mirror of
https://github.com/vdukhovni/postfix
synced 2025-08-22 18:07:41 +00:00
postfix-3.7-20211022
This commit is contained in:
parent
d87dc6f21c
commit
6b8941f03e
@ -25795,3 +25795,23 @@ Apologies for any names omitted.
|
|||||||
smtp/smtp.h, smtp/smtp_chat.c, smtp/smtp_params.c,
|
smtp/smtp.h, smtp/smtp_chat.c, smtp/smtp_params.c,
|
||||||
smtpd/smtpd.c, smtpd/smtpd.h, smtpd/smtpd_chat.c, and test
|
smtpd/smtpd.c, smtpd/smtpd.h, smtpd/smtpd_chat.c, and test
|
||||||
data.
|
data.
|
||||||
|
|
||||||
|
20211006
|
||||||
|
|
||||||
|
Documentation: http://tools.ietf.org/html/rfc[0-9]+ sometimes
|
||||||
|
does not redirect to the https site. Max-Julian Pogner.
|
||||||
|
Fixed by updating mantools/postlink and rebuilding the HTML
|
||||||
|
files that reference RFCs.
|
||||||
|
|
||||||
|
20211016
|
||||||
|
|
||||||
|
Documentation: clarified the difference between private and
|
||||||
|
public services in master.cf. File: proto/master.
|
||||||
|
|
||||||
|
20211022
|
||||||
|
|
||||||
|
Bugfix: the known_tcp_ports setting had no effect. Reported
|
||||||
|
by Peter. It also wasn't fully implemented. Files:
|
||||||
|
config_known_tcp_ports.c, mail_params.c,
|
||||||
|
posttls-finger/posttls-finger.c, smtp/smtp_connect.c,
|
||||||
|
util/find_inet.c, util/myaddrinfo.c.
|
||||||
|
@ -1,5 +0,0 @@
|
|||||||
Add a note to tlsproxy source why it does not enforce deadlines or
|
|
||||||
minimum data rates. Reason: tlsproxy relies on the plaintext client
|
|
||||||
to enforce their context-dependent deadlines and data rates. When
|
|
||||||
a plaintext client times out, it will close the tlsproxy connection,
|
|
||||||
and then tlsproxy will also hang up.
|
|
@ -1,6 +1,11 @@
|
|||||||
Wish list:
|
Wish list:
|
||||||
|
|
||||||
Add verp=+= to the qmgr "from=" logging.
|
Add a pointer to
|
||||||
|
http://mmogilvi.users.sourceforge.net/software/oauthbearer.html
|
||||||
|
in documentation or on-line howtos.
|
||||||
|
|
||||||
|
Add verp=+= to the qmgr "from=" logging. This is already
|
||||||
|
implemented but not yet integrated.
|
||||||
|
|
||||||
Need canonical Dovecot example that has virtual_mailbox_domains,
|
Need canonical Dovecot example that has virtual_mailbox_domains,
|
||||||
(virtual_mailbox_maps or reject unverified_recipient), and
|
(virtual_mailbox_maps or reject unverified_recipient), and
|
||||||
|
@ -20,7 +20,7 @@ BDAT (CHUNKING) support</h1>
|
|||||||
|
|
||||||
<h2>Overview </h2>
|
<h2>Overview </h2>
|
||||||
|
|
||||||
<p> Postfix SMTP server supports <a href="http://tools.ietf.org/html/rfc3030">RFC 3030</a> CHUNKING (the BDAT command)
|
<p> Postfix SMTP server supports <a href="https://tools.ietf.org/html/rfc3030">RFC 3030</a> CHUNKING (the BDAT command)
|
||||||
without BINARYMIME, in both <a href="smtpd.8.html">smtpd(8)</a> and <a href="postscreen.8.html">postscreen(8)</a>. It is enabled
|
without BINARYMIME, in both <a href="smtpd.8.html">smtpd(8)</a> and <a href="postscreen.8.html">postscreen(8)</a>. It is enabled
|
||||||
by default. </p>
|
by default. </p>
|
||||||
|
|
||||||
@ -155,7 +155,7 @@ signatures, so conversion would have to happen before signing. </p>
|
|||||||
<h2> <a name="downsides">Downsides of CHUNKING (BDAT) support</a>
|
<h2> <a name="downsides">Downsides of CHUNKING (BDAT) support</a>
|
||||||
</h2>
|
</h2>
|
||||||
|
|
||||||
<p> The <a href="http://tools.ietf.org/html/rfc3030">RFC 3030</a> authors did not specify any limitations on how
|
<p> The <a href="https://tools.ietf.org/html/rfc3030">RFC 3030</a> authors did not specify any limitations on how
|
||||||
clients may pipeline commands (i.e. send commands without waiting
|
clients may pipeline commands (i.e. send commands without waiting
|
||||||
for a server response). If a server announces PIPELINING support,
|
for a server response). If a server announces PIPELINING support,
|
||||||
like Postfix does, then a remote SMTP client can pipeline all
|
like Postfix does, then a remote SMTP client can pipeline all
|
||||||
@ -167,10 +167,10 @@ behavior. If you require "<a href="postconf.5.html#reject_unauth_pipelining">rej
|
|||||||
then turn off Postfix's CHUNKING announcement as described above.
|
then turn off Postfix's CHUNKING announcement as described above.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p> In <a href="http://tools.ietf.org/html/rfc4468">RFC 4468</a>, the authors write that a client may pipeline
|
<p> In <a href="https://tools.ietf.org/html/rfc4468">RFC 4468</a>, the authors write that a client may pipeline
|
||||||
commands, and that after sending BURL LAST or BDAT LAST, a client
|
commands, and that after sending BURL LAST or BDAT LAST, a client
|
||||||
must wait for the server's response. But as this text does not
|
must wait for the server's response. But as this text does not
|
||||||
appear in <a href="http://tools.ietf.org/html/rfc3030">RFC 3030</a> which defines BDAT, is it a useless restriction
|
appear in <a href="https://tools.ietf.org/html/rfc3030">RFC 3030</a> which defines BDAT, is it a useless restriction
|
||||||
that Postfix will not enforce. </p>
|
that Postfix will not enforce. </p>
|
||||||
|
|
||||||
</body>
|
</body>
|
||||||
|
@ -222,9 +222,9 @@ header/body checks for mail to some domains only</a>". </p>
|
|||||||
|
|
||||||
<li> <p> Header/body checks do not decode message headers or message
|
<li> <p> Header/body checks do not decode message headers or message
|
||||||
body content. For example, if text in the message body is BASE64
|
body content. For example, if text in the message body is BASE64
|
||||||
encoded (<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a>) then your regular expressions will have to match
|
encoded (<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a>) then your regular expressions will have to match
|
||||||
the BASE64 encoded form. Likewise, message headers with encoded
|
the BASE64 encoded form. Likewise, message headers with encoded
|
||||||
non-ASCII characters (<a href="http://tools.ietf.org/html/rfc2047">RFC 2047</a>) need to be matched in their encoded
|
non-ASCII characters (<a href="https://tools.ietf.org/html/rfc2047">RFC 2047</a>) need to be matched in their encoded
|
||||||
form. </p>
|
form. </p>
|
||||||
|
|
||||||
<li> <p> Header/body checks cannot filter on a combination of
|
<li> <p> Header/body checks cannot filter on a combination of
|
||||||
|
@ -21,7 +21,7 @@ DSN Support </h1>
|
|||||||
<h2>Introduction</h2>
|
<h2>Introduction</h2>
|
||||||
|
|
||||||
<p> Postfix version 2.3 introduces support for Delivery Status
|
<p> Postfix version 2.3 introduces support for Delivery Status
|
||||||
Notifications as described in <a href="http://tools.ietf.org/html/rfc3464">RFC 3464</a>. This gives senders control
|
Notifications as described in <a href="https://tools.ietf.org/html/rfc3464">RFC 3464</a>. This gives senders control
|
||||||
over successful and failed delivery notifications. </p>
|
over successful and failed delivery notifications. </p>
|
||||||
|
|
||||||
<p> Specifically, DSN support gives an email sender the ability to
|
<p> Specifically, DSN support gives an email sender the ability to
|
||||||
|
@ -227,7 +227,7 @@ setting the <a href="postconf.5.html">main.cf</a> parameter <a href="postconf.5.
|
|||||||
</p> </blockquote>
|
</p> </blockquote>
|
||||||
|
|
||||||
<p> The elliptic curve standards are evolving, with new curves
|
<p> The elliptic curve standards are evolving, with new curves
|
||||||
introduced in <a href="http://tools.ietf.org/html/rfc8031">RFC 8031</a> to augment or replace the NIST curves tarnished
|
introduced in <a href="https://tools.ietf.org/html/rfc8031">RFC 8031</a> to augment or replace the NIST curves tarnished
|
||||||
by the Snowden revelations. Fortunately, TLS clients advertise
|
by the Snowden revelations. Fortunately, TLS clients advertise
|
||||||
their list of supported curves to the server so that servers can
|
their list of supported curves to the server so that servers can
|
||||||
choose newer stronger curves when mutually supported. OpenSSL 1.0.2
|
choose newer stronger curves when mutually supported. OpenSSL 1.0.2
|
||||||
|
@ -228,7 +228,7 @@ to the LMTP client. </p>
|
|||||||
|
|
||||||
<li> <p> The SMTP server now requires that IPv6 addresses in SMTP
|
<li> <p> The SMTP server now requires that IPv6 addresses in SMTP
|
||||||
commands are specified as [ipv6:<i>ipv6address</i>], as
|
commands are specified as [ipv6:<i>ipv6address</i>], as
|
||||||
described in <a href="http://tools.ietf.org/html/rfc2821">RFC 2821</a>. </p>
|
described in <a href="https://tools.ietf.org/html/rfc2821">RFC 2821</a>. </p>
|
||||||
|
|
||||||
<li> <p> The IPv6 network address matching code was rewritten from
|
<li> <p> The IPv6 network address matching code was rewritten from
|
||||||
the ground up, and is expected to be closer to the specification.
|
the ground up, and is expected to be closer to the specification.
|
||||||
|
@ -199,7 +199,7 @@ server listening at port 389 on ldap.example.com. It will bind anonymously,
|
|||||||
search for any directory entries whose mailacceptinggeneralid
|
search for any directory entries whose mailacceptinggeneralid
|
||||||
attribute is "ldapuser", read the "maildrop" attributes of those
|
attribute is "ldapuser", read the "maildrop" attributes of those
|
||||||
found, and build a list of their maildrops, which will be treated
|
found, and build a list of their maildrops, which will be treated
|
||||||
as <a href="http://tools.ietf.org/html/rfc822">RFC822</a> addresses to which the message will be delivered. </p>
|
as <a href="https://tools.ietf.org/html/rfc822">RFC822</a> addresses to which the message will be delivered. </p>
|
||||||
|
|
||||||
<h2><a name="example_virtual">Example: virtual domains/addresses</a></h2>
|
<h2><a name="example_virtual">Example: virtual domains/addresses</a></h2>
|
||||||
|
|
||||||
@ -592,10 +592,10 @@ contents, please include the applicable bits of some directory entries. </p>
|
|||||||
|
|
||||||
<li>Prabhat K Singh: Wrote the initial Postfix LDAP lookups and connection caching.
|
<li>Prabhat K Singh: Wrote the initial Postfix LDAP lookups and connection caching.
|
||||||
|
|
||||||
<li>Keith Stevenson: <a href="http://tools.ietf.org/html/rfc2254">RFC 2254</a> escaping in queries.
|
<li>Keith Stevenson: <a href="https://tools.ietf.org/html/rfc2254">RFC 2254</a> escaping in queries.
|
||||||
|
|
||||||
<li>Samuel Tardieu: Noticed that searches could include wildcards, prompting
|
<li>Samuel Tardieu: Noticed that searches could include wildcards, prompting
|
||||||
the work on <a href="http://tools.ietf.org/html/rfc2254">RFC 2254</a> escaping in queries. Spotted a bug
|
the work on <a href="https://tools.ietf.org/html/rfc2254">RFC 2254</a> escaping in queries. Spotted a bug
|
||||||
in binding.
|
in binding.
|
||||||
|
|
||||||
<li>Sami Haahtinen: Referral chasing and v3 support.
|
<li>Sami Haahtinen: Referral chasing and v3 support.
|
||||||
|
@ -85,7 +85,7 @@ becoming clogged with undeliverable messages. Specify an empty
|
|||||||
value ("<a href="postconf.5.html#virtual_mailbox_maps">virtual_mailbox_maps</a> =") to disable this feature. </p>
|
value ("<a href="postconf.5.html#virtual_mailbox_maps">virtual_mailbox_maps</a> =") to disable this feature. </p>
|
||||||
|
|
||||||
<li> <p> Lines 6 and 13-15 redirect mail for postmaster to the
|
<li> <p> Lines 6 and 13-15 redirect mail for postmaster to the
|
||||||
local postmaster. <a href="http://tools.ietf.org/html/rfc821">RFC 821</a> requires that every domain has a postmaster
|
local postmaster. <a href="https://tools.ietf.org/html/rfc821">RFC 821</a> requires that every domain has a postmaster
|
||||||
address. </p>
|
address. </p>
|
||||||
|
|
||||||
</ul>
|
</ul>
|
||||||
|
@ -25,7 +25,7 @@ mail to remote destinations when the client's IP address is in the
|
|||||||
|
|
||||||
<p> SMTP clients outside the SMTP server's network need a different
|
<p> SMTP clients outside the SMTP server's network need a different
|
||||||
way to get "same network" privileges. To address this need, Postfix
|
way to get "same network" privileges. To address this need, Postfix
|
||||||
supports SASL authentication (<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a>, formerly <a href="http://tools.ietf.org/html/rfc2554">RFC 2554</a>). With
|
supports SASL authentication (<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a>, formerly <a href="https://tools.ietf.org/html/rfc2554">RFC 2554</a>). With
|
||||||
this a remote SMTP client can authenticate to the Postfix SMTP
|
this a remote SMTP client can authenticate to the Postfix SMTP
|
||||||
server, and the Postfix SMTP client can authenticate to a remote
|
server, and the Postfix SMTP client can authenticate to a remote
|
||||||
SMTP server. Once a client is authenticated, a server can give it
|
SMTP server. Once a client is authenticated, a server can give it
|
||||||
|
@ -145,7 +145,7 @@ no"). </p>
|
|||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
|
|
||||||
<li> <p> Disallowing <a href="http://tools.ietf.org/html/rfc822">RFC 822</a> address syntax (example: "MAIL FROM: the
|
<li> <p> Disallowing <a href="https://tools.ietf.org/html/rfc822">RFC 822</a> address syntax (example: "MAIL FROM: the
|
||||||
dude <dude@example.com>"). </p>
|
dude <dude@example.com>"). </p>
|
||||||
|
|
||||||
<li> <p> Disallowing addresses that are not enclosed with <>
|
<li> <p> Disallowing addresses that are not enclosed with <>
|
||||||
|
@ -22,8 +22,8 @@ Postfix SMTPUTF8 support
|
|||||||
<h2> Overview </h2>
|
<h2> Overview </h2>
|
||||||
|
|
||||||
<p> This document describes Postfix support for Email Address
|
<p> This document describes Postfix support for Email Address
|
||||||
Internationalization (EAI) as defined in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a> (SMTPUTF8 extension),
|
Internationalization (EAI) as defined in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a> (SMTPUTF8 extension),
|
||||||
<a href="http://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized email headers) and <a href="http://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized
|
<a href="https://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized email headers) and <a href="https://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized
|
||||||
delivery status notifications). Introduced with Postfix version
|
delivery status notifications). Introduced with Postfix version
|
||||||
3.0, this fully supports UTF-8 email addresses and UTF-8 message
|
3.0, this fully supports UTF-8 email addresses and UTF-8 message
|
||||||
header values. </p>
|
header values. </p>
|
||||||
@ -288,7 +288,7 @@ at one point in time. </p>
|
|||||||
|
|
||||||
<h3> No automatic conversions between ASCII and UTF-8 domain names. </h3>
|
<h3> No automatic conversions between ASCII and UTF-8 domain names. </h3>
|
||||||
|
|
||||||
<p> Some background: According to <a href="http://tools.ietf.org/html/rfc6530">RFC 6530</a> and related documents,
|
<p> Some background: According to <a href="https://tools.ietf.org/html/rfc6530">RFC 6530</a> and related documents,
|
||||||
an internationalized domain name can appear in two forms: the UTF-8
|
an internationalized domain name can appear in two forms: the UTF-8
|
||||||
form, and the ASCII (xn--mumble) form. An internationalized address
|
form, and the ASCII (xn--mumble) form. An internationalized address
|
||||||
localpart must be encoded in UTF-8; the RFCs do not define an ASCII
|
localpart must be encoded in UTF-8; the RFCs do not define an ASCII
|
||||||
@ -336,7 +336,7 @@ environments</a> </h2>
|
|||||||
non-UTF-8 members. Postfix will try to deliver the non-UTF8 subscribers
|
non-UTF-8 members. Postfix will try to deliver the non-UTF8 subscribers
|
||||||
over "traditional" non-SMTPUTF8 sessions, as long as the message
|
over "traditional" non-SMTPUTF8 sessions, as long as the message
|
||||||
has an ASCII envelope sender address and all-ASCII header values.
|
has an ASCII envelope sender address and all-ASCII header values.
|
||||||
The mailing list manager may have to apply <a href="http://tools.ietf.org/html/rfc2047">RFC 2047</a> encoding to
|
The mailing list manager may have to apply <a href="https://tools.ietf.org/html/rfc2047">RFC 2047</a> encoding to
|
||||||
satisfy that last condition. </p>
|
satisfy that last condition. </p>
|
||||||
|
|
||||||
<h3> Pre-existing non-ASCII email flows </h3>
|
<h3> Pre-existing non-ASCII email flows </h3>
|
||||||
@ -352,7 +352,7 @@ if pre-SMTPUTF8 standards do not support such practice. </p>
|
|||||||
requires that non-ASCII address information is encoded in UTF-8 and
|
requires that non-ASCII address information is encoded in UTF-8 and
|
||||||
will reject other encodings such as ISO-8859. It is not practical
|
will reject other encodings such as ISO-8859. It is not practical
|
||||||
for Postfix to support multiple encodings at the same time. There
|
for Postfix to support multiple encodings at the same time. There
|
||||||
is no problem with <a href="http://tools.ietf.org/html/rfc2047">RFC 2047</a> encodings such as "=?ISO-8859-1?Q?text?=",
|
is no problem with <a href="https://tools.ietf.org/html/rfc2047">RFC 2047</a> encodings such as "=?ISO-8859-1?Q?text?=",
|
||||||
because those use only characters from the ASCII characterset. </p>
|
because those use only characters from the ASCII characterset. </p>
|
||||||
|
|
||||||
<h3> Rejecting non-ASCII addresses in non-SMTPUTF8 transactions </h3>
|
<h3> Rejecting non-ASCII addresses in non-SMTPUTF8 transactions </h3>
|
||||||
|
@ -191,7 +191,7 @@ discussed the first half of this document. </p>
|
|||||||
|
|
||||||
<li> <p> Lines 2-3: Substitute your fantasy hostname here. Do not
|
<li> <p> Lines 2-3: Substitute your fantasy hostname here. Do not
|
||||||
use a domain name that is already in use by real organizations
|
use a domain name that is already in use by real organizations
|
||||||
on the Internet. See <a href="http://tools.ietf.org/html/rfc2606">RFC 2606</a> for examples of domain
|
on the Internet. See <a href="https://tools.ietf.org/html/rfc2606">RFC 2606</a> for examples of domain
|
||||||
names that are guaranteed not to be owned by anyone. </p>
|
names that are guaranteed not to be owned by anyone. </p>
|
||||||
|
|
||||||
<li> <p> Lines 5, 9, 10: This provides the mapping from
|
<li> <p> Lines 5, 9, 10: This provides the mapping from
|
||||||
|
@ -823,7 +823,7 @@ discussed the first half of this document. </p>
|
|||||||
|
|
||||||
<li> <p> Lines 2-3: Substitute your fantasy hostname here. Do not
|
<li> <p> Lines 2-3: Substitute your fantasy hostname here. Do not
|
||||||
use a domain name that is already in use by real organizations
|
use a domain name that is already in use by real organizations
|
||||||
on the Internet. See <a href="http://tools.ietf.org/html/rfc2606">RFC 2606</a> for examples of domain
|
on the Internet. See <a href="https://tools.ietf.org/html/rfc2606">RFC 2606</a> for examples of domain
|
||||||
names that are guaranteed not to be owned by anyone. </p>
|
names that are guaranteed not to be owned by anyone. </p>
|
||||||
|
|
||||||
<li> <p> Lines 5, 9, 10: This provides the mapping from
|
<li> <p> Lines 5, 9, 10: This provides the mapping from
|
||||||
|
@ -33,7 +33,7 @@ encrypted session protects the information that is transmitted with
|
|||||||
SMTP mail or with SASL authentication.
