9 Postfix SMTP+LMTP client
13 \fBsmtp\fR [generic Postfix daemon options]
17 The Postfix SMTP+LMTP client implements the SMTP and LMTP mail
18 delivery protocols. It processes message delivery requests from
19 the queue manager. Each request specifies a queue file, a sender
20 address, a domain or host to deliver to, and recipient information.
21 This program expects to be run from the \fBmaster\fR(8) process
24 The SMTP+LMTP client updates the queue file and marks recipients
25 as finished, or it informs the queue manager that delivery should
26 be tried again at a later time. Delivery status reports are sent
27 to the \fBbounce\fR(8), \fBdefer\fR(8) or \fBtrace\fR(8) daemon as
30 The SMTP+LMTP client looks up a list of mail exchanger addresses for
31 the destination host, sorts the list by preference, and connects
32 to each listed address until it finds a server that responds.
34 When a server is not reachable, or when mail delivery fails due
35 to a recoverable error condition, the SMTP+LMTP client will try to
36 deliver the mail to an alternate host.
38 After a successful mail transaction, a connection may be saved
39 to the \fBscache\fR(8) connection cache server, so that it
40 may be used by any SMTP+LMTP client for a subsequent transaction.
42 By default, connection caching is enabled temporarily for
43 destinations that have a high volume of mail in the active
44 queue. Connection caching can be enabled permanently for
45 specific destinations.
46 .SH "SMTP DESTINATION SYNTAX"
51 SMTP destinations have the following form:
53 .IP \fIdomainname\fR:\fIport\fR
54 Look up the mail exchangers for the specified domain, and
55 connect to the specified port (default: \fBsmtp\fR).
57 .IP [\fIhostname\fR]:\fIport\fR
58 Look up the address(es) of the specified host, and connect to
59 the specified port (default: \fBsmtp\fR).
61 .IP [\fIaddress\fR]:\fIport\fR
62 Connect to the host at the specified address, and connect
63 to the specified port (default: \fBsmtp\fR). An IPv6 address
64 must be formatted as [\fBipv6\fR:\fIaddress\fR].
65 .SH "LMTP DESTINATION SYNTAX"
70 LMTP destinations have the following form:
71 .IP \fBunix\fR:\fIpathname\fR
72 Connect to the local UNIX-domain server that is bound to the specified
73 \fIpathname\fR. If the process runs chrooted, an absolute pathname
74 is interpreted relative to the Postfix queue directory.
75 .IP \fBinet\fR:\fIhostname\fR
76 .IP \fBinet\fB:\fIhostname\fR:\fIport\fR
77 .IP \fBinet\fR:[\fIaddress\fR]
78 .IP \fBinet\fR:[\fIaddress\fR]:\fIport\fR
79 Connect to the specified TCP port on the specified local or
80 remote host. If no port is specified, connect to the port defined as
81 \fBlmtp\fR in \fBservices\fR(4).
82 If no such service is found, the \fBlmtp_tcp_port\fR configuration
83 parameter (default value of 24) will be used.
84 An IPv6 address must be formatted as [\fBipv6\fR:\fIaddress\fR].
91 The SMTP+LMTP client is moderately security-sensitive. It
92 talks to SMTP or LMTP servers and to DNS servers on the
93 network. The SMTP+LMTP client can be run chrooted at fixed
98 RFC 821 (SMTP protocol)
99 RFC 822 (ARPA Internet Text Messages)
100 RFC 1651 (SMTP service extensions)
101 RFC 1652 (8bit-MIME transport)
102 RFC 1870 (Message Size Declaration)
103 RFC 2033 (LMTP protocol)
104 RFC 2034 (SMTP Enhanced Error Codes)
105 RFC 2045 (MIME: Format of Internet Message Bodies)
106 RFC 2046 (MIME: Media Types)
107 RFC 2554 (AUTH command)
108 RFC 2821 (SMTP protocol)
109 RFC 2920 (SMTP Pipelining)
110 RFC 3207 (STARTTLS command)
111 RFC 3461 (SMTP DSN Extension)
112 RFC 3463 (Enhanced Status Codes)
113 RFC 4954 (AUTH command)
117 Problems and transactions are logged to \fBsyslogd\fR(8).
118 Corrupted message files are marked so that the queue manager can
119 move them to the \fBcorrupt\fR queue for further inspection.
