defined. AAAA records (analogous to A records for IPv4) are in use, and are
currently seen as the mainstream. Another record type called A6 was proposed
as better than AAAA because it had more flexibility. However, it was felt to be
-over-complex, and its status was reduced to &"experimental"&. Exim used to
+over-complex, and its status was reduced to &"experimental"&.
+.new
+Exim used to
have a compile option for including A6 record support but this has now been
withdrawn.
+.wen
This option is interpreted by Sendmail to cause debug information to be sent
to the named file. It is ignored by Exim.
+.new
.vitem &%-z%&&~<&'log-line'&>
.oindex "&%-z%&"
This option writes its argument to Exim's logfile.
Use is restricted to administrators; the intent is for operational notes.
Quotes should be used to maintain a multi-word item as a single argument,
under most shells.
+.wen
.endlist
.ecindex IIDclo1
colon in the example above is necessary. If it were not there, the list would
be interpreted as the two items 127.0.0.1:: and 1.
-.section "Changing list separators" "SECID53"
+.section "Changing list separators" "SECTlistsepchange"
.cindex "list separator" "changing"
.cindex "IPv6" "addresses in lists"
Doubling colons in IPv6 addresses is an unwelcome chore, so a mechanism was
show how you can specify hosts that are permitted to send unqualified sender
and recipient addresses, respectively.
+.new
The &%log_selector%& option is used to increase the detail of logging
over the default:
.code
log_selector = +smtp_protocol_error +smtp_syntax_error \
+tls_certificate_verified
.endd
+.wen
The &%percent_hack_domains%& option is also commented out:
.code
&`fail`& keyword causes a &'forced expansion failure'& &-- see section
&<<SECTforexpfai>>& for an explanation of what this means.
+.new
The supported DNS record types are A, CNAME, MX, NS, PTR, SOA, SPF, SRV, TLSA
and TXT, and, when Exim is compiled with IPv6 support, AAAA.
If no type is given, TXT is assumed.
+.wen
For any record type, if multiple records are found, the data is returned as a
concatenation, with newline as the default separator. The order, of course,
It is permitted to specify a space as the separator character. Further
white space is ignored.
+.new
.cindex "SOA record" "in &(dnsdb)& lookup"
For an SOA lookup, while no result is obtained the lookup is redone with
successively more leading components dropped from the given domain.
.code
${lookup dnsdb{>:,; soa=a.b.example.com}}
.endd
+.wen
.section "Dnsdb lookup modifiers" "SECTdnsdb_mod"
.cindex "dnsdb modifiers"
See also the &$lookup_dnssec_authenticated$& variable.
+.new
.cindex timeout "dns lookup"
.cindex "DNS" timeout
Timeout for the dnsdb lookup can be controlled by a retrans modifier.
Retries for the dnsdb lookup can be controlled by a retry modifier.
The form if &"retry_VAL"& where VAL is an integer.
The default count is set by the main configuration option &%dns_retry%&.
+.wen
.section "Pseudo dnsdb record types" "SECID66"
configuration, you must add &%-export-dynamic%& to EXTRALIBS.
+.new
.vitem "&*${env{*&<&'key'&>&*}{*&<&'string1'&>&*}{*&<&'string2'&>&*}}*&"
.cindex "expansion" "extracting value from environment"
.cindex "environment" "value from"
This forces an expansion failure (see section &<<SECTforexpfai>>&);
{<&'string1'&>} must be present for &"fail"& to be recognized.
-If {<&'string2'&>} is omitted an empty string is substituted on
+If {<&'string2'&>} is omitted an empty string is substituted on
search failure.
If {<&'string1'&>} is omitted the search result is substituted on
search success.
+.wen
.vitem "&*${extract{*&<&'key'&>&*}{*&<&'string1'&>&*}{*&<&'string2'&>&*}&&&
content-scanning extension and the obsolete &%demime%& condition. For details,
see section &<<SECTdemimecond>>&.
