_basename ++ ++ This variable is set only when doing deliveries in "mailstore" format in ++ the appendfile transport. During the expansion of the mailstore_prefix, ++ mailstore_suffix, message_prefix, and message_suffix options, it contains ++ the basename of the files that are being written, that is, the name without ++ the ".tmp", ".env", or ".msg" suffix. At all other times, this variable is ++ empty. ++ ++$malware_name ++ ++ This variable is available when Exim is compiled with the content-scanning ++ extension. It is set to the name of the virus that was found when the ACL ++ malware condition is true (see section 43.1). ++ ++$max_received_linelength ++ ++ This variable contains the number of bytes in the longest line that was ++ received as part of the message, not counting the line termination ++ character(s). ++ ++$message_age ++ ++ This variable is set at the start of a delivery attempt to contain the ++ number of seconds since the message was received. It does not change during ++ a single delivery attempt. ++ ++$message_body ++ ++ This variable contains the initial portion of a message's body while it is ++ being delivered, and is intended mainly for use in filter files. The ++ maximum number of characters of the body that are put into the variable is ++ set by the message_body_visible configuration option; the default is 500. ++ ++ By default, newlines are converted into spaces in $message_body, to make it ++ easier to search for phrases that might be split over a line break. ++ However, this can be disabled by setting message_body_newlines to be true. ++ Binary zeros are always converted into spaces. ++ ++$message_body_end ++ ++ This variable contains the final portion of a message's body while it is ++ being delivered. The format and maximum size are as for $message_body. ++ ++$message_body_size ++ ++ When a message is being delivered, this variable contains the size of the ++ body in bytes. The count starts from the character after the blank line ++ that separates the body from the header. Newlines are included in the ++ count. See also $message_size, $body_linecount, and $body_zerocount. ++ ++$message_exim_id ++ ++ When a message is being received or delivered, this variable contains the ++ unique message id that is generated and used by Exim to identify the ++ message. An id is not created for a message until after its header has been ++ successfully received. Note: This is not the contents of the Message-ID: ++ header line; it is the local id that Exim assigns to the message, for ++ example: "1BXTIK-0001yO-VA". ++ ++$message_headers ++ ++ This variable contains a concatenation of all the header lines when a ++ message is being processed, except for lines added by routers or ++ transports. The header lines are separated by newline characters. Their ++ contents are decoded in the same way as a header line that is inserted by ++ bheader. ++ ++$message_headers_raw ++ ++ This variable is like $message_headers except that no processing of the ++ contents of header lines is done. ++ ++$message_id ++ ++ This is an old name for $message_exim_id, which is now deprecated. ++ ++$message_linecount ++ ++ This variable contains the total number of lines in the header and body of ++ the message. Compare $body_linecount, which is the count for the body only. ++ During the DATA and content-scanning ACLs, $message_linecount contains the ++ number of lines received. Before delivery happens (that is, before filters, ++ routers, and transports run) the count is increased to include the ++ Received: header line that Exim standardly adds, and also any other header ++ lines that are added by ACLs. The blank line that separates the message ++ header from the body is not counted. ++ ++ As with the special case of $message_size, during the expansion of the ++ appendfile transport's maildir_tag option in maildir format, the value of ++ $message_linecount is the precise size of the number of newlines in the ++ file that has been written (minus one for the blank line between the header ++ and the body). ++ ++ Here is an example of the use of this variable in a DATA ACL: ++ ++ deny message = Too many lines in message header ++ condition = \ ++ ${if <{250}{${eval:$message_linecount - $body_linecount}}} ++ ++ In the MAIL and RCPT ACLs, the value is zero because at that stage the ++ message has not yet been received. ++ ++$message_size ++ ++ When a message is being processed, this variable contains its size in ++ bytes. In most cases, the size includes those headers that were received ++ with the message, but not those (such as Envelope-to:) that are added to ++ individual deliveries as they are written. However, there is one special ++ case: during the expansion of the maildir_tag option in the appendfile ++ transport while doing a delivery in maildir format, the value of ++ $message_size is the precise size of the file that has been written. See ++ also $message_body_size, $body_linecount, and $body_zerocount. ++ ++ While running a per message ACL (mail/rcpt/predata), $message_size contains ++ the size supplied on the MAIL command, or -1 if no size was given. The ++ value may not, of course, be truthful. ++ ++$mime_xxx ++ ++ A number of variables whose names start with $mime are available when Exim ++ is compiled with the content-scanning extension. For details, see section ++ 43.4. ++ ++$n0 - $n9 ++ ++ These variables are counters that can be incremented by means of the add ++ command in filter files. ++ ++$original_domain ++ ++ When a top-level address is being processed for delivery, this contains the ++ same value as $domain. However, if a "child" address (for example, ++ generated by an alias, forward, or filter file) is being processed, this ++ variable contains the domain of the original address (lower cased). This ++ differs from $parent_domain only when there is more than one level of ++ aliasing or forwarding. When more than one address is being delivered in a ++ single transport run, $original_domain is not set. ++ ++ If a new address is created by means of a deliver command in a system ++ filter, it is set up with an artificial "parent" address. This has the ++ local part system-filter and the default qualify domain. ++ ++$original_local_part ++ ++ When a top-level address is being processed for delivery, this contains the ++ same value as $local_part, unless a prefix or suffix was removed from the ++ local part, because $original_local_part always contains the full local ++ part. When a "child" address (for example, generated by an alias, forward, ++ or filter file) is being processed, this variable contains the full local ++ part of the original address. ++ ++ If the router that did the redirection processed the local part ++ case-insensitively, the value in $original_local_part is in lower case. ++ This variable differs from $parent_local_part only when there is more than ++ one level of aliasing or forwarding. When more than one address is being ++ delivered in a single transport run, $original_local_part is not set. ++ ++ If a new address is created by means of a deliver command in a system ++ filter, it is set up with an artificial "parent" address. This has the ++ local part system-filter and the default qualify domain. ++ ++$originator_gid ++ ++ This variable contains the value of $caller_gid that was set when the ++ message was received. For messages received via the command line, this is ++ the gid of the sending user. For messages received by SMTP over TCP/IP, ++ this is normally the gid of the Exim user. ++ ++$originator_uid ++ ++ The value of $caller_uid that was set when the message was received. For ++ messages received via the command line, this is the uid of the sending ++ user. For messages received by SMTP over TCP/IP, this is normally the uid ++ of the Exim user. ++ ++$parent_domain ++ ++ This variable is similar to $original_domain (see above), except that it ++ refers to the immediately preceding parent address. ++ ++$parent_local_part ++ ++ This variable is similar to $original_local_part (see above), except that ++ it refers to the immediately preceding parent address. ++ ++$pid ++ ++ This variable contains the current process id. ++ ++$pipe_addresses ++ ++ This is not an expansion variable, but is mentioned here because the string ++ "$pipe_addresses" is handled specially in the command specification for the ++ pipe transport (chapter 29) and in transport filters (described under ++ transport_filter in chapter 24). It cannot be used in general expansion ++ strings, and provokes an "unknown variable" error if encountered. ++ ++$primary_hostname ++ ++ This variable contains the value set by primary_hostname in the ++ configuration file, or read by the uname() function. If uname() returns a ++ single-component name, Exim calls gethostbyname() (or getipnodebyname() ++ where available) in an attempt to acquire a fully qualified host name. See ++ also $smtp_active_hostname. ++ ++$prvscheck_address ++ ++ This variable is used in conjunction with the prvscheck expansion item, ++ which is described in sections 11.5 and 42.50. ++ ++$prvscheck_keynum ++ ++ This variable is used in conjunction with the prvscheck expansion item, ++ which is described in sections 11.5 and 42.50. ++ ++$prvscheck_result ++ ++ This variable is used in conjunction with the prvscheck expansion item, ++ which is described in sections 11.5 and 42.50. ++ ++$qualify_domain ++ ++ The value set for the qualify_domain option in the configuration file. ++ ++$qualify_recipient ++ ++ The value set for the qualify_recipient option in the configuration file, ++ or if not set, the value of $qualify_domain. ++ ++$rcpt_count ++ ++ When a message is being received by SMTP, this variable contains the number ++ of RCPT commands received for the current message. If this variable is used ++ in a RCPT ACL, its value includes the current command. ++ ++$rcpt_defer_count ++ ++ When a message is being received by SMTP, this variable contains the number ++ of RCPT commands in the current message that have previously been rejected ++ with a temporary (4xx) response. ++ ++$rcpt_fail_count ++ ++ When a message is being received by SMTP, this variable contains the number ++ of RCPT commands in the current message that have previously been rejected ++ with a permanent (5xx) response. ++ ++$received_count ++ ++ This variable contains the number of Received: header lines in the message, ++ including the one added by Exim (so its value is always greater than zero). ++ It is available in the DATA ACL, the non-SMTP ACL, and while routing and ++ delivering. ++ ++$received_for ++ ++ If there is only a single recipient address in an incoming message, this ++ variable contains that address when the Received: header line is being ++ built. The value is copied after recipient rewriting has happened, but ++ before the local_scan() function is run. ++ ++$received_ip_address ++ ++ As soon as an Exim server starts processing an incoming TCP/IP connection, ++ this variable is set to the address of the local IP interface, and ++ $received_port is set to the local port number. (The remote IP address and ++ port are in $sender_host_address and $sender_host_port.) When testing with ++ -bh, the port value is -1 unless it has been set using the -oMi command ++ line option. ++ ++ As well as being useful in ACLs (including the "connect" ACL), these ++ variable could be used, for example, to make the file name for a TLS ++ certificate depend on which interface and/or port is being used for the ++ incoming connection. The values of $received_ip_address and $received_port ++ are saved with any messages that are received, thus making these variables ++ available at delivery time. ++ ++ Note: There are no equivalent variables for outgoing connections, because ++ the values are unknown (unless they are explicitly set by options of the ++ smtp transport). ++ ++$received_port ++ ++ See $received_ip_address. ++ ++$received_protocol ++ ++ When a message is being processed, this variable contains the name of the ++ protocol by which it was received. Most of the names used by Exim are ++ defined by RFCs 821, 2821, and 3848. They start with "smtp" (the client ++ used HELO) or "esmtp" (the client used EHLO). This can be followed by "s" ++ for secure (encrypted) and/or "a" for authenticated. Thus, for example, if ++ the protocol is set to "esmtpsa", the message was received over an ++ encrypted SMTP connection and the client was successfully authenticated. ++ ++ Exim uses the protocol name "smtps" for the case when encryption is ++ automatically set up on connection without the use of STARTTLS (see ++ tls_on_connect_ports), and the client uses HELO to initiate the encrypted ++ SMTP session. The name "smtps" is also used for the rare situation where ++ the client initially uses EHLO, sets up an encrypted connection using ++ STARTTLS, and then uses HELO afterwards. ++ ++ The -oMr option provides a way of specifying a custom protocol name for ++ messages that are injected locally by trusted callers. This is commonly ++ used to identify messages that are being re-injected after some kind of ++ scanning. ++ ++$received_time ++ ++ This variable contains the date and time when the current message was ++ received, as a number of seconds since the start of the Unix epoch. ++ ++$recipient_data ++ ++ This variable is set after an indexing lookup success in an ACL recipients ++ condition. It contains the data from the lookup, and the value remains set ++ until the next recipients test. Thus, you can do things like this: ++ ++ require recipients = cdb*@;/some/file ++ deny some further test involving $recipient_data ++ ++ Warning: This variable is set only when a lookup is used as an indexing ++ method in the address list, using the semicolon syntax as in the example ++ above. The variable is not set for a lookup that is used as part of the ++ string expansion that all such lists undergo before being interpreted. ++ ++$recipient_verify_failure ++ ++ In an ACL, when a recipient verification fails, this variable contains ++ information about the failure. It is set to one of the following words: ++ ++ + "qualify": The address was unqualified (no domain), and the message was ++ neither local nor came from an exempted host. ++ ++ + "route": Routing failed. ++ ++ + "mail": Routing succeeded, and a callout was attempted; rejection ++ occurred at or before the MAIL command (that is, on initial connection, ++ HELO, or MAIL). ++ ++ + "recipient": The RCPT command in a callout was rejected. ++ ++ + "postmaster": The postmaster check in a callout was rejected. ++ ++ The main use of this variable is expected to be to distinguish between ++ rejections of MAIL and rejections of RCPT. ++ ++$recipients ++ ++ This variable contains a list of envelope recipients for a message. A comma ++ and a space separate the addresses in the replacement text. However, the ++ variable is not generally available, to prevent exposure of Bcc recipients ++ in unprivileged users' filter files. You can use $recipients only in these ++ cases: ++ ++ 1. In a system filter file. ++ ++ 2. In the ACLs associated with the DATA command and with non-SMTP ++ messages, that is, the ACLs defined by acl_smtp_predata, acl_smtp_data, ++ acl_smtp_mime, acl_not_smtp_start, acl_not_smtp, and acl_not_smtp_mime. ++ ++ 3. From within a local_scan() function. ++ ++$recipients_count ++ ++ When a message is being processed, this variable contains the number of ++ envelope recipients that came with the message. Duplicates are not excluded ++ from the count. While a message is being received over SMTP, the number ++ increases for each accepted recipient. It can be referenced in an ACL. ++ ++$regex_match_string ++ ++ This variable is set to contain the matching regular expression after a ++ regex ACL condition has matched (see section 43.5). ++ ++$reply_address ++ ++ When a message is being processed, this variable contains the contents of ++ the Reply-To: header line if one exists and it is not empty, or otherwise ++ the contents of the From: header line. Apart from the removal of leading ++ white space, the value is not processed in any way. In particular, no RFC ++ 2047 decoding or character code translation takes place. ++ ++$return_path ++ ++ When a message is being delivered, this variable contains the return path - ++ the sender field that will be sent as part of the envelope. It is not ++ enclosed in <> characters. At the start of routing an address, $return_path ++ has the same value as $sender_address, but if, for example, an incoming ++ message to a mailing list has been expanded by a router which specifies a ++ different address for bounce messages, $return_path subsequently contains ++ the new bounce address, whereas $sender_address always contains the ++ original sender address that was received with the message. In other words, ++ $sender_address contains the incoming envelope sender, and $return_path ++ contains the outgoing envelope sender. ++ ++$return_size_limit ++ ++ This is an obsolete name for $bounce_return_size_limit. ++ ++$router_name ++ ++ During the running of a router this variable contains its name. ++ ++$runrc ++ ++ This variable contains the return code from a command that is run by the $ ++ {run...} expansion item. Warning: In a router or transport, you cannot ++ assume the order in which option values are expanded, except for those ++ preconditions whose order of testing is documented. Therefore, you cannot ++ reliably expect to set $runrc by the expansion of one option, and use it in ++ another. ++ ++$self_hostname ++ ++ When an address is routed to a supposedly remote host that turns out to be ++ the local host, what happens is controlled by the self generic router ++ option. One of its values causes the address to be passed to another ++ router. When this happens, $self_hostname is set to the name of the local ++ host that the original router encountered. In other circumstances its ++ contents are null. ++ ++$sender_address ++ ++ When a message is being processed, this variable contains the sender's ++ address that was received in the message's envelope. The case of letters in ++ the address is retained, in both the local part and the domain. For bounce ++ messages, the value of this variable is the empty string. See also ++ $return_path. ++ ++$sender_address_data ++ ++ If $address_data is set when the routers are called from an ACL to verify a ++ sender address, the final value is preserved in $sender_address_data, to ++ distinguish it from data from a recipient address. The value does not ++ persist after the end of the current ACL statement. If you want to preserve ++ it for longer, you can save it in an ACL variable. ++ ++$sender_address_domain ++ ++ The domain portion of $sender_address. ++ ++$sender_address_local_part ++ ++ The local part portion of $sender_address. ++ ++$sender_data ++ ++ This variable is set after a lookup success in an ACL senders condition or ++ in a router senders option. It contains the data from the lookup, and the ++ value remains set until the next senders test. Thus, you can do things like ++ this: ++ ++ require senders = cdb*@;/some/file ++ deny some further test involving $sender_data ++ ++ Warning: This variable is set only when a lookup is used as an indexing ++ method in the address list, using the semicolon syntax as in the example ++ above. The variable is not set for a lookup that is used as part of the ++ string expansion that all such lists undergo before being interpreted. ++ ++$sender_fullhost ++ ++ When a message is received from a remote host, this variable contains the ++ host name and IP address in a single string. It ends with the IP address in ++ square brackets, followed by a colon and a port number if the logging of ++ ports is enabled. The format of the rest of the string depends on whether ++ the host issued a HELO or EHLO SMTP command, and whether the host name was ++ verified by looking up its IP address. (Looking up the IP address can be ++ forced by the host_lookup option, independent of verification.) A plain ++ host name at the start of the string is a verified host name; if this is ++ not present, verification either failed or was not requested. A host name ++ in parentheses is the argument of a HELO or EHLO command. This is omitted ++ if it is identical to the verified host name or to the host's IP address in ++ square brackets. ++ ++$sender_helo_name ++ ++ When a message is received from a remote host that has issued a HELO or ++ EHLO command, the argument of that command is placed in this variable. It ++ is also set if HELO or EHLO is used when a message is received using SMTP ++ locally via the -bs or -bS options. ++ ++$sender_host_address ++ ++ When a message is received from a remote host, this variable contains that ++ host's IP address. For locally submitted messages, it is empty. ++ ++$sender_host_authenticated ++ ++ This variable contains the name (not the public name) of the authenticator ++ driver that successfully authenticated the client from which the message ++ was received. It is empty if there was no successful authentication. See ++ also $authenticated_id. ++ ++$sender_host_dnssec ++ ++ If $sender_host_name has been populated (by reference, hosts_lookup or ++ otherwise) then this boolean will have been set true if, and only if, the ++ resolver library states that the reverse DNS was authenticated data. At all ++ other times, this variable is false. ++ ++ It is likely that you will need to coerce DNSSEC support on in the resolver ++ library, by setting: ++ ++ dns_use_dnssec = 1 ++ ++ Exim does not perform DNSSEC validation itself, instead leaving that to a ++ validating resolver (eg, unbound, or bind with suitable configuration). ++ ++ Exim does not (currently) check to see if the forward DNS was also secured ++ with DNSSEC, only the reverse DNS. ++ ++ If you have changed host_lookup_order so that "bydns" is not the first ++ mechanism in the list, then this variable will be false. ++ ++$sender_host_name ++ ++ When a message is received from a remote host, this variable contains the ++ host's name as obtained by looking up its IP address. For messages received ++ by other means, this variable is empty. ++ ++ If the host name has not previously been looked up, a reference to ++ $sender_host_name triggers a lookup (for messages from remote hosts). A ++ looked up name is accepted only if it leads back to the original IP address ++ via a forward lookup. If either the reverse or the forward lookup fails to ++ find any data, or if the forward lookup does not yield the original IP ++ address, $sender_host_name remains empty, and $host_lookup_failed is set to ++ "1". ++ ++ However, if either of the lookups cannot be completed (for example, there ++ is a DNS timeout), $host_lookup_deferred is set to "1", and ++ $host_lookup_failed remains set to "0". ++ ++ Once $host_lookup_failed is set to "1", Exim does not try to look up the ++ host name again if there is a subsequent reference to $sender_host_name in ++ the same Exim process, but it does try again if $host_lookup_deferred is ++ set to "1". ++ ++ Exim does not automatically look up every calling host's name. If you want ++ maximum efficiency, you should arrange your configuration so that it avoids ++ these lookups altogether. The lookup happens only if one or more of the ++ following are true: ++ ++ + A string containing $sender_host_name is expanded. ++ ++ + The calling host matches the list in host_lookup. In the default ++ configuration, this option is set to *, so it must be changed if ++ lookups are to be avoided. (In the code, the default for host_lookup is ++ unset.) ++ ++ + Exim needs the host name in order to test an item in a host list. The ++ items that require this are described in sections 10.13 and 10.16. ++ ++ + The calling host matches helo_try_verify_hosts or helo_verify_hosts. In ++ this case, the host name is required to compare with the name quoted in ++ any EHLO or HELO commands that the client issues. ++ ++ + The remote host issues a EHLO or HELO command that quotes one of the ++ domains in helo_lookup_domains. The default value of this option is ++ ++ helo_lookup_domains = @ : @[] ++ ++ which causes a lookup if a remote host (incorrectly) gives the server's ++ name or IP address in an EHLO or HELO command. ++ ++$sender_host_port ++ ++ When a message is received from a remote host, this variable contains the ++ port number that was used on the remote host. ++ ++$sender_ident ++ ++ When a message is received from a remote host, this variable contains the ++ identification received in response to an RFC 1413 request. When a message ++ has been received locally, this variable contains the login name of the ++ user that called Exim. ++ ++$sender_rate_xxx ++ ++ A number of variables whose names begin $sender_rate_ are set as part of ++ the ratelimit ACL condition. Details are given in section 42.37. ++ ++$sender_rcvhost ++ ++ This is provided specifically for use in Received: headers. It starts with ++ either the verified host name (as obtained from a reverse DNS lookup) or, ++ if there is no verified host name, the IP address in square brackets. After ++ that there may be text in parentheses. When the first item is a verified ++ host name, the first thing in the parentheses is the IP address in square ++ brackets, followed by a colon and a port number if port logging is enabled. ++ When the first item is an IP address, the port is recorded as "port=xxxx" ++ inside the parentheses. ++ ++ There may also be items of the form "helo=xxxx" if HELO or EHLO was used ++ and its argument was not identical to the real host name or IP address, and ++ "ident=xxxx" if an RFC 1413 ident string is available. If all three items ++ are present in the parentheses, a newline and tab are inserted into the ++ string, to improve the formatting of the Received: header. ++ ++$sender_verify_failure ++ ++ In an ACL, when a sender verification fails, this variable contains ++ information about the failure. The details are the same as for ++ $recipient_verify_failure. ++ ++$sending_ip_address ++ ++ This variable is set whenever an outgoing SMTP connection to another host ++ has been set up. It contains the IP address of the local interface that is ++ being used. This is useful if a host that has more than one IP address ++ wants to take on different personalities depending on which one is being ++ used. For incoming connections, see $received_ip_address. ++ ++$sending_port ++ ++ This variable is set whenever an outgoing SMTP connection to another host ++ has been set up. It contains the local port that is being used. For ++ incoming connections, see $received_port. ++ ++$smtp_active_hostname ++ ++ During an incoming SMTP session, this variable contains the value of the ++ active host name, as specified by the smtp_active_hostname option. The ++ value of $smtp_active_hostname is saved with any message that is received, ++ so its value can be consulted during routing and delivery. ++ ++$smtp_command ++ ++ During the processing of an incoming SMTP command, this variable contains ++ the entire command. This makes it possible to distinguish between HELO and ++ EHLO in the HELO ACL, and also to distinguish between commands such as ++ these: ++ ++ MAIL FROM:<> ++ MAIL FROM: <> ++ ++ For a MAIL command, extra parameters such as SIZE can be inspected. For a ++ RCPT command, the address in $smtp_command is the original address before ++ any rewriting, whereas the values in $local_part and $domain are taken from ++ the address after SMTP-time rewriting. ++ ++$smtp_command_argument ++ ++ While an ACL is running to check an SMTP command, this variable contains ++ the argument, that is, the text that follows the command name, with leading ++ white space removed. Following the introduction of $smtp_command, this ++ variable is somewhat redundant, but is retained for backwards ++ compatibility. ++ ++$smtp_count_at_connection_start ++ ++ This variable is set greater than zero only in processes spawned by the ++ Exim daemon for handling incoming SMTP connections. The name is ++ deliberately long, in order to emphasize what the contents are. When the ++ daemon accepts a new connection, it increments this variable. A copy of the ++ variable is passed to the child process that handles the connection, but ++ its value is fixed, and never changes. It is only an approximation of how ++ many incoming connections there actually are, because many other ++ connections may come and go while a single connection is being processed. ++ When a child process terminates, the daemon decrements its copy of the ++ variable. ++ ++$sn0 - $sn9 ++ ++ These variables are copies of the values of the $n0 - $n9 accumulators that ++ were current at the end of the system filter file. This allows a system ++ filter file to set values that can be tested in users' filter files. For ++ example, a system filter could set a value indicating how likely it is that ++ a message is junk mail. ++ ++$spam_xxx ++ ++ A number of variables whose names start with $spam are available when Exim ++ is compiled with the content-scanning extension. For details, see section ++ 43.2. ++ ++$spool_directory ++ ++ The name of Exim's spool directory. ++ ++$spool_inodes ++ ++ The number of free inodes in the disk partition where Exim's spool files ++ are being written. The value is recalculated whenever the variable is ++ referenced. If the relevant file system does not have the concept of ++ inodes, the value of is -1. See also the check_spool_inodes option. ++ ++$spool_space ++ ++ The amount of free space (as a number of kilobytes) in the disk partition ++ where Exim's spool files are being written. The value is recalculated ++ whenever the variable is referenced. If the operating system does not have ++ the ability to find the amount of free space (only true for experimental ++ systems), the space value is -1. For example, to check in an ACL that there ++ is at least 50 megabytes free on the spool, you could write: ++ ++ condition = ${if > {$spool_space}{50000}} ++ ++ See also the check_spool_space option. ++ ++$thisaddress ++ ++ This variable is set only during the processing of the foranyaddress ++ command in a filter file. Its use is explained in the description of that ++ command, which can be found in the separate document entitled Exim's ++ interfaces to mail filtering. ++ ++$tls_in_bits ++ ++ Contains an approximation of the TLS cipher's bit-strength on the inbound ++ connection; the meaning of this depends upon the TLS implementation used. ++ If TLS has not been negotiated, the value will be 0. The value of this is ++ automatically fed into the Cyrus SASL authenticator when acting as a ++ server, to specify the "external SSF" (a SASL term). ++ ++ The deprecated $tls_bits variable refers to the inbound side except when ++ used in the context of an outbound SMTP delivery, when it refers to the ++ outbound. ++ ++$tls_out_bits ++ ++ Contains an approximation of the TLS cipher's bit-strength on an outbound ++ SMTP connection; the meaning of this depends upon the TLS implementation ++ used. If TLS has not been negotiated, the value will be 0. ++ ++$tls_in_certificate_verified ++ ++ This variable is set to "1" if a TLS certificate was verified when the ++ message was received, and "0" otherwise. ++ ++ The deprecated $tls_certificate_verfied variable refers to the inbound side ++ except when used in the context of an outbound SMTP delivery, when it ++ refers to the outbound. ++ ++$tls_out_certificate_verified ++ ++ This variable is set to "1" if a TLS certificate was verified when an ++ outbound SMTP connection was made, and "0" otherwise. ++ ++$tls_in_cipher ++ ++ When a message is received from a remote host over an encrypted SMTP ++ connection, this variable is set to the cipher suite that was negotiated, ++ for example DES-CBC3-SHA. In other circumstances, in particular, for ++ message received over unencrypted connections, the variable is empty. ++ Testing $tls_cipher for emptiness is one way of distinguishing between ++ encrypted and non-encrypted connections during ACL processing. ++ ++ The deprecated $tls_cipher variable is the same as $tls_in_cipher during ++ message reception, but in the context of an outward SMTP delivery taking ++ place via the smtp transport becomes the same as $tls_out_cipher. ++ ++$tls_out_cipher ++ ++ This variable is cleared before any outgoing SMTP connection is made, and ++ then set to the outgoing cipher suite if one is negotiated. See chapter 41 ++ for details of TLS support and chapter 30 for details of the smtp ++ transport. ++ ++$tls_in_peerdn ++ ++ When a message is received from a remote host over an encrypted SMTP ++ connection, and Exim is configured to request a certificate from the ++ client, the value of the Distinguished Name of the certificate is made ++ available in the $tls_in_peerdn during subsequent processing. ++ ++ The deprecated $tls_peerdn variable refers to the inbound side except when ++ used in the context of an outbound SMTP delivery, when it refers to the ++ outbound. ++ ++$tls_out_peerdn ++ ++ When a message is being delivered to a remote host over an encrypted SMTP ++ connection, and Exim is configured to request a certificate from the ++ server, the value of the Distinguished Name of the certificate is made ++ available in the $tls_out_peerdn during subsequent processing. ++ ++$tls_in_sni ++ ++ When a TLS session is being established, if the client sends the Server ++ Name Indication extension, the value will be placed in this variable. If ++ the variable appears in tls_certificate then this option and some others, ++ described in 41.10, will be re-expanded early in the TLS session, to permit ++ a different certificate to be presented (and optionally a different key to ++ be used) to the client, based upon the value of the SNI extension. ++ ++ The deprecated $tls_sni variable refers to the inbound side except when ++ used in the context of an outbound SMTP delivery, when it refers to the ++ outbound. ++ ++$tls_out_sni ++ ++ During outbound SMTP deliveries, this variable reflects the value of the ++ tls_sni option on the transport. ++ ++$tod_bsdinbox ++ ++ The time of day and the date, in the format required for BSD-style mailbox ++ files, for example: Thu Oct 17 17:14:09 1995. ++ ++$tod_epoch ++ ++ The time and date as a number of seconds since the start of the Unix epoch. ++ ++$tod_epoch_l ++ ++ The time and date as a number of microseconds since the start of the Unix ++ epoch. ++ ++$tod_full ++ ++ A full version of the time and date, for example: Wed, 16 Oct 1995 09:51:40 ++ +0100. The timezone is always given as a numerical offset from UTC, with ++ positive values used for timezones that are ahead (east) of UTC, and ++ negative values for those that are behind (west). ++ ++$tod_log ++ ++ The time and date in the format used for writing Exim's log files, for ++ example: 1995-10-12 15:32:29, but without a timezone. ++ ++$tod_logfile ++ ++ This variable contains the date in the format yyyymmdd. This is the format ++ that is used for datestamping log files when log_file_path contains the ++ "%D" flag. ++ ++$tod_zone ++ ++ This variable contains the numerical value of the local timezone, for ++ example: -0500. ++ ++$tod_zulu ++ ++ This variable contains the UTC date and time in "Zulu" format, as specified ++ by ISO 8601, for example: 20030221154023Z. ++ ++$transport_name ++ ++ During the running of a transport, this variable contains its name. ++ ++$value ++ ++ This variable contains the result of an expansion lookup, extraction ++ operation, or external command, as described above. It is also used during ++ a reduce expansion. ++ ++$version_number ++ ++ The version number of Exim. ++ ++$warn_message_delay ++ ++ This variable is set only during the creation of a message warning about a ++ delivery delay. Details of its use are explained in section 48.2. ++ ++$warn_message_recipients ++ ++ This variable is set only during the creation of a message warning about a ++ delivery delay. Details of its use are explained in section 48.2. ++ ++ ++ ++=============================================================================== ++12. EMBEDDED PERL ++ ++Exim can be built to include an embedded Perl interpreter. When this is done, ++Perl subroutines can be called as part of the string expansion process. To make ++use of the Perl support, you need version 5.004 or later of Perl installed on ++your system. To include the embedded interpreter in the Exim binary, include ++the line ++ ++EXIM_PERL = perl.o ++ ++in your Local/Makefile and then build Exim in the normal way. ++ ++ ++12.1 Setting up so Perl can be used ++----------------------------------- ++ ++Access to Perl subroutines is via a global configuration option called ++perl_startup and an expansion string operator ${perl ...}. If there is no ++perl_startup option in the Exim configuration file then no Perl interpreter is ++started and there is almost no overhead for Exim (since none of the Perl ++library will be paged in unless used). If there is a perl_startup option then ++the associated value is taken to be Perl code which is executed in a newly ++created Perl interpreter. ++ ++The value of perl_startup is not expanded in the Exim sense, so you do not need ++backslashes before any characters to escape special meanings. The option should ++usually be something like ++ ++perl_startup = do '/etc/exim.pl' ++ ++where /etc/exim.pl is Perl code which defines any subroutines you want to use ++from Exim. Exim can be configured either to start up a Perl interpreter as soon ++as it is entered, or to wait until the first time it is needed. Starting the ++interpreter at the beginning ensures that it is done while Exim still has its ++setuid privilege, but can impose an unnecessary overhead if Perl is not in fact ++used in a particular run. Also, note that this does not mean that Exim is ++necessarily running as root when Perl is called at a later time. By default, ++the interpreter is started only when it is needed, but this can be changed in ++two ways: ++ ++ * Setting perl_at_start (a boolean option) in the configuration requests a ++ startup when Exim is entered. ++ ++ * The command line option -ps also requests a startup when Exim is entered, ++ overriding the setting of perl_at_start. ++ ++There is also a command line option -pd (for delay) which suppresses the ++initial startup, even if perl_at_start is set. ++ ++ ++12.2 Calling Perl subroutines ++----------------------------- ++ ++When the configuration file includes a perl_startup option you can make use of ++the string expansion item to call the Perl subroutines that are defined by the ++perl_startup code. The operator is used in any of the following forms: ++ ++${perl{foo}} ++${perl{foo}{argument}} ++${perl{foo}{argument1}{argument2} ... } ++ ++which calls the subroutine foo with the given arguments. A maximum of eight ++arguments may be passed. Passing more than this results in an expansion failure ++with an error message of the form ++ ++Too many arguments passed to Perl subroutine "foo" (max is 8) ++ ++The return value of the Perl subroutine is evaluated in a scalar context before ++it is passed back to Exim to be inserted into the expanded string. If the ++return value is undef, the expansion is forced to fail in the same way as an ++explicit "fail" on an if or lookup item. If the subroutine aborts by obeying ++Perl's die function, the expansion fails with the error message that was passed ++to die. ++ ++ ++12.3 Calling Exim functions from Perl ++------------------------------------- ++ ++Within any Perl code called from Exim, the function Exim::expand_string() is ++available to call back into Exim's string expansion function. For example, the ++Perl code ++ ++my $lp = Exim::expand_string('$local_part'); ++ ++makes the current Exim $local_part available in the Perl variable $lp. Note ++those are single quotes and not double quotes to protect against $local_part ++being interpolated as a Perl variable. ++ ++If the string expansion is forced to fail by a "fail" item, the result of ++Exim::expand_string() is undef. If there is a syntax error in the expansion ++string, the Perl call from the original expansion string fails with an ++appropriate error message, in the same way as if die were used. ++ ++Two other Exim functions are available for use from within Perl code. ++Exim::debug_write() writes a string to the standard error stream if Exim's ++debugging is enabled. If you want a newline at the end, you must supply it. ++Exim::log_write() writes a string to Exim's main log, adding a leading ++timestamp. In this case, you should not supply a terminating newline. ++ ++ ++12.4 Use of standard output and error by Perl ++--------------------------------------------- ++ ++You should not write to the standard error or output streams from within your ++Perl code, as it is not defined how these are set up. In versions of Exim ++before 4.50, it is possible for the standard output or error to refer to the ++SMTP connection during message reception via the daemon. Writing to this stream ++is certain to cause chaos. From Exim 4.50 onwards, the standard output and ++error streams are connected to /dev/null in the daemon. The chaos is avoided, ++but the output is lost. ++ ++The Perl warn statement writes to the standard error stream by default. Calls ++to warn may be embedded in Perl modules that you use, but over which you have ++no control. When Exim starts up the Perl interpreter, it arranges for output ++from the warn statement to be written to the Exim main log. You can change this ++by including appropriate Perl magic somewhere in your Perl code. For example, ++to discard warn output completely, you need this: ++ ++$SIG{__WARN__} = sub { }; ++ ++Whenever a warn is obeyed, the anonymous subroutine is called. In this example, ++the code for the subroutine is empty, so it does nothing, but you can include ++any Perl code that you like. The text of the warn message is passed as the ++first subroutine argument. ++ ++ ++ ++=============================================================================== ++13. STARTING THE DAEMON AND THE USE OF NETWORK INTERFACES ++ ++A host that is connected to a TCP/IP network may have one or more physical ++hardware network interfaces. Each of these interfaces may be configured as one ++or more "logical" interfaces, which are the entities that a program actually ++works with. Each of these logical interfaces is associated with an IP address. ++In addition, TCP/IP software supports "loopback" interfaces (127.0.0.1 in IPv4 ++and ::1 in IPv6), which do not use any physical hardware. Exim requires ++knowledge about the host's interfaces for use in three different circumstances: ++ ++ 1. When a listening daemon is started, Exim needs to know which interfaces and ++ ports to listen on. ++ ++ 2. When Exim is routing an address, it needs to know which IP addresses are ++ associated with local interfaces. This is required for the correct ++ processing of MX lists by removing the local host and others with the same ++ or higher priority values. Also, Exim needs to detect cases when an address ++ is routed to an IP address that in fact belongs to the local host. Unless ++ the self router option or the allow_localhost option of the smtp transport ++ is set (as appropriate), this is treated as an error situation. ++ ++ 3. When Exim connects to a remote host, it may need to know which interface to ++ use for the outgoing connection. ++ ++Exim's default behaviour is likely to be appropriate in the vast majority of ++cases. If your host has only one interface, and you want all its IP addresses ++to be treated in the same way, and you are using only the standard SMTP port, ++you should not need to take any special action. The rest of this chapter does ++not apply to you. ++ ++In a more complicated situation you may want to listen only on certain ++interfaces, or on different ports, and for this reason there are a number of ++options that can be used to influence Exim's behaviour. The rest of this ++chapter describes how they operate. ++ ++When a message is received over TCP/IP, the interface and port that were ++actually used are set in $received_ip_address and $received_port. ++ ++ ++13.1 Starting a listening daemon ++-------------------------------- ++ ++When a listening daemon is started (by means of the -bd command line option), ++the interfaces and ports on which it listens are controlled by the following ++options: ++ ++ * daemon_smtp_ports contains a list of default ports. (For backward ++ compatibility, this option can also be specified in the singular.) ++ ++ * local_interfaces contains list of interface IP addresses on which to ++ listen. Each item may optionally also specify a port. ++ ++The default list separator in both cases is a colon, but this can be changed as ++described in section 6.19. When IPv6 addresses are involved, it is usually best ++to change the separator to avoid having to double all the colons. For example: ++ ++local_interfaces = <; 127.0.0.1 ; \ ++ 192.168.23.65 ; \ ++ ::1 ; \ ++ 3ffe:ffff:836f::fe86:a061 ++ ++There are two different formats for specifying a port along with an IP address ++in local_interfaces: ++ ++ 1. The port is added onto the address with a dot separator. For example, to ++ listen on port 1234 on two different IP addresses: ++ ++ local_interfaces = <; 192.168.23.65.1234 ; \ ++ 3ffe:ffff:836f::fe86:a061.1234 ++ ++ 2. The IP address is enclosed in square brackets, and the port is added with a ++ colon separator, for example: ++ ++ local_interfaces = <; [192.168.23.65]:1234 ; \ ++ [3ffe:ffff:836f::fe86:a061]:1234 ++ ++When a port is not specified, the value of daemon_smtp_ports is used. The ++default setting contains just one port: ++ ++daemon_smtp_ports = smtp ++ ++If more than one port is listed, each interface that does not have its own port ++specified listens on all of them. Ports that are listed in daemon_smtp_ports ++can be identified either by name (defined in /etc/services) or by number. ++However, when ports are given with individual IP addresses in local_interfaces, ++only numbers (not names) can be used. ++ ++ ++13.2 Special IP listening addresses ++----------------------------------- ++ ++The addresses 0.0.0.0 and ::0 are treated specially. They are interpreted as ++"all IPv4 interfaces" and "all IPv6 interfaces", respectively. In each case, ++Exim tells the TCP/IP stack to "listen on all IPvx interfaces" instead of ++setting up separate listening sockets for each interface. The default value of ++local_interfaces is ++ ++local_interfaces = 0.0.0.0 ++ ++when Exim is built without IPv6 support; otherwise it is: ++ ++local_interfaces = <; ::0 ; 0.0.0.0 ++ ++Thus, by default, Exim listens on all available interfaces, on the SMTP port. ++ ++ ++13.3 Overriding local_interfaces and daemon_smtp_ports ++------------------------------------------------------ ++ ++The -oX command line option can be used to override the values of ++daemon_smtp_ports and/or local_interfaces for a particular daemon instance. ++Another way of doing this would be to use macros and the -D option. However, ++-oX can be used by any admin user, whereas modification of the runtime ++configuration by -D is allowed only when the caller is root or exim. ++ ++The value of -oX is a list of items. The default colon separator can be changed ++in the usual way if required. If there are any items that do not contain dots ++or colons (that is, are not IP addresses), the value of daemon_smtp_ports is ++replaced by the list of those items. If there are any items that do contain ++dots or colons, the value of local_interfaces is replaced by those items. Thus, ++for example, ++ ++-oX 1225 ++ ++overrides daemon_smtp_ports, but leaves local_interfaces unchanged, whereas ++ ++-oX 192.168.34.5.1125 ++ ++overrides local_interfaces, leaving daemon_smtp_ports unchanged. (However, ++since local_interfaces now contains no items without ports, the value of ++daemon_smtp_ports is no longer relevant in this example.) ++ ++ ++13.4 Support for the obsolete SSMTP (or SMTPS) protocol ++------------------------------------------------------- ++ ++Exim supports the obsolete SSMTP protocol (also known as SMTPS) that was used ++before the STARTTLS command was standardized for SMTP. Some legacy clients ++still use this protocol. If the tls_on_connect_ports option is set to a list of ++port numbers, connections to those ports must use SSMTP. The most common use of ++this option is expected to be ++ ++tls_on_connect_ports = 465 ++ ++because 465 is the usual port number used by the legacy clients. There is also ++a command line option -tls-on-connect, which forces all ports to behave in this ++way when a daemon is started. ++ ++Warning: Setting tls_on_connect_ports does not of itself cause the daemon to ++listen on those ports. You must still specify them in daemon_smtp_ports, ++local_interfaces, or the -oX option. (This is because tls_on_connect_ports ++applies to inetd connections as well as to connections via the daemon.) ++ ++ ++13.5 IPv6 address scopes ++------------------------ ++ ++IPv6 addresses have "scopes", and a host with multiple hardware interfaces can, ++in principle, have the same link-local IPv6 address on different interfaces. ++Thus, additional information is needed, over and above the IP address, to ++distinguish individual interfaces. A convention of using a percent sign ++followed by something (often the interface name) has been adopted in some ++cases, leading to addresses like this: ++ ++fe80::202:b3ff:fe03:45c1%eth0 ++ ++To accommodate this usage, a percent sign followed by an arbitrary string is ++allowed at the end of an IPv6 address. By default, Exim calls getaddrinfo() to ++convert a textual IPv6 address for actual use. This function recognizes the ++percent convention in operating systems that support it, and it processes the ++address appropriately. Unfortunately, some older libraries have problems with ++getaddrinfo(). If ++ ++IPV6_USE_INET_PTON=yes ++ ++is set in Local/Makefile (or an OS-dependent Makefile) when Exim is built, Exim ++uses inet_pton() to convert a textual IPv6 address for actual use, instead of ++getaddrinfo(). (Before version 4.14, it always used this function.) Of course, ++this means that the additional functionality of getaddrinfo() - recognizing ++scoped addresses - is lost. ++ ++ ++13.6 Disabling IPv6 ++------------------- ++ ++Sometimes it happens that an Exim binary that was compiled with IPv6 support is ++run on a host whose kernel does not support IPv6. The binary will fall back to ++using IPv4, but it may waste resources looking up AAAA records, and trying to ++connect to IPv6 addresses, causing delays to mail delivery. If you set the ++disable_ipv6 option true, even if the Exim binary has IPv6 support, no IPv6 ++activities take place. AAAA records are never looked up, and any IPv6 addresses ++that are listed in local_interfaces, data for the manualroute router, etc. are ++ignored. If IP literals are enabled, the ipliteral router declines to handle ++IPv6 literal addresses. ++ ++On the other hand, when IPv6 is in use, there may be times when you want to ++disable it for certain hosts or domains. You can use the dns_ipv4_lookup option ++to globally suppress the lookup of AAAA records for specified domains, and you ++can use the ignore_target_hosts generic router option to ignore IPv6 addresses ++in an individual router. ++ ++ ++13.7 Examples of starting a listening daemon ++-------------------------------------------- ++ ++The default case in an IPv6 environment is ++ ++daemon_smtp_ports = smtp ++local_interfaces = <; ::0 ; 0.0.0.0 ++ ++This specifies listening on the smtp port on all IPv6 and IPv4 interfaces. ++Either one or two sockets may be used, depending on the characteristics of the ++TCP/IP stack. (This is complicated and messy; for more information, read the ++comments in the daemon.c source file.) ++ ++To specify listening on ports 25 and 26 on all interfaces: ++ ++daemon_smtp_ports = 25 : 26 ++ ++(leaving local_interfaces at the default setting) or, more explicitly: ++ ++local_interfaces = <; ::0.25 ; ::0.26 \ ++ 0.0.0.0.25 ; 0.0.0.0.26 ++ ++To listen on the default port on all IPv4 interfaces, and on port 26 on the ++IPv4 loopback address only: ++ ++local_interfaces = 0.0.0.0 : 127.0.0.1.26 ++ ++To specify listening on the default port on specific interfaces only: ++ ++local_interfaces = 10.0.0.67 : 192.168.34.67 ++ ++Warning: Such a setting excludes listening on the loopback interfaces. ++ ++ ++13.8 Recognizing the local host ++------------------------------- ++ ++The local_interfaces option is also used when Exim needs to determine whether ++or not an IP address refers to the local host. That is, the IP addresses of all ++the interfaces on which a daemon is listening are always treated as local. ++ ++For this usage, port numbers in local_interfaces are ignored. If either of the ++items 0.0.0.0 or ::0 are encountered, Exim gets a complete list of available ++interfaces from the operating system, and extracts the relevant (that is, IPv4 ++or IPv6) addresses to use for checking. ++ ++Some systems set up large numbers of virtual interfaces in order to provide ++many virtual web servers. In this situation, you may want to listen for email ++on only a few of the available interfaces, but nevertheless treat all ++interfaces as local when routing. You can do this by setting ++extra_local_interfaces to a list of IP addresses, possibly including the "all" ++wildcard values. These addresses are recognized as local, but are not used for ++listening. Consider this example: ++ ++local_interfaces = <; 127.0.0.1 ; ::1 ; \ ++ 192.168.53.235 ; \ ++ 3ffe:2101:12:1:a00:20ff:fe86:a061 ++ ++extra_local_interfaces = <; ::0 ; 0.0.0.0 ++ ++The daemon listens on the loopback interfaces and just one IPv4 and one IPv6 ++address, but all available interface addresses are treated as local when Exim ++is routing. ++ ++In some environments the local host name may be in an MX list, but with an IP ++address that is not assigned to any local interface. In other cases it may be ++desirable to treat other host names as if they referred to the local host. Both ++these cases can be handled by setting the hosts_treat_as_local option. This ++contains host names rather than IP addresses. When a host is referenced during ++routing, either via an MX record or directly, it is treated as the local host ++if its name matches hosts_treat_as_local, or if any of its IP addresses match ++local_interfaces or extra_local_interfaces. ++ ++ ++13.9 Delivering to a remote host ++-------------------------------- ++ ++Delivery to a remote host is handled by the smtp transport. By default, it ++allows the system's TCP/IP functions to choose which interface to use (if there ++is more than one) when connecting to a remote host. However, the interface ++option can be set to specify which interface is used. See the description of ++the smtp transport in chapter 30 for more details. ++ ++ ++ ++=============================================================================== ++14. MAIN CONFIGURATION ++ ++The first part of the run time configuration file contains three types of item: ++ ++ * Macro definitions: These lines start with an upper case letter. See section ++ 6.4 for details of macro processing. ++ ++ * Named list definitions: These lines start with one of the words ++ "domainlist", "hostlist", "addresslist", or "localpartlist". Their use is ++ described in section 10.5. ++ ++ * Main configuration settings: Each setting occupies one line of the file ++ (with possible continuations). If any setting is preceded by the word ++ "hide", the -bP command line option displays its value to admin users only. ++ See section 6.10 for a description of the syntax of these option settings. ++ ++This chapter specifies all the main configuration options, along with their ++types and default values. For ease of finding a particular option, they appear ++in alphabetical order in section 14.23 below. However, because there are now so ++many options, they are first listed briefly in functional groups, as an aid to ++finding the name of the option you are looking for. Some options are listed in ++more than one group. ++ ++ ++14.1 Miscellaneous ++------------------ ++ ++bi_command to run for -bi command line option ++disable_ipv6 do no IPv6 processing ++keep_malformed for broken files - should not happen ++localhost_number for unique message ids in clusters ++message_body_newlines retain newlines in $message_body ++message_body_visible how much to show in $message_body ++mua_wrapper run in "MUA wrapper" mode ++print_topbitchars top-bit characters are printing ++timezone force time zone ++ ++ ++14.2 Exim parameters ++-------------------- ++ ++exim_group override compiled-in value ++exim_path override compiled-in value ++exim_user override compiled-in value ++primary_hostname default from uname() ++split_spool_directory use multiple directories ++spool_directory override compiled-in value ++ ++ ++14.3 Privilege controls ++----------------------- ++ ++admin_groups groups that are Exim admin users ++deliver_drop_privilege drop root for delivery processes ++local_from_check insert Sender: if necessary ++local_from_prefix for testing From: for local sender ++local_from_suffix for testing From: for local sender ++local_sender_retain keep Sender: from untrusted user ++never_users do not run deliveries as these ++prod_requires_admin forced delivery requires admin user ++queue_list_requires_admin queue listing requires admin user ++trusted_groups groups that are trusted ++trusted_users users that are trusted ++ ++ ++14.4 Logging ++------------ ++ ++hosts_connection_nolog exemption from connect logging ++log_file_path override compiled-in value ++log_selector set/unset optional logging ++log_timezone add timezone to log lines ++message_logs create per-message logs ++preserve_message_logs after message completion ++process_log_path for SIGUSR1 and exiwhat ++syslog_duplication controls duplicate log lines on syslog ++syslog_facility set syslog "facility" field ++syslog_processname set syslog "ident" field ++syslog_timestamp timestamp syslog lines ++write_rejectlog control use of message log ++ ++ ++14.5 Frozen messages ++-------------------- ++ ++auto_thaw sets time for retrying frozen messages ++freeze_tell send message when freezing ++move_frozen_messages to another directory ++timeout_frozen_after keep frozen messages only so long ++ ++ ++14.6 Data lookups ++----------------- ++ ++ibase_servers InterBase servers ++ldap_ca_cert_dir dir of CA certs to verify LDAP server's ++ldap_ca_cert_file file of CA certs to verify LDAP server's ++ldap_cert_file client cert file for LDAP ++ldap_cert_key client key file for LDAP ++ldap_cipher_suite TLS negotiation preference control ++ldap_default_servers used if no server in query ++ldap_require_cert action to take without LDAP server cert ++ldap_start_tls require TLS within LDAP ++ldap_version set protocol version ++lookup_open_max lookup files held open ++mysql_servers default MySQL servers ++oracle_servers Oracle servers ++pgsql_servers default PostgreSQL servers ++sqlite_lock_timeout as it says ++ ++ ++14.7 Message ids ++---------------- ++ ++message_id_header_domain used to build Message-ID: header ++message_id_header_text ditto ++ ++ ++14.8 Embedded Perl Startup ++-------------------------- ++ ++perl_at_start always start the interpreter ++perl_startup code to obey when starting Perl ++ ++ ++14.9 Daemon ++----------- ++ ++daemon_smtp_ports default ports ++daemon_startup_retries number of times to retry ++daemon_startup_sleep time to sleep between tries ++extra_local_interfaces not necessarily listened on ++local_interfaces on which to listen, with optional ports ++pid_file_path override compiled-in value ++queue_run_max maximum simultaneous queue runners ++ ++ ++14.10 Resource control ++---------------------- ++ ++check_log_inodes before accepting a message ++check_log_space before accepting a message ++check_spool_inodes before accepting a message ++check_spool_space before accepting a message ++deliver_queue_load_max no queue deliveries if load high ++queue_only_load queue incoming if load high ++queue_only_load_latch don't re-evaluate load for each message ++queue_run_max maximum simultaneous queue runners ++remote_max_parallel parallel SMTP delivery per message ++smtp_accept_max simultaneous incoming connections ++smtp_accept_max_nonmail non-mail commands ++smtp_accept_max_nonmail_hosts hosts to which the limit applies ++smtp_accept_max_per_connection messages per connection ++smtp_accept_max_per_host connections from one host ++smtp_accept_queue queue mail if more connections ++smtp_accept_queue_per_connection queue if more messages per connection ++smtp_accept_reserve only reserve hosts if more connections ++smtp_check_spool_space from SIZE on MAIL command ++smtp_connect_backlog passed to TCP/IP stack ++smtp_load_reserve SMTP from reserved hosts if load high ++smtp_reserve_hosts these are the reserve hosts ++ ++ ++14.11 Policy controls ++--------------------- ++ ++acl_not_smtp ACL for non-SMTP messages ++acl_not_smtp_mime ACL for non-SMTP MIME parts ++acl_not_smtp_start ACL for start of non-SMTP message ++acl_smtp_auth ACL for AUTH ++acl_smtp_connect ACL for connection ++acl_smtp_data ACL for DATA ++acl_smtp_dkim ACL for DKIM verification ++acl_smtp_etrn ACL for ETRN ++acl_smtp_expn ACL for EXPN ++acl_smtp_helo ACL for EHLO or HELO ++acl_smtp_mail ACL for MAIL ++acl_smtp_mailauth ACL for AUTH on MAIL command ++acl_smtp_mime ACL for MIME parts ++acl_smtp_predata ACL for start of data ++acl_smtp_quit ACL for QUIT ++acl_smtp_rcpt ACL for RCPT ++acl_smtp_starttls ACL for STARTTLS ++acl_smtp_vrfy ACL for VRFY ++av_scanner specify virus scanner ++check_rfc2047_length check length of RFC 2047 "encoded words" ++dns_csa_search_limit control CSA parent search depth ++dns_csa_use_reverse en/disable CSA IP reverse search ++header_maxsize total size of message header ++header_line_maxsize individual header line limit ++helo_accept_junk_hosts allow syntactic junk from these hosts ++helo_allow_chars allow illegal chars in HELO names ++helo_lookup_domains lookup hostname for these HELO names ++helo_try_verify_hosts HELO soft-checked for these hosts ++helo_verify_hosts HELO hard-checked for these hosts ++host_lookup host name looked up for these hosts ++host_lookup_order order of DNS and local name lookups ++host_reject_connection reject connection from these hosts ++hosts_treat_as_local useful in some cluster configurations ++local_scan_timeout timeout for local_scan() ++message_size_limit for all messages ++percent_hack_domains recognize %-hack for these domains ++spamd_address set interface to SpamAssassin ++strict_acl_vars object to unset ACL variables ++ ++ ++14.12 Callout cache ++------------------- ++ ++callout_domain_negative_expire timeout for negative domain cache item ++callout_domain_positive_expire timeout for positive domain cache item ++callout_negative_expire timeout for negative address cache item ++callout_positive_expire timeout for positive address cache item ++callout_random_local_part string to use for "random" testing ++ ++ ++14.13 TLS ++--------- ++ ++gnutls_compat_mode use GnuTLS compatibility mode ++gnutls_enable_pkcs11 allow GnuTLS to autoload PKCS11 modules ++openssl_options adjust OpenSSL compatibility options ++tls_advertise_hosts advertise TLS to these hosts ++tls_certificate location of server certificate ++tls_crl certificate revocation list ++tls_dh_max_bits clamp D-H bit count suggestion ++tls_dhparam DH parameters for server ++tls_on_connect_ports specify SSMTP (SMTPS) ports ++tls_privatekey location of server private key ++tls_remember_esmtp don't reset after starting TLS ++tls_require_ciphers specify acceptable ciphers ++tls_try_verify_hosts try to verify client certificate ++tls_verify_certificates expected client certificates ++tls_verify_hosts insist on client certificate verify ++ ++ ++14.14 Local user handling ++------------------------- ++ ++finduser_retries useful in NIS environments ++gecos_name used when creating Sender: ++gecos_pattern ditto ++max_username_length for systems that truncate ++unknown_login used when no login name found ++unknown_username ditto ++uucp_from_pattern for recognizing "From " lines ++uucp_from_sender ditto ++ ++ ++14.15 All incoming messages (SMTP and non-SMTP) ++----------------------------------------------- ++ ++header_maxsize total size of message header ++header_line_maxsize individual header line limit ++message_size_limit applies to all messages ++percent_hack_domains recognize %-hack for these domains ++received_header_text expanded to make Received: ++received_headers_max for mail loop detection ++recipients_max limit per message ++recipients_max_reject permanently reject excess recipients ++ ++ ++14.16 Non-SMTP incoming messages ++-------------------------------- ++ ++receive_timeout for non-SMTP messages ++ ++ ++14.17 Incoming SMTP messages ++---------------------------- ++ ++See also the Policy controls section above. ++ ++host_lookup host name looked up for these hosts ++host_lookup_order order of DNS and local name lookups ++recipient_unqualified_hosts may send unqualified recipients ++rfc1413_hosts make ident calls to these hosts ++rfc1413_query_timeout zero disables ident calls ++sender_unqualified_hosts may send unqualified senders ++smtp_accept_keepalive some TCP/IP magic ++smtp_accept_max simultaneous incoming connections ++smtp_accept_max_nonmail non-mail commands ++smtp_accept_max_nonmail_hosts hosts to which the limit applies ++smtp_accept_max_per_connection messages per connection ++smtp_accept_max_per_host connections from one host ++smtp_accept_queue queue mail if more connections ++smtp_accept_queue_per_connection queue if more messages per connection ++smtp_accept_reserve only reserve hosts if more connections ++smtp_active_hostname host name to use in messages ++smtp_banner text for welcome banner ++smtp_check_spool_space from SIZE on MAIL command ++smtp_connect_backlog passed to TCP/IP stack ++smtp_enforce_sync of SMTP command/responses ++smtp_etrn_command what to run for ETRN ++smtp_etrn_serialize only one at once ++smtp_load_reserve only reserve hosts if this load ++smtp_max_unknown_commands before dropping connection ++smtp_ratelimit_hosts apply ratelimiting to these hosts ++smtp_ratelimit_mail ratelimit for MAIL commands ++smtp_ratelimit_rcpt ratelimit for RCPT commands ++smtp_receive_timeout per command or data line ++smtp_reserve_hosts these are the reserve hosts ++smtp_return_error_details give detail on rejections ++ ++ ++14.18 SMTP extensions ++--------------------- ++ ++accept_8bitmime advertise 8BITMIME ++auth_advertise_hosts advertise AUTH to these hosts ++ignore_fromline_hosts allow "From " from these hosts ++ignore_fromline_local allow "From " from local SMTP ++pipelining_advertise_hosts advertise pipelining to these hosts ++tls_advertise_hosts advertise TLS to these hosts ++ ++ ++14.19 Processing messages ++------------------------- ++ ++allow_domain_literals recognize domain literal syntax ++allow_mx_to_ip allow MX to point to IP address ++allow_utf8_domains in addresses ++check_rfc2047_length check length of RFC 2047 "encoded words" ++delivery_date_remove from incoming messages ++envelope_to_remove from incoming messages ++extract_addresses_remove_arguments affects -t processing ++headers_charset default for translations ++qualify_domain default for senders ++qualify_recipient default for recipients ++return_path_remove from incoming messages ++strip_excess_angle_brackets in addresses ++strip_trailing_dot at end of addresses ++untrusted_set_sender untrusted can set envelope sender ++ ++ ++14.20 System filter ++------------------- ++ ++system_filter locate system filter ++system_filter_directory_transport transport for delivery to a directory ++system_filter_file_transport transport for delivery to a file ++system_filter_group group for filter running ++system_filter_pipe_transport transport for delivery to a pipe ++system_filter_reply_transport transport for autoreply delivery ++system_filter_user user for filter running ++ ++ ++14.21 Routing and delivery ++-------------------------- ++ ++disable_ipv6 do no IPv6 processing ++dns_again_means_nonexist for broken domains ++dns_check_names_pattern pre-DNS syntax check ++dns_ipv4_lookup only v4 lookup for these domains ++dns_retrans parameter for resolver ++dns_retry parameter for resolver ++dns_use_dnssec parameter for resolver ++dns_use_edns0 parameter for resolver ++hold_domains hold delivery for these domains ++local_interfaces for routing checks ++queue_domains no immediate delivery for these ++queue_only no immediate delivery at all ++queue_only_file no immediate delivery if file exists ++queue_only_load no immediate delivery if load is high ++queue_only_load_latch don't re-evaluate load for each message ++queue_only_override allow command line to override ++queue_run_in_order order of arrival ++queue_run_max of simultaneous queue runners ++queue_smtp_domains no immediate SMTP delivery for these ++remote_max_parallel parallel SMTP delivery per message ++remote_sort_domains order of remote deliveries ++retry_data_expire timeout for retry data ++retry_interval_max safety net for retry rules ++ ++ ++14.22 Bounce and warning messages ++--------------------------------- ++ ++bounce_message_file content of bounce ++bounce_message_text content of bounce ++bounce_return_body include body if returning message ++bounce_return_message include original message in bounce ++bounce_return_size_limit limit on returned message ++bounce_sender_authentication send authenticated sender with bounce ++dsn_from set From: contents in bounces ++errors_copy copy bounce messages ++errors_reply_to Reply-to: in bounces ++delay_warning time schedule ++delay_warning_condition condition for warning messages ++ignore_bounce_errors_after discard undeliverable bounces ++smtp_return_error_details give detail on rejections ++warn_message_file content of warning message ++ ++ ++14.23 Alphabetical list of main options ++--------------------------------------- ++ ++Those options that undergo string expansion before use are marked with *. ++ +++-----------------------------------------------------+ ++|accept_8bitmime|Use: main|Type: boolean|Default: true| +++-----------------------------------------------------+ ++ ++This option causes Exim to send 8BITMIME in its response to an SMTP EHLO ++command, and to accept the BODY= parameter on MAIL commands. However, though ++Exim is 8-bit clean, it is not a protocol converter, and it takes no steps to ++do anything special with messages received by this route. ++ ++Historically Exim kept this option off by default, but the maintainers feel ++that in today's Internet, this causes more problems than it solves. It now ++defaults to true. A more detailed analysis of the issues is provided by Dan ++Bernstein: ++ ++http://cr.yp.to/smtp/8bitmime.html ++ ++To log received 8BITMIME status use ++ ++log_selector = +8bitmime ++ +++---------------------------------------------------+ ++|acl_not_smtp|Use: main|Type: string*|Default: unset| +++---------------------------------------------------+ ++ ++This option defines the ACL that is run when a non-SMTP message has been read ++and is on the point of being accepted. See chapter 42 for further details. ++ +++--------------------------------------------------------+ ++|acl_not_smtp_mime|Use: main|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++This option defines the ACL that is run for individual MIME parts of non-SMTP ++messages. It operates in exactly the same way as acl_smtp_mime operates for ++SMTP messages. ++ +++---------------------------------------------------------+ ++|acl_not_smtp_start|Use: main|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++This option defines the ACL that is run before Exim starts reading a non-SMTP ++message. See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_auth|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP AUTH command is received. ++See chapter 42 for further details. ++ +++-------------------------------------------------------+ ++|acl_smtp_connect|Use: main|Type: string*|Default: unset| +++-------------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP connection is received. ++See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_data|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run after an SMTP DATA command has been ++processed and the message itself has been received, but before the final ++acknowledgment is sent. See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_etrn|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP ETRN command is received. ++See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_expn|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP EXPN command is received. ++See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_helo|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP EHLO or HELO command is ++received. See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_mail|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP MAIL command is received. ++See chapter 42 for further details. ++ +++--------------------------------------------------------+ ++|acl_smtp_mailauth|Use: main|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++This option defines the ACL that is run when there is an AUTH parameter on a ++MAIL command. See chapter 42 for details of ACLs, and chapter 33 for details of ++authentication. ++ +++----------------------------------------------------+ ++|acl_smtp_mime|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option is available when Exim is built with the content-scanning ++extension. It defines the ACL that is run for each MIME part in a message. See ++section 43.4 for details. ++ +++-------------------------------------------------------+ ++|acl_smtp_predata|Use: main|Type: string*|Default: unset| +++-------------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP DATA command is received, ++before the message itself is received. See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_quit|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP QUIT command is received. ++See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_rcpt|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP RCPT command is received. ++See chapter 42 for further details. ++ +++--------------------------------------------------------+ ++|acl_smtp_starttls|Use: main|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP STARTTLS command is ++received. See chapter 42 for further details. ++ +++----------------------------------------------------+ ++|acl_smtp_vrfy|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option defines the ACL that is run when an SMTP VRFY command is received. ++See chapter 42 for further details. ++ +++--------------------------------------------------------+ ++|admin_groups|Use: main|Type: string list*|Default: unset| +++--------------------------------------------------------+ ++ ++This option is expanded just once, at the start of Exim's processing. If the ++current group or any of the supplementary groups of an Exim caller is in this ++colon-separated list, the caller has admin privileges. If all your system ++programmers are in a specific group, for example, you can give them all Exim ++admin privileges by putting that group in admin_groups. However, this does not ++permit them to read Exim's spool files (whose group owner is the Exim gid). To ++permit this, you have to add individuals to the Exim group. ++ +++------------------------------------------------------------+ ++|allow_domain_literals|Use: main|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is set, the RFC 2822 domain literal format is permitted in email ++addresses. The option is not set by default, because the domain literal format ++is not normally required these days, and few people know about it. It has, ++however, been exploited by mail abusers. ++ ++Unfortunately, it seems that some DNS black list maintainers are using this ++format to report black listing to postmasters. If you want to accept messages ++addressed to your hosts by IP address, you need to set allow_domain_literals ++true, and also to add "@[]" to the list of local domains (defined in the named ++domain list local_domains in the default configuration). This "magic string" ++matches the domain literal form of all the local host's IP addresses. ++ +++-----------------------------------------------------+ ++|allow_mx_to_ip|Use: main|Type: boolean|Default: false| +++-----------------------------------------------------+ ++ ++It appears that more and more DNS zone administrators are breaking the rules ++and putting domain names that look like IP addresses on the right hand side of ++MX records. Exim follows the rules and rejects this, giving an error message ++that explains the mis-configuration. However, some other MTAs support this ++practice, so to avoid "Why can't Exim do this?" complaints, allow_mx_to_ip ++exists, in order to enable this heinous activity. It is not recommended, except ++when you have no other choice. ++ +++---------------------------------------------------------+ ++|allow_utf8_domains|Use: main|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++Lots of discussion is going on about internationalized domain names. One camp ++is strongly in favour of just using UTF-8 characters, and it seems that at ++least two other MTAs permit this. This option allows Exim users to experiment ++if they wish. ++ ++If it is set true, Exim's domain parsing function allows valid UTF-8 ++multicharacters to appear in domain name components, in addition to letters, ++digits, and hyphens. However, just setting this option is not enough; if you ++want to look up these domain names in the DNS, you must also adjust the value ++of dns_check_names_pattern to match the extended form. A suitable setting is: ++ ++dns_check_names_pattern = (?i)^(?>(?(1)\.|())[a-z0-9\xc0-\xff]\ ++ (?>[-a-z0-9\x80-\xff]*[a-z0-9\x80-\xbf])?)+$ ++ ++Alternatively, you can just disable this feature by setting ++ ++dns_check_names_pattern = ++ ++That is, set the option to an empty string so that no check is done. ++ +++----------------------------------------------------------+ ++|auth_advertise_hosts|Use: main|Type: host list*|Default: *| +++----------------------------------------------------------+ ++ ++If any server authentication mechanisms are configured, Exim advertises them in ++response to an EHLO command only if the calling host matches this list. ++Otherwise, Exim does not advertise AUTH. Exim does not accept AUTH commands ++from clients to which it has not advertised the availability of AUTH. The ++advertising of individual authentication mechanisms can be controlled by the ++use of the server_advertise_condition generic authenticator option on the ++individual authenticators. See chapter 33 for further details. ++ ++Certain mail clients (for example, Netscape) require the user to provide a name ++and password for authentication if AUTH is advertised, even though it may not ++be needed (the host may accept messages from hosts on its local LAN without ++authentication, for example). The auth_advertise_hosts option can be used to ++make these clients more friendly by excluding them from the set of hosts to ++which Exim advertises AUTH. ++ ++If you want to advertise the availability of AUTH only when the connection is ++encrypted using TLS, you can make use of the fact that the value of this option ++is expanded, with a setting like this: ++ ++auth_advertise_hosts = ${if eq{$tls_in_cipher}{}{}{*}} ++ ++If $tls_in_cipher is empty, the session is not encrypted, and the result of the ++expansion is empty, thus matching no hosts. Otherwise, the result of the ++expansion is *, which matches all hosts. ++ +++------------------------------------------+ ++|auto_thaw|Use: main|Type: time|Default: 0s| +++------------------------------------------+ ++ ++If this option is set to a time greater than zero, a queue runner will try a ++new delivery attempt on any frozen message, other than a bounce message, if ++this much time has passed since it was frozen. This may result in the message ++being re-frozen if nothing has changed since the last attempt. It is a way of ++saying "keep on trying, even though there are big problems". ++ ++Note: This is an old option, which predates timeout_frozen_after and ++ignore_bounce_errors_after. It is retained for compatibility, but it is not ++thought to be very useful any more, and its use should probably be avoided. ++ +++----------------------------------------------------+ ++|av_scanner|Use: main|Type: string|Default: see below| +++----------------------------------------------------+ ++ ++This option is available if Exim is built with the content-scanning extension. ++It specifies which anti-virus scanner to use. The default value is: ++ ++sophie:/var/run/sophie ++ ++If the value of av_scanner starts with a dollar character, it is expanded ++before use. See section 43.1 for further details. ++ +++------------------------------------------------+ ++|bi_command|Use: main|Type: string|Default: unset| +++------------------------------------------------+ ++ ++This option supplies the name of a command that is run when Exim is called with ++the -bi option (see chapter 5). The string value is just the command name, it ++is not a complete command line. If an argument is required, it must come from ++the -oA command line option. ++ +++---------------------------------------------------------+ ++|bounce_message_file|Use: main|Type: string|Default: unset| +++---------------------------------------------------------+ ++ ++This option defines a template file containing paragraphs of text to be used ++for constructing bounce messages. Details of the file's contents are given in ++chapter 48. See also warn_message_file. ++ +++---------------------------------------------------------+ ++|bounce_message_text|Use: main|Type: string|Default: unset| +++---------------------------------------------------------+ ++ ++When this option is set, its contents are included in the default bounce ++message immediately after "This message was created automatically by mail ++delivery software." It is not used if bounce_message_file is set. ++ +++--------------------------------------------------------+ ++|bounce_return_body|Use: main|Type: boolean|Default: true| +++--------------------------------------------------------+ ++ ++This option controls whether the body of an incoming message is included in a ++bounce message when bounce_return_message is true. The default setting causes ++the entire message, both header and body, to be returned (subject to the value ++of bounce_return_size_limit). If this option is false, only the message header ++is included. In the case of a non-SMTP message containing an error that is ++detected during reception, only those header lines preceding the point at which ++the error was detected are returned. ++ +++-----------------------------------------------------------+ ++|bounce_return_message|Use: main|Type: boolean|Default: true| +++-----------------------------------------------------------+ ++ ++If this option is set false, none of the original message is included in bounce ++messages generated by Exim. See also bounce_return_size_limit and ++bounce_return_body. ++ +++--------------------------------------------------------------+ ++|bounce_return_size_limit|Use: main|Type: integer|Default: 100K| +++--------------------------------------------------------------+ ++ ++This option sets a limit in bytes on the size of messages that are returned to ++senders as part of bounce messages when bounce_return_message is true. The ++limit should be less than the value of the global message_size_limit and of any ++message_size_limit settings on transports, to allow for the bounce text that ++Exim generates. If this option is set to zero there is no limit. ++ ++When the body of any message that is to be included in a bounce message is ++greater than the limit, it is truncated, and a comment pointing this out is ++added at the top. The actual cutoff may be greater than the value given, owing ++to the use of buffering for transferring the message in chunks (typically 8K in ++size). The idea is to save bandwidth on those undeliverable 15-megabyte ++messages. ++ +++------------------------------------------------------------------+ ++|bounce_sender_authentication|Use: main|Type: string|Default: unset| +++------------------------------------------------------------------+ ++ ++This option provides an authenticated sender address that is sent with any ++bounce messages generated by Exim that are sent over an authenticated SMTP ++connection. A typical setting might be: ++ ++bounce_sender_authentication = mailer-daemon@my.domain.example ++ ++which would cause bounce messages to be sent using the SMTP command: ++ ++MAIL FROM:<> AUTH=mailer-daemon@my.domain.example ++ ++The value of bounce_sender_authentication must always be a complete email ++address. ++ +++---------------------------------------------------------------+ ++|callout_domain_negative_expire|Use: main|Type: time|Default: 3h| +++---------------------------------------------------------------+ ++ ++This option specifies the expiry time for negative callout cache data for a ++domain. See section 42.44 for details of callout verification, and section ++42.46 for details of the caching. ++ +++---------------------------------------------------------------+ ++|callout_domain_positive_expire|Use: main|Type: time|Default: 7d| +++---------------------------------------------------------------+ ++ ++This option specifies the expiry time for positive callout cache data for a ++domain. See section 42.44 for details of callout verification, and section ++42.46 for details of the caching. ++ +++--------------------------------------------------------+ ++|callout_negative_expire|Use: main|Type: time|Default: 2h| +++--------------------------------------------------------+ ++ ++This option specifies the expiry time for negative callout cache data for an ++address. See section 42.44 for details of callout verification, and section ++42.46 for details of the caching. ++ +++---------------------------------------------------------+ ++|callout_positive_expire|Use: main|Type: time|Default: 24h| +++---------------------------------------------------------+ ++ ++This option specifies the expiry time for positive callout cache data for an ++address. See section 42.44 for details of callout verification, and section ++42.46 for details of the caching. ++ +++--------------------------------------------------------------------+ ++|callout_random_local_part|Use: main|Type: string*|Default: see below| +++--------------------------------------------------------------------+ ++ ++This option defines the "random" local part that can be used as part of callout ++verification. The default value is ++ ++$primary_hostname-$tod_epoch-testing ++ ++See section 42.45 for details of how this value is used. ++ +++---------------------------------------------------+ ++|check_log_inodes|Use: main|Type: integer|Default: 0| +++---------------------------------------------------+ ++ ++See check_spool_space below. ++ +++--------------------------------------------------+ ++|check_log_space|Use: main|Type: integer|Default: 0| +++--------------------------------------------------+ ++ ++See check_spool_space below. ++ +++----------------------------------------------------------+ ++|check_rfc2047_length|Use: main|Type: boolean|Default: true| +++----------------------------------------------------------+ ++ ++RFC 2047 defines a way of encoding non-ASCII characters in headers using a ++system of "encoded words". The RFC specifies a maximum length for an encoded ++word; strings to be encoded that exceed this length are supposed to use ++multiple encoded words. By default, Exim does not recognize encoded words that ++exceed the maximum length. However, it seems that some software, in violation ++of the RFC, generates overlong encoded words. If check_rfc2047_length is set ++false, Exim recognizes encoded words of any length. ++ +++-----------------------------------------------------+ ++|check_spool_inodes|Use: main|Type: integer|Default: 0| +++-----------------------------------------------------+ ++ ++See check_spool_space below. ++ +++----------------------------------------------------+ ++|check_spool_space|Use: main|Type: integer|Default: 0| +++----------------------------------------------------+ ++ ++The four check_... options allow for checking of disk resources before a ++message is accepted. ++ ++When any of these options are set, they apply to all incoming messages. If you ++want to apply different checks to different kinds of message, you can do so by ++testing the variables $log_inodes, $log_space, $spool_inodes, and $spool_space ++in an ACL with appropriate additional conditions. ++ ++check_spool_space and check_spool_inodes check the spool partition if either ++value is greater than zero, for example: ++ ++check_spool_space = 10M ++check_spool_inodes = 100 ++ ++The spool partition is the one that contains the directory defined by ++SPOOL_DIRECTORY in Local/Makefile. It is used for holding messages in transit. ++ ++check_log_space and check_log_inodes check the partition in which log files are ++written if either is greater than zero. These should be set only if ++log_file_path and spool_directory refer to different partitions. ++ ++If there is less space or fewer inodes than requested, Exim refuses to accept ++incoming mail. In the case of SMTP input this is done by giving a 452 temporary ++error response to the MAIL command. If ESMTP is in use and there was a SIZE ++parameter on the MAIL command, its value is added to the check_spool_space ++value, and the check is performed even if check_spool_space is zero, unless ++no_smtp_check_spool_space is set. ++ ++The values for check_spool_space and check_log_space are held as a number of ++kilobytes. If a non-multiple of 1024 is specified, it is rounded up. ++ ++For non-SMTP input and for batched SMTP input, the test is done at start-up; on ++failure a message is written to stderr and Exim exits with a non-zero code, as ++it obviously cannot send an error message of any kind. ++ +++--------------------------------------------------------+ ++|daemon_smtp_ports|Use: main|Type: string|Default: "smtp"| +++--------------------------------------------------------+ ++ ++This option specifies one or more default SMTP ports on which the Exim daemon ++listens. See chapter 13 for details of how it is used. For backward ++compatibility, daemon_smtp_port (singular) is a synonym. ++ +++---------------------------------------------------------+ ++|daemon_startup_retries|Use: main|Type: integer|Default: 9| +++---------------------------------------------------------+ ++ ++This option, along with daemon_startup_sleep, controls the retrying done by the ++daemon at startup when it cannot immediately bind a listening socket (typically ++because the socket is already in use): daemon_startup_retries defines the ++number of retries after the first failure, and daemon_startup_sleep defines the ++length of time to wait between retries. ++ +++------------------------------------------------------+ ++|daemon_startup_sleep|Use: main|Type: time|Default: 30s| +++------------------------------------------------------+ ++ ++See daemon_startup_retries. ++ +++----------------------------------------------------+ ++|delay_warning|Use: main|Type: time list|Default: 24h| +++----------------------------------------------------+ ++ ++When a message is delayed, Exim sends a warning message to the sender at ++intervals specified by this option. The data is a colon-separated list of times ++after which to send warning messages. If the value of the option is an empty ++string or a zero time, no warnings are sent. Up to 10 times may be given. If a ++message has been on the queue for longer than the last time, the last interval ++between the times is used to compute subsequent warning times. For example, ++with ++ ++delay_warning = 4h:8h:24h ++ ++the first message is sent after 4 hours, the second after 8 hours, and the ++third one after 24 hours. After that, messages are sent every 16 hours, because ++that is the interval between the last two times on the list. If you set just ++one time, it specifies the repeat interval. For example, with: ++ ++delay_warning = 6h ++ ++messages are repeated every six hours. To stop warnings after a given time, set ++a very large time at the end of the list. For example: ++ ++delay_warning = 2h:12h:99d ++ +++------------------------------------------------------------------+ ++|delay_warning_condition|Use: main|Type: string*|Default: see below| +++------------------------------------------------------------------+ ++ ++The string is expanded at the time a warning message might be sent. If all the ++deferred addresses have the same domain, it is set in $domain during the ++expansion. Otherwise $domain is empty. If the result of the expansion is a ++forced failure, an empty string, or a string matching any of "0", "no" or ++"false" (the comparison being done caselessly) then the warning message is not ++sent. The default is: ++ ++delay_warning_condition = ${if or {\ ++ { !eq{$h_list-id:$h_list-post:$h_list-subscribe:}{} }\ ++ { match{$h_precedence:}{(?i)bulk|list|junk} }\ ++ { match{$h_auto-submitted:}{(?i)auto-generated|auto-replied} }\ ++ } {no}{yes}} ++ ++This suppresses the sending of warnings for messages that contain List-ID:, ++List-Post:, or List-Subscribe: headers, or have "bulk", "list" or "junk" in a ++Precedence: header, or have "auto-generated" or "auto-replied" in an ++Auto-Submitted: header. ++ +++-------------------------------------------------------------+ ++|deliver_drop_privilege|Use: main|Type: boolean|Default: false| +++-------------------------------------------------------------+ ++ ++If this option is set true, Exim drops its root privilege at the start of a ++delivery process, and runs as the Exim user throughout. This severely restricts ++the kinds of local delivery that are possible, but is viable in certain types ++of configuration. There is a discussion about the use of root privilege in ++chapter 54. ++ +++-----------------------------------------------------------------+ ++|deliver_queue_load_max|Use: main|Type: fixed-point|Default: unset| +++-----------------------------------------------------------------+ ++ ++When this option is set, a queue run is abandoned if the system load average ++becomes greater than the value of the option. The option has no effect on ++ancient operating systems on which Exim cannot determine the load average. See ++also queue_only_load and smtp_load_reserve. ++ +++----------------------------------------------------------+ ++|delivery_date_remove|Use: main|Type: boolean|Default: true| +++----------------------------------------------------------+ ++ ++Exim's transports have an option for adding a Delivery-date: header to a ++message when it is delivered, in exactly the same way as Return-path: is ++handled. Delivery-date: records the actual time of delivery. Such headers ++should not be present in incoming messages, and this option causes them to be ++removed at the time the message is received, to avoid any problems that might ++occur when a delivered message is subsequently sent on to some other recipient. ++ +++----------------------------------------------------+ ++|disable_fsync|Use: main|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++This option is available only if Exim was built with the compile-time option ++ENABLE_DISABLE_FSYNC. When this is not set, a reference to disable_fsync in a ++runtime configuration generates an "unknown option" error. You should not build ++Exim with ENABLE_DISABLE_FSYNC or set disable_fsync unless you really, really, ++really understand what you are doing. No pre-compiled distributions of Exim ++should ever make this option available. ++ ++When disable_fsync is set true, Exim no longer calls fsync() to force updated ++files' data to be written to disc before continuing. Unexpected events such as ++crashes and power outages may cause data to be lost or scrambled. Here be ++Dragons. Beware. ++ +++---------------------------------------------------+ ++|disable_ipv6|Use: main|Type: boolean|Default: false| +++---------------------------------------------------+ ++ ++If this option is set true, even if the Exim binary has IPv6 support, no IPv6 ++activities take place. AAAA records are never looked up, and any IPv6 addresses ++that are listed in local_interfaces, data for the manualroute router, etc. are ++ignored. If IP literals are enabled, the ipliteral router declines to handle ++IPv6 literal addresses. ++ +++--------------------------------------------------------------------+ ++|dns_again_means_nonexist|Use: main|Type: domain list*|Default: unset| +++--------------------------------------------------------------------+ ++ ++DNS lookups give a "try again" response for the DNS errors "non-authoritative ++host not found" and "SERVERFAIL". This can cause Exim to keep trying to deliver ++a message, or to give repeated temporary errors to incoming mail. Sometimes the ++effect is caused by a badly set up name server and may persist for a long time. ++If a domain which exhibits this problem matches anything in ++dns_again_means_nonexist, it is treated as if it did not exist. This option ++should be used with care. You can make it apply to reverse lookups by a setting ++such as this: ++ ++dns_again_means_nonexist = *.in-addr.arpa ++ ++This option applies to all DNS lookups that Exim does. It also applies when the ++gethostbyname() or getipnodebyname() functions give temporary errors, since ++these are most likely to be caused by DNS lookup problems. The dnslookup router ++has some options of its own for controlling what happens when lookups for MX or ++SRV records give temporary errors. These more specific options are applied ++after this global option. ++ +++-----------------------------------------------------------------+ ++|dns_check_names_pattern|Use: main|Type: string|Default: see below| +++-----------------------------------------------------------------+ ++ ++When this option is set to a non-empty string, it causes Exim to check domain ++names for characters that are not allowed in host names before handing them to ++the DNS resolver, because some resolvers give temporary errors for names that ++contain unusual characters. If a domain name contains any unwanted characters, ++a "not found" result is forced, and the resolver is not called. The check is ++done by matching the domain name against a regular expression, which is the ++value of this option. The default pattern is ++ ++dns_check_names_pattern = \ ++ (?i)^(?>(?(1)\.|())[^\W_](?>[a-z0-9/-]*[^\W_])?)+$ ++ ++which permits only letters, digits, slashes, and hyphens in components, but ++they must start and end with a letter or digit. Slashes are not, in fact, ++permitted in host names, but they are found in certain NS records (which can be ++accessed in Exim by using a dnsdb lookup). If you set allow_utf8_domains, you ++must modify this pattern, or set the option to an empty string. ++ +++-------------------------------------------------------+ ++|dns_csa_search_limit|Use: main|Type: integer|Default: 5| +++-------------------------------------------------------+ ++ ++This option controls the depth of parental searching for CSA SRV records in the ++DNS, as described in more detail in section 42.49. ++ +++---------------------------------------------------------+ ++|dns_csa_use_reverse|Use: main|Type: boolean|Default: true| +++---------------------------------------------------------+ ++ ++This option controls whether or not an IP address, given as a CSA domain, is ++reversed and looked up in the reverse DNS, as described in more detail in ++section 42.49. ++ +++-----------------------------------------------------------+ ++|dns_ipv4_lookup|Use: main|Type: domain list*|Default: unset| +++-----------------------------------------------------------+ ++ ++When Exim is compiled with IPv6 support and disable_ipv6 is not set, it looks ++for IPv6 address records (AAAA records) as well as IPv4 address records (A ++records) when trying to find IP addresses for hosts, unless the host's domain ++matches this list. ++ ++This is a fudge to help with name servers that give big delays or otherwise do ++not work for the AAAA record type. In due course, when the world's name servers ++have all been upgraded, there should be no need for this option. ++ +++--------------------------------------------+ ++|dns_retrans|Use: main|Type: time|Default: 0s| +++--------------------------------------------+ ++ ++The options dns_retrans and dns_retry can be used to set the retransmission and ++retry parameters for DNS lookups. Values of zero (the defaults) leave the ++system default settings unchanged. The first value is the time between retries, ++and the second is the number of retries. It isn't totally clear exactly how ++these settings affect the total time a DNS lookup may take. I haven't found any ++documentation about timeouts on DNS lookups; these parameter values are ++available in the external resolver interface structure, but nowhere does it ++seem to describe how they are used or what you might want to set in them. ++ +++--------------------------------------------+ ++|dns_retry|Use: main|Type: integer|Default: 0| +++--------------------------------------------+ ++ ++See dns_retrans above. ++ +++--------------------------------------------------+ ++|dns_use_dnssec|Use: main|Type: integer|Default: -1| +++--------------------------------------------------+ ++ ++If this option is set to a non-negative number then Exim will initialise the ++DNS resolver library to either use or not use DNSSEC, overriding the system ++default. A value of 0 coerces DNSSEC off, a value of 1 coerces DNSSEC on. ++ ++If the resolver library does not support DNSSEC then this option has no effect. ++ +++-------------------------------------------------+ ++|dns_use_edns0|Use: main|Type: integer|Default: -1| +++-------------------------------------------------+ ++ ++If this option is set to a non-negative number then Exim will initialise the ++DNS resolver library to either use or not use EDNS0 extensions, overriding the ++system default. A value of 0 coerces EDNS0 off, a value of 1 coerces EDNS0 on. ++ ++If the resolver library does not support EDNS0 then this option has no effect. ++ +++----------------------------------------------+ ++|drop_cr|Use: main|Type: boolean|Default: false| +++----------------------------------------------+ ++ ++This is an obsolete option that is now a no-op. It used to affect the way Exim ++handled CR and LF characters in incoming messages. What happens now is ++described in section 46.2. ++ +++---------------------------------------------------+ ++|dsn_from|Use: main|Type: string*|Default: see below| +++---------------------------------------------------+ ++ ++This option can be used to vary the contents of From: header lines in bounces ++and other automatically generated messages ("Delivery Status Notifications" - ++hence the name of the option). The default setting is: ++ ++dsn_from = Mail Delivery System <Mailer-Daemon@$qualify_domain> ++ ++The value is expanded every time it is needed. If the expansion fails, a panic ++is logged, and the default value is used. ++ +++--------------------------------------------------------+ ++|envelope_to_remove|Use: main|Type: boolean|Default: true| +++--------------------------------------------------------+ ++ ++Exim's transports have an option for adding an Envelope-to: header to a message ++when it is delivered, in exactly the same way as Return-path: is handled. ++Envelope-to: records the original recipient address from the messages's ++envelope that caused the delivery to happen. Such headers should not be present ++in incoming messages, and this option causes them to be removed at the time the ++message is received, to avoid any problems that might occur when a delivered ++message is subsequently sent on to some other recipient. ++ +++-------------------------------------------------------+ ++|errors_copy|Use: main|Type: string list*|Default: unset| +++-------------------------------------------------------+ ++ ++Setting this option causes Exim to send bcc copies of bounce messages that it ++generates to other addresses. Note: This does not apply to bounce messages ++coming from elsewhere. The value of the option is a colon-separated list of ++items. Each item consists of a pattern, terminated by white space, followed by ++a comma-separated list of email addresses. If a pattern contains spaces, it ++must be enclosed in double quotes. ++ ++Each pattern is processed in the same way as a single item in an address list ++(see section 10.19). When a pattern matches the recipient of the bounce ++message, the message is copied to the addresses on the list. The items are ++scanned in order, and once a matching one is found, no further items are ++examined. For example: ++ ++errors_copy = spqr@mydomain postmaster@mydomain.example :\ ++ rqps@mydomain hostmaster@mydomain.example,\ ++ postmaster@mydomain.example ++ ++The address list is expanded before use. The expansion variables $local_part ++and $domain are set from the original recipient of the error message, and if ++there was any wildcard matching in the pattern, the expansion variables $0, $1, ++etc. are set in the normal way. ++ +++-----------------------------------------------------+ ++|errors_reply_to|Use: main|Type: string|Default: unset| +++-----------------------------------------------------+ ++ ++By default, Exim's bounce and delivery warning messages contain the header line ++ ++From: Mail Delivery System <Mailer-Daemon@qualify-domain> ++ ++where qualify-domain is the value of the qualify_domain option. A warning ++message that is generated by the quota_warn_message option in an appendfile ++transport may contain its own From: header line that overrides the default. ++ ++Experience shows that people reply to bounce messages. If the errors_reply_to ++option is set, a Reply-To: header is added to bounce and warning messages. For ++example: ++ ++errors_reply_to = postmaster@my.domain.example ++ ++The value of the option is not expanded. It must specify a valid RFC 2822 ++address. However, if a warning message that is generated by the ++quota_warn_message option in an appendfile transport contain its own Reply-To: ++header line, the value of the errors_reply_to option is not used. ++ +++------------------------------------------------------------------+ ++|exim_group|Use: main|Type: string|Default: compile-time configured| +++------------------------------------------------------------------+ ++ ++This option changes the gid under which Exim runs when it gives up root ++privilege. The default value is compiled into the binary. The value of this ++option is used only when exim_user is also set. Unless it consists entirely of ++digits, the string is looked up using getgrnam(), and failure causes a ++configuration error. See chapter 54 for a discussion of security issues. ++ +++---------------------------------------------------+ ++|exim_path|Use: main|Type: string|Default: see below| +++---------------------------------------------------+ ++ ++This option specifies the path name of the Exim binary, which is used when Exim ++needs to re-exec itself. The default is set up to point to the file exim in the ++directory configured at compile time by the BIN_DIRECTORY setting. It is ++necessary to change exim_path if, exceptionally, Exim is run from some other ++place. Warning: Do not use a macro to define the value of this option, because ++you will break those Exim utilities that scan the configuration file to find ++where the binary is. (They then use the -bP option to extract option settings ++such as the value of spool_directory.) ++ +++-----------------------------------------------------------------+ ++|exim_user|Use: main|Type: string|Default: compile-time configured| +++-----------------------------------------------------------------+ ++ ++This option changes the uid under which Exim runs when it gives up root ++privilege. The default value is compiled into the binary. Ownership of the run ++time configuration file and the use of the -C and -D command line options is ++checked against the values in the binary, not what is set here. ++ ++Unless it consists entirely of digits, the string is looked up using getpwnam() ++, and failure causes a configuration error. If exim_group is not also supplied, ++the gid is taken from the result of getpwnam() if it is used. See chapter 54 ++for a discussion of security issues. ++ +++-----------------------------------------------------------------+ ++|extra_local_interfaces|Use: main|Type: string list|Default: unset| +++-----------------------------------------------------------------+ ++ ++This option defines network interfaces that are to be considered local when ++routing, but which are not used for listening by the daemon. See section 13.8 ++for details. ++ +++---------------------------------------------------------------------------+ ++|extract_addresses_remove_ arguments|Use: main|Type: boolean|Default: true| +++---------------------------------------------------------------------------+ ++ ++According to some Sendmail documentation (Sun, IRIX, HP-UX), if any addresses ++are present on the command line when the -t option is used to build an envelope ++from a message's To:, Cc: and Bcc: headers, the command line addresses are ++removed from the recipients list. This is also how Smail behaves. However, ++other Sendmail documentation (the O'Reilly book) states that command line ++addresses are added to those obtained from the header lines. When ++extract_addresses_remove_arguments is true (the default), Exim subtracts ++argument headers. If it is set false, Exim adds rather than removes argument ++addresses. ++ +++---------------------------------------------------+ ++|finduser_retries|Use: main|Type: integer|Default: 0| +++---------------------------------------------------+ ++ ++On systems running NIS or other schemes in which user and group information is ++distributed from a remote system, there can be times when getpwnam() and ++related functions fail, even when given valid data, because things time out. ++Unfortunately these failures cannot be distinguished from genuine "not found" ++errors. If finduser_retries is set greater than zero, Exim will try that many ++extra times to find a user or a group, waiting for one second between retries. ++ ++You should not set this option greater than zero if your user information is in ++a traditional /etc/passwd file, because it will cause Exim needlessly to search ++the file multiple times for non-existent users, and also cause delay. ++ +++-----------------------------------------------------------------------+ ++|freeze_tell|Use: main|Type: string list, comma separated|Default: unset| +++-----------------------------------------------------------------------+ ++ ++On encountering certain errors, or when configured to do so in a system filter, ++ACL, or special router, Exim freezes a message. This means that no further ++delivery attempts take place until an administrator thaws the message, or the ++auto_thaw, ignore_bounce_errors_after, or timeout_frozen_after feature cause it ++to be processed. If freeze_tell is set, Exim generates a warning message ++whenever it freezes something, unless the message it is freezing is a ++locally-generated bounce message. (Without this exception there is the ++possibility of looping.) The warning message is sent to the addresses supplied ++as the comma-separated value of this option. If several of the message's ++addresses cause freezing, only a single message is sent. If the freezing was ++automatic, the reason(s) for freezing can be found in the message log. If you ++configure freezing in a filter or ACL, you must arrange for any logging that ++you require. ++ +++-------------------------------------------------+ ++|gecos_name|Use: main|Type: string*|Default: unset| +++-------------------------------------------------+ ++ ++Some operating systems, notably HP-UX, use the "gecos" field in the system ++password file to hold other information in addition to users' real names. Exim ++looks up this field for use when it is creating Sender: or From: headers. If ++either gecos_pattern or gecos_name are unset, the contents of the field are ++used unchanged, except that, if an ampersand is encountered, it is replaced by ++the user's login name with the first character forced to upper case, since this ++is a convention that is observed on many systems. ++ ++When these options are set, gecos_pattern is treated as a regular expression ++that is to be applied to the field (again with & replaced by the login name), ++and if it matches, gecos_name is expanded and used as the user's name. ++ ++Numeric variables such as $1, $2, etc. can be used in the expansion to pick up ++sub-fields that were matched by the pattern. In HP-UX, where the user's name ++terminates at the first comma, the following can be used: ++ ++gecos_pattern = ([^,]*) ++gecos_name = $1 ++ +++---------------------------------------------------+ ++|gecos_pattern|Use: main|Type: string|Default: unset| +++---------------------------------------------------+ ++ ++See gecos_name above. ++ +++---------------------------------------------------------+ ++|gnutls_compat_mode|Use: main|Type: boolean|Default: unset| +++---------------------------------------------------------+ ++ ++This option controls whether GnuTLS is used in compatibility mode in an Exim ++server. This reduces security slightly, but improves interworking with older ++implementations of TLS. ++ ++option gnutls_enable_pkcs11 main boolean unset This option will let GnuTLS ++(2.12.0 or later) autoload PKCS11 modules with the p11-kit configuration files ++in /etc/pkcs11/modules/. ++ ++See http://www.gnutls.org/manual/gnutls.html#Smart-cards-and-HSMs for ++documentation. ++ +++---------------------------------------------------------+ ++|headers_charset|Use: main|Type: string|Default: see below| +++---------------------------------------------------------+ ++ ++This option sets a default character set for translating from encoded MIME ++"words" in header lines, when referenced by an $h_xxx expansion item. The ++default is the value of HEADERS_CHARSET in Local/Makefile. The ultimate default ++is ISO-8859-1. For more details see the description of header insertions in ++section 11.5. ++ +++---------------------------------------------------------+ ++|header_maxsize|Use: main|Type: integer|Default: see below| +++---------------------------------------------------------+ ++ ++This option controls the overall maximum size of a message's header section. ++The default is the value of HEADER_MAXSIZE in Local/Makefile; the default for ++that is 1M. Messages with larger header sections are rejected. ++ +++------------------------------------------------------+ ++|header_line_maxsize|Use: main|Type: integer|Default: 0| +++------------------------------------------------------+ ++ ++This option limits the length of any individual header line in a message, after ++all the continuations have been joined together. Messages with individual ++header lines that are longer than the limit are rejected. The default value of ++zero means "no limit". ++ +++----------------------------------------------------------------+ ++|helo_accept_junk_hosts|Use: main|Type: host list*|Default: unset| +++----------------------------------------------------------------+ ++ ++Exim checks the syntax of HELO and EHLO commands for incoming SMTP mail, and ++gives an error response for invalid data. Unfortunately, there are some SMTP ++clients that send syntactic junk. They can be accommodated by setting this ++option. Note that this is a syntax check only. See helo_verify_hosts if you ++want to do semantic checking. See also helo_allow_chars for a way of extending ++the permitted character set. ++ +++------------------------------------------------------+ ++|helo_allow_chars|Use: main|Type: string|Default: unset| +++------------------------------------------------------+ ++ ++This option can be set to a string of rogue characters that are permitted in ++all EHLO and HELO names in addition to the standard letters, digits, hyphens, ++and dots. If you really must allow underscores, you can set ++ ++helo_allow_chars = _ ++ ++Note that the value is one string, not a list. ++ +++-----------------------------------------------------------------+ ++|helo_lookup_domains|Use: main|Type: domain list*|Default: "@:@[]"| +++-----------------------------------------------------------------+ ++ ++If the domain given by a client in a HELO or EHLO command matches this list, a ++reverse lookup is done in order to establish the host's true name. The default ++forces a lookup if the client host gives the server's name or any of its IP ++addresses (in brackets), something that broken clients have been seen to do. ++ +++---------------------------------------------------------------+ ++|helo_try_verify_hosts|Use: main|Type: host list*|Default: unset| +++---------------------------------------------------------------+ ++ ++By default, Exim just checks the syntax of HELO and EHLO commands (see ++helo_accept_junk_hosts and helo_allow_chars). However, some sites like to do ++more extensive checking of the data supplied by these commands. The ACL ++condition "verify = helo" is provided to make this possible. Formerly, it was ++necessary also to set this option (helo_try_verify_hosts) to force the check to ++occur. From release 4.53 onwards, this is no longer necessary. If the check has ++not been done before "verify = helo" is encountered, it is done at that time. ++Consequently, this option is obsolete. Its specification is retained here for ++backwards compatibility. ++ ++When an EHLO or HELO command is received, if the calling host matches ++helo_try_verify_hosts, Exim checks that the host name given in the HELO or EHLO ++command either: ++ ++ * is an IP literal matching the calling address of the host, or ++ ++ * matches the host name that Exim obtains by doing a reverse lookup of the ++ calling host address, or ++ ++ * when looked up using gethostbyname() (or getipnodebyname() when available) ++ yields the calling host address. ++ ++However, the EHLO or HELO command is not rejected if any of the checks fail. ++Processing continues, but the result of the check is remembered, and can be ++detected later in an ACL by the "verify = helo" condition. ++ +++-----------------------------------------------------------+ ++|helo_verify_hosts|Use: main|Type: host list*|Default: unset| +++-----------------------------------------------------------+ ++ ++Like helo_try_verify_hosts, this option is obsolete, and retained only for ++backwards compatibility. For hosts that match this option, Exim checks the host ++name given in the HELO or EHLO in the same way as for helo_try_verify_hosts. If ++the check fails, the HELO or EHLO command is rejected with a 550 error, and ++entries are written to the main and reject logs. If a MAIL command is received ++before EHLO or HELO, it is rejected with a 503 error. ++ +++--------------------------------------------------------+ ++|hold_domains|Use: main|Type: domain list*|Default: unset| +++--------------------------------------------------------+ ++ ++This option allows mail for particular domains to be held on the queue ++manually. The option is overridden if a message delivery is forced with the -M, ++-qf, -Rf or -Sf options, and also while testing or verifying addresses using ++-bt or -bv. Otherwise, if a domain matches an item in hold_domains, no routing ++or delivery for that address is done, and it is deferred every time the message ++is looked at. ++ ++This option is intended as a temporary operational measure for delaying the ++delivery of mail while some problem is being sorted out, or some new ++configuration tested. If you just want to delay the processing of some domains ++until a queue run occurs, you should use queue_domains or queue_smtp_domains, ++not hold_domains. ++ ++A setting of hold_domains does not override Exim's code for removing messages ++from the queue if they have been there longer than the longest retry time in ++any retry rule. If you want to hold messages for longer than the normal retry ++times, insert a dummy retry rule with a long retry time. ++ +++-----------------------------------------------------+ ++|host_lookup|Use: main|Type: host list*|Default: unset| +++-----------------------------------------------------+ ++ ++Exim does not look up the name of a calling host from its IP address unless it ++is required to compare against some host list, or the host matches ++helo_try_verify_hosts or helo_verify_hosts, or the host matches this option ++(which normally contains IP addresses rather than host names). The default ++configuration file contains ++ ++host_lookup = * ++ ++which causes a lookup to happen for all hosts. If the expense of these lookups ++is felt to be too great, the setting can be changed or removed. ++ ++After a successful reverse lookup, Exim does a forward lookup on the name it ++has obtained, to verify that it yields the IP address that it started with. If ++this check fails, Exim behaves as if the name lookup failed. ++ ++After any kind of failure, the host name (in $sender_host_name) remains unset, ++and $host_lookup_failed is set to the string "1". See also ++dns_again_means_nonexist, helo_lookup_domains, and "verify = ++reverse_host_lookup" in ACLs. ++ +++---------------------------------------------------------------------+ ++|host_lookup_order|Use: main|Type: string list|Default: "bydns:byaddr"| +++---------------------------------------------------------------------+ ++ ++This option specifies the order of different lookup methods when Exim is trying ++to find a host name from an IP address. The default is to do a DNS lookup ++first, and then to try a local lookup (using gethostbyaddr() or equivalent) if ++that fails. You can change the order of these lookups, or omit one entirely, if ++you want. ++ ++Warning: The "byaddr" method does not always yield aliases when there are ++multiple PTR records in the DNS and the IP address is not listed in /etc/hosts. ++Different operating systems give different results in this case. That is why ++the default tries a DNS lookup first. ++ +++----------------------------------------------------------------+ ++|host_reject_connection|Use: main|Type: host list*|Default: unset| +++----------------------------------------------------------------+ ++ ++If this option is set, incoming SMTP calls from the hosts listed are rejected ++as soon as the connection is made. This option is obsolete, and retained only ++for backward compatibility, because nowadays the ACL specified by ++acl_smtp_connect can also reject incoming connections immediately. ++ ++The ability to give an immediate rejection (either by this option or using an ++ACL) is provided for use in unusual cases. Many hosts will just try again, ++sometimes without much delay. Normally, it is better to use an ACL to reject ++incoming messages at a later stage, such as after RCPT commands. See chapter 42 ++. ++ +++----------------------------------------------------------------+ ++|hosts_connection_nolog|Use: main|Type: host list*|Default: unset| +++----------------------------------------------------------------+ ++ ++This option defines a list of hosts for which connection logging does not ++happen, even though the smtp_connection log selector is set. For example, you ++might want not to log SMTP connections from local processes, or from 127.0.0.1, ++or from your local LAN. This option is consulted in the main loop of the ++daemon; you should therefore strive to restrict its value to a short inline ++list of IP addresses and networks. To disable logging SMTP connections from ++local processes, you must create a host list with an empty item. For example: ++ ++hosts_connection_nolog = : ++ ++If the smtp_connection log selector is not set, this option has no effect. ++ +++----------------------------------------------------------------+ ++|hosts_treat_as_local|Use: main|Type: domain list*|Default: unset| +++----------------------------------------------------------------+ ++ ++If this option is set, any host names that match the domain list are treated as ++if they were the local host when Exim is scanning host lists obtained from MX ++records or other sources. Note that the value of this option is a domain list, ++not a host list, because it is always used to check host names, not IP ++addresses. ++ ++This option also applies when Exim is matching the special items "@mx_any", ++"@mx_primary", and "@mx_secondary" in a domain list (see section 10.8), and ++when checking the hosts option in the smtp transport for the local host (see ++the allow_localhost option in that transport). See also local_interfaces, ++extra_local_interfaces, and chapter 13, which contains a discussion about local ++network interfaces and recognizing the local host. ++ +++--------------------------------------------------------+ ++|ibase_servers|Use: main|Type: string list|Default: unset| +++--------------------------------------------------------+ ++ ++This option provides a list of InterBase servers and associated connection ++data, to be used in conjunction with ibase lookups (see section 9.21). The ++option is available only if Exim has been built with InterBase support. ++ +++------------------------------------------------------------+ ++|ignore_bounce_errors_after|Use: main|Type: time|Default: 10w| +++------------------------------------------------------------+ ++ ++This option affects the processing of bounce messages that cannot be delivered, ++that is, those that suffer a permanent delivery failure. (Bounce messages that ++suffer temporary delivery failures are of course retried in the usual way.) ++ ++After a permanent delivery failure, bounce messages are frozen, because there ++is no sender to whom they can be returned. When a frozen bounce message has ++been on the queue for more than the given time, it is unfrozen at the next ++queue run, and a further delivery is attempted. If delivery fails again, the ++bounce message is discarded. This makes it possible to keep failed bounce ++messages around for a shorter time than the normal maximum retry time for ++frozen messages. For example, ++ ++ignore_bounce_errors_after = 12h ++ ++retries failed bounce message deliveries after 12 hours, discarding any further ++failures. If the value of this option is set to a zero time period, bounce ++failures are discarded immediately. Setting a very long time (as in the default ++value) has the effect of disabling this option. For ways of automatically ++dealing with other kinds of frozen message, see auto_thaw and ++timeout_frozen_after. ++ +++---------------------------------------------------------------+ ++|ignore_fromline_hosts|Use: main|Type: host list*|Default: unset| +++---------------------------------------------------------------+ ++ ++Some broken SMTP clients insist on sending a UUCP-like "From " line before the ++headers of a message. By default this is treated as the start of the message's ++body, which means that any following headers are not recognized as such. Exim ++can be made to ignore it by setting ignore_fromline_hosts to match those hosts ++that insist on sending it. If the sender is actually a local process rather ++than a remote host, and is using -bs to inject the messages, ++ignore_fromline_local must be set to achieve this effect. ++ +++------------------------------------------------------------+ ++|ignore_fromline_local|Use: main|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++See ignore_fromline_hosts above. ++ +++-----------------------------------------------+ ++|keep_malformed|Use: main|Type: time|Default: 4d| +++-----------------------------------------------+ ++ ++This option specifies the length of time to keep messages whose spool files ++have been corrupted in some way. This should, of course, never happen. At the ++next attempt to deliver such a message, it gets removed. The incident is ++logged. ++ +++------------------------------------------------------+ ++|ldap_ca_cert_dir|Use: main|Type: string|Default: unset| +++------------------------------------------------------+ ++ ++This option indicates which directory contains CA certificates for verifying a ++TLS certificate presented by an LDAP server. While Exim does not provide a ++default value, your SSL library may. Analogous to tls_verify_certificates but ++as a client-side option for LDAP and constrained to be a directory. ++ +++-------------------------------------------------------+ ++|ldap_ca_cert_file|Use: main|Type: string|Default: unset| +++-------------------------------------------------------+ ++ ++This option indicates which file contains CA certificates for verifying a TLS ++certificate presented by an LDAP server. While Exim does not provide a default ++value, your SSL library may. Analogous to tls_verify_certificates but as a ++client-side option for LDAP and constrained to be a file. ++ +++----------------------------------------------------+ ++|ldap_cert_file|Use: main|Type: string|Default: unset| +++----------------------------------------------------+ ++ ++This option indicates which file contains an TLS client certificate which Exim ++should present to the LDAP server during TLS negotiation. Should be used ++together with ldap_cert_key. ++ +++---------------------------------------------------+ ++|ldap_cert_key|Use: main|Type: string|Default: unset| +++---------------------------------------------------+ ++ ++This option indicates which file contains the secret/private key to use to ++prove identity to the LDAP server during TLS negotiation. Should be used ++together with ldap_cert_file, which contains the identity to be proven. ++ +++-------------------------------------------------------+ ++|ldap_cipher_suite|Use: main|Type: string|Default: unset| +++-------------------------------------------------------+ ++ ++This controls the TLS cipher-suite negotiation during TLS negotiation with the ++LDAP server. See 41.4 for more details of the format of cipher-suite options ++with OpenSSL (as used by LDAP client libraries). ++ +++---------------------------------------------------------------+ ++|ldap_default_servers|Use: main|Type: string list|Default: unset| +++---------------------------------------------------------------+ ++ ++This option provides a list of LDAP servers which are tried in turn when an ++LDAP query does not contain a server. See section 9.14 for details of LDAP ++queries. This option is available only when Exim has been built with LDAP ++support. ++ +++--------------------------------------------------------+ ++|ldap_require_cert|Use: main|Type: string|Default: unset.