121 Depending on the setting of the \fBnotify_classes\fR parameter,
122 the postmaster is notified of bounces, protocol problems, and of
127 SMTP and LMTP connection caching does not work with TLS. The necessary
128 support for TLS object passivation and re-activation does not
129 exist without closing the session, which defeats the purpose.
131 SMTP and LMTP connection caching assumes that SASL credentials
132 are valid for all destinations that map onto the same IP
133 address and TCP port.
134 .SH "CONFIGURATION PARAMETERS"
139 Before Postfix version 2.3, the LMTP client is a separate
140 program that implements only a subset of the functionality
141 available with SMTP: there is no support for TLS, and
142 connections are cached in-process, making it ineffective
143 when the client is used for multiple domains.
145 Most smtp_\fIxxx\fR configuration parameters have an
146 lmtp_\fIxxx\fR "mirror" parameter for the equivalent LMTP
147 feature. This document describes only those LMTP-related
148 parameters that aren't simply "mirror" parameters.
150 Changes to \fBmain.cf\fR are picked up automatically, as \fBsmtp\fR(8)
151 processes run for only a limited amount of time. Use the command
152 "\fBpostfix reload\fR" to speed up a change.
154 The text below provides only a parameter summary. See
155 \fBpostconf\fR(5) for more details including examples.
156 .SH "COMPATIBILITY CONTROLS"
161 .IP "\fBignore_mx_lookup_error (no)\fR"
162 Ignore DNS MX lookups that produce no response.
163 .IP "\fBsmtp_always_send_ehlo (yes)\fR"
164 Always send EHLO at the start of an SMTP session.
165 .IP "\fBsmtp_never_send_ehlo (no)\fR"
166 Never send EHLO at the start of an SMTP session.
167 .IP "\fBsmtp_defer_if_no_mx_address_found (no)\fR"
168 Defer mail delivery when no MX record resolves to an IP address.
169 .IP "\fBsmtp_line_length_limit (990)\fR"
170 The maximal length of message header and body lines that Postfix
172 .IP "\fBsmtp_pix_workaround_delay_time (10s)\fR"
173 How long the Postfix SMTP client pauses before sending
174 ".<CR><LF>" in order to work around the PIX firewall
175 "<CR><LF>.<CR><LF>" bug.
176 .IP "\fBsmtp_pix_workaround_threshold_time (500s)\fR"
177 How long a message must be queued before the Postfix SMTP client
178 turns on the PIX firewall "<CR><LF>.<CR><LF>"
179 bug workaround for delivery through firewalls with "smtp fixup"
181 .IP "\fBsmtp_pix_workarounds (disable_esmtp, delay_dotcrlf)\fR"
182 A list that specifies zero or more workarounds for CISCO PIX
184 .IP "\fBsmtp_pix_workaround_maps (empty)\fR"
185 Lookup tables, indexed by the remote SMTP server address, with
186 per-destination workarounds for CISCO PIX firewall bugs.
187 .IP "\fBsmtp_quote_rfc821_envelope (yes)\fR"
188 Quote addresses in SMTP MAIL FROM and RCPT TO commands as required
190 .IP "\fBsmtp_skip_5xx_greeting (yes)\fR"
191 Skip SMTP servers that greet with a 5XX status code (go away, do
192 not try again later).
193 .IP "\fBsmtp_skip_quit_response (yes)\fR"
194 Do not wait for the response to the SMTP QUIT command.
196 Available in Postfix version 2.0 and earlier:
197 .IP "\fBsmtp_skip_4xx_greeting (yes)\fR"
198 Skip SMTP servers that greet with a 4XX status code (go away, try
201 Available in Postfix version 2.2 and later:
202 .IP "\fBsmtp_discard_ehlo_keyword_address_maps (empty)\fR"
203 Lookup tables, indexed by the remote SMTP server address, with
204 case insensitive lists of EHLO keywords (pipelining, starttls, auth,
205 etc.) that the Postfix SMTP client will ignore in the EHLO response from a
207 .IP "\fBsmtp_discard_ehlo_keywords (empty)\fR"
208 A case insensitive list of EHLO keywords (pipelining, starttls,
209 auth, etc.) that the Postfix SMTP client will ignore in the EHLO
210 response from a remote SMTP server.