|
SMTP mail or with SASL authentication.
|
||||||
|
|
||||||
<p> Postfix version 2.2 introduces support for TLS as described in
|
<p> Postfix version 2.2 introduces support for TLS as described in
|
||||||
<a href="http://tools.ietf.org/html/rfc3207">RFC 3207</a>. TLS Support for older Postfix versions was available as
|
<a href="https://tools.ietf.org/html/rfc3207">RFC 3207</a>. TLS Support for older Postfix versions was available as
|
||||||
an add-on patch. The section "<a href="#compat">Compatibility with
|
an add-on patch. The section "<a href="#compat">Compatibility with
|
||||||
Postfix < 2.2 TLS support</a>" below discusses the differences
|
Postfix < 2.2 TLS support</a>" below discusses the differences
|
||||||
between these implementations. </p>
|
between these implementations. </p>
|
||||||
@ -425,7 +425,7 @@ private key. This is intended behavior. </p>
|
|||||||
|
|
||||||
<p> You can ENFORCE the use of TLS, so that the Postfix SMTP server
|
<p> You can ENFORCE the use of TLS, so that the Postfix SMTP server
|
||||||
announces STARTTLS and accepts no mail without TLS encryption, by
|
announces STARTTLS and accepts no mail without TLS encryption, by
|
||||||
setting "<a href="postconf.5.html#smtpd_enforce_tls">smtpd_enforce_tls</a> = yes". According to <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> this MUST
|
setting "<a href="postconf.5.html#smtpd_enforce_tls">smtpd_enforce_tls</a> = yes". According to <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> this MUST
|
||||||
NOT be applied in case of a publicly-referenced Postfix SMTP server.
|
NOT be applied in case of a publicly-referenced Postfix SMTP server.
|
||||||
This option is off by default and should only seldom be used. </p>
|
This option is off by default and should only seldom be used. </p>
|
||||||
|
|
||||||
@ -575,7 +575,7 @@ $<a href="postconf.5.html#data_directory">data_directory</a>, and a warning is l
|
|||||||
|
|
||||||
<p> Cached Postfix SMTP server session information expires after
|
<p> Cached Postfix SMTP server session information expires after
|
||||||
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
||||||
default of 300s, but a longer time of 3600sec (=1 hour). <a href="http://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
default of 300s, but a longer time of 3600sec (=1 hour). <a href="https://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
||||||
recommends a maximum of 24 hours. </p>
|
recommends a maximum of 24 hours. </p>
|
||||||
|
|
||||||
<p> Example: </p>
|
<p> Example: </p>
|
||||||
@ -949,7 +949,7 @@ $<a href="postconf.5.html#data_directory">data_directory</a>, and a warning is l
|
|||||||
|
|
||||||
<p> Cached Postfix SMTP client session information expires after
|
<p> Cached Postfix SMTP client session information expires after
|
||||||
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
||||||
default of 300s, but a longer time of 3600s (=1 hour). <a href="http://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
default of 300s, but a longer time of 3600s (=1 hour). <a href="https://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
||||||
recommends a maximum of 24 hours. </p>
|
recommends a maximum of 24 hours. </p>
|
||||||
|
|
||||||
<p> Example: </p>
|
<p> Example: </p>
|
||||||
@ -1004,7 +1004,7 @@ CommonName is checked. Verification may be turned off with the
|
|||||||
|
|
||||||
<p> Enforcing the use of TLS is useful if you know that you will
|
<p> Enforcing the use of TLS is useful if you know that you will
|
||||||
only
|
only
|
||||||
connect to servers that support <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> _and_ that present server
|
connect to servers that support <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> _and_ that present server
|
||||||
certificates that meet the above requirements. An example would
|
certificates that meet the above requirements. An example would
|
||||||
be a client only sends email to one specific mailhub that offers
|
be a client only sends email to one specific mailhub that offers
|
||||||
the necessary STARTTLS support. </p>
|
the necessary STARTTLS support. </p>
|
||||||
@ -1021,7 +1021,7 @@ the necessary STARTTLS support. </p>
|
|||||||
<h3> <a name="client_tls_nopeer"> Disabling server certificate
|
<h3> <a name="client_tls_nopeer"> Disabling server certificate
|
||||||
verification </a> </h3>
|
verification </a> </h3>
|
||||||
|
|
||||||
<p> As of <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> the requirements for hostname checking for MTA
|
<p> As of <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> the requirements for hostname checking for MTA
|
||||||
clients are not set. When TLS is required (<a href="postconf.5.html#smtp_enforce_tls">smtp_enforce_tls</a> = yes),
|
clients are not set. When TLS is required (<a href="postconf.5.html#smtp_enforce_tls">smtp_enforce_tls</a> = yes),
|
||||||
the option <a href="postconf.5.html#smtp_tls_enforce_peername">smtp_tls_enforce_peername</a> can be set to "no" to disable
|
the option <a href="postconf.5.html#smtp_tls_enforce_peername">smtp_tls_enforce_peername</a> can be set to "no" to disable
|
||||||
strict remote SMTP server hostname checking. In this case, the mail
|
strict remote SMTP server hostname checking. In this case, the mail
|
||||||
|
@ -188,8 +188,8 @@ Certificate-less operation is not recommended. <p>
|
|||||||
Most sites only have RSA certificates. You can configure all three
|
Most sites only have RSA certificates. You can configure all three
|
||||||
at the same time, in which case the ciphersuite negotiated with the
|
at the same time, in which case the ciphersuite negotiated with the
|
||||||
remote SMTP client determines which certificate is used. If your
|
remote SMTP client determines which certificate is used. If your
|
||||||
DNS zone is signed, and you want to publish DANE TLSA (<a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a>,
|
DNS zone is signed, and you want to publish DANE TLSA (<a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a>,
|
||||||
<a href="http://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>) records, these must match all of the configured
|
<a href="https://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>) records, these must match all of the configured
|
||||||
certificate chains. Since the best practice is to publish "3 1 1"
|
certificate chains. Since the best practice is to publish "3 1 1"
|
||||||
certificate associations, create a separate TLSA record to match
|
certificate associations, create a separate TLSA record to match
|
||||||
each public-key certificate digest. </p>
|
each public-key certificate digest. </p>
|
||||||
@ -224,7 +224,7 @@ size of the server TLS handshake. </p>
|
|||||||
</pre>
|
</pre>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<li> <p> If you publish DANE TLSA (<a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a>, <a href="http://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>)
|
<li> <p> If you publish DANE TLSA (<a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a>, <a href="https://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>)
|
||||||
"2 0 1" or "2 1 1" records to specify root CA certificate digests,
|
"2 0 1" or "2 1 1" records to specify root CA certificate digests,
|
||||||
you must include the corresponding root CA certificates in the
|
you must include the corresponding root CA certificates in the
|
||||||
"server.pem" certificate file. </p>
|
"server.pem" certificate file. </p>
|
||||||
@ -526,7 +526,7 @@ private key. This is intended behavior. </p>
|
|||||||
<p> <a name="server_enforce">You can ENFORCE the use of TLS</a>,
|
<p> <a name="server_enforce">You can ENFORCE the use of TLS</a>,
|
||||||
so that the Postfix SMTP server announces STARTTLS and accepts no
|
so that the Postfix SMTP server announces STARTTLS and accepts no
|
||||||
mail without TLS encryption, by setting
|
mail without TLS encryption, by setting
|
||||||
"<a href="postconf.5.html#smtpd_tls_security_level">smtpd_tls_security_level</a> = encrypt". According to <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> this
|
"<a href="postconf.5.html#smtpd_tls_security_level">smtpd_tls_security_level</a> = encrypt". According to <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> this
|
||||||
MUST NOT be applied in case
|
MUST NOT be applied in case
|
||||||
of a publicly-referenced Postfix SMTP server. This option is off
|
of a publicly-referenced Postfix SMTP server. This option is off
|
||||||
by default and should only seldom be used. </p>
|
by default and should only seldom be used. </p>
|
||||||
@ -685,9 +685,9 @@ the cost of repeatedly negotiating TLS session keys is high.</p>
|
|||||||
|
|
||||||
<p> Starting with Postfix 2.11, linked with a compatible OpenSSL
|
<p> Starting with Postfix 2.11, linked with a compatible OpenSSL
|
||||||
library (at least 0.9.8h, preferably 1.0.0 or later) the Postfix
|
library (at least 0.9.8h, preferably 1.0.0 or later) the Postfix
|
||||||
SMTP server supports <a href="http://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session resumption without
|
SMTP server supports <a href="https://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session resumption without
|
||||||
server-side state when the remote SMTP client also supports <a href="http://tools.ietf.org/html/rfc5077">RFC</a>
|
server-side state when the remote SMTP client also supports <a href="https://tools.ietf.org/html/rfc5077">RFC</a>
|
||||||
<a href="http://tools.ietf.org/html/rfc5077">5077</a>. The session is encrypted by the server in a <i>session
|
<a href="https://tools.ietf.org/html/rfc5077">5077</a>. The session is encrypted by the server in a <i>session
|
||||||
ticket</i> returned to client for storage. When a client sends a
|
ticket</i> returned to client for storage. When a client sends a
|
||||||
valid session ticket, the server decrypts it and resumes the session,
|
valid session ticket, the server decrypts it and resumes the session,
|
||||||
provided neither the ticket nor the session have expired. This
|
provided neither the ticket nor the session have expired. This
|
||||||
@ -720,7 +720,7 @@ Postfix-owned <a href="postconf.5.html#data_directory">data_directory</a>, and a
|
|||||||
|
|
||||||
<p> Cached Postfix SMTP server session information expires after
|
<p> Cached Postfix SMTP server session information expires after
|
||||||
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
||||||
default of 300s, but a longer time of 3600sec (=1 hour). <a href="http://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
default of 300s, but a longer time of 3600sec (=1 hour). <a href="https://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
||||||
recommends a maximum of 24 hours. </p>
|
recommends a maximum of 24 hours. </p>
|
||||||
|
|
||||||
<p> Example: </p>
|
<p> Example: </p>
|
||||||
@ -1273,14 +1273,14 @@ just in case the transport table entries are not specified consistently. </p>
|
|||||||
<h4><a name="client_tls_dane">DANE TLS authentication.</a> </h4>
|
<h4><a name="client_tls_dane">DANE TLS authentication.</a> </h4>
|
||||||
|
|
||||||
<p> The Postfix SMTP client supports two TLS security levels based
|
<p> The Postfix SMTP client supports two TLS security levels based
|
||||||
on DANE TLSA (<a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a>, <a href="http://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>) records. The opportunistic
|
on DANE TLSA (<a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a>, <a href="https://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>) records. The opportunistic
|
||||||
"dane" level and the mandatory "dane-only" level. </p>
|
"dane" level and the mandatory "dane-only" level. </p>
|
||||||
|
|
||||||
<p> The "dane" level is a stronger form of <a
|
<p> The "dane" level is a stronger form of <a
|
||||||
href="#client_tls_may">opportunistic</a> TLS that is resistant to
|
href="#client_tls_may">opportunistic</a> TLS that is resistant to
|
||||||
man in the middle and downgrade attacks when the destination domain
|
man in the middle and downgrade attacks when the destination domain
|
||||||
uses DNSSEC to publish DANE TLSA records for its MX hosts. If a
|
uses DNSSEC to publish DANE TLSA records for its MX hosts. If a
|
||||||
remote SMTP server has "usable" (see section 3 of <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>) DANE
|
remote SMTP server has "usable" (see section 3 of <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>) DANE
|
||||||
TLSA records, the server connection will be authenticated. When
|
TLSA records, the server connection will be authenticated. When
|
||||||
DANE authentication fails, there is no fallback to unauthenticated
|
DANE authentication fails, there is no fallback to unauthenticated
|
||||||
or plaintext delivery. </p>
|
or plaintext delivery. </p>
|
||||||
@ -1315,7 +1315,7 @@ be signed and the Postfix SMTP client's operating system must be
|
|||||||
configured to send its DNS queries to a recursive DNS nameserver
|
configured to send its DNS queries to a recursive DNS nameserver
|
||||||
that is able to validate the signed records. Each MX host's DNS
|
that is able to validate the signed records. Each MX host's DNS
|
||||||
zone needs to also be signed, and needs to publish DANE TLSA (see
|
zone needs to also be signed, and needs to publish DANE TLSA (see
|
||||||
section 3 of <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>) records that specify how that MX host's TLS
|
section 3 of <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>) records that specify how that MX host's TLS
|
||||||
certificate is to be verified. </p>
|
certificate is to be verified. </p>
|
||||||
|
|
||||||
<p> TLSA records do not preempt the normal SMTP MX host
|
<p> TLSA records do not preempt the normal SMTP MX host
|
||||||
@ -1327,7 +1327,7 @@ see the documentation for the <a href="postconf.5.html#smtp_dns_support_level">s
|
|||||||
parameter. The <a href="postconf.5.html#tls_dane_digests">tls_dane_digests</a> parameter controls the list of
|
parameter. The <a href="postconf.5.html#tls_dane_digests">tls_dane_digests</a> parameter controls the list of
|
||||||
supported digests. </p>
|
supported digests. </p>
|
||||||
|
|
||||||
<p> As explained in section 3 of <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>, certificate usages "0"
|
<p> As explained in section 3 of <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>, certificate usages "0"
|
||||||
and "1", which are intended to "constrain" existing Web-PKI trust,
|
and "1", which are intended to "constrain" existing Web-PKI trust,
|
||||||
are not supported with MTA-to-MTA SMTP. Rather, TLSA records with
|
are not supported with MTA-to-MTA SMTP. Rather, TLSA records with
|
||||||
usages "0" and "1" are treated as "unusable". </p>
|
usages "0" and "1" are treated as "unusable". </p>
|
||||||
@ -1346,8 +1346,8 @@ records. </p>
|
|||||||
security level is treated like a "mandatory" TLS security level,
|
security level is treated like a "mandatory" TLS security level,
|
||||||
and weak ciphers and protocols are disabled. Since DANE authenticates
|
and weak ciphers and protocols are disabled. Since DANE authenticates
|
||||||
server certificates the "aNULL" cipher-suites are transparently
|
server certificates the "aNULL" cipher-suites are transparently
|
||||||
excluded at this level, no need to configure this manually. <a href="http://tools.ietf.org/html/rfc7672">RFC</a>
|
excluded at this level, no need to configure this manually. <a href="https://tools.ietf.org/html/rfc7672">RFC</a>
|
||||||
<a href="http://tools.ietf.org/html/rfc7672">7672</a> (DANE) TLS authentication is available with Postfix 2.11 and
|
<a href="https://tools.ietf.org/html/rfc7672">7672</a> (DANE) TLS authentication is available with Postfix 2.11 and
|
||||||
later. </p>
|
later. </p>
|
||||||
|
|
||||||
<p> When a DANE TLSA record specifies a trust-anchor (TA) certificate
|
<p> When a DANE TLSA record specifies a trust-anchor (TA) certificate
|
||||||
@ -1613,7 +1613,7 @@ verification as a default policy. </p>
|
|||||||
|
|
||||||
<p> Mandatory server certificate verification as a default security
|
<p> Mandatory server certificate verification as a default security
|
||||||
level may be appropriate if you know that you will only connect to
|
level may be appropriate if you know that you will only connect to
|
||||||
servers that support <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> <i>and</i> that present verifiable
|
servers that support <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> <i>and</i> that present verifiable
|
||||||
server certificates. An example would be a client that sends all
|
server certificates. An example would be a client that sends all
|
||||||
email to a central mailhub that offers the necessary STARTTLS
|
email to a central mailhub that offers the necessary STARTTLS
|
||||||
support. In such cases, you can often use a <a
|
support. In such cases, you can often use a <a
|
||||||
@ -1687,7 +1687,7 @@ as a default policy. </p>
|
|||||||
|
|
||||||
<p> Mandatory secure server certificate verification as a default
|
<p> Mandatory secure server certificate verification as a default
|
||||||
security level may be appropriate if you know that you will only
|
security level may be appropriate if you know that you will only
|
||||||
connect to servers that support <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> <i>and</i> that present
|
connect to servers that support <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> <i>and</i> that present
|
||||||
verifiable server certificates. An example would be a client that
|
verifiable server certificates. An example would be a client that
|
||||||
sends all email to a central mailhub that offers the necessary
|
sends all email to a central mailhub that offers the necessary
|
||||||
STARTTLS support. </p>
|
STARTTLS support. </p>
|
||||||
@ -2102,7 +2102,7 @@ Postfix-owned <a href="postconf.5.html#data_directory">data_directory</a>, and a
|
|||||||
|
|
||||||
<p> Cached Postfix SMTP client session information expires after
|
<p> Cached Postfix SMTP client session information expires after
|
||||||
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
a certain amount of time. Postfix/TLS does not use the OpenSSL
|
||||||
default of 300s, but a longer time of 3600s (=1 hour). <a href="http://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
default of 300s, but a longer time of 3600s (=1 hour). <a href="https://tools.ietf.org/html/rfc2246">RFC 2246</a>
|
||||||
recommends a maximum of 24 hours. </p>
|
recommends a maximum of 24 hours. </p>
|
||||||
|
|
||||||
<p> Example: </p>
|
<p> Example: </p>
|
||||||
@ -2177,7 +2177,7 @@ When, as is current practice, the client verifies the insecurely
|
|||||||
obtained MX hostname, it is subject to a DNS man-in-the-middle
|
obtained MX hostname, it is subject to a DNS man-in-the-middle
|
||||||
attack. </p>
|
attack. </p>
|
||||||
|
|
||||||
<p> Adoption of DNSSEC and <a href="http://tools.ietf.org/html/rfc6698">RFC6698</a> (DANE) may gradually (as domains
|
<p> Adoption of DNSSEC and <a href="https://tools.ietf.org/html/rfc6698">RFC6698</a> (DANE) may gradually (as domains
|
||||||
implement DNSSEC and publish TLSA records for their MX hosts) address
|
implement DNSSEC and publish TLSA records for their MX hosts) address
|
||||||
the DNS man-in-the-middle risk and provide scalable key management
|
the DNS man-in-the-middle risk and provide scalable key management
|
||||||
for SMTP with TLS. Postfix ≥ 2.11 supports the new <a
|
for SMTP with TLS. Postfix ≥ 2.11 supports the new <a
|
||||||
@ -2290,7 +2290,7 @@ found, but none are usable, the effective security level is <a
|
|||||||
href="#client_tls_encrypt">encrypt</a>. When usable TLSA records
|
href="#client_tls_encrypt">encrypt</a>. When usable TLSA records
|
||||||
are obtained for the remote SMTP server, SSLv2+3 are automatically
|
are obtained for the remote SMTP server, SSLv2+3 are automatically
|
||||||
disabled (see <a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a>), and the server certificate
|
disabled (see <a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a>), and the server certificate
|
||||||
must match the TLSA records. <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE) TLS authentication
|
must match the TLSA records. <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE) TLS authentication
|
||||||
and DNSSEC support is available with Postfix 2.11 and later. </dd>
|
and DNSSEC support is available with Postfix 2.11 and later. </dd>
|
||||||
|
|
||||||
<dt><b>dane-only</b></dt> <dd><a href="#client_tls_dane">Mandatory DANE TLS</a>.
|
<dt><b>dane-only</b></dt> <dd><a href="#client_tls_dane">Mandatory DANE TLS</a>.