| +++--------------------------------------------------------+ ++ ++This should be one of the values "hard", "demand", "allow", "try" or "never". A ++value other than one of these is interpreted as "never". See the entry ++"TLS_REQCERT" in your system man page for ldap.conf(5). Although Exim does not ++set a default, the LDAP library probably defaults to hard/demand. ++ +++-----------------------------------------------------+ ++|ldap_start_tls|Use: main|Type: boolean|Default: false| +++-----------------------------------------------------+ ++ ++If set, Exim will attempt to negotiate TLS with the LDAP server when connecting ++on a regular LDAP port. This is the LDAP equivalent of SMTP's "STARTTLS". This ++is distinct from using "ldaps", which is the LDAP form of SSL-on-connect. In ++the event of failure to negotiate TLS, the action taken is controlled by ++ldap_require_cert. ++ +++---------------------------------------------------+ ++|ldap_version|Use: main|Type: integer|Default: unset| +++---------------------------------------------------+ ++ ++This option can be used to force Exim to set a specific protocol version for ++LDAP. If it option is unset, it is shown by the -bP command line option as -1. ++When this is the case, the default is 3 if LDAP_VERSION3 is defined in the LDAP ++headers; otherwise it is 2. This option is available only when Exim has been ++built with LDAP support. ++ +++------------------------------------------------------+ ++|local_from_check|Use: main|Type: boolean|Default: true| +++------------------------------------------------------+ ++ ++When a message is submitted locally (that is, not over a TCP/IP connection) by ++an untrusted user, Exim removes any existing Sender: header line, and checks ++that the From: header line matches the login of the calling user and the domain ++specified by qualify_domain. ++ ++Note: An unqualified address (no domain) in the From: header in a locally ++submitted message is automatically qualified by Exim, unless the -bnq command ++line option is used. ++ ++You can use local_from_prefix and local_from_suffix to permit affixes on the ++local part. If the From: header line does not match, Exim adds a Sender: header ++with an address constructed from the calling user's login and the default ++qualify domain. ++ ++If local_from_check is set false, the From: header check is disabled, and no ++Sender: header is ever added. If, in addition, you want to retain Sender: ++header lines supplied by untrusted users, you must also set local_sender_retain ++to be true. ++ ++These options affect only the header lines in the message. The envelope sender ++is still forced to be the login id at the qualify domain unless ++untrusted_set_sender permits the user to supply an envelope sender. ++ ++For messages received over TCP/IP, an ACL can specify "submission mode" to ++request similar header line checking. See section 46.16, which has more details ++about Sender: processing. ++ +++-------------------------------------------------------+ ++|local_from_prefix|Use: main|Type: string|Default: unset| +++-------------------------------------------------------+ ++ ++When Exim checks the From: header line of locally submitted messages for ++matching the login id (see local_from_check above), it can be configured to ++ignore certain prefixes and suffixes in the local part of the address. This is ++done by setting local_from_prefix and/or local_from_suffix to appropriate ++lists, in the same form as the local_part_prefix and local_part_suffix router ++options (see chapter 15). For example, if ++ ++local_from_prefix = *- ++ ++is set, a From: line containing ++ ++From: anything-user@your.domain.example ++ ++will not cause a Sender: header to be added if user@your.domain.example matches ++the actual sender address that is constructed from the login name and qualify ++domain. ++ +++-------------------------------------------------------+ ++|local_from_suffix|Use: main|Type: string|Default: unset| +++-------------------------------------------------------+ ++ ++See local_from_prefix above. ++ +++---------------------------------------------------------------+ ++|local_interfaces|Use: main|Type: string list|Default: see below| +++---------------------------------------------------------------+ ++ ++This option controls which network interfaces are used by the daemon for ++listening; they are also used to identify the local host when routing. Chapter ++13 contains a full description of this option and the related options ++daemon_smtp_ports, extra_local_interfaces, hosts_treat_as_local, and ++tls_on_connect_ports. The default value for local_interfaces is ++ ++local_interfaces = 0.0.0.0 ++ ++when Exim is built without IPv6 support; otherwise it is ++ ++local_interfaces = <; ::0 ; 0.0.0.0 ++ +++---------------------------------------------------+ ++|local_scan_timeout|Use: main|Type: time|Default: 5m| +++---------------------------------------------------+ ++ ++This timeout applies to the local_scan() function (see chapter 44). Zero means ++"no timeout". If the timeout is exceeded, the incoming message is rejected with ++a temporary error if it is an SMTP message. For a non-SMTP message, the message ++is dropped and Exim ends with a non-zero code. The incident is logged on the ++main and reject logs. ++ +++----------------------------------------------------------+ ++|local_sender_retain|Use: main|Type: boolean|Default: false| +++----------------------------------------------------------+ ++ ++When a message is submitted locally (that is, not over a TCP/IP connection) by ++an untrusted user, Exim removes any existing Sender: header line. If you do not ++want this to happen, you must set local_sender_retain, and you must also set ++local_from_check to be false (Exim will complain if you do not). See also the ++ACL modifier "control = suppress_local_fixups". Section 46.16 has more details ++about Sender: processing. ++ +++-------------------------------------------------------+ ++|localhost_number|Use: main|Type: string*|Default: unset| +++-------------------------------------------------------+ ++ ++Exim's message ids are normally unique only within the local host. If ++uniqueness among a set of hosts is required, each host must set a different ++value for the localhost_number option. The string is expanded immediately after ++reading the configuration file (so that a number can be computed from the host ++name, for example) and the result of the expansion must be a number in the ++range 0-16 (or 0-10 on operating systems with case-insensitive file systems). ++This is available in subsequent string expansions via the variable ++$localhost_number. When localhost_number is set, the final two characters of ++the message id, instead of just being a fractional part of the time, are ++computed from the time and the local host number as described in section 3.4. ++ +++-----------------------------------------------------------------------+ ++|log_file_path|Use: main|Type: string list*|Default: set at compile time| +++-----------------------------------------------------------------------+ ++ ++This option sets the path which is used to determine the names of Exim's log ++files, or indicates that logging is to be to syslog, or both. It is expanded ++when Exim is entered, so it can, for example, contain a reference to the host ++name. If no specific path is set for the log files at compile or run time, they ++are written in a sub-directory called log in Exim's spool directory. Chapter 51 ++contains further details about Exim's logging, and section 51.1 describes how ++the contents of log_file_path are used. If this string is fixed at your ++installation (contains no expansion variables) it is recommended that you do ++not set this option in the configuration file, but instead supply the path ++using LOG_FILE_PATH in Local/Makefile so that it is available to Exim for ++logging errors detected early on - in particular, failure to read the ++configuration file. ++ +++--------------------------------------------------+ ++|log_selector|Use: main|Type: string|Default: unset| +++--------------------------------------------------+ ++ ++This option can be used to reduce or increase the number of things that Exim ++writes to its log files. Its argument is made up of names preceded by plus or ++minus characters. For example: ++ ++log_selector = +arguments -retry_defer ++ ++A list of possible names and what they control is given in the chapter on ++logging, in section 51.15. ++ +++---------------------------------------------------+ ++|log_timezone|Use: main|Type: boolean|Default: false| +++---------------------------------------------------+ ++ ++By default, the timestamps on log lines are in local time without the timezone. ++This means that if your timezone changes twice a year, the timestamps in log ++lines are ambiguous for an hour when the clocks go back. One way of avoiding ++this problem is to set the timezone to UTC. An alternative is to set ++log_timezone true. This turns on the addition of the timezone offset to ++timestamps in log lines. Turning on this option can add quite a lot to the size ++of log files because each line is extended by 6 characters. Note that the ++$tod_log variable contains the log timestamp without the zone, but there is ++another variable called $tod_zone that contains just the timezone offset. ++ +++---------------------------------------------------+ ++|lookup_open_max|Use: main|Type: integer|Default: 25| +++---------------------------------------------------+ ++ ++This option limits the number of simultaneously open files for single-key ++lookups that use regular files (that is, lsearch, dbm, and cdb). Exim normally ++keeps these files open during routing, because often the same file is required ++several times. If the limit is reached, Exim closes the least recently used ++file. Note that if you are using the ndbm library, it actually opens two files ++for each logical DBM database, though it still counts as one for the purposes ++of lookup_open_max. If you are getting "too many open files" errors with NDBM, ++you need to reduce the value of lookup_open_max. ++ +++------------------------------------------------------+ ++|max_username_length|Use: main|Type: integer|Default: 0| +++------------------------------------------------------+ ++ ++Some operating systems are broken in that they truncate long arguments to ++getpwnam() to eight characters, instead of returning "no such user". If this ++option is set greater than zero, any attempt to call getpwnam() with an ++argument that is longer behaves as if getpwnam() failed. ++ +++---------------------------------------------------------+ ++|message_body_newlines|Use: main|Type: bool|Default: false| +++---------------------------------------------------------+ ++ ++By default, newlines in the message body are replaced by spaces when setting ++the $message_body and $message_body_end expansion variables. If this option is ++set true, this no longer happens. ++ +++---------------------------------------------------------+ ++|message_body_visible|Use: main|Type: integer|Default: 500| +++---------------------------------------------------------+ ++ ++This option specifies how much of a message's body is to be included in the ++$message_body and $message_body_end expansion variables. ++ +++---------------------------------------------------------------+ ++|message_id_header_domain|Use: main|Type: string*|Default: unset| +++---------------------------------------------------------------+ ++ ++If this option is set, the string is expanded and used as the right hand side ++(domain) of the Message-ID: header that Exim creates if a locally-originated ++incoming message does not have one. "Locally-originated" means "not received ++over TCP/IP." Otherwise, the primary host name is used. Only letters, digits, ++dot and hyphen are accepted; any other characters are replaced by hyphens. If ++the expansion is forced to fail, or if the result is an empty string, the ++option is ignored. ++ +++-------------------------------------------------------------+ ++|message_id_header_text|Use: main|Type: string*|Default: unset| +++-------------------------------------------------------------+ ++ ++If this variable is set, the string is expanded and used to augment the text of ++the Message-id: header that Exim creates if a locally-originated incoming ++message does not have one. The text of this header is required by RFC 2822 to ++take the form of an address. By default, Exim uses its internal message id as ++the local part, and the primary host name as the domain. If this option is set, ++it is expanded, and provided the expansion is not forced to fail, and does not ++yield an empty string, the result is inserted into the header immediately ++before the @, separated from the internal message id by a dot. Any characters ++that are illegal in an address are automatically converted into hyphens. This ++means that variables such as $tod_log can be used, because the spaces and ++colons will become hyphens. ++ +++--------------------------------------------------+ ++|message_logs|Use: main|Type: boolean|Default: true| +++--------------------------------------------------+ ++ ++If this option is turned off, per-message log files are not created in the ++msglog spool sub-directory. This reduces the amount of disk I/O required by ++Exim, by reducing the number of files involved in handling a message from a ++minimum of four (header spool file, body spool file, delivery journal, and ++per-message log) to three. The other major I/O activity is Exim's main log, ++which is not affected by this option. ++ +++-------------------------------------------------------+ ++|message_size_limit|Use: main|Type: string*|Default: 50M| +++-------------------------------------------------------+ ++ ++This option limits the maximum size of message that Exim will process. The ++value is expanded for each incoming connection so, for example, it can be made ++to depend on the IP address of the remote host for messages arriving via TCP/ ++IP. After expansion, the value must be a sequence of decimal digits, optionally ++followed by K or M. ++ ++Note: This limit cannot be made to depend on a message's sender or any other ++properties of an individual message, because it has to be advertised in the ++server's response to EHLO. String expansion failure causes a temporary error. A ++value of zero means no limit, but its use is not recommended. See also ++bounce_return_size_limit. ++ ++Incoming SMTP messages are failed with a 552 error if the limit is exceeded; ++locally-generated messages either get a stderr message or a delivery failure ++message to the sender, depending on the -oe setting. Rejection of an oversized ++message is logged in both the main and the reject logs. See also the generic ++transport option message_size_limit, which limits the size of message that an ++individual transport can process. ++ ++If you use a virus-scanner and set this option to to a value larger than the ++maximum size that your virus-scanner is configured to support, you may get ++failures triggered by large mails. The right size to configure for the ++virus-scanner depends upon what data is passed and the options in use but it's ++probably safest to just set it to a little larger than this value. Eg, with a ++default Exim message size of 50M and a default ClamAV StreamMaxLength of 10M, ++some problems may result. ++ ++A value of 0 will disable size limit checking; Exim will still advertise the ++SIZE extension in an EHLO response, but without a limit, so as to permit SMTP ++clients to still indicate the message size along with the MAIL verb. ++ +++-----------------------------------------------------------+ ++|move_frozen_messages|Use: main|Type: boolean|Default: false| +++-----------------------------------------------------------+ ++ ++This option, which is available only if Exim has been built with the setting ++ ++SUPPORT_MOVE_FROZEN_MESSAGES=yes ++ ++in Local/Makefile, causes frozen messages and their message logs to be moved ++from the input and msglog directories on the spool to Finput and Fmsglog, ++respectively. There is currently no support in Exim or the standard utilities ++for handling such moved messages, and they do not show up in lists generated by ++-bp or by the Exim monitor. ++ +++--------------------------------------------------+ ++|mua_wrapper|Use: main|Type: boolean|Default: false| +++--------------------------------------------------+ ++ ++Setting this option true causes Exim to run in a very restrictive mode in which ++it passes messages synchronously to a smart host. Chapter 50 contains a full ++description of this facility. ++ +++--------------------------------------------------------+ ++|mysql_servers|Use: main|Type: string list|Default: unset| +++--------------------------------------------------------+ ++ ++This option provides a list of MySQL servers and associated connection data, to ++be used in conjunction with mysql lookups (see section 9.21). The option is ++available only if Exim has been built with MySQL support. ++ +++-------------------------------------------------------+ ++|never_users|Use: main|Type: string list*|Default: unset| +++-------------------------------------------------------+ ++ ++This option is expanded just once, at the start of Exim's processing. Local ++message deliveries are normally run in processes that are setuid to the ++recipient, and remote deliveries are normally run under Exim's own uid and gid. ++It is usually desirable to prevent any deliveries from running as root, as a ++safety precaution. ++ ++When Exim is built, an option called FIXED_NEVER_USERS can be set to a list of ++users that must not be used for local deliveries. This list is fixed in the ++binary and cannot be overridden by the configuration file. By default, it ++contains just the single user name "root". The never_users runtime option can ++be used to add more users to the fixed list. ++ ++If a message is to be delivered as one of the users on the fixed list or the ++never_users list, an error occurs, and delivery is deferred. A common example ++is ++ ++never_users = root:daemon:bin ++ ++Including root is redundant if it is also on the fixed list, but it does no ++harm. This option overrides the pipe_as_creator option of the pipe transport ++driver. ++ +++--------------------------------------------------------------+ ++|openssl_options|Use: main|Type: string list|Default: +no_sslv2| +++--------------------------------------------------------------+ ++ ++This option allows an administrator to adjust the SSL options applied by ++OpenSSL to connections. It is given as a space-separated list of items, each ++one to be +added or -subtracted from the current value. ++ ++This option is only available if Exim is built against OpenSSL. The values ++available for this option vary according to the age of your OpenSSL install. ++The "all" value controls a subset of flags which are available, typically the ++bug workaround options. The SSL_CTX_set_options man page will list the values ++known on your system and Exim should support all the "bug workaround" options ++and many of the "modifying" options. The Exim names lose the leading "SSL_OP_" ++and are lower-cased. ++ ++Note that adjusting the options can have severe impact upon the security of SSL ++as used by Exim. It is possible to disable safety checks and shoot yourself in ++the foot in various unpleasant ways. This option should not be adjusted ++lightly. An unrecognised item will be detected at startup, by invoking Exim ++with the -bV flag. ++ ++Historical note: prior to release 4.80, Exim defaulted this value to ++"+dont_insert_empty_fragments", which may still be needed for compatibility ++with some clients, but which lowers security by increasing exposure to some now ++infamous attacks. ++ ++An example: ++ ++# Make both old MS and old Eudora happy: ++openssl_options = -all +microsoft_big_sslv3_buffer \ ++ +dont_insert_empty_fragments ++ ++Possible options may include: ++ ++ * "all" ++ ++ * "allow_unsafe_legacy_renegotiation" ++ ++ * "cipher_server_preference" ++ ++ * "dont_insert_empty_fragments" ++ ++ * "ephemeral_rsa" ++ ++ * "legacy_server_connect" ++ ++ * "microsoft_big_sslv3_buffer" ++ ++ * "microsoft_sess_id_bug" ++ ++ * "msie_sslv2_rsa_padding" ++ ++ * "netscape_challenge_bug" ++ ++ * "netscape_reuse_cipher_change_bug" ++ ++ * "no_compression" ++ ++ * "no_session_resumption_on_renegotiation" ++ ++ * "no_sslv2" ++ ++ * "no_sslv3" ++ ++ * "no_ticket" ++ ++ * "no_tlsv1" ++ ++ * "no_tlsv1_1" ++ ++ * "no_tlsv1_2" ++ ++ * "safari_ecdhe_ecdsa_bug" ++ ++ * "single_dh_use" ++ ++ * "single_ecdh_use" ++ ++ * "ssleay_080_client_dh_bug" ++ ++ * "sslref2_reuse_cert_type_bug" ++ ++ * "tls_block_padding_bug" ++ ++ * "tls_d5_bug" ++ ++ * "tls_rollback_bug" ++ ++As an aside, the "safari_ecdhe_ecdsa_bug" item is a misnomer and affects all ++clients connecting using the MacOS SecureTransport TLS facility prior to MacOS ++10.8.4, including email clients. If you see old MacOS clients failing to ++negotiate TLS then this option value might help, provided that your OpenSSL ++release is new enough to contain this work-around. This may be a situation ++where you have to upgrade OpenSSL to get buggy clients working. ++ +++---------------------------------------------------------+ ++|oracle_servers|Use: main|Type: string list|Default: unset| +++---------------------------------------------------------+ ++ ++This option provides a list of Oracle servers and associated connection data, ++to be used in conjunction with oracle lookups (see section 9.21). The option is ++available only if Exim has been built with Oracle support. ++ +++----------------------------------------------------------------+ ++|percent_hack_domains|Use: main|Type: domain list*|Default: unset| +++----------------------------------------------------------------+ ++ ++The "percent hack" is the convention whereby a local part containing a percent ++sign is re-interpreted as a new email address, with the percent replaced by @. ++This is sometimes called "source routing", though that term is also applied to ++RFC 2822 addresses that begin with an @ character. If this option is set, Exim ++implements the percent facility for those domains listed, but no others. This ++happens before an incoming SMTP address is tested against an ACL. ++ ++Warning: The "percent hack" has often been abused by people who are trying to ++get round relaying restrictions. For this reason, it is best avoided if at all ++possible. Unfortunately, a number of less security-conscious MTAs implement it ++unconditionally. If you are running Exim on a gateway host, and routing mail ++through to internal MTAs without processing the local parts, it is a good idea ++to reject recipient addresses with percent characters in their local parts. ++Exim's default configuration does this. ++ +++----------------------------------------------------+ ++|perl_at_start|Use: main|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++This option is available only when Exim is built with an embedded Perl ++interpreter. See chapter 12 for details of its use. ++ +++--------------------------------------------------+ ++|perl_startup|Use: main|Type: string|Default: unset| +++--------------------------------------------------+ ++ ++This option is available only when Exim is built with an embedded Perl ++interpreter. See chapter 12 for details of its use. ++ +++--------------------------------------------------------+ ++|pgsql_servers|Use: main|Type: string list|Default: unset| +++--------------------------------------------------------+ ++ ++This option provides a list of PostgreSQL servers and associated connection ++data, to be used in conjunction with pgsql lookups (see section 9.21). The ++option is available only if Exim has been built with PostgreSQL support. ++ +++------------------------------------------------------------------+ ++|pid_file_path|Use: main|Type: string*|Default: set at compile time| +++------------------------------------------------------------------+ ++ ++This option sets the name of the file to which the Exim daemon writes its ++process id. The string is expanded, so it can contain, for example, references ++to the host name: ++ ++pid_file_path = /var/log/$primary_hostname/exim.pid ++ ++If no path is set, the pid is written to the file exim-daemon.pid in Exim's ++spool directory. The value set by the option can be overridden by the -oP ++command line option. A pid file is not written if a "non-standard" daemon is ++run by means of the -oX option, unless a path is explicitly supplied by -oP. ++ +++----------------------------------------------------------------+ ++|pipelining_advertise_hosts|Use: main|Type: host list*|Default: *| +++----------------------------------------------------------------+ ++ ++This option can be used to suppress the advertisement of the SMTP PIPELINING ++extension to specific hosts. See also the no_pipelining control in section ++42.21. When PIPELINING is not advertised and smtp_enforce_sync is true, an Exim ++server enforces strict synchronization for each SMTP command and response. When ++PIPELINING is advertised, Exim assumes that clients will use it; "out of order" ++commands that are "expected" do not count as protocol errors (see ++smtp_max_synprot_errors). ++ +++------------------------------------------------------------+ ++|preserve_message_logs|Use: main|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is set, message log files are not deleted when messages are ++completed. Instead, they are moved to a sub-directory of the spool directory ++called msglog.OLD, where they remain available for statistical or debugging ++purposes. This is a dangerous option to set on systems with any appreciable ++volume of mail. Use with care! ++ +++----------------------------------------------------------+ ++|primary_hostname|Use: main|Type: string|Default: see below| +++----------------------------------------------------------+ ++ ++This specifies the name of the current host. It is used in the default EHLO or ++HELO command for outgoing SMTP messages (changeable via the helo_data option in ++the smtp transport), and as the default for qualify_domain. The value is also ++used by default in some SMTP response messages from an Exim server. This can be ++changed dynamically by setting smtp_active_hostname. ++ ++If primary_hostname is not set, Exim calls uname() to find the host name. If ++this fails, Exim panics and dies. If the name returned by uname() contains only ++one component, Exim passes it to gethostbyname() (or getipnodebyname() when ++available) in order to obtain the fully qualified version. The variable ++$primary_hostname contains the host name, whether set explicitly by this ++option, or defaulted. ++ +++--------------------------------------------------------+ ++|print_topbitchars|Use: main|Type: boolean|Default: false| +++--------------------------------------------------------+ ++ ++By default, Exim considers only those characters whose codes lie in the range ++32-126 to be printing characters. In a number of circumstances (for example, ++when writing log entries) non-printing characters are converted into escape ++sequences, primarily to avoid messing up the layout. If print_topbitchars is ++set, code values of 128 and above are also considered to be printing ++characters. ++ ++This option also affects the header syntax checks performed by the autoreply ++transport, and whether Exim uses RFC 2047 encoding of the user's full name when ++constructing From: and Sender: addresses (as described in section 46.18). ++Setting this option can cause Exim to generate eight bit message headers that ++do not conform to the standards. ++ +++------------------------------------------------------+ ++|process_log_path|Use: main|Type: string|Default: unset| +++------------------------------------------------------+ ++ ++This option sets the name of the file to which an Exim process writes its ++"process log" when sent a USR1 signal. This is used by the exiwhat utility ++script. If this option is unset, the file called exim-process.info in Exim's ++spool directory is used. The ability to specify the name explicitly can be ++useful in environments where two different Exims are running, using different ++spool directories. ++ +++---------------------------------------------------------+ ++|prod_requires_admin|Use: main|Type: boolean|Default: true| +++---------------------------------------------------------+ ++ ++The -M, -R, and -q command-line options require the caller to be an admin user ++unless prod_requires_admin is set false. See also queue_list_requires_admin. ++ +++--------------------------------------------------------+ ++|qualify_domain|Use: main|Type: string|Default: see below| +++--------------------------------------------------------+ ++ ++This option specifies the domain name that is added to any envelope sender ++addresses that do not have a domain qualification. It also applies to recipient ++addresses if qualify_recipient is not set. Unqualified addresses are accepted ++by default only for locally-generated messages. Qualification is also applied ++to addresses in header lines such as From: and To: for locally-generated ++messages, unless the -bnq command line option is used. ++ ++Messages from external sources must always contain fully qualified addresses, ++unless the sending host matches sender_unqualified_hosts or ++recipient_unqualified_hosts (as appropriate), in which case incoming addresses ++are qualified with qualify_domain or qualify_recipient as necessary. ++Internally, Exim always works with fully qualified envelope addresses. If ++qualify_domain is not set, it defaults to the primary_hostname value. ++ +++-----------------------------------------------------------+ ++|qualify_recipient|Use: main|Type: string|Default: see below| +++-----------------------------------------------------------+ ++ ++This option allows you to specify a different domain for qualifying recipient ++addresses to the one that is used for senders. See qualify_domain above. ++ +++---------------------------------------------------------+ ++|queue_domains|Use: main|Type: domain list*|Default: unset| +++---------------------------------------------------------+ ++ ++This option lists domains for which immediate delivery is not required. A ++delivery process is started whenever a message is received, but only those ++domains that do not match are processed. All other deliveries wait until the ++next queue run. See also hold_domains and queue_smtp_domains. ++ +++---------------------------------------------------------------+ ++|queue_list_requires_admin|Use: main|Type: boolean|Default: true| +++---------------------------------------------------------------+ ++ ++The -bp command-line option, which lists the messages that are on the queue, ++requires the caller to be an admin user unless queue_list_requires_admin is set ++false. See also prod_requires_admin. ++ +++-------------------------------------------------+ ++|queue_only|Use: main|Type: boolean|Default: false| +++-------------------------------------------------+ ++ ++If queue_only is set, a delivery process is not automatically started whenever ++a message is received. Instead, the message waits on the queue for the next ++queue run. Even if queue_only is false, incoming messages may not get delivered ++immediately when certain conditions (such as heavy load) occur. ++ ++The -odq command line has the same effect as queue_only. The -odb and -odi ++command line options override queue_only unless queue_only_override is set ++false. See also queue_only_file, queue_only_load, and smtp_accept_queue. ++ +++-----------------------------------------------------+ ++|queue_only_file|Use: main|Type: string|Default: unset| +++-----------------------------------------------------+ ++ ++This option can be set to a colon-separated list of absolute path names, each ++one optionally preceded by "smtp". When Exim is receiving a message, it tests ++for the existence of each listed path using a call to stat(). For each path ++that exists, the corresponding queueing option is set. For paths with no ++prefix, queue_only is set; for paths prefixed by "smtp", queue_smtp_domains is ++set to match all domains. So, for example, ++ ++queue_only_file = smtp/some/file ++ ++causes Exim to behave as if queue_smtp_domains were set to "*" whenever /some/ ++file exists. ++ +++----------------------------------------------------------+ ++|queue_only_load|Use: main|Type: fixed-point|Default: unset| +++----------------------------------------------------------+ ++ ++If the system load average is higher than this value, incoming messages from ++all sources are queued, and no automatic deliveries are started. If this ++happens during local or remote SMTP input, all subsequent messages received on ++the same SMTP connection are queued by default, whatever happens to the load in ++the meantime, but this can be changed by setting queue_only_load_latch false. ++ ++Deliveries will subsequently be performed by queue runner processes. This ++option has no effect on ancient operating systems on which Exim cannot ++determine the load average. See also deliver_queue_load_max and ++smtp_load_reserve. ++ +++-----------------------------------------------------------+ ++|queue_only_load_latch|Use: main|Type: boolean|Default: true| +++-----------------------------------------------------------+ ++ ++When this option is true (the default), once one message has been queued ++because the load average is higher than the value set by queue_only_load, all ++subsequent messages received on the same SMTP connection are also queued. This ++is a deliberate choice; even though the load average may fall below the ++threshold, it doesn't seem right to deliver later messages on the same ++connection when not delivering earlier ones. However, there are special ++circumstances such as very long-lived connections from scanning appliances ++where this is not the best strategy. In such cases, queue_only_load_latch ++should be set false. This causes the value of the load average to be ++re-evaluated for each message. ++ +++---------------------------------------------------------+ ++|queue_only_override|Use: main|Type: boolean|Default: true| +++---------------------------------------------------------+ ++ ++When this option is true, the -odx command line options override the setting of ++queue_only or queue_only_file in the configuration file. If queue_only_override ++is set false, the -odx options cannot be used to override; they are accepted, ++but ignored. ++ +++---------------------------------------------------------+ ++|queue_run_in_order|Use: main|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is set, queue runs happen in order of message arrival instead of ++in an arbitrary order. For this to happen, a complete list of the entire queue ++must be set up before the deliveries start. When the queue is all held in a ++single directory (the default), a single list is created for both the ordered ++and the non-ordered cases. However, if split_spool_directory is set, a single ++list is not created when queue_run_in_order is false. In this case, the ++sub-directories are processed one at a time (in a random order), and this ++avoids setting up one huge list for the whole queue. Thus, setting ++queue_run_in_order with split_spool_directory may degrade performance when the ++queue is large, because of the extra work in setting up the single, large list. ++In most situations, queue_run_in_order should not be set. ++ +++------------------------------------------------+ ++|queue_run_max|Use: main|Type: integer|Default: 5| +++------------------------------------------------+ ++ ++This controls the maximum number of queue runner processes that an Exim daemon ++can run simultaneously. This does not mean that it starts them all at once, but ++rather that if the maximum number are still running when the time comes to ++start another one, it refrains from starting another one. This can happen with ++very large queues and/or very sluggish deliveries. This option does not, ++however, interlock with other processes, so additional queue runners can be ++started by other means, or by killing and restarting the daemon. ++ ++Setting this option to zero does not suppress queue runs; rather, it disables ++the limit, allowing any number of simultaneous queue runner processes to be ++run. If you do not want queue runs to occur, omit the -qxx setting on the ++daemon's command line. ++ +++--------------------------------------------------------------+ ++|queue_smtp_domains|Use: main|Type: domain list*|Default: unset| +++--------------------------------------------------------------+ ++ ++When this option is set, a delivery process is started whenever a message is ++received, routing is performed, and local deliveries take place. However, if ++any SMTP deliveries are required for domains that match queue_smtp_domains, ++they are not immediately delivered, but instead the message waits on the queue ++for the next queue run. Since routing of the message has taken place, Exim ++knows to which remote hosts it must be delivered, and so when the queue run ++happens, multiple messages for the same host are delivered over a single SMTP ++connection. The -odqs command line option causes all SMTP deliveries to be ++queued in this way, and is equivalent to setting queue_smtp_domains to "*". See ++also hold_domains and queue_domains. ++ +++------------------------------------------------+ ++|receive_timeout|Use: main|Type: time|Default: 0s| +++------------------------------------------------+ ++ ++This option sets the timeout for accepting a non-SMTP message, that is, the ++maximum time that Exim waits when reading a message on the standard input. If ++the value is zero, it will wait for ever. This setting is overridden by the -or ++command line option. The timeout for incoming SMTP messages is controlled by ++smtp_receive_timeout. ++ +++---------------------------------------------------------------+ ++|received_header_text|Use: main|Type: string*|Default: see below| +++---------------------------------------------------------------+ ++ ++This string defines the contents of the Received: message header that is added ++to each message, except for the timestamp, which is automatically added on at ++the end (preceded by a semicolon). The string is expanded each time it is used. ++If the expansion yields an empty string, no Received: header line is added to ++the message. Otherwise, the string should start with the text "Received:" and ++conform to the RFC 2822 specification for Received: header lines. The default ++setting is: ++ ++received_header_text = Received: \ ++ ${if def:sender_rcvhost {from $sender_rcvhost\n\t}\ ++ {${if def:sender_ident \ ++ {from ${quote_local_part:$sender_ident} }}\ ++ ${if def:sender_helo_name {(helo=$sender_helo_name)\n\t}}}}\ ++ by $primary_hostname \ ++ ${if def:received_protocol {with $received_protocol}} \ ++ ${if def:tls_in_cipher {($tls_in_cipher)\n\t}}\ ++ (Exim $version_number)\n\t\ ++ ${if def:sender_address \ ++ {(envelope-from <$sender_address>)\n\t}}\ ++ id $message_exim_id\ ++ ${if def:received_for {\n\tfor $received_for}} ++ ++The reference to the TLS cipher is omitted when Exim is built without TLS ++support. The use of conditional expansions ensures that this works for both ++locally generated messages and messages received from remote hosts, giving ++header lines such as the following: ++ ++Received: from scrooge.carol.example ([192.168.12.25] ident=root) ++by marley.carol.example with esmtp (Exim 4.00) ++(envelope-from <bob@carol.example>) ++id 16IOWa-00019l-00 ++for chas@dickens.example; Tue, 25 Dec 2001 14:43:44 +0000 ++Received: by scrooge.carol.example with local (Exim 4.00) ++id 16IOWW-000083-00; Tue, 25 Dec 2001 14:43:41 +0000 ++ ++Until the body of the message has been received, the timestamp is the time when ++the message started to be received. Once the body has arrived, and all policy ++checks have taken place, the timestamp is updated to the time at which the ++message was accepted. ++ +++--------------------------------------------------------+ ++|received_headers_max|Use: main|Type: integer|Default: 30| +++--------------------------------------------------------+ ++ ++When a message is to be delivered, the number of Received: headers is counted, ++and if it is greater than this parameter, a mail loop is assumed to have ++occurred, the delivery is abandoned, and an error message is generated. This ++applies to both local and remote deliveries. ++ +++---------------------------------------------------------------------+ ++|recipient_unqualified_hosts|Use: main|Type: host list*|Default: unset| +++---------------------------------------------------------------------+ ++ ++This option lists those hosts from which Exim is prepared to accept unqualified ++recipient addresses in message envelopes. The addresses are made fully ++qualified by the addition of the qualify_recipient value. This option also ++affects message header lines. Exim does not reject unqualified recipient ++addresses in headers, but it qualifies them only if the message came from a ++host that matches recipient_unqualified_hosts, or if the message was submitted ++locally (not using TCP/IP), and the -bnq option was not set. ++ +++-------------------------------------------------+ ++|recipients_max|Use: main|Type: integer|Default: 0| +++-------------------------------------------------+ ++ ++If this option is set greater than zero, it specifies the maximum number of ++original recipients for any message. Additional recipients that are generated ++by aliasing or forwarding do not count. SMTP messages get a 452 response for ++all recipients over the limit; earlier recipients are delivered as normal. ++Non-SMTP messages with too many recipients are failed, and no deliveries are ++done. ++ ++Note: The RFCs specify that an SMTP server should accept at least 100 RCPT ++commands in a single message. ++ +++------------------------------------------------------------+ ++|recipients_max_reject|Use: main|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is set true, Exim rejects SMTP messages containing too many ++recipients by giving 552 errors to the surplus RCPT commands, and a 554 error ++to the eventual DATA command. Otherwise (the default) it gives a 452 error to ++the surplus RCPT commands and accepts the message on behalf of the initial set ++of recipients. The remote server should then re-send the message for the ++remaining recipients at a later time. ++ +++------------------------------------------------------+ ++|remote_max_parallel|Use: main|Type: integer|Default: 2| +++------------------------------------------------------+ ++ ++This option controls parallel delivery of one message to a number of remote ++hosts. If the value is less than 2, parallel delivery is disabled, and Exim ++does all the remote deliveries for a message one by one. Otherwise, if a single ++message has to be delivered to more than one remote host, or if several copies ++have to be sent to the same remote host, up to remote_max_parallel deliveries ++are done simultaneously. If more than remote_max_parallel deliveries are ++required, the maximum number of processes are started, and as each one ++finishes, another is begun. The order of starting processes is the same as if ++sequential delivery were being done, and can be controlled by the ++remote_sort_domains option. If parallel delivery takes place while running with ++debugging turned on, the debugging output from each delivery process is tagged ++with its process id. ++ ++This option controls only the maximum number of parallel deliveries for one ++message in one Exim delivery process. Because Exim has no central queue ++manager, there is no way of controlling the total number of simultaneous ++deliveries if the configuration allows a delivery attempt as soon as a message ++is received. ++ ++If you want to control the total number of deliveries on the system, you need ++to set the queue_only option. This ensures that all incoming messages are added ++to the queue without starting a delivery process. Then set up an Exim daemon to ++start queue runner processes at appropriate intervals (probably fairly often, ++for example, every minute), and limit the total number of queue runners by ++setting the queue_run_max parameter. Because each queue runner delivers only ++one message at a time, the maximum number of deliveries that can then take ++place at once is queue_run_max multiplied by remote_max_parallel. ++ ++If it is purely remote deliveries you want to control, use queue_smtp_domains ++instead of queue_only. This has the added benefit of doing the SMTP routing ++before queueing, so that several messages for the same host will eventually get ++delivered down the same connection. ++ +++---------------------------------------------------------------+ ++|remote_sort_domains|Use: main|Type: domain list*|Default: unset| +++---------------------------------------------------------------+ ++ ++When there are a number of remote deliveries for a message, they are sorted by ++domain into the order given by this list. For example, ++ ++remote_sort_domains = *.cam.ac.uk:*.uk ++ ++would attempt to deliver to all addresses in the cam.ac.uk domain first, then ++to those in the uk domain, then to any others. ++ +++--------------------------------------------------+ ++|retry_data_expire|Use: main|Type: time|Default: 7d| +++--------------------------------------------------+ ++ ++This option sets a "use before" time on retry information in Exim's hints ++database. Any older retry data is ignored. This means that, for example, once a ++host has not been tried for 7 days, Exim behaves as if it has no knowledge of ++past failures. ++ +++----------------------------------------------------+ ++|retry_interval_max|Use: main|Type: time|Default: 24h| +++----------------------------------------------------+ ++ ++Chapter 32 describes Exim's mechanisms for controlling the intervals between ++delivery attempts for messages that cannot be delivered straight away. This ++option sets an overall limit to the length of time between retries. It cannot ++be set greater than 24 hours; any attempt to do so forces the default value. ++ +++--------------------------------------------------------+ ++|return_path_remove|Use: main|Type: boolean|Default: true| +++--------------------------------------------------------+ ++ ++RFC 2821, section 4.4, states that an SMTP server must insert a Return-path: ++header line into a message when it makes a "final delivery". The Return-path: ++header preserves the sender address as received in the MAIL command. This ++description implies that this header should not be present in an incoming ++message. If return_path_remove is true, any existing Return-path: headers are ++removed from messages at the time they are received. Exim's transports have ++options for adding Return-path: headers at the time of delivery. They are ++normally used only for final local deliveries. ++ +++-------------------------------------------------------+ ++|return_size_limit|Use: main|Type: integer|Default: 100K| +++-------------------------------------------------------+ ++ ++This option is an obsolete synonym for bounce_return_size_limit. ++ +++---------------------------------------------------+ ++|rfc1413_hosts|Use: main|Type: host list*|Default: *| +++---------------------------------------------------+ ++ ++RFC 1413 identification calls are made to any client host which matches an item ++in the list. ++ +++------------------------------------------------------+ ++|rfc1413_query_timeout|Use: main|Type: time|Default: 5s| +++------------------------------------------------------+ ++ ++This sets the timeout on RFC 1413 identification calls. If it is set to zero, ++no RFC 1413 calls are ever made. ++ +++------------------------------------------------------------------+ ++|sender_unqualified_hosts|Use: main|Type: host list*|Default: unset| +++------------------------------------------------------------------+ ++ ++This option lists those hosts from which Exim is prepared to accept unqualified ++sender addresses. The addresses are made fully qualified by the addition of ++qualify_domain. This option also affects message header lines. Exim does not ++reject unqualified addresses in headers that contain sender addresses, but it ++qualifies them only if the message came from a host that matches ++sender_unqualified_hosts, or if the message was submitted locally (not using ++TCP/IP), and the -bnq option was not set. ++ +++-----------------------------------------------------------+ ++|smtp_accept_keepalive|Use: main|Type: boolean|Default: true| +++-----------------------------------------------------------+ ++ ++This option controls the setting of the SO_KEEPALIVE option on incoming TCP/IP ++socket connections. When set, it causes the kernel to probe idle connections ++periodically, by sending packets with "old" sequence numbers. The other end of ++the connection should send an acknowledgment if the connection is still okay or ++a reset if the connection has been aborted. The reason for doing this is that ++it has the beneficial effect of freeing up certain types of connection that can ++get stuck when the remote host is disconnected without tidying up the TCP/IP ++call properly. The keepalive mechanism takes several hours to detect ++unreachable hosts. ++ +++---------------------------------------------------+ ++|smtp_accept_max|Use: main|Type: integer|Default: 20| +++---------------------------------------------------+ ++ ++This option specifies the maximum number of simultaneous incoming SMTP calls ++that Exim will accept. It applies only to the listening daemon; there is no ++control (in Exim) when incoming SMTP is being handled by inetd. If the value is ++set to zero, no limit is applied. However, it is required to be non-zero if ++either smtp_accept_max_per_host or smtp_accept_queue is set. See also ++smtp_accept_reserve and smtp_load_reserve. ++ ++A new SMTP connection is immediately rejected if the smtp_accept_max limit has ++been reached. If not, Exim first checks smtp_accept_max_per_host. If that limit ++has not been reached for the client host, smtp_accept_reserve and ++smtp_load_reserve are then checked before accepting the connection. ++ +++-----------------------------------------------------------+ ++|smtp_accept_max_nonmail|Use: main|Type: integer|Default: 10| +++-----------------------------------------------------------+ ++ ++Exim counts the number of "non-mail" commands in an SMTP session, and drops the ++connection if there are too many. This option defines "too many". The check ++catches some denial-of-service attacks, repeated failing AUTHs, or a mad client ++looping sending EHLO, for example. The check is applied only if the client host ++matches smtp_accept_max_nonmail_hosts. ++ ++When a new message is expected, one occurrence of RSET is not counted. This ++allows a client to send one RSET between messages (this is not necessary, but ++some clients do it). Exim also allows one uncounted occurrence of HELO or EHLO, ++and one occurrence of STARTTLS between messages. After starting up a TLS ++session, another EHLO is expected, and so it too is not counted. The first ++occurrence of AUTH in a connection, or immediately following STARTTLS is not ++counted. Otherwise, all commands other than MAIL, RCPT, DATA, and QUIT are ++counted. ++ +++-------------------------------------------------------------------+ ++|smtp_accept_max_nonmail_hosts|Use: main|Type: host list*|Default: *| +++-------------------------------------------------------------------+ ++ ++You can control which hosts are subject to the smtp_accept_max_nonmail check by ++setting this option. The default value makes it apply to all hosts. By changing ++the value, you can exclude any badly-behaved hosts that you have to live with. ++ +++--------------------------------------------------------------------+ ++|smtp_accept_max_per_connection|Use: main|Type: integer|Default: 1000| +++--------------------------------------------------------------------+ ++ ++The value of this option limits the number of MAIL commands that Exim is ++prepared to accept over a single SMTP connection, whether or not each command ++results in the transfer of a message. After the limit is reached, a 421 ++response is given to subsequent MAIL commands. This limit is a safety ++precaution against a client that goes mad (incidents of this type have been ++seen). ++ +++---------------------------------------------------------------+ ++|smtp_accept_max_per_host|Use: main|Type: string*|Default: unset| +++---------------------------------------------------------------+ ++ ++This option restricts the number of simultaneous IP connections from a single ++host (strictly, from a single IP address) to the Exim daemon. The option is ++expanded, to enable different limits to be applied to different hosts by ++reference to $sender_host_address. Once the limit is reached, additional ++connection attempts from the same host are rejected with error code 421. This ++is entirely independent of smtp_accept_reserve. The option's default value of ++zero imposes no limit. If this option is set greater than zero, it is required ++that smtp_accept_max be non-zero. ++ ++Warning: When setting this option you should not use any expansion ++constructions that take an appreciable amount of time. The expansion and test ++happen in the main daemon loop, in order to reject additional connections ++without forking additional processes (otherwise a denial-of-service attack ++could cause a vast number or processes to be created). While the daemon is ++doing this processing, it cannot accept any other incoming connections. ++ +++----------------------------------------------------+ ++|smtp_accept_queue|Use: main|Type: integer|Default: 0| +++----------------------------------------------------+ ++ ++If the number of simultaneous incoming SMTP connections being handled via the ++listening daemon exceeds this value, messages received by SMTP are just placed ++on the queue; no delivery processes are started automatically. The count is ++fixed at the start of an SMTP connection. It cannot be updated in the ++subprocess that receives messages, and so the queueing or not queueing applies ++to all messages received in the same connection. ++ ++A value of zero implies no limit, and clearly any non-zero value is useful only ++if it is less than the smtp_accept_max value (unless that is zero). See also ++queue_only, queue_only_load, queue_smtp_domains, and the various -odx command ++line options. ++ +++-----------------------------------------------------------------------+ ++|smtp_accept_queue_per_ connection|Use: main|Type: integer|Default: 10| +++-----------------------------------------------------------------------+ ++ ++This option limits the number of delivery processes that Exim starts ++automatically when receiving messages via SMTP, whether via the daemon or by ++the use of -bs or -bS. If the value of the option is greater than zero, and the ++number of messages received in a single SMTP session exceeds this number, ++subsequent messages are placed on the queue, but no delivery processes are ++started. This helps to limit the number of Exim processes when a server ++restarts after downtime and there is a lot of mail waiting for it on other ++systems. On large systems, the default should probably be increased, and on ++dial-in client systems it should probably be set to zero (that is, disabled). ++ +++------------------------------------------------------+ ++|smtp_accept_reserve|Use: main|Type: integer|Default: 0| +++------------------------------------------------------+ ++ ++When smtp_accept_max is set greater than zero, this option specifies a number ++of SMTP connections that are reserved for connections from the hosts that are ++specified in smtp_reserve_hosts. The value set in smtp_accept_max includes this ++reserve pool. The specified hosts are not restricted to this number of ++connections; the option specifies a minimum number of connection slots for ++them, not a maximum. It is a guarantee that this group of hosts can always get ++at least smtp_accept_reserve connections. However, the limit specified by ++smtp_accept_max_per_host is still applied to each individual host. ++ ++For example, if smtp_accept_max is set to 50 and smtp_accept_reserve is set to ++5, once there are 45 active connections (from any hosts), new connections are ++accepted only from hosts listed in smtp_reserve_hosts, provided the other ++criteria for acceptance are met. ++ +++-----------------------------------------------------------+ ++|smtp_active_hostname|Use: main|Type: string*|Default: unset| +++-----------------------------------------------------------+ ++ ++This option is provided for multi-homed servers that want to masquerade as ++several different hosts. At the start of an incoming SMTP connection, its value ++is expanded and used instead of the value of $primary_hostname in SMTP ++responses. For example, it is used as domain name in the response to an ++incoming HELO or EHLO command. ++ ++The active hostname is placed in the $smtp_active_hostname variable, which is ++saved with any messages that are received. It is therefore available for use in ++routers and transports when the message is later delivered. ++ ++If this option is unset, or if its expansion is forced to fail, or if the ++expansion results in an empty string, the value of $primary_hostname is used. ++Other expansion failures cause a message to be written to the main and panic ++logs, and the SMTP command receives a temporary error. Typically, the value of ++smtp_active_hostname depends on the incoming interface address. For example: ++ ++smtp_active_hostname = ${if eq{$received_ip_address}{10.0.0.1}\ ++ {cox.mydomain}{box.mydomain}} ++ ++Although $smtp_active_hostname is primarily concerned with incoming messages, ++it is also used as the default for HELO commands in callout verification if ++there is no remote transport from which to obtain a helo_data value. ++ +++------------------------------------------------------+ ++|smtp_banner|Use: main|Type: string*|Default: see below| +++------------------------------------------------------+ ++ ++This string, which is expanded every time it is used, is output as the initial ++positive response to an SMTP connection. The default setting is: ++ ++smtp_banner = $smtp_active_hostname ESMTP Exim \ ++ $version_number $tod_full ++ ++Failure to expand the string causes a panic error. If you want to create a ++multiline response to the initial SMTP connection, use "\n" in the string at ++appropriate points, but not at the end. Note that the 220 code is not included ++in this string. Exim adds it automatically (several times in the case of a ++multiline response). ++ +++------------------------------------------------------------+ ++|smtp_check_spool_space|Use: main|Type: boolean|Default: true| +++------------------------------------------------------------+ ++ ++When this option is set, if an incoming SMTP session encounters the SIZE option ++on a MAIL command, it checks that there is enough space in the spool ++directory's partition to accept a message of that size, while still leaving ++free the amount specified by check_spool_space (even if that value is zero). If ++there isn't enough space, a temporary error code is returned. ++ +++--------------------------------------------------------+ ++|smtp_connect_backlog|Use: main|Type: integer|Default: 20| +++--------------------------------------------------------+ ++ ++This option specifies a maximum number of waiting SMTP connections. Exim passes ++this value to the TCP/IP system when it sets up its listener. Once this number ++of connections are waiting for the daemon's attention, subsequent connection ++attempts are refused at the TCP/IP level. At least, that is what the manuals ++say; in some circumstances such connection attempts have been observed to time ++out instead. For large systems it is probably a good idea to increase the value ++(to 50, say). It also gives some protection against denial-of-service attacks ++by SYN flooding. ++ +++-------------------------------------------------------+ ++|smtp_enforce_sync|Use: main|Type: boolean|Default: true| +++-------------------------------------------------------+ ++ ++The SMTP protocol specification requires the client to wait for a response from ++the server at certain points in the dialogue. Without PIPELINING these ++synchronization points are after every command; with PIPELINING they are fewer, ++but they still exist. ++ ++Some spamming sites send out a complete set of SMTP commands without waiting ++for any response. Exim protects against this by rejecting a message if the ++client has sent further input when it should not have. The error response "554 ++SMTP synchronization error" is sent, and the connection is dropped. Testing for ++this error cannot be perfect because of transmission delays (unexpected input ++may be on its way but not yet received when Exim checks). However, it does ++detect many instances. ++ ++The check can be globally disabled by setting smtp_enforce_sync false. If you ++want to disable the check selectively (for example, only for certain hosts), ++you can do so by an appropriate use of a control modifier in an ACL (see ++section 42.21). See also pipelining_advertise_hosts. ++ +++--------------------------------------------------------+ ++|smtp_etrn_command|Use: main|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++If this option is set, the given command is run whenever an SMTP ETRN command ++is received from a host that is permitted to issue such commands (see chapter ++42). The string is split up into separate arguments which are independently ++expanded. The expansion variable $domain is set to the argument of the ETRN ++command, and no syntax checking is done on it. For example: ++ ++smtp_etrn_command = /etc/etrn_command $domain \ ++ $sender_host_address ++ ++A new process is created to run the command, but Exim does not wait for it to ++complete. Consequently, its status cannot be checked. If the command cannot be ++run, a line is written to the panic log, but the ETRN caller still receives a ++250 success response. Exim is normally running under its own uid when receiving ++SMTP, so it is not possible for it to change the uid before running the ++command. ++ +++---------------------------------------------------------+ ++|smtp_etrn_serialize|Use: main|Type: boolean|Default: true| +++---------------------------------------------------------+ ++ ++When this option is set, it prevents the simultaneous execution of more than ++one identical command as a result of ETRN in an SMTP connection. See section ++47.8 for details. ++ +++------------------------------------------------------------+ ++|smtp_load_reserve|Use: main|Type: fixed-point|Default: unset| +++------------------------------------------------------------+ ++ ++If the system load average ever gets higher than this, incoming SMTP calls are ++accepted only from those hosts that match an entry in smtp_reserve_hosts. If ++smtp_reserve_hosts is not set, no incoming SMTP calls are accepted when the ++load is over the limit. The option has no effect on ancient operating systems ++on which Exim cannot determine the load average. See also ++deliver_queue_load_max and queue_only_load. ++ +++----------------------------------------------------------+ ++|smtp_max_synprot_errors|Use: main|Type: integer|Default: 3| +++----------------------------------------------------------+ ++ ++Exim rejects SMTP commands that contain syntax or protocol errors. In ++particular, a syntactically invalid email address, as in this command: ++ ++RCPT TO:<abc xyz@a.b.c> ++ ++causes immediate rejection of the command, before any other tests are done. ++(The ACL cannot be run if there is no valid address to set up for it.) An ++example of a protocol error is receiving RCPT before MAIL. If there are too ++many syntax or protocol errors in one SMTP session, the connection is dropped. ++The limit is set by this option. ++ ++When the PIPELINING extension to SMTP is in use, some protocol errors are ++"expected", for instance, a RCPT command after a rejected MAIL command. Exim ++assumes that PIPELINING will be used if it advertises it (see ++pipelining_advertise_hosts), and in this situation, "expected" errors do not ++count towards the limit. ++ +++------------------------------------------------------------+ ++|smtp_max_unknown_commands|Use: main|Type: integer|Default: 3| +++------------------------------------------------------------+ ++ ++If there are too many unrecognized commands in an incoming SMTP session, an ++Exim server drops the connection. This is a defence against some kinds of abuse ++that subvert web clients into making connections to SMTP ports; in these ++circumstances, a number of non-SMTP command lines are sent first. ++ +++--------------------------------------------------------------+ ++|smtp_ratelimit_hosts|Use: main|Type: host list*|Default: unset| +++--------------------------------------------------------------+ ++ ++Some sites find it helpful to be able to limit the rate at which certain hosts ++can send them messages, and the rate at which an individual message can specify ++recipients. ++ ++Exim has two rate-limiting facilities. This section describes the older ++facility, which can limit rates within a single connection. The newer ratelimit ++ACL condition can limit rates across all connections. See section 42.37 for ++details of the newer facility. ++ ++When a host matches smtp_ratelimit_hosts, the values of smtp_ratelimit_mail and ++smtp_ratelimit_rcpt are used to control the rate of acceptance of MAIL and RCPT ++commands in a single SMTP session, respectively. Each option, if set, must ++contain a set of four comma-separated values: ++ ++ * A threshold, before which there is no rate limiting. ++ ++ * An initial time delay. Unlike other times in Exim, numbers with decimal ++ fractional parts are allowed here. ++ ++ * A factor by which to increase the delay each time. ++ ++ * A maximum value for the delay. This should normally be less than 5 minutes, ++ because after that time, the client is liable to timeout the SMTP command. ++ ++For example, these settings have been used successfully at the site which first ++suggested this feature, for controlling mail from their customers: ++ ++smtp_ratelimit_mail = 2,0.5s,1.05,4m ++smtp_ratelimit_rcpt = 4,0.25s,1.015,4m ++ ++The first setting specifies delays that are applied to MAIL commands after two ++have been received over a single connection. The initial delay is 0.5 seconds, ++increasing by a factor of 1.05 each time. The second setting applies delays to ++RCPT commands when more than four occur in a single message. ++ +++---------------------------------------------------------+ ++|smtp_ratelimit_mail|Use: main|Type: string|Default: unset| +++---------------------------------------------------------+ ++ ++See smtp_ratelimit_hosts above. ++ +++---------------------------------------------------------+ ++|smtp_ratelimit_rcpt|Use: main|Type: string|Default: unset| +++---------------------------------------------------------+ ++ ++See smtp_ratelimit_hosts above. ++ +++-----------------------------------------------------+ ++|smtp_receive_timeout|Use: main|Type: time|Default: 5m| +++-----------------------------------------------------+ ++ ++This sets a timeout value for SMTP reception. It applies to all forms of SMTP ++input, including batch SMTP. If a line of input (either an SMTP command or a ++data line) is not received within this time, the SMTP connection is dropped and ++the message is abandoned. A line is written to the log containing one of the ++following messages: ++ ++SMTP command timeout on connection from... ++SMTP data timeout on connection from... ++ ++The former means that Exim was expecting to read an SMTP command; the latter ++means that it was in the DATA phase, reading the contents of a message. ++ ++The value set by this option can be overridden by the -os command-line option. ++A setting of zero time disables the timeout, but this should never be used for ++SMTP over TCP/IP. (It can be useful in some cases of local input using -bs or ++-bS.) For non-SMTP input, the reception timeout is controlled by ++receive_timeout and -or. ++ +++------------------------------------------------------------+ ++|smtp_reserve_hosts|Use: main|Type: host list*|Default: unset| +++------------------------------------------------------------+ ++ ++This option defines hosts for which SMTP connections are reserved; see ++smtp_accept_reserve and smtp_load_reserve above. ++ +++----------------------------------------------------------------+ ++|smtp_return_error_details|Use: main|Type: boolean|Default: false| +++----------------------------------------------------------------+ ++ ++In the default state, Exim uses bland messages such as "Administrative ++prohibition" when it rejects SMTP commands for policy reasons. Many sysadmins ++like this because it gives away little information to spammers. However, some ++other sysadmins who are applying strict checking policies want to give out much ++fuller information about failures. Setting smtp_return_error_details true ++causes Exim to be more forthcoming. For example, instead of "Administrative ++prohibition", it might give: ++ ++550-Rejected after DATA: '>' missing at end of address: ++550 failing address in "From" header is: <user@dom.ain ++ +++-------------------------------------------------------+ ++|spamd_address|Use: main|Type: string|Default: see below| +++-------------------------------------------------------+ ++ ++This option is available when Exim is compiled with the content-scanning ++extension. It specifies how Exim connects to SpamAssassin's spamd daemon. The ++default value is ++ ++127.0.0.1 783 ++ ++See section 43.2 for more details. ++ +++------------------------------------------------------------+ ++|split_spool_directory|Use: main|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is set, it causes Exim to split its input directory into 62 ++subdirectories, each with a single alphanumeric character as its name. The ++sixth character of the message id is used to allocate messages to ++subdirectories; this is the least significant base-62 digit of the time of ++arrival of the message. ++ ++Splitting up the spool in this way may provide better performance on systems ++where there are long mail queues, by reducing the number of files in any one ++directory. The msglog directory is also split up in a similar way to the input ++directory; however, if preserve_message_logs is set, all old msglog files are ++still placed in the single directory msglog.OLD. ++ ++It is not necessary to take any special action for existing messages when ++changing split_spool_directory. Exim notices messages that are in the "wrong" ++place, and continues to process them. If the option is turned off after a ++period of being on, the subdirectories will eventually empty and be ++automatically deleted. ++ ++When split_spool_directory is set, the behaviour of queue runner processes ++changes. Instead of creating a list of all messages in the queue, and then ++trying to deliver each one in turn, it constructs a list of those in one ++sub-directory and tries to deliver them, before moving on to the next ++sub-directory. The sub-directories are processed in a random order. This ++spreads out the scanning of the input directories, and uses less memory. It is ++particularly beneficial when there are lots of messages on the queue. However, ++if queue_run_in_order is set, none of this new processing happens. The entire ++queue has to be scanned and sorted before any deliveries can start. ++ +++--------------------------------------------------------------------+ ++|spool_directory|Use: main|Type: string*|Default: set at compile time| +++--------------------------------------------------------------------+ ++ ++This defines the directory in which Exim keeps its spool, that is, the messages ++it is waiting to deliver. The default value is taken from the compile-time ++configuration setting, if there is one. If not, this option must be set. The ++string is expanded, so it can contain, for example, a reference to ++$primary_hostname. ++ ++If the spool directory name is fixed on your installation, it is recommended ++that you set it at build time rather than from this option, particularly if the ++log files are being written to the spool directory (see log_file_path). ++Otherwise log files cannot be used for errors that are detected early on, such ++as failures in the configuration file. ++ ++By using this option to override the compiled-in path, it is possible to run ++tests of Exim without using the standard spool. ++ +++----------------------------------------------------+ ++|sqlite_lock_timeout|Use: main|Type: time|Default: 5s| +++----------------------------------------------------+ ++ ++This option controls the timeout that the sqlite lookup uses when trying to ++access an SQLite database. See section 9.25 for more details. ++ +++------------------------------------------------------+ ++|strict_acl_vars|Use: main|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++This option controls what happens if a syntactically valid but undefined ACL ++variable is referenced. If it is false (the default), an empty string is ++substituted; if it is true, an error is generated. See section 42.18 for ++details of ACL variables. ++ +++------------------------------------------------------------------+ ++|strip_excess_angle_brackets|Use: main|Type: boolean|Default: false| +++------------------------------------------------------------------+ ++ ++If this option is set, redundant pairs of angle brackets round "route-addr" ++items in addresses are stripped. For example, <<xxx@a.b.c.d>> is treated as ++<xxx@a.b.c.d>. If this is in the envelope and the message is passed on to ++another MTA, the excess angle brackets are not passed on. If this option is not ++set, multiple pairs of angle brackets cause a syntax error. ++ +++---------------------------------------------------------+ ++|strip_trailing_dot|Use: main|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is set, a trailing dot at the end of a domain in an address is ++ignored. If this is in the envelope and the message is passed on to another ++MTA, the dot is not passed on. If this option is not set, a dot at the end of a ++domain causes a syntax error. However, addresses in header lines are checked ++only when an ACL requests header syntax checking. ++ +++--------------------------------------------------------+ ++|syslog_duplication|Use: main|Type: boolean|Default: true| +++--------------------------------------------------------+ ++ ++When Exim is logging to syslog, it writes the log lines for its three separate ++logs at different syslog priorities so that they can in principle be separated ++on the logging hosts. Some installations do not require this separation, and in ++those cases, the duplication of certain log lines is a nuisance. If ++syslog_duplication is set false, only one copy of any particular log line is ++written to syslog. For lines that normally go to both the main log and the ++reject log, the reject log version (possibly containing message header lines) ++is written, at LOG_NOTICE priority. Lines that normally go to both the main and ++the panic log are written at the LOG_ALERT priority. ++ +++-----------------------------------------------------+ ++|syslog_facility|Use: main|Type: string|Default: unset| +++-----------------------------------------------------+ ++ ++This option sets the syslog "facility" name, used when Exim is logging to ++syslog. The value must be one of the strings "mail", "user", "news", "uucp", ++"daemon", or "localx" where x is a digit between 0 and 7. If this option is ++unset, "mail" is used. See chapter 51 for details of Exim's logging. ++ +++---------------------------------------------------------+ ++|syslog_processname|Use: main|Type: string|Default: "exim"| +++---------------------------------------------------------+ ++ ++This option sets the syslog "ident" name, used when Exim is logging to syslog. ++The value must be no longer than 32 characters. See chapter 51 for details of ++Exim's logging. ++ +++------------------------------------------------------+ ++|syslog_timestamp|Use: main|Type: boolean|Default: true| +++------------------------------------------------------+ ++ ++If syslog_timestamp is set false, the timestamps on Exim's log lines are ++omitted when these lines are sent to syslog. See chapter 51 for details of ++Exim's logging. ++ +++----------------------------------------------------+ ++|system_filter|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This option specifies an Exim filter file that is applied to all messages at ++the start of each delivery attempt, before any routing is done. System filters ++must be Exim filters; they cannot be Sieve filters. If the system filter ++generates any deliveries to files or pipes, or any new mail messages, the ++appropriate system_filter_..._transport option(s) must be set, to define which ++transports are to be used. Details of this facility are given in chapter 45. ++ +++------------------------------------------------------------------------+ ++|system_filter_directory_transport|Use: main|Type: string*|Default: unset| +++------------------------------------------------------------------------+ ++ ++This sets the name of the transport driver that is to be used when the save ++command in a system message filter specifies a path ending in "/", implying ++delivery of each message into a separate file in some directory. During the ++delivery, the variable $address_file contains the path name. ++ +++-------------------------------------------------------------------+ ++|system_filter_file_transport|Use: main|Type: string*|Default: unset| +++-------------------------------------------------------------------+ ++ ++This sets the name of the transport driver that is to be used when the save ++command in a system message filter specifies a path not ending in "/". During ++the delivery, the variable $address_file contains the path name. ++ +++---------------------------------------------------------+ ++|system_filter_group|Use: main|Type: string|Default: unset| +++---------------------------------------------------------+ ++ ++This option is used only when system_filter_user is also set. It sets the gid ++under which the system filter is run, overriding any gid that is associated ++with the user. The value may be numerical or symbolic. ++ +++-------------------------------------------------------------------+ ++|system_filter_pipe_transport|Use: main|Type: string*|Default: unset| +++-------------------------------------------------------------------+ ++ ++This specifies the transport driver that is to be used when a pipe command is ++used in a system filter. During the delivery, the variable $address_pipe ++contains the pipe command. ++ +++--------------------------------------------------------------------+ ++|system_filter_reply_transport|Use: main|Type: string*|Default: unset| +++--------------------------------------------------------------------+ ++ ++This specifies the transport driver that is to be used when a mail command is ++used in a system filter. ++ +++--------------------------------------------------------+ ++|system_filter_user|Use: main|Type: string|Default: unset| +++--------------------------------------------------------+ ++ ++If this option is set to root, the system filter is run in the main Exim ++delivery process, as root. Otherwise, the system filter runs in a separate ++process, as the given user, defaulting to the Exim run-time user. Unless the ++string consists entirely of digits, it is looked up in the password data. ++Failure to find the named user causes a configuration error. The gid is either ++taken from the password data, or specified by system_filter_group. When the uid ++is specified numerically, system_filter_group is required to be set. ++ ++If the system filter generates any pipe, file, or reply deliveries, the uid ++under which the filter is run is used when transporting them, unless a ++transport option overrides. ++ +++-------------------------------------------------+ ++|tcp_nodelay|Use: main|Type: boolean|Default: true| +++-------------------------------------------------+ ++ ++If this option is set false, it stops the Exim daemon setting the TCP_NODELAY ++option on its listening sockets. Setting TCP_NODELAY turns off the "Nagle ++algorithm", which is a way of improving network performance in interactive ++(character-by-character) situations. Turning it off should improve Exim's ++performance a bit, so that is what happens by default. However, it appears that ++some broken clients cannot cope, and time out. Hence this option. It affects ++only those sockets that are set up for listening by the daemon. Sockets created ++by the smtp transport for delivering mail always set TCP_NODELAY. ++ +++-----------------------------------------------------+ ++|timeout_frozen_after|Use: main|Type: time|Default: 0s| +++-----------------------------------------------------+ ++ ++If timeout_frozen_after is set to a time greater than zero, a frozen message of ++any kind that has been on the queue for longer than the given time is ++automatically cancelled at the next queue run. If the frozen message is a ++bounce message, it is just discarded; otherwise, a bounce is sent to the ++sender, in a similar manner to cancellation by the -Mg command line option. If ++you want to timeout frozen bounce messages earlier than other kinds of frozen ++message, see ignore_bounce_errors_after. ++ ++Note: the default value of zero means no timeouts; with this setting, frozen ++messages remain on the queue forever (except for any frozen bounce messages ++that are released by ignore_bounce_errors_after). ++ +++----------------------------------------------+ ++|timezone|Use: main|Type: string|Default: unset| +++----------------------------------------------+ ++ ++The value of timezone is used to set the environment variable TZ while running ++Exim (if it is different on entry). This ensures that all timestamps created by ++Exim are in the required timezone. If you want all your timestamps to be in UTC ++(aka GMT) you should set ++ ++timezone = UTC ++ ++The default value is taken from TIMEZONE_DEFAULT in Local/Makefile, or, if that ++is not set, from the value of the TZ environment variable when Exim is built. ++If timezone is set to the empty string, either at build or run time, any ++existing TZ variable is removed from the environment when Exim runs. This is ++appropriate behaviour for obtaining wall-clock time on some, but unfortunately ++not all, operating systems. ++ +++-------------------------------------------------------------+ ++|tls_advertise_hosts|Use: main|Type: host list*|Default: unset| +++-------------------------------------------------------------+ ++ ++When Exim is built with support for TLS encrypted connections, the availability ++of the STARTTLS command to set up an encrypted session is advertised in ++response to EHLO only to those client hosts that match this option. See chapter ++41 for details of Exim's support for TLS. ++ +++------------------------------------------------------+ ++|tls_certificate|Use: main|Type: string*|Default: unset| +++------------------------------------------------------+ ++ ++The value of this option is expanded, and must then be the absolute path to a ++file which contains the server's certificates. The server's private key is also ++assumed to be in this file if tls_privatekey is unset. See chapter 41 for ++further details. ++ ++Note: The certificates defined by this option are used only when Exim is ++receiving incoming messages as a server. If you want to supply certificates for ++use when sending messages as a client, you must set the tls_certificate option ++in the relevant smtp transport. ++ ++If the option contains $tls_out_sni and Exim is built against OpenSSL, then if ++the OpenSSL build supports TLS extensions and the TLS client sends the Server ++Name Indication extension, then this option and others documented in 41.10 will ++be re-expanded. ++ +++----------------------------------------------+ ++|tls_crl|Use: main|Type: string*|Default: unset| +++----------------------------------------------+ ++ ++This option specifies a certificate revocation list. The expanded value must be ++the name of a file that contains a CRL in PEM format. ++ ++See 41.10 for discussion of when this option might be re-expanded. ++ +++-----------------------------------------------------+ ++|tls_dh_max_bits|Use: main|Type: integer|Default: 2236| +++-----------------------------------------------------+ ++ ++The number of bits used for Diffie-Hellman key-exchange may be suggested by the ++chosen TLS library. That value might prove to be too high for interoperability. ++This option provides a maximum clamp on the value suggested, trading off ++security for interoperability. ++ ++The value must be at least 1024. ++ ++The value 2236 was chosen because, at time of adding the option, it was the ++hard-coded maximum value supported by the NSS cryptographic library, as used by ++Thunderbird, while GnuTLS was suggesting 2432 bits as normal. ++ ++If you prefer more security and are willing to break some clients, raise this ++number. ++ ++Note that the value passed to GnuTLS for *generating* a new prime may be a ++little less than this figure, because GnuTLS is inexact and may produce a ++larger prime than requested. ++ +++--------------------------------------------------+ ++|tls_dhparam|Use: main|Type: string*|Default: unset| +++--------------------------------------------------+ ++ ++The value of this option is expanded and indicates the source of DH parameters ++to be used by Exim. ++ ++If it is a filename starting with a "/", then it names a file from which DH ++parameters should be loaded. If the file exists, it should hold a PEM-encoded ++PKCS#3 representation of the DH prime. If the file does not exist, for OpenSSL ++it is an error. For GnuTLS, Exim will attempt to create the file and fill it ++with a generated DH prime. For OpenSSL, if the DH bit-count from loading the ++file is greater than tls_dh_max_bits then it will be ignored, and treated as ++though the tls_dhparam were set to "none". ++ ++If this option expands to the string "none", then no DH parameters will be ++loaded by Exim. ++ ++If this option expands to the string "historic" and Exim is using GnuTLS, then ++Exim will attempt to load a file from inside the spool directory. If the file ++does not exist, Exim will attempt to create it. See section 41.3 for further ++details. ++ ++If Exim is using OpenSSL and this option is empty or unset, then Exim will load ++a default DH prime; the default is the 2048 bit prime described in section 2.2 ++of RFC 5114, "2048-bit MODP Group with 224-bit Prime Order Subgroup", which in ++IKE is assigned number 23. ++ ++Otherwise, the option must expand to the name used by Exim for any of a number ++of DH primes specified in RFC 2409, RFC 3526 and RFC 5114. As names, Exim uses ++"ike" followed by the number used by IKE, of "default" which corresponds to ++"ike23". ++ ++The available primes are: "ike1", "ike2", "ike5", "ike14", "ike15", "ike16", ++"ike17", "ike18", "ike22", "ike23" (aka "default") and "ike24". ++ ++Some of these will be too small to be accepted by clients. Some may be too ++large to be accepted by clients. ++ ++The TLS protocol does not negotiate an acceptable size for this; clients tend ++to hard-drop connections if what is offered by the server is unacceptable, ++whether too large or too small, and there's no provision for the client to tell ++the server what these constraints are. Thus, as a server operator, you need to ++make an educated guess as to what is most likely to work for your userbase. ++ ++Some known size constraints suggest that a bit-size in the range 2048 to 2236 ++is most likely to maximise interoperability. The upper bound comes from ++applications using the Mozilla Network Security Services (NSS) library, which ++used to set its "DH_MAX_P_BITS" upper-bound to 2236. This affects many mail ++user agents (MUAs). The lower bound comes from Debian installs of Exim4 prior ++to the 4.80 release, as Debian used to patch Exim to raise the minimum ++acceptable bound from 1024 to 2048. ++ +++---------------------------------------------------------------+ ++|tls_on_connect_ports|Use: main|Type: string list|Default: unset| +++---------------------------------------------------------------+ ++ ++This option specifies a list of incoming SSMTP (aka SMTPS) ports that should ++operate the obsolete SSMTP (SMTPS) protocol, where a TLS session is immediately ++set up without waiting for the client to issue a STARTTLS command. For further ++details, see section 13.4. ++ +++-----------------------------------------------------+ ++|tls_privatekey|Use: main|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++The value of this option is expanded, and must then be the absolute path to a ++file which contains the server's private key. If this option is unset, or if ++the expansion is forced to fail, or the result is an empty string, the private ++key is assumed to be in the same file as the server's certificates. See chapter ++41 for further details. ++ ++See 41.10 for discussion of when this option might be re-expanded. ++ +++---------------------------------------------------------+ ++|tls_remember_esmtp|Use: main|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is set true, Exim violates the RFCs by remembering that it is in ++"esmtp" state after successfully negotiating a TLS session. This provides ++support for broken clients that fail to send a new EHLO after starting a TLS ++session. ++ +++----------------------------------------------------------+ ++|tls_require_ciphers|Use: main|Type: string*|Default: unset| +++----------------------------------------------------------+ ++ ++This option controls which ciphers can be used for incoming TLS connections. ++The smtp transport has an option of the same name for controlling outgoing ++connections. This option is expanded for each connection, so can be varied for ++different clients if required. The value of this option must be a list of ++permitted cipher suites. The OpenSSL and GnuTLS libraries handle cipher control ++in somewhat different ways. If GnuTLS is being used, the client controls the ++preference order of the available ciphers. Details are given in sections 41.4 ++and 41.5. ++ +++--------------------------------------------------------------+ ++|tls_try_verify_hosts|Use: main|Type: host list*|Default: unset| +++--------------------------------------------------------------+ ++ ++See tls_verify_hosts below. ++ +++--------------------------------------------------------------+ ++|tls_verify_certificates|Use: main|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++The value of this option is expanded, and must then be the absolute path to a ++file containing permitted certificates for clients that match tls_verify_hosts ++or tls_try_verify_hosts. Alternatively, if you are using OpenSSL, you can set ++tls_verify_certificates to the name of a directory containing certificate ++files. This does not work with GnuTLS; the option must be set to the name of a ++single file if you are using GnuTLS. ++ ++These certificates should be for the certificate authorities trusted, rather ++than the public cert of individual clients. With both OpenSSL and GnuTLS, if ++the value is a file then the certificates are sent by Exim as a server to ++connecting clients, defining the list of accepted certificate authorities. Thus ++the values defined should be considered public data. To avoid this, use OpenSSL ++with a directory. ++ ++See 41.10 for discussion of when this option might be re-expanded. ++ ++A forced expansion failure or setting to an empty string is equivalent to being ++unset. ++ +++----------------------------------------------------------+ ++|tls_verify_hosts|Use: main|Type: host list*|Default: unset| +++----------------------------------------------------------+ ++ ++This option, along with tls_try_verify_hosts, controls the checking of ++certificates from clients. The expected certificates are defined by ++tls_verify_certificates, which must be set. A configuration error occurs if ++either tls_verify_hosts or tls_try_verify_hosts is set and ++tls_verify_certificates is not set. ++ ++Any client that matches tls_verify_hosts is constrained by ++tls_verify_certificates. When the client initiates a TLS session, it must ++present one of the listed certificates. If it does not, the connection is ++aborted. Warning: Including a host in tls_verify_hosts does not require the ++host to use TLS. It can still send SMTP commands through unencrypted ++connections. Forcing a client to use TLS has to be done separately using an ACL ++to reject inappropriate commands when the connection is not encrypted. ++ ++A weaker form of checking is provided by tls_try_verify_hosts. If a client ++matches this option (but not tls_verify_hosts), Exim requests a certificate and ++checks it against tls_verify_certificates, but does not abort the connection if ++there is no certificate or if it does not match. This state can be detected in ++an ACL, which makes it possible to implement policies such as "accept for relay ++only if a verified certificate has been received, but accept for local delivery ++if encrypted, even without a verified certificate". ++ ++Client hosts that match neither of these lists are not asked to present ++certificates. ++ +++----------------------------------------------------------+ ++|trusted_groups|Use: main|Type: string list*|Default: unset| +++----------------------------------------------------------+ ++ ++This option is expanded just once, at the start of Exim's processing. If this ++option is set, any process that is running in one of the listed groups, or ++which has one of them as a supplementary group, is trusted. The groups can be ++specified numerically or by name. See section 5.2 for details of what trusted ++callers are permitted to do. If neither trusted_groups nor trusted_users is ++set, only root and the Exim user are trusted. ++ +++---------------------------------------------------------+ ++|trusted_users|Use: main|Type: string list*|Default: unset| +++---------------------------------------------------------+ ++ ++This option is expanded just once, at the start of Exim's processing. If this ++option is set, any process that is running as one of the listed users is ++trusted. The users can be specified numerically or by name. See section 5.2 for ++details of what trusted callers are permitted to do. If neither trusted_groups ++nor trusted_users is set, only root and the Exim user are trusted. ++ +++----------------------------------------------------+ ++|unknown_login|Use: main|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This is a specialized feature for use in unusual configurations. By default, if ++the uid of the caller of Exim cannot be looked up using getpwuid(), Exim gives ++up. The unknown_login option can be used to set a login name to be used in this ++circumstance. It is expanded, so values like user$caller_uid can be set. When ++unknown_login is used, the value of unknown_username is used for the user's ++real name (gecos field), unless this has been set by the -F option. ++ +++------------------------------------------------------+ ++|unknown_username|Use: main|Type: string|Default: unset| +++------------------------------------------------------+ ++ ++See unknown_login. ++ +++-----------------------------------------------------------------+ ++|untrusted_set_sender|Use: main|Type: address list*|Default: unset| +++-----------------------------------------------------------------+ ++ ++When an untrusted user submits a message to Exim using the standard input, Exim ++normally creates an envelope sender address from the user's login and the ++default qualification domain. Data from the -f option (for setting envelope ++senders on non-SMTP messages) or the SMTP MAIL command (if -bs or -bS is used) ++is ignored. ++ ++However, untrusted users are permitted to set an empty envelope sender address, ++to declare that a message should never generate any bounces. For example: ++ ++exim -f '<>' user@domain.example ++ ++The untrusted_set_sender option allows you to permit untrusted users to set ++other envelope sender addresses in a controlled way. When it is set, untrusted ++users are allowed to set envelope sender addresses that match any of the ++patterns in the list. Like all address lists, the string is expanded. The ++identity of the user is in $sender_ident, so you can, for example, restrict ++users to setting senders that start with their login ids followed by a hyphen ++by a setting like this: ++ ++untrusted_set_sender = ^$sender_ident- ++ ++If you want to allow untrusted users to set envelope sender addresses without ++restriction, you can use ++ ++untrusted_set_sender = * ++ ++The untrusted_set_sender option applies to all forms of local input, but only ++to the setting of the envelope sender. It does not permit untrusted users to ++use the other options which trusted user can use to override message ++parameters. Furthermore, it does not stop Exim from removing an existing ++Sender: header in the message, or from adding a Sender: header if necessary. ++See local_sender_retain and local_from_check for ways of overriding these ++actions. The handling of the Sender: header is also described in section 46.16. ++ ++The log line for a message's arrival shows the envelope sender following "<=". ++For local messages, the user's login always follows, after "U=". In -bp ++displays, and in the Exim monitor, if an untrusted user sets an envelope sender ++address, the user's login is shown in parentheses after the sender address. ++ +++-----------------------------------------------------------+ ++|uucp_from_pattern|Use: main|Type: string|Default: see below| +++-----------------------------------------------------------+ ++ ++Some applications that pass messages to an MTA via a command line interface use ++an initial line starting with "From " to pass the envelope sender. In ++particular, this is used by UUCP software. Exim recognizes such a line by means ++of a regular expression that is set in uucp_from_pattern. When the pattern ++matches, the sender address is constructed by expanding the contents of ++uucp_from_sender, provided that the caller of Exim is a trusted user. The ++default pattern recognizes lines in the following two forms: ++ ++From ph10 Fri Jan 5 12:35 GMT 1996 ++From ph10 Fri, 7 Jan 97 14:00:00 GMT ++ ++The pattern can be seen by running ++ ++exim -bP uucp_from_pattern ++ ++It checks only up to the hours and minutes, and allows for a 2-digit or 4-digit ++year in the second case. The first word after "From " is matched in the regular ++expression by a parenthesized subpattern. The default value for ++uucp_from_sender is "$1", which therefore just uses this first word ("ph10" in ++the example above) as the message's sender. See also ignore_fromline_hosts. ++ +++------------------------------------------------------+ ++|uucp_from_sender|Use: main|Type: string*|Default: "$1"| +++------------------------------------------------------+ ++ ++See uucp_from_pattern above. ++ +++-------------------------------------------------------+ ++|warn_message_file|Use: main|Type: string|Default: unset| +++-------------------------------------------------------+ ++ ++This option defines a template file containing paragraphs of text to be used ++for constructing the warning message which is sent by Exim when a message has ++been on the queue for a specified amount of time, as specified by delay_warning ++. Details of the file's contents are given in chapter 48. See also ++bounce_message_file. ++ +++-----------------------------------------------------+ ++|write_rejectlog|Use: main|Type: boolean|Default: true| +++-----------------------------------------------------+ ++ ++If this option is set false, Exim no longer writes anything to the reject log. ++See chapter 51 for details of what Exim writes to its logs. ++ ++ ++ ++=============================================================================== ++15. GENERIC OPTIONS FOR ROUTERS ++ ++This chapter describes the generic options that apply to all routers. Those ++that are preconditions are marked with ** in the "use" field. ++ ++For a general description of how a router operates, see sections 3.10 and 3.12. ++The latter specifies the order in which the preconditions are tested. The order ++of expansion of the options that provide data for a transport is: errors_to, ++headers_add, headers_remove, transport. ++ +++------------------------------------------------------+ ++|address_data|Use: routers|Type: string*|Default: unset| +++------------------------------------------------------+ ++ ++The string is expanded just before the router is run, that is, after all the ++precondition tests have succeeded. If the expansion is forced to fail, the ++router declines, the value of address_data remains unchanged, and the more ++option controls what happens next. Other expansion failures cause delivery of ++the address to be deferred. ++ ++When the expansion succeeds, the value is retained with the address, and can be ++accessed using the variable $address_data in the current router, subsequent ++routers, and the eventual transport. ++ ++Warning: If the current or any subsequent router is a redirect router that runs ++a user's filter file, the contents of $address_data are accessible in the ++filter. This is not normally a problem, because such data is usually either not ++confidential or it "belongs" to the current user, but if you do put ++confidential data into $address_data you need to remember this point. ++ ++Even if the router declines or passes, the value of $address_data remains with ++the address, though it can be changed by another address_data setting on a ++subsequent router. If a router generates child addresses, the value of ++$address_data propagates to them. This also applies to the special kind of ++"child" that is generated by a router with the unseen option. ++ ++The idea of address_data is that you can use it to look up a lot of data for ++the address once, and then pick out parts of the data later. For example, you ++could use a single LDAP lookup to return a string of the form ++ ++uid=1234 gid=5678 mailbox=/mail/xyz forward=/home/xyz/.forward ++ ++In the transport you could pick out the mailbox by a setting such as ++ ++file = ${extract{mailbox}{$address_data}} ++ ++This makes the configuration file less messy, and also reduces the number of ++lookups (though Exim does cache lookups). ++ ++The address_data facility is also useful as a means of passing information from ++one router to another, and from a router to a transport. In addition, if ++$address_data is set by a router when verifying a recipient address from an ++ACL, it remains available for use in the rest of the ACL statement. After ++verifying a sender, the value is transferred to $sender_address_data. ++ +++-------------------------------------------------------+ ++|address_test|Use: routers**|Type: boolean|Default: true| +++-------------------------------------------------------+ ++ ++If this option is set false, the router is skipped when routing is being tested ++by means of the -bt command line option. This can be a convenience when your ++first router sends messages to an external scanner, because it saves you having ++to set the "already scanned" indicator when testing real address routing. ++ +++--------------------------------------------------------------+ ++|cannot_route_message|Use: routers|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++This option specifies a text message that is used when an address cannot be ++routed because Exim has run out of routers. The default message is "Unrouteable ++address". This option is useful only on routers that have more set false, or on ++the very last router in a configuration, because the value that is used is ++taken from the last router that is considered. This includes a router that is ++skipped because its preconditions are not met, as well as a router that ++declines. For example, using the default configuration, you could put: ++ ++cannot_route_message = Remote domain not found in DNS ++ ++on the first router, which is a dnslookup router with more set false, and ++ ++cannot_route_message = Unknown local user ++ ++on the final router that checks for local users. If string expansion fails for ++this option, the default message is used. Unless the expansion failure was ++explicitly forced, a message about the failure is written to the main and panic ++logs, in addition to the normal message about the routing failure. ++ +++------------------------------------------------------------+ ++|caseful_local_part|Use: routers|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++By default, routers handle the local parts of addresses in a case-insensitive ++manner, though the actual case is preserved for transmission with the message. ++If you want the case of letters to be significant in a router, you must set ++this option true. For individual router options that contain address or local ++part lists (for example, local_parts), case-sensitive matching can be turned on ++by "+caseful" as a list item. See section 10.20 for more details. ++ ++The value of the $local_part variable is forced to lower case while a router is ++running unless caseful_local_part is set. When a router assigns an address to a ++transport, the value of $local_part when the transport runs is the same as it ++was in the router. Similarly, when a router generates child addresses by ++aliasing or forwarding, the values of $original_local_part and ++$parent_local_part are those that were used by the redirecting router. ++ ++This option applies to the processing of an address by a router. When a ++recipient address is being processed in an ACL, there is a separate control ++modifier that can be used to specify case-sensitive processing within the ACL ++(see section 42.21). ++ +++------------------------------------------------------------+ ++|check_local_user|Use: routers**|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++When this option is true, Exim checks that the local part of the recipient ++address (with affixes removed if relevant) is the name of an account on the ++local system. The check is done by calling the getpwnam() function rather than ++trying to read /etc/passwd directly. This means that other methods of holding ++password data (such as NIS) are supported. If the local part is a local user, ++$home is set from the password data, and can be tested in other preconditions ++that are evaluated after this one (the order of evaluation is given in section ++3.12). However, the value of $home can be overridden by router_home_directory. ++If the local part is not a local user, the router is skipped. ++ ++If you want to check that the local part is either the name of a local user or ++matches something else, you cannot combine check_local_user with a setting of ++local_parts, because that specifies the logical and of the two conditions. ++However, you can use a passwd lookup in a local_parts setting to achieve this. ++For example: ++ ++local_parts = passwd;$local_part : lsearch;/etc/other/users ++ ++Note, however, that the side effects of check_local_user (such as setting up a ++home directory) do not occur when a passwd lookup is used in a local_parts (or ++any other) precondition. ++ +++-----------------------------------------------------+ ++|condition|Use: routers**|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++This option specifies a general precondition test that has to succeed for the ++router to be called. The condition option is the last precondition to be ++evaluated (see section 3.12). The string is expanded, and if the result is a ++forced failure, or an empty string, or one of the strings "0" or "no" or ++"false" (checked without regard to the case of the letters), the router is ++skipped, and the address is offered to the next one. ++ ++If the result is any other value, the router is run (as this is the last ++precondition to be evaluated, all the other preconditions must be true). ++ ++This option is unusual in that multiple condition options may be present. All ++condition options must succeed. ++ ++The condition option provides a means of applying custom conditions to the ++running of routers. Note that in the case of a simple conditional expansion, ++the default expansion values are exactly what is wanted. For example: ++ ++condition = ${if >{$message_age}{600}} ++ ++Because of the default behaviour of the string expansion, this is equivalent to ++ ++condition = ${if >{$message_age}{600}{true}{}} ++ ++A multiple condition example, which succeeds: ++ ++condition = ${if >{$message_age}{600}} ++condition = ${if !eq{${lc:$local_part}}{postmaster}} ++condition = foobar ++ ++If the expansion fails (other than forced failure) delivery is deferred. Some ++of the other precondition options are common special cases that could in fact ++be specified using condition. ++ +++-----------------------------------------------------+ ++|debug_print|Use: routers|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++If this option is set and debugging is enabled (see the -d command line option) ++or in address-testing mode (see the -bt command line option), the string is ++expanded and included in the debugging output. If expansion of the string ++fails, the error message is written to the debugging output, and Exim carries ++on processing. This option is provided to help with checking out the values of ++variables and so on when debugging router configurations. For example, if a ++condition option appears not to be working, debug_print can be used to output ++the variables it references. The output happens after checks for domains, ++local_parts, and check_local_user but before any other preconditions are ++tested. A newline is added to the text if it does not end with one. The ++variable $router_name contains the name of the router. ++ +++---------------------------------------------------------+ ++|disable_logging|Use: routers|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is set true, nothing is logged for any routing errors or for any ++deliveries caused by this router. You should not set this option unless you ++really, really know what you are doing. See also the generic transport option ++of the same name. ++ +++--------------------------------------------------------+ ++|domains|Use: routers**|Type: domain list*|Default: unset| +++--------------------------------------------------------+ ++ ++If this option is set, the router is skipped unless the current domain matches ++the list. If the match is achieved by means of a file lookup, the data that the ++lookup returned for the domain is placed in $domain_data for use in string ++expansions of the driver's private options. See section 3.12 for a list of the ++order in which preconditions are evaluated. ++ +++-----------------------------------------------+ ++|driver|Use: routers|Type: string|Default: unset| +++-----------------------------------------------+ ++ ++This option must always be set. It specifies which of the available routers is ++to be used. ++ +++---------------------------------------------------+ ++|errors_to|Use: routers|Type: string*|Default: unset| +++---------------------------------------------------+ ++ ++If a router successfully handles an address, it may assign the address to a ++transport for delivery or it may generate child addresses. In both cases, if ++there is a delivery problem during later processing, the resulting bounce ++message is sent to the address that results from expanding this string, ++provided that the address verifies successfully. The errors_to option is ++expanded before headers_add, headers_remove, and transport. ++ ++The errors_to setting associated with an address can be overridden if it ++subsequently passes through other routers that have their own errors_to ++settings, or if the message is delivered by a transport with a return_path ++setting. ++ ++If errors_to is unset, or the expansion is forced to fail, or the result of the ++expansion fails to verify, the errors address associated with the incoming ++address is used. At top level, this is the envelope sender. A non-forced ++expansion failure causes delivery to be deferred. ++ ++If an address for which errors_to has been set ends up being delivered over ++SMTP, the envelope sender for that delivery is the errors_to value, so that any ++bounces that are generated by other MTAs on the delivery route are also sent ++there. You can set errors_to to the empty string by either of these settings: ++ ++errors_to = ++errors_to = "" ++ ++An expansion item that yields an empty string has the same effect. If you do ++this, a locally detected delivery error for addresses processed by this router ++no longer gives rise to a bounce message; the error is discarded. If the ++address is delivered to a remote host, the return path is set to "<>", unless ++overridden by the return_path option on the transport. ++ ++If for some reason you want to discard local errors, but use a non-empty MAIL ++command for remote delivery, you can preserve the original return path in ++$address_data in the router, and reinstate it in the transport by setting ++return_path. ++ ++The most common use of errors_to is to direct mailing list bounces to the ++manager of the list, as described in section 49.2, or to implement VERP ++(Variable Envelope Return Paths) (see section 49.6). ++ +++-----------------------------------------------+ ++|expn|Use: routers**|Type: boolean|Default: true| +++-----------------------------------------------+ ++ ++If this option is turned off, the router is skipped when testing an address as ++a result of processing an SMTP EXPN command. You might, for example, want to ++turn it off on a router for users' .forward files, while leaving it on for the ++system alias file. See section 3.12 for a list of the order in which ++preconditions are evaluated. ++ ++The use of the SMTP EXPN command is controlled by an ACL (see chapter 42). When ++Exim is running an EXPN command, it is similar to testing an address with -bt. ++Compare VRFY, whose counterpart is -bv. ++ +++-----------------------------------------------------+ ++|fail_verify|Use: routers|Type: boolean|Default: false| +++-----------------------------------------------------+ ++ ++Setting this option has the effect of setting both fail_verify_sender and ++fail_verify_recipient to the same value. ++ +++---------------------------------------------------------------+ ++|fail_verify_recipient|Use: routers|Type: boolean|Default: false| +++---------------------------------------------------------------+ ++ ++If this option is true and an address is accepted by this router when verifying ++a recipient, verification fails. ++ +++------------------------------------------------------------+ ++|fail_verify_sender|Use: routers|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is true and an address is accepted by this router when verifying ++a sender, verification fails. ++ +++------------------------------------------------------------+ ++|fallback_hosts|Use: routers|Type: string list|Default: unset| +++------------------------------------------------------------+ ++ ++String expansion is not applied to this option. The argument must be a ++colon-separated list of host names or IP addresses. The list separator can be ++changed (see section 6.19), and a port can be specified with each name or ++address. In fact, the format of each item is exactly the same as defined for ++the list of hosts in a manualroute router (see section 20.5). ++ ++If a router queues an address for a remote transport, this host list is ++associated with the address, and used instead of the transport's fallback host ++list. If hosts_randomize is set on the transport, the order of the list is ++randomized for each use. See the fallback_hosts option of the smtp transport ++for further details. ++ +++---------------------------------------------------+ ++|group|Use: routers|Type: string*|Default: see below| +++---------------------------------------------------+ ++ ++When a router queues an address for a transport, and the transport does not ++specify a group, the group given here is used when running the delivery ++process. The group may be specified numerically or by name. If expansion fails, ++the error is logged and delivery is deferred. The default is unset, unless ++check_local_user is set, when the default is taken from the password ++information. See also initgroups and user and the discussion in chapter 23. ++ +++-----------------------------------------------------+ ++|headers_add|Use: routers|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++This option specifies a string of text that is expanded at routing time, and ++associated with any addresses that are accepted by the router. However, this ++option has no effect when an address is just being verified. The way in which ++the text is used to add header lines at transport time is described in section ++46.17. New header lines are not actually added until the message is in the ++process of being transported. This means that references to header lines in ++string expansions in the transport's configuration do not "see" the added ++header lines. ++ ++The headers_add option is expanded after errors_to, but before headers_remove ++and transport. If the expanded string is empty, or if the expansion is forced ++to fail, the option has no effect. Other expansion failures are treated as ++configuration errors. ++ ++Unlike most options, headers_add can be specified multiple times for a router; ++all listed headers are added. ++ ++Warning 1: The headers_add option cannot be used for a redirect router that has ++the one_time option set. ++ ++Warning 2: If the unseen option is set on the router, all header additions are ++deleted when the address is passed on to subsequent routers. For a redirect ++router, if a generated address is the same as the incoming address, this can ++lead to duplicate addresses with different header modifications. Exim does not ++do duplicate deliveries (except, in certain circumstances, to pipes -- see ++section 22.7), but it is undefined which of the duplicates is discarded, so ++this ambiguous situation should be avoided. The repeat_use option of the ++redirect router may be of help. ++ +++--------------------------------------------------------+ ++|headers_remove|Use: routers|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++This option specifies a string of text that is expanded at routing time, and ++associated with any addresses that are accepted by the router. However, this ++option has no effect when an address is just being verified. The way in which ++the text is used to remove header lines at transport time is described in ++section 46.17. Header lines are not actually removed until the message is in ++the process of being transported. This means that references to header lines in ++string expansions in the transport's configuration still "see" the original ++header lines. ++ ++The headers_remove option is expanded after errors_to and headers_add, but ++before transport. If the expansion is forced to fail, the option has no effect. ++Other expansion failures are treated as configuration errors. ++ ++Unlike most options, headers_remove can be specified multiple times for a ++router; all listed headers are removed. ++ ++Warning 1: The headers_remove option cannot be used for a redirect router that ++has the one_time option set. ++ ++Warning 2: If the unseen option is set on the router, all header removal ++requests are deleted when the address is passed on to subsequent routers, and ++this can lead to problems with duplicates -- see the similar warning for ++headers_add above. ++ +++----------------------------------------------------------------+ ++|ignore_target_hosts|Use: routers|Type: host list*|Default: unset| +++----------------------------------------------------------------+ ++ ++Although this option is a host list, it should normally contain IP address ++entries rather than names. If any host that is looked up by the router has an ++IP address that matches an item in this list, Exim behaves as if that IP ++address did not exist. This option allows you to cope with rogue DNS entries ++like ++ ++remote.domain.example. A 127.0.0.1 ++ ++by setting ++ ++ignore_target_hosts = 127.0.0.1 ++ ++on the relevant router. If all the hosts found by a dnslookup router are ++discarded in this way, the router declines. In a conventional configuration, an ++attempt to mail to such a domain would normally provoke the "unrouteable ++domain" error, and an attempt to verify an address in the domain would fail. ++Similarly, if ignore_target_hosts is set on an ipliteral router, the router ++declines if presented with one of the listed addresses. ++ ++You can use this option to disable the use of IPv4 or IPv6 for mail delivery by ++means of the first or the second of the following settings, respectively: ++ ++ignore_target_hosts = 0.0.0.0/0 ++ignore_target_hosts = <; 0::0/0 ++ ++The pattern in the first line matches all IPv4 addresses, whereas the pattern ++in the second line matches all IPv6 addresses. ++ ++This option may also be useful for ignoring link-local and site-local IPv6 ++addresses. Because, like all host lists, the value of ignore_target_hosts is ++expanded before use as a list, it is possible to make it dependent on the ++domain that is being routed. ++ ++During its expansion, $host_address is set to the IP address that is being ++checked. ++ +++----------------------------------------------------+ ++|initgroups|Use: routers|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++If the router queues an address for a transport, and this option is true, and ++the uid supplied by the router is not overridden by the transport, the ++initgroups() function is called when running the transport to ensure that any ++additional groups associated with the uid are set up. See also group and user ++and the discussion in chapter 23. ++ +++-----------------------------------------------------------------+ ++|local_part_prefix|Use: routers**|Type: string list|Default: unset| +++-----------------------------------------------------------------+ ++ ++If this option is set, the router is skipped unless the local part starts with ++one of the given strings, or local_part_prefix_optional is true. See section ++3.12 for a list of the order in which preconditions are evaluated. ++ ++The list is scanned from left to right, and the first prefix that matches is ++used. A limited form of wildcard is available; if the prefix begins with an ++asterisk, it matches the longest possible sequence of arbitrary characters at ++the start of the local part. An asterisk should therefore always be followed by ++some character that does not occur in normal local parts. Wildcarding can be ++used to set up multiple user mailboxes, as described in section 49.8. ++ ++During the testing of the local_parts option, and while the router is running, ++the prefix is removed from the local part, and is available in the expansion ++variable $local_part_prefix. When a message is being delivered, if the router ++accepts the address, this remains true during subsequent delivery by a ++transport. In particular, the local part that is transmitted in the RCPT ++command for LMTP, SMTP, and BSMTP deliveries has the prefix removed by default. ++This behaviour can be overridden by setting rcpt_include_affixes true on the ++relevant transport. ++ ++When an address is being verified, local_part_prefix affects only the behaviour ++of the router. If the callout feature of verification is in use, this means ++that the full address, including the prefix, will be used during the callout. ++ ++The prefix facility is commonly used to handle local parts of the form ++owner-something. Another common use is to support local parts of the form ++real-username to bypass a user's .forward file - helpful when trying to tell a ++user their forwarding is broken - by placing a router like this one immediately ++before the router that handles .forward files: ++ ++real_localuser: ++ driver = accept ++ local_part_prefix = real- ++ check_local_user ++ transport = local_delivery ++ ++For security, it would probably be a good idea to restrict the use of this ++router to locally-generated messages, using a condition such as this: ++ ++ condition = ${if match {$sender_host_address}\ ++ {\N^(|127\.0\.0\.1)$\N}} ++ ++If both local_part_prefix and local_part_suffix are set for a router, both ++conditions must be met if not optional. Care must be taken if wildcards are ++used in both a prefix and a suffix on the same router. Different separator ++characters must be used to avoid ambiguity. ++ +++--------------------------------------------------------------------+ ++|local_part_prefix_optional|Use: routers|Type: boolean|Default: false| +++--------------------------------------------------------------------+ ++ ++See local_part_prefix above. ++ +++-----------------------------------------------------------------+ ++|local_part_suffix|Use: routers**|Type: string list|Default: unset| +++-----------------------------------------------------------------+ ++ ++This option operates in the same way as local_part_prefix, except that the ++local part must end (rather than start) with the given string, the ++local_part_suffix_optional option determines whether the suffix is mandatory, ++and the wildcard * character, if present, must be the last character of the ++suffix. This option facility is commonly used to handle local parts of the form ++something-request and multiple user mailboxes of the form username-foo. ++ +++--------------------------------------------------------------------+ ++|local_part_suffix_optional|Use: routers|Type: boolean|Default: false| +++--------------------------------------------------------------------+ ++ ++See local_part_suffix above. ++ +++----------------------------------------------------------------+ ++|local_parts|Use: routers**|Type: local part list*|Default: unset| +++----------------------------------------------------------------+ ++ ++The router is run only if the local part of the address matches the list. See ++section 3.12 for a list of the order in which preconditions are evaluated, and ++section 10.21 for a discussion of local part lists. Because the string is ++expanded, it is possible to make it depend on the domain, for example: ++ ++local_parts = dbm;/usr/local/specials/$domain ++ ++If the match is achieved by a lookup, the data that the lookup returned for the ++local part is placed in the variable $local_part_data for use in expansions of ++the router's private options. You might use this option, for example, if you ++have a large number of local virtual domains, and you want to send all ++postmaster mail to the same place without having to set up an alias in each ++virtual domain: ++ ++postmaster: ++ driver = redirect ++ local_parts = postmaster ++ data = postmaster@real.domain.example ++ +++----------------------------------------------------------+ ++|log_as_local|Use: routers|Type: boolean|Default: see below| +++----------------------------------------------------------+ ++ ++Exim has two logging styles for delivery, the idea being to make local ++deliveries stand out more visibly from remote ones. In the "local" style, the ++recipient address is given just as the local part, without a domain. The use of ++this style is controlled by this option. It defaults to true for the accept ++router, and false for all the others. This option applies only when a router ++assigns an address to a transport. It has no effect on routers that redirect ++addresses. ++ +++----------------------------------------------+ ++|more|Use: routers|Type: boolean*|Default: true| +++----------------------------------------------+ ++ ++The result of string expansion for this option must be a valid boolean value, ++that is, one of the strings "yes", "no", "true", or "false". Any other result ++causes an error, and delivery is deferred. If the expansion is forced to fail, ++the default value for the option (true) is used. Other failures cause delivery ++to be deferred. ++ ++If this option is set false, and the router declines to handle the address, no ++further routers are tried, routing fails, and the address is bounced. However, ++if the router explicitly passes an address to the following router by means of ++the setting ++ ++self = pass ++ ++or otherwise, the setting of more is ignored. Also, the setting of more does ++not affect the behaviour if one of the precondition tests fails. In that case, ++the address is always passed to the next router. ++ ++Note that address_data is not considered to be a precondition. If its expansion ++is forced to fail, the router declines, and the value of more controls what ++happens next. ++ +++---------------------------------------------------------+ ++|pass_on_timeout|Use: routers|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If a router times out during a host lookup, it normally causes deferral of the ++address. If pass_on_timeout is set, the address is passed on to the next ++router, overriding no_more. This may be helpful for systems that are ++intermittently connected to the Internet, or those that want to pass to a smart ++host any messages that cannot immediately be delivered. ++ ++There are occasional other temporary errors that can occur while doing DNS ++lookups. They are treated in the same way as a timeout, and this option applies ++to all of them. ++ +++----------------------------------------------------+ ++|pass_router|Use: routers|Type: string|Default: unset| +++----------------------------------------------------+ ++ ++Routers that recognize the generic self option (dnslookup, ipliteral, and ++manualroute) are able to return "pass", forcing routing to continue, and ++overriding a false setting of more. When one of these routers returns "pass", ++the address is normally handed on to the next router in sequence. This can be ++changed by setting pass_router to the name of another router. However (unlike ++redirect_router) the named router must be below the current router, to avoid ++loops. Note that this option applies only to the special case of "pass". It ++does not apply when a router returns "decline" because it cannot handle an ++address. ++ +++--------------------------------------------------------+ ++|redirect_router|Use: routers|Type: string|Default: unset| +++--------------------------------------------------------+ ++ ++Sometimes an administrator knows that it is pointless to reprocess addresses ++generated from alias or forward files with the same router again. For example, ++if an alias file translates real names into login ids there is no point ++searching the alias file a second time, especially if it is a large file. ++ ++The redirect_router option can be set to the name of any router instance. It ++causes the routing of any generated addresses to start at the named router ++instead of at the first router. This option has no effect if the router in ++which it is set does not generate new addresses. ++ +++--------------------------------------------------------------+ ++|require_files|Use: routers**|Type: string list*|Default: unset| +++--------------------------------------------------------------+ ++ ++This option provides a general mechanism for predicating the running of a ++router on the existence or non-existence of certain files or directories. ++Before running a router, as one of its precondition tests, Exim works its way ++through the require_files list, expanding each item separately. ++ ++Because the list is split before expansion, any colons in expansion items must ++be doubled, or the facility for using a different list separator must be used. ++If any expansion is forced to fail, the item is ignored. Other expansion ++failures cause routing of the address to be deferred. ++ ++If any expanded string is empty, it is ignored. Otherwise, except as described ++below, each string must be a fully qualified file path, optionally preceded by ++"!". The paths are passed to the stat() function to test for the existence of ++the files or directories. The router is skipped if any paths not preceded by "! ++" do not exist, or if any paths preceded by "!" do exist. ++ ++If stat() cannot determine whether a file exists or not, delivery of the ++message is deferred. This can happen when NFS-mounted filesystems are ++unavailable. ++ ++This option is checked after the domains, local_parts, and senders options, so ++you cannot use it to check for the existence of a file in which to look up a ++domain, local part, or sender. (See section 3.12 for a full list of the order ++in which preconditions are evaluated.) However, as these options are all ++expanded, you can use the exists expansion condition to make such tests. The ++require_files option is intended for checking files that the router may be ++going to use internally, or which are needed by a transport (for example ++.procmailrc). ++ ++During delivery, the stat() function is run as root, but there is a facility ++for some checking of the accessibility of a file by another user. This is not a ++proper permissions check, but just a "rough" check that operates as follows: ++ ++If an item in a require_files list does not contain any forward slash ++characters, it is taken to be the user (and optional group, separated by a ++comma) to be checked for subsequent files in the list. If no group is specified ++but the user is specified symbolically, the gid associated with the uid is ++used. For example: ++ ++require_files = mail:/some/file ++require_files = $local_part:$home/.procmailrc ++ ++If a user or group name in a require_files list does not exist, the ++require_files condition fails. ++ ++Exim performs the check by scanning along the components of the file path, and ++checking the access for the given uid and gid. It checks for "x" access on ++directories, and "r" access on the final file. Note that this means that file ++access control lists, if the operating system has them, are ignored. ++ ++Warning 1: When the router is being run to verify addresses for an incoming ++SMTP message, Exim is not running as root, but under its own uid. This may ++affect the result of a require_files check. In particular, stat() may yield the ++error EACCES ("Permission denied"). This means that the Exim user is not ++permitted to read one of the directories on the file's path. ++ ++Warning 2: Even when Exim is running as root while delivering a message, stat() ++can yield EACCES for a file in an NFS directory that is mounted without root ++access. In this case, if a check for access by a particular user is requested, ++Exim creates a subprocess that runs as that user, and tries the check again in ++that process. ++ ++The default action for handling an unresolved EACCES is to consider it to be ++caused by a configuration error, and routing is deferred because the existence ++or non-existence of the file cannot be determined. However, in some ++circumstances it may be desirable to treat this condition as if the file did ++not exist. If the file name (or the exclamation mark that precedes the file ++name for non-existence) is preceded by a plus sign, the EACCES error is treated ++as if the file did not exist. For example: ++ ++require_files = +/some/file ++ ++If the router is not an essential part of verification (for example, it handles ++users' .forward files), another solution is to set the verify option false so ++that the router is skipped when verifying. ++ +++------------------------------------------------------------------+ ++|retry_use_local_part|Use: routers|Type: boolean|Default: see below| +++------------------------------------------------------------------+ ++ ++When a delivery suffers a temporary routing failure, a retry record is created ++in Exim's hints database. For addresses whose routing depends only on the ++domain, the key for the retry record should not involve the local part, but for ++other addresses, both the domain and the local part should be included. ++Usually, remote routing is of the former kind, and local routing is of the ++latter kind. ++ ++This option controls whether the local part is used to form the key for retry ++hints for addresses that suffer temporary errors while being handled by this ++router. The default value is true for any router that has check_local_user set, ++and false otherwise. Note that this option does not apply to hints keys for ++transport delays; they are controlled by a generic transport option of the same ++name. ++ ++The setting of retry_use_local_part applies only to the router on which it ++appears. If the router generates child addresses, they are routed ++independently; this setting does not become attached to them. ++ +++---------------------------------------------------------------+ ++|router_home_directory|Use: routers|Type: string*|Default: unset| +++---------------------------------------------------------------+ ++ ++This option sets a home directory for use while the router is running. (Compare ++transport_home_directory, which sets a home directory for later transporting.) ++In particular, if used on a redirect router, this option sets a value for $home ++while a filter is running. The value is expanded; forced expansion failure ++causes the option to be ignored - other failures cause the router to defer. ++ ++Expansion of router_home_directory happens immediately after the ++check_local_user test (if configured), before any further expansions take ++place. (See section 3.12 for a list of the order in which preconditions are ++evaluated.) While the router is running, router_home_directory overrides the ++value of $home that came from check_local_user. ++ ++When a router accepts an address and assigns it to a local transport (including ++the cases when a redirect router generates a pipe, file, or autoreply ++delivery), the home directory setting for the transport is taken from the first ++of these values that is set: ++ ++ * The home_directory option on the transport; ++ ++ * The transport_home_directory option on the router; ++ ++ * The password data if check_local_user is set on the router; ++ ++ * The router_home_directory option on the router. ++ ++In other words, router_home_directory overrides the password data for the ++router, but not for the transport. ++ +++----------------------------------------------+ ++|self|Use: routers|Type: string|Default: freeze| +++----------------------------------------------+ ++ ++This option applies to those routers that use a recipient address to find a ++list of remote hosts. Currently, these are the dnslookup, ipliteral, and ++manualroute routers. Certain configurations of the queryprogram router can also ++specify a list of remote hosts. Usually such routers are configured to send the ++message to a remote host via an smtp transport. The self option specifies what ++happens when the first host on the list turns out to be the local host. The way ++in which Exim checks for the local host is described in section 13.8. ++ ++Normally this situation indicates either an error in Exim's configuration (for ++example, the router should be configured not to process this domain), or an ++error in the DNS (for example, the MX should not point to this host). For this ++reason, the default action is to log the incident, defer the address, and ++freeze the message. The following alternatives are provided for use in special ++cases: ++ ++defer ++ ++ Delivery of the message is tried again later, but the message is not ++ frozen. ++ ++reroute: <domain> ++ ++ The domain is changed to the given domain, and the address is passed back ++ to be reprocessed by the routers. No rewriting of headers takes place. This ++ behaviour is essentially a redirection. ++ ++reroute: rewrite: <domain> ++ ++ The domain is changed to the given domain, and the address is passed back ++ to be reprocessed by the routers. Any headers that contain the original ++ domain are rewritten. ++ ++pass ++ ++ The router passes the address to the next router, or to the router named in ++ the pass_router option if it is set. This overrides no_more. During ++ subsequent routing and delivery, the variable $self_hostname contains the ++ name of the local host that the router encountered. This can be used to ++ distinguish between different cases for hosts with multiple names. The ++ combination ++ ++ self = pass ++ no_more ++ ++ ensures that only those addresses that routed to the local host are passed ++ on. Without no_more, addresses that were declined for other reasons would ++ also be passed to the next router. ++ ++fail ++ ++ Delivery fails and an error report is generated. ++ ++send ++ ++ The anomaly is ignored and the address is queued for the transport. This ++ setting should be used with extreme caution. For an smtp transport, it ++ makes sense only in cases where the program that is listening on the SMTP ++ port is not this version of Exim. That is, it must be some other MTA, or ++ Exim with a different configuration file that handles the domain in another ++ way. ++ +++---------------------------------------------------------+ ++|senders|Use: routers**|Type: address list*|Default: unset| +++---------------------------------------------------------+ ++ ++If this option is set, the router is skipped unless the message's sender ++address matches something on the list. See section 3.12 for a list of the order ++in which preconditions are evaluated. ++ ++There are issues concerning verification when the running of routers is ++dependent on the sender. When Exim is verifying the address in an errors_to ++setting, it sets the sender to the null string. When using the -bt option to ++check a configuration file, it is necessary also to use the -f option to set an ++appropriate sender. For incoming mail, the sender is unset when verifying the ++sender, but is available when verifying any recipients. If the SMTP VRFY ++command is enabled, it must be used after MAIL if the sender address matters. ++ +++--------------------------------------------------------------+ ++|translate_ip_address|Use: routers|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++There exist some rare networking situations (for example, packet radio) where ++it is helpful to be able to translate IP addresses generated by normal routing ++mechanisms into other IP addresses, thus performing a kind of manual IP ++routing. This should be done only if the normal IP routing of the TCP/IP stack ++is inadequate or broken. Because this is an extremely uncommon requirement, the ++code to support this option is not included in the Exim binary unless ++SUPPORT_TRANSLATE_IP_ADDRESS=yes is set in Local/Makefile. ++ ++The translate_ip_address string is expanded for every IP address generated by ++the router, with the generated address set in $host_address. If the expansion ++is forced to fail, no action is taken. For any other expansion error, delivery ++of the message is deferred. If the result of the expansion is an IP address, ++that replaces the original address; otherwise the result is assumed to be a ++host name - this is looked up using gethostbyname() (or getipnodebyname() when ++available) to produce one or more replacement IP addresses. For example, to ++subvert all IP addresses in some specific networks, this could be added to a ++router: ++ ++translate_ip_address = \ ++ ${lookup{${mask:$host_address/26}}lsearch{/some/file}\ ++ {$value}fail}} ++ ++The file would contain lines like ++ ++10.2.3.128/26 some.host ++10.8.4.34/26 10.44.8.15 ++ ++You should not make use of this facility unless you really understand what you ++are doing. ++ +++---------------------------------------------------+ ++|transport|Use: routers|Type: string*|Default: unset| +++---------------------------------------------------+ ++ ++This option specifies the transport to be used when a router accepts an address ++and sets it up for delivery. A transport is never needed if a router is used ++only for verification. The value of the option is expanded at routing time, ++after the expansion of errors_to, headers_add, and headers_remove, and result ++must be the name of one of the configured transports. If it is not, delivery is ++deferred. ++ ++The transport option is not used by the redirect router, but it does have some ++private options that set up transports for pipe and file deliveries (see ++chapter 22). ++ +++---------------------------------------------------------------------+ ++|transport_current_directory|Use: routers|Type: string*|Default: unset| +++---------------------------------------------------------------------+ ++ ++This option associates a current directory with any address that is routed to a ++local transport. This can happen either because a transport is explicitly ++configured for the router, or because it generates a delivery to a file or a ++pipe. During the delivery process (that is, at transport time), this option ++string is expanded and is set as the current directory, unless overridden by a ++setting on the transport. If the expansion fails for any reason, including ++forced failure, an error is logged, and delivery is deferred. See chapter 23 ++for details of the local delivery environment. ++ +++----------------------------------------------------------------------+ ++|transport_home_directory|Use: routers|Type: string*|Default: see below| +++----------------------------------------------------------------------+ ++ ++This option associates a home directory with any address that is routed to a ++local transport. This can happen either because a transport is explicitly ++configured for the router, or because it generates a delivery to a file or a ++pipe. During the delivery process (that is, at transport time), the option ++string is expanded and is set as the home directory, unless overridden by a ++setting of home_directory on the transport. If the expansion fails for any ++reason, including forced failure, an error is logged, and delivery is deferred. ++ ++If the transport does not specify a home directory, and ++transport_home_directory is not set for the router, the home directory for the ++transport is taken from the password data if check_local_user is set for the ++router. Otherwise it is taken from router_home_directory if that option is set; ++if not, no home directory is set for the transport. ++ ++See chapter 23 for further details of the local delivery environment. ++ +++-------------------------------------------------+ ++|unseen|Use: routers|Type: boolean*|Default: false| +++-------------------------------------------------+ ++ ++The result of string expansion for this option must be a valid boolean value, ++that is, one of the strings "yes", "no", "true", or "false". Any other result ++causes an error, and delivery is deferred. If the expansion is forced to fail, ++the default value for the option (false) is used. Other failures cause delivery ++to be deferred. ++ ++When this option is set true, routing does not cease if the router accepts the ++address. Instead, a copy of the incoming address is passed to the next router, ++overriding a false setting of more. There is little point in setting more false ++if unseen is always true, but it may be useful in cases when the value of ++unseen contains expansion items (and therefore, presumably, is sometimes true ++and sometimes false). ++ ++Setting the unseen option has a similar effect to the unseen command qualifier ++in filter files. It can be used to cause copies of messages to be delivered to ++some other destination, while also carrying out a normal delivery. In effect, ++the current address is made into a "parent" that has two children - one that is ++delivered as specified by this router, and a clone that goes on to be routed ++further. For this reason, unseen may not be combined with the one_time option ++in a redirect router. ++ ++Warning: Header lines added to the address (or specified for removal) by this ++router or by previous routers affect the "unseen" copy of the message only. The ++clone that continues to be processed by further routers starts with no added ++headers and none specified for removal. For a redirect router, if a generated ++address is the same as the incoming address, this can lead to duplicate ++addresses with different header modifications. Exim does not do duplicate ++deliveries (except, in certain circumstances, to pipes -- see section 22.7), ++but it is undefined which of the duplicates is discarded, so this ambiguous ++situation should be avoided. The repeat_use option of the redirect router may ++be of help. ++ ++Unlike the handling of header modifications, any data that was set by the ++address_data option in the current or previous routers is passed on to ++subsequent routers. ++ +++--------------------------------------------------+ ++|user|Use: routers|Type: string*|Default: see below| +++--------------------------------------------------+ ++ ++When a router queues an address for a transport, and the transport does not ++specify a user, the user given here is used when running the delivery process. ++The user may be specified numerically or by name. If expansion fails, the error ++is logged and delivery is deferred. This user is also used by the redirect ++router when running a filter file. The default is unset, except when ++check_local_user is set. In this case, the default is taken from the password ++information. If the user is specified as a name, and group is not set, the ++group associated with the user is used. See also initgroups and group and the ++discussion in chapter 23. ++ +++-------------------------------------------------+ ++|verify|Use: routers**|Type: boolean|Default: true| +++-------------------------------------------------+ ++ ++Setting this option has the effect of setting verify_sender and ++verify_recipient to the same value. ++ +++-------------------------------------------------------+ ++|verify_only|Use: routers**|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++If this option is set, the router is used only when verifying an address, ++delivering in cutthrough mode or testing with the -bv option, not when actually ++doing a delivery, testing with the -bt option, or running the SMTP EXPN ++command. It can be further restricted to verifying only senders or recipients ++by means of verify_sender and verify_recipient. ++ ++Warning: When the router is being run to verify addresses for an incoming SMTP ++message, Exim is not running as root, but under its own uid. If the router ++accesses any files, you need to make sure that they are accessible to the Exim ++user or group. ++ +++-----------------------------------------------------------+ ++|verify_recipient|Use: routers**|Type: boolean|Default: true| +++-----------------------------------------------------------+ ++ ++If this option is false, the router is skipped when verifying recipient ++addresses, delivering in cutthrough mode or testing recipient verification ++using -bv. See section 3.12 for a list of the order in which preconditions are ++evaluated. ++ +++--------------------------------------------------------+ ++|verify_sender|Use: routers**|Type: boolean|Default: true| +++--------------------------------------------------------+ ++ ++If this option is false, the router is skipped when verifying sender addresses ++or testing sender verification using -bvs. See section 3.12 for a list of the ++order in which preconditions are evaluated. ++ ++ ++ ++=============================================================================== ++16. THE ACCEPT ROUTER ++ ++The accept router has no private options of its own. Unless it is being used ++purely for verification (see verify_only) a transport is required to be defined ++by the generic transport option. If the preconditions that are specified by ++generic options are met, the router accepts the address and queues it for the ++given transport. The most common use of this router is for setting up ++deliveries to local mailboxes. For example: ++ ++localusers: ++ driver = accept ++ domains = mydomain.example ++ check_local_user ++ transport = local_delivery ++ ++The domains condition in this example checks the domain of the address, and ++check_local_user checks that the local part is the login of a local user. When ++both preconditions are met, the accept router runs, and queues the address for ++the local_delivery transport. ++ ++ ++ ++=============================================================================== ++17. THE DNSLOOKUP ROUTER ++ ++The dnslookup router looks up the hosts that handle mail for the recipient's ++domain in the DNS. A transport must always be set for this router, unless ++verify_only is set. ++ ++If SRV support is configured (see check_srv below), Exim first searches for SRV ++records. If none are found, or if SRV support is not configured, MX records are ++looked up. If no MX records exist, address records are sought. However, ++mx_domains can be set to disable the direct use of address records. ++ ++MX records of equal priority are sorted by Exim into a random order. Exim then ++looks for address records for the host names obtained from MX or SRV records. ++When a host has more than one IP address, they are sorted into a random order, ++except that IPv6 addresses are always sorted before IPv4 addresses. If all the ++IP addresses found are discarded by a setting of the ignore_target_hosts ++generic option, the router declines. ++ ++Unless they have the highest priority (lowest MX value), MX records that point ++to the local host, or to any host name that matches hosts_treat_as_local, are ++discarded, together