211 .IP "\fBsmtp_generic_maps (empty)\fR"
212 Optional lookup tables that perform address rewriting in the
213 SMTP client, typically to transform a locally valid address into
214 a globally valid address when sending mail across the Internet.
216 Available in Postfix version 2.2.9 and later:
217 .IP "\fBsmtp_cname_overrides_servername (version dependent)\fR"
218 Allow DNS CNAME records to override the servername that the
219 Postfix SMTP client uses for logging, SASL password lookup, TLS
220 policy decisions, or TLS certificate verification.
222 Available in Postfix version 2.3 and later:
223 .IP "\fBlmtp_discard_lhlo_keyword_address_maps (empty)\fR"
224 Lookup tables, indexed by the remote LMTP server address, with
225 case insensitive lists of LHLO keywords (pipelining, starttls,
226 auth, etc.) that the LMTP client will ignore in the LHLO response
227 from a remote LMTP server.
228 .IP "\fBlmtp_discard_lhlo_keywords (empty)\fR"
229 A case insensitive list of LHLO keywords (pipelining, starttls,
230 auth, etc.) that the LMTP client will ignore in the LHLO response
231 from a remote LMTP server.
233 Available in Postfix version 2.4.4 and later:
234 .IP "\fBsend_cyrus_sasl_authzid (no)\fR"
235 When authenticating to a remote SMTP or LMTP server with the
236 default setting "no", send no SASL authoriZation ID (authzid); send
237 only the SASL authentiCation ID (authcid) plus the authcid's password.
239 Available in Postfix version 2.5 and later:
240 .IP "\fBsmtp_header_checks (empty)\fR"
241 Restricted \fBheader_checks\fR(5) tables for the Postfix SMTP client.
242 .IP "\fBsmtp_mime_header_checks (empty)\fR"
243 Restricted \fBmime_header_checks\fR(5) tables for the Postfix SMTP
245 .IP "\fBsmtp_nested_header_checks (empty)\fR"
246 Restricted \fBnested_header_checks\fR(5) tables for the Postfix SMTP
248 .IP "\fBsmtp_body_checks (empty)\fR"
249 Restricted \fBbody_checks\fR(5) tables for the Postfix SMTP client.
251 Available in Postfix version 2.6 and later:
252 .IP "\fBtcp_windowsize (0)\fR"
253 An optional workaround for routers that break TCP window scaling.
254 .SH "MIME PROCESSING CONTROLS"
259 Available in Postfix version 2.0 and later:
260 .IP "\fBdisable_mime_output_conversion (no)\fR"
261 Disable the conversion of 8BITMIME format to 7BIT format.
262 .IP "\fBmime_boundary_length_limit (2048)\fR"
263 The maximal length of MIME multipart boundary strings.
264 .IP "\fBmime_nesting_limit (100)\fR"
265 The maximal recursion level that the MIME processor will handle.
266 .SH "EXTERNAL CONTENT INSPECTION CONTROLS"
271 Available in Postfix version 2.1 and later:
272 .IP "\fBsmtp_send_xforward_command (no)\fR"
273 Send the non-standard XFORWARD command when the Postfix SMTP server
274 EHLO response announces XFORWARD support.
275 .SH "SASL AUTHENTICATION CONTROLS"
280 .IP "\fBsmtp_sasl_auth_enable (no)\fR"
281 Enable SASL authentication in the Postfix SMTP client.
282 .IP "\fBsmtp_sasl_password_maps (empty)\fR"
283 Optional SMTP client lookup tables with one username:password entry
284 per remote hostname or domain, or sender address when sender-dependent
285 authentication is enabled.
286 .IP "\fBsmtp_sasl_security_options (noplaintext, noanonymous)\fR"
287 Postfix SMTP client SASL security options; as of Postfix 2.3
288 the list of available
289 features depends on the SASL client implementation that is selected
290 with \fBsmtp_sasl_type\fR.
292 Available in Postfix version 2.2 and later:
293 .IP "\fBsmtp_sasl_mechanism_filter (empty)\fR"
294 If non-empty, a Postfix SMTP client filter for the remote SMTP
295 server's list of offered SASL mechanisms.