+.new
.vitem &$dkim_cur_signer$& &&&
&$dkim_verify_status$& &&&
&$dkim_verify_reason$& &&&
When a message has been received this variable contains
a colon-separated list of signer domains and identities for the message.
For details see chapter &<<CHAPdkim>>&.
+.wen
.vitem &$dnslist_domain$& &&&
&$dnslist_matched$& &&&
It will be empty if &(DNSSEC)& was not requested,
&"no"& if the result was not labelled as authenticated data
and &"yes"& if it was.
+.new
Results that are labelled as authoritive answer that match
-the $%dns_trust_aa%$ configuration variable count also
+the &%dns_trust_aa%& configuration variable count also
as authenticated data.
+.wen
.vitem &$mailstore_basename$&
.vindex "&$mailstore_basename$&"
It is only useful as the argument of a
&%certextract%& expansion item, &%md5%&, &%sha1%& or &%sha256%& operator,
or a &%def%& condition.
+.new
If certificate verification fails it may refer to a failing chain element
which is not the leaf.
+.wen
.vitem &$tls_out_ourcert$&
.vindex "&$tls_out_ourcert$&"
outbound connection. It is only useful as the argument of a
&%certextract%& expansion item, &%md5%&, &%sha1%& or &%sha256%& operator,
or a &%def%& condition.
+.new
If certificate verification fails it may refer to a failing chain element
which is not the leaf.
+.wen
.vitem &$tls_in_certificate_verified$&
.vindex "&$tls_in_certificate_verified$&"
connection, and Exim is configured to request a certificate from the client,
the value of the Distinguished Name of the certificate is made available in the
&$tls_in_peerdn$& during subsequent processing.
+.new
If certificate verification fails it may refer to a failing chain element
which is not the leaf.
+.wen
The deprecated &$tls_peerdn$& variable refers to the inbound side
except when used in the context of an outbound SMTP delivery, when it refers to
connection, and Exim is configured to request a certificate from the server,
the value of the Distinguished Name of the certificate is made available in the
&$tls_out_peerdn$& during subsequent processing.
+.new
If certificate verification fails it may refer to a failing chain element
which is not the leaf.
+.wen
.vitem &$tls_in_sni$&
.vindex "&$tls_in_sni$&"
.row &%dns_ipv4_lookup%& "only v4 lookup for these domains"
.row &%dns_retrans%& "parameter for resolver"
.row &%dns_retry%& "parameter for resolver"
-.row &%dns_trust_aa%& "nameservers trusted as authentic"
+.row &%dns_trust_aa%& "DNS zones trusted as authentic"
.row &%dns_use_edns0%& "parameter for resolver"
.row &%hold_domains%& "hold delivery for these domains"
.row &%local_interfaces%& "for routing checks"
processed and the message itself has been received, but before the
acknowledgment is sent. See chapter &<<CHAPACL>>& for further details.
+.new
.option acl_smtp_dkim main string&!! unset
.cindex DKIM "ACL for"
This option defines the ACL that is run for each DKIM signature
of a received message.
See chapter &<<CHAPdkim>>& for further details.
+.wen
.option acl_smtp_etrn main string&!! unset
.cindex "ETRN" "ACL for"
extension. It defines the ACL that is run for each MIME part in a message. See
section &<<SECTscanmimepart>>& for details.
+.new
.option acl_smtp_notquit main string&!! unset
.cindex "not-QUIT, ACL for"
This option defines the ACL that is run when an SMTP session
ends without a QUIT command being received.
See chapter &<<CHAPACL>>& for further details.
+.wen
.option acl_smtp_predata main string&!! unset
This option defines the ACL that is run when an SMTP DATA command is
to handle IPv6 literal addresses.
+.new
.option dkim_verify_signers main "domain list&!!" $dkim_signers
.cindex DKIM "controlling calls to the ACL"
This option gives a list of DKIM domains for which the DKIM ACL is run.
