From c302f4a4bf9d604bf4db1f21d3dd8ec09362a134 Mon Sep 17 00:00:00 2001
From: Wietse Venema
1 /etc/postfix/master.cf: - 2 127.0.0.1:9998 unix - n n - - spawn + 2 127.0.0.1:9998 inet n n n - - spawn 3 user=nobody argv=/some/where/policy-server 4 5 /etc/postfix/main.cf: @@ -340,7 +340,7 @@ client/server configuration" section above.1 /etc/postfix/master.cf: -2 127.0.0.1:9998 unix - n n - - spawn +2 127.0.0.1:9998 inet n n n - - spawn 3 user=nobody argv=/usr/bin/perl /usr/libexec/postfix/greylist.pl 4 5 /etc/postfix/main.cf: diff --git a/postfix/html/header_checks.5.html b/postfix/html/header_checks.5.html index f4580ce1d..5a0c26d92 100644 --- a/postfix/html/header_checks.5.html +++ b/postfix/html/header_checks.5.html @@ -309,9 +309,9 @@ HEADER_CHECKS(5) HEADER_CHECKS(5) exploit. /etc/postfix/main.cf: - header_checks = regexp:/etc/postfix/header_checks + body_checks = regexp:/etc/postfix/body_checks - /etc/postfix/header_checks: + /etc/postfix/body_checks: /^<iframe src=(3D)?cid:.* height=(3D)?0 width=(3D)?0>$/ REJECT IFRAME vulnerability exploit diff --git a/postfix/html/pickup.8.html b/postfix/html/pickup.8.html index ad7e6ac17..7688047f4 100644 --- a/postfix/html/pickup.8.html +++ b/postfix/html/pickup.8.html @@ -43,8 +43,8 @@ PICKUP(8) PICKUP(8) unfiltered user data. CONFIGURATION PARAMETERS - As the pickup daemon is a relatively long-running process, - up to an hour may pass before a main.cf change takes + As the pickup(8) daemon is a relatively long-running pro- + cess, up to an hour may pass before a main.cf change takes effect. Use the command "postfix reload" command to speed up a change. diff --git a/postfix/html/postconf.5.html b/postfix/html/postconf.5.html index d2836b4d5..47b03d4aa 100644 --- a/postfix/html/postconf.5.html +++ b/postfix/html/postconf.5.html @@ -733,6 +733,7 @@ below it), "/file/name" or "type:table" patt pattern is replaced by its contents; a "type:table" lookup table is matched when a table entry matches a lookup string (the lookup result is ignored). Continue long lines by starting the next line +with whitespace. @@ -1546,7 +1547,7 @@ This feature is available in Postfix 2.0 and later. The names of message delivery transports that should not be delivered to unless someone issues "sendmail -q" or equivalent. Specify zero or more names of mail delivery transports names that appear in the -first field of master.cf). +first field of master.cf.@@ -3852,7 +3853,7 @@ The error classes are:
Send the postmaster copies of the headers of bounced mail, and send transcripts of SMTP sessions when Postfix rejects mail. The notification is sent to the address specified with the -bounce_notice_recipient configuration parameter (default: postmaster) +bounce_notice_recipient configuration parameter (default: postmaster). 2bounce @@ -4582,13 +4583,6 @@ recipient addresses with $relay_r recipients. See also the relay domains address class in the ADDRESS_CLASS_README file. -The list of domains that are by default delivered via the -$local_transport mail delivery transport. By default this is the -Postfix local(8) delivery agent which looks up all recipients in -/etc/passwd and /etc/aliases. The SMTP server validates recipient -addresses with $local_recipient_maps. See also the local domain -address class in the ADDRESS_CLASS_README file.
-NOTE: Postfix will not automatically forward mail for domains that list this system as their primary or backup MX host. See the permit_mx_backup restriction in the postconf(5) manual page.
@@ -5245,7 +5239,7 @@ This feature is available in Postfix 2.1 and later.The maximal length of message header and body lines that Postfix -will send via SMTP. Longer lines are longer are broken by inserting +will send via SMTP. Longer lines are broken by inserting "<CR><LF><SPACE>". This minimizes the damage to MIME formatted mail.
@@ -5765,7 +5759,7 @@ restrictions.By default, clients in trusted networks are excluded. Specify a list of network blocks, hostnames or .domain names (the initial -initial dot causes the domain to match any name below it). +dot causes the domain to match any name below it).
@@ -6407,7 +6401,7 @@ supposed to give the result to another Postfix SMTP server process.
Specify host:port. The host can be specified as an IP address -or was a symbolic name; no MX lookups are done. When no host or +or as a symbolic name; no MX lookups are done. When no host or host: are specified, the local machine is assumed.
This feature is available in Postfix 2.1 and later.
@@ -6606,8 +6600,7 @@ address.