297 Available in Postfix version 2.3 and later:
298 .IP "\fBsmtp_sender_dependent_authentication (no)\fR"
299 Enable sender-dependent authentication in the Postfix SMTP client; this is
300 available only with SASL authentication, and disables SMTP connection
301 caching to ensure that mail from different senders will use the
302 appropriate credentials.
303 .IP "\fBsmtp_sasl_path (empty)\fR"
304 Implementation-specific information that the Postfix SMTP client
306 the SASL plug-in implementation that is selected with
307 \fBsmtp_sasl_type\fR.
308 .IP "\fBsmtp_sasl_type (cyrus)\fR"
309 The SASL plug-in type that the Postfix SMTP client should use
312 Available in Postfix version 2.5 and later:
313 .IP "\fBsmtp_sasl_auth_cache_name (empty)\fR"
314 An optional table to prevent repeated SASL authentication
315 failures with the same remote SMTP server hostname, username and
317 .IP "\fBsmtp_sasl_auth_cache_time (90d)\fR"
318 The maximal age of an smtp_sasl_auth_cache_name entry before it
320 .IP "\fBsmtp_sasl_auth_soft_bounce (yes)\fR"
321 When a remote SMTP server rejects a SASL authentication request
322 with a 535 reply code, defer mail delivery instead of returning
323 mail as undeliverable.
324 .SH "STARTTLS SUPPORT CONTROLS"
329 Detailed information about STARTTLS configuration may be found
330 in the TLS_README document.
331 .IP "\fBsmtp_tls_security_level (empty)\fR"
332 The default SMTP TLS security level for the Postfix SMTP client;
333 when a non-empty value is specified, this overrides the obsolete
334 parameters smtp_use_tls, smtp_enforce_tls, and smtp_tls_enforce_peername.
335 .IP "\fBsmtp_sasl_tls_security_options ($smtp_sasl_security_options)\fR"
336 The SASL authentication security options that the Postfix SMTP
337 client uses for TLS encrypted SMTP sessions.
338 .IP "\fBsmtp_starttls_timeout (300s)\fR"
339 Time limit for Postfix SMTP client write and read operations
340 during TLS startup and shutdown handshake procedures.
341 .IP "\fBsmtp_tls_CAfile (empty)\fR"
342 A file containing CA certificates of root CAs trusted to sign
343 either remote SMTP server certificates or intermediate CA certificates.
344 .IP "\fBsmtp_tls_CApath (empty)\fR"
345 Directory with PEM format certificate authority certificates
346 that the Postfix SMTP client uses to verify a remote SMTP server
348 .IP "\fBsmtp_tls_cert_file (empty)\fR"
349 File with the Postfix SMTP client RSA certificate in PEM format.
350 .IP "\fBsmtp_tls_mandatory_ciphers (medium)\fR"
351 The minimum TLS cipher grade that the Postfix SMTP client will
353 mandatory TLS encryption.
354 .IP "\fBsmtp_tls_exclude_ciphers (empty)\fR"
355 List of ciphers or cipher types to exclude from the Postfix
357 list at all TLS security levels.
358 .IP "\fBsmtp_tls_mandatory_exclude_ciphers (empty)\fR"
359 Additional list of ciphers or cipher types to exclude from the
360 SMTP client cipher list at mandatory TLS security levels.
361 .IP "\fBsmtp_tls_dcert_file (empty)\fR"
362 File with the Postfix SMTP client DSA certificate in PEM format.
363 .IP "\fBsmtp_tls_dkey_file ($smtp_tls_dcert_file)\fR"
364 File with the Postfix SMTP client DSA private key in PEM format.
365 .IP "\fBsmtp_tls_key_file ($smtp_tls_cert_file)\fR"
366 File with the Postfix SMTP client RSA private key in PEM format.
367 .IP "\fBsmtp_tls_loglevel (0)\fR"
368 Enable additional Postfix SMTP client logging of TLS activity.
369 .IP "\fBsmtp_tls_note_starttls_offer (no)\fR"
370 Log the hostname of a remote SMTP server that offers STARTTLS,
371 when TLS is not already enabled for that server.
372 .IP "\fBsmtp_tls_policy_maps (empty)\fR"
373 Optional lookup tables with the Postfix SMTP client TLS security
374 policy by next-hop destination; when a non-empty value is specified,
375 this overrides the obsolete smtp_tls_per_site parameter.
