X-Git-Url: https://git.exim.org/users/jgh/exim.git/blobdiff_plain/1195f8f2a4329ae21a4ec5d3fa3666c6c4fa2d2f..f1e494e0021f2efbc346a24727b8ebc66733e4b2:/doc/doc-docbook/spec.xfpt?ds=sidebyside diff --git a/doc/doc-docbook/spec.xfpt b/doc/doc-docbook/spec.xfpt index 2196b7cfe..73420473f 100644 --- a/doc/doc-docbook/spec.xfpt +++ b/doc/doc-docbook/spec.xfpt @@ -4441,6 +4441,27 @@ of the syntax, and how it interacts with configuration file options, are given in chapter &<>&. When &%-oX%& is used to start a daemon, no pid file is written unless &%-oP%& is also present to specify a pid filename. +.new +.vitem &%-oY%& +.oindex &%-oY%& +.cindex "daemon notifier socket" +This option controls the creation of an inter-process communications endpoint +by the Exim daemon. +It is only relevant when the &%-bd%& (start listening daemon) option is also +given. +Normally the daemon creates this socket, unless a &%-oX%& and &*no*& &%-oP%& +option is also present. +If this option is given then the socket will not be created. This could be +required if the system is running multiple daemons. + +The socket is currently used for +.ilist +fast ramp-up of queue runner processes +.next +obtaining a current queue size +.endlist +.wen + .vitem &%-pd%& .oindex "&%-pd%&" .cindex "Perl" "starting the interpreter" @@ -6606,14 +6627,15 @@ cause parts of the string to be replaced by data that is obtained from the lookup. Lookups of this type are conditional expansion items. Different results can be defined for the cases of lookup success and failure. See chapter &<>&, where string expansions are described in detail. -The key for the lookup is specified as part of the string expansion. +The key for the lookup is &*specified*& as part of the string expansion. .next Lists of domains, hosts, and email addresses can contain lookup requests as a way of avoiding excessively long linear lists. In this case, the data that is returned by the lookup is often (but not always) discarded; whether the lookup succeeds or fails is what really counts. These kinds of list are described in chapter &<>&. -The key for the lookup is given by the context in which the list is expanded. +The key for the lookup is &*implicit*&, +given by the context in which the list is expanded. .endlist String expansions, lists, and lookups interact with each other in such a way @@ -6648,7 +6670,8 @@ The result of the expansion is not tainted. In the second example, the lookup is a single item in a domain list. It causes Exim to use a lookup to see if the domain that is being processed can be found -in the file. The file could contains lines like this: +in the file. +The file could contains lines like this: .code domain1: domain2: @@ -6669,11 +6692,11 @@ causes a second lookup to occur. The lookup type may optionally be followed by a comma and a comma-separated list of options. Each option is a &"name=value"& pair. -Whether an option is meaningful depands on the lookup type. +Whether an option is meaningful depends on the lookup type. All lookups support the option &"cache=no_rd"&. If this is given then the cache that Exim manages for lookup results -is not checked before diong the lookup. +is not checked before doing the lookup. The result of the lookup is still written to the cache. .wen @@ -6857,6 +6880,13 @@ the implicit key is the host's IP address rather than its name (see section &*Warning 3*&: Do not use an IPv4-mapped IPv6 address for a key; use the IPv4, in dotted-quad form. (Exim converts IPv4-mapped IPv6 addresses to this notation before executing the lookup.) + +.new +One option is supported, "ret=full", to request the return of the entire line +rather than omitting the key porttion. +Note however that the key portion will have been de-quoted. +.wen + .next .cindex lookup json .cindex json "lookup type" @@ -7093,10 +7123,7 @@ passed to a Redis database. See section &<>&. .cindex "sqlite lookup type" .cindex "lookup" "sqlite" &(sqlite)&: The format of the query is -new -an optional filename -followed by an SQL statement -that is passed to an SQLite database. See section &<>&. +an SQL statement that is passed to an SQLite database. See section &<>&. .next &(testdb)&: This is a lookup type that is used for testing Exim. It is @@ -8096,7 +8123,7 @@ option, you can still update it by a query of this form: ${lookup pgsql,servers=master/db/name/pw {UPDATE ...} } .endd -An older syntax places the servers speciification before the qury, +An older syntax places the servers specification before the query, semicolon separated: .code ${lookup mysql{servers=master; UPDATE ...