The unknown_ the response code for rejected requests (default: 450). The response is always 450 in case of a temporary DNS error. -reject_unlisted_recipient -(Postfix 2.0 name: check_recipient_maps) +reject_unlisted_recipient (Postfix 2.0 name: check_recipient_maps) Reject the request when the RCPT TO address is not listed in the list of valid recipients for its domain class. See the diff --git a/postfix/html/proxymap.8.html b/postfix/html/proxymap.8.html index 4c29654f3..6d5afdc93 100644 --- a/postfix/html/proxymap.8.html +++ b/postfix/html/proxymap.8.html @@ -44,7 +44,7 @@ PROXYMAP(8) PROXYMAP(8) Open the table with type maptype and name mapname, as controlled by flags. The reply includes the map- type dependent flags (to distinguish a fixed string - table from regular a expression table). + table from a regular expression table). lookup maptype:mapname flags key Look up the data stored under the requested key. diff --git a/postfix/html/qmgr.8.html b/postfix/html/qmgr.8.html index 39af6a58e..fe9050aa7 100644 --- a/postfix/html/qmgr.8.html +++ b/postfix/html/qmgr.8.html @@ -63,8 +63,8 @@ QMGR(8) QMGR(8) defer(8) daemon. trace Per-recipient status information as requested with - the Postfix "sendmail -v" or "sendmail -bv" com- - mand. These files are maintained by the trace(8) + the Postfix "sendmail -v" or "sendmail -bv" com- + mand. These files are maintained by the trace(8) daemon. The qmgr daemon is responsible for asking the bounce(8), @@ -365,7 +365,7 @@ QMGR(8) QMGR(8) SEE ALSO trivial-rewrite(8), address routing bounce(8), delivery status reports - postconf(5) configuration parameters + postconf(5), configuration parameters master(8), process manager syslogd(8) system logging diff --git a/postfix/html/smtpd.8.html b/postfix/html/smtpd.8.html index 242c121c4..7744fe394 100644 --- a/postfix/html/smtpd.8.html +++ b/postfix/html/smtpd.8.html @@ -434,6 +434,8 @@ SMTPD(8) SMTPD(8) Postfix SMTP server starts to increment the error counter with each junk command. + Available in Postfix version 2.1 and later: + smtpd_recipient_overshoot_limit (1000) The number of recipients that a remote SMTP client can send in excess of the limit specified with @@ -447,12 +449,8 @@ SMTPD(8) SMTPD(8) outside Postfix. See the file SMTPD_POLICY_README for more information. - smtpd_policy_service_timeout (100s) - The time limit for connecting to, writing to or - receiving from a delegated SMTPD policy server. - smtpd_policy_service_max_idle (300s) - The time after which an idle SMTPD policy service + The time after which an idle SMTPD policy service connection is closed. smtpd_policy_service_max_ttl (1000s) @@ -460,107 +458,108 @@ SMTPD(8) SMTPD(8) connection is closed. smtpd_policy_service_timeout (100s) - The time limit for connecting to, writing to or + The time limit for connecting to, writing to or receiving from a delegated SMTPD policy server. ACCESS CONTROLS - The SMTPD_ACCESS_README document gives an introduction to + The SMTPD_ACCESS_README document gives an introduction to all the SMTP server access control features. smtpd_delay_reject (yes) - Wait until the RCPT TO command before evaluating + Wait until the RCPT TO command before evaluating $smtpd_client_restrictions, $smtpd_helo_restric- tions and $smtpd_sender_restrictions, or wait until - the ETRN command before evaluating + the ETRN command before evaluating $smtpd_client_restrictions and $smtpd_helo_restric- tions. - parent_domain_matches_subdomains (see 'postconf -d' out- + parent_domain_matches_subdomains (see 'postconf -d' out- put) What Postfix features match subdomains of "domain.tld" automatically, instead of requiring an explicit ".domain.tld" pattern. smtpd_client_restrictions (empty) - Optional SMTP server access restrictions in the + Optional SMTP server access restrictions in the context of a client SMTP connection request. smtpd_helo_required (no) Require that a remote SMTP client introduces itself - at the beginning of an SMTP session with the HELO + at the beginning of an SMTP session with the HELO or EHLO command. smtpd_helo_restrictions (empty) - Optional restrictions that the Postfix SMTP server + Optional restrictions that the Postfix SMTP server applies in the context of the SMTP HELO command. smtpd_sender_restrictions (empty) - Optional restrictions that the Postfix SMTP server + Optional restrictions that the Postfix SMTP server applies in the context of the MAIL FROM command. smtpd_recipient_restrictions (permit_mynetworks, reject_unauth_destination) The access restrictions that the Postfix SMTP - server applies in the context of the RCPT TO com- + server applies in the context of the RCPT TO com- mand. smtpd_etrn_restrictions (empty) - Optional SMTP server access restrictions in the + Optional SMTP server access restrictions in the context of a client ETRN request. allow_untrusted_routing (no) - Forward mail with sender-specified routing - (user[@%!]remote[@%!]site) from untrusted clients + Forward mail with sender-specified routing + (user[@%!]remote[@%!]site) from