Exim the Mail Transfer Agent.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Exim the Mail Transfer Agent.Pdf ,Title.10724 Page 1 Tuesday, October 9, 2001 9:25 AM Exim The Mail Transfer Agent ,Title.10724 Page 2 Tuesday, October 9, 2001 9:25 AM ,Title.10724 Page 3 Tuesday, October 9, 2001 9:25 AM Exim The Mail Transfer Agent Philip Hazel Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo ,Copyright.10561 Page 1 Tuesday, October 9, 2001 9:25 AM Exim: The Mail Transfer Agent by Philip Hazel Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editor: Andy Oram Production Editor: Mary Brady Cover Designer: Ellie Volckhausen Printing History: June 2001: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of an aye-aye and Exim is a trademark of O’Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Library of Congress Cataloging-in-Publication Data Hazel, Philip Exim: the mail transfer agent/by Philip Hazel p.cm. ISBN 0-596-00098-7 1. Exim (Computer program) 2. Email--Computer programs I. Title TK5105.73 .H39 2001 004.692--dc21 2001036079 [DS] Ta ble of Contents Preface .................................................................................................................. xiii 1. Introduction .................................................................................................. 1 2. How Inter net Mail Works ......................................................................... 5 Dif ferent Types of MTA .................................................................................... 10 Inter net Message Standards ............................................................................. 11 RFC 822 Message Format ................................................................................. 11 The Message ‘‘On the Wir e’’ ............................................................................ 13 Summary of the SMTP Protocol ....................................................................... 15 Forgery .............................................................................................................. 18 Authentication and Encryption ........................................................................ 18 Routing a Message ............................................................................................ 18 Checking Incoming Mail .................................................................................. 19 Overview of the DNS ....................................................................................... 21 DNS Records Used for Mail Routing ............................................................... 24 Related DNS Records ....................................................................................... 25 Common DNS Errors ........................................................................................ 27 Role of the Postmaster ..................................................................................... 29 3. Exim Over view .......................................................................................... 30 Exim Philosophy ............................................................................................... 30 Exim’s Queue ................................................................................................... 31 Receiving and Delivering Messages ................................................................ 31 Exim Processes ................................................................................................. 32 v 9 October 2001 09:13 vi Table of Contents Coordination Between Processes .................................................................... 32 How Exim Is Configured ................................................................................. 33 How Exim Delivers Messages .......................................................................... 35 Local and Remote Addresses ........................................................................... 37 Pr ocessing an Address ..................................................................................... 38 A Simple Example ............................................................................................ 40 Complications While Directing and Routing ................................................... 46 Complications During Delivery ....................................................................... 48 Complications After Delivery ........................................................................... 49 Use of Transports by Directors and Routers ................................................... 49 4. Exim Operations Over view ................................................................... 52 How Exim Identifies Messages ........................................................................ 52 Watching Exim at Work .................................................................................... 53 The Runtime Configuration File ...................................................................... 54 The Default Qualification Domain .................................................................. 61 Handling Frozen Bounce Messages ................................................................ 62 Reducing Activity at High Load ....................................................................... 62 Limiting Message Sizes ..................................................................................... 65 Parallel Remote Delivery .................................................................................. 65 Contr olling the Number of Delivery Processes .............................................. 66 Large Message Queues ..................................................................................... 66 Large Installations ............................................................................................. 67 5. Extending the Deliver y Configuration ............................................. 71 Multiple Local Domains ................................................................................... 71 Virtual Domains ................................................................................................ 74 Mailing Lists ...................................................................................................... 78 Using an External Local Delivery Agent ......................................................... 85 Multiple User Addresses ................................................................................... 87 Mixed Local/Remote Domains ......................................................................... 88 Delivering to UUCP .......................................................................................... 90 Ignoring the Local Part in Local Deliveries ..................................................... 91 Handling Local Parts in a Case-Sensitive Manner ........................................... 93 Scanning Messages for Viruses ........................................................................ 94 Modifying Message Bodies .............................................................................. 99 9 October 2001 09:13 Ta ble of Contents vii 6. Options Common to Director s and Routers ................................ 101 Conditional Running of Routers and Directors ............................................. 102 Changing a Driver’s Successful Outcome ..................................................... 107 Adding Data for Use by Transports ............................................................... 108 Debugging Directors and Routers ................................................................. 113 Summary of Director/Router Generic Options ............................................. 114 7. The Director s ............................................................................................ 118 Conditional Running of Directors .................................................................. 119 Optimizing Single-Level Aliasing ................................................................... 120 Adding Data for Use by Transports ............................................................... 121 The aliasfile and forwardfile Directors .......................................................... 121 The aliasfile Director ...................................................................................... 133 The forwardfile Director ................................................................................ 138 The localuser Director .................................................................................... 146 The smartuser Director .................................................................................. 147 8. The Routers ............................................................................................... 150 Timeouts While Routing ...............................................................................
