tankistua
Gold Member | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору smtp_banner = "$smtp_active_hostname ESMTP Server $tod_full" VMAILDIR = /usr/local/vmail domainlist local_domains = @ : dsearch; VMAILDIR/users domainlist relay_to_domains = hostlist relay_from_hosts = localhost : 194.93.191.144/28 av_scanner = clamd:/var/run/clamav/clamd spamd_address = 127.0.0.1 783 acl_smtp_rcpt = acl_check_rcpt acl_smtp_data = acl_check_data exim_user = mailnull exim_group = mail never_users = root host_lookup = * rfc1413_hosts = !* rfc1413_query_timeout = 0s ignore_bounce_errors_after = 2d timeout_frozen_after = 7d accept_8bitmime = true log_selector = +all ###################################################################### # ACL CONFIGURATION # # Specifies access control lists for incoming SMTP mail # ###################################################################### begin acl acl_check_rcpt: accept hosts = : deny message = Restricted characters in address domains = +local_domains local_parts = ^[.] : ^.*[@%!/|] deny message = Restricted characters in address domains = !+local_domains local_parts = ^[./|] : ^.*[@%!] : ^.*/\\.\\./ warn message = X-SenderHostName: $sender_host_name hosts = ! +relay_from_hosts warn message = X-SenderNoBackresolve: yes log_message = No backresolving for $sender_host_address condition = ${if def:sender_host_name {no} {yes}} require verify = sender accept local_parts = postmaster domains = +local_domains accept hosts = +relay_from_hosts control = submission accept authenticated = * control = submission accept domains = +local_domains endpass verify = recipient accept domains = +relay_to_domains endpass verify = recipient deny message = relay not permitted acl_check_data: deny message = Contains file with forbidden extension: $found_extension demime = exe:com:bat:cmd:vbs:pl:bas:js:java:reg:shs:pif:scr:dll:ssh:chm:hlp:lnk:cpl # Deny if the message contains a virus. Before enabling this check, you # must install a virus scanner and set the av_scanner option above. deny message = This message contains a virus ($malware_name). demime = * malware = * accept add_header = X-Spam-Checked: NO condition = ${if < {$message_size}{200k}{yes}{no}} # Add headers to a message if it is judged to be spam. Before enabling this, # you must install SpamAssassin. You may also need to set the spamd_address # option above. warn spam = nobody message = X-Spam_score: $spam_score\n\ X-Spam_score_int: $spam_score_int\n\ X-Spam_bar: $spam_bar\n\ X-Spam_report: $spam_report # Accept the message. accept begin routers dnslookup: driver = dnslookup domains = ! +local_domains transport = remote_smtp ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8 no_more system_aliases: driver = redirect allow_fail allow_defer data = ${lookup{$local_part}lsearch{/etc/aliases}} user = mailnull group = mail file_transport = address_file pipe_transport = address_pipe vmail_aliases: driver = redirect allow_fail allow_defer require_files = VMAILDIR/aliases/$domain data = ${lookup{$local_part}lsearch{VMAILDIR/aliases/$domain}} user = vmail group = vmail file_transport = address_file pipe_transport = address_pipe vmail_user: driver = accept condition = ${if eq{} {${lookup {$local_part} lsearch{VMAILDIR/users/$domain}}}{no}{yes}} user = vmail group = vmail local_part_suffix = +* local_part_suffix_optional transport = vmail_delivery ###################################################################### # TRANSPORTS CONFIGURATION # ###################################################################### begin transports remote_smtp: driver = smtp vmail_delivery: driver = appendfile user = vmail group = vmail mode = 0600 directory=VMAILDIR/mail/$domain/$local_part/Maildir maildir_format = true mode_fail_narrower = false envelope_to_add = true return_path_add = true address_pipe: driver = pipe return_output address_file: driver = appendfile delivery_date_add envelope_to_add return_path_add address_reply: driver = autoreply ###################################################################### # RETRY CONFIGURATION # ###################################################################### begin retry # This single retry rule applies to all domains and all errors. It specifies # retries every 15 minutes for 2 hours, then increasing retry intervals, # starting at 1 hour and increasing each time by a factor of 1.5, up to 16 # hours, then retries every 6 hours until 4 days have passed since the first # failed delivery. # Address or Domain Error Retries # ----------------- ----- ------- * * F,2h,15m; G,16h,1h,1.5; F,4d,6h ###################################################################### # REWRITE CONFIGURATION # ###################################################################### # There are no rewriting specifications in this default configuration file. begin rewrite ###################################################################### # AUTHENTICATION CONFIGURATION # ###################################################################### # There are no authenticator specifications in this default configuration file. begin authenticators ###################################################################### # CONFIGURATION FOR local_scan() # ###################################################################### # If you have built Exim to include a local_scan() function that contains # tables for private options, you can define those options here. Remember to # uncomment the "begin" line. It is commented by default because it provokes # an error with Exim binaries that are not built with LOCAL_SCAN_HAS_OPTIONS # set in the Local/Makefile. # begin local_scan # End of Exim configuration file |