|
||||||
@ -2299,7 +2299,7 @@ DNSSEC. If no TLSA records are found, or none are usable, no
|
|||||||
connection is made to the server. When usable TLSA records are
|
connection is made to the server. When usable TLSA records are
|
||||||
obtained for the remote SMTP server, SSLv2+3 are automatically disabled
|
obtained for the remote SMTP server, SSLv2+3 are automatically disabled
|
||||||
(see <a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a>), and the server certificate must
|
(see <a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a>), and the server certificate must
|
||||||
match the TLSA records. <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE) TLS authentication and
|
match the TLSA records. <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE) TLS authentication and
|
||||||
DNSSEC support is available with Postfix 2.11 and later. </dd>
|
DNSSEC support is available with Postfix 2.11 and later. </dd>
|
||||||
|
|
||||||
<dt><b>fingerprint</b></dt> <dd><a href="#client_tls_fprint">Certificate
|
<dt><b>fingerprint</b></dt> <dd><a href="#client_tls_fprint">Certificate
|
||||||
@ -2996,7 +2996,7 @@ receiving and sending mail. It also enables logging of TLS connections
|
|||||||
and recording of TLS use in the "Received" header. TLS session
|
and recording of TLS use in the "Received" header. TLS session
|
||||||
caching is also enabled in the Postfix SMTP client. With Postfix
|
caching is also enabled in the Postfix SMTP client. With Postfix
|
||||||
≥ 2.10, the SMTP server does not need an explicit session cache
|
≥ 2.10, the SMTP server does not need an explicit session cache
|
||||||
since session reuse is better handled via <a href="http://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session
|
since session reuse is better handled via <a href="https://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session
|
||||||
tickets. </p>
|
tickets. </p>
|
||||||
|
|
||||||
<h3><a name="private-ca">Private Certification Authority</a></h3>
|
<h3><a name="private-ca">Private Certification Authority</a></h3>
|
||||||
|
@ -89,7 +89,7 @@ names are shown in upper case, they are in fact case insensitive.
|
|||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
|
|
||||||
<li> <p> Attribute values are xtext encoded as per <a href="http://tools.ietf.org/html/rfc1891">RFC 1891</a>.
|
<li> <p> Attribute values are xtext encoded as per <a href="https://tools.ietf.org/html/rfc1891">RFC 1891</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<li> <p> The NAME attribute specifies a remote SMTP client
|
<li> <p> The NAME attribute specifies a remote SMTP client
|
||||||
@ -260,7 +260,7 @@ before each MAIL FROM command. </p>
|
|||||||
<h2> References </h2>
|
<h2> References </h2>
|
||||||
|
|
||||||
<p> Moore, K, "SMTP Service Extension for Delivery Status Notifications",
|
<p> Moore, K, "SMTP Service Extension for Delivery Status Notifications",
|
||||||
<a href="http://tools.ietf.org/html/rfc1891">RFC 1891</a>, January 1996. </p>
|
<a href="https://tools.ietf.org/html/rfc1891">RFC 1891</a>, January 1996. </p>
|
||||||
|
|
||||||
</body>
|
</body>
|
||||||
|
|
||||||
|
@ -81,7 +81,7 @@ names are shown in upper case, they are in fact case insensitive.
|
|||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
|
|
||||||
<li> <p> Attribute values are xtext encoded as per <a href="http://tools.ietf.org/html/rfc1891">RFC 1891</a>.
|
<li> <p> Attribute values are xtext encoded as per <a href="https://tools.ietf.org/html/rfc1891">RFC 1891</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<li> <p> The NAME attribute specifies the up-stream hostname,
|
<li> <p> The NAME attribute specifies the up-stream hostname,
|
||||||
@ -234,7 +234,7 @@ so there is no risk of information leakage. </p>
|
|||||||
<h2> References </h2>
|
<h2> References </h2>
|
||||||
|
|
||||||
<p> Moore, K, "SMTP Service Extension for Delivery Status Notifications",
|
<p> Moore, K, "SMTP Service Extension for Delivery Status Notifications",
|
||||||
<a href="http://tools.ietf.org/html/rfc1891">RFC 1891</a>, January 1996. </p>
|
<a href="https://tools.ietf.org/html/rfc1891">RFC 1891</a>, January 1996. </p>
|
||||||
|
|
||||||
</body>
|
</body>
|
||||||
|
|
||||||
|
@ -160,7 +160,7 @@ ACCESS(5) ACCESS(5)
|
|||||||
|
|
||||||
<b>REJECT ACTIONS</b>
|
<b>REJECT ACTIONS</b>
|
||||||
Postfix version 2.3 and later support enhanced status codes as defined
|
Postfix version 2.3 and later support enhanced status codes as defined
|
||||||
in <a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a>. When no code is specified at the beginning of the <i>text</i>
|
in <a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a>. When no code is specified at the beginning of the <i>text</i>
|
||||||
below, Postfix inserts a default enhanced status code of "5.7.1" in the
|
below, Postfix inserts a default enhanced status code of "5.7.1" in the
|
||||||
case of reject actions, and "4.7.1" in the case of defer actions. See
|
case of reject actions, and "4.7.1" in the case of defer actions. See
|
||||||
"ENHANCED STATUS CODES" below.
|
"ENHANCED STATUS CODES" below.
|
||||||
@ -340,7 +340,7 @@ ACCESS(5) ACCESS(5)
|
|||||||
|
|
||||||
<b>ENHANCED STATUS CODES</b>
|
<b>ENHANCED STATUS CODES</b>
|
||||||
Postfix version 2.3 and later support enhanced status codes as defined
|
Postfix version 2.3 and later support enhanced status codes as defined
|
||||||
in <a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a>. When an enhanced status code is specified in an access
|
in <a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a>. When an enhanced status code is specified in an access
|
||||||
table, it is subject to modification. The following transformations are
|
table, it is subject to modification. The following transformations are
|
||||||
needed when the same access table is used for client, helo, sender, or
|
needed when the same access table is used for client, helo, sender, or
|
||||||
recipient access restrictions; they happen regardless of whether Post-
|
recipient access restrictions; they happen regardless of whether Post-
|
||||||
|
@ -63,8 +63,8 @@ ALIASES(5) ALIASES(5)
|
|||||||
The <i>value</i> contains one or more of the following:
|
The <i>value</i> contains one or more of the following:
|
||||||
|
|
||||||
<i>address</i>
|
<i>address</i>
|
||||||
Mail is forwarded to <i>address</i>, which is compatible with the <a href="http://tools.ietf.org/html/rfc822">RFC</a>
|
Mail is forwarded to <i>address</i>, which is compatible with the <a href="https://tools.ietf.org/html/rfc822">RFC</a>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">822</a> standard.
|
<a href="https://tools.ietf.org/html/rfc822">822</a> standard.
|
||||||
|
|
||||||
<i>/file/name</i>
|
<i>/file/name</i>
|
||||||
Mail is appended to <i>/file/name</i>. See <a href="local.8.html"><b>local</b>(8)</a> for details of
|
Mail is appended to <i>/file/name</i>. See <a href="local.8.html"><b>local</b>(8)</a> for details of
|
||||||
@ -177,7 +177,7 @@ ALIASES(5) ALIASES(5)
|
|||||||
while expanding aliases or .forward files.
|
while expanding aliases or .forward files.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
|
|
||||||
<b>SEE ALSO</b>
|
<b>SEE ALSO</b>
|
||||||
<a href="local.8.html">local(8)</a>, local delivery agent
|
<a href="local.8.html">local(8)</a>, local delivery agent
|
||||||
|
@ -39,16 +39,16 @@ BOUNCE(8) BOUNCE(8)
|
|||||||
and that depend on retry logic in their own client.
|
and that depend on retry logic in their own client.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a> (Format of Internet Message Bodies)
|
<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a> (Format of Internet Message Bodies)
|
||||||
<a href="http://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc3462">RFC 3462</a> (Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc3462">RFC 3462</a> (Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc3834">RFC 3834</a> (Auto-Submitted: message header)
|
<a href="https://tools.ietf.org/html/rfc3834">RFC 3834</a> (Auto-Submitted: message header)
|
||||||
<a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
<a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
||||||
<a href="http://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized Message Format)
|
<a href="https://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
|
@ -62,13 +62,13 @@ CLEANUP(8) CLEANUP(8)
|
|||||||
trouble.
|
trouble.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a> (MIME: Format of Internet Message Bodies)
|
<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a> (MIME: Format of Internet Message Bodies)
|
||||||
<a href="http://tools.ietf.org/html/rfc2046">RFC 2046</a> (MIME: Media Types)
|
<a href="https://tools.ietf.org/html/rfc2046">RFC 2046</a> (MIME: Media Types)
|
||||||
<a href="http://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery status notifications)
|
<a href="https://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery status notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
@ -422,7 +422,7 @@ CLEANUP(8) CLEANUP(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
||||||
Enable preliminary SMTPUTF8 support for the protocols described
|
Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
||||||
Detect that a message requires SMTPUTF8 support for the speci-
|
Detect that a message requires SMTPUTF8 support for the speci-
|
||||||
|
@ -39,16 +39,16 @@ BOUNCE(8) BOUNCE(8)
|
|||||||
and that depend on retry logic in their own client.
|
and that depend on retry logic in their own client.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a> (Format of Internet Message Bodies)
|
<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a> (Format of Internet Message Bodies)
|
||||||
<a href="http://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc3462">RFC 3462</a> (Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc3462">RFC 3462</a> (Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc3834">RFC 3834</a> (Auto-Submitted: message header)
|
<a href="https://tools.ietf.org/html/rfc3834">RFC 3834</a> (Auto-Submitted: message header)
|
||||||
<a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
<a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
||||||
<a href="http://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized Message Format)
|
<a href="https://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
|
@ -17,7 +17,7 @@ DISCARD(8) DISCARD(8)
|
|||||||
the queue manager. Each request specifies a queue file, a sender
|
the queue manager. Each request specifies a queue file, a sender
|
||||||
address, a next-hop destination that is treated as the reason for dis-
|
address, a next-hop destination that is treated as the reason for dis-
|
||||||
carding the mail, and recipient information. The reason may be pre-
|
carding the mail, and recipient information. The reason may be pre-
|
||||||
fixed with an <a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a>-compatible detail code. This program expects to
|
fixed with an <a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a>-compatible detail code. This program expects to
|
||||||
be run from the <a href="master.8.html"><b>master</b>(8)</a> process manager.
|
be run from the <a href="master.8.html"><b>master</b>(8)</a> process manager.
|
||||||
|
|
||||||
The <a href="discard.8.html"><b>discard</b>(8)</a> delivery agent pretends to deliver all recipients in the
|
The <a href="discard.8.html"><b>discard</b>(8)</a> delivery agent pretends to deliver all recipients in the
|
||||||
@ -33,7 +33,7 @@ DISCARD(8) DISCARD(8)
|
|||||||
the network, and can be run chrooted at fixed low privilege.
|
the network, and can be run chrooted at fixed low privilege.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
|
@ -17,7 +17,7 @@ ERROR(8) ERROR(8)
|
|||||||
the queue manager. Each request specifies a queue file, a sender
|
the queue manager. Each request specifies a queue file, a sender
|
||||||
address, the reason for non-delivery (specified as the next-hop desti-
|
address, the reason for non-delivery (specified as the next-hop desti-
|
||||||
nation), and recipient information. The reason may be prefixed with an
|
nation), and recipient information. The reason may be prefixed with an
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a>-compatible detail code; if none is specified a default 4.0.0
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a>-compatible detail code; if none is specified a default 4.0.0
|
||||||
or 5.0.0 code is used instead. This program expects to be run from the
|
or 5.0.0 code is used instead. This program expects to be run from the
|
||||||
<a href="master.8.html"><b>master</b>(8)</a> process manager.
|
<a href="master.8.html"><b>master</b>(8)</a> process manager.
|
||||||
|
|
||||||
@ -34,7 +34,7 @@ ERROR(8) ERROR(8)
|
|||||||
network, and can be run chrooted at fixed low privilege.
|
network, and can be run chrooted at fixed low privilege.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
|
@ -173,7 +173,7 @@ HEADER_CHECKS(5) HEADER_CHECKS(5)
|
|||||||
Note 1: the BCC address is added as if it was specified with
|
Note 1: the BCC address is added as if it was specified with
|
||||||
NOTIFY=NONE. The sender will not be notified when the BCC
|
NOTIFY=NONE. The sender will not be notified when the BCC
|
||||||
address is undeliverable, as long as all down-stream software
|
address is undeliverable, as long as all down-stream software
|
||||||
implements <a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
implements <a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
||||||
|
|
||||||
Note 2: this ignores duplicate addresses (with the same delivery
|
Note 2: this ignores duplicate addresses (with the same delivery
|
||||||
status notification options).
|
status notification options).
|
||||||
@ -376,10 +376,10 @@ HEADER_CHECKS(5) HEADER_CHECKS(5)
|
|||||||
line at a time. A decision made for one line is not carried over
|
line at a time. A decision made for one line is not carried over
|
||||||
to the next line.
|
to the next line.
|
||||||
|
|
||||||
<b>o</b> If text in the message body is encoded (<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a>) then the rules
|
<b>o</b> If text in the message body is encoded (<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a>) then the rules
|
||||||
need to be specified for the encoded form.
|
need to be specified for the encoded form.
|
||||||
|
|
||||||
<b>o</b> Likewise, when message headers are encoded (<a href="http://tools.ietf.org/html/rfc2047">RFC 2047</a>) then the
|
<b>o</b> Likewise, when message headers are encoded (<a href="https://tools.ietf.org/html/rfc2047">RFC 2047</a>) then the
|
||||||
rules need to be specified for the encoded form.
|
rules need to be specified for the encoded form.
|
||||||
|
|
||||||
Message headers added by the <a href="cleanup.8.html"><b>cleanup</b>(8)</a> daemon itself are excluded from
|
Message headers added by the <a href="cleanup.8.html"><b>cleanup</b>(8)</a> daemon itself are excluded from
|
||||||
@ -462,8 +462,8 @@ HEADER_CHECKS(5) HEADER_CHECKS(5)
|
|||||||
<a href="postmap.1.html">postmap(1)</a>, Postfix lookup table management
|
<a href="postmap.1.html">postmap(1)</a>, Postfix lookup table management
|
||||||
<a href="postsuper.1.html">postsuper(1)</a>, Postfix janitor
|
<a href="postsuper.1.html">postsuper(1)</a>, Postfix janitor
|
||||||
<a href="postcat.1.html">postcat(1)</a>, show Postfix queue file contents
|
<a href="postcat.1.html">postcat(1)</a>, show Postfix queue file contents
|
||||||
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a>, base64 and quoted-printable encoding rules
|
<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a>, base64 and quoted-printable encoding rules
|
||||||
<a href="http://tools.ietf.org/html/rfc2047">RFC 2047</a>, message header encoding for non-ASCII text
|
<a href="https://tools.ietf.org/html/rfc2047">RFC 2047</a>, message header encoding for non-ASCII text
|
||||||
|
|
||||||
<b>README FILES</b>
|
<b>README FILES</b>
|
||||||
<a href="DATABASE_README.html">DATABASE_README</a>, Postfix lookup table overview
|
<a href="DATABASE_README.html">DATABASE_README</a>, Postfix lookup table overview
|
||||||
|
@ -102,7 +102,7 @@ LDAP_TABLE(5) LDAP_TABLE(5)
|
|||||||
timeout = 5
|
timeout = 5
|
||||||
|
|
||||||
<b>search_base (No default; you must configure this)</b>
|
<b>search_base (No default; you must configure this)</b>
|
||||||
The <a href="http://tools.ietf.org/html/rfc2253">RFC2253</a> base DN at which to conduct the search, e.g.
|
The <a href="https://tools.ietf.org/html/rfc2253">RFC2253</a> base DN at which to conduct the search, e.g.
|
||||||
|
|
||||||
search_base = dc=your, dc=com
|
search_base = dc=your, dc=com
|
||||||
|
|
||||||
@ -111,18 +111,18 @@ LDAP_TABLE(5) LDAP_TABLE(5)
|
|||||||
|
|
||||||
<b>%%</b> This is replaced by a literal '%' character.
|
<b>%%</b> This is replaced by a literal '%' character.
|
||||||
|
|
||||||
<b>%s</b> This is replaced by the input key. <a href="http://tools.ietf.org/html/rfc2253">RFC 2253</a> quoting is
|
<b>%s</b> This is replaced by the input key. <a href="https://tools.ietf.org/html/rfc2253">RFC 2253</a> quoting is
|
||||||
used to make sure that the input key does not add unex-
|
used to make sure that the input key does not add unex-
|
||||||
pected metacharacters.
|
pected metacharacters.
|
||||||
|
|
||||||
<b>%u</b> When the input key is an address of the form user@domain,
|
<b>%u</b> When the input key is an address of the form user@domain,
|
||||||
<b>%u</b> is replaced by the (<a href="http://tools.ietf.org/html/rfc2253">RFC 2253</a>) quoted local part of the
|
<b>%u</b> is replaced by the (<a href="https://tools.ietf.org/html/rfc2253">RFC 2253</a>) quoted local part of the
|
||||||
address. Otherwise, <b>%u</b> is replaced by the entire search
|
address. Otherwise, <b>%u</b> is replaced by the entire search
|
||||||
string. If the localpart is empty, the search is sup-
|
string. If the localpart is empty, the search is sup-
|
||||||
pressed and returns no results.
|
pressed and returns no results.
|
||||||
|
|
||||||
<b>%d</b> When the input key is an address of the form user@domain,
|
<b>%d</b> When the input key is an address of the form user@domain,
|
||||||
<b>%d</b> is replaced by the (<a href="http://tools.ietf.org/html/rfc2253">RFC 2253</a>) quoted domain part of
|
<b>%d</b> is replaced by the (<a href="https://tools.ietf.org/html/rfc2253">RFC 2253</a>) quoted domain part of
|
||||||
the address. Otherwise, the search is suppressed and
|
the address. Otherwise, the search is suppressed and
|
||||||
returns no results.
|
returns no results.
|
||||||
|
|
||||||
@ -142,7 +142,7 @@ LDAP_TABLE(5) LDAP_TABLE(5)
|
|||||||
pressed and returns no results.
|
pressed and returns no results.
|
||||||
|
|
||||||
<b>query_filter (default: mailacceptinggeneralid=%s)</b>
|
<b>query_filter (default: mailacceptinggeneralid=%s)</b>
|
||||||
The <a href="http://tools.ietf.org/html/rfc2254">RFC2254</a> filter used to search the directory, where <b>%s</b> is a
|
The <a href="https://tools.ietf.org/html/rfc2254">RFC2254</a> filter used to search the directory, where <b>%s</b> is a
|
||||||
substitute for the address Postfix is trying to resolve, e.g.
|
substitute for the address Postfix is trying to resolve, e.g.
|
||||||
|
|
||||||
query_filter = (&(mail=%s)(paid_up=true))
|
query_filter = (&(mail=%s)(paid_up=true))
|
||||||
@ -152,18 +152,18 @@ LDAP_TABLE(5) LDAP_TABLE(5)
|
|||||||
<b>%%</b> This is replaced by a literal '%' character. (Postfix 2.2
|
<b>%%</b> This is replaced by a literal '%' character. (Postfix 2.2
|
||||||
and later).
|
and later).
|
||||||
|
|
||||||
<b>%s</b> This is replaced by the input key. <a href="http://tools.ietf.org/html/rfc2254">RFC 2254</a> quoting is
|
<b>%s</b> This is replaced by the input key. <a href="https://tools.ietf.org/html/rfc2254">RFC 2254</a> quoting is
|
||||||
used to make sure that the input key does not add unex-
|
used to make sure that the input key does not add unex-
|
||||||
pected metacharacters.
|
pected metacharacters.
|
||||||
|
|
||||||
<b>%u</b> When the input key is an address of the form user@domain,
|
<b>%u</b> When the input key is an address of the form user@domain,
|
||||||
<b>%u</b> is replaced by the (<a href="http://tools.ietf.org/html/rfc2254">RFC 2254</a>) quoted local part of the
|
<b>%u</b> is replaced by the (<a href="https://tools.ietf.org/html/rfc2254">RFC 2254</a>) quoted local part of the
|
||||||
address. Otherwise, <b>%u</b> is replaced by the entire search
|
address. Otherwise, <b>%u</b> is replaced by the entire search
|
||||||
string. If the localpart is empty, the search is sup-
|
string. If the localpart is empty, the search is sup-
|
||||||
pressed and returns no results.