} } @@ -8155,18 +8182,28 @@ SQLite is different to the other SQL lookups because a filename is required in addition to the SQL query. An SQLite database is a single file, and there is no daemon as in the other SQL databases. +.new .oindex &%sqlite_dbfile%& -The preferred way of specifying the file is by using the -&%sqlite_dbfile%& option, set to -an absolute path. +There are two ways of +specifying the file. +The first is is by using the &%sqlite_dbfile%& main option. +The second, which allows separate files for each query, +is to use an option appended, comma-separated, to the &"sqlite"& +lookup type word. The option is the word &"file"&, then an equals, +then the filename. +The filename in this case cannot contain whitespace or open-brace charachters. +.wen + A deprecated method is available, prefixing the query with the filename separated by white space. -This means that the path name cannot contain white space. +This means that .cindex "tainted data" "sqlite file" -It also means that the query cannot use any tainted values, as that taints +the query cannot use any tainted values, as that taints the entire query including the filename - resulting in a refusal to open the file. +In all the above cases the filename must be an absolute path. + Here is a lookup expansion example: .code sqlite_dbfile = /some/thing/sqlitedb @@ -8735,8 +8772,13 @@ The value for a match will be the list element string. .cindex "tainted data" "de-tainting" Note that this is commonly untainted (depending on the way the list was created). +Specifically, explicit text in the configuration file in not tainted. This is a useful way of obtaining an untainted equivalent to the domain, for later operations. + +However if the list (including one-element lists) +is created by expanding a variable containing tainted data, +it is tainted and so will the match value be. .endlist @@ -9453,10 +9495,22 @@ the data type. ACL rules always expand strings. A couple of expansion conditions do not expand some of the brace-delimited branches, for security reasons, .cindex "tainted data" expansion +.cindex "tainted data" definition .cindex expansion "tainted data" and expansion of data deriving from the sender (&"tainted data"&) is not permitted. +.new +Common ways of obtaining untainted equivalents of variables with +tainted values +.cindex "tainted data" "de-tainting" +come down to using the tainted value as a lookup key in a trusted database. +This database could be the filesystem structure, +or the password file, +or accessed via a DBMS. +Specific methods are indexed under &"de-tainting"&. +.wen + .section "Literal text in expanded strings" "SECTlittext" @@ -10180,12 +10234,9 @@ in a list using the given separator. .wen -.vitem "&*${lookup{*&<&'key'&>&*}&~*&<&'search&~type'&>&*&~&&& - {*&<&'file'&>&*}&~{*&<&'string1'&>&*}&~{*&<&'string2'&>&*}}*&" -This is the first of one of two different types of lookup item, which are both -described in the next item. - -.vitem "&*${lookup&~*&<&'search&~type'&>&*&~{*&<&'query'&>&*}&~&&& +.vitem "&*${lookup&~{*&<&'key'&>&*}&~*&<&'search&~type'&>&*&~&&& + {*&<&'file'&>&*}&~{*&<&'string1'&>&*}&~{*&<&'string2'&>&*}}*&" &&& + "&*${lookup&~*&<&'search&~type'&>&*&~{*&<&'query'&>&*}&~&&& {*&<&'string1'&>&*}&~{*&<&'string2'&>&*}}*&" .cindex "expansion" "lookup in" .cindex "file" "lookups" @@ -11605,6 +11656,11 @@ condition is true if the named file (or directory) exists. The existence test is done by calling the &[stat()]& function. The use of the &%exists%& test in users' filter files may be locked out by the system administrator. +.new +&*Note:*& Testing a path using this condition is not a sufficient way of +de-tainting it. +.wen + .vitem &*first_delivery*& .cindex "delivery" "first" .cindex "first delivery" @@ -12454,25 +12510,32 @@ the complete argument of the ETRN command (see section &<>&). .cindex "tainted data" If the origin of the data is an incoming message, -the result of expanding this variable is tainted. -When un untainted version is needed, one should be obtained from +the result of expanding this variable is tainted and may not +be further expanded or used as a filename. +When an untainted version is needed, one should be obtained from looking up the value in a local (therefore trusted) database. Often &$domain_data$& is usable in this role. .vitem &$domain_data$& .vindex "&$domain_data$&" -When the &%domains%& option on a router matches a domain by -means of a lookup, the data read by the lookup is available during the running -of the router as &$domain_data$&. In addition, if the driver routes the +When the &%domains%& condition on a router +.new +or an ACL +matches a domain +against a list, the match value is copied to &$domain_data$&. +This is an enhancement over previous versions of Exim, when it only +applied to the data read by a lookup. +For details on match values see section &<>& et. al. +.wen + +If the router routes the address to a transport, the value is available in that transport. If the transport