smtpd | Début | Suivant | Sommaire | Préc.page.lue | Accueil |
NAME | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
SYNOPSIS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
smtpd [generic Postfix daemon options] sendmail -bs
DESCRIPTION | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Alternatively, the SMTP server be can run in stand-alone mode; this is traditionally obtained with "sendmail -bs". When the SMTP server runs stand-alone with non $mail_owner privileges, it receives mail even while the mail system is not running, deposits messages directly into the maildrop queue, and disables the SMTP server's access policies. As of Postfix version 2.3, the SMTP server refuses to receive mail from the network when it runs with non $mail_owner privileges.
The SMTP server implements a variety of policies for connection requests, and for parameters given to HELO, ETRN, MAIL FROM, VRFY and RCPT TO commands. They are detailed below and in the main.cf configuration file.
SECURITY | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The SMTP server is moderately security-sensitive. It talks to SMTP clients and to DNS servers on the network. The SMTP server can be run chrooted at fixed low privilege.
STANDARDS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
RFC 821 (SMTP protocol) RFC 1123 (Host requirements) RFC 1652 (8bit-MIME transport) RFC 1869 (SMTP service extensions) RFC 1870 (Message Size Declaration) RFC 1985 (ETRN command) RFC 2034 (SMTP Enhanced Error Codes) RFC 2554 (AUTH command) RFC 2821 (SMTP protocol) RFC 2920 (SMTP Pipelining) RFC 3207 (STARTTLS command) RFC 3461 (SMTP DSN Extension) RFC 3463 (Enhanced Status Codes) RFC 3848 (ESMTP Transmission Types) RFC 4954 (AUTH command)
DIAGNOSTICS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Depending on the setting of the notify_classes parameter, the postmaster is notified of bounces, protocol problems, policy violations, and of other trouble.
CONFIGURATION PARAMETERS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Changes to main.cf are picked up automatically, as smtpd(8) processes run for only a limited amount of time. Use the command "postfix reload" to speed up a change.
The text below provides only a parameter summary. See postconf(5) for more details including examples.
COMPATIBILITY CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The following parameters work around implementation errors in other software, and/or allow you to override standards in order to prevent undesirable use.
Available in Postfix version 2.1 and later:
Available in Postfix version 2.2 and later:
Available in Postfix version 2.3 and later:
ADDRESS REWRITING CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
See the ADDRESS_REWRITING_README document for a detailed discussion of Postfix address rewriting.
Available in Postfix version 2.2 and later:
AFTER QUEUE EXTERNAL CONTENT INSPECTION CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
As of version 1.0, Postfix can be configured to send new mail to an external content filter AFTER the mail is queued. This content filter is expected to inject mail back into a (Postfix or other) MTA for further delivery. See the FILTER_README document for details.
BEFORE QUEUE EXTERNAL CONTENT INSPECTION CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
As of version 2.1, the Postfix SMTP server can be configured to send incoming mail to a real-time SMTP-based content filter BEFORE mail is queued. This content filter is expected to inject mail back into Postfix. See the SMTPD_PROXY_README document for details on how to configure and operate this feature.
BEFORE QUEUE MILTER CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
As of version 2.3, Postfix supports the Sendmail version 8 Milter (mail filter) protocol. These content filters run outside Postfix. They can inspect the SMTP command stream and the message content, and can request modifications before mail is queued. For details see the MILTER_README document.
GENERAL CONTENT INSPECTION CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The following parameters are applicable for both built-in and external content filters.
Available in Postfix version 2.1 and later:
EXTERNAL CONTENT INSPECTION CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The following parameters are applicable for both before-queue and after-queue content filtering.
Available in Postfix version 2.1 and later:
SASL AUTHENTICATION CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Postfix SASL support (RFC 4954) can be used to authenticate remote SMTP clients to the Postfix SMTP server, and to authenticate the Postfix SMTP client to a remote SMTP server. See the SASL_README document for details.
Available in Postfix version 2.1 and later:
Available in Postfix version 2.1 and 2.2:
Available in Postfix version 2.3 and later:
Available in Postfix version 2.5 and later:
STARTTLS SUPPORT CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Detailed information about STARTTLS configuration may be found in the TLS_README document.
Available in Postfix version 2.5 and later:
OBSOLETE STARTTLS CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The following configuration parameters exist for compatibility with Postfix versions before 2.3. Support for these will be removed in a future release.
VERP SUPPORT CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
With VERP style delivery, each recipient of a message receives a customized copy of the message with his/her own recipient address encoded in the envelope sender address. The VERP_README file describes configuration and operation details of Postfix support for variable envelope return path addresses. VERP style delivery is requested with the SMTP XVERP command or with the "sendmail -V" command-line option and is available in Postfix version 1.1 and later.