with any other MX records of equal or lower priority. ++ ++If the host pointed to by the highest priority MX record, or looked up as an ++address record, is the local host, or matches hosts_treat_as_local, what ++happens is controlled by the generic self option. ++ ++ ++17.1 Problems with DNS lookups ++------------------------------ ++ ++There have been problems with DNS servers when SRV records are looked up. Some ++mis-behaving servers return a DNS error or timeout when a non-existent SRV ++record is sought. Similar problems have in the past been reported for MX ++records. The global dns_again_means_nonexist option can help with this problem, ++but it is heavy-handed because it is a global option. ++ ++For this reason, there are two options, srv_fail_domains and mx_fail_domains, ++that control what happens when a DNS lookup in a dnslookup router results in a ++DNS failure or a "try again" response. If an attempt to look up an SRV or MX ++record causes one of these results, and the domain matches the relevant list, ++Exim behaves as if the DNS had responded "no such record". In the case of an ++SRV lookup, this means that the router proceeds to look for MX records; in the ++case of an MX lookup, it proceeds to look for A or AAAA records, unless the ++domain matches mx_domains, in which case routing fails. ++ ++ ++17.2 Declining addresses by dnslookup ++------------------------------------- ++ ++There are a few cases where a dnslookup router will decline to accept an ++address; if such a router is expected to handle "all remaining non-local ++domains", then it is important to set no_more. ++ ++Reasons for a dnslookup router to decline currently include: ++ ++ * The domain does not exist in DNS ++ ++ * The domain exists but the MX record's host part is just "."; this is a ++ common convention (borrowed from SRV) used to indicate that there is no ++ such service for this domain and to not fall back to trying A/AAAA records. ++ ++ * Ditto, but for SRV records, when check_srv is set on this router. ++ ++ * MX record points to a non-existent host. ++ ++ * MX record points to an IP address and the main section option ++ allow_mx_to_ip is not set. ++ ++ * MX records exist and point to valid hosts, but all hosts resolve only to ++ addresses blocked by the ignore_target_hosts generic option on this router. ++ ++ * The domain is not syntactically valid (see also allow_utf8_domains and ++ dns_check_names_pattern for handling one variant of this) ++ ++ * check_secondary_mx is set on this router but the local host can not be ++ found in the MX records (see below) ++ ++ ++17.3 Private options for dnslookup ++---------------------------------- ++ ++The private options for the dnslookup router are as follows: ++ +++--------------------------------------------------------------+ ++|check_secondary_mx|Use: dnslookup|Type: boolean|Default: false| +++--------------------------------------------------------------+ ++ ++If this option is set, the router declines unless the local host is found in ++(and removed from) the list of hosts obtained by MX lookup. This can be used to ++process domains for which the local host is a secondary mail exchanger ++differently to other domains. The way in which Exim decides whether a host is ++the local host is described in section 13.8. ++ +++-----------------------------------------------------+ ++|check_srv|Use: dnslookup|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++The dnslookup router supports the use of SRV records (see RFC 2782) in addition ++to MX and address records. The support is disabled by default. To enable SRV ++support, set the check_srv option to the name of the service required. For ++example, ++ ++check_srv = smtp ++ ++looks for SRV records that refer to the normal smtp service. The option is ++expanded, so the service name can vary from message to message or address to ++address. This might be helpful if SRV records are being used for a submission ++service. If the expansion is forced to fail, the check_srv option is ignored, ++and the router proceeds to look for MX records in the normal way. ++ ++When the expansion succeeds, the router searches first for SRV records for the ++given service (it assumes TCP protocol). A single SRV record with a host name ++that consists of just a single dot indicates "no such service for this domain"; ++if this is encountered, the router declines. If other kinds of SRV record are ++found, they are used to construct a host list for delivery according to the ++rules of RFC 2782. MX records are not sought in this case. ++ ++When no SRV records are found, MX records (and address records) are sought in ++the traditional way. In other words, SRV records take precedence over MX ++records, just as MX records take precedence over address records. Note that ++this behaviour is not sanctioned by RFC 2782, though a previous draft RFC ++defined it. It is apparently believed that MX records are sufficient for email ++and that SRV records should not be used for this purpose. However, SRV records ++have an additional "weight" feature which some people might find useful when ++trying to split an SMTP load between hosts of different power. ++ ++See section 17.1 above for a discussion of Exim's behaviour when there is a DNS ++lookup error. ++ +++-----------------------------------------------------------+ ++|mx_domains|Use: dnslookup|Type: domain list*|Default: unset| +++-----------------------------------------------------------+ ++ ++A domain that matches mx_domains is required to have either an MX or an SRV ++record in order to be recognized. (The name of this option could be improved.) ++For example, if all the mail hosts in fict.example are known to have MX ++records, except for those in discworld.fict.example, you could use this ++setting: ++ ++mx_domains = ! *.discworld.fict.example : *.fict.example ++ ++This specifies that messages addressed to a domain that matches the list but ++has no MX record should be bounced immediately instead of being routed using ++the address record. ++ +++----------------------------------------------------------------+ ++|mx_fail_domains|Use: dnslookup|Type: domain list*|Default: unset| +++----------------------------------------------------------------+ ++ ++If the DNS lookup for MX records for one of the domains in this list causes a ++DNS lookup error, Exim behaves as if no MX records were found. See section 17.1 ++for more discussion. ++ +++---------------------------------------------------------+ ++|qualify_single|Use: dnslookup|Type: boolean|Default: true| +++---------------------------------------------------------+ ++ ++When this option is true, the resolver option RES_DEFNAMES is set for DNS ++lookups. Typically, but not standardly, this causes the resolver to qualify ++single-component names with the default domain. For example, on a machine ++called dictionary.ref.example, the domain thesaurus would be changed to ++thesaurus.ref.example inside the resolver. For details of what your resolver ++actually does, consult your man pages for resolver and resolv.conf. ++ +++----------------------------------------------------------+ ++|rewrite_headers|Use: dnslookup|Type: boolean|Default: true| +++----------------------------------------------------------+ ++ ++If the domain name in the address that is being processed is not fully ++qualified, it may be expanded to its full form by a DNS lookup. For example, if ++an address is specified as dormouse@teaparty, the domain might be expanded to ++teaparty.wonderland.fict.example. Domain expansion can also occur as a result ++of setting the widen_domains option. If rewrite_headers is true, all ++occurrences of the abbreviated domain name in any Bcc:, Cc:, From:, Reply-to:, ++Sender:, and To: header lines of the message are rewritten with the full domain ++name. ++ ++This option should be turned off only when it is known that no message is ever ++going to be sent outside an environment where the abbreviation makes sense. ++ ++When an MX record is looked up in the DNS and matches a wildcard record, name ++servers normally return a record containing the name that has been looked up, ++making it impossible to detect whether a wildcard was present or not. However, ++some name servers have recently been seen to return the wildcard entry. If the ++name returned by a DNS lookup begins with an asterisk, it is not used for ++header rewriting. ++ +++--------------------------------------------------------------------+ ++|same_domain_copy_routing|Use: dnslookup|Type: boolean|Default: false| +++--------------------------------------------------------------------+ ++ ++Addresses with the same domain are normally routed by the dnslookup router to ++the same list of hosts. However, this cannot be presumed, because the router ++options and preconditions may refer to the local part of the address. By ++default, therefore, Exim routes each address in a message independently. DNS ++servers run caches, so repeated DNS lookups are not normally expensive, and in ++any case, personal messages rarely have more than a few recipients. ++ ++If you are running mailing lists with large numbers of subscribers at the same ++domain, and you are using a dnslookup router which is independent of the local ++part, you can set same_domain_copy_routing to bypass repeated DNS lookups for ++identical domains in one message. In this case, when dnslookup routes an ++address to a remote transport, any other unrouted addresses in the message that ++have the same domain are automatically given the same routing without ++processing them independently, provided the following conditions are met: ++ ++ * No router that processed the address specified headers_add or ++ headers_remove. ++ ++ * The router did not change the address in any way, for example, by ++ "widening" the domain. ++ +++----------------------------------------------------------+ ++|search_parents|Use: dnslookup|Type: boolean|Default: false| +++----------------------------------------------------------+ ++ ++When this option is true, the resolver option RES_DNSRCH is set for DNS ++lookups. This is different from the qualify_single option in that it applies to ++domains containing dots. Typically, but not standardly, it causes the resolver ++to search for the name in the current domain and in parent domains. For ++example, on a machine in the fict.example domain, if looking up ++teaparty.wonderland failed, the resolver would try ++teaparty.wonderland.fict.example. For details of what your resolver actually ++does, consult your man pages for resolver and resolv.conf. ++ ++Setting this option true can cause problems in domains that have a wildcard MX ++record, because any domain that does not have its own MX record matches the ++local wildcard. ++ +++-----------------------------------------------------------------+ ++|srv_fail_domains|Use: dnslookup|Type: domain list*|Default: unset| +++-----------------------------------------------------------------+ ++ ++If the DNS lookup for SRV records for one of the domains in this list causes a ++DNS lookup error, Exim behaves as if no SRV records were found. See section ++17.1 for more discussion. ++ +++-------------------------------------------------------------+ ++|widen_domains|Use: dnslookup|Type: string list|Default: unset| +++-------------------------------------------------------------+ ++ ++If a DNS lookup fails and this option is set, each of its strings in turn is ++added onto the end of the domain, and the lookup is tried again. For example, ++if ++ ++widen_domains = fict.example:ref.example ++ ++is set and a lookup of klingon.dictionary fails, ++klingon.dictionary.fict.example is looked up, and if this fails, ++klingon.dictionary.ref.example is tried. Note that the qualify_single and ++search_parents options can cause some widening to be undertaken inside the DNS ++resolver. widen_domains is not applied to sender addresses when verifying, ++unless rewrite_headers is false (not the default). ++ ++ ++17.4 Effect of qualify_single and search_parents ++------------------------------------------------ ++ ++When a domain from an envelope recipient is changed by the resolver as a result ++of the qualify_single or search_parents options, Exim rewrites the ++corresponding address in the message's header lines unless rewrite_headers is ++set false. Exim then re-routes the address, using the full domain. ++ ++These two options affect only the DNS lookup that takes place inside the router ++for the domain of the address that is being routed. They do not affect lookups ++such as that implied by ++ ++domains = @mx_any ++ ++that may happen while processing a router precondition before the router is ++entered. No widening ever takes place for these lookups. ++ ++ ++ ++=============================================================================== ++18. THE IPLITERAL ROUTER ++ ++This router has no private options. Unless it is being used purely for ++verification (see verify_only) a transport is required to be defined by the ++generic transport option. The router accepts the address if its domain part ++takes the form of an RFC 2822 domain literal. For example, the ipliteral router ++handles the address ++ ++root@[192.168.1.1] ++ ++by setting up delivery to the host with that IP address. IPv4 domain literals ++consist of an IPv4 address enclosed in square brackets. IPv6 domain literals ++are similar, but the address is preceded by "ipv6:". For example: ++ ++postmaster@[ipv6:fe80::a00:20ff:fe86:a061.5678] ++ ++Exim allows "ipv4:" before IPv4 addresses, for consistency, and on the grounds ++that sooner or later somebody will try it. ++ ++If the IP address matches something in ignore_target_hosts, the router ++declines. If an IP literal turns out to refer to the local host, the generic ++self option determines what happens. ++ ++The RFCs require support for domain literals; however, their use is ++controversial in today's Internet. If you want to use this router, you must ++also set the main configuration option allow_domain_literals. Otherwise, Exim ++will not recognize the domain literal syntax in addresses. ++ ++ ++ ++=============================================================================== ++19. THE IPLOOKUP ROUTER ++ ++The iplookup router was written to fulfil a specific requirement in Cambridge ++University (which in fact no longer exists). For this reason, it is not ++included in the binary of Exim by default. If you want to include it, you must ++set ++ ++ROUTER_IPLOOKUP=yes ++ ++in your Local/Makefile configuration file. ++ ++The iplookup router routes an address by sending it over a TCP or UDP ++connection to one or more specific hosts. The host can then return the same or ++a different address - in effect rewriting the recipient address in the ++message's envelope. The new address is then passed on to subsequent routers. If ++this process fails, the address can be passed on to other routers, or delivery ++can be deferred. Since iplookup is just a rewriting router, a transport must ++not be specified for it. ++ +++-----------------------------------------------+ ++|hosts|Use: iplookup|Type: string|Default: unset| +++-----------------------------------------------+ ++ ++This option must be supplied. Its value is a colon-separated list of host ++names. The hosts are looked up using gethostbyname() (or getipnodebyname() when ++available) and are tried in order until one responds to the query. If none ++respond, what happens is controlled by optional. ++ +++---------------------------------------------------+ ++|optional|Use: iplookup|Type: boolean|Default: false| +++---------------------------------------------------+ ++ ++If optional is true, if no response is obtained from any host, the address is ++passed to the next router, overriding no_more. If optional is false, delivery ++to the address is deferred. ++ +++-------------------------------------------+ ++|port|Use: iplookup|Type: integer|Default: 0| +++-------------------------------------------+ ++ ++This option must be supplied. It specifies the port number for the TCP or UDP ++call. ++ +++------------------------------------------------+ ++|protocol|Use: iplookup|Type: string|Default: udp| +++------------------------------------------------+ ++ ++This option can be set to "udp" or "tcp" to specify which of the two protocols ++is to be used. ++ +++----------------------------------------------------+ ++|query|Use: iplookup|Type: string*|Default: see below| +++----------------------------------------------------+ ++ ++This defines the content of the query that is sent to the remote hosts. The ++default value is: ++ ++$local_part@$domain $local_part@$domain ++ ++The repetition serves as a way of checking that a response is to the correct ++query in the default case (see response_pattern below). ++ +++--------------------------------------------------+ ++|reroute|Use: iplookup|Type: string*|Default: unset| +++--------------------------------------------------+ ++ ++If this option is not set, the rerouted address is precisely the byte string ++returned by the remote host, up to the first white space, if any. If set, the ++string is expanded to form the rerouted address. It can include parts matched ++in the response by response_pattern by means of numeric variables such as $1, ++$2, etc. The variable $0 refers to the entire input string, whether or not a ++pattern is in use. In all cases, the rerouted address must end up in the form ++local_part@domain. ++ +++----------------------------------------------------------+ ++|response_pattern|Use: iplookup|Type: string|Default: unset| +++----------------------------------------------------------+ ++ ++This option can be set to a regular expression that is applied to the string ++returned from the remote host. If the pattern does not match the response, the ++router declines. If response_pattern is not set, no checking of the response is ++done, unless the query was defaulted, in which case there is a check that the ++text returned after the first white space is the original address. This checks ++that the answer that has been received is in response to the correct question. ++For example, if the response is just a new domain, the following could be used: ++ ++response_pattern = ^([^@]+)$ ++reroute = $local_part@$1 ++ +++--------------------------------------------+ ++|timeout|Use: iplookup|Type: time|Default: 5s| +++--------------------------------------------+ ++ ++This specifies the amount of time to wait for a response from the remote ++machine. The same timeout is used for the connect() function for a TCP call. It ++does not apply to UDP. ++ ++ ++ ++=============================================================================== ++20. THE MANUALROUTE ROUTER ++ ++The manualroute router is so-called because it provides a way of manually ++routing an address according to its domain. It is mainly used when you want to ++route addresses to remote hosts according to your own rules, bypassing the ++normal DNS routing that looks up MX records. However, manualroute can also ++route to local transports, a facility that may be useful if you want to save ++messages for dial-in hosts in local files. ++ ++The manualroute router compares a list of domain patterns with the domain it is ++trying to route. If there is no match, the router declines. Each pattern has ++associated with it a list of hosts and some other optional data, which may ++include a transport. The combination of a pattern and its data is called a ++"routing rule". For patterns that do not have an associated transport, the ++generic transport option must specify a transport, unless the router is being ++used purely for verification (see verify_only). ++ ++In the case of verification, matching the domain pattern is sufficient for the ++router to accept the address. When actually routing an address for delivery, an ++address that matches a domain pattern is queued for the associated transport. ++If the transport is not a local one, a host list must be associated with the ++pattern; IP addresses are looked up for the hosts, and these are passed to the ++transport along with the mail address. For local transports, a host list is ++optional. If it is present, it is passed in $host as a single text string. ++ ++The list of routing rules can be provided as an inline string in route_list, or ++the data can be obtained by looking up the domain in a file or database by ++setting route_data. Only one of these settings may appear in any one instance ++of manualroute. The format of routing rules is described below, following the ++list of private options. ++ ++ ++20.1 Private options for manualroute ++------------------------------------ ++ ++The private options for the manualroute router are as follows: ++ +++-------------------------------------------------------------+ ++|host_all_ignored|Use: manualroute|Type: string|Default: defer| +++-------------------------------------------------------------+ ++ ++See host_find_failed. ++ +++--------------------------------------------------------------+ ++|host_find_failed|Use: manualroute|Type: string|Default: freeze| +++--------------------------------------------------------------+ ++ ++This option controls what happens when manualroute tries to find an IP address ++for a host, and the host does not exist. The option can be set to one of the ++following values: ++ ++decline ++defer ++fail ++freeze ++ignore ++pass ++ ++The default ("freeze") assumes that this state is a serious configuration ++error. The difference between "pass" and "decline" is that the former forces ++the address to be passed to the next router (or the router defined by ++pass_router), overriding no_more, whereas the latter passes the address to the ++next router only if more is true. ++ ++The value "ignore" causes Exim to completely ignore a host whose IP address ++cannot be found. If all the hosts in the list are ignored, the behaviour is ++controlled by the host_all_ignored option. This takes the same values as ++host_find_failed, except that it cannot be set to "ignore". ++ ++The host_find_failed option applies only to a definite "does not exist" state; ++if a host lookup gets a temporary error, delivery is deferred unless the ++generic pass_on_timeout option is set. ++ +++-------------------------------------------------------------+ ++|hosts_randomize|Use: manualroute|Type: boolean|Default: false| +++-------------------------------------------------------------+ ++ ++If this option is set, the order of the items in a host list in a routing rule ++is randomized each time the list is used, unless an option in the routing rule ++overrides (see below). Randomizing the order of a host list can be used to do ++crude load sharing. However, if more than one mail address is routed by the ++same router to the same host list, the host lists are considered to be the same ++(even though they may be randomized into different orders) for the purpose of ++deciding whether to batch the deliveries into a single SMTP transaction. ++ ++When hosts_randomize is true, a host list may be split into groups whose order ++is separately randomized. This makes it possible to set up MX-like behaviour. ++The boundaries between groups are indicated by an item that is just "+" in the ++host list. For example: ++ ++route_list = * host1:host2:host3:+:host4:host5 ++ ++The order of the first three hosts and the order of the last two hosts is ++randomized for each use, but the first three always end up before the last two. ++If hosts_randomize is not set, a "+" item in the list is ignored. If a ++randomized host list is passed to an smtp transport that also has ++hosts_randomize set, the list is not re-randomized. ++ +++--------------------------------------------------------+ ++|route_data|Use: manualroute|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++If this option is set, it must expand to yield the data part of a routing rule. ++Typically, the expansion string includes a lookup based on the domain. For ++example: ++ ++route_data = ${lookup{$domain}dbm{/etc/routes}} ++ ++If the expansion is forced to fail, or the result is an empty string, the ++router declines. Other kinds of expansion failure cause delivery to be ++deferred. ++ +++------------------------------------------------------------+ ++|route_list|Use: manualroute|Type: string list|Default: unset| +++------------------------------------------------------------+ ++ ++This string is a list of routing rules, in the form defined below. Note that, ++unlike most string lists, the items are separated by semicolons. This is so ++that they may contain colon-separated host lists. ++ +++----------------------------------------------------------------------+ ++|same_domain_copy_routing|Use: manualroute|Type: boolean|Default: false| +++----------------------------------------------------------------------+ ++ ++Addresses with the same domain are normally routed by the manualroute router to ++the same list of hosts. However, this cannot be presumed, because the router ++options and preconditions may refer to the local part of the address. By ++default, therefore, Exim routes each address in a message independently. DNS ++servers run caches, so repeated DNS lookups are not normally expensive, and in ++any case, personal messages rarely have more than a few recipients. ++ ++If you are running mailing lists with large numbers of subscribers at the same ++domain, and you are using a manualroute router which is independent of the ++local part, you can set same_domain_copy_routing to bypass repeated DNS lookups ++for identical domains in one message. In this case, when manualroute routes an ++address to a remote transport, any other unrouted addresses in the message that ++have the same domain are automatically given the same routing without ++processing them independently. However, this is only done if headers_add and ++headers_remove are unset. ++ ++ ++20.2 Routing rules in route_list ++-------------------------------- ++ ++The value of route_list is a string consisting of a sequence of routing rules, ++separated by semicolons. If a semicolon is needed in a rule, it can be entered ++as two semicolons. Alternatively, the list separator can be changed as ++described (for colon-separated lists) in section 6.19. Empty rules are ignored. ++The format of each rule is ++ ++<domain pattern> <list of hosts> <options> ++ ++The following example contains two rules, each with a simple domain pattern and ++no options: ++ ++route_list = \ ++ dict.ref.example mail-1.ref.example:mail-2.ref.example ; \ ++ thes.ref.example mail-3.ref.example:mail-4.ref.example ++ ++The three parts of a rule are separated by white space. The pattern and the ++list of hosts can be enclosed in quotes if necessary, and if they are, the ++usual quoting rules apply. Each rule in a route_list must start with a single ++domain pattern, which is the only mandatory item in the rule. The pattern is in ++the same format as one item in a domain list (see section 10.8), except that it ++may not be the name of an interpolated file. That is, it may be wildcarded, or ++a regular expression, or a file or database lookup (with semicolons doubled, ++because of the use of semicolon as a separator in a route_list). ++ ++The rules in route_list are searched in order until one of the patterns matches ++the domain that is being routed. The list of hosts and then options are then ++used as described below. If there is no match, the router declines. When ++route_list is set, route_data must not be set. ++ ++ ++20.3 Routing rules in route_data ++-------------------------------- ++ ++The use of route_list is convenient when there are only a small number of ++routing rules. For larger numbers, it is easier to use a file or database to ++hold the routing information, and use the route_data option instead. The value ++of route_data is a list of hosts, followed by (optional) options. Most ++commonly, route_data is set as a string that contains an expansion lookup. For ++example, suppose we place two routing rules in a file like this: ++ ++dict.ref.example: mail-1.ref.example:mail-2.ref.example ++thes.ref.example: mail-3.ref.example:mail-4.ref.example ++ ++This data can be accessed by setting ++ ++route_data = ${lookup{$domain}lsearch{/the/file/name}} ++ ++Failure of the lookup results in an empty string, causing the router to ++decline. However, you do not have to use a lookup in route_data. The only ++requirement is that the result of expanding the string is a list of hosts, ++possibly followed by options, separated by white space. The list of hosts must ++be enclosed in quotes if it contains white space. ++ ++ ++20.4 Format of the list of hosts ++-------------------------------- ++ ++A list of hosts, whether obtained via route_data or route_list, is always ++separately expanded before use. If the expansion fails, the router declines. ++The result of the expansion must be a colon-separated list of names and/or IP ++addresses, optionally also including ports. The format of each item in the list ++is described in the next section. The list separator can be changed as ++described in section 6.19. ++ ++If the list of hosts was obtained from a route_list item, the following ++variables are set during its expansion: ++ ++ * If the domain was matched against a regular expression, the numeric ++ variables $1, $2, etc. may be set. For example: ++ ++ route_list = ^domain(\d+) host-$1.text.example ++ ++ * $0 is always set to the entire domain. ++ ++ * $1 is also set when partial matching is done in a file lookup. ++ ++ * If the pattern that matched the domain was a lookup item, the data that was ++ looked up is available in the expansion variable $value. For example: ++ ++ route_list = lsearch;;/some/file.routes $value ++ ++Note the doubling of the semicolon in the pattern that is necessary because ++semicolon is the default route list separator. ++ ++ ++20.5 Format of one host item ++---------------------------- ++ ++Each item in the list of hosts is either a host name or an IP address, ++optionally with an attached port number. When no port is given, an IP address ++is not enclosed in brackets. When a port is specified, it overrides the port ++specification on the transport. The port is separated from the name or address ++by a colon. This leads to some complications: ++ ++ * Because colon is the default separator for the list of hosts, either the ++ colon that specifies a port must be doubled, or the list separator must be ++ changed. The following two examples have the same effect: ++ ++ route_list = * "host1.tld::1225 : host2.tld::1226" ++ route_list = * "<+ host1.tld:1225 + host2.tld:1226" ++ ++ * When IPv6 addresses are involved, it gets worse, because they contain ++ colons of their own. To make this case easier, it is permitted to enclose ++ an IP address (either v4 or v6) in square brackets if a port number ++ follows. For example: ++ ++ route_list = * "</ [10.1.1.1]:1225 / [::1]:1226" ++ ++ ++20.6 How the list of hosts is used ++---------------------------------- ++ ++When an address is routed to an smtp transport by manualroute, each of the ++hosts is tried, in the order specified, when carrying out the SMTP delivery. ++However, the order can be changed by setting the hosts_randomize option, either ++on the router (see section 20.1 above), or on the transport. ++ ++Hosts may be listed by name or by IP address. An unadorned name in the list of ++hosts is interpreted as a host name. A name that is followed by "/MX" is ++interpreted as an indirection to a sublist of hosts obtained by looking up MX ++records in the DNS. For example: ++ ++route_list = * x.y.z:p.q.r/MX:e.f.g ++ ++If this feature is used with a port specifier, the port must come last. For ++example: ++ ++route_list = * dom1.tld/mx::1225 ++ ++If the hosts_randomize option is set, the order of the items in the list is ++randomized before any lookups are done. Exim then scans the list; for any name ++that is not followed by "/MX" it looks up an IP address. If this turns out to ++be an interface on the local host and the item is not the first in the list, ++Exim discards it and any subsequent items. If it is the first item, what ++happens is controlled by the self option of the router. ++ ++A name on the list that is followed by "/MX" is replaced with the list of hosts ++obtained by looking up MX records for the name. This is always a DNS lookup; ++the bydns and byname options (see section 20.7 below) are not relevant here. ++The order of these hosts is determined by the preference values in the MX ++records, according to the usual rules. Because randomizing happens before the ++MX lookup, it does not affect the order that is defined by MX preferences. ++ ++If the local host is present in the sublist obtained from MX records, but is ++not the most preferred host in that list, it and any equally or less preferred ++hosts are removed before the sublist is inserted into the main list. ++ ++If the local host is the most preferred host in the MX list, what happens ++depends on where in the original list of hosts the "/MX" item appears. If it is ++not the first item (that is, there are previous hosts in the main list), Exim ++discards this name and any subsequent items in the main list. ++ ++If the MX item is first in the list of hosts, and the local host is the most ++preferred host, what happens is controlled by the self option of the router. ++ ++DNS failures when lookup up the MX records are treated in the same way as DNS ++failures when looking up IP addresses: pass_on_timeout and host_find_failed are ++used when relevant. ++ ++The generic ignore_target_hosts option applies to all hosts in the list, ++whether obtained from an MX lookup or not. ++ ++ ++20.7 How the options are used ++----------------------------- ++ ++The options are a sequence of words; in practice no more than three are ever ++present. One of the words can be the name of a transport; this overrides the ++transport option on the router for this particular routing rule only. The other ++words (if present) control randomization of the list of hosts on a per-rule ++basis, and how the IP addresses of the hosts are to be found when routing to a ++remote transport. These options are as follows: ++ ++ * randomize: randomize the order of the hosts in this list, overriding the ++ setting of hosts_randomize for this routing rule only. ++ ++ * no_randomize: do not randomize the order of the hosts in this list, ++ overriding the setting of hosts_randomize for this routing rule only. ++ ++ * byname: use getipnodebyname() (gethostbyname() on older systems) to find IP ++ addresses. This function may ultimately cause a DNS lookup, but it may also ++ look in /etc/hosts or other sources of information. ++ ++ * bydns: look up address records for the hosts directly in the DNS; fail if ++ no address records are found. If there is a temporary DNS error (such as a ++ timeout), delivery is deferred. ++ ++For example: ++ ++route_list = domain1 host1:host2:host3 randomize bydns;\ ++ domain2 host4:host5 ++ ++If neither byname nor bydns is given, Exim behaves as follows: First, a DNS ++lookup is done. If this yields anything other than HOST_NOT_FOUND, that result ++is used. Otherwise, Exim goes on to try a call to getipnodebyname() or ++gethostbyname(), and the result of the lookup is the result of that call. ++ ++Warning: It has been discovered that on some systems, if a DNS lookup called ++via getipnodebyname() times out, HOST_NOT_FOUND is returned instead of ++TRY_AGAIN. That is why the default action is to try a DNS lookup first. Only if ++that gives a definite "no such host" is the local function called. ++ ++If no IP address for a host can be found, what happens is controlled by the ++host_find_failed option. ++ ++When an address is routed to a local transport, IP addresses are not looked up. ++The host list is passed to the transport in the $host variable. ++ ++ ++20.8 Manualroute examples ++------------------------- ++ ++In some of the examples that follow, the presence of the remote_smtp transport, ++as defined in the default configuration file, is assumed: ++ ++ * The manualroute router can be used to forward all external mail to a smart ++ host. If you have set up, in the main part of the configuration, a named ++ domain list that contains your local domains, for example: ++ ++ domainlist local_domains = my.domain.example ++ ++ You can arrange for all other domains to be routed to a smart host by ++ making your first router something like this: ++ ++ smart_route: ++ driver = manualroute ++ domains = !+local_domains ++ transport = remote_smtp ++ route_list = * smarthost.ref.example ++ ++ This causes all non-local addresses to be sent to the single host ++ smarthost.ref.example. If a colon-separated list of smart hosts is given, ++ they are tried in order (but you can use hosts_randomize to vary the order ++ each time). Another way of configuring the same thing is this: ++ ++ smart_route: ++ driver = manualroute ++ transport = remote_smtp ++ route_list = !+local_domains smarthost.ref.example ++ ++ There is no difference in behaviour between these two routers as they ++ stand. However, they behave differently if no_more is added to them. In the ++ first example, the router is skipped if the domain does not match the ++ domains precondition; the following router is always tried. If the router ++ runs, it always matches the domain and so can never decline. Therefore, ++ no_more would have no effect. In the second case, the router is never ++ skipped; it always runs. However, if it doesn't match the domain, it ++ declines. In this case no_more would prevent subsequent routers from ++ running. ++ ++ * A mail hub is a host which receives mail for a number of domains via MX ++ records in the DNS and delivers it via its own private routing mechanism. ++ Often the final destinations are behind a firewall, with the mail hub being ++ the one machine that can connect to machines both inside and outside the ++ firewall. The manualroute router is usually used on a mail hub to route ++ incoming messages to the correct hosts. For a small number of domains, the ++ routing can be inline, using the route_list option, but for a larger number ++ a file or database lookup is easier to manage. ++ ++ If the domain names are in fact the names of the machines to which the mail ++ is to be sent by the mail hub, the configuration can be quite simple. For ++ example: ++ ++ hub_route: ++ driver = manualroute ++ transport = remote_smtp ++ route_list = *.rhodes.tvs.example $domain ++ ++ This configuration routes domains that match "*.rhodes.tvs.example" to ++ hosts whose names are the same as the mail domains. A similar approach can ++ be taken if the host name can be obtained from the domain name by a string ++ manipulation that the expansion facilities can handle. Otherwise, a lookup ++ based on the domain can be used to find the host: ++ ++ through_firewall: ++ driver = manualroute ++ transport = remote_smtp ++ route_data = ${lookup {$domain} cdb {/internal/host/routes}} ++ ++ The result of the lookup must be the name or IP address of the host (or ++ hosts) to which the address is to be routed. If the lookup fails, the route ++ data is empty, causing the router to decline. The address then passes to ++ the next router. ++ ++ * You can use manualroute to deliver messages to pipes or files in batched ++ SMTP format for onward transportation by some other means. This is one way ++ of storing mail for a dial-up host when it is not connected. The route list ++ entry can be as simple as a single domain name in a configuration like ++ this: ++ ++ save_in_file: ++ driver = manualroute ++ transport = batchsmtp_appendfile ++ route_list = saved.domain.example ++ ++ though often a pattern is used to pick up more than one domain. If there ++ are several domains or groups of domains with different transport ++ requirements, different transports can be listed in the routing ++ information: ++ ++ save_in_file: ++ driver = manualroute ++ route_list = \ ++ *.saved.domain1.example $domain batch_appendfile; \ ++ *.saved.domain2.example \ ++ ${lookup{$domain}dbm{/domain2/hosts}{$value}fail} \ ++ batch_pipe ++ ++ The first of these just passes the domain in the $host variable, which ++ doesn't achieve much (since it is also in $domain), but the second does a ++ file lookup to find a value to pass, causing the router to decline to ++ handle the address if the lookup fails. ++ ++ * Routing mail directly to UUCP software is a specific case of the use of ++ manualroute in a gateway to another mail environment. This is an example of ++ one way it can be done: ++ ++ # Transport ++ uucp: ++ driver = pipe ++ user = nobody ++ command = /usr/local/bin/uux -r - \ ++ ${substr_-5:$host}!rmail ${local_part} ++ return_fail_output = true ++ ++ # Router ++ uucphost: ++ transport = uucp ++ driver = manualroute ++ route_data = \ ++ ${lookup{$domain}lsearch{/usr/local/exim/uucphosts}} ++ ++ The file /usr/local/exim/uucphosts contains entries like ++ ++ darksite.ethereal.example: darksite.UUCP ++ ++ It can be set up more simply without adding and removing ".UUCP" but this ++ way makes clear the distinction between the domain name ++ darksite.ethereal.example and the UUCP host name darksite. ++ ++ ++ ++=============================================================================== ++21. THE QUERYPROGRAM ROUTER ++ ++The queryprogram router routes an address by running an external command and ++acting on its output. This is an expensive way to route, and is intended mainly ++for use in lightly-loaded systems, or for performing experiments. However, if ++it is possible to use the precondition options (domains, local_parts, etc) to ++skip this router for most addresses, it could sensibly be used in special ++cases, even on a busy host. There are the following private options: ++ +++------------------------------------------------------+ ++|command|Use: queryprogram|Type: string*|Default: unset| +++------------------------------------------------------+ ++ ++This option must be set. It specifies the command that is to be run. The ++command is split up into a command name and arguments, and then each is ++expanded separately (exactly as for a pipe transport, described in chapter 29). ++ +++-----------------------------------------------------------+ ++|command_group|Use: queryprogram|Type: string|Default: unset| +++-----------------------------------------------------------+ ++ ++This option specifies a gid to be set when running the command while routing an ++address for deliver. It must be set if command_user specifies a numerical uid. ++If it begins with a digit, it is interpreted as the numerical value of the gid. ++Otherwise it is looked up using getgrnam(). ++ +++----------------------------------------------------------+ ++|command_user|Use: queryprogram|Type: string|Default: unset| +++----------------------------------------------------------+ ++ ++This option must be set. It specifies the uid which is set when running the ++command while routing an address for delivery. If the value begins with a ++digit, it is interpreted as the numerical value of the uid. Otherwise, it is ++looked up using getpwnam() to obtain a value for the uid and, if command_group ++is not set, a value for the gid also. ++ ++Warning: Changing uid and gid is possible only when Exim is running as root, ++which it does during a normal delivery in a conventional configuration. ++However, when an address is being verified during message reception, Exim is ++usually running as the Exim user, not as root. If the queryprogram router is ++called from a non-root process, Exim cannot change uid or gid before running ++the command. In this circumstance the command runs under the current uid and ++gid. ++ +++-----------------------------------------------------------+ ++|current_directory|Use: queryprogram|Type: string|Default: /| +++-----------------------------------------------------------+ ++ ++This option specifies an absolute path which is made the current directory ++before running the command. ++ +++------------------------------------------------+ ++|timeout|Use: queryprogram|Type: time|Default: 1h| +++------------------------------------------------+ ++ ++If the command does not complete within the timeout period, its process group ++is killed and the message is frozen. A value of zero time specifies no timeout. ++ ++The standard output of the command is connected to a pipe, which is read when ++the command terminates. It should consist of a single line of output, ++containing up to five fields, separated by white space. The maximum length of ++the line is 1023 characters. Longer lines are silently truncated. The first ++field is one of the following words (case-insensitive): ++ ++ * Accept: routing succeeded; the remaining fields specify what to do (see ++ below). ++ ++ * Decline: the router declines; pass the address to the next router, unless ++ no_more is set. ++ ++ * Fail: routing failed; do not pass the address to any more routers. Any ++ subsequent text on the line is an error message. If the router is run as ++ part of address verification during an incoming SMTP message, the message ++ is included in the SMTP response. ++ ++ * Defer: routing could not be completed at this time; try again later. Any ++ subsequent text on the line is an error message which is logged. It is not ++ included in any SMTP response. ++ ++ * Freeze: the same as defer, except that the message is frozen. ++ ++ * Pass: pass the address to the next router (or the router specified by ++ pass_router), overriding no_more. ++ ++ * Redirect: the message is redirected. The remainder of the line is a list of ++ new addresses, which are routed independently, starting with the first ++ router, or the router specified by redirect_router, if set. ++ ++When the first word is accept, the remainder of the line consists of a number ++of keyed data values, as follows (split into two lines here, to fit on the ++page): ++ ++ACCEPT TRANSPORT=<transport> HOSTS=<list of hosts> ++LOOKUP=byname|bydns DATA=<text> ++ ++The data items can be given in any order, and all are optional. If no transport ++is included, the transport specified by the generic transport option is used. ++The list of hosts and the lookup type are needed only if the transport is an ++smtp transport that does not itself supply a list of hosts. ++ ++The format of the list of hosts is the same as for the manualroute router. As ++well as host names and IP addresses with optional port numbers, as described in ++section 20.5, it may contain names followed by "/MX" to specify sublists of ++hosts that are obtained by looking up MX records (see section 20.6). ++ ++If the lookup type is not specified, Exim behaves as follows when trying to ++find an IP address for each host: First, a DNS lookup is done. If this yields ++anything other than HOST_NOT_FOUND, that result is used. Otherwise, Exim goes ++on to try a call to getipnodebyname() or gethostbyname(), and the result of the ++lookup is the result of that call. ++ ++If the DATA field is set, its value is placed in the $address_data variable. ++For example, this return line ++ ++accept hosts=x1.y.example:x2.y.example data="rule1" ++ ++routes the address to the default transport, passing a list of two hosts. When ++the transport runs, the string "rule1" is in $address_data. ++ ++ ++ ++=============================================================================== ++22. THE REDIRECT ROUTER ++ ++The redirect router handles several kinds of address redirection. Its most ++common uses are for resolving local part aliases from a central alias file ++(usually called /etc/aliases) and for handling users' personal .forward files, ++but it has many other potential uses. The incoming address can be redirected in ++several different ways: ++ ++ * It can be replaced by one or more new addresses which are themselves routed ++ independently. ++ ++ * It can be routed to be delivered to a given file or directory. ++ ++ * It can be routed to be delivered to a specified pipe command. ++ ++ * It can cause an automatic reply to be generated. ++ ++ * It can be forced to fail, optionally with a custom error message. ++ ++ * It can be temporarily deferred, optionally with a custom message. ++ ++ * It can be discarded. ++ ++The generic transport option must not be set for redirect routers. However, ++there are some private options which define transports for delivery to files ++and pipes, and for generating autoreplies. See the file_transport, ++pipe_transport and reply_transport descriptions below. ++ ++ ++22.1 Redirection data ++--------------------- ++ ++The router operates by interpreting a text string which it obtains either by ++expanding the contents of the data option, or by reading the entire contents of ++a file whose name is given in the file option. These two options are mutually ++exclusive. The first is commonly used for handling system aliases, in a ++configuration like this: ++ ++system_aliases: ++ driver = redirect ++ data = ${lookup{$local_part}lsearch{/etc/aliases}} ++ ++If the lookup fails, the expanded string in this example is empty. When the ++expansion of data results in an empty string, the router declines. A forced ++expansion failure also causes the router to decline; other expansion failures ++cause delivery to be deferred. ++ ++A configuration using file is commonly used for handling users' .forward files, ++like this: ++ ++userforward: ++ driver = redirect ++ check_local_user ++ file = $home/.forward ++ no_verify ++ ++If the file does not exist, or causes no action to be taken (for example, it is ++empty or consists only of comments), the router declines. Warning: This is not ++the case when the file contains syntactically valid items that happen to yield ++empty addresses, for example, items containing only RFC 2822 address comments. ++ ++ ++22.2 Forward files and address verification ++------------------------------------------- ++ ++It is usual to set no_verify on redirect routers which handle users' .forward ++files, as in the example above. There are two reasons for this: ++ ++ * When Exim is receiving an incoming SMTP message from a remote host, it is ++ running under the Exim uid, not as root. Exim is unable to change uid to ++ read the file as the user, and it may not be able to read it as the Exim ++ user. So in practice the router may not be able to operate. ++ ++ * However, even when the router can operate, the existence of a .forward file ++ is unimportant when verifying an address. What should be checked is whether ++ the local part is a valid user name or not. Cutting out the redirection ++ processing saves some resources. ++ ++ ++22.3 Interpreting redirection data ++---------------------------------- ++ ++The contents of the data string, whether obtained from data or file, can be ++interpreted in two different ways: ++ ++ * If the allow_filter option is set true, and the data begins with the text " ++ #Exim filter" or "#Sieve filter", it is interpreted as a list of filtering ++ instructions in the form of an Exim or Sieve filter file, respectively. ++ Details of the syntax and semantics of filter files are described in a ++ separate document entitled Exim's interfaces to mail filtering; this ++ document is intended for use by end users. ++ ++ * Otherwise, the data must be a comma-separated list of redirection items, as ++ described in the next section. ++ ++When a message is redirected to a file (a "mail folder"), the file name given ++in a non-filter redirection list must always be an absolute path. A filter may ++generate a relative path - how this is handled depends on the transport's ++configuration. See section 26.1 for a discussion of this issue for the ++appendfile transport. ++ ++ ++22.4 Items in a non-filter redirection list ++------------------------------------------- ++ ++When the redirection data is not an Exim or Sieve filter, for example, if it ++comes from a conventional alias or forward file, it consists of a list of ++addresses, file names, pipe commands, or certain special items (see section ++22.6 below). The special items can be individually enabled or disabled by means ++of options whose names begin with allow_ or forbid_, depending on their default ++values. The items in the list are separated by commas or newlines. If a comma ++is required in an item, the entire item must be enclosed in double quotes. ++ ++Lines starting with a # character are comments, and are ignored, and # may also ++appear following a comma, in which case everything between the # and the next ++newline character is ignored. ++ ++If an item is entirely enclosed in double quotes, these are removed. Otherwise ++double quotes are retained because some forms of mail address require their use ++(but never to enclose the entire address). In the following description, "item" ++refers to what remains after any surrounding double quotes have been removed. ++ ++Warning: If you use an Exim expansion to construct a redirection address, and ++the expansion contains a reference to $local_part, you should make use of the ++quote_local_part expansion operator, in case the local part contains special ++characters. For example, to redirect all mail for the domain obsolete.example, ++retaining the existing local part, you could use this setting: ++ ++data = ${quote_local_part:$local_part}@newdomain.example ++ ++ ++22.5 Redirecting to a local mailbox ++----------------------------------- ++ ++A redirection item may safely be the same as the address currently under ++consideration. This does not cause a routing loop, because a router is ++automatically skipped if any ancestor of the address that is being processed is ++the same as the current address and was processed by the current router. Such ++an address is therefore passed to the following routers, so it is handled as if ++there were no redirection. When making this loop-avoidance test, the complete ++local part, including any prefix or suffix, is used. ++ ++Specifying the same local part without a domain is a common usage in personal ++filter files when the user wants to have messages delivered to the local ++mailbox and also forwarded elsewhere. For example, the user whose login is cleo ++might have a .forward file containing this: ++ ++cleo, cleopatra@egypt.example ++ ++For compatibility with other MTAs, such unqualified local parts may be preceded ++by "\", but this is not a requirement for loop prevention. However, it does ++make a difference if more than one domain is being handled synonymously. ++ ++If an item begins with "\" and the rest of the item parses as a valid RFC 2822 ++address that does not include a domain, the item is qualified using the domain ++of the incoming address. In the absence of a leading "\", unqualified addresses ++are qualified using the value in qualify_recipient, but you can force the ++incoming domain to be used by setting qualify_preserve_domain. ++ ++Care must be taken if there are alias names for local users. Consider an MTA ++handling a single local domain where the system alias file contains: ++ ++Sam.Reman: spqr ++ ++Now suppose that Sam (whose login id is spqr) wants to save copies of messages ++in the local mailbox, and also forward copies elsewhere. He creates this ++forward file: ++ ++Sam.Reman, spqr@reme.elsewhere.example ++ ++With these settings, an incoming message addressed to Sam.Reman fails. The ++redirect router for system aliases does not process Sam.Reman the second time ++round, because it has previously routed it, and the following routers ++presumably cannot handle the alias. The forward file should really contain ++ ++spqr, spqr@reme.elsewhere.example ++ ++but because this is such a common error, the check_ancestor option (see below) ++exists to provide a way to get round it. This is normally set on a redirect ++router that is handling users' .forward files. ++ ++ ++22.6 Special items in redirection lists ++--------------------------------------- ++ ++In addition to addresses, the following types of item may appear in redirection ++lists (that is, in non-filter redirection data): ++ ++ * An item is treated as a pipe command if it begins with "|" and does not ++ parse as a valid RFC 2822 address that includes a domain. A transport for ++ running the command must be specified by the pipe_transport option. ++ Normally, either the router or the transport specifies a user and a group ++ under which to run the delivery. The default is to use the Exim user and ++ group. ++ ++ Single or double quotes can be used for enclosing the individual arguments ++ of the pipe command; no interpretation of escapes is done for single ++ quotes. If the command contains a comma character, it is necessary to put ++ the whole item in double quotes, for example: ++ ++ "|/some/command ready,steady,go" ++ ++ since items in redirection lists are terminated by commas. Do not, however, ++ quote just the command. An item such as ++ ++ |"/some/command ready,steady,go" ++ ++ is interpreted as a pipe with a rather strange command name, and no ++ arguments. ++ ++ Note that the above example assumes that the text comes from a lookup ++ source of some sort, so that the quotes are part of the data. If composing ++ a redirect router with a data option directly specifying this command, the ++ quotes will be used by the configuration parser to define the extent of one ++ string, but will not be passed down into the redirect router itself. There ++ are two main approaches to get around this: escape quotes to be part of the ++ data itself, or avoid using this mechanism and instead create a custom ++ transport with the command option set and reference that transport from an ++ accept router. ++ ++ * An item is interpreted as a path name if it begins with "/" and does not ++ parse as a valid RFC 2822 address that includes a domain. For example, ++ ++ /home/world/minbari ++ ++ is treated as a file name, but ++ ++ /s=molari/o=babylon/@x400gate.way ++ ++ is treated as an address. For a file name, a transport must be specified ++ using the file_transport option. However, if the generated path name ends ++ with a forward slash character, it is interpreted as a directory name ++ rather than a file name, and directory_transport is used instead. ++ ++ Normally, either the router or the transport specifies a user and a group ++ under which to run the delivery. The default is to use the Exim user and ++ group. ++ ++ However, if a redirection item is the path /dev/null, delivery to it is ++ bypassed at a high level, and the log entry shows "**bypassed**" instead of ++ a transport name. In this case the user and group are not used. ++ ++ * If an item is of the form ++ ++ :include:<path name> ++ ++ a list of further items is taken from the given file and included at that ++ point. Note: Such a file can not be a filter file; it is just an ++ out-of-line addition to the list. The items in the included list are ++ separated by commas or newlines and are not subject to expansion. If this ++ is the first item in an alias list in an lsearch file, a colon must be used ++ to terminate the alias name. This example is incorrect: ++ ++ list1 :include:/opt/lists/list1 ++ ++ It must be given as ++ ++ list1: :include:/opt/lists/list1 ++ ++ * Sometimes you want to throw away mail to a particular local part. Making ++ the data option expand to an empty string does not work, because that ++ causes the router to decline. Instead, the alias item :blackhole: can be ++ used. It does what its name implies. No delivery is done, and no error ++ message is generated. This has the same effect as specifing /dev/null as a ++ destination, but it can be independently disabled. ++ ++ Warning: If :blackhole: appears anywhere in a redirection list, no delivery ++ is done for the original local part, even if other redirection items are ++ present. If you are generating a multi-item list (for example, by reading a ++ database) and need the ability to provide a no-op item, you must use /dev/ ++ null. ++ ++ * An attempt to deliver a particular address can be deferred or forced to ++ fail by redirection items of the form ++ ++ :defer: ++ :fail: ++ ++ respectively. When a redirection list contains such an item, it applies to ++ the entire redirection; any other items in the list are ignored. Any text ++ following :fail: or :defer: is placed in the error text associated with the ++ failure. For example, an alias file might contain: ++ ++ X.Employee: :fail: Gone away, no forwarding address ++ ++ In the case of an address that is being verified from an ACL or as the ++ subject of a VRFY command, the text is included in the SMTP error response ++ by default. The text is not included in the response to an EXPN command. In ++ non-SMTP cases the text is included in the error message that Exim ++ generates. ++ ++ By default, Exim sends a 451 SMTP code for a :defer:, and 550 for :fail:. ++ However, if the message starts with three digits followed by a space, ++ optionally followed by an extended code of the form n.n.n, also followed by ++ a space, and the very first digit is the same as the default error code, ++ the code from the message is used instead. If the very first digit is ++ incorrect, a panic error is logged, and the default code is used. You can ++ suppress the use of the supplied code in a redirect router by setting the ++ forbid_smtp_code option true. In this case, any SMTP code is quietly ++ ignored. ++ ++ In an ACL, an explicitly provided message overrides the default, but the ++ default message is available in the variable $acl_verify_message and can ++ therefore be included in a custom message if this is desired. ++ ++ Normally the error text is the rest of the redirection list - a comma does ++ not terminate it - but a newline does act as a terminator. Newlines are not ++ normally present in alias expansions. In lsearch lookups they are removed ++ as part of the continuation process, but they may exist in other kinds of ++ lookup and in :include: files. ++ ++ During routing for message delivery (as opposed to verification), a ++ redirection containing :fail: causes an immediate failure of the incoming ++ address, whereas :defer: causes the message to remain on the queue so that ++ a subsequent delivery attempt can happen at a later time. If an address is ++ deferred for too long, it will ultimately fail, because the normal retry ++ rules still apply. ++ ++ * Sometimes it is useful to use a single-key search type with a default (see ++ chapter 9) to look up aliases. However, there may be a need for exceptions ++ to the default. These can be handled by aliasing them to :unknown:. This ++ differs from :fail: in that it causes the redirect router to decline, ++ whereas :fail: forces routing to fail. A lookup which results in an empty ++ redirection list has the same effect. ++ ++ ++22.7 Duplicate addresses ++------------------------ ++ ++Exim removes duplicate addresses from the list to which it is delivering, so as ++to deliver just one copy to each address. This does not apply to deliveries ++routed to pipes by different immediate parent addresses, but an indirect ++aliasing scheme of the type ++ ++pipe: |/some/command $local_part ++localpart1: pipe ++localpart2: pipe ++ ++does not work with a message that is addressed to both local parts, because ++when the second is aliased to the intermediate local part "pipe" it gets ++discarded as being the same as a previously handled address. However, a scheme ++such as ++ ++localpart1: |/some/command $local_part ++localpart2: |/some/command $local_part ++ ++does result in two different pipe deliveries, because the immediate parents of ++the pipes are distinct. ++ ++ ++22.8 Repeated redirection expansion ++----------------------------------- ++ ++When a message cannot be delivered to all of its recipients immediately, ++leading to two or more delivery attempts, redirection expansion is carried out ++afresh each time for those addresses whose children were not all previously ++delivered. If redirection is being used as a mailing list, this can lead to new ++members of the list receiving copies of old messages. The one_time option can ++be used to avoid this. ++ ++ ++22.9 Errors in redirection lists ++-------------------------------- ++ ++If skip_syntax_errors is set, a malformed address that causes a parsing error ++is skipped, and an entry is written to the main log. This may be useful for ++mailing lists that are automatically managed. Otherwise, if an error is ++detected while generating the list of new addresses, the original address is ++deferred. See also syntax_errors_to. ++ ++ ++22.10 Private options for the redirect router ++--------------------------------------------- ++ ++The private options for the redirect router are as follows: ++ +++------------------------------------------------------+ ++|allow_defer|Use: redirect|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++Setting this option allows the use of :defer: in non-filter redirection data, ++or the defer command in an Exim filter file. ++ +++-----------------------------------------------------+ ++|allow_fail|Use: redirect|Type: boolean|Default: false| +++-----------------------------------------------------+ ++ ++If this option is true, the :fail: item can be used in a redirection list, and ++the fail command may be used in an Exim filter file. ++ +++-------------------------------------------------------+ ++|allow_filter|Use: redirect|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++Setting this option allows Exim to interpret redirection data that starts with ++"#Exim filter" or "#Sieve filter" as a set of filtering instructions. There are ++some features of Exim filter files that some administrators may wish to lock ++out; see the forbid_filter_xxx options below. ++ ++It is also possible to lock out Exim filters or Sieve filters while allowing ++the other type; see forbid_exim_filter and forbid_sieve_filter. ++ ++The filter is run using the uid and gid set by the generic user and group ++options. These take their defaults from the password data if check_local_user ++is set, so in the normal case of users' personal filter files, the filter is ++run as the relevant user. When allow_filter is set true, Exim insists that ++either check_local_user or user is set. ++ +++-------------------------------------------------------+ ++|allow_freeze|Use: redirect|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++Setting this option allows the use of the freeze command in an Exim filter. ++This command is more normally encountered in system filters, and is disabled by ++default for redirection filters because it isn't something you usually want to ++let ordinary users do. ++ +++---------------------------------------------------------+ ++|check_ancestor|Use: redirect|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++This option is concerned with handling generated addresses that are the same as ++some address in the list of redirection ancestors of the current address. ++Although it is turned off by default in the code, it is set in the default ++configuration file for handling users' .forward files. It is recommended for ++this use of the redirect router. ++ ++When check_ancestor is set, if a generated address (including the domain) is ++the same as any ancestor of the current address, it is replaced by a copy of ++the current address. This helps in the case where local part A is aliased to B, ++and B has a .forward file pointing back to A. For example, within a single ++domain, the local part "Joe.Bloggs" is aliased to "jb" and jb/.forward ++contains: ++ ++\Joe.Bloggs, <other item(s)> ++ ++Without the check_ancestor setting, either local part ("jb" or "joe.bloggs") ++gets processed once by each router and so ends up as it was originally. If "jb" ++is the real mailbox name, mail to "jb" gets delivered (having been turned into ++"joe.bloggs" by the .forward file and back to "jb" by the alias), but mail to ++"joe.bloggs" fails. Setting check_ancestor on the redirect router that handles ++the .forward file prevents it from turning "jb" back into "joe.bloggs" when ++that was the original address. See also the repeat_use option below. ++ +++----------------------------------------------------------+ ++|check_group|Use: redirect|Type: boolean|Default: see below| +++----------------------------------------------------------+ ++ ++When the file option is used, the group owner of the file is checked only when ++this option is set. The permitted groups are those listed in the owngroups ++option, together with the user's default group if check_local_user is set. If ++the file has the wrong group, routing is deferred. The default setting for this ++option is true if check_local_user is set and the modemask option permits the ++group write bit, or if the owngroups option is set. Otherwise it is false, and ++no group check occurs. ++ +++----------------------------------------------------------+ ++|check_owner|Use: redirect|Type: boolean|Default: see below| +++----------------------------------------------------------+ ++ ++When the file option is used, the owner of the file is checked only when this ++option is set. If check_local_user is set, the local user is permitted; ++otherwise the owner must be one of those listed in the owners option. The ++default value for this option is true if check_local_user or owners is set. ++Otherwise the default is false, and no owner check occurs. ++ +++-----------------------------------------------+ ++|data|Use: redirect|Type: string*|Default: unset| +++-----------------------------------------------+ ++ ++This option is mutually exclusive with file. One or other of them must be set, ++but not both. The contents of data are expanded, and then used as the list of ++forwarding items, or as a set of filtering instructions. If the expansion is ++forced to fail, or the result is an empty string or a string that has no effect ++(consists entirely of comments), the router declines. ++ ++When filtering instructions are used, the string must begin with "#Exim ++filter", and all comments in the string, including this initial one, must be ++terminated with newline characters. For example: ++ ++data = #Exim filter\n\ ++ if $h_to: contains Exim then save $home/mail/exim endif ++ ++If you are reading the data from a database where newlines cannot be included, ++you can use the ${sg} expansion item to turn the escape string of your choice ++into a newline. ++ +++--------------------------------------------------------------+ ++|directory_transport|Use: redirect|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++A redirect router sets up a direct delivery to a directory when a path name ++ending with a slash is specified as a new "address". The transport used is ++specified by this option, which, after expansion, must be the name of a ++configured transport. This should normally be an appendfile transport. ++ +++-----------------------------------------------+ ++|file|Use: redirect|Type: string*|Default: unset| +++-----------------------------------------------+ ++ ++This option specifies the name of a file that contains the redirection data. It ++is mutually exclusive with the data option. The string is expanded before use; ++if the expansion is forced to fail, the router declines. Other expansion ++failures cause delivery to be deferred. The result of a successful expansion ++must be an absolute path. The entire file is read and used as the redirection ++data. If the data is an empty string or a string that has no effect (consists ++entirely of comments), the router declines. ++ ++If the attempt to open the file fails with a "does not exist" error, Exim runs ++a check on the containing directory, unless ignore_enotdir is true (see below). ++If the directory does not appear to exist, delivery is deferred. This can ++happen when users' .forward files are in NFS-mounted directories, and there is ++a mount problem. If the containing directory does exist, but the file does not, ++the router declines. ++ +++---------------------------------------------------------+ ++|file_transport|Use: redirect|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++A redirect router sets up a direct delivery to a file when a path name not ++ending in a slash is specified as a new "address". The transport used is ++specified by this option, which, after expansion, must be the name of a ++configured transport. This should normally be an appendfile transport. When it ++is running, the file name is in $address_file. ++ +++-------------------------------------------------------------+ ++|filter_prepend_home|Use: redirect|Type: boolean|Default: true| +++-------------------------------------------------------------+ ++ ++When this option is true, if a save command in an Exim filter specifies a ++relative path, and $home is defined, it is automatically prepended to the ++relative path. If this option is set false, this action does not happen. The ++relative path is then passed to the transport unmodified. ++ +++-----------------------------------------------------------+ ++|forbid_blackhole|Use: redirect|Type: boolean|Default: false| +++-----------------------------------------------------------+ ++ ++If this option is true, the :blackhole: item may not appear in a redirection ++list. ++ +++-------------------------------------------------------------+ ++|forbid_exim_filter|Use: redirect|Type: boolean|Default: false| +++-------------------------------------------------------------+ ++ ++If this option is set true, only Sieve filters are permitted when allow_filter ++is true. ++ +++------------------------------------------------------+ ++|forbid_file|Use: redirect|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++If this option is true, this router may not generate a new address that ++specifies delivery to a local file or directory, either from a filter or from a ++conventional forward file. This option is forced to be true if one_time is set. ++It applies to Sieve filters as well as to Exim filters, but if true, it locks ++out the Sieve's "keep" facility. ++ +++---------------------------------------------------------------+ ++|forbid_filter_dlfunc|Use: redirect|Type: boolean|Default: false| +++---------------------------------------------------------------+ ++ ++If this option is true, string expansions in Exim filters are not allowed to ++make use of the dlfunc expansion facility to run dynamically loaded functions. ++ +++-------------------------------------------------------------------+ ++|forbid_filter_existstest|Use: redirect|Type: boolean|Default: false| +++-------------------------------------------------------------------+ ++ ++If this option is true, string expansions in Exim filters are not allowed to ++make use of the exists condition or the stat expansion item. ++ +++-----------------------------------------------------------------+ ++|forbid_filter_logwrite|Use: redirect|Type: boolean|Default: false| +++-----------------------------------------------------------------+ ++ ++If this option is true, use of the logging facility in Exim filters is not ++permitted. Logging is in any case available only if the filter is being run ++under some unprivileged uid (which is normally the case for ordinary users' ++.forward files). ++ +++---------------------------------------------------------------+ ++|forbid_filter_lookup|Use: redirect|Type: boolean|Default: false| +++---------------------------------------------------------------+ ++ ++If this option is true, string expansions in Exim filter files are not allowed ++to make use of lookup items. ++ +++-------------------------------------------------------------+ ++|forbid_filter_perl|Use: redirect|Type: boolean|Default: false| +++-------------------------------------------------------------+ ++ ++This option has an effect only if Exim is built with embedded Perl support. If ++it is true, string expansions in Exim filter files are not allowed to make use ++of the embedded Perl support. ++ +++-----------------------------------------------------------------+ ++|forbid_filter_readfile|Use: redirect|Type: boolean|Default: false| +++-----------------------------------------------------------------+ ++ ++If this option is true, string expansions in Exim filter files are not allowed ++to make use of readfile items. ++ +++-------------------------------------------------------------------+ ++|forbid_filter_readsocket|Use: redirect|Type: boolean|Default: false| +++-------------------------------------------------------------------+ ++ ++If this option is true, string expansions in Exim filter files are not allowed ++to make use of readsocket items. ++ +++--------------------------------------------------------------+ ++|forbid_filter_reply|Use: redirect|Type: boolean|Default: false| +++--------------------------------------------------------------+ ++ ++If this option is true, this router may not generate an automatic reply ++message. Automatic replies can be generated only from Exim or Sieve filter ++files, not from traditional forward files. This option is forced to be true if ++one_time is set. ++ +++------------------------------------------------------------+ ++|forbid_filter_run|Use: redirect|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is true, string expansions in Exim filter files are not allowed ++to make use of run items. ++ +++---------------------------------------------------------+ ++|forbid_include|Use: redirect|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is true, items of the form ++ ++:include:<path name> ++ ++are not permitted in non-filter redirection lists. ++ +++------------------------------------------------------+ ++|forbid_pipe|Use: redirect|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++If this option is true, this router may not generate a new address which ++specifies delivery to a pipe, either from an Exim filter or from a conventional ++forward file. This option is forced to be true if one_time is set. ++ +++--------------------------------------------------------------+ ++|forbid_sieve_filter|Use: redirect|Type: boolean|Default: false| +++--------------------------------------------------------------+ ++ ++If this option is set true, only Exim filters are permitted when allow_filter ++is true. ++ +++-----------------------------------------------------------+ ++|forbid_smtp_code|Use: redirect|Type: boolean|Default: false| +++-----------------------------------------------------------+ ++ ++If this option is set true, any SMTP error codes that are present at the start ++of messages specified for ":defer:" or ":fail:" are quietly ignored, and the ++default codes (451 and 550, respectively) are always used. ++ +++---------------------------------------------------------------+ ++|hide_child_in_errmsg|Use: redirect|Type: boolean|Default: false| +++---------------------------------------------------------------+ ++ ++If this option is true, it prevents Exim from quoting a child address if it ++generates a bounce or delay message for it. Instead it says "an address ++generated from <the top level address>". Of course, this applies only to ++bounces generated locally. If a message is forwarded to another host, its ++bounce may well quote the generated address. ++ +++--------------------------------------------------------+ ++|ignore_eacces|Use: redirect|Type: boolean|Default: false| +++--------------------------------------------------------+ ++ ++If this option is set and an attempt to open a redirection file yields the ++EACCES error (permission denied), the redirect router behaves as if the file ++did not exist. ++ +++---------------------------------------------------------+ ++|ignore_enotdir|Use: redirect|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is set and an attempt to open a redirection file yields the ++ENOTDIR error (something on the path is not a directory), the redirect router ++behaves as if the file did not exist. ++ ++Setting ignore_enotdir has another effect as well: When a redirect router that ++has the file option set discovers that the file does not exist (the ENOENT ++error), it tries to stat() the parent directory, as a check against unmounted ++NFS directories. If the parent can not be statted, delivery is deferred. ++However, it seems wrong to do this check when ignore_enotdir is set, because ++that option tells Exim to ignore "something on the path is not a directory" ++(the ENOTDIR error). This is a confusing area, because it seems that some ++operating systems give ENOENT where others give ENOTDIR. ++ +++-----------------------------------------------------------+ ++|include_directory|Use: redirect|Type: string|Default: unset| +++-----------------------------------------------------------+ ++ ++If this option is set, the path names of any :include: items in a redirection ++list must start with this directory. ++ +++-------------------------------------------------------+ ++|modemask|Use: redirect|Type: octal integer|Default: 022| +++-------------------------------------------------------+ ++ ++This specifies mode bits which must not be set for a file specified by the file ++option. If any of the forbidden bits are set, delivery is deferred. ++ +++---------------------------------------------------+ ++|one_time|Use: redirect|Type: boolean|Default: false| +++---------------------------------------------------+ ++ ++Sometimes the fact that Exim re-evaluates aliases and reprocesses redirection ++files each time it tries to deliver a message causes a problem when one or more ++of the generated addresses fails be delivered at the first attempt. The problem ++is not one of duplicate delivery - Exim is clever enough to handle that - but ++of what happens when the redirection list changes during the time that the ++message is on Exim's queue. This is particularly true in the case of mailing ++lists, where new subscribers might receive copies of messages that were posted ++before they subscribed. ++ ++If one_time is set and any addresses generated by the router fail to deliver at ++the first attempt, the failing addresses are added to the message as "top ++level" addresses, and the parent address that generated them is marked ++"delivered". Thus, redirection does not happen again at the next delivery ++attempt. ++ ++Warning 1: Any header line addition or removal that is specified by this router ++would be lost if delivery did not succeed at the first attempt. For this ++reason, the headers_add and headers_remove generic options are not permitted ++when one_time is set. ++ ++Warning 2: To ensure that the router generates only addresses (as opposed to ++pipe or file deliveries or auto-replies) forbid_file, forbid_pipe, and ++forbid_filter_reply are forced to be true when one_time is set. ++ ++Warning 3: The unseen generic router option may not be set with one_time. ++ ++The original top-level address is remembered with each of the generated ++addresses, and is output in any log messages. However, any intermediate parent ++addresses are not recorded. This makes a difference to the log only if ++all_parents log selector is set. It is expected that one_time will typically be ++used for mailing lists, where there is normally just one level of expansion. ++ +++-----------------------------------------------------+ ++|owners|Use: redirect|Type: string list|Default: unset| +++-----------------------------------------------------+ ++ ++This specifies a list of permitted owners for the file specified by file. This ++list is in addition to the local user when check_local_user is set. See ++check_owner above. ++ +++--------------------------------------------------------+ ++|owngroups|Use: redirect|Type: string list|Default: unset| +++--------------------------------------------------------+ ++ ++This specifies a list of permitted groups for the file specified by file. The ++list is in addition to the local user's primary group when check_local_user is ++set. See check_group above. ++ +++---------------------------------------------------------+ ++|pipe_transport|Use: redirect|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++A redirect router sets up a direct delivery to a pipe when a string starting ++with a vertical bar character is specified as a new "address". The transport ++used is specified by this option, which, after expansion, must be the name of a ++configured transport. This should normally be a pipe transport. When the ++transport is run, the pipe command is in $address_pipe. ++ +++---------------------------------------------------------+ ++|qualify_domain|Use: redirect|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++If this option is set, and an unqualified address (one without a domain) is ++generated, and that address would normally be qualified by the global setting ++in qualify_recipient, it is instead qualified with the domain specified by ++expanding this string. If the expansion fails, the router declines. If you want ++to revert to the default, you can have the expansion generate ++$qualify_recipient. ++ ++This option applies to all unqualified addresses generated by Exim filters, but ++for traditional .forward files, it applies only to addresses that are not ++preceded by a backslash. Sieve filters cannot generate unqualified addresses. ++ +++------------------------------------------------------------------+ ++|qualify_preserve_domain|Use: redirect|Type: boolean|Default: false| +++------------------------------------------------------------------+ ++ ++If this option is set, the router's local qualify_domain option must not be set ++(a configuration error occurs if it is). If an unqualified address (one without ++a domain) is generated, it is qualified with the domain of the parent address ++(the immediately preceding ancestor) instead of the global qualify_recipient ++value. In the case of a traditional .forward file, this applies whether or not ++the address is preceded by a backslash. ++ +++----------------------------------------------------+ ++|repeat_use|Use: redirect|Type: boolean|Default: true| +++----------------------------------------------------+ ++ ++If this option is set false, the router is skipped for a child address that has ++any ancestor that was routed by this router. This test happens before any of ++the other preconditions are tested. Exim's default anti-looping rules skip only ++when the ancestor is the same as the current address. See also check_ancestor ++above and the generic redirect_router option. ++ +++----------------------------------------------------------+ ++|reply_transport|Use: redirect|Type: string*|Default: unset| +++----------------------------------------------------------+ ++ ++A redirect router sets up an automatic reply when a mail or vacation command is ++used in a filter file. The transport used is specified by this option, which, ++after expansion, must be the name of a configured transport. This should ++normally be an autoreply transport. Other transports are unlikely to do ++anything sensible or useful. ++ +++-------------------------------------------------+ ++|rewrite|Use: redirect|Type: boolean|Default: true| +++-------------------------------------------------+ ++ ++If this option is set false, addresses generated by the router are not subject ++to address rewriting. Otherwise, they are treated like new addresses and are ++rewritten according to the global rewriting rules. ++ +++-----------------------------------------------------------+ ++|sieve_subaddress|Use: redirect|Type: string*|Default: unset| +++-----------------------------------------------------------+ ++ ++The value of this option is passed to a Sieve filter to specify the :subaddress ++part of an address. ++ +++------------------------------------------------------------+ ++|sieve_useraddress|Use: redirect|Type: string*|Default: unset| +++------------------------------------------------------------+ ++ ++The value of this option is passed to a Sieve filter to specify the :user part ++of an address. However, if it is unset, the entire original local part ++(including any prefix or suffix) is used for :user. ++ +++-------------------------------------------------------------------+ ++|sieve_vacation_directory|Use: redirect|Type: string*|Default: unset| +++-------------------------------------------------------------------+ ++ ++To enable the "vacation" extension for Sieve filters, you must set ++sieve_vacation_directory to the directory where vacation databases are held (do ++not put anything else in that directory), and ensure that the reply_transport ++option refers to an autoreply transport. Each user needs their own directory; ++Exim will create it if necessary. ++ +++-------------------------------------------------------------+ ++|skip_syntax_errors|Use: redirect|Type: boolean|Default: false| +++-------------------------------------------------------------+ ++ ++If skip_syntax_errors is set, syntactically malformed addresses in non-filter ++redirection data are skipped, and each failing address is logged. If ++syntax_errors_to is set, a message is sent to the address it defines, giving ++details of the failures. If syntax_errors_text is set, its contents are ++expanded and placed at the head of the error message generated by ++syntax_errors_to. Usually it is appropriate to set syntax_errors_to to be the ++same address as the generic errors_to option. The skip_syntax_errors option is ++often used when handling mailing lists. ++ ++If all the addresses in a redirection list are skipped because of syntax ++errors, the router declines to handle the original address, and it is passed to ++the following routers. ++ ++If skip_syntax_errors is set when an Exim filter is interpreted, any syntax ++error in the filter causes filtering to be abandoned without any action being ++taken. The incident is logged, and the router declines to handle the address, ++so it is passed to the following routers. ++ ++Syntax errors in a Sieve filter file cause the "keep" action to occur. This ++action is specified by RFC 3028. The values of skip_syntax_errors, ++syntax_errors_to, and syntax_errors_text are not used. ++ ++skip_syntax_errors can be used to specify that errors in users' forward lists ++or filter files should not prevent delivery. The syntax_errors_to option, used ++with an address that does not get redirected, can be used to notify users of ++these errors, by means of a router like this: ++ ++userforward: ++ driver = redirect ++ allow_filter ++ check_local_user ++ file = $home/.forward ++ file_transport = address_file ++ pipe_transport = address_pipe ++ reply_transport = address_reply ++ no_verify ++ skip_syntax_errors ++ syntax_errors_to = real-$local_part@$domain ++ syntax_errors_text = \ ++ This is an automatically generated message. An error has\n\ ++ been found in your .forward file. Details of the error are\n\ ++ reported below. While this error persists, you will receive\n\ ++ a copy of this message for every message that is addressed\n\ ++ to you. If your .forward file is a filter file, or if it is\n\ ++ a non-filter file containing no valid forwarding addresses,\n\ ++ a copy of each incoming message will be put in your normal\n\ ++ mailbox. If a non-filter file contains at least one valid\n\ ++ forwarding address, forwarding to the valid addresses will\n\ ++ happen, and those will be the only deliveries that occur. ++ ++You also need a router to ensure that local addresses that are prefixed by ++"real-" are recognized, but not forwarded or filtered. For example, you could ++put this immediately before the userforward router: ++ ++real_localuser: ++ driver = accept ++ check_local_user ++ local_part_prefix = real- ++ transport = local_delivery ++ ++For security, it would probably be a good idea to restrict the use of this ++router to locally-generated messages, using a condition such as this: ++ ++ condition = ${if match {$sender_host_address}\ ++ {\N^(|127\.0\.0\.1)$\N}} ++ +++-------------------------------------------------------------+ ++|syntax_errors_text|Use: redirect|Type: string*|Default: unset| +++-------------------------------------------------------------+ ++ ++See skip_syntax_errors above. ++ +++----------------------------------------------------------+ ++|syntax_errors_to|Use: redirect|Type: string|Default: unset| +++----------------------------------------------------------+ ++ ++See skip_syntax_errors above. ++ ++ ++ ++=============================================================================== ++23. ENVIRONMENT FOR RUNNING LOCAL TRANSPORTS ++ ++Local transports handle deliveries to files and pipes. (The autoreply transport ++can be thought of as similar to a pipe.) Exim always runs transports in ++subprocesses, under specified uids and gids. Typical deliveries to local ++mailboxes run under the uid and gid of the local user. ++ ++Exim also sets a specific current directory while running the transport; for ++some transports a home directory setting is also relevant. The pipe transport ++is the only one that sets up environment variables; see section 29.4 for ++details. ++ ++The values used for the uid, gid, and the directories may come from several ++different places. In many cases, the router that handles the address associates ++settings with that address as a result of its check_local_user, group, or user ++options. However, values may also be given in the transport's own ++configuration, and these override anything that comes from the router. ++ ++ ++23.1 Concurrent deliveries ++-------------------------- ++ ++If two different messages for the same local recipient arrive more or less ++simultaneously, the two delivery processes are likely to run concurrently. When ++the appendfile transport is used to write to a file, Exim applies locking rules ++to stop concurrent processes from writing to the same file at the same time. ++ ++However, when you use a pipe transport, it is up to you to arrange any locking ++that is needed. Here is a silly example: ++ ++my_transport: ++ driver = pipe ++ command = /bin/sh -c 'cat >>/some/file' ++ ++This is supposed to write the message at the end of the file. However, if two ++messages arrive at the same time, the file will be scrambled. You can use the ++exim_lock utility program (see section 52.15) to lock a file using the same ++algorithm that Exim itself uses. ++ ++ ++23.2 Uids and gids ++------------------ ++ ++All transports have the options group and user. If group is set, it overrides ++any group that the router set in the address, even if user is not set for the ++transport. This makes it possible, for example, to run local mail delivery ++under the uid of the recipient (set by the router), but in a special group (set ++by the transport). For example: ++ ++# Routers ... ++# User/group are set by check_local_user in this router ++local_users: ++ driver = accept ++ check_local_user ++ transport = group_delivery ++ ++# Transports ... ++# This transport overrides the group ++group_delivery: ++ driver = appendfile ++ file = /var/spool/mail/$local_part ++ group = mail ++ ++If user is set for a transport, its value overrides what is set in the address ++by the router. If user is non-numeric and group is not set, the gid associated ++with the user is used. If user is numeric, group must be set. ++ ++When the uid is taken from the transport's configuration, the initgroups() ++function is called for the groups associated with that uid if the initgroups ++option is set for the transport. When the uid is not specified by the ++transport, but is associated with the address by a router, the option for ++calling initgroups() is taken from the router configuration. ++ ++The pipe transport contains the special option pipe_as_creator. If this is set ++and user is not set, the uid of the process that called Exim to receive the ++message is used, and if group is not set, the corresponding original gid is ++also used. ++ ++This is the detailed preference order for obtaining a gid; the first of the ++following that is set is used: ++ ++ * A group setting of the transport; ++ ++ * A group setting of the router; ++ ++ * A gid associated with a user setting of the router, either as a result of ++ check_local_user or an explicit non-numeric user setting; ++ ++ * The group associated with a non-numeric user setting of the transport; ++ ++ * In a pipe transport, the creator's gid if deliver_as_creator is set and the ++ uid is the creator's uid; ++ ++ * The Exim gid if the Exim uid is being used as a default. ++ ++If, for example, the user is specified numerically on the router and there are ++no group settings, no gid is available. In this situation, an error occurs. ++This is different for the uid, for which there always is an ultimate default. ++The first of the following that is set is used: ++ ++ * A user setting of the transport; ++ ++ * In a pipe transport, the creator's uid if deliver_as_creator is set; ++ ++ * A user setting of the router; ++ ++ * A check_local_user setting of the router; ++ ++ * The Exim uid. ++ ++Of course, an error will still occur if the uid that is chosen is on the ++never_users list. ++ ++ ++23.3 Current and home directories ++--------------------------------- ++ ++Routers may set current and home directories for local transports by means of ++the transport_current_directory and transport_home_directory options. However, ++if the transport's current_directory or home_directory options are set, they ++override the router's values. In detail, the home directory for a local ++transport is taken from the first of these values that is set: ++ ++ * The home_directory option on the transport; ++ ++ * The transport_home_directory option on the router; ++ ++ * The password data if check_local_user is set on the router; ++ ++ * The router_home_directory option on the router. ++ ++The current directory is taken from the first of these values that is set: ++ ++ * The current_directory option on the transport; ++ ++ * The transport_current_directory option on the router. ++ ++If neither the router nor the transport sets a current directory, Exim uses the ++value of the home directory, if it is set. Otherwise it sets the current ++directory to / before running a local transport. ++ ++ ++23.4 Expansion variables derived from the address ++------------------------------------------------- ++ ++Normally a local delivery is handling a single address, and in that case the ++variables such as $domain and $local_part are set during local deliveries. ++However, in some circumstances more than one address may be handled at once ++(for example, while writing batch SMTP for onward transmission by some other ++means). In this case, the variables associated with the local part are never ++set, $domain is set only if all the addresses have the same domain, and ++$original_domain is never set. ++ ++ ++ ++=============================================================================== ++24. GENERIC OPTIONS FOR TRANSPORTS ++ ++The following generic options apply to all transports: ++ +++------------------------------------------------------+ ++|body_only|Use: transports|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++If this option is set, the message's headers are not transported. It is ++mutually exclusive with headers_only. If it is used with the appendfile or pipe ++transports, the settings of message_prefix and message_suffix should be ++checked, because this option does not automatically suppress them. ++ +++--------------------------------------------------------------+ ++|current_directory|Use: transports|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++This specifies the current directory that is to be set while running the ++transport, overriding any value that may have been set by the router. If the ++expansion fails for any reason, including forced failure, an error is logged, ++and delivery is deferred. ++ +++------------------------------------------------------------+ ++|disable_logging|Use: transports|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is set true, nothing is logged for any deliveries by the ++transport or for any transport errors. You should not set this option unless ++you really, really know what you are doing. ++ +++--------------------------------------------------------+ ++|debug_print|Use: transports|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++If this option is set and debugging is enabled (see the -d command line ++option), the string is expanded and included in the debugging output when the ++transport is run. If expansion of the string fails, the error message is ++written to the debugging output, and Exim carries on processing. This facility ++is provided to help with checking out the values of variables and so on when ++debugging driver configurations. For example, if a headers_add option is not ++working properly, debug_print could be used to output the variables it ++references. A newline is added to the text if it does not end with one. The ++variables $transport_name and $router_name contain the name of the transport ++and the router that called it. ++ +++--------------------------------------------------------------+ ++|delivery_date_add|Use: transports|Type: boolean|Default: false| +++--------------------------------------------------------------+ ++ ++If this option is true, a Delivery-date: header is added to the message. This ++gives the actual time the delivery was made. As this is not a standard header, ++Exim has a configuration option (delivery_date_remove) which requests its ++removal from incoming messages, so that delivered messages can safely be resent ++to other recipients. ++ +++--------------------------------------------------+ ++|driver|Use: transports|Type: string|Default: unset| +++--------------------------------------------------+ ++ ++This specifies which of the available transport drivers is to be used. There is ++no default, and this option must be set for every transport. ++ +++------------------------------------------------------------+ ++|envelope_to_add|Use: transports|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is true, an Envelope-to: header is added to the message. This ++gives the original address(es) in the incoming envelope that caused this ++delivery to happen. More than one address may be present if the transport is ++configured to handle several addresses at once, or if more than one original ++address was redirected to the same final address. As this is not a standard ++header, Exim has a configuration option (envelope_to_remove) which requests its ++removal from incoming messages, so that delivered messages can safely be resent ++to other recipients. ++ +++-------------------------------------------------------+ ++|group|Use: transports|Type: string*|Default: Exim group| +++-------------------------------------------------------+ ++ ++This option specifies a gid for running the transport process, overriding any ++value that the router supplies, and also overriding any value associated with ++user (see below). ++ +++--------------------------------------------------------+ ++|headers_add|Use: transports|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++This option specifies a string of text that is expanded and added to the header ++portion of a message as it is transported, as described in section 46.17. ++Additional header lines can also be specified by routers. If the result of the ++expansion is an empty string, or if the expansion is forced to fail, no action ++is taken. Other expansion failures are treated as errors and cause the delivery ++to be deferred. ++ ++Unlike most options, headers_add can be specified multiple times for a ++transport; all listed headers are added. ++ +++---------------------------------------------------------+ ++|headers_only|Use: transports|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is set, the message's body is not transported. It is mutually ++exclusive with body_only. If it is used with the appendfile or pipe transports, ++the settings of message_prefix and message_suffix should be checked, since this ++option does not automatically suppress them. ++ +++-----------------------------------------------------------+ ++|headers_remove|Use: transports|Type: string*|Default: unset| +++-----------------------------------------------------------+ ++ ++This option specifies a string that is expanded into a list of header names; ++these headers are omitted from the message as it is transported, as described ++in section 46.17. Header removal can also be specified by routers. If the ++result of the expansion is an empty string, or if the expansion is forced to ++fail, no action is taken. Other expansion failures are treated as errors and ++cause the delivery to be deferred. ++ ++Unlike most options, headers_remove can be specified multiple times for a ++router; all listed headers are added. ++ +++-----------------------------------------------------------+ ++|headers_rewrite|Use: transports|Type: string|Default: unset| +++-----------------------------------------------------------+ ++ ++This option allows addresses in header lines to be rewritten at transport time, ++that is, as the message is being copied to its destination. The contents of the ++option are a colon-separated list of rewriting rules. Each rule is in exactly ++the same form as one of the general rewriting rules that are applied when a ++message is received. These are described in chapter 31. For example, ++ ++headers_rewrite = a@b c@d f : \ ++ x@y w@z ++ ++changes a@b into c@d in From: header lines, and x@y into w@z in all ++address-bearing header lines. The rules are applied to the header lines just ++before they are written out at transport time, so they affect only those copies ++of the message that pass through the transport. However, only the message's ++original header lines, and any that were added by a system filter, are ++rewritten. If a router or transport adds header lines, they are not affected by ++this option. These rewriting rules are not applied to the envelope. You can ++change the return path using return_path, but you cannot change envelope ++recipients at this time. ++ +++-----------------------------------------------------------+ ++|home_directory|Use: transports|Type: string*|Default: unset| +++-----------------------------------------------------------+ ++ ++This option specifies a home directory setting for a local transport, ++overriding any value that may be set by the router. The home directory is ++placed in $home while expanding the transport's private options. It is also ++used as the current directory if no current directory is set by the ++current_directory option on the transport or the transport_current_directory ++option on the router. If the expansion fails for any reason, including forced ++failure, an error is logged, and delivery is deferred. ++ +++-------------------------------------------------------+ ++|initgroups|Use: transports|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++If this option is true and the uid for the delivery process is provided by the ++transport, the initgroups() function is called when running the transport to ++ensure that any additional groups associated with the uid are set up. ++ +++-----------------------------------------------------------+ ++|message_size_limit|Use: transports|Type: string*|Default: 0| +++-----------------------------------------------------------+ ++ ++This option controls the size of messages passed through the transport. It is ++expanded before use; the result of the expansion must be a sequence of decimal ++digits, optionally followed by K or M. If the expansion fails for any reason, ++including forced failure, or if the result is not of the required form, ++delivery is deferred. If the value is greater than zero and the size of a ++message exceeds this limit, the address is failed. If there is any chance that ++the resulting bounce message could be routed to the same transport, you should ++ensure that return_size_limit is less than the transport's message_size_limit, ++as otherwise the bounce message will fail to get delivered. ++ +++-----------------------------------------------------------------+ ++|rcpt_include_affixes|Use: transports|Type: boolean|Default: false| +++-----------------------------------------------------------------+ ++ ++When this option is false (the default), and an address that has had any ++affixes (prefixes or suffixes) removed from the local part is delivered by any ++form of SMTP or LMTP, the affixes are not included. For example, if a router ++that contains ++ ++local_part_prefix = *- ++ ++routes the address abc-xyz@some.domain to an SMTP transport, the envelope is ++delivered with ++ ++RCPT TO:<xyz@some.domain> ++ ++This is also the case when an ACL-time callout is being used to verify a ++recipient address. However, if rcpt_include_affixes is set true, the whole ++local part is included in the RCPT command. This option applies to BSMTP ++deliveries by the appendfile and pipe transports as well as to the lmtp and ++smtp transports. ++ +++---------------------------------------------------------------------+ ++|retry_use_local_part|Use: transports|Type: boolean|Default: see below| +++---------------------------------------------------------------------+ ++ ++When a delivery suffers a temporary failure, a retry record is created in ++Exim's hints database. For remote deliveries, the key for the retry record is ++based on the name and/or IP address of the failing remote host. For local ++deliveries, the key is normally the entire address, including both the local ++part and the domain. This is suitable for most common cases of local delivery ++temporary failure - for example, exceeding a mailbox quota should delay only ++deliveries to that mailbox, not to the whole domain. ++ ++However, in some special cases you may want to treat a temporary local delivery ++as a failure associated with the domain, and not with a particular local part. ++(For example, if you are storing all mail for some domain in files.) You can do ++this by setting retry_use_local_part false. ++ ++For all the local transports, its default value is true. For remote transports, ++the default value is false for tidiness, but changing the value has no effect ++on a remote transport in the current implementation. ++ +++--------------------------------------------------------+ ++|return_path|Use: transports|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++If this option is set, the string is expanded at transport time and replaces ++the existing return path (envelope sender) value in the copy of the message ++that is being delivered. An empty return path is permitted. This feature is ++designed for remote deliveries, where the value of this option is used in the ++SMTP MAIL command. If you set return_path for a local transport, the only ++effect is to change the address that is placed in the Return-path: header line, ++if one is added to the message (see the next option). ++ ++Note: A changed return path is not logged unless you add ++return_path_on_delivery to the log selector. ++ ++The expansion can refer to the existing value via $return_path. This is either ++the message's envelope sender, or an address set by the errors_to option on a ++router. If the expansion is forced to fail, no replacement occurs; if it fails ++for another reason, delivery is deferred. This option can be used to support ++VERP (Variable Envelope Return Paths) - see section 49.6. ++ ++Note: If a delivery error is detected locally, including the case when a remote ++server rejects a message at SMTP time, the bounce message is not sent to the ++value of this option. It is sent to the previously set errors address. This ++defaults to the incoming sender address, but can be changed by setting ++errors_to in a router. ++ +++------------------------------------------------------------+ ++|return_path_add|Use: transports|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is true, a Return-path: header is added to the message. Although ++the return path is normally available in the prefix line of BSD mailboxes, this ++is commonly not displayed by MUAs, and so the user does not have easy access to ++it. ++ ++RFC 2821 states that the Return-path: header is added to a message "when the ++delivery SMTP server makes the final delivery". This implies that this header ++should not be present in incoming messages. Exim has a configuration option, ++return_path_remove, which requests removal of this header from incoming ++messages, so that delivered messages can safely be resent to other recipients. ++ +++-------------------------------------------------------------+ ++|shadow_condition|Use: transports|Type: string*|Default: unset| +++-------------------------------------------------------------+ ++ ++See shadow_transport below. ++ +++------------------------------------------------------------+ ++|shadow_transport|Use: transports|Type: string|Default: unset| +++------------------------------------------------------------+ ++ ++A local transport may set the shadow_transport option to the name of another ++local transport. Shadow remote transports are not supported. ++ ++Whenever a delivery to the main transport succeeds, and either shadow_condition ++is unset, or its expansion does not result in the empty string or one of the ++strings "0" or "no" or "false", the message is also passed to the shadow ++transport, with the same delivery address or addresses. If expansion fails, no ++action is taken except that non-forced expansion failures cause a log line to ++be written. ++ ++The result of the shadow transport is discarded and does not affect the ++subsequent processing of the message. Only a single level of shadowing is ++provided; the shadow_transport option is ignored on any transport when it is ++running as a shadow. Options concerned with output from pipes are also ignored. ++The log line for the successful delivery has an item added on the end, of the ++form ++ ++ST=<shadow transport name> ++ ++If the shadow transport did not succeed, the error message is put in ++parentheses afterwards. Shadow transports can be used for a number of different ++purposes, including keeping more detailed log information than Exim normally ++provides, and implementing automatic acknowledgment policies based on message ++headers that some sites insist on. ++ +++-------------------------------------------------------------+ ++|transport_filter|Use: transports|Type: string*|Default: unset| +++-------------------------------------------------------------+ ++ ++This option sets up a filtering (in the Unix shell sense) process for messages ++at transport time. It should not be confused with mail filtering as set up by ++individual users or via a system filter. ++ ++When the message is about to be written out, the command specified by ++transport_filter is started up in a separate, parallel process, and the entire ++message, including the header lines, is passed to it on its standard input ++(this in fact is done from a third process, to avoid deadlock). The command ++must be specified as an absolute path. ++ ++The lines of the message that are written to the transport filter are ++terminated by newline ("\n"). The message is passed to the filter before any ++SMTP-specific processing, such as turning "\n" into "\r\n" and escaping lines ++beginning with a dot, and also before any processing implied by the settings of ++check_string and escape_string in the appendfile or pipe transports. ++ ++The standard error for the filter process is set to the same destination as its ++standard output; this is read and written to the message's ultimate ++destination. The process that writes the message to the filter, the filter ++itself, and the original process that reads the result and delivers it are all ++run in parallel, like a shell pipeline. ++ ++The filter can perform any transformations it likes, but of course should take ++care not to break RFC 2822 syntax. Exim does not check the result, except to ++test for a final newline when SMTP is in use. All messages transmitted over ++SMTP must end with a newline, so Exim supplies one if it is missing. ++ ++A transport filter can be used to provide content-scanning on a per-user basis ++at delivery time if the only required effect of the scan is to modify the ++message. For example, a content scan could insert a new header line containing ++a spam score. This could be interpreted by a filter in the user's MUA. It is ++not possible to discard a message at this stage. ++ ++A problem might arise if the filter increases the size of a message that is ++being sent down an SMTP connection. If the receiving SMTP server has indicated ++support for the SIZE parameter, Exim will have sent the size of the message at ++the start of the SMTP session. If what is actually sent is substantially more, ++the server might reject the message. This can be worked round by setting the ++size_addition option on the smtp transport, either to allow for additions to ++the message, or to disable the use of SIZE altogether. ++ ++The value of the transport_filter option is the command string for starting the ++filter, which is run directly from Exim, not under a shell. The string is ++parsed by Exim in the same way as a command string for the pipe transport: Exim ++breaks it up into arguments and then expands each argument separately (see ++section 29.3). Any kind of expansion failure causes delivery to be deferred. ++The special argument $pipe_addresses is replaced by a number of arguments, one ++for each address that applies to this delivery. (This isn't an ideal name for ++this feature here, but as it was already implemented for the pipe transport, it ++seemed sensible not to change it.) ++ ++The expansion variables $host and $host_address are available when the ++transport is a remote one. They contain the name and IP address of the host to ++which the message is being sent. For example: ++ ++transport_filter = /some/directory/transport-filter.pl \ ++ $host $host_address $sender_address $pipe_addresses ++ ++Two problems arise if you want to use more complicated expansion items to ++generate transport filter commands, both of which due to the fact that the ++command is split up before expansion. ++ ++ * If an expansion item contains white space, you must quote it, so that it is ++ all part of the same command item. If the entire option setting is one such ++ expansion item, you have to take care what kind of quoting you use. For ++ example: ++ ++ transport_filter = '/bin/cmd${if eq{$host}{a.b.c}{1}{2}}' ++ ++ This runs the command /bin/cmd1 if the host name is a.b.c, and /bin/cmd2 ++ otherwise. If double quotes had been used, they would have been stripped by ++ Exim when it read the option's value. When the value is used, if the single ++ quotes were missing, the line would be split into two items, "/bin/cmd${if" ++ and "eq{$host}{a.b.c}{1}{2}", and an error would occur when Exim tried to ++ expand the first one. ++ ++ * Except for the special case of $pipe_addresses that is mentioned above, an ++ expansion cannot generate multiple arguments, or a command name followed by ++ arguments. Consider this example: ++ ++ transport_filter = ${lookup{$host}lsearch{/a/file}\ ++ {$value}{/bin/cat}} ++ ++ The result of the lookup is interpreted as the name of the command, even if ++ it contains white space. The simplest way round this is to use a shell: ++ ++ transport_filter = /bin/sh -c ${lookup{$host}lsearch{/a/file}\ ++ {$value}{/bin/cat}} ++ ++The filter process is run under the same uid and gid as the normal delivery. ++For remote deliveries this is the Exim uid/gid by default. The command should ++normally yield a zero return code. Transport filters are not supposed to fail. ++A non-zero code is taken to mean that the transport filter encountered some ++serious problem. Delivery of the message is deferred; the message remains on ++the queue and is tried again later. It is not possible to cause a message to be ++bounced from a transport filter. ++ ++If a transport filter is set on an autoreply transport, the original message is ++passed through the filter as it is being copied into the newly generated ++message, which happens if the return_message option is set. ++ +++---------------------------------------------------------------+ ++|transport_filter_timeout|Use: transports|Type: time|Default: 5m| +++---------------------------------------------------------------+ ++ ++When Exim is reading the output of a transport filter, it applies a timeout ++that can be set by this option. Exceeding the timeout is normally treated as a ++temporary delivery failure. However, if a transport filter is used with a pipe ++transport, a timeout in the transport filter is treated in the same way as a ++timeout in the pipe command itself. By default, a timeout is a hard error, but ++if the pipe transport's timeout_defer option is set true, it becomes a ++temporary error. ++ +++-----------------------------------------------------+ ++|user|Use: transports|Type: string*|Default: Exim user| +++-----------------------------------------------------+ ++ ++This option specifies the user under whose uid the delivery process is to be ++run, overriding any uid that may have been set by the router. If the user is ++given as a name, the uid is looked up from the password data, and the ++associated group is taken as the value of the gid to be used if the group ++option is not set. ++ ++For deliveries that use local transports, a user and group are normally ++specified explicitly or implicitly (for example, as a result of ++check_local_user) by the router or transport. ++ ++For remote transports, you should leave this option unset unless you really are ++sure you know what you are doing. When a remote transport is running, it needs ++to be able to access Exim's hints databases, because each host may have its own ++retry data. ++ ++ ++ ++=============================================================================== ++25. ADDRESS BATCHING IN LOCAL TRANSPORTS ++ ++The only remote transport (smtp) is normally configured to handle more than one ++address at a time, so that when several addresses are routed to the same remote ++host, just one copy of the message is sent. Local transports, however, normally ++handle one address at a time. That is, a separate instance of the transport is ++run for each address that is routed to the transport. A separate copy of the ++message is delivered each time. ++ ++In special cases, it may be desirable to handle several addresses at once in a ++local transport, for example: ++ ++ * In an appendfile transport, when storing messages in files for later ++ delivery by some other means, a single copy of the message with multiple ++ recipients saves space. ++ ++ * In an lmtp transport, when delivering over "local SMTP" to some process, a ++ single copy saves time, and is the normal way LMTP is expected to work. ++ ++ * In a pipe transport, when passing the message to a scanner program or to ++ some other delivery mechanism such as UUCP, multiple recipients may be ++ acceptable. ++ ++These three local transports all have the same options for controlling multiple ++("batched") deliveries, namely batch_max and batch_id. To save repeating the ++information for each transport, these options are described here. ++ ++The batch_max option specifies the maximum number of addresses that can be ++delivered together in a single run of the transport. Its default value is one ++(no batching). When more than one address is routed to a transport that has a ++batch_max value greater than one, the addresses are delivered in a batch (that ++is, in a single run of the transport with multiple recipients), subject to ++certain conditions: ++ ++ * If any of the transport's options contain a reference to $local_part, no ++ batching is possible. ++ ++ * If any of the transport's options contain a reference to $domain, only ++ addresses with the same domain are batched. ++ ++ * If batch_id is set, it is expanded for each address, and only those ++ addresses with the same expanded value are batched. This allows you to ++ specify customized batching conditions. Failure of the expansion for any ++ reason, including forced failure, disables batching, but it does not stop ++ the delivery from taking place. ++ ++ * Batched addresses must also have the same errors address (where to send ++ delivery errors), the same header additions and removals, the same user and ++ group for the transport, and if a host list is present, the first host must ++ be the same. ++ ++In the case of the appendfile and pipe transports, batching applies both when ++the file or pipe command is specified in the transport, and when it is ++specified by a redirect router, but all the batched addresses must of course be ++routed to the same file or pipe command. These two transports have an option ++called use_bsmtp, which causes them to deliver the message in "batched SMTP" ++format, with the envelope represented as SMTP commands. The check_string and ++escape_string options are forced to the values ++ ++check_string = "." ++escape_string = ".." ++ ++when batched SMTP is in use. A full description of the batch SMTP mechanism is ++given in section 47.10. The lmtp transport does not have a use_bsmtp option, ++because it always delivers using the SMTP protocol. ++ ++If the generic envelope_to_add option is set for a batching transport, the ++Envelope-to: header that is added to the message contains all the addresses ++that are being processed together. If you are using a batching appendfile ++transport without use_bsmtp, the only way to preserve the recipient addresses ++is to set the envelope_to_add option. ++ ++If you are using a pipe transport without BSMTP, and setting the transport's ++command option, you can include $pipe_addresses as part of the command. This is ++not a true variable; it is a bit of magic that causes each of the recipient ++addresses to be inserted into the command as a separate argument. This provides ++a way of accessing all the addresses that are being delivered in the batch. ++Note: This is not possible for pipe commands that are specified by a redirect ++router. ++ ++ ++ ++=============================================================================== ++26. THE APPENDFILE TRANSPORT ++ ++The appendfile transport delivers a message by appending it to an existing ++file, or by creating an entirely new file in a specified directory. Single ++files to which messages are appended can be in the traditional Unix mailbox ++format, or optionally in the MBX format supported by the Pine MUA and ++University of Washington IMAP daemon, inter alia. When each message is being ++delivered as a separate file, "maildir" format can optionally be used to give ++added protection against failures that happen part-way through the delivery. A ++third form of separate-file delivery known as "mailstore" is also supported. ++For all file formats, Exim attempts to create as many levels of directory as ++necessary, provided that create_directory is set. ++ ++The code for the optional formats is not included in the Exim binary by ++default. It is necessary to set SUPPORT_MBX, SUPPORT_MAILDIR and/or ++SUPPORT_MAILSTORE in Local/Makefile to have the appropriate code included. ++ ++Exim recognizes system quota errors, and generates an appropriate message. Exim ++also supports its own quota control within the transport, for use when the ++system facility is unavailable or cannot be used for some reason. ++ ++If there is an error while appending to a file (for example, quota exceeded or ++partition filled), Exim attempts to reset the file's length and last ++modification time back to what they were before. If there is an error while ++creating an entirely new file, the new file is removed. ++ ++Before appending to a file, a number of security checks are made, and the file ++is locked. A detailed description is given below, after the list of private ++options. ++ ++The appendfile transport is most commonly used for local deliveries to users' ++mailboxes. However, it can also be used as a pseudo-remote transport for ++putting messages into files for remote delivery by some means other than Exim. ++"Batch SMTP" format is often used in this case (see the use_bsmtp option). ++ ++ ++26.1 The file and directory options ++----------------------------------- ++ ++The file option specifies a single file, to which the message is appended; the ++directory option specifies a directory, in which a new file containing the ++message is created. Only one of these two options can be set, and for normal ++deliveries to mailboxes, one of them must be set. ++ ++However, appendfile is also used for delivering messages to files or ++directories whose names (or parts of names) are obtained from alias, ++forwarding, or filtering operations (for example, a save command in a user's ++Exim filter). When such a transport is running, $local_part contains the local ++part that was aliased or forwarded, and $address_file contains the name (or ++partial name) of the file or directory generated by the redirection operation. ++There are two cases: ++ ++ * If neither file nor directory is set, the redirection operation must ++ specify an absolute path (one that begins with "/"). This is the most ++ common case when users with local accounts use filtering to sort mail into ++ different folders. See for example, the address_file transport in the ++ default configuration. If the path ends with a slash, it is assumed to be ++ the name of a directory. A delivery to a directory can also be forced by ++ setting maildir_format or mailstore_format. ++ ++ * If file or directory is set for a delivery from a redirection, it is used ++ to determine the file or directory name for the delivery. Normally, the ++ contents of $address_file are used in some way in the string expansion. ++ ++As an example of the second case, consider an environment where users do not ++have home directories. They may be permitted to use Exim filter commands of the ++form: ++ ++save folder23 ++ ++or Sieve filter commands of the form: ++ ++require "fileinto"; ++fileinto "folder23"; ++ ++In this situation, the expansion of file or directory in the transport must ++transform the relative path into an appropriate absolute file name. In the case ++of Sieve filters, the name inbox must be handled. It is the name that is used ++as a result of a "keep" action in the filter. This example shows one way of ++handling this requirement: ++ ++file = ${if eq{$address_file}{inbox} \ ++ {/var/mail/$local_part} \ ++ {${if eq{${substr_0_1:$address_file}}{/} \ ++ {$address_file} \ ++ {$home/mail/$address_file} \ ++ }} \ ++ } ++ ++With this setting of file, inbox refers to the standard mailbox location, ++absolute paths are used without change, and other folders are in the mail ++directory within the home directory. ++ ++Note 1: While processing an Exim filter, a relative path such as folder23 is ++turned into an absolute path if a home directory is known to the router. In ++particular, this is the case if check_local_user is set. If you want to prevent ++this happening at routing time, you can set router_home_directory empty. This ++forces the router to pass the relative path to the transport. ++ ++Note 2: An absolute path in $address_file is not treated specially; the file or ++directory option is still used if it is set. ++ ++ ++26.2 Private options for appendfile ++----------------------------------- ++ +++-------------------------------------------------------+ ++|allow_fifo|Use: appendfile|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++Setting this option permits delivery to named pipes (FIFOs) as well as to ++regular files. If no process is reading the named pipe at delivery time, the ++delivery is deferred. ++ +++----------------------------------------------------------+ ++|allow_symlink|Use: appendfile|Type: boolean|Default: false| +++----------------------------------------------------------+ ++ ++By default, appendfile will not deliver if the path name for the file is that ++of a symbolic link. Setting this option relaxes that constraint, but there are ++security issues involved in the use of symbolic links. Be sure you know what ++you are doing if you set this. Details of exactly what this option affects are ++included in the discussion which follows this list of options. ++ +++-----------------------------------------------------+ ++|batch_id|Use: appendfile|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++See the description of local delivery batching in chapter 25. However, batching ++is automatically disabled for appendfile deliveries that happen as a result of ++forwarding or aliasing or other redirection directly to a file. ++ +++--------------------------------------------------+ ++|batch_max|Use: appendfile|Type: integer|Default: 1| +++--------------------------------------------------+ ++ ++See the description of local delivery batching in chapter 25. ++ +++--------------------------------------------------------+ ++|check_group|Use: appendfile|Type: boolean|Default: false| +++--------------------------------------------------------+ ++ ++When this option is set, the group owner of the file defined by the file option ++is checked to see that it is the same as the group under which the delivery ++process is running. The default setting is false because the default file mode ++is 0600, which means that the group is irrelevant. ++ +++-------------------------------------------------------+ ++|check_owner|Use: appendfile|Type: boolean|Default: true| +++-------------------------------------------------------+ ++ ++When this option is set, the owner of the file defined by the file option is ++checked to ensure that it is the same as the user under which the delivery ++process is running. ++ +++------------------------------------------------------------+ ++|check_string|Use: appendfile|Type: string|Default: see below| +++------------------------------------------------------------+ ++ ++As appendfile writes the message, the start of each line is tested for matching ++check_string, and if it does, the initial matching characters are replaced by ++the contents of escape_string. The value of check_string is a literal string, ++not a regular expression, and the case of any letters it contains is ++significant. ++ ++If use_bsmtp is set the values of check_string and escape_string are forced to ++"." and ".." respectively, and any settings in the configuration are ignored. ++Otherwise, they default to "From " and ">From " when the file option is set, ++and unset when any of the directory, maildir, or mailstore options are set. ++ ++The default settings, along with message_prefix and message_suffix, are ++suitable for traditional "BSD" mailboxes, where a line beginning with "From " ++indicates the start of a new message. All four options need changing if another ++format is used. For example, to deliver to mailboxes in MMDF format: ++ ++check_string = "\1\1\1\1\n" ++escape_string = "\1\1\1\1 \n" ++message_prefix = "\1\1\1\1\n" ++message_suffix = "\1\1\1\1\n" ++ +++------------------------------------------------------------+ ++|create_directory|Use: appendfile|Type: boolean|Default: true| +++------------------------------------------------------------+ ++ ++When this option is true, Exim attempts to create any missing superior ++directories for the file that it is about to write. A created directory's mode ++is given by the directory_mode option. ++ ++The group ownership of a newly created directory is highly dependent on the ++operating system (and possibly the file system) that is being used. For ++example, in Solaris, if the parent directory has the setgid bit set, its group ++is propagated to the child; if not, the currently set group is used. However, ++in FreeBSD, the parent's group is always used. ++ +++----------------------------------------------------------+ ++|create_file|Use: appendfile|Type: string|Default: anywhere| +++----------------------------------------------------------+ ++ ++This option constrains the location of files and directories that are created ++by this transport. It applies to files defined by the file option and ++directories defined by the directory option. In the case of maildir delivery, ++it applies to the top level directory, not the maildir directories beneath. ++ ++The option must be set to one of the words "anywhere", "inhome", or ++"belowhome". In the second and third cases, a home directory must have been set ++for the transport. This option is not useful when an explicit file name is ++given for normal mailbox deliveries. It is intended for the case when file ++names are generated from users' .forward files. These are usually handled by an ++appendfile transport called address_file. See also file_must_exist. ++ +++------------------------------------------------------+ ++|directory|Use: appendfile|Type: string*|Default: unset| +++------------------------------------------------------+ ++ ++This option is mutually exclusive with the file option, but one of file or ++directory must be set, unless the delivery is the direct result of a ++redirection (see section 26.1). ++ ++When directory is set, the string is expanded, and the message is delivered ++into a new file or files in or below the given directory, instead of being ++appended to a single mailbox file. A number of different formats are provided ++(see maildir_format and mailstore_format), and see section 26.4 for further ++details of this form of delivery. ++ +++---------------------------------------------------------------+ ++|directory_file|Use: appendfile|Type: string*|Default: see below| +++---------------------------------------------------------------+ ++ ++When directory is set, but neither maildir_format nor mailstore_format is set, ++appendfile delivers each message into a file whose name is obtained by ++expanding this string. The default value is: ++ ++q${base62:$tod_epoch}-$inode ++ ++This generates a unique name from the current time, in base 62 form, and the ++inode of the file. The variable $inode is available only when expanding this ++option. ++ +++----------------------------------------------------------------+ ++|directory_mode|Use: appendfile|Type: octal integer|Default: 0700| +++----------------------------------------------------------------+ ++ ++If appendfile creates any directories as a result of the create_directory ++option, their mode is specified by this option. ++ +++-------------------------------------------------------------------+ ++|escape_string|Use: appendfile|Type: string|Default: see description| +++-------------------------------------------------------------------+ ++ ++See check_string above. ++ +++-------------------------------------------------+ ++|file|Use: appendfile|Type: string*|Default: unset| +++-------------------------------------------------+ ++ ++This option is mutually exclusive with the directory option, but one of file or ++directory must be set, unless the delivery is the direct result of a ++redirection (see section 26.1). The file option specifies a single file, to ++which the message is appended. One or more of use_fcntl_lock, use_flock_lock, ++or use_lockfile must be set with file. ++ ++If you are using more than one host to deliver over NFS into the same ++mailboxes, you should always use lock files. ++ ++The string value is expanded for each delivery, and must yield an absolute ++path. The most common settings of this option are variations on one of these ++examples: ++ ++file = /var/spool/mail/$local_part ++file = /home/$local_part/inbox ++file = $home/inbox ++ ++In the first example, all deliveries are done into the same directory. If Exim ++is configured to use lock files (see use_lockfile below) it must be able to ++create a file in the directory, so the "sticky" bit must be turned on for ++deliveries to be possible, or alternatively the group option can be used to run ++the delivery under a group id which has write access to the directory. ++ +++-------------------------------------------------------+ ++|file_format|Use: appendfile|Type: string|Default: unset| +++-------------------------------------------------------+ ++ ++This option requests the transport to check the format of an existing file ++before adding to it. The check consists of matching a specific string at the ++start of the file. The value of the option consists of an even number of ++colon-separated strings. The first of each pair is the test string, and the ++second is the name of a transport. If the transport associated with a matched ++string is not the current transport, control is passed over to the other ++transport. For example, suppose the standard local_delivery transport has this ++added to it: ++ ++file_format = "From : local_delivery :\ ++ \1\1\1\1\n : local_mmdf_delivery" ++ ++Mailboxes that begin with "From" are still handled by this transport, but if a ++mailbox begins with four binary ones followed by a newline, control is passed ++to a transport called local_mmdf_delivery, which presumably is configured to do ++the delivery in MMDF format. If a mailbox does not exist or is empty, it is ++assumed to match the current transport. If the start of a mailbox doesn't match ++any string, or if the transport named for a given string is not defined, ++delivery is deferred. ++ +++------------------------------------------------------------+ ++|file_must_exist|Use: appendfile|Type: boolean|Default: false| +++------------------------------------------------------------+ ++ ++If this option is true, the file specified by the file option must exist. A ++temporary error occurs if it does not, causing delivery to be deferred. If this ++option is false, the file is created if it does not exist. ++ +++---------------------------------------------------------+ ++|lock_fcntl_timeout|Use: appendfile|Type: time|Default: 0s| +++---------------------------------------------------------+ ++ ++By default, the appendfile transport uses non-blocking calls to fcntl() when ++locking an open mailbox file. If the call fails, the delivery process sleeps ++for lock_interval and tries again, up to lock_retries times. Non-blocking calls ++are used so that the file is not kept open during the wait for the lock; the ++reason for this is to make it as safe as possible for deliveries over NFS in ++the case when processes might be accessing an NFS mailbox without using a lock ++file. This should not be done, but misunderstandings and hence ++misconfigurations are not unknown. ++ ++On a busy system, however, the performance of a non-blocking lock approach is ++not as good as using a blocking lock with a timeout. In this case, the waiting ++is done inside the system call, and Exim's delivery process acquires the lock ++and can proceed as soon as the previous lock holder releases it. ++ ++If lock_fcntl_timeout is set to a non-zero time, blocking locks, with that ++timeout, are used. There may still be some retrying: the maximum number of ++retries is ++ ++(lock_retries * lock_interval) / lock_fcntl_timeout ++ ++rounded up to the next whole number. In other words, the total time during ++which appendfile is trying to get a lock is roughly the same, unless ++lock_fcntl_timeout is set very large. ++ ++You should consider setting this option if you are getting a lot of delayed ++local deliveries because of errors of the form ++ ++failed to lock mailbox /some/file (fcntl) ++ +++---------------------------------------------------------+ ++|lock_flock_timeout|Use: appendfile|Type: time|Default: 0s| +++---------------------------------------------------------+ ++ ++This timeout applies to file locking when using flock() (see use_flock); the ++timeout operates in a similar manner to lock_fcntl_timeout. ++ +++----------------------------------------------------+ ++|lock_interval|Use: appendfile|Type: time|Default: 3s| +++----------------------------------------------------+ ++ ++This specifies the time to wait between attempts to lock the file. See below ++for details of locking. ++ +++------------------------------------------------------+ ++|lock_retries|Use: appendfile|Type: integer|Default: 10| +++------------------------------------------------------+ ++ ++This specifies the maximum number of attempts to lock the file. A value of zero ++is treated as 1. See below for details of locking. ++ +++---------------------------------------------------------------+ ++|lockfile_mode|Use: appendfile|Type: octal integer|Default: 0600| +++---------------------------------------------------------------+ ++ ++This specifies the mode of the created lock file, when a lock file is being ++used (see use_lockfile and use_mbx_lock). ++ +++--------------------------------------------------------+ ++|lockfile_timeout|Use: appendfile|Type: time|Default: 30m| +++--------------------------------------------------------+ ++ ++When a lock file is being used (see use_lockfile), if a lock file already ++exists and is older than this value, it is assumed to have been left behind by ++accident, and Exim attempts to remove it. ++ +++--------------------------------------------------------------+ ++|mailbox_filecount|Use: appendfile|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++If this option is set, it is expanded, and the result is taken as the current ++number of files in the mailbox. It must be a decimal number, optionally ++followed by K or M. This provides a way of obtaining this information from an ++external source that maintains the data. ++ +++---------------------------------------------------------+ ++|mailbox_size|Use: appendfile|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++If this option is set, it is expanded, and the result is taken as the current ++size the mailbox. It must be a decimal number, optionally followed by K or M. ++This provides a way of obtaining this information from an external source that ++maintains the data. This is likely to be helpful for maildir deliveries where ++it is computationally expensive to compute the size of a mailbox. ++ +++-----------------------------------------------------------+ ++|maildir_format|Use: appendfile|Type: boolean|Default: false| +++-----------------------------------------------------------+ ++ ++If this option is set with the directory option, the delivery is into a new ++file, in the "maildir" format that is used by other mail software. When the ++transport is activated directly from a redirect router (for example, the ++address_file transport in the default configuration), setting maildir_format ++causes the path received from the router to be treated as a directory, whether ++or not it ends with "/". This option is available only if SUPPORT_MAILDIR is ++present in Local/Makefile. See section 26.5 below for further details. ++ +++-----------------------------------------------------------------------------+ ++|maildir_quota_directory_regex|Use: appendfile|Type: string|Default: See below| +++-----------------------------------------------------------------------------+ ++ ++This option is relevant only when maildir_use_size_file is set. It defines a ++regular expression for specifying directories, relative to the quota directory ++(see quota_directory), that should be included in the quota calculation. The ++default value is: ++ ++maildir_quota_directory_regex = ^(?:cur|new|\..