Recommended publications
  • Simple Mail Transfer Protocol (SMTP)
    Mail agents MUA = Mail User Agent Interacts directly with the end user Introduction to Internet Mail Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom, Mulberry, Pegasus, Simeon, Netscape, Outlook, ... Multiple MUAs on one system - end user choice Philip Hazel MTA = Mail Transfer Agent University of Cambridge Receives and delivers messages Sendmail, Smail, PP, MMDF, Charon, Exim, qmail, Postfix, ... One MTA per system - sysadmin choice Message format (1) Message format (2) From: Philip Hazel <[email protected]> An address consists of a local part and a domain To: Julius Caesar <[email protected]> [email protected] Cc: Mark Anthony <[email protected]> Subject: How Internet mail works A basic message body is unstructured Julius, Other RFCs (MIME, 2045) add additional headers which I'm going to be running a course on ... define structure for the body Format was originally defined by RFC 822 in 1982 MIME supports attachments of various kinds and in Now superseded by RFC 2822 various encodings Message consists of Header lines Creating/decoding attachments is the MUA's job A blank line Body lines Authenticating senders MUA MTA Spool log Embedded MUA uses inter-process call to send to MTA in May use pipe, file, or internal SMTP over a pipe Folders Mailbox MTA knows the identity of the sender Normally inserts Sender: header if differs from From: SMTP MTA Spool Freestanding MUA uses SMTP to send mail MTA cannot easily distinguish local/remote clients SMTP No authentication in basic protocol Folders SMTP AUTH command in extended
    [Show full text]
  • Mailarchiva Enterprise Edition V1.9
    MailArchiva Enterprise Edition Administration Guide Willkommen Bienvenidos Welkom Bienvenue Welcome MailArchiva Enterprise Edition v1.9 INSTALLATION AND AMINISTRATION GUIDE For Windows / Linux MailArchiva Enterprise Edition Administration Guide 1 INDEX 1 INDEX ............................................................................................................. 2 2 IMPORTANT NOTICE ....................................................................................... 4 3 CONTACT INFORMATION ................................................................................. 4 TECHNICAL REQUIREMENTS .................................................................................. 5 4 OVERVIEW ...................................................................................................... 6 5 HIGH-LEVEL FEATURES ................................................................................... 7 6 ARCHITECTURE ............................................................................................... 9 7 INSTALLATION .............................................................................................. 10 7.1 EXCHANGE SERVER CONFIGURATION .................................................................... 11 7.2 SERVER INSTALLATION (ON WINDOWS ) ................................................................ 14 7.3 SERVER INSTALLATION (ON LINUX ) ..................................................................... 15 7.4 MICROSOFT EXCHANGE ...................................................................................
    [Show full text]
  • Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods*
    Int. J. Communications, Network and System Sciences, 2013, 6, 88-99 http://dx.doi.org/10.4236/ijcns.2013.62011 Published Online February 2013 (http://www.scirp.org/journal/ijcns) Efficient Spam Filtering System Based on Smart * Cooperative Subjective and Objective Methods Samir A. Elsagheer Mohamed1,2 1College of Computer, Qassim University, Qassim, KSA 2Electrical Engineering Department, Faculty of Engineering, Aswan University, Aswan, Egypt Email: [email protected], [email protected] Received September 17, 2012; revised January 16, 2013; accepted January 25, 2013 ABSTRACT Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time con- suming and resource demanding. They are inaccurate and require continuous update to cope with newly invented spammer’s tricks. On the other side, the existing subjective proposals have some drawbacks like the attacks from mali- cious users that make them unreliable and the privacy. In this paper, we propose an efficient spam filtering system that is based on a smart cooperative subjective technique for content filtering in addition to the fastest and the most reliable non-content-based objective methods. The system combines several applications. The first is a web-based system that we have developed based on the proposed technique. A server application having extra features suitable for the enter- prises and closed work groups is a second part of the system. Another part is a set of standard web services that allow any existing email server or email client to interact with the system.