untrusted clients to destinations matching $relay_domains. smtpd_restriction_classes (empty) - User-defined aliases for groups of access restric- + User-defined aliases for groups of access restric- tions. smtpd_null_access_lookup_key (<>) - The lookup key to be used in SMTP access(5) tables + The lookup key to be used in SMTP access(5) tables instead of the null sender address. permit_mx_backup_networks (empty) Restrict the use of the permit_mx_backup SMTP - access feature to only domains whose primary MX + access feature to only domains whose primary MX hosts match the listed networks. Available in Postfix version 2.0 and later: smtpd_data_restrictions (empty) - Optional access restrictions that the Postfix SMTP + Optional access restrictions that the Postfix SMTP server applies in the context of the SMTP DATA com- mand. smtpd_expansion_filter (see 'postconf -d' output) - What characters are allowed in $name expansions of + What characters are allowed in $name expansions of RBL reply templates. Available in Postfix version 2.1 and later: smtpd_reject_unlisted_sender (no) - Request that the Postfix SMTP server rejects mail - from unknown sender addresses, even when no - explicit reject_unlisted_sender access restriction + Request that the Postfix SMTP server rejects mail + from unknown sender addresses, even when no + explicit reject_unlisted_sender access restriction is specified. smtpd_reject_unlisted_recipient (yes) - Request that the Postfix SMTP server rejects mail + Request that the Postfix SMTP server rejects mail for unknown recipient addresses, even when no - explicit reject_unlisted_recipient access restric- + explicit reject_unlisted_recipient access restric- tion is specified. SENDER AND RECIPIENT ADDRESS VERIFICATION CONTROLS - Postfix version 2.1 introduces sender and address verifi- - cation. This feature is implemented by sending probe - email messages that are not actually delivered. This fea- - ture is requested via the reject_unverified_sender and - reject_unverified_recipient access restrictions. The sta- - tus of verification probes is maintained by the verify(8) - server. See the file ADDRESS_VERIFICATION_README for - information about how to configure and operate the Postfix - sender/recipient address verification service. + Postfix version 2.1 introduces sender and recipient + address verification. This feature is implemented by + sending probe email messages that are not actually deliv- + ered. This feature is requested via the reject_unveri- + fied_sender and reject_unverified_recipient access + restrictions. The status of verification probes is main- + tained by the verify(8) server. See the file ADDRESS_VER- + IFICATION_README for information about how to configure + and operate the Postfix sender/recipient address verifica- + tion service. address_verify_poll_count (3) How many times to query the verify(8) service for diff --git a/postfix/html/spawn.8.html b/postfix/html/spawn.8.html index b1820ee7c..77e203a9b 100644 --- a/postfix/html/spawn.8.html +++ b/postfix/html/spawn.8.html @@ -66,7 +66,7 @@ SPAWN(8) SPAWN(8) data-driven attacks. CONFIGURATION PARAMETERS - Changes to main.cf are picked up automatically as smtpd(8) + Changes to main.cf are picked up automatically as spawn(8) processes run for only a limited amount of time. Use the command "postfix reload" to speed up a change. diff --git a/postfix/html/trivial-rewrite.8.html b/postfix/html/trivial-rewrite.8.html index f6e6ba824..bd3cfb7f1 100644 --- a/postfix/html/trivial-rewrite.8.html +++ b/postfix/html/trivial-rewrite.8.html @@ -156,13 +156,13 @@ TRIVIAL-REWRITE(8) TRIVIAL-REWRITE(8) destination). ADDRESS VERIFICATION CONTROLS - Postfix version 2.1 introduces sender and address verifi- - cation. This feature is implemented by sending probe - email messages that are not actually delivered. By - default, address verification probes use the same route as - regular mail. To override specific aspects of message - routing for address verification probes, specify one or - more of the following: + Postfix version 2.1 introduces sender and recipient + address verification. This feature is implemented by + sending probe email messages that are not actually deliv- + ered. By default, address verification probes use the + same route as regular mail. To override specific aspects + of message routing for address verification probes, spec- + ify one or more of the following: address_verify_local_transport ($local_transport) Overrides the local_transport parameter setting for diff --git a/postfix/man/man5/header_checks.5 b/postfix/man/man5/header_checks.5 index 246ecddfd..866d68831 100644 --- a/postfix/man/man5/header_checks.5 +++ b/postfix/man/man5/header_checks.5 @@ -292,9 +292,9 @@ Body pattern to stop a specific HTML browser vulnerability exploit. .nf /etc/postfix/main.cf: .ti +4 -header_checks = regexp:/etc/postfix/header_checks +body_checks = regexp:/etc/postfix/body_checks -/etc/postfix/header_checks: +/etc/postfix/body_checks: .ti +4 /^