is handling multiple addresses, the value from the first address is used. -&$domain_data$& is also set when the &%domains%& condition in an ACL matches a -domain by means of a lookup. The data read by the lookup is available during -the rest of the ACL statement. In all other situations, this variable expands -to nothing. +&$domain_data$& set in an ACL is available during +the rest of the ACL statement. .vitem &$exim_gid$& .vindex "&$exim_gid$&" @@ -12654,7 +12717,8 @@ once. .cindex "tainted data" If the origin of the data is an incoming message, -the result of expanding this variable is tainted. +the result of expanding this variable is tainted and +may not be further expanded or used as a filename. &*Warning*&: the content of this variable is usually provided by a potential attacker. @@ -12704,19 +12768,17 @@ to process local parts in a case-dependent manner in a router, you can set the .vitem &$local_part_data$& .vindex "&$local_part_data$&" -When the &%local_parts%& option on a router matches a local part by means of a -lookup, the data read by the lookup is available during the running of the -router as &$local_part_data$&. In addition, if the driver routes the address -to a transport, the value is available in that transport. If the transport is -handling multiple addresses, the value from the first address is used. +When the &%local_parts%& condition on a router or ACL +matches a local part list +.new +the match value is copied to &$local_part_data$&. +This is an enhancement over previous versions of Exim, when it only +applied to the data read by a lookup. +For details on match values see section &<>& et. al. +.wen The &%check_local_user%& router option also sets this variable. -&$local_part_data$& is also set when the &%local_parts%& condition in an ACL -matches a local part by means of a lookup. The data read by the lookup is -available during the rest of the ACL statement. In all other situations, this -variable expands to nothing. - .vindex &$local_part_prefix$& &&& &$local_part_prefix_v$& &&& &$local_part_suffix$& &&& @@ -13075,6 +13137,8 @@ The name of the spool queue in use; empty for the default queue. .cindex "spool" "number of messages" This variable contains the number of messages queued. It is evaluated on demand, but no more often than once every minute. +If there is no daemon notifier socket open, the value will be +an empty string. .vitem &$r_...$& .vindex &$r_...$& @@ -13790,6 +13854,8 @@ Observability for TLS session resumption. See &<>& for details. .vindex "&$tls_in_sni$&" .vindex "&$tls_sni$&" .cindex "TLS" "Server Name Indication" +.cindex "TLS" SNI +.cindex SNI "observability on server" When a TLS session is being established, if the client sends the Server Name Indication extension, the value will be placed in this variable. If the variable appears in &%tls_certificate%& then this option and @@ -13805,6 +13871,8 @@ the outbound. .vitem &$tls_out_sni$& .vindex "&$tls_out_sni$&" .cindex "TLS" "Server Name Indication" +.cindex "TLS" SNI +.cindex SNI "observability in client" During outbound SMTP deliveries, this variable reflects the value of the &%tls_sni%& option on the transport. @@ -16647,10 +16715,16 @@ should need to modify the default. The option is expanded before use. If the platform supports Linux-style abstract socket names, the result is used with a nul byte prefixed. -Otherwise, it should be a full path name and use a directory accessible +Otherwise, +.new "if nonempty," +it should be a full path name and use a directory accessible to Exim. -If the Exim command line uses a &%-oX%& option and does not use &%-oP%& +.new +If this option is set as empty, +or the command line &%-oY%& option is used, or +.wen +the command line uses a &%-oX%& option and does not use &%-oP%&, then a notifier socket is not created. @@ -17972,6 +18046,7 @@ syslog. The value must be no longer than 32 characters. See chapter .option syslog_timestamp main boolean true .cindex "syslog" "timestamps" +.cindex timestamps syslog If &%syslog_timestamp%& is set false, the timestamps on Exim's log lines are omitted when these lines are sent to syslog. See chapter &<>& for details of Exim's logging. @@ -18127,6 +18202,7 @@ when a list of more than one file is used, the &$tls_in_ourcert$& variable is unreliable. The macro "_TLS_BAD_MULTICERT_IN_OURCERT" will be defined for those versions. +.cindex SNI "selecting server certificate based on" If the option contains &$tls_out_sni$& and Exim is built against OpenSSL, then if the OpenSSL build supports TLS extensions and the TLS client sends the Server Name Indication extension, then this option and others documented in @@ -25679,6 +25755,8 @@ See &<>& for details. .option tls_sni smtp string&!! unset .cindex "TLS" "Server Name Indication" +.cindex "TLS" SNI +.cindex SNI "setting in client" .vindex "&$tls_sni$&" If this option is set then it sets the $tls_out_sni variable and causes any TLS session to pass this value as the Server Name Indication extension to @@ -29224,8 +29302,14 @@ certificate verification to the listed servers. Verification either must or need not succeed respectively. The &%tls_verify_cert_hostnames%& option lists hosts for which additional -checks are made: that the host name (the one in the DNS A record) -is valid for the certificate. +name checks are made on the server certificate. +.new +The match against this list is, as per other Exim usage, the +IP for the host. That is most closely associated with the +name on the DNS A (or AAAA) record for the host. +However, the name that needs to be in the certificate +is the one at the head of any CNAME chain leading to the A record. +.wen The option defaults to always checking. The &(smtp)& transport has two OCSP-related options: @@ -29275,6 +29359,8 @@ outgoing connection. .section "Use of TLS Server Name Indication" "SECTtlssni" .cindex "TLS" "Server Name Indication" +.cindex "TLS" SNI +.cindex SNI .vindex "&$tls_in_sni$&" .oindex "&%tls_in_sni%&" With TLS1.0 or above, there is an extension mechanism by which extra @@ -31752,8 +31838,9 @@ send email. Details of how this works are given in section .cindex "header lines" "verifying header names only ASCII" .cindex "verifying" "header names only ASCII" This condition is relevant only in an ACL that is run after a message has been -received, that is, in an ACL specified by &%acl_smtp_data%& or -&%acl_not_smtp%&. It checks all header names (not the content) to make sure +received. +This usually means an ACL specified by &%acl_smtp_data%& or &%acl_not_smtp%&. +It checks all header names (not the content) to make sure there are no non-ASCII characters, also excluding control characters. The allowable characters are decimal ASCII values 33 through 126. @@ -31908,7 +31995,7 @@ Note that '/' is legal in local-parts; if the address may have such (eg. is generated from the received message) they must be protected from the options parsing by doubling: .code -verify = sender=${sg{${address:$h_sender:}}{/}{//}} +verify = sender=${listquote{/}{${address:$h_sender:}}} .endd .endlist @@ -35439,14 +35526,14 @@ address if its delivery failed. .section "Per-address filtering" "SECTperaddfil" -.vindex "&$domain$&" -.vindex "&$local_part$&" +.vindex "&$domain_data$&" +.vindex "&$local_part_data$&" In contrast to the system filter, which is run just once per message for each delivery attempt, it is also possible to set up a system-wide filtering operation that runs once for each recipient address. In this case, variables -such as &$local_part$& and &$domain$& can be used, and indeed, the choice of -filter file could be made dependent on them. This is an example of a router -which implements such a filter: +such as &$local_part_data$& and &$domain_data$& can be used, +and indeed, the choice of filter file could be made dependent on them. +This is an example of a router which implements such a filter: .code central_filter: check_local_user @@ -37267,7 +37354,7 @@ follows: .code my_mailboxes: driver = appendfile - file = /var/mail/$domain/$local_part_data + file = /var/mail/$domain_data/$local_part_data user = mail .endd This uses a directory of mailboxes for each domain. The &%user%& setting is @@ -37307,7 +37394,7 @@ It runs a user's &_.forward_& file for all local parts of the form cases by testing the variable &$local_part_suffix$&. For example: .code if $local_part_suffix contains -special then -save /home/$local_part/Mail/special +save /home/$local_part_data/Mail/special endif .endd If the filter file does not exist, or does not deal with such addresses, they @@ -38653,6 +38740,7 @@ an asterisk is appended to the X= cipher field in the log line. .next .cindex "log" "TLS SNI" .cindex "TLS" "logging SNI" +.cindex SNI logging &%tls_sni%&: When a message is received over an encrypted connection, and the remote host provided the Server Name Indication extension, the SNI is added to the log line, preceded by SNI=. @@ -41522,7 +41610,7 @@ mean, refer to the DMARC website above. Valid strings are: &'reject '& The DMARC check failed and the library recommends rejecting the email. &'quarantine '& The DMARC check failed and the library recommends keeping it for further inspection. &'none '& The DMARC check passed and the library recommends no specific action, neutral. -&'norecord '& No policy section in the DMARC record for this sender domain. +&'norecord '& No policy section in the DMARC record for this RFC5322.From field &'nofrom '& Unable to determine the domain of the sender. &'temperror '& Library error or dns error. &'off '& The DMARC check was disabled for this email.