Available in Postfix version 1.1 and 2.0:
Available in Postfix version 2.1 and later:
TROUBLE SHOOTING CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The DEBUG_README document describes how to debug parts of the Postfix mail system. The methods vary from making the software log a lot of detail, to running some daemon processes under control of a call tracer or debugger.
Available in Postfix version 2.1 and later:
KNOWN VERSUS UNKNOWN RECIPIENT CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
As of Postfix version 2.0, the SMTP server rejects mail for unknown recipients. This prevents the mail queue from clogging up with undeliverable MAILER-DAEMON messages. Additional information on this topic is in the LOCAL_RECIPIENT_README and ADDRESS_CLASS_README documents.
Parameters concerning known/unknown local recipients:
Parameters concerning known/unknown recipients of relay destinations:
Parameters concerning known/unknown recipients in virtual alias domains:
Parameters concerning known/unknown recipients in virtual mailbox domains:
RESOURCE AND RATE CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The following parameters limit resource usage by the SMTP server and/or control client request rates.
Available in Postfix version 2.3 and later:
The per SMTP client connection count and request rate limits are implemented in co-operation with the anvil(8) service, and are available in Postfix version 2.2 and later.
Available in Postfix version 2.3 and later:
TARPIT CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
When a remote SMTP client makes errors, the Postfix SMTP server can insert delays before responding. This can help to slow down run-away software. The behavior is controlled by an error counter that counts the number of errors within an SMTP session that a client makes without delivering mail.
Available in Postfix version 2.1 and later:
ACCESS POLICY DELEGATION CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
As of version 2.1, Postfix can be configured to delegate access policy decisions to an external server that runs outside Postfix. See the file SMTPD_POLICY_README for more information.
ACCESS CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The SMTPD_ACCESS_README document gives an introduction to all the SMTP server access control features.
Available in Postfix version 2.0 and later:
Available in Postfix version 2.1 and later:
Available in Postfix version 2.2 and later:
SENDER AND RECIPIENT ADDRESS VERIFICATION CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Postfix version 2.1 introduces sender and recipient address verification. This feature is implemented by sending probe email messages that are not actually delivered. This feature is requested via the reject_unverified_sender and reject_unverified_recipient access restrictions. The status of verification probes is maintained by the verify(8) server. See the file ADDRESS_VERIFICATION_README for information about how to configure and operate the Postfix sender/recipient address verification service.
ACCESS CONTROL RESPONSES | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The following parameters control numerical SMTP reply codes and/or text responses.
Available in Postfix version 2.0 and later:
MISCELLANEOUS CONTROLS | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Available in Postfix version 2.2 and later:
Available in Postfix version 2.5 and later:
SEE ALSO | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
anvil(8), connection/rate limiting cleanup(8), message canonicalization tlsmgr(8), TLS session and PRNG management trivial-rewrite(8), address resolver verify(8), address verification service postconf(5), configuration parameters master(5), generic daemon options master(8), process manager syslogd(8), system logging
README FILES | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Use "postconf readme_directory" or "postconf html_directory" to locate this information.
ADDRESS_CLASS_README, blocking unknown hosted or relay recipients ADDRESS_REWRITING_README Postfix address manipulation FILTER_README, external after-queue content filter LOCAL_RECIPIENT_README, blocking unknown local recipients MILTER_README, before-queue mail filter applications SMTPD_ACCESS_README, built-in access policies SMTPD_POLICY_README, external policy server SMTPD_PROXY_README, external before-queue content filter SASL_README, Postfix SASL howto TLS_README, Postfix STARTTLS howto VERP_README, Postfix XVERP extension XCLIENT_README, Postfix XCLIENT extension XFORWARD_README, Postfix XFORWARD extension
LICENSE | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
The Secure Mailer license must be distributed with this software.
AUTHOR(S) | Début | Précédent | Suivant | Sommaire | Préc.page.lue | Accueil |
Wietse Venema IBM T.J. Watson Research P.O. Box 704 Yorktown Heights, NY 10598, USA SASL support originally by: Till Franke SuSE Rhein/Main AG 65760 Eschborn, Germany TLS support originally by: Lutz Jaenicke BTU Cottbus Allgemeine Elektrotechnik Universitaetsplatz 3-4 D-03044 Cottbus, Germany Revised TLS support by: Victor Duchovni Morgan Stanley
Sommaire | Début | Suivant | Sommaire | Préc.page.lue | Accueil |
Table des mots clés | Début | Suivant | Sommaire | Préc.page.lue | Accueil |