. Update the Copyright year (only) when changing content.
. /////////////////////////////////////////////////////////////////////////////
. Update the Copyright year (only) when changing content.
. /////////////////////////////////////////////////////////////////////////////
.section "Exim documentation" "SECID1"
. Keep this example change bar when updating the documentation!
.section "Exim documentation" "SECID1"
. Keep this example change bar when updating the documentation!
.cindex "documentation"
This edition of the Exim specification applies to version &version() of Exim.
Substantive changes from the &previousversion; edition are marked in some
renditions of the document; this paragraph is so marked if the rendition is
capable of showing a change indicator.
.cindex "documentation"
This edition of the Exim specification applies to version &version() of Exim.
Substantive changes from the &previousversion; edition are marked in some
renditions of the document; this paragraph is so marked if the rendition is
capable of showing a change indicator.
This document is very much a reference manual; it is not a tutorial. The reader
is expected to have some familiarity with the SMTP mail transfer protocol and
This document is very much a reference manual; it is not a tutorial. The reader
is expected to have some familiarity with the SMTP mail transfer protocol and
on a line by itself. Double quotes round the file name are optional. If you use
the first form, a configuration error occurs if the file does not exist; the
second form does nothing for non-existent files.
on a line by itself. Double quotes round the file name are optional. If you use
the first form, a configuration error occurs if the file does not exist; the
second form does nothing for non-existent files.
The first form allows a relative name. It is resolved relative to
the directory of the including file. For the second form an absolute file
name is required.
The first form allows a relative name. It is resolved relative to
the directory of the including file. For the second form an absolute file
name is required.
Includes may be nested to any depth, but remember that Exim reads its
configuration file often, so it is a good idea to keep them to a minimum.
Includes may be nested to any depth, but remember that Exim reads its
configuration file often, so it is a good idea to keep them to a minimum.
router or transport are not accessible.
For incoming SMTP messages, no header lines are visible in
router or transport are not accessible.
For incoming SMTP messages, no header lines are visible in
because the header structure is not set up until the message is received.
They are visible in DKIM, PRDR and DATA ACLs.
Header lines that are added in a RCPT ACL (for example)
are saved until the message's incoming header lines are available, at which
point they are added.
because the header structure is not set up until the message is received.
They are visible in DKIM, PRDR and DATA ACLs.
Header lines that are added in a RCPT ACL (for example)
are saved until the message's incoming header lines are available, at which
point they are added.
running, however, header lines added by earlier ACLs are visible.
Upper case and lower case letters are synonymous in header names. If the
running, however, header lines added by earlier ACLs are visible.
Upper case and lower case letters are synonymous in header names. If the
The third argument is a list of options, of which the first element is the timeout
and must be present if the argument is given.
Further elements are options of form &'name=value'&.
The third argument is a list of options, of which the first element is the timeout
and must be present if the argument is given.
Further elements are options of form &'name=value'&.
A fourth argument allows you to change any newlines that are in the data
that is read, in the same way as for &%readfile%& (see above). This example
turns them into spaces:
A fourth argument allows you to change any newlines that are in the data
that is read, in the same way as for &%readfile%& (see above). This example
turns them into spaces:
If you have changed &%host_lookup_order%& so that &`bydns`& is not the first
mechanism in the list, then this variable will be false.
If you have changed &%host_lookup_order%& so that &`bydns`& is not the first
mechanism in the list, then this variable will be false.
This requires that your system resolver library support EDNS0 (and that
DNSSEC flags exist in the system headers). If the resolver silently drops
all EDNS0 options, then this will have no effect. OpenBSD's asr resolver
is known to currently ignore EDNS0, documented in CAVEATS of asr_run(3).
This requires that your system resolver library support EDNS0 (and that
DNSSEC flags exist in the system headers). If the resolver silently drops
all EDNS0 options, then this will have no effect. OpenBSD's asr resolver
is known to currently ignore EDNS0, documented in CAVEATS of asr_run(3).