It is expanded after the message is received; by default it runs
the ACL once for each signature in the message.
See chapter &<<CHAPdkim>>&.
+.wen
.option dns_again_means_nonexist main "domain list&!!" unset
parameter values are available in the external resolver interface structure,
but nowhere does it seem to describe how they are used or what you might want
to set in them.
+.new
See also the &%slow_lookup_log%& option.
+.wen
.option dns_retry main integer 0
See &%dns_retrans%& above.
-.option dns_trust_aa main domain list&!! unset
+.new
+.option dns_trust_aa main "domain list&!!" unset
.cindex "DNS" "resolver options"
.cindex "DNS" "DNSSEC"
-If this option is set then lookup results marked with an AA bit
-(Authoratative Answer) are trusted when they come from one
-of the listed domains, as if they were marked as having been
-DNSSEC-verified.
-
-Use this option only if you talk directly to the resolver
-for your local domains, and list only it.
-It is needed when the resolver does not return an AD bit
-for its local domains.
-The first SOA or NS record appearing in the results is compared
-against the option value.
-
+If this option is set then lookup results marked with the AA bit
+(Authoritative Answer) are trusted the same way as if they were
+DNSSEC-verified. The authority section's name of the answer must
+match with this expanded domain list.
+
+Use this option only if you talk directly to a resolver that is
+authoritive for some zones and does not set the AD (Authentic Data)
+bit in the answer. Some DNS servers may have an configuration option to
+mark the answers from their own zones as verified (they set the AD bit).
+Others do not have this option. It is considered as poor practice using
+a resolver that is an authoritive server for some zones.
+
+Use this option only if you really have to (e.g. if you want
+to use DANE for remote delivery to a server that is listed in the DNS
+zones that your resolver is authoritive for).
+
+If the DNS answer packet has the AA bit set and contains resource record
+in the answer section, the name of the first NS record appearing in the
+authority section is compared against the list. If the answer packet is
+authoritive but the answer section is empty, the name of the first SOA
+record in the authoritive section is used instead.
+.wen
.cindex "DNS" "resolver options"
.option dns_use_edns0 main integer -1
This option can be used to enable the Per-Recipient Data Response extension
to SMTP, defined by Eric Hall.
If the option is set, PRDR is advertised by Exim when operating as a server.
-If the client requests PRDR, and more than one recipient, for a message
+If the client requests PRDR, and more than one recipient, for a message
an additional ACL is called for each recipient after the message content
is recieved. See section &<<SECTPRDRACL>>&.
using TCP/IP), and the &%-bnq%& option was not set.
+.new
.option slow_lookup_log main integer 0
.cindex "logging" "slow lookups"
.cindex "dns" "logging slow lookups"
If the value is nonzero it is taken as a number of milliseconds
and lookups taking longer than this are logged.
Currently this applies only to DNS lookups.
+.wen
The former means that Exim was expecting to read an SMTP command; the latter
means that it was in the DATA phase, reading the contents of a message.
+.new
If the first character of the option is a &"$"& the option is
expanded before use and may depend on
&$sender_host_name$&, &$sender_host_address$& and &$sender_host_port$&.
+.wen
.oindex "&%-os%&"
acceptable bound from 1024 to 2048.
+.new
.option tls_eccurve main string&!! prime256v1
.cindex TLS "EC cryptography"
If built with a recent-enough version of OpenSSL,
which tell the library to choose.
If the option is set to an empty string, no EC curves will be enabled.
+.wen
.option tls_ocsp_file main string&!! unset
unless you really, really know what you are doing. See also the generic
transport option of the same name.
+.new
.option dnssec_request_domains routers "domain list&!!" unset
.cindex "MX record" "security"
.cindex "DNSSEC" "MX lookup"
the dnssec request bit set. Any returns not having the Authenticated Data bit
(AD bit) set will be ignored and logged as a host-lookup failure.