|
pressed and returns no results.
|
||||||
|
|
||||||
<b>%d</b> When the input key is an address of the form user@domain,
|
<b>%d</b> When the input key is an address of the form user@domain,
|
||||||
<b>%d</b> is replaced by the (<a href="http://tools.ietf.org/html/rfc2254">RFC 2254</a>) quoted domain part of
|
<b>%d</b> is replaced by the (<a href="https://tools.ietf.org/html/rfc2254">RFC 2254</a>) quoted domain part of
|
||||||
the address. Otherwise, the search is suppressed and
|
the address. Otherwise, the search is suppressed and
|
||||||
returns no results.
|
returns no results.
|
||||||
|
|
||||||
@ -281,7 +281,7 @@ LDAP_TABLE(5) LDAP_TABLE(5)
|
|||||||
|
|
||||||
<b>special_result_attribute (default: empty)</b>
|
<b>special_result_attribute (default: empty)</b>
|
||||||
The attribute(s) of directory entries that can contain DNs or
|
The attribute(s) of directory entries that can contain DNs or
|
||||||
<a href="http://tools.ietf.org/html/rfc2255">RFC 2255</a> LDAP URLs. If found, a recursive search is performed to
|
<a href="https://tools.ietf.org/html/rfc2255">RFC 2255</a> LDAP URLs. If found, a recursive search is performed to
|
||||||
retrieve the entry referenced by the DN, or the entries matched
|
retrieve the entry referenced by the DN, or the entries matched
|
||||||
by the URL query.
|
by the URL query.
|
||||||
|
|
||||||
@ -295,13 +295,13 @@ LDAP_TABLE(5) LDAP_TABLE(5)
|
|||||||
special, leaf or terminal) in the Postfix table definition. If
|
special, leaf or terminal) in the Postfix table definition. If
|
||||||
the URL lists any of the table's special result attributes,
|
the URL lists any of the table's special result attributes,
|
||||||
these are retrieved and used recursively. A URL that does not
|
these are retrieved and used recursively. A URL that does not
|
||||||
specify any attribute selection, is equivalent (<a href="http://tools.ietf.org/html/rfc2255">RFC 2255</a>) to a
|
specify any attribute selection, is equivalent (<a href="https://tools.ietf.org/html/rfc2255">RFC 2255</a>) to a
|
||||||
URL that selects all attributes, in which case the selected
|
URL that selects all attributes, in which case the selected
|
||||||
attributes will be the full set of result attributes in the
|
attributes will be the full set of result attributes in the
|
||||||
Postfix table.
|
Postfix table.
|
||||||
|
|
||||||
If an LDAP URL attribute-descriptor or the corresponding Postfix
|
If an LDAP URL attribute-descriptor or the corresponding Postfix
|
||||||
LDAP table result attribute (but not both) uses <a href="http://tools.ietf.org/html/rfc2255">RFC 2255</a>
|
LDAP table result attribute (but not both) uses <a href="https://tools.ietf.org/html/rfc2255">RFC 2255</a>
|
||||||
sub-type options ("attr;option"), the attribute requested from
|
sub-type options ("attr;option"), the attribute requested from
|
||||||
the LDAP server will include the sub-type option. In all other
|
the LDAP server will include the sub-type option. In all other
|
||||||
cases, the URL attribute and the table attribute must match
|
cases, the URL attribute and the table attribute must match
|
||||||
@ -629,7 +629,7 @@ LDAP_TABLE(5) LDAP_TABLE(5)
|
|||||||
ing at port 389 on ldap.example.com. It will bind anonymously, search
|
ing at port 389 on ldap.example.com. It will bind anonymously, search
|
||||||
for any directory entries whose mailacceptinggeneralid attribute is
|
for any directory entries whose mailacceptinggeneralid attribute is
|
||||||
"ldapuser", read the "maildrop" attributes of those found, and build a
|
"ldapuser", read the "maildrop" attributes of those found, and build a
|
||||||
list of their maildrops, which will be treated as <a href="http://tools.ietf.org/html/rfc822">RFC822</a> addresses to
|
list of their maildrops, which will be treated as <a href="https://tools.ietf.org/html/rfc822">RFC822</a> addresses to
|
||||||
which the message will be delivered.
|
which the message will be delivered.
|
||||||
|
|
||||||
<b>OBSOLETE MAIN.CF PARAMETERS</b>
|
<b>OBSOLETE MAIN.CF PARAMETERS</b>
|
||||||
|
@ -141,26 +141,26 @@ SMTP(8) SMTP(8)
|
|||||||
low privilege.
|
low privilege.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
<a href="http://tools.ietf.org/html/rfc1651">RFC 1651</a> (SMTP service extensions)
|
<a href="https://tools.ietf.org/html/rfc1651">RFC 1651</a> (SMTP service extensions)
|
||||||
<a href="http://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
<a href="https://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
||||||
<a href="http://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message Size Declaration)
|
<a href="https://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message Size Declaration)
|
||||||
<a href="http://tools.ietf.org/html/rfc2033">RFC 2033</a> (LMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc2033">RFC 2033</a> (LMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP Enhanced Error Codes)
|
<a href="https://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP Enhanced Error Codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a> (MIME: Format of Internet Message Bodies)
|
<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a> (MIME: Format of Internet Message Bodies)
|
||||||
<a href="http://tools.ietf.org/html/rfc2046">RFC 2046</a> (MIME: Media Types)
|
<a href="https://tools.ietf.org/html/rfc2046">RFC 2046</a> (MIME: Media Types)
|
||||||
<a href="http://tools.ietf.org/html/rfc2554">RFC 2554</a> (AUTH command)
|
<a href="https://tools.ietf.org/html/rfc2554">RFC 2554</a> (AUTH command)
|
||||||
<a href="http://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP Pipelining)
|
<a href="https://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP Pipelining)
|
||||||
<a href="http://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
<a href="https://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
||||||
<a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN Extension)
|
<a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN Extension)
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH command)
|
<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH command)
|
||||||
<a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
<a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
||||||
<a href="http://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (SMTP security via opportunistic DANE TLS)
|
<a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (SMTP security via opportunistic DANE TLS)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
@ -231,7 +231,7 @@ SMTP(8) SMTP(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtp_quote_rfc821_envelope">smtp_quote_rfc821_envelope</a> (yes)</b>
|
<b><a href="postconf.5.html#smtp_quote_rfc821_envelope">smtp_quote_rfc821_envelope</a> (yes)</b>
|
||||||
Quote addresses in Postfix SMTP client MAIL FROM and RCPT TO
|
Quote addresses in Postfix SMTP client MAIL FROM and RCPT TO
|
||||||
commands as required by <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
commands as required by <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#smtp_reply_filter">smtp_reply_filter</a> (empty)</b>
|
<b><a href="postconf.5.html#smtp_reply_filter">smtp_reply_filter</a> (empty)</b>
|
||||||
A mechanism to transform replies from remote SMTP servers one
|
A mechanism to transform replies from remote SMTP servers one
|
||||||
@ -635,10 +635,10 @@ SMTP(8) SMTP(8)
|
|||||||
Available in Postfix version 2.11-3.1:
|
Available in Postfix version 2.11-3.1:
|
||||||
|
|
||||||
<b><a href="postconf.5.html#tls_dane_digest_agility">tls_dane_digest_agility</a> (on)</b>
|
<b><a href="postconf.5.html#tls_dane_digest_agility">tls_dane_digest_agility</a> (on)</b>
|
||||||
Configure <a href="http://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
Configure <a href="https://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a> (yes)</b>
|
||||||
Enable support for <a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
Enable support for <a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
||||||
digests of trust-anchors with certificate usage "2".
|
digests of trust-anchors with certificate usage "2".
|
||||||
|
|
||||||
Available in Postfix version 2.11 and later:
|
Available in Postfix version 2.11 and later:
|
||||||
@ -854,7 +854,7 @@ SMTP(8) SMTP(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
||||||
Enable preliminary SMTPUTF8 support for the protocols described
|
Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
||||||
Detect that a message requires SMTPUTF8 support for the speci-
|
Detect that a message requires SMTPUTF8 support for the speci-
|
||||||
|
@ -159,7 +159,7 @@ LOCAL(8) LOCAL(8)
|
|||||||
follow the conventions defined in <<b>sysexits.h</b>>. Exit status 0 means
|
follow the conventions defined in <<b>sysexits.h</b>>. Exit status 0 means
|
||||||
normal successful completion.
|
normal successful completion.
|
||||||
|
|
||||||
Postfix version 2.3 and later support <a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a>-style enhanced status
|
Postfix version 2.3 and later support <a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a>-style enhanced status
|
||||||
codes. If a command terminates with a non-zero exit status, and the
|
codes. If a command terminates with a non-zero exit status, and the
|
||||||
command output begins with an enhanced status code, this status code
|
command output begins with an enhanced status code, this status code
|
||||||
takes precedence over the non-zero exit status.
|
takes precedence over the non-zero exit status.
|
||||||
@ -279,8 +279,8 @@ LOCAL(8) LOCAL(8)
|
|||||||
the <b><a href="postconf.5.html#default_privs">default_privs</a></b> configuration parameter.
|
the <b><a href="postconf.5.html#default_privs">default_privs</a></b> configuration parameter.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
|
@ -122,8 +122,10 @@ MASTER(5) MASTER(5)
|
|||||||
This feature is available as of Postfix version 2.5.
|
This feature is available as of Postfix version 2.5.
|
||||||
|
|
||||||
<b>Private (default: y)</b>
|
<b>Private (default: y)</b>
|
||||||
Whether or not access is restricted to the mail system. Inter-
|
Whether a service is internal to Postfix (pathname starts with
|
||||||
net (type <b>inet</b>) services can't be private.
|
<b>private/</b>), or exposed through Postfix command-line tools (path-
|
||||||
|
name starts with <b>public/</b>). Internet (type <b>inet</b>) services can't
|
||||||
|
be private.
|
||||||
|
|
||||||
<b>Unprivileged (default: y)</b>
|
<b>Unprivileged (default: y)</b>
|
||||||
Whether the service runs with root privileges or as the owner of
|
Whether the service runs with root privileges or as the owner of
|
||||||
|
@ -133,8 +133,8 @@ OQMGR(8) OQMGR(8)
|
|||||||
queue manager of the arrival of new mail one would request <b>I</b>.
|
queue manager of the arrival of new mail one would request <b>I</b>.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery status notifications)
|
<a href="https://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery status notifications)
|
||||||
|
|
||||||
<b>SECURITY</b>
|
<b>SECURITY</b>
|
||||||
The <a href="qmgr.8.html"><b>oqmgr</b>(8)</a> daemon is not security sensitive. It reads single-charac-
|
The <a href="qmgr.8.html"><b>oqmgr</b>(8)</a> daemon is not security sensitive. It reads single-charac-
|
||||||
|
@ -121,7 +121,7 @@ PIPE(8) PIPE(8)
|
|||||||
command-line <b>$sender</b>, <b>$original_recipient</b> and <b>$recipient</b>
|
command-line <b>$sender</b>, <b>$original_recipient</b> and <b>$recipient</b>
|
||||||
address localparts (text to the left of the right-most <b>@</b>
|
address localparts (text to the left of the right-most <b>@</b>
|
||||||
character), according to an 8-bit transparent version of
|
character), according to an 8-bit transparent version of
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a>. This is recommended for delivery via <b>UUCP</b> or
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a>. This is recommended for delivery via <b>UUCP</b> or
|
||||||
<b>BSMTP</b>.
|
<b>BSMTP</b>.
|
||||||
|
|
||||||
The result is compatible with the address parsing of com-
|
The result is compatible with the address parsing of com-
|
||||||
@ -306,7 +306,7 @@ PIPE(8) PIPE(8)
|
|||||||
|
|
||||||
<b>${sasl_sender}</b>
|
<b>${sasl_sender}</b>
|
||||||
This macro expands to the SASL sender name (i.e. the
|
This macro expands to the SASL sender name (i.e. the
|
||||||
original submitter as per <a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a>) in the MAIL FROM com-
|
original submitter as per <a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a>) in the MAIL FROM com-
|
||||||
mand when the Postfix SMTP server received the message.
|
mand when the Postfix SMTP server received the message.
|
||||||
|
|
||||||
This feature is available as of Postfix 2.2.
|
This feature is available as of Postfix 2.2.
|
||||||
@ -343,7 +343,7 @@ PIPE(8) PIPE(8)
|
|||||||
ing.
|
ing.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Command exit status codes are expected to follow the conventions
|
Command exit status codes are expected to follow the conventions
|
||||||
|
@ -204,7 +204,7 @@ POSTALIAS(1) POSTALIAS(1)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
||||||
Enable preliminary SMTPUTF8 support for the protocols described
|
Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#syslog_facility">syslog_facility</a> (mail)</b>
|
<b><a href="postconf.5.html#syslog_facility">syslog_facility</a> (mail)</b>
|
||||||
The syslog facility of Postfix logging.
|
The syslog facility of Postfix logging.
|
||||||
@ -219,7 +219,7 @@ POSTALIAS(1) POSTALIAS(1)
|
|||||||
The initial OpenLDAP LMDB database size limit in bytes.
|
The initial OpenLDAP LMDB database size limit in bytes.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
|
|
||||||
<b>SEE ALSO</b>
|
<b>SEE ALSO</b>
|
||||||
<a href="aliases.5.html">aliases(5)</a>, format of alias database input file.
|
<a href="aliases.5.html">aliases(5)</a>, format of alias database input file.
|
||||||
|
@ -124,7 +124,7 @@ is hard-coded as "450".
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -143,7 +143,7 @@ an <a href="access.5.html">access(5)</a> map "reject" action.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -828,7 +828,7 @@ that is received by the Postfix mail system.
|
|||||||
Note: with Postfix 2.3 and later the BCC address is added as if it
|
Note: with Postfix 2.3 and later the BCC address is added as if it
|
||||||
was specified with NOTIFY=NONE. The sender will not be notified
|
was specified with NOTIFY=NONE. The sender will not be notified
|
||||||
when the BCC address is undeliverable, as long as all down-stream
|
when the BCC address is undeliverable, as long as all down-stream
|
||||||
software implements <a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
software implements <a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -1357,7 +1357,7 @@ is placed into the Postfix configuration directory. </p>
|
|||||||
|
|
||||||
<p>
|
<p>
|
||||||
Enable interoperability with remote SMTP clients that implement an obsolete
|
Enable interoperability with remote SMTP clients that implement an obsolete
|
||||||
version of the AUTH command (<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a>). Examples of such clients
|
version of the AUTH command (<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a>). Examples of such clients
|
||||||
are MicroSoft Outlook Express version 4 and MicroSoft Exchange
|
are MicroSoft Outlook Express version 4 and MicroSoft Exchange
|
||||||
version 5.0.
|
version 5.0.
|
||||||
</p>
|
</p>
|
||||||
@ -2519,7 +2519,7 @@ address, or Recipient address. </dd>
|
|||||||
<a href="postconf.5.html#maps_rbl_reject_code">maps_rbl_reject_code</a> configuration parameter. Note: The numerical
|
<a href="postconf.5.html#maps_rbl_reject_code">maps_rbl_reject_code</a> configuration parameter. Note: The numerical
|
||||||
SMTP response code is required, and must appear at the start of the
|
SMTP response code is required, and must appear at the start of the
|
||||||
reply. With Postfix version 2.3 and later this information may be followed
|
reply. With Postfix version 2.3 and later this information may be followed
|
||||||
by an <a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> enhanced status code. </dd>
|
by an <a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> enhanced status code. </dd>
|
||||||
|
|
||||||
<dt><b>$rbl_domain</b></dt>
|
<dt><b>$rbl_domain</b></dt>
|
||||||
|
|
||||||
@ -2752,7 +2752,7 @@ client request is rejected by the "defer" restriction.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -3014,7 +3014,7 @@ Example:
|
|||||||
(default: no)</b></DT><DD>
|
(default: no)</b></DT><DD>
|
||||||
|
|
||||||
<p> Enable a workaround for future libc incompatibility. The Postfix
|
<p> Enable a workaround for future libc incompatibility. The Postfix
|
||||||
implementation of <a href="http://tools.ietf.org/html/rfc2308">RFC 2308</a> negative reply caching relies on the
|
implementation of <a href="https://tools.ietf.org/html/rfc2308">RFC 2308</a> negative reply caching relies on the
|
||||||
promise that res_query() and res_search() invoke res_send(), which
|
promise that res_query() and res_search() invoke res_send(), which
|
||||||
returns the server response in an application buffer even if the
|
returns the server response in an application buffer even if the
|
||||||
requested record does not exist. If this promise is broken, specify
|
requested record does not exist. If this promise is broken, specify
|
||||||
@ -3871,7 +3871,7 @@ address is empty. This is the same behavior as prior to Postfix
|
|||||||
3.3. </p>
|
3.3. </p>
|
||||||
|
|
||||||
<li> <p> In the <b>standard</b> form, the <i>name</i> will be quoted
|
<li> <p> In the <b>standard</b> form, the <i>name</i> will be quoted
|
||||||
if it contains <b>specials</b> as defined in <a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a>, or the "!%"
|
if it contains <b>specials</b> as defined in <a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a>, or the "!%"
|
||||||
address operators. </p>
|
address operators. </p>
|
||||||
|
|
||||||
<li> <p> The Postfix <a href="sendmail.1.html">sendmail(1)</a> command gets <i>name</i> information
|
<li> <p> The Postfix <a href="sendmail.1.html">sendmail(1)</a> command gets <i>name</i> information
|
||||||
@ -4126,7 +4126,7 @@ workaround will be phased out as IPv6 deployment becomes more common.