    [Show full text]
  • ESET MAIL SECURITY Installation Manual and User Guide
    ESET MAIL SECURITY Installation Manual and User Guide (intended for product version 4.0 and higher) Linux, BSD and Solaris Contents 1. Introduction..................................................................3 1.1 Main .........................................................................................3functionality 1.2 Key features.........................................................................................3 of the system 2. Terminology..................................................................5 and abbreviations 3. System..................................................................6 requirements 4. Installation..................................................................7 5. Architecture..................................................................8 Overview 6. Integration..................................................................10 with Email Messaging System 6.1 Bi-directional.........................................................................................11 email message scanning in MTA 6.2 Scanning.........................................................................................11 of inbound email messages 6.3 Scanning.........................................................................................11 of outbound email messages 6.4 Scanning of email messages downloaded from POP3/IMAP.........................................................................................11 server 6.5 Alternative.........................................................................................12
    [Show full text]
  • Kaspersky Security for Mail Server
    KASPERSKY SECURITY FOR MAIL SERVER Kaspersky Security for Mail Server protects mail and groupware servers from malicious programs and spam. The product includes applications that protect mail traffi c for all popular servers, including Microsoft® Exchange, Lotus® Domino®, Sendmail, qmail, Postfi x, Exim and CommuniGate Pro. The solution can also be used to set up a dedicated mail gateway. PRODUCT HIGHLIGHTS* MAIL SERVER PROTECTION REDUCED TRAFFIC LOAD Anti-malware and anti-spam protection of mail traffi c Cloud-enabled, intelligent spam fi ltering signifi cantly for all popular mail systems. reduces traffi c load. SYSTEM RESOURCE OPTIMISATION ZETA SHIELD TECHNOLOGY A powerful antivirus engine, load balancing of server (Linux and Exchange servers) resources and scan exclusions all reduce the load Kaspersky ZETA (Zero-day Exploits and Targeted on your system. Attacks) Shield defends against advanced persistent threats (APTs) which take advantage of zero-hour KSN INTEGRATION FOR ANTISPAM vulnerabilities. Increases spam and malware detection rates thanks to integration with Kaspersky Lab’s cloud-based threat identifi cation engine (KSN). FEATURES • Integrated protection of mail servers from all types • Complete protection of Microsoft Exchange Server of malicious programs and compatibiliy with DAG (Database Availability • Effi cient protection against spam Group) • Real-time antivirus protection • Backup storage of data prior to disinfection • On-schedule scanning of emails and databases or deletion • Protection for Sendmail, qmail, Postfi x, Exim
    [Show full text]
  • Linux E-Mail Set Up, Maintain, and Secure a Small Office E-Mail Server
    Linux E-mail Set up, maintain, and secure a small office e-mail server Ian Haycox Alistair McDonald Magnus Bäck Ralf Hildebrandt Patrick Ben Koetter David Rusenko Carl Taylor BIRMINGHAM - MUMBAI This material is copyright and is licensed for the sole use by Jillian Fraser on 20th November 2009 111 Sutter Street, Suite 1800, San Francisco, , 94104 Linux E-mail Set up, maintain, and secure a small office e-mail server Copyright © 2009 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: June 2005 Second edition: November 2009 Production Reference: 1051109 Published by Packt Publishing Ltd. 32 Lincoln Road Olton Birmingham, B27 6PA, UK. ISBN 978-1-847198-64-8 www.packtpub.com
    [Show full text]
  • Opensmtpd: Current State of Affairs
