masqmail-0.2
view docs/masqmail.route.5 @ 17:6c59dedd06be
fixed delivery with empty or non-existent alias file
Thanks to Marcos Dione for the hint where to look.
(Closes Debian bug #417842)
author | meillo@marmaro.de |
---|---|
date | Thu, 06 Nov 2008 09:41:35 +0100 |
parents | 8c55886cacd8 |
children | 31cf4655ab0c |
line source
1 .TH masqmail.route 5 User Manuals
2 .SH NAME
3 masqmail.route \- masqmail route configuration file
4 .SH DESCRIPTION
6 This man page describes the syntax of the route configuration files of \fBmasqmail (8)\f1. Their usual locations are in \fI/etc/masqmail/\f1.
8 .SH OPTIONS
9 .TP
11 \fBprotocol\f1 = \fIstring\f1
13 \fIstring\f1 can be one of 'smtp' or 'pipe', default is 'smtp'. If set to 'smtp', mail will be sent with the SMTP protocol to its destination. If set to 'pipe', you also have to set 'pipe' to a command, the message will then be piped to a program. See option 'pipe' below.
14 .TP
16 \fBmail_host\f1 = \fIstring\f1
18 This is preferably the mail server of your ISP. All outgoing messages will be sent to this host which will distribute them to their destinations. If you do not set this mails will be sent directly. Because the mail server is probably 'near' to you, mail transfer will be much faster if you use it.
20 You can optionally give a port number following the host name and a colon, eg mail_host="mail.foo.com:25".
21 .TP
23 \fBresolve_list\f1 = \fIlist\f1
25 Specify the method how the domain of the server is resolved. Possible values are dns_mx, dns_a, byname. For 'dns_mx', the domain is assumed to be an MX pointer to a list of host names, these will be tried each in order (lowest preference value first, equal preference values in random order). For 'dns_a', the domain is assumed to be an A pointer. For 'byname', the library function \fBgethostbyname (3)\f1 will be used.
27 The default is "dns_mx;dns_a;byname".
28 .TP
30 \fBconnect_error_fail\f1 = \fIboolean\f1
32 If this is set, a connection error will cause a mail delivery to fail, ie. it will be bounced. If it is unset, it will just be defered.
34 Default is false. The reason for this is that masqmail is designed for non permanent internet connections, where such errors may occur quite often, and a bounce would be annoying.
36 For the default local_net route is is set to true.
37 .TP
39 \fBhelo_name\f1 = \fIstring\f1
41 Set the name given with the HELO/EHLO command. If this is not set, \fBhost_name\f1 from \fImasqmail.conf\f1 will be used, if the \fBdo_correct_helo\f1 option (see below) is unset.
42 .TP
44 \fBdo_correct_helo\f1 = \fIboolean\f1
46 If this is set, masqmail tries to look up your host name as it appears on the internet and sends this in the HELO/EHLO command. Some servers are so picky that they want this. Which is really crazy. It just does not make any sense to lie about ones own identity, because it can always be looked up by the server. Nobody should believe in the name given by HELO/EHLO anyway. If this is not set, \fBhost_name\f1 from \fImasqmail.conf\f1 or as given with the \fBhelo_name\f1 (see above) will be used.
47 .TP
49 \fBdo_pipelining\f1 = \fIboolean\f1
51 If this is set to false, masqmail will not use ESMTP PIPELINING, even if the server announces that it is able to cope with it. Default is true.
53 You do not want to set this to false unless the mail setup on the remote server side is really broken. Keywords: wingate.
54 .TP
56 \fBallowed_mail_locals\f1 = \fIlist\f1
58 This is a semicolon ';' separated list of local parts which will be allowed to send mail through this connection. If unset and \fBnot_allowed_mail_locals\f1 is also unset, all users are allowed.
59 .TP
61 \fBnot_allowed_mail_locals\f1 = \fIlist\f1
63 This is a semicolon ';' separated list of local parts which will be not allowed to send mail through this connection. Local parts in this list will not be allowed to use this route even if they are part of \fBallowed_mail_locals\f1 (see above).