This applies to all of the SRV, MX, AAAA, A lookup sequence.
+.wen
.option domains routers&!? "domain list&!!" unset
routers, and this can lead to problems with duplicates -- see the similar
warning for &%headers_add%& above.
+.new
+&*Warning 3*&: Because of the separate expansion of the list items,
+items that contain a list separator must have it doubled.
+To avoid this, change the list separator (&<<SECTlistsepchange>>&).
+.wen
+
+
.option ignore_target_hosts routers "host list&!!" unset
.cindex "IP address" "discarding"
an address; if such a router is expected to handle "all remaining non-local
domains", then it is important to set &%no_more%&.
+.new
The router will defer rather than decline if the domain
is found in the &%fail_defer_domains%& router option.
+.wen
Reasons for a &(dnslookup)& router to decline currently include:
.ilist
+.new
.option fail_defer_domains dnslookup "domain list&!!" unset
.cindex "MX record" "not found"
DNS lookups for domains matching &%fail_defer_domains%&
domain while the DNS configuration is not ready.
However, it will result in any message with mistyped domains
also being queued.
+.wen
.option mx_domains dnslookup "domain list&!!" unset
Unlike most options, &%headers_remove%& can be specified multiple times
for a router; all listed headers are removed.
+&*Warning*&: Because of the separate expansion of the list items,
+items that contain a list separator must have it doubled.
+To avoid this, change the list separator (&<<SECTlistsepchange>>&).
+
.option headers_rewrite transports string unset
legitimate reasons for this (host died, network died), but if it repeats a lot
for the same host, it indicates something odd.
+.new
.vitem &%lookup%&
A DNS lookup for a host failed.
Note that a &%dnslookup%& router will need to have matched
its &%fail_defer_domains%& option for this retry type to be usable.
Also note that a &%manualroute%& router will probably need
its &%host_find_failed%& option set to &%defer%&.
+.wen
.vitem &%refused_MX%&
A connection to a host obtained from an MX record was refused.
the PLAIN authentication mechanism (RFC 2595) or the LOGIN mechanism, which is
not formally documented, but used by several MUAs. The seventh authenticator
supports Microsoft's &'Secure Password Authentication'& mechanism.
+.new
The eighth is an Exim authenticator but not an SMTP one;
instead it can use information from a TLS negotiation.
+.wen
The authenticators are configured using the same syntax as other drivers (see
section &<<SECTfordricon>>&). If no authenticators are required, no
.cindex "QUIT, ACL for"
The ACL for the SMTP QUIT command is anomalous, in that the outcome of the ACL
does not affect the response code to QUIT, which is always 221. Thus, the ACL
-does not in fact control any access. For this reason, it may only accept
+does not in fact control any access.
+.new
+For this reason, it may only accept
or warn as its final result.
+.wen
This ACL can be used for tasks such as custom logging at the end of an SMTP
session. For example, you can use ACL variables in other ACLs to count
The option is usable in the RCPT ACL.
If enabled for a message recieved via smtp and routed to an smtp transport,
+.new
and only one transport, interface, destination host and port combination
is used for all recipients of the message,
+.wen
then the delivery connection is made while the receiving connection is open
and data is copied from one to the other.
for a mail will be quietly ignored.
If a recipient-verify callout connection is subsequently
requested in the same ACL it is held open and used for
+.new
any subsequent receipients and the data,
+.wen
otherwise one is made after the initial RCPT ACL completes.
Note that routers are used in verify mode,
Cutthrough delivery is not supported via transport-filters or when DKIM signing
of outgoing messages is done, because it sends data to the ultimate destination
before the entire message has been received from the source.
+.new
It is not supported for messages recieved with the SMTP PRDR option in use.
+.wen
Should the ultimate destination system positively accept or reject the mail,
a corresponding indication is given to the source system and nothing is queued.
one of its aliases, does, when it is itself looked up in the DNS, yield the
original IP address.