|
|||||||
<p> Note: you MUST stop and start Postfix after changing this
|
<p> Note: you MUST stop and start Postfix after changing this
|
||||||
parameter. </p>
|
parameter. </p>
|
||||||
|
|
||||||
<p> On systems that pre-date IPV6_V6ONLY support (<a href="http://tools.ietf.org/html/rfc3493">RFC 3493</a>), an
|
<p> On systems that pre-date IPV6_V6ONLY support (<a href="https://tools.ietf.org/html/rfc3493">RFC 3493</a>), an
|
||||||
IPv6 server will also accept IPv4 connections, even when IPv4 is
|
IPv6 server will also accept IPv4 connections, even when IPv4 is
|
||||||
turned off with the <a href="postconf.5.html#inet_protocols">inet_protocols</a> parameter. On systems with
|
turned off with the <a href="postconf.5.html#inet_protocols">inet_protocols</a> parameter. On systems with
|
||||||
IPV6_V6ONLY support, Postfix will use separate server sockets for
|
IPV6_V6ONLY support, Postfix will use separate server sockets for
|
||||||
@ -4137,7 +4137,7 @@ corresponding protocol. </p>
|
|||||||
Postfix will look up DNS type A records, and will convert
|
Postfix will look up DNS type A records, and will convert
|
||||||
IPv4-in-IPv6 client IP addresses (::ffff:1.2.3.4) to their original
|
IPv4-in-IPv6 client IP addresses (::ffff:1.2.3.4) to their original
|
||||||
IPv4 form (1.2.3.4). The latter is needed on hosts that pre-date
|
IPv4 form (1.2.3.4). The latter is needed on hosts that pre-date
|
||||||
IPV6_V6ONLY support (<a href="http://tools.ietf.org/html/rfc3493">RFC 3493</a>). </p>
|
IPV6_V6ONLY support (<a href="https://tools.ietf.org/html/rfc3493">RFC 3493</a>). </p>
|
||||||
|
|
||||||
<p> When IPv6 support is enabled via the <a href="postconf.5.html#inet_protocols">inet_protocols</a> parameter,
|
<p> When IPv6 support is enabled via the <a href="postconf.5.html#inet_protocols">inet_protocols</a> parameter,
|
||||||
Postfix will do DNS type AAAA record lookups. </p>
|
Postfix will do DNS type AAAA record lookups. </p>
|
||||||
@ -4262,7 +4262,7 @@ restriction.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -5874,7 +5874,7 @@ a neighboring system. </dd>
|
|||||||
<dt><b><a href="postconf.5.html#permit_sasl_authenticated">permit_sasl_authenticated</a> </b></dt>
|
<dt><b><a href="postconf.5.html#permit_sasl_authenticated">permit_sasl_authenticated</a> </b></dt>
|
||||||
|
|
||||||
<dd> Append the domain name in $<a href="postconf.5.html#myorigin">myorigin</a> or $<a href="postconf.5.html#mydomain">mydomain</a> when the
|
<dd> Append the domain name in $<a href="postconf.5.html#myorigin">myorigin</a> or $<a href="postconf.5.html#mydomain">mydomain</a> when the
|
||||||
client is successfully authenticated via the <a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH)
|
client is successfully authenticated via the <a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH)
|
||||||
protocol. </dd>
|
protocol. </dd>
|
||||||
|
|
||||||
<dt><b><a href="postconf.5.html#permit_tls_clientcerts">permit_tls_clientcerts</a> </b></dt>
|
<dt><b><a href="postconf.5.html#permit_tls_clientcerts">permit_tls_clientcerts</a> </b></dt>
|
||||||
@ -6621,7 +6621,7 @@ client request is blocked by the <a href="postconf.5.html#reject_rbl_client">rej
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -7418,7 +7418,7 @@ restriction.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -9657,7 +9657,7 @@ equals $<a href="postconf.5.html#myorigin">myorigin</a>, $<a href="postconf.5.ht
|
|||||||
Note: with Postfix 2.3 and later the BCC address is added as if it
|
Note: with Postfix 2.3 and later the BCC address is added as if it
|
||||||
was specified with NOTIFY=NONE. The sender will not be notified
|
was specified with NOTIFY=NONE. The sender will not be notified
|
||||||
when the BCC address is undeliverable, as long as all down-stream
|
when the BCC address is undeliverable, as long as all down-stream
|
||||||
software implements <a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
software implements <a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -9798,7 +9798,7 @@ client request is rejected by the "reject" restriction.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -9937,7 +9937,7 @@ restriction.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -10204,7 +10204,7 @@ in multiple deliveries of the same message to mailing list members.
|
|||||||
looking inside quotes. </p>
|
looking inside quotes. </p>
|
||||||
|
|
||||||
<p> By default, the Postfix address resolver does not quote the
|
<p> By default, the Postfix address resolver does not quote the
|
||||||
address localpart as per <a href="http://tools.ietf.org/html/rfc822">RFC 822</a>, so that additional @ or % or !
|
address localpart as per <a href="https://tools.ietf.org/html/rfc822">RFC 822</a>, so that additional @ or % or !
|
||||||
operators remain visible. This behavior is safe but it is also
|
operators remain visible. This behavior is safe but it is also
|
||||||
technically incorrect. </p>
|
technically incorrect. </p>
|
||||||
|
|
||||||
@ -10355,7 +10355,7 @@ equals $<a href="postconf.5.html#myorigin">myorigin</a>, $<a href="postconf.5.ht
|
|||||||
Note: with Postfix 2.3 and later the BCC address is added as if it
|
Note: with Postfix 2.3 and later the BCC address is added as if it
|
||||||
was specified with NOTIFY=NONE. The sender will not be notified
|
was specified with NOTIFY=NONE. The sender will not be notified
|
||||||
when the BCC address is undeliverable, as long as all down-stream
|
when the BCC address is undeliverable, as long as all down-stream
|
||||||
software implements <a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
software implements <a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -11401,7 +11401,7 @@ the CommonName is checked. The behavior may be changed with the
|
|||||||
<a href="postconf.5.html#smtp_tls_enforce_peername">smtp_tls_enforce_peername</a> option. </p>
|
<a href="postconf.5.html#smtp_tls_enforce_peername">smtp_tls_enforce_peername</a> option. </p>
|
||||||
|
|
||||||
<p> This option is useful only if you are definitely sure that you
|
<p> This option is useful only if you are definitely sure that you
|
||||||
will only connect to servers that support <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> _and_ that
|
will only connect to servers that support <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> _and_ that
|
||||||
provide valid server certificates. Typical use is for clients that
|
provide valid server certificates. Typical use is for clients that
|
||||||
send all their email to a dedicated mailhub. </p>
|
send all their email to a dedicated mailhub. </p>
|
||||||
|
|
||||||
@ -11848,12 +11848,12 @@ The default time unit is s (seconds).
|
|||||||
<p>
|
<p>
|
||||||
Quote addresses in Postfix SMTP client MAIL FROM and RCPT TO commands
|
Quote addresses in Postfix SMTP client MAIL FROM and RCPT TO commands
|
||||||
as required
|
as required
|
||||||
by <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>. This includes putting quotes around an address localpart
|
by <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>. This includes putting quotes around an address localpart
|
||||||
that ends in ".".
|
that ends in ".".
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
The default is to comply with <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>. If you have to send mail to
|
The default is to comply with <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>. If you have to send mail to
|
||||||
a broken SMTP server, configure a special SMTP client in <a href="master.5.html">master.cf</a>:
|
a broken SMTP server, configure a special SMTP client in <a href="master.5.html">master.cf</a>:
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
@ -12325,7 +12325,7 @@ Skip remote SMTP servers that greet with a 5XX status code.
|
|||||||
<p> By default, the Postfix SMTP client moves on the next mail
|
<p> By default, the Postfix SMTP client moves on the next mail
|
||||||
exchanger. Specify "<a href="postconf.5.html#smtp_skip_5xx_greeting">smtp_skip_5xx_greeting</a> = no" if Postfix should
|
exchanger. Specify "<a href="postconf.5.html#smtp_skip_5xx_greeting">smtp_skip_5xx_greeting</a> = no" if Postfix should
|
||||||
bounce the mail immediately. Caution: the latter behavior appears
|
bounce the mail immediately. Caution: the latter behavior appears
|
||||||
to contradict <a href="http://tools.ietf.org/html/rfc2821">RFC 2821</a>. </p>
|
to contradict <a href="https://tools.ietf.org/html/rfc2821">RFC 2821</a>. </p>
|
||||||
|
|
||||||
|
|
||||||
</DD>
|
</DD>
|
||||||
@ -12849,7 +12849,7 @@ compiled and linked with OpenSSL 1.0.0 or later. </p>
|
|||||||
|
|
||||||
<p> With mandatory TLS encryption, require that the remote SMTP
|
<p> With mandatory TLS encryption, require that the remote SMTP
|
||||||
server hostname matches the information in the remote SMTP server
|
server hostname matches the information in the remote SMTP server
|
||||||
certificate. As of <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> the requirements for hostname checking
|
certificate. As of <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> the requirements for hostname checking
|
||||||
for MTA clients are not specified. </p>
|
for MTA clients are not specified. </p>
|
||||||
|
|
||||||
<p> This option can be set to "no" to disable strict peer name
|
<p> This option can be set to "no" to disable strict peer name
|
||||||
@ -13475,7 +13475,7 @@ href="TLS_README.html#client_tls_may">may</a>. If TLSA records are
|
|||||||
found, but none are usable, the effective security level is <a
|
found, but none are usable, the effective security level is <a
|
||||||
href="TLS_README.html#client_tls_encrypt">encrypt</a>. When usable
|
href="TLS_README.html#client_tls_encrypt">encrypt</a>. When usable
|
||||||
TLSA records are obtained for the remote SMTP server, the
|
TLSA records are obtained for the remote SMTP server, the
|
||||||
server certificate must match the TLSA records. <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE)
|
server certificate must match the TLSA records. <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE)
|
||||||
TLS authentication and DNSSEC support is available with Postfix
|
TLS authentication and DNSSEC support is available with Postfix
|
||||||
2.11 and later. The optional "connection_reuse" attribute (Postfix
|
2.11 and later. The optional "connection_reuse" attribute (Postfix
|
||||||
≥ 3.4) overrides the <a href="postconf.5.html">main.cf</a> <a href="postconf.5.html#smtp_tls_connection_reuse">smtp_tls_connection_reuse</a> parameter.
|
≥ 3.4) overrides the <a href="postconf.5.html">main.cf</a> <a href="postconf.5.html#smtp_tls_connection_reuse">smtp_tls_connection_reuse</a> parameter.
|
||||||
@ -13486,7 +13486,7 @@ TLS authentication and DNSSEC support is available with Postfix
|
|||||||
obtained via TLSA records in DNSSEC. If no TLSA records are found,
|
obtained via TLSA records in DNSSEC. If no TLSA records are found,
|
||||||
or none are usable, no connection is made to the server. When
|
or none are usable, no connection is made to the server. When
|
||||||
usable TLSA records are obtained for the remote SMTP server, the
|
usable TLSA records are obtained for the remote SMTP server, the
|
||||||
server certificate must match the TLSA records. <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE) TLS
|
server certificate must match the TLSA records. <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE) TLS
|
||||||
authentication and DNSSEC support is available with Postfix 2.11
|
authentication and DNSSEC support is available with Postfix 2.11
|
||||||
and later. The optional "connection_reuse" attribute (Postfix ≥
|
and later. The optional "connection_reuse" attribute (Postfix ≥
|
||||||
3.4) overrides the <a href="postconf.5.html">main.cf</a> <a href="postconf.5.html#smtp_tls_connection_reuse">smtp_tls_connection_reuse</a> parameter.
|
3.4) overrides the <a href="postconf.5.html">main.cf</a> <a href="postconf.5.html#smtp_tls_connection_reuse">smtp_tls_connection_reuse</a> parameter.
|
||||||
@ -13780,7 +13780,7 @@ in effect, the destination domain's containing DNS zone must be
|
|||||||
signed and the Postfix SMTP client's operating system must be
|
signed and the Postfix SMTP client's operating system must be
|
||||||
configured to send its DNS queries to a recursive DNS nameserver
|
configured to send its DNS queries to a recursive DNS nameserver
|
||||||
that is able to validate the signed records. Each MX host's DNS
|
that is able to validate the signed records. Each MX host's DNS
|
||||||
zone should also be signed, and should publish DANE TLSA (<a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>)
|
zone should also be signed, and should publish DANE TLSA (<a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>)
|
||||||
records that specify how that MX host's TLS certificate is to be
|
records that specify how that MX host's TLS certificate is to be
|
||||||
verified. TLSA records do not preempt the normal SMTP MX host
|
verified. TLSA records do not preempt the normal SMTP MX host
|
||||||
selection algorithm, if some MX hosts support TLSA and others do
|
selection algorithm, if some MX hosts support TLSA and others do
|
||||||
@ -13795,13 +13795,13 @@ purposes of protocol and cipher selection, the "dane" security level
|
|||||||
is treated like a "mandatory" TLS security level, and weak ciphers
|
is treated like a "mandatory" TLS security level, and weak ciphers
|
||||||
and protocols are disabled. Since DANE authenticates server
|
and protocols are disabled. Since DANE authenticates server
|
||||||
certificates the "aNULL" cipher-suites are transparently excluded
|
certificates the "aNULL" cipher-suites are transparently excluded
|
||||||
at this level, no need to configure this manually. <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE)
|
at this level, no need to configure this manually. <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE)
|
||||||
TLS authentication is available with Postfix 2.11 and later. </dd>
|
TLS authentication is available with Postfix 2.11 and later. </dd>
|
||||||
|
|
||||||
<dt><b><a href="TLS_README.html#client_tls_dane">dane-only</a></b></dt>
|
<dt><b><a href="TLS_README.html#client_tls_dane">dane-only</a></b></dt>
|
||||||
<dd>Mandatory DANE TLS. This is just like "dane" above, but DANE
|
<dd>Mandatory DANE TLS. This is just like "dane" above, but DANE
|
||||||
TLSA authentication is required. There is no fallback to "may" or
|
TLSA authentication is required. There is no fallback to "may" or
|
||||||
"encrypt" when TLSA records are missing or unusable. <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>
|
"encrypt" when TLSA records are missing or unusable. <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>
|
||||||
(DANE) TLS authentication is available with Postfix 2.11 and later.
|
(DANE) TLS authentication is available with Postfix 2.11 and later.
|
||||||
</dd>
|
</dd>
|
||||||
|
|
||||||
@ -13902,7 +13902,7 @@ Examples:
|
|||||||
<p> Optional name to send to the remote SMTP server in the TLS Server
|
<p> Optional name to send to the remote SMTP server in the TLS Server
|
||||||
Name Indication (SNI) extension. The SNI extension is always on when
|
Name Indication (SNI) extension. The SNI extension is always on when
|
||||||
DANE is used to authenticate the server, and in that case the SNI name
|
DANE is used to authenticate the server, and in that case the SNI name
|
||||||
sent is the one required by <a href="http://tools.ietf.org/html/rfc7672">RFC7672</a> and this parameter is ignored. </p>
|
sent is the one required by <a href="https://tools.ietf.org/html/rfc7672">RFC7672</a> and this parameter is ignored. </p>
|
||||||
|
|
||||||
<p> Some SMTP servers use the received SNI name to select an appropriate
|
<p> Some SMTP servers use the received SNI name to select an appropriate
|
||||||
certificate chain to present to the client. While this may improve
|
certificate chain to present to the client. While this may improve
|
||||||
@ -14018,7 +14018,7 @@ trust-anchor files are used at all, they will be specified on a
|
|||||||
per-destination basis via the "tafile" attribute of the "verify"
|
per-destination basis via the "tafile" attribute of the "verify"
|
||||||
and "secure" levels in <a href="postconf.5.html#smtp_tls_policy_maps">smtp_tls_policy_maps</a>. </p>
|
and "secure" levels in <a href="postconf.5.html#smtp_tls_policy_maps">smtp_tls_policy_maps</a>. </p>
|
||||||
|
|
||||||
<p> The underlying mechanism is in support of <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE TLSA),
|
<p> The underlying mechanism is in support of <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (DANE TLSA),
|
||||||
which defines mechanisms for an SMTP client MTA to securely determine
|
which defines mechanisms for an SMTP client MTA to securely determine
|
||||||
server TLS certificates via DNS. </p>
|
server TLS certificates via DNS. </p>
|
||||||
|
|
||||||
@ -14730,7 +14730,7 @@ network or network address listed in $<a href="postconf.5.html#mynetworks">myne
|
|||||||
<dt><b><a name="permit_sasl_authenticated">permit_sasl_authenticated</a></b></dt>
|
<dt><b><a name="permit_sasl_authenticated">permit_sasl_authenticated</a></b></dt>
|
||||||
|
|
||||||
<dd> Permit the request when the client is successfully
|
<dd> Permit the request when the client is successfully
|
||||||
authenticated via the <a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH) protocol. </dd>
|
authenticated via the <a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH) protocol. </dd>
|
||||||
|
|
||||||
<dt><b><a name="permit_tls_all_clientcerts">permit_tls_all_clientcerts</a></b></dt>
|
<dt><b><a name="permit_tls_all_clientcerts">permit_tls_all_clientcerts</a></b></dt>
|
||||||
|
|
||||||
@ -15262,7 +15262,7 @@ restriction lists" for a discussion of evaluation context and time.
|
|||||||
(default: no)</b></DT><DD>
|
(default: no)</b></DT><DD>
|
||||||
|
|
||||||
<p> Mandatory TLS: announce STARTTLS support to remote SMTP clients,
|
<p> Mandatory TLS: announce STARTTLS support to remote SMTP clients,
|
||||||
and require that clients use TLS encryption. According to <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a>
|
and require that clients use TLS encryption. According to <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a>
|
||||||
this MUST NOT be applied in case of a publicly-referenced SMTP
|
this MUST NOT be applied in case of a publicly-referenced SMTP
|
||||||
server. This option is therefore off by default. </p>
|
server. This option is therefore off by default. </p>
|
||||||
|
|
||||||
@ -16797,7 +16797,7 @@ releases it was called <b><a href="postconf.5.html#smtpd_sasl_application_name">
|
|||||||
When the client's "initial response" is longer than the normal limit for
|
When the client's "initial response" is longer than the normal limit for
|
||||||
SMTP commands, the client must omit its initial response, and wait for an
|
SMTP commands, the client must omit its initial response, and wait for an
|
||||||
empty server challenge; it can then send what would have been its "initial
|
empty server challenge; it can then send what would have been its "initial
|
||||||
response" as a response to the empty server challenge. <a href="http://tools.ietf.org/html/rfc4954">RFC4954</a> requires the
|
response" as a response to the empty server challenge. <a href="https://tools.ietf.org/html/rfc4954">RFC4954</a> requires the
|
||||||
server to accept client responses up to at least 12288 octets of
|
server to accept client responses up to at least 12288 octets of
|
||||||
base64-encoded text. The default value is therefore also the minimum value
|
base64-encoded text. The default value is therefore also the minimum value
|
||||||
accepted for this parameter.</p>
|
accepted for this parameter.</p>
|
||||||
@ -18321,7 +18321,7 @@ to remote SMTP clients, but do not require that clients use TLS encryption.
|
|||||||
|
|
||||||
<dt><b>encrypt</b></dt> <dd>Mandatory TLS encryption: announce
|
<dt><b>encrypt</b></dt> <dd>Mandatory TLS encryption: announce
|
||||||
STARTTLS support to remote SMTP clients, and require that clients use TLS
|
STARTTLS support to remote SMTP clients, and require that clients use TLS
|
||||||
encryption. According to <a href="http://tools.ietf.org/html/rfc2487">RFC 2487</a> this MUST NOT be applied in case
|
encryption. According to <a href="https://tools.ietf.org/html/rfc2487">RFC 2487</a> this MUST NOT be applied in case
|
||||||
of a publicly-referenced SMTP server. Instead, this option should
|
of a publicly-referenced SMTP server. Instead, this option should
|
||||||
be used only on dedicated servers. </dd>
|
be used only on dedicated servers. </dd>
|
||||||
|
|
||||||
@ -18372,7 +18372,7 @@ under a non-Postfix directory is redirected to the Postfix-owned
|
|||||||
<a href="postconf.5.html#data_directory">data_directory</a>, and a warning is logged. </p>
|
<a href="postconf.5.html#data_directory">data_directory</a>, and a warning is logged. </p>
|
||||||
|
|
||||||
<p> As of Postfix 2.11 the preferred mechanism for session resumption
|
<p> As of Postfix 2.11 the preferred mechanism for session resumption
|
||||||
is <a href="http://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session tickets, which don't require server-side
|
is <a href="https://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session tickets, which don't require server-side
|
||||||
storage. Consequently, for Postfix ≥ 2.11 this parameter should
|
storage. Consequently, for Postfix ≥ 2.11 this parameter should
|
||||||
generally be left empty. TLS session tickets require an OpenSSL
|
generally be left empty. TLS session tickets require an OpenSSL
|
||||||
library (at least version 0.9.8h) that provides full support for
|
library (at least version 0.9.8h) that provides full support for
|
||||||
@ -18401,7 +18401,7 @@ are not possible. </p>
|
|||||||
|
|
||||||
<p> As of Postfix 2.11 this setting cannot exceed 100 days. If set
|
<p> As of Postfix 2.11 this setting cannot exceed 100 days. If set
|
||||||
≤ 0, session caching is disabled, not just via the database, but
|
≤ 0, session caching is disabled, not just via the database, but
|
||||||
also via <a href="http://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session tickets, which don't require server-side
|
also via <a href="https://tools.ietf.org/html/rfc5077">RFC 5077</a> TLS session tickets, which don't require server-side
|
||||||
storage. If set to a positive value less than 2 minutes, the minimum
|
storage. If set to a positive value less than 2 minutes, the minimum
|
||||||
value of 2 minutes is used instead. TLS session tickets require
|
value of 2 minutes is used instead. TLS session tickets require
|
||||||
an OpenSSL library (at least version 0.9.8h) that provides full
|
an OpenSSL library (at least version 0.9.8h) that provides full
|
||||||
@ -18540,7 +18540,7 @@ mail. </dd>
|
|||||||
(default: yes)</b></DT><DD>
|
(default: yes)</b></DT><DD>
|
||||||
|
|
||||||
<p> Enable preliminary SMTPUTF8 support for the protocols described
|
<p> Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533. This requires that Postfix is built to support
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533. This requires that Postfix is built to support
|
||||||
these protocols. </p>
|
these protocols. </p>
|
||||||
|
|
||||||
<p> This feature is available in Postfix 3.0 and later. </p>
|
<p> This feature is available in Postfix 3.0 and later. </p>
|
||||||
@ -18708,12 +18708,12 @@ This feature is available in Postfix 2.0 and later.