64 .TP
66 \fBallowed_return_paths\f1 = \fIlist\f1
68 This is a semicolon ';' separated list of addresses. Messages which have one one of these addresses as the return path will be used using this route (if not also in \fBnot_allowed_return_paths\f1 or an item in \fBnot_allowed_mail_locals\f1 matches).
70 Patterns containing '?' and '*' can be used. The special item "<>" matches the null sender address (eg. failure notices or delivery notifications).
71 .TP
73 \fBnot_allowed_return_paths\f1 = \fIlist\f1
75 This is a semicolon ';' separated list of addresses. Messages which have one one of these addresses as the return path will not be used using this route (even if also in \fBallowed_return_paths\f1 or an item in \fBallowed_mail_locals\f1 matches).
77 Patterns containing '?' and '*' can be used. The special item "<>" matches the null sender address (eg. failure notices or delivery notifications).
78 .TP
80 \fBallowed_rcpt_domains\f1 = \fIlist\f1
82 A list of recipient domains where mail will be sent to. This is for example useful if you use this route configuration when connected to another LAN via ppp. Patterns containing '?' and '*' can be used.
83 .TP
85 \fBnot_allowed_rcpt_domains\f1 = \fIlist\f1
87 A list of recipient domains where mail will not be sent to. This is for example useful if you send mail directly (\fBmail_host\f1 is not set) and you know of hosts that will not accept mail from you because they use a dialup list (eg. \fBhttp://maps.vix.com/dul/\f1. If any domain matches both \fBallowed_rcpt_domains\f1 and \fBnot_allowed_rcpt_domains\f1, mail will not be sent to this domain. Patterns containing '?' and '*' can be used.
88 .TP
90 \fBset_h_from_domain\f1 = \fIstring\f1
92 Replace the domain part in 'From:' headers with this value. This may be useful if you use a private, outside unknown address on your local LAN and want this to be replaced by the domain of the address of your email addrsss on the internet. Note that this is different to \fBset_return_path_domain\f1, see below.
93 .TP
95 \fBset_return_path_domain\f1 = \fIstring\f1
97 Sets the domain part of the envelope from address. Some hosts check whether this is the same as the net the connection is coming from. If not, they reject the mail because they suspect spamming. It should be a valid address, because some mail servers also check that. You can also use this to set it to your usual address on the internet and put a local address only known on your LAN in the configuration of your mailer. Only the domain part will be changed, the local part remains unchanged. Use \fBmap_return_path_addresses\f1 for rewriting local parts.
98 .TP
100 \fBmap_h_from_addresses\f1 = \fIlist\f1
102 This is similar to \fBset_h_from_domain\f1, but more flexible. Set this to a list which maps local parts to a full RFC 822 compliant email address, the local parts (the keys) are separated from the addresses (the values) by colons (':').
104 Example:
106 map_h_from_addresses = "john: John Smith <jsmith@mail.academic.edu>; charlie: Charlie Miller <cmiller@mx.commercial.com>"
108 You can use patterns, eg. * as keys.
109 .TP
111 \fBmap_h_reply_to_addresses\f1 = \fIlist\f1
113 Same as \fBmap_h_from_addresses\f1, but for the 'Reply-To:' header.
114 .TP
116 \fBmap_h_mail_followup_to_addresses\f1 = \fIlist\f1
118 Same as \fBmap_h_from_addresses\f1, but for the 'Mail-Followup-To:' header. Useful when replying to mailing lists.
119 .TP
121 \fBmap_return_path_addresses\f1 = \fIlist\f1
123 This is similar to \fBset_return_path_domain\f1, but more flexible. Set this to a list which maps local parts to a full RFC 821 compliant email address, the local parts (the keys) are separated from the addresses (the values) by colons (':'). Note that this option takes RFC 821 addresses while \fBmap_h_from_addresses\f1 takes RFC 822 addresses. The most important difference is that RFC 821 addresses have no full name.
125 Example:
127 map_return_path_addresses = "john: <jsmith@mail.academic.edu>; charlie: <cmiller@mx.commercial.com>"
129 You can use patterns, eg. * as keys.
130 .TP
132 \fBexpand_h_sender_address\f1 = \fIboolean\f1
134 This sets the domain of the sender address as given by the Sender: header to the same address as in the envelope return path address (which can be set by either \fBset_return_path_domain\f1 or \fBmap_return_path_addresses\f1). This is for mail clients (eg. Microsoft Outlook) which use this address as the sender address. Though they should use the From: address, see RFC 821. If \fBfetchmail (1)\f1 encounters an unqualified Sender: address, it will be expanded to the domain of the pop server, which is almost never correct. Default is true.
135 .TP
137 \fBexpand_h_sender_domain\f1 = \fIboolean\f1
139 Like \fBexpand_h_sender_address\f1, but sets the domain only. Deprecated, will be removed in a later version.
140 .TP
142 \fBlast_route\f1 = \fIboolean\f1
144 If this is set, a mail which would have been delivered using this route, but has failed temporarily, will not be tried to be delivered using the next route.
146 If you have set up a special route with filters using the lists 'allowed_rcpt_domains', 'allowed_return_paths', and 'allowed_mail_locals' or their complements (not_), and the mail passing these rules should be delivered using this route only, you should set this to 'true'. Otherwise the mail would be passed to the next route (if any), unless that route has rules which prevent that.
148 Default is false.
149 .TP
151 \fBauth_name\f1 = \fIstring\f1
153 Set the authentication type for ESMTP AUTH authentification. Currently only 'cram-md5' and 'login' are supported.
154 .TP
156 \fBauth_login\f1 = \fIstring\f1
158 Your account name for ESMTP AUTH authentification.
159 .TP
161 \fBauth_secret\f1 = \fIstring\f1
163 Your secret for ESMTP AUTH authentification.
164 .TP
166 \fBpop3_login\f1 = \fIfile\f1
168 If your Mail server requires SMTP-after-POP, set this to a get configuration (see \fBmasqmail.get (5)\f1). If you login to the POP server before you send, this is not necessary.
169 .TP
171 \fBwrapper\f1 = \fIcommand\f1
173 If set, instead of opening a connection to a remote server, \fIcommand\f1 will be called and all traffic will be piped to its stdin and from its stdout. Purpose is to tunnel ip traffic, eg. for ssl.
175 Example for ssl tunneling:
177 wrapper="/usr/bin/openssl s_client \-quiet \-connect pop.gmx.net:995 2>/dev/null"
178 .TP
180 \fBpipe\f1 = \fIcommand\f1
182 If set, and protocol is set to 'pipe', \fIcommand\f1 will be called and the message will be piped to its stdin. Purpose is to use gateways to uucp, fax, sms or whatever else.
184 You can use variables to give as arguments to the command, these are the same as for the mda in the main configuration, see \fBmasqmail.conf (5)\f1.
185 .TP
187 \fBpipe_fromline = \fIboolean\f1\fB\f1
189 If this is set, and protocol is set to 'pipe', a from line will be prepended to the output stream whenever a pipe command is called. Default is false.
190 .TP
192 \fBpipe_fromhack = \fIboolean\f1\fB\f1
194 If this is set, and protocol is set to 'pipe', each line beginning with 'From ' is replaced with '>From ' whenever a pipe command is called. You probably want this if you have set \fBpipe_fromline\f1 above. Default is false.
195 .SH AUTHOR
197 masqmail was written by Oliver Kurth <oku@masqmail.cx>
199 You will find the newest version of masqmail at \fBhttp://masqmail.cx/masqmail/\f1 or search for it in freshmeat (\fBhttp://www.freshmeat.net\f1). There is also a mailing list, you will find information about it at masqmails main site.
201 .SH BUGS
203 You should report them to the mailing list.
205 .SH SEE ALSO
207 \fBmasqmail (8)\f1, \fBmasqmail.conf (5)\f1, \fBmasqmail.get (5)\f1
209 .SH COMMENTS
211 This man page was written using \fBxml2man (1)\f1 by the same author.