    From: "Gilles Chehade" <[email protected]> To: "Ah, Jacques Cousteau" <[email protected]> Date: Sun, 24 Sep 2017 CET Subject: OpenSMTPD, current state of affairs The plan - Made tons of slides, I'll just skip over some if needed... - Sick AF, may need to run out during the talk… - Should this happen, stay calm and don’t panic, I’ll be back :-) $ whoami - Gilles Chehade <[email protected]> - I'm also @poolpOrg on twitter and github - I live in the beautiful city of Nantes, France (west coast riprizent !) - OpenBSD user since 2.6 (1999), OpenBSD developer since 4.2 (2007) - Also used NetBSD and FreeBSD a lot in the past, I enjoyed all BSD systems - Started working on smtpd in 2007 as personal project for my own needs - pyr@, reyk@ and henning@ tricked me into turning it into OpenSMTPD - "It will be fun", they said with a grin. $ whoami - Currently a Lead-Developer for the Vente-Privée Group - Platinum Sponsor of EuroBSDCon 2017 btw, woohoo ! - We are hiring. We are hiring. We are hiring. We are hiring. Mail me ;-) - I no longer do R&D work in the mail industry - Still do mail experiments in private though ;-) - My daily job has NOTHING to do with mails whatsoever, no conflicts of interest - Vente-Privée has a few OpenSMTPD instances as main MTA - I wasn't sure, I had to ask Miky Mike, the guy who knows this stuff - We also have a few OpenBSD installs, not sure I can say where and why, so… The OpenSMTPD crew - Eric Faurot <[email protected]> aka "The Doctor" - Sunil Nimmagadda <[email protected]> - Jung Joerg <[email protected]> - We tend to cc: our diffs to Todd Miller <[email protected]> - We receive a few contributions from the community - Mostly Linux people, just saying..
    [Show full text]
  • The Qmail Handbook by Dave Sill ISBN:1893115402 Apress 2002 (492 Pages)
    < Free Open Study > The qmail Handbook by Dave Sill ISBN:1893115402 Apress 2002 (492 pages) This guide begins with a discussion of qmail s history, architecture and features, and then goes into a thorough investigation of the installation and configuration process. Table of Contents The qmail Handbook Introduction Ch apt - Introducing qmail er 1 Ch apt - Installing qmail er 2 Ch apt - Configuring qmail: The Basics er 3 Ch apt - Using qmail er 4 Ch apt - Managing qmail er 5 Ch apt - Troubleshooting qmail er 6 Ch apt - Configuring qmail: Advanced Options er 7 Ch apt - Controlling Junk Mail er 8 Ch apt - Managing Mailing Lists er 9 Ch apt - Serving Mailboxes er 10 Ch apt - Hosting Virtual Domain and Users er 11 Ch apt - Understanding Advanced Topics er 12 Ap pe ndi - How qmail Works x A Ap pe ndi - Related Packages x B Ap pe ndi - How Internet Mail Works x C Ap pe ndi - qmail Features x D Ap pe - Error Messages ndi x E Ap pe - Gotchas ndi x F Index List of Figures List of Tables List of Listings < Free Open Study > < Free Open Study > Back Cover • Provides thorough instruction for installing, configuring, and optimizing qmail • Includes coverage of secure networking, troubleshooting issues, and mailing list administration • Covers what system administrators want to know by concentrating on qmail issues relevant to daily operation • Includes instructions on how to filter spam before it reaches the client The qmail Handbook will guide system and mail administrators of all skill levels through installing, configuring, and maintaining the qmail server.
    [Show full text]
  • Release Notes for Debian 7.0 (Wheezy), S/390
    Release Notes for Debian 7.0 (wheezy), S/390 The Debian Documentation Project (http://www.debian.org/doc/) November 20, 2018 Release Notes for Debian 7.0 (wheezy), S/390 This document is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, version 2, as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. The license text can also be found at http://www.gnu.org/licenses/gpl-2.0.html and /usr/ share/common-licenses/GPL-2 on Debian. ii Contents 1 Introduction 1 1.1 Reporting bugs on this document . 1 1.2 Contributing upgrade reports . 1 1.3 Sources for this document . 2 2 What’s new in Debian 7.0 3 2.1 Supported architectures . 3 2.2 What’s new for S390? . 4 2.3 What’s new in the distribution? . 4 2.3.1 CDs, DVDs and BDs . 5 2.3.2 Multiarch . 5 2.3.3 Dependency booting . 5 2.3.4 systemd . 5 2.3.5 Multimedia . 5 2.3.6 Hardened security . 5 2.3.7 AppArmor . 6 2.3.8 The stable-backports section .