|
|||||||
<p>
|
<p>
|
||||||
Require that addresses received in SMTP MAIL FROM and RCPT TO
|
Require that addresses received in SMTP MAIL FROM and RCPT TO
|
||||||
commands are enclosed with <>, and that those addresses do
|
commands are enclosed with <>, and that those addresses do
|
||||||
not contain <a href="http://tools.ietf.org/html/rfc822">RFC 822</a> style comments or phrases. This stops mail
|
not contain <a href="https://tools.ietf.org/html/rfc822">RFC 822</a> style comments or phrases. This stops mail
|
||||||
from poorly written software.
|
from poorly written software.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
By default, the Postfix SMTP server accepts <a href="http://tools.ietf.org/html/rfc822">RFC 822</a> syntax in MAIL
|
By default, the Postfix SMTP server accepts <a href="https://tools.ietf.org/html/rfc822">RFC 822</a> syntax in MAIL
|
||||||
FROM and RCPT TO addresses.
|
FROM and RCPT TO addresses.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
@ -18891,10 +18891,10 @@ bytes (equivalent to 256 bits) is sufficient to generate a 128bit
|
|||||||
<DT><b><a name="tls_dane_digest_agility">tls_dane_digest_agility</a>
|
<DT><b><a name="tls_dane_digest_agility">tls_dane_digest_agility</a>
|
||||||
(default: on)</b></DT><DD>
|
(default: on)</b></DT><DD>
|
||||||
|
|
||||||
<p> Configure <a href="http://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
<p> Configure <a href="https://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
||||||
Do not change this setting from its default value. </p>
|
Do not change this setting from its default value. </p>
|
||||||
|
|
||||||
<p> See Section 8 of <a href="http://tools.ietf.org/html/rfc7671">RFC7671</a> for correct key rotation procedures. </p>
|
<p> See Section 8 of <a href="https://tools.ietf.org/html/rfc7671">RFC7671</a> for correct key rotation procedures. </p>
|
||||||
|
|
||||||
<p> This feature is available in Postfix 2.11 through 3.1. Postfix
|
<p> This feature is available in Postfix 2.11 through 3.1. Postfix
|
||||||
3.2 and later ignore this configuration parameter and behave as
|
3.2 and later ignore this configuration parameter and behave as
|
||||||
@ -18906,7 +18906,7 @@ though it were set to "on". </p>
|
|||||||
<DT><b><a name="tls_dane_digests">tls_dane_digests</a>
|
<DT><b><a name="tls_dane_digests">tls_dane_digests</a>
|
||||||
(default: sha512 sha256)</b></DT><DD>
|
(default: sha512 sha256)</b></DT><DD>
|
||||||
|
|
||||||
<p> DANE TLSA (<a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a>, <a href="http://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a>) resource-record "matching
|
<p> DANE TLSA (<a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a>, <a href="https://tools.ietf.org/html/rfc7671">RFC 7671</a>, <a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a>) resource-record "matching
|
||||||
type" digest algorithms in descending preference order. All the
|
type" digest algorithms in descending preference order. All the
|
||||||
specified algorithms must be supported by the underlying OpenSSL
|
specified algorithms must be supported by the underlying OpenSSL
|
||||||
library, otherwise the Postfix SMTP client will not support DANE
|
library, otherwise the Postfix SMTP client will not support DANE
|
||||||
@ -18929,7 +18929,7 @@ ignored with a warning. </p>
|
|||||||
|
|
||||||
<p> Note: It is unwise to omit sha256 from the digest list. This
|
<p> Note: It is unwise to omit sha256 from the digest list. This
|
||||||
digest algorithm is the only mandatory to implement digest algorithm
|
digest algorithm is the only mandatory to implement digest algorithm
|
||||||
in <a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a>, and many servers are expected publish TLSA records
|
in <a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a>, and many servers are expected publish TLSA records
|
||||||
with just sha256 digests. Unless one of the standard digests is
|
with just sha256 digests. Unless one of the standard digests is
|
||||||
seriously compromised and servers have had ample time to update their
|
seriously compromised and servers have had ample time to update their
|
||||||
TLSA records you should not omit any standard digests, just arrange
|
TLSA records you should not omit any standard digests, just arrange
|
||||||
@ -18943,7 +18943,7 @@ them in order from strongest to weakest. </p>
|
|||||||
<DT><b><a name="tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a>
|
<DT><b><a name="tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a>
|
||||||
(default: yes)</b></DT><DD>
|
(default: yes)</b></DT><DD>
|
||||||
|
|
||||||
<p> Enable support for <a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
<p> Enable support for <a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
||||||
digests of trust-anchors with certificate usage "2". Do not change
|
digests of trust-anchors with certificate usage "2". Do not change
|
||||||
this setting from its default value. </p>
|
this setting from its default value. </p>
|
||||||
|
|
||||||
@ -19047,15 +19047,15 @@ be using 0.9.6! </dd>
|
|||||||
SMTP client and server. These curves are used by the Postfix SMTP
|
SMTP client and server. These curves are used by the Postfix SMTP
|
||||||
server when "<a href="postconf.5.html#smtpd_tls_eecdh_grade">smtpd_tls_eecdh_grade</a> = auto". The selected curves
|
server when "<a href="postconf.5.html#smtpd_tls_eecdh_grade">smtpd_tls_eecdh_grade</a> = auto". The selected curves
|
||||||
must be implemented by OpenSSL and be standardized for use in TLS
|
must be implemented by OpenSSL and be standardized for use in TLS
|
||||||
(<a href="http://tools.ietf.org/html/rfc4492">RFC 4492</a> or its imminent successor). It is unwise to list only
|
(<a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a> or its imminent successor). It is unwise to list only
|
||||||
"bleeding-edge" curves supported by a small subset of clients. The
|
"bleeding-edge" curves supported by a small subset of clients. The
|
||||||
default list is suitable for most users. </p>
|
default list is suitable for most users. </p>
|
||||||
|
|
||||||
<p> Postfix skips curve names that are unknown to OpenSSL, or that
|
<p> Postfix skips curve names that are unknown to OpenSSL, or that
|
||||||
are known but not yet implemented. This makes it possible to
|
are known but not yet implemented. This makes it possible to
|
||||||
"anticipate" support for curves that should be used once they become
|
"anticipate" support for curves that should be used once they become
|
||||||
available. In particular, in some OpenSSL versions, the new <a href="http://tools.ietf.org/html/rfc8031">RFC</a>
|
available. In particular, in some OpenSSL versions, the new <a href="https://tools.ietf.org/html/rfc8031">RFC</a>
|
||||||
<a href="http://tools.ietf.org/html/rfc8031">8031</a> curves "X25519" and "X448" may be known by name, but ECDH
|
<a href="https://tools.ietf.org/html/rfc8031">8031</a> curves "X25519" and "X448" may be known by name, but ECDH
|
||||||
support for either or both may be missing. These curves may appear
|
support for either or both may be missing. These curves may appear
|
||||||
in the default value of this parameter, even though they'll only
|
in the default value of this parameter, even though they'll only
|
||||||
be usable with later versions of OpenSSL. </p>
|
be usable with later versions of OpenSSL. </p>
|
||||||
@ -19077,7 +19077,7 @@ server when "<a href="postconf.5.html#smtpd_tls_eecdh_grade">smtpd_tls_eecdh_gra
|
|||||||
strong" means approximately 128-bit security based on best known
|
strong" means approximately 128-bit security based on best known
|
||||||
attacks. The selected curve must be implemented by OpenSSL (as
|
attacks. The selected curve must be implemented by OpenSSL (as
|
||||||
reported by ecparam(1) with the "-list_curves" option) and be one
|
reported by ecparam(1) with the "-list_curves" option) and be one
|
||||||
of the curves listed in Section 5.1.1 of <a href="http://tools.ietf.org/html/rfc4492">RFC 4492</a>. You should not
|
of the curves listed in Section 5.1.1 of <a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a>. You should not
|
||||||
generally change this setting. Remote SMTP client implementations
|
generally change this setting. Remote SMTP client implementations
|
||||||
must support this curve for EECDH key exchange to take place. It
|
must support this curve for EECDH key exchange to take place. It
|
||||||
is unwise to choose an "bleeding-edge" curve supported by only a
|
is unwise to choose an "bleeding-edge" curve supported by only a
|
||||||
@ -19122,7 +19122,7 @@ This additional strength comes at a significant computational cost, most
|
|||||||
users should instead set "<a href="postconf.5.html#smtpd_tls_eecdh_grade">smtpd_tls_eecdh_grade</a> = strong". The selected
|
users should instead set "<a href="postconf.5.html#smtpd_tls_eecdh_grade">smtpd_tls_eecdh_grade</a> = strong". The selected
|
||||||
curve must be implemented by OpenSSL (as reported by ecparam(1) with the
|
curve must be implemented by OpenSSL (as reported by ecparam(1) with the
|
||||||
"-list_curves" option) and be one of the curves listed in Section 5.1.1
|
"-list_curves" option) and be one of the curves listed in Section 5.1.1
|
||||||
of <a href="http://tools.ietf.org/html/rfc4492">RFC 4492</a>. You should not generally change this setting. </p>
|
of <a href="https://tools.ietf.org/html/rfc4492">RFC 4492</a>. You should not generally change this setting. </p>
|
||||||
|
|
||||||
<p> This default "ultra" curve is rated in NSA <a
|
<p> This default "ultra" curve is rated in NSA <a
|
||||||
href="https://web.archive.org/web/20160330034144/https://www.nsa.gov/ia/programs/suiteb_cryptography/">Suite
|
href="https://web.archive.org/web/20160330034144/https://www.nsa.gov/ia/programs/suiteb_cryptography/">Suite
|
||||||
@ -19472,7 +19472,7 @@ listed before the corresponding certificates. </p>
|
|||||||
<DT><b><a name="tls_session_ticket_cipher">tls_session_ticket_cipher</a>
|
<DT><b><a name="tls_session_ticket_cipher">tls_session_ticket_cipher</a>
|
||||||
(default: Postfix ≥ 3.0: aes-256-cbc, Postfix < 3.0: aes-128-cbc)</b></DT><DD>
|
(default: Postfix ≥ 3.0: aes-256-cbc, Postfix < 3.0: aes-128-cbc)</b></DT><DD>
|
||||||
|
|
||||||
<p> Algorithm used to encrypt <a href="http://tools.ietf.org/html/rfc5077">RFC5077</a> TLS session tickets. This
|
<p> Algorithm used to encrypt <a href="https://tools.ietf.org/html/rfc5077">RFC5077</a> TLS session tickets. This
|
||||||
algorithm must use CBC mode, have a 128-bit block size, and must
|
algorithm must use CBC mode, have a 128-bit block size, and must
|
||||||
have a key length between 128 and 256 bits. The default is
|
have a key length between 128 and 256 bits. The default is
|
||||||
aes-256-cbc. Overriding the default to choose a different algorithm
|
aes-256-cbc. Overriding the default to choose a different algorithm
|
||||||
@ -20627,7 +20627,7 @@ is one of the possible replies from the restrictions
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -20660,7 +20660,7 @@ with 450 when the mapping failed due to a temporary error condition.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -20691,7 +20691,7 @@ specified with the HELO or EHLO command is rejected by the
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
@ -20791,7 +20791,7 @@ accept the address anyway.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -20815,7 +20815,7 @@ accept the address anyway.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -20873,7 +20873,7 @@ accept the address anyway.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
@ -20897,7 +20897,7 @@ accept the address anyway.
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Do not change this unless you have a complete understanding of <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
Do not change this unless you have a complete understanding of <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
|
@ -47,7 +47,7 @@ POSTMAP(1) POSTMAP(1)
|
|||||||
will store the base64-encoded result instead of the <i>value</i>.
|
will store the base64-encoded result instead of the <i>value</i>.
|
||||||
|
|
||||||
When the <i>key</i> specifies email address information, the localpart should
|
When the <i>key</i> specifies email address information, the localpart should
|
||||||
be enclosed with double quotes if required by <a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a>. For example, an
|
be enclosed with double quotes if required by <a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a>. For example, an
|
||||||
address localpart that contains ";", or a localpart that starts or ends
|
address localpart that contains ";", or a localpart that starts or ends
|
||||||
with ".".
|
with ".".
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ POSTMAP(1) POSTMAP(1)
|
|||||||
<b>COMMAND-LINE ARGUMENTS</b>
|
<b>COMMAND-LINE ARGUMENTS</b>
|
||||||
<b>-b</b> Enable message body query mode. When reading lookup keys from
|
<b>-b</b> Enable message body query mode. When reading lookup keys from
|
||||||
standard input with "<b>-q -</b>", process the input as if it is an
|
standard input with "<b>-q -</b>", process the input as if it is an
|
||||||
email message in <a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a> format. Each line of body content
|
email message in <a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a> format. Each line of body content
|
||||||
becomes one lookup key.
|
becomes one lookup key.
|
||||||
|
|
||||||
By default, the <b>-b</b> option starts generating lookup keys at the
|
By default, the <b>-b</b> option starts generating lookup keys at the
|
||||||
@ -107,7 +107,7 @@ POSTMAP(1) POSTMAP(1)
|
|||||||
|
|
||||||
<b>-h</b> Enable message header query mode. When reading lookup keys from
|
<b>-h</b> Enable message header query mode. When reading lookup keys from
|
||||||
standard input with "<b>-q -</b>", process the input as if it is an
|
standard input with "<b>-q -</b>", process the input as if it is an
|
||||||
email message in <a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a> format. Each logical header line
|
email message in <a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a> format. Each logical header line
|
||||||
becomes one lookup key. A multi-line header becomes one lookup
|
becomes one lookup key. A multi-line header becomes one lookup
|
||||||
key with one or more embedded newline characters.
|
key with one or more embedded newline characters.
|
||||||
|
|
||||||
@ -276,7 +276,7 @@ POSTMAP(1) POSTMAP(1)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
||||||
Enable preliminary SMTPUTF8 support for the protocols described
|
Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#syslog_facility">syslog_facility</a> (mail)</b>
|
<b><a href="postconf.5.html#syslog_facility">syslog_facility</a> (mail)</b>
|
||||||
The syslog facility of Postfix logging.
|
The syslog facility of Postfix logging.
|
||||||
|
@ -87,8 +87,8 @@ POSTQUEUE(1) POSTQUEUE(1)
|
|||||||
|
|
||||||
<b>-s</b> <i>site</i>
|
<b>-s</b> <i>site</i>
|
||||||
Schedule immediate delivery of all mail that is queued for the
|
Schedule immediate delivery of all mail that is queued for the
|
||||||
named <i>site</i>. A numerical site must be specified as a valid <a href="http://tools.ietf.org/html/rfc5321">RFC</a>
|
named <i>site</i>. A numerical site must be specified as a valid <a href="https://tools.ietf.org/html/rfc5321">RFC</a>
|
||||||
<a href="http://tools.ietf.org/html/rfc5321">5321</a> address literal enclosed in [], just like in email
|
<a href="https://tools.ietf.org/html/rfc5321">5321</a> address literal enclosed in [], just like in email
|
||||||
addresses. The site must be eligible for the "fast flush" ser-
|
addresses. The site must be eligible for the "fast flush" ser-
|
||||||
vice. See <a href="flush.8.html"><b>flush</b>(8)</a> for more information about the "fast flush"
|
vice. See <a href="flush.8.html"><b>flush</b>(8)</a> for more information about the "fast flush"
|
||||||
service.
|
service.
|
||||||
@ -156,7 +156,7 @@ POSTQUEUE(1) POSTQUEUE(1)
|
|||||||
it can connect to Postfix daemon processes.
|
it can connect to Postfix daemon processes.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc7159">RFC 7159</a> (JSON notation)
|
<a href="https://tools.ietf.org/html/rfc7159">RFC 7159</a> (JSON notation)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>, and to the standard
|
Problems are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>, and to the standard
|
||||||
|
@ -55,20 +55,20 @@ POSTSCREEN(8) POSTSCREEN(8)
|
|||||||
fixed low privilege.
|
fixed low privilege.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc1123">RFC 1123</a> (Host requirements)
|
<a href="https://tools.ietf.org/html/rfc1123">RFC 1123</a> (Host requirements)
|
||||||
<a href="http://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
<a href="https://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
||||||
<a href="http://tools.ietf.org/html/rfc1869">RFC 1869</a> (SMTP service extensions)
|
<a href="https://tools.ietf.org/html/rfc1869">RFC 1869</a> (SMTP service extensions)
|
||||||
<a href="http://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message Size Declaration)
|
<a href="https://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message Size Declaration)
|
||||||
<a href="http://tools.ietf.org/html/rfc1985">RFC 1985</a> (ETRN command)
|
<a href="https://tools.ietf.org/html/rfc1985">RFC 1985</a> (ETRN command)
|
||||||
<a href="http://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP Enhanced Status Codes)
|
<a href="https://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP Enhanced Status Codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
||||||
Not: <a href="http://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP Pipelining)
|
Not: <a href="https://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP Pipelining)
|
||||||
<a href="http://tools.ietf.org/html/rfc3030">RFC 3030</a> (CHUNKING without BINARYMIME)
|
<a href="https://tools.ietf.org/html/rfc3030">RFC 3030</a> (CHUNKING without BINARYMIME)
|
||||||
<a href="http://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
<a href="https://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
||||||
<a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN Extension)
|
<a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN Extension)
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol, including multi-line 220 banners)
|
<a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol, including multi-line 220 banners)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
|
@ -138,8 +138,8 @@ QMGR(8) QMGR(8)
|
|||||||
queue manager of the arrival of new mail one would request <b>I</b>.
|
queue manager of the arrival of new mail one would request <b>I</b>.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery status notifications)
|
<a href="https://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery status notifications)
|
||||||
|
|
||||||
<b>SECURITY</b>
|
<b>SECURITY</b>
|
||||||
The <a href="qmgr.8.html"><b>qmgr</b>(8)</a> daemon is not security sensitive. It reads single-character
|
The <a href="qmgr.8.html"><b>qmgr</b>(8)</a> daemon is not security sensitive. It reads single-character
|
||||||
|
@ -60,7 +60,7 @@ QMQPD(8) QMQPD(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
||||||
Enable preliminary SMTPUTF8 support for the protocols described
|
Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
||||||
Detect that a message requires SMTPUTF8 support for the speci-
|
Detect that a message requires SMTPUTF8 support for the speci-
|
||||||
|
@ -269,7 +269,7 @@ SMTP-SINK(1) SMTP-SINK(1)
|
|||||||
dom portion of the per-message capture file name.
|
dom portion of the per-message capture file name.
|
||||||
|
|
||||||
<i>time-stamp</i>
|
<i>time-stamp</i>
|
||||||
A time stamp as defined in <a href="http://tools.ietf.org/html/rfc2822">RFC 2822</a>.
|
A time stamp as defined in <a href="https://tools.ietf.org/html/rfc2822">RFC 2822</a>.
|
||||||
|
|
||||||
<b>SEE ALSO</b>
|
<b>SEE ALSO</b>
|
||||||
<a href="smtp-source.1.html">smtp-source(1)</a>, SMTP/LMTP message generator
|
<a href="smtp-source.1.html">smtp-source(1)</a>, SMTP/LMTP message generator
|
||||||
|
@ -141,26 +141,26 @@ SMTP(8) SMTP(8)
|
|||||||
low privilege.