+.new
There is one possible option, &`defer_ok`&. If this is present and a
DNS operation returns a temporary error, the verify condition succeeds.
+.wen
If this condition is used for a locally generated message (that is, when there
is no client host involved), it always succeeds.
If you use a remote host,
you need to make Exim's spool directory available to it,
as the scanner is passed a file path, not file contents.
-For information about available commands and their options you may use
+For information about available commands and their options you may use
.code
$ socat UNIX:/var/run/avast/scan.sock STDIO:
FLAGS
.new
Support is also provided for Rspamd.
-For more information about installation and configuration of SpamAssassin or
+For more information about installation and configuration of SpamAssassin or
Rspamd refer to their respective websites at
&url(http://spamassassin.apache.org) and &url(http://www.rspamd.com)
.wen
nicely, however.
.oindex "&%spamd_address%&"
-By default, SpamAssassin listens on 127.0.0.1, TCP port 783 and if you
+By default, SpamAssassin listens on 127.0.0.1, TCP port 783 and if you
intend to use an instance running on the local host you do not need to set
&%spamd_address%&. If you intend to use another host or port for SpamAssassin,
you must set the &%spamd_address%& option in the global part of the Exim
The name allows you to use per-domain or per-user antispam profiles in
principle, but this is not straightforward in practice, because a message may
have multiple recipients, not necessarily all in the same domain. Because the
-&%spam%& condition has to be called from a DATA ACL in order to be able to
+&%spam%& condition has to be called from a DATA-time ACL in order to be able to
read the contents of the message, the variables &$local_part$& and &$domain$&
are not set.
+.new
Careful enforcement of single-recipient messages
(eg. by responding with defer in the recipient ACL for all recipients
after the first),
or the use of PRDR,
.cindex "PRDR" "use for per-user SpamAssassin profiles"
are needed to use this feature.
+.wen
The right-hand side of the &%spam%& condition is expanded before being used, so
you can put lookups or conditions there. When the right-hand side evaluates to
.cindex "spam scanning" "returned variables"
When the &%spam%& condition is run, it sets up a number of expansion
-variables. These variables are saved with the received message, thus they are
+variables.
+.new
+Except for &$spam_report$&,
+.wen
+these variables are saved with the received message so are
available for use at delivery time.
.vlist
.vitem &$spam_report$&
A multiline text table, containing the full SpamAssassin report for the
message. Useful for inclusion in headers or reject messages.
+.new
+This variable is only usable in a DATA-time ACL.
+.wen
.new
.vitem &$spam_action$&
This is perhaps the most important of the MIME variables. It contains a
proposed filename for an attachment, if one was found in either the
&'Content-Type:'& or &'Content-Disposition:'& headers. The filename will be
-RFC2047 or RFC2231 decoded, but no additional sanity checks are done.
+RFC2047
+.new
+or RFC2231
+.wen
+decoded, but no additional sanity checks are done.
If no filename was
found, this variable contains the empty string.
&`*etrn `& ETRN commands
&`*host_lookup_failed `& as it says
&` ident_timeout `& timeout for ident connection
+.new
&` incoming_interface `& local interface on <= and => lines
+.wen
&` incoming_port `& remote port on <= lines
&`*lost_incoming_connection `& as it says (includes timeouts)
&` outgoing_port `& add remote port to => lines
followed by a colon and the port number. The local interface and port are also
added to other SMTP log lines, for example &"SMTP connection from"& and to
rejection lines
+.new
and (despite the name) the local interface is added to &"=>"& lines..
+.wen
.next
.cindex "log" "incoming remote port"
.cindex "port" "logging remote"
The &*-C*& option is used to specify an alternate &_exim.conf_& which might
contain alternate exim configuration the queue management might be using.
-to obtain a queue listing, and then greps the output to select messages
+to obtain a queue listing, and then greps the output to select messages
that match given criteria. The following selection options are available:
.vlist