Specification of the Exim Mail Transfer Agent

Specification of the Exim Mail Transfer Agent

Specification of the Exim Mail Transfer Agent Philip Hazel University of Cambridge Computing Service Specification of the Exim Mail Transfer Agent Author: Philip Hazel University of Cambridge Computing Service New Museums Site, Pembroke Street, Cambridge CB2 3QH, England Copyright © 2007 University of Cambridge Revision 4.68 23 August 2007 Contents 1. Introduction .................................................................................................................................. 1 1.1 Exim documentation .............................................................................................................. 1 1.2 FTP and web sites ................................................................................................................. 2 1.3 Mailing lists .............................................................................................................................. 2 1.4 Exim training ........................................................................................................................... 3 1.5 Bug reports .............................................................................................................................. 3 1.6 Where to find the Exim distribution ...................................................................................... 3 1.7 Limitations ............................................................................................................................... 3 1.8 Run time configuration ........................................................................................................... 4 1.9 Calling interface ...................................................................................................................... 4 1.10 Terminology ........................................................................................................................... 4 2. Incorporated code ...................................................................................................................... 6 3. How Exim receives and delivers mail ................................................................................... 8 3.1 Overall philosophy .................................................................................................................. 8 3.2 Policy control ........................................................................................................................... 8 3.3 User filters ............................................................................................................................... 8 3.4 Message identification ........................................................................................................... 9 3.5 Receiving mail ........................................................................................................................ 9 3.6 Handling an incoming message ........................................................................................ 10 3.7 Life of a message ................................................................................................................. 10 3.8 Processing an address for delivery ................................................................................... 11 3.9 Processing an address for verification .............................................................................. 12 3.10 Running an individual router ............................................................................................ 12 3.11 Duplicate addresses .......................................................................................................... 13 3.12 Router preconditions ......................................................................................................... 13 3.13 Delivery in detail ................................................................................................................. 14 3.14 Retry mechanism ............................................................................................................... 15 3.15 Temporary delivery failure ................................................................................................ 15 3.16 Permanent delivery failure ................................................................................................ 15 3.17 Failures to deliver bounce messages ............................................................................. 16 4. Building and installing Exim ................................................................................................. 17 4.1 Unpacking ............................................................................................................................. 17 4.2 Multiple machine architectures and operating systems ................................................. 17 4.3 DBM libraries ........................................................................................................................ 17 4.4 Pre-building configuration ................................................................................................... 18 4.5 Support for iconv() ............................................................................................................... 19 4.6 Including TLS/SSL encryption support ............................................................................. 19 4.7 Use of tcpwrappers .............................................................................................................. 20 4.8 Including support for IPv6 ................................................................................................... 20 4.9 The building process ........................................................................................................... 20 4.10 Output from “make” ........................................................................................................... 21 4.11 Overriding build-time options for Exim ............................................................................ 21 4.12 OS-specific header files .................................................................................................... 22 4.13 Overriding build-time options for the monitor ................................................................ 23 4.14 Installing Exim binaries and scripts ................................................................................. 23 4.15 Installing info documentation ........................................................................................... 24 4.16 Setting up the spool directory .......................................................................................... 24 4.17 Testing ................................................................................................................................. 24 4.18 Replacing another MTA with Exim .................................................................................. 25 iii 4.19 Upgrading Exim .................................................................................................................. 26 4.20 Stopping the Exim daemon on Solaris ........................................................................... 26 5. The Exim command line ......................................................................................................... 27 5.1 Setting options by program name ...................................................................................... 27 5.2 Trusted and admin users .................................................................................................... 27 5.3 Command line options ........................................................................................................ 28 6. The Exim run time configuration file ................................................................................... 48 6.1 Using a different configuration file ..................................................................................... 48 6.2 Configuration file format ...................................................................................................... 49 6.3 File inclusions in the configuration file .............................................................................. 49 6.4 Macros in the configuration file .......................................................................................... 50 6.5 Macro substitution ................................................................................................................ 50 6.6 Redefining macros ............................................................................................................... 50 6.7 Overriding macro values ..................................................................................................... 51 6.8 Example of macro usage .................................................................................................... 51 6.9 Conditional skips in the configuration file ......................................................................... 51 6.10 Common option syntax ..................................................................................................... 51 6.11 Boolean options ................................................................................................................. 52 6.12 Integer values ..................................................................................................................... 52 6.13 Octal integer values ........................................................................................................... 52 6.14 Fixed

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    476 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us