|
low privilege.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
<a href="http://tools.ietf.org/html/rfc1651">RFC 1651</a> (SMTP service extensions)
|
<a href="https://tools.ietf.org/html/rfc1651">RFC 1651</a> (SMTP service extensions)
|
||||||
<a href="http://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
<a href="https://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
||||||
<a href="http://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message Size Declaration)
|
<a href="https://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message Size Declaration)
|
||||||
<a href="http://tools.ietf.org/html/rfc2033">RFC 2033</a> (LMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc2033">RFC 2033</a> (LMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP Enhanced Error Codes)
|
<a href="https://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP Enhanced Error Codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a> (MIME: Format of Internet Message Bodies)
|
<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a> (MIME: Format of Internet Message Bodies)
|
||||||
<a href="http://tools.ietf.org/html/rfc2046">RFC 2046</a> (MIME: Media Types)
|
<a href="https://tools.ietf.org/html/rfc2046">RFC 2046</a> (MIME: Media Types)
|
||||||
<a href="http://tools.ietf.org/html/rfc2554">RFC 2554</a> (AUTH command)
|
<a href="https://tools.ietf.org/html/rfc2554">RFC 2554</a> (AUTH command)
|
||||||
<a href="http://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP Pipelining)
|
<a href="https://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP Pipelining)
|
||||||
<a href="http://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
<a href="https://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
||||||
<a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN Extension)
|
<a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN Extension)
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH command)
|
<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH command)
|
||||||
<a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
<a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
||||||
<a href="http://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc7672">RFC 7672</a> (SMTP security via opportunistic DANE TLS)
|
<a href="https://tools.ietf.org/html/rfc7672">RFC 7672</a> (SMTP security via opportunistic DANE TLS)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
@ -231,7 +231,7 @@ SMTP(8) SMTP(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtp_quote_rfc821_envelope">smtp_quote_rfc821_envelope</a> (yes)</b>
|
<b><a href="postconf.5.html#smtp_quote_rfc821_envelope">smtp_quote_rfc821_envelope</a> (yes)</b>
|
||||||
Quote addresses in Postfix SMTP client MAIL FROM and RCPT TO
|
Quote addresses in Postfix SMTP client MAIL FROM and RCPT TO
|
||||||
commands as required by <a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
commands as required by <a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a>.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#smtp_reply_filter">smtp_reply_filter</a> (empty)</b>
|
<b><a href="postconf.5.html#smtp_reply_filter">smtp_reply_filter</a> (empty)</b>
|
||||||
A mechanism to transform replies from remote SMTP servers one
|
A mechanism to transform replies from remote SMTP servers one
|
||||||
@ -635,10 +635,10 @@ SMTP(8) SMTP(8)
|
|||||||
Available in Postfix version 2.11-3.1:
|
Available in Postfix version 2.11-3.1:
|
||||||
|
|
||||||
<b><a href="postconf.5.html#tls_dane_digest_agility">tls_dane_digest_agility</a> (on)</b>
|
<b><a href="postconf.5.html#tls_dane_digest_agility">tls_dane_digest_agility</a> (on)</b>
|
||||||
Configure <a href="http://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
Configure <a href="https://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a> (yes)</b>
|
||||||
Enable support for <a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
Enable support for <a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
||||||
digests of trust-anchors with certificate usage "2".
|
digests of trust-anchors with certificate usage "2".
|
||||||
|
|
||||||
Available in Postfix version 2.11 and later:
|
Available in Postfix version 2.11 and later:
|
||||||
@ -854,7 +854,7 @@ SMTP(8) SMTP(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
||||||
Enable preliminary SMTPUTF8 support for the protocols described
|
Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
<b><a href="postconf.5.html#smtputf8_autodetect_classes">smtputf8_autodetect_classes</a> (sendmail, verify)</b>
|
||||||
Detect that a message requires SMTPUTF8 support for the speci-
|
Detect that a message requires SMTPUTF8 support for the speci-
|
||||||
|
@ -40,27 +40,27 @@ SMTPD(8) SMTPD(8)
|
|||||||
chrooted at fixed low privilege.
|
chrooted at fixed low privilege.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc1123">RFC 1123</a> (Host requirements)
|
<a href="https://tools.ietf.org/html/rfc1123">RFC 1123</a> (Host requirements)
|
||||||
<a href="http://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
<a href="https://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
|
||||||
<a href="http://tools.ietf.org/html/rfc1869">RFC 1869</a> (SMTP service extensions)
|
<a href="https://tools.ietf.org/html/rfc1869">RFC 1869</a> (SMTP service extensions)
|
||||||
<a href="http://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message size declaration)
|
<a href="https://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message size declaration)
|
||||||
<a href="http://tools.ietf.org/html/rfc1985">RFC 1985</a> (ETRN command)
|
<a href="https://tools.ietf.org/html/rfc1985">RFC 1985</a> (ETRN command)
|
||||||
<a href="http://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP enhanced status codes)
|
<a href="https://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP enhanced status codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc2554">RFC 2554</a> (AUTH command)
|
<a href="https://tools.ietf.org/html/rfc2554">RFC 2554</a> (AUTH command)
|
||||||
<a href="http://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP pipelining)
|
<a href="https://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP pipelining)
|
||||||
<a href="http://tools.ietf.org/html/rfc3030">RFC 3030</a> (CHUNKING without BINARYMIME)
|
<a href="https://tools.ietf.org/html/rfc3030">RFC 3030</a> (CHUNKING without BINARYMIME)
|
||||||
<a href="http://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
<a href="https://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
|
||||||
<a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN extension)
|
<a href="https://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN extension)
|
||||||
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
<a href="https://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced status codes)
|
||||||
<a href="http://tools.ietf.org/html/rfc3848">RFC 3848</a> (ESMTP transmission types)
|
<a href="https://tools.ietf.org/html/rfc3848">RFC 3848</a> (ESMTP transmission types)
|
||||||
<a href="http://tools.ietf.org/html/rfc4409">RFC 4409</a> (Message submission)
|
<a href="https://tools.ietf.org/html/rfc4409">RFC 4409</a> (Message submission)
|
||||||
<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH command)
|
<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH command)
|
||||||
<a href="http://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol)
|
<a href="https://tools.ietf.org/html/rfc5321">RFC 5321</a> (SMTP protocol)
|
||||||
<a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
<a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
||||||
<a href="http://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc7505">RFC 7505</a> ("Null MX" No Service Resource Record)
|
<a href="https://tools.ietf.org/html/rfc7505">RFC 7505</a> ("Null MX" No Service Resource Record)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
@ -84,7 +84,7 @@ SMTPD(8) SMTPD(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#broken_sasl_auth_clients">broken_sasl_auth_clients</a> (no)</b>
|
<b><a href="postconf.5.html#broken_sasl_auth_clients">broken_sasl_auth_clients</a> (no)</b>
|
||||||
Enable interoperability with remote SMTP clients that implement
|
Enable interoperability with remote SMTP clients that implement
|
||||||
an obsolete version of the AUTH command (<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a>).
|
an obsolete version of the AUTH command (<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a>).
|
||||||
|
|
||||||
<b><a href="postconf.5.html#disable_vrfy_command">disable_vrfy_command</a> (no)</b>
|
<b><a href="postconf.5.html#disable_vrfy_command">disable_vrfy_command</a> (no)</b>
|
||||||
Disable the SMTP VRFY command.
|
Disable the SMTP VRFY command.
|
||||||
@ -97,7 +97,7 @@ SMTPD(8) SMTPD(8)
|
|||||||
<b><a href="postconf.5.html#strict_rfc821_envelopes">strict_rfc821_envelopes</a> (no)</b>
|
<b><a href="postconf.5.html#strict_rfc821_envelopes">strict_rfc821_envelopes</a> (no)</b>
|
||||||
Require that addresses received in SMTP MAIL FROM and RCPT TO
|
Require that addresses received in SMTP MAIL FROM and RCPT TO
|
||||||
commands are enclosed with <>, and that those addresses do not
|
commands are enclosed with <>, and that those addresses do not
|
||||||
contain <a href="http://tools.ietf.org/html/rfc822">RFC 822</a> style comments or phrases.
|
contain <a href="https://tools.ietf.org/html/rfc822">RFC 822</a> style comments or phrases.
|
||||||
|
|
||||||
Available in Postfix version 2.1 and later:
|
Available in Postfix version 2.1 and later:
|
||||||
|
|
||||||
@ -350,14 +350,14 @@ SMTPD(8) SMTPD(8)
|
|||||||
ture.
|
ture.
|
||||||
|
|
||||||
<b>SASL AUTHENTICATION CONTROLS</b>
|
<b>SASL AUTHENTICATION CONTROLS</b>
|
||||||
Postfix SASL support (<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a>) can be used to authenticate remote SMTP
|
Postfix SASL support (<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a>) can be used to authenticate remote SMTP
|
||||||
clients to the Postfix SMTP server, and to authenticate the Postfix
|
clients to the Postfix SMTP server, and to authenticate the Postfix
|
||||||
SMTP client to a remote SMTP server. See the <a href="SASL_README.html">SASL_README</a> document for
|
SMTP client to a remote SMTP server. See the <a href="SASL_README.html">SASL_README</a> document for
|
||||||
details.
|
details.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#broken_sasl_auth_clients">broken_sasl_auth_clients</a> (no)</b>
|
<b><a href="postconf.5.html#broken_sasl_auth_clients">broken_sasl_auth_clients</a> (no)</b>
|
||||||
Enable interoperability with remote SMTP clients that implement
|
Enable interoperability with remote SMTP clients that implement
|
||||||
an obsolete version of the AUTH command (<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a>).
|
an obsolete version of the AUTH command (<a href="https://tools.ietf.org/html/rfc4954">RFC 4954</a>).
|
||||||
|
|
||||||
<b><a href="postconf.5.html#smtpd_sasl_auth_enable">smtpd_sasl_auth_enable</a> (no)</b>
|
<b><a href="postconf.5.html#smtpd_sasl_auth_enable">smtpd_sasl_auth_enable</a> (no)</b>
|
||||||
Enable SASL authentication in the Postfix SMTP server.
|
Enable SASL authentication in the Postfix SMTP server.
|
||||||
@ -601,7 +601,7 @@ SMTPD(8) SMTPD(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#tls_session_ticket_cipher">tls_session_ticket_cipher</a> (Postfix</b> ><b>= 3.0: aes-256-cbc, Postfix</b> < <b>3.0:</b>
|
<b><a href="postconf.5.html#tls_session_ticket_cipher">tls_session_ticket_cipher</a> (Postfix</b> ><b>= 3.0: aes-256-cbc, Postfix</b> < <b>3.0:</b>
|
||||||
<b>aes-128-cbc)</b>
|
<b>aes-128-cbc)</b>
|
||||||
Algorithm used to encrypt <a href="http://tools.ietf.org/html/rfc5077">RFC5077</a> TLS session tickets.
|
Algorithm used to encrypt <a href="https://tools.ietf.org/html/rfc5077">RFC5077</a> TLS session tickets.
|
||||||
|
|
||||||
Available in Postfix version 3.2 and later:
|
Available in Postfix version 3.2 and later:
|
||||||
|
|
||||||
@ -654,7 +654,7 @@ SMTPD(8) SMTPD(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#smtputf8_enable">smtputf8_enable</a> (yes)</b>
|
||||||
Enable preliminary SMTPUTF8 support for the protocols described
|
Enable preliminary SMTPUTF8 support for the protocols described
|
||||||
in <a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
in <a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a>..6533.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#strict_smtputf8">strict_smtputf8</a> (no)</b>
|
<b><a href="postconf.5.html#strict_smtputf8">strict_smtputf8</a> (no)</b>
|
||||||
Enable stricter enforcement of the SMTPUTF8 protocol.
|
Enable stricter enforcement of the SMTPUTF8 protocol.
|
||||||
|
@ -111,10 +111,10 @@ TLSPROXY(8) TLSPROXY(8)
|
|||||||
Available in Postfix version 2.11-3.1:
|
Available in Postfix version 2.11-3.1:
|
||||||
|
|
||||||
<b><a href="postconf.5.html#tls_dane_digest_agility">tls_dane_digest_agility</a> (on)</b>
|
<b><a href="postconf.5.html#tls_dane_digest_agility">tls_dane_digest_agility</a> (on)</b>
|
||||||
Configure <a href="http://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
Configure <a href="https://tools.ietf.org/html/rfc7671">RFC7671</a> DANE TLSA digest algorithm agility.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a> (yes)</b>
|
<b><a href="postconf.5.html#tls_dane_trust_anchor_digest_enable">tls_dane_trust_anchor_digest_enable</a> (yes)</b>
|
||||||
Enable support for <a href="http://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
Enable support for <a href="https://tools.ietf.org/html/rfc6698">RFC 6698</a> (DANE TLSA) DNS records that contain
|
||||||
digests of trust-anchors with certificate usage "2".
|
digests of trust-anchors with certificate usage "2".
|
||||||
|
|
||||||
Available in Postfix version 2.11 and later:
|
Available in Postfix version 2.11 and later:
|
||||||
@ -126,7 +126,7 @@ TLSPROXY(8) TLSPROXY(8)
|
|||||||
|
|
||||||
<b><a href="postconf.5.html#tls_session_ticket_cipher">tls_session_ticket_cipher</a> (Postfix</b> ><b>= 3.0: aes-256-cbc, Postfix</b> < <b>3.0:</b>
|
<b><a href="postconf.5.html#tls_session_ticket_cipher">tls_session_ticket_cipher</a> (Postfix</b> ><b>= 3.0: aes-256-cbc, Postfix</b> < <b>3.0:</b>
|
||||||
<b>aes-128-cbc)</b>
|
<b>aes-128-cbc)</b>
|
||||||
Algorithm used to encrypt <a href="http://tools.ietf.org/html/rfc5077">RFC5077</a> TLS session tickets.
|
Algorithm used to encrypt <a href="https://tools.ietf.org/html/rfc5077">RFC5077</a> TLS session tickets.
|
||||||
|
|
||||||
<b><a href="postconf.5.html#openssl_path">openssl_path</a> (openssl)</b>
|
<b><a href="postconf.5.html#openssl_path">openssl_path</a> (openssl)</b>
|
||||||
The location of the OpenSSL command line program <b>openssl</b>(1).
|
The location of the OpenSSL command line program <b>openssl</b>(1).
|
||||||
|
@ -39,16 +39,16 @@ BOUNCE(8) BOUNCE(8)
|
|||||||
and that depend on retry logic in their own client.
|
and that depend on retry logic in their own client.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a> (Format of Internet Message Bodies)
|
<a href="https://tools.ietf.org/html/rfc2045">RFC 2045</a> (Format of Internet Message Bodies)
|
||||||
<a href="http://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc2822">RFC 2822</a> (Internet Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc3462">RFC 3462</a> (Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc3462">RFC 3462</a> (Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc3464">RFC 3464</a> (Delivery Status Notifications)
|
||||||
<a href="http://tools.ietf.org/html/rfc3834">RFC 3834</a> (Auto-Submitted: message header)
|
<a href="https://tools.ietf.org/html/rfc3834">RFC 3834</a> (Auto-Submitted: message header)
|
||||||
<a href="http://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
<a href="https://tools.ietf.org/html/rfc5322">RFC 5322</a> (Internet Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
<a href="https://tools.ietf.org/html/rfc6531">RFC 6531</a> (Internationalized SMTP)
|
||||||
<a href="http://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized Message Format)
|
<a href="https://tools.ietf.org/html/rfc6532">RFC 6532</a> (Internationalized Message Format)
|
||||||
<a href="http://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
<a href="https://tools.ietf.org/html/rfc6533">RFC 6533</a> (Internationalized Delivery Status Notifications)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
Problems and transactions are logged to <b>syslogd</b>(8) or <a href="postlogd.8.html"><b>postlogd</b>(8)</a>.
|
||||||
|
@ -118,7 +118,7 @@ VIRTUAL(8) VIRTUAL(8)
|
|||||||
fatal error.
|
fatal error.
|
||||||
|
|
||||||
<b>STANDARDS</b>
|
<b>STANDARDS</b>
|
||||||
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
<a href="https://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
|
||||||
|
|
||||||
<b>DIAGNOSTICS</b>
|
<b>DIAGNOSTICS</b>
|
||||||
Mail bounces when the recipient has no mailbox or when the recipient is
|
Mail bounces when the recipient has no mailbox or when the recipient is
|
||||||
|
@ -123,7 +123,9 @@ implemented with streams sockets.
|
|||||||
This feature is available as of Postfix version 2.5.
|
This feature is available as of Postfix version 2.5.
|
||||||
.RE
|
.RE
|
||||||
.IP "\fBPrivate (default: y)\fR"
|
.IP "\fBPrivate (default: y)\fR"
|
||||||
Whether or not access is restricted to the mail system.
|
Whether a service is internal to Postfix (pathname starts
|
||||||
|
with \fBprivate/\fR), or exposed through Postfix command\-line
|
||||||
|
tools (pathname starts with \fBpublic/\fR).
|
||||||
Internet (type \fBinet\fR) services can't be private.
|
Internet (type \fBinet\fR) services can't be private.
|
||||||
.IP "\fBUnprivileged (default: y)\fR"
|
.IP "\fBUnprivileged (default: y)\fR"
|
||||||
Whether the service runs with root privileges or as the
|
Whether the service runs with root privileges or as the
|
||||||
|
@ -1160,7 +1160,7 @@ while (<>) {
|
|||||||
|
|
||||||
if (!/href=/) { s/(https?:\/\/[^ ,"\(\)]*[^ ,"\(\):;!?.])/<a href="$1">$1<\/a>/; }
|
if (!/href=/) { s/(https?:\/\/[^ ,"\(\)]*[^ ,"\(\):;!?.])/<a href="$1">$1<\/a>/; }
|
||||||
s/(ftp:\/\/[^ ,"\(\)]*[^ ,"\(\):;!?.])/<a href="$1">$1<\/a>/;
|
s/(ftp:\/\/[^ ,"\(\)]*[^ ,"\(\):;!?.])/<a href="$1">$1<\/a>/;
|
||||||
s/\bRFC\s*([1-9]\d*)/<a href="http:\/\/tools.ietf.org\/html\/rfc$1">$&<\/a>/g;
|
s/\bRFC\s*([1-9]\d*)/<a href="https:\/\/tools.ietf.org\/html\/rfc$1">$&<\/a>/g;
|
||||||
|
|
||||||
# Split README/RFC/parameter/restriction hyperlinks that span line breaks
|
# Split README/RFC/parameter/restriction hyperlinks that span line breaks
|
||||||
|
|
||||||
|
@ -117,7 +117,9 @@
|
|||||||
# This feature is available as of Postfix version 2.5.
|
# This feature is available as of Postfix version 2.5.
|
||||||
# .RE
|
# .RE
|
||||||
# .IP "\fBPrivate (default: y)\fR"
|
# .IP "\fBPrivate (default: y)\fR"
|
||||||
# Whether or not access is restricted to the mail system.
|
# Whether a service is internal to Postfix (pathname starts
|
||||||
|
# with \fBprivate/\fR), or exposed through Postfix command-line
|
||||||
|
# tools (pathname starts with \fBpublic/\fR).
|
||||||
# Internet (type \fBinet\fR) services can't be private.
|
# Internet (type \fBinet\fR) services can't be private.
|
||||||
# .IP "\fBUnprivileged (default: y)\fR"
|
# .IP "\fBUnprivileged (default: y)\fR"
|
||||||
# Whether the service runs with root privileges or as the
|
# Whether the service runs with root privileges or as the
|
||||||
|
@ -1941,6 +1941,7 @@ mail_params.o: ../../include/vbuf.h
|
|||||||
mail_params.o: ../../include/vstream.h
|
mail_params.o: ../../include/vstream.h
|
||||||
mail_params.o: ../../include/vstring.h
|
mail_params.o: ../../include/vstring.h
|
||||||
mail_params.o: ../../include/vstring_vstream.h
|
mail_params.o: ../../include/vstring_vstream.h
|
||||||
|
mail_params.o: config_known_tcp_ports.h
|
||||||
mail_params.o: compat_level.h
|
mail_params.o: compat_level.h
|
||||||
mail_params.o: mail_conf.h
|
mail_params.o: mail_conf.h
|
||||||
mail_params.o: mail_params.c
|
mail_params.o: mail_params.c
|
||||||
|
@ -58,6 +58,8 @@ void config_known_tcp_ports(const char *source, const char *settings)
|
|||||||
ARGV *association;
|
ARGV *association;
|
||||||
char **cpp;
|
char **cpp;
|
||||||
|
|
||||||
|
clear_known_tcp_ports();
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* The settings is in the form of associations separated by comma. Split
|
* The settings is in the form of associations separated by comma. Split
|
||||||
* it into separate associations.