*)$ ++ ++This includes the cur and new directories, and any maildir++ folders ++(directories whose names begin with a dot). If you want to exclude the Trash ++folder from the count (as some sites do), you need to change this setting to ++ ++maildir_quota_directory_regex = ^(?:cur|new|\.(?!Trash).*)$ ++ ++This uses a negative lookahead in the regular expression to exclude the ++directory whose name is .Trash. When a directory is excluded from quota ++calculations, quota processing is bypassed for any messages that are delivered ++directly into that directory. ++ +++---------------------------------------------------------+ ++|maildir_retries|Use: appendfile|Type: integer|Default: 10| +++---------------------------------------------------------+ ++ ++This option specifies the number of times to retry when writing a file in ++"maildir" format. See section 26.5 below. ++ +++--------------------------------------------------------+ ++|maildir_tag|Use: appendfile|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++This option applies only to deliveries in maildir format, and is described in ++section 26.5 below. ++ +++-------------------------------------------------------------------+ ++|maildir_use_size_file|Use: appendfile*|Type: boolean|Default: false| +++-------------------------------------------------------------------+ ++ ++The result of string expansion for this option must be a valid boolean value. ++If it is true, it enables support for maildirsize files. Exim creates a ++maildirsize file in a maildir if one does not exist, taking the quota from the ++quota option of the transport. If quota is unset, the value is zero. See ++maildir_quota_directory_regex above and section 26.5 below for further details. ++ +++----------------------------------------------------------------------+ ++|maildirfolder_create_regex|Use: appendfile|Type: string|Default: unset| +++----------------------------------------------------------------------+ ++ ++The value of this option is a regular expression. If it is unset, it has no ++effect. Otherwise, before a maildir delivery takes place, the pattern is ++matched against the name of the maildir directory, that is, the directory ++containing the new and tmp subdirectories that will be used for the delivery. ++If there is a match, Exim checks for the existence of a file called ++maildirfolder in the directory, and creates it if it does not exist. See ++section 26.5 for more details. ++ +++-------------------------------------------------------------+ ++|mailstore_format|Use: appendfile|Type: boolean|Default: false| +++-------------------------------------------------------------+ ++ ++If this option is set with the directory option, the delivery is into two new ++files in "mailstore" format. The option is available only if SUPPORT_MAILSTORE ++is present in Local/Makefile. See section 26.4 below for further details. ++ +++-------------------------------------------------------------+ ++|mailstore_prefix|Use: appendfile|Type: string*|Default: unset| +++-------------------------------------------------------------+ ++ ++This option applies only to deliveries in mailstore format, and is described in ++section 26.4 below. ++ +++-------------------------------------------------------------+ ++|mailstore_suffix|Use: appendfile|Type: string*|Default: unset| +++-------------------------------------------------------------+ ++ ++This option applies only to deliveries in mailstore format, and is described in ++section 26.4 below. ++ +++-------------------------------------------------------+ ++|mbx_format|Use: appendfile|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++This option is available only if Exim has been compiled with SUPPORT_MBX set in ++Local/Makefile. If mbx_format is set with the file option, the message is ++appended to the mailbox file in MBX format instead of traditional Unix format. ++This format is supported by Pine4 and its associated IMAP and POP daemons, by ++means of the c-client library that they all use. ++ ++Note: The message_prefix and message_suffix options are not automatically ++changed by the use of mbx_format. They should normally be set empty when using ++MBX format, so this option almost always appears in this combination: ++ ++mbx_format = true ++message_prefix = ++message_suffix = ++ ++If none of the locking options are mentioned in the configuration, use_mbx_lock ++is assumed and the other locking options default to false. It is possible to ++specify the other kinds of locking with mbx_format, but use_fcntl_lock and ++use_mbx_lock are mutually exclusive. MBX locking interworks with c-client, ++providing for shared access to the mailbox. It should not be used if any ++program that does not use this form of locking is going to access the mailbox, ++nor should it be used if the mailbox file is NFS mounted, because it works only ++when the mailbox is accessed from a single host. ++ ++If you set use_fcntl_lock with an MBX-format mailbox, you cannot use the ++standard version of c-client, because as long as it has a mailbox open (this ++means for the whole of a Pine or IMAP session), Exim will not be able to append ++messages to it. ++ +++---------------------------------------------------------------+ ++|message_prefix|Use: appendfile|Type: string*|Default: see below| +++---------------------------------------------------------------+ ++ ++The string specified here is expanded and output at the start of every message. ++The default is unset unless file is specified and use_bsmtp is not set, in ++which case it is: ++ ++message_prefix = "From ${if def:return_path{$return_path}\ ++ {MAILER-DAEMON}} $tod_bsdinbox\n" ++ ++Note: If you set use_crlf true, you must change any occurrences of "\n" to "\r\ ++n" in message_prefix. ++ +++---------------------------------------------------------------+ ++|message_suffix|Use: appendfile|Type: string*|Default: see below| +++---------------------------------------------------------------+ ++ ++The string specified here is expanded and output at the end of every message. ++The default is unset unless file is specified and use_bsmtp is not set, in ++which case it is a single newline character. The suffix can be suppressed by ++setting ++ ++message_suffix = ++ ++Note: If you set use_crlf true, you must change any occurrences of "\n" to "\r\ ++n" in message_suffix. ++ +++------------------------------------------------------+ ++|mode|Use: appendfile|Type: octal integer|Default: 0600| +++------------------------------------------------------+ ++ ++If the output file is created, it is given this mode. If it already exists and ++has wider permissions, they are reduced to this mode. If it has narrower ++permissions, an error occurs unless mode_fail_narrower is false. However, if ++the delivery is the result of a save command in a filter file specifying a ++particular mode, the mode of the output file is always forced to take that ++value, and this option is ignored. ++ +++--------------------------------------------------------------+ ++|mode_fail_narrower|Use: appendfile|Type: boolean|Default: true| +++--------------------------------------------------------------+ ++ ++This option applies in the case when an existing mailbox file has a narrower ++mode than that specified by the mode option. If mode_fail_narrower is true, the ++delivery is deferred ("mailbox has the wrong mode"); otherwise Exim continues ++with the delivery attempt, using the existing mode of the file. ++ +++----------------------------------------------------------+ ++|notify_comsat|Use: appendfile|Type: boolean|Default: false| +++----------------------------------------------------------+ ++ ++If this option is true, the comsat daemon is notified after every successful ++delivery to a user mailbox. This is the daemon that notifies logged on users ++about incoming mail. ++ +++--------------------------------------------------+ ++|quota|Use: appendfile|Type: string*|Default: unset| +++--------------------------------------------------+ ++ ++This option imposes a limit on the size of the file to which Exim is appending, ++or to the total space used in the directory tree when the directory option is ++set. In the latter case, computation of the space used is expensive, because ++all the files in the directory (and any sub-directories) have to be ++individually inspected and their sizes summed. (See quota_size_regex and ++maildir_use_size_file for ways to avoid this in environments where users have ++no shell access to their mailboxes). ++ ++As there is no interlock against two simultaneous deliveries into a multi-file ++mailbox, it is possible for the quota to be overrun in this case. For ++single-file mailboxes, of course, an interlock is a necessity. ++ ++A file's size is taken as its used value. Because of blocking effects, this may ++be a lot less than the actual amount of disk space allocated to the file. If ++the sizes of a number of files are being added up, the rounding effect can ++become quite noticeable, especially on systems that have large block sizes. ++Nevertheless, it seems best to stick to the used figure, because this is the ++obvious value which users understand most easily. ++ ++The value of the option is expanded, and must then be a numerical value ++(decimal point allowed), optionally followed by one of the letters K, M, or G, ++for kilobytes, megabytes, or gigabytes. If Exim is running on a system with ++large file support (Linux and FreeBSD have this), mailboxes larger than 2G can ++be handled. ++ ++Note: A value of zero is interpreted as "no quota". ++ ++The expansion happens while Exim is running as root, before it changes uid for ++the delivery. This means that files that are inaccessible to the end user can ++be used to hold quota values that are looked up in the expansion. When delivery ++fails because this quota is exceeded, the handling of the error is as for ++system quota failures. ++ ++By default, Exim's quota checking mimics system quotas, and restricts the ++mailbox to the specified maximum size, though the value is not accurate to the ++last byte, owing to separator lines and additional headers that may get added ++during message delivery. When a mailbox is nearly full, large messages may get ++refused even though small ones are accepted, because the size of the current ++message is added to the quota when the check is made. This behaviour can be ++changed by setting quota_is_inclusive false. When this is done, the check for ++exceeding the quota does not include the current message. Thus, deliveries ++continue until the quota has been exceeded; thereafter, no further messages are ++delivered. See also quota_warn_threshold. ++ +++------------------------------------------------------------+ ++|quota_directory|Use: appendfile|Type: string*|Default: unset| +++------------------------------------------------------------+ ++ ++This option defines the directory to check for quota purposes when delivering ++into individual files. The default is the delivery directory, or, if a file ++called maildirfolder exists in a maildir directory, the parent of the delivery ++directory. ++ +++--------------------------------------------------------+ ++|quota_filecount|Use: appendfile|Type: string*|Default: 0| +++--------------------------------------------------------+ ++ ++This option applies when the directory option is set. It limits the total ++number of files in the directory (compare the inode limit in system quotas). It ++can only be used if quota is also set. The value is expanded; an expansion ++failure causes delivery to be deferred. A value of zero is interpreted as "no ++quota". ++ +++--------------------------------------------------------------+ ++|quota_is_inclusive|Use: appendfile|Type: boolean|Default: true| +++--------------------------------------------------------------+ ++ ++See quota above. ++ +++------------------------------------------------------------+ ++|quota_size_regex|Use: appendfile|Type: string|Default: unset| +++------------------------------------------------------------+ ++ ++This option applies when one of the delivery modes that writes a separate file ++for each message is being used. When Exim wants to find the size of one of ++these files in order to test the quota, it first checks quota_size_regex. If ++this is set to a regular expression that matches the file name, and it captures ++one string, that string is interpreted as a representation of the file's size. ++The value of quota_size_regex is not expanded. ++ ++This feature is useful only when users have no shell access to their mailboxes ++- otherwise they could defeat the quota simply by renaming the files. This ++facility can be used with maildir deliveries, by setting maildir_tag to add the ++file length to the file name. For example: ++ ++maildir_tag = ,S=$message_size ++quota_size_regex = ,S=(\d+) ++ ++An alternative to $message_size is $message_linecount, which contains the ++number of lines in the message. ++ ++The regular expression should not assume that the length is at the end of the ++file name (even though maildir_tag puts it there) because maildir MUAs ++sometimes add other information onto the ends of message file names. ++ ++Section 26.7 contains further information. ++ +++-------------------------------------------------------------------+ ++|quota_warn_message|Use: appendfile|Type: string*|Default: see below| +++-------------------------------------------------------------------+ ++ ++See below for the use of this option. If it is not set when ++quota_warn_threshold is set, it defaults to ++ ++quota_warn_message = "\ ++ To: $local_part@$domain\n\ ++ Subject: Your mailbox\n\n\ ++ This message is automatically created \ ++ by mail delivery software.\n\n\ ++ The size of your mailbox has exceeded \ ++ a warning threshold that is\n\ ++ set by the system administrator.\n" ++ +++-------------------------------------------------------------+ ++|quota_warn_threshold|Use: appendfile|Type: string*|Default: 0| +++-------------------------------------------------------------+ ++ ++This option is expanded in the same way as quota (see above). If the resulting ++value is greater than zero, and delivery of the message causes the size of the ++file or total space in the directory tree to cross the given threshold, a ++warning message is sent. If quota is also set, the threshold may be specified ++as a percentage of it by following the value with a percent sign. For example: ++ ++quota = 10M ++quota_warn_threshold = 75% ++ ++If quota is not set, a setting of quota_warn_threshold that ends with a percent ++sign is ignored. ++ ++The warning message itself is specified by the quota_warn_message option, and ++it must start with a To: header line containing the recipient(s) of the warning ++message. These do not necessarily have to include the recipient(s) of the ++original message. A Subject: line should also normally be supplied. You can ++include any other header lines that you want. If you do not include a From: ++line, the default is: ++ ++From: Mail Delivery System <mailer-daemon@$qualify_domain_sender> ++ ++If you supply a Reply-To: line, it overrides the global errors_reply_to option. ++ ++The quota option does not have to be set in order to use this option; they are ++independent of one another except when the threshold is specified as a ++percentage. ++ +++------------------------------------------------------+ ++|use_bsmtp|Use: appendfile|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++If this option is set true, appendfile writes messages in "batch SMTP" format, ++with the envelope sender and recipient(s) included as SMTP commands. If you ++want to include a leading HELO command with such messages, you can do so by ++setting the message_prefix option. See section 47.10 for details of batch SMTP. ++ +++-----------------------------------------------------+ ++|use_crlf|Use: appendfile|Type: boolean|Default: false| +++-----------------------------------------------------+ ++ ++This option causes lines to be terminated with the two-character CRLF sequence ++(carriage return, linefeed) instead of just a linefeed character. In the case ++of batched SMTP, the byte sequence written to the file is then an exact image ++of what would be sent down a real SMTP connection. ++ ++Note: The contents of the message_prefix and message_suffix options (which are ++used to supply the traditional "From " and blank line separators in ++Berkeley-style mailboxes) are written verbatim, so must contain their own ++carriage return characters if these are needed. In cases where these options ++have non-empty defaults, the values end with a single linefeed, so they must be ++changed to end with "\r\n" if use_crlf is set. ++ +++---------------------------------------------------------------+ ++|use_fcntl_lock|Use: appendfile|Type: boolean|Default: see below| +++---------------------------------------------------------------+ ++ ++This option controls the use of the fcntl() function to lock a file for ++exclusive use when a message is being appended. It is set by default unless ++use_flock_lock is set. Otherwise, it should be turned off only if you know that ++all your MUAs use lock file locking. When both use_fcntl_lock and ++use_flock_lock are unset, use_lockfile must be set. ++ +++-----------------------------------------------------------+ ++|use_flock_lock|Use: appendfile|Type: boolean|Default: false| +++-----------------------------------------------------------+ ++ ++This option is provided to support the use of flock() for file locking, for the ++few situations where it is needed. Most modern operating systems support fcntl ++() and lockf() locking, and these two functions interwork with each other. Exim ++uses fcntl() locking by default. ++ ++This option is required only if you are using an operating system where flock() ++is used by programs that access mailboxes (typically MUAs), and where flock() ++does not correctly interwork with fcntl(). You can use both fcntl() and flock() ++locking simultaneously if you want. ++ ++Not all operating systems provide flock(). Some versions of Solaris do not have ++it (and some, I think, provide a not quite right version built on top of lockf ++()). If the OS does not have flock(), Exim will be built without the ability to ++use it, and any attempt to do so will cause a configuration error. ++ ++Warning: flock() locks do not work on NFS files (unless flock() is just being ++mapped onto fcntl() by the OS). ++ +++-------------------------------------------------------------+ ++|use_lockfile|Use: appendfile|Type: boolean|Default: see below| +++-------------------------------------------------------------+ ++ ++If this option is turned off, Exim does not attempt to create a lock file when ++appending to a mailbox file. In this situation, the only locking is by fcntl(). ++You should only turn use_lockfile off if you are absolutely sure that every MUA ++that is ever going to look at your users' mailboxes uses fcntl() rather than a ++lock file, and even then only when you are not delivering over NFS from more ++than one host. ++ ++In order to append to an NFS file safely from more than one host, it is ++necessary to take out a lock before opening the file, and the lock file ++achieves this. Otherwise, even with fcntl() locking, there is a risk of file ++corruption. ++ ++The use_lockfile option is set by default unless use_mbx_lock is set. It is not ++possible to turn both use_lockfile and use_fcntl_lock off, except when ++mbx_format is set. ++ +++-------------------------------------------------------------+ ++|use_mbx_lock|Use: appendfile|Type: boolean|Default: see below| +++-------------------------------------------------------------+ ++ ++This option is available only if Exim has been compiled with SUPPORT_MBX set in ++Local/Makefile. Setting the option specifies that special MBX locking rules be ++used. It is set by default if mbx_format is set and none of the locking options ++are mentioned in the configuration. The locking rules are the same as are used ++by the c-client library that underlies Pine and the IMAP4 and POP daemons that ++come with it (see the discussion below). The rules allow for shared access to ++the mailbox. However, this kind of locking does not work when the mailbox is ++NFS mounted. ++ ++You can set use_mbx_lock with either (or both) of use_fcntl_lock and ++use_flock_lock to control what kind of locking is used in implementing the MBX ++locking rules. The default is to use fcntl() if use_mbx_lock is set without ++use_fcntl_lock or use_flock_lock. ++ ++ ++26.3 Operational details for appending ++-------------------------------------- ++ ++Before appending to a file, the following preparations are made: ++ ++ * If the name of the file is /dev/null, no action is taken, and a success ++ return is given. ++ ++ * If any directories on the file's path are missing, Exim creates them if the ++ create_directory option is set. A created directory's mode is given by the ++ directory_mode option. ++ ++ * If file_format is set, the format of an existing file is checked. If this ++ indicates that a different transport should be used, control is passed to ++ that transport. ++ ++ * If use_lockfile is set, a lock file is built in a way that will work ++ reliably over NFS, as follows: ++ ++ 1. Create a "hitching post" file whose name is that of the lock file with ++ the current time, primary host name, and process id added, by opening ++ for writing as a new file. If this fails with an access error, delivery ++ is deferred. ++ ++ 2. Close the hitching post file, and hard link it to the lock file name. ++ ++ 3. If the call to link() succeeds, creation of the lock file has ++ succeeded. Unlink the hitching post name. ++ ++ 4. Otherwise, use stat() to get information about the hitching post file, ++ and then unlink hitching post name. If the number of links is exactly ++ two, creation of the lock file succeeded but something (for example, an ++ NFS server crash and restart) caused this fact not to be communicated ++ to the link() call. ++ ++ 5. If creation of the lock file failed, wait for lock_interval and try ++ again, up to lock_retries times. However, since any program that writes ++ to a mailbox should complete its task very quickly, it is reasonable to ++ time out old lock files that are normally the result of user agent and ++ system crashes. If an existing lock file is older than lockfile_timeout ++ Exim attempts to unlink it before trying again. ++ ++ * A call is made to lstat() to discover whether the main file exists, and if ++ so, what its characteristics are. If lstat() fails for any reason other ++ than non-existence, delivery is deferred. ++ ++ * If the file does exist and is a symbolic link, delivery is deferred, unless ++ the allow_symlink option is set, in which case the ownership of the link is ++ checked, and then stat() is called to find out about the real file, which ++ is then subjected to the checks below. The check on the top-level link ++ ownership prevents one user creating a link for another's mailbox in a ++ sticky directory, though allowing symbolic links in this case is definitely ++ not a good idea. If there is a chain of symbolic links, the intermediate ++ ones are not checked. ++ ++ * If the file already exists but is not a regular file, or if the file's ++ owner and group (if the group is being checked - see check_group above) are ++ different from the user and group under which the delivery is running, ++ delivery is deferred. ++ ++ * If the file's permissions are more generous than specified, they are ++ reduced. If they are insufficient, delivery is deferred, unless ++ mode_fail_narrower is set false, in which case the delivery is tried using ++ the existing permissions. ++ ++ * The file's inode number is saved, and the file is then opened for ++ appending. If this fails because the file has vanished, appendfile behaves ++ as if it hadn't existed (see below). For any other failures, delivery is ++ deferred. ++ ++ * If the file is opened successfully, check that the inode number hasn't ++ changed, that it is still a regular file, and that the owner and ++ permissions have not changed. If anything is wrong, defer delivery and ++ freeze the message. ++ ++ * If the file did not exist originally, defer delivery if the file_must_exist ++ option is set. Otherwise, check that the file is being created in a ++ permitted directory if the create_file option is set (deferring on ++ failure), and then open for writing as a new file, with the O_EXCL and ++ O_CREAT options, except when dealing with a symbolic link (the ++ allow_symlink option must be set). In this case, which can happen if the ++ link points to a non-existent file, the file is opened for writing using ++ O_CREAT but not O_EXCL, because that prevents link following. ++ ++ * If opening fails because the file exists, obey the tests given above for ++ existing files. However, to avoid looping in a situation where the file is ++ being continuously created and destroyed, the exists/not-exists loop is ++ broken after 10 repetitions, and the message is then frozen. ++ ++ * If opening fails with any other error, defer delivery. ++ ++ * Once the file is open, unless both use_fcntl_lock and use_flock_lock are ++ false, it is locked using fcntl() or flock() or both. If use_mbx_lock is ++ false, an exclusive lock is requested in each case. However, if ++ use_mbx_lock is true, Exim takes out a shared lock on the open file, and an ++ exclusive lock on the file whose name is ++ ++ /tmp/.<device-number>.<inode-number> ++ ++ using the device and inode numbers of the open mailbox file, in accordance ++ with the MBX locking rules. This file is created with a mode that is ++ specified by the lockfile_mode option. ++ ++ If Exim fails to lock the file, there are two possible courses of action, ++ depending on the value of the locking timeout. This is obtained from ++ lock_fcntl_timeout or lock_flock_timeout, as appropriate. ++ ++ If the timeout value is zero, the file is closed, Exim waits for ++ lock_interval, and then goes back and re-opens the file as above and tries ++ to lock it again. This happens up to lock_retries times, after which the ++ delivery is deferred. ++ ++ If the timeout has a value greater than zero, blocking calls to fcntl() or ++ flock() are used (with the given timeout), so there has already been some ++ waiting involved by the time locking fails. Nevertheless, Exim does not ++ give up immediately. It retries up to ++ ++ (lock_retries * lock_interval) / <timeout> ++ ++ times (rounded up). ++ ++At the end of delivery, Exim closes the file (which releases the fcntl() and/or ++flock() locks) and then deletes the lock file if one was created. ++ ++ ++26.4 Operational details for delivery to a new file ++--------------------------------------------------- ++ ++When the directory option is set instead of file, each message is delivered ++into a newly-created file or set of files. When appendfile is activated ++directly from a redirect router, neither file nor directory is normally set, ++because the path for delivery is supplied by the router. (See for example, the ++address_file transport in the default configuration.) In this case, delivery is ++to a new file if either the path name ends in "/", or the maildir_format or ++mailstore_format option is set. ++ ++No locking is required while writing the message to a new file, so the various ++locking options of the transport are ignored. The "From" line that by default ++separates messages in a single file is not normally needed, nor is the escaping ++of message lines that start with "From", and there is no need to ensure a ++newline at the end of each message. Consequently, the default values for ++check_string, message_prefix, and message_suffix are all unset when any of ++directory, maildir_format, or mailstore_format is set. ++ ++If Exim is required to check a quota setting, it adds up the sizes of all the ++files in the delivery directory by default. However, you can specify a ++different directory by setting quota_directory. Also, for maildir deliveries ++(see below) the maildirfolder convention is honoured. ++ ++There are three different ways in which delivery to individual files can be ++done, controlled by the settings of the maildir_format and mailstore_format ++options. Note that code to support maildir or mailstore formats is not included ++in the binary unless SUPPORT_MAILDIR or SUPPORT_MAILSTORE, respectively, is set ++in Local/Makefile. ++ ++In all three cases an attempt is made to create the directory and any necessary ++sub-directories if they do not exist, provided that the create_directory option ++is set (the default). The location of a created directory can be constrained by ++setting create_file. A created directory's mode is given by the directory_mode ++option. If creation fails, or if the create_directory option is not set when ++creation is required, delivery is deferred. ++ ++ ++26.5 Maildir delivery ++--------------------- ++ ++If the maildir_format option is true, Exim delivers each message by writing it ++to a file whose name is tmp/<stime>.H<mtime>P<pid>.<host> in the directory that ++is defined by the directory option (the "delivery directory"). If the delivery ++is successful, the file is renamed into the new subdirectory. ++ ++In the file name, <stime> is the current time of day in seconds, and <mtime> is ++the microsecond fraction of the time. After a maildir delivery, Exim checks ++that the time-of-day clock has moved on by at least one microsecond before ++terminating the delivery process. This guarantees uniqueness for the file name. ++However, as a precaution, Exim calls stat() for the file before opening it. If ++any response other than ENOENT (does not exist) is given, Exim waits 2 seconds ++and tries again, up to maildir_retries times. ++ ++Before Exim carries out a maildir delivery, it ensures that subdirectories ++called new, cur, and tmp exist in the delivery directory. If they do not exist, ++Exim tries to create them and any superior directories in their path, subject ++to the create_directory and create_file options. If the ++maildirfolder_create_regex option is set, and the regular expression it ++contains matches the delivery directory, Exim also ensures that a file called ++maildirfolder exists in the delivery directory. If a missing directory or ++maildirfolder file cannot be created, delivery is deferred. ++ ++These features make it possible to use Exim to create all the necessary files ++and directories in a maildir mailbox, including subdirectories for maildir++ ++folders. Consider this example: ++ ++maildir_format = true ++directory = /var/mail/$local_part\ ++ ${if eq{$local_part_suffix}{}{}\ ++ {/.${substr_1:$local_part_suffix}}} ++maildirfolder_create_regex = /\.[^/]+$ ++ ++If $local_part_suffix is empty (there was no suffix for the local part), ++delivery is into a toplevel maildir with a name like /var/mail/pimbo (for the ++user called pimbo). The pattern in maildirfolder_create_regex does not match ++this name, so Exim will not look for or create the file /var/mail/pimbo/ ++maildirfolder, though it will create /var/mail/pimbo/{cur,new,tmp} if ++necessary. ++ ++However, if $local_part_suffix contains "-eximusers" (for example), delivery is ++into the maildir++ folder /var/mail/pimbo/.eximusers, which does match ++maildirfolder_create_regex. In this case, Exim will create /var/mail/pimbo ++/.eximusers/maildirfolder as well as the three maildir directories /var/mail/ ++pimbo/.eximusers/{cur,new,tmp}. ++ ++Warning: Take care when setting maildirfolder_create_regex that it does not ++inadvertently match the toplevel maildir directory, because a maildirfolder ++file at top level would completely break quota calculations. ++ ++If Exim is required to check a quota setting before a maildir delivery, and ++quota_directory is not set, it looks for a file called maildirfolder in the ++maildir directory (alongside new, cur, tmp). If this exists, Exim assumes the ++directory is a maildir++ folder directory, which is one level down from the ++user's top level mailbox directory. This causes it to start at the parent ++directory instead of the current directory when calculating the amount of space ++used. ++ ++One problem with delivering into a multi-file mailbox is that it is ++computationally expensive to compute the size of the mailbox for quota ++checking. Various approaches have been taken to reduce the amount of work ++needed. The next two sections describe two of them. A third alternative is to ++use some external process for maintaining the size data, and use the expansion ++of the mailbox_size option as a way of importing it into Exim. ++ ++ ++26.6 Using tags to record message sizes ++--------------------------------------- ++ ++If maildir_tag is set, the string is expanded for each delivery. When the ++maildir file is renamed into the new sub-directory, the tag is added to its ++name. However, if adding the tag takes the length of the name to the point ++where the test stat() call fails with ENAMETOOLONG, the tag is dropped and the ++maildir file is created with no tag. ++ ++Tags can be used to encode the size of files in their names; see ++quota_size_regex above for an example. The expansion of maildir_tag happens ++after the message has been written. The value of the $message_size variable is ++set to the number of bytes actually written. If the expansion is forced to ++fail, the tag is ignored, but a non-forced failure causes delivery to be ++deferred. The expanded tag may contain any printing characters except "/". ++Non-printing characters in the string are ignored; if the resulting string is ++empty, it is ignored. If it starts with an alphanumeric character, a leading ++colon is inserted; this default has not proven to be the path that popular ++maildir implementations have chosen (but changing it in Exim would break ++backwards compatibility). ++ ++For one common implementation, you might set: ++ ++maildir_tag = ,S=${message_size} ++ ++but you should check the documentation of the other software to be sure. ++ ++It is advisable to also set quota_size_regex when setting maildir_tag as this ++allows Exim to extract the size from your tag, instead of having to stat() each ++message file. ++ ++ ++26.7 Using a maildirsize file ++----------------------------- ++ ++If maildir_use_size_file is true, Exim implements the maildir++ rules for ++storing quota and message size information in a file called maildirsize within ++the toplevel maildir directory. If this file does not exist, Exim creates it, ++setting the quota from the quota option of the transport. If the maildir ++directory itself does not exist, it is created before any attempt to write a ++maildirsize file. ++ ++The maildirsize file is used to hold information about the sizes of messages in ++the maildir, thus speeding up quota calculations. The quota value in the file ++is just a cache; if the quota is changed in the transport, the new value ++overrides the cached value when the next message is delivered. The cache is ++maintained for the benefit of other programs that access the maildir and need ++to know the quota. ++ ++If the quota option in the transport is unset or zero, the maildirsize file is ++maintained (with a zero quota setting), but no quota is imposed. ++ ++A regular expression is available for controlling which directories in the ++maildir participate in quota calculations when a maildirsizefile is in use. See ++the description of the maildir_quota_directory_regex option above for details. ++ ++ ++26.8 Mailstore delivery ++----------------------- ++ ++If the mailstore_format option is true, each message is written as two files in ++the given directory. A unique base name is constructed from the message id and ++the current delivery process, and the files that are written use this base name ++plus the suffixes .env and .msg. The .env file contains the message's envelope, ++and the .msg file contains the message itself. The base name is placed in the ++variable $mailstore_basename. ++ ++During delivery, the envelope is first written to a file with the suffix .tmp. ++The .msg file is then written, and when it is complete, the .tmp file is ++renamed as the .env file. Programs that access messages in mailstore format ++should wait for the presence of both a .msg and a .env file before accessing ++either of them. An alternative approach is to wait for the absence of a .tmp ++file. ++ ++The envelope file starts with any text defined by the mailstore_prefix option, ++expanded and terminated by a newline if there isn't one. Then follows the ++sender address on one line, then all the recipient addresses, one per line. ++There can be more than one recipient only if the batch_max option is set ++greater than one. Finally, mailstore_suffix is expanded and the result appended ++to the file, followed by a newline if it does not end with one. ++ ++If expansion of mailstore_prefix or mailstore_suffix ends with a forced ++failure, it is ignored. Other expansion errors are treated as serious ++configuration errors, and delivery is deferred. The variable ++$mailstore_basename is available for use during these expansions. ++ ++ ++26.9 Non-special new file delivery ++---------------------------------- ++ ++If neither maildir_format nor mailstore_format is set, a single new file is ++created directly in the named directory. For example, when delivering messages ++into files in batched SMTP format for later delivery to some host (see section ++47.10), a setting such as ++ ++directory = /var/bsmtp/$host ++ ++might be used. A message is written to a file with a temporary name, which is ++then renamed when the delivery is complete. The final name is obtained by ++expanding the contents of the directory_file option. ++ ++ ++ ++=============================================================================== ++27. THE AUTOREPLY TRANSPORT ++ ++The autoreply transport is not a true transport in that it does not cause the ++message to be transmitted. Instead, it generates a new mail message as an ++automatic reply to the incoming message. References: and Auto-Submitted: header ++lines are included. These are constructed according to the rules in RFCs 2822 ++and 3834, respectively. ++ ++If the router that passes the message to this transport does not have the ++unseen option set, the original message (for the current recipient) is not ++delivered anywhere. However, when the unseen option is set on the router that ++passes the message to this transport, routing of the address continues, so ++another router can set up a normal message delivery. ++ ++The autoreply transport is usually run as the result of mail filtering, a ++"vacation" message being the standard example. However, it can also be run ++directly from a router like any other transport. To reduce the possibility of ++message cascades, messages created by the autoreply transport always have empty ++envelope sender addresses, like bounce messages. ++ ++The parameters of the message to be sent can be specified in the configuration ++by options described below. However, these are used only when the address ++passed to the transport does not contain its own reply information. When the ++transport is run as a consequence of a mail or vacation command in a filter ++file, the parameters of the message are supplied by the filter, and passed with ++the address. The transport's options that define the message are then ignored ++(so they are not usually set in this case). The message is specified entirely ++by the filter or by the transport; it is never built from a mixture of options. ++However, the file_optional, mode, and return_message options apply in all ++cases. ++ ++Autoreply is implemented as a local transport. When used as a result of a ++command in a user's filter file, autoreply normally runs under the uid and gid ++of the user, and with appropriate current and home directories (see chapter 23 ++). ++ ++There is a subtle difference between routing a message to a pipe transport that ++generates some text to be returned to the sender, and routing it to an ++autoreply transport. This difference is noticeable only if more than one ++address from the same message is so handled. In the case of a pipe, the ++separate outputs from the different addresses are gathered up and returned to ++the sender in a single message, whereas if autoreply is used, a separate ++message is generated for each address that is passed to it. ++ ++Non-printing characters are not permitted in the header lines generated for the ++message that autoreply creates, with the exception of newlines that are ++immediately followed by white space. If any non-printing characters are found, ++the transport defers. Whether characters with the top bit set count as printing ++characters or not is controlled by the print_topbitchars global option. ++ ++If any of the generic options for manipulating headers (for example, ++headers_add) are set on an autoreply transport, they apply to the copy of the ++original message that is included in the generated message when return_message ++is set. They do not apply to the generated message itself. ++ ++If the autoreply transport receives return code 2 from Exim when it submits the ++message, indicating that there were no recipients, it does not treat this as an ++error. This means that autoreplies sent to $sender_address when this is empty ++(because the incoming message is a bounce message) do not cause problems. They ++are just discarded. ++ ++ ++27.1 Private options for autoreply ++---------------------------------- ++ +++-----------------------------------------------+ ++|bcc|Use: autoreply|Type: string*|Default: unset| +++-----------------------------------------------+ ++ ++This specifies the addresses that are to receive "blind carbon copies" of the ++message when the message is specified by the transport. ++ +++----------------------------------------------+ ++|cc|Use: autoreply|Type: string*|Default: unset| +++----------------------------------------------+ ++ ++This specifies recipients of the message and the contents of the Cc: header ++when the message is specified by the transport. ++ +++------------------------------------------------+ ++|file|Use: autoreply|Type: string*|Default: unset| +++------------------------------------------------+ ++ ++The contents of the file are sent as the body of the message when the message ++is specified by the transport. If both file and text are set, the text string ++comes first. ++ +++-------------------------------------------------------+ ++|file_expand|Use: autoreply|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++If this is set, the contents of the file named by the file option are subjected ++to string expansion as they are added to the message. ++ +++---------------------------------------------------------+ ++|file_optional|Use: autoreply|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is true, no error is generated if the file named by the file ++option or passed with the address does not exist or cannot be read. ++ +++------------------------------------------------+ ++|from|Use: autoreply|Type: string*|Default: unset| +++------------------------------------------------+ ++ ++This specifies the contents of the From: header when the message is specified ++by the transport. ++ +++---------------------------------------------------+ ++|headers|Use: autoreply|Type: string*|Default: unset| +++---------------------------------------------------+ ++ ++This specifies additional RFC 2822 headers that are to be added to the message ++when the message is specified by the transport. Several can be given by using " ++\n" to separate them. There is no check on the format. ++ +++-----------------------------------------------+ ++|log|Use: autoreply|Type: string*|Default: unset| +++-----------------------------------------------+ ++ ++This option names a file in which a record of every message sent is logged when ++the message is specified by the transport. ++ +++-----------------------------------------------------+ ++|mode|Use: autoreply|Type: octal integer|Default: 0600| +++-----------------------------------------------------+ ++ ++If either the log file or the "once" file has to be created, this mode is used. ++ +++------------------------------------------------------------+ ++|never_mail|Use: autoreply|Type: address list*|Default: unset| +++------------------------------------------------------------+ ++ ++If any run of the transport creates a message with a recipient that matches any ++item in the list, that recipient is quietly discarded. If all recipients are ++discarded, no message is created. This applies both when the recipients are ++generated by a filter and when they are specified in the transport. ++ +++------------------------------------------------+ ++|once|Use: autoreply|Type: string*|Default: unset| +++------------------------------------------------+ ++ ++This option names a file or DBM database in which a record of each To: ++recipient is kept when the message is specified by the transport. Note: This ++does not apply to Cc: or Bcc: recipients. ++ ++If once is unset, or is set to an empty string, the message is always sent. By ++default, if once is set to a non-empty file name, the message is not sent if a ++potential recipient is already listed in the database. However, if the ++once_repeat option specifies a time greater than zero, the message is sent if ++that much time has elapsed since a message was last sent to this recipient. A ++setting of zero time for once_repeat (the default) prevents a message from ++being sent a second time - in this case, zero means infinity. ++ ++If once_file_size is zero, a DBM database is used to remember recipients, and ++it is allowed to grow as large as necessary. If once_file_size is set greater ++than zero, it changes the way Exim implements the once option. Instead of using ++a DBM file to record every recipient it sends to, it uses a regular file, whose ++size will never get larger than the given value. ++ ++In the file, Exim keeps a linear list of recipient addresses and the times at ++which they were sent messages. If the file is full when a new address needs to ++be added, the oldest address is dropped. If once_repeat is not set, this means ++that a given recipient may receive multiple messages, but at unpredictable ++intervals that depend on the rate of turnover of addresses in the file. If ++once_repeat is set, it specifies a maximum time between repeats. ++ +++------------------------------------------------------+ ++|once_file_size|Use: autoreply|Type: integer|Default: 0| +++------------------------------------------------------+ ++ ++See once above. ++ +++--------------------------------------------------+ ++|once_repeat|Use: autoreply|Type: time*|Default: 0s| +++--------------------------------------------------+ ++ ++See once above. After expansion, the value of this option must be a valid time ++value. ++ +++----------------------------------------------------+ ++|reply_to|Use: autoreply|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This specifies the contents of the Reply-To: header when the message is ++specified by the transport. ++ +++----------------------------------------------------------+ ++|return_message|Use: autoreply|Type: boolean|Default: false| +++----------------------------------------------------------+ ++ ++If this is set, a copy of the original message is returned with the new ++message, subject to the maximum size set in the return_size_limit global ++configuration option. ++ +++---------------------------------------------------+ ++|subject|Use: autoreply|Type: string*|Default: unset| +++---------------------------------------------------+ ++ ++This specifies the contents of the Subject: header when the message is ++specified by the transport. It is tempting to quote the original subject in ++automatic responses. For example: ++ ++subject = Re: $h_subject: ++ ++There is a danger in doing this, however. It may allow a third party to ++subscribe your users to an opt-in mailing list, provided that the list accepts ++bounce messages as subscription confirmations. Well-managed lists require a ++non-bounce message to confirm a subscription, so the danger is relatively ++small. ++ +++------------------------------------------------+ ++|text|Use: autoreply|Type: string*|Default: unset| +++------------------------------------------------+ ++ ++This specifies a single string to be used as the body of the message when the ++message is specified by the transport. If both text and file are set, the text ++comes first. ++ +++----------------------------------------------+ ++|to|Use: autoreply|Type: string*|Default: unset| +++----------------------------------------------+ ++ ++This specifies recipients of the message and the contents of the To: header ++when the message is specified by the transport. ++ ++ ++ ++=============================================================================== ++28. THE LMTP TRANSPORT ++ ++The lmtp transport runs the LMTP protocol (RFC 2033) over a pipe to a specified ++command or by interacting with a Unix domain socket. This transport is ++something of a cross between the pipe and smtp transports. Exim also has ++support for using LMTP over TCP/IP; this is implemented as an option for the ++smtp transport. Because LMTP is expected to be of minority interest, the ++default build-time configure in src/EDITME has it commented out. You need to ++ensure that ++ ++TRANSPORT_LMTP=yes ++ ++is present in your Local/Makefile in order to have the lmtp transport included ++in the Exim binary. The private options of the lmtp transport are as follows: ++ +++-----------------------------------------------+ ++|batch_id|Use: lmtp|Type: string*|Default: unset| +++-----------------------------------------------+ ++ ++See the description of local delivery batching in chapter 25. ++ +++--------------------------------------------+ ++|batch_max|Use: lmtp|Type: integer|Default: 1| +++--------------------------------------------+ ++ ++This limits the number of addresses that can be handled in a single delivery. ++Most LMTP servers can handle several addresses at once, so it is normally a ++good idea to increase this value. See the description of local delivery ++batching in chapter 25. ++ +++----------------------------------------------+ ++|command|Use: lmtp|Type: string*|Default: unset| +++----------------------------------------------+ ++ ++This option must be set if socket is not set. The string is a command which is ++run in a separate process. It is split up into a command name and list of ++arguments, each of which is separately expanded (so expansion cannot change the ++number of arguments). The command is run directly, not via a shell. The message ++is passed to the new process using the standard input and output to operate the ++LMTP protocol. ++ +++---------------------------------------------------+ ++|ignore_quota|Use: lmtp|Type: boolean|Default: false| +++---------------------------------------------------+ ++ ++If this option is set true, the string "IGNOREQUOTA" is added to RCPT commands, ++provided that the LMTP server has advertised support for IGNOREQUOTA in its ++response to the LHLO command. ++ +++---------------------------------------------+ ++|socket|Use: lmtp|Type: string*|Default: unset| +++---------------------------------------------+ ++ ++This option must be set if command is not set. The result of expansion must be ++the name of a Unix domain socket. The transport connects to the socket and ++delivers the message to it using the LMTP protocol. ++ +++----------------------------------------+ ++|timeout|Use: lmtp|Type: time|Default: 5m| +++----------------------------------------+ ++ ++The transport is aborted if the created process or Unix domain socket does not ++respond to LMTP commands or message input within this timeout. Delivery is ++deferred, and will be tried again later. Here is an example of a typical LMTP ++transport: ++ ++lmtp: ++ driver = lmtp ++ command = /some/local/lmtp/delivery/program ++ batch_max = 20 ++ user = exim ++ ++This delivers up to 20 addresses at a time, in a mixture of domains if ++necessary, running as the user exim. ++ ++ ++ ++=============================================================================== ++29. THE PIPE TRANSPORT ++ ++The pipe transport is used to deliver messages via a pipe to a command running ++in another process. One example is the use of pipe as a pseudo-remote transport ++for passing messages to some other delivery mechanism (such as UUCP). Another ++is the use by individual users to automatically process their incoming ++messages. The pipe transport can be used in one of the following ways: ++ ++ * A router routes one address to a transport in the normal way, and the ++ transport is configured as a pipe transport. In this case, $local_part ++ contains the local part of the address (as usual), and the command that is ++ run is specified by the command option on the transport. ++ ++ * If the batch_max option is set greater than 1 (the default is 1), the ++ transport can handle more than one address in a single run. In this case, ++ when more than one address is routed to the transport, $local_part is not ++ set (because it is not unique). However, the pseudo-variable ++ $pipe_addresses (described in section 29.3 below) contains all the ++ addresses that are routed to the transport. ++ ++ * A router redirects an address directly to a pipe command (for example, from ++ an alias or forward file). In this case, $address_pipe contains the text of ++ the pipe command, and the command option on the transport is ignored unless ++ force_command is set. If only one address is being transported (batch_max ++ is not greater than one, or only one address was redirected to this pipe ++ command), $local_part contains the local part that was redirected. ++ ++The pipe transport is a non-interactive delivery method. Exim can also deliver ++messages over pipes using the LMTP interactive protocol. This is implemented by ++the lmtp transport. ++ ++In the case when pipe is run as a consequence of an entry in a local user's ++.forward file, the command runs under the uid and gid of that user. In other ++cases, the uid and gid have to be specified explicitly, either on the transport ++or on the router that handles the address. Current and "home" directories are ++also controllable. See chapter 23 for details of the local delivery environment ++and chapter 25 for a discussion of local delivery batching. ++ ++ ++29.1 Concurrent delivery ++------------------------ ++ ++If two messages arrive at almost the same time, and both are routed to a pipe ++delivery, the two pipe transports may be run concurrently. You must ensure that ++any pipe commands you set up are robust against this happening. If the commands ++write to a file, the exim_lock utility might be of use. ++ ++ ++29.2 Returned status and data ++----------------------------- ++ ++If the command exits with a non-zero return code, the delivery is deemed to ++have failed, unless either the ignore_status option is set (in which case the ++return code is treated as zero), or the return code is one of those listed in ++the temp_errors option, which are interpreted as meaning "try again later". In ++this case, delivery is deferred. Details of a permanent failure are logged, but ++are not included in the bounce message, which merely contains "local delivery ++failed". ++ ++If the command exits on a signal and the freeze_signal option is set then the ++message will be frozen in the queue. If that option is not set, a bounce will ++be sent as normal. ++ ++If the return code is greater than 128 and the command being run is a shell ++script, it normally means that the script was terminated by a signal whose ++value is the return code minus 128. The freeze_signal option does not apply in ++this case. ++ ++If Exim is unable to run the command (that is, if execve() fails), the return ++code is set to 127. This is the value that a shell returns if it is asked to ++run a non-existent command. The wording for the log line suggests that a ++non-existent command may be the problem. ++ ++The return_output option can affect the result of a pipe delivery. If it is set ++and the command produces any output on its standard output or standard error ++streams, the command is considered to have failed, even if it gave a zero ++return code or if ignore_status is set. The output from the command is included ++as part of the bounce message. The return_fail_output option is similar, except ++that output is returned only when the command exits with a failure return code, ++that is, a value other than zero or a code that matches temp_errors. ++ ++ ++29.3 How the command is run ++--------------------------- ++ ++The command line is (by default) broken down into a command name and arguments ++by the pipe transport itself. The allow_commands and restrict_to_path options ++can be used to restrict the commands that may be run. ++ ++Unquoted arguments are delimited by white space. If an argument appears in ++double quotes, backslash is interpreted as an escape character in the usual ++way. If an argument appears in single quotes, no escaping is done. ++ ++String expansion is applied to the command line except when it comes from a ++traditional .forward file (commands from a filter file are expanded). The ++expansion is applied to each argument in turn rather than to the whole line. ++For this reason, any string expansion item that contains white space must be ++quoted so as to be contained within a single argument. A setting such as ++ ++command = /some/path ${if eq{$local_part}{postmaster}{xx}{yy}} ++ ++will not work, because the expansion item gets split between several arguments. ++You have to write ++ ++command = /some/path "${if eq{$local_part}{postmaster}{xx}{yy}}" ++ ++to ensure that it is all in one argument. The expansion is done in this way, ++argument by argument, so that the number of arguments cannot be changed as a ++result of expansion, and quotes or backslashes in inserted variables do not ++interact with external quoting. However, this leads to problems if you want to ++generate multiple arguments (or the command name plus arguments) from a single ++expansion. In this situation, the simplest solution is to use a shell. For ++example: ++ ++command = /bin/sh -c ${lookup{$local_part}lsearch{/some/file}} ++ ++Special handling takes place when an argument consists of precisely the text ++"$pipe_addresses". This is not a general expansion variable; the only place ++this string is recognized is when it appears as an argument for a pipe or ++transport filter command. It causes each address that is being handled to be ++inserted in the argument list at that point as a separate argument. This avoids ++any problems with spaces or shell metacharacters, and is of use when a pipe ++transport is handling groups of addresses in a batch. ++ ++If force_command is enabled on the transport, Special handling takes place for ++an argument that consists of precisely the text "$address_pipe". It is handled ++similarly to $pipe_addresses above. It is expanded and each argument is ++inserted in the argument list at that point as a separate argument. The ++"$address_pipe" item does not need to be the only item in the argument; in ++fact, if it were then force_command should behave as a no-op. Rather, it should ++be used to adjust the command run while preserving the argument vector ++separation. ++ ++After splitting up into arguments and expansion, the resulting command is run ++in a subprocess directly from the transport, not under a shell. The message ++that is being delivered is supplied on the standard input, and the standard ++output and standard error are both connected to a single pipe that is read by ++Exim. The max_output option controls how much output the command may produce, ++and the return_output and return_fail_output options control what is done with ++it. ++ ++Not running the command under a shell (by default) lessens the security risks ++in cases when a command from a user's filter file is built out of data that was ++taken from an incoming message. If a shell is required, it can of course be ++explicitly specified as the command to be run. However, there are circumstances ++where existing commands (for example, in .forward files) expect to be run under ++a shell and cannot easily be modified. To allow for these cases, there is an ++option called use_shell, which changes the way the pipe transport works. ++Instead of breaking up the command line as just described, it expands it as a ++single string and passes the result to /bin/sh. The restrict_to_path option and ++the $pipe_addresses facility cannot be used with use_shell, and the whole ++mechanism is inherently less secure. ++ ++ ++29.4 Environment variables ++-------------------------- ++ ++The environment variables listed below are set up when the command is invoked. ++This list is a compromise for maximum compatibility with other MTAs. Note that ++the environment option can be used to add additional variables to this ++environment. ++ ++DOMAIN the domain of the address ++HOME the home directory, if set ++HOST the host name when called from a router (see below) ++LOCAL_PART see below ++LOCAL_PART_PREFIX see below ++LOCAL_PART_SUFFIX see below ++LOGNAME see below ++MESSAGE_ID Exim's local ID for the message ++PATH as specified by the path option below ++QUALIFY_DOMAIN the sender qualification domain ++RECIPIENT the complete recipient address ++SENDER the sender of the message (empty if a bounce) ++SHELL /bin/sh ++TZ the value of the timezone option, if set ++USER see below ++ ++When a pipe transport is called directly from (for example) an accept router, ++LOCAL_PART is set to the local part of the address. When it is called as a ++result of a forward or alias expansion, LOCAL_PART is set to the local part of ++the address that was expanded. In both cases, any affixes are removed from the ++local part, and made available in LOCAL_PART_PREFIX and LOCAL_PART_SUFFIX, ++respectively. LOGNAME and USER are set to the same value as LOCAL_PART for ++compatibility with other MTAs. ++ ++HOST is set only when a pipe transport is called from a router that associates ++hosts with an address, typically when using pipe as a pseudo-remote transport. ++HOST is set to the first host name specified by the router. ++ ++If the transport's generic home_directory option is set, its value is used for ++the HOME environment variable. Otherwise, a home directory may be set by the ++router's transport_home_directory option, which defaults to the user's home ++directory if check_local_user is set. ++ ++ ++29.5 Private options for pipe ++----------------------------- ++ +++----------------------------------------------------------+ ++|allow_commands|Use: pipe|Type: string list*|Default: unset| +++----------------------------------------------------------+ ++ ++The string is expanded, and is then interpreted as a colon-separated list of ++permitted commands. If restrict_to_path is not set, the only commands permitted ++are those in the allow_commands list. They need not be absolute paths; the path ++option is still used for relative paths. If restrict_to_path is set with ++allow_commands, the command must either be in the allow_commands list, or a ++name without any slashes that is found on the path. In other words, if neither ++allow_commands nor restrict_to_path is set, there is no restriction on the ++command, but otherwise only commands that are permitted by one or the other are ++allowed. For example, if ++ ++allow_commands = /usr/bin/vacation ++ ++and restrict_to_path is not set, the only permitted command is /usr/bin/ ++vacation. The allow_commands option may not be set if use_shell is set. ++ +++-----------------------------------------------+ ++|batch_id|Use: pipe|Type: string*|Default: unset| +++-----------------------------------------------+ ++ ++See the description of local delivery batching in chapter 25. ++ +++--------------------------------------------+ ++|batch_max|Use: pipe|Type: integer|Default: 1| +++--------------------------------------------+ ++ ++This limits the number of addresses that can be handled in a single delivery. ++See the description of local delivery batching in chapter 25. ++ +++--------------------------------------------------+ ++|check_string|Use: pipe|Type: string|Default: unset| +++--------------------------------------------------+ ++ ++As pipe writes the message, the start of each line is tested for matching ++check_string, and if it does, the initial matching characters are replaced by ++the contents of escape_string, provided both are set. The value of check_string ++is a literal string, not a regular expression, and the case of any letters it ++contains is significant. When use_bsmtp is set, the contents of check_string ++and escape_string are forced to values that implement the SMTP escaping ++protocol. Any settings made in the configuration file are ignored. ++ +++----------------------------------------------+ ++|command|Use: pipe|Type: string*|Default: unset| +++----------------------------------------------+ ++ ++This option need not be set when pipe is being used to deliver to pipes ++obtained directly from address redirections. In other cases, the option must be ++set, to provide a command to be run. It need not yield an absolute path (see ++the path option below). The command is split up into separate arguments by ++Exim, and each argument is separately expanded, as described in section 29.3 ++above. ++ +++--------------------------------------------------+ ++|environment|Use: pipe|Type: string*|Default: unset| +++--------------------------------------------------+ ++ ++This option is used to add additional variables to the environment in which the ++command runs (see section 29.4 for the default list). Its value is a string ++which is expanded, and then interpreted as a colon-separated list of ++environment settings of the form <name>=<value>. ++ +++---------------------------------------------------+ ++|escape_string|Use: pipe|Type: string|Default: unset| +++---------------------------------------------------+ ++ ++See check_string above. ++ +++-------------------------------------------------------+ ++|freeze_exec_fail|Use: pipe|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++Failure to exec the command in a pipe transport is by default treated like any ++other failure while running the command. However, if freeze_exec_fail is set, ++failure to exec is treated specially, and causes the message to be frozen, ++whatever the setting of ignore_status. ++ +++----------------------------------------------------+ ++|freeze_signal|Use: pipe|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++Normally if the process run by a command in a pipe transport exits on a signal, ++a bounce message is sent. If freeze_signal is set, the message will be frozen ++in Exim's queue instead. ++ +++----------------------------------------------------+ ++|force_command|Use: pipe|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++Normally when a router redirects an address directly to a pipe command the ++command option on the transport is ignored. If force_command is set, the ++command option will used. This is especially useful for forcing a wrapper or ++additional argument to be added to the command. For example: ++ ++command = /usr/bin/remote_exec myhost -- $address_pipe ++force_command ++ ++Note that $address_pipe is handled specially in command when force_command is ++set, expanding out to the original argument vector as separate items, similarly ++to a Unix shell ""$@"" construct. ++ +++----------------------------------------------------+ ++|ignore_status|Use: pipe|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++If this option is true, the status returned by the subprocess that is set up to ++run the command is ignored, and Exim behaves as if zero had been returned. ++Otherwise, a non-zero status or termination by signal causes an error return ++from the transport unless the status value is one of those listed in ++temp_errors; these cause the delivery to be deferred and tried again later. ++ ++Note: This option does not apply to timeouts, which do not return a status. See ++the timeout_defer option for how timeouts are handled. ++ +++-------------------------------------------------------+ ++|log_defer_output|Use: pipe|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++If this option is set, and the status returned by the command is one of the ++codes listed in temp_errors (that is, delivery was deferred), and any output ++was produced, the first line of it is written to the main log. ++ +++------------------------------------------------------+ ++|log_fail_output|Use: pipe|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++If this option is set, and the command returns any output, and also ends with a ++return code that is neither zero nor one of the return codes listed in ++temp_errors (that is, the delivery failed), the first line of output is written ++to the main log. This option and log_output are mutually exclusive. Only one of ++them may be set. ++ +++-------------------------------------------------+ ++|log_output|Use: pipe|Type: boolean|Default: false| +++-------------------------------------------------+ ++ ++If this option is set and the command returns any output, the first line of ++output is written to the main log, whatever the return code. This option and ++log_fail_output are mutually exclusive. Only one of them may be set. ++ +++-----------------------------------------------+ ++|max_output|Use: pipe|Type: integer|Default: 20K| +++-----------------------------------------------+ ++ ++This specifies the maximum amount of output that the command may produce on its ++standard output and standard error file combined. If the limit is exceeded, the ++process running the command is killed. This is intended as a safety measure to ++catch runaway processes. The limit is applied independently of the settings of ++the options that control what is done with such output (for example, ++return_output). Because of buffering effects, the amount of output may exceed ++the limit by a small amount before Exim notices. ++ +++---------------------------------------------------------+ ++|message_prefix|Use: pipe|Type: string*|Default: see below| +++---------------------------------------------------------+ ++ ++The string specified here is expanded and output at the start of every message. ++The default is unset if use_bsmtp is set. Otherwise it is ++ ++message_prefix = \ ++ From ${if def:return_path{$return_path}{MAILER-DAEMON}}\ ++ ${tod_bsdinbox}\n ++ ++This is required by the commonly used /usr/bin/vacation program. However, it ++must not be present if delivery is to the Cyrus IMAP server, or to the tmail ++local delivery agent. The prefix can be suppressed by setting ++ ++message_prefix = ++ ++Note: If you set use_crlf true, you must change any occurrences of "\n" to "\r\ ++n" in message_prefix. ++ +++---------------------------------------------------------+ ++|message_suffix|Use: pipe|Type: string*|Default: see below| +++---------------------------------------------------------+ ++ ++The string specified here is expanded and output at the end of every message. ++The default is unset if use_bsmtp is set. Otherwise it is a single newline. The ++suffix can be suppressed by setting ++ ++message_suffix = ++ ++Note: If you set use_crlf true, you must change any occurrences of "\n" to "\r\ ++n" in message_suffix. ++ +++----------------------------------------------+ ++|path|Use: pipe|Type: string|Default: see below| +++----------------------------------------------+ ++ ++This option specifies the string that is set up in the PATH environment ++variable of the subprocess. The default is: ++ ++/bin:/usr/bin ++ ++If the command option does not yield an absolute path name, the command is ++sought in the PATH directories, in the usual way. Warning: This does not apply ++to a command specified as a transport filter. ++ +++------------------------------------------------------+ ++|permit_coredump|Use: pipe|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++Normally Exim inhibits core-dumps during delivery. If you have a need to get a ++core-dump of a pipe command, enable this command. This enables core-dumps ++during delivery and affects both the Exim binary and the pipe command run. It ++is recommended that this option remain off unless and until you have a need for ++it and that this only be enabled when needed, as the risk of excessive resource ++consumption can be quite high. Note also that Exim is typically installed as a ++setuid binary and most operating systems will inhibit coredumps of these by ++default, so further OS-specific action may be required. ++ +++------------------------------------------------------+ ++|pipe_as_creator|Use: pipe|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++If the generic user option is not set and this option is true, the delivery ++process is run under the uid that was in force when Exim was originally called ++to accept the message. If the group id is not otherwise set (via the generic ++group option), the gid that was in force when Exim was originally called to ++accept the message is used. ++ +++-------------------------------------------------------+ ++|restrict_to_path|Use: pipe|Type: boolean|Default: false| +++-------------------------------------------------------+ ++ ++When this option is set, any command name not listed in allow_commands must ++contain no slashes. The command is searched for only in the directories listed ++in the path option. This option is intended for use in the case when a pipe ++command has been generated from a user's .forward file. This is usually handled ++by a pipe transport called address_pipe. ++ +++---------------------------------------------------------+ ++|return_fail_output|Use: pipe|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If this option is true, and the command produced any output and ended with a ++return code other than zero or one of the codes listed in temp_errors (that is, ++the delivery failed), the output is returned in the bounce message. However, if ++the message has a null sender (that is, it is itself a bounce message), output ++from the command is discarded. This option and return_output are mutually ++exclusive. Only one of them may be set. ++ +++----------------------------------------------------+ ++|return_output|Use: pipe|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++If this option is true, and the command produced any output, the delivery is ++deemed to have failed whatever the return code from the command, and the output ++is returned in the bounce message. Otherwise, the output is just discarded. ++However, if the message has a null sender (that is, it is a bounce message), ++output from the command is always discarded, whatever the setting of this ++option. This option and return_fail_output are mutually exclusive. Only one of ++them may be set. ++ +++----------------------------------------------------------+ ++|temp_errors|Use: pipe|Type: string list|Default: see below| +++----------------------------------------------------------+ ++ ++This option contains either a colon-separated list of numbers, or a single ++asterisk. If ignore_status is false and return_output is not set, and the ++command exits with a non-zero return code, the failure is treated as temporary ++and the delivery is deferred if the return code matches one of the numbers, or ++if the setting is a single asterisk. Otherwise, non-zero return codes are ++treated as permanent errors. The default setting contains the codes defined by ++EX_TEMPFAIL and EX_CANTCREAT in sysexits.h. If Exim is compiled on a system ++that does not define these macros, it assumes values of 75 and 73, ++respectively. ++ +++----------------------------------------+ ++|timeout|Use: pipe|Type: time|Default: 1h| +++----------------------------------------+ ++ ++If the command fails to complete within this time, it is killed. This normally ++causes the delivery to fail (but see timeout_defer). A zero time interval ++specifies no timeout. In order to ensure that any subprocesses created by the ++command are also killed, Exim makes the initial process a process group leader, ++and kills the whole process group on a timeout. However, this can be defeated ++if one of the processes starts a new process group. ++ +++----------------------------------------------------+ ++|timeout_defer|Use: pipe|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++A timeout in a pipe transport, either in the command that the transport runs, ++or in a transport filter that is associated with it, is by default treated as a ++hard error, and the delivery fails. However, if timeout_defer is set true, both ++kinds of timeout become temporary errors, causing the delivery to be deferred. ++ +++------------------------------------------------+ ++|umask|Use: pipe|Type: octal integer|Default: 022| +++------------------------------------------------+ ++ ++This specifies the umask setting for the subprocess that runs the command. ++ +++------------------------------------------------+ ++|use_bsmtp|Use: pipe|Type: boolean|Default: false| +++------------------------------------------------+ ++ ++If this option is set true, the pipe transport writes messages in "batch SMTP" ++format, with the envelope sender and recipient(s) included as SMTP commands. If ++you want to include a leading HELO command with such messages, you can do so by ++setting the message_prefix option. See section 47.10 for details of batch SMTP. ++ +++---------------------------------------------------------+ ++|use_classresources|Use: pipe|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++This option is available only when Exim is running on FreeBSD, NetBSD, or BSD/ ++OS. If it is set true, the setclassresources() function is used to set resource ++limits when a pipe transport is run to perform a delivery. The limits for the ++uid under which the pipe is to run are obtained from the login class database. ++ +++-----------------------------------------------+ ++|use_crlf|Use: pipe|Type: boolean|Default: false| +++-----------------------------------------------+ ++ ++This option causes lines to be terminated with the two-character CRLF sequence ++(carriage return, linefeed) instead of just a linefeed character. In the case ++of batched SMTP, the byte sequence written to the pipe is then an exact image ++of what would be sent down a real SMTP connection. ++ ++The contents of the message_prefix and message_suffix options are written ++verbatim, so must contain their own carriage return characters if these are ++needed. When use_bsmtp is not set, the default values for both message_prefix ++and message_suffix end with a single linefeed, so their values must be changed ++to end with "\r\n" if use_crlf is set. ++ +++------------------------------------------------+ ++|use_shell|Use: pipe|Type: boolean|Default: false| +++------------------------------------------------+ ++ ++If this option is set, it causes the command to be passed to /bin/sh instead of ++being run directly from the transport, as described in section 29.3. This is ++less secure, but is needed in some situations where the command is expected to ++be run under a shell and cannot easily be modified. The allow_commands and ++restrict_to_path options, and the "$pipe_addresses" facility are incompatible ++with use_shell. The command is expanded as a single string, and handed to /bin/ ++sh as data for its -c option. ++ ++ ++29.6 Using an external local delivery agent ++------------------------------------------- ++ ++The pipe transport can be used to pass all messages that require local delivery ++to a separate local delivery agent such as procmail. When doing this, care must ++be taken to ensure that the pipe is run under an appropriate uid and gid. In ++some configurations one wants this to be a uid that is trusted by the delivery ++agent to supply the correct sender of the message. It may be necessary to ++recompile or reconfigure the delivery agent so that it trusts an appropriate ++user. The following is an example transport and router configuration for ++procmail: ++ ++# transport ++procmail_pipe: ++ driver = pipe ++ command = /usr/local/bin/procmail -d $local_part ++ return_path_add ++ delivery_date_add ++ envelope_to_add ++ check_string = "From " ++ escape_string = ">From " ++ umask = 077 ++ user = $local_part ++ group = mail ++ ++# router ++procmail: ++ driver = accept ++ check_local_user ++ transport = procmail_pipe ++ ++In this example, the pipe is run as the local user, but with the group set to ++mail. An alternative is to run the pipe as a specific user such as mail or exim ++, but in this case you must arrange for procmail to trust that user to supply a ++correct sender address. If you do not specify either a group or a user option, ++the pipe command is run as the local user. The home directory is the user's ++home directory by default. ++ ++Note: The command that the pipe transport runs does not begin with ++ ++IFS=" " ++ ++as shown in some procmail documentation, because Exim does not by default use a ++shell to run pipe commands. ++ ++The next example shows a transport and a router for a system where local ++deliveries are handled by the Cyrus IMAP server. ++ ++# transport ++local_delivery_cyrus: ++ driver = pipe ++ command = /usr/cyrus/bin/deliver \ ++ -m ${substr_1:$local_part_suffix} -- $local_part ++ user = cyrus ++ group = mail ++ return_output ++ log_output ++ message_prefix = ++ message_suffix = ++ ++# router ++local_user_cyrus: ++ driver = accept ++ check_local_user ++ local_part_suffix = .* ++ transport = local_delivery_cyrus ++ ++Note the unsetting of message_prefix and message_suffix, and the use of ++return_output to cause any text written by Cyrus to be returned to the sender. ++ ++ ++ ++=============================================================================== ++30. THE SMTP TRANSPORT ++ ++The smtp transport delivers messages over TCP/IP connections using the SMTP or ++LMTP protocol. The list of hosts to try can either be taken from the address ++that is being processed (having been set up by the router), or specified ++explicitly for the transport. Timeout and retry processing (see chapter 32) is ++applied to each IP address independently. ++ ++ ++30.1 Multiple messages on a single connection ++--------------------------------------------- ++ ++The sending of multiple messages over a single TCP/IP connection can arise in ++two ways: ++ ++ * If a message contains more than max_rcpt (see below) addresses that are ++ routed to the same host, more than one copy of the message has to be sent ++ to that host. In this situation, multiple copies may be sent in a single ++ run of the smtp transport over a single TCP/IP connection. (What Exim ++ actually does when it has too many addresses to send in one message also ++ depends on the value of the global remote_max_parallel option. Details are ++ given in section 47.1.) ++ ++ * When a message has been successfully delivered over a TCP/IP connection, ++ Exim looks in its hints database to see if there are any other messages ++ awaiting a connection to the same host. If there are, a new delivery ++ process is started for one of them, and the current TCP/IP connection is ++ passed on to it. The new process may in turn send multiple copies and ++ possibly create yet another process. ++ ++For each copy sent over the same TCP/IP connection, a sequence counter is ++incremented, and if it ever gets to the value of connection_max_messages, no ++further messages are sent over that connection. ++ ++ ++30.2 Use of the $host and $host_address variables ++------------------------------------------------- ++ ++At the start of a run of the smtp transport, the values of $host and ++$host_address are the name and IP address of the first host on the host list ++passed by the router. However, when the transport is about to connect to a ++specific host, and while it is connected to that host, $host and $host_address ++are set to the values for that host. These are the values that are in force ++when the helo_data, hosts_try_auth, interface, serialize_hosts, and the various ++TLS options are expanded. ++ ++ ++30.3 Use of $tls_cipher and $tls_peerdn ++--------------------------------------- ++ ++At the start of a run of the smtp transport, the values of $tls_bits, ++$tls_cipher, $tls_peerdn and $tls_sni are the values that were set when the ++message was received. These are the values that are used for options that are ++expanded before any SMTP connections are made. Just before each connection is ++made, these four variables are emptied. If TLS is subsequently started, they ++are set to the appropriate values for the outgoing connection, and these are ++the values that are in force when any authenticators are run and when the ++authenticated_sender option is expanded. ++ ++These variables are deprecated in favour of $tls_in_cipher et. al. and will be ++removed in a future release. ++ ++ ++30.4 Private options for smtp ++----------------------------- ++ ++The private options of the smtp transport are as follows: ++ +++------------------------------------------------------------------+ ++|address_retry_include_sender|Use: smtp|Type: boolean|Default: true| +++------------------------------------------------------------------+ ++ ++When an address is delayed because of a 4xx response to a RCPT command, it is ++the combination of sender and recipient that is delayed in subsequent queue ++runs until the retry time is reached. You can delay the recipient without ++reference to the sender (which is what earlier versions of Exim did), by ++setting address_retry_include_sender false. However, this can lead to problems ++with servers that regularly issue 4xx responses to RCPT commands. ++ +++------------------------------------------------------+ ++|allow_localhost|Use: smtp|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++When a host specified in hosts or fallback_hosts (see below) turns out to be ++the local host, or is listed in hosts_treat_as_local, delivery is deferred by ++default. However, if allow_localhost is set, Exim goes on to do the delivery ++anyway. This should be used only in special cases when the configuration ++ensures that no looping will result (for example, a differently configured Exim ++is listening on the port to which the message is sent). ++ +++-----------------------------------------------------------+ ++|authenticated_sender|Use: smtp|Type: string*|Default: unset| +++-----------------------------------------------------------+ ++ ++When Exim has authenticated as a client, or if authenticated_sender_force is ++true, this option sets a value for the AUTH= item on outgoing MAIL commands, ++overriding any existing authenticated sender value. If the string expansion is ++forced to fail, the option is ignored. Other expansion failures cause delivery ++to be deferred. If the result of expansion is an empty string, that is also ++ignored. ++ ++The expansion happens after the outgoing connection has been made and TLS ++started, if required. This means that the $host, $host_address, $tls_out_cipher ++, and $tls_out_peerdn variables are set according to the particular connection. ++ ++If the SMTP session is not authenticated, the expansion of authenticated_sender ++still happens (and can cause the delivery to be deferred if it fails), but no ++AUTH= item is added to MAIL commands unless authenticated_sender_force is true. ++ ++This option allows you to use the smtp transport in LMTP mode to deliver mail ++to Cyrus IMAP and provide the proper local part as the "authenticated sender", ++via a setting such as: ++ ++authenticated_sender = $local_part ++ ++This removes the need for IMAP subfolders to be assigned special ACLs to allow ++direct delivery to those subfolders. ++ ++Because of expected uses such as that just described for Cyrus (when no domain ++is involved), there is no checking on the syntax of the provided value. ++ +++-----------------------------------------------------------------+ ++|authenticated_sender_force|Use: smtp|Type: boolean|Default: false| +++-----------------------------------------------------------------+ ++ ++If this option is set true, the authenticated_sender option's value is used for ++the AUTH= item on outgoing MAIL commands, even if Exim has not authenticated as ++a client. ++ +++------------------------------------------------+ ++|command_timeout|Use: smtp|Type: time|Default: 5m| +++------------------------------------------------+ ++ ++This sets a timeout for receiving a response to an SMTP command that has been ++sent out. It is also used when waiting for the initial banner line from the ++remote host. Its value must not be zero. ++ +++------------------------------------------------+ ++|connect_timeout|Use: smtp|Type: time|Default: 5m| +++------------------------------------------------+ ++ ++This sets a timeout for the connect() function, which sets up a TCP/IP call to ++a remote host. A setting of zero allows the system timeout (typically several ++minutes) to act. To have any effect, the value of this option must be less than ++the system timeout. However, it has been observed that on some systems there is ++no system timeout, which is why the default value for this option is 5 minutes, ++a value recommended by RFC 1123. ++ +++------------------------------------------------------------+ ++|connection_max_messages|Use: smtp|Type: integer|Default: 500| +++------------------------------------------------------------+ ++ ++This controls the maximum number of separate message deliveries that are sent ++over a single TCP/IP connection. If the value is zero, there is no limit. For ++testing purposes, this value can be overridden by the -oB command line option. ++ +++---------------------------------------------+ ++|data_timeout|Use: smtp|Type: time|Default: 5m| +++---------------------------------------------+ ++ ++This sets a timeout for the transmission of each block in the data portion of ++the message. As a result, the overall timeout for a message depends on the size ++of the message. Its value must not be zero. See also final_timeout. ++ +++--------------------------------------------------------+ ++|delay_after_cutoff|Use: smtp|Type: boolean|Default: true| +++--------------------------------------------------------+ ++ ++This option controls what happens when all remote IP addresses for a given ++domain have been inaccessible for so long that they have passed their retry ++cutoff times. ++ ++In the default state, if the next retry time has not been reached for any of ++them, the address is bounced without trying any deliveries. In other words, ++Exim delays retrying an IP address after the final cutoff time until a new ++retry time is reached, and can therefore bounce an address without ever trying ++a delivery, when machines have been down for a long time. Some people are ++unhappy at this prospect, so... ++ ++If delay_after_cutoff is set false, Exim behaves differently. If all IP ++addresses are past their final cutoff time, Exim tries to deliver to those IP ++addresses that have not been tried since the message arrived. If there are ++none, of if they all fail, the address is bounced. In other words, it does not ++delay when a new message arrives, but immediately tries those expired IP ++addresses that haven't been tried since the message arrived. If there is a ++continuous stream of messages for the dead hosts, unsetting delay_after_cutoff ++means that there will be many more attempts to deliver to them. ++ +++--------------------------------------------------------+ ++|dns_qualify_single|Use: smtp|Type: boolean|Default: true| +++--------------------------------------------------------+ ++ ++If the hosts or fallback_hosts option is being used, and the gethostbyname ++option is false, the RES_DEFNAMES resolver option is set. See the ++qualify_single option in chapter 17 for more details. ++ +++---------------------------------------------------------+ ++|dns_search_parents|Use: smtp|Type: boolean|Default: false| +++---------------------------------------------------------+ ++ ++If the hosts or fallback_hosts option is being used, and the gethostbyname ++option is false, the RES_DNSRCH resolver option is set. See the search_parents ++option in chapter 17 for more details. ++ +++-------------------------------------------+ ++|dscp|Use: smtp|Type: string*|Default: unset| +++-------------------------------------------+ ++ ++This option causes the DSCP value associated with a socket to be set to one of ++a number of fixed strings or to numeric value. The -bI:dscp option may be used ++to ask Exim which names it knows of. Common values include "throughput", ++"mincost", and on newer systems "ef", "af41", etc. Numeric values may be in the ++range 0 to 0x3F. ++ ++The outbound packets from Exim will be marked with this value in the header ++(for IPv4, the TOS field; for IPv6, the TCLASS field); there is no guarantee ++that these values will have any effect, not be stripped by networking ++equipment, or do much of anything without cooperation with your Network ++Engineer and those of all network operators between the source and destination. ++ +++---------------------------------------------------------+ ++|fallback_hosts|Use: smtp|Type: string list|Default: unset| +++---------------------------------------------------------+ ++ ++String expansion is not applied to this option. The argument must be a ++colon-separated list of host names or IP addresses, optionally also including ++port numbers, though the separator can be changed, as described in section 6.19 ++. Each individual item in the list is the same as an item in a route_list ++setting for the manualroute router, as described in section 20.5. ++ ++Fallback hosts can also be specified on routers, which associate them with the ++addresses they process. As for the hosts option without hosts_override, ++fallback_hosts specified on the transport is used only if the address does not ++have its own associated fallback host list. Unlike hosts, a setting of ++fallback_hosts on an address is not overridden by hosts_override. However, ++hosts_randomize does apply to fallback host lists. ++ ++If Exim is unable to deliver to any of the hosts for a particular address, and ++the errors are not permanent rejections, the address is put on a separate ++transport queue with its host list replaced by the fallback hosts, unless the ++address was routed via MX records and the current host was in the original MX ++list. In that situation, the fallback host list is not used. ++ ++Once normal deliveries are complete, the fallback queue is delivered by ++re-running the same transports with the new host lists. If several failing ++addresses have the same fallback hosts (and max_rcpt permits it), a single copy ++of the message is sent. ++ ++The resolution of the host names on the fallback list is controlled by the ++gethostbyname option, as for the hosts option. Fallback hosts apply both to ++cases when the host list comes with the address and when it is taken from hosts ++. This option provides a "use a smart host only if delivery fails" facility. ++ +++-----------------------------------------------+ ++|final_timeout|Use: smtp|Type: time|Default: 10m| +++-----------------------------------------------+ ++ ++This is the timeout that applies while waiting for the response to the final ++line containing just "." that terminates a message. Its value must not be zero. ++ +++----------------------------------------------------+ ++|gethostbyname|Use: smtp|Type: boolean|Default: false| +++----------------------------------------------------+ ++ ++If this option is true when the hosts and/or fallback_hosts options are being ++used, names are looked up using gethostbyname() (or getipnodebyname() when ++available) instead of using the DNS. Of course, that function may in fact use ++the DNS, but it may also consult other sources of information such as /etc/ ++hosts. ++ +++---------------------------------------------------------+ ++|gnutls_compat_mode|Use: smtp|Type: boolean|Default: unset| +++---------------------------------------------------------+ ++ ++This option controls whether GnuTLS is used in compatibility mode in an Exim ++server. This reduces security slightly, but improves interworking with older ++implementations of TLS. ++ +++----------------------------------------------------+ ++|helo_data|Use: smtp|Type: string*|Default: see below| +++----------------------------------------------------+ ++ ++The value of this option is expanded after a connection to a another host has ++been set up. The result is used as the argument for the EHLO, HELO, or LHLO ++command that starts the outgoing SMTP or LMTP session. The default value of the ++option is: ++ ++$primary_hostname ++ ++During the expansion, the variables $host and $host_address are set to the ++identity of the remote host, and the variables $sending_ip_address and ++$sending_port are set to the local IP address and port number that are being ++used. These variables can be used to generate different values for different ++servers or different local IP addresses. For example, if you want the string ++that is used for helo_data to be obtained by a DNS lookup of the outgoing ++interface address, you could use this: ++ ++helo_data = ${lookup dnsdb{ptr=$sending_ip_address}{$value}\ ++ {$primary_hostname}} ++ ++The use of helo_data applies both to sending messages and when doing callouts. ++ +++-------------------------------------------------+ ++|hosts|Use: smtp|Type: string list*|Default: unset| +++-------------------------------------------------+ ++ ++Hosts are associated with an address by a router such as dnslookup, which finds ++the hosts by looking up the address domain in the DNS, or by manualroute, which ++has lists of hosts in its configuration. However, email addresses can be passed ++to the smtp transport by any router, and not all of them can provide an ++associated list of hosts. ++ ++The hosts option specifies a list of hosts to be used if the address being ++processed does not have any hosts associated with it. The hosts specified by ++hosts are also used, whether or not the address has its own hosts, if ++hosts_override is set. ++ ++The string is first expanded, before being interpreted as a colon-separated ++list of host names or IP addresses, possibly including port numbers. The ++separator may be changed to something other than colon, as described in section ++6.19. Each individual item in the list is the same as an item in a route_list ++setting for the manualroute router, as described in section 20.5. However, note ++that the "/MX" facility of the manualroute router is not available here. ++ ++If the expansion fails, delivery is deferred. Unless the failure was caused by ++the inability to complete a lookup, the error is logged to the panic log as ++well as the main log. Host names are looked up either by searching directly for ++address records in the DNS or by calling gethostbyname() (or getipnodebyname() ++when available), depending on the setting of the gethostbyname option. When ++Exim is compiled with IPv6 support, if a host that is looked up in the DNS has ++both IPv4 and IPv6 addresses, both types of address are used. ++ ++During delivery, the hosts are tried in order, subject to their retry status, ++unless hosts_randomize is set. ++ +++-----------------------------------------------------------+ ++|hosts_avoid_esmtp|Use: smtp|Type: host list*|Default: unset| +++-----------------------------------------------------------+ ++ ++This option is for use with broken hosts that announce ESMTP facilities (for ++example, PIPELINING) and then fail to implement them properly. When a host ++matches hosts_avoid_esmtp, Exim sends HELO rather than EHLO at the start of the ++SMTP session. This means that it cannot use any of the ESMTP facilities such as ++AUTH, PIPELINING, SIZE, and STARTTLS. ++ +++----------------------------------------------------------------+ ++|hosts_avoid_pipelining|Use: smtp|Type: host list*|Default: unset| +++----------------------------------------------------------------+ ++ ++Exim will not use the SMTP PIPELINING extension when delivering to any host ++that matches this list, even if the server host advertises PIPELINING support. ++ +++---------------------------------------------------------+ ++|hosts_avoid_tls|Use: smtp|Type: host list*|Default: unset| +++---------------------------------------------------------+ ++ ++Exim will not try to start a TLS session when delivering to any host that ++matches this list. See chapter 41 for details of TLS. ++ +++------------------------------------------------------------+ ++|hosts_verify_avoid_tls|Use: smtp|Type: host list*|Default: *| +++------------------------------------------------------------+ ++ ++Exim will not try to start a TLS session for a verify callout, or when ++delivering in cutthrough mode, to any host that matches this list. Note that ++the default is to not use TLS. ++ +++------------------------------------------------+ ++|hosts_max_try|Use: smtp|Type: integer|Default: 5| +++------------------------------------------------+ ++ ++This option limits the number of IP addresses that are tried for any one ++delivery in cases where there are temporary delivery errors. Section 30.5 ++describes in detail how the value of this option is used. ++ +++-----------------------------------------------------------+ ++|hosts_max_try_hardlimit|Use: smtp|Type: integer|Default: 50| +++-----------------------------------------------------------+ ++ ++This is an additional check on the maximum number of IP addresses that Exim ++tries for any one delivery. Section 30.5 describes its use and why it exists. ++ +++----------------------------------------------------------+ ++|hosts_nopass_tls|Use: smtp|Type: host list*|Default: unset| +++----------------------------------------------------------+ ++ ++For any host that matches this list, a connection on which a TLS session has ++been started will not be passed to a new delivery process for sending another ++message on the same connection. See section 41.11 for an explanation of when ++this might be needed. ++ +++-----------------------------------------------------+ ++|hosts_override|Use: smtp|Type: boolean|Default: false| +++-----------------------------------------------------+ ++ ++If this option is set and the hosts option is also set, any hosts that are ++attached to the address are ignored, and instead the hosts specified by the ++hosts option are always used. This option does not apply to fallback_hosts. ++ +++------------------------------------------------------+ ++|hosts_randomize|Use: smtp|Type: boolean|Default: false| +++------------------------------------------------------+ ++ ++If this option is set, and either the list of hosts is taken from the hosts or ++the fallback_hosts option, or the hosts supplied by the router were not ++obtained from MX records (this includes fallback hosts from the router), and ++were not randomized by the router, the order of trying the hosts is randomized ++each time the transport runs. Randomizing the order of a host list can be used ++to do crude load sharing. ++ ++When hosts_randomize is true, a host list may be split into groups whose order ++is separately randomized. This makes it possible to set up MX-like behaviour. ++The boundaries between groups are indicated by an item that is just "+" in the ++host list. For example: ++ ++hosts = host1:host2:host3:+:host4:host5 ++ ++The order of the first three hosts and the order of the last two hosts is ++randomized for each use, but the first three always end up before the last two. ++If hosts_randomize is not set, a "+" item in the list is ignored. ++ +++------------------------------------------------------------+ ++|hosts_require_auth|Use: smtp|Type: host list*|Default: unset| +++------------------------------------------------------------+ ++ ++This option provides a list of servers for which authentication must succeed ++before Exim will try to transfer a message. If authentication fails for servers ++which are not in this list, Exim tries to send unauthenticated. If ++authentication fails for one of these servers, delivery is deferred. This ++temporary error is detectable in the retry rules, so it can be turned into a ++hard failure if required. See also hosts_try_auth, and chapter 33 for details ++of authentication. ++ +++-----------------------------------------------------------+ ++|hosts_require_tls|Use: smtp|Type: host list*|Default: unset| +++-----------------------------------------------------------+ ++ ++Exim will insist on using a TLS session when delivering to any host that ++matches this list. See chapter 41 for details of TLS. Note: This option affects ++outgoing mail only. To insist on TLS for incoming messages, use an appropriate ++ACL. ++ +++--------------------------------------------------------+ ++|hosts_try_auth|Use: smtp|Type: host list*|Default: unset| +++--------------------------------------------------------+ ++ ++This option provides a list of servers to which, provided they announce ++authentication support, Exim will attempt to authenticate as a client when it ++connects. If authentication fails, Exim will try to transfer the message ++unauthenticated. See also hosts_require_auth, and chapter 33 for details of ++authentication. ++ +++-----------------------------------------------------+ ++|interface|Use: smtp|Type: string list*|Default: unset| +++-----------------------------------------------------+ ++ ++This option specifies which interface to bind to when making an outgoing SMTP ++call. The value is an IP address, not an interface name such as "eth0". Do not ++confuse this with the interface address that was used when a message was ++received, which is in $received_ip_address, formerly known as ++$interface_address. The name was changed to minimize confusion with the ++outgoing interface address. There is no variable that contains an outgoing ++interface address because, unless it is set by this option, its value is ++unknown. ++ ++During the expansion of the interface option the variables $host and ++$host_address refer to the host to which a connection is about to be made ++during the expansion of the string. Forced expansion failure, or an empty ++string result causes the option to be ignored. Otherwise, after expansion, the ++string must be a list of IP addresses, colon-separated by default, but the ++separator can be changed in the usual way. For example: ++ ++interface = <; 192.168.123.123 ; 3ffe:ffff:836f::fe86:a061 ++ ++The first interface of the correct type (IPv4 or IPv6) is used for the outgoing ++connection. If none of them are the correct type, the option is ignored. If ++interface is not set, or is ignored, the system's IP functions choose which ++interface to use if the host has more than one. ++ +++-----------------------------------------------+ ++|keepalive|Use: smtp|Type: boolean|Default: true| +++-----------------------------------------------+ ++ ++This option controls the setting of SO_KEEPALIVE on outgoing TCP/IP socket ++connections. When set, it causes the kernel to probe idle connections ++periodically, by sending packets with "old" sequence numbers. The other end of ++the connection should send a acknowledgment if the connection is still okay or ++a reset if the connection has been aborted. The reason for doing this is that ++it has the beneficial effect of freeing up certain types of connection that can ++get stuck when the remote host is disconnected without tidying up the TCP/IP ++call properly. The keepalive mechanism takes several hours to detect ++unreachable hosts. ++ +++--------------------------------------------------------+ ++|lmtp_ignore_quota|Use: smtp|Type: boolean|Default: false| +++--------------------------------------------------------+ ++ ++If this option is set true when the protocol option is set to "lmtp", the ++string "IGNOREQUOTA" is added to RCPT commands, provided that the LMTP server ++has advertised support for IGNOREQUOTA in its response to the LHLO command. ++ +++---------------------------------------------+ ++|max_rcpt|Use: smtp|Type: integer|Default: 100| +++---------------------------------------------+ ++ ++This option limits the number of RCPT commands that are sent in a single SMTP ++message transaction. Each set of addresses is treated independently, and so can ++cause parallel connections to the same host if remote_max_parallel permits ++this. ++ +++--------------------------------------------------+ ++|multi_domain|Use: smtp|Type: boolean|Default: true| +++--------------------------------------------------+ ++ ++When this option is set, the smtp transport can handle a number of addresses ++containing a mixture of different domains provided they all resolve to the same ++list of hosts. Turning the option off restricts the transport to handling only ++one domain at a time. This is useful if you want to use $domain in an expansion ++for the transport, because it is set only when there is a single domain ++involved in a remote delivery. ++ +++-----------------------------------------------+ ++|port|Use: smtp|Type: string*|Default: see below| +++-----------------------------------------------+ ++ ++This option specifies the TCP/IP port on the server to which Exim connects. ++Note: Do not confuse this with the port that was used when a message was ++received, which is in $received_port, formerly known as $interface_port. The ++name was changed to minimize confusion with the outgoing port. There is no ++variable that contains an outgoing port. ++ ++If the value of this option begins with a digit it is taken as a port number; ++otherwise it is looked up using getservbyname(). The default value is normally ++"smtp", but if protocol is set to "lmtp", the default is "lmtp". If the ++expansion fails, or if a port number cannot be found, delivery is deferred. ++ +++---------------------------------------------+ ++|protocol|Use: smtp|Type: string|Default: smtp| +++---------------------------------------------+ ++ ++If this option is set to "lmtp" instead of "smtp", the default value for the ++port option changes to "lmtp", and the transport operates the LMTP protocol ++(RFC 2033) instead of SMTP. This protocol is sometimes used for local ++deliveries into closed message stores. Exim also has support for running LMTP ++over a pipe to a local process - see chapter 28. ++ ++If this option is set to "smtps", the default vaule for the port option changes ++to "smtps", and the transport initiates TLS immediately after connecting, as an ++outbound SSL-on-connect, instead of using STARTTLS to upgrade. The Internet ++standards bodies strongly discourage use of this mode. ++ +++--------------------------------------------------------------+ ++|retry_include_ip_address|Use: smtp|Type: boolean|Default: true| +++--------------------------------------------------------------+ ++ ++Exim normally includes both the host name and the IP address in the key it ++constructs for indexing retry data after a temporary delivery failure. This ++means that when one of several IP addresses for a host is failing, it gets ++tried periodically (controlled by the retry rules), but use of the other IP ++addresses is not affected. ++ ++However, in some dialup environments hosts are assigned a different IP address ++each time they connect. In this situation the use of the IP address as part of ++the retry key leads to undesirable behaviour. Setting this option false causes ++Exim to use only the host name. This should normally be done on a separate ++instance of the smtp transport, set up specially to handle the dialup hosts. ++ +++---------------------------------------------------------+ ++|serialize_hosts|Use: smtp|Type: host list*|Default: unset| +++---------------------------------------------------------+ ++ ++Because Exim operates in a distributed manner, if several messages for the same ++host arrive at around the same time, more than one simultaneous connection to ++the remote host can occur. This is not usually a problem except when there is a ++slow link between the hosts. In that situation it may be helpful to restrict ++Exim to one connection at a time. This can be done by setting serialize_hosts ++to match the relevant hosts. ++ ++Exim implements serialization by means of a hints database in which a record is ++written whenever a process connects to one of the restricted hosts. The record ++is deleted when the connection is completed. Obviously there is scope for ++records to get left lying around if there is a system or program crash. To ++guard against this, Exim ignores any records that are more than six hours old. ++ ++If you set up this kind of serialization, you should also arrange to delete the ++relevant hints database whenever your system reboots. The names of the files ++start with misc and they are kept in the spool/db directory. There may be one ++or two files, depending on the type of DBM in use. The same files are used for ++ETRN serialization. ++ +++---------------------------------------------------+ ++|size_addition|Use: smtp|Type: integer|Default: 1024| +++---------------------------------------------------+ ++ ++If a remote SMTP server indicates that it supports the SIZE option of the MAIL ++command, Exim uses this to pass over the message size at the start of an SMTP ++transaction. It adds the value of size_addition to the value it sends, to allow ++for headers and other text that may be added during delivery by configuration ++options or in a transport filter. It may be necessary to increase this if a lot ++of text is added to messages. ++ ++Alternatively, if the value of size_addition is set negative, it disables the ++use of the SIZE option altogether. ++ +++------------------------------------------------------+ ++|tls_certificate|Use: smtp|Type: string*|Default: unset| +++------------------------------------------------------+ ++ ++The value of this option must be the absolute path to a file which contains the ++client's certificate, for possible use when sending a message over an encrypted ++connection. The values of $host and $host_address are set to the name and ++address of the server during the expansion. See chapter 41 for details of TLS. ++ ++Note: This option must be set if you want Exim to be able to use a TLS ++certificate when sending messages as a client. The global option of the same ++name specifies the certificate for Exim as a server; it is not automatically ++assumed that the same certificate should be used when Exim is operating as a ++client. ++ +++----------------------------------------------+ ++|tls_crl|Use: smtp|Type: string*|Default: unset| +++----------------------------------------------+ ++ ++This option specifies a certificate revocation list. The expanded value must be ++the name of a file that contains a CRL in PEM format. ++ +++-----------------------------------------------------+ ++|tls_dh_min_bits|Use: smtp|Type: integer|Default: 1024| +++-----------------------------------------------------+ ++ ++When establishing a TLS session, if a ciphersuite which uses Diffie-Hellman key ++agreement is negotiated, the server will provide a large prime number for use. ++This option establishes the minimum acceptable size of that number. If the ++parameter offered by the server is too small, then the TLS handshake will fail. ++ ++Only supported when using GnuTLS. ++ +++-----------------------------------------------------+ ++|tls_privatekey|Use: smtp|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++The value of this option must be the absolute path to a file which contains the ++client's private key. This is used when sending a message over an encrypted ++connection using a client certificate. The values of $host and $host_address ++are set to the name and address of the server during the expansion. If this ++option is unset, or the expansion is forced to fail, or the result is an empty ++string, the private key is assumed to be in the same file as the certificate. ++See chapter 41 for details of TLS. ++ +++----------------------------------------------------------+ ++|tls_require_ciphers|Use: smtp|Type: string*|Default: unset| +++----------------------------------------------------------+ ++ ++The value of this option must be a list of permitted cipher suites, for use ++when setting up an outgoing encrypted connection. (There is a global option of ++the same name for controlling incoming connections.) The values of $host and ++$host_address are set to the name and address of the server during the ++expansion. See chapter 41 for details of TLS; note that this option is used in ++different ways by OpenSSL and GnuTLS (see sections 41.4 and 41.5). For GnuTLS, ++the order of the ciphers is a preference order. ++ +++----------------------------------------------+ ++|tls_sni|Use: smtp|Type: string*|Default: unset| +++----------------------------------------------+ ++ ++If this option is set then it sets the $tls_out_sni variable and causes any TLS ++session to pass this value as the Server Name Indication extension to the ++remote side, which can be used by the remote side to select an appropriate ++certificate and private key for the session. ++ ++See 41.10 for more information. ++ ++Note that for OpenSSL, this feature requires a build of OpenSSL that supports ++TLS extensions. ++ +++-----------------------------------------------------------+ ++|tls_tempfail_tryclear|Use: smtp|Type: boolean|Default: true| +++-----------------------------------------------------------+ ++ ++When the server host is not in hosts_require_tls, and there is a problem in ++setting up a TLS session, this option determines whether or not Exim should try ++to deliver the message unencrypted. If it is set false, delivery to the current ++host is deferred; if there are other hosts, they are tried. If this option is ++set true, Exim attempts to deliver unencrypted after a 4xx response to ++STARTTLS. Also, if STARTTLS is accepted, but the subsequent TLS negotiation ++fails, Exim closes the current connection (because it is in an unknown state), ++opens a new one to the same host, and then tries the delivery in clear. ++ +++--------------------------------------------------------------+ ++|tls_verify_certificates|Use: smtp|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++The value of this option must be the absolute path to a file containing ++permitted server certificates, for use when setting up an encrypted connection. ++Alternatively, if you are using OpenSSL, you can set tls_verify_certificates to ++the name of a directory containing certificate files. This does not work with ++GnuTLS; the option must be set to the name of a single file if you are using ++GnuTLS. The values of $host and $host_address are set to the name and address ++of the server during the expansion of this option. See chapter 41 for details ++of TLS. ++ ++ ++30.5 How the limits for the number of hosts to try are used ++----------------------------------------------------------- ++ ++There are two options that are concerned with the number of hosts that are ++tried when an SMTP delivery takes place. They are hosts_max_try and ++hosts_max_try_hardlimit. ++ ++The hosts_max_try option limits the number of hosts that are tried for a single ++delivery. However, despite the term "host" in its name, the option actually ++applies to each IP address independently. In other words, a multihomed host is ++treated as several independent hosts, just as it is for retrying. ++ ++Many of the larger ISPs have multiple MX records which often point to ++multihomed hosts. As a result, a list of a dozen or more IP addresses may be ++created as a result of routing one of these domains. ++ ++Trying every single IP address on such a long list does not seem sensible; if ++several at the top of the list fail, it is reasonable to assume there is some ++problem that is likely to affect all of them. Roughly speaking, the value of ++hosts_max_try is the maximum number that are tried before deferring the ++delivery. However, the logic cannot be quite that simple. ++ ++Firstly, IP addresses that are skipped because their retry times have not ++arrived do not count, and in addition, addresses that are past their retry ++limits are also not counted, even when they are tried. This means that when ++some IP addresses are past their retry limits, more than the value of ++hosts_max_retry may be tried. The reason for this behaviour is to ensure that ++all IP addresses are considered before timing out an email address (but see ++below for an exception). ++ ++Secondly, when the hosts_max_try limit is reached, Exim looks down the host ++list to see if there is a subsequent host with a different (higher valued) MX. ++If there is, that host is considered next, and the current IP address is used ++but not counted. This behaviour helps in the case of a domain with a retry rule ++that hardly ever delays any hosts, as is now explained: ++ ++Consider the case of a long list of hosts with one MX value, and a few with a ++higher MX value. If hosts_max_try is small (the default is 5) only a few hosts ++at the top of the list are tried at first. With the default retry rule, which ++specifies increasing retry times, the higher MX hosts are eventually tried when ++those at the top of the list are skipped because they have not reached their ++retry times. ++ ++However, it is common practice to put a fixed short retry time on domains for ++large ISPs, on the grounds that their servers are rarely down for very long. ++Unfortunately, these are exactly the domains that tend to resolve to long lists ++of hosts. The short retry time means that the lowest MX hosts are tried every ++time. The attempts may be in a different order because of random sorting, but ++without the special MX check, the higher MX hosts would never be tried until ++all the lower MX hosts had timed out (which might be several days), because ++there are always some lower MX hosts that have reached their retry times. With ++the special check, Exim considers at least one IP address from each MX value at ++every delivery attempt, even if the hosts_max_try limit has already been ++reached. ++ ++The above logic means that hosts_max_try is not a hard limit, and in ++particular, Exim normally eventually tries all the IP addresses before timing ++out an email address. When hosts_max_try was implemented, this seemed a ++reasonable thing to do. Recently, however, some lunatic DNS configurations have ++been set up with hundreds of IP addresses for some domains. It can take a very ++long time indeed for an address to time out in these cases. ++ ++The hosts_max_try_hardlimit option was added to help with this problem. Exim ++never tries more than this number of IP addresses; if it hits this limit and ++they are all timed out, the email address is bounced, even though not all ++possible IP addresses have been tried. ++ ++ ++ ++=============================================================================== ++31. ADDRESS REWRITING ++ ++There are some circumstances in which Exim automatically rewrites domains in ++addresses. The two most common are when an address is given without a domain ++(referred to as an "unqualified address") or when an address contains an ++abbreviated domain that is expanded by DNS lookup. ++ ++Unqualified envelope addresses are accepted only for locally submitted ++messages, or for messages that are received from hosts matching ++sender_unqualified_hosts or recipient_unqualified_hosts, as appropriate. ++Unqualified addresses in header lines are qualified if they are in locally ++submitted messages, or messages from hosts that are permitted to send ++unqualified envelope addresses. Otherwise, unqualified addresses in header ++lines are neither qualified nor rewritten. ++ ++One situation in which Exim does not automatically rewrite a domain is when it ++is the name of a CNAME record in the DNS. The older RFCs suggest that such a ++domain should be rewritten using the "canonical" name, and some MTAs do this. ++The new RFCs do not contain this suggestion. ++ ++ ++31.1 Explicitly configured address rewriting ++-------------------------------------------- ++ ++This chapter describes the rewriting rules that can be used in the main rewrite ++section of the configuration file, and also in the generic headers_rewrite ++option that can be set on any transport. ++ ++Some people believe that configured address rewriting is a Mortal Sin. Others ++believe that life is not possible without it. Exim provides the facility; you ++do not have to use it. ++ ++The main rewriting rules that appear in the "rewrite" section of the ++configuration file are applied to addresses in incoming messages, both envelope ++addresses and addresses in header lines. Each rule specifies the types of ++address to which it applies. ++ ++Whether or not addresses in header lines are rewritten depends on the origin of ++the headers and the type of rewriting. Global rewriting, that is, rewriting ++rules from the rewrite section of the configuration file, is applied only to ++those headers that were received with the message. Header lines that are added ++by ACLs or by a system filter or by individual routers or transports (which are ++specific to individual recipient addresses) are not rewritten by the global ++rules. ++ ++Rewriting at transport time, by means of the headers_rewrite option, applies ++all headers except those added by routers and transports. That is, as well as ++the headers that were received with the message, it also applies to headers ++that were added by an ACL or a system filter. ++ ++In general, rewriting addresses from your own system or domain has some ++legitimacy. Rewriting other addresses should be done only with great care and ++in special circumstances. The author of Exim believes that rewriting should be ++used sparingly, and mainly for "regularizing" addresses in your own domains. ++Although it can sometimes be used as a routing tool, this is very strongly ++discouraged. ++ ++There are two commonly encountered circumstances where rewriting is used, as ++illustrated by these examples: ++ ++ * The company whose domain is hitch.fict.example has a number of hosts that ++ exchange mail with each other behind a firewall, but there is only a single ++ gateway to the outer world. The gateway rewrites *.hitch.fict.example as ++ hitch.fict.example when sending mail off-site. ++ ++ * A host rewrites the local parts of its own users so that, for example, ++ fp42@hitch.fict.example becomes Ford.Prefect@hitch.fict.example. ++ ++ ++31.2 When does rewriting happen? ++-------------------------------- ++ ++Configured address rewriting can take place at several different stages of a ++message's processing. ++ ++At the start of an ACL for MAIL, the sender address may have been rewritten by ++a special SMTP-time rewrite rule (see section 31.9), but no ordinary rewrite ++rules have yet been applied. If, however, the sender address is verified in the ++ACL, it is rewritten before verification, and remains rewritten thereafter. The ++subsequent value of $sender_address is the rewritten address. This also applies ++if sender verification happens in a RCPT ACL. Otherwise, when the sender ++address is not verified, it is rewritten as soon as a message's header lines ++have been received. ++ ++Similarly, at the start of an ACL for RCPT, the current recipient's address may ++have been rewritten by a special SMTP-time rewrite rule, but no ordinary ++rewrite rules have yet been applied to it. However, the behaviour is different ++from the sender address when a recipient is verified. The address is rewritten ++for the verification, but the rewriting is not remembered at this stage. The ++value of $local_part and $domain after verification are always the same as they ++were before (that is, they contain the unrewritten - except for SMTP-time ++rewriting - address). ++ ++As soon as a message's header lines have been received, all the envelope ++recipient addresses are permanently rewritten, and rewriting is also applied to ++the addresses in the header lines (if configured). This happens before adding ++any header lines that were specified in MAIL or RCPT ACLs, and before the DATA ++ACL and local_scan() functions are run. ++ ++When an address is being routed, either for delivery or for verification, ++rewriting is applied immediately to child addresses that are generated by ++redirection, unless no_rewrite is set on the router. ++ ++At transport time, additional rewriting of addresses in header lines can be ++specified by setting the generic headers_rewrite option on a transport. This ++option contains rules that are identical in form to those in the rewrite ++section of the configuration file. They are applied to the original message ++header lines and any that were added by ACLs or a system filter. They are not ++applied to header lines that are added by routers or the transport. ++ ++The outgoing envelope sender can be rewritten by means of the return_path ++transport option. However, it is not possible to rewrite envelope recipients at ++transport time. ++ ++ ++31.3 Testing the rewriting rules that apply on input ++---------------------------------------------------- ++ ++Exim's input rewriting configuration appears in a part of the run time ++configuration file headed by "begin rewrite". It can be tested by the -brw ++command line option. This takes an address (which can be a full RFC 2822 ++address) as its argument. The output is a list of how the address would be ++transformed by the rewriting rules for each of the different places it might ++appear in an incoming message, that is, for each different header and for the ++envelope sender and recipient fields. For example, ++ ++exim -brw ph10@exim.workshop.example ++ ++might produce the output ++ ++sender: Philip.Hazel@exim.workshop.example ++from: Philip.Hazel@exim.workshop.example ++to: ph10@exim.workshop.example ++cc: ph10@exim.workshop.example ++bcc: ph10@exim.workshop.example ++reply-to: Philip.Hazel@exim.workshop.example ++env-from: Philip.Hazel@exim.workshop.example ++env-to: ph10@exim.workshop.example ++ ++which shows that rewriting has been set up for that address when used in any of ++the source fields, but not when it appears as a recipient address. At the ++present time, there is no equivalent way of testing rewriting rules that are ++set for a particular transport. ++ ++ ++31.4 Rewriting rules ++-------------------- ++ ++The rewrite section of the configuration file consists of lines of rewriting ++rules in the form ++ ++<source pattern> <replacement> <flags> ++ ++Rewriting rules that are specified for the headers_rewrite generic transport ++option are given as a colon-separated list. Each item in the list takes the ++same form as a line in the main rewriting configuration (except that any colons ++must be doubled, of course). ++ ++The formats of source patterns and replacement strings are described below. ++Each is terminated by white space, unless enclosed in double quotes, in which ++case normal quoting conventions apply inside the quotes. The flags are single ++characters which may appear in any order. Spaces and tabs between them are ++ignored. ++ ++For each address that could potentially be rewritten, the rules are scanned in ++order, and replacements for the address from earlier rules can themselves be ++replaced by later rules (but see the "q" and "R" flags). ++ ++The order in which addresses are rewritten is undefined, may change between ++releases, and must not be relied on, with one exception: when a message is ++received, the envelope sender is always rewritten first, before any header ++lines are rewritten. For example, the replacement string for a rewrite of an ++address in To: must not assume that the message's address in From: has (or has ++not) already been rewritten. However, a rewrite of From: may assume that the ++envelope sender has already been rewritten. ++ ++The variables $local_part and $domain can be used in the replacement string to ++refer to the address that is being rewritten. Note that lookup-driven rewriting ++can be done by a rule of the form ++ ++*@* ${lookup ... ++ ++where the lookup key uses $1 and $2 or $local_part and $domain to refer to the ++address that is being rewritten. ++ ++ ++31.5 Rewriting patterns ++----------------------- ++ ++The source pattern in a rewriting rule is any item which may appear in an ++address list (see section 10.19). It is in fact processed as a single-item ++address list, which means that it is expanded before being tested against the ++address. As always, if you use a regular expression as a pattern, you must take ++care to escape dollar and backslash characters, or use the "\N" facility to ++suppress string expansion within the regular expression. ++ ++Domains in patterns should be given in lower case. Local parts in patterns are ++case-sensitive. If you want to do case-insensitive matching of local parts, you ++can use a regular expression that starts with "^(?i)". ++ ++After matching, the numerical variables $1, $2, etc. may be set, depending on ++the type of match which occurred. These can be used in the replacement string ++to insert portions of the incoming address. $0 always refers to the complete ++incoming address. When a regular expression is used, the numerical variables ++are set from its capturing subexpressions. For other types of pattern they are ++set as follows: ++ ++ * If a local part or domain starts with an asterisk, the numerical variables ++ refer to the character strings matched by asterisks, with $1 associated ++ with the first asterisk, and $2 with the second, if present. For example, ++ if the pattern ++ ++ *queen@*.fict.example ++ ++ is matched against the address hearts-queen@wonderland.fict.example then ++ ++ $0 = hearts-queen@wonderland.fict.example ++ $1 = hearts- ++ $2 = wonderland ++ ++ Note that if the local part does not start with an asterisk, but the domain ++ does, it is $1 that contains the wild part of the domain. ++ ++ * If the domain part of the pattern is a partial lookup, the wild and fixed ++ parts of the domain are placed in the next available numerical variables. ++ Suppose, for example, that the address foo@bar.baz.example is processed by ++ a rewriting rule of the form ++ ++ *@partial-dbm;/some/dbm/file <replacement string> ++ ++ and the key in the file that matches the domain is "*.baz.example". Then ++ ++ $1 = foo ++ $2 = bar ++ $3 = baz.example ++ ++ If the address foo@baz.example is looked up, this matches the same wildcard ++ file entry, and in this case $2 is set to the empty string, but $3 is still ++ set to baz.example. If a non-wild key is matched in a partial lookup, $2 is ++ again set to the empty string and $3 is set to the whole domain. For ++ non-partial domain lookups, no numerical variables are set. ++ ++ ++31.6 Rewriting replacements ++--------------------------- ++ ++If the replacement string for a rule is a single asterisk, addresses that match ++the pattern and the flags are not rewritten, and no subsequent rewriting rules ++are scanned. For example, ++ ++hatta@lookingglass.fict.example * f ++ ++specifies that hatta@lookingglass.fict.example is never to be rewritten in ++From: headers. ++ ++If the replacement string is not a single asterisk, it is expanded, and must ++yield a fully qualified address. Within the expansion, the variables ++$local_part and $domain refer to the address that is being rewritten. Any ++letters they contain retain their original case - they are not lower cased. The ++numerical variables are set up according to the type of pattern that matched ++the address, as described above. If the expansion is forced to fail by the ++presence of "fail" in a conditional or lookup item, rewriting by the current ++rule is abandoned, but subsequent rules may take effect. Any other expansion ++failure causes the entire rewriting operation to be abandoned, and an entry ++written to the panic log. ++ ++ ++31.7 Rewriting flags ++-------------------- ++ ++There are three different kinds of flag that may appear on rewriting rules: ++ ++ * Flags that specify which headers and envelope addresses to rewrite: E, F, ++ T, b, c, f, h, r, s, t. ++ ++ * A flag that specifies rewriting at SMTP time: S. ++ ++ * Flags that control the rewriting process: Q, q, R, w. ++ ++For rules that are part of the headers_rewrite generic transport option, E, F, ++T, and S are not permitted. ++ ++ ++31.8 Flags specifying which headers and envelope addresses to rewrite ++--------------------------------------------------------------------- ++ ++If none of the following flag letters, nor the "S" flag (see section 31.9) are ++present, a main rewriting rule applies to all headers and to both the sender ++and recipient fields of the envelope, whereas a transport-time rewriting rule ++just applies to all headers. Otherwise, the rewriting rule is skipped unless ++the relevant addresses are being processed. ++ ++E rewrite all envelope fields ++F rewrite the envelope From field ++T rewrite the envelope To field ++b rewrite the Bcc: header ++c rewrite the Cc: header ++f rewrite the From: header ++h rewrite all headers ++r rewrite the Reply-To: header ++s rewrite the Sender: header ++t rewrite the To: header ++ ++"All headers" means all of the headers listed above that can be selected ++individually, plus their Resent- versions. It does not include other headers ++such as Subject: etc. ++ ++You should be particularly careful about rewriting Sender: headers, and ++restrict this to special known cases in your own domains. ++ ++ ++31.9 The SMTP-time rewriting flag ++--------------------------------- ++ ++The rewrite flag "S" specifies a rewrite of incoming envelope addresses at SMTP ++time, as soon as an address is received in a MAIL or RCPT command, and before ++any other processing; even before syntax checking. The pattern is required to ++be a regular expression, and it is matched against the whole of the data for ++the command, including any surrounding angle brackets. ++ ++This form of rewrite rule allows for the handling of addresses that are not ++compliant with RFCs 2821 and 2822 (for example, "bang paths" in batched SMTP ++input). Because the input is not required to be a syntactically valid address, ++the variables $local_part and $domain are not available during the expansion of ++the replacement string. The result of rewriting replaces the original address ++in the MAIL or RCPT command. ++ ++ ++31.10 Flags controlling the rewriting process ++--------------------------------------------- ++ ++There are four flags which control the way the rewriting process works. These ++take effect only when a rule is invoked, that is, when the address is of the ++correct type (matches the flags) and matches the pattern: ++ ++ * If the "Q" flag is set on a rule, the rewritten address is permitted to be ++ an unqualified local part. It is qualified with qualify_recipient. In the ++ absence of "Q" the rewritten address must always include a domain. ++ ++ * If the "q" flag is set on a rule, no further rewriting rules are ++ considered, even if no rewriting actually takes place because of a "fail" ++ in the expansion. The "q" flag is not effective if the address is of the ++ wrong type (does not match the flags) or does not match the pattern. ++ ++ * The "R" flag causes a successful rewriting rule to be re-applied to the new ++ address, up to ten times. It can be combined with the "q" flag, to stop ++ rewriting once it fails to match (after at least one successful rewrite). ++ ++ * When an address in a header is rewritten, the rewriting normally applies ++ only to the working part of the address, with any comments and RFC 2822 ++ "phrase" left unchanged. For example, rewriting might change ++ ++ From: Ford Prefect <fp42@restaurant.hitch.fict.example> ++ ++ into ++ ++ From: Ford Prefect <prefectf@hitch.fict.example> ++ ++ Sometimes there is a need to replace the whole address item, and this can ++ be done by adding the flag letter "w" to a rule. If this is set on a rule ++ that causes an address in a header line to be rewritten, the entire address ++ is replaced, not just the working part. The replacement must be a complete ++ RFC 2822 address, including the angle brackets if necessary. If text ++ outside angle brackets contains a character whose value is greater than 126 ++ or less than 32 (except for tab), the text is encoded according to RFC ++ 2047. The character set is taken from headers_charset, which defaults to ++ ISO-8859-1. ++ ++ When the "w" flag is set on a rule that causes an envelope address to be ++ rewritten, all but the working part of the replacement address is ++ discarded. ++ ++ ++31.11 Rewriting examples ++------------------------ ++ ++Here is an example of the two common rewriting paradigms: ++ ++*@*.hitch.fict.example $1@hitch.fict.example ++*@hitch.fict.example ${lookup{$1}dbm{/etc/realnames}\ ++ {$value}fail}@hitch.fict.example bctfrF ++ ++Note the use of "fail" in the lookup expansion in the second rule, forcing the ++string expansion to fail if the lookup does not succeed. In this context it has ++the effect of leaving the original address unchanged, but Exim goes on to ++consider subsequent rewriting rules, if any, because the "q" flag is not ++present in that rule. An alternative to "fail" would be to supply $1 ++explicitly, which would cause the rewritten address to be the same as before, ++at the cost of a small bit of processing. Not supplying either of these is an ++error, since the rewritten address would then contain no local part. ++ ++The first example above replaces the domain with a superior, more general ++domain. This may not be desirable for certain local parts. If the rule ++ ++root@*.hitch.fict.example * ++ ++were inserted before the first rule, rewriting would be suppressed for the ++local part root at any domain ending in hitch.fict.example. ++ ++Rewriting can be made conditional on a number of tests, by making use of ${if ++in the expansion item. For example, to apply a rewriting rule only to messages ++that originate outside the local host: ++ ++*@*.hitch.fict.example "${if !eq {$sender_host_address}{}\ ++ {$1@hitch.fict.example}fail}" ++ ++The replacement string is quoted in this example because it contains white ++space. ++ ++Exim does not handle addresses in the form of "bang paths". If it sees such an ++address it treats it as an unqualified local part which it qualifies with the ++local qualification domain (if the source of the message is local or if the ++remote host is permitted to send unqualified addresses). Rewriting can ++sometimes be used to handle simple bang paths with a fixed number of ++components. For example, the rule ++ ++\N^([^!]+)!(.*)@your.domain.example$\N $2@$1 ++ ++rewrites a two-component bang path host.name!user as the domain address ++user@host.name. However, there is a security implication in using this as a ++global rewriting rule for envelope addresses. It can provide a backdoor method ++for using your system as a relay, because the incoming addresses appear to be ++local. If the bang path addresses are received via SMTP, it is safer to use the ++"S" flag to rewrite them as they are received, so that relay checking can be ++done on the rewritten addresses. ++ ++ ++ ++=============================================================================== ++32. RETRY CONFIGURATION ++ ++The "retry" section of the runtime configuration file contains a list of retry ++rules that control how often Exim tries to deliver messages that cannot be ++delivered at the first attempt. If there are no retry rules (the section is ++empty or not present), there are no retries. In this situation, temporary ++errors are treated as permanent. The default configuration contains a single, ++general-purpose retry rule (see section 7.5). The -brt command line option can ++be used to test which retry rule will be used for a given address, domain and ++error. ++ ++The most common cause of retries is temporary failure to deliver to a remote ++host because the host is down, or inaccessible because of a network problem. ++Exim's retry processing in this case is applied on a per-host (strictly, per IP ++address) basis, not on a per-message basis. Thus, if one message has recently ++been delayed, delivery of a new message to the same host is not immediately ++tried, but waits for the host's retry time to arrive. If the retry_defer log ++selector is set, the message "retry time not reached" is written to the main ++log whenever a delivery is skipped for this reason. Section 47.2 contains more ++details of the handling of errors during remote deliveries. ++ ++Retry processing applies to routing as well as to delivering, except as covered ++in the next paragraph. The retry rules do not distinguish between these ++actions. It is not possible, for example, to specify different behaviour for ++failures to route the domain snark.fict.example and failures to deliver to the ++host snark.fict.example. I didn't think anyone would ever need this added ++complication, so did not implement it. However, although they share the same ++retry rule, the actual retry times for routing and transporting a given domain ++are maintained independently. ++ ++When a delivery is not part of a queue run (typically an immediate delivery on ++receipt of a message), the routers are always run, and local deliveries are ++always attempted, even if retry times are set for them. This makes for better ++behaviour if one particular message is causing problems (for example, causing ++quota overflow, or provoking an error in a filter file). If such a delivery ++suffers a temporary failure, the retry data is updated as normal, and ++subsequent delivery attempts from queue runs occur only when the retry time for ++the local address is reached. ++ ++ ++32.1 Changing retry rules ++------------------------- ++ ++If you change the retry rules in your configuration, you should consider ++whether or not to delete the retry data that is stored in Exim's spool area in ++files with names like db/retry. Deleting any of Exim's hints files is always ++safe; that is why they are called "hints". ++ ++The hints retry data contains suggested retry times based on the previous ++rules. In the case of a long-running problem with a remote host, it might ++record the fact that the host has timed out. If your new rules increase the ++timeout time for such a host, you should definitely remove the old retry data ++and let Exim recreate it, based on the new rules. Otherwise Exim might bounce ++messages that it should now be retaining. ++ ++ ++32.2 Format of retry rules ++-------------------------- ++ ++Each retry rule occupies one line and consists of three or four parts, ++separated by white space: a pattern, an error name, an optional list of sender ++addresses, and a list of retry parameters. The pattern and sender lists must be ++enclosed in double quotes if they contain white space. The rules are searched ++in order until one is found where the pattern, error name, and sender list (if ++present) match the failing host or address, the error that occurred, and the ++message's sender, respectively. ++ ++The pattern is any single item that may appear in an address list (see section ++10.19). It is in fact processed as a one-item address list, which means that it ++is expanded before being tested against the address that has been delayed. A ++negated address list item is permitted. Address list processing treats a plain ++domain name as if it were preceded by "*@", which makes it possible for many ++retry rules to start with just a domain. For example, ++ ++lookingglass.fict.example * F,24h,30m; ++ ++provides a rule for any address in the lookingglass.fict.example domain, ++whereas ++ ++alice@lookingglass.fict.example * F,24h,30m; ++ ++applies only to temporary failures involving the local part alice. In practice, ++almost all rules start with a domain name pattern without a local part. ++ ++Warning: If you use a regular expression in a routing rule pattern, it must ++match a complete address, not just a domain, because that is how regular ++expressions work in address lists. ++ ++^\Nxyz\d+\.abc\.example$\N * G,1h,10m,2 Wrong ++^\N[^@]+@xyz\d+\.abc\.example$\N * G,1h,10m,2 Right ++ ++ ++32.3 Choosing which retry rule to use for address errors ++-------------------------------------------------------- ++ ++When Exim is looking for a retry rule after a routing attempt has failed (for ++example, after a DNS timeout), each line in the retry configuration is tested ++against the complete address only if retry_use_local_part is set for the ++router. Otherwise, only the domain is used, except when matching against a ++regular expression, when the local part of the address is replaced with "*". A ++domain on its own can match a domain pattern, or a pattern that starts with ++"*@". By default, retry_use_local_part is true for routers where ++check_local_user is true, and false for other routers. ++ ++Similarly, when Exim is looking for a retry rule after a local delivery has ++failed (for example, after a mailbox full error), each line in the retry ++configuration is tested against the complete address only if ++retry_use_local_part is set for the transport (it defaults true for all local ++transports). ++ ++However, when Exim is looking for a retry rule after a remote delivery attempt ++suffers an address error (a 4xx SMTP response for a recipient address), the ++whole address is always used as the key when searching the retry rules. The ++rule that is found is used to create a retry time for the combination of the ++failing address and the message's sender. It is the combination of sender and ++recipient that is delayed in subsequent queue runs until its retry time is ++reached. You can delay the recipient without regard to the sender by setting ++address_retry_include_sender false in the smtp transport but this can lead to ++problems with servers that regularly issue 4xx responses to RCPT commands. ++ ++ ++32.4 Choosing which retry rule to use for host and message errors ++----------------------------------------------------------------- ++ ++For a temporary error that is not related to an individual address (for ++example, a connection timeout), each line in the retry configuration is checked ++twice. First, the name of the remote host is used as a domain name (preceded by ++"*@" when matching a regular expression). If this does not match the line, the ++domain from the email address is tried in a similar fashion. For example, ++suppose the MX records for a.b.c.example are ++ ++a.b.c.example MX 5 x.y.z.example ++ MX 6 p.q.r.example ++ MX 7 m.n.o.example ++ ++and the retry rules are ++ ++p.q.r.example * F,24h,30m; ++a.b.c.example * F,4d,45m; ++ ++and a delivery to the host x.y.z.example suffers a connection failure. The ++first rule matches neither the host nor the domain, so Exim looks at the second ++rule. This does not match the host, but it does match the domain, so it is used ++to calculate the retry time for the host x.y.z.example. Meanwhile, Exim tries ++to deliver to p.q.r.example. If this also suffers a host error, the first retry ++rule is used, because it matches the host. ++ ++In other words, temporary failures to deliver to host p.q.r.example use the ++first rule to determine retry times, but for all the other hosts for the domain ++a.b.c.example, the second rule is used. The second rule is also used if routing ++to a.b.c.example suffers a temporary failure. ++ ++Note: The host name is used when matching the patterns, not its IP address. ++However, if a message is routed directly to an IP address without the use of a ++host name, for example, if a manualroute router contains a setting such as: ++ ++route_list = *.a.example 192.168.34.23 ++ ++then the "host name" that is used when searching for a retry rule is the ++textual form of the IP address. ++ ++ ++32.5 Retry rules for specific errors ++------------------------------------ ++ ++The second field in a retry rule is the name of a particular error, or an ++asterisk, which matches any error. The errors that can be tested for are: ++ ++auth_failed ++ ++ Authentication failed when trying to send to a host in the ++ hosts_require_auth list in an smtp transport. ++ ++data_4xx ++ ++ A 4xx error was received for an outgoing DATA command, either immediately ++ after the command, or after sending the message's data. ++ ++mail_4xx ++ ++ A 4xx error was received for an outgoing MAIL command. ++ ++rcpt_4xx ++ ++ A 4xx error was received for an outgoing RCPT command. ++ ++For the three 4xx errors, either the first or both of the x's can be given as ++specific digits, for example: "mail_45x" or "rcpt_436". For example, to ++recognize 452 errors given to RCPT commands for addresses in a certain domain, ++and have retries every ten minutes with a one-hour timeout, you could set up a ++retry rule of this form: ++ ++the.domain.name rcpt_452 F,1h,10m ++ ++These errors apply to both outgoing SMTP (the smtp transport) and outgoing LMTP ++(either the lmtp transport, or the smtp transport in LMTP mode). ++ ++lost_connection ++ ++ A server unexpectedly closed the SMTP connection. There may, of course, ++ legitimate reasons for this (host died, network died), but if it repeats a ++ lot for the same host, it indicates something odd. ++ ++refused_MX ++ ++ A connection to a host obtained from an MX record was refused. ++ ++refused_A ++ ++ A connection to a host not obtained from an MX record was refused. ++ ++refused ++ ++ A connection was refused. ++ ++timeout_connect_MX ++ ++ A connection attempt to a host obtained from an MX record timed out. ++ ++timeout_connect_A ++ ++ A connection attempt to a host not obtained from an MX record timed out. ++ ++timeout_connect ++ ++ A connection attempt timed out. ++ ++timeout_MX ++ ++ There was a timeout while connecting or during an SMTP session with a host ++ obtained from an MX record. ++ ++timeout_A ++ ++ There was a timeout while connecting or during an SMTP session with a host ++ not obtained from an MX record. ++ ++timeout ++ ++ There was a timeout while connecting or during an SMTP session. ++ ++tls_required ++ ++ The server was required to use TLS (it matched hosts_require_tls in the ++ smtp transport), but either did not offer TLS, or it responded with 4xx to ++ STARTTLS, or there was a problem setting up the TLS connection. ++ ++quota ++ ++ A mailbox quota was exceeded in a local delivery by the appendfile ++ transport. ++ ++quota_<time> ++ ++ A mailbox quota was exceeded in a local delivery by the appendfile ++ transport, and the mailbox has not been accessed for <time>. For example, ++ quota_4d applies to a quota error when the mailbox has not been accessed ++ for four days. ++ ++The idea of quota_<time> is to make it possible to have shorter timeouts when ++the mailbox is full and is not being read by its owner. Ideally, it should be ++based on the last time that the user accessed the mailbox. However, it is not ++always possible to determine this. Exim uses the following heuristic rules: ++ ++ * If the mailbox is a single file, the time of last access (the "atime") is ++ used. As no new messages are being delivered (because the mailbox is over ++ quota), Exim does not access the file, so this is the time of last user ++ access. ++ ++ * For a maildir delivery, the time of last modification of the new ++ subdirectory is used. As the mailbox is over quota, no new files are ++ created in the new subdirectory, because no new messages are being ++ delivered. Any change to the new subdirectory is therefore assumed to be ++ the result of an MUA moving a new message to the cur directory when it is ++ first read. The time that is used is therefore the last time that the user ++ read a new message. ++ ++ * For other kinds of multi-file mailbox, the time of last access cannot be ++ obtained, so a retry rule that uses this type of error field is never ++ matched. ++ ++The quota errors apply both to system-enforced quotas and to Exim's own quota ++mechanism in the appendfile transport. The quota error also applies when a ++local delivery is deferred because a partition is full (the ENOSPC error). ++ ++ ++32.6 Retry rules for specified senders ++-------------------------------------- ++ ++You can specify retry rules that apply only when the failing message has a ++specific sender. In particular, this can be used to define retry rules that ++apply only to bounce messages. The third item in a retry rule can be of this ++form: ++ ++senders=<address list> ++ ++The retry timings themselves are then the fourth item. For example: ++ ++* rcpt_4xx senders=: F,1h,30m ++ ++matches recipient 4xx errors for bounce messages sent to any address at any ++host. If the address list contains white space, it must be enclosed in quotes. ++For example: ++ ++a.domain rcpt_452 senders="xb.dom : yc.dom" G,8h,10m,1.5 ++ ++Warning: This facility can be unhelpful if it is used for host errors (which do ++not depend on the recipient). The reason is that the sender is used only to ++match the retry rule. Once the rule has been found for a host error, its ++contents are used to set a retry time for the host, and this will apply to all ++messages, not just those with specific senders. ++ ++When testing retry rules using -brt, you can supply a sender using the -f ++command line option, like this: ++ ++exim -f "" -brt user@dom.ain ++ ++If you do not set -f with -brt, a retry rule that contains a senders list is ++never matched. ++ ++ ++32.7 Retry parameters ++--------------------- ++ ++The third (or fourth, if a senders list is present) field in a retry rule is a ++sequence of retry parameter sets, separated by semicolons. Each set consists of ++ ++<letter>,<cutoff time>,<arguments> ++ ++The letter identifies the algorithm for computing a new retry time; the cutoff ++time is the time beyond which this algorithm no longer applies, and the ++arguments vary the algorithm's action. The cutoff time is measured from the ++time that the first failure for the domain (combined with the local part if ++relevant) was detected, not from the time the message was received. ++ ++The available algorithms are: ++ ++ * F: retry at fixed intervals. There is a single time parameter specifying ++ the interval. ++ ++ * G: retry at geometrically increasing intervals. The first argument ++ specifies a starting value for the interval, and the second a multiplier, ++ which is used to increase the size of the interval at each retry. ++ ++ * H: retry at randomized intervals. The arguments are as for G. For each ++ retry, the previous interval is multiplied by the factor in order to get a ++ maximum for the next interval. The minimum interval is the first argument ++ of the parameter, and an actual interval is chosen randomly between them. ++ Such a rule has been found to be helpful in cluster configurations when all ++ the members of the cluster restart at once, and may therefore synchronize ++ their queue processing times. ++ ++When computing the next retry time, the algorithm definitions are scanned in ++order until one whose cutoff time has not yet passed is reached. This is then ++used to compute a new retry time that is later than the current time. In the ++case of fixed interval retries, this simply means adding the interval to the ++current time. For geometrically increasing intervals, retry intervals are ++computed from the rule's parameters until one that is greater than the previous ++interval is found. The main configuration variable retry_interval_max limits ++the maximum interval between retries. It cannot be set greater than "24h", ++which is its default value. ++ ++A single remote domain may have a number of hosts associated with it, and each ++host may have more than one IP address. Retry algorithms are selected on the ++basis of the domain name, but are applied to each IP address independently. If, ++for example, a host has two IP addresses and one is unusable, Exim will ++generate retry times for it and will not try to use it until its next retry ++time comes. Thus the good IP address is likely to be tried first most of the ++time. ++ ++Retry times are hints rather than promises. Exim does not make any attempt to ++run deliveries exactly at the computed times. Instead, a queue runner process ++starts delivery processes for delayed messages periodically, and these attempt ++new deliveries only for those addresses that have passed their next retry time. ++If a new message arrives for a deferred address, an immediate delivery attempt ++occurs only if the address has passed its retry time. In the absence of new ++messages, the minimum time between retries is the interval between queue runner ++processes. There is not much point in setting retry times of five minutes if ++your queue runners happen only once an hour, unless there are a significant ++number of incoming messages (which might be the case on a system that is ++sending everything to a smart host, for example). ++ ++The data in the retry hints database can be inspected by using the exim_dumpdb ++or exim_fixdb utility programs (see chapter 52). The latter utility can also be ++used to change the data. The exinext utility script can be used to find out ++what the next retry times are for the hosts associated with a particular mail ++domain, and also for local deliveries that have been deferred. ++ ++ ++32.8 Retry rule examples ++------------------------ ++ ++Here are some example retry rules: ++ ++alice@wonderland.fict.example quota_5d F,7d,3h ++wonderland.fict.example quota_5d ++wonderland.fict.example * F,1h,15m; G,2d,1h,2; ++lookingglass.fict.example * F,24h,30m; ++* refused_A F,2h,20m; ++* * F,2h,15m; G,16h,1h,1.5; F,5d,8h ++ ++The first rule sets up special handling for mail to ++alice@wonderland.fict.example when there is an over-quota error and the mailbox ++has not been read for at least 5 days. Retries continue every three hours for 7 ++days. The second rule handles over-quota errors for all other local parts at ++wonderland.fict.example; the absence of a local part has the same effect as ++supplying "*@". As no retry algorithms are supplied, messages that fail are ++bounced immediately if the mailbox has not been read for at least 5 days. ++ ++The third rule handles all other errors at wonderland.fict.example; retries ++happen every 15 minutes for an hour, then with geometrically increasing ++intervals until two days have passed since a delivery first failed. After the ++first hour there is a delay of one hour, then two hours, then four hours, and ++so on (this is a rather extreme example). ++ ++The fourth rule controls retries for the domain lookingglass.fict.example. They ++happen every 30 minutes for 24 hours only. The remaining two rules handle all ++other domains, with special action for connection refusal from hosts that were ++not obtained from an MX record. ++ ++The final rule in a retry configuration should always have asterisks in the ++first two fields so as to provide a general catch-all for any addresses that do ++not have their own special handling. This example tries every 15 minutes for 2 ++hours, then with intervals starting at one hour and increasing by a factor of ++1.5 up to 16 hours, then every 8 hours up to 5 days. ++ ++ ++32.9 Timeout of retry data ++-------------------------- ++ ++Exim timestamps the data that it writes to its retry hints database. When it ++consults the data during a delivery it ignores any that is older than the value ++set in retry_data_expire (default 7 days). If, for example, a host hasn't been ++tried for 7 days, Exim will try to deliver to it immediately a message arrives, ++and if that fails, it will calculate a retry time as if it were failing for the ++first time. ++ ++This improves the behaviour for messages routed to rarely-used hosts such as MX ++backups. If such a host was down at one time, and happens to be down again when ++Exim tries a month later, using the old retry data would imply that it had been ++down all the time, which is not a justified assumption. ++ ++If a host really is permanently dead, this behaviour causes a burst of retries ++every now and again, but only if messages routed to it are rare. If there is a ++message at least once every 7 days the retry data never expires. ++ ++ ++32.10 Long-term failures ++------------------------ ++ ++Special processing happens when an email address has been failing for so long ++that the cutoff time for the last algorithm is reached. For example, using the ++default retry rule: ++ ++* * F,2h,15m; G,16h,1h,1.5; F,4d,6h ++ ++the cutoff time is four days. Reaching the retry cutoff is independent of how ++long any specific message has been failing; it is the length of continuous ++failure for the recipient address that counts. ++ ++When the cutoff time is reached for a local delivery, or for all the IP ++addresses associated with a remote delivery, a subsequent delivery failure ++causes Exim to give up on the address, and a bounce message is generated. In ++order to cater for new messages that use the failing address, a next retry time ++is still computed from the final algorithm, and is used as follows: ++ ++For local deliveries, one delivery attempt is always made for any subsequent ++messages. If this delivery fails, the address fails immediately. The ++post-cutoff retry time is not used. ++ ++If the delivery is remote, there are two possibilities, controlled by the ++delay_after_cutoff option of the smtp transport. The option is true by default. ++Until the post-cutoff retry time for one of the IP addresses is reached, the ++failing email address is bounced immediately, without a delivery attempt taking ++place. After that time, one new delivery attempt is made to those IP addresses ++that are past their retry times, and if that still fails, the address is ++bounced and new retry times are computed. ++ ++In other words, when all the hosts for a given email address have been failing ++for a long time, Exim bounces rather then defers until one of the hosts' retry ++times is reached. Then it tries once, and bounces if that attempt fails. This ++behaviour ensures that few resources are wasted in repeatedly trying to deliver ++to a broken destination, but if the host does recover, Exim will eventually ++notice. ++ ++If delay_after_cutoff is set false, Exim behaves differently. If all IP ++addresses are past their final cutoff time, Exim tries to deliver to those IP ++addresses that have not been tried since the message arrived. If there are no ++suitable IP addresses, or if they all fail, the address is bounced. In other ++words, it does not delay when a new message arrives, but tries the expired ++addresses immediately, unless they have been tried since the message arrived. ++If there is a continuous stream of messages for the failing domains, setting ++delay_after_cutoff false means that there will be many more attempts to deliver ++to permanently failing IP addresses than when delay_after_cutoff is true. ++ ++ ++32.11 Deliveries that work intermittently ++----------------------------------------- ++ ++Some additional logic is needed to cope with cases where a host is ++intermittently available, or when a message has some attribute that prevents ++its delivery when others to the same address get through. In this situation, ++because some messages are successfully delivered, the "retry clock" for the ++host or address keeps getting reset by the successful deliveries, and so ++failing messages remain on the queue for ever because the cutoff time is never ++reached. ++ ++Two exceptional actions are applied to prevent this happening. The first ++applies to errors that are related to a message rather than a remote host. ++Section 47.2 has a discussion of the different kinds of error; examples of ++message-related errors are 4xx responses to MAIL or DATA commands, and quota ++failures. For this type of error, if a message's arrival time is earlier than ++the "first failed" time for the error, the earlier time is used when scanning ++the retry rules to decide when to try next and when to time out the address. ++ ++The exceptional second action applies in all cases. If a message has been on ++the queue for longer than the cutoff time of any applicable retry rule for a ++given address, a delivery is attempted for that address, even if it is not yet ++time, and if this delivery fails, the address is timed out. A new retry time is ++not computed in this case, so that other messages for the same address are ++considered immediately. ++ ++ ++ ++=============================================================================== ++33. SMTP AUTHENTICATION ++ ++The "authenticators" section of Exim's run time configuration is concerned with ++SMTP authentication. This facility is an extension to the SMTP protocol, ++described in RFC 2554, which allows a client SMTP host to authenticate itself ++to a server. This is a common way for a server to recognize clients that are ++permitted to use it as a relay. SMTP authentication is not of relevance to the ++transfer of mail between servers that have no managerial connection with each ++other. ++ ++Very briefly, the way SMTP authentication works is as follows: ++ ++ * The server advertises a number of authentication mechanisms in response to ++ the client's EHLO command. ++ ++ * The client issues an AUTH command, naming a specific mechanism. The command ++ may, optionally, contain some authentication data. ++ ++ * The server may issue one or more challenges, to which the client must send ++ appropriate responses. In simple authentication mechanisms, the challenges ++ are just prompts for user names and passwords. The server does not have to ++ issue any challenges - in some mechanisms the relevant data may all be ++ transmitted with the AUTH command. ++ ++ * The server either accepts or denies authentication. ++ ++ * If authentication succeeds, the client may optionally make use of the AUTH ++ option on the MAIL command to pass an authenticated sender in subsequent ++ mail transactions. Authentication lasts for the remainder of the SMTP ++ connection. ++ ++ * If authentication fails, the client may give up, or it may try a different ++ authentication mechanism, or it may try transferring mail over the ++ unauthenticated connection. ++ ++If you are setting up a client, and want to know which authentication ++mechanisms the server supports, you can use Telnet to connect to port 25 (the ++SMTP port) on the server, and issue an EHLO command. The response to this ++includes the list of supported mechanisms. For example: ++ ++$ telnet server.example 25 ++Trying 192.168.34.25... ++Connected to server.example. ++Escape character is '^]'. ++220 server.example ESMTP Exim 4.20 ... ++ehlo client.example ++250-server.example Hello client.example [10.8.4.5] ++250-SIZE 52428800 ++250-PIPELINING ++250-AUTH PLAIN ++250 HELP ++ ++The second-last line of this example output shows that the server supports ++authentication using the PLAIN mechanism. In Exim, the different authentication ++mechanisms are configured by specifying authenticator drivers. Like the routers ++and transports, which authenticators are included in the binary is controlled ++by build-time definitions. The following are currently available, included by ++setting ++ ++AUTH_CRAM_MD5=yes ++AUTH_CYRUS_SASL=yes ++AUTH_DOVECOT=yes ++AUTH_GSASL=yes ++AUTH_HEIMDAL_GSSAPI=yes ++AUTH_PLAINTEXT=yes ++AUTH_SPA=yes ++ ++in Local/Makefile, respectively. The first of these supports the CRAM-MD5 ++authentication mechanism (RFC 2195), and the second provides an interface to ++the Cyrus SASL authentication library. The third is an interface to Dovecot's ++authentication system, delegating the work via a socket interface. The fourth ++provides an interface to the GNU SASL authentication library, which provides ++mechanisms but typically not data sources. The fifth provides direct access to ++Heimdal GSSAPI, geared for Kerberos, but supporting setting a server keytab. ++The sixth can be configured to support the PLAIN authentication mechanism (RFC ++2595) or the LOGIN mechanism, which is not formally documented, but used by ++several MUAs. The seventh authenticator supports Microsoft's Secure Password ++Authentication mechanism. ++ ++The authenticators are configured using the same syntax as other drivers (see ++section 6.22). If no authenticators are required, no authentication section ++need be present in the configuration file. Each authenticator can in principle ++have both server and client functions. When Exim is receiving SMTP mail, it is ++acting as a server; when it is sending out messages over SMTP, it is acting as ++a client. Authenticator configuration options are provided for use in both ++these circumstances. ++ ++To make it clear which options apply to which situation, the prefixes server_ ++and client_ are used on option names that are specific to either the server or ++the client function, respectively. Server and client functions are disabled if ++none of their options are set. If an authenticator is to be used for both ++server and client functions, a single definition, using both sets of options, ++is required. For example: ++ ++cram: ++ driver = cram_md5 ++ public_name = CRAM-MD5 ++ server_secret = ${if eq{$auth1}{ph10}{secret1}fail} ++ client_name = ph10 ++ client_secret = secret2 ++ ++The server_ option is used when Exim is acting as a server, and the client_ ++options when it is acting as a client. ++ ++Descriptions of the individual authenticators are given in subsequent chapters. ++The remainder of this chapter covers the generic options for the ++authenticators, followed by general discussion of the way authentication works ++in Exim. ++ ++Beware: the meaning of $auth1, $auth2, ... varies on a per-driver and ++per-mechanism basis. Please read carefully to determine which variables hold ++account labels such as usercodes and which hold passwords or other ++authenticating data. ++ ++Note that some mechanisms support two different identifiers for accounts: the ++authentication id and the authorization id. The contractions authn and authz ++are commonly encountered. The American spelling is standard here. Conceptually, ++authentication data such as passwords are tied to the identifier used to ++authenticate; servers may have rules to permit one user to act as a second ++user, so that after login the session is treated as though that second user had ++logged in. That second user is the authorization id. A robust configuration ++might confirm that the authz field is empty or matches the authn field. Often ++this is just ignored. The authn can be considered as verified data, the authz ++as an unverified request which the server might choose to honour. ++ ++A realm is a text string, typically a domain name, presented by a server to a ++client to help it select an account and credentials to use. In some mechanisms, ++the client and server provably agree on the realm, but clients typically can ++not treat the realm as secure data to be blindly trusted. ++ ++ ++33.1 Generic options for authenticators ++--------------------------------------- ++ +++-----------------------------------------------------------------+ ++|client_condition|Use: authenticators|Type: string*|Default: unset| +++-----------------------------------------------------------------+ ++ ++When Exim is authenticating as a client, it skips any authenticator whose ++client_condition expansion yields "0", "no", or "false". This can be used, for ++example, to skip plain text authenticators when the connection is not encrypted ++by a setting such as: ++ ++client_condition = ${if !eq{$tls_out_cipher}{}} ++ +++--------------------------------------------------------------+ ++|client_set_id|Use: authenticators|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++When client authentication succeeds, this condition is expanded; the result is ++used in the log lines for outbound messasges. Typically it will be the user ++name used for authentication. ++ +++------------------------------------------------------+ ++|driver|Use: authenticators|Type: string|Default: unset| +++------------------------------------------------------+ ++ ++This option must always be set. It specifies which of the available ++authenticators is to be used. ++ +++-----------------------------------------------------------+ ++|public_name|Use: authenticators|Type: string|Default: unset| +++-----------------------------------------------------------+ ++ ++This option specifies the name of the authentication mechanism that the driver ++implements, and by which it is known to the outside world. These names should ++contain only upper case letters, digits, underscores, and hyphens (RFC 2222), ++but Exim in fact matches them caselessly. If public_name is not set, it ++defaults to the driver's instance name. ++ +++---------------------------------------------------------------------------+ ++|server_advertise_condition|Use: authenticators|Type: string*|Default: unset| +++---------------------------------------------------------------------------+ ++ ++When a server is about to advertise an authentication mechanism, the condition ++is expanded. If it yields the empty string, "0", "no", or "false", the ++mechanism is not advertised. If the expansion fails, the mechanism is not ++advertised. If the failure was not forced, and was not caused by a lookup ++defer, the incident is logged. See section 33.3 below for further discussion. ++ +++-----------------------------------------------------------------+ ++|server_condition|Use: authenticators|Type: string*|Default: unset| +++-----------------------------------------------------------------+ ++ ++This option must be set for a plaintext server authenticator, where it is used ++directly to control authentication. See section 34.2 for details. ++ ++For the gsasl authenticator, this option is required for various mechanisms; ++see chapter 38 for details. ++ ++For the other authenticators, server_condition can be used as an additional ++authentication or authorization mechanism that is applied after the other ++authenticator conditions succeed. If it is set, it is expanded when the ++authenticator would otherwise return a success code. If the expansion is forced ++to fail, authentication fails. Any other expansion failure causes a temporary ++error code to be returned. If the result of a successful expansion is an empty ++string, "0", "no", or "false", authentication fails. If the result of the ++expansion is "1", "yes", or "true", authentication succeeds. For any other ++result, a temporary error code is returned, with the expanded string as the ++error text. ++ +++-------------------------------------------------------------------+ ++|server_debug_print|Use: authenticators|Type: string*|Default: unset| +++-------------------------------------------------------------------+ ++ ++If this option is set and authentication debugging is enabled (see the -d ++command line option), the string is expanded and included in the debugging ++output when the authenticator is run as a server. This can help with checking ++out the values of variables. If expansion of the string fails, the error ++message is written to the debugging output, and Exim carries on processing. ++ +++--------------------------------------------------------------+ ++|server_set_id|Use: authenticators|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++When an Exim server successfully authenticates a client, this string is ++expanded using data from the authentication, and preserved for any incoming ++messages in the variable $authenticated_id. It is also included in the log ++lines for incoming messages. For example, a user/password authenticator ++configuration might preserve the user name that was used to authenticate, and ++refer to it subsequently during delivery of the message. If expansion fails, ++the option is ignored. ++ +++---------------------------------------------------------------------------+ ++|server_mail_auth_condition|Use: authenticators|Type: string*|Default: unset| +++---------------------------------------------------------------------------+ ++ ++This option allows a server to discard authenticated sender addresses supplied ++as part of MAIL commands in SMTP connections that are authenticated by the ++driver on which server_mail_auth_condition is set. The option is not used as ++part of the authentication process; instead its (unexpanded) value is ++remembered for later use. How it is used is described in the following section. ++ ++ ++33.2 The AUTH parameter on MAIL commands ++---------------------------------------- ++ ++When a client supplied an AUTH= item on a MAIL command, Exim applies the ++following checks before accepting it as the authenticated sender of the ++message: ++ ++ * If the connection is not using extended SMTP (that is, HELO was used rather ++ than EHLO), the use of AUTH= is a syntax error. ++ ++ * If the value of the AUTH= parameter is "<>", it is ignored. ++ ++ * If acl_smtp_mailauth is defined, the ACL it specifies is run. While it is ++ running, the value of $authenticated_sender is set to the value obtained ++ from the AUTH= parameter. If the ACL does not yield "accept", the value of ++ $authenticated_sender is deleted. The acl_smtp_mailauth ACL may not return ++ "drop" or "discard". If it defers, a temporary error code (451) is given ++ for the MAIL command. ++ ++ * If acl_smtp_mailauth is not defined, the value of the AUTH= parameter is ++ accepted and placed in $authenticated_sender only if the client has ++ authenticated. ++ ++ * If the AUTH= value was accepted by either of the two previous rules, and ++ the client has authenticated, and the authenticator has a setting for the ++ server_mail_auth_condition, the condition is checked at this point. The ++ valued that was saved from the authenticator is expanded. If the expansion ++ fails, or yields an empty string, "0", "no", or "false", the value of ++ $authenticated_sender is deleted. If the expansion yields any other value, ++ the value of $authenticated_sender is retained and passed on with the ++ message. ++ ++When $authenticated_sender is set for a message, it is passed on to other hosts ++to which Exim authenticates as a client. Do not confuse this value with ++$authenticated_id, which is a string obtained from the authentication process, ++and which is not usually a complete email address. ++ ++Whenever an AUTH= value is ignored, the incident is logged. The ACL for MAIL, ++if defined, is run after AUTH= is accepted or ignored. It can therefore make ++use of $authenticated_sender. The converse is not true: the value of ++$sender_address is not yet set up when the acl_smtp_mailauth ACL is run. ++ ++ ++33.3 Authentication on an Exim server ++------------------------------------- ++ ++When Exim receives an EHLO command, it advertises the public names of those ++authenticators that are configured as servers, subject to the following ++conditions: ++ ++ * The client host must match auth_advertise_hosts (default *). ++ ++ * It the server_advertise_condition option is set, its expansion must not ++ yield the empty string, "0", "no", or "false". ++ ++The order in which the authenticators are defined controls the order in which ++the mechanisms are advertised. ++ ++Some mail clients (for example, some versions of Netscape) require the user to ++provide a name and password for authentication whenever AUTH is advertised, ++even though authentication may not in fact be needed (for example, Exim may be ++set up to allow unconditional relaying from the client by an IP address check). ++You can make such clients more friendly by not advertising AUTH to them. For ++example, if clients on the 10.9.8.0/24 network are permitted (by the ACL that ++runs for RCPT) to relay without authentication, you should set ++ ++auth_advertise_hosts = ! 10.9.8.0/24 ++ ++so that no authentication mechanisms are advertised to them. ++ ++The server_advertise_condition controls the advertisement of individual ++authentication mechanisms. For example, it can be used to restrict the ++advertisement of a particular mechanism to encrypted connections, by a setting ++such as: ++ ++server_advertise_condition = ${if eq{$tls_in_cipher}{}{no}{yes}} ++ ++If the session is encrypted, $tls_in_cipher is not empty, and so the expansion ++yields "yes", which allows the advertisement to happen. ++ ++When an Exim server receives an AUTH command from a client, it rejects it ++immediately if AUTH was not advertised in response to an earlier EHLO command. ++This is the case if ++ ++ * The client host does not match auth_advertise_hosts; or ++ ++ * No authenticators are configured with server options; or ++ ++ * Expansion of server_advertise_condition blocked the advertising of all the ++ server authenticators. ++ ++Otherwise, Exim runs the ACL specified by acl_smtp_auth in order to decide ++whether to accept the command. If acl_smtp_auth is not set, AUTH is accepted ++from any client host. ++ ++If AUTH is not rejected by the ACL, Exim searches its configuration for a ++server authentication mechanism that was advertised in response to EHLO and ++that matches the one named in the AUTH command. If it finds one, it runs the ++appropriate authentication protocol, and authentication either succeeds or ++fails. If there is no matching advertised mechanism, the AUTH command is ++rejected with a 504 error. ++ ++When a message is received from an authenticated host, the value of ++$received_protocol is set to "esmtpa" or "esmtpsa" instead of "esmtp" or ++"esmtps", and $sender_host_authenticated contains the name (not the public ++name) of the authenticator driver that successfully authenticated the client ++from which the message was received. This variable is empty if there was no ++successful authentication. ++ ++ ++33.4 Testing server authentication ++---------------------------------- ++ ++Exim's -bh option can be useful for testing server authentication ++configurations. The data for the AUTH command has to be sent using base64 ++encoding. A quick way to produce such data for testing is the following Perl ++script: ++ ++use MIME::Base64; ++printf ("%s", encode_base64(eval "\"$ARGV[0]\"")); ++ ++This interprets its argument as a Perl string, and then encodes it. The ++interpretation as a Perl string allows binary zeros, which are required for ++some kinds of authentication, to be included in the data. For example, a ++command line to run this script on such data might be ++ ++encode '\0user\0password' ++ ++Note the use of single quotes to prevent the shell interpreting the ++backslashes, so that they can be interpreted by Perl to specify characters ++whose code value is zero. ++ ++Warning 1: If either of the user or password strings starts with an octal ++digit, you must use three zeros instead of one after the leading backslash. If ++you do not, the octal digit that starts your string will be incorrectly ++interpreted as part of the code for the first character. ++ ++Warning 2: If there are characters in the strings that Perl interprets ++specially, you must use a Perl escape to prevent them being misinterpreted. For ++example, a command such as ++ ++encode '\0user@domain.com\0pas$$word' ++ ++gives an incorrect answer because of the unescaped "@" and "$" characters. ++ ++If you have the mimencode command installed, another way to do produce ++base64-encoded strings is to run the command ++ ++echo -e -n `\0user\0password' | mimencode ++ ++The -e option of echo enables the interpretation of backslash escapes in the ++argument, and the -n option specifies no newline at the end of its output. ++However, not all versions of echo recognize these options, so you should check ++your version before relying on this suggestion. ++ ++ ++33.5 Authentication by an Exim client ++------------------------------------- ++ ++The smtp transport has two options called hosts_require_auth and hosts_try_auth ++. When the smtp transport connects to a server that announces support for ++authentication, and the host matches an entry in either of these options, Exim ++(as a client) tries to authenticate as follows: ++ ++ * For each authenticator that is configured as a client, in the order in ++ which they are defined in the configuration, it searches the authentication ++ mechanisms announced by the server for one whose name matches the public ++ name of the authenticator. ++ ++ * When it finds one that matches, it runs the authenticator's client code. ++ The variables $host and $host_address are available for any string ++ expansions that the client might do. They are set to the server's name and ++ IP address. If any expansion is forced to fail, the authentication attempt ++ is abandoned, and Exim moves on to the next authenticator. Otherwise an ++ expansion failure causes delivery to be deferred. ++ ++ * If the result of the authentication attempt is a temporary error or a ++ timeout, Exim abandons trying to send the message to the host for the ++ moment. It will try again later. If there are any backup hosts available, ++ they are tried in the usual way. ++ ++ * If the response to authentication is a permanent error (5xx code), Exim ++ carries on searching the list of authenticators and tries another one if ++ possible. If all authentication attempts give permanent errors, or if there ++ are no attempts because no mechanisms match (or option expansions force ++ failure), what happens depends on whether the host matches ++ hosts_require_auth or hosts_try_auth. In the first case, a temporary error ++ is generated, and delivery is deferred. The error can be detected in the ++ retry rules, and thereby turned into a permanent error if you wish. In the ++ second case, Exim tries to deliver the message unauthenticated. ++ ++When Exim has authenticated itself to a remote server, it adds the AUTH ++parameter to the MAIL commands it sends, if it has an authenticated sender for ++the message. If the message came from a remote host, the authenticated sender ++is the one that was receiving on an incoming MAIL command, provided that the ++incoming connection was authenticated and the server_mail_auth condition ++allowed the authenticated sender to be retained. If a local process calls Exim ++to send a message, the sender address that is built from the login name and ++qualify_domain is treated as authenticated. However, if the ++authenticated_sender option is set on the smtp transport, it overrides the ++authenticated sender that was received with the message. ++ ++ ++ ++=============================================================================== ++34. THE PLAINTEXT AUTHENTICATOR ++ ++The plaintext authenticator can be configured to support the PLAIN and LOGIN ++authentication mechanisms, both of which transfer authentication data as plain ++(unencrypted) text (though base64 encoded). The use of plain text is a security ++risk; you are strongly advised to insist on the use of SMTP encryption (see ++chapter 41) if you use the PLAIN or LOGIN mechanisms. If you do use unencrypted ++plain text, you should not use the same passwords for SMTP connections as you ++do for login accounts. ++ ++ ++34.1 Plaintext options ++---------------------- ++ ++When configured as a server, plaintext uses the following options: ++ +++-----------------------------------------------------------------+ ++|server_condition|Use: authenticators|Type: string*|Default: unset| +++-----------------------------------------------------------------+ ++ ++This is actually a global authentication option, but it must be set in order to ++configure the plaintext driver as a server. Its use is described below. ++ +++----------------------------------------------------------+ ++|server_prompts|Use: plaintext|Type: string*|Default: unset| +++----------------------------------------------------------+ ++ ++The contents of this option, after expansion, must be a colon-separated list of ++prompt strings. If expansion fails, a temporary authentication rejection is ++given. ++ ++ ++34.2 Using plaintext in a server ++-------------------------------- ++ ++When running as a server, plaintext performs the authentication test by ++expanding a string. The data sent by the client with the AUTH command, or in ++response to subsequent prompts, is base64 encoded, and so may contain any byte ++values when decoded. If any data is supplied with the command, it is treated as ++a list of strings, separated by NULs (binary zeros), the first three of which ++are placed in the expansion variables $auth1, $auth2, and $auth3 (neither LOGIN ++nor PLAIN uses more than three strings). ++ ++For compatibility with previous releases of Exim, the values are also placed in ++the expansion variables $1, $2, and $3. However, the use of these variables for ++this purpose is now deprecated, as it can lead to confusion in string ++expansions that also use them for other things. ++ ++If there are more strings in server_prompts than the number of strings supplied ++with the AUTH command, the remaining prompts are used to obtain more data. Each ++response from the client may be a list of NUL-separated strings. ++ ++Once a sufficient number of data strings have been received, server_condition ++is expanded. If the expansion is forced to fail, authentication fails. Any ++other expansion failure causes a temporary error code to be returned. If the ++result of a successful expansion is an empty string, "0", "no", or "false", ++authentication fails. If the result of the expansion is "1", "yes", or "true", ++authentication succeeds and the generic server_set_id option is expanded and ++saved in $authenticated_id. For any other result, a temporary error code is ++returned, with the expanded string as the error text, and the failed id saved ++in $authenticated_fail_id. ++ ++Warning: If you use a lookup in the expansion to find the user's password, be ++sure to make the authentication fail if the user is unknown. There are good and ++bad examples at the end of the next section. ++ ++ ++34.3 The PLAIN authentication mechanism ++--------------------------------------- ++ ++The PLAIN authentication mechanism (RFC 2595) specifies that three strings be ++sent as one item of data (that is, one combined string containing two NUL ++separators). The data is sent either as part of the AUTH command, or ++subsequently in response to an empty prompt from the server. ++ ++The second and third strings are a user name and a corresponding password. ++Using a single fixed user name and password as an example, this could be ++configured as follows: ++ ++fixed_plain: ++ driver = plaintext ++ public_name = PLAIN ++ server_prompts = : ++ server_condition = \ ++ ${if and {{eq{$auth2}{username}}{eq{$auth3}{mysecret}}}} ++ server_set_id = $auth2 ++ ++Note that the default result strings from if ("true" or an empty string) are ++exactly what we want here, so they need not be specified. Obviously, if the ++password contains expansion-significant characters such as dollar, backslash, ++or closing brace, they have to be escaped. ++ ++The server_prompts setting specifies a single, empty prompt (empty items at the ++end of a string list are ignored). If all the data comes as part of the AUTH ++command, as is commonly the case, the prompt is not used. This authenticator is ++advertised in the response to EHLO as ++ ++250-AUTH PLAIN ++ ++and a client host can authenticate itself by sending the command ++ ++AUTH PLAIN AHVzZXJuYW1lAG15c2VjcmV0 ++ ++As this contains three strings (more than the number of prompts), no further ++data is required from the client. Alternatively, the client may just send ++ ++AUTH PLAIN ++ ++to initiate authentication, in which case the server replies with an empty ++prompt. The client must respond with the combined data string. ++ ++The data string is base64 encoded, as required by the RFC. This example, when ++decoded, is <NUL>"username"<NUL>"mysecret", where <NUL> represents a zero byte. ++This is split up into three strings, the first of which is empty. The ++server_condition option in the authenticator checks that the second two are ++"username" and "mysecret" respectively. ++ ++Having just one fixed user name and password, as in this example, is not very ++realistic, though for a small organization with only a handful of ++authenticating clients it could make sense. ++ ++A more sophisticated instance of this authenticator could use the user name in ++$auth2 to look up a password in a file or database, and maybe do an encrypted ++comparison (see crypteq in chapter 11). Here is a example of this approach, ++where the passwords are looked up in a DBM file. Warning: This is an incorrect ++example: ++ ++server_condition = \ ++ ${if eq{$auth3}{${lookup{$auth2}dbm{/etc/authpwd}}}} ++ ++The expansion uses the user name ($auth2) as the key to look up a password, ++which it then compares to the supplied password ($auth3). Why is this example ++incorrect? It works fine for existing users, but consider what happens if a ++non-existent user name is given. The lookup fails, but as no success/failure ++strings are given for the lookup, it yields an empty string. Thus, to defeat ++the authentication, all a client has to do is to supply a non-existent user ++name and an empty password. The correct way of writing this test is: ++ ++server_condition = ${lookup{$auth2}dbm{/etc/authpwd}\ ++ {${if eq{$value}{$auth3}}} {false}} ++ ++In this case, if the lookup succeeds, the result is checked; if the lookup ++fails, "false" is returned and authentication fails. If crypteq is being used ++instead of eq, the first example is in fact safe, because crypteq always fails ++if its second argument is empty. However, the second way of writing the test ++makes the logic clearer. ++ ++ ++34.4 The LOGIN authentication mechanism ++--------------------------------------- ++ ++The LOGIN authentication mechanism is not documented in any RFC, but is in use ++in a number of programs. No data is sent with the AUTH command. Instead, a user ++name and password are supplied separately, in response to prompts. The ++plaintext authenticator can be configured to support this as in this example: ++ ++fixed_login: ++ driver = plaintext ++ public_name = LOGIN ++ server_prompts = User Name : Password ++ server_condition = \ ++ ${if and {{eq{$auth1}{username}}{eq{$auth2}{mysecret}}}} ++ server_set_id = $auth1 ++ ++Because of the way plaintext operates, this authenticator accepts data supplied ++with the AUTH command (in contravention of the specification of LOGIN), but if ++the client does not supply it (as is the case for LOGIN clients), the prompt ++strings are used to obtain two data items. ++ ++Some clients are very particular about the precise text of the prompts. For ++example, Outlook Express is reported to recognize only "Username:" and ++"Password:". Here is an example of a LOGIN authenticator that uses those ++strings. It uses the ldapauth expansion condition to check the user name and ++password by binding to an LDAP server: ++ ++login: ++ driver = plaintext ++ public_name = LOGIN ++ server_prompts = Username:: : Password:: ++ server_condition = ${if and{{ \ ++ !eq{}{$auth1} }{ \ ++ ldapauth{\ ++ user="uid=${quote_ldap_dn:$auth1},ou=people,o=example.org" \ ++ pass=${quote:$auth2} \ ++ ldap://ldap.example.org/} }} } ++ server_set_id = uid=$auth1,ou=people,o=example.org ++ ++We have to check that the username is not empty before using it, because LDAP ++does not permit empty DN components. We must also use the quote_ldap_dn ++operator to correctly quote the DN for authentication. However, the basic quote ++operator, rather than any of the LDAP quoting operators, is the correct one to ++use for the password, because quoting is needed only to make the password ++conform to the Exim syntax. At the LDAP level, the password is an uninterpreted ++string. ++ ++ ++34.5 Support for different kinds of authentication ++-------------------------------------------------- ++ ++A number of string expansion features are provided for the purpose of ++interfacing to different ways of user authentication. These include checking ++traditionally encrypted passwords from /etc/passwd (or equivalent), PAM, ++Radius, ldapauth, pwcheck, and saslauthd. For details see section 11.7. ++ ++ ++34.6 Using plaintext in a client ++-------------------------------- ++ ++The plaintext authenticator has two client options: ++ +++------------------------------------------------------------------------+ ++|client_ignore_invalid_base64|Use: plaintext|Type: boolean|Default: false| +++------------------------------------------------------------------------+ ++ ++If the client receives a server prompt that is not a valid base64 string, ++authentication is abandoned by default. However, if this option is set true, ++the error in the challenge is ignored and the client sends the response as ++usual. ++ +++-------------------------------------------------------+ ++|client_send|Use: plaintext|Type: string*|Default: unset| +++-------------------------------------------------------+ ++ ++The string is a colon-separated list of authentication data strings. Each ++string is independently expanded before being sent to the server. The first ++string is sent with the AUTH command; any more strings are sent in response to ++prompts from the server. Before each string is expanded, the value of the most ++recent prompt is placed in the next $auth<n> variable, starting with $auth1 for ++the first prompt. Up to three prompts are stored in this way. Thus, the prompt ++that is received in response to sending the first string (with the AUTH ++command) can be used in the expansion of the second string, and so on. If an ++invalid base64 string is received when client_ignore_invalid_base64 is set, an ++empty string is put in the $auth<n> variable. ++ ++Note: You cannot use expansion to create multiple strings, because splitting ++takes priority and happens first. ++ ++Because the PLAIN authentication mechanism requires NUL (binary zero) bytes in ++the data, further processing is applied to each string before it is sent. If ++there are any single circumflex characters in the string, they are converted to ++NULs. Should an actual circumflex be required as data, it must be doubled in ++the string. ++ ++This is an example of a client configuration that implements the PLAIN ++authentication mechanism with a fixed user name and password: ++ ++fixed_plain: ++ driver = plaintext ++ public_name = PLAIN ++ client_send = ^username^mysecret ++ ++The lack of colons means that the entire text is sent with the AUTH command, ++with the circumflex characters converted to NULs. A similar example that uses ++the LOGIN mechanism is: ++ ++fixed_login: ++ driver = plaintext ++ public_name = LOGIN ++ client_send = : username : mysecret ++ ++The initial colon means that the first string is empty, so no data is sent with ++the AUTH command itself. The remaining strings are sent in response to prompts. ++ ++ ++ ++=============================================================================== ++35. THE CRAM_MD5 AUTHENTICATOR ++ ++The CRAM-MD5 authentication mechanism is described in RFC 2195. The server ++sends a challenge string to the client, and the response consists of a user ++name and the CRAM-MD5 digest of the challenge string combined with a secret ++string (password) which is known to both server and client. Thus, the secret is ++not sent over the network as plain text, which makes this authenticator more ++secure than plaintext. However, the downside is that the secret has to be ++available in plain text at either end. ++ ++ ++35.1 Using cram_md5 as a server ++------------------------------- ++ ++This authenticator has one server option, which must be set to configure the ++authenticator as a server: ++ +++--------------------------------------------------------+ ++|server_secret|Use: cram_md5|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++When the server receives the client's response, the user name is placed in the ++expansion variable $auth1, and server_secret is expanded to obtain the password ++for that user. The server then computes the CRAM-MD5 digest that the client ++should have sent, and checks that it received the correct string. If the ++expansion of server_secret is forced to fail, authentication fails. If the ++expansion fails for some other reason, a temporary error code is returned to ++the client. ++ ++For compatibility with previous releases of Exim, the user name is also placed ++in $1. However, the use of this variables for this purpose is now deprecated, ++as it can lead to confusion in string expansions that also use numeric ++variables for other things. ++ ++For example, the following authenticator checks that the user name given by the ++client is "ph10", and if so, uses "secret" as the password. For any other user ++name, authentication fails. ++ ++fixed_cram: ++ driver = cram_md5 ++ public_name = CRAM-MD5 ++ server_secret = ${if eq{$auth1}{ph10}{secret}fail} ++ server_set_id = $auth1 ++ ++If authentication succeeds, the setting of server_set_id preserves the user ++name in $authenticated_id. A more typical configuration might look up the ++secret string in a file, using the user name as the key. For example: ++ ++lookup_cram: ++ driver = cram_md5 ++ public_name = CRAM-MD5 ++ server_secret = ${lookup{$auth1}lsearch{/etc/authpwd}\ ++ {$value}fail} ++ server_set_id = $auth1 ++ ++Note that this expansion explicitly forces failure if the lookup fails because ++$auth1 contains an unknown user name. ++ ++As another example, if you wish to re-use a Cyrus SASL sasldb2 file without ++using the relevant libraries, you need to know the realm to specify in the ++lookup and then ask for the "userPassword" attribute for that user in that ++realm, with: ++ ++cyrusless_crammd5: ++ driver = cram_md5 ++ public_name = CRAM-MD5 ++ server_secret = ${lookup{$auth1:mail.example.org:userPassword}\ ++ dbmjz{/etc/sasldb2}} ++ server_set_id = $auth1 ++ ++ ++35.2 Using cram_md5 as a client ++------------------------------- ++ ++When used as a client, the cram_md5 authenticator has two options: ++ +++----------------------------------------------------------------------+ ++|client_name|Use: cram_md5|Type: string*|Default: the primary host name| +++----------------------------------------------------------------------+ ++ ++This string is expanded, and the result used as the user name data when ++computing the response to the server's challenge. ++ +++--------------------------------------------------------+ ++|client_secret|Use: cram_md5|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++This option must be set for the authenticator to work as a client. Its value is ++expanded and the result used as the secret string when computing the response. ++ ++Different user names and secrets can be used for different servers by referring ++to $host or $host_address in the options. Forced failure of either expansion ++string is treated as an indication that this authenticator is not prepared to ++handle this case. Exim moves on to the next configured client authenticator. ++Any other expansion failure causes Exim to give up trying to send the message ++to the current server. ++ ++A simple example configuration of a cram_md5 authenticator, using fixed ++strings, is: ++ ++fixed_cram: ++ driver = cram_md5 ++ public_name = CRAM-MD5 ++ client_name = ph10 ++ client_secret = secret ++ ++ ++ ++=============================================================================== ++36. THE CYRUS_SASL AUTHENTICATOR ++ ++The code for this authenticator was provided by Matthew Byng-Maddick of A L ++Digital Ltd (http://www.aldigital.co.uk). ++ ++The cyrus_sasl authenticator provides server support for the Cyrus SASL library ++implementation of the RFC 2222 ("Simple Authentication and Security Layer"). ++This library supports a number of authentication mechanisms, including PLAIN ++and LOGIN, but also several others that Exim does not support directly. In ++particular, there is support for Kerberos authentication. ++ ++The cyrus_sasl authenticator provides a gatewaying mechanism directly to the ++Cyrus interface, so if your Cyrus library can do, for example, CRAM-MD5, then ++so can the cyrus_sasl authenticator. By default it uses the public name of the ++driver to determine which mechanism to support. ++ ++Where access to some kind of secret file is required, for example in GSSAPI or ++CRAM-MD5, it is worth noting that the authenticator runs as the Exim user, and ++that the Cyrus SASL library has no way of escalating privileges by default. You ++may also find you need to set environment variables, depending on the driver ++you are using. ++ ++The application name provided by Exim is "exim", so various SASL options may be ++set in exim.conf in your SASL directory. If you are using GSSAPI for Kerberos, ++note that because of limitations in the GSSAPI interface, changing the server ++keytab might need to be communicated down to the Kerberos layer independently. ++The mechanism for doing so is dependent upon the Kerberos implementation. ++ ++For example, for older releases of Heimdal, the environment variable ++KRB5_KTNAME may be set to point to an alternative keytab file. Exim will pass ++this variable through from its own inherited environment when started as root ++or the Exim user. The keytab file needs to be readable by the Exim user. With ++newer releases of Heimdal, a setuid Exim may cause Heimdal to discard the ++environment variable. In practice, for those releases, the Cyrus authenticator ++is not a suitable interface for GSSAPI (Kerberos) support. Instead, consider ++the heimdal_gssapi authenticator, described in chapter 39 ++ ++ ++36.1 Using cyrus_sasl as a server ++--------------------------------- ++ ++The cyrus_sasl authenticator has four private options. It puts the username (on ++a successful authentication) into $auth1. For compatibility with previous ++releases of Exim, the username is also placed in $1. However, the use of this ++variable for this purpose is now deprecated, as it can lead to confusion in ++string expansions that also use numeric variables for other things. ++ +++----------------------------------------------------------------+ ++|server_hostname|Use: cyrus_sasl|Type: string*|Default: see below| +++----------------------------------------------------------------+ ++ ++This option selects the hostname that is used when communicating with the ++library. The default value is "$primary_hostname". It is up to the underlying ++SASL plug-in what it does with this data. ++ +++-----------------------------------------------------------+ ++|server_mech|Use: cyrus_sasl|Type: string|Default: see below| +++-----------------------------------------------------------+ ++ ++This option selects the authentication mechanism this driver should use. The ++default is the value of the generic public_name option. This option allows you ++to use a different underlying mechanism from the advertised name. For example: ++ ++sasl: ++ driver = cyrus_sasl ++ public_name = X-ANYTHING ++ server_mech = CRAM-MD5 ++ server_set_id = $auth1 ++ +++---------------------------------------------------------+ ++|server_realm|Use: cyrus_sasl|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++This specifies the SASL realm that the server claims to be in. ++ +++-----------------------------------------------------------+ ++|server_service|Use: cyrus_sasl|Type: string|Default: "smtp"| +++-----------------------------------------------------------+ ++ ++This is the SASL service that the server claims to implement. ++ ++For straightforward cases, you do not need to set any of the authenticator's ++private options. All you need to do is to specify an appropriate mechanism as ++the public name. Thus, if you have a SASL library that supports CRAM-MD5 and ++PLAIN, you could have two authenticators as follows: ++ ++sasl_cram_md5: ++ driver = cyrus_sasl ++ public_name = CRAM-MD5 ++ server_set_id = $auth1 ++ ++sasl_plain: ++ driver = cyrus_sasl ++ public_name = PLAIN ++ server_set_id = $auth2 ++ ++Cyrus SASL does implement the LOGIN authentication method, even though it is ++not a standard method. It is disabled by default in the source distribution, ++but it is present in many binary distributions. ++ ++ ++ ++=============================================================================== ++37. THE DOVECOT AUTHENTICATOR ++ ++This authenticator is an interface to the authentication facility of the ++Dovecot POP/IMAP server, which can support a number of authentication methods. ++If you are using Dovecot to authenticate POP/IMAP clients, it might be helpful ++to use the same mechanisms for SMTP authentication. This is a server ++authenticator only. There is only one option: ++ +++------------------------------------------------------+ ++|server_socket|Use: dovecot|Type: string|Default: unset| +++------------------------------------------------------+ ++ ++This option must specify the socket that is the interface to Dovecot ++authentication. The public_name option must specify an authentication mechanism ++that Dovecot is configured to support. You can have several authenticators for ++different mechanisms. For example: ++ ++dovecot_plain: ++ driver = dovecot ++ public_name = PLAIN ++ server_socket = /var/run/dovecot/auth-client ++ server_set_id = $auth2 ++ ++dovecot_ntlm: ++ driver = dovecot ++ public_name = NTLM ++ server_socket = /var/run/dovecot/auth-client ++ server_set_id = $auth1 ++ ++If the SMTP connection is encrypted, or if $sender_host_address is equal to ++$received_ip_address (that is, the connection is local), the "secured" option ++is passed in the Dovecot authentication command. If, for a TLS connection, a ++client certificate has been verified, the "valid-client-cert" option is passed. ++When authentication succeeds, the identity of the user who authenticated is ++placed in $auth1. ++ ++ ++ ++=============================================================================== ++38. THE GSASL AUTHENTICATOR ++ ++The gsasl authenticator provides server integration for the GNU SASL library ++and the mechanisms it provides. This is new as of the 4.80 release and there ++are a few areas where the library does not let Exim smoothly scale to handle ++future authentication mechanisms, so no guarantee can be made that any ++particular new authentication mechanism will be supported without code changes ++in Exim. ++ +++-------------------------------------------------------------+ ++|server_channelbinding|Use: gsasl|Type: boolean|Default: false| +++-------------------------------------------------------------+ ++ ++Some authentication mechanisms are able to use external context at both ends of ++the session to bind the authentication to that context, and fail the ++authentication process if that context differs. Specifically, some TLS ++ciphersuites can provide identifying information about the cryptographic ++context. ++ ++This means that certificate identity and verification becomes a non-issue, as a ++man-in-the-middle attack will cause the correct client and server to see ++different identifiers and authentication will fail. ++ ++This is currently only supported when using the GnuTLS library. This is only ++usable by mechanisms which support "channel binding"; at time of writing, ++that's the SCRAM family. ++ ++This defaults off to ensure smooth upgrade across Exim releases, in case this ++option causes some clients to start failing. Some future release of Exim may ++switch the default to be true. ++ +++-----------------------------------------------------------+ ++|server_hostname|Use: gsasl|Type: string*|Default: see below| +++-----------------------------------------------------------+ ++ ++This option selects the hostname that is used when communicating with the ++library. The default value is "$primary_hostname". Some mechanisms will use ++this data. ++ +++------------------------------------------------------+ ++|server_mech|Use: gsasl|Type: string|Default: see below| +++------------------------------------------------------+ ++ ++This option selects the authentication mechanism this driver should use. The ++default is the value of the generic public_name option. This option allows you ++to use a different underlying mechanism from the advertised name. For example: ++ ++sasl: ++ driver = gsasl ++ public_name = X-ANYTHING ++ server_mech = CRAM-MD5 ++ server_set_id = $auth1 ++ +++-------------------------------------------------------+ ++|server_password|Use: gsasl|Type: string*|Default: unset| +++-------------------------------------------------------+ ++ ++Various mechanisms need access to the cleartext password on the server, so that ++proof-of-possession can be demonstrated on the wire, without sending the ++password itself. ++ ++The data available for lookup varies per mechanism. In all cases, $auth1 is set ++to the authentication id. The $auth2 variable will always be the authorization ++id (authz) if available, else the empty string. The $auth3 variable will always ++be the realm if available, else the empty string. ++ ++A forced failure will cause authentication to defer. ++ ++If using this option, it may make sense to set the server_condition option to ++be simply "true". ++ +++----------------------------------------------------+ ++|server_realm|Use: gsasl|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++This specifies the SASL realm that the server claims to be in. Some mechanisms ++will use this data. ++ +++---------------------------------------------------------+ ++|server_scram_iter|Use: gsasl|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++This option provides data for the SCRAM family of mechanisms. $auth1 is not ++available at evaluation time. (This may change, as we receive feedback on use) ++ +++---------------------------------------------------------+ ++|server_scram_salt|Use: gsasl|Type: string*|Default: unset| +++---------------------------------------------------------+ ++ ++This option provides data for the SCRAM family of mechanisms. $auth1 is not ++available at evaluation time. (This may change, as we receive feedback on use) ++ +++------------------------------------------------------+ ++|server_service|Use: gsasl|Type: string|Default: "smtp"| +++------------------------------------------------------+ ++ ++This is the SASL service that the server claims to implement. Some mechanisms ++will use this data. ++ ++ ++38.1 gsasl auth variables ++------------------------- ++ ++These may be set when evaluating specific options, as detailed above. They will ++also be set when evaluating server_condition. ++ ++Unless otherwise stated below, the gsasl integration will use the following ++meanings for these variables: ++ ++ * $auth1: the authentication id ++ ++ * $auth2: the authorization id ++ ++ * $auth3: the realm ++ ++On a per-mechanism basis: ++ ++ * EXTERNAL: only $auth1 is set, to the possibly empty authorization id; the ++ server_condition option must be present. ++ ++ * ANONYMOUS: only $auth1 is set, to the possibly empty anonymous token; the ++ server_condition option must be present. ++ ++ * GSSAPI: $auth1 will be set to the GSSAPI Display Name; $auth2 will be set ++ to the authorization id, the server_condition option must be present. ++ ++An anonymous token is something passed along as an unauthenticated identifier; ++this is analogous to FTP anonymous authentication passing an email address, or ++software-identifier@, as the "password". ++ ++An example showing the password having the realm specified in the callback and ++demonstrating a Cyrus SASL to GSASL migration approach is: ++ ++gsasl_cyrusless_crammd5: ++ driver = gsasl ++ public_name = CRAM-MD5 ++ server_realm = imap.example.org ++ server_password = ${lookup{$auth1:$auth3:userPassword}\ ++ dbmjz{/etc/sasldb2}{$value}fail} ++ server_set_id = ${quote:$auth1} ++ server_condition = yes ++ ++ ++ ++=============================================================================== ++39. THE HEIMDAL_GSSAPI AUTHENTICATOR ++ ++The heimdal_gssapi authenticator provides server integration for the Heimdal ++GSSAPI/Kerberos library, permitting Exim to set a keytab pathname reliably. ++ +++--------------------------------------------------------------------+ ++|server_hostname|Use: heimdal_gssapi|Type: string*|Default: see below| +++--------------------------------------------------------------------+ ++ ++This option selects the hostname that is used, with server_service, for ++constructing the GSS server name, as a GSS_C_NT_HOSTBASED_SERVICE identifier. ++The default value is "$primary_hostname". ++ +++--------------------------------------------------------------+ ++|server_keytab|Use: heimdal_gssapi|Type: string*|Default: unset| +++--------------------------------------------------------------+ ++ ++If set, then Heimdal will not use the system default keytab (typically /etc/ ++krb5.keytab) but instead the pathname given in this option. The value should be ++a pathname, with no "file:" prefix. ++ +++--------------------------------------------------------------+ ++|server_service|Use: heimdal_gssapi|Type: string*|Default: smtp| +++--------------------------------------------------------------+ ++ ++This option specifies the service identifier used, in conjunction with ++server_hostname, for building the identifer for finding credentials from the ++keytab. ++ ++ ++39.1 heimdal_gssapi auth variables ++---------------------------------- ++ ++Beware that these variables will typically include a realm, thus will appear to ++be roughly like an email address already. The authzid in $auth2 is not ++verified, so a malicious client can set it to anything. ++ ++The $auth1 field should be safely trustable as a value from the Key ++Distribution Center. Note that these are not quite email addresses. Each ++identifier is for a role, and so the left-hand-side may include a role suffix. ++For instance, "joe/admin@EXAMPLE.ORG". ++ ++ * $auth1: the authentication id, set to the GSS Display Name. ++ ++ * $auth2: the authorization id, sent within SASL encapsulation after ++ authentication. If that was empty, this will also be set to the GSS Display ++ Name. ++ ++ ++ ++=============================================================================== ++40. THE SPA AUTHENTICATOR ++ ++The spa authenticator provides client support for Microsoft's Secure Password ++Authentication mechanism, which is also sometimes known as NTLM (NT LanMan). ++The code for client side of this authenticator was contributed by Marc ++Prud'hommeaux, and much of it is taken from the Samba project (http:// ++www.samba.org). The code for the server side was subsequently contributed by ++Tom Kistner. The mechanism works as follows: ++ ++ * After the AUTH command has been accepted, the client sends an SPA ++ authentication request based on the user name and optional domain. ++ ++ * The server sends back a challenge. ++ ++ * The client builds a challenge response which makes use of the user's ++ password and sends it to the server, which then accepts or rejects it. ++ ++Encryption is used to protect the password in transit. ++ ++ ++40.1 Using spa as a server ++-------------------------- ++ ++The spa authenticator has just one server option: ++ +++-----------------------------------------------------+ ++|server_password|Use: spa|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++This option is expanded, and the result must be the cleartext password for the ++authenticating user, whose name is at this point in $auth1. For compatibility ++with previous releases of Exim, the user name is also placed in $1. However, ++the use of this variable for this purpose is now deprecated, as it can lead to ++confusion in string expansions that also use numeric variables for other ++things. For example: ++ ++spa: ++ driver = spa ++ public_name = NTLM ++ server_password = \ ++ ${lookup{$auth1}lsearch{/etc/exim/spa_clearpass}{$value}fail} ++ ++If the expansion is forced to fail, authentication fails. Any other expansion ++failure causes a temporary error code to be returned. ++ ++ ++40.2 Using spa as a client ++-------------------------- ++ ++The spa authenticator has the following client options: ++ +++---------------------------------------------------+ ++|client_domain|Use: spa|Type: string*|Default: unset| +++---------------------------------------------------+ ++ ++This option specifies an optional domain for the authentication. ++ +++-----------------------------------------------------+ ++|client_password|Use: spa|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++This option specifies the user's password, and must be set. ++ +++-----------------------------------------------------+ ++|client_username|Use: spa|Type: string*|Default: unset| +++-----------------------------------------------------+ ++ ++This option specifies the user name, and must be set. Here is an example of a ++configuration of this authenticator for use with the mail servers at msn.com: ++ ++msn: ++ driver = spa ++ public_name = MSN ++ client_username = msn/msn_username ++ client_password = msn_plaintext_password ++ client_domain = DOMAIN_OR_UNSET ++ ++ ++ ++=============================================================================== ++41. ENCRYPTED SMTP CONNECTIONS USING TLS/SSL ++ ++Support for TLS (Transport Layer Security), formerly known as SSL (Secure ++Sockets Layer), is implemented by making use of the OpenSSL library or the ++GnuTLS library (Exim requires GnuTLS release 1.0 or later). There is no ++cryptographic code in the Exim distribution itself for implementing TLS. In ++order to use this feature you must install OpenSSL or GnuTLS, and then build a ++version of Exim that includes TLS support (see section 4.7). You also need to ++understand the basic concepts of encryption at a managerial level, and in ++particular, the way that public keys, private keys, and certificates are used. ++ ++RFC 3207 defines how SMTP connections can make use of encryption. Once a ++connection is established, the client issues a STARTTLS command. If the server ++accepts this, the client and the server negotiate an encryption mechanism. If ++the negotiation succeeds, the data that subsequently passes between them is ++encrypted. ++ ++Exim's ACLs can detect whether the current SMTP session is encrypted or not, ++and if so, what cipher suite is in use, whether the client supplied a ++certificate, and whether or not that certificate was verified. This makes it ++possible for an Exim server to deny or accept certain commands based on the ++encryption state. ++ ++Warning: Certain types of firewall and certain anti-virus products can disrupt ++TLS connections. You need to turn off SMTP scanning for these products in order ++to get TLS to work. ++ ++ ++41.1 Support for the legacy "ssmtp" (aka "smtps") protocol ++---------------------------------------------------------- ++ ++Early implementations of encrypted SMTP used a different TCP port from normal ++SMTP, and expected an encryption negotiation to start immediately, instead of ++waiting for a STARTTLS command from the client using the standard SMTP port. ++The protocol was called "ssmtp" or "smtps", and port 465 was allocated for this ++purpose. ++ ++This approach was abandoned when encrypted SMTP was standardized, but there are ++still some legacy clients that use it. Exim supports these clients by means of ++the tls_on_connect_ports global option. Its value must be a list of port ++numbers; the most common use is expected to be: ++ ++tls_on_connect_ports = 465 ++ ++The port numbers specified by this option apply to all SMTP connections, both ++via the daemon and via inetd. You still need to specify all the ports that the ++daemon uses (by setting daemon_smtp_ports or local_interfaces or the -oX ++command line option) because tls_on_connect_ports does not add an extra port - ++rather, it specifies different behaviour on a port that is defined elsewhere. ++ ++There is also a -tls-on-connect command line option. This overrides ++tls_on_connect_ports; it forces the legacy behaviour for all ports. ++ ++ ++41.2 OpenSSL vs GnuTLS ++---------------------- ++ ++The first TLS support in Exim was implemented using OpenSSL. Support for GnuTLS ++followed later, when the first versions of GnuTLS were released. To build Exim ++to use GnuTLS, you need to set ++ ++USE_GNUTLS=yes ++ ++in Local/Makefile, in addition to ++ ++SUPPORT_TLS=yes ++ ++You must also set TLS_LIBS and TLS_INCLUDE appropriately, so that the include ++files and libraries for GnuTLS can be found. ++ ++There are some differences in usage when using GnuTLS instead of OpenSSL: ++ ++ * The tls_verify_certificates option must contain the name of a file, not the ++ name of a directory (for OpenSSL it can be either). ++ ++ * The default value for tls_dhparam differs for historical reasons. ++ ++ * Distinguished Name (DN) strings reported by the OpenSSL library use a slash ++ for separating fields; GnuTLS uses commas, in accordance with RFC 2253. ++ This affects the value of the $tls_in_peerdn and $tls_out_peerdn variables. ++ ++ * OpenSSL identifies cipher suites using hyphens as separators, for example: ++ DES-CBC3-SHA. GnuTLS historically used underscores, for example: ++ RSA_ARCFOUR_SHA. What is more, OpenSSL complains if underscores are present ++ in a cipher list. To make life simpler, Exim changes underscores to hyphens ++ for OpenSSL and passes the string unchanged to GnuTLS (expecting the ++ library to handle its own older variants) when processing lists of cipher ++ suites in the tls_require_ciphers options (the global option and the smtp ++ transport option). ++ ++ * The tls_require_ciphers options operate differently, as described in the ++ sections 41.4 and 41.5. ++ ++ * The tls_dh_min_bits SMTP transport option is only honoured by GnuTLS. When ++ using OpenSSL, this option is ignored. (If an API is found to let OpenSSL ++ be configured in this way, let the Exim Maintainers know and we'll likely ++ use it). ++ ++ * Some other recently added features may only be available in one or the ++ other. This should be documented with the feature. If the documentation ++ does not explicitly state that the feature is infeasible in the other TLS ++ implementation, then patches are welcome. ++ ++ ++41.3 GnuTLS parameter computation ++--------------------------------- ++ ++This section only applies if tls_dhparam is set to "historic" or to an explicit ++path; if the latter, then the text about generation still applies, but not the ++chosen filename. By default, as of Exim 4.80 a hard-coded D-H prime is used. ++See the documentation of tls_dhparam for more information. ++ ++GnuTLS uses D-H parameters that may take a substantial amount of time to ++compute. It is unreasonable to re-compute them for every TLS session. ++Therefore, Exim keeps this data in a file in its spool directory, called ++gnutls-params-NNNN for some value of NNNN, corresponding to the number of bits ++requested. The file is owned by the Exim user and is readable only by its ++owner. Every Exim process that start up GnuTLS reads the D-H parameters from ++this file. If the file does not exist, the first Exim process that needs it ++computes the data and writes it to a temporary file which is renamed once it is ++complete. It does not matter if several Exim processes do this simultaneously ++(apart from wasting a few resources). Once a file is in place, new Exim ++processes immediately start using it. ++ ++For maximum security, the parameters that are stored in this file should be ++recalculated periodically, the frequency depending on your paranoia level. If ++you are avoiding using the fixed D-H primes published in RFCs, then you are ++concerned about some advanced attacks and will wish to do this; if you do not ++regenerate then you might as well stick to the standard primes. ++ ++Arranging this is easy in principle; just delete the file when you want new ++values to be computed. However, there may be a problem. The calculation of new ++parameters needs random numbers, and these are obtained from /dev/random. If ++the system is not very active, /dev/random may delay returning data until ++enough randomness (entropy) is available. This may cause Exim to hang for a ++substantial amount of time, causing timeouts on incoming connections. ++ ++The solution is to generate the parameters externally to Exim. They are stored ++in gnutls-params-N in PEM format, which means that they can be generated ++externally using the certtool command that is part of GnuTLS. ++ ++To replace the parameters with new ones, instead of deleting the file and ++letting Exim re-create it, you can generate new parameters using certtool and, ++when this has been done, replace Exim's cache file by renaming. The relevant ++commands are something like this: ++ ++# ls ++[ look for file; assume gnutls-params-2236 is the most recent ] ++# rm -f new-params ++# touch new-params ++# chown exim:exim new-params ++# chmod 0600 new-params ++# certtool --generate-dh-params --bits 2236 >>new-params ++# openssl dhparam -noout -text -in new-params | head ++[ check the first line, make sure it's not more than 2236; ++ if it is, then go back to the start ("rm") and repeat ++ until the size generated is at most the size requested ] ++# chmod 0400 new-params ++# mv new-params gnutls-params-2236 ++ ++If Exim never has to generate the parameters itself, the possibility of ++stalling is removed. ++ ++The filename changed in Exim 4.80, to gain the -bits suffix. The value which ++Exim will choose depends upon the version of GnuTLS in use. For older GnuTLS, ++the value remains hard-coded in Exim as 1024. As of GnuTLS 2.12.x, there is a ++way for Exim to ask for the "normal" number of bits for D-H public-key usage, ++and Exim does so. This attempt to remove Exim from TLS policy decisions failed, ++as GnuTLS 2.12 returns a value higher than the current hard-coded limit of the ++NSS library. Thus Exim gains the tls_dh_max_bits global option, which applies ++to all D-H usage, client or server. If the value returned by GnuTLS is greater ++than tls_dh_max_bits then the value will be clamped down to tls_dh_max_bits. ++The default value has been set at the current NSS limit, which is still much ++higher than Exim historically used. ++ ++The filename and bits used will change as the GnuTLS maintainers change the ++value for their parameter "GNUTLS_SEC_PARAM_NORMAL", as clamped by ++tls_dh_max_bits. At the time of writing (mid 2012), GnuTLS 2.12 recommends 2432 ++bits, while NSS is limited to 2236 bits. ++ ++In fact, the requested value will be *lower* than tls_dh_max_bits, to increase ++the chance of the generated prime actually being within acceptable bounds, as ++GnuTLS has been observed to overshoot. Note the check step in the procedure ++above. There is no sane procedure available to Exim to double-check the size of ++the generated prime, so it might still be too large. ++ ++ ++41.4 Requiring specific ciphers in OpenSSL ++------------------------------------------ ++ ++There is a function in the OpenSSL library that can be passed a list of cipher ++suites before the cipher negotiation takes place. This specifies which ciphers ++are acceptable. The list is colon separated and may contain names like ++DES-CBC3-SHA. Exim passes the expanded value of tls_require_ciphers directly to ++this function call. Many systems will install the OpenSSL manual-pages, so you ++may have ciphers(1) available to you. The following quotation from the OpenSSL ++documentation specifies what forms of item are allowed in the cipher string: ++ ++ * It can consist of a single cipher suite such as RC4-SHA. ++ ++ * It can represent a list of cipher suites containing a certain algorithm, or ++ cipher suites of a certain type. For example SHA1 represents all ciphers ++ suites using the digest algorithm SHA1 and SSLv3 represents all SSL v3 ++ algorithms. ++ ++ * Lists of cipher suites can be combined in a single cipher string using the ++ + character. This is used as a logical and operation. For example SHA1+DES ++ represents all cipher suites containing the SHA1 and the DES algorithms. ++ ++Each cipher string can be optionally preceded by one of the characters "!", "-" ++or "+". ++ ++ * If "!" is used, the ciphers are permanently deleted from the list. The ++ ciphers deleted can never reappear in the list even if they are explicitly ++ stated. ++ ++ * If "-" is used, the ciphers are deleted from the list, but some or all of ++ the ciphers can be added again by later options. ++ ++ * If "+" is used, the ciphers are moved to the end of the list. This option ++ does not add any new ciphers; it just moves matching existing ones. ++ ++If none of these characters is present, the string is interpreted as a list of ++ciphers to be appended to the current preference list. If the list includes any ++ciphers already present they will be ignored: that is, they will not be moved ++to the end of the list. ++ ++The OpenSSL ciphers(1) command may be used to test the results of a given ++string: ++ ++# note single-quotes to get ! past any shell history expansion ++$ openssl ciphers 'HIGH:!MD5:!SHA1' ++ ++This example will let the library defaults be permitted on the MX port, where ++there's probably no identity verification anyway, but ups the ante on the ++submission ports where the administrator might have some influence on the ++choice of clients used: ++ ++# OpenSSL variant; see man ciphers(1) ++tls_require_ciphers = ${if =={$received_port}{25}\ ++ {DEFAULT}\ ++ {HIGH:!MD5:!SHA1}} ++ ++ ++41.5 Requiring specific ciphers or other parameters in GnuTLS ++------------------------------------------------------------- ++ ++The GnuTLS library allows the caller to provide a "priority string", documented ++as part of the gnutls_priority_init function. This is very similar to the ++ciphersuite specification in OpenSSL. ++ ++The tls_require_ciphers option is treated as the GnuTLS priority string. ++ ++The tls_require_ciphers option is available both as an global option, ++controlling how Exim behaves as a server, and also as an option of the smtp ++transport, controlling how Exim behaves as a client. In both cases the value is ++string expanded. The resulting string is not an Exim list and the string is ++given to the GnuTLS library, so that Exim does not need to be aware of future ++feature enhancements of GnuTLS. ++ ++Documentation of the strings accepted may be found in the GnuTLS manual, under ++"Priority strings". This is online as http://www.gnutls.org/manual/html_node/ ++Priority-Strings.html, but beware that this relates to GnuTLS 3, which may be ++newer than the version installed on your system. If you are using GnuTLS 3, ++then the example code on that site can be used to test a given string. ++ ++Prior to Exim 4.80, an older API of GnuTLS was used, and Exim supported three ++additional options, "gnutls_require_kx", "gnutls_require_mac" and " ++gnutls_require_protocols". tls_require_ciphers was an Exim list. ++ ++This example will let the library defaults be permitted on the MX port, where ++there's probably no identity verification anyway, and lowers security further ++by increasing compatibility; but this ups the ante on the submission ports ++where the administrator might have some influence on the choice of clients ++used: ++ ++# GnuTLS variant ++tls_require_ciphers = ${if =={$received_port}{25}\ ++ {NORMAL:%COMPAT}\ ++ {SECURE128}} ++ ++ ++41.6 Configuring an Exim server to use TLS ++------------------------------------------ ++ ++When Exim has been built with TLS support, it advertises the availability of ++the STARTTLS command to client hosts that match tls_advertise_hosts, but not to ++any others. The default value of this option is unset, which means that ++STARTTLS is not advertised at all. This default is chosen because you need to ++set some other options in order to make TLS available, and also it is sensible ++for systems that want to use TLS only as a client. ++ ++If a client issues a STARTTLS command and there is some configuration problem ++in the server, the command is rejected with a 454 error. If the client persists ++in trying to issue SMTP commands, all except QUIT are rejected with the error ++ ++554 Security failure ++ ++If a STARTTLS command is issued within an existing TLS session, it is rejected ++with a 554 error code. ++ ++To enable TLS operations on a server, you must set tls_advertise_hosts to match ++some hosts. You can, of course, set it to * to match all hosts. However, this ++is not all you need to do. TLS sessions to a server won't work without some ++further configuration at the server end. ++ ++It is rumoured that all existing clients that support TLS/SSL use RSA ++encryption. To make this work you need to set, in the server, ++ ++tls_certificate = /some/file/name ++tls_privatekey = /some/file/name ++ ++These options are, in fact, expanded strings, so you can make them depend on ++the identity of the client that is connected if you wish. The first file ++contains the server's X509 certificate, and the second contains the private key ++that goes with it. These files need to be readable by the Exim user, and must ++always be given as full path names. They can be the same file if both the ++certificate and the key are contained within it. If tls_privatekey is not set, ++or if its expansion is forced to fail or results in an empty string, this is ++assumed to be the case. The certificate file may also contain intermediate ++certificates that need to be sent to the client to enable it to authenticate ++the server's certificate. ++ ++If you do not understand about certificates and keys, please try to find a ++source of this background information, which is not Exim-specific. (There are a ++few comments below in section 41.12.) ++ ++Note: These options do not apply when Exim is operating as a client - they ++apply only in the case of a server. If you need to use a certificate in an Exim ++client, you must set the options of the same names in an smtp transport. ++ ++With just these options, an Exim server will be able to use TLS. It does not ++require the client to have a certificate (but see below for how to insist on ++this). There is one other option that may be needed in other situations. If ++ ++tls_dhparam = /some/file/name ++ ++is set, the SSL library is initialized for the use of Diffie-Hellman ciphers ++with the parameters contained in the file. Set this to "none" to disable use of ++DH entirely, by making no prime available: ++ ++tls_dhparam = none ++ ++This may also be set to a string identifying a standard prime to be used for ++DH; if it is set to "default" or, for OpenSSL, is unset, then the prime used is ++"ike23". There are a few standard primes available, see the documentation for ++tls_dhparam for the complete list. ++ ++See the command ++ ++openssl dhparam ++ ++for a way of generating file data. ++ ++The strings supplied for these three options are expanded every time a client ++host connects. It is therefore possible to use different certificates and keys ++for different hosts, if you so wish, by making use of the client's IP address ++in $sender_host_address to control the expansion. If a string expansion is ++forced to fail, Exim behaves as if the option is not set. ++ ++The variable $tls_in_cipher is set to the cipher suite that was negotiated for ++an incoming TLS connection. It is included in the Received: header of an ++incoming message (by default - you can, of course, change this), and it is also ++included in the log line that records a message's arrival, keyed by "X=", ++unless the tls_cipher log selector is turned off. The encrypted condition can ++be used to test for specific cipher suites in ACLs. ++ ++Once TLS has been established, the ACLs that run for subsequent SMTP commands ++can check the name of the cipher suite and vary their actions accordingly. The ++cipher suite names vary, depending on which TLS library is being used. For ++example, OpenSSL uses the name DES-CBC3-SHA for the cipher suite which in other ++contexts is known as TLS_RSA_WITH_3DES_EDE_CBC_SHA. Check the OpenSSL or GnuTLS ++documentation for more details. ++ ++For outgoing SMTP deliveries, $tls_out_cipher is used and logged (again ++depending on the tls_cipher log selector). ++ ++ ++41.7 Requesting and verifying client certificates ++------------------------------------------------- ++ ++If you want an Exim server to request a certificate when negotiating a TLS ++session with a client, you must set either tls_verify_hosts or ++tls_try_verify_hosts. You can, of course, set either of them to * to apply to ++all TLS connections. For any host that matches one of these options, Exim ++requests a certificate as part of the setup of the TLS session. The contents of ++the certificate are verified by comparing it with a list of expected ++certificates. These must be available in a file or, for OpenSSL only (not ++GnuTLS), a directory, identified by tls_verify_certificates. ++ ++A file can contain multiple certificates, concatenated end to end. If a ++directory is used (OpenSSL only), each certificate must be in a separate file, ++with a name (or a symbolic link) of the form <hash>.0, where <hash> is a hash ++value constructed from the certificate. You can compute the relevant hash by ++running the command ++ ++openssl x509 -hash -noout -in /cert/file ++ ++where /cert/file contains a single certificate. ++ ++The difference between tls_verify_hosts and tls_try_verify_hosts is what ++happens if the client does not supply a certificate, or if the certificate does ++not match any of the certificates in the collection named by ++tls_verify_certificates. If the client matches tls_verify_hosts, the attempt to ++set up a TLS session is aborted, and the incoming connection is dropped. If the ++client matches tls_try_verify_hosts, the (encrypted) SMTP session continues. ++ACLs that run for subsequent SMTP commands can detect the fact that no ++certificate was verified, and vary their actions accordingly. For example, you ++can insist on a certificate before accepting a message for relaying, but not ++when the message is destined for local delivery. ++ ++When a client supplies a certificate (whether it verifies or not), the value of ++the Distinguished Name of the certificate is made available in the variable ++$tls_in_peerdn during subsequent processing of the message. ++ ++Because it is often a long text string, it is not included in the log line or ++Received: header by default. You can arrange for it to be logged, keyed by "DN= ++", by setting the tls_peerdn log selector, and you can use received_header_text ++to change the Received: header. When no certificate is supplied, $tls_in_peerdn ++is empty. ++ ++ ++41.8 Revoked certificates ++------------------------- ++ ++Certificate issuing authorities issue Certificate Revocation Lists (CRLs) when ++certificates are revoked. If you have such a list, you can pass it to an Exim ++server using the global option called tls_crl and to an Exim client using an ++identically named option for the smtp transport. In each case, the value of the ++option is expanded and must then be the name of a file that contains a CRL in ++PEM format. ++ ++ ++41.9 Configuring an Exim client to use TLS ++------------------------------------------ ++ ++The tls_cipher and tls_peerdn log selectors apply to outgoing SMTP deliveries ++as well as to incoming, the latter one causing logging of the server ++certificate's DN. The remaining client configuration for TLS is all within the ++smtp transport. ++ ++It is not necessary to set any options to have TLS work in the smtp transport. ++If Exim is built with TLS support, and TLS is advertised by a server, the smtp ++transport always tries to start a TLS session. However, this can be prevented ++by setting hosts_avoid_tls (an option of the transport) to a list of server ++hosts for which TLS should not be used. ++ ++If you do not want Exim to attempt to send messages unencrypted when an attempt ++to set up an encrypted connection fails in any way, you can set ++hosts_require_tls to a list of hosts for which encryption is mandatory. For ++those hosts, delivery is always deferred if an encrypted connection cannot be ++set up. If there are any other hosts for the address, they are tried in the ++usual way. ++ ++When the server host is not in hosts_require_tls, Exim may try to deliver the ++message unencrypted. It always does this if the response to STARTTLS is a 5xx ++code. For a temporary error code, or for a failure to negotiate a TLS session ++after a success response code, what happens is controlled by the ++tls_tempfail_tryclear option of the smtp transport. If it is false, delivery to ++this host is deferred, and other hosts (if available) are tried. If it is true, ++Exim attempts to deliver unencrypted after a 4xx response to STARTTLS, and if ++STARTTLS is accepted, but the subsequent TLS negotiation fails, Exim closes the ++current connection (because it is in an unknown state), opens a new one to the ++same host, and then tries the delivery unencrypted. ++ ++The tls_certificate and tls_privatekey options of the smtp transport provide ++the client with a certificate, which is passed to the server if it requests it. ++If the server is Exim, it will request a certificate only if tls_verify_hosts ++or tls_try_verify_hosts matches the client. ++ ++If the tls_verify_certificates option is set on the smtp transport, it must ++name a file or, for OpenSSL only (not GnuTLS), a directory, that contains a ++collection of expected server certificates. The client verifies the server's ++certificate against this collection, taking into account any revoked ++certificates that are in the list defined by tls_crl. ++ ++If tls_require_ciphers is set on the smtp transport, it must contain a list of ++permitted cipher suites. If either of these checks fails, delivery to the ++current host is abandoned, and the smtp transport tries to deliver to ++alternative hosts, if any. ++ ++Note: These options must be set in the smtp transport for Exim to use TLS when ++it is operating as a client. Exim does not assume that a server certificate ++(set by the global options of the same name) should also be used when operating ++as a client. ++ ++All the TLS options in the smtp transport are expanded before use, with $host ++and $host_address containing the name and address of the server to which the ++client is connected. Forced failure of an expansion causes Exim to behave as if ++the relevant option were unset. ++ ++Before an SMTP connection is established, the $tls_out_bits, $tls_out_cipher, ++$tls_out_peerdn and $tls_out_sni variables are emptied. (Until the first ++connection, they contain the values that were set when the message was ++received.) If STARTTLS is subsequently successfully obeyed, these variables are ++set to the relevant values for the outgoing connection. ++ ++ ++41.10 Use of TLS Server Name Indication ++--------------------------------------- ++ ++With TLS1.0 or above, there is an extension mechanism by which extra ++information can be included at various points in the protocol. One of these ++extensions, documented in RFC 6066 (and before that RFC 4366) is "Server Name ++Indication", commonly "SNI". This extension is sent by the client in the ++initial handshake, so that the server can examine the servername within and ++possibly choose to use different certificates and keys (and more) for this ++session. ++ ++This is analagous to HTTP's "Host:" header, and is the main mechanism by which ++HTTPS-enabled web-sites can be virtual-hosted, many sites to one IP address. ++ ++With SMTP to MX, there are the same problems here as in choosing the identity ++against which to validate a certificate: you can't rely on insecure DNS to ++provide the identity which you then cryptographically verify. So this will be ++of limited use in that environment. ++ ++With SMTP to Submission, there is a well-defined hostname which clients are ++connecting to and can validate certificates against. Thus clients can choose to ++include this information in the TLS negotiation. If this becomes wide-spread, ++then hosters can choose to present different certificates to different clients. ++Or even negotiate different cipher suites. ++ ++The tls_sni option on an SMTP transport is an expanded string; the result, if ++not empty, will be sent on a TLS session as part of the handshake. There's ++nothing more to it. Choosing a sensible value not derived insecurely is the ++only point of caution. The $tls_out_sni variable will be set to this string for ++the lifetime of the client connection (including during authentication). ++ ++Except during SMTP client sessions, if $tls_in_sni is set then it is a string ++received from a client. It can be logged with the log_selector item "+tls_sni". ++ ++If the string "tls_in_sni" appears in the main section's tls_certificate option ++(prior to expansion) then the following options will be re-expanded during TLS ++session handshake, to permit alternative values to be chosen: ++ ++ * tls_certificate ++ ++ * tls_crl ++ ++ * tls_privatekey ++ ++ * tls_verify_certificates ++ ++Great care should be taken to deal with matters of case, various injection ++attacks in the string ("../" or SQL), and ensuring that a valid filename can ++always be referenced; it is important to remember that $tls_sni is arbitrary ++unverified data provided prior to authentication. ++ ++The Exim developers are proceeding cautiously and so far no other TLS options ++are re-expanded. ++ ++When Exim is built againt OpenSSL, OpenSSL must have been built with support ++for TLS Extensions. This holds true for OpenSSL 1.0.0+ and 0.9.8+ with ++enable-tlsext in EXTRACONFIGURE. If you invoke openssl s_client -h and see ++"-servername" in the output, then OpenSSL has support. ++ ++When Exim is built against GnuTLS, SNI support is available as of GnuTLS ++0.5.10. (Its presence predates the current API which Exim uses, so if Exim ++built, then you have SNI support). ++ ++ ++41.11 Multiple messages on the same encrypted TCP/IP connection ++--------------------------------------------------------------- ++ ++Exim sends multiple messages down the same TCP/IP connection by starting up an ++entirely new delivery process for each message, passing the socket from one ++process to the next. This implementation does not fit well with the use of TLS, ++because there is quite a lot of state information associated with a TLS ++connection, not just a socket identification. Passing all the state information ++to a new process is not feasible. Consequently, Exim shuts down an existing TLS ++session before passing the socket to a new process. The new process may then ++try to start a new TLS session, and if successful, may try to re-authenticate ++if AUTH is in use, before sending the next message. ++ ++The RFC is not clear as to whether or not an SMTP session continues in clear ++after TLS has been shut down, or whether TLS may be restarted again later, as ++just described. However, if the server is Exim, this shutdown and ++reinitialization works. It is not known which (if any) other servers operate ++successfully if the client closes a TLS session and continues with unencrypted ++SMTP, but there are certainly some that do not work. For such servers, Exim ++should not pass the socket to another process, because the failure of the ++subsequent attempt to use it would cause Exim to record a temporary host error, ++and delay other deliveries to that host. ++ ++To test for this case, Exim sends an EHLO command to the server after closing ++down the TLS session. If this fails in any way, the connection is closed ++instead of being passed to a new delivery process, but no retry information is ++recorded. ++ ++There is also a manual override; you can set hosts_nopass_tls on the smtp ++transport to match those hosts for which Exim should not pass connections to ++new processes if TLS has been used. ++ ++ ++41.12 Certificates and all that ++------------------------------- ++ ++In order to understand fully how TLS works, you need to know about ++certificates, certificate signing, and certificate authorities. This is not the ++place to give a tutorial, especially as I do not know very much about it ++myself. Some helpful introduction can be found in the FAQ for the SSL addition ++to Apache, currently at ++ ++http://www.modssl.org/docs/2.7/ssl_faq.html#ToC24 ++ ++Other parts of the modssl documentation are also helpful, and have links to ++further files. Eric Rescorla's book, SSL and TLS, published by Addison-Wesley ++(ISBN 0-201-61598-3), contains both introductory and more in-depth ++descriptions. Some sample programs taken from the book are available from ++ ++http://www.rtfm.com/openssl-examples/ ++ ++ ++41.13 Certificate chains ++------------------------ ++ ++The file named by tls_certificate may contain more than one certificate. This ++is useful in the case where the certificate that is being sent is validated by ++an intermediate certificate which the other end does not have. Multiple ++certificates must be in the correct order in the file. First the host's ++certificate itself, then the first intermediate certificate to validate the ++issuer of the host certificate, then the next intermediate certificate to ++validate the issuer of the first intermediate certificate, and so on, until ++finally (optionally) the root certificate. The root certificate must already be ++trusted by the recipient for validation to succeed, of course, but if it's not ++preinstalled, sending the root certificate along with the rest makes it ++available for the user to install if the receiving end is a client MUA that can ++interact with a user. ++ ++ ++41.14 Self-signed certificates ++------------------------------ ++ ++You can create a self-signed certificate using the req command provided with ++OpenSSL, like this: ++ ++openssl req -x509 -newkey rsa:1024 -keyout file1 -out file2 \ ++ -days 9999 -nodes ++ ++file1 and file2 can be the same file; the key and the certificate are delimited ++and so can be identified independently. The -days option specifies a period for ++which the certificate is valid. The -nodes option is important: if you do not ++set it, the key is encrypted with a passphrase that you are prompted for, and ++any use that is made of the key causes more prompting for the passphrase. This ++is not helpful if you are going to use this certificate and key in an MTA, ++where prompting is not possible. ++ ++NB: we are now past the point where 9999 days takes us past the 32-bit Unix ++epoch. If your system uses unsigned time_t (most do) and is 32-bit, then the ++above command might produce a date in the past. Think carefully about the ++lifetime of the systems you're deploying, and either reduce the duration of the ++certificate or reconsider your platform deployment. (At time of writing, ++reducing the duration is the most likely choice, but the inexorable progression ++of time takes us steadily towards an era where this will not be a sensible ++resolution). ++ ++A self-signed certificate made in this way is sufficient for testing, and may ++be adequate for all your requirements if you are mainly interested in ++encrypting transfers, and not in secure identification. ++ ++However, many clients require that the certificate presented by the server be a ++user (also called "leaf" or "site") certificate, and not a self-signed ++certificate. In this situation, the self-signed certificate described above ++must be installed on the client host as a trusted root certification authority ++(CA), and the certificate used by Exim must be a user certificate signed with ++that self-signed certificate. ++ ++For information on creating self-signed CA certificates and using them to sign ++user certificates, see the General implementation overview chapter of the ++Open-source PKI book, available online at http://ospkibook.sourceforge.net/. ++ ++ ++ ++=============================================================================== ++42. ACCESS CONTROL LISTS ++ ++Access Control Lists (ACLs) are defined in a separate section of the run time ++configuration file, headed by "begin acl". Each ACL definition starts with a ++name, terminated by a colon. Here is a complete ACL section that contains just ++one very small ACL: ++ ++begin acl ++small_acl: ++ accept hosts = one.host.only ++ ++You can have as many lists as you like in the ACL section, and the order in ++which they appear does not matter. The lists are self-terminating. ++ ++The majority of ACLs are used to control Exim's behaviour when it receives ++certain SMTP commands. This applies both to incoming TCP/IP connections, and ++when a local process submits a message using SMTP by specifying the -bs option. ++The most common use is for controlling which recipients are accepted in ++incoming messages. In addition, you can define an ACL that is used to check ++local non-SMTP messages. The default configuration file contains an example of ++a realistic ACL for checking RCPT commands. This is discussed in chapter 7. ++ ++ ++42.1 Testing ACLs ++----------------- ++ ++The -bh command line option provides a way of testing your ACL configuration ++locally by running a fake SMTP session with which you interact. The host ++relay-test.mail-abuse.org provides a service for checking your relaying ++configuration (see section 42.52 for more details). ++ ++ ++42.2 Specifying when ACLs are used ++---------------------------------- ++ ++In order to cause an ACL to be used, you have to name it in one of the relevant ++options in the main part of the configuration. These options are: ++ ++ acl_not_smtp ACL for non-SMTP messages ++ acl_not_smtp_mime ACL for non-SMTP MIME parts ++ acl_not_smtp_start ACL at start of non-SMTP message ++ acl_smtp_auth ACL for AUTH ++ acl_smtp_connect ACL for start of SMTP connection ++ acl_smtp_data ACL after DATA is complete ++ acl_smtp_etrn ACL for ETRN ++ acl_smtp_expn ACL for EXPN ++ acl_smtp_helo ACL for HELO or EHLO ++ acl_smtp_mail ACL for MAIL ++ acl_smtp_mailauth ACL for the AUTH parameter of MAIL ++ acl_smtp_mime ACL for content-scanning MIME parts ++ acl_smtp_notquit ACL for non-QUIT terminations ++ acl_smtp_predata ACL at start of DATA command ++ acl_smtp_quit ACL for QUIT ++ acl_smtp_rcpt ACL for RCPT ++ acl_smtp_starttls ACL for STARTTLS ++ acl_smtp_vrfy ACL for VRFY ++ ++For example, if you set ++ ++acl_smtp_rcpt = small_acl ++ ++the little ACL defined above is used whenever Exim receives a RCPT command in ++an SMTP dialogue. The majority of policy tests on incoming messages can be done ++when RCPT commands arrive. A rejection of RCPT should cause the sending MTA to ++give up on the recipient address contained in the RCPT command, whereas ++rejection at other times may cause the client MTA to keep on trying to deliver ++the message. It is therefore recommended that you do as much testing as ++possible at RCPT time. ++ ++ ++42.3 The non-SMTP ACLs ++---------------------- ++ ++The non-SMTP ACLs apply to all non-interactive incoming messages, that is, they ++apply to batched SMTP as well as to non-SMTP messages. (Batched SMTP is not ++really SMTP.) Many of the ACL conditions (for example, host tests, and tests on ++the state of the SMTP connection such as encryption and authentication) are not ++relevant and are forbidden in these ACLs. However, the sender and recipients ++are known, so the senders and sender_domains conditions and the $sender_address ++and $recipients variables can be used. Variables such as $authenticated_sender ++are also available. You can specify added header lines in any of these ACLs. ++ ++The acl_not_smtp_start ACL is run right at the start of receiving a non-SMTP ++message, before any of the message has been read. (This is the analogue of the ++acl_smtp_predata ACL for SMTP input.) In the case of batched SMTP input, it ++runs after the DATA command has been reached. The result of this ACL is ++ignored; it cannot be used to reject a message. If you really need to, you ++could set a value in an ACL variable here and reject based on that in the ++acl_not_smtp ACL. However, this ACL can be used to set controls, and in ++particular, it can be used to set ++ ++control = suppress_local_fixups ++ ++This cannot be used in the other non-SMTP ACLs because by the time they are ++run, it is too late. ++ ++The acl_not_smtp_mime ACL is available only when Exim is compiled with the ++content-scanning extension. For details, see chapter 43. ++ ++The acl_not_smtp ACL is run just before the local_scan() function. Any kind of ++rejection is treated as permanent, because there is no way of sending a ++temporary error for these kinds of message. ++ ++ ++42.4 The SMTP connect ACL ++------------------------- ++ ++The ACL test specified by acl_smtp_connect happens at the start of an SMTP ++session, after the test specified by host_reject_connection (which is now an ++anomaly) and any TCP Wrappers testing (if configured). If the connection is ++accepted by an accept verb that has a message modifier, the contents of the ++message override the banner message that is otherwise specified by the ++smtp_banner option. ++ ++ ++42.5 The EHLO/HELO ACL ++---------------------- ++ ++The ACL test specified by acl_smtp_helo happens when the client issues an EHLO ++or HELO command, after the tests specified by helo_accept_junk_hosts, ++helo_allow_chars, helo_verify_hosts, and helo_try_verify_hosts. Note that a ++client may issue more than one EHLO or HELO command in an SMTP session, and ++indeed is required to issue a new EHLO or HELO after successfully setting up ++encryption following a STARTTLS command. ++ ++If the command is accepted by an accept verb that has a message modifier, the ++message may not contain more than one line (it will be truncated at the first ++newline and a panic logged if it does). Such a message cannot affect the EHLO ++options that are listed on the second and subsequent lines of an EHLO response. ++ ++ ++42.6 The DATA ACLs ++------------------ ++ ++Two ACLs are associated with the DATA command, because it is two-stage command, ++with two responses being sent to the client. When the DATA command is received, ++the ACL defined by acl_smtp_predata is obeyed. This gives you control after all ++the RCPT commands, but before the message itself is received. It offers the ++opportunity to give a negative response to the DATA command before the data is ++transmitted. Header lines added by MAIL or RCPT ACLs are not visible at this ++time, but any that are defined here are visible when the acl_smtp_data ACL is ++run. ++ ++You cannot test the contents of the message, for example, to verify addresses ++in the headers, at RCPT time or when the DATA command is received. Such tests ++have to appear in the ACL that is run after the message itself has been ++received, before the final response to the DATA command is sent. This is the ++ACL specified by acl_smtp_data, which is the second ACL that is associated with ++the DATA command. ++ ++For both of these ACLs, it is not possible to reject individual recipients. An ++error response rejects the entire message. Unfortunately, it is known that some ++MTAs do not treat hard (5xx) responses to the DATA command (either before or ++after the data) correctly - they keep the message on their queues and try again ++later, but that is their problem, though it does waste some of your resources. ++ ++The acl_smtp_data ACL is run after both the acl_smtp_dkim and the acl_smtp_mime ++ACLs. ++ ++ ++42.7 The SMTP DKIM ACL ++---------------------- ++ ++The acl_smtp_dkim ACL is available only when Exim is compiled with DKIM support ++enabled (which is the default). ++ ++The ACL test specified by acl_smtp_dkim happens after a message has been ++received, and is executed for each DKIM signature found in a message. If not ++otherwise specified, the default action is to accept. ++ ++This ACL is evaluated before acl_smtp_mime and acl_smtp_data. ++ ++For details on the operation of DKIM, see chapter 56. ++ ++ ++42.8 The SMTP MIME ACL ++---------------------- ++ ++The acl_smtp_mime option is available only when Exim is compiled with the ++content-scanning extension. For details, see chapter 43. ++ ++This ACL is evaluated after acl_smtp_dkim but before acl_smtp_data. ++ ++ ++42.9 The QUIT ACL ++----------------- ++ ++The ACL for the SMTP QUIT command is anomalous, in that the outcome of the ACL ++does not affect the response code to QUIT, which is always 221. Thus, the ACL ++does not in fact control any access. For this reason, the only verbs that are ++permitted are accept and warn. ++ ++This ACL can be used for tasks such as custom logging at the end of an SMTP ++session. For example, you can use ACL variables in other ACLs to count ++messages, recipients, etc., and log the totals at QUIT time using one or more ++logwrite modifiers on a warn verb. ++ ++Warning: Only the $acl_cx variables can be used for this, because the $acl_mx ++variables are reset at the end of each incoming message. ++ ++You do not need to have a final accept, but if you do, you can use a message ++modifier to specify custom text that is sent as part of the 221 response to ++QUIT. ++ ++This ACL is run only for a "normal" QUIT. For certain kinds of disastrous ++failure (for example, failure to open a log file, or when Exim is bombing out ++because it has detected an unrecoverable error), all SMTP commands from the ++client are given temporary error responses until QUIT is received or the ++connection is closed. In these special cases, the QUIT ACL does not run. ++ ++ ++42.10 The not-QUIT ACL ++---------------------- ++ ++The not-QUIT ACL, specified by acl_smtp_notquit, is run in most cases when an ++SMTP session ends without sending QUIT. However, when Exim itself is in bad ++trouble, such as being unable to write to its log files, this ACL is not run, ++because it might try to do things (such as write to log files) that make the ++situation even worse. ++ ++Like the QUIT ACL, this ACL is provided to make it possible to do customized ++logging or to gather statistics, and its outcome is ignored. The delay modifier ++is forbidden in this ACL, and the only permitted verbs are accept and warn. ++ ++When the not-QUIT ACL is running, the variable $smtp_notquit_reason is set to a ++string that indicates the reason for the termination of the SMTP connection. ++The possible values are: ++ ++ "acl-drop" Another ACL issued a drop command ++ "bad-commands" Too many unknown or non-mail commands ++ "command-timeout" Timeout while reading SMTP commands ++ "connection-lost" The SMTP connection has been lost ++ "data-timeout" Timeout while reading message data ++ "local-scan-error" The local_scan() function crashed ++ "local-scan-timeout" The local_scan() function timed out ++ "signal-exit" SIGTERM or SIGINT ++ "synchronization-error" SMTP synchronization error ++ "tls-failed" TLS failed to start ++ ++In most cases when an SMTP connection is closed without having received QUIT, ++Exim sends an SMTP response message before actually closing the connection. ++With the exception of the "acl-drop" case, the default message can be ++overridden by the message modifier in the not-QUIT ACL. In the case of a drop ++verb in another ACL, it is the message from the other ACL that is used. ++ ++ ++42.11 Finding an ACL to use ++--------------------------- ++ ++The value of an acl_smtp_xxx option is expanded before use, so you can use ++different ACLs in different circumstances. For example, ++ ++acl_smtp_rcpt = ${if ={25}{$interface_port} \ ++ {acl_check_rcpt} {acl_check_rcpt_submit} } ++ ++In the default configuration file there are some example settings for providing ++an RFC 4409 message submission service on port 587 and a non-standard "smtps" ++service on port 465. You can use a string expansion like this to choose an ACL ++for MUAs on these ports which is more appropriate for this purpose than the ++default ACL on port 25. ++ ++The expanded string does not have to be the name of an ACL in the configuration ++file; there are other possibilities. Having expanded the string, Exim searches ++for an ACL as follows: ++ ++ * If the string begins with a slash, Exim uses it as a file name, and reads ++ its contents as an ACL. The lines are processed in the same way as lines in ++ the Exim configuration file. In particular, continuation lines are ++ supported, blank lines are ignored, as are lines whose first non-whitespace ++ character is "#". If the file does not exist or cannot be read, an error ++ occurs (typically causing a temporary failure of whatever caused the ACL to ++ be run). For example: ++ ++ acl_smtp_data = /etc/acls/\ ++ ${lookup{$sender_host_address}lsearch\ ++ {/etc/acllist}{$value}{default}} ++ ++ This looks up an ACL file to use on the basis of the host's IP address, ++ falling back to a default if the lookup fails. If an ACL is successfully ++ read from a file, it is retained in memory for the duration of the Exim ++ process, so that it can be re-used without having to re-read the file. ++ ++ * If the string does not start with a slash, and does not contain any spaces, ++ Exim searches the ACL section of the configuration for an ACL whose name ++ matches the string. ++ ++ * If no named ACL is found, or if the string contains spaces, Exim parses the ++ string as an inline ACL. This can save typing in cases where you just want ++ to have something like ++ ++ acl_smtp_vrfy = accept ++ ++ in order to allow free use of the VRFY command. Such a string may contain ++ newlines; it is processed in the same way as an ACL that is read from a ++ file. ++ ++ ++42.12 ACL return codes ++---------------------- ++ ++Except for the QUIT ACL, which does not affect the SMTP return code (see ++section 42.9 above), the result of running an ACL is either "accept" or "deny", ++or, if some test cannot be completed (for example, if a database is down), ++"defer". These results cause 2xx, 5xx, and 4xx return codes, respectively, to ++be used in the SMTP dialogue. A fourth return, "error", occurs when there is an ++error such as invalid syntax in the ACL. This also causes a 4xx return code. ++ ++For the non-SMTP ACL, "defer" and "error" are treated in the same way as ++"deny", because there is no mechanism for passing temporary errors to the ++submitters of non-SMTP messages. ++ ++ACLs that are relevant to message reception may also return "discard". This has ++the effect of "accept", but causes either the entire message or an individual ++recipient address to be discarded. In other words, it is a blackholing ++facility. Use it with care. ++ ++If the ACL for MAIL returns "discard", all recipients are discarded, and no ACL ++is run for subsequent RCPT commands. The effect of "discard" in a RCPT ACL is ++to discard just the one recipient address. If there are no recipients left when ++the message's data is received, the DATA ACL is not run. A "discard" return ++from the DATA or the non-SMTP ACL discards all the remaining recipients. The ++"discard" return is not permitted for the acl_smtp_predata ACL. ++ ++The local_scan() function is always run, even if there are no remaining ++recipients; it may create new recipients. ++ ++ ++42.13 Unset ACL options ++----------------------- ++ ++The default actions when any of the acl_xxx options are unset are not all the ++same. Note: These defaults apply only when the relevant ACL is not defined at ++all. For any defined ACL, the default action when control reaches the end of ++the ACL statements is "deny". ++ ++For acl_smtp_quit and acl_not_smtp_start there is no default because these two ++are ACLs that are used only for their side effects. They cannot be used to ++accept or reject anything. ++ ++For acl_not_smtp, acl_smtp_auth, acl_smtp_connect, acl_smtp_data, acl_smtp_helo ++, acl_smtp_mail, acl_smtp_mailauth, acl_smtp_mime, acl_smtp_predata, and ++acl_smtp_starttls, the action when the ACL is not defined is "accept". ++ ++For the others (acl_smtp_etrn, acl_smtp_expn, acl_smtp_rcpt, and acl_smtp_vrfy ++), the action when the ACL is not defined is "deny". This means that ++acl_smtp_rcpt must be defined in order to receive any messages over an SMTP ++connection. For an example, see the ACL in the default configuration file. ++ ++ ++42.14 Data for message ACLs ++--------------------------- ++ ++When a MAIL or RCPT ACL, or either of the DATA ACLs, is running, the variables ++that contain information about the host and the message's sender (for example, ++$sender_host_address and $sender_address) are set, and can be used in ACL ++statements. In the case of RCPT (but not MAIL or DATA), $domain and $local_part ++are set from the argument address. The entire SMTP command is available in ++$smtp_command. ++ ++When an ACL for the AUTH parameter of MAIL is running, the variables that ++contain information about the host are set, but $sender_address is not yet set. ++Section 33.2 contains a discussion of this parameter and how it is used. ++ ++The $message_size variable is set to the value of the SIZE parameter on the ++MAIL command at MAIL, RCPT and pre-data time, or to -1 if that parameter is not ++given. The value is updated to the true message size by the time the final DATA ++ACL is run (after the message data has been received). ++ ++The $rcpt_count variable increases by one for each RCPT command received. The ++$recipients_count variable increases by one each time a RCPT command is ++accepted, so while an ACL for RCPT is being processed, it contains the number ++of previously accepted recipients. At DATA time (for both the DATA ACLs), ++$rcpt_count contains the total number of RCPT commands, and $recipients_count ++contains the total number of accepted recipients. ++ ++ ++42.15 Data for non-message ACLs ++------------------------------- ++ ++When an ACL is being run for AUTH, EHLO, ETRN, EXPN, HELO, STARTTLS, or VRFY, ++the remainder of the SMTP command line is placed in $smtp_command_argument, and ++the entire SMTP command is available in $smtp_command. These variables can be ++tested using a condition condition. For example, here is an ACL for use with ++AUTH, which insists that either the session is encrypted, or the CRAM-MD5 ++authentication method is used. In other words, it does not permit ++authentication methods that use cleartext passwords on unencrypted connections. ++ ++acl_check_auth: ++ accept encrypted = * ++ accept condition = ${if eq{${uc:$smtp_command_argument}}\ ++ {CRAM-MD5}} ++ deny message = TLS encryption or CRAM-MD5 required ++ ++(Another way of applying this restriction is to arrange for the authenticators ++that use cleartext passwords not to be advertised when the connection is not ++encrypted. You can use the generic server_advertise_condition authenticator ++option to do this.) ++ ++ ++42.16 Format of an ACL ++---------------------- ++ ++An individual ACL consists of a number of statements. Each statement starts ++with a verb, optionally followed by a number of conditions and "modifiers". ++Modifiers can change the way the verb operates, define error and log messages, ++set variables, insert delays, and vary the processing of accepted messages. ++ ++If all the conditions are met, the verb is obeyed. The same condition may be ++used (with different arguments) more than once in the same statement. This ++provides a means of specifying an "and" conjunction between conditions. For ++example: ++ ++deny dnslists = list1.example ++dnslists = list2.example ++ ++If there are no conditions, the verb is always obeyed. Exim stops evaluating ++the conditions and modifiers when it reaches a condition that fails. What ++happens then depends on the verb (and in one case, on a special modifier). Not ++all the conditions make sense at every testing point. For example, you cannot ++test a sender address in the ACL that is run for a VRFY command. ++ ++ ++42.17 ACL verbs ++--------------- ++ ++The ACL verbs are as follows: ++ ++ * accept: If all the conditions are met, the ACL returns "accept". If any of ++ the conditions are not met, what happens depends on whether endpass appears ++ among the conditions (for syntax see below). If the failing condition is ++ before endpass, control is passed to the next ACL statement; if it is after ++ endpass, the ACL returns "deny". Consider this statement, used to check a ++ RCPT command: ++ ++ accept domains = +local_domains ++ endpass ++ verify = recipient ++ ++ If the recipient domain does not match the domains condition, control ++ passes to the next statement. If it does match, the recipient is verified, ++ and the command is accepted if verification succeeds. However, if ++ verification fails, the ACL yields "deny", because the failing condition is ++ after endpass. ++ ++ The endpass feature has turned out to be confusing to many people, so its ++ use is not recommended nowadays. It is always possible to rewrite an ACL so ++ that endpass is not needed, and it is no longer used in the default ++ configuration. ++ ++ If a message modifier appears on an accept statement, its action depends on ++ whether or not endpass is present. In the absence of endpass (when an ++ accept verb either accepts or passes control to the next statement), ++ message can be used to vary the message that is sent when an SMTP command ++ is accepted. For example, in a RCPT ACL you could have: ++ ++ accept <some conditions> ++ message = OK, I will allow you through today ++ ++ You can specify an SMTP response code, optionally followed by an "extended ++ response code" at the start of the message, but the first digit must be the ++ same as would be sent by default, which is 2 for an accept verb. ++ ++ If endpass is present in an accept statement, message specifies an error ++ message that is used when access is denied. This behaviour is retained for ++ backward compatibility, but current "best practice" is to avoid the use of ++ endpass. ++ ++ * defer: If all the conditions are true, the ACL returns "defer" which, in an ++ SMTP session, causes a 4xx response to be given. For a non-SMTP ACL, defer ++ is the same as deny, because there is no way of sending a temporary error. ++ For a RCPT command, defer is much the same as using a redirect router and ++ ":defer:" while verifying, but the defer verb can be used in any ACL, and ++ even for a recipient it might be a simpler approach. ++ ++ * deny: If all the conditions are met, the ACL returns "deny". If any of the ++ conditions are not met, control is passed to the next ACL statement. For ++ example, ++ ++ deny dnslists = blackholes.mail-abuse.org ++ ++ rejects commands from hosts that are on a DNS black list. ++ ++ * discard: This verb behaves like accept, except that it returns "discard" ++ from the ACL instead of "accept". It is permitted only on ACLs that are ++ concerned with receiving messages. When all the conditions are true, the ++ sending entity receives a "success" response. However, discard causes ++ recipients to be discarded. If it is used in an ACL for RCPT, just the one ++ recipient is discarded; if used for MAIL, DATA or in the non-SMTP ACL, all ++ the message's recipients are discarded. Recipients that are discarded ++ before DATA do not appear in the log line when the received_recipients log ++ selector is set. ++ ++ If the log_message modifier is set when discard operates, its contents are ++ added to the line that is automatically written to the log. The message ++ modifier operates exactly as it does for accept. ++ ++ * drop: This verb behaves like deny, except that an SMTP connection is ++ forcibly closed after the 5xx error message has been sent. For example: ++ ++ drop message = I don't take more than 20 RCPTs ++ condition = ${if > {$rcpt_count}{20}} ++ ++ There is no difference between deny and drop for the connect-time ACL. The ++ connection is always dropped after sending a 550 response. ++ ++ * require: If all the conditions are met, control is passed to the next ACL ++ statement. If any of the conditions are not met, the ACL returns "deny". ++ For example, when checking a RCPT command, ++ ++ require message = Sender did not verify ++ verify = sender ++ ++ passes control to subsequent statements only if the message's sender can be ++ verified. Otherwise, it rejects the command. Note the positioning of the ++ message modifier, before the verify condition. The reason for this is ++ discussed in section 42.19. ++ ++ * warn: If all the conditions are true, a line specified by the log_message ++ modifier is written to Exim's main log. Control always passes to the next ++ ACL statement. If any condition is false, the log line is not written. If ++ an identical log line is requested several times in the same message, only ++ one copy is actually written to the log. If you want to force duplicates to ++ be written, use the logwrite modifier instead. ++ ++ If log_message is not present, a warn verb just checks its conditions and ++ obeys any "immediate" modifiers (such as control, set, logwrite, add_header ++ , and remove_header) that appear before the first failing condition. There ++ is more about adding header lines in section 42.23. ++ ++ If any condition on a warn statement cannot be completed (that is, there is ++ some sort of defer), the log line specified by log_message is not written. ++ This does not include the case of a forced failure from a lookup, which is ++ considered to be a successful completion. After a defer, no further ++ conditions or modifiers in the warn statement are processed. The incident ++ is logged, and the ACL continues to be processed, from the next statement ++ onwards. ++ ++ When one of the warn conditions is an address verification that fails, the ++ text of the verification failure message is in $acl_verify_message. If you ++ want this logged, you must set it up explicitly. For example: ++ ++ warn !verify = sender ++ log_message = sender verify failed: $acl_verify_message ++ ++At the end of each ACL there is an implicit unconditional deny. ++ ++As you can see from the examples above, the conditions and modifiers are ++written one to a line, with the first one on the same line as the verb, and ++subsequent ones on following lines. If you have a very long condition, you can ++continue it onto several physical lines by the usual backslash continuation ++mechanism. It is conventional to align the conditions vertically. ++ ++ ++42.18 ACL variables ++------------------- ++ ++There are some special variables that can be set during ACL processing. They ++can be used to pass information between different ACLs, different invocations ++of the same ACL in the same SMTP connection, and between ACLs and the routers, ++transports, and filters that are used to deliver a message. The names of these ++variables must begin with $acl_c or $acl_m, followed either by a digit or an ++underscore, but the remainder of the name can be any sequence of alphanumeric ++characters and underscores that you choose. There is no limit on the number of ++ACL variables. The two sets act as follows: ++ ++ * The values of those variables whose names begin with $acl_c persist ++ throughout an SMTP connection. They are never reset. Thus, a value that is ++ set while receiving one message is still available when receiving the next ++ message on the same SMTP connection. ++ ++ * The values of those variables whose names begin with $acl_m persist only ++ while a message is being received. They are reset afterwards. They are also ++ reset by MAIL, RSET, EHLO, HELO, and after starting up a TLS session. ++ ++When a message is accepted, the current values of all the ACL variables are ++preserved with the message and are subsequently made available at delivery ++time. The ACL variables are set by a modifier called set. For example: ++ ++accept hosts = whatever ++ set acl_m4 = some value ++accept authenticated = * ++ set acl_c_auth = yes ++ ++Note: A leading dollar sign is not used when naming a variable that is to be ++set. If you want to set a variable without taking any action, you can use a ++warn verb without any other modifiers or conditions. ++ ++What happens if a syntactically valid but undefined ACL variable is referenced ++depends on the setting of the strict_acl_vars option. If it is false (the ++default), an empty string is substituted; if it is true, an error is generated. ++ ++Versions of Exim before 4.64 have a limited set of numbered variables, but ++their names are compatible, so there is no problem with upgrading. ++ ++ ++42.19 Condition and modifier processing ++--------------------------------------- ++ ++An exclamation mark preceding a condition negates its result. For example: ++ ++deny domains = *.dom.example ++ !verify = recipient ++ ++causes the ACL to return "deny" if the recipient domain ends in dom.example and ++the recipient address cannot be verified. Sometimes negation can be used on the ++right-hand side of a condition. For example, these two statements are ++equivalent: ++ ++deny hosts = !192.168.3.4 ++deny !hosts = 192.168.3.4 ++ ++However, for many conditions (verify being a good example), only left-hand side ++negation of the whole condition is possible. ++ ++The arguments of conditions and modifiers are expanded. A forced failure of an ++expansion causes a condition to be ignored, that is, it behaves as if the ++condition is true. Consider these two statements: ++ ++accept senders = ${lookup{$host_name}lsearch\ ++ {/some/file}{$value}fail} ++accept senders = ${lookup{$host_name}lsearch\ ++ {/some/file}{$value}{}} ++ ++Each attempts to look up a list of acceptable senders. If the lookup succeeds, ++the returned list is searched, but if the lookup fails the behaviour is ++different in the two cases. The fail in the first statement causes the ++condition to be ignored, leaving no further conditions. The accept verb ++therefore succeeds. The second statement, however, generates an empty list when ++the lookup fails. No sender can match an empty list, so the condition fails, ++and therefore the accept also fails. ++ ++ACL modifiers appear mixed in with conditions in ACL statements. Some of them ++specify actions that are taken as the conditions for a statement are checked; ++others specify text for messages that are used when access is denied or a ++warning is generated. The control modifier affects the way an incoming message ++is handled. ++ ++The positioning of the modifiers in an ACL statement is important, because the ++processing of a verb ceases as soon as its outcome is known. Only those ++modifiers that have already been encountered will take effect. For example, ++consider this use of the message modifier: ++ ++require message = Can't verify sender ++ verify = sender ++ message = Can't verify recipient ++ verify = recipient ++ message = This message cannot be used ++ ++If sender verification fails, Exim knows that the result of the statement is ++"deny", so it goes no further. The first message modifier has been seen, so its ++text is used as the error message. If sender verification succeeds, but ++recipient verification fails, the second message is used. If recipient ++verification succeeds, the third message becomes "current", but is never used ++because there are no more conditions to cause failure. ++ ++For the deny verb, on the other hand, it is always the last message modifier ++that is used, because all the conditions must be true for rejection to happen. ++Specifying more than one message modifier does not make sense, and the message ++can even be specified after all the conditions. For example: ++ ++deny hosts = ... ++ !senders = *@my.domain.example ++ message = Invalid sender from client host ++ ++The "deny" result does not happen until the end of the statement is reached, by ++which time Exim has set up the message. ++ ++ ++42.20 ACL modifiers ++------------------- ++ ++The ACL modifiers are as follows: ++ ++add_header = <text> ++ ++ This modifier specifies one or more header lines that are to be added to an ++ incoming message, assuming, of course, that the message is ultimately ++ accepted. For details, see section 42.23. ++ ++continue = <text> ++ ++ This modifier does nothing of itself, and processing of the ACL always ++ continues with the next condition or modifier. The value of continue is in ++ the side effects of expanding its argument. Typically this could be used to ++ update a database. It is really just a syntactic tidiness, to avoid having ++ to write rather ugly lines like this: ++ ++ condition = ${if eq{0}{<some expansion>}{true}{true}} ++ ++ Instead, all you need is ++ ++ continue = <some expansion> ++ ++control = <text> ++ ++ This modifier affects the subsequent processing of the SMTP connection or ++ of an incoming message that is accepted. The effect of the first type of ++ control lasts for the duration of the connection, whereas the effect of the ++ second type lasts only until the current message has been received. The ++ message-specific controls always apply to the whole message, not to ++ individual recipients, even if the control modifier appears in a RCPT ACL. ++ ++ As there are now quite a few controls that can be applied, they are ++ described separately in section 42.21. The control modifier can be used in ++ several different ways. For example: ++ ++ + It can be at the end of an accept statement: ++ ++ accept ...some conditions ++ control = queue_only ++ ++ In this case, the control is applied when this statement yields ++ "accept", in other words, when the conditions are all true. ++ ++ + It can be in the middle of an accept statement: ++ ++ accept ...some conditions... ++ control = queue_only ++ ...some more conditions... ++ ++ If the first set of conditions are true, the control is applied, even ++ if the statement does not accept because one of the second set of ++ conditions is false. In this case, some subsequent statement must yield ++ "accept" for the control to be relevant. ++ ++ + It can be used with warn to apply the control, leaving the decision ++ about accepting or denying to a subsequent verb. For example: ++ ++ warn ...some conditions... ++ control = freeze ++ accept ... ++ ++ This example of warn does not contain message, log_message, or logwrite ++ , so it does not add anything to the message and does not write a log ++ entry. ++ ++ + If you want to apply a control unconditionally, you can use it with a ++ require verb. For example: ++ ++ require control = no_multiline_responses ++ ++delay = <time> ++ ++ This modifier may appear in any ACL except notquit. It causes Exim to wait ++ for the time interval before proceeding. However, when testing Exim using ++ the -bh option, the delay is not actually imposed (an appropriate message ++ is output instead). The time is given in the usual Exim notation, and the ++ delay happens as soon as the modifier is processed. In an SMTP session, ++ pending output is flushed before the delay is imposed. ++ ++ Like control, delay can be used with accept or deny, for example: ++ ++ deny ...some conditions... ++ delay = 30s ++ ++ The delay happens if all the conditions are true, before the statement ++ returns "deny". Compare this with: ++ ++ deny delay = 30s ++ ...some conditions... ++ ++ which waits for 30s before processing the conditions. The delay modifier ++ can also be used with warn and together with control: ++ ++ warn ...some conditions... ++ delay = 2m ++ control = freeze ++ accept ... ++ ++ If delay is encountered when the SMTP PIPELINING extension is in use, ++ responses to several commands are no longer buffered and sent in one packet ++ (as they would normally be) because all output is flushed before imposing ++ the delay. This optimization is disabled so that a number of small delays ++ do not appear to the client as one large aggregated delay that might ++ provoke an unwanted timeout. You can, however, disable output flushing for ++ delay by using a control modifier to set no_delay_flush. ++ ++endpass ++ ++ This modifier, which has no argument, is recognized only in accept and ++ discard statements. It marks the boundary between the conditions whose ++ failure causes control to pass to the next statement, and the conditions ++ whose failure causes the ACL to return "deny". This concept has proved to ++ be confusing to some people, so the use of endpass is no longer recommended ++ as "best practice". See the description of accept above for more details. ++ ++log_message = <text> ++ ++ This modifier sets up a message that is used as part of the log message if ++ the ACL denies access or a warn statement's conditions are true. For ++ example: ++ ++ require log_message = wrong cipher suite $tls_in_cipher ++ encrypted = DES-CBC3-SHA ++ ++ log_message is also used when recipients are discarded by discard. For ++ example: ++ ++ discard <some conditions> ++ log_message = Discarded $local_part@$domain because... ++ ++ When access is denied, log_message adds to any underlying error message ++ that may exist because of a condition failure. For example, while verifying ++ a recipient address, a :fail: redirection might have already set up a ++ message. ++ ++ The message may be defined before the conditions to which it applies, ++ because the string expansion does not happen until Exim decides that access ++ is to be denied. This means that any variables that are set by the ++ condition are available for inclusion in the message. For example, the ++ $dnslist_<xxx> variables are set after a DNS black list lookup succeeds. If ++ the expansion of log_message fails, or if the result is an empty string, ++ the modifier is ignored. ++ ++ If you want to use a warn statement to log the result of an address ++ verification, you can use $acl_verify_message to include the verification ++ error message. ++ ++ If log_message is used with a warn statement, "Warning:" is added to the ++ start of the logged message. If the same warning log message is requested ++ more than once while receiving a single email message, only one copy is ++ actually logged. If you want to log multiple copies, use logwrite instead ++ of log_message. In the absence of log_message and logwrite, nothing is ++ logged for a successful warn statement. ++ ++ If log_message is not present and there is no underlying error message (for ++ example, from the failure of address verification), but message is present, ++ the message text is used for logging rejections. However, if any text for ++ logging contains newlines, only the first line is logged. In the absence of ++ both log_message and message, a default built-in message is used for ++ logging rejections. ++ ++log_reject_target = <log name list> ++ ++ This modifier makes it possible to specify which logs are used for messages ++ about ACL rejections. Its argument is a colon-separated list of words that ++ can be "main", "reject", or "panic". The default is "main:reject". The list ++ may be empty, in which case a rejection is not logged at all. For example, ++ this ACL fragment writes no logging information when access is denied: ++ ++ deny <some conditions> ++ log_reject_target = ++ ++ This modifier can be used in SMTP and non-SMTP ACLs. It applies to both ++ permanent and temporary rejections. Its effect lasts for the rest of the ++ current ACL. ++ ++logwrite = <text> ++ ++ This modifier writes a message to a log file as soon as it is encountered ++ when processing an ACL. (Compare log_message, which, except in the case of ++ warn and discard, is used only if the ACL statement denies access.) The ++ logwrite modifier can be used to log special incidents in ACLs. For ++ example: ++ ++ accept <some special conditions> ++ control = freeze ++ logwrite = froze message because ... ++ ++ By default, the message is written to the main log. However, it may begin ++ with a colon, followed by a comma-separated list of log names, and then ++ another colon, to specify exactly which logs are to be written. For ++ example: ++ ++ logwrite = :main,reject: text for main and reject logs ++ logwrite = :panic: text for panic log only ++ ++message = <text> ++ ++ This modifier sets up a text string that is expanded and used as a response ++ message when an ACL statement terminates the ACL with an "accept", "deny", ++ or "defer" response. (In the case of the accept and discard verbs, there is ++ some complication if endpass is involved; see the description of accept for ++ details.) ++ ++ The expansion of the message happens at the time Exim decides that the ACL ++ is to end, not at the time it processes message. If the expansion fails, or ++ generates an empty string, the modifier is ignored. Here is an example ++ where message must be specified first, because the ACL ends with a ++ rejection if the hosts condition fails: ++ ++ require message = Host not recognized ++ hosts = 10.0.0.0/8 ++ ++ (Once a condition has failed, no further conditions or modifiers are ++ processed.) ++ ++ For ACLs that are triggered by SMTP commands, the message is returned as ++ part of the SMTP response. The use of message with accept (or discard) is ++ meaningful only for SMTP, as no message is returned when a non-SMTP message ++ is accepted. In the case of the connect ACL, accepting with a message ++ modifier overrides the value of smtp_banner. For the EHLO/HELO ACL, a ++ customized accept message may not contain more than one line (otherwise it ++ will be truncated at the first newline and a panic logged), and it cannot ++ affect the EHLO options. ++ ++ When SMTP is involved, the message may begin with an overriding response ++ code, consisting of three digits optionally followed by an "extended ++ response code" of the form n.n.n, each code being followed by a space. For ++ example: ++ ++ deny message = 599 1.2.3 Host not welcome ++ hosts = 192.168.34.0/24 ++ ++ The first digit of the supplied response code must be the same as would be ++ sent by default. A panic occurs if it is not. Exim uses a 550 code when it ++ denies access, but for the predata ACL, note that the default success code ++ is 354, not 2xx. ++ ++ Notwithstanding the previous paragraph, for the QUIT ACL, unlike the ++ others, the message modifier cannot override the 221 response code. ++ ++ The text in a message modifier is literal; any quotes are taken as ++ literals, but because the string is expanded, backslash escapes are ++ processed anyway. If the message contains newlines, this gives rise to a ++ multi-line SMTP response. ++ ++ If message is used on a statement that verifies an address, the message ++ specified overrides any message that is generated by the verification ++ process. However, the original message is available in the variable ++ $acl_verify_message, so you can incorporate it into your message if you ++ wish. In particular, if you want the text from :fail: items in redirect ++ routers to be passed back as part of the SMTP response, you should either ++ not use a message modifier, or make use of $acl_verify_message. ++ ++ For compatibility with previous releases of Exim, a message modifier that ++ is used with a warn verb behaves in a similar way to the add_header ++ modifier, but this usage is now deprecated. However, message acts only when ++ all the conditions are true, wherever it appears in an ACL command, whereas ++ add_header acts as soon as it is encountered. If message is used with warn ++ in an ACL that is not concerned with receiving a message, it has no effect. ++ ++remove_header = <text> ++ ++ This modifier specifies one or more header names in a colon-separated list ++ that are to be removed from an incoming message, assuming, of course, that ++ the message is ultimately accepted. For details, see section 42.24. ++ ++set <acl_name> = <value> ++ ++ This modifier puts a value into one of the ACL variables (see section 42.18 ++ ). ++ ++udpsend = <parameters> ++ ++ This modifier sends a UDP packet, for purposes such as statistics ++ collection or behaviour monitoring. The parameters are expanded, and the ++ result of the expansion must be a colon-separated list consisting of a ++ destination server, port number, and the packet contents. The server can be ++ specified as a host name or IPv4 or IPv6 address. The separator can be ++ changed with the usual angle bracket syntax. For example, you might want to ++ collect information on which hosts connect when: ++ ++ udpsend = <; 2001:dB8::dead:beef ; 1234 ;\ ++ $tod_zulu $sender_host_address ++ ++ ++42.21 Use of the control modifier ++--------------------------------- ++ ++The control modifier supports the following settings: ++ ++control = allow_auth_unadvertised ++ ++ This modifier allows a client host to use the SMTP AUTH command even when ++ it has not been advertised in response to EHLO. Furthermore, because there ++ are apparently some really broken clients that do this, Exim will accept ++ AUTH after HELO (rather than EHLO) when this control is set. It should be ++ used only if you really need it, and you should limit its use to those ++ broken clients that do not work without it. For example: ++ ++ warn hosts = 192.168.34.25 ++ control = allow_auth_unadvertised ++ ++ Normally, when an Exim server receives an AUTH command, it checks the name ++ of the authentication mechanism that is given in the command to ensure that ++ it matches an advertised mechanism. When this control is set, the check ++ that a mechanism has been advertised is bypassed. Any configured mechanism ++ can be used by the client. This control is permitted only in the connection ++ and HELO ACLs. ++ ++control = caseful_local_part, control = caselower_local_part ++ ++ These two controls are permitted only in the ACL specified by acl_smtp_rcpt ++ (that is, during RCPT processing). By default, the contents of $local_part ++ are lower cased before ACL processing. If "caseful_local_part" is ++ specified, any uppercase letters in the original local part are restored in ++ $local_part for the rest of the ACL, or until a control that sets ++ "caselower_local_part" is encountered. ++ ++ These controls affect only the current recipient. Moreover, they apply only ++ to local part handling that takes place directly in the ACL (for example, ++ as a key in lookups). If a test to verify the recipient is obeyed, the ++ case-related handling of the local part during the verification is ++ controlled by the router configuration (see the caseful_local_part generic ++ router option). ++ ++ This facility could be used, for example, to add a spam score to local ++ parts containing upper case letters. For example, using $acl_m4 to ++ accumulate the spam score: ++ ++ warn control = caseful_local_part ++ set acl_m4 = ${eval:\ ++ $acl_m4 + \ ++ ${if match{$local_part}{[A-Z]}{1}{0}}\ ++ } ++ control = caselower_local_part ++ ++ Notice that we put back the lower cased version afterwards, assuming that ++ is what is wanted for subsequent tests. ++ ++control = cutthrough_delivery ++ ++ This option requests delivery be attempted while the item is being ++ received. It is usable in the RCPT ACL and valid only for single-recipient ++ mails forwarded from one SMTP connection to another. If a recipient-verify ++ callout connection is requested in the same ACL it is held open and used ++ for the data, otherwise one is made after the ACL completes. Note that ++ routers are used in verify mode. ++ ++ Should the ultimate destination system positively accept or reject the ++ mail, a corresponding indication is given to the source system and nothing ++ is queued. If there is a temporary error the item is queued for later ++ delivery in the usual fashion. If the item is successfully delivered in ++ cutthrough mode the log line is tagged with ">>" rather than "=>" and ++ appears before the acceptance "<=" line. ++ ++ Delivery in this mode avoids the generation of a bounce mail to a (possibly ++ faked) sender when the destination system is doing content-scan based ++ rejection. ++ ++control = debug/<options> ++ ++ This control turns on debug logging, almost as though Exim had been invoked ++ with "-d", with the output going to a new logfile, by default called ++ debuglog. The filename can be adjusted with the tag option, which may ++ access any variables already defined. The logging may be adjusted with the ++ opts option, which takes the same values as the "-d" command-line option. ++ Some examples (which depend on variables that don't exist in all contexts): ++ ++ control = debug ++ control = debug/tag=.$sender_host_address ++ control = debug/opts=+expand+acl ++ control = debug/tag=.$message_exim_id/opts=+expand ++ ++control = dkim_disable_verify ++ ++ This control turns off DKIM verification processing entirely. For details ++ on the operation and configuration of DKIM, see chapter 56. ++ ++control = dscp/<value> ++ ++ This option causes the DSCP value associated with the socket for the ++ inbound connection to be adjusted to a given value, given as one of a ++ number of fixed strings or to numeric value. The -bI:dscp option may be ++ used to ask Exim which names it knows of. Common values include ++ "throughput", "mincost", and on newer systems "ef", "af41", etc. Numeric ++ values may be in the range 0 to 0x3F. ++ ++ The outbound packets from Exim will be marked with this value in the header ++ (for IPv4, the TOS field; for IPv6, the TCLASS field); there is no ++ guarantee that these values will have any effect, not be stripped by ++ networking equipment, or do much of anything without cooperation with your ++ Network Engineer and those of all network operators between the source and ++ destination. ++ ++control = enforce_sync, control = no_enforce_sync ++ ++ These controls make it possible to be selective about when SMTP ++ synchronization is enforced. The global option smtp_enforce_sync specifies ++ the initial state of the switch (it is true by default). See the ++ description of this option in chapter 14 for details of SMTP ++ synchronization checking. ++ ++ The effect of these two controls lasts for the remainder of the SMTP ++ connection. They can appear in any ACL except the one for the non-SMTP ++ messages. The most straightforward place to put them is in the ACL defined ++ by acl_smtp_connect, which is run at the start of an incoming SMTP ++ connection, before the first synchronization check. The expected use is to ++ turn off the synchronization checks for badly-behaved hosts that you ++ nevertheless need to work with. ++ ++control = fakedefer/<message> ++ ++ This control works in exactly the same way as fakereject (described below) ++ except that it causes an SMTP 450 response after the message data instead ++ of a 550 response. You must take care when using fakedefer because it ++ causes the messages to be duplicated when the sender retries. Therefore, ++ you should not use fakedefer if the message is to be delivered normally. ++ ++control = fakereject/<message> ++ ++ This control is permitted only for the MAIL, RCPT, and DATA ACLs, in other ++ words, only when an SMTP message is being received. If Exim accepts the ++ message, instead the final 250 response, a 550 rejection message is sent. ++ However, Exim proceeds to deliver the message as normal. The control ++ applies only to the current message, not to any subsequent ones that may be ++ received in the same SMTP connection. ++ ++ The text for the 550 response is taken from the control modifier. If no ++ message is supplied, the following is used: ++ ++ 550-Your message has been rejected but is being ++ 550-kept for evaluation. ++ 550-If it was a legitimate message, it may still be ++ 550 delivered to the target recipient(s). ++ ++ This facility should be used with extreme caution. ++ ++control = freeze ++ ++ This control is permitted only for the MAIL, RCPT, DATA, and non-SMTP ACLs, ++ in other words, only when a message is being received. If the message is ++ accepted, it is placed on Exim's queue and frozen. The control applies only ++ to the current message, not to any subsequent ones that may be received in ++ the same SMTP connection. ++ ++ This modifier can optionally be followed by "/no_tell". If the global ++ option freeze_tell is set, it is ignored for the current message (that is, ++ nobody is told about the freezing), provided all the control=freeze ++ modifiers that are obeyed for the current message have the "/no_tell" ++ option. ++ ++control = no_delay_flush ++ ++ Exim normally flushes SMTP output before implementing a delay in an ACL, to ++ avoid unexpected timeouts in clients when the SMTP PIPELINING extension is ++ in use. This control, as long as it is encountered before the delay ++ modifier, disables such output flushing. ++ ++control = no_callout_flush ++ ++ Exim normally flushes SMTP output before performing a callout in an ACL, to ++ avoid unexpected timeouts in clients when the SMTP PIPELINING extension is ++ in use. This control, as long as it is encountered before the verify ++ condition that causes the callout, disables such output flushing. ++ ++control = no_mbox_unspool ++ ++ This control is available when Exim is compiled with the content scanning ++ extension. Content scanning may require a copy of the current message, or ++ parts of it, to be written in "mbox format" to a spool file, for passing to ++ a virus or spam scanner. Normally, such copies are deleted when they are no ++ longer needed. If this control is set, the copies are not deleted. The ++ control applies only to the current message, not to any subsequent ones ++ that may be received in the same SMTP connection. It is provided for ++ debugging purposes and is unlikely to be useful in production. ++ ++control = no_multiline_responses ++ ++ This control is permitted for any ACL except the one for non-SMTP messages. ++ It seems that there are broken clients in use that cannot handle multiline ++ SMTP responses, despite the fact that RFC 821 defined them over 20 years ++ ago. ++ ++ If this control is set, multiline SMTP responses from ACL rejections are ++ suppressed. One way of doing this would have been to put out these ++ responses as one long line. However, RFC 2821 specifies a maximum of 512 ++ bytes per response ("use multiline responses for more" it says - ha!), and ++ some of the responses might get close to that. So this facility, which is ++ after all only a sop to broken clients, is implemented by doing two very ++ easy things: ++ ++ + Extra information that is normally output as part of a rejection caused ++ by sender verification failure is omitted. Only the final line ++ (typically "sender verification failed") is sent. ++ ++ + If a message modifier supplies a multiline response, only the first ++ line is output. ++ ++ The setting of the switch can, of course, be made conditional on the ++ calling host. Its effect lasts until the end of the SMTP connection. ++ ++control = no_pipelining ++ ++ This control turns off the advertising of the PIPELINING extension to SMTP ++ in the current session. To be useful, it must be obeyed before Exim sends ++ its response to an EHLO command. Therefore, it should normally appear in an ++ ACL controlled by acl_smtp_connect or acl_smtp_helo. See also ++ pipelining_advertise_hosts. ++ ++control = queue_only ++ ++ This control is permitted only for the MAIL, RCPT, DATA, and non-SMTP ACLs, ++ in other words, only when a message is being received. If the message is ++ accepted, it is placed on Exim's queue and left there for delivery by a ++ subsequent queue runner. No immediate delivery process is started. In other ++ words, it has the effect as the queue_only global option. However, the ++ control applies only to the current message, not to any subsequent ones ++ that may be received in the same SMTP connection. ++ ++control = submission/<options> ++ ++ This control is permitted only for the MAIL, RCPT, and start of data ACLs ++ (the latter is the one defined by acl_smtp_predata). Setting it tells Exim ++ that the current message is a submission from a local MUA. In this case, ++ Exim operates in "submission mode", and applies certain fixups to the ++ message if necessary. For example, it adds a Date: header line if one is ++ not present. This control is not permitted in the acl_smtp_data ACL, ++ because that is too late (the message has already been created). ++ ++ Chapter 46 describes the processing that Exim applies to messages. Section ++ 46.1 covers the processing that happens in submission mode; the available ++ options for this control are described there. The control applies only to ++ the current message, not to any subsequent ones that may be received in the ++ same SMTP connection. ++ ++control = suppress_local_fixups ++ ++ This control applies to locally submitted (non TCP/IP) messages, and is the ++ complement of "control = submission". It disables the fixups that are ++ normally applied to locally-submitted messages. Specifically: ++ ++ + Any Sender: header line is left alone (in this respect, it is a dynamic ++ version of local_sender_retain). ++ ++ + No Message-ID:, From:, or Date: header lines are added. ++ ++ + There is no check that From: corresponds to the actual sender. ++ ++ This control may be useful when a remotely-originated message is accepted, ++ passed to some scanning program, and then re-submitted for delivery. It can ++ be used only in the acl_smtp_mail, acl_smtp_rcpt, acl_smtp_predata, and ++ acl_not_smtp_start ACLs, because it has to be set before the message's data ++ is read. ++ ++ Note: This control applies only to the current message, not to any others ++ that are being submitted at the same time using -bs or -bS. ++ ++ ++42.22 Summary of message fixup control ++-------------------------------------- ++ ++All four possibilities for message fixups can be specified: ++ ++ * Locally submitted, fixups applied: the default. ++ ++ * Locally submitted, no fixups applied: use "control = ++ suppress_local_fixups". ++ ++ * Remotely submitted, no fixups applied: the default. ++ ++ * Remotely submitted, fixups applied: use "control = submission". ++ ++ ++42.23 Adding header lines in ACLs ++--------------------------------- ++ ++The add_header modifier can be used to add one or more extra header lines to an ++incoming message, as in this example: ++ ++warn dnslists = sbl.spamhaus.org : \ ++ dialup.mail-abuse.org ++ add_header = X-blacklisted-at: $dnslist_domain ++ ++The add_header modifier is permitted in the MAIL, RCPT, PREDATA, DATA, MIME, ++and non-SMTP ACLs (in other words, those that are concerned with receiving a ++message). The message must ultimately be accepted for add_header to have any ++significant effect. You can use add_header with any ACL verb, including deny ++(though this is potentially useful only in a RCPT ACL). ++ ++Leading and trailing newlines are removed from the data for the add_header ++modifier; if it then contains one or more newlines that are not followed by a ++space or a tab, it is assumed to contain multiple header lines. Each one is ++checked for valid syntax; "X-ACL-Warn:" is added to the front of any line that ++is not a valid header line. ++ ++Added header lines are accumulated during the MAIL, RCPT, and predata ACLs. ++They are added to the message before processing the DATA and MIME ACLs. ++However, if an identical header line is requested more than once, only one copy ++is actually added to the message. Further header lines may be accumulated ++during the DATA and MIME ACLs, after which they are added to the message, again ++with duplicates suppressed. Thus, it is possible to add two identical header ++lines to an SMTP message, but only if one is added before DATA and one after. ++In the case of non-SMTP messages, new headers are accumulated during the ++non-SMTP ACLs, and are added to the message after all the ACLs have run. If a ++message is rejected after DATA or by the non-SMTP ACL, all added header lines ++are included in the entry that is written to the reject log. ++ ++Header lines are not visible in string expansions of message headers until they ++are added to the message. It follows that header lines defined in the MAIL, ++RCPT, and predata ACLs are not visible until the DATA ACL and MIME ACLs are ++run. Similarly, header lines that are added by the DATA or MIME ACLs are not ++visible in those ACLs. Because of this restriction, you cannot use header lines ++as a way of passing data between (for example) the MAIL and RCPT ACLs. If you ++want to do this, you can use ACL variables, as described in section 42.18. ++ ++The list of headers yet to be added is given by the $headers_added variable. ++ ++The add_header modifier acts immediately as it is encountered during the ++processing of an ACL. Notice the difference between these two cases: ++ ++accept add_header = ADDED: some text ++ <some condition> ++ ++accept <some condition> ++ add_header = ADDED: some text ++ ++In the first case, the header line is always added, whether or not the ++condition is true. In the second case, the header line is added only if the ++condition is true. Multiple occurrences of add_header may occur in the same ACL ++statement. All those that are encountered before a condition fails are ++honoured. ++ ++For compatibility with previous versions of Exim, a message modifier for a warn ++verb acts in the same way as add_header, except that it takes effect only if ++all the conditions are true, even if it appears before some of them. ++Furthermore, only the last occurrence of message is honoured. This usage of ++message is now deprecated. If both add_header and message are present on a warn ++verb, both are processed according to their specifications. ++ ++By default, new header lines are added to a message at the end of the existing ++header lines. However, you can specify that any particular header line should ++be added right at the start (before all the Received: lines), immediately after ++the first block of Received: lines, or immediately before any line that is not ++a Received: or Resent-something: header. ++ ++This is done by specifying ":at_start:", ":after_received:", or ++":at_start_rfc:" (or, for completeness, ":at_end:") before the text of the ++header line, respectively. (Header text cannot start with a colon, as there has ++to be a header name first.) For example: ++ ++warn add_header = \ ++ :after_received:X-My-Header: something or other... ++ ++If more than one header line is supplied in a single add_header modifier, each ++one is treated independently and can therefore be placed differently. If you ++add more than one line at the start, or after the Received: block, they end up ++in reverse order. ++ ++Warning: This facility currently applies only to header lines that are added in ++an ACL. It does NOT work for header lines that are added in a system filter or ++in a router or transport. ++ ++ ++42.24 Removing header lines in ACLs ++----------------------------------- ++ ++The remove_header modifier can be used to remove one or more header lines from ++an incoming message, as in this example: ++ ++warn message = Remove internal headers ++ remove_header = x-route-mail1 : x-route-mail2 ++ ++The remove_header modifier is permitted in the MAIL, RCPT, PREDATA, DATA, MIME, ++and non-SMTP ACLs (in other words, those that are concerned with receiving a ++message). The message must ultimately be accepted for remove_header to have any ++significant effect. You can use remove_header with any ACL verb, including deny ++, though this is really not useful for any verb that doesn't result in a ++delivered message. ++ ++More than one header can be removed at the same time by using a colon separated ++list of header names. The header matching is case insensitive. Wildcards are ++not permitted, nor is list expansion performed, so you cannot use hostlists to ++create a list of headers, however both connection and message variable ++expansion are performed ($acl_c_* and $acl_m_*), illustrated in this example: ++ ++warn hosts = +internal_hosts ++ set acl_c_ihdrs = x-route-mail1 : x-route-mail2 ++warn message = Remove internal headers ++ remove_header = $acl_c_ihdrs ++ ++Removed header lines are accumulated during the MAIL, RCPT, and predata ACLs. ++They are removed from the message before processing the DATA and MIME ACLs. ++There is no harm in attempting to remove the same header twice nor is removing ++a non-existent header. Further header lines to be removed may be accumulated ++during the DATA and MIME ACLs, after which they are removed from the message, ++if present. In the case of non-SMTP messages, headers to be removed are ++accumulated during the non-SMTP ACLs, and are removed from the message after ++all the ACLs have run. If a message is rejected after DATA or by the non-SMTP ++ACL, there really is no effect because there is no logging of what headers ++would have been removed. ++ ++Header lines are not visible in string expansions until the DATA phase when it ++is received. Any header lines removed in the MAIL, RCPT, and predata ACLs are ++not visible in the DATA ACL and MIME ACLs. Similarly, header lines that are ++removed by the DATA or MIME ACLs are still visible in those ACLs. Because of ++this restriction, you cannot use header lines as a way of controlling data ++passed between (for example) the MAIL and RCPT ACLs. If you want to do this, ++you should instead use ACL variables, as described in section 42.18. ++ ++The remove_header modifier acts immediately as it is encountered during the ++processing of an ACL. Notice the difference between these two cases: ++ ++accept remove_header = X-Internal ++ <some condition> ++ ++accept <some condition> ++ remove_header = X-Internal ++ ++In the first case, the header line is always removed, whether or not the ++condition is true. In the second case, the header line is removed only if the ++condition is true. Multiple occurrences of remove_header may occur in the same ++ACL statement. All those that are encountered before a condition fails are ++honoured. ++ ++Warning: This facility currently applies only to header lines that are present ++during ACL processing. It does NOT remove header lines that are added in a ++system filter or in a router or transport. ++ ++ ++42.25 ACL conditions ++-------------------- ++ ++Some of the conditions listed in this section are available only when Exim is ++compiled with the content-scanning extension. They are included here briefly ++for completeness. More detailed descriptions can be found in the discussion on ++content scanning in chapter 43. ++ ++Not all conditions are relevant in all circumstances. For example, testing ++senders and recipients does not make sense in an ACL that is being run as the ++result of the arrival of an ETRN command, and checks on message headers can be ++done only in the ACLs specified by acl_smtp_data and acl_not_smtp. You can use ++the same condition (with different parameters) more than once in the same ACL ++statement. This provides a way of specifying an "and" conjunction. The ++conditions are as follows: ++ ++acl = <name of acl or ACL string or file name > ++ ++ The possible values of the argument are the same as for the acl_smtp_xxx ++ options. The named or inline ACL is run. If it returns "accept" the ++ condition is true; if it returns "deny" the condition is false. If it ++ returns "defer", the current ACL returns "defer" unless the condition is on ++ a warn verb. In that case, a "defer" return makes the condition false. This ++ means that further processing of the warn verb ceases, but processing of ++ the ACL continues. ++ ++ If the argument is a named ACL, up to nine space-separated optional values ++ can be appended; they appear within the called ACL in $acl_arg1 to ++ $acl_arg9, and $acl_narg is set to the count of values. Previous values of ++ these variables are restored after the call returns. The name and values ++ are expanded separately. ++ ++ If the nested acl returns "drop" and the outer condition denies access, the ++ connection is dropped. If it returns "discard", the verb must be accept or ++ discard, and the action is taken immediately - no further conditions are ++ tested. ++ ++ ACLs may be nested up to 20 deep; the limit exists purely to catch runaway ++ loops. This condition allows you to use different ACLs in different ++ circumstances. For example, different ACLs can be used to handle RCPT ++ commands for different local users or different local domains. ++ ++authenticated = <string list> ++ ++ If the SMTP connection is not authenticated, the condition is false. ++ Otherwise, the name of the authenticator is tested against the list. To ++ test for authentication by any authenticator, you can set ++ ++ authenticated = * ++ ++condition = <string> ++ ++ This feature allows you to make up custom conditions. If the result of ++ expanding the string is an empty string, the number zero, or one of the ++ strings "no" or "false", the condition is false. If the result is any ++ non-zero number, or one of the strings "yes" or "true", the condition is ++ true. For any other value, some error is assumed to have occurred, and the ++ ACL returns "defer". However, if the expansion is forced to fail, the ++ condition is ignored. The effect is to treat it as true, whether it is ++ positive or negative. ++ ++decode = <location> ++ ++ This condition is available only when Exim is compiled with the ++ content-scanning extension, and it is allowed only in the ACL defined by ++ acl_smtp_mime. It causes the current MIME part to be decoded into a file. ++ If all goes well, the condition is true. It is false only if there are ++ problems such as a syntax error or a memory shortage. For more details, see ++ chapter 43. ++ ++demime = <extension list> ++ ++ This condition is available only when Exim is compiled with the ++ content-scanning extension. Its use is described in section 43.6. ++ ++dnslists = <list of domain names and other data> ++ ++ This condition checks for entries in DNS black lists. These are also known ++ as "RBL lists", after the original Realtime Blackhole List, but note that ++ the use of the lists at mail-abuse.org now carries a charge. There are too ++ many different variants of this condition to describe briefly here. See ++ sections 42.26-42.36 for details. ++ ++domains = <domain list> ++ ++ This condition is relevant only after a RCPT command. It checks that the ++ domain of the recipient address is in the domain list. If percent-hack ++ processing is enabled, it is done before this test is done. If the check ++ succeeds with a lookup, the result of the lookup is placed in $domain_data ++ until the next domains test. ++ ++ Note carefully (because many people seem to fall foul of this): you cannot ++ use domains in a DATA ACL. ++ ++encrypted = <string list> ++ ++ If the SMTP connection is not encrypted, the condition is false. Otherwise, ++ the name of the cipher suite in use is tested against the list. To test for ++ encryption without testing for any specific cipher suite(s), set ++ ++ encrypted = * ++ ++hosts = <host list> ++ ++ This condition tests that the calling host matches the host list. If you ++ have name lookups or wildcarded host names and IP addresses in the same ++ host list, you should normally put the IP addresses first. For example, you ++ could have: ++ ++ accept hosts = 10.9.8.7 : dbm;/etc/friendly/hosts ++ ++ The lookup in this example uses the host name for its key. This is implied ++ by the lookup type "dbm". (For a host address lookup you would use ++ "net-dbm" and it wouldn't matter which way round you had these two items.) ++ ++ The reason for the problem with host names lies in the left-to-right way ++ that Exim processes lists. It can test IP addresses without doing any DNS ++ lookups, but when it reaches an item that requires a host name, it fails if ++ it cannot find a host name to compare with the pattern. If the above list ++ is given in the opposite order, the accept statement fails for a host whose ++ name cannot be found, even if its IP address is 10.9.8.7. ++ ++ If you really do want to do the name check first, and still recognize the ++ IP address even if the name lookup fails, you can rewrite the ACL like ++ this: ++ ++ accept hosts = dbm;/etc/friendly/hosts ++ accept hosts = 10.9.8.7 ++ ++ The default action on failing to find the host name is to assume that the ++ host is not in the list, so the first accept statement fails. The second ++ statement can then check the IP address. ++ ++ If a hosts condition is satisfied by means of a lookup, the result of the ++ lookup is made available in the $host_data variable. This allows you, for ++ example, to set up a statement like this: ++ ++ deny hosts = net-lsearch;/some/file ++ message = $host_data ++ ++ which gives a custom error message for each denied host. ++ ++local_parts = <local part list> ++ ++ This condition is relevant only after a RCPT command. It checks that the ++ local part of the recipient address is in the list. If percent-hack ++ processing is enabled, it is done before this test. If the check succeeds ++ with a lookup, the result of the lookup is placed in $local_part_data, ++ which remains set until the next local_parts test. ++ ++malware = <option> ++ ++ This condition is available only when Exim is compiled with the ++ content-scanning extension. It causes the incoming message to be scanned ++ for viruses. For details, see chapter 43. ++ ++mime_regex = <list of regular expressions> ++ ++ This condition is available only when Exim is compiled with the ++ content-scanning extension, and it is allowed only in the ACL defined by ++ acl_smtp_mime. It causes the current MIME part to be scanned for a match ++ with any of the regular expressions. For details, see chapter 43. ++ ++ratelimit = <parameters> ++ ++ This condition can be used to limit the rate at which a user or host ++ submits messages. Details are given in section 42.37. ++ ++recipients = <address list> ++ ++ This condition is relevant only after a RCPT command. It checks the entire ++ recipient address against a list of recipients. ++ ++regex = <list of regular expressions> ++ ++ This condition is available only when Exim is compiled with the ++ content-scanning extension, and is available only in the DATA, MIME, and ++ non-SMTP ACLs. It causes the incoming message to be scanned for a match ++ with any of the regular expressions. For details, see chapter 43. ++ ++sender_domains = <domain list> ++ ++ This condition tests the domain of the sender of the message against the ++ given domain list. Note: The domain of the sender address is in ++ $sender_address_domain. It is not put in $domain during the testing of this ++ condition. This is an exception to the general rule for testing domain ++ lists. It is done this way so that, if this condition is used in an ACL for ++ a RCPT command, the recipient's domain (which is in $domain) can be used to ++ influence the sender checking. ++ ++ Warning: It is a bad idea to use this condition on its own as a control on ++ relaying, because sender addresses are easily, and commonly, forged. ++ ++senders = <address list> ++ ++ This condition tests the sender of the message against the given list. To ++ test for a bounce message, which has an empty sender, set ++ ++ senders = : ++ ++ Warning: It is a bad idea to use this condition on its own as a control on ++ relaying, because sender addresses are easily, and commonly, forged. ++ ++spam = <username> ++ ++ This condition is available only when Exim is compiled with the ++ content-scanning extension. It causes the incoming message to be scanned by ++ SpamAssassin. For details, see chapter 43. ++ ++verify = certificate ++ ++ This condition is true in an SMTP session if the session is encrypted, and ++ a certificate was received from the client, and the certificate was ++ verified. The server requests a certificate only if the client matches ++ tls_verify_hosts or tls_try_verify_hosts (see chapter 41). ++ ++verify = csa ++ ++ This condition checks whether the sending host (the client) is authorized ++ to send email. Details of how this works are given in section 42.49. ++ ++verify = header_sender/<options> ++ ++ This condition is relevant only in an ACL that is run after a message has ++ been received, that is, in an ACL specified by acl_smtp_data or ++ acl_not_smtp. It checks that there is a verifiable address in at least one ++ of the Sender:, Reply-To:, or From: header lines. Such an address is ++ loosely thought of as a "sender" address (hence the name of the test). ++ However, an address that appears in one of these headers need not be an ++ address that accepts bounce messages; only sender addresses in envelopes ++ are required to accept bounces. Therefore, if you use the callout option on ++ this check, you might want to arrange for a non-empty address in the MAIL ++ command. ++ ++ Details of address verification and the options are given later, starting ++ at section 42.43 (callouts are described in section 42.44). You can combine ++ this condition with the senders condition to restrict it to bounce messages ++ only: ++ ++ deny senders = : ++ message = A valid sender header is required for bounces ++ !verify = header_sender ++ ++verify = header_syntax ++ ++ This condition is relevant only in an ACL that is run after a message has ++ been received, that is, in an ACL specified by acl_smtp_data or ++ acl_not_smtp. It checks the syntax of all header lines that can contain ++ lists of addresses (Sender:, From:, Reply-To:, To:, Cc:, and Bcc:). ++ Unqualified addresses (local parts without domains) are permitted only in ++ locally generated messages and from hosts that match ++ sender_unqualified_hosts or recipient_unqualified_hosts, as appropriate. ++ ++ Note that this condition is a syntax check only. However, a common spamming ++ ploy used to be to send syntactically invalid headers such as ++ ++ To: @ ++ ++ and this condition can be used to reject such messages, though they are not ++ as common as they used to be. ++ ++verify = helo ++ ++ This condition is true if a HELO or EHLO command has been received from the ++ client host, and its contents have been verified. If there has been no ++ previous attempt to verify the HELO/EHLO contents, it is carried out when ++ this condition is encountered. See the description of the helo_verify_hosts ++ and helo_try_verify_hosts options for details of how to request ++ verification independently of this condition. ++ ++ For SMTP input that does not come over TCP/IP (the -bs command line ++ option), this condition is always true. ++ ++verify = not_blind ++ ++ This condition checks that there are no blind (bcc) recipients in the ++ message. Every envelope recipient must appear either in a To: header line ++ or in a Cc: header line for this condition to be true. Local parts are ++ checked case-sensitively; domains are checked case-insensitively. If ++ Resent-To: or Resent-Cc: header lines exist, they are also checked. This ++ condition can be used only in a DATA or non-SMTP ACL. ++ ++ There are, of course, many legitimate messages that make use of blind (bcc) ++ recipients. This check should not be used on its own for blocking messages. ++ ++verify = recipient/<options> ++ ++ This condition is relevant only after a RCPT command. It verifies the ++ current recipient. Details of address verification are given later, ++ starting at section 42.43. After a recipient has been verified, the value ++ of $address_data is the last value that was set while routing the address. ++ This applies even if the verification fails. When an address that is being ++ verified is redirected to a single address, verification continues with the ++ new address, and in that case, the subsequent value of $address_data is the ++ value for the child address. ++ ++verify = reverse_host_lookup ++ ++ This condition ensures that a verified host name has been looked up from ++ the IP address of the client host. (This may have happened already if the ++ host name was needed for checking a host list, or if the host matched ++ host_lookup.) Verification ensures that the host name obtained from a ++ reverse DNS lookup, or one of its aliases, does, when it is itself looked ++ up in the DNS, yield the original IP address. ++ ++ If this condition is used for a locally generated message (that is, when ++ there is no client host involved), it always succeeds. ++ ++verify = sender/<options> ++ ++ This condition is relevant only after a MAIL or RCPT command, or after a ++ message has been received (the acl_smtp_data or acl_not_smtp ACLs). If the ++ message's sender is empty (that is, this is a bounce message), the ++ condition is true. Otherwise, the sender address is verified. ++ ++ If there is data in the $address_data variable at the end of routing, its ++ value is placed in $sender_address_data at the end of verification. This ++ value can be used in subsequent conditions and modifiers in the same ACL ++ statement. It does not persist after the end of the current statement. If ++ you want to preserve the value for longer, you can save it in an ACL ++ variable. ++ ++ Details of verification are given later, starting at section 42.43. Exim ++ caches the result of sender verification, to avoid doing it more than once ++ per message. ++ ++verify = sender=<address>/<options> ++ ++ This is a variation of the previous option, in which a modified address is ++ verified as a sender. ++ ++ ++42.26 Using DNS lists ++--------------------- ++ ++In its simplest form, the dnslists condition tests whether the calling host is ++on at least one of a number of DNS lists by looking up the inverted IP address ++in one or more DNS domains. (Note that DNS list domains are not mail domains, ++so the "+" syntax for named lists doesn't work - it is used for special options ++instead.) For example, if the calling host's IP address is 192.168.62.43, and ++the ACL statement is ++ ++deny dnslists = blackholes.mail-abuse.org : \ ++ dialups.mail-abuse.org ++ ++the following records are looked up: ++ ++43.62.168.192.blackholes.mail-abuse.org ++43.62.168.192.dialups.mail-abuse.org ++ ++As soon as Exim finds an existing DNS record, processing of the list stops. ++Thus, multiple entries on the list provide an "or" conjunction. If you want to ++test that a host is on more than one list (an "and" conjunction), you can use ++two separate conditions: ++ ++deny dnslists = blackholes.mail-abuse.org ++ dnslists = dialups.mail-abuse.org ++ ++If a DNS lookup times out or otherwise fails to give a decisive answer, Exim ++behaves as if the host does not match the list item, that is, as if the DNS ++record does not exist. If there are further items in the DNS list, they are ++processed. ++ ++This is usually the required action when dnslists is used with deny (which is ++the most common usage), because it prevents a DNS failure from blocking mail. ++However, you can change this behaviour by putting one of the following special ++items in the list: ++ +++include_unknown behave as if the item is on the list +++exclude_unknown behave as if the item is not on the list (default) +++defer_unknown give a temporary error ++ ++Each of these applies to any subsequent items on the list. For example: ++ ++deny dnslists = +defer_unknown : foo.bar.example ++ ++Testing the list of domains stops as soon as a match is found. If you want to ++warn for one list and block for another, you can use two different statements: ++ ++deny dnslists = blackholes.mail-abuse.org ++warn message = X-Warn: sending host is on dialups list ++ dnslists = dialups.mail-abuse.org ++ ++DNS list lookups are cached by Exim for the duration of the SMTP session, so a ++lookup based on the IP address is done at most once for any incoming ++connection. Exim does not share information between multiple incoming ++connections (but your local name server cache should be active). ++ ++ ++42.27 Specifying the IP address for a DNS list lookup ++----------------------------------------------------- ++ ++By default, the IP address that is used in a DNS list lookup is the IP address ++of the calling host. However, you can specify another IP address by listing it ++after the domain name, introduced by a slash. For example: ++ ++deny dnslists = black.list.tld/192.168.1.2 ++ ++This feature is not very helpful with explicit IP addresses; it is intended for ++use with IP addresses that are looked up, for example, the IP addresses of the ++MX hosts or nameservers of an email sender address. For an example, see section ++42.29 below. ++ ++ ++42.28 DNS lists keyed on domain names ++------------------------------------- ++ ++There are some lists that are keyed on domain names rather than inverted IP ++addresses (see for example the domain based zones link at http:// ++www.rfc-ignorant.org/). No reversing of components is used with these lists. ++You can change the name that is looked up in a DNS list by listing it after the ++domain name, introduced by a slash. For example, ++ ++deny message = Sender's domain is listed at $dnslist_domain ++ dnslists = dsn.rfc-ignorant.org/$sender_address_domain ++ ++This particular example is useful only in ACLs that are obeyed after the RCPT ++or DATA commands, when a sender address is available. If (for example) the ++message's sender is user@tld.example the name that is looked up by this example ++is ++ ++tld.example.dsn.rfc-ignorant.org ++ ++A single dnslists condition can contain entries for both names and IP ++addresses. For example: ++ ++deny dnslists = sbl.spamhaus.org : \ ++ dsn.rfc-ignorant.org/$sender_address_domain ++ ++The first item checks the sending host's IP address; the second checks a domain ++name. The whole condition is true if either of the DNS lookups succeeds. ++ ++ ++42.29 Multiple explicit keys for a DNS list ++------------------------------------------- ++ ++The syntax described above for looking up explicitly-defined values (either ++names or IP addresses) in a DNS blacklist is a simplification. After the domain ++name for the DNS list, what follows the slash can in fact be a list of items. ++As with all lists in Exim, the default separator is a colon. However, because ++this is a sublist within the list of DNS blacklist domains, it is necessary ++either to double the separators like this: ++ ++dnslists = black.list.tld/name.1::name.2 ++ ++or to change the separator character, like this: ++ ++dnslists = black.list.tld/<;name.1;name.2 ++ ++If an item in the list is an IP address, it is inverted before the DNS ++blacklist domain is appended. If it is not an IP address, no inversion occurs. ++Consider this condition: ++ ++dnslists = black.list.tld/<;192.168.1.2;a.domain ++ ++The DNS lookups that occur are: ++ ++2.1.168.192.black.list.tld ++a.domain.black.list.tld ++ ++Once a DNS record has been found (that matches a specific IP return address, if ++specified - see section 42.32), no further lookups are done. If there is a ++temporary DNS error, the rest of the sublist of domains or IP addresses is ++tried. A temporary error for the whole dnslists item occurs only if no other ++DNS lookup in this sublist succeeds. In other words, a successful lookup for ++any of the items in the sublist overrides a temporary error for a previous ++item. ++ ++The ability to supply a list of items after the slash is in some sense just a ++syntactic convenience. These two examples have the same effect: ++ ++dnslists = black.list.tld/a.domain : black.list.tld/b.domain ++dnslists = black.list.tld/a.domain::b.domain ++ ++However, when the data for the list is obtained from a lookup, the second form ++is usually much more convenient. Consider this example: ++ ++deny message = The mail servers for the domain \ ++ $sender_address_domain \ ++ are listed at $dnslist_domain ($dnslist_value); \ ++ see $dnslist_text. ++ dnslists = sbl.spamhaus.org/<|${lookup dnsdb {>|a=<|\ ++ ${lookup dnsdb {>|mxh=\ ++ $sender_address_domain} }} } ++ ++Note the use of ">|" in the dnsdb lookup to specify the separator for multiple ++DNS records. The inner dnsdb lookup produces a list of MX hosts and the outer ++dnsdb lookup finds the IP addresses for these hosts. The result of expanding ++the condition might be something like this: ++ ++dnslists = sbl.spahmaus.org/<|192.168.2.3|192.168.5.6|... ++ ++Thus, this example checks whether or not the IP addresses of the sender ++domain's mail servers are on the Spamhaus black list. ++ ++The key that was used for a successful DNS list lookup is put into the variable ++$dnslist_matched (see section 42.31). ++ ++ ++42.30 Data returned by DNS lists ++-------------------------------- ++ ++DNS lists are constructed using address records in the DNS. The original RBL ++just used the address 127.0.0.1 on the right hand side of each record, but the ++RBL+ list and some other lists use a number of values with different meanings. ++The values used on the RBL+ list are: ++ ++127.1.0.1 RBL ++127.1.0.2 DUL ++127.1.0.3 DUL and RBL ++127.1.0.4 RSS ++127.1.0.5 RSS and RBL ++127.1.0.6 RSS and DUL ++127.1.0.7 RSS and DUL and RBL ++ ++Section 42.32 below describes how you can distinguish between different values. ++Some DNS lists may return more than one address record; see section 42.34 for ++details of how they are checked. ++ ++ ++42.31 Variables set from DNS lists ++---------------------------------- ++ ++When an entry is found in a DNS list, the variable $dnslist_domain contains the ++name of the overall domain that matched (for example, "spamhaus.example"), ++$dnslist_matched contains the key within that domain (for example, ++"192.168.5.3"), and $dnslist_value contains the data from the DNS record. When ++the key is an IP address, it is not reversed in $dnslist_matched (though it is, ++of course, in the actual lookup). In simple cases, for example: ++ ++deny dnslists = spamhaus.example ++ ++the key is also available in another variable (in this case, ++$sender_host_address). In more complicated cases, however, this is not true. ++For example, using a data lookup (as described in section 42.29) might generate ++a dnslists lookup like this: ++ ++deny dnslists = spamhaus.example/<|192.168.1.2|192.168.6.7|... ++ ++If this condition succeeds, the value in $dnslist_matched might be ++"192.168.6.7" (for example). ++ ++If more than one address record is returned by the DNS lookup, all the IP ++addresses are included in $dnslist_value, separated by commas and spaces. The ++variable $dnslist_text contains the contents of any associated TXT record. For ++lists such as RBL+ the TXT record for a merged entry is often not very ++meaningful. See section 42.35 for a way of obtaining more information. ++ ++You can use the DNS list variables in message or log_message modifiers - ++although these appear before the condition in the ACL, they are not expanded ++until after it has failed. For example: ++ ++deny hosts = !+local_networks ++ message = $sender_host_address is listed \ ++ at $dnslist_domain ++ dnslists = rbl-plus.mail-abuse.example ++ ++ ++42.32 Additional matching conditions for DNS lists ++-------------------------------------------------- ++ ++You can add an equals sign and an IP address after a dnslists domain name in ++order to restrict its action to DNS records with a matching right hand side. ++For example, ++ ++deny dnslists = rblplus.mail-abuse.org=127.0.0.2 ++ ++rejects only those hosts that yield 127.0.0.2. Without this additional data, ++any address record is considered to be a match. For the moment, we assume that ++the DNS lookup returns just one record. Section 42.34 describes how multiple ++records are handled. ++ ++More than one IP address may be given for checking, using a comma as a ++separator. These are alternatives - if any one of them matches, the dnslists ++condition is true. For example: ++ ++deny dnslists = a.b.c=127.0.0.2,127.0.0.3 ++ ++If you want to specify a constraining address list and also specify names or IP ++addresses to be looked up, the constraining address list must be specified ++first. For example: ++ ++deny dnslists = dsn.rfc-ignorant.org\ ++ =127.0.0.2/$sender_address_domain ++ ++If the character "&" is used instead of "=", the comparison for each listed IP ++address is done by a bitwise "and" instead of by an equality test. In other ++words, the listed addresses are used as bit masks. The comparison is true if ++all the bits in the mask are present in the address that is being tested. For ++example: ++ ++dnslists = a.b.c&0.0.0.3 ++ ++matches if the address is x.x.x.3, x.x.x.7, x.x.x.11, etc. If you want to test ++whether one bit or another bit is present (as opposed to both being present), ++you must use multiple values. For example: ++ ++dnslists = a.b.c&0.0.0.1,0.0.0.2 ++ ++matches if the final component of the address is an odd number or two times an ++odd number. ++ ++ ++42.33 Negated DNS matching conditions ++------------------------------------- ++ ++You can supply a negative list of IP addresses as part of a dnslists condition. ++Whereas ++ ++deny dnslists = a.b.c=127.0.0.2,127.0.0.3 ++ ++means "deny if the host is in the black list at the domain a.b.c and the IP ++address yielded by the list is either 127.0.0.2 or 127.0.0.3", ++ ++deny dnslists = a.b.c!=127.0.0.2,127.0.0.3 ++ ++means "deny if the host is in the black list at the domain a.b.c and the IP ++address yielded by the list is not 127.0.0.2 and not 127.0.0.3". In other ++words, the result of the test is inverted if an exclamation mark appears before ++the "=" (or the "&") sign. ++ ++Note: This kind of negation is not the same as negation in a domain, host, or ++address list (which is why the syntax is different). ++ ++If you are using just one list, the negation syntax does not gain you much. The ++previous example is precisely equivalent to ++ ++deny dnslists = a.b.c ++ !dnslists = a.b.c=127.0.0.2,127.0.0.3 ++ ++However, if you are using multiple lists, the negation syntax is clearer. ++Consider this example: ++ ++deny dnslists = sbl.spamhaus.org : \ ++ list.dsbl.org : \ ++ dnsbl.njabl.org!=127.0.0.3 : \ ++ relays.ordb.org ++ ++Using only positive lists, this would have to be: ++ ++deny dnslists = sbl.spamhaus.org : \ ++ list.dsbl.org ++deny dnslists = dnsbl.njabl.org ++ !dnslists = dnsbl.njabl.org=127.0.0.3 ++deny dnslists = relays.ordb.org ++ ++which is less clear, and harder to maintain. ++ ++ ++42.34 Handling multiple DNS records from a DNS list ++--------------------------------------------------- ++ ++A DNS lookup for a dnslists condition may return more than one DNS record, ++thereby providing more than one IP address. When an item in a dnslists list is ++followed by "=" or "&" and a list of IP addresses, in order to restrict the ++match to specific results from the DNS lookup, there are two ways in which the ++checking can be handled. For example, consider the condition: ++ ++dnslists = a.b.c=127.0.0.1 ++ ++What happens if the DNS lookup for the incoming IP address yields both ++127.0.0.1 and 127.0.0.2 by means of two separate DNS records? Is the condition ++true because at least one given value was found, or is it false because at ++least one of the found values was not listed? And how does this affect negated ++conditions? Both possibilities are provided for with the help of additional ++separators "==" and "=&". ++ ++ * If "=" or "&" is used, the condition is true if any one of the looked up IP ++ addresses matches one of the listed addresses. For the example above, the ++ condition is true because 127.0.0.1 matches. ++ ++ * If "==" or "=&" is used, the condition is true only if every one of the ++ looked up IP addresses matches one of the listed addresses. If the ++ condition is changed to: ++ ++ dnslists = a.b.c==127.0.0.1 ++ ++ and the DNS lookup yields both 127.0.0.1 and 127.0.0.2, the condition is ++ false because 127.0.0.2 is not listed. You would need to have: ++ ++ dnslists = a.b.c==127.0.0.1,127.0.0.2 ++ ++ for the condition to be true. ++ ++When "!" is used to negate IP address matching, it inverts the result, giving ++the precise opposite of the behaviour above. Thus: ++ ++ * If "!=" or "!&" is used, the condition is true if none of the looked up IP ++ addresses matches one of the listed addresses. Consider: ++ ++ dnslists = a.b.c!&0.0.0.1 ++ ++ If the DNS lookup yields both 127.0.0.1 and 127.0.0.2, the condition is ++ false because 127.0.0.1 matches. ++ ++ * If "!==" or "!=&" is used, the condition is true if there is at least one ++ looked up IP address that does not match. Consider: ++ ++ dnslists = a.b.c!=&0.0.0.1 ++ ++ If the DNS lookup yields both 127.0.0.1 and 127.0.0.2, the condition is ++ true, because 127.0.0.2 does not match. You would need to have: ++ ++ dnslists = a.b.c!=&0.0.0.1,0.0.0.2 ++ ++ for the condition to be false. ++ ++When the DNS lookup yields only a single IP address, there is no difference ++between "=" and "==" and between "&" and "=&". ++ ++ ++42.35 Detailed information from merged DNS lists ++------------------------------------------------ ++ ++When the facility for restricting the matching IP values in a DNS list is used, ++the text from the TXT record that is set in $dnslist_text may not reflect the ++true reason for rejection. This happens when lists are merged and the IP ++address in the A record is used to distinguish them; unfortunately there is ++only one TXT record. One way round this is not to use merged lists, but that ++can be inefficient because it requires multiple DNS lookups where one would do ++in the vast majority of cases when the host of interest is not on any of the ++lists. ++ ++A less inefficient way of solving this problem is available. If two domain ++names, comma-separated, are given, the second is used first to do an initial ++check, making use of any IP value restrictions that are set. If there is a ++match, the first domain is used, without any IP value restrictions, to get the ++TXT record. As a byproduct of this, there is also a check that the IP being ++tested is indeed on the first list. The first domain is the one that is put in ++$dnslist_domain. For example: ++ ++reject message = \ ++ rejected because $sender_host_address is blacklisted \ ++ at $dnslist_domain\n$dnslist_text ++ dnslists = \ ++ sbl.spamhaus.org,sbl-xbl.spamhaus.org=127.0.0.2 : \ ++ dul.dnsbl.sorbs.net,dnsbl.sorbs.net=127.0.0.10 ++ ++For the first blacklist item, this starts by doing a lookup in ++sbl-xbl.spamhaus.org and testing for a 127.0.0.2 return. If there is a match, ++it then looks in sbl.spamhaus.org, without checking the return value, and as ++long as something is found, it looks for the corresponding TXT record. If there ++is no match in sbl-xbl.spamhaus.org, nothing more is done. The second blacklist ++item is processed similarly. ++ ++If you are interested in more than one merged list, the same list must be given ++several times, but because the results of the DNS lookups are cached, the DNS ++calls themselves are not repeated. For example: ++ ++reject dnslists = \ ++ http.dnsbl.sorbs.net,dnsbl.sorbs.net=127.0.0.2 : \ ++ socks.dnsbl.sorbs.net,dnsbl.sorbs.net=127.0.0.3 : \ ++ misc.dnsbl.sorbs.net,dnsbl.sorbs.net=127.0.0.4 : \ ++ dul.dnsbl.sorbs.net,dnsbl.sorbs.net=127.0.0.10 ++ ++In this case there is one lookup in dnsbl.sorbs.net, and if none of the IP ++values matches (or if no record is found), this is the only lookup that is ++done. Only if there is a match is one of the more specific lists consulted. ++ ++ ++42.36 DNS lists and IPv6 ++------------------------ ++ ++If Exim is asked to do a dnslist lookup for an IPv6 address, it inverts it ++nibble by nibble. For example, if the calling host's IP address is ++3ffe:ffff:836f:0a00:000a:0800:200a:c031, Exim might look up ++ ++1.3.0.c.a.0.0.2.0.0.8.0.a.0.0.0.0.0.a.0.f.6.3.8. ++ f.f.f.f.e.f.f.3.blackholes.mail-abuse.org ++ ++(split over two lines here to fit on the page). Unfortunately, some of the DNS ++lists contain wildcard records, intended for IPv4, that interact badly with ++IPv6. For example, the DNS entry ++ ++*.3.some.list.example. A 127.0.0.1 ++ ++is probably intended to put the entire 3.0.0.0/8 IPv4 network on the list. ++Unfortunately, it also matches the entire 3::/4 IPv6 network. ++ ++You can exclude IPv6 addresses from DNS lookups by making use of a suitable ++condition condition, as in this example: ++ ++deny condition = ${if isip4{$sender_host_address}} ++ dnslists = some.list.example ++ ++ ++42.37 Rate limiting incoming messages ++------------------------------------- ++ ++The ratelimit ACL condition can be used to measure and control the rate at ++which clients can send email. This is more powerful than the smtp_ratelimit_* ++options, because those options control the rate of commands in a single SMTP ++session only, whereas the ratelimit condition works across all connections ++(concurrent and sequential) from the same client host. The syntax of the ++ratelimit condition is: ++ ++ratelimit = <m> / <p> / <options> / <key> ++ ++If the average client sending rate is less than m messages per time period p ++then the condition is false; otherwise it is true. ++ ++As a side-effect, the ratelimit condition sets the expansion variable ++$sender_rate to the client's computed rate, $sender_rate_limit to the ++configured value of m, and $sender_rate_period to the configured value of p. ++ ++The parameter p is the smoothing time constant, in the form of an Exim time ++interval, for example, "8h" for eight hours. A larger time constant means that ++it takes Exim longer to forget a client's past behaviour. The parameter m is ++the maximum number of messages that a client is permitted to send in each time ++interval. It also specifies the number of messages permitted in a fast burst. ++By increasing both m and p but keeping m/p constant, you can allow a client to ++send more messages in a burst without changing its long-term sending rate ++limit. Conversely, if m and p are both small, messages must be sent at an even ++rate. ++ ++There is a script in util/ratelimit.pl which extracts sending rates from log ++files, to assist with choosing appropriate settings for m and p when deploying ++the ratelimit ACL condition. The script prints usage instructions when it is ++run with no arguments. ++ ++The key is used to look up the data for calculating the client's average ++sending rate. This data is stored in Exim's spool directory, alongside the ++retry and other hints databases. The default key is $sender_host_address, which ++means Exim computes the sending rate of each client host IP address. By ++changing the key you can change how Exim identifies clients for the purpose of ++ratelimiting. For example, to limit the sending rate of each authenticated ++user, independent of the computer they are sending from, set the key to ++$authenticated_id. You must ensure that the lookup key is meaningful; for ++example, $authenticated_id is only meaningful if the client has authenticated ++(which you can check with the authenticated ACL condition). ++ ++The lookup key does not have to identify clients: If you want to limit the rate ++at which a recipient receives messages, you can use the key ++"$local_part@$domain" with the per_rcpt option (see below) in a RCPT ACL. ++ ++Each ratelimit condition can have up to four options. A per_* option specifies ++what Exim measures the rate of, for example messages or recipients or bytes. ++You can adjust the measurement using the unique= and/or count= options. You can ++also control when Exim updates the recorded rate using a strict, leaky, or ++readonly option. The options are separated by a slash, like the other ++parameters. They may appear in any order. ++ ++Internally, Exim appends the smoothing constant p onto the lookup key with any ++options that alter the meaning of the stored data. The limit m is not stored, ++so you can alter the configured maximum rate and Exim will still remember ++clients' past behaviour. If you change the per_* mode or add or remove the ++unique= option, the lookup key changes so Exim will forget past behaviour. The ++lookup key is not affected by changes to the update mode and the count= option. ++ ++ ++42.38 Ratelimit options for what is being measured ++-------------------------------------------------- ++ ++The per_conn option limits the client's connection rate. It is not normally ++used in the acl_not_smtp, acl_not_smtp_mime, or acl_not_smtp_start ACLs. ++ ++The per_mail option limits the client's rate of sending messages. This is the ++default if none of the per_* options is specified. It can be used in ++acl_smtp_mail, acl_smtp_rcpt, acl_smtp_predata, acl_smtp_mime, acl_smtp_data, ++or acl_not_smtp. ++ ++The per_byte option limits the sender's email bandwidth. It can be used in the ++same ACLs as the per_mail option, though it is best to use this option in the ++acl_smtp_mime, acl_smtp_data or acl_not_smtp ACLs; if it is used in an earlier ++ACL, Exim relies on the SIZE parameter given by the client in its MAIL command, ++which may be inaccurate or completely missing. You can follow the limit m in ++the configuration with K, M, or G to specify limits in kilobytes, megabytes, or ++gigabytes, respectively. ++ ++The per_rcpt option causes Exim to limit the rate at which recipients are ++accepted. It can be used in the acl_smtp_rcpt, acl_smtp_predata, acl_smtp_mime, ++acl_smtp_data, or acl_smtp_rcpt ACLs. In acl_smtp_rcpt the rate is updated one ++recipient at a time; in the other ACLs the rate is updated with the total ++recipient count in one go. Note that in either case the rate limiting engine ++will see a message with many recipients as a large high-speed burst. ++ ++The per_addr option is like the per_rcpt option, except it counts the number of ++different recipients that the client has sent messages to in the last time ++period. That is, if the client repeatedly sends messages to the same recipient, ++its measured rate is not increased. This option can only be used in ++acl_smtp_rcpt. ++ ++The per_cmd option causes Exim to recompute the rate every time the condition ++is processed. This can be used to limit the rate of any SMTP command. If it is ++used in multiple ACLs it can limit the aggregate rate of multiple different ++commands. ++ ++The count= option can be used to alter how much Exim adds to the client's ++measured rate. For example, the per_byte option is equivalent to "per_mail/ ++count=$message_size". If there is no count= option, Exim increases the measured ++rate by one (except for the per_rcpt option in ACLs other than acl_smtp_rcpt). ++The count does not have to be an integer. ++ ++The unique= option is described in section 42.41 below. ++ ++ ++42.39 Ratelimit update modes ++---------------------------- ++ ++You can specify one of three options with the ratelimit condition to control ++when its database is updated. This section describes the readonly mode, and the ++next section describes the strict and leaky modes. ++ ++If the ratelimit condition is used in readonly mode, Exim looks up a ++previously-computed rate to check against the limit. ++ ++For example, you can test the client's sending rate and deny it access (when it ++is too fast) in the connect ACL. If the client passes this check then it can go ++on to send a message, in which case its recorded rate will be updated in the ++MAIL ACL. Subsequent connections from the same client will check this new rate. ++ ++acl_check_connect: ++ deny ratelimit = 100 / 5m / readonly ++ log_message = RATE CHECK: $sender_rate/$sender_rate_period \ ++ (max $sender_rate_limit) ++# ... ++acl_check_mail: ++ warn ratelimit = 100 / 5m / strict ++ log_message = RATE UPDATE: $sender_rate/$sender_rate_period \ ++ (max $sender_rate_limit) ++ ++If Exim encounters multiple ratelimit conditions with the same key when ++processing a message then it may increase the client's measured rate more than ++it should. For example, this will happen if you check the per_rcpt option in ++both acl_smtp_rcpt and acl_smtp_data. However it's OK to check the same ++ratelimit condition multiple times in the same ACL. You can avoid any multiple ++update problems by using the readonly option on later ratelimit checks. ++ ++The per_* options described above do not make sense in some ACLs. If you use a ++per_* option in an ACL where it is not normally permitted then the update mode ++defaults to readonly and you cannot specify the strict or leaky modes. In other ++ACLs the default update mode is leaky (see the next section) so you must ++specify the readonly option explicitly. ++ ++ ++42.40 Ratelimit options for handling fast clients ++------------------------------------------------- ++ ++If a client's average rate is greater than the maximum, the rate limiting ++engine can react in two possible ways, depending on the presence of the strict ++or leaky update modes. This is independent of the other counter-measures (such ++as rejecting the message) that may be specified by the rest of the ACL. ++ ++The leaky (default) option means that the client's recorded rate is not updated ++if it is above the limit. The effect of this is that Exim measures the client's ++average rate of successfully sent email, which cannot be greater than the ++maximum allowed. If the client is over the limit it may suffer some ++counter-measures (as specified in the ACL), but it will still be able to send ++email at the configured maximum rate, whatever the rate of its attempts. This ++is generally the better choice if you have clients that retry automatically. ++For example, it does not prevent a sender with an over-aggressive retry rate ++from getting any email through. ++ ++The strict option means that the client's recorded rate is always updated. The ++effect of this is that Exim measures the client's average rate of attempts to ++send email, which can be much higher than the maximum it is actually allowed. ++If the client is over the limit it may be subjected to counter-measures by the ++ACL. It must slow down and allow sufficient time to pass that its computed rate ++falls below the maximum before it can send email again. The time (the number of ++smoothing periods) it must wait and not attempt to send mail can be calculated ++with this formula: ++ ++ ln(peakrate/maxrate) ++ ++ ++42.41 Limiting the rate of different events ++------------------------------------------- ++ ++The ratelimit unique= option controls a mechanism for counting the rate of ++different events. For example, the per_addr option uses this mechanism to count ++the number of different recipients that the client has sent messages to in the ++last time period; it is equivalent to "per_rcpt/unique=$local_part@$domain". ++You could use this feature to measure the rate that a client uses different ++sender addresses with the options "per_mail/unique=$sender_address". ++ ++For each ratelimit key Exim stores the set of unique= values that it has seen ++for that key. The whole set is thrown away when it is older than the rate ++smoothing period p, so each different event is counted at most once per period. ++In the leaky update mode, an event that causes the client to go over the limit ++is not added to the set, in the same way that the client's recorded rate is not ++updated in the same situation. ++ ++When you combine the unique= and readonly options, the specific unique= value ++is ignored, and Exim just retrieves the client's stored rate. ++ ++The unique= mechanism needs more space in the ratelimit database than the other ++ratelimit options in order to store the event set. The number of unique values ++is potentially as large as the rate limit, so the extra space required ++increases with larger limits. ++ ++The uniqueification is not perfect: there is a small probability that Exim will ++think a new event has happened before. If the sender's rate is less than the ++limit, Exim should be more than 99.9% correct. However in strict mode the ++measured rate can go above the limit, in which case Exim may under-count events ++by a significant margin. Fortunately, if the rate is high enough (2.7 times the ++limit) that the false positive rate goes above 9%, then Exim will throw away ++the over-full event set before the measured rate falls below the limit. ++Therefore the only harm should be that exceptionally high sending rates are ++logged incorrectly; any countermeasures you configure will be as effective as ++intended. ++ ++ ++42.42 Using rate limiting ++------------------------- ++ ++Exim's other ACL facilities are used to define what counter-measures are taken ++when the rate limit is exceeded. This might be anything from logging a warning ++(for example, while measuring existing sending rates in order to define ++policy), through time delays to slow down fast senders, up to rejecting the ++message. For example: ++ ++# Log all senders' rates ++warn ratelimit = 0 / 1h / strict ++ log_message = Sender rate $sender_rate / $sender_rate_period ++ ++# Slow down fast senders; note the need to truncate $sender_rate ++# at the decimal point. ++warn ratelimit = 100 / 1h / per_rcpt / strict ++ delay = ${eval: ${sg{$sender_rate}{[.].*}{}} - \ ++ $sender_rate_limit }s ++ ++# Keep authenticated users under control ++deny authenticated = * ++ ratelimit = 100 / 1d / strict / $authenticated_id ++ ++# System-wide rate limit ++defer message = Sorry, too busy. Try again later. ++ ratelimit = 10 / 1s / $primary_hostname ++ ++# Restrict incoming rate from each host, with a default ++# set using a macro and special cases looked up in a table. ++defer message = Sender rate exceeds $sender_rate_limit \ ++ messages per $sender_rate_period ++ ratelimit = ${lookup {$sender_host_address} \ ++ cdb {DB/ratelimits.cdb} \ ++ {$value} {RATELIMIT} } ++ ++Warning: If you have a busy server with a lot of ratelimit tests, especially ++with the per_rcpt option, you may suffer from a performance bottleneck caused ++by locking on the ratelimit hints database. Apart from making your ACLs less ++complicated, you can reduce the problem by using a RAM disk for Exim's hints ++directory (usually /var/spool/exim/db/). However this means that Exim will lose ++its hints data after a reboot (including retry hints, the callout cache, and ++ratelimit data). ++ ++ ++42.43 Address verification ++-------------------------- ++ ++Several of the verify conditions described in section 42.25 cause addresses to ++be verified. Section 42.47 discusses the reporting of sender verification ++failures. The verification conditions can be followed by options that modify ++the verification process. The options are separated from the keyword and from ++each other by slashes, and some of them contain parameters. For example: ++ ++verify = sender/callout ++verify = recipient/defer_ok/callout=10s,defer_ok ++ ++The first stage of address verification, which always happens, is to run the ++address through the routers, in "verify mode". Routers can detect the ++difference between verification and routing for delivery, and their actions can ++be varied by a number of generic options such as verify and verify_only (see ++chapter 15). If routing fails, verification fails. The available options are as ++follows: ++ ++ * If the callout option is specified, successful routing to one or more ++ remote hosts is followed by a "callout" to those hosts as an additional ++ check. Callouts and their sub-options are discussed in the next section. ++ ++ * If there is a defer error while doing verification routing, the ACL ++ normally returns "defer". However, if you include defer_ok in the options, ++ the condition is forced to be true instead. Note that this is a main ++ verification option as well as a suboption for callouts. ++ ++ * The no_details option is covered in section 42.47, which discusses the ++ reporting of sender address verification failures. ++ ++ * The success_on_redirect option causes verification always to succeed ++ immediately after a successful redirection. By default, if a redirection ++ generates just one address, that address is also verified. See further ++ discussion in section 42.48. ++ ++After an address verification failure, $acl_verify_message contains the error ++message that is associated with the failure. It can be preserved by coding like ++this: ++ ++warn !verify = sender ++ set acl_m0 = $acl_verify_message ++ ++If you are writing your own custom rejection message or log message when ++denying access, you can use this variable to include information about the ++verification failure. ++ ++In addition, $sender_verify_failure or $recipient_verify_failure (as ++appropriate) contains one of the following words: ++ ++ * qualify: The address was unqualified (no domain), and the message was ++ neither local nor came from an exempted host. ++ ++ * route: Routing failed. ++ ++ * mail: Routing succeeded, and a callout was attempted; rejection occurred at ++ or before the MAIL command (that is, on initial connection, HELO, or MAIL). ++ ++ * recipient: The RCPT command in a callout was rejected. ++ ++ * postmaster: The postmaster check in a callout was rejected. ++ ++The main use of these variables is expected to be to distinguish between ++rejections of MAIL and rejections of RCPT in callouts. ++ ++ ++42.44 Callout verification ++-------------------------- ++ ++For non-local addresses, routing verifies the domain, but is unable to do any ++checking of the local part. There are situations where some means of verifying ++the local part is desirable. One way this can be done is to make an SMTP ++callback to a delivery host for the sender address or a callforward to a ++subsequent host for a recipient address, to see if the host accepts the ++address. We use the term callout to cover both cases. Note that for a sender ++address, the callback is not to the client host that is trying to deliver the ++message, but to one of the hosts that accepts incoming mail for the sender's ++domain. ++ ++Exim does not do callouts by default. If you want them to happen, you must ++request them by setting appropriate options on the verify condition, as ++described below. This facility should be used with care, because it can add a ++lot of resource usage to the cost of verifying an address. However, Exim does ++cache the results of callouts, which helps to reduce the cost. Details of ++caching are in section 42.46. ++ ++Recipient callouts are usually used only between hosts that are controlled by ++the same administration. For example, a corporate gateway host could use ++callouts to check for valid recipients on an internal mailserver. A successful ++callout does not guarantee that a real delivery to the address would succeed; ++on the other hand, a failing callout does guarantee that a delivery would fail. ++ ++If the callout option is present on a condition that verifies an address, a ++second stage of verification occurs if the address is successfully routed to ++one or more remote hosts. The usual case is routing by a dnslookup or a ++manualroute router, where the router specifies the hosts. However, if a router ++that does not set up hosts routes to an smtp transport with a hosts setting, ++the transport's hosts are used. If an smtp transport has hosts_override set, ++its hosts are always used, whether or not the router supplies a host list. ++ ++The port that is used is taken from the transport, if it is specified and is a ++remote transport. (For routers that do verification only, no transport need be ++specified.) Otherwise, the default SMTP port is used. If a remote transport ++specifies an outgoing interface, this is used; otherwise the interface is not ++specified. Likewise, the text that is used for the HELO command is taken from ++the transport's helo_data option; if there is no transport, the value of ++$smtp_active_hostname is used. ++ ++For a sender callout check, Exim makes SMTP connections to the remote hosts, to ++test whether a bounce message could be delivered to the sender address. The ++following SMTP commands are sent: ++ ++HELO <local host name> ++MAIL FROM:<> ++RCPT TO:<the address to be tested> ++QUIT ++ ++LHLO is used instead of HELO if the transport's protocol option is set to ++"lmtp". ++ ++The callout may use EHLO, AUTH and/or STARTTLS given appropriate option ++settings. ++ ++A recipient callout check is similar. By default, it also uses an empty address ++for the sender. This default is chosen because most hosts do not make use of ++the sender address when verifying a recipient. Using the same address means ++that a single cache entry can be used for each recipient. Some sites, however, ++do make use of the sender address when verifying. These are catered for by the ++use_sender and use_postmaster options, described in the next section. ++ ++If the response to the RCPT command is a 2xx code, the verification succeeds. ++If it is 5xx, the verification fails. For any other condition, Exim tries the ++next host, if any. If there is a problem with all the remote hosts, the ACL ++yields "defer", unless the defer_ok parameter of the callout option is given, ++in which case the condition is forced to succeed. ++ ++A callout may take a little time. For this reason, Exim normally flushes SMTP ++output before performing a callout in an ACL, to avoid unexpected timeouts in ++clients when the SMTP PIPELINING extension is in use. The flushing can be ++disabled by using a control modifier to set no_callout_flush. ++ ++ ++42.45 Additional parameters for callouts ++---------------------------------------- ++ ++The callout option can be followed by an equals sign and a number of optional ++parameters, separated by commas. For example: ++ ++verify = recipient/callout=10s,defer_ok ++ ++The old syntax, which had callout_defer_ok and check_postmaster as separate ++verify options, is retained for backwards compatibility, but is now deprecated. ++The additional parameters for callout are as follows: ++ ++<a time interval> ++ ++ This specifies the timeout that applies for the callout attempt to each ++ host. For example: ++ ++ verify = sender/callout=5s ++ ++ The default is 30 seconds. The timeout is used for each response from the ++ remote host. It is also used for the initial connection, unless overridden ++ by the connect parameter. ++ ++connect = <time interval> ++ ++ This parameter makes it possible to set a different (usually smaller) ++ timeout for making the SMTP connection. For example: ++ ++ verify = sender/callout=5s,connect=1s ++ ++ If not specified, this timeout defaults to the general timeout value. ++ ++defer_ok ++ ++ When this parameter is present, failure to contact any host, or any other ++ kind of temporary error, is treated as success by the ACL. However, the ++ cache is not updated in this circumstance. ++ ++fullpostmaster ++ ++ This operates like the postmaster option (see below), but if the check for ++ postmaster@domain fails, it tries just postmaster, without a domain, in ++ accordance with the specification in RFC 2821. The RFC states that the ++ unqualified address postmaster should be accepted. ++ ++mailfrom = <email address> ++ ++ When verifying addresses in header lines using the header_sender ++ verification option, Exim behaves by default as if the addresses are ++ envelope sender addresses from a message. Callout verification therefore ++ tests to see whether a bounce message could be delivered, by using an empty ++ address in the MAIL command. However, it is arguable that these addresses ++ might never be used as envelope senders, and could therefore justifiably ++ reject bounce messages (empty senders). The mailfrom callout parameter ++ allows you to specify what address to use in the MAIL command. For example: ++ ++ require verify = header_sender/callout=mailfrom=abcd@x.y.z ++ ++ This parameter is available only for the header_sender verification option. ++ ++maxwait = <time interval> ++ ++ This parameter sets an overall timeout for performing a callout ++ verification. For example: ++ ++ verify = sender/callout=5s,maxwait=30s ++ ++ This timeout defaults to four times the callout timeout for individual SMTP ++ commands. The overall timeout applies when there is more than one host that ++ can be tried. The timeout is checked before trying the next host. This ++ prevents very long delays if there are a large number of hosts and all are ++ timing out (for example, when network connections are timing out). ++ ++no_cache ++ ++ When this parameter is given, the callout cache is neither read nor ++ updated. ++ ++postmaster ++ ++ When this parameter is set, a successful callout check is followed by a ++ similar check for the local part postmaster at the same domain. If this ++ address is rejected, the callout fails (but see fullpostmaster above). The ++ result of the postmaster check is recorded in a cache record; if it is a ++ failure, this is used to fail subsequent callouts for the domain without a ++ connection being made, until the cache record expires. ++ ++postmaster_mailfrom = <email address> ++ ++ The postmaster check uses an empty sender in the MAIL command by default. ++ You can use this parameter to do a postmaster check using a different ++ address. For example: ++ ++ require verify = sender/callout=postmaster_mailfrom=abc@x.y.z ++ ++ If both postmaster and postmaster_mailfrom are present, the rightmost one ++ overrides. The postmaster parameter is equivalent to this example: ++ ++ require verify = sender/callout=postmaster_mailfrom= ++ ++ Warning: The caching arrangements for postmaster checking do not take ++ account of the sender address. It is assumed that either the empty address ++ or a fixed non-empty address will be used. All that Exim remembers is that ++ the postmaster check for the domain succeeded or failed. ++ ++random ++ ++ When this parameter is set, before doing the normal callout check, Exim ++ does a check for a "random" local part at the same domain. The local part ++ is not really random - it is defined by the expansion of the option ++ callout_random_local_part, which defaults to ++ ++ $primary_hostname-$tod_epoch-testing ++ ++ The idea here is to try to determine whether the remote host accepts all ++ local parts without checking. If it does, there is no point in doing ++ callouts for specific local parts. If the "random" check succeeds, the ++ result is saved in a cache record, and used to force the current and ++ subsequent callout checks to succeed without a connection being made, until ++ the cache record expires. ++ ++use_postmaster ++ ++ This parameter applies to recipient callouts only. For example: ++ ++ deny !verify = recipient/callout=use_postmaster ++ ++ It causes a non-empty postmaster address to be used in the MAIL command ++ when performing the callout for the recipient, and also for a "random" ++ check if that is configured. The local part of the address is "postmaster" ++ and the domain is the contents of $qualify_domain. ++ ++use_sender ++ ++ This option applies to recipient callouts only. For example: ++ ++ require verify = recipient/callout=use_sender ++ ++ It causes the message's actual sender address to be used in the MAIL ++ command when performing the callout, instead of an empty address. There is ++ no need to use this option unless you know that the called hosts make use ++ of the sender when checking recipients. If used indiscriminately, it ++ reduces the usefulness of callout caching. ++ ++If you use any of the parameters that set a non-empty sender for the MAIL ++command (mailfrom, postmaster_mailfrom, use_postmaster, or use_sender), you ++should think about possible loops. Recipient checking is usually done between ++two hosts that are under the same management, and the host that receives the ++callouts is not normally configured to do callouts itself. Therefore, it is ++normally safe to use use_postmaster or use_sender in these circumstances. ++ ++However, if you use a non-empty sender address for a callout to an arbitrary ++host, there is the likelihood that the remote host will itself initiate a ++callout check back to your host. As it is checking what appears to be a message ++sender, it is likely to use an empty address in MAIL, thus avoiding a callout ++loop. However, to be on the safe side it would be best to set up your own ACLs ++so that they do not do sender verification checks when the recipient is the ++address you use for header sender or postmaster callout checking. ++ ++Another issue to think about when using non-empty senders for callouts is ++caching. When you set mailfrom or use_sender, the cache record is keyed by the ++sender/recipient combination; thus, for any given recipient, many more actual ++callouts are performed than when an empty sender or postmaster is used. ++ ++ ++42.46 Callout caching ++--------------------- ++ ++Exim caches the results of callouts in order to reduce the amount of resources ++used, unless you specify the no_cache parameter with the callout option. A ++hints database called "callout" is used for the cache. Two different record ++types are used: one records the result of a callout check for a specific ++address, and the other records information that applies to the entire domain ++(for example, that it accepts the local part postmaster). ++ ++When an original callout fails, a detailed SMTP error message is given about ++the failure. However, for subsequent failures use the cache data, this message ++is not available. ++ ++The expiry times for negative and positive address cache records are ++independent, and can be set by the global options callout_negative_expire ++(default 2h) and callout_positive_expire (default 24h), respectively. ++ ++If a host gives a negative response to an SMTP connection, or rejects any ++commands up to and including ++ ++MAIL FROM:<> ++ ++(but not including the MAIL command with a non-empty address), any callout ++attempt is bound to fail. Exim remembers such failures in a domain cache ++record, which it uses to fail callouts for the domain without making new ++connections, until the domain record times out. There are two separate expiry ++times for domain cache records: callout_domain_negative_expire (default 3h) and ++callout_domain_positive_expire (default 7d). ++ ++Domain records expire when the negative expiry time is reached if callouts ++cannot be made for the domain, or if the postmaster check failed. Otherwise, ++they expire when the positive expiry time is reached. This ensures that, for ++example, a host that stops accepting "random" local parts will eventually be ++noticed. ++ ++The callout caching mechanism is based on the domain of the address that is ++being tested. If the domain routes to several hosts, it is assumed that their ++behaviour will be the same. ++ ++ ++42.47 Sender address verification reporting ++------------------------------------------- ++ ++See section 42.43 for a general discussion of verification. When sender ++verification fails in an ACL, the details of the failure are given as ++additional output lines before the 550 response to the relevant SMTP command ++(RCPT or DATA). For example, if sender callout is in use, you might see: ++ ++MAIL FROM:<xyz@abc.example> ++250 OK ++RCPT TO:<pqr@def.example> ++550-Verification failed for <xyz@abc.example> ++550-Called: 192.168.34.43 ++550-Sent: RCPT TO:<xyz@abc.example> ++550-Response: 550 Unknown local part xyz in <xyz@abc.example> ++550 Sender verification failed ++ ++If more than one RCPT command fails in the same way, the details are given only ++for the first of them. However, some administrators do not want to send out ++this much information. You can suppress the details by adding "/no_details" to ++the ACL statement that requests sender verification. For example: ++ ++verify = sender/no_details ++ ++ ++42.48 Redirection while verifying ++--------------------------------- ++ ++A dilemma arises when a local address is redirected by aliasing or forwarding ++during verification: should the generated addresses themselves be verified, or ++should the successful expansion of the original address be enough to verify it? ++By default, Exim takes the following pragmatic approach: ++ ++ * When an incoming address is redirected to just one child address, ++ verification continues with the child address, and if that fails to verify, ++ the original verification also fails. ++ ++ * When an incoming address is redirected to more than one child address, ++ verification does not continue. A success result is returned. ++ ++This seems the most reasonable behaviour for the common use of aliasing as a ++way of redirecting different local parts to the same mailbox. It means, for ++example, that a pair of alias entries of the form ++ ++A.Wol: aw123 ++aw123: :fail: Gone away, no forwarding address ++ ++work as expected, with both local parts causing verification failure. When a ++redirection generates more than one address, the behaviour is more like a ++mailing list, where the existence of the alias itself is sufficient for ++verification to succeed. ++ ++It is possible, however, to change the default behaviour so that all successful ++redirections count as successful verifications, however many new addresses are ++generated. This is specified by the success_on_redirect verification option. ++For example: ++ ++require verify = recipient/success_on_redirect/callout=10s ++ ++In this example, verification succeeds if a router generates a new address, and ++the callout does not occur, because no address was routed to a remote host. ++ ++When verification is being tested via the -bv option, the treatment of ++redirections is as just described, unless the -v or any debugging option is ++also specified. In that case, full verification is done for every generated ++address and a report is output for each of them. ++ ++ ++42.49 Client SMTP authorization (CSA) ++------------------------------------- ++ ++Client SMTP Authorization is a system that allows a site to advertise which ++machines are and are not permitted to send email. This is done by placing ++special SRV records in the DNS; these are looked up using the client's HELO ++domain. At the time of writing, CSA is still an Internet Draft. Client SMTP ++Authorization checks in Exim are performed by the ACL condition: ++ ++verify = csa ++ ++This fails if the client is not authorized. If there is a DNS problem, or if no ++valid CSA SRV record is found, or if the client is authorized, the condition ++succeeds. These three cases can be distinguished using the expansion variable ++$csa_status, which can take one of the values "fail", "defer", "unknown", or ++"ok". The condition does not itself defer because that would be likely to cause ++problems for legitimate email. ++ ++The error messages produced by the CSA code include slightly more detail. If ++$csa_status is "defer", this may be because of problems looking up the CSA SRV ++record, or problems looking up the CSA target address record. There are four ++reasons for $csa_status being "fail": ++ ++ * The client's host name is explicitly not authorized. ++ ++ * The client's IP address does not match any of the CSA target IP addresses. ++ ++ * The client's host name is authorized but it has no valid target IP ++ addresses (for example, the target's addresses are IPv6 and the client is ++ using IPv4). ++ ++ * The client's host name has no CSA SRV record but a parent domain has ++ asserted that all subdomains must be explicitly authorized. ++ ++The csa verification condition can take an argument which is the domain to use ++for the DNS query. The default is: ++ ++verify = csa/$sender_helo_name ++ ++This implementation includes an extension to CSA. If the query domain is an ++address literal such as [192.0.2.95], or if it is a bare IP address, Exim ++searches for CSA SRV records in the reverse DNS as if the HELO domain was (for ++example) 95.2.0.192.in-addr.arpa. Therefore it is meaningful to say: ++ ++verify = csa/$sender_host_address ++ ++In fact, this is the check that Exim performs if the client does not say HELO. ++This extension can be turned off by setting the main configuration option ++dns_csa_use_reverse to be false. ++ ++If a CSA SRV record is not found for the domain itself, a search is performed ++through its parent domains for a record which might be making assertions about ++subdomains. The maximum depth of this search is limited using the main ++configuration option dns_csa_search_limit, which is 5 by default. Exim does not ++look for CSA SRV records in a top level domain, so the default settings handle ++HELO domains as long as seven (hostname.five.four.three.two.one.com). This ++encompasses the vast majority of legitimate HELO domains. ++ ++The dnsdb lookup also has support for CSA. Although dnsdb also supports direct ++SRV lookups, this is not sufficient because of the extra parent domain search ++behaviour of CSA, and (as with PTR lookups) dnsdb also turns IP addresses into ++lookups in the reverse DNS space. The result of a successful lookup such as: ++ ++${lookup dnsdb {csa=$sender_helo_name}} ++ ++has two space-separated fields: an authorization code and a target host name. ++The authorization code can be "Y" for yes, "N" for no, "X" for explicit ++authorization required but absent, or "?" for unknown. ++ ++ ++42.50 Bounce address tag validation ++----------------------------------- ++ ++Bounce address tag validation (BATV) is a scheme whereby the envelope senders ++of outgoing messages have a cryptographic, timestamped "tag" added to them. ++Genuine incoming bounce messages should therefore always be addressed to ++recipients that have a valid tag. This scheme is a way of detecting unwanted ++bounce messages caused by sender address forgeries (often called "collateral ++spam"), because the recipients of such messages do not include valid tags. ++ ++There are two expansion items to help with the implementation of the BATV ++"prvs" (private signature) scheme in an Exim configuration. This scheme signs ++the original envelope sender address by using a simple key to add a hash of the ++address and some time-based randomizing information. The prvs expansion item ++creates a signed address, and the prvscheck expansion item checks one. The ++syntax of these expansion items is described in section 11.5. ++ ++As an example, suppose the secret per-address keys are stored in an MySQL ++database. A query to look up the key for an address could be defined as a macro ++like this: ++ ++PRVSCHECK_SQL = ${lookup mysql{SELECT secret FROM batv_prvs \ ++ WHERE sender='${quote_mysql:$prvscheck_address}'\ ++ }{$value}} ++ ++Suppose also that the senders who make use of BATV are defined by an address ++list called batv_senders. Then, in the ACL for RCPT commands, you could use ++this: ++ ++# Bounces: drop unsigned addresses for BATV senders ++deny message = This address does not send an unsigned reverse path ++ senders = : ++ recipients = +batv_senders ++ ++# Bounces: In case of prvs-signed address, check signature. ++deny message = Invalid reverse path signature. ++ senders = : ++ condition = ${prvscheck {$local_part@$domain}\ ++ {PRVSCHECK_SQL}{1}} ++ !condition = $prvscheck_result ++ ++The first statement rejects recipients for bounce messages that are addressed ++to plain BATV sender addresses, because it is known that BATV senders do not ++send out messages with plain sender addresses. The second statement rejects ++recipients that are prvs-signed, but with invalid signatures (either because ++the key is wrong, or the signature has timed out). ++ ++A non-prvs-signed address is not rejected by the second statement, because the ++prvscheck expansion yields an empty string if its first argument is not a ++prvs-signed address, thus causing the condition condition to be false. If the ++first argument is a syntactically valid prvs-signed address, the yield is the ++third string (in this case "1"), whether or not the cryptographic and timeout ++checks succeed. The $prvscheck_result variable contains the result of the ++checks (empty for failure, "1" for success). ++ ++There is one more issue you must consider when implementing prvs-signing: you ++have to ensure that the routers accept prvs-signed addresses and deliver them ++correctly. The easiest way to handle this is to use a redirect router to remove ++the signature with a configuration along these lines: ++ ++batv_redirect: ++ driver = redirect ++ data = ${prvscheck {$local_part@$domain}{PRVSCHECK_SQL}} ++ ++This works because, if the third argument of prvscheck is empty, the result of ++the expansion of a prvs-signed address is the decoded value of the original ++address. This router should probably be the first of your routers that handles ++local addresses. ++ ++To create BATV-signed addresses in the first place, a transport of this form ++can be used: ++ ++external_smtp_batv: ++ driver = smtp ++ return_path = ${prvs {$return_path} \ ++ {${lookup mysql{SELECT \ ++ secret FROM batv_prvs WHERE \ ++ sender='${quote_mysql:$sender_address}'} \ ++ {$value}fail}}} ++ ++If no key can be found for the existing return path, no signing takes place. ++ ++ ++42.51 Using an ACL to control relaying ++-------------------------------------- ++ ++An MTA is said to relay a message if it receives it from some host and delivers ++it directly to another host as a result of a remote address contained within ++it. Redirecting a local address via an alias or forward file and then passing ++the message on to another host is not relaying, but a redirection as a result ++of the "percent hack" is. ++ ++Two kinds of relaying exist, which are termed "incoming" and "outgoing". A host ++which is acting as a gateway or an MX backup is concerned with incoming ++relaying from arbitrary hosts to a specific set of domains. On the other hand, ++a host which is acting as a smart host for a number of clients is concerned ++with outgoing relaying from those clients to the Internet at large. Often the ++same host is fulfilling both functions, but in principle these two kinds of ++relaying are entirely independent. What is not wanted is the transmission of ++mail from arbitrary remote hosts through your system to arbitrary domains. ++ ++You can implement relay control by means of suitable statements in the ACL that ++runs for each RCPT command. For convenience, it is often easiest to use Exim's ++named list facility to define the domains and hosts involved. For example, ++suppose you want to do the following: ++ ++ * Deliver a number of domains to mailboxes on the local host (or process them ++ locally in some other way). Let's say these are my.dom1.example and ++ my.dom2.example. ++ ++ * Relay mail for a number of other domains for which you are the secondary ++ MX. These might be friend1.example and friend2.example. ++ ++ * Relay mail from the hosts on your local LAN, to whatever domains are ++ involved. Suppose your LAN is 192.168.45.0/24. ++ ++In the main part of the configuration, you put the following definitions: ++ ++domainlist local_domains = my.dom1.example : my.dom2.example ++domainlist relay_to_domains = friend1.example : friend2.example ++hostlist relay_from_hosts = 192.168.45.0/24 ++ ++Now you can use these definitions in the ACL that is run for every RCPT ++command: ++ ++acl_check_rcpt: ++ accept domains = +local_domains : +relay_to_domains ++ accept hosts = +relay_from_hosts ++ ++The first statement accepts any RCPT command that contains an address in the ++local or relay domains. For any other domain, control passes to the second ++statement, which accepts the command only if it comes from one of the relay ++hosts. In practice, you will probably want to make your ACL more sophisticated ++than this, for example, by including sender and recipient verification. The ++default configuration includes a more comprehensive example, which is described ++in chapter 7. ++ ++ ++42.52 Checking a relay configuration ++------------------------------------ ++ ++You can check the relay characteristics of your configuration in the same way ++that you can test any ACL behaviour for an incoming SMTP connection, by using ++the -bh option to run a fake SMTP session with which you interact. ++ ++For specifically testing for unwanted relaying, the host ++relay-test.mail-abuse.org provides a useful service. If you telnet to this host ++from the host on which Exim is running, using the normal telnet port, you will ++see a normal telnet connection message and then quite a long delay. Be patient. ++The remote host is making an SMTP connection back to your host, and trying a ++number of common probes to test for open relay vulnerability. The results of ++the tests will eventually appear on your terminal. ++ ++ ++ ++=============================================================================== ++43. CONTENT SCANNING AT ACL TIME ++ ++The extension of Exim to include content scanning at ACL time, formerly known ++as "exiscan", was originally implemented as a patch by Tom Kistner. The code ++was integrated into the main source for Exim release 4.50, and Tom continues to ++maintain it. Most of the wording of this chapter is taken from Tom's ++specification. ++ ++It is also possible to scan the content of messages at other times. The ++local_scan() function (see chapter 44) allows for content scanning after all ++the ACLs have run. A transport filter can be used to scan messages at delivery ++time (see the transport_filter option, described in chapter 24). ++ ++If you want to include the ACL-time content-scanning features when you compile ++Exim, you need to arrange for WITH_CONTENT_SCAN to be defined in your Local/ ++Makefile. When you do that, the Exim binary is built with: ++ ++ * Two additional ACLs (acl_smtp_mime and acl_not_smtp_mime) that are run for ++ all MIME parts for SMTP and non-SMTP messages, respectively. ++ ++ * Additional ACL conditions and modifiers: decode, malware, mime_regex, regex ++ , and spam. These can be used in the ACL that is run at the end of message ++ reception (the acl_smtp_data ACL). ++ ++ * An additional control feature ("no_mbox_unspool") that saves spooled copies ++ of messages, or parts of messages, for debugging purposes. ++ ++ * Additional expansion variables that are set in the new ACL and by the new ++ conditions. ++ ++ * Two new main configuration options: av_scanner and spamd_address. ++ ++There is another content-scanning configuration option for Local/Makefile, ++called WITH_OLD_DEMIME. If this is set, the old, deprecated demime ACL ++condition is compiled, in addition to all the other content-scanning features. ++ ++Content-scanning is continually evolving, and new features are still being ++added. While such features are still unstable and liable to incompatible ++changes, they are made available in Exim by setting options whose names begin ++EXPERIMENTAL_ in Local/Makefile. Such features are not documented in this ++manual. You can find out about them by reading the file called doc/ ++experimental.txt. ++ ++All the content-scanning facilities work on a MBOX copy of the message that is ++temporarily created in a file called: ++ ++<spool_directory>/scan/<message_id>/<message_id>.eml ++ ++The .eml extension is a friendly hint to virus scanners that they can expect an ++MBOX-like structure inside that file. The file is created when the first ++content scanning facility is called. Subsequent calls to content scanning ++conditions open the same file again. The directory is recursively removed when ++the acl_smtp_data ACL has finished running, unless ++ ++control = no_mbox_unspool ++ ++has been encountered. When the MIME ACL decodes files, they are put into the ++same directory by default. ++ ++ ++43.1 Scanning for viruses ++------------------------- ++ ++The malware ACL condition lets you connect virus scanner software to Exim. It ++supports a "generic" interface to scanners called via the shell, and ++specialized interfaces for "daemon" type virus scanners, which are resident in ++memory and thus are much faster. ++ ++You can set the av_scanner option in first part of the Exim configuration file ++to specify which scanner to use, together with any additional options that are ++needed. The basic syntax is as follows: ++ ++av_scanner = <scanner-type>:<option1>:<option2>:[...] ++ ++If you do not set av_scanner, it defaults to ++ ++av_scanner = sophie:/var/run/sophie ++ ++If the value of av_scanner starts with a dollar character, it is expanded ++before use. The following scanner types are supported in this release: ++ ++aveserver ++ ++ This is the scanner daemon of Kaspersky Version 5. You can get a trial ++ version at http://www.kaspersky.com. This scanner type takes one option, ++ which is the path to the daemon's UNIX socket. The default is shown in this ++ example: ++ ++ av_scanner = aveserver:/var/run/aveserver ++ ++clamd ++ ++ This daemon-type scanner is GPL and free. You can get it at http:// ++ www.clamav.net/. Some older versions of clamd do not seem to unpack MIME ++ containers, so it used to be recommended to unpack MIME attachments in the ++ MIME ACL. This no longer believed to be necessary. One option is required: ++ either the path and name of a UNIX socket file, or a hostname or IP number, ++ and a port, separated by space, as in the second of these examples: ++ ++ av_scanner = clamd:/opt/clamd/socket ++ av_scanner = clamd:192.0.2.3 1234 ++ av_scanner = clamd:192.0.2.3 1234:local ++ ++ If the value of av_scanner points to a UNIX socket file or contains the ++ local keyword, then the ClamAV interface will pass a filename containing ++ the data to be scanned, which will should normally result in less I/O ++ happening and be more efficient. Normally in the TCP case, the data is ++ streamed to ClamAV as Exim does not assume that there is a common ++ filesystem with the remote host. There is an option WITH_OLD_CLAMAV_STREAM ++ in src/EDITME available, should you be running a version of ClamAV prior to ++ 0.95. If the option is unset, the default is /tmp/clamd. Thanks to David ++ Saez for contributing the code for this scanner. ++ ++cmdline ++ ++ This is the keyword for the generic command line scanner interface. It can ++ be used to attach virus scanners that are invoked from the shell. This ++ scanner type takes 3 mandatory options: ++ ++ 1. The full path and name of the scanner binary, with all command line ++ options, and a placeholder ("%s") for the directory to scan. ++ ++ 2. A regular expression to match against the STDOUT and STDERR output of ++ the virus scanner. If the expression matches, a virus was found. You ++ must make absolutely sure that this expression matches on "virus ++ found". This is called the "trigger" expression. ++ ++ 3. Another regular expression, containing exactly one pair of parentheses, ++ to match the name of the virus found in the scanners output. This is ++ called the "name" expression. ++ ++ For example, Sophos Sweep reports a virus on a line like this: ++ ++ Virus 'W32/Magistr-B' found in file ./those.bat ++ ++ For the trigger expression, we can match the phrase "found in file". For ++ the name expression, we want to extract the W32/Magistr-B string, so we can ++ match for the single quotes left and right of it. Altogether, this makes ++ the configuration setting: ++ ++ av_scanner = cmdline:\ ++ /path/to/sweep -ss -all -rec -archive %s:\ ++ found in file:'(.+)' ++ ++drweb ++ ++ The DrWeb daemon scanner (http://www.sald.com/) interface takes one ++ argument, either a full path to a UNIX socket, or an IP address and port ++ separated by white space, as in these examples: ++ ++ av_scanner = drweb:/var/run/drwebd.sock ++ av_scanner = drweb:192.168.2.20 31337 ++ ++ If you omit the argument, the default path /usr/local/drweb/run/drwebd.sock ++ is used. Thanks to Alex Miller for contributing the code for this scanner. ++ ++fsecure ++ ++ The F-Secure daemon scanner (http://www.f-secure.com) takes one argument ++ which is the path to a UNIX socket. For example: ++ ++ av_scanner = fsecure:/path/to/.fsav ++ ++ If no argument is given, the default is /var/run/.fsav. Thanks to Johan ++ Thelmen for contributing the code for this scanner. ++ ++kavdaemon ++ ++ This is the scanner daemon of Kaspersky Version 4. This version of the ++ Kaspersky scanner is outdated. Please upgrade (see aveserver above). This ++ scanner type takes one option, which is the path to the daemon's UNIX ++ socket. For example: ++ ++ av_scanner = kavdaemon:/opt/AVP/AvpCtl ++ ++ The default path is /var/run/AvpCtl. ++ ++mksd ++ ++ This is a daemon type scanner that is aimed mainly at Polish users, though ++ some parts of documentation are now available in English. You can get it at ++ http://linux.mks.com.pl/. The only option for this scanner type is the ++ maximum number of processes used simultaneously to scan the attachments, ++ provided that the demime facility is employed and also provided that mksd ++ has been run with at least the same number of child processes. For example: ++ ++ av_scanner = mksd:2 ++ ++ You can safely omit this option (the default value is 1). ++ ++sophie ++ ++ Sophie is a daemon that uses Sophos' libsavi library to scan for viruses. ++ You can get Sophie at http://www.clanfield.info/sophie/. The only option ++ for this scanner type is the path to the UNIX socket that Sophie uses for ++ client communication. For example: ++ ++ av_scanner = sophie:/tmp/sophie ++ ++ The default path is /var/run/sophie, so if you are using this, you can omit ++ the option. ++ ++When av_scanner is correctly set, you can use the malware condition in the DATA ++ACL. Note: You cannot use the malware condition in the MIME ACL. ++ ++The av_scanner option is expanded each time malware is called. This makes it ++possible to use different scanners. See further below for an example. The ++malware condition caches its results, so when you use it multiple times for the ++same message, the actual scanning process is only carried out once. However, ++using expandable items in av_scanner disables this caching, in which case each ++use of the malware condition causes a new scan of the message. ++ ++The malware condition takes a right-hand argument that is expanded before use. ++It can then be one of ++ ++ * "true", "*", or "1", in which case the message is scanned for viruses. The ++ condition succeeds if a virus was found, and fail otherwise. This is the ++ recommended usage. ++ ++ * "false" or "0" or an empty string, in which case no scanning is done and ++ the condition fails immediately. ++ ++ * A regular expression, in which case the message is scanned for viruses. The ++ condition succeeds if a virus is found and its name matches the regular ++ expression. This allows you to take special actions on certain types of ++ virus. ++ ++You can append "/defer_ok" to the malware condition to accept messages even if ++there is a problem with the virus scanner. Otherwise, such a problem causes the ++ACL to defer. ++ ++When a virus is found, the condition sets up an expansion variable called ++$malware_name that contains the name of the virus. You can use it in a message ++modifier that specifies the error returned to the sender, and/or in logging ++data. ++ ++If your virus scanner cannot unpack MIME and TNEF containers itself, you should ++use the demime condition (see section 43.6) before the malware condition. ++ ++Beware the interaction of Exim's message_size_limit with any size limits ++imposed by your anti-virus scanner. ++ ++Here is a very simple scanning example: ++ ++deny message = This message contains malware ($malware_name) ++ demime = * ++ malware = * ++ ++The next example accepts messages when there is a problem with the scanner: ++ ++deny message = This message contains malware ($malware_name) ++ demime = * ++ malware = */defer_ok ++ ++The next example shows how to use an ACL variable to scan with both sophie and ++aveserver. It assumes you have set: ++ ++av_scanner = $acl_m0 ++ ++in the main Exim configuration. ++ ++deny message = This message contains malware ($malware_name) ++ set acl_m0 = sophie ++ malware = * ++ ++deny message = This message contains malware ($malware_name) ++ set acl_m0 = aveserver ++ malware = * ++ ++ ++43.2 Scanning with SpamAssassin ++------------------------------- ++ ++The spam ACL condition calls SpamAssassin's spamd daemon to get a spam score ++and a report for the message. You can get SpamAssassin at http:// ++www.spamassassin.org, or, if you have a working Perl installation, you can use ++CPAN by running: ++ ++perl -MCPAN -e 'install Mail::SpamAssassin' ++ ++SpamAssassin has its own set of configuration files. Please review its ++documentation to see how you can tweak it. The default installation should work ++nicely, however. ++ ++After having installed and configured SpamAssassin, start the spamd daemon. By ++default, it listens on 127.0.0.1, TCP port 783. If you use another host or port ++for spamd, you must set the spamd_address option in the global part of the Exim ++configuration as follows (example): ++ ++spamd_address = 192.168.99.45 387 ++ ++You do not need to set this option if you use the default. As of version 2.60, ++spamd also supports communication over UNIX sockets. If you want to use these, ++supply spamd_address with an absolute file name instead of a address/port pair: ++ ++spamd_address = /var/run/spamd_socket ++ ++You can have multiple spamd servers to improve scalability. These can reside on ++other hardware reachable over the network. To specify multiple spamd servers, ++put multiple address/port pairs in the spamd_address option, separated with ++colons: ++ ++spamd_address = 192.168.2.10 783 : \ ++ 192.168.2.11 783 : \ ++ 192.168.2.12 783 ++ ++Up to 32 spamd servers are supported. The servers are queried in a random ++fashion. When a server fails to respond to the connection attempt, all other ++servers are tried until one succeeds. If no server responds, the spam condition ++defers. ++ ++Warning: It is not possible to use the UNIX socket connection method with ++multiple spamd servers. ++ ++The spamd_address variable is expanded before use if it starts with a dollar ++sign. In this case, the expansion may return a string that is used as the list ++so that multiple spamd servers can be the result of an expansion. ++ ++ ++43.3 Calling SpamAssassin from an Exim ACL ++------------------------------------------ ++ ++Here is a simple example of the use of the spam condition in a DATA ACL: ++ ++deny message = This message was classified as SPAM ++ spam = joe ++ ++The right-hand side of the spam condition specifies a name. This is relevant if ++you have set up multiple SpamAssassin profiles. If you do not want to scan ++using a specific profile, but rather use the SpamAssassin system-wide default ++profile, you can scan for an unknown name, or simply use "nobody". However, you ++must put something on the right-hand side. ++ ++The name allows you to use per-domain or per-user antispam profiles in ++principle, but this is not straightforward in practice, because a message may ++have multiple recipients, not necessarily all in the same domain. Because the ++spam condition has to be called from a DATA ACL in order to be able to read the ++contents of the message, the variables $local_part and $domain are not set. ++ ++The right-hand side of the spam condition is expanded before being used, so you ++can put lookups or conditions there. When the right-hand side evaluates to "0" ++or "false", no scanning is done and the condition fails immediately. ++ ++Scanning with SpamAssassin uses a lot of resources. If you scan every message, ++large ones may cause significant performance degradation. As most spam messages ++are quite small, it is recommended that you do not scan the big ones. For ++example: ++ ++deny message = This message was classified as SPAM ++ condition = ${if < {$message_size}{10K}} ++ spam = nobody ++ ++The spam condition returns true if the threshold specified in the user's ++SpamAssassin profile has been matched or exceeded. If you want to use the spam ++condition for its side effects (see the variables below), you can make it ++always return "true" by appending ":true" to the username. ++ ++When the spam condition is run, it sets up a number of expansion variables. ++These variables are saved with the received message, thus they are available ++for use at delivery time. ++ ++$spam_score ++ ++ The spam score of the message, for example "3.4" or "30.5". This is useful ++ for inclusion in log or reject messages. ++ ++$spam_score_int ++ ++ The spam score of the message, multiplied by ten, as an integer value. For ++ example "34" or "305". It may appear to disagree with $spam_score because ++ $spam_score is rounded and $spam_score_int is truncated. The integer value ++ is useful for numeric comparisons in conditions. ++ ++$spam_bar ++ ++ A string consisting of a number of "+" or "-" characters, representing the ++ integer part of the spam score value. A spam score of 4.4 would have a ++ $spam_bar value of "++++". This is useful for inclusion in warning headers, ++ since MUAs can match on such strings. ++ ++$spam_report ++ ++ A multiline text table, containing the full SpamAssassin report for the ++ message. Useful for inclusion in headers or reject messages. ++ ++The spam condition caches its results unless expansion in spamd_address was ++used. If you call it again with the same user name, it does not scan again, but ++rather returns the same values as before. ++ ++The spam condition returns DEFER if there is any error while running the ++message through SpamAssassin or if the expansion of spamd_address failed. If ++you want to treat DEFER as FAIL (to pass on to the next ACL statement block), ++append "/defer_ok" to the right-hand side of the spam condition, like this: ++ ++deny message = This message was classified as SPAM ++ spam = joe/defer_ok ++ ++This causes messages to be accepted even if there is a problem with spamd. ++ ++Here is a longer, commented example of the use of the spam condition: ++ ++# put headers in all messages (no matter if spam or not) ++warn spam = nobody:true ++ add_header = X-Spam-Score: $spam_score ($spam_bar) ++ add_header = X-Spam-Report: $spam_report ++ ++# add second subject line with *SPAM* marker when message ++# is over threshold ++warn spam = nobody ++ add_header = Subject: *SPAM* $h_Subject: ++ ++# reject spam at high scores (> 12) ++deny message = This message scored $spam_score spam points. ++ spam = nobody:true ++ condition = ${if >{$spam_score_int}{120}{1}{0}} ++ ++ ++43.4 Scanning MIME parts ++------------------------ ++ ++The acl_smtp_mime global option specifies an ACL that is called once for each ++MIME part of an SMTP message, including multipart types, in the sequence of ++their position in the message. Similarly, the acl_not_smtp_mime option ++specifies an ACL that is used for the MIME parts of non-SMTP messages. These ++options may both refer to the same ACL if you want the same processing in both ++cases. ++ ++These ACLs are called (possibly many times) just before the acl_smtp_data ACL ++in the case of an SMTP message, or just before the acl_not_smtp ACL in the case ++of a non-SMTP message. However, a MIME ACL is called only if the message ++contains a Content-Type: header line. When a call to a MIME ACL does not yield ++"accept", ACL processing is aborted and the appropriate result code is sent to ++the client. In the case of an SMTP message, the acl_smtp_data ACL is not called ++when this happens. ++ ++You cannot use the malware or spam conditions in a MIME ACL; these can only be ++used in the DATA or non-SMTP ACLs. However, you can use the regex condition to ++match against the raw MIME part. You can also use the mime_regex condition to ++match against the decoded MIME part (see section 43.5). ++ ++At the start of a MIME ACL, a number of variables are set from the header ++information for the relevant MIME part. These are described below. The contents ++of the MIME part are not by default decoded into a disk file except for MIME ++parts whose content-type is "message/rfc822". If you want to decode a MIME part ++into a disk file, you can use the decode condition. The general syntax is: ++ ++decode = [/<path>/]<filename> ++ ++The right hand side is expanded before use. After expansion, the value can be: ++ ++ 1. "0" or "false", in which case no decoding is done. ++ ++ 2. The string "default". In that case, the file is put in the temporary ++ "default" directory <spool_directory>/scan/<message_id>/ with a sequential ++ file name consisting of the message id and a sequence number. The full path ++ and name is available in $mime_decoded_filename after decoding. ++ ++ 3. A full path name starting with a slash. If the full name is an existing ++ directory, it is used as a replacement for the default directory. The ++ filename is then sequentially assigned. If the path does not exist, it is ++ used as the full path and file name. ++ ++ 4. If the string does not start with a slash, it is used as the filename, and ++ the default path is then used. ++ ++The decode condition normally succeeds. It is only false for syntax errors or ++unusual circumstances such as memory shortages. You can easily decode a file ++with its original, proposed filename using ++ ++decode = $mime_filename ++ ++However, you should keep in mind that $mime_filename might contain anything. If ++you place files outside of the default path, they are not automatically ++unlinked. ++ ++For RFC822 attachments (these are messages attached to messages, with a ++content-type of "message/rfc822"), the ACL is called again in the same manner ++as for the primary message, only that the $mime_is_rfc822 expansion variable is ++set (see below). Attached messages are always decoded to disk before being ++checked, and the files are unlinked once the check is done. ++ ++The MIME ACL supports the regex and mime_regex conditions. These can be used to ++match regular expressions against raw and decoded MIME parts, respectively. ++They are described in section 43.5. ++ ++The following list describes all expansion variables that are available in the ++MIME ACL: ++ ++$mime_boundary ++ ++ If the current part is a multipart (see $mime_is_multipart) below, it ++ should have a boundary string, which is stored in this variable. If the ++ current part has no boundary parameter in the Content-Type: header, this ++ variable contains the empty string. ++ ++$mime_charset ++ ++ This variable contains the character set identifier, if one was found in ++ the Content-Type: header. Examples for charset identifiers are: ++ ++ us-ascii ++ gb2312 (Chinese) ++ iso-8859-1 ++ ++ Please note that this value is not normalized, so you should do matches ++ case-insensitively. ++ ++$mime_content_description ++ ++ This variable contains the normalized content of the Content-Description: ++ header. It can contain a human-readable description of the parts content. ++ Some implementations repeat the filename for attachments here, but they are ++ usually only used for display purposes. ++ ++$mime_content_disposition ++ ++ This variable contains the normalized content of the Content-Disposition: ++ header. You can expect strings like "attachment" or "inline" here. ++ ++$mime_content_id ++ ++ This variable contains the normalized content of the Content-ID: header. ++ This is a unique ID that can be used to reference a part from another part. ++ ++$mime_content_size ++ ++ This variable is set only after the decode modifier (see above) has been ++ successfully run. It contains the size of the decoded part in kilobytes. ++ The size is always rounded up to full kilobytes, so only a completely empty ++ part has a $mime_content_size of zero. ++ ++$mime_content_transfer_encoding ++ ++ This variable contains the normalized content of the ++ Content-transfer-encoding: header. This is a symbolic name for an encoding ++ type. Typical values are "base64" and "quoted-printable". ++ ++$mime_content_type ++ ++ If the MIME part has a Content-Type: header, this variable contains its ++ value, lowercased, and without any options (like "name" or "charset"). Here ++ are some examples of popular MIME types, as they may appear in this ++ variable: ++ ++ text/plain ++ text/html ++ application/octet-stream ++ image/jpeg ++ audio/midi ++ ++ If the MIME part has no Content-Type: header, this variable contains the ++ empty string. ++ ++$mime_decoded_filename ++ ++ This variable is set only after the decode modifier (see above) has been ++ successfully run. It contains the full path and file name of the file ++ containing the decoded data. ++ ++$mime_filename ++ ++ This is perhaps the most important of the MIME variables. It contains a ++ proposed filename for an attachment, if one was found in either the ++ Content-Type: or Content-Disposition: headers. The filename will be RFC2047 ++ decoded, but no additional sanity checks are done. If no filename was ++ found, this variable contains the empty string. ++ ++$mime_is_coverletter ++ ++ This variable attempts to differentiate the "cover letter" of an e-mail ++ from attached data. It can be used to clamp down on flashy or unnecessarily ++ encoded content in the cover letter, while not restricting attachments at ++ all. ++ ++ The variable contains 1 (true) for a MIME part believed to be part of the ++ cover letter, and 0 (false) for an attachment. At present, the algorithm is ++ as follows: ++ ++ 1. The outermost MIME part of a message is always a cover letter. ++ ++ 2. If a multipart/alternative or multipart/related MIME part is a cover ++ letter, so are all MIME subparts within that multipart. ++ ++ 3. If any other multipart is a cover letter, the first subpart is a cover ++ letter, and the rest are attachments. ++ ++ 4. All parts contained within an attachment multipart are attachments. ++ ++ As an example, the following will ban "HTML mail" (including that sent with ++ alternative plain text), while allowing HTML files to be attached. HTML ++ coverletter mail attached to non-HMTL coverletter mail will also be ++ allowed: ++ ++ deny message = HTML mail is not accepted here ++ !condition = $mime_is_rfc822 ++ condition = $mime_is_coverletter ++ condition = ${if eq{$mime_content_type}{text/html}{1}{0}} ++ ++$mime_is_multipart ++ ++ This variable has the value 1 (true) when the current part has the main ++ type "multipart", for example "multipart/alternative" or "multipart/mixed". ++ Since multipart entities only serve as containers for other parts, you may ++ not want to carry out specific actions on them. ++ ++$mime_is_rfc822 ++ ++ This variable has the value 1 (true) if the current part is not a part of ++ the checked message itself, but part of an attached message. Attached ++ message decoding is fully recursive. ++ ++$mime_part_count ++ ++ This variable is a counter that is raised for each processed MIME part. It ++ starts at zero for the very first part (which is usually a multipart). The ++ counter is per-message, so it is reset when processing RFC822 attachments ++ (see $mime_is_rfc822). The counter stays set after acl_smtp_mime is ++ complete, so you can use it in the DATA ACL to determine the number of MIME ++ parts of a message. For non-MIME messages, this variable contains the value ++ -1. ++ ++ ++43.5 Scanning with regular expressions ++-------------------------------------- ++ ++You can specify your own custom regular expression matches on the full body of ++the message, or on individual MIME parts. ++ ++The regex condition takes one or more regular expressions as arguments and ++matches them against the full message (when called in the DATA ACL) or a raw ++MIME part (when called in the MIME ACL). The regex condition matches linewise, ++with a maximum line length of 32K characters. That means you cannot have ++multiline matches with the regex condition. ++ ++The mime_regex condition can be called only in the MIME ACL. It matches up to ++32K of decoded content (the whole content at once, not linewise). If the part ++has not been decoded with the decode modifier earlier in the ACL, it is decoded ++automatically when mime_regex is executed (using default path and filename ++values). If the decoded data is larger than 32K, only the first 32K characters ++are checked. ++ ++The regular expressions are passed as a colon-separated list. To include a ++literal colon, you must double it. Since the whole right-hand side string is ++expanded before being used, you must also escape dollar signs and backslashes ++with more backslashes, or use the "\N" facility to disable expansion. Here is a ++simple example that contains two regular expressions: ++ ++deny message = contains blacklisted regex ($regex_match_string) ++ regex = [Mm]ortgage : URGENT BUSINESS PROPOSAL ++ ++The conditions returns true if any one of the regular expressions matches. The ++$regex_match_string expansion variable is then set up and contains the matching ++regular expression. ++ ++Warning: With large messages, these conditions can be fairly CPU-intensive. ++ ++ ++43.6 The demime condition ++------------------------- ++ ++The demime ACL condition provides MIME unpacking, sanity checking and file ++extension blocking. It is usable only in the DATA and non-SMTP ACLs. The demime ++condition uses a simpler interface to MIME decoding than the MIME ACL ++functionality, but provides no additional facilities. Please note that this ++condition is deprecated and kept only for backward compatibility. You must set ++the WITH_OLD_DEMIME option in Local/Makefile at build time to be able to use ++the demime condition. ++ ++The demime condition unpacks MIME containers in the message. It detects errors ++in MIME containers and can match file extensions found in the message against a ++list. Using this facility produces files containing the unpacked MIME parts of ++the message in the temporary scan directory. If you do antivirus scanning, it ++is recommended that you use the demime condition before the antivirus (malware) ++condition. ++ ++On the right-hand side of the demime condition you can pass a colon-separated ++list of file extensions that it should match against. For example: ++ ++deny message = Found blacklisted file attachment ++ demime = vbs:com:bat:pif:prf:lnk ++ ++If one of the file extensions is found, the condition is true, otherwise it is ++false. If there is a temporary error while demimeing (for example, "disk ++full"), the condition defers, and the message is temporarily rejected (unless ++the condition is on a warn verb). ++ ++The right-hand side is expanded before being treated as a list, so you can have ++conditions and lookups there. If it expands to an empty string, "false", or ++zero ("0"), no demimeing is done and the condition is false. ++ ++The demime condition set the following variables: ++ ++$demime_errorlevel ++ ++ When an error is detected in a MIME container, this variable contains the ++ severity of the error, as an integer number. The higher the value, the more ++ severe the error (the current maximum value is 3). If this variable is ++ unset or zero, no error occurred. ++ ++$demime_reason ++ ++ When $demime_errorlevel is greater than zero, this variable contains a ++ human-readable text string describing the MIME error that occurred. ++ ++$found_extension ++ ++ When the demime condition is true, this variable contains the file ++ extension it found. ++ ++Both $demime_errorlevel and $demime_reason are set by the first call of the ++demime condition, and are not changed on subsequent calls. ++ ++If you do not want to check for file extensions, but rather use the demime ++condition for unpacking or error checking purposes, pass "*" as the right-hand ++side value. Here is a more elaborate example of how to use this facility: ++ ++# Reject messages with serious MIME container errors ++deny message = Found MIME error ($demime_reason). ++ demime = * ++ condition = ${if >{$demime_errorlevel}{2}{1}{0}} ++ ++# Reject known virus spreading file extensions. ++# Accepting these is pretty much braindead. ++deny message = contains $found_extension file (blacklisted). ++ demime = com:vbs:bat:pif:scr ++ ++# Freeze .exe and .doc files. Postmaster can ++# examine them and eventually thaw them. ++deny log_message = Another $found_extension file. ++ demime = exe:doc ++ control = freeze ++ ++ ++ ++=============================================================================== ++44. ADDING A LOCAL SCAN FUNCTION TO EXIM ++ ++In these days of email worms, viruses, and ever-increasing spam, some sites ++want to apply a lot of checking to messages before accepting them. ++ ++The content scanning extension (chapter 43) has facilities for passing messages ++to external virus and spam scanning software. You can also do a certain amount ++in Exim itself through string expansions and the condition condition in the ACL ++that runs after the SMTP DATA command or the ACL for non-SMTP messages (see ++chapter 42), but this has its limitations. ++ ++To allow for further customization to a site's own requirements, there is the ++possibility of linking Exim with a private message scanning function, written ++in C. If you want to run code that is written in something other than C, you ++can of course use a little C stub to call it. ++ ++The local scan function is run once for every incoming message, at the point ++when Exim is just about to accept the message. It can therefore be used to ++control non-SMTP messages from local processes as well as messages arriving via ++SMTP. ++ ++Exim applies a timeout to calls of the local scan function, and there is an ++option called local_scan_timeout for setting it. The default is 5 minutes. Zero ++means "no timeout". Exim also sets up signal handlers for SIGSEGV, SIGILL, ++SIGFPE, and SIGBUS before calling the local scan function, so that the most ++common types of crash are caught. If the timeout is exceeded or one of those ++signals is caught, the incoming message is rejected with a temporary error if ++it is an SMTP message. For a non-SMTP message, the message is dropped and Exim ++ends with a non-zero code. The incident is logged on the main and reject logs. ++ ++ ++44.1 Building Exim to use a local scan function ++----------------------------------------------- ++ ++To make use of the local scan function feature, you must tell Exim where your ++function is before building Exim, by setting LOCAL_SCAN_SOURCE in your Local/ ++Makefile. A recommended place to put it is in the Local directory, so you might ++set ++ ++LOCAL_SCAN_SOURCE=Local/local_scan.c ++ ++for example. The function must be called local_scan(). It is called by Exim ++after it has received a message, when the success return code is about to be ++sent. This is after all the ACLs have been run. The return code from your ++function controls whether the message is actually accepted or not. There is a ++commented template function (that just accepts the message) in the file _src/ ++local_scan.c_. ++ ++If you want to make use of Exim's run time configuration file to set options ++for your local_scan() function, you must also set ++ ++LOCAL_SCAN_HAS_OPTIONS=yes ++ ++in Local/Makefile (see section 44.3 below). ++ ++ ++44.2 API for local_scan() ++------------------------- ++ ++You must include this line near the start of your code: ++ ++#include "local_scan.h" ++ ++This header file defines a number of variables and other values, and the ++prototype for the function itself. Exim is coded to use unsigned char values ++almost exclusively, and one of the things this header defines is a shorthand ++for "unsigned char" called "uschar". It also contains the following macro ++definitions, to simplify casting character strings and pointers to character ++strings: ++ ++#define CS (char *) ++#define CCS (const char *) ++#define CSS (char **) ++#define US (unsigned char *) ++#define CUS (const unsigned char *) ++#define USS (unsigned char **) ++ ++The function prototype for local_scan() is: ++ ++extern int local_scan(int fd, uschar **return_text); ++ ++The arguments are as follows: ++ ++ * fd is a file descriptor for the file that contains the body of the message ++ (the -D file). The file is open for reading and writing, but updating it is ++ not recommended. Warning: You must not close this file descriptor. ++ ++ The descriptor is positioned at character 19 of the file, which is the ++ first character of the body itself, because the first 19 characters are the ++ message id followed by "-D" and a newline. If you rewind the file, you ++ should use the macro SPOOL_DATA_START_OFFSET to reset to the start of the ++ data, just in case this changes in some future version. ++ ++ * return_text is an address which you can use to return a pointer to a text ++ string at the end of the function. The value it points to on entry is NULL. ++ ++The function must return an int value which is one of the following macros: ++ ++"LOCAL_SCAN_ACCEPT" ++ ++ The message is accepted. If you pass back a string of text, it is saved ++ with the message, and made available in the variable $local_scan_data. No ++ newlines are permitted (if there are any, they are turned into spaces) and ++ the maximum length of text is 1000 characters. ++ ++"LOCAL_SCAN_ACCEPT_FREEZE" ++ ++ This behaves as LOCAL_SCAN_ACCEPT, except that the accepted message is ++ queued without immediate delivery, and is frozen. ++ ++"LOCAL_SCAN_ACCEPT_QUEUE" ++ ++ This behaves as LOCAL_SCAN_ACCEPT, except that the accepted message is ++ queued without immediate delivery. ++ ++"LOCAL_SCAN_REJECT" ++ ++ The message is rejected; the returned text is used as an error message ++ which is passed back to the sender and which is also logged. Newlines are ++ permitted - they cause a multiline response for SMTP rejections, but are ++ converted to "\n" in log lines. If no message is given, "Administrative ++ prohibition" is used. ++ ++"LOCAL_SCAN_TEMPREJECT" ++ ++ The message is temporarily rejected; the returned text is used as an error ++ message as for LOCAL_SCAN_REJECT. If no message is given, "Temporary local ++ problem" is used. ++ ++"LOCAL_SCAN_REJECT_NOLOGHDR" ++ ++ This behaves as LOCAL_SCAN_REJECT, except that the header of the rejected ++ message is not written to the reject log. It has the effect of unsetting ++ the rejected_header log selector for just this rejection. If ++ rejected_header is already unset (see the discussion of the log_selection ++ option in section 51.15), this code is the same as LOCAL_SCAN_REJECT. ++ ++"LOCAL_SCAN_TEMPREJECT_NOLOGHDR" ++ ++ This code is a variation of LOCAL_SCAN_TEMPREJECT in the same way that ++ LOCAL_SCAN_REJECT_NOLOGHDR is a variation of LOCAL_SCAN_REJECT. ++ ++If the message is not being received by interactive SMTP, rejections are ++reported by writing to stderr or by sending an email, as configured by the -oe ++command line options. ++ ++ ++44.3 Configuration options for local_scan() ++------------------------------------------- ++ ++It is possible to have option settings in the main configuration file that set ++values in static variables in the local_scan() module. If you want to do this, ++you must have the line ++ ++LOCAL_SCAN_HAS_OPTIONS=yes ++ ++in your Local/Makefile when you build Exim. (This line is in OS/ ++Makefile-Default, commented out). Then, in the local_scan() source file, you ++must define static variables to hold the option values, and a table to define ++them. ++ ++The table must be a vector called local_scan_options, of type "optionlist". ++Each entry is a triplet, consisting of a name, an option type, and a pointer to ++the variable that holds the value. The entries must appear in alphabetical ++order. Following local_scan_options you must also define a variable called ++local_scan_options_count that contains the number of entries in the table. Here ++is a short example, showing two kinds of option: ++ ++static int my_integer_option = 42; ++static uschar *my_string_option = US"a default string"; ++ ++optionlist local_scan_options[] = { ++ { "my_integer", opt_int, &my_integer_option }, ++ { "my_string", opt_stringptr, &my_string_option } ++}; ++ ++int local_scan_options_count = ++ sizeof(local_scan_options)/sizeof(optionlist); ++ ++The values of the variables can now be changed from Exim's runtime ++configuration file by including a local scan section as in this example: ++ ++begin local_scan ++my_integer = 99 ++my_string = some string of text... ++ ++The available types of option data are as follows: ++ ++opt_bool ++ ++ This specifies a boolean (true/false) option. The address should point to a ++ variable of type "BOOL", which will be set to TRUE or FALSE, which are ++ macros that are defined as "1" and "0", respectively. If you want to detect ++ whether such a variable has been set at all, you can initialize it to ++ TRUE_UNSET. (BOOL variables are integers underneath, so can hold more than ++ two values.) ++ ++opt_fixed ++ ++ This specifies a fixed point number, such as is used for load averages. The ++ address should point to a variable of type "int". The value is stored ++ multiplied by 1000, so, for example, 1.4142 is truncated and stored as ++ 1414. ++ ++opt_int ++ ++ This specifies an integer; the address should point to a variable of type ++ "int". The value may be specified in any of the integer formats accepted by ++ Exim. ++ ++opt_mkint ++ ++ This is the same as opt_int, except that when such a value is output in a ++ -bP listing, if it is an exact number of kilobytes or megabytes, it is ++ printed with the suffix K or M. ++ ++opt_octint ++ ++ This also specifies an integer, but the value is always interpreted as an ++ octal integer, whether or not it starts with the digit zero, and it is ++ always output in octal. ++ ++opt_stringptr ++ ++ This specifies a string value; the address must be a pointer to a variable ++ that points to a string (for example, of type "uschar *"). ++ ++opt_time ++ ++ This specifies a time interval value. The address must point to a variable ++ of type "int". The value that is placed there is a number of seconds. ++ ++If the -bP command line option is followed by "local_scan", Exim prints out the ++values of all the local_scan() options. ++ ++ ++44.4 Available Exim variables ++----------------------------- ++ ++The header local_scan.h gives you access to a number of C variables. These are ++the only ones that are guaranteed to be maintained from release to release. ++Note, however, that you can obtain the value of any Exim expansion variable, ++including $recipients, by calling expand_string(). The exported C variables are ++as follows: ++ ++int body_linecount ++ ++ This variable contains the number of lines in the message's body. ++ ++int body_zerocount ++ ++ This variable contains the number of binary zero bytes in the message's ++ body. ++ ++unsigned int debug_selector ++ ++ This variable is set to zero when no debugging is taking place. Otherwise, ++ it is a bitmap of debugging selectors. Two bits are identified for use in ++ local_scan(); they are defined as macros: ++ ++ + The "D_v" bit is set when -v was present on the command line. This is a ++ testing option that is not privileged - any caller may set it. All the ++ other selector bits can be set only by admin users. ++ ++ + The "D_local_scan" bit is provided for use by local_scan(); it is set ++ by the "+local_scan" debug selector. It is not included in the default ++ set of debugging bits. ++ ++ Thus, to write to the debugging output only when "+local_scan" has been ++ selected, you should use code like this: ++ ++ if ((debug_selector & D_local_scan) != 0) ++ debug_printf("xxx", ...); ++ ++uschar *expand_string_message ++ ++ After a failing call to expand_string() (returned value NULL), the variable ++ expand_string_message contains the error message, zero-terminated. ++ ++header_line *header_list ++ ++ A pointer to a chain of header lines. The header_line structure is ++ discussed below. ++ ++header_line *header_last ++ ++ A pointer to the last of the header lines. ++ ++uschar *headers_charset ++ ++ The value of the headers_charset configuration option. ++ ++BOOL host_checking ++ ++ This variable is TRUE during a host checking session that is initiated by ++ the -bh command line option. ++ ++uschar *interface_address ++ ++ The IP address of the interface that received the message, as a string. ++ This is NULL for locally submitted messages. ++ ++int interface_port ++ ++ The port on which this message was received. When testing with the -bh ++ command line option, the value of this variable is -1 unless a port has ++ been specified via the -oMi option. ++ ++uschar *message_id ++ ++ This variable contains Exim's message id for the incoming message (the ++ value of $message_exim_id) as a zero-terminated string. ++ ++uschar *received_protocol ++ ++ The name of the protocol by which the message was received. ++ ++int recipients_count ++ ++ The number of accepted recipients. ++ ++recipient_item *recipients_list ++ ++ The list of accepted recipients, held in a vector of length ++ recipients_count. The recipient_item structure is discussed below. You can ++ add additional recipients by calling receive_add_recipient() (see below). ++ You can delete recipients by removing them from the vector and adjusting ++ the value in recipients_count. In particular, by setting recipients_count ++ to zero you remove all recipients. If you then return the value ++ "LOCAL_SCAN_ACCEPT", the message is accepted, but immediately blackholed. ++ To replace the recipients, you can set recipients_count to zero and then ++ call receive_add_recipient() as often as needed. ++ ++uschar *sender_address ++ ++ The envelope sender address. For bounce messages this is the empty string. ++ ++uschar *sender_host_address ++ ++ The IP address of the sending host, as a string. This is NULL for ++ locally-submitted messages. ++ ++uschar *sender_host_authenticated ++ ++ The name of the authentication mechanism that was used, or NULL if the ++ message was not received over an authenticated SMTP connection. ++ ++uschar *sender_host_name ++ ++ The name of the sending host, if known. ++ ++int sender_host_port ++ ++ The port on the sending host. ++ ++BOOL smtp_input ++ ++ This variable is TRUE for all SMTP input, including BSMTP. ++ ++BOOL smtp_batched_input ++ ++ This variable is TRUE for BSMTP input. ++ ++int store_pool ++ ++ The contents of this variable control which pool of memory is used for new ++ requests. See section 44.8 for details. ++ ++ ++44.5 Structure of header lines ++------------------------------ ++ ++The header_line structure contains the members listed below. You can add ++additional header lines by calling the header_add() function (see below). You ++can cause header lines to be ignored (deleted) by setting their type to *. ++ ++struct header_line *next ++ ++ A pointer to the next header line, or NULL for the last line. ++ ++int type ++ ++ A code identifying certain headers that Exim recognizes. The codes are ++ printing characters, and are documented in chapter 55 of this manual. ++ Notice in particular that any header line whose type is * is not ++ transmitted with the message. This flagging is used for header lines that ++ have been rewritten, or are to be removed (for example, Envelope-sender: ++ header lines.) Effectively, * means "deleted". ++ ++int slen ++ ++ The number of characters in the header line, including the terminating and ++ any internal newlines. ++ ++uschar *text ++ ++ A pointer to the text of the header. It always ends with a newline, ++ followed by a zero byte. Internal newlines are preserved. ++ ++ ++44.6 Structure of recipient items ++--------------------------------- ++ ++The recipient_item structure contains these members: ++ ++uschar *address ++ ++ This is a pointer to the recipient address as it was received. ++ ++int pno ++ ++ This is used in later Exim processing when top level addresses are created ++ by the one_time option. It is not relevant at the time local_scan() is run ++ and must always contain -1 at this stage. ++ ++uschar *errors_to ++ ++ If this value is not NULL, bounce messages caused by failing to deliver to ++ the recipient are sent to the address it contains. In other words, it ++ overrides the envelope sender for this one recipient. (Compare the ++ errors_to generic router option.) If a local_scan() function sets an ++ errors_to field to an unqualified address, Exim qualifies it using the ++ domain from qualify_recipient. When local_scan() is called, the errors_to ++ field is NULL for all recipients. ++ ++ ++44.7 Available Exim functions ++----------------------------- ++ ++The header local_scan.h gives you access to a number of Exim functions. These ++are the only ones that are guaranteed to be maintained from release to release: ++ ++pid_t child_open ++ (uschar **argv, uschar **envp, int newumask, int *infdptr, int *outfdptr, ++ BOOL make_leader) ++ ++ This function creates a child process that runs the command specified by ++ argv. The environment for the process is specified by envp, which can be ++ NULL if no environment variables are to be passed. A new umask is supplied ++ for the process in newumask. ++ ++ Pipes to the standard input and output of the new process are set up and ++ returned to the caller via the infdptr and outfdptr arguments. The standard ++ error is cloned to the standard output. If there are any file descriptors ++ "in the way" in the new process, they are closed. If the final argument is ++ TRUE, the new process is made into a process group leader. ++ ++ The function returns the pid of the new process, or -1 if things go wrong. ++ ++int child_close(pid_t pid, int timeout) ++ ++ This function waits for a child process to terminate, or for a timeout (in ++ seconds) to expire. A timeout value of zero means wait as long as it takes. ++ The return value is as follows: ++ ++ + >= 0 ++ ++ The process terminated by a normal exit and the value is the process ++ ending status. ++ ++ + < 0 and > -256 ++ ++ The process was terminated by a signal and the value is the negation of ++ the signal number. ++ ++ + -256 ++ ++ The process timed out. ++ ++ + -257 ++ ++ The was some other error in wait(); errno is still set. ++ ++pid_t child_open_exim(int *fd) ++ ++ This function provide you with a means of submitting a new message to Exim. ++ (Of course, you can also call /usr/sbin/sendmail yourself if you want, but ++ this packages it all up for you.) The function creates a pipe, forks a ++ subprocess that is running ++ ++ exim -t -oem -oi -f <> ++ ++ and returns to you (via the "int *" argument) a file descriptor for the ++ pipe that is connected to the standard input. The yield of the function is ++ the PID of the subprocess. You can then write a message to the file ++ descriptor, with recipients in To:, Cc:, and/or Bcc: header lines. ++ ++ When you have finished, call child_close() to wait for the process to ++ finish and to collect its ending status. A timeout value of zero is usually ++ fine in this circumstance. Unless you have made a mistake with the ++ recipient addresses, you should get a return code of zero. ++ ++pid_t child_open_exim2(int *fd, uschar *sender, uschar *sender_authentication) ++ ++ This function is a more sophisticated version of child_open(). The command ++ that it runs is: ++ ++ exim -t -oem -oi -f sender -oMas sender_authentication ++ ++ The third argument may be NULL, in which case the -oMas option is omitted. ++ ++void debug_printf(char *, ...) ++ ++ This is Exim's debugging function, with arguments as for (printf(). The ++ output is written to the standard error stream. If no debugging is ++ selected, calls to debug_printf() have no effect. Normally, you should make ++ calls conditional on the "local_scan" debug selector by coding like this: ++ ++ if ((debug_selector & D_local_scan) != 0) ++ debug_printf("xxx", ...); ++ ++uschar *expand_string(uschar *string) ++ ++ This is an interface to Exim's string expansion code. The return value is ++ the expanded string, or NULL if there was an expansion failure. The C ++ variable expand_string_message contains an error message after an expansion ++ failure. If expansion does not change the string, the return value is the ++ pointer to the input string. Otherwise, the return value points to a new ++ block of memory that was obtained by a call to store_get(). See section ++ 44.8 below for a discussion of memory handling. ++ ++void header_add(int type, char *format, ...) ++ ++ This function allows you to an add additional header line at the end of the ++ existing ones. The first argument is the type, and should normally be a ++ space character. The second argument is a format string and any number of ++ substitution arguments as for sprintf(). You may include internal newlines ++ if you want, and you must ensure that the string ends with a newline. ++ ++void header_add_at_position ++ (BOOL after, uschar *name, BOOL topnot, int type, char *format, ...) ++ ++ This function adds a new header line at a specified point in the header ++ chain. The header itself is specified as for header_add(). ++ ++ If name is NULL, the new header is added at the end of the chain if after ++ is true, or at the start if after is false. If name is not NULL, the header ++ lines are searched for the first non-deleted header that matches the name. ++ If one is found, the new header is added before it if after is false. If ++ after is true, the new header is added after the found header and any ++ adjacent subsequent ones with the same name (even if marked "deleted"). If ++ no matching non-deleted header is found, the topnot option controls where ++ the header is added. If it is true, addition is at the top; otherwise at ++ the bottom. Thus, to add a header after all the Received: headers, or at ++ the top if there are no Received: headers, you could use ++ ++ header_add_at_position(TRUE, US"Received", TRUE, ++ ' ', "X-xxx: ..."); ++ ++ Normally, there is always at least one non-deleted Received: header, but ++ there may not be if received_header_text expands to an empty string. ++ ++void header_remove(int occurrence, uschar *name) ++ ++ This function removes header lines. If occurrence is zero or negative, all ++ occurrences of the header are removed. If occurrence is greater than zero, ++ that particular instance of the header is removed. If no header(s) can be ++ found that match the specification, the function does nothing. ++ ++BOOL header_testname(header_line *hdr, uschar *name, int length, BOOL notdel) ++ ++ This function tests whether the given header has the given name. It is not ++ just a string comparison, because white space is permitted between the name ++ and the colon. If the notdel argument is true, a false return is forced for ++ all "deleted" headers; otherwise they are not treated specially. For ++ example: ++ ++ if (header_testname(h, US"X-Spam", 6, TRUE)) ... ++ ++uschar *lss_b64encode(uschar *cleartext, int length) ++ ++ This function base64-encodes a string, which is passed by address and ++ length. The text may contain bytes of any value, including zero. The result ++ is passed back in dynamic memory that is obtained by calling store_get(). ++ It is zero-terminated. ++ ++int lss_b64decode(uschar *codetext, uschar **cleartext) ++ ++ This function decodes a base64-encoded string. Its arguments are a ++ zero-terminated base64-encoded string and the address of a variable that is ++ set to point to the result, which is in dynamic memory. The length of the ++ decoded string is the yield of the function. If the input is invalid base64 ++ data, the yield is -1. A zero byte is added to the end of the output string ++ to make it easy to interpret as a C string (assuming it contains no zeros ++ of its own). The added zero byte is not included in the returned count. ++ ++int lss_match_domain(uschar *domain, uschar *list) ++ ++ This function checks for a match in a domain list. Domains are always ++ matched caselessly. The return value is one of the following: ++ ++ OK match succeeded ++ FAIL match failed ++ DEFER match deferred ++ ++ DEFER is usually caused by some kind of lookup defer, such as the inability ++ to contact a database. ++ ++int lss_match_local_part(uschar *localpart, uschar *list, BOOL caseless) ++ ++ This function checks for a match in a local part list. The third argument ++ controls case-sensitivity. The return values are as for lss_match_domain(). ++ ++int lss_match_address(uschar *address, uschar *list, BOOL caseless) ++ ++ This function checks for a match in an address list. The third argument ++ controls the case-sensitivity of the local part match. The domain is always ++ matched caselessly. The return values are as for lss_match_domain(). ++ ++int lss_match_host(uschar *host_name, uschar *host_address, uschar *list) ++ ++ This function checks for a match in a host list. The most common usage is ++ expected to be ++ ++ lss_match_host(sender_host_name, sender_host_address, ...) ++ ++ An empty address field matches an empty item in the host list. If the host ++ name is NULL, the name corresponding to $sender_host_address is ++ automatically looked up if a host name is required to match an item in the ++ list. The return values are as for lss_match_domain(), but in addition, ++ lss_match_host() returns ERROR in the case when it had to look up a host ++ name, but the lookup failed. ++ ++void log_write(unsigned int selector, int which, char *format, ...) ++ ++ This function writes to Exim's log files. The first argument should be zero ++ (it is concerned with log_selector). The second argument can be "LOG_MAIN" ++ or "LOG_REJECT" or "LOG_PANIC" or the inclusive "or" of any combination of ++ them. It specifies to which log or logs the message is written. The ++ remaining arguments are a format and relevant insertion arguments. The ++ string should not contain any newlines, not even at the end. ++ ++void receive_add_recipient(uschar *address, int pno) ++ ++ This function adds an additional recipient to the message. The first ++ argument is the recipient address. If it is unqualified (has no domain), it ++ is qualified with the qualify_recipient domain. The second argument must ++ always be -1. ++ ++ This function does not allow you to specify a private errors_to address (as ++ described with the structure of recipient_item above), because it pre-dates ++ the addition of that field to the structure. However, it is easy to add ++ such a value afterwards. For example: ++ ++ receive_add_recipient(US"monitor@mydom.example", -1); ++ recipients_list[recipients_count-1].errors_to = ++ US"postmaster@mydom.example"; ++ ++BOOL receive_remove_recipient(uschar *recipient) ++ ++ This is a convenience function to remove a named recipient from the list of ++ recipients. It returns true if a recipient was removed, and false if no ++ matching recipient could be found. The argument must be a complete email ++ address. ++ ++uschar rfc2047_decode ++ (uschar *string, BOOL lencheck, uschar *target, int zeroval, int *lenptr, ++ uschar **error) ++ ++ This function decodes strings that are encoded according to RFC 2047. ++ Typically these are the contents of header lines. First, each "encoded ++ word" is decoded from the Q or B encoding into a byte-string. Then, if ++ provided with the name of a charset encoding, and if the iconv() function ++ is available, an attempt is made to translate the result to the named ++ character set. If this fails, the binary string is returned with an error ++ message. ++ ++ The first argument is the string to be decoded. If lencheck is TRUE, the ++ maximum MIME word length is enforced. The third argument is the target ++ encoding, or NULL if no translation is wanted. ++ ++ If a binary zero is encountered in the decoded string, it is replaced by ++ the contents of the zeroval argument. For use with Exim headers, the value ++ must not be 0 because header lines are handled as zero-terminated strings. ++ ++ The function returns the result of processing the string, zero-terminated; ++ if lenptr is not NULL, the length of the result is set in the variable to ++ which it points. When zeroval is 0, lenptr should not be NULL. ++ ++ If an error is encountered, the function returns NULL and uses the error ++ argument to return an error message. The variable pointed to by error is ++ set to NULL if there is no error; it may be set non-NULL even when the ++ function returns a non-NULL value if decoding was successful, but there was ++ a problem with translation. ++ ++int smtp_fflush(void) ++ ++ This function is used in conjunction with smtp_printf(), as described ++ below. ++ ++void smtp_printf(char *, ...) ++ ++ The arguments of this function are like printf(); it writes to the SMTP ++ output stream. You should use this function only when there is an SMTP ++ output stream, that is, when the incoming message is being received via ++ interactive SMTP. This is the case when smtp_input is TRUE and ++ smtp_batched_input is FALSE. If you want to test for an incoming message ++ from another host (as opposed to a local process that used the -bs command ++ line option), you can test the value of sender_host_address, which is ++ non-NULL when a remote host is involved. ++ ++ If an SMTP TLS connection is established, smtp_printf() uses the TLS output ++ function, so it can be used for all forms of SMTP connection. ++ ++ Strings that are written by smtp_printf() from within local_scan() must ++ start with an appropriate response code: 550 if you are going to return ++ LOCAL_SCAN_REJECT, 451 if you are going to return LOCAL_SCAN_TEMPREJECT, ++ and 250 otherwise. Because you are writing the initial lines of a ++ multi-line response, the code must be followed by a hyphen to indicate that ++ the line is not the final response line. You must also ensure that the ++ lines you write terminate with CRLF. For example: ++ ++ smtp_printf("550-this is some extra info\r\n"); ++ return LOCAL_SCAN_REJECT; ++ ++ Note that you can also create multi-line responses by including newlines in ++ the data returned via the return_text argument. The added value of using ++ smtp_printf() is that, for instance, you could introduce delays between ++ multiple output lines. ++ ++ The smtp_printf() function does not return any error indication, because it ++ does not automatically flush pending output, and therefore does not test ++ the state of the stream. (In the main code of Exim, flushing and error ++ detection is done when Exim is ready for the next SMTP input command.) If ++ you want to flush the output and check for an error (for example, the ++ dropping of a TCP/IP connection), you can call smtp_fflush(), which has no ++ arguments. It flushes the output stream, and returns a non-zero value if ++ there is an error. ++ ++void *store_get(int) ++ ++ This function accesses Exim's internal store (memory) manager. It gets a ++ new chunk of memory whose size is given by the argument. Exim bombs out if ++ it ever runs out of memory. See the next section for a discussion of memory ++ handling. ++ ++void *store_get_perm(int) ++ ++ This function is like store_get(), but it always gets memory from the ++ permanent pool. See the next section for a discussion of memory handling. ++ ++uschar *string_copy(uschar *string) ++ ++ See below. ++ ++uschar *string_copyn(uschar *string, int length) ++ ++ See below. ++ ++uschar *string_sprintf(char *format, ...) ++ ++ These three functions create strings using Exim's dynamic memory ++ facilities. The first makes a copy of an entire string. The second copies ++ up to a maximum number of characters, indicated by the second argument. The ++ third uses a format and insertion arguments to create a new string. In each ++ case, the result is a pointer to a new string in the current memory pool. ++ See the next section for more discussion. ++ ++ ++44.8 More about Exim's memory handling ++-------------------------------------- ++ ++No function is provided for freeing memory, because that is never needed. The ++dynamic memory that Exim uses when receiving a message is automatically ++recycled if another message is received by the same process (this applies only ++to incoming SMTP connections - other input methods can supply only one message ++at a time). After receiving the last message, a reception process terminates. ++ ++Because it is recycled, the normal dynamic memory cannot be used for holding ++data that must be preserved over a number of incoming messages on the same SMTP ++connection. However, Exim in fact uses two pools of dynamic memory; the second ++one is not recycled, and can be used for this purpose. ++ ++If you want to allocate memory that remains available for subsequent messages ++in the same SMTP connection, you should set ++ ++store_pool = POOL_PERM ++ ++before calling the function that does the allocation. There is no need to ++restore the value if you do not need to; however, if you do want to revert to ++the normal pool, you can either restore the previous value of store_pool or set ++it explicitly to POOL_MAIN. ++ ++The pool setting applies to all functions that get dynamic memory, including ++expand_string(), store_get(), and the string_xxx() functions. There is also a ++convenience function called store_get_perm() that gets a block of memory from ++the permanent pool while preserving the value of store_pool. ++ ++ ++ ++=============================================================================== ++45. SYSTEM-WIDE MESSAGE FILTERING ++ ++The previous chapters (on ACLs and the local scan function) describe checks ++that can be applied to messages before they are accepted by a host. There is ++also a mechanism for checking messages once they have been received, but before ++they are delivered. This is called the system filter. ++ ++The system filter operates in a similar manner to users' filter files, but it ++is run just once per message (however many recipients the message has). It ++should not normally be used as a substitute for routing, because deliver ++commands in a system router provide new envelope recipient addresses. The ++system filter must be an Exim filter. It cannot be a Sieve filter. ++ ++The system filter is run at the start of a delivery attempt, before any routing ++is done. If a message fails to be completely delivered at the first attempt, ++the system filter is run again at the start of every retry. If you want your ++filter to do something only once per message, you can make use of the ++first_delivery condition in an if command in the filter to prevent it happening ++on retries. ++ ++Warning: Because the system filter runs just once, variables that are specific ++to individual recipient addresses, such as $local_part and $domain, are not ++set, and the "personal" condition is not meaningful. If you want to run a ++centrally-specified filter for each recipient address independently, you can do ++so by setting up a suitable redirect router, as described in section 45.8 ++below. ++ ++ ++45.1 Specifying a system filter ++------------------------------- ++ ++The name of the file that contains the system filter must be specified by ++setting system_filter. If you want the filter to run under a uid and gid other ++than root, you must also set system_filter_user and system_filter_group as ++appropriate. For example: ++ ++system_filter = /etc/mail/exim.filter ++system_filter_user = exim ++ ++If a system filter generates any deliveries directly to files or pipes (via the ++save or pipe commands), transports to handle these deliveries must be specified ++by setting system_filter_file_transport and system_filter_pipe_transport, ++respectively. Similarly, system_filter_reply_transport must be set to handle ++any messages generated by the reply command. ++ ++ ++45.2 Testing a system filter ++---------------------------- ++ ++You can run simple tests of a system filter in the same way as for a user ++filter, but you should use -bF rather than -bf, so that features that are ++permitted only in system filters are recognized. ++ ++If you want to test the combined effect of a system filter and a user filter, ++you can use both -bF and -bf on the same command line. ++ ++ ++45.3 Contents of a system filter ++-------------------------------- ++ ++The language used to specify system filters is the same as for users' filter ++files. It is described in the separate end-user document Exim's interface to ++mail filtering. However, there are some additional features that are available ++only in system filters; these are described in subsequent sections. If they are ++encountered in a user's filter file or when testing with -bf, they cause ++errors. ++ ++There are two special conditions which, though available in users' filter ++files, are designed for use in system filters. The condition first_delivery is ++true only for the first attempt at delivering a message, and manually_thawed is ++true only if the message has been frozen, and subsequently thawed by an admin ++user. An explicit forced delivery counts as a manual thaw, but thawing as a ++result of the auto_thaw setting does not. ++ ++Warning: If a system filter uses the first_delivery condition to specify an ++"unseen" (non-significant) delivery, and that delivery does not succeed, it ++will not be tried again. If you want Exim to retry an unseen delivery until it ++succeeds, you should arrange to set it up every time the filter runs. ++ ++When a system filter finishes running, the values of the variables $n0 - $n9 ++are copied into $sn0 - $sn9 and are thereby made available to users' filter ++files. Thus a system filter can, for example, set up "scores" to which users' ++filter files can refer. ++ ++ ++45.4 Additional variable for system filters ++------------------------------------------- ++ ++The expansion variable $recipients, containing a list of all the recipients of ++the message (separated by commas and white space), is available in system ++filters. It is not available in users' filters for privacy reasons. ++ ++ ++45.5 Defer, freeze, and fail commands for system filters ++-------------------------------------------------------- ++ ++There are three extra commands (defer, freeze and fail) which are always ++available in system filters, but are not normally enabled in users' filters. ++(See the allow_defer, allow_freeze and allow_fail options for the redirect ++router.) These commands can optionally be followed by the word text and a ++string containing an error message, for example: ++ ++fail text "this message looks like spam to me" ++ ++The keyword text is optional if the next character is a double quote. ++ ++The defer command defers delivery of the original recipients of the message. ++The fail command causes all the original recipients to be failed, and a bounce ++message to be created. The freeze command suspends all delivery attempts for ++the original recipients. In all cases, any new deliveries that are specified by ++the filter are attempted as normal after the filter has run. ++ ++The freeze command is ignored if the message has been manually unfrozen and not ++manually frozen since. This means that automatic freezing by a system filter ++can be used as a way of checking out suspicious messages. If a message is found ++to be all right, manually unfreezing it allows it to be delivered. ++ ++The text given with a fail command is used as part of the bounce message as ++well as being written to the log. If the message is quite long, this can fill ++up a lot of log space when such failures are common. To reduce the size of the ++log message, Exim interprets the text in a special way if it starts with the ++two characters "<<" and contains ">>" later. The text between these two strings ++is written to the log, and the rest of the text is used in the bounce message. ++For example: ++ ++fail "<<filter test 1>>Your message is rejected \ ++ because it contains attachments that we are \ ++ not prepared to receive." ++ ++Take great care with the fail command when basing the decision to fail on the ++contents of the message, because the bounce message will of course include the ++contents of the original message and will therefore trigger the fail command ++again (causing a mail loop) unless steps are taken to prevent this. Testing the ++error_message condition is one way to prevent this. You could use, for example ++ ++if $message_body contains "this is spam" and not error_message ++then fail text "spam is not wanted here" endif ++ ++though of course that might let through unwanted bounce messages. The ++alternative is clever checking of the body and/or headers to detect bounces ++generated by the filter. ++ ++The interpretation of a system filter file ceases after a defer, freeze, or ++fail command is obeyed. However, any deliveries that were set up earlier in the ++filter file are honoured, so you can use a sequence such as ++ ++mail ... ++freeze ++ ++to send a specified message when the system filter is freezing (or deferring or ++failing) a message. The normal deliveries for the message do not, of course, ++take place. ++ ++ ++45.6 Adding and removing headers in a system filter ++--------------------------------------------------- ++ ++Two filter commands that are available only in system filters are: ++ ++headers add <string> ++headers remove <string> ++ ++The argument for the headers add is a string that is expanded and then added to ++the end of the message's headers. It is the responsibility of the filter ++maintainer to make sure it conforms to RFC 2822 syntax. Leading white space is ++ignored, and if the string is otherwise empty, or if the expansion is forced to ++fail, the command has no effect. ++ ++You can use "\n" within the string, followed by white space, to specify ++continued header lines. More than one header may be added in one command by ++including "\n" within the string without any following white space. For ++example: ++ ++headers add "X-header-1: ....\n \ ++ continuation of X-header-1 ...\n\ ++ X-header-2: ...." ++ ++Note that the header line continuation white space after the first newline must ++be placed before the backslash that continues the input string, because white ++space after input continuations is ignored. ++ ++The argument for headers remove is a colon-separated list of header names. This ++command applies only to those headers that are stored with the message; those ++that are added at delivery time (such as Envelope-To: and Return-Path:) cannot ++be removed by this means. If there is more than one header with the same name, ++they are all removed. ++ ++The headers command in a system filter makes an immediate change to the set of ++header lines that was received with the message (with possible additions from ++ACL processing). Subsequent commands in the system filter operate on the ++modified set, which also forms the basis for subsequent message delivery. ++Unless further modified during routing or transporting, this set of headers is ++used for all recipients of the message. ++ ++During routing and transporting, the variables that refer to the contents of ++header lines refer only to those lines that are in this set. Thus, header lines ++that are added by a system filter are visible to users' filter files and to all ++routers and transports. This contrasts with the manipulation of header lines by ++routers and transports, which is not immediate, but which instead is saved up ++until the message is actually being written (see section 46.17). ++ ++If the message is not delivered at the first attempt, header lines that were ++added by the system filter are stored with the message, and so are still ++present at the next delivery attempt. Header lines that were removed are still ++present, but marked "deleted" so that they are not transported with the ++message. For this reason, it is usual to make the headers command conditional ++on first_delivery so that the set of header lines is not modified more than ++once. ++ ++Because header modification in a system filter acts immediately, you have to ++use an indirect approach if you want to modify the contents of a header line. ++For example: ++ ++headers add "Old-Subject: $h_subject:" ++headers remove "Subject" ++headers add "Subject: new subject (was: $h_old-subject:)" ++headers remove "Old-Subject" ++ ++ ++45.7 Setting an errors address in a system filter ++------------------------------------------------- ++ ++In a system filter, if a deliver command is followed by ++ ++errors_to <some address> ++ ++in order to change the envelope sender (and hence the error reporting) for that ++delivery, any address may be specified. (In a user filter, only the current ++user's address can be set.) For example, if some mail is being monitored, you ++might use ++ ++unseen deliver monitor@spying.example errors_to root@local.example ++ ++to take a copy which would not be sent back to the normal error reporting ++address if its delivery failed. ++ ++ ++45.8 Per-address filtering ++-------------------------- ++ ++In contrast to the system filter, which is run just once per message for each ++delivery attempt, it is also possible to set up a system-wide filtering ++operation that runs once for each recipient address. In this case, variables ++such as $local_part and $domain can be used, and indeed, the choice of filter ++file could be made dependent on them. This is an example of a router which ++implements such a filter: ++ ++central_filter: ++ check_local_user ++ driver = redirect ++ domains = +local_domains ++ file = /central/filters/$local_part ++ no_verify ++ allow_filter ++ allow_freeze ++ ++The filter is run in a separate process under its own uid. Therefore, either ++check_local_user must be set (as above), in which case the filter is run as the ++local user, or the user option must be used to specify which user to use. If ++both are set, user overrides. ++ ++Care should be taken to ensure that none of the commands in the filter file ++specify a significant delivery if the message is to go on to be delivered to ++its intended recipient. The router will not then claim to have dealt with the ++address, so it will be passed on to subsequent routers to be delivered in the ++normal way. ++ ++ ++ ++=============================================================================== ++46. MESSAGE PROCESSING ++ ++Exim performs various transformations on the sender and recipient addresses of ++all messages that it handles, and also on the messages' header lines. Some of ++these are optional and configurable, while others always take place. All of ++this processing, except rewriting as a result of routing, and the addition or ++removal of header lines while delivering, happens when a message is received, ++before it is placed on Exim's queue. ++ ++Some of the automatic processing takes place by default only for ++"locally-originated" messages. This adjective is used to describe messages that ++are not received over TCP/IP, but instead are passed to an Exim process on its ++standard input. This includes the interactive "local SMTP" case that is set up ++by the -bs command line option. ++ ++Note: Messages received over TCP/IP on the loopback interface (127.0.0.1 or ++::1) are not considered to be locally-originated. Exim does not treat the ++loopback interface specially in any way. ++ ++If you want the loopback interface to be treated specially, you must ensure ++that there are appropriate entries in your ACLs. ++ ++ ++46.1 Submission mode for non-local messages ++------------------------------------------- ++ ++Processing that happens automatically for locally-originated messages (unless ++suppress_local_fixups is set) can also be requested for messages that are ++received over TCP/IP. The term "submission mode" is used to describe this ++state. Submission mode is set by the modifier ++ ++control = submission ++ ++in a MAIL, RCPT, or pre-data ACL for an incoming message (see sections 42.20 ++and 42.21). This makes Exim treat the message as a local submission, and is ++normally used when the source of the message is known to be an MUA running on a ++client host (as opposed to an MTA). For example, to set submission mode for ++messages originating on the IPv4 loopback interface, you could include the ++following in the MAIL ACL: ++ ++warn hosts = 127.0.0.1 ++ control = submission ++ ++There are some options that can be used when setting submission mode. A slash ++is used to separate options. For example: ++ ++control = submission/sender_retain ++ ++Specifying sender_retain has the effect of setting local_sender_retain true and ++local_from_check false for the current incoming message. The first of these ++allows an existing Sender: header in the message to remain, and the second ++suppresses the check to ensure that From: matches the authenticated sender. ++With this setting, Exim still fixes up messages by adding Date: and Message-ID: ++header lines if they are missing, but makes no attempt to check sender ++authenticity in header lines. ++ ++When sender_retain is not set, a submission mode setting may specify a domain ++to be used when generating a From: or Sender: header line. For example: ++ ++control = submission/domain=some.domain ++ ++The domain may be empty. How this value is used is described in sections 46.11 ++and 46.16. There is also a name option that allows you to specify the user's ++full name for inclusion in a created Sender: or From: header line. For example: ++ ++accept authenticated = * ++ control = submission/domain=wonderland.example/\ ++ name=${lookup {$authenticated_id} \ ++ lsearch {/etc/exim/namelist}} ++ ++Because the name may contain any characters, including slashes, the name option ++must be given last. The remainder of the string is used as the name. For the ++example above, if /etc/exim/namelist contains: ++ ++bigegg: Humpty Dumpty ++ ++then when the sender has authenticated as bigegg, the generated Sender: line ++would be: ++ ++Sender: Humpty Dumpty <bigegg@wonderland.example> ++ ++By default, submission mode forces the return path to the same address as is ++used to create the Sender: header. However, if sender_retain is specified, the ++return path is also left unchanged. ++ ++Note: The changes caused by submission mode take effect after the predata ACL. ++This means that any sender checks performed before the fix-ups use the ++untrusted sender address specified by the user, not the trusted sender address ++specified by submission mode. Although this might be slightly unexpected, it ++does mean that you can configure ACL checks to spot that a user is trying to ++spoof another's address. ++ ++ ++46.2 Line endings ++----------------- ++ ++RFC 2821 specifies that CRLF (two characters: carriage-return, followed by ++linefeed) is the line ending for messages transmitted over the Internet using ++SMTP over TCP/IP. However, within individual operating systems, different ++conventions are used. For example, Unix-like systems use just LF, but others ++use CRLF or just CR. ++ ++Exim was designed for Unix-like systems, and internally, it stores messages ++using the system's convention of a single LF as a line terminator. When ++receiving a message, all line endings are translated to this standard format. ++Originally, it was thought that programs that passed messages directly to an ++MTA within an operating system would use that system's convention. Experience ++has shown that this is not the case; for example, there are Unix applications ++that use CRLF in this circumstance. For this reason, and for compatibility with ++other MTAs, the way Exim handles line endings for all messages is now as ++follows: ++ ++ * LF not preceded by CR is treated as a line ending. ++ ++ * CR is treated as a line ending; if it is immediately followed by LF, the LF ++ is ignored. ++ ++ * The sequence "CR, dot, CR" does not terminate an incoming SMTP message, nor ++ a local message in the state where a line containing only a dot is a ++ terminator. ++ ++ * If a bare CR is encountered within a header line, an extra space is added ++ after the line terminator so as not to end the header line. The reasoning ++ behind this is that bare CRs in header lines are most likely either to be ++ mistakes, or people trying to play silly games. ++ ++ * If the first header line received in a message ends with CRLF, a subsequent ++ bare LF in a header line is treated in the same way as a bare CR in a ++ header line. ++ ++ ++46.3 Unqualified addresses ++-------------------------- ++ ++By default, Exim expects every envelope address it receives from an external ++host to be fully qualified. Unqualified addresses cause negative responses to ++SMTP commands. However, because SMTP is used as a means of transporting ++messages from MUAs running on personal workstations, there is sometimes a ++requirement to accept unqualified addresses from specific hosts or IP networks. ++ ++Exim has two options that separately control which hosts may send unqualified ++sender or recipient addresses in SMTP commands, namely sender_unqualified_hosts ++and recipient_unqualified_hosts. In both cases, if an unqualified address is ++accepted, it is qualified by adding the value of qualify_domain or ++qualify_recipient, as appropriate. ++ ++Unqualified addresses in header lines are automatically qualified for messages ++that are locally originated, unless the -bnq option is given on the command ++line. For messages received over SMTP, unqualified addresses in header lines ++are qualified only if unqualified addresses are permitted in SMTP commands. In ++other words, such qualification is also controlled by sender_unqualified_hosts ++and recipient_unqualified_hosts, ++ ++ ++46.4 The UUCP From line ++----------------------- ++ ++Messages that have come from UUCP (and some other applications) often begin ++with a line containing the envelope sender and a timestamp, following the word ++"From". Examples of two common formats are: ++ ++From a.oakley@berlin.mus Fri Jan 5 12:35 GMT 1996 ++From f.butler@berlin.mus Fri, 7 Jan 97 14:00:00 GMT ++ ++This line precedes the RFC 2822 header lines. For compatibility with Sendmail, ++Exim recognizes such lines at the start of messages that are submitted to it ++via the command line (that is, on the standard input). It does not recognize ++such lines in incoming SMTP messages, unless the sending host matches ++ignore_fromline_hosts or the -bs option was used for a local message and ++ignore_fromline_local is set. The recognition is controlled by a regular ++expression that is defined by the uucp_from_pattern option, whose default value ++matches the two common cases shown above and puts the address that follows ++"From" into $1. ++ ++When the caller of Exim for a non-SMTP message that contains a "From" line is a ++trusted user, the message's sender address is constructed by expanding the ++contents of uucp_sender_address, whose default value is "$1". This is then ++parsed as an RFC 2822 address. If there is no domain, the local part is ++qualified with qualify_domain unless it is the empty string. However, if the ++command line -f option is used, it overrides the "From" line. ++ ++If the caller of Exim is not trusted, the "From" line is recognized, but the ++sender address is not changed. This is also the case for incoming SMTP messages ++that are permitted to contain "From" lines. ++ ++Only one "From" line is recognized. If there is more than one, the second is ++treated as a data line that starts the body of the message, as it is not valid ++as a header line. This also happens if a "From" line is present in an incoming ++SMTP message from a source that is not permitted to send them. ++ ++ ++46.5 Resent- header lines ++------------------------- ++ ++RFC 2822 makes provision for sets of header lines starting with the string ++"Resent-" to be added to a message when it is resent by the original recipient ++to somebody else. These headers are Resent-Date:, Resent-From:, Resent-Sender:, ++Resent-To:, Resent-Cc:, Resent-Bcc: and Resent-Message-ID:. The RFC says: ++ ++ Resent fields are strictly informational. They MUST NOT be used in the ++ normal processing of replies or other such automatic actions on messages. ++ ++This leaves things a bit vague as far as other processing actions such as ++address rewriting are concerned. Exim treats Resent- header lines as follows: ++ ++ * A Resent-From: line that just contains the login id of the submitting user ++ is automatically rewritten in the same way as From: (see below). ++ ++ * If there's a rewriting rule for a particular header line, it is also ++ applied to Resent- header lines of the same type. For example, a rule that ++ rewrites From: also rewrites Resent-From:. ++ ++ * For local messages, if Sender: is removed on input, Resent-Sender: is also ++ removed. ++ ++ * For a locally-submitted message, if there are any Resent- header lines but ++ no Resent-Date:, Resent-From:, or Resent-Message-Id:, they are added as ++ necessary. It is the contents of Resent-Message-Id: (rather than ++ Message-Id:) which are included in log lines in this case. ++ ++ * The logic for adding Sender: is duplicated for Resent-Sender: when any ++ Resent- header lines are present. ++ ++ ++46.6 The Auto-Submitted: header line ++------------------------------------ ++ ++Whenever Exim generates an autoreply, a bounce, or a delay warning message, it ++includes the header line: ++ ++Auto-Submitted: auto-replied ++ ++ ++46.7 The Bcc: header line ++------------------------- ++ ++If Exim is called with the -t option, to take recipient addresses from a ++message's header, it removes any Bcc: header line that may exist (after ++extracting its addresses). If -t is not present on the command line, any ++existing Bcc: is not removed. ++ ++ ++46.8 The Date: header line ++-------------------------- ++ ++If a locally-generated or submission-mode message has no Date: header line, ++Exim adds one, using the current date and time, unless the ++suppress_local_fixups control has been specified. ++ ++ ++46.9 The Delivery-date: header line ++----------------------------------- ++ ++Delivery-date: header lines are not part of the standard RFC 2822 header set. ++Exim can be configured to add them to the final delivery of messages. (See the ++generic delivery_date_add transport option.) They should not be present in ++messages in transit. If the delivery_date_remove configuration option is set ++(the default), Exim removes Delivery-date: header lines from incoming messages. ++ ++ ++46.10 The Envelope-to: header line ++---------------------------------- ++ ++Envelope-to: header lines are not part of the standard RFC 2822 header set. ++Exim can be configured to add them to the final delivery of messages. (See the ++generic envelope_to_add transport option.) They should not be present in ++messages in transit. If the envelope_to_remove configuration option is set (the ++default), Exim removes Envelope-to: header lines from incoming messages. ++ ++ ++46.11 The From: header line ++--------------------------- ++ ++If a submission-mode message does not contain a From: header line, Exim adds ++one if either of the following conditions is true: ++ ++ * The envelope sender address is not empty (that is, this is not a bounce ++ message). The added header line copies the envelope sender address. ++ ++ * The SMTP session is authenticated and $authenticated_id is not empty. ++ ++ 1. If no domain is specified by the submission control, the local part is ++ $authenticated_id and the domain is $qualify_domain. ++ ++ 2. If a non-empty domain is specified by the submission control, the local ++ part is $authenticated_id, and the domain is the specified domain. ++ ++ 3. If an empty domain is specified by the submission control, ++ $authenticated_id is assumed to be the complete address. ++ ++A non-empty envelope sender takes precedence. ++ ++If a locally-generated incoming message does not contain a From: header line, ++and the suppress_local_fixups control is not set, Exim adds one containing the ++sender's address. The calling user's login name and full name are used to ++construct the address, as described in section 46.18. They are obtained from ++the password data by calling getpwuid() (but see the unknown_login ++configuration option). The address is qualified with qualify_domain. ++ ++For compatibility with Sendmail, if an incoming, non-SMTP message has a From: ++header line containing just the unqualified login name of the calling user, ++this is replaced by an address containing the user's login name and full name ++as described in section 46.18. ++ ++ ++46.12 The Message-ID: header line ++--------------------------------- ++ ++If a locally-generated or submission-mode incoming message does not contain a ++Message-ID: or Resent-Message-ID: header line, and the suppress_local_fixups ++control is not set, Exim adds a suitable header line to the message. If there ++are any Resent-: headers in the message, it creates Resent-Message-ID:. The id ++is constructed from Exim's internal message id, preceded by the letter E to ++ensure it starts with a letter, and followed by @ and the primary host name. ++Additional information can be included in this header line by setting the ++message_id_header_text and/or message_id_header_domain options. ++ ++ ++46.13 The Received: header line ++------------------------------- ++ ++A Received: header line is added at the start of every message. The contents ++are defined by the received_header_text configuration option, and Exim ++automatically adds a semicolon and a timestamp to the configured string. ++ ++The Received: header is generated as soon as the message's header lines have ++been received. At this stage, the timestamp in the Received: header line is the ++time that the message started to be received. This is the value that is seen by ++the DATA ACL and by the local_scan() function. ++ ++Once a message is accepted, the timestamp in the Received: header line is ++changed to the time of acceptance, which is (apart from a small delay while the ++-H spool file is written) the earliest time at which delivery could start. ++ ++ ++46.14 The References: header line ++--------------------------------- ++ ++Messages created by the autoreply transport include a References: header line. ++This is constructed according to the rules that are described in section 3.64 ++of RFC 2822 (which states that replies should contain such a header line), and ++section 3.14 of RFC 3834 (which states that automatic responses are not ++different in this respect). However, because some mail processing software does ++not cope well with very long header lines, no more than 12 message IDs are ++copied from the References: header line in the incoming message. If there are ++more than 12, the first one and then the final 11 are copied, before adding the ++message ID of the incoming message. ++ ++ ++46.15 The Return-path: header line ++---------------------------------- ++ ++Return-path: header lines are defined as something an MTA may insert when it ++does the final delivery of messages. (See the generic return_path_add transport ++option.) Therefore, they should not be present in messages in transit. If the ++return_path_remove configuration option is set (the default), Exim removes ++Return-path: header lines from incoming messages. ++ ++ ++46.16 The Sender: header line ++----------------------------- ++ ++For a locally-originated message from an untrusted user, Exim may remove an ++existing Sender: header line, and it may add a new one. You can modify these ++actions by setting the local_sender_retain option true, the local_from_check ++option false, or by using the suppress_local_fixups control setting. ++ ++When a local message is received from an untrusted user and local_from_check is ++true (the default), and the suppress_local_fixups control has not been set, a ++check is made to see if the address given in the From: header line is the ++correct (local) sender of the message. The address that is expected has the ++login name as the local part and the value of qualify_domain as the domain. ++Prefixes and suffixes for the local part can be permitted by setting ++local_from_prefix and local_from_suffix appropriately. If From: does not ++contain the correct sender, a Sender: line is added to the message. ++ ++If you set local_from_check false, this checking does not occur. However, the ++removal of an existing Sender: line still happens, unless you also set ++local_sender_retain to be true. It is not possible to set both of these options ++true at the same time. ++ ++By default, no processing of Sender: header lines is done for messages received ++over TCP/IP or for messages submitted by trusted users. However, when a message ++is received over TCP/IP in submission mode, and sender_retain is not specified ++on the submission control, the following processing takes place: ++ ++First, any existing Sender: lines are removed. Then, if the SMTP session is ++authenticated, and $authenticated_id is not empty, a sender address is created ++as follows: ++ ++ * If no domain is specified by the submission control, the local part is ++ $authenticated_id and the domain is $qualify_domain. ++ ++ * If a non-empty domain is specified by the submission control, the local ++ part is $authenticated_id, and the domain is the specified domain. ++ ++ * If an empty domain is specified by the submission control, ++ $authenticated_id is assumed to be the complete address. ++ ++This address is compared with the address in the From: header line. If they are ++different, a Sender: header line containing the created address is added. ++Prefixes and suffixes for the local part in From: can be permitted by setting ++local_from_prefix and local_from_suffix appropriately. ++ ++Note: Whenever a Sender: header line is created, the return path for the ++message (the envelope sender address) is changed to be the same address, except ++in the case of submission mode when sender_retain is specified. ++ ++ ++46.17 Adding and removing header lines in routers and transports ++---------------------------------------------------------------- ++ ++When a message is delivered, the addition and removal of header lines can be ++specified in a system filter, or on any of the routers and transports that ++process the message. Section 45.6 contains details about modifying headers in a ++system filter. Header lines can also be added in an ACL as a message is ++received (see section 42.23). ++ ++In contrast to what happens in a system filter, header modifications that are ++specified on routers and transports apply only to the particular recipient ++addresses that are being processed by those routers and transports. These ++changes do not actually take place until a copy of the message is being ++transported. Therefore, they do not affect the basic set of header lines, and ++they do not affect the values of the variables that refer to header lines. ++ ++Note: In particular, this means that any expansions in the configuration of the ++transport cannot refer to the modified header lines, because such expansions ++all occur before the message is actually transported. ++ ++For both routers and transports, the result of expanding a headers_add option ++must be in the form of one or more RFC 2822 header lines, separated by newlines ++(coded as "\n"). For example: ++ ++headers_add = X-added-header: added by $primary_hostname\n\ ++ X-added-second: another added header line ++ ++Exim does not check the syntax of these added header lines. ++ ++Multiple headers_add options for a single router or transport can be specified; ++the values will be concatenated (with a separating newline added) before ++expansion. ++ ++The result of expanding headers_remove must consist of a colon-separated list ++of header names. This is confusing, because header names themselves are often ++terminated by colons. In this case, the colons are the list separators, not ++part of the names. For example: ++ ++headers_remove = return-receipt-to:acknowledge-to ++ ++Multiple headers_remove options for a single router or transport can be ++specified; the values will be concatenated (with a separating colon added) ++before expansion. ++ ++When headers_add or headers_remove is specified on a router, its value is ++expanded at routing time, and then associated with all addresses that are ++accepted by that router, and also with any new addresses that it generates. If ++an address passes through several routers as a result of aliasing or ++forwarding, the changes are cumulative. ++ ++However, this does not apply to multiple routers that result from the use of ++the unseen option. Any header modifications that were specified by the "unseen" ++router or its predecessors apply only to the "unseen" delivery. ++ ++Addresses that end up with different headers_add or headers_remove settings ++cannot be delivered together in a batch, so a transport is always dealing with ++a set of addresses that have the same header-processing requirements. ++ ++The transport starts by writing the original set of header lines that arrived ++with the message, possibly modified by the system filter. As it writes out ++these lines, it consults the list of header names that were attached to the ++recipient address(es) by headers_remove options in routers, and it also ++consults the transport's own headers_remove option. Header lines whose names ++are on either of these lists are not written out. If there are multiple ++instances of any listed header, they are all skipped. ++ ++After the remaining original header lines have been written, new header lines ++that were specified by routers' headers_add options are written, in the order ++in which they were attached to the address. These are followed by any header ++lines specified by the transport's headers_add option. ++ ++This way of handling header line modifications in routers and transports has ++the following consequences: ++ ++ * The original set of header lines, possibly modified by the system filter, ++ remains "visible", in the sense that the $header_xxx variables refer to it, ++ at all times. ++ ++ * Header lines that are added by a router's headers_add option are not ++ accessible by means of the $header_xxx expansion syntax in subsequent ++ routers or the transport. ++ ++ * Conversely, header lines that are specified for removal by headers_remove ++ in a router remain visible to subsequent routers and the transport. ++ ++ * Headers added to an address by headers_add in a router cannot be removed by ++ a later router or by a transport. ++ ++ * An added header can refer to the contents of an original header that is to ++ be removed, even it has the same name as the added header. For example: ++ ++ headers_remove = subject ++ headers_add = Subject: new subject (was: $h_subject:) ++ ++Warning: The headers_add and headers_remove options cannot be used for a ++redirect router that has the one_time option set. ++ ++ ++46.18 Constructed addresses ++--------------------------- ++ ++When Exim constructs a sender address for a locally-generated message, it uses ++the form ++ ++<user name> <login@qualify_domain> ++ ++For example: ++ ++Zaphod Beeblebrox <zaphod@end.univ.example> ++ ++The user name is obtained from the -F command line option if set, or otherwise ++by looking up the calling user by getpwuid() and extracting the "gecos" field ++from the password entry. If the "gecos" field contains an ampersand character, ++this is replaced by the login name with the first letter upper cased, as is ++conventional in a number of operating systems. See the gecos_name option for a ++way to tailor the handling of the "gecos" field. The unknown_username option ++can be used to specify user names in cases when there is no password file ++entry. ++ ++In all cases, the user name is made to conform to RFC 2822 by quoting all or ++parts of it if necessary. In addition, if it contains any non-printing ++characters, it is encoded as described in RFC 2047, which defines a way of ++including non-ASCII characters in header lines. The value of the ++headers_charset option specifies the name of the encoding that is used (the ++characters are assumed to be in this encoding). The setting of ++print_topbitchars controls whether characters with the top bit set (that is, ++with codes greater than 127) count as printing characters or not. ++ ++ ++46.19 Case of local parts ++------------------------- ++ ++RFC 2822 states that the case of letters in the local parts of addresses cannot ++be assumed to be non-significant. Exim preserves the case of local parts of ++addresses, but by default it uses a lower-cased form when it is routing, ++because on most Unix systems, usernames are in lower case and case-insensitive ++routing is required. However, any particular router can be made to use the ++original case for local parts by setting the caseful_local_part generic router ++option. ++ ++If you must have mixed-case user names on your system, the best way to proceed, ++assuming you want case-independent handling of incoming email, is to set up ++your first router to convert incoming local parts in your domains to the ++correct case by means of a file lookup. For example: ++ ++correct_case: ++ driver = redirect ++ domains = +local_domains ++ data = ${lookup{$local_part}cdb\ ++ {/etc/usercased.cdb}{$value}fail}\ ++ @$domain ++ ++For this router, the local part is forced to lower case by the default action ( ++caseful_local_part is not set). The lower-cased local part is used to look up a ++new local part in the correct case. If you then set caseful_local_part on any ++subsequent routers which process your domains, they will operate on local parts ++with the correct case in a case-sensitive manner. ++ ++ ++46.20 Dots in local parts ++------------------------- ++ ++RFC 2822 forbids empty components in local parts. That is, an unquoted local ++part may not begin or end with a dot, nor have two consecutive dots in the ++middle. However, it seems that many MTAs do not enforce this, so Exim permits ++empty components for compatibility. ++ ++ ++46.21 Rewriting addresses ++------------------------- ++ ++Rewriting of sender and recipient addresses, and addresses in headers, can ++happen automatically, or as the result of configuration options, as described ++in chapter 31. The headers that may be affected by this are Bcc:, Cc:, From:, ++Reply-To:, Sender:, and To:. ++ ++Automatic rewriting includes qualification, as mentioned above. The other case ++in which it can happen is when an incomplete non-local domain is given. The ++routing process may cause this to be expanded into the full domain name. For ++example, a header such as ++ ++To: hare@teaparty ++ ++might get rewritten as ++ ++To: hare@teaparty.wonderland.fict.example ++ ++Rewriting as a result of routing is the one kind of message processing that ++does not happen at input time, as it cannot be done until the address has been ++routed. ++ ++Strictly, one should not do any deliveries of a message until all its addresses ++have been routed, in case any of the headers get changed as a result of ++routing. However, doing this in practice would hold up many deliveries for ++unreasonable amounts of time, just because one address could not immediately be ++routed. Exim therefore does not delay other deliveries when routing of one or ++more addresses is deferred. ++ ++ ++ ++=============================================================================== ++47. SMTP PROCESSING ++ ++Exim supports a number of different ways of using the SMTP protocol, and its ++LMTP variant, which is an interactive protocol for transferring messages into a ++closed mail store application. This chapter contains details of how SMTP is ++processed. For incoming mail, the following are available: ++ ++ * SMTP over TCP/IP (Exim daemon or inetd); ++ ++ * SMTP over the standard input and output (the -bs option); ++ ++ * Batched SMTP on the standard input (the -bS option). ++ ++For mail delivery, the following are available: ++ ++ * SMTP over TCP/IP (the smtp transport); ++ ++ * LMTP over TCP/IP (the smtp transport with the protocol option set to ++ "lmtp"); ++ ++ * LMTP over a pipe to a process running in the local host (the lmtp ++ transport); ++ ++ * Batched SMTP to a file or pipe (the appendfile and pipe transports with the ++ use_bsmtp option set). ++ ++Batched SMTP is the name for a process in which batches of messages are stored ++in or read from files (or pipes), in a format in which SMTP commands are used ++to contain the envelope information. ++ ++ ++47.1 Outgoing SMTP and LMTP over TCP/IP ++--------------------------------------- ++ ++Outgoing SMTP and LMTP over TCP/IP is implemented by the smtp transport. The ++protocol option selects which protocol is to be used, but the actual processing ++is the same in both cases. ++ ++If, in response to its EHLO command, Exim is told that the SIZE parameter is ++supported, it adds SIZE=<n> to each subsequent MAIL command. The value of <n> ++is the message size plus the value of the size_addition option (default 1024) ++to allow for additions to the message such as per-transport header lines, or ++changes made in a transport filter. If size_addition is set negative, the use ++of SIZE is suppressed. ++ ++If the remote server advertises support for PIPELINING, Exim uses the ++pipelining extension to SMTP (RFC 2197) to reduce the number of TCP/IP packets ++required for the transaction. ++ ++If the remote server advertises support for the STARTTLS command, and Exim was ++built to support TLS encryption, it tries to start a TLS session unless the ++server matches hosts_avoid_tls. See chapter 41 for more details. Either a match ++in that or hosts_verify_avoid_tls apply when the transport is called for ++verification. ++ ++If the remote server advertises support for the AUTH command, Exim scans the ++authenticators configuration for any suitable client settings, as described in ++chapter 33. ++ ++Responses from the remote host are supposed to be terminated by CR followed by ++LF. However, there are known to be hosts that do not send CR characters, so in ++order to be able to interwork with such hosts, Exim treats LF on its own as a ++line terminator. ++ ++If a message contains a number of different addresses, all those with the same ++characteristics (for example, the same envelope sender) that resolve to the ++same set of hosts, in the same order, are sent in a single SMTP transaction, ++even if they are for different domains, unless there are more than the setting ++of the max_rcpts option in the smtp transport allows, in which case they are ++split into groups containing no more than max_rcpts addresses each. If ++remote_max_parallel is greater than one, such groups may be sent in parallel ++sessions. The order of hosts with identical MX values is not significant when ++checking whether addresses can be batched in this way. ++ ++When the smtp transport suffers a temporary failure that is not ++message-related, Exim updates its transport-specific database, which contains ++records indexed by host name that remember which messages are waiting for each ++particular host. It also updates the retry database with new retry times. ++ ++Exim's retry hints are based on host name plus IP address, so if one address of ++a multi-homed host is broken, it will soon be skipped most of the time. See the ++next section for more detail about error handling. ++ ++When a message is successfully delivered over a TCP/IP SMTP connection, Exim ++looks in the hints database for the transport to see if there are any queued ++messages waiting for the host to which it is connected. If it finds one, it ++creates a new Exim process using the -MC option (which can only be used by a ++process running as root or the Exim user) and passes the TCP/IP socket to it so ++that it can deliver another message using the same socket. The new process does ++only those deliveries that are routed to the connected host, and may in turn ++pass the socket on to a third process, and so on. ++ ++The connection_max_messages option of the smtp transport can be used to limit ++the number of messages sent down a single TCP/IP connection. ++ ++The second and subsequent messages delivered down an existing connection are ++identified in the main log by the addition of an asterisk after the closing ++square bracket of the IP address. ++ ++ ++47.2 Errors in outgoing SMTP ++---------------------------- ++ ++Three different kinds of error are recognized for outgoing SMTP: host errors, ++message errors, and recipient errors. ++ ++Host errors ++ ++ A host error is not associated with a particular message or with a ++ particular recipient of a message. The host errors are: ++ ++ + Connection refused or timed out, ++ ++ + Any error response code on connection, ++ ++ + Any error response code to EHLO or HELO, ++ ++ + Loss of connection at any time, except after ".", ++ ++ + I/O errors at any time, ++ ++ + Timeouts during the session, other than in response to MAIL, RCPT or ++ the "." at the end of the data. ++ ++ For a host error, a permanent error response on connection, or in response ++ to EHLO, causes all addresses routed to the host to be failed. Any other ++ host error causes all addresses to be deferred, and retry data to be ++ created for the host. It is not tried again, for any message, until its ++ retry time arrives. If the current set of addresses are not all delivered ++ in this run (to some alternative host), the message is added to the list of ++ those waiting for this host, so if it is still undelivered when a ++ subsequent successful delivery is made to the host, it will be sent down ++ the same SMTP connection. ++ ++Message errors ++ ++ A message error is associated with a particular message when sent to a ++ particular host, but not with a particular recipient of the message. The ++ message errors are: ++ ++ + Any error response code to MAIL, DATA, or the "." that terminates the ++ data, ++ ++ + Timeout after MAIL, ++ ++ + Timeout or loss of connection after the "." that terminates the data. A ++ timeout after the DATA command itself is treated as a host error, as is ++ loss of connection at any other time. ++ ++ For a message error, a permanent error response (5xx) causes all addresses ++ to be failed, and a delivery error report to be returned to the sender. A ++ temporary error response (4xx), or one of the timeouts, causes all ++ addresses to be deferred. Retry data is not created for the host, but ++ instead, a retry record for the combination of host plus message id is ++ created. The message is not added to the list of those waiting for this ++ host. This ensures that the failing message will not be sent to this host ++ again until the retry time arrives. However, other messages that are routed ++ to the host are not affected, so if it is some property of the message that ++ is causing the error, it will not stop the delivery of other mail. ++ ++ If the remote host specified support for the SIZE parameter in its response ++ to EHLO, Exim adds SIZE=nnn to the MAIL command, so an over-large message ++ will cause a message error because the error arrives as a response to MAIL. ++ ++Recipient errors ++ ++ A recipient error is associated with a particular recipient of a message. ++ The recipient errors are: ++ ++ + Any error response to RCPT, ++ ++ + Timeout after RCPT. ++ ++ For a recipient error, a permanent error response (5xx) causes the ++ recipient address to be failed, and a bounce message to be returned to the ++ sender. A temporary error response (4xx) or a timeout causes the failing ++ address to be deferred, and routing retry data to be created for it. This ++ is used to delay processing of the address in subsequent queue runs, until ++ its routing retry time arrives. This applies to all messages, but because ++ it operates only in queue runs, one attempt will be made to deliver a new ++ message to the failing address before the delay starts to operate. This ++ ensures that, if the failure is really related to the message rather than ++ the recipient ("message too big for this recipient" is a possible example), ++ other messages have a chance of getting delivered. If a delivery to the ++ address does succeed, the retry information gets cleared, so all stuck ++ messages get tried again, and the retry clock is reset. ++ ++ The message is not added to the list of those waiting for this host. Use of ++ the host for other messages is unaffected, and except in the case of a ++ timeout, other recipients are processed independently, and may be ++ successfully delivered in the current SMTP session. After a timeout it is ++ of course impossible to proceed with the session, so all addresses get ++ deferred. However, those other than the one that failed do not suffer any ++ subsequent retry delays. Therefore, if one recipient is causing trouble, ++ the others have a chance of getting through when a subsequent delivery ++ attempt occurs before the failing recipient's retry time. ++ ++In all cases, if there are other hosts (or IP addresses) available for the ++current set of addresses (for example, from multiple MX records), they are ++tried in this run for any undelivered addresses, subject of course to their own ++retry data. In other words, recipient error retry data does not take effect ++until the next delivery attempt. ++ ++Some hosts have been observed to give temporary error responses to every MAIL ++command at certain times ("insufficient space" has been seen). It would be nice ++if such circumstances could be recognized, and defer data for the host itself ++created, but this is not possible within the current Exim design. What actually ++happens is that retry data for every (host, message) combination is created. ++ ++The reason that timeouts after MAIL and RCPT are treated specially is that ++these can sometimes arise as a result of the remote host's verification ++procedures. Exim makes this assumption, and treats them as if a temporary error ++response had been received. A timeout after "." is treated specially because it ++is known that some broken implementations fail to recognize the end of the ++message if the last character of the last line is a binary zero. Thus, it is ++helpful to treat this case as a message error. ++ ++Timeouts at other times are treated as host errors, assuming a problem with the ++host, or the connection to it. If a timeout after MAIL, RCPT, or "." is really ++a connection problem, the assumption is that at the next try the timeout is ++likely to occur at some other point in the dialogue, causing it then to be ++treated as a host error. ++ ++There is experimental evidence that some MTAs drop the connection after the ++terminating "." if they do not like the contents of the message for some ++reason, in contravention of the RFC, which indicates that a 5xx response should ++be given. That is why Exim treats this case as a message rather than a host ++error, in order not to delay other messages to the same host. ++ ++ ++47.3 Incoming SMTP messages over TCP/IP ++--------------------------------------- ++ ++Incoming SMTP messages can be accepted in one of two ways: by running a ++listening daemon, or by using inetd. In the latter case, the entry in /etc/ ++inetd.conf should be like this: ++ ++smtp stream tcp nowait exim /opt/exim/bin/exim in.exim -bs ++ ++Exim distinguishes between this case and the case of a locally running user ++agent using the -bs option by checking whether or not the standard input is a ++socket. When it is, either the port must be privileged (less than 1024), or the ++caller must be root or the Exim user. If any other user passes a socket with an ++unprivileged port number, Exim prints a message on the standard error stream ++and exits with an error code. ++ ++By default, Exim does not make a log entry when a remote host connects or ++disconnects (either via the daemon or inetd), unless the disconnection is ++unexpected. It can be made to write such log entries by setting the ++smtp_connection log selector. ++ ++Commands from the remote host are supposed to be terminated by CR followed by ++LF. However, there are known to be hosts that do not send CR characters. In ++order to be able to interwork with such hosts, Exim treats LF on its own as a ++line terminator. Furthermore, because common code is used for receiving ++messages from all sources, a CR on its own is also interpreted as a line ++terminator. However, the sequence "CR, dot, CR" does not terminate incoming ++SMTP data. ++ ++One area that sometimes gives rise to problems concerns the EHLO or HELO ++commands. Some clients send syntactically invalid versions of these commands, ++which Exim rejects by default. (This is nothing to do with verifying the data ++that is sent, so helo_verify_hosts is not relevant.) You can tell Exim not to ++apply a syntax check by setting helo_accept_junk_hosts to match the broken ++hosts that send invalid commands. ++ ++The amount of disk space available is checked whenever SIZE is received on a ++MAIL command, independently of whether message_size_limit or check_spool_space ++is configured, unless smtp_check_spool_space is set false. A temporary error is ++given if there is not enough space. If check_spool_space is set, the check is ++for that amount of space plus the value given with SIZE, that is, it checks ++that the addition of the incoming message will not reduce the space below the ++threshold. ++ ++When a message is successfully received, Exim includes the local message id in ++its response to the final "." that terminates the data. If the remote host logs ++this text it can help with tracing what has happened to a message. ++ ++The Exim daemon can limit the number of simultaneous incoming connections it is ++prepared to handle (see the smtp_accept_max option). It can also limit the ++number of simultaneous incoming connections from a single remote host (see the ++smtp_accept_max_per_host option). Additional connection attempts are rejected ++using the SMTP temporary error code 421. ++ ++The Exim daemon does not rely on the SIGCHLD signal to detect when a subprocess ++has finished, as this can get lost at busy times. Instead, it looks for ++completed subprocesses every time it wakes up. Provided there are other things ++happening (new incoming calls, starts of queue runs), completed processes will ++be noticed and tidied away. On very quiet systems you may sometimes see a ++"defunct" Exim process hanging about. This is not a problem; it will be noticed ++when the daemon next wakes up. ++ ++When running as a daemon, Exim can reserve some SMTP slots for specific hosts, ++and can also be set up to reject SMTP calls from non-reserved hosts at times of ++high system load - for details see the smtp_accept_reserve, smtp_load_reserve, ++and smtp_reserve_hosts options. The load check applies in both the daemon and ++inetd cases. ++ ++Exim normally starts a delivery process for each message received, though this ++can be varied by means of the -odq command line option and the queue_only, ++queue_only_file, and queue_only_load options. The number of simultaneously ++running delivery processes started in this way from SMTP input can be limited ++by the smtp_accept_queue and smtp_accept_queue_per_connection options. When ++either limit is reached, subsequently received messages are just put on the ++input queue without starting a delivery process. ++ ++The controls that involve counts of incoming SMTP calls (smtp_accept_max, ++smtp_accept_queue, smtp_accept_reserve) are not available when Exim is started ++up from the inetd daemon, because in that case each connection is handled by an ++entirely independent Exim process. Control by load average is, however, ++available with inetd. ++ ++Exim can be configured to verify addresses in incoming SMTP commands as they ++are received. See chapter 42 for details. It can also be configured to rewrite ++addresses at this time - before any syntax checking is done. See section 31.9. ++ ++Exim can also be configured to limit the rate at which a client host submits ++MAIL and RCPT commands in a single SMTP session. See the smtp_ratelimit_hosts ++option. ++ ++ ++47.4 Unrecognized SMTP commands ++------------------------------- ++ ++If Exim receives more than smtp_max_unknown_commands unrecognized SMTP commands ++during a single SMTP connection, it drops the connection after sending the ++error response to the last command. The default value for ++smtp_max_unknown_commands is 3. This is a defence against some kinds of abuse ++that subvert web servers into making connections to SMTP ports; in these ++circumstances, a number of non-SMTP lines are sent first. ++ ++ ++47.5 Syntax and protocol errors in SMTP commands ++------------------------------------------------ ++ ++A syntax error is detected if an SMTP command is recognized, but there is ++something syntactically wrong with its data, for example, a malformed email ++address in a RCPT command. Protocol errors include invalid command sequencing ++such as RCPT before MAIL. If Exim receives more than smtp_max_synprot_errors ++such commands during a single SMTP connection, it drops the connection after ++sending the error response to the last command. The default value for ++smtp_max_synprot_errors is 3. This is a defence against broken clients that ++loop sending bad commands (yes, it has been seen). ++ ++ ++47.6 Use of non-mail SMTP commands ++---------------------------------- ++ ++The "non-mail" SMTP commands are those other than MAIL, RCPT, and DATA. Exim ++counts such commands, and drops the connection if there are too many of them in ++a single SMTP session. This action catches some denial-of-service attempts and ++things like repeated failing AUTHs, or a mad client looping sending EHLO. The ++global option smtp_accept_max_nonmail defines what "too many" means. Its ++default value is 10. ++ ++When a new message is expected, one occurrence of RSET is not counted. This ++allows a client to send one RSET between messages (this is not necessary, but ++some clients do it). Exim also allows one uncounted occurrence of HELO or EHLO, ++and one occurrence of STARTTLS between messages. After starting up a TLS ++session, another EHLO is expected, and so it too is not counted. ++ ++The first occurrence of AUTH in a connection, or immediately following STARTTLS ++is also not counted. Otherwise, all commands other than MAIL, RCPT, DATA, and ++QUIT are counted. ++ ++You can control which hosts are subject to the limit set by ++smtp_accept_max_nonmail by setting smtp_accept_max_nonmail_hosts. The default ++value is "*", which makes the limit apply to all hosts. This option means that ++you can exclude any specific badly-behaved hosts that you have to live with. ++ ++ ++47.7 The VRFY and EXPN commands ++------------------------------- ++ ++When Exim receives a VRFY or EXPN command on a TCP/IP connection, it runs the ++ACL specified by acl_smtp_vrfy or acl_smtp_expn (as appropriate) in order to ++decide whether the command should be accepted or not. If no ACL is defined, the ++command is rejected. ++ ++When VRFY is accepted, it runs exactly the same code as when Exim is called ++with the -bv option. ++ ++When EXPN is accepted, a single-level expansion of the address is done. EXPN is ++treated as an "address test" (similar to the -bt option) rather than a ++verification (the -bv option). If an unqualified local part is given as the ++argument to EXPN, it is qualified with qualify_domain. Rejections of VRFY and ++EXPN commands are logged on the main and reject logs, and VRFY verification ++failures are logged on the main log for consistency with RCPT failures. ++ ++ ++47.8 The ETRN command ++--------------------- ++ ++RFC 1985 describes an SMTP command called ETRN that is designed to overcome the ++security problems of the TURN command (which has fallen into disuse). When Exim ++receives an ETRN command on a TCP/IP connection, it runs the ACL specified by ++acl_smtp_etrn in order to decide whether the command should be accepted or not. ++If no ACL is defined, the command is rejected. ++ ++The ETRN command is concerned with "releasing" messages that are awaiting ++delivery to certain hosts. As Exim does not organize its message queue by host, ++the only form of ETRN that is supported by default is the one where the text ++starts with the "#" prefix, in which case the remainder of the text is specific ++to the SMTP server. A valid ETRN command causes a run of Exim with the -R ++option to happen, with the remainder of the ETRN text as its argument. For ++example, ++ ++ETRN #brigadoon ++ ++runs the command ++ ++exim -R brigadoon ++ ++which causes a delivery attempt on all messages with undelivered addresses ++containing the text "brigadoon". When smtp_etrn_serialize is set (the default), ++Exim prevents the simultaneous execution of more than one queue run for the ++same argument string as a result of an ETRN command. This stops a misbehaving ++client from starting more than one queue runner at once. ++ ++Exim implements the serialization by means of a hints database in which a ++record is written whenever a process is started by ETRN, and deleted when the ++process completes. However, Exim does not keep the SMTP session waiting for the ++ETRN process to complete. Once ETRN is accepted, the client is sent a "success" ++return code. Obviously there is scope for hints records to get left lying ++around if there is a system or program crash. To guard against this, Exim ++ignores any records that are more than six hours old. ++ ++For more control over what ETRN does, the smtp_etrn_command option can used. ++This specifies a command that is run whenever ETRN is received, whatever the ++form of its argument. For example: ++ ++smtp_etrn_command = /etc/etrn_command $domain \ ++ $sender_host_address ++ ++The string is split up into arguments which are independently expanded. The ++expansion variable $domain is set to the argument of the ETRN command, and no ++syntax checking is done on the contents of this argument. Exim does not wait ++for the command to complete, so its status code is not checked. Exim runs under ++its own uid and gid when receiving incoming SMTP, so it is not possible for it ++to change them before running the command. ++ ++ ++47.9 Incoming local SMTP ++------------------------ ++ ++Some user agents use SMTP to pass messages to their local MTA using the ++standard input and output, as opposed to passing the envelope on the command ++line and writing the message to the standard input. This is supported by the ++-bs option. This form of SMTP is handled in the same way as incoming messages ++over TCP/IP (including the use of ACLs), except that the envelope sender given ++in a MAIL command is ignored unless the caller is trusted. In an ACL you can ++detect this form of SMTP input by testing for an empty host identification. It ++is common to have this as the first line in the ACL that runs for RCPT ++commands: ++ ++accept hosts = : ++ ++This accepts SMTP messages from local processes without doing any other tests. ++ ++ ++47.10 Outgoing batched SMTP ++--------------------------- ++ ++Both the appendfile and pipe transports can be used for handling batched SMTP. ++Each has an option called use_bsmtp which causes messages to be output in BSMTP ++format. No SMTP responses are possible for this form of delivery. All it is ++doing is using SMTP commands as a way of transmitting the envelope along with ++the message. ++ ++The message is written to the file or pipe preceded by the SMTP commands MAIL ++and RCPT, and followed by a line containing a single dot. Lines in the message ++that start with a dot have an extra dot added. The SMTP command HELO is not ++normally used. If it is required, the message_prefix option can be used to ++specify it. ++ ++Because appendfile and pipe are both local transports, they accept only one ++recipient address at a time by default. However, you can arrange for them to ++handle several addresses at once by setting the batch_max option. When this is ++done for BSMTP, messages may contain multiple RCPT commands. See chapter 25 for ++more details. ++ ++When one or more addresses are routed to a BSMTP transport by a router that ++sets up a host list, the name of the first host on the list is available to the ++transport in the variable $host. Here is an example of such a transport and ++router: ++ ++begin routers ++route_append: ++ driver = manualroute ++ transport = smtp_appendfile ++ route_list = domain.example batch.host.example ++ ++begin transports ++smtp_appendfile: ++ driver = appendfile ++ directory = /var/bsmtp/$host ++ batch_max = 1000 ++ use_bsmtp ++ user = exim ++ ++This causes messages addressed to domain.example to be written in BSMTP format ++to /var/bsmtp/batch.host.example, with only a single copy of each message ++(unless there are more than 1000 recipients). ++ ++ ++47.11 Incoming batched SMTP ++--------------------------- ++ ++The -bS command line option causes Exim to accept one or more messages by ++reading SMTP on the standard input, but to generate no responses. If the caller ++is trusted, the senders in the MAIL commands are believed; otherwise the sender ++is always the caller of Exim. Unqualified senders and receivers are not ++rejected (there seems little point) but instead just get qualified. HELO and ++EHLO act as RSET; VRFY, EXPN, ETRN and HELP, act as NOOP; QUIT quits. ++ ++Minimal policy checking is done for BSMTP input. Only the non-SMTP ACL is run ++in the same way as for non-SMTP local input. ++ ++If an error is detected while reading a message, including a missing "." at the ++end, Exim gives up immediately. It writes details of the error to the standard ++output in a stylized way that the calling program should be able to make some ++use of automatically, for example: ++ ++554 Unexpected end of file ++Transaction started in line 10 ++Error detected in line 14 ++ ++It writes a more verbose version, for human consumption, to the standard error ++file, for example: ++ ++An error was detected while processing a file of BSMTP input. ++The error message was: ++ ++501 '>' missing at end of address ++ ++The SMTP transaction started in line 10. ++The error was detected in line 12. ++The SMTP command at fault was: ++ ++rcpt to:<malformed@in.com.plete ++ ++1 previous message was successfully processed. ++The rest of the batch was abandoned. ++ ++The return code from Exim is zero only if there were no errors. It is 1 if some ++messages were accepted before an error was detected, and 2 if no messages were ++accepted. ++ ++ ++ ++=============================================================================== ++48. CUSTOMIZING BOUNCE AND WARNING MESSAGES ++ ++When a message fails to be delivered, or remains on the queue for more than a ++configured amount of time, Exim sends a message to the original sender, or to ++an alternative configured address. The text of these messages is built into the ++code of Exim, but it is possible to change it, either by adding a single ++string, or by replacing each of the paragraphs by text supplied in a file. ++ ++The From: and To: header lines are automatically generated; you can cause a ++Reply-To: line to be added by setting the errors_reply_to option. Exim also ++adds the line ++ ++Auto-Submitted: auto-generated ++ ++to all warning and bounce messages, ++ ++ ++48.1 Customizing bounce messages ++-------------------------------- ++ ++If bounce_message_text is set, its contents are included in the default message ++immediately after "This message was created automatically by mail delivery ++software." The string is not expanded. It is not used if bounce_message_file is ++set. ++ ++When bounce_message_file is set, it must point to a template file for ++constructing error messages. The file consists of a series of text items, ++separated by lines consisting of exactly four asterisks. If the file cannot be ++opened, default text is used and a message is written to the main and panic ++logs. If any text item in the file is empty, default text is used for that ++item. ++ ++Each item of text that is read from the file is expanded, and there are two ++expansion variables which can be of use here: $bounce_recipient is set to the ++recipient of an error message while it is being created, and ++$bounce_return_size_limit contains the value of the return_size_limit option, ++rounded to a whole number. ++ ++The items must appear in the file in the following order: ++ ++ * The first item is included in the headers, and should include at least a ++ Subject: header. Exim does not check the syntax of these headers. ++ ++ * The second item forms the start of the error message. After it, Exim lists ++ the failing addresses with their error messages. ++ ++ * The third item is used to introduce any text from pipe transports that is ++ to be returned to the sender. It is omitted if there is no such text. ++ ++ * The fourth item is used to introduce the copy of the message that is ++ returned as part of the error report. ++ ++ * The fifth item is added after the fourth one if the returned message is ++ truncated because it is bigger than return_size_limit. ++ ++ * The sixth item is added after the copy of the original message. ++ ++The default state (bounce_message_file unset) is equivalent to the following ++file, in which the sixth item is empty. The Subject: and some other lines have ++been split in order to fit them on the page: ++ ++Subject: Mail delivery failed ++ ${if eq{$sender_address}{$bounce_recipient} ++ {: returning message to sender}} ++**** ++This message was created automatically by mail delivery software. ++ ++A message ${if eq{$sender_address}{$bounce_recipient} ++ {that you sent }{sent by ++ ++<$sender_address> ++ ++}}could not be delivered to all of its recipients. ++This is a permanent error. The following address(es) failed: ++**** ++The following text was generated during the delivery attempt(s): ++**** ++------ This is a copy of the message, including all the headers. ++ ------ ++**** ++------ The body of the message is $message_size characters long; ++ only the first ++------ $bounce_return_size_limit or so are included here. ++**** ++ ++ ++48.2 Customizing warning messages ++--------------------------------- ++ ++The option warn_message_file can be pointed at a template file for use when ++warnings about message delays are created. In this case there are only three ++text sections: ++ ++ * The first item is included in the headers, and should include at least a ++ Subject: header. Exim does not check the syntax of these headers. ++ ++ * The second item forms the start of the warning message. After it, Exim ++ lists the delayed addresses. ++ ++ * The third item then ends the message. ++ ++The default state is equivalent to the following file, except that some lines ++have been split here, in order to fit them on the page: ++ ++Subject: Warning: message $message_exim_id delayed ++ $warn_message_delay ++**** ++This message was created automatically by mail delivery software. ++ ++A message ${if eq{$sender_address}{$warn_message_recipients} ++{that you sent }{sent by ++ ++<$sender_address> ++ ++}}has not been delivered to all of its recipients after ++more than $warn_message_delay on the queue on $primary_hostname. ++ ++The message identifier is: $message_exim_id ++The subject of the message is: $h_subject ++The date of the message is: $h_date ++ ++The following address(es) have not yet been delivered: ++**** ++No action is required on your part. Delivery attempts will ++continue for some time, and this warning may be repeated at ++intervals if the message remains undelivered. Eventually the ++mail delivery software will give up, and when that happens, ++the message will be returned to you. ++ ++However, in the default state the subject and date lines are omitted if no ++appropriate headers exist. During the expansion of this file, ++$warn_message_delay is set to the delay time in one of the forms "<n> minutes" ++or "<n> hours", and $warn_message_recipients contains a list of recipients for ++the warning message. There may be more than one if there are multiple addresses ++with different errors_to settings on the routers that handled them. ++ ++ ++ ++=============================================================================== ++49. SOME COMMON CONFIGURATION SETTINGS ++ ++This chapter discusses some configuration settings that seem to be fairly ++common. More examples and discussion can be found in the Exim book. ++ ++ ++49.1 Sending mail to a smart host ++--------------------------------- ++ ++If you want to send all mail for non-local domains to a "smart host", you ++should replace the default dnslookup router with a router which does the ++routing explicitly: ++ ++send_to_smart_host: ++ driver = manualroute ++ route_list = !+local_domains smart.host.name ++ transport = remote_smtp ++ ++You can use the smart host's IP address instead of the name if you wish. If you ++are using Exim only to submit messages to a smart host, and not for receiving ++incoming messages, you can arrange for it to do the submission synchronously by ++setting the mua_wrapper option (see chapter 50). ++ ++ ++49.2 Using Exim to handle mailing lists ++--------------------------------------- ++ ++Exim can be used to run simple mailing lists, but for large and/or complicated ++requirements, the use of additional specialized mailing list software such as ++Majordomo or Mailman is recommended. ++ ++The redirect router can be used to handle mailing lists where each list is ++maintained in a separate file, which can therefore be managed by an independent ++manager. The domains router option can be used to run these lists in a separate ++domain from normal mail. For example: ++ ++lists: ++ driver = redirect ++ domains = lists.example ++ file = /usr/lists/$local_part ++ forbid_pipe ++ forbid_file ++ errors_to = $local_part-request@lists.example ++ no_more ++ ++This router is skipped for domains other than lists.example. For addresses in ++that domain, it looks for a file that matches the local part. If there is no ++such file, the router declines, but because no_more is set, no subsequent ++routers are tried, and so the whole delivery fails. ++ ++The forbid_pipe and forbid_file options prevent a local part from being ++expanded into a file name or a pipe delivery, which is usually inappropriate in ++a mailing list. ++ ++The errors_to option specifies that any delivery errors caused by addresses ++taken from a mailing list are to be sent to the given address rather than the ++original sender of the message. However, before acting on this, Exim verifies ++the error address, and ignores it if verification fails. ++ ++For example, using the configuration above, mail sent to dicts@lists.example is ++passed on to those addresses contained in /usr/lists/dicts, with error reports ++directed to dicts-request@lists.example, provided that this address can be ++verified. There could be a file called /usr/lists/dicts-request containing the ++address(es) of this particular list's manager(s), but other approaches, such as ++setting up an earlier router (possibly using the local_part_prefix or ++local_part_suffix options) to handle addresses of the form owner-xxx or xxx- ++request, are also possible. ++ ++ ++49.3 Syntax errors in mailing lists ++----------------------------------- ++ ++If an entry in redirection data contains a syntax error, Exim normally defers ++delivery of the original address. That means that a syntax error in a mailing ++list holds up all deliveries to the list. This may not be appropriate when a ++list is being maintained automatically from data supplied by users, and the ++addresses are not rigorously checked. ++ ++If the skip_syntax_errors option is set, the redirect router just skips entries ++that fail to parse, noting the incident in the log. If in addition ++syntax_errors_to is set to a verifiable address, a message is sent to it ++whenever a broken address is skipped. It is usually appropriate to set ++syntax_errors_to to the same address as errors_to. ++ ++ ++49.4 Re-expansion of mailing lists ++---------------------------------- ++ ++Exim remembers every individual address to which a message has been delivered, ++in order to avoid duplication, but it normally stores only the original ++recipient addresses with a message. If all the deliveries to a mailing list ++cannot be done at the first attempt, the mailing list is re-expanded when the ++delivery is next tried. This means that alterations to the list are taken into ++account at each delivery attempt, so addresses that have been added to the list ++since the message arrived will therefore receive a copy of the message, even ++though it pre-dates their subscription. ++ ++If this behaviour is felt to be undesirable, the one_time option can be set on ++the redirect router. If this is done, any addresses generated by the router ++that fail to deliver at the first attempt are added to the message as "top ++level" addresses, and the parent address that generated them is marked ++"delivered". Thus, expansion of the mailing list does not happen again at the ++subsequent delivery attempts. The disadvantage of this is that if any of the ++failing addresses are incorrect, correcting them in the file has no effect on ++pre-existing messages. ++ ++The original top-level address is remembered with each of the generated ++addresses, and is output in any log messages. However, any intermediate parent ++addresses are not recorded. This makes a difference to the log only if the ++all_parents selector is set, but for mailing lists there is normally only one ++level of expansion anyway. ++ ++ ++49.5 Closed mailing lists ++------------------------- ++ ++The examples so far have assumed open mailing lists, to which anybody may send ++mail. It is also possible to set up closed lists, where mail is accepted from ++specified senders only. This is done by making use of the generic senders ++option to restrict the router that handles the list. ++ ++The following example uses the same file as a list of recipients and as a list ++of permitted senders. It requires three routers: ++ ++lists_request: ++ driver = redirect ++ domains = lists.example ++ local_part_suffix = -request ++ file = /usr/lists/$local_part$local_part_suffix ++ no_more ++ ++lists_post: ++ driver = redirect ++ domains = lists.example ++ senders = ${if exists {/usr/lists/$local_part}\ ++ {lsearch;/usr/lists/$local_part}{*}} ++ file = /usr/lists/$local_part ++ forbid_pipe ++ forbid_file ++ errors_to = $local_part-request@lists.example ++ no_more ++ ++lists_closed: ++ driver = redirect ++ domains = lists.example ++ allow_fail ++ data = :fail: $local_part@lists.example is a closed mailing list ++ ++All three routers have the same domains setting, so for any other domains, they ++are all skipped. The first router runs only if the local part ends in -request. ++It handles messages to the list manager(s) by means of an open mailing list. ++ ++The second router runs only if the senders precondition is satisfied. It checks ++for the existence of a list that corresponds to the local part, and then checks ++that the sender is on the list by means of a linear search. It is necessary to ++check for the existence of the file before trying to search it, because ++otherwise Exim thinks there is a configuration error. If the file does not ++exist, the expansion of senders is *, which matches all senders. This means ++that the router runs, but because there is no list, declines, and no_more ++ensures that no further routers are run. The address fails with an "unrouteable ++address" error. ++ ++The third router runs only if the second router is skipped, which happens when ++a mailing list exists, but the sender is not on it. This router forcibly fails ++the address, giving a suitable error message. ++ ++ ++49.6 Variable Envelope Return Paths (VERP) ++------------------------------------------ ++ ++Variable Envelope Return Paths - see http://cr.yp.to/proto/verp.txt - are a way ++of helping mailing list administrators discover which subscription address is ++the cause of a particular delivery failure. The idea is to encode the original ++recipient address in the outgoing envelope sender address, so that if the ++message is forwarded by another host and then subsequently bounces, the ++original recipient can be extracted from the recipient address of the bounce. ++ ++Envelope sender addresses can be modified by Exim using two different ++facilities: the errors_to option on a router (as shown in previous mailing list ++examples), or the return_path option on a transport. The second of these is ++effective only if the message is successfully delivered to another host; it is ++not used for errors detected on the local host (see the description of ++return_path in chapter 24). Here is an example of the use of return_path to ++implement VERP on an smtp transport: ++ ++verp_smtp: ++ driver = smtp ++ max_rcpt = 1 ++ return_path = \ ++ ${if match {$return_path}{^(.+?)-request@your.dom.example\$}\ ++ {$1-request+$local_part=$domain@your.dom.example}fail} ++ ++This has the effect of rewriting the return path (envelope sender) on outgoing ++SMTP messages, if the local part of the original return path ends in ++"-request", and the domain is your.dom.example. The rewriting inserts the local ++part and domain of the recipient into the return path. Suppose, for example, ++that a message whose return path has been set to ++somelist-request@your.dom.example is sent to subscriber@other.dom.example. In ++the transport, the return path is rewritten as ++ ++somelist-request+subscriber=other.dom.example@your.dom.example ++ ++For this to work, you must tell Exim to send multiple copies of messages that ++have more than one recipient, so that each copy has just one recipient. This is ++achieved by setting max_rcpt to 1. Without this, a single copy of a message ++might be sent to several different recipients in the same domain, in which case ++$local_part is not available in the transport, because it is not unique. ++ ++Unless your host is doing nothing but mailing list deliveries, you should ++probably use a separate transport for the VERP deliveries, so as not to use ++extra resources in making one-per-recipient copies for other deliveries. This ++can easily be done by expanding the transport option in the router: ++ ++dnslookup: ++ driver = dnslookup ++ domains = ! +local_domains ++ transport = \ ++ ${if match {$return_path}{^(.+?)-request@your.dom.example\$}\ ++ {verp_smtp}{remote_smtp}} ++ no_more ++ ++If you want to change the return path using errors_to in a router instead of ++using return_path in the transport, you need to set errors_to on all routers ++that handle mailing list addresses. This will ensure that all delivery errors, ++including those detected on the local host, are sent to the VERP address. ++ ++On a host that does no local deliveries and has no manual routing, only the ++dnslookup router needs to be changed. A special transport is not needed for ++SMTP deliveries. Every mailing list recipient has its own return path value, ++and so Exim must hand them to the transport one at a time. Here is an example ++of a dnslookup router that implements VERP: ++ ++verp_dnslookup: ++ driver = dnslookup ++ domains = ! +local_domains ++ transport = remote_smtp ++ errors_to = \ ++ ${if match {$return_path}{^(.+?)-request@your.dom.example\$}} ++ {$1-request+$local_part=$domain@your.dom.example}fail} ++ no_more ++ ++Before you start sending out messages with VERPed return paths, you must also ++configure Exim to accept the bounce messages that come back to those paths. ++Typically this is done by setting a local_part_suffix option for a router, and ++using this to route the messages to wherever you want to handle them. ++ ++The overhead incurred in using VERP depends very much on the size of the ++message, the number of recipient addresses that resolve to the same remote ++host, and the speed of the connection over which the message is being sent. If ++a lot of addresses resolve to the same host and the connection is slow, sending ++a separate copy of the message for each address may take substantially longer ++than sending a single copy with many recipients (for which VERP cannot be ++used). ++ ++ ++49.7 Virtual domains ++-------------------- ++ ++The phrase virtual domain is unfortunately used with two rather different ++meanings: ++ ++ * A domain for which there are no real mailboxes; all valid local parts are ++ aliases for other email addresses. Common examples are organizational ++ top-level domains and "vanity" domains. ++ ++ * One of a number of independent domains that are all handled by the same ++ host, with mailboxes on that host, but where the mailbox owners do not ++ necessarily have login accounts on that host. ++ ++The first usage is probably more common, and does seem more "virtual" than the ++second. This kind of domain can be handled in Exim with a straightforward ++aliasing router. One approach is to create a separate alias file for each ++virtual domain. Exim can test for the existence of the alias file to determine ++whether the domain exists. The dsearch lookup type is useful here, leading to a ++router of this form: ++ ++virtual: ++ driver = redirect ++ domains = dsearch;/etc/mail/virtual ++ data = ${lookup{$local_part}lsearch{/etc/mail/virtual/$domain}} ++ no_more ++ ++The domains option specifies that the router is to be skipped, unless there is ++a file in the /etc/mail/virtual directory whose name is the same as the domain ++that is being processed. When the router runs, it looks up the local part in ++the file to find a new address (or list of addresses). The no_more setting ++ensures that if the lookup fails (leading to data being an empty string), Exim ++gives up on the address without trying any subsequent routers. ++ ++This one router can handle all the virtual domains because the alias file names ++follow a fixed pattern. Permissions can be arranged so that appropriate people ++can edit the different alias files. A successful aliasing operation results in ++a new envelope recipient address, which is then routed from scratch. ++ ++The other kind of "virtual" domain can also be handled in a straightforward ++way. One approach is to create a file for each domain containing a list of ++valid local parts, and use it in a router like this: ++ ++my_domains: ++ driver = accept ++ domains = dsearch;/etc/mail/domains ++ local_parts = lsearch;/etc/mail/domains/$domain ++ transport = my_mailboxes ++ ++The address is accepted if there is a file for the domain, and the local part ++can be found in the file. The domains option is used to check for the file's ++existence because domains is tested before the local_parts option (see section ++3.12). You cannot use require_files, because that option is tested after ++local_parts. The transport is as follows: ++ ++my_mailboxes: ++ driver = appendfile ++ file = /var/mail/$domain/$local_part ++ user = mail ++ ++This uses a directory of mailboxes for each domain. The user setting is ++required, to specify which uid is to be used for writing to the mailboxes. ++ ++The configuration shown here is just one example of how you might support this ++requirement. There are many other ways this kind of configuration can be set ++up, for example, by using a database instead of separate files to hold all the ++information about the domains. ++ ++ ++49.8 Multiple user mailboxes ++---------------------------- ++ ++Heavy email users often want to operate with multiple mailboxes, into which ++incoming mail is automatically sorted. A popular way of handling this is to ++allow users to use multiple sender addresses, so that replies can easily be ++identified. Users are permitted to add prefixes or suffixes to their local ++parts for this purpose. The wildcard facility of the generic router options ++local_part_prefix and local_part_suffix can be used for this. For example, ++consider this router: ++ ++userforward: ++ driver = redirect ++ check_local_user ++ file = $home/.forward ++ local_part_suffix = -* ++ local_part_suffix_optional ++ allow_filter ++ ++It runs a user's .forward file for all local parts of the form username-*. ++Within the filter file the user can distinguish different cases by testing the ++variable $local_part_suffix. For example: ++ ++if $local_part_suffix contains -special then ++save /home/$local_part/Mail/special ++endif ++ ++If the filter file does not exist, or does not deal with such addresses, they ++fall through to subsequent routers, and, assuming no subsequent use of the ++local_part_suffix option is made, they presumably fail. Thus, users have ++control over which suffixes are valid. ++ ++Alternatively, a suffix can be used to trigger the use of a different .forward ++file - which is the way a similar facility is implemented in another MTA: ++ ++userforward: ++ driver = redirect ++ check_local_user ++ file = $home/.forward$local_part_suffix ++ local_part_suffix = -* ++ local_part_suffix_optional ++ allow_filter ++ ++If there is no suffix, .forward is used; if the suffix is -special, for ++example, .forward-special is used. Once again, if the appropriate file does not ++exist, or does not deal with the address, it is passed on to subsequent ++routers, which could, if required, look for an unqualified .forward file to use ++as a default. ++ ++ ++49.9 Simplified vacation processing ++----------------------------------- ++ ++The traditional way of running the vacation program is for a user to set up a ++pipe command in a .forward file (see section 22.6 for syntax details). This is ++prone to error by inexperienced users. There are two features of Exim that can ++be used to make this process simpler for users: ++ ++ * A local part prefix such as "vacation-" can be specified on a router which ++ can cause the message to be delivered directly to the vacation program, or ++ alternatively can use Exim's autoreply transport. The contents of a user's ++ .forward file are then much simpler. For example: ++ ++ spqr, vacation-spqr ++ ++ * The require_files generic router option can be used to trigger a vacation ++ delivery by checking for the existence of a certain file in the user's home ++ directory. The unseen generic option should also be used, to ensure that ++ the original delivery also proceeds. In this case, all the user has to do ++ is to create a file called, say, .vacation, containing a vacation message. ++ ++Another advantage of both these methods is that they both work even when the ++use of arbitrary pipes by users is locked out. ++ ++ ++49.10 Taking copies of mail ++--------------------------- ++ ++Some installations have policies that require archive copies of all messages to ++be made. A single copy of each message can easily be taken by an appropriate ++command in a system filter, which could, for example, use a different file for ++each day's messages. ++ ++There is also a shadow transport mechanism that can be used to take copies of ++messages that are successfully delivered by local transports, one copy per ++delivery. This could be used, inter alia, to implement automatic notification ++of delivery by sites that insist on doing such things. ++ ++ ++49.11 Intermittently connected hosts ++------------------------------------ ++ ++It has become quite common (because it is cheaper) for hosts to connect to the ++Internet periodically rather than remain connected all the time. The normal ++arrangement is that mail for such hosts accumulates on a system that is ++permanently connected. ++ ++Exim was designed for use on permanently connected hosts, and so it is not ++particularly well-suited to use in an intermittently connected environment. ++Nevertheless there are some features that can be used. ++ ++ ++49.12 Exim on the upstream server host ++-------------------------------------- ++ ++It is tempting to arrange for incoming mail for the intermittently connected ++host to remain on Exim's queue until the client connects. However, this ++approach does not scale very well. Two different kinds of waiting message are ++being mixed up in the same queue - those that cannot be delivered because of ++some temporary problem, and those that are waiting for their destination host ++to connect. This makes it hard to manage the queue, as well as wasting ++resources, because each queue runner scans the entire queue. ++ ++A better approach is to separate off those messages that are waiting for an ++intermittently connected host. This can be done by delivering these messages ++into local files in batch SMTP, "mailstore", or other envelope-preserving ++format, from where they are transmitted by other software when their ++destination connects. This makes it easy to collect all the mail for one host ++in a single directory, and to apply local timeout rules on a per-message basis ++if required. ++ ++On a very small scale, leaving the mail on Exim's queue can be made to work. If ++you are doing this, you should configure Exim with a long retry period for the ++intermittent host. For example: ++ ++cheshire.wonderland.fict.example * F,5d,24h ++ ++This stops a lot of failed delivery attempts from occurring, but Exim remembers ++which messages it has queued up for that host. Once the intermittent host comes ++online, forcing delivery of one message (either by using the -M or -R options, ++or by using the ETRN SMTP command (see section 47.8) causes all the queued up ++messages to be delivered, often down a single SMTP connection. While the host ++remains connected, any new messages get delivered immediately. ++ ++If the connecting hosts do not have fixed IP addresses, that is, if a host is ++issued with a different IP address each time it connects, Exim's retry ++mechanisms on the holding host get confused, because the IP address is normally ++used as part of the key string for holding retry information. This can be ++avoided by unsetting retry_include_ip_address on the smtp transport. Since this ++has disadvantages for permanently connected hosts, it is best to arrange a ++separate transport for the intermittently connected ones. ++ ++ ++49.13 Exim on the intermittently connected client host ++------------------------------------------------------ ++ ++The value of smtp_accept_queue_per_connection should probably be increased, or ++even set to zero (that is, disabled) on the intermittently connected host, so ++that all incoming messages down a single connection get delivered immediately. ++ ++Mail waiting to be sent from an intermittently connected host will probably not ++have been routed, because without a connection DNS lookups are not possible. ++This means that if a normal queue run is done at connection time, each message ++is likely to be sent in a separate SMTP session. This can be avoided by ++starting the queue run with a command line option beginning with -qq instead of ++-q. In this case, the queue is scanned twice. In the first pass, routing is ++done but no deliveries take place. The second pass is a normal queue run; since ++all the messages have been previously routed, those destined for the same host ++are likely to get sent as multiple deliveries in a single SMTP connection. ++ ++ ++ ++=============================================================================== ++50. USING EXIM AS A NON-QUEUEING CLIENT ++ ++On a personal computer, it is a common requirement for all email to be sent to ++a "smart host". There are plenty of MUAs that can be configured to operate that ++way, for all the popular operating systems. However, there are some MUAs for ++Unix-like systems that cannot be so configured: they submit messages using the ++command line interface of /usr/sbin/sendmail. Furthermore, utility programs ++such as cron submit messages this way. ++ ++If the personal computer runs continuously, there is no problem, because it can ++run a conventional MTA that handles delivery to the smart host, and deal with ++any delays via its queueing mechanism. However, if the computer does not run ++continuously or runs different operating systems at different times, queueing ++email is not desirable. ++ ++There is therefore a requirement for something that can provide the /usr/sbin/ ++sendmail interface but deliver messages to a smart host without any queueing or ++retrying facilities. Furthermore, the delivery to the smart host should be ++synchronous, so that if it fails, the sending MUA is immediately informed. In ++other words, we want something that extends an MUA that submits to a local MTA ++via the command line so that it behaves like one that submits to a remote smart ++host using TCP/SMTP. ++ ++There are a number of applications (for example, there is one called ssmtp) ++that do this job. However, people have found them to be lacking in various ++ways. For instance, you might want to allow aliasing and forwarding to be done ++before sending a message to the smart host. ++ ++Exim already had the necessary infrastructure for doing this job. Just a few ++tweaks were needed to make it behave as required, though it is somewhat of an ++overkill to use a fully-featured MTA for this purpose. ++ ++There is a Boolean global option called mua_wrapper, defaulting false. Setting ++mua_wrapper true causes Exim to run in a special mode where it assumes that it ++is being used to "wrap" a command-line MUA in the manner just described. As ++well as setting mua_wrapper, you also need to provide a compatible router and ++transport configuration. Typically there will be just one router and one ++transport, sending everything to a smart host. ++ ++When run in MUA wrapping mode, the behaviour of Exim changes in the following ++ways: ++ ++ * A daemon cannot be run, nor will Exim accept incoming messages from inetd. ++ In other words, the only way to submit messages is via the command line. ++ ++ * Each message is synchronously delivered as soon as it is received (-odi is ++ assumed). All queueing options (queue_only, queue_smtp_domains, control in ++ an ACL, etc.) are quietly ignored. The Exim reception process does not ++ finish until the delivery attempt is complete. If the delivery is ++ successful, a zero return code is given. ++ ++ * Address redirection is permitted, but the final routing for all addresses ++ must be to the same remote transport, and to the same list of hosts. ++ Furthermore, the return address (envelope sender) must be the same for all ++ recipients, as must any added or deleted header lines. In other words, it ++ must be possible to deliver the message in a single SMTP transaction, ++ however many recipients there are. ++ ++ * If these conditions are not met, or if routing any address results in a ++ failure or defer status, or if Exim is unable to deliver all the recipients ++ successfully to one of the smart hosts, delivery of the entire message ++ fails. ++ ++ * Because no queueing is allowed, all failures are treated as permanent; ++ there is no distinction between 4xx and 5xx SMTP response codes from the ++ smart host. Furthermore, because only a single yes/no response can be given ++ to the caller, it is not possible to deliver to some recipients and not ++ others. If there is an error (temporary or permanent) for any recipient, ++ all are failed. ++ ++ * If more than one smart host is listed, Exim will try another host after a ++ connection failure or a timeout, in the normal way. However, if this kind ++ of failure happens for all the hosts, the delivery fails. ++ ++ * When delivery fails, an error message is written to the standard error ++ stream (as well as to Exim's log), and Exim exits to the caller with a ++ return code value 1. The message is expunged from Exim's spool files. No ++ bounce messages are ever generated. ++ ++ * No retry data is maintained, and any retry rules are ignored. ++ ++ * A number of Exim options are overridden: deliver_drop_privilege is forced ++ true, max_rcpt in the smtp transport is forced to "unlimited", ++ remote_max_parallel is forced to one, and fallback hosts are ignored. ++ ++The overall effect is that Exim makes a single synchronous attempt to deliver ++the message, failing if there is any kind of problem. Because no local ++deliveries are done and no daemon can be run, Exim does not need root ++privilege. It should be possible to run it setuid to exim instead of setuid to ++root. See section 54.3 for a general discussion about the advantages and ++disadvantages of running without root privilege. ++ ++ ++ ++=============================================================================== ++51. LOG FILES ++ ++Exim writes three different logs, referred to as the main log, the reject log, ++and the panic log: ++ ++ * The main log records the arrival of each message and each delivery in a ++ single line in each case. The format is as compact as possible, in an ++ attempt to keep down the size of log files. Two-character flag sequences ++ make it easy to pick out these lines. A number of other events are recorded ++ in the main log. Some of them are optional, in which case the log_selector ++ option controls whether they are included or not. A Perl script called ++ eximstats, which does simple analysis of main log files, is provided in the ++ Exim distribution (see section 52.7). ++ ++ * The reject log records information from messages that are rejected as a ++ result of a configuration option (that is, for policy reasons). The first ++ line of each rejection is a copy of the line that is also written to the ++ main log. Then, if the message's header has been read at the time the log ++ is written, its contents are written to this log. Only the original header ++ lines are available; header lines added by ACLs are not logged. You can use ++ the reject log to check that your policy controls are working correctly; on ++ a busy host this may be easier than scanning the main log for rejection ++ messages. You can suppress the writing of the reject log by setting ++ write_rejectlog false. ++ ++ * When certain serious errors occur, Exim writes entries to its panic log. If ++ the error is sufficiently disastrous, Exim bombs out afterwards. Panic log ++ entries are usually written to the main log as well, but can get lost amid ++ the mass of other entries. The panic log should be empty under normal ++ circumstances. It is therefore a good idea to check it (or to have a cron ++ script check it) regularly, in order to become aware of any problems. When ++ Exim cannot open its panic log, it tries as a last resort to write to the ++ system log (syslog). This is opened with LOG_PID+LOG_CONS and the facility ++ code of LOG_MAIL. The message itself is written at priority LOG_CRIT. ++ ++Every log line starts with a timestamp, in the format shown in the following ++example. Note that many of the examples shown in this chapter are line-wrapped. ++In the log file, this would be all on one line: ++ ++2001-09-16 16:09:47 SMTP connection from [127.0.0.1] closed ++ by QUIT ++ ++By default, the timestamps are in the local timezone. There are two ways of ++changing this: ++ ++ * You can set the timezone option to a different time zone; in particular, if ++ you set ++ ++ timezone = UTC ++ ++ the timestamps will be in UTC (aka GMT). ++ ++ * If you set log_timezone true, the time zone is added to the timestamp, for ++ example: ++ ++ 2003-04-25 11:17:07 +0100 Start queue run: pid=12762 ++ ++Exim does not include its process id in log lines by default, but you can ++request that it does so by specifying the "pid" log selector (see section 51.15 ++). When this is set, the process id is output, in square brackets, immediately ++after the time and date. ++ ++ ++51.1 Where the logs are written ++------------------------------- ++ ++The logs may be written to local files, or to syslog, or both. However, it ++should be noted that many syslog implementations use UDP as a transport, and ++are therefore unreliable in the sense that messages are not guaranteed to ++arrive at the loghost, nor is the ordering of messages necessarily maintained. ++It has also been reported that on large log files (tens of megabytes) you may ++need to tweak syslog to prevent it syncing the file with each write - on Linux ++this has been seen to make syslog take 90% plus of CPU time. ++ ++The destination for Exim's logs is configured by setting LOG_FILE_PATH in Local ++/Makefile or by setting log_file_path in the run time configuration. This ++latter string is expanded, so it can contain, for example, references to the ++host name: ++ ++log_file_path = /var/log/$primary_hostname/exim_%slog ++ ++It is generally advisable, however, to set the string in Local/Makefile rather ++than at run time, because then the setting is available right from the start of ++Exim's execution. Otherwise, if there's something it wants to log before it has ++read the configuration file (for example, an error in the configuration file) ++it will not use the path you want, and may not be able to log at all. ++ ++The value of LOG_FILE_PATH or log_file_path is a colon-separated list, ++currently limited to at most two items. This is one option where the facility ++for changing a list separator may not be used. The list must always be ++colon-separated. If an item in the list is "syslog" then syslog is used; ++otherwise the item must either be an absolute path, containing "%s" at the ++point where "main", "reject", or "panic" is to be inserted, or be empty, ++implying the use of a default path. ++ ++When Exim encounters an empty item in the list, it searches the list defined by ++LOG_FILE_PATH, and uses the first item it finds that is neither empty nor ++"syslog". This means that an empty item in log_file_path can be used to mean ++"use the path specified at build time". It no such item exists, log files are ++written in the log subdirectory of the spool directory. This is equivalent to ++the setting: ++ ++log_file_path = $spool_directory/log/%slog ++ ++If you do not specify anything at build time or run time, that is where the ++logs are written. ++ ++A log file path may also contain "%D" or "%M" if datestamped log file names are ++in use - see section 51.3 below. ++ ++Here are some examples of possible settings: ++ ++LOG_FILE_PATH=syslog syslog only ++LOG_FILE_PATH=:syslog syslog and default path ++LOG_FILE_PATH=syslog : /usr/log/exim_%s syslog and specified path ++LOG_FILE_PATH=/usr/log/exim_%s specified path only ++ ++If there are more than two paths in the list, the first is used and a panic ++error is logged. ++ ++ ++51.2 Logging to local files that are periodically "cycled" ++---------------------------------------------------------- ++ ++Some operating systems provide centralized and standardized methods for cycling ++log files. For those that do not, a utility script called exicyclog is provided ++(see section 52.6). This renames and compresses the main and reject logs each ++time it is called. The maximum number of old logs to keep can be set. It is ++suggested this script is run as a daily cron job. ++ ++An Exim delivery process opens the main log when it first needs to write to it, ++and it keeps the file open in case subsequent entries are required - for ++example, if a number of different deliveries are being done for the same ++message. However, remote SMTP deliveries can take a long time, and this means ++that the file may be kept open long after it is renamed if exicyclog or ++something similar is being used to rename log files on a regular basis. To ++ensure that a switch of log files is noticed as soon as possible, Exim calls ++stat() on the main log's name before reusing an open file, and if the file does ++not exist, or its inode has changed, the old file is closed and Exim tries to ++open the main log from scratch. Thus, an old log file may remain open for quite ++some time, but no Exim processes should write to it once it has been renamed. ++ ++ ++51.3 Datestamped log files ++-------------------------- ++ ++Instead of cycling the main and reject log files by renaming them periodically, ++some sites like to use files whose names contain a datestamp, for example, ++mainlog-20031225. The datestamp is in the form yyyymmdd or yyyymm. Exim has ++support for this way of working. It is enabled by setting the log_file_path ++option to a path that includes "%D" or "%M" at the point where the datestamp is ++required. For example: ++ ++log_file_path = /var/spool/exim/log/%slog-%D ++log_file_path = /var/log/exim-%s-%D.log ++log_file_path = /var/spool/exim/log/%D-%slog ++log_file_path = /var/log/exim/%s.%M ++ ++As before, "%s" is replaced by "main" or "reject"; the following are examples ++of names generated by the above examples: ++ ++/var/spool/exim/log/mainlog-20021225 ++/var/log/exim-reject-20021225.log ++/var/spool/exim/log/20021225-mainlog ++/var/log/exim/main.200212 ++ ++When this form of log file is specified, Exim automatically switches to new ++files at midnight. It does not make any attempt to compress old logs; you will ++need to write your own script if you require this. You should not run exicyclog ++with this form of logging. ++ ++The location of the panic log is also determined by log_file_path, but it is ++not datestamped, because rotation of the panic log does not make sense. When ++generating the name of the panic log, "%D" or "%M" are removed from the string. ++In addition, if it immediately follows a slash, a following non-alphanumeric ++character is removed; otherwise a preceding non-alphanumeric character is ++removed. Thus, the four examples above would give these panic log names: ++ ++/var/spool/exim/log/paniclog ++/var/log/exim-panic.log ++/var/spool/exim/log/paniclog ++/var/log/exim/panic ++ ++ ++51.4 Logging to syslog ++---------------------- ++ ++The use of syslog does not change what Exim logs or the format of its messages, ++except in one respect. If syslog_timestamp is set false, the timestamps on ++Exim's log lines are omitted when these lines are sent to syslog. Apart from ++that, the same strings are written to syslog as to log files. The syslog ++"facility" is set to LOG_MAIL, and the program name to "exim" by default, but ++you can change these by setting the syslog_facility and syslog_processname ++options, respectively. If Exim was compiled with SYSLOG_LOG_PID set in Local/ ++Makefile (this is the default in src/EDITME), then, on systems that permit it ++(all except ULTRIX), the LOG_PID flag is set so that the syslog() call adds the ++pid as well as the time and host name to each line. The three log streams are ++mapped onto syslog priorities as follows: ++ ++ * mainlog is mapped to LOG_INFO ++ ++ * rejectlog is mapped to LOG_NOTICE ++ ++ * paniclog is mapped to LOG_ALERT ++ ++Many log lines are written to both mainlog and rejectlog, and some are written ++to both mainlog and paniclog, so there will be duplicates if these are routed ++by syslog to the same place. You can suppress this duplication by setting ++syslog_duplication false. ++ ++Exim's log lines can sometimes be very long, and some of its rejectlog entries ++contain multiple lines when headers are included. To cope with both these ++cases, entries written to syslog are split into separate syslog() calls at each ++internal newline, and also after a maximum of 870 data characters. (This allows ++for a total syslog line length of 1024, when additions such as timestamps are ++added.) If you are running a syslog replacement that can handle lines longer ++than the 1024 characters allowed by RFC 3164, you should set ++ ++SYSLOG_LONG_LINES=yes ++ ++in Local/Makefile before building Exim. That stops Exim from splitting long ++lines, but it still splits at internal newlines in reject log entries. ++ ++To make it easy to re-assemble split lines later, each component of a split ++entry starts with a string of the form [<n>/<m>] or [<n>\<m>] where <n> is the ++component number and <m> is the total number of components in the entry. The / ++delimiter is used when the line was split because it was too long; if it was ++split because of an internal newline, the \ delimiter is used. For example, ++supposing the length limit to be 50 instead of 870, the following would be the ++result of a typical rejection message to mainlog (LOG_INFO), each line in ++addition being preceded by the time, host name, and pid as added by syslog: ++ ++[1/5] 2002-09-16 16:09:43 16RdAL-0006pc-00 rejected from ++[2/5] [127.0.0.1] (ph10): syntax error in 'From' header ++[3/5] when scanning for sender: missing or malformed lo ++[4/5] cal part in "<>" (envelope sender is <ph10@cam.exa ++[5/5] mple>) ++ ++The same error might cause the following lines to be written to "rejectlog" ++(LOG_NOTICE): ++ ++[1/18] 2002-09-16 16:09:43 16RdAL-0006pc-00 rejected fro ++[2/18] m [127.0.0.1] (ph10): syntax error in 'From' head ++[3/18] er when scanning for sender: missing or malformed ++[4/18] local part in "<>" (envelope sender is <ph10@cam ++[5\18] .example>) ++[6\18] Recipients: ph10@some.domain.cam.example ++[7\18] P Received: from [127.0.0.1] (ident=ph10) ++[8\18] by xxxxx.cam.example with smtp (Exim 4.00) ++[9\18] id 16RdAL-0006pc-00 ++[10/18] for ph10@cam.example; Mon, 16 Sep 2002 16: ++[11\18] 09:43 +0100 ++[12\18] F From: <> ++[13\18] Subject: this is a test header ++[18\18] X-something: this is another header ++[15/18] I Message-Id: <E16RdAL-0006pc-00@xxxxx.cam.examp ++[16\18] le> ++[17\18] B Bcc: ++[18/18] Date: Mon, 16 Sep 2002 16:09:43 +0100 ++ ++Log lines that are neither too long nor contain newlines are written to syslog ++without modification. ++ ++If only syslog is being used, the Exim monitor is unable to provide a log tail ++display, unless syslog is routing mainlog to a file on the local host and the ++environment variable EXIMON_LOG_FILE_PATH is set to tell the monitor where it ++is. ++ ++ ++51.5 Log line flags ++------------------- ++ ++One line is written to the main log for each message received, and for each ++successful, unsuccessful, and delayed delivery. These lines can readily be ++picked out by the distinctive two-character flags that immediately follow the ++timestamp. The flags are: ++ ++<= message arrival ++=> normal message delivery ++-> additional address in same delivery ++>> cutthrough message delivery ++*> delivery suppressed by -N ++** delivery failed; address bounced ++== delivery deferred; temporary problem ++ ++ ++51.6 Logging message reception ++------------------------------ ++ ++The format of the single-line entry in the main log that is written for every ++message received is shown in the basic example below, which is split over ++several lines in order to fit it on the page: ++ ++2002-10-31 08:57:53 16ZCW1-0005MB-00 <= kryten@dwarf.fict.example ++ H=mailer.fict.example [192.168.123.123] U=exim ++ P=smtp S=5678 id=<incoming message id> ++ ++The address immediately following "<=" is the envelope sender address. A bounce ++message is shown with the sender address "<>", and if it is locally generated, ++this is followed by an item of the form ++ ++R=<message id> ++ ++which is a reference to the message that caused the bounce to be sent. ++ ++For messages from other hosts, the H and U fields identify the remote host and ++record the RFC 1413 identity of the user that sent the message, if one was ++received. The number given in square brackets is the IP address of the sending ++host. If there is a single, unparenthesized host name in the H field, as above, ++it has been verified to correspond to the IP address (see the host_lookup ++option). If the name is in parentheses, it was the name quoted by the remote ++host in the SMTP HELO or EHLO command, and has not been verified. If ++verification yields a different name to that given for HELO or EHLO, the ++verified name appears first, followed by the HELO or EHLO name in parentheses. ++ ++Misconfigured hosts (and mail forgers) sometimes put an IP address, with or ++without brackets, in the HELO or EHLO command, leading to entries in the log ++containing text like these examples: ++ ++H=(10.21.32.43) [192.168.8.34] ++H=([10.21.32.43]) [192.168.8.34] ++ ++This can be confusing. Only the final address in square brackets can be relied ++on. ++ ++For locally generated messages (that is, messages not received over TCP/IP), ++the H field is omitted, and the U field contains the login name of the caller ++of Exim. ++ ++For all messages, the P field specifies the protocol used to receive the ++message. This is the value that is stored in $received_protocol. In the case of ++incoming SMTP messages, the value indicates whether or not any SMTP extensions ++(ESMTP), encryption, or authentication were used. If the SMTP session was ++encrypted, there is an additional X field that records the cipher suite that ++was used. ++ ++The protocol is set to "esmtpsa" or "esmtpa" for messages received from hosts ++that have authenticated themselves using the SMTP AUTH command. The first value ++is used when the SMTP connection was encrypted ("secure"). In this case there ++is an additional item A= followed by the name of the authenticator that was ++used. If an authenticated identification was set up by the authenticator's ++server_set_id option, this is logged too, separated by a colon from the ++authenticator name. ++ ++The id field records the existing message id, if present. The size of the ++received message is given by the S field. When the message is delivered, ++headers may be removed or added, so that the size of delivered copies of the ++message may not correspond with this value (and indeed may be different to each ++other). ++ ++The log_selector option can be used to request the logging of additional data ++when a message is received. See section 51.15 below. ++ ++ ++51.7 Logging deliveries ++----------------------- ++ ++The format of the single-line entry in the main log that is written for every ++delivery is shown in one of the examples below, for local and remote ++deliveries, respectively. Each example has been split into two lines in order ++to fit it on the page: ++ ++2002-10-31 08:59:13 16ZCW1-0005MB-00 => marv ++ <marv@hitch.fict.example> R=localuser T=local_delivery ++2002-10-31 09:00:10 16ZCW1-0005MB-00 => ++ monk@holistic.fict.example R=dnslookup T=remote_smtp ++ H=holistic.fict.example [192.168.234.234] ++ ++For ordinary local deliveries, the original address is given in angle brackets ++after the final delivery address, which might be a pipe or a file. If ++intermediate address(es) exist between the original and the final address, the ++last of these is given in parentheses after the final address. The R and T ++fields record the router and transport that were used to process the address. ++ ++If SMTP AUTH was used for the delivery there is an additional item A= followed ++by the name of the authenticator that was used. If an authenticated ++identification was set up by the authenticator's client_set_id option, this is ++logged too, separated by a colon from the authenticator name. ++ ++If a shadow transport was run after a successful local delivery, the log line ++for the successful delivery has an item added on the end, of the form ++ ++ST=<shadow transport name> ++ ++If the shadow transport did not succeed, the error message is put in ++parentheses afterwards. ++ ++When more than one address is included in a single delivery (for example, two ++SMTP RCPT commands in one transaction) the second and subsequent addresses are ++flagged with "->" instead of "=>". When two or more messages are delivered down ++a single SMTP connection, an asterisk follows the IP address in the log lines ++for the second and subsequent messages. ++ ++When delivery is done in cutthrough mode it is flagged with ">>" and the log ++line precedes the reception line, since cutthrough waits for a possible ++rejection from the destination in case it can reject the sourced item. ++ ++The generation of a reply message by a filter file gets logged as a "delivery" ++to the addressee, preceded by ">". ++ ++The log_selector option can be used to request the logging of additional data ++when a message is delivered. See section 51.15 below. ++ ++ ++51.8 Discarded deliveries ++------------------------- ++ ++When a message is discarded as a result of the command "seen finish" being ++obeyed in a filter file which generates no deliveries, a log entry of the form ++ ++2002-12-10 00:50:49 16auJc-0001UB-00 => discarded ++ <low.club@bridge.example> R=userforward ++ ++is written, to record why no deliveries are logged. When a message is discarded ++because it is aliased to ":blackhole:" the log line is like this: ++ ++1999-03-02 09:44:33 10HmaX-0005vi-00 => :blackhole: ++ <hole@nowhere.example> R=blackhole_router ++ ++ ++51.9 Deferred deliveries ++------------------------ ++ ++When a delivery is deferred, a line of the following form is logged: ++ ++2002-12-19 16:20:23 16aiQz-0002Q5-00 == marvin@endrest.example ++ R=dnslookup T=smtp defer (146): Connection refused ++ ++In the case of remote deliveries, the error is the one that was given for the ++last IP address that was tried. Details of individual SMTP failures are also ++written to the log, so the above line would be preceded by something like ++ ++2002-12-19 16:20:23 16aiQz-0002Q5-00 Failed to connect to ++ mail1.endrest.example [192.168.239.239]: Connection refused ++ ++When a deferred address is skipped because its retry time has not been reached, ++a message is written to the log, but this can be suppressed by setting an ++appropriate value in log_selector. ++ ++ ++51.10 Delivery failures ++----------------------- ++ ++If a delivery fails because an address cannot be routed, a line of the ++following form is logged: ++ ++1995-12-19 16:20:23 0tRiQz-0002Q5-00 ** jim@trek99.example ++ <jim@trek99.example>: unknown mail domain ++ ++If a delivery fails at transport time, the router and transport are shown, and ++the response from the remote host is included, as in this example: ++ ++2002-07-11 07:14:17 17SXDU-000189-00 ** ace400@pb.example ++ R=dnslookup T=remote_smtp: SMTP error from remote mailer ++ after pipelined RCPT TO:<ace400@pb.example>: host ++ pbmail3.py.example [192.168.63.111]: 553 5.3.0 ++ <ace400@pb.example>...Addressee unknown ++ ++The word "pipelined" indicates that the SMTP PIPELINING extension was being ++used. See hosts_avoid_esmtp in the smtp transport for a way of disabling ++PIPELINING. The log lines for all forms of delivery failure are flagged with ++"**". ++ ++ ++51.11 Fake deliveries ++--------------------- ++ ++If a delivery does not actually take place because the -N option has been used ++to suppress it, a normal delivery line is written to the log, except that "=>" ++is replaced by "*>". ++ ++ ++51.12 Completion ++---------------- ++ ++A line of the form ++ ++2002-10-31 09:00:11 16ZCW1-0005MB-00 Completed ++ ++is written to the main log when a message is about to be removed from the spool ++at the end of its processing. ++ ++ ++51.13 Summary of Fields in Log Lines ++------------------------------------ ++ ++A summary of the field identifiers that are used in log lines is shown in the ++following table: ++ ++A authenticator name (and optional id and sender) ++C SMTP confirmation on delivery ++ command list for "no mail in SMTP session" ++CV certificate verification status ++D duration of "no mail in SMTP session" ++DN distinguished name from peer certificate ++DT on => lines: time taken for a delivery ++F sender address (on delivery lines) ++H host name and IP address ++I local interface used ++id message id for incoming message ++P on <= lines: protocol used ++ on => and ** lines: return path ++QT on => lines: time spent on queue so far ++ on "Completed" lines: time spent on queue ++R on <= lines: reference for local bounce ++ on => ** and == lines: router name ++S size of message ++ST shadow transport name ++T on <= lines: message subject (topic) ++ on => ** and == lines: transport name ++U local user or RFC 1413 identity ++X TLS cipher suite ++ ++ ++51.14 Other log entries ++----------------------- ++ ++Various other types of log entry are written from time to time. Most should be ++self-explanatory. Among the more common are: ++ ++ * retry time not reached An address previously suffered a temporary error ++ during routing or local delivery, and the time to retry has not yet ++ arrived. This message is not written to an individual message log file ++ unless it happens during the first delivery attempt. ++ ++ * retry time not reached for any host An address previously suffered ++ temporary errors during remote delivery, and the retry time has not yet ++ arrived for any of the hosts to which it is routed. ++ ++ * spool file locked An attempt to deliver a message cannot proceed because ++ some other Exim process is already working on the message. This can be ++ quite common if queue running processes are started at frequent intervals. ++ The exiwhat utility script can be used to find out what Exim processes are ++ doing. ++ ++ * error ignored There are several circumstances that give rise to this ++ message: ++ ++ 1. Exim failed to deliver a bounce message whose age was greater than ++ ignore_bounce_errors_after. The bounce was discarded. ++ ++ 2. A filter file set up a delivery using the "noerror" option, and the ++ delivery failed. The delivery was discarded. ++ ++ 3. A delivery set up by a router configured with ++ ++ errors_to = <> ++ ++ failed. The delivery was discarded. ++ ++ ++51.15 Reducing or increasing what is logged ++------------------------------------------- ++ ++By setting the log_selector global option, you can disable some of Exim's ++default logging, or you can request additional logging. The value of ++log_selector is made up of names preceded by plus or minus characters. For ++example: ++ ++log_selector = +arguments -retry_defer ++ ++The list of optional log items is in the following table, with the default ++selection marked by asterisks: ++ ++ 8bitmime received 8BITMIME status ++*acl_warn_skipped skipped warn statement in ACL ++ address_rewrite address rewriting ++ all_parents all parents in => lines ++ arguments command line arguments ++*connection_reject connection rejections ++*delay_delivery immediate delivery delayed ++ deliver_time time taken to perform delivery ++ delivery_size add S=nnn to => lines ++*dnslist_defer defers of DNS list (aka RBL) lookups ++*etrn ETRN commands ++*host_lookup_failed as it says ++ ident_timeout timeout for ident connection ++ incoming_interface incoming interface on <= lines ++ incoming_port incoming port on <= lines ++*lost_incoming_connection as it says (includes timeouts) ++ outgoing_port add remote port to => lines ++*queue_run start and end queue runs ++ queue_time time on queue for one recipient ++ queue_time_overall time on queue for whole message ++ pid Exim process id ++ received_recipients recipients on <= lines ++ received_sender sender on <= lines ++*rejected_header header contents on reject log ++*retry_defer "retry time not reached" ++ return_path_on_delivery put return path on => and ** lines ++ sender_on_delivery add sender to => lines ++*sender_verify_fail sender verification failures ++*size_reject rejection because too big ++*skip_delivery delivery skipped in a queue run ++*smtp_confirmation SMTP confirmation on => lines ++ smtp_connection SMTP connections ++ smtp_incomplete_transaction incomplete SMTP transactions ++ smtp_mailauth AUTH argument to MAIL commands ++ smtp_no_mail session with no MAIL commands ++ smtp_protocol_error SMTP protocol errors ++ smtp_syntax_error SMTP syntax errors ++ subject contents of Subject: on <= lines ++ tls_certificate_verified certificate verification status ++*tls_cipher TLS cipher suite on <= and => lines ++ tls_peerdn TLS peer DN on <= and => lines ++ tls_sni TLS SNI on <= lines ++ unknown_in_list DNS lookup failed in list match ++ ++ all all of the above ++ ++More details on each of these items follows: ++ ++ * 8bitmime: This causes Exim to log any 8BITMIME status of received messages, ++ which may help in tracking down interoperability issues with ancient MTAs ++ that are not 8bit clean. This is added to the "<=" line, tagged with "M8S=" ++ and a value of "0", "7" or "8", corresponding to "not given", "7BIT" and ++ "8BITMIME" respectively. ++ ++ * acl_warn_skipped: When an ACL warn statement is skipped because one of its ++ conditions cannot be evaluated, a log line to this effect is written if ++ this log selector is set. ++ ++ * address_rewrite: This applies both to global rewrites and per-transport ++ rewrites, but not to rewrites in filters run as an unprivileged user ++ (because such users cannot access the log). ++ ++ * all_parents: Normally only the original and final addresses are logged on ++ delivery lines; with this selector, intermediate parents are given in ++ parentheses between them. ++ ++ * arguments: This causes Exim to write the arguments with which it was called ++ to the main log, preceded by the current working directory. This is a ++ debugging feature, added to make it easier to find out how certain MUAs ++ call /usr/sbin/sendmail. The logging does not happen if Exim has given up ++ root privilege because it was called with the -C or -D options. Arguments ++ that are empty or that contain white space are quoted. Non-printing ++ characters are shown as escape sequences. This facility cannot log ++ unrecognized arguments, because the arguments are checked before the ++ configuration file is read. The only way to log such cases is to interpose ++ a script such as util/logargs.sh between the caller and Exim. ++ ++ * connection_reject: A log entry is written whenever an incoming SMTP ++ connection is rejected, for whatever reason. ++ ++ * delay_delivery: A log entry is written whenever a delivery process is not ++ started for an incoming message because the load is too high or too many ++ messages were received on one connection. Logging does not occur if no ++ delivery process is started because queue_only is set or -odq was used. ++ ++ * deliver_time: For each delivery, the amount of real time it has taken to ++ perform the actual delivery is logged as DT=<time>, for example, "DT=1s". ++ ++ * delivery_size: For each delivery, the size of message delivered is added to ++ the "=>" line, tagged with S=. ++ ++ * dnslist_defer: A log entry is written if an attempt to look up a host in a ++ DNS black list suffers a temporary error. ++ ++ * etrn: Every valid ETRN command that is received is logged, before the ACL ++ is run to determine whether or not it is actually accepted. An invalid ETRN ++ command, or one received within a message transaction is not logged by this ++ selector (see smtp_syntax_error and smtp_protocol_error). ++ ++ * host_lookup_failed: When a lookup of a host's IP addresses fails to find ++ any addresses, or when a lookup of an IP address fails to find a host name, ++ a log line is written. This logging does not apply to direct DNS lookups ++ when routing email addresses, but it does apply to "byname" lookups. ++ ++ * ident_timeout: A log line is written whenever an attempt to connect to a ++ client's ident port times out. ++ ++ * incoming_interface: The interface on which a message was received is added ++ to the "<=" line as an IP address in square brackets, tagged by I= and ++ followed by a colon and the port number. The local interface and port are ++ also added to other SMTP log lines, for example "SMTP connection from", and ++ to rejection lines. ++ ++ * incoming_port: The remote port number from which a message was received is ++ added to log entries and Received: header lines, following the IP address ++ in square brackets, and separated from it by a colon. This is implemented ++ by changing the value that is put in the $sender_fullhost and ++ $sender_rcvhost variables. Recording the remote port number has become more ++ important with the widening use of NAT (see RFC 2505). ++ ++ * lost_incoming_connection: A log line is written when an incoming SMTP ++ connection is unexpectedly dropped. ++ ++ * outgoing_port: The remote port number is added to delivery log lines (those ++ containing => tags) following the IP address. This option is not included ++ in the default setting, because for most ordinary configurations, the ++ remote port number is always 25 (the SMTP port). ++ ++ * pid: The current process id is added to every log line, in square brackets, ++ immediately after the time and date. ++ ++ * queue_run: The start and end of every queue run are logged. ++ ++ * queue_time: The amount of time the message has been in the queue on the ++ local host is logged as QT=<time> on delivery ("=>") lines, for example, ++ "QT=3m45s". The clock starts when Exim starts to receive the message, so it ++ includes reception time as well as the delivery time for the current ++ address. This means that it may be longer than the difference between the ++ arrival and delivery log line times, because the arrival log line is not ++ written until the message has been successfully received. ++ ++ * queue_time_overall: The amount of time the message has been in the queue on ++ the local host is logged as QT=<time> on "Completed" lines, for example, ++ "QT=3m45s". The clock starts when Exim starts to receive the message, so it ++ includes reception time as well as the total delivery time. ++ ++ * received_recipients: The recipients of a message are listed in the main log ++ as soon as the message is received. The list appears at the end of the log ++ line that is written when a message is received, preceded by the word ++ "for". The addresses are listed after they have been qualified, but before ++ any rewriting has taken place. Recipients that were discarded by an ACL for ++ MAIL or RCPT do not appear in the list. ++ ++ * received_sender: The unrewritten original sender of a message is added to ++ the end of the log line that records the message's arrival, after the word ++ "from" (before the recipients if received_recipients is also set). ++ ++ * rejected_header: If a message's header has been received at the time a ++ rejection is written to the reject log, the complete header is added to the ++ log. Header logging can be turned off individually for messages that are ++ rejected by the local_scan() function (see section 44.2). ++ ++ * retry_defer: A log line is written if a delivery is deferred because a ++ retry time has not yet been reached. However, this "retry time not reached" ++ message is always omitted from individual message logs after the first ++ delivery attempt. ++ ++ * return_path_on_delivery: The return path that is being transmitted with the ++ message is included in delivery and bounce lines, using the tag P=. This is ++ omitted if no delivery actually happens, for example, if routing fails, or ++ if delivery is to /dev/null or to ":blackhole:". ++ ++ * sender_on_delivery: The message's sender address is added to every delivery ++ and bounce line, tagged by F= (for "from"). This is the original sender ++ that was received with the message; it is not necessarily the same as the ++ outgoing return path. ++ ++ * sender_verify_fail: If this selector is unset, the separate log line that ++ gives details of a sender verification failure is not written. Log lines ++ for the rejection of SMTP commands contain just "sender verify failed", so ++ some detail is lost. ++ ++ * size_reject: A log line is written whenever a message is rejected because ++ it is too big. ++ ++ * skip_delivery: A log line is written whenever a message is skipped during a ++ queue run because it is frozen or because another process is already ++ delivering it. The message that is written is "spool file is locked". ++ ++ * smtp_confirmation: The response to the final "." in the SMTP dialogue for ++ outgoing messages is added to delivery log lines in the form "C="<text>. A ++ number of MTAs (including Exim) return an identifying string in this ++ response. ++ ++ * smtp_connection: A log line is written whenever an SMTP connection is ++ established or closed, unless the connection is from a host that matches ++ hosts_connection_nolog. (In contrast, lost_incoming_connection applies only ++ when the closure is unexpected.) This applies to connections from local ++ processes that use -bs as well as to TCP/IP connections. If a connection is ++ dropped in the middle of a message, a log line is always written, whether ++ or not this selector is set, but otherwise nothing is written at the start ++ and end of connections unless this selector is enabled. ++ ++ For TCP/IP connections to an Exim daemon, the current number of connections ++ is included in the log message for each new connection, but note that the ++ count is reset if the daemon is restarted. Also, because connections are ++ closed (and the closure is logged) in subprocesses, the count may not ++ include connections that have been closed but whose termination the daemon ++ has not yet noticed. Thus, while it is possible to match up the opening and ++ closing of connections in the log, the value of the logged counts may not ++ be entirely accurate. ++ ++ * smtp_incomplete_transaction: When a mail transaction is aborted by RSET, ++ QUIT, loss of connection, or otherwise, the incident is logged, and the ++ message sender plus any accepted recipients are included in the log line. ++ This can provide evidence of dictionary attacks. ++ ++ * smtp_no_mail: A line is written to the main log whenever an accepted SMTP ++ connection terminates without having issued a MAIL command. This includes ++ both the case when the connection is dropped, and the case when QUIT is ++ used. It does not include cases where the connection is rejected right at ++ the start (by an ACL, or because there are too many connections, or ++ whatever). These cases already have their own log lines. ++ ++ The log line that is written contains the identity of the client in the ++ usual way, followed by D= and a time, which records the duration of the ++ connection. If the connection was authenticated, this fact is logged ++ exactly as it is for an incoming message, with an A= item. If the ++ connection was encrypted, CV=, DN=, and X= items may appear as they do for ++ an incoming message, controlled by the same logging options. ++ ++ Finally, if any SMTP commands were issued during the connection, a C= item ++ is added to the line, listing the commands that were used. For example, ++ ++ C=EHLO,QUIT ++ ++ shows that the client issued QUIT straight after EHLO. If there were fewer ++ than 20 commands, they are all listed. If there were more than 20 commands, ++ the last 20 are listed, preceded by "...". However, with the default ++ setting of 10 for smtp_accep_max_nonmail, the connection will in any case ++ have been aborted before 20 non-mail commands are processed. ++ ++ * smtp_mailauth: A third subfield with the authenticated sender, ++ colon-separated, is appended to the A= item for a message arrival or ++ delivery log line, if an AUTH argument to the SMTP MAIL command (see 33.2) ++ was accepted or used. ++ ++ * smtp_protocol_error: A log line is written for every SMTP protocol error ++ encountered. Exim does not have perfect detection of all protocol errors ++ because of transmission delays and the use of pipelining. If PIPELINING has ++ been advertised to a client, an Exim server assumes that the client will ++ use it, and therefore it does not count "expected" errors (for example, ++ RCPT received after rejecting MAIL) as protocol errors. ++ ++ * smtp_syntax_error: A log line is written for every SMTP syntax error ++ encountered. An unrecognized command is treated as a syntax error. For an ++ external connection, the host identity is given; for an internal connection ++ using -bs the sender identification (normally the calling user) is given. ++ ++ * subject: The subject of the message is added to the arrival log line, ++ preceded by "T=" (T for "topic", since S is already used for "size"). Any ++ MIME "words" in the subject are decoded. The print_topbitchars option ++ specifies whether characters with values greater than 127 should be logged ++ unchanged, or whether they should be rendered as escape sequences. ++ ++ * tls_certificate_verified: An extra item is added to <= and => log lines ++ when TLS is in use. The item is "CV=yes" if the peer's certificate was ++ verified, and "CV=no" if not. ++ ++ * tls_cipher: When a message is sent or received over an encrypted ++ connection, the cipher suite used is added to the log line, preceded by X=. ++ ++ * tls_peerdn: When a message is sent or received over an encrypted ++ connection, and a certificate is supplied by the remote host, the peer DN ++ is added to the log line, preceded by DN=. ++ ++ * tls_sni: When a message is received over an encrypted connection, and the ++ remote host provided the Server Name Indication extension, the SNI is added ++ to the log line, preceded by SNI=. ++ ++ * unknown_in_list: This setting causes a log entry to be written when the ++ result of a list match is failure because a DNS lookup failed. ++ ++ ++51.16 Message log ++----------------- ++ ++In addition to the general log files, Exim writes a log file for each message ++that it handles. The names of these per-message logs are the message ids, and ++they are kept in the msglog sub-directory of the spool directory. Each message ++log contains copies of the log lines that apply to the message. This makes it ++easier to inspect the status of an individual message without having to search ++the main log. A message log is deleted when processing of the message is ++complete, unless preserve_message_logs is set, but this should be used only ++with great care because they can fill up your disk very quickly. ++ ++On a heavily loaded system, it may be desirable to disable the use of ++per-message logs, in order to reduce disk I/O. This can be done by setting the ++message_logs option false. ++ ++ ++ ++=============================================================================== ++52. EXIM UTILITIES ++ ++A number of utility scripts and programs are supplied with Exim and are ++described in this chapter. There is also the Exim Monitor, which is covered in ++the next chapter. The utilities described here are: ++ ++ 52.1 exiwhat list what Exim processes are doing ++ 52.2 exiqgrep grep the queue ++ 52.3 exiqsumm summarize the queue ++ 52.4 exigrep search the main log ++ 52.5 exipick select messages on various criteria ++ 52.6 exicyclog cycle (rotate) log files ++ 52.7 eximstats extract statistics from the log ++ 52.8 exim_checkaccess check address acceptance from given IP ++ 52.9 exim_dbmbuild build a DBM file ++ 52.10 exinext extract retry information ++ 52.11 exim_dumpdb dump a hints database ++ 52.11 exim_tidydb clean up a hints database ++ 52.11 exim_fixdb patch a hints database ++ 52.15 exim_lock lock a mailbox file ++ ++Another utility that might be of use to sites with many MTAs is Tom Kistner's ++exilog. It provides log visualizations across multiple Exim servers. See http:/ ++/duncanthrax.net/exilog/ for details. ++ ++ ++52.1 Finding out what Exim processes are doing (exiwhat) ++-------------------------------------------------------- ++ ++On operating systems that can restart a system call after receiving a signal ++(most modern OS), an Exim process responds to the SIGUSR1 signal by writing a ++line describing what it is doing to the file exim-process.info in the Exim ++spool directory. The exiwhat script sends the signal to all Exim processes it ++can find, having first emptied the file. It then waits for one second to allow ++the Exim processes to react before displaying the results. In order to run ++exiwhat successfully you have to have sufficient privilege to send the signal ++to the Exim processes, so it is normally run as root. ++ ++Warning: This is not an efficient process. It is intended for occasional use by ++system administrators. It is not sensible, for example, to set up a script that ++sends SIGUSR1 signals to Exim processes at short intervals. ++ ++Unfortunately, the ps command that exiwhat uses to find Exim processes varies ++in different operating systems. Not only are different options used, but the ++format of the output is different. For this reason, there are some system ++configuration options that configure exactly how exiwhat works. If it doesn't ++seem to be working for you, check the following compile-time options: ++ ++EXIWHAT_PS_CMD the command for running ps ++EXIWHAT_PS_ARG the argument for ps ++EXIWHAT_EGREP_ARG the argument for egrep to select from ps output ++EXIWHAT_KILL_ARG the argument for the kill command ++ ++An example of typical output from exiwhat is ++ ++164 daemon: -q1h, listening on port 25 ++10483 running queue: waiting for 0tAycK-0002ij-00 (10492) ++10492 delivering 0tAycK-0002ij-00 to mail.ref.example ++ [10.19.42.42] (editor@ref.example) ++10592 handling incoming call from [192.168.243.242] ++10628 accepting a local non-SMTP message ++ ++The first number in the output line is the process number. The third line has ++been split here, in order to fit it on the page. ++ ++ ++52.2 Selective queue listing (exiqgrep) ++--------------------------------------- ++ ++This utility is a Perl script contributed by Matt Hubbard. It runs ++ ++exim -bpu ++ ++to obtain a queue listing with undelivered recipients only, and then greps the ++output to select messages that match given criteria. The following selection ++options are available: ++ ++-f <regex> ++ ++ Match the sender address using a case-insensitive search. The field that is ++ tested is enclosed in angle brackets, so you can test for bounce messages ++ with ++ ++ exiqgrep -f '^<>$' ++ ++-r <regex> ++ ++ Match a recipient address using a case-insensitve search. The field that is ++ tested is not enclosed in angle brackets. ++ ++-s <regex> ++ ++ Match against the size field. ++ ++-y <seconds> ++ ++ Match messages that are younger than the given time. ++ ++-o <seconds> ++ ++ Match messages that are older than the given time. ++ ++-z ++ ++ Match only frozen messages. ++ ++-x ++ ++ Match only non-frozen messages. ++ ++The following options control the format of the output: ++ ++-c ++ ++ Display only the count of matching messages. ++ ++-l ++ ++ Long format - display the full message information as output by Exim. This ++ is the default. ++ ++-i ++ ++ Display message ids only. ++ ++-b ++ ++ Brief format - one line per message. ++ ++-R ++ ++ Display messages in reverse order. ++ ++There is one more option, -h, which outputs a list of options. ++ ++ ++52.3 Summarizing the queue (exiqsumm) ++------------------------------------- ++ ++The exiqsumm utility is a Perl script which reads the output of "exim -bp" and ++produces a summary of the messages on the queue. Thus, you use it by running a ++command such as ++ ++exim -bp | exiqsumm ++ ++The output consists of one line for each domain that has messages waiting for ++it, as in the following example: ++ ++3 2322 74m 66m msn.com.example ++ ++Each line lists the number of pending deliveries for a domain, their total ++volume, and the length of time that the oldest and the newest messages have ++been waiting. Note that the number of pending deliveries is greater than the ++number of messages when messages have more than one recipient. ++ ++A summary line is output at the end. By default the output is sorted on the ++domain name, but exiqsumm has the options -a and -c, which cause the output to ++be sorted by oldest message and by count of messages, respectively. There are ++also three options that split the messages for each domain into two or more ++subcounts: -b separates bounce messages, -f separates frozen messages, and -s ++separates messages according to their sender. ++ ++The output of exim -bp contains the original addresses in the message, so this ++also applies to the output from exiqsumm. No domains from addresses generated ++by aliasing or forwarding are included (unless the one_time option of the ++redirect router has been used to convert them into "top level" addresses). ++ ++ ++52.4 Extracting specific information from the log (exigrep) ++----------------------------------------------------------- ++ ++The exigrep utility is a Perl script that searches one or more main log files ++for entries that match a given pattern. When it finds a match, it extracts all ++the log entries for the relevant message, not just those that match the ++pattern. Thus, exigrep can extract complete log entries for a given message, or ++all mail for a given user, or for a given host, for example. The input files ++can be in Exim log format or syslog format. If a matching log line is not ++associated with a specific message, it is included in exigrep's output without ++any additional lines. The usage is: ++ ++exigrep [-t<n>] [-I] [-l] [-v] <pattern> [<log file>] ... ++ ++If no log file names are given on the command line, the standard input is read. ++ ++The -t argument specifies a number of seconds. It adds an additional condition ++for message selection. Messages that are complete are shown only if they spent ++more than <n> seconds on the queue. ++ ++By default, exigrep does case-insensitive matching. The -I option makes it ++case-sensitive. This may give a performance improvement when searching large ++log files. Without -I, the Perl pattern matches use Perl's "/i" option; with -I ++they do not. In both cases it is possible to change the case sensitivity within ++the pattern by using "(?i)" or "(?-i)". ++ ++The -l option means "literal", that is, treat all characters in the pattern as ++standing for themselves. Otherwise the pattern must be a Perl regular ++expression. ++ ++The -v option inverts the matching condition. That is, a line is selected if it ++does not match the pattern. ++ ++If the location of a zcat command is known from the definition of ZCAT_COMMAND ++in Local/Makefile, exigrep automatically passes any file whose name ends in ++COMPRESS_SUFFIX through zcat as it searches it. ++ ++ ++52.5 Selecting messages by various criteria (exipick) ++----------------------------------------------------- ++ ++John Jetmore's exipick utility is included in the Exim distribution. It lists ++messages from the queue according to a variety of criteria. For details of ++exipick's facilities, visit the web page at http://www.exim.org/eximwiki/ ++ToolExipickManPage or run exipick with the --help option. ++ ++ ++52.6 Cycling log files (exicyclog) ++---------------------------------- ++ ++The exicyclog script can be used to cycle (rotate) mainlog and rejectlog files. ++This is not necessary if only syslog is being used, or if you are using log ++files with datestamps in their names (see section 51.3). Some operating systems ++have their own standard mechanisms for log cycling, and these can be used ++instead of exicyclog if preferred. There are two command line options for ++exicyclog: ++ ++ * -k <count> specifies the number of log files to keep, overriding the ++ default that is set when Exim is built. The default default is 10. ++ ++ * -l <path> specifies the log file path, in the same format as Exim's ++ log_file_path option (for example, "/var/log/exim_%slog"), again overriding ++ the script's default, which is to find the setting from Exim's ++ configuration. ++ ++Each time exicyclog is run the file names get "shuffled down" by one. If the ++main log file name is mainlog (the default) then when exicyclog is run mainlog ++becomes mainlog.01, the previous mainlog.01 becomes mainlog.02 and so on, up to ++the limit that is set in the script or by the -k option. Log files whose ++numbers exceed the limit are discarded. Reject logs are handled similarly. ++ ++If the limit is greater than 99, the script uses 3-digit numbers such as ++mainlog.001, mainlog.002, etc. If you change from a number less than 99 to one ++that is greater, or vice versa, you will have to fix the names of any existing ++log files. ++ ++If no mainlog file exists, the script does nothing. Files that "drop off" the ++end are deleted. All files with numbers greater than 01 are compressed, using a ++compression command which is configured by the COMPRESS_COMMAND setting in ++Local/Makefile. It is usual to run exicyclog daily from a root crontab entry of ++the form ++ ++1 0 * * * su exim -c /usr/exim/bin/exicyclog ++ ++assuming you have used the name "exim" for the Exim user. You can run exicyclog ++as root if you wish, but there is no need. ++ ++ ++52.7 Mail statistics (eximstats) ++-------------------------------- ++ ++A Perl script called eximstats is provided for extracting statistical ++information from log files. The output is either plain text, or HTML. Exim log ++files are also supported by the Lire system produced by the LogReport ++Foundation http://www.logreport.org. ++ ++The eximstats script has been hacked about quite a bit over time. The latest ++version is the result of some extensive revision by Steve Campbell. A lot of ++information is given by default, but there are options for suppressing various ++parts of it. Following any options, the arguments to the script are a list of ++files, which should be main log files. For example: ++ ++eximstats -nr /var/spool/exim/log/mainlog.01 ++ ++By default, eximstats extracts information about the number and volume of ++messages received from or delivered to various hosts. The information is sorted ++both by message count and by volume, and the top fifty hosts in each category ++are listed on the standard output. Similar information, based on email ++addresses or domains instead of hosts can be requested by means of various ++options. For messages delivered and received locally, similar statistics are ++also produced per user. ++ ++The output also includes total counts and statistics about delivery errors, and ++histograms showing the number of messages received and deliveries made in each ++hour of the day. A delivery with more than one address in its envelope (for ++example, an SMTP transaction with more than one RCPT command) is counted as a ++single delivery by eximstats. ++ ++Though normally more deliveries than receipts are reported (as messages may ++have multiple recipients), it is possible for eximstats to report more messages ++received than delivered, even though the queue is empty at the start and end of ++the period in question. If an incoming message contains no valid recipients, no ++deliveries are recorded for it. A bounce message is handled as an entirely ++separate message. ++ ++eximstats always outputs a grand total summary giving the volume and number of ++messages received and deliveries made, and the number of hosts involved in each ++case. It also outputs the number of messages that were delayed (that is, not ++completely delivered at the first attempt), and the number that had at least ++one address that failed. ++ ++The remainder of the output is in sections that can be independently disabled ++or modified by various options. It consists of a summary of deliveries by ++transport, histograms of messages received and delivered per time interval ++(default per hour), information about the time messages spent on the queue, a ++list of relayed messages, lists of the top fifty sending hosts, local senders, ++destination hosts, and destination local users by count and by volume, and a ++list of delivery errors that occurred. ++ ++The relay information lists messages that were actually relayed, that is, they ++came from a remote host and were directly delivered to some other remote host, ++without being processed (for example, for aliasing or forwarding) locally. ++ ++There are quite a few options for eximstats to control exactly what it outputs. ++These are documented in the Perl script itself, and can be extracted by running ++the command perldoc on the script. For example: ++ ++perldoc /usr/exim/bin/eximstats ++ ++ ++52.8 Checking access policy (exim_checkaccess) ++---------------------------------------------- ++ ++The -bh command line argument allows you to run a fake SMTP session with ++debugging output, in order to check what Exim is doing when it is applying ++policy controls to incoming SMTP mail. However, not everybody is sufficiently ++familiar with the SMTP protocol to be able to make full use of -bh, and ++sometimes you just want to answer the question "Does this address have access?" ++without bothering with any further details. ++ ++The exim_checkaccess utility is a "packaged" version of -bh. It takes two ++arguments, an IP address and an email address: ++ ++exim_checkaccess 10.9.8.7 A.User@a.domain.example ++ ++The utility runs a call to Exim with the -bh option, to test whether the given ++email address would be accepted in a RCPT command in a TCP/IP connection from ++the host with the given IP address. The output of the utility is either the ++word "accepted", or the SMTP error response, for example: ++ ++Rejected: ++550 Relay not permitted ++ ++When running this test, the utility uses "<>" as the envelope sender address ++for the MAIL command, but you can change this by providing additional options. ++These are passed directly to the Exim command. For example, to specify that the ++test is to be run with the sender address himself@there.example you can use: ++ ++exim_checkaccess 10.9.8.7 A.User@a.domain.example \ ++ -f himself@there.example ++ ++Note that these additional Exim command line items must be given after the two ++mandatory arguments. ++ ++Because the exim_checkaccess uses -bh, it does not perform callouts while ++running its checks. You can run checks that include callouts by using -bhc, but ++this is not yet available in a "packaged" form. ++ ++ ++52.9 Making DBM files (exim_dbmbuild) ++------------------------------------- ++ ++The exim_dbmbuild program reads an input file containing keys and data in the ++format used by the lsearch lookup (see section 9.3). It writes a DBM file using ++the lower-cased alias names as keys and the remainder of the information as ++data. The lower-casing can be prevented by calling the program with the -nolc ++option. ++ ++A terminating zero is included as part of the key string. This is expected by ++the dbm lookup type. However, if the option -nozero is given, exim_dbmbuild ++creates files without terminating zeroes in either the key strings or the data ++strings. The dbmnz lookup type can be used with such files. ++ ++The program requires two arguments: the name of the input file (which can be a ++single hyphen to indicate the standard input), and the name of the output file. ++It creates the output under a temporary name, and then renames it if all went ++well. ++ ++If the native DB interface is in use (USE_DB is set in a compile-time ++configuration file - this is common in free versions of Unix) the two file ++names must be different, because in this mode the Berkeley DB functions create ++a single output file using exactly the name given. For example, ++ ++exim_dbmbuild /etc/aliases /etc/aliases.db ++ ++reads the system alias file and creates a DBM version of it in /etc/aliases.db. ++ ++In systems that use the ndbm routines (mostly proprietary versions of Unix), ++two files are used, with the suffixes .dir and .pag. In this environment, the ++suffixes are added to the second argument of exim_dbmbuild, so it can be the ++same as the first. This is also the case when the Berkeley functions are used ++in compatibility mode (though this is not recommended), because in that case it ++adds a .db suffix to the file name. ++ ++If a duplicate key is encountered, the program outputs a warning, and when it ++finishes, its return code is 1 rather than zero, unless the -noduperr option is ++used. By default, only the first of a set of duplicates is used - this makes it ++compatible with lsearch lookups. There is an option -lastdup which causes it to ++use the data for the last duplicate instead. There is also an option -nowarn, ++which stops it listing duplicate keys to stderr. For other errors, where it ++doesn't actually make a new file, the return code is 2. ++ ++ ++52.10 Finding individual retry times (exinext) ++---------------------------------------------- ++ ++A utility called exinext (mostly a Perl script) provides the ability to fish ++specific information out of the retry database. Given a mail domain (or a ++complete address), it looks up the hosts for that domain, and outputs any retry ++information for the hosts or for the domain. At present, the retry information ++is obtained by running exim_dumpdb (see below) and post-processing the output. ++For example: ++ ++$ exinext piglet@milne.fict.example ++kanga.milne.example:192.168.8.1 error 146: Connection refused ++ first failed: 21-Feb-1996 14:57:34 ++ last tried: 21-Feb-1996 14:57:34 ++ next try at: 21-Feb-1996 15:02:34 ++roo.milne.example:192.168.8.3 error 146: Connection refused ++ first failed: 20-Jan-1996 13:12:08 ++ last tried: 21-Feb-1996 11:42:03 ++ next try at: 21-Feb-1996 19:42:03 ++ past final cutoff time ++ ++You can also give exinext a local part, without a domain, and it will give any ++retry information for that local part in your default domain. A message id can ++be used to obtain retry information pertaining to a specific message. This ++exists only when an attempt to deliver a message to a remote host suffers a ++message-specific error (see section 47.2). exinext is not particularly ++efficient, but then it is not expected to be run very often. ++ ++The exinext utility calls Exim to find out information such as the location of ++the spool directory. The utility has -C and -D options, which are passed on to ++the exim commands. The first specifies an alternate Exim configuration file, ++and the second sets macros for use within the configuration file. These ++features are mainly to help in testing, but might also be useful in ++environments where more than one configuration file is in use. ++ ++ ++52.11 Hints database maintenance ++-------------------------------- ++ ++Three utility programs are provided for maintaining the DBM files that Exim ++uses to contain its delivery hint information. Each program requires two ++arguments. The first specifies the name of Exim's spool directory, and the ++second is the name of the database it is to operate on. These are as follows: ++ ++ * retry: the database of retry information ++ ++ * wait-<transport name>: databases of information about messages waiting for ++ remote hosts ++ ++ * callout: the callout cache ++ ++ * ratelimit: the data for implementing the ratelimit ACL condition ++ ++ * misc: other hints data ++ ++The misc database is used for ++ ++ * Serializing ETRN runs (when smtp_etrn_serialize is set) ++ ++ * Serializing delivery to a specific host (when serialize_hosts is set in an ++ smtp transport) ++ ++ ++52.12 exim_dumpdb ++----------------- ++ ++The entire contents of a database are written to the standard output by the ++exim_dumpdb program, which has no options or arguments other than the spool and ++database names. For example, to dump the retry database: ++ ++exim_dumpdb /var/spool/exim retry ++ ++Two lines of output are produced for each entry: ++ ++T:mail.ref.example:192.168.242.242 146 77 Connection refused ++31-Oct-1995 12:00:12 02-Nov-1995 12:21:39 02-Nov-1995 20:21:39 * ++ ++The first item on the first line is the key of the record. It starts with one ++of the letters R, or T, depending on whether it refers to a routing or ++transport retry. For a local delivery, the next part is the local address; for ++a remote delivery it is the name of the remote host, followed by its failing IP ++address (unless retry_include_ip_address is set false on the smtp transport). ++If the remote port is not the standard one (port 25), it is added to the IP ++address. Then there follows an error code, an additional error code, and a ++textual description of the error. ++ ++The three times on the second line are the time of first failure, the time of ++the last delivery attempt, and the computed time for the next attempt. The line ++ends with an asterisk if the cutoff time for the last retry rule has been ++exceeded. ++ ++Each output line from exim_dumpdb for the wait-xxx databases consists of a host ++name followed by a list of ids for messages that are or were waiting to be ++delivered to that host. If there are a very large number for any one host, ++continuation records, with a sequence number added to the host name, may be ++seen. The data in these records is often out of date, because a message may be ++routed to several alternative hosts, and Exim makes no effort to keep ++cross-references. ++ ++ ++52.13 exim_tidydb ++----------------- ++ ++The exim_tidydb utility program is used to tidy up the contents of a hints ++database. If run with no options, it removes all records that are more than 30 ++days old. The age is calculated from the date and time that the record was last ++updated. Note that, in the case of the retry database, it is not the time since ++the first delivery failure. Information about a host that has been down for ++more than 30 days will remain in the database, provided that the record is ++updated sufficiently often. ++ ++The cutoff date can be altered by means of the -t option, which must be ++followed by a time. For example, to remove all records older than a week from ++the retry database: ++ ++exim_tidydb -t 7d /var/spool/exim retry ++ ++Both the wait-xxx and retry databases contain items that involve message ids. ++In the former these appear as data in records keyed by host - they were ++messages that were waiting for that host - and in the latter they are the keys ++for retry information for messages that have suffered certain types of error. ++When exim_tidydb is run, a check is made to ensure that message ids in database ++records are those of messages that are still on the queue. Message ids for ++messages that no longer exist are removed from wait-xxx records, and if this ++leaves any records empty, they are deleted. For the retry database, records ++whose keys are non-existent message ids are removed. The exim_tidydb utility ++outputs comments on the standard output whenever it removes information from ++the database. ++ ++Certain records are automatically removed by Exim when they are no longer ++needed, but others are not. For example, if all the MX hosts for a domain are ++down, a retry record is created for each one. If the primary MX host comes back ++first, its record is removed when Exim successfully delivers to it, but the ++records for the others remain because Exim has not tried to use those hosts. ++ ++It is important, therefore, to run exim_tidydb periodically on all the hints ++databases. You should do this at a quiet time of day, because it requires a ++database to be locked (and therefore inaccessible to Exim) while it does its ++work. Removing records from a DBM file does not normally make the file smaller, ++but all the common DBM libraries are able to re-use the space that is released. ++After an initial phase of increasing in size, the databases normally reach a ++point at which they no longer get any bigger, as long as they are regularly ++tidied. ++ ++Warning: If you never run exim_tidydb, the space used by the hints databases is ++likely to keep on increasing. ++ ++ ++52.14 exim_fixdb ++---------------- ++ ++The exim_fixdb program is a utility for interactively modifying databases. Its ++main use is for testing Exim, but it might also be occasionally useful for ++getting round problems in a live system. It has no options, and its interface ++is somewhat crude. On entry, it prompts for input with a right angle-bracket. A ++key of a database record can then be entered, and the data for that record is ++displayed. ++ ++If "d" is typed at the next prompt, the entire record is deleted. For all ++except the retry database, that is the only operation that can be carried out. ++For the retry database, each field is output preceded by a number, and data for ++individual fields can be changed by typing the field number followed by new ++data, for example: ++ ++> 4 951102:1000 ++ ++resets the time of the next delivery attempt. Time values are given as a ++sequence of digit pairs for year, month, day, hour, and minute. Colons can be ++used as optional separators. ++ ++ ++52.15 Mailbox maintenance (exim_lock) ++------------------------------------- ++ ++The exim_lock utility locks a mailbox file using the same algorithm as Exim. ++For a discussion of locking issues, see section 26.3. Exim_lock can be used to ++prevent any modification of a mailbox by Exim or a user agent while ++investigating a problem. The utility requires the name of the file as its first ++argument. If the locking is successful, the second argument is run as a command ++(using C's system() function); if there is no second argument, the value of the ++SHELL environment variable is used; if this is unset or empty, /bin/sh is run. ++When the command finishes, the mailbox is unlocked and the utility ends. The ++following options are available: ++ ++-fcntl ++ ++ Use fcntl() locking on the open mailbox. ++ ++-flock ++ ++ Use flock() locking on the open mailbox, provided the operating system ++ supports it. ++ ++-interval ++ ++ This must be followed by a number, which is a number of seconds; it sets ++ the interval to sleep between retries (default 3). ++ ++-lockfile ++ ++ Create a lock file before opening the mailbox. ++ ++-mbx ++ ++ Lock the mailbox using MBX rules. ++ ++-q ++ ++ Suppress verification output. ++ ++-retries ++ ++ This must be followed by a number; it sets the number of times to try to ++ get the lock (default 10). ++ ++-restore_time ++ ++ This option causes exim_lock to restore the modified and read times to the ++ locked file before exiting. This allows you to access a locked mailbox (for ++ example, to take a backup copy) without disturbing the times that the user ++ subsequently sees. ++ ++-timeout ++ ++ This must be followed by a number, which is a number of seconds; it sets a ++ timeout to be used with a blocking fcntl() lock. If it is not set (the ++ default), a non-blocking call is used. ++ ++-v ++ ++ Generate verbose output. ++ ++If none of -fcntl, -flock, -lockfile or -mbx are given, the default is to ++create a lock file and also to use fcntl() locking on the mailbox, which is the ++same as Exim's default. The use of -flock or -fcntl requires that the file be ++writeable; the use of -lockfile requires that the directory containing the file ++be writeable. Locking by lock file does not last for ever; Exim assumes that a ++lock file is expired if it is more than 30 minutes old. ++ ++The -mbx option can be used with either or both of -fcntl or -flock. It assumes ++-fcntl by default. MBX locking causes a shared lock to be taken out on the open ++mailbox, and an exclusive lock on the file /tmp/.n.m where n and m are the ++device number and inode number of the mailbox file. When the locking is ++released, if an exclusive lock can be obtained for the mailbox, the file in / ++tmp is deleted. ++ ++The default output contains verification of the locking that takes place. The ++-v option causes some additional information to be given. The -q option ++suppresses all output except error messages. ++ ++A command such as ++ ++exim_lock /var/spool/mail/spqr ++ ++runs an interactive shell while the file is locked, whereas ++ ++exim_lock -q /var/spool/mail/spqr <<End ++<some commands> ++End ++ ++runs a specific non-interactive sequence of commands while the file is locked, ++suppressing all verification output. A single command can be run by a command ++such as ++ ++exim_lock -q /var/spool/mail/spqr \ ++ "cp /var/spool/mail/spqr /some/where" ++ ++Note that if a command is supplied, it must be entirely contained within the ++second argument - hence the quotes. ++ ++ ++ ++=============================================================================== ++53. THE EXIM MONITOR ++ ++The Exim monitor is an application which displays in an X window information ++about the state of Exim's queue and what Exim is doing. An admin user can ++perform certain operations on messages from this GUI interface; however all ++such facilities are also available from the command line, and indeed, the ++monitor itself makes use of the command line to perform any actions requested. ++ ++ ++53.1 Running the monitor ++------------------------ ++ ++The monitor is started by running the script called eximon. This is a shell ++script that sets up a number of environment variables, and then runs the binary ++called eximon.bin. The default appearance of the monitor window can be changed ++by editing the Local/eximon.conf file created by editing exim_monitor/EDITME. ++Comments in that file describe what the various parameters are for. ++ ++The parameters that get built into the eximon script can be overridden for a ++particular invocation by setting up environment variables of the same names, ++preceded by "EXIMON_". For example, a shell command such as ++ ++EXIMON_LOG_DEPTH=400 eximon ++ ++(in a Bourne-compatible shell) runs eximon with an overriding setting of the ++LOG_DEPTH parameter. If EXIMON_LOG_FILE_PATH is set in the environment, it ++overrides the Exim log file configuration. This makes it possible to have ++eximon tailing log data that is written to syslog, provided that MAIL.INFO ++syslog messages are routed to a file on the local host. ++ ++X resources can be used to change the appearance of the window in the normal ++way. For example, a resource setting of the form ++ ++Eximon*background: gray94 ++ ++changes the colour of the background to light grey rather than white. The ++stripcharts are drawn with both the data lines and the reference lines in ++black. This means that the reference lines are not visible when on top of the ++data. However, their colour can be changed by setting a resource called ++"highlight" (an odd name, but that's what the Athena stripchart widget uses). ++For example, if your X server is running Unix, you could set up lighter ++reference lines in the stripcharts by obeying ++ ++xrdb -merge <<End ++Eximon*highlight: gray ++End ++ ++In order to see the contents of messages on the queue, and to operate on them, ++eximon must either be run as root or by an admin user. ++ ++The command-line parameters of eximon are passed to eximon.bin and may contain ++X11 resource parameters interpreted by the X11 library. In addition, if the ++first parameter starts with the string "gdb" then it is removed and the binary ++is invoked under gdb (the parameter is used as the gdb command-name, so ++versioned variants of gdb can be invoked). ++ ++The monitor's window is divided into three parts. The first contains one or ++more stripcharts and two action buttons, the second contains a "tail" of the ++main log file, and the third is a display of the queue of messages awaiting ++delivery, with two more action buttons. The following sections describe these ++different parts of the display. ++ ++ ++53.2 The stripcharts ++-------------------- ++ ++The first stripchart is always a count of messages on the queue. Its name can ++be configured by setting QUEUE_STRIPCHART_NAME in the Local/eximon.conf file. ++The remaining stripcharts are defined in the configuration script by regular ++expression matches on log file entries, making it possible to display, for ++example, counts of messages delivered to certain hosts or using certain ++transports. The supplied defaults display counts of received and delivered ++messages, and of local and SMTP deliveries. The default period between ++stripchart updates is one minute; this can be adjusted by a parameter in the ++Local/eximon.conf file. ++ ++The stripchart displays rescale themselves automatically as the value they are ++displaying changes. There are always 10 horizontal lines in each chart; the ++title string indicates the value of each division when it is greater than one. ++For example, "x2" means that each division represents a value of 2. ++ ++It is also possible to have a stripchart which shows the percentage fullness of ++a particular disk partition, which is useful when local deliveries are confined ++to a single partition. ++ ++This relies on the availability of the statvfs() function or equivalent in the ++operating system. Most, but not all versions of Unix that support Exim have ++this. For this particular stripchart, the top of the chart always represents ++100%, and the scale is given as "x10%". This chart is configured by setting ++SIZE_STRIPCHART and (optionally) SIZE_STRIPCHART_NAME in the Local/eximon.conf ++file. ++ ++ ++53.3 Main action buttons ++------------------------ ++ ++Below the stripcharts there is an action button for quitting the monitor. Next ++to this is another button marked "Size". They are placed here so that shrinking ++the window to its default minimum size leaves just the queue count stripchart ++and these two buttons visible. Pressing the "Size" button causes the window to ++expand to its maximum size, unless it is already at the maximum, in which case ++it is reduced to its minimum. ++ ++When expanding to the maximum, if the window cannot be fully seen where it ++currently is, it is moved back to where it was the last time it was at full ++size. When it is expanding from its minimum size, the old position is ++remembered, and next time it is reduced to the minimum it is moved back there. ++ ++The idea is that you can keep a reduced window just showing one or two ++stripcharts at a convenient place on your screen, easily expand it to show the ++full window when required, and just as easily put it back to what it was. The ++idea is copied from what the twm window manager does for its f.fullzoom action. ++The minimum size of the window can be changed by setting the MIN_HEIGHT and ++MIN_WIDTH values in Local/eximon.conf. ++ ++Normally, the monitor starts up with the window at its full size, but it can be ++built so that it starts up with the window at its smallest size, by setting ++START_SMALL=yes in Local/eximon.conf. ++ ++ ++53.4 The log display ++-------------------- ++ ++The second section of the window is an area in which a display of the tail of ++the main log is maintained. To save space on the screen, the timestamp on each ++log line is shortened by removing the date and, if log_timezone is set, the ++timezone. The log tail is not available when the only destination for logging ++data is syslog, unless the syslog lines are routed to a local file whose name ++is passed to eximon via the EXIMON_LOG_FILE_PATH environment variable. ++ ++The log sub-window has a scroll bar at its lefthand side which can be used to ++move back to look at earlier text, and the up and down arrow keys also have a ++scrolling effect. The amount of log that is kept depends on the setting of ++LOG_BUFFER in Local/eximon.conf, which specifies the amount of memory to use. ++When this is full, the earlier 50% of data is discarded - this is much more ++efficient than throwing it away line by line. The sub-window also has a ++horizontal scroll bar for accessing the ends of long log lines. This is the ++only means of horizontal scrolling; the right and left arrow keys are not ++available. Text can be cut from this part of the window using the mouse in the ++normal way. The size of this subwindow is controlled by parameters in the ++configuration file Local/eximon.conf. ++ ++Searches of the text in the log window can be carried out by means of the ^R ++and ^S keystrokes, which default to a reverse and a forward search, ++respectively. The search covers only the text that is displayed in the window. ++It cannot go further back up the log. ++ ++The point from which the search starts is indicated by a caret marker. This is ++normally at the end of the text in the window, but can be positioned explicitly ++by pointing and clicking with the left mouse button, and is moved automatically ++by a successful search. If new text arrives in the window when it is scrolled ++back, the caret remains where it is, but if the window is not scrolled back, ++the caret is moved to the end of the new text. ++ ++Pressing ^R or ^S pops up a window into which the search text can be typed. ++There are buttons for selecting forward or reverse searching, for carrying out ++the search, and for cancelling. If the "Search" button is pressed, the search ++happens and the window remains so that further searches can be done. If the ++"Return" key is pressed, a single search is done and the window is closed. If ^ ++C is typed the search is cancelled. ++ ++The searching facility is implemented using the facilities of the Athena text ++widget. By default this pops up a window containing both "search" and "replace" ++options. In order to suppress the unwanted "replace" portion for eximon, a ++modified version of the TextPop widget is distributed with Exim. However, the ++linkers in BSDI and HP-UX seem unable to handle an externally provided version ++of TextPop when the remaining parts of the text widget come from the standard ++libraries. The compile-time option EXIMON_TEXTPOP can be unset to cut out the ++modified TextPop, making it possible to build Eximon on these systems, at the ++expense of having unwanted items in the search popup window. ++ ++ ++53.5 The queue display ++---------------------- ++ ++The bottom section of the monitor window contains a list of all messages that ++are on the queue, which includes those currently being received or delivered, ++as well as those awaiting delivery. The size of this subwindow is controlled by ++parameters in the configuration file Local/eximon.conf, and the frequency at ++which it is updated is controlled by another parameter in the same file - the ++default is 5 minutes, since queue scans can be quite expensive. However, there ++is an "Update" action button just above the display which can be used to force ++an update of the queue display at any time. ++ ++When a host is down for some time, a lot of pending mail can build up for it, ++and this can make it hard to deal with other messages on the queue. To help ++with this situation there is a button next to "Update" called "Hide". If ++pressed, a dialogue box called "Hide addresses ending with" is put up. If you ++type anything in here and press "Return", the text is added to a chain of such ++texts, and if every undelivered address in a message matches at least one of ++the texts, the message is not displayed. ++ ++If there is an address that does not match any of the texts, all the addresses ++are displayed as normal. The matching happens on the ends of addresses so, for ++example, cam.ac.uk specifies all addresses in Cambridge, while ++xxx@foo.com.example specifies just one specific address. When any hiding has ++been set up, a button called "Unhide" is displayed. If pressed, it cancels all ++hiding. Also, to ensure that hidden messages do not get forgotten, a hide ++request is automatically cancelled after one hour. ++ ++While the dialogue box is displayed, you can't press any buttons or do anything ++else to the monitor window. For this reason, if you want to cut text from the ++queue display to use in the dialogue box, you have to do the cutting before ++pressing the "Hide" button. ++ ++The queue display contains, for each unhidden queued message, the length of ++time it has been on the queue, the size of the message, the message id, the ++message sender, and the first undelivered recipient, all on one line. If it is ++a bounce message, the sender is shown as "<>". If there is more than one ++recipient to which the message has not yet been delivered, subsequent ones are ++listed on additional lines, up to a maximum configured number, following which ++an ellipsis is displayed. Recipients that have already received the message are ++not shown. ++ ++If a message is frozen, an asterisk is displayed at the left-hand side. ++ ++The queue display has a vertical scroll bar, and can also be scrolled by means ++of the arrow keys. Text can be cut from it using the mouse in the normal way. ++The text searching facilities, as described above for the log window, are also ++available, but the caret is always moved to the end of the text when the queue ++display is updated. ++ ++ ++53.6 The queue menu ++------------------- ++ ++If the shift key is held down and the left button is clicked when the mouse ++pointer is over the text for any message, an action menu pops up, and the first ++line of the queue display for the message is highlighted. This does not affect ++any selected text. ++ ++If you want to use some other event for popping up the menu, you can set the ++MENU_EVENT parameter in Local/eximon.conf to change the default, or set ++EXIMON_MENU_EVENT in the environment before starting the monitor. The value set ++in this parameter is a standard X event description. For example, to run eximon ++using ctrl rather than shift you could use ++ ++EXIMON_MENU_EVENT='Ctrl<Btn1Down>' eximon ++ ++The title of the menu is the message id, and it contains entries which act as ++follows: ++ ++ * message log: The contents of the message log for the message are displayed ++ in a new text window. ++ ++ * headers: Information from the spool file that contains the envelope ++ information and headers is displayed in a new text window. See chapter 55 ++ for a description of the format of spool files. ++ ++ * body: The contents of the spool file containing the body of the message are ++ displayed in a new text window. There is a default limit of 20,000 bytes to ++ the amount of data displayed. This can be changed by setting the BODY_MAX ++ option at compile time, or the EXIMON_BODY_MAX option at run time. ++ ++ * deliver message: A call to Exim is made using the -M option to request ++ delivery of the message. This causes an automatic thaw if the message is ++ frozen. The -v option is also set, and the output from Exim is displayed in ++ a new text window. The delivery is run in a separate process, to avoid ++ holding up the monitor while the delivery proceeds. ++ ++ * freeze message: A call to Exim is made using the -Mf option to request that ++ the message be frozen. ++ ++ * thaw message: A call to Exim is made using the -Mt option to request that ++ the message be thawed. ++ ++ * give up on msg: A call to Exim is made using the -Mg option to request that ++ Exim gives up trying to deliver the message. A bounce message is generated ++ for any remaining undelivered addresses. ++ ++ * remove message: A call to Exim is made using the -Mrm option to request ++ that the message be deleted from the system without generating a bounce ++ message. ++ ++ * add recipient: A dialog box is displayed into which a recipient address can ++ be typed. If the address is not qualified and the QUALIFY_DOMAIN parameter ++ is set in Local/eximon.conf, the address is qualified with that domain. ++ Otherwise it must be entered as a fully qualified address. Pressing RETURN ++ causes a call to Exim to be made using the -Mar option to request that an ++ additional recipient be added to the message, unless the entry box is ++ empty, in which case no action is taken. ++ ++ * mark delivered: A dialog box is displayed into which a recipient address ++ can be typed. If the address is not qualified and the QUALIFY_DOMAIN ++ parameter is set in Local/eximon.conf, the address is qualified with that ++ domain. Otherwise it must be entered as a fully qualified address. Pressing ++ RETURN causes a call to Exim to be made using the -Mmd option to mark the ++ given recipient address as already delivered, unless the entry box is ++ empty, in which case no action is taken. ++ ++ * mark all delivered: A call to Exim is made using the -Mmad option to mark ++ all recipient addresses as already delivered. ++ ++ * edit sender: A dialog box is displayed initialized with the current ++ sender's address. Pressing RETURN causes a call to Exim to be made using ++ the -Mes option to replace the sender address, unless the entry box is ++ empty, in which case no action is taken. If you want to set an empty sender ++ (as in bounce messages), you must specify it as "<>". Otherwise, if the ++ address is not qualified and the QUALIFY_DOMAIN parameter is set in Local/ ++ eximon.conf, the address is qualified with that domain. ++ ++When a delivery is forced, a window showing the -v output is displayed. In ++other cases when a call to Exim is made, if there is any output from Exim (in ++particular, if the command fails) a window containing the command and the ++output is displayed. Otherwise, the results of the action are normally apparent ++from the log and queue displays. However, if you set ACTION_OUTPUT=yes in Local ++/eximon.conf, a window showing the Exim command is always opened, even if no ++output is generated. ++ ++The queue display is automatically updated for actions such as freezing and ++thawing, unless ACTION_QUEUE_UPDATE=no has been set in Local/eximon.conf. In ++this case the "Update" button has to be used to force an update of the display ++after one of these actions. ++ ++In any text window that is displayed as result of a menu action, the normal ++cut-and-paste facility is available, and searching can be carried out using ^R ++and ^S, as described above for the log tail window. ++ ++ ++ ++=============================================================================== ++54. SECURITY CONSIDERATIONS ++ ++This chapter discusses a number of issues concerned with security, some of ++which are also covered in other parts of this manual. ++ ++For reasons that this author does not understand, some people have promoted ++Exim as a "particularly secure" mailer. Perhaps it is because of the existence ++of this chapter in the documentation. However, the intent of the chapter is ++simply to describe the way Exim works in relation to certain security concerns, ++not to make any specific claims about the effectiveness of its security as ++compared with other MTAs. ++ ++What follows is a description of the way Exim is supposed to be. Best efforts ++have been made to try to ensure that the code agrees with the theory, but an ++absence of bugs can never be guaranteed. Any that are reported will get fixed ++as soon as possible. ++ ++ ++54.1 Building a more "hardened" Exim ++------------------------------------ ++ ++There are a number of build-time options that can be set in Local/Makefile to ++create Exim binaries that are "harder" to attack, in particular by a rogue Exim ++administrator who does not have the root password, or by someone who has ++penetrated the Exim (but not the root) account. These options are as follows: ++ ++ * ALT_CONFIG_PREFIX can be set to a string that is required to match the ++ start of any file names used with the -C option. When it is set, these file ++ names are also not allowed to contain the sequence "/../". (However, if the ++ value of the -C option is identical to the value of CONFIGURE_FILE in Local ++ /Makefile, Exim ignores -C and proceeds as usual.) There is no default ++ setting for ALT_CONFIG_PREFIX. ++ ++ If the permitted configuration files are confined to a directory to which ++ only root has access, this guards against someone who has broken into the ++ Exim account from running a privileged Exim with an arbitrary configuration ++ file, and using it to break into other accounts. ++ ++ * If a non-trusted configuration file (i.e. not the default configuration ++ file or one which is trusted by virtue of being listed in the ++ TRUSTED_CONFIG_LIST file) is specified with -C, or if macros are given with ++ -D (but see the next item), then root privilege is retained only if the ++ caller of Exim is root. This locks out the possibility of testing a ++ configuration using -C right through message reception and delivery, even ++ if the caller is root. The reception works, but by that time, Exim is ++ running as the Exim user, so when it re-execs to regain privilege for the ++ delivery, the use of -C causes privilege to be lost. However, root can test ++ reception and delivery using two separate commands. ++ ++ * The WHITELIST_D_MACROS build option declares some macros to be safe to ++ override with -D if the real uid is one of root, the Exim run-time user or ++ the CONFIGURE_OWNER, if defined. The potential impact of this option is ++ limited by requiring the run-time value supplied to -D to match a regex ++ that errs on the restrictive side. Requiring build-time selection of safe ++ macros is onerous but this option is intended solely as a transition ++ mechanism to permit previously-working configurations to continue to work ++ after release 4.73. ++ ++ * If DISABLE_D_OPTION is defined, the use of the -D command line option is ++ disabled. ++ ++ * FIXED_NEVER_USERS can be set to a colon-separated list of users that are ++ never to be used for any deliveries. This is like the never_users runtime ++ option, but it cannot be overridden; the runtime option adds additional ++ users to the list. The default setting is "root"; this prevents a non-root ++ user who is permitted to modify the runtime file from using Exim as a way ++ to get root. ++ ++ ++54.2 Root privilege ++------------------- ++ ++The Exim binary is normally setuid to root, which means that it gains root ++privilege (runs as root) when it starts execution. In some special cases (for ++example, when the daemon is not in use and there are no local deliveries), it ++may be possible to run Exim setuid to some user other than root. This is ++discussed in the next section. However, in most installations, root privilege ++is required for two things: ++ ++ * To set up a socket connected to the standard SMTP port (25) when ++ initialising the listening daemon. If Exim is run from inetd, this ++ privileged action is not required. ++ ++ * To be able to change uid and gid in order to read users' .forward files and ++ perform local deliveries as the receiving user or as specified in the ++ configuration. ++ ++It is not necessary to be root to do any of the other things Exim does, such as ++receiving messages and delivering them externally over SMTP, and it is ++obviously more secure if Exim does not run as root except when necessary. For ++this reason, a user and group for Exim to use must be defined in Local/Makefile ++. These are known as "the Exim user" and "the Exim group". Their values can be ++changed by the run time configuration, though this is not recommended. Often a ++user called exim is used, but some sites use mail or another user name ++altogether. ++ ++Exim uses setuid() whenever it gives up root privilege. This is a permanent ++abdication; the process cannot regain root afterwards. Prior to release 4.00, ++seteuid() was used in some circumstances, but this is no longer the case. ++ ++After a new Exim process has interpreted its command line options, it changes ++uid and gid in the following cases: ++ ++ * If the -C option is used to specify an alternate configuration file, or if ++ the -D option is used to define macro values for the configuration, and the ++ calling process is not running as root, the uid and gid are changed to ++ those of the calling process. However, if DISABLE_D_OPTION is defined in ++ Local/Makefile, the -D option may not be used at all. If WHITELIST_D_MACROS ++ is defined in Local/Makefile, then some macro values can be supplied if the ++ calling process is running as root, the Exim run-time user or ++ CONFIGURE_OWNER, if defined. ++ ++ * If the expansion test option (-be) or one of the filter testing options ( ++ -bf or -bF) are used, the uid and gid are changed to those of the calling ++ process. ++ ++ * If the process is not a daemon process or a queue runner process or a ++ delivery process or a process for testing address routing (started with -bt ++ ), the uid and gid are changed to the Exim user and group. This means that ++ Exim always runs under its own uid and gid when receiving messages. This ++ also applies when testing address verification (the -bv option) and testing ++ incoming message policy controls (the -bh option). ++ ++ * For a daemon, queue runner, delivery, or address testing process, the uid ++ remains as root at this stage, but the gid is changed to the Exim group. ++ ++The processes that initially retain root privilege behave as follows: ++ ++ * A daemon process changes the gid to the Exim group and the uid to the Exim ++ user after setting up one or more listening sockets. The initgroups() ++ function is called, so that if the Exim user is in any additional groups, ++ they will be used during message reception. ++ ++ * A queue runner process retains root privilege throughout its execution. Its ++ job is to fork a controlled sequence of delivery processes. ++ ++ * A delivery process retains root privilege throughout most of its execution, ++ but any actual deliveries (that is, the transports themselves) are run in ++ subprocesses which always change to a non-root uid and gid. For local ++ deliveries this is typically the uid and gid of the owner of the mailbox; ++ for remote deliveries, the Exim uid and gid are used. Once all the delivery ++ subprocesses have been run, a delivery process changes to the Exim uid and ++ gid while doing post-delivery tidying up such as updating the retry ++ database and generating bounce and warning messages. ++ ++ While the recipient addresses in a message are being routed, the delivery ++ process runs as root. However, if a user's filter file has to be processed, ++ this is done in a subprocess that runs under the individual user's uid and ++ gid. A system filter is run as root unless system_filter_user is set. ++ ++ * A process that is testing addresses (the -bt option) runs as root so that ++ the routing is done in the same environment as a message delivery. ++ ++ ++54.3 Running Exim without privilege ++----------------------------------- ++ ++Some installations like to run Exim in an unprivileged state for more of its ++operation, for added security. Support for this mode of operation is provided ++by the global option deliver_drop_privilege. When this is set, the uid and gid ++are changed to the Exim user and group at the start of a delivery process (and ++also queue runner and address testing processes). This means that address ++routing is no longer run as root, and the deliveries themselves cannot change ++to any other uid. ++ ++Leaving the binary setuid to root, but setting deliver_drop_privilege means ++that the daemon can still be started in the usual way, and it can respond ++correctly to SIGHUP because the re-invocation regains root privilege. ++ ++An alternative approach is to make Exim setuid to the Exim user and also setgid ++to the Exim group. If you do this, the daemon must be started from a root ++process. (Calling Exim from a root process makes it behave in the way it does ++when it is setuid root.) However, the daemon cannot restart itself after a ++SIGHUP signal because it cannot regain privilege. ++ ++It is still useful to set deliver_drop_privilege in this case, because it stops ++Exim from trying to re-invoke itself to do a delivery after a message has been ++received. Such a re-invocation is a waste of resources because it has no ++effect. ++ ++If restarting the daemon is not an issue (for example, if mua_wrapper is set, ++or inetd is being used instead of a daemon), having the binary setuid to the ++Exim user seems a clean approach, but there is one complication: ++ ++In this style of operation, Exim is running with the real uid and gid set to ++those of the calling process, and the effective uid/gid set to Exim's values. ++Ideally, any association with the calling process' uid/gid should be dropped, ++that is, the real uid/gid should be reset to the effective values so as to ++discard any privileges that the caller may have. While some operating systems ++have a function that permits this action for a non-root effective uid, quite a ++number of them do not. Because of this lack of standardization, Exim does not ++address this problem at this time. ++ ++For this reason, the recommended approach for "mostly unprivileged" running is ++to keep the Exim binary setuid to root, and to set deliver_drop_privilege. This ++also has the advantage of allowing a daemon to be used in the most ++straightforward way. ++ ++If you configure Exim not to run delivery processes as root, there are a number ++of restrictions on what you can do: ++ ++ * You can deliver only as the Exim user/group. You should explicitly use the ++ user and group options to override routers or local transports that ++ normally deliver as the recipient. This makes sure that configurations that ++ work in this mode function the same way in normal mode. Any implicit or ++ explicit specification of another user causes an error. ++ ++ * Use of .forward files is severely restricted, such that it is usually not ++ worthwhile to include them in the configuration. ++ ++ * Users who wish to use .forward would have to make their home directory and ++ the file itself accessible to the Exim user. Pipe and append-to-file ++ entries, and their equivalents in Exim filters, cannot be used. While they ++ could be enabled in the Exim user's name, that would be insecure and not ++ very useful. ++ ++ * Unless the local user mailboxes are all owned by the Exim user (possible in ++ some POP3 or IMAP-only environments): ++ ++ 1. They must be owned by the Exim group and be writeable by that group. ++ This implies you must set mode in the appendfile configuration, as well ++ as the mode of the mailbox files themselves. ++ ++ 2. You must set no_check_owner, since most or all of the files will not be ++ owned by the Exim user. ++ ++ 3. You must set file_must_exist, because Exim cannot set the owner ++ correctly on a newly created mailbox when unprivileged. This also ++ implies that new mailboxes need to be created manually. ++ ++These restrictions severely restrict what can be done in local deliveries. ++However, there are no restrictions on remote deliveries. If you are running a ++gateway host that does no local deliveries, setting deliver_drop_privilege ++gives more security at essentially no cost. ++ ++If you are using the mua_wrapper facility (see chapter 50), ++deliver_drop_privilege is forced to be true. ++ ++ ++54.4 Delivering to local files ++------------------------------ ++ ++Full details of the checks applied by appendfile before it writes to a file are ++given in chapter 26. ++ ++ ++54.5 Running local commands ++--------------------------- ++ ++There are a number of ways in which an administrator can configure Exim to run ++commands based upon received, untrustworthy, data. Further, in some ++configurations a user who can control a .forward file can also arrange to run ++commands. Configuration to check includes, but is not limited to: ++ ++ * Use of use_shell in the pipe transport: various forms of shell command ++ injection may be possible with this option present. It is dangerous and ++ should be used only with considerable caution. Consider constraints which ++ whitelist allowed characters in a variable which is to be used in a pipe ++ transport that has use_shell enabled. ++ ++ * A number of options such as forbid_filter_run, forbid_filter_perl, ++ forbid_filter_dlfunc and so forth which restrict facilities available to ++ .forward files in a redirect router. If Exim is running on a central mail ++ hub to which ordinary users do not have shell access, but home directories ++ are NFS mounted (for instance) then administrators should review the list ++ of these forbid options available, and should bear in mind that the options ++ that may need forbidding can change as new features are added between ++ releases. ++ ++ * The ${run...} expansion item does not use a shell by default, but ++ administrators can configure use of /bin/sh as part of the command. Such ++ invocations should be viewed with prejudicial suspicion. ++ ++ * Administrators who use embedded Perl are advised to explore how Perl's ++ taint checking might apply to their usage. ++ ++ * Use of ${expand...} is somewhat analagous to shell's eval builtin and ++ administrators are well advised to view its use with suspicion, in case ++ (for instance) it allows a local-part to contain embedded Exim directives. ++ ++ * Use of ${match_local_part...} and friends becomes more dangerous if Exim ++ was built with EXPAND_LISTMATCH_RHS defined: the second string in each can ++ reference arbitrary lists and files, rather than just being a list of ++ opaque strings. The EXPAND_LISTMATCH_RHS option was added and set false by ++ default because of real-world security vulnerabilities caused by its use ++ with untrustworthy data injected in, for SQL injection attacks. Consider ++ the use of the inlisti expansion condition instead. ++ ++ ++54.6 IPv4 source routing ++------------------------ ++ ++Many operating systems suppress IP source-routed packets in the kernel, but ++some cannot be made to do this, so Exim does its own check. It logs incoming ++IPv4 source-routed TCP calls, and then drops them. Things are all different in ++IPv6. No special checking is currently done. ++ ++ ++54.7 The VRFY, EXPN, and ETRN commands in SMTP ++---------------------------------------------- ++ ++Support for these SMTP commands is disabled by default. If required, they can ++be enabled by defining suitable ACLs. ++ ++ ++54.8 Privileged users ++--------------------- ++ ++Exim recognizes two sets of users with special privileges. Trusted users are ++able to submit new messages to Exim locally, but supply their own sender ++addresses and information about a sending host. For other users submitting ++local messages, Exim sets up the sender address from the uid, and doesn't ++permit a remote host to be specified. ++ ++However, an untrusted user is permitted to use the -f command line option in ++the special form -f <> to indicate that a delivery failure for the message ++should not cause an error report. This affects the message's envelope, but it ++does not affect the Sender: header. Untrusted users may also be permitted to ++use specific forms of address with the -f option by setting the ++untrusted_set_sender option. ++ ++Trusted users are used to run processes that receive mail messages from some ++other mail domain and pass them on to Exim for delivery either locally, or over ++the Internet. Exim trusts a caller that is running as root, as the Exim user, ++as any user listed in the trusted_users configuration option, or under any ++group listed in the trusted_groups option. ++ ++Admin users are permitted to do things to the messages on Exim's queue. They ++can freeze or thaw messages, cause them to be returned to their senders, remove ++them entirely, or modify them in various ways. In addition, admin users can run ++the Exim monitor and see all the information it is capable of providing, which ++includes the contents of files on the spool. ++ ++By default, the use of the -M and -q options to cause Exim to attempt delivery ++of messages on its queue is restricted to admin users. This restriction can be ++relaxed by setting the no_prod_requires_admin option. Similarly, the use of -bp ++(and its variants) to list the contents of the queue is also restricted to ++admin users. This restriction can be relaxed by setting ++no_queue_list_requires_admin. ++ ++Exim recognizes an admin user if the calling process is running as root or as ++the Exim user or if any of the groups associated with the calling process is ++the Exim group. It is not necessary actually to be running under the Exim ++group. However, if admin users who are not root or the Exim user are to access ++the contents of files on the spool via the Exim monitor (which runs ++unprivileged), Exim must be built to allow group read access to its spool ++files. ++ ++ ++54.9 Spool files ++---------------- ++ ++Exim's spool directory and everything it contains is owned by the Exim user and ++set to the Exim group. The mode for spool files is defined in the Local/ ++Makefile configuration file, and defaults to 0640. This means that any user who ++is a member of the Exim group can access these files. ++ ++ ++54.10 Use of argv[0] ++-------------------- ++ ++Exim examines the last component of argv[0], and if it matches one of a set of ++specific strings, Exim assumes certain options. For example, calling Exim with ++the last component of argv[0] set to "rsmtp" is exactly equivalent to calling ++it with the option -bS. There are no security implications in this. ++ ++ ++54.11 Use of %f formatting ++-------------------------- ++ ++The only use made of "%f" by Exim is in formatting load average values. These ++are actually stored in integer variables as 1000 times the load average. ++Consequently, their range is limited and so therefore is the length of the ++converted output. ++ ++ ++54.12 Embedded Exim path ++------------------------ ++ ++Exim uses its own path name, which is embedded in the code, only when it needs ++to re-exec in order to regain root privilege. Therefore, it is not root when it ++does so. If some bug allowed the path to get overwritten, it would lead to an ++arbitrary program's being run as exim, not as root. ++ ++ ++54.13 Dynamic module directory ++------------------------------ ++ ++Any dynamically loadable modules must be installed into the directory defined ++in "LOOKUP_MODULE_DIR" in Local/Makefile for Exim to permit loading it. ++ ++ ++54.14 Use of sprintf() ++---------------------- ++ ++A large number of occurrences of "sprintf" in the code are actually calls to ++string_sprintf(), a function that returns the result in malloc'd store. The ++intermediate formatting is done into a large fixed buffer by a function that ++runs through the format string itself, and checks the length of each conversion ++before performing it, thus preventing buffer overruns. ++ ++The remaining uses of sprintf() happen in controlled circumstances where the ++output buffer is known to be sufficiently long to contain the converted string. ++ ++ ++54.15 Use of debug_printf() and log_write() ++------------------------------------------- ++ ++Arbitrary strings are passed to both these functions, but they do their ++formatting by calling the function string_vformat(), which runs through the ++format string itself, and checks the length of each conversion. ++ ++ ++54.16 Use of strcat() and strcpy() ++---------------------------------- ++ ++These are used only in cases where the output buffer is known to be large ++enough to hold the result. ++ ++ ++ ++=============================================================================== ++55. FORMAT OF SPOOL FILES ++ ++A message on Exim's queue consists of two files, whose names are the message id ++followed by -D and -H, respectively. The data portion of the message is kept in ++the -D file on its own. The message's envelope, status, and headers are all ++kept in the -H file, whose format is described in this chapter. Each of these ++two files contains the final component of its own name as its first line. This ++is insurance against disk crashes where the directory is lost but the files ++themselves are recoverable. ++ ++Some people are tempted into editing -D files in order to modify messages. You ++need to be extremely careful if you do this; it is not recommended and you are ++on your own if you do it. Here are some of the pitfalls: ++ ++ * You must ensure that Exim does not try to deliver the message while you are ++ fiddling with it. The safest way is to take out a write lock on the -D ++ file, which is what Exim itself does, using fcntl(). If you update the file ++ in place, the lock will be retained. If you write a new file and rename it, ++ the lock will be lost at the instant of rename. ++ ++ * If you change the number of lines in the file, the value of $body_linecount ++ , which is stored in the -H file, will be incorrect. At present, this value ++ is not used by Exim, but there is no guarantee that this will always be the ++ case. ++ ++ * If the message is in MIME format, you must take care not to break it. ++ ++ * If the message is cryptographically signed, any change will invalidate the ++ signature. ++ ++All in all, modifying -D files is fraught with danger. ++ ++Files whose names end with -J may also be seen in the input directory (or its ++subdirectories when split_spool_directory is set). These are journal files, ++used to record addresses to which the message has been delivered during the ++course of a delivery attempt. If there are still undelivered recipients at the ++end, the -H file is updated, and the -J file is deleted. If, however, there is ++some kind of crash (for example, a power outage) before this happens, the -J ++file remains in existence. When Exim next processes the message, it notices the ++-J file and uses it to update the -H file before starting the next delivery ++attempt. ++ ++ ++55.1 Format of the -H file ++-------------------------- ++ ++The second line of the -H file contains the login name for the uid of the ++process that called Exim to read the message, followed by the numerical uid and ++gid. For a locally generated message, this is normally the user who sent the ++message. For a message received over TCP/IP via the daemon, it is normally the ++Exim user. ++ ++The third line of the file contains the address of the message's sender as ++transmitted in the envelope, contained in angle brackets. The sender address is ++empty for bounce messages. For incoming SMTP mail, the sender address is given ++in the MAIL command. For locally generated mail, the sender address is created ++by Exim from the login name of the current user and the configured ++qualify_domain. However, this can be overridden by the -f option or a leading ++"From " line if the caller is trusted, or if the supplied address is "<>" or an ++address that matches untrusted_set_senders. ++ ++The fourth line contains two numbers. The first is the time that the message ++was received, in the conventional Unix form - the number of seconds since the ++start of the epoch. The second number is a count of the number of messages ++warning of delayed delivery that have been sent to the sender. ++ ++There follow a number of lines starting with a hyphen. These can appear in any ++order, and are omitted when not relevant: ++ ++-acl <number> <length> ++ ++ This item is obsolete, and is not generated from Exim release 4.61 onwards; ++ -aclc and -aclm are used instead. However, -acl is still recognized, to ++ provide backward compatibility. In the old format, a line of this form is ++ present for every ACL variable that is not empty. The number identifies the ++ variable; the acl_cx variables are numbered 0-9 and the acl_mx variables ++ are numbered 10-19. The length is the length of the data string for the ++ variable. The string itself starts at the beginning of the next line, and ++ is followed by a newline character. It may contain internal newlines. ++ ++-aclc <rest-of-name> <length> ++ ++ A line of this form is present for every ACL connection variable that is ++ defined. Note that there is a space between -aclc and the rest of the name. ++ The length is the length of the data string for the variable. The string ++ itself starts at the beginning of the next line, and is followed by a ++ newline character. It may contain internal newlines. ++ ++-aclm <rest-of-name> <length> ++ ++ A line of this form is present for every ACL message variable that is ++ defined. Note that there is a space between -aclm and the rest of the name. ++ The length is the length of the data string for the variable. The string ++ itself starts at the beginning of the next line, and is followed by a ++ newline character. It may contain internal newlines. ++ ++-active_hostname <hostname> ++ ++ This is present if, when the message was received over SMTP, the value of ++ $smtp_active_hostname was different to the value of $primary_hostname. ++ ++-allow_unqualified_recipient ++ ++ This is present if unqualified recipient addresses are permitted in header ++ lines (to stop such addresses from being qualified if rewriting occurs at ++ transport time). Local messages that were input using -bnq and remote ++ messages from hosts that match recipient_unqualified_hosts set this flag. ++ ++-allow_unqualified_sender ++ ++ This is present if unqualified sender addresses are permitted in header ++ lines (to stop such addresses from being qualified if rewriting occurs at ++ transport time). Local messages that were input using -bnq and remote ++ messages from hosts that match sender_unqualified_hosts set this flag. ++ ++-auth_id <text> ++ ++ The id information for a message received on an authenticated SMTP ++ connection - the value of the $authenticated_id variable. ++ ++-auth_sender <address> ++ ++ The address of an authenticated sender - the value of the ++ $authenticated_sender variable. ++ ++-body_linecount <number> ++ ++ This records the number of lines in the body of the message, and is always ++ present. ++ ++-body_zerocount <number> ++ ++ This records the number of binary zero bytes in the body of the message, ++ and is present if the number is greater than zero. ++ ++-deliver_firsttime ++ ++ This is written when a new message is first added to the spool. When the ++ spool file is updated after a deferral, it is omitted. ++ ++-frozen <time> ++ ++ The message is frozen, and the freezing happened at <time>. ++ ++-helo_name <text> ++ ++ This records the host name as specified by a remote host in a HELO or EHLO ++ command. ++ ++-host_address <address>.<port> ++ ++ This records the IP address of the host from which the message was received ++ and the remote port number that was used. It is omitted for locally ++ generated messages. ++ ++-host_auth <text> ++ ++ If the message was received on an authenticated SMTP connection, this ++ records the name of the authenticator - the value of the ++ $sender_host_authenticated variable. ++ ++-host_lookup_failed ++ ++ This is present if an attempt to look up the sending host's name from its ++ IP address failed. It corresponds to the $host_lookup_failed variable. ++ ++-host_name <text> ++ ++ This records the name of the remote host from which the message was ++ received, if the host name was looked up from the IP address when the ++ message was being received. It is not present if no reverse lookup was ++ done. ++ ++-ident <text> ++ ++ For locally submitted messages, this records the login of the originating ++ user, unless it was a trusted user and the -oMt option was used to specify ++ an ident value. For messages received over TCP/IP, this records the ident ++ string supplied by the remote host, if any. ++ ++-interface_address <address>.<port> ++ ++ This records the IP address of the local interface and the port number ++ through which a message was received from a remote host. It is omitted for ++ locally generated messages. ++ ++-local ++ ++ The message is from a local sender. ++ ++-localerror ++ ++ The message is a locally-generated bounce message. ++ ++-local_scan <string> ++ ++ This records the data string that was returned by the local_scan() function ++ when the message was received - the value of the $local_scan_data variable. ++ It is omitted if no data was returned. ++ ++-manual_thaw ++ ++ The message was frozen but has been thawed manually, that is, by an ++ explicit Exim command rather than via the auto-thaw process. ++ ++-N ++ ++ A testing delivery process was started using the -N option to suppress any ++ actual deliveries, but delivery was deferred. At any further delivery ++ attempts, -N is assumed. ++ ++-received_protocol ++ ++ This records the value of the $received_protocol variable, which contains ++ the name of the protocol by which the message was received. ++ ++-sender_set_untrusted ++ ++ The envelope sender of this message was set by an untrusted local caller ++ (used to ensure that the caller is displayed in queue listings). ++ ++-spam_score_int <number> ++ ++ If a message was scanned by SpamAssassin, this is present. It records the ++ value of $spam_score_int. ++ ++-tls_certificate_verified ++ ++ A TLS certificate was received from the client that sent this message, and ++ the certificate was verified by the server. ++ ++-tls_cipher <cipher name> ++ ++ When the message was received over an encrypted connection, this records ++ the name of the cipher suite that was used. ++ ++-tls_peerdn <peer DN> ++ ++ When the message was received over an encrypted connection, and a ++ certificate was received from the client, this records the Distinguished ++ Name from that certificate. ++ ++Following the options there is a list of those addresses to which the message ++is not to be delivered. This set of addresses is initialized from the command ++line when the -t option is used and extract_addresses_remove_arguments is set; ++otherwise it starts out empty. Whenever a successful delivery is made, the ++address is added to this set. The addresses are kept internally as a balanced ++binary tree, and it is a representation of that tree which is written to the ++spool file. If an address is expanded via an alias or forward file, the ++original address is added to the tree when deliveries to all its child ++addresses are complete. ++ ++If the tree is empty, there is a single line in the spool file containing just ++the text "XX". Otherwise, each line consists of two letters, which are either Y ++or N, followed by an address. The address is the value for the node of the ++tree, and the letters indicate whether the node has a left branch and/or a ++right branch attached to it, respectively. If branches exist, they immediately ++follow. Here is an example of a three-node tree: ++ ++YY darcy@austen.fict.example ++NN alice@wonderland.fict.example ++NN editor@thesaurus.ref.example ++ ++After the non-recipients tree, there is a list of the message's recipients. ++This is a simple list, preceded by a count. It includes all the original ++recipients of the message, including those to whom the message has already been ++delivered. In the simplest case, the list contains one address per line. For ++example: ++ ++4 ++editor@thesaurus.ref.example ++darcy@austen.fict.example ++rdo@foundation ++alice@wonderland.fict.example ++ ++However, when a child address has been added to the top-level addresses as a ++result of the use of the one_time option on a redirect router, each line is of ++the following form: ++ ++<top-level address> <errors_to address> <length>,<parent number>#<flag bits> ++ ++The 01 flag bit indicates the presence of the three other fields that follow ++the top-level address. Other bits may be used in future to support additional ++fields. The <parent number> is the offset in the recipients list of the ++original parent of the "one time" address. The first two fields are the ++envelope sender that is associated with this address and its length. If the ++length is zero, there is no special envelope sender (there are then two space ++characters in the line). A non-empty field can arise from a redirect router ++that has an errors_to setting. ++ ++A blank line separates the envelope and status information from the headers ++which follow. A header may occupy several lines of the file, and to save effort ++when reading it in, each header is preceded by a number and an identifying ++character. The number is the number of characters in the header, including any ++embedded newlines and the terminating newline. The character is one of the ++following: ++ ++<blank> header in which Exim has no special interest ++"B" Bcc: header ++"C" Cc: header ++"F" From: header ++"I" Message-id: header ++"P" Received: header - P for "postmark" ++"R" Reply-To: header ++"S" Sender: header ++"T" To: header ++"*" replaced or deleted header ++ ++Deleted or replaced (rewritten) headers remain in the spool file for debugging ++purposes. They are not transmitted when the message is delivered. Here is a ++typical set of headers: ++ ++111P Received: by hobbit.fict.example with local (Exim 4.00) ++id 14y9EI-00026G-00; Fri, 11 May 2001 10:28:59 +0100 ++049 Message-Id: <E14y9EI-00026G-00@hobbit.fict.example> ++038* X-rewrote-sender: bb@hobbit.fict.example ++042* From: Bilbo Baggins <bb@hobbit.fict.example> ++049F From: Bilbo Baggins <B.Baggins@hobbit.fict.example> ++099* To: alice@wonderland.fict.example, rdo@foundation, ++darcy@austen.fict.example, editor@thesaurus.ref.example ++104T To: alice@wonderland.fict.example, rdo@foundation.example, ++darcy@austen.fict.example, editor@thesaurus.ref.example ++038 Date: Fri, 11 May 2001 10:28:59 +0100 ++ ++The asterisked headers indicate that the envelope sender, From: header, and To: ++header have been rewritten, the last one because routing expanded the ++unqualified domain foundation. ++ ++ ++ ++=============================================================================== ++56. SUPPORT FOR DKIM (DOMAINKEYS IDENTIFIED MAIL) ++ ++DKIM is a mechanism by which messages sent by some entity can be provably ++linked to a domain which that entity controls. It permits reputation to be ++tracked on a per-domain basis, rather than merely upon source IP address. DKIM ++is documented in RFC 4871. ++ ++Since version 4.70, DKIM support is compiled into Exim by default. It can be ++disabled by setting DISABLE_DKIM=yes in Local/Makefile. ++ ++Exim's DKIM implementation allows to ++ ++ 1. Sign outgoing messages: This function is implemented in the SMTP transport. ++ It can co-exist with all other Exim features, including transport filters. ++ ++ 2. Verify signatures in incoming messages: This is implemented by an ++ additional ACL (acl_smtp_dkim), which can be called several times per ++ message, with different signature contexts. ++ ++In typical Exim style, the verification implementation does not include any ++default "policy". Instead it enables you to build your own policy using Exim's ++standard controls. ++ ++Please note that verification of DKIM signatures in incoming mail is turned on ++by default for logging purposes. For each signature in incoming email, exim ++will log a line displaying the most important signature details, and the ++signature status. Here is an example (with line-breaks added for clarity): ++ ++2009-09-09 10:22:28 1MlIRf-0003LU-U3 DKIM: ++ d=facebookmail.com s=q1-2009b ++ c=relaxed/relaxed a=rsa-sha1 ++ i=@facebookmail.com t=1252484542 [verification succeeded] ++ ++You might want to turn off DKIM verification processing entirely for internal ++or relay mail sources. To do that, set the dkim_disable_verify ACL control ++modifier. This should typically be done in the RCPT ACL, at points where you ++accept mail from relay sources (internal hosts or authenticated senders). ++ ++ ++56.1 Signing outgoing messages ++------------------------------ ++ ++Signing is implemented by setting private options on the SMTP transport. These ++options take (expandable) strings as arguments. ++ +++--------------------------------------------------+ ++|dkim_domain|Use: smtp|Type: string*|Default: unset| +++--------------------------------------------------+ ++ ++MANDATORY: The domain you want to sign with. The result of this expanded option ++is put into the $dkim_domain expansion variable. ++ +++----------------------------------------------------+ ++|dkim_selector|Use: smtp|Type: string*|Default: unset| +++----------------------------------------------------+ ++ ++MANDATORY: This sets the key selector string. You can use the $dkim_domain ++expansion variable to look up a matching selector. The result is put in the ++expansion variable $dkim_selector which should be used in the dkim_private_key ++option along with $dkim_domain. ++ +++-------------------------------------------------------+ ++|dkim_private_key|Use: smtp|Type: string*|Default: unset| +++-------------------------------------------------------+ ++ ++MANDATORY: This sets the private key to use. You can use the $dkim_domain and ++$dkim_selector expansion variables to determine the private key to use. The ++result can either ++ ++ * be a valid RSA private key in ASCII armor, including line breaks. ++ ++ * start with a slash, in which case it is treated as a file that contains the ++ private key. ++ ++ * be "0", "false" or the empty string, in which case the message will not be ++ signed. This case will not result in an error, even if dkim_strict is set. ++ +++-------------------------------------------------+ ++|dkim_canon|Use: smtp|Type: string*|Default: unset| +++-------------------------------------------------+ ++ ++OPTIONAL: This option sets the canonicalization method used when signing a ++message. The DKIM RFC currently supports two methods: "simple" and "relaxed". ++The option defaults to "relaxed" when unset. Note: the current implementation ++only supports using the same canonicalization method for both headers and body. ++ +++--------------------------------------------------+ ++|dkim_strict|Use: smtp|Type: string*|Default: unset| +++--------------------------------------------------+ ++ ++OPTIONAL: This option defines how Exim behaves when signing a message that ++should be signed fails for some reason. When the expansion evaluates to either ++"1" or "true", Exim will defer. Otherwise Exim will send the message unsigned. ++You can use the $dkim_domain and $dkim_selector expansion variables here. ++ +++--------------------------------------------------------+ ++|dkim_sign_headers|Use: smtp|Type: string*|Default: unset| +++--------------------------------------------------------+ ++ ++OPTIONAL: When set, this option must expand to (or be specified as) a ++colon-separated list of header names. Headers with these names will be included ++in the message signature. When unspecified, the header names recommended in ++RFC4871 will be used. ++ ++ ++56.2 Verifying DKIM signatures in incoming mail ++----------------------------------------------- ++ ++Verification of DKIM signatures in incoming email is implemented via the ++acl_smtp_dkim ACL. By default, this ACL is called once for each syntactically ++(!) correct signature in the incoming message. ++ ++To evaluate the signature in the ACL a large number of expansion variables ++containing the signature status and its details are set up during the runtime ++of the ACL. ++ ++Calling the ACL only for existing signatures is not sufficient to build more ++advanced policies. For that reason, the global option dkim_verify_signers, and ++a global expansion variable $dkim_signers exist. ++ ++The global option dkim_verify_signers can be set to a colon-separated list of ++DKIM domains or identities for which the ACL acl_smtp_dkim is called. It is ++expanded when the message has been received. At this point, the expansion ++variable $dkim_signers already contains a colon-separated list of signer ++domains and identities for the message. When dkim_verify_signers is not ++specified in the main configuration, it defaults as: ++ ++dkim_verify_signers = $dkim_signers ++ ++This leads to the default behaviour of calling acl_smtp_dkim for each DKIM ++signature in the message. Current DKIM verifiers may want to explicitly call ++the ACL for known domains or identities. This would be achieved as follows: ++ ++dkim_verify_signers = paypal.com:ebay.com:$dkim_signers ++ ++This would result in acl_smtp_dkim always being called for "paypal.com" and ++"ebay.com", plus all domains and identities that have signatures in the ++message. You can also be more creative in constructing your policy. For ++example: ++ ++dkim_verify_signers = $sender_address_domain:$dkim_signers ++ ++If a domain or identity is listed several times in the (expanded) value of ++dkim_verify_signers, the ACL is only called once for that domain or identity. ++ ++Inside the acl_smtp_dkim, the following expansion variables are available (from ++most to least important): ++ ++$dkim_cur_signer ++ ++ The signer that is being evaluated in this ACL run. This can be a domain or ++ an identity. This is one of the list items from the expanded main option ++ dkim_verify_signers (see above). ++ ++$dkim_verify_status ++ ++ A string describing the general status of the signature. One of ++ ++ + none: There is no signature in the message for the current domain or ++ identity (as reflected by $dkim_cur_signer). ++ ++ + invalid: The signature could not be verified due to a processing error. ++ More detail is available in $dkim_verify_reason. ++ ++ + fail: Verification of the signature failed. More detail is available in ++ $dkim_verify_reason. ++ ++ + pass: The signature passed verification. It is valid. ++ ++$dkim_verify_reason ++ ++ A string giving a litte bit more detail when $dkim_verify_status is either ++ "fail" or "invalid". One of ++ ++ + pubkey_unavailable (when $dkim_verify_status="invalid"): The public key ++ for the domain could not be retrieved. This may be a temporary problem. ++ ++ + pubkey_syntax (when $dkim_verify_status="invalid"): The public key ++ record for the domain is syntactically invalid. ++ ++ + bodyhash_mismatch (when $dkim_verify_status="fail"): The calculated ++ body hash does not match the one specified in the signature header. ++ This means that the message body was modified in transit. ++ ++ + signature_incorrect (when $dkim_verify_status="fail"): The signature ++ could not be verified. This may mean that headers were modified, ++ re-written or otherwise changed in a way which is incompatible with ++ DKIM verification. It may of course also mean that the signature is ++ forged. ++ ++$dkim_domain ++ ++ The signing domain. IMPORTANT: This variable is only populated if there is ++ an actual signature in the message for the current domain or identity (as ++ reflected by $dkim_cur_signer). ++ ++$dkim_identity ++ ++ The signing identity, if present. IMPORTANT: This variable is only ++ populated if there is an actual signature in the message for the current ++ domain or identity (as reflected by $dkim_cur_signer). ++ ++$dkim_selector ++ ++ The key record selector string. ++ ++$dkim_algo ++ ++ The algorithm used. One of 'rsa-sha1' or 'rsa-sha256'. ++ ++$dkim_canon_body ++ ++ The body canonicalization method. One of 'relaxed' or 'simple'. ++ ++dkim_canon_headers ++ ++ The header canonicalization method. One of 'relaxed' or 'simple'. ++ ++$dkim_copiedheaders ++ ++ A transcript of headers and their values which are included in the ++ signature (copied from the 'z=' tag of the signature). ++ ++$dkim_bodylength ++ ++ The number of signed body bytes. If zero ("0"), the body is unsigned. If no ++ limit was set by the signer, "9999999999999" is returned. This makes sure ++ that this variable always expands to an integer value. ++ ++$dkim_created ++ ++ UNIX timestamp reflecting the date and time when the signature was created. ++ When this was not specified by the signer, "0" is returned. ++ ++$dkim_expires ++ ++ UNIX timestamp reflecting the date and time when the signer wants the ++ signature to be treated as "expired". When this was not specified by the ++ signer, "9999999999999" is returned. This makes it possible to do useful ++ integer size comparisons against this value. ++ ++$dkim_headernames ++ ++ A colon-separated list of names of headers included in the signature. ++ ++$dkim_key_testing ++ ++ "1" if the key record has the "testing" flag set, "0" if not. ++ ++$nosubdomains ++ ++ "1" if the key record forbids subdomaining, "0" otherwise. ++ ++$dkim_key_srvtype ++ ++ Service type (tag s=) from the key record. Defaults to "*" if not specified ++ in the key record. ++ ++$dkim_key_granularity ++ ++ Key granularity (tag g=) from the key record. Defaults to "*" if not ++ specified in the key record. ++ ++$dkim_key_notes ++ ++ Notes from the key record (tag n=). ++ ++In addition, two ACL conditions are provided: ++ ++dkim_signers ++ ++ ACL condition that checks a colon-separated list of domains or identities ++ for a match against the domain or identity that the ACL is currently ++ verifying (reflected by $dkim_cur_signer). This is typically used to ++ restrict an ACL verb to a group of domains or identities. For example: ++ ++ # Warn when Mail purportedly from GMail has no signature at all ++ warn log_message = GMail sender without DKIM signature ++ sender_domains = gmail.com ++ dkim_signers = gmail.com ++ dkim_status = none ++ ++dkim_status ++ ++ ACL condition that checks a colon-separated list of possible DKIM ++ verification results against the actual result of verification. This is ++ typically used to restrict an ACL verb to a list of verification outcomes, ++ for example: ++ ++ deny message = Mail from Paypal with invalid/missing signature ++ sender_domains = paypal.com:paypal.de ++ dkim_signers = paypal.com:paypal.de ++ dkim_status = none:invalid:fail ++ ++ The possible status keywords are: 'none','invalid','fail' and 'pass'. ++ Please see the documentation of the $dkim_verify_status expansion variable ++ above for more information of what they mean. ++ ++ ++ ++=============================================================================== ++57. ADDING NEW DRIVERS OR LOOKUP TYPES ++ ++The following actions have to be taken in order to add a new router, transport, ++authenticator, or lookup type to Exim: ++ ++ 1. Choose a name for the driver or lookup type that does not conflict with any ++ existing name; I will use "newdriver" in what follows. ++ ++ 2. Add to src/EDITME the line: ++ ++ <type>_NEWDRIVER=yes ++ ++ where <type> is ROUTER, TRANSPORT, AUTH, or LOOKUP. If the code is not to ++ be included in the binary by default, comment this line out. You should ++ also add any relevant comments about the driver or lookup type. ++ ++ 3. Add to src/config.h.defaults the line: ++ ++ #define <type>_NEWDRIVER ++ ++ 4. Edit src/drtables.c, adding conditional code to pull in the private header ++ and create a table entry as is done for all the other drivers and lookup ++ types. ++ ++ 5. Edit scripts/lookups-Makefile if this is a new lookup; there is a for-loop ++ near the bottom, ranging the "name_mod" variable over a list of all ++ lookups. Add your "NEWDRIVER" to that list. As long as the dynamic module ++ would be named newdriver.so, you can use the simple form that most lookups ++ have. ++ ++ 6. Edit Makefile in the appropriate sub-directory (src/routers, src/transports ++ , src/auths, or src/lookups); add a line for the new driver or lookup type ++ and add it to the definition of OBJ. ++ ++ 7. Create newdriver.h and newdriver.c in the appropriate sub-directory of src. ++ ++ 8. Edit scripts/MakeLinks and add commands to link the .h and .c files as for ++ other drivers and lookups. ++ ++Then all you need to do is write the code! A good way to start is to make a ++proforma by copying an existing module of the same type, globally changing all ++occurrences of the name, and cutting out most of the code. Note that any ++options you create must be listed in alphabetical order, because the tables are ++searched using a binary chop procedure. ++ ++There is a README file in each of the sub-directories of src describing the ++interface that is expected. ++ diff --git a/debian/patches/series b/debian/patches/series index 57dd216..d92ede3 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -8,3 +8,4 @@ 66_enlarge-dh-parameters-size.dpatch 67_unnecessaryCopt.diff 70_remove_exim-users_references.dpatch +80_addmanuallybuiltdocs.diff |