X-Git-Url: https://git.exim.org/exim.git/blobdiff_plain/2f6c7b1aa0bf4a675d0ec95646b27f5c71bf06c2..a050bbe0d120464d80dab3eb8af420c4ec686ca8:/src/src/configure.default diff --git a/src/src/configure.default b/src/src/configure.default index 245cc3925..729cdc392 100644 --- a/src/src/configure.default +++ b/src/src/configure.default @@ -326,7 +326,7 @@ timeout_frozen_after = 7d # By default, messages that are waiting on Exim's queue are all held in a -# single directory called "input" which it itself within Exim's spool +# single directory called "input" which is itself within Exim's spool # directory. (The default spool directory is specified when Exim is built, and # is often /var/spool/exim/.) Exim works best when its queue is kept short, but # there are circumstances where this is not always possible. If you uncomment @@ -507,8 +507,8 @@ acl_check_rcpt: # examples of how you can get Exim to perform a DNS black list lookup at this # point. The first one denies, whereas the second just warns. # - # deny message = rejected because $sender_host_address is in a black list at $dnslist_domain\n$dnslist_text - # dnslists = black.list.example + # deny dnslists = black.list.example + # message = rejected because $sender_host_address is in a black list at $dnslist_domain\n$dnslist_text # # warn dnslists = black.list.example # add_header = X-Warning: $sender_host_address is in a black list at $dnslist_domain @@ -554,7 +554,6 @@ acl_check_rcpt: .ifdef _HAVE_PRDR acl_check_prdr: warn set acl_m_did_prdr = y -.endif ############################################################################# # do lookup on filtering, with $local_part@$domain, deny on filter match @@ -564,6 +563,7 @@ acl_check_prdr: ############################################################################# accept +.endif # This ACL is used after the contents of a message have been received. This # is the ACL in which you can test a message's headers or body, and in @@ -578,9 +578,9 @@ acl_check_data: # Deny if the message contains an overlong line. Per the standards # we should never receive one such via SMTP. # - deny message = maximum allowed line length is 998 octets, \ + deny condition = ${if > {$max_received_linelength}{998}} + message = maximum allowed line length is 998 octets, \ got $max_received_linelength - condition = ${if > {$max_received_linelength}{998}} # Deny if the headers contain badly-formed addresses. # @@ -663,9 +663,6 @@ smarthost: transport = smarthost_smtp route_data = ROUTER_SMARTHOST ignore_target_hosts = <; 0.0.0.0 ; 127.0.0.0/8 ; ::1 -.ifdef _HAVE_DNSSEC - dnssec_request_domains = * -.endif no_more .else @@ -690,9 +687,6 @@ dnslookup: ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8 # if ipv6-enabled then instead use: # ignore_target_hosts = <; 0.0.0.0 ; 127.0.0.0/8 ; ::1 -.ifdef _HAVE_DNSSEC - dnssec_request_domains = * -.endif no_more # This closes the ROUTER_SMARTHOST ifdef around the choice of routing for @@ -814,9 +808,6 @@ begin transports remote_smtp: driver = smtp message_size_limit = ${if > {$max_received_linelength}{998} {1}{0}} -.ifdef _HAVE_DANE - hosts_try_dane = * -.endif .ifdef _HAVE_PRDR hosts_try_prdr = * .endif @@ -872,7 +863,7 @@ smarthost_smtp: local_delivery: driver = appendfile - file = /var/mail/$local_part + file = /var/mail/$local_part_data delivery_date_add envelope_to_add return_path_add