|
* it into separate associations.
|
||||||
|
@ -237,6 +237,7 @@
|
|||||||
#include <own_inet_addr.h>
|
#include <own_inet_addr.h>
|
||||||
#include <mail_params.h>
|
#include <mail_params.h>
|
||||||
#include <compat_level.h>
|
#include <compat_level.h>
|
||||||
|
#include <config_known_tcp_ports.h>
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Special configuration variables.
|
* Special configuration variables.
|
||||||
@ -922,6 +923,11 @@ void mail_params_init()
|
|||||||
#endif
|
#endif
|
||||||
util_utf8_enable = var_smtputf8_enable;
|
util_utf8_enable = var_smtputf8_enable;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Configure the known TCP port mappings.
|
||||||
|
*/
|
||||||
|
config_known_tcp_ports(VAR_KNOWN_TCP_PORTS, var_known_tcp_ports);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* What protocols should we attempt to support? The result is stored in
|
* What protocols should we attempt to support? The result is stored in
|
||||||
* the global inet_proto_table variable.
|
* the global inet_proto_table variable.
|
||||||
|
@ -20,7 +20,7 @@
|
|||||||
* Patches change both the patchlevel and the release date. Snapshots have no
|
* Patches change both the patchlevel and the release date. Snapshots have no
|
||||||
* patchlevel; they change the release date only.
|
* patchlevel; they change the release date only.
|
||||||
*/
|
*/
|
||||||
#define MAIL_RELEASE_DATE "20211002"
|
#define MAIL_RELEASE_DATE "20211022"
|
||||||
#define MAIL_VERSION_NUMBER "3.7"
|
#define MAIL_VERSION_NUMBER "3.7"
|
||||||
|
|
||||||
#ifdef SNAPSHOT
|
#ifdef SNAPSHOT
|
||||||
|
@ -1490,12 +1490,14 @@ static char *parse_destination(char *destination, char *def_service,
|
|||||||
/*
|
/*
|
||||||
* Convert service to port number, network byte order.
|
* Convert service to port number, network byte order.
|
||||||
*/
|
*/
|
||||||
|
service = (char *) filter_known_tcp_port(service);
|
||||||
if (alldig(service)) {
|
if (alldig(service)) {
|
||||||
if ((port = atoi(service)) >= 65536 || port == 0)
|
if ((port = atoi(service)) >= 65536 || port == 0)
|
||||||
msg_fatal("bad network port in destination: %s", destination);
|
msg_fatal("bad network port: %s for destination: %s",
|
||||||
|
service, destination);
|
||||||
*portp = htons(port);
|
*portp = htons(port);
|
||||||
} else {
|
} else {
|
||||||
if ((sp = getservbyname(filter_known_tcp_port(service), protocol)) != 0)
|
if ((sp = getservbyname(service, protocol)) != 0)
|
||||||
*portp = sp->s_port;
|
*portp = sp->s_port;
|
||||||
else if (strcmp(service, "smtp") == 0)
|
else if (strcmp(service, "smtp") == 0)
|
||||||
*portp = htons(25);
|
*portp = htons(25);
|
||||||
|
@ -356,12 +356,14 @@ static char *smtp_parse_destination(char *destination, char *def_service,
|
|||||||
/*
|
/*
|
||||||
* Convert service to port number, network byte order.
|
* Convert service to port number, network byte order.
|
||||||
*/
|
*/
|
||||||
|
service = (char *) filter_known_tcp_port(service);
|
||||||
if (alldig(service)) {
|
if (alldig(service)) {
|
||||||
if ((port = atoi(service)) >= 65536 || port == 0)
|
if ((port = atoi(service)) >= 65536 || port == 0)
|
||||||
msg_fatal("bad network port in destination: %s", destination);
|
msg_fatal("bad network port: %s for destination: %s",
|
||||||
|
service, destination);
|
||||||
*portp = htons(port);
|
*portp = htons(port);
|
||||||
} else {
|
} else {
|
||||||
if ((sp = getservbyname(filter_known_tcp_port(service), protocol)) == 0)
|
if ((sp = getservbyname(service, protocol)) == 0)
|
||||||
msg_fatal("unknown service: %s/%s", service, protocol);
|
msg_fatal("unknown service: %s/%s", service, protocol);
|
||||||
*portp = sp->s_port;
|
*portp = sp->s_port;
|
||||||
}
|
}
|
||||||
|
@ -140,7 +140,7 @@ TESTPROG= dict_open dup2_pass_on_exec events exec_command fifo_open \
|
|||||||
valid_utf8_string ip_match base32_code msg_rate_delay netstring \
|
valid_utf8_string ip_match base32_code msg_rate_delay netstring \
|
||||||
vstream timecmp dict_cache midna_domain casefold strcasecmp_utf8 \
|
vstream timecmp dict_cache midna_domain casefold strcasecmp_utf8 \
|
||||||
vbuf_print split_qnameval vstream msg_logger byte_mask \
|
vbuf_print split_qnameval vstream msg_logger byte_mask \
|
||||||
known_tcp_ports dict_stream
|
known_tcp_ports dict_stream find_inet
|
||||||
PLUGIN_MAP_SO = $(LIB_PREFIX)pcre$(LIB_SUFFIX)
|
PLUGIN_MAP_SO = $(LIB_PREFIX)pcre$(LIB_SUFFIX)
|
||||||
|
|
||||||
LIB_DIR = ../../lib
|
LIB_DIR = ../../lib
|
||||||
@ -472,6 +472,11 @@ sane_basename: $(LIB)
|
|||||||
$(CC) $(CFLAGS) -DTEST -o $@ $@.c $(LIB) $(SYSLIBS)
|
$(CC) $(CFLAGS) -DTEST -o $@ $@.c $(LIB) $(SYSLIBS)
|
||||||
mv junk $@.o
|
mv junk $@.o
|
||||||
|
|
||||||
|
find_inet: $(LIB)
|
||||||
|
mv $@.o junk
|
||||||
|
$(CC) $(CFLAGS) -DTEST -o $@ $@.c $(LIB) $(SYSLIBS)
|
||||||
|
mv junk $@.o
|
||||||
|
|
||||||
stream_test: stream_test.c $(LIB)
|
stream_test: stream_test.c $(LIB)
|
||||||
$(CC) $(CFLAGS) -o $@ $@.c $(LIB) $(SYSLIBS)
|
$(CC) $(CFLAGS) -o $@ $@.c $(LIB) $(SYSLIBS)
|
||||||
|
|
||||||
@ -1010,6 +1015,11 @@ dict_inline_cidr_test: dict_open dict_inline_cidr.ref
|
|||||||
diff dict_inline_cidr.ref dict_inline_cidr.tmp
|
diff dict_inline_cidr.ref dict_inline_cidr.tmp
|
||||||
rm -f dict_inline_cidr.tmp
|
rm -f dict_inline_cidr.tmp
|
||||||
|
|
||||||
|
find_inet_test: find_inet find_inet.ref
|
||||||
|
$(SHLIB_ENV) ${VALGRIND} ./find_inet >find_inet.tmp 2>&1
|
||||||
|
diff find_inet.ref find_inet.tmp
|
||||||
|
rm -f find_inet.tmp
|
||||||
|
|
||||||
depend: $(MAKES)
|
depend: $(MAKES)
|
||||||
(sed '1,/^# do not edit/!d' Makefile.in; \
|
(sed '1,/^# do not edit/!d' Makefile.in; \
|
||||||
set -e; for i in [a-z][a-z0-9]*.c; do \
|
set -e; for i in [a-z][a-z0-9]*.c; do \
|
||||||
|
@ -35,6 +35,11 @@
|
|||||||
/* IBM T.J. Watson Research
|
/* IBM T.J. Watson Research
|
||||||
/* P.O. Box 704
|
/* P.O. Box 704
|
||||||
/* Yorktown Heights, NY 10598, USA
|
/* Yorktown Heights, NY 10598, USA
|
||||||
|
/*
|
||||||
|
/* Wietse Venema
|
||||||
|
/* Google, Inc.
|
||||||
|
/* 111 8th Avenue
|
||||||
|
/* New York, NY 10011, USA
|
||||||
/*--*/
|
/*--*/
|
||||||
|
|
||||||
/* System libraries. */
|
/* System libraries. */
|
||||||
@ -58,6 +63,12 @@
|
|||||||
#define INADDR_NONE 0xffffffff
|
#define INADDR_NONE 0xffffffff
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef TEST
|
||||||
|
extern NORETURN PRINTFLIKE(1, 2) test_msg_fatal(const char *,...);
|
||||||
|
|
||||||
|
#define msg_fatal test_msg_fatal
|
||||||
|
#endif
|
||||||
|
|
||||||
/* find_inet_addr - translate numerical or symbolic host name */
|
/* find_inet_addr - translate numerical or symbolic host name */
|
||||||
|
|
||||||
unsigned find_inet_addr(const char *host)
|
unsigned find_inet_addr(const char *host)
|
||||||
@ -85,13 +96,158 @@ int find_inet_port(const char *service, const char *protocol)
|
|||||||
struct servent *sp;
|
struct servent *sp;
|
||||||
int port;
|
int port;
|
||||||
|
|
||||||
|
service = filter_known_tcp_port(service);
|
||||||
if (alldig(service) && (port = atoi(service)) != 0) {
|
if (alldig(service) && (port = atoi(service)) != 0) {
|
||||||
if (port < 0 || port > 65535)
|
if (port < 0 || port > 65535)
|
||||||
msg_fatal("bad port number: %s", service);
|
msg_fatal("bad port number: %s", service);
|
||||||
return (htons(port));
|
return (htons(port));
|
||||||
} else {
|
} else {
|
||||||
if ((sp = getservbyname(filter_known_tcp_port(service), protocol)) == 0)
|
if ((sp = getservbyname(service, protocol)) == 0)
|
||||||
msg_fatal("unknown service: %s/%s", service, protocol);
|
msg_fatal("unknown service: %s/%s", service, protocol);
|
||||||
return (sp->s_port);
|
return (sp->s_port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef TEST
|
||||||
|
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <setjmp.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
#include <vstream.h>
|
||||||
|
#include <vstring.h>
|
||||||
|
#include <msg_vstream.h>
|
||||||
|
|
||||||
|
#define STR(x) vstring_str(x)
|
||||||
|
|
||||||
|
/* TODO(wietse) make this a proper VSTREAM interface */
|
||||||
|
|
||||||
|
/* vstream_swap - kludge to capture output for testing */
|
||||||
|
|
||||||
|
static void vstream_swap(VSTREAM *one, VSTREAM *two)
|
||||||
|
{
|
||||||
|
VSTREAM save;
|
||||||
|
|
||||||
|
save = *one;
|
||||||
|
*one = *two;
|
||||||
|
*two = save;
|
||||||
|
}
|
||||||
|
|
||||||
|
jmp_buf test_fatal_jbuf;
|
||||||
|
|
||||||
|
#undef msg_fatal
|
||||||
|
|
||||||
|
/* test_msg_fatal - does not return, and does not terminate */
|
||||||
|
|
||||||
|
void test_msg_fatal(const char *fmt,...)
|
||||||
|
{
|
||||||
|
va_list ap;
|
||||||
|
|
||||||
|
va_start(ap, fmt);
|
||||||
|
vmsg_warn(fmt, ap);
|
||||||
|
va_end(ap);
|
||||||
|
longjmp(test_fatal_jbuf, 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
struct association {
|
||||||
|
const char *lhs; /* service name */
|
||||||
|
const char *rhs; /* service port */
|
||||||
|
};
|
||||||
|
|
||||||
|
struct test_case {
|
||||||
|
const char *label; /* identifies test case */
|
||||||
|
struct association associations[10];
|
||||||
|
const char *service;
|
||||||
|
const char *proto;
|
||||||
|
const char *exp_warning; /* expected error */
|
||||||
|
int exp_hport; /* expected port, host byte order */
|
||||||
|
};
|
||||||
|
|
||||||
|
struct test_case test_cases[] = {
|
||||||
|
{"good-symbolic",
|
||||||
|
/* association */ {{"foobar", "25252"}, 0},
|
||||||
|
/* service */ "foobar",
|
||||||
|
/* proto */ "tcp",
|
||||||
|
/* exp_warning */ "",
|
||||||
|
/* exp_hport */ 25252,
|
||||||
|
},
|
||||||
|
{"good-numeric",
|
||||||
|
/* association */ {{"foobar", "25252"}, 0},
|
||||||
|
/* service */ "25252",
|
||||||
|
/* proto */ "tcp",
|
||||||
|
/* exp_warning */ "",
|
||||||
|
/* exp_hport */ 25252,
|
||||||
|
},
|
||||||
|
{"bad-symbolic",
|
||||||
|
/* association */ {{"foobar", "25252"}, 0},
|
||||||
|
/* service */ "an-impossible-name",
|
||||||
|
/* proto */ "tcp",
|
||||||
|
/* exp_warning */ "find_inet: warning: unknown service: an-impossible-name/tcp\n",
|
||||||
|
},
|
||||||
|
{"bad-numeric",
|
||||||
|
/* association */ {{"foobar", "25252"}, 0},
|
||||||
|
/* service */ "123456",
|
||||||
|
/* proto */ "tcp",
|
||||||
|
/* exp_warning */ "find_inet: warning: bad port number: 123456\n",
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
int main(int argc, char **argv) {
|
||||||
|
struct test_case *tp;
|
||||||
|
struct association *ap;
|
||||||
|
int pass = 0;
|
||||||
|
int fail = 0;
|
||||||
|
const char *err;
|
||||||
|
int test_failed;
|
||||||
|
int nport;
|
||||||
|
VSTRING *msg_buf;
|
||||||
|
VSTREAM *memory_stream;
|
||||||
|
|
||||||
|
msg_vstream_init("find_inet", VSTREAM_ERR);
|
||||||
|
msg_buf = vstring_alloc(100);
|
||||||
|
|
||||||
|
for (tp = test_cases; tp->label != 0; tp++) {
|
||||||
|
test_failed = 0;
|
||||||
|
VSTRING_RESET(msg_buf);
|
||||||
|
VSTRING_TERMINATE(msg_buf);
|
||||||
|
clear_known_tcp_ports();
|
||||||
|
for (err = 0, ap = tp->associations; err == 0 && ap->lhs != 0; ap++)
|
||||||
|
err = add_known_tcp_port(ap->lhs, ap->rhs);
|
||||||
|
if (err != 0) {
|
||||||
|
msg_warn("test case %s: got err: \"%s\"", tp->label, err);
|
||||||
|
test_failed = 1;
|
||||||
|
} else {
|
||||||
|
if ((memory_stream = vstream_memopen(msg_buf, O_WRONLY)) == 0)
|
||||||
|
msg_fatal("open memory stream: %m");
|
||||||
|
vstream_swap(VSTREAM_ERR, memory_stream);
|
||||||
|
if (setjmp(test_fatal_jbuf) == 0)
|
||||||
|
nport = find_inet_port(tp->service, tp->proto);
|
||||||
|
vstream_swap(memory_stream, VSTREAM_ERR);
|
||||||
|
if (vstream_fclose(memory_stream))
|
||||||
|
msg_fatal("close memory stream: %m");
|
||||||
|
if (strcmp(STR(msg_buf), tp->exp_warning) != 0) {
|
||||||
|
msg_warn("test case %s: got error: \"%s\", want: \"%s\"",
|
||||||
|
tp->label, STR(msg_buf), tp->exp_warning);
|
||||||
|
test_failed = 1;
|
||||||
|
} else if (tp->exp_warning[0] == 0) {
|
||||||
|
if (ntohs(nport) != tp->exp_hport) {
|
||||||
|
msg_warn("test case %s: got port \"%d\", want: \"%d\"",
|
||||||
|
tp->label, ntohs(nport), tp->exp_hport);
|
||||||
|
test_failed = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (test_failed) {
|
||||||
|
msg_info("%s: FAIL", tp->label);
|
||||||
|
fail++;
|
||||||
|
} else {
|
||||||
|
msg_info("%s: PASS", tp->label);
|
||||||
|
pass++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
msg_info("PASS=%d FAIL=%d", pass, fail);
|
||||||
|
vstring_free(msg_buf);
|
||||||
|
exit(fail != 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
|
5
postfix/src/util/find_inet.ref
Normal file
5
postfix/src/util/find_inet.ref
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
find_inet: good-symbolic: PASS
|
||||||
|
find_inet: good-numeric: PASS
|
||||||
|
find_inet: bad-symbolic: PASS
|
||||||
|
find_inet: bad-numeric: PASS
|
||||||
|
find_inet: PASS=4 FAIL=0
|
@ -179,6 +179,11 @@
|
|||||||
/* IBM T.J. Watson Research
|
/* IBM T.J. Watson Research
|
||||||
/* P.O. Box 704
|
/* P.O. Box 704
|
||||||
/* Yorktown Heights, NY 10598, USA
|
/* Yorktown Heights, NY 10598, USA
|
||||||
|
/*
|
||||||
|
/* Wietse Venema
|
||||||
|
/* Google, Inc.
|
||||||
|
/* 111 8th Avenue
|
||||||
|
/* New York, NY 10011, USA
|
||||||
/*--*/
|
/*--*/
|
||||||
|
|
||||||
/* System library. */
|
/* System library. */
|
||||||
@ -271,6 +276,7 @@ static int find_service(const char *service, int socktype)
|
|||||||
const char *proto;
|
const char *proto;
|
||||||
unsigned port;
|
unsigned port;
|
||||||
|
|
||||||
|
service = filter_known_tcp_port(service);
|
||||||
if (alldig(service)) {
|
if (alldig(service)) {
|
||||||
port = atoi(service);
|
port = atoi(service);
|
||||||
return (port < 65536 ? htons(port) : -1);
|
return (port < 65536 ? htons(port) : -1);
|
||||||
@ -282,7 +288,7 @@ static int find_service(const char *service, int socktype)
|
|||||||
} else {
|
} else {
|
||||||
return (-1);
|
return (-1);
|
||||||
}
|
}
|
||||||
if ((sp = getservbyname(filter_known_tcp_port(service), proto)) != 0) {
|
if ((sp = getservbyname(service, proto)) != 0) {
|
||||||
return (sp->s_port);
|
return (sp->s_port);
|
||||||
} else {
|
} else {
|
||||||
return (-1);
|
return (-1);
|
||||||
@ -445,7 +451,12 @@ int hostname_to_sockaddr_pf(const char *hostname, int pf,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
err = getaddrinfo(hostname, filter_known_tcp_port(service), &hints, res);
|
if (service) {
|
||||||
|
service = filter_known_tcp_port(service);
|
||||||
|
if (alldig(service))
|
||||||
|
hints.ai_flags |= AI_NUMERICSERV;
|
||||||
|
}
|
||||||
|
err = getaddrinfo(hostname, service, &hints, res);
|
||||||
#if defined(BROKEN_AI_NULL_SERVICE)
|
#if defined(BROKEN_AI_NULL_SERVICE)
|
||||||
if (service == 0 && err == 0) {
|
if (service == 0 && err == 0) {
|
||||||
struct addrinfo *r;
|
struct addrinfo *r;
|
||||||
@ -561,7 +572,12 @@ int hostaddr_to_sockaddr(const char *hostaddr, const char *service,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
err = getaddrinfo(hostaddr, filter_known_tcp_port(service), &hints, res);
|
if (service) {
|
||||||
|
service = filter_known_tcp_port(service);
|
||||||
|
if (alldig(service))
|
||||||
|
hints.ai_flags |= AI_NUMERICSERV;
|
||||||
|
}
|
||||||
|
err = getaddrinfo(hostaddr, service, &hints, res);
|
||||||
#if defined(BROKEN_AI_NULL_SERVICE)
|
#if defined(BROKEN_AI_NULL_SERVICE)
|
||||||
if (service == 0 && err == 0) {
|
if (service == 0 && err == 0) {
|
||||||
struct addrinfo *r;
|
struct addrinfo *r;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user