2 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
5 <title>HOWTO - Using Exim 4 and Mailman together</title>
6 <style type="text/css">
7 body { color: #00005a; background: white; }
8 a:link { color: #ff6600; }
9 a:visited { color: #990000; }
10 a:hover { color: #ff9933; }
14 <h1>HOWTO - Using Exim 4 and Mailman 2.1 together</h1>
16 <p>Mailman is a list manager with web front end and built in
17 archiving functions. Details can be found at <a
18 href="http://www.list.org/"> http://www.list.org/</a>. This
19 documentation describes the configuration of Exim (version 4) to
20 work with Mailman version 2.1</p>
22 <h2><a name="index">Index</a></h2>
25 <li><a href="#scope">Scope of this document</a></li>
26 <li><a href="#basic">Basic Configuration</a></li>
28 <li><a href="#mmconf">Mailman configuration</a></li>
29 <li><a href="#exconf">Exim configuration</a></li>
30 <li><a href="#maconf">Main configuration settings</a></li>
31 <li><a href="#roconf">Exim Router</a></li>
32 <li><a href="#taconf">Exim Transport</a></li>
34 <li><a href="#batune">Basic mailing list MTA tuning</a></li>
36 <li><a href="#retune">Receiver verification</a></li>
37 <li><a href="#rctune">Tuning of numbers of recipients</a></li>
38 <li><a href="#smtune">SMTP callback</a></li>
40 <li><a href="#verpin">Doing VERP and personalisation with exim
43 <li><a href="#verpmm">VERP within Mailman</a></li>
44 <li><a href="#persmm">Mailing list personalisation by Mailman</a></li>
45 <li><a href="#verpex">VERP expansion by Exim rather than
48 <li><a href="#virdom">Virtual domains</a></li>
49 <li><a href="#lispol">List policy management</a></li>
51 <li><a href="#conpol">Content scanning</a></li>
52 <li><a href="#incpol">Incoming message checks</a></li>
53 <li><a href="#mmapol">Mailman specific ACL checks</a></li>
55 <li><a href="#lisver">List verification</a></li>
56 <li><a href="#problem">Possible Problems</a></li>
57 <li><a href="#dochis">Document History</a></li>
58 <li><a href="#doccha">Document Changes</a></li>
59 <li><a href="#docfin">Final Word</a></li>
62 <h2><a href="#index"><a name="scope">Scope of this document</a></a></h2>
64 <p>This document describes how to set up a basic working
65 configuration using Exim 4 as an MTA for the Mailman MLM. The
66 assumption is made that the receiving MTA, Mailman and the list
67 distribution MTA are all on the same machine, and that Mailman
68 talks to Exim using SMTP to address <tt>127.0.0.1</tt></p>
70 <p>It also describes ways of using VERP delivery, both
71 conventionally (doing VERP from Mailman), and an alternative more
72 efficient technique where VERP expansion is done within exim.</p>
74 <p>Tuning and setting appropriate mailing list protection policies
75 is also covered in passing.</p>
77 <p>General installation, use, running and administration of either
78 Mailman or exim is not covered here - the documentation for the
79 programs concerned should be read for this information.</p>
81 <h2><a href="#index"><a name="basic">Basic Configuration</a></a></h2>
83 <h3><a href="#index"><a name="mmconf">Mailman configuration</a></a></h3>
85 <p>For basic operation there is no Mailman configuration needed
86 other than the standard options detailed in the Mailman install
87 documentation. The user/group settings for Mailman must match
88 those in the config fragments given below, and you need to have at
89 least configured <tt>DEFAULT_URL_HOST</tt> and
90 <tt>DEFAULT_EMAIL_HOST</tt> within Mailman, for example by editing
91 <tt>~mailman/Mailman/mm_cfg.py</tt> and setting the following
92 (substituting in your own domains):-</p>
95 # The host part of the URL used for your mailman install
96 DEFAULT_URL_HOST = 'www.example.com'
98 # The email domain of your lists
99 DEFAULT_EMAIL_HOST = 'list.example.com'
101 # Let Mailman know that the MTA needs no aliases setting
105 <p>The final setting above informs Mailman that it does not need
106 to prompt you to add aliases when creating a list (like Sendmail),
107 or modify other settings (like Postfix). Not setting this will
108 mean that Mailman nags you to do things that aren't necessary in
109 an Exim configuration.</p>
111 <p>After making a change to the Mailman configuration file you
112 need to restart the Mailman queue runners.</p>
115 ~mailman/bin/mailmanctl restart
118 <p>Mailman should also be set to deliver to the MTA using SMTP -
119 this is done by having <tt>DELIVERY_MODULE = 'SMTPDirect'</tt> in
120 the config file (which is the default mode of operation)</p>
123 <h3><a href="#index"><a name="exconf">Exim configuration</a></a></h3>
125 <p>The Exim configuration is built so that a list created within
126 Mailman automatically appears to Exim without the need for
127 defining any additional aliases (however Mailman may helpfully
128 show or email you a list of required aliases when you create a
129 list - you can just ignore those - if you have set the
130 <tt>MTA</tt> parameter it will stop doing this).</p>
132 <p>The drawback of this configuration is that it will work poorly
133 on systems supporting lists in several different mail domains.
134 While Mailman handles virtual domains, it does not yet support
135 having two distinct lists with the same name in different virtual
136 domains, using the same Mailman installation. This will
137 eventually change. (But see below for a variation on this scheme
138 that should accommodate virtual domains better.)</p>
140 <p>The configuration file excerpts below are for use in an already
141 functional Exim configuration. You also need to have an alias for
142 <tt>mailman</tt> within the <tt>mm_domains</tt>, this picks up
143 mail sent to the site list (or basically just sent in error), and
144 should forward to the Mailman Administrator. It appears that a
145 couple of Mailman messages mention the <tt>mailman-admin</tt>
146 address (this appears to be an error in Mailman or maybe a
147 packaging error), so I would suggest that <tt>mailman-admin</tt>
148 is aliased also to the Mailman Administrator.</p>
150 <p><i>[Note: the instructions in this document will work only with
151 Exim 4. It may be possible to adapt them for Exim 3, but frankly
152 it is not worth the trouble]</i></p>
154 <p>You will need to add some macros to the main section of your
155 Exim config file. You will also need to define one new transport
156 and add new routers. Additional ACLs may be used to handle policy
157 enforcement. Remember that the exim daemon needs restarting
158 before it sees configuration changes.</p>
160 <h3><a href="#index"><a name="maconf">Main configuration settings</a></a></h3>
162 <p>First, you need to add some macros to the top of your Exim
163 config file. These just make the routers and transport below a
164 bit cleaner. Obviously, you'll need to edit these based on how
165 you configured and installed Mailman.</p>
168 # Home dir for your Mailman installation -- aka Mailman's prefix
170 # By default this is set to "/usr/local/mailman"
171 # On a Red Hat/Fedora system using the RPM use "/var/mailman"
172 # On Debian using the deb package use "/var/lib/mailman"
173 # This is normally the same as ~mailman
176 # User and group for Mailman, should match your --with-mail-gid
177 # switch to Mailman's configure script.
178 # Value is normally "mailman"
182 # Domains that your lists are in - colon separated list
183 # you may wish to add these into local_domains as well
184 domainlist mm_domains=list.example.com
186 # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
188 # These values are derived from the ones above and should not need
189 # editing unless you have munged your mailman installation
191 # The path of the Mailman mail wrapper script
192 MM_WRAP=MM_HOME/mail/mailman
194 # The path of the list config file (used as a required file when
195 # verifying list addresses)
196 MM_LISTCHK=MM_HOME/lists/${lc::$local_part}/config.pck
199 <h3><a href="#index"><a name="roconf">Exim Router</a></a></h3>
201 <p>This router picks up all the addresses going to the Mailman
202 lists. Initially it selects only the domains that have may have
203 lists in, then selects where <tt>local_part</tt> matches a list
204 name (ie you can see a list config file). The suffixes pick up
205 all the Mailman admin addresses<p>
207 <p>The router should be placed in the router section (ie somewhere
208 after the <tt>"begin routers"</tt> line of your config file).
209 Normally you would place it just after the aliases router (since
210 that will pick up the <tt>mailman</tt> master contact
216 domains = +mm_domains
217 require_files = MM_LISTCHK
218 local_part_suffix_optional
219 local_part_suffix = -admin : \
220 -bounces : -bounces+* : \
221 -confirm : -confirm+* : \
223 -owner : -request : \
224 -subscribe : -unsubscribe
225 transport = mailman_transport
228 <h3><a href="#index"><a name="taconf">Exim Transport</a></a></h3>
230 <p>The transport for Exim 4 can be placed anywhere where under the
231 <tt>begin transports</tt> line of your Exim config file.</p>
233 <p>The <tt>if def:local_part_suffix</tt> section selects whether
234 the suffix is used as the mailman command, or whether there is no
235 suffix and so <tt>post</tt> is passed as a command.</p>
237 <p>The <tt>sg</tt> phrase strips the VERP information (if any)
244 '${if def:local_part_suffix \
245 {${sg{$local_part_suffix}{-(\\w+)(\\+.*)?}{\$1}}} \
248 current_directory = MM_HOME
249 home_directory = MM_HOME
255 <h2><a href="#index"><a name="batune">Basic mailing list MTA tuning</a></a></h2>
257 <p>Exim has a lot configurability, especially where the ACL
258 (Access Control Lists) used during SMTP reception are concerned.
259 MTA policy needs to be tuned so that list traffic is not affected
260 by ACLs intended for qualifying traffic coming in from outside.
261 Later in this document some suggestions are made regarding
262 filtering traffic that is going into the mailing list, however
265 <h3><a href="#index"><a name="retune">Receiver verification</a></a></h3>
267 <p>Exim's receiver verification feature is very useful -- it lets
268 Exim reject unrouteable addresses at SMTP time. However, this is
269 most useful for externally-originating mail that is addresses to
270 mail in one of your local domains. For Mailman list traffic, mail
271 originates on your server, and is addressed to random external
272 domains that are not under your control. Furthermore, each
273 message is addressed to many recipients -- up to 500 if you use
274 Mailman's default configuration, and don't tweak
275 <tt>SMTP_MAX_RCPTS</tt>.</p>
277 <p>Doing receiver verification on Mailman list traffic is a recipe
278 for trouble. In particular, Exim will attempt to route every
279 recipient addresses in outgoing Mailman list posts. Even though
280 this requires nothing more than a few DNS lookups for each
281 address, it can still introduce significant delays (because these
282 verifications have to be done serially as you attempt handoff to
283 exim). Therefore, you should disable recipient verification for
286 <p>Under Exim 4, this is probably already taken care of for you by
287 the default recipient verification ACL statement (in the "RCPT TO"
291 accept domains = +local_domains
293 message = unknown user
297 <p>which only does recipient verification on addresses in your
298 domain. (That's not exactly the same as doing recipient
299 verification only on messages coming from non-127.0.0.1 hosts, but
300 it should do the trick for Mailman). Obviously if the next ACL
301 does verification on non-local addresses you will need to deal
304 <p>Alternatively you can add an early get-out in the "RCPT TO"
305 ACL), which <i>trusts</i> all traffic coming from the loopback IP
309 accept hosts = 127.0.0.1
312 <h3><a href="#index"><a name="rctune">Tuning of numbers of recipients</a></a></h3>
314 <p>By default Mailman will send up to 500 recipients on each
315 message it injects into exim. However this is not necessarily a
316 good configuration for exim since it will route all those
317 recipients before starting deliveries to any of them.
318 Additionally some ACL configurations have tests on the maximum
319 number of recipients (which is a good reason for having a get out
320 ACL for list traffic as described above)</p>
322 <p>I would suggest setting Mailman to send a maximum of 5 to 50
323 recipients on a single mail (setting it lower decreases list
324 latency, but increases the work that Mailman and exim have to do),
325 and change it to send a maximum of 30 messages per SMTP
326 connection. To reflect this you should also change the exim
327 parameter <tt>smtp_accept_queue_per_connection</tt> to be 30 as
330 <p>For example, add the following lines to
331 <tt>~mailman/Mailman/mm_cfg.py</tt>:</p>
334 # Max recipients for each message
336 # Max messages sent in each SMTP connection
337 SMTP_MAX_SESSIONS_PER_CONNECTION = 30
340 <p>Tuning a mailing list system is very much a black art, and
341 depends on the type of lists you host, their throughput, size and
342 the bandwidth available. In general, tuning is only a significant
343 issue if you are pushing your system near its operational
346 <h2><a href="#index"><a name="verpin">Doing VERP and personalisation with exim and Mailman</a></a></h2>
348 <h3><a href="#index"><a name="verpmm">VERP within Mailman</a></a></h3>
350 <p><a href="http://cr.yp.to/proto/verp.txt">VERP</a> (Variable
351 Envelope Return Paths) encodes the (original) receipient address
352 in the sender address. The reason for doing this is that it means
353 bounces are sent to an address which has the original recipient
354 address encoded in it - meaning you know which recipient address
355 caused the bounce. This makes automatic bounce handling very
356 effective - the normal method of parsing the bouncing address out
357 of the bounce message is very prone to failure, especially in the
358 case of foreign MTAs which use different addressing standards, or
359 where mail forwarding is involved.</p>
361 <p>VERP will send one email, with a separate envelope sender
362 (return path), for each of your subscribers - this means that it
363 will generate more traffic since you cannot bundle up deliveries
365 href="http://wiki.list.org/display/DOC/So+what+is+this+VERP+stuff">analysis
366 of the costs of VERP</a> can be found in the <a
367 href="http://wiki.list.org/">Mailman WIKI</a>.</p>
369 <p>VERP settings within Mailman are done on a per-installation
370 basis - ie they affect all the lists within the installation. To
371 configure VERP within Mailman read the information in
372 <tt>~mailman/Mailman/Default.py</tt> for the options that start
373 with <tt>VERP</tt>. In a nutshell, all you need to do to enable
374 VERP with Exim is to add these lines to
375 <tt>~mailman/Mailman/mm_cfg.py</tt>:</p>
378 VERP_PASSWORD_REMINDERS = 1
379 VERP_PERSONALIZED_DELIVERIES = 1
380 VERP_CONFIRMATIONS = 1
381 VERP_DELIVERY_INTERVAL = 1
384 <p>(The router and ACLs above are smart enough to deal with VERP
387 <p>This configuration on its own will make the monthly password
388 reminders, confirmations and all list postings be sent out using
391 <p>If you wish to have the advantages of VERP with a lower
392 bandwidth cost, you can enable VERP on occasional list postings
393 rather than on every posting. Mailman will still VERP on all
394 password reminders and confirmations (these are already inherently
395 single recipient mailings), but only on occasional list postings.
396 To make Mailman use VERP on every twentieth list posting (using
397 bulk delivery for the other 19), change:-</p>
400 VERP_DELIVERY_INTERVAL = 20
403 <p>The downside to doing this is that Mailman may fail to notice a
404 bouncing address if it does not receive at least one bounce per
405 day, so ideally this approach should only be taken if the lists
406 have more than 20 message per day throughput.</p>
408 <h3><a href="#index"><a name="persmm">Mailing list personalisation by Mailman</a></a></h3>
410 <p>Mailman can also personalise each message it sends out on a
411 list. This allows, for example, the recipient's own address to
412 appear as the To: header, or information specific to them to be
413 placed in the mail footer (although at present personalisation can
414 only be done for normal mail delivery - not for digest
415 subscribers). This personalisation comes at a cost of an
416 individual message per recipient (ie same bandwidth requirements
417 as full VERP) and some processing costs for Mailman.</p>
419 <p>To enable personalisation, add the following configuration item
420 to <tt>~mailman/Mailman/mm_cfg.py</tt> (you should also set the
421 VERP settings from above since you have already incurred the costs
425 OWNERS_CAN_ENABLE_PERSONALIZATION = 1
428 <p>You will then find that in the list administration web
429 interface a new set of options has appeared in the <i>Non-digest
430 options</i> section.</p>
432 <h3><a href="#index"><a name="verpex">VERP expansion by exim rather than Mailman</a></a></h3>
434 <p>One drawback of VERP is that as well as increasing the
435 bandwidth outgoing mail requires, it also causes Mailman to send
436 one separate message per recipient from Mailman to exim - causing
437 exim to have many many more queue entries and consequently more
438 queue disk space. For example a 20,000 recipient list would
439 require 400MB minimum temporary queue storage for each 20KB
440 message sent to the list. There are also issues of increasing
441 disk traffic/throughput and losing some disk caching
444 <p>These local load problems can be overcome by doing the VERP
445 expansion as the message is sent out from the MTA over network
446 SMTP rather than as the message is injected into the MTA. It will
447 come as no surprise that exim can be configured to do just
450 <p>Firstly we need to pick up outgoing Mailman mail and send it to
451 a specialised VERP transport. This is done using a router which
452 should be placed just before your normal <tt>dnslookup</tt> router
453 for remote addresses:-</p>
456 # Pick up on messages from our local mailman and route them via our
457 # special VERP-enabled transport
461 # we only consider messages sent in through loopback
462 condition = ${if or{{eq{$sender_host_address}{127.0.0.1}} \
463 {eq{$sender_host_address}{::1}}}{yes}{no}}
464 # we do not do this for traffic going to the local machine
465 domains = !+local_domains:!+mm_domains
466 ignore_target_hosts = <; 0.0.0.0; \
469 ::1/128;fe80::/10;fe \
471 # only the un-VERPed bounce addresses are handled
472 senders = "*-bounces@*"
473 transport = mailman_verp_smtp
476 <p>Addresses selected by this router should then be passed on to
477 an SMTP transport that does VERP expansion. This should be placed
478 anywhere within the transport section:-</p>
481 # Mailman VERP envelope sender address formatting. This seems not to use
482 # quoted-printable encoding of the address, but instead just replaces the
483 # '@' in the recipient address with '='.
487 # put recipient address into return_path
489 ${local_part:$return_path}+$local_part=$domain@${domain:$return_path}
490 # must restrict to one recipient at a time
492 # Errors-To: may carry old return_path
493 headers_remove = Errors-To
494 headers_add = Errors-To: ${return_path}
497 <p>Once this has been configured, Mailman can be set to not do
498 VERP expansion on normal list deliveries - the VERP
499 configuration should now look like:-</p>
501 VERP_PASSWORD_REMINDERS = 1
502 VERP_PERSONALIZED_DELIVERIES = 1
503 VERP_CONFIRMATIONS = 1
504 VERP_DELIVERY_INTERVAL = 0
507 <p>If you have set personalisation on any list, this will still be
508 handled, and VERPed, by Mailman.</p>
510 <h2><a href="#index"><a name="virdom">Virtual domains</a></a></h2>
512 <p>One approach to handling virtual domains is to use a separate
513 Mailman installation for each virtual domain. (Currently, this is
514 the only way to have lists with the same name in different virtual
515 domains handled by the same machine.)</p>
517 <p>In this case, you must change the <tt>MM_HOME</tt> macro to
518 something like this:-</p>
521 MM_HOME=/virtual/${lc::$domain}/mailman
524 <p>and modify the <tt>mm_domains</tt> domain list appropriately.</p>
526 <h2><a href="#index"><a name="lispol">List policy management</a></a></h2>
528 <p>Most list policy handling is done within Mailman using the Web
529 GUI. However some issues may be better handled by the MTA,
530 especially matters of overall site policy (not just mailing list
531 policy). For example you may wish to do virus or spam scanning on
532 incoming messages.</p>
534 <p>In general you exclude outgoing list mail from any policy
535 controls. This is because outgoing list mail has already been
536 through the policy controls on the way into the system.
537 Additionally spam scanning (for example) is a machine intensive
538 operation, and scanning a message that has already been scanned,
539 and then replicated to many recipients, is going to be very
540 expensive as well as ineffective. For this reason you will
541 normally have an <tt>accept</tt> clause early on in your ACLs that
542 causes Mailman generated traffic to bypass the machine intensive
545 <h3><a href="#index"><a name="conpol">Content scanning</a></a></h3>
547 <p>I would recommend that mailing lists now scan for both spam and
548 viruses on incoming mail - this is due to the potential for a
549 compromised windows machine belonging to a subscriber managing to
550 distribute unwanted content via the list. This causes problems
551 not only to the list reputation, but also to the list manager who
552 will get many many bounces from subscribers who do content
553 scanning on their own incoming mail.</p>
555 <p>The best way to do this is using the <a
556 href="http://duncanthrax.net/exiscan-acl/">exiscan</a> extension
557 along with a virus scanner such as <a
558 href="http://duncanthrax.net/exiscan-acl/">clam-av</a> and a spam
559 content scanner such as <a
560 href="http://www.spamassassin.org/">SpamAssassin</a>. Configuring
561 these is beyond the scope of this document, however Tim Jackson
562 has a very good set of <a
563 href="http://www.timj.co.uk/linux/Exim-SpamAndVirusScanning.pdf">PDF
564 documentation</a> on integrating these.</p>
566 <p>One thing to note is that if you add full SpamAssassin headers
567 onto list messages this bulks up the messages significantly.
568 These headers are also available to list subscribers, which might
569 make it easier for someone malicious to work out how to evade your
570 spam scanning strategy. I would suggest that Spam headers are not
571 added for Mailman incoming mail, or minimal (short) headers added,
572 or that they are stripped somewhere. However having minimal
573 headers on means that you can, for example, moderate all messages
574 which have a given spam rating (as well as bouncing messages with
575 a very high rating).</p>
577 <h3><a href="#index"><a name="incpol">Incoming message checks</a></a></h3>
579 <p>You may wish to apply various checks to incoming messages to
580 ensure that they are sane. These may include:-</p>
583 <li>DNSBL checks</li>
584 <li>Header checks</li>
585 <li>Sender callback verification</li>
588 <p>However all of these do have some degree of false positive
589 ratings. You need to be aware of how much of your user base you
590 may alienate by imposing too strict a set of controls, and balance
591 that against the reduced amount of unwanted bulk mail.</p>
593 <h3><a href="#index"><a name="mmapol">Mailman specific ACL checks</a></a></h3>
595 <p>Lists should never receive bounce messages to the posting
596 address unless the bounced message is either a forgery using the
597 list address as the sender address, or the bouncing MTA is
598 terminally broken. In either of these cases we really are not
599 interested in receiving the messages and can reject them at SMTP
600 time with a clear conscience. The ACL to do this (as part of the
604 # Reject bounce (null sender) messages to the list
605 deny message = "Recipient never sends mail so cannot cause bounces"
607 domains = +mm_domains
608 condition = ${if exists{MM_LISTCHK} {yes}{no}}
611 <p>Additionally other mailman addresses do not generate mail (as
612 the envelope sender, although they may be mentioned in the header
613 addresses. The ACL is split into 2 so that it can be written
614 without the local_part condition wrapping.</p>
617 # Reject bounce (null sender) messages to the list
618 deny message = "Recipient never sends mail so cannot cause bounces"
620 domains = +mm_domains
621 local_parts = \N^.*-(admin|join|leave|owner|request)$\N
622 deny message = "Recipient never sends mail so cannot cause bounces"
624 domains = +mm_domains
625 local_parts = \N^.*-(subscribe|unsubscribe)$\N
628 <h3><a href="#index"><a name="smtune">SMTP callbacks</a></a></h3>
630 <p>Exim's SMTP callback feature is an even more powerful way to
631 detect bogus sender addresses than normal sender verification.
632 They are specially useful for checking envelope sender addresses
633 at RCPT time within SMTP, and have been to date the most effective
634 single anti-SPAM measure (however it should be noted that CBV is
635 hated vehemently by some mail admins, and does increase both
636 latency and traffic, as well as theoretically being a means to set
637 up a DDOS situation).</p>
639 <p>It is recommended that SMTP Sender CBV is not carried out on
640 messages to the Mailman bounce handlers, so that broken remote
641 MTAs (specifcally ones which send bounces with something other
642 than a null sender address) do not get excluded from being taken
643 off mailing lists</p>
646 # Do callback verification unless Mailman incoming bounce
647 deny !local_parts = *-bounces : *-bounces+*
648 !verify = sender/callout=30s,defer_ok
652 <p>Callback verification can also be done on header addresses, but
653 care should be taken not to reject messages unnecessarily,
654 especially when the message is going to Mailman's bounce
657 <h2><a href="#index"><a name="lisver">List verification</a></a></h2>
659 <p>This is how a set of address tests for the Exim lists look on a
660 working system. The list in question is
661 <tt>testlist@list.example.com</tt>, and these commands were
662 run on the <tt>list.example.com</tt> mail server (<tt>"% "</tt>
663 indicates the Unix shell prompt):</p>
666 % exim -bt testlist@list.example.com
667 testlist@list.example.com
668 router = mailman_router, transport = mailman_transport
670 % exim -bt testlist-request@list.example.com
671 testlist-request@list.example.com
672 router = mailman_router, transport = mailman_transport
674 % exim -bt testlist-bounces@list.example.com
675 testlist-bounces@list.example.com
676 router = mailman_router, transport = mailman_transport
678 % exim -bt testlist-bounces+luser=example.com@list.example.com
679 testlist-bounces+luser=example.com@list.example.com
680 router = mailman_router, transport = mailman_transport
683 <p>If your <tt>"exim -bt"</tt> output looks something like this,
684 that's a start: at least it means Exim will pass the right
685 messages to the right Mailman commands. It by no means guarantees
686 that your Exim/Mailman installation is functioning perfectly,
689 <h2><a href="#index"><a name="problem">Possible Problems</a></a></h2>
693 <li> Mailman will send as many <tt>MAIL FROM/RCPT TO</tt> as it
694 needs. It may result in more than 10 or 100 messages sent in one
695 connection, which will exceed the default value of Exim's
696 smtp_accept_queue_per_connection This is bad because it will
697 cause Exim to switch into queue mode and severely delay delivery
698 of your list messages. The way to fix this is to set mailman's
699 <tt>SMTP_MAX_SESSIONS_PER_CONNECTION</tt> (in
700 <tt>~mailman/Mailman/mm_cfg.py</tt>) to a smaller value than
701 Exim's <tt>smtp_accept_queue_per_connection</tt></li>
703 <li>Mailman should ignore Exim delay warning messages, even
704 though Exim should never send this to list messages. Mailman
705 2.1's general bounce detection and VERP support should greatly
706 improve the bounce detector's hit rates.</li>
708 <li>List existence is determined by the existence of a
709 <tt>config.pck</tt> file for a list. If you delete lists by
710 foul means, be aware of this.</li>
712 <li>If you are getting Exim or Mailman complaining about user
713 ids when you send mail to a list, check that the
714 <tt>MM_UID</tt> and <tt>MM_GID</tt> match those of
715 Mailman itself (i.e. what were used in the configure script).
716 Also make sure you do not have aliases in the main alias file
721 <h2><a href="#index"><a name="dochis">Document History</a></a></h2>
724 <li>Originally written by Nigel Metheringham.</li>
725 <li>Updated by Marc Merlin for Mailman 2.1, Exim 4</li>
726 <li>Overhauled/reformatted/clarified/simplified by Greg
728 <li>Rehashed again by Nigel Metheringham</li>
731 <h2><a href="#index"><a name="doccha">Document Changes</a></a></h2>
734 <li><b>14 June 2004</b> Originally written by Nigel Metheringham.</li>
735 <li><b>28 June 2004</b> Fixed a problem with the Exim VERP
736 transport which caused locally aliased recipient addresses to
737 have incorrect VERP extensions added. Followed posting to
738 exim-users list by Arkadiusz Miskiewicz -- <i>Nigel Metheringham</i>.</li>
739 <li><b>19 November 2004</b> Fixed previously unnoticed brainstorm
740 where <tt>reject</tt> had been used as a ACL verb rather than
741 <tt>deny</tt>. Fixes to the VERP router/transport pair.
742 -- <i>Nigel Metheringham</i></li>
746 <h2><a href="#index"><a name="docfin">Final Word</a></a></h2>
748 <p>Like many documents of this type, it has evolved and taken on
749 contributions by many many helpful folks, mainly those on the
750 Mailman and exim mailing lists. To all of you, who have made
751 contributions yet had their names shamefully lost by me, <i>Thank