    [Show full text]
  • Messaging Platforms for Service Providers - Market Quadrant 2017 ∗
    . The Radicati Group, Inc. www.radicati.com . THE RADICATI GROUP, INC. Messaging Platforms for Service Providers - Market Quadrant 2017 ∗ ........ An Analysis of the Market for Messaging Platforms for Service Providers, Revealing Top Players, Trail Blazers, Specialists and Mature Players. June 2017 SM ∗ Radicati Market Quadrant is copyrighted June 2017 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market QuadrantsSM should not be considered an endorsement, but rather a measure of The Radicati Group’s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market QuadrantsSM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof. Messaging Platforms for Service Providers - Market Quadrant 2017 TABLE OF CONTENTS RADICATI MARKET QUADRANTS EXPLAINED .................................................................................. 2 MARKET SEGMENTATION – MESSAGING PLATFORMS FOR SERVICE PROVIDERS ............................
    [Show full text]
  • AREDN Documentation Release 3.19.3.0
    AREDN Documentation Release 3.19.3.0 AREDN Jul 05, 2020 Guía de inicio 1 Información general de AREDN®3 2 Seleccionando el Hardware de Radio5 3 Descargando el Firmware AREDN®7 4 Instalación del Firmware AREDN®9 5 Basic Radio Setup 21 6 Estado del Nodo 25 7 Mesh Status Display 31 8 Advanced Configuration 35 9 Resumen de redes 51 10 Network Topologies 53 11 Características del espectro radioeléctrico 57 12 Planificación de canales 63 13 Network Modeling 73 14 AREDN® Services Overview 79 15 Chat Programs 83 16 Email Programs 91 i 17 File Sharing Programs 95 18 VoIP Audio/Video Conferencing 99 19 Video Streaming and Surveillance 107 20 Computer Aided Dispatch 115 21 Other Possible Services 119 22 Firmware Upgrade Tips 125 23 Comparing SISO and MIMO Radios 127 24 How-to Use PuTTYGen on Windows to Make SSH Keys and Use Them on AREDN® Nodes 131 25 Settings for Radio Mobile 141 26 Test Network Links with iperf 145 27 Tools for Developers 147 28 Frecuencias y canales 153 29 Información adicional 155 ii AREDN Documentation, Release 3.19.3.0 Version 3.20.3.0 Esta documentación está compuesta de diferentes secciones, las cuales se muestran en el panel de navegación. • La Guía de inicio recorre el proceso de configuración de un nodo radio de AREDN® como parte de una red mallada. • La Guía de diseño de red proporciona información general y consejos para planificar y desplegar una red mallada de forma robusta. • La Guía de aplicaciones y servicios analiza los tipos de programas o servicios que pueden ser utilizados a través de la red mallada.
    [Show full text]
  • Sendmail Evolution: 8.10 and Beyond
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference Monterey, California, USA, June 6–11, 1999 Sendmail Evolution: 8.10 and Beyond Gregory Neil Shapiro and Eric Allman Sendmail, Inc. © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Sendmail Evolution: 8.10 and Beyond Gregory Neil Shapiro [email protected] Eric Allman [email protected] Sendmail, Inc. 6603 Shellmound Street Emeryville,California 94608 ABSTRACT SendmailTM has been the de facto mail transfer agent implementation since the dawn of the Internet. Today, sendmail development is still drivenbyacontinually changing set of network requirements and user demands. Lately,two new driving forces have also contributed to sendmail development. First, as more open source mail transfer agents, such as Exim and Postfix,become available, a newfriendly competition has developed in which the authors of the various MTAs share their ideas via open source and help to advance open standards as opposed to advancing their own particular implementation. Second, a new“hybrid” company, Sendmail, Inc., has been created to offer commercial versions of the open source software while continuing to fuel open source development.
    [Show full text]