.option debug_store main boolean &`false`&
.cindex debugging "memory corruption"
.cindex memory debugging
This option, when true, enables extra checking in Exim's internal memory
management. For use when a memory corruption issue is being investigated,
it should normally be left as default.
.option debug_store main boolean &`false`&
.cindex debugging "memory corruption"
.cindex memory debugging
This option, when true, enables extra checking in Exim's internal memory
management. For use when a memory corruption issue is being investigated,
it should normally be left as default.
OpenBSD's asr resolver routines are known to ignore the EDNS0 option; this
means that DNSSEC will not work with Exim on that platform either, unless Exim
is linked against an alternative DNS client library.
OpenBSD's asr resolver routines are known to ignore the EDNS0 option; this
means that DNSSEC will not work with Exim on that platform either, unless Exim
is linked against an alternative DNS client library.
of SSL-on-connect.
In the event of failure to negotiate TLS, the action taken is controlled
by &%ldap_require_cert%&.
of SSL-on-connect.
In the event of failure to negotiate TLS, the action taken is controlled
by &%ldap_require_cert%&.
appropriate &%system_filter_..._transport%& option(s) must be set, to define
which transports are to be used. Details of this facility are given in chapter
&<<CHAPsystemfilter>>&.
appropriate &%system_filter_..._transport%& option(s) must be set, to define
which transports are to be used. Details of this facility are given in chapter
&<<CHAPsystemfilter>>&.
specifies the string that is set up in the PATH environment
variable of the subprocess.
If the &%command%& option does not yield an absolute path name, the command is
specifies the string that is set up in the PATH environment
variable of the subprocess.
If the &%command%& option does not yield an absolute path name, the command is
Note that the hostlist test for whether to do authentication can be
confused if name-IP lookups change between the time the peer is decided
on and the transport running. For example, with a manualroute
Note that the hostlist test for whether to do authentication can be
confused if name-IP lookups change between the time the peer is decided
on and the transport running. For example, with a manualroute
No authentication will then be done, despite the names being identical.
For such cases use a separate transport which always authenticates.
No authentication will then be done, despite the names being identical.
For such cases use a separate transport which always authenticates.
.cindex "AUTH" "on MAIL command"
When Exim has authenticated itself to a remote server, it adds the AUTH
.cindex "AUTH" "on MAIL command"
When Exim has authenticated itself to a remote server, it adds the AUTH
If the ACL for VRFY returns &"accept"&, a recipient verify (without callout)
is done on the address and the result determines the SMTP response.
If the ACL for VRFY returns &"accept"&, a recipient verify (without callout)
is done on the address and the result determines the SMTP response.
of outgoing messages is done, because it sends data to the ultimate destination
before the entire message has been received from the source.
It is not supported for messages received with the SMTP PRDR
of outgoing messages is done, because it sends data to the ultimate destination
before the entire message has been received from the source.
It is not supported for messages received with the SMTP PRDR
Note that '/' is legal in local-parts; if the address may have such
(eg. is generated from the received message)
they must be protected from the options parsing by doubling:
.code
verify = sender=${sg{${address:$h_sender:}}{/}{//}}
.endd
Note that '/' is legal in local-parts; if the address may have such
(eg. is generated from the received message)
they must be protected from the options parsing by doubling:
.code
verify = sender=${sg{${address:$h_sender:}}{/}{//}}
.endd
To include this it must be built with SUPPORT_I18N and the libidn library.
Standards supported are RFCs 2060, 5890, 6530 and 6533.
To include this it must be built with SUPPORT_I18N and the libidn library.
Standards supported are RFCs 2060, 5890, 6530 and 6533.
If Exim is built with SUPPORT_I18N_2008 (in addition to SUPPORT_I18N, not
instead of it) then IDNA2008 is supported; this adds an extra library
requirement, upon libidn2.
If Exim is built with SUPPORT_I18N_2008 (in addition to SUPPORT_I18N, not
instead of it) then IDNA2008 is supported; this adds an extra library
requirement, upon libidn2.