376 .IP "\fBsmtp_tls_mandatory_protocols (SSLv3, TLSv1)\fR"
377 List of SSL/TLS protocols that the Postfix SMTP client will use with
378 mandatory TLS encryption.
379 .IP "\fBsmtp_tls_scert_verifydepth (9)\fR"
380 The verification depth for remote SMTP server certificates.
381 .IP "\fBsmtp_tls_secure_cert_match (nexthop, dot-nexthop)\fR"
382 The server certificate peername verification method for the
383 "secure" TLS security level.
384 .IP "\fBsmtp_tls_session_cache_database (empty)\fR"
385 Name of the file containing the optional Postfix SMTP client
387 .IP "\fBsmtp_tls_session_cache_timeout (3600s)\fR"
388 The expiration time of Postfix SMTP client TLS session cache
390 .IP "\fBsmtp_tls_verify_cert_match (hostname)\fR"
391 The server certificate peername verification method for the
392 "verify" TLS security level.
393 .IP "\fBtls_daemon_random_bytes (32)\fR"
394 The number of pseudo-random bytes that an \fBsmtp\fR(8) or \fBsmtpd\fR(8)
395 process requests from the \fBtlsmgr\fR(8) server in order to seed its
396 internal pseudo random number generator (PRNG).
397 .IP "\fBtls_high_cipherlist (ALL:!EXPORT:!LOW:!MEDIUM:+RC4:@STRENGTH)\fR"
398 The OpenSSL cipherlist for "HIGH" grade ciphers.
399 .IP "\fBtls_medium_cipherlist (ALL:!EXPORT:!LOW:+RC4:@STRENGTH)\fR"
400 The OpenSSL cipherlist for "MEDIUM" or higher grade ciphers.
401 .IP "\fBtls_low_cipherlist (ALL:!EXPORT:+RC4:@STRENGTH)\fR"
402 The OpenSSL cipherlist for "LOW" or higher grade ciphers.
403 .IP "\fBtls_export_cipherlist (ALL:+RC4:@STRENGTH)\fR"
404 The OpenSSL cipherlist for "EXPORT" or higher grade ciphers.
405 .IP "\fBtls_null_cipherlist (eNULL:!aNULL)\fR"
406 The OpenSSL cipherlist for "NULL" grade ciphers that provide
407 authentication without encryption.
409 Available in Postfix version 2.4 and later:
410 .IP "\fBsmtp_sasl_tls_verified_security_options ($smtp_sasl_tls_security_options)\fR"
411 The SASL authentication security options that the Postfix SMTP
412 client uses for TLS encrypted SMTP sessions with a verified server
415 Available in Postfix version 2.5 and later:
416 .IP "\fBsmtp_tls_fingerprint_cert_match (empty)\fR"
417 List of acceptable remote SMTP server certificate fingerprints
418 for the "fingerprint" TLS security level (\fBsmtp_tls_security_level\fR =
420 .IP "\fBsmtp_tls_fingerprint_digest (md5)\fR"
421 The message digest algorithm used to construct remote SMTP server
422 certificate fingerprints.
424 Available in Postfix version 2.6 and later:
425 .IP "\fBsmtp_tls_protocols (!SSLv2)\fR"
426 List of TLS protocols that the Postfix SMTP client will exclude or
427 include with opportunistic TLS encryption.
428 .IP "\fBsmtp_tls_ciphers (export)\fR"
429 The minimum TLS cipher grade that the Postfix SMTP client
430 will use with opportunistic TLS encryption.
431 .IP "\fBsmtp_tls_eccert_file (empty)\fR"
432 File with the Postfix SMTP client ECDSA certificate in PEM format.
433 .IP "\fBsmtp_tls_eckey_file ($smtp_tls_eccert_file)\fR"
434 File with the Postfix SMTP client ECDSA private key in PEM format.
435 .SH "OBSOLETE STARTTLS CONTROLS"
440 The following configuration parameters exist for compatibility
441 with Postfix versions before 2.3. Support for these will
442 be removed in a future release.
443 .IP "\fBsmtp_use_tls (no)\fR"
444 Opportunistic mode: use TLS when a remote SMTP server announces
445 STARTTLS support, otherwise send the mail in the clear.
446 .IP "\fBsmtp_enforce_tls (no)\fR"
447 Enforcement mode: require that remote SMTP servers use TLS
448 encryption, and never send mail in the clear.
449 .IP "\fBsmtp_tls_enforce_peername (yes)\fR"
450 With mandatory TLS encryption, require that the remote SMTP
451 server hostname matches the information in the remote SMTP server
453 .IP "\fBsmtp_tls_per_site (empty)\fR"
454 Optional lookup tables with the Postfix SMTP client TLS usage
455 policy by next-hop destination and by remote SMTP server hostname.
456 .IP "\fBsmtp_tls_cipherlist (empty)\fR"
457 Obsolete Postfix < 2.3 control for the Postfix SMTP client TLS
459 .SH "RESOURCE AND RATE CONTROLS"
464 .IP "\fBsmtp_destination_concurrency_limit ($default_destination_concurrency_limit)\fR"
465 The maximal number of parallel deliveries to the same destination
466 via the smtp message delivery transport.
467 .IP "\fBsmtp_destination_recipient_limit ($default_destination_recipient_limit)\fR"
468 The maximal number of recipients per message for the smtp
469 message delivery transport.
470 .IP "\fBsmtp_connect_timeout (30s)\fR"
471 The SMTP client time limit for completing a TCP connection, or
472 zero (use the operating system built-in time limit).
473 .IP "\fBsmtp_helo_timeout (300s)\fR"
474 The SMTP client time limit for sending the HELO or EHLO command,
475 and for receiving the initial server response.
476 .IP "\fBlmtp_lhlo_timeout (300s)\fR"
477 The LMTP client time limit for sending the LHLO command, and
478 for receiving the initial server response.
479 .IP "\fBsmtp_xforward_timeout (300s)\fR"
480 The SMTP client time limit for sending the XFORWARD command, and
481 for receiving the server response.
482 .IP "\fBsmtp_mail_timeout (300s)\fR"
483 The SMTP client time limit for sending the MAIL FROM command, and
484 for receiving the server response.
485 .IP "\fBsmtp_rcpt_timeout (300s)\fR"
486 The SMTP client time limit for sending the SMTP RCPT TO command, and
487 for receiving the server response.
488 .IP "\fBsmtp_data_init_timeout (120s)\fR"
489 The SMTP client time limit for sending the SMTP DATA command, and for
490 receiving the server response.
491 .IP "\fBsmtp_data_xfer_timeout (180s)\fR"
492 The SMTP client time limit for sending the SMTP message content.
493 .IP "\fBsmtp_data_done_timeout (600s)\fR"
494 The SMTP client time limit for sending the SMTP ".", and for receiving
496 .IP "\fBsmtp_quit_timeout (300s)\fR"
497 The SMTP client time limit for sending the QUIT command, and for
498 receiving the server response.
500 Available in Postfix version 2.1 and later:
501 .IP "\fBsmtp_mx_address_limit (5)\fR"
502 The maximal number of MX (mail exchanger) IP addresses that can
503 result from mail exchanger lookups, or zero (no limit).
504 .IP "\fBsmtp_mx_session_limit (2)\fR"
505 The maximal number of SMTP sessions per delivery request before
506 giving up or delivering to a fall-back relay host, or zero (no
508 .IP "\fBsmtp_rset_timeout (20s)\fR"
509 The SMTP client time limit for sending the RSET command, and
510 for receiving the server response.
512 Available in Postfix version 2.2 and earlier:
513 .IP "\fBlmtp_cache_connection (yes)\fR"
514 Keep Postfix LMTP client connections open for up to $max_idle
517 Available in Postfix version 2.2 and later:
518 .IP "\fBsmtp_connection_cache_destinations (empty)\fR"
519 Permanently enable SMTP connection caching for the specified
521 .IP "\fBsmtp_connection_cache_on_demand (yes)\fR"
522 Temporarily enable SMTP connection caching while a destination
523 has a high volume of mail in the active queue.
524 .IP "\fBsmtp_connection_reuse_time_limit (300s)\fR"
525 The amount of time during which Postfix will use an SMTP
526 connection repeatedly.
527 .IP "\fBsmtp_connection_cache_time_limit (2s)\fR"
528 When SMTP connection caching is enabled, the amount of time that
529 an unused SMTP client socket is kept open before it is closed.
531 Available in Postfix version 2.3 and later:
532 .IP "\fBconnection_cache_protocol_timeout (5s)\fR"
533 Time limit for connection cache connect, send or receive
535 .SH "TROUBLE SHOOTING CONTROLS"
540 .IP "\fBdebug_peer_level (2)\fR"
541 The increment in verbose logging level when a remote client or
542 server matches a pattern in the debug_peer_list parameter.
543 .IP "\fBdebug_peer_list (empty)\fR"
544 Optional list of remote client or server hostname or network
545 address patterns that cause the verbose logging level to increase
546 by the amount specified in $debug_peer_level.
547 .IP "\fBerror_notice_recipient (postmaster)\fR"
548 The recipient of postmaster notifications about mail delivery
549 problems that are caused by policy, resource, software or protocol
551 .IP "\fBinternal_mail_filter_classes (empty)\fR"
552 What categories of Postfix-generated mail are subject to
553 before-queue content inspection by non_smtpd_milters, header_checks
555 .IP "\fBnotify_classes (resource, software)\fR"
556 The list of error classes that are reported to the postmaster.
557 .SH "MISCELLANEOUS CONTROLS"
562 .IP "\fBbest_mx_transport (empty)\fR"
563 Where the Postfix SMTP client should deliver mail when it detects
564 a "mail loops back to myself" error condition.
565 .IP "\fBconfig_directory (see 'postconf -d' output)\fR"
566 The default location of the Postfix main.cf and master.cf
568 .IP "\fBdaemon_timeout (18000s)\fR"
569 How much time a Postfix daemon process may take to handle a
570 request before it is terminated by a built-in watchdog timer.
571 .IP "\fBdelay_logging_resolution_limit (2)\fR"
572 The maximal number of digits after the decimal point when logging
573 sub-second delay values.
574 .IP "\fBdisable_dns_lookups (no)\fR"
575 Disable DNS lookups in the Postfix SMTP and LMTP clients.
576 .IP "\fBinet_interfaces (all)\fR"
577 The network interface addresses that this mail system receives
579 .IP "\fBinet_protocols (ipv4)\fR"
580 The Internet protocols Postfix will attempt to use when making
581 or accepting connections.
582 .IP "\fBipc_timeout (3600s)\fR"
583 The time limit for sending or receiving information over an internal
584 communication channel.
585 .IP "\fBlmtp_assume_final (no)\fR"
586 When an LMTP server announces no DSN support, assume that the
587 server performs final delivery, and send "delivered" delivery status
588 notifications instead of "relayed".
589 .IP "\fBlmtp_tcp_port (24)\fR"
590 The default TCP port that the Postfix LMTP client connects to.
591 .IP "\fBmax_idle (100s)\fR"
592 The maximum amount of time that an idle Postfix daemon process waits
593 for an incoming connection before terminating voluntarily.
594 .IP "\fBmax_use (100)\fR"
595 The maximal number of incoming connections that a Postfix daemon
596 process will service before terminating voluntarily.
597 .IP "\fBprocess_id (read-only)\fR"
598 The process ID of a Postfix command or daemon process.
599 .IP "\fBprocess_name (read-only)\fR"
600 The process name of a Postfix command or daemon process.
601 .IP "\fBproxy_interfaces (empty)\fR"
602 The network interface addresses that this mail system receives mail
603 on by way of a proxy or network address translation unit.
604 .IP "\fBsmtp_bind_address (empty)\fR"
605 An optional numerical network address that the Postfix SMTP client
606 should bind to when making an IPv4 connection.
607 .IP "\fBsmtp_bind_address6 (empty)\fR"
608 An optional numerical network address that the Postfix SMTP client
609 should bind to when making an IPv6 connection.
610 .IP "\fBsmtp_helo_name ($myhostname)\fR"
611 The hostname to send in the SMTP EHLO or HELO command.
612 .IP "\fBlmtp_lhlo_name ($myhostname)\fR"
613 The hostname to send in the LMTP LHLO command.
614 .IP "\fBsmtp_host_lookup (dns)\fR"
615 What mechanisms when the Postfix SMTP client uses to look up a host's IP
617 .IP "\fBsmtp_randomize_addresses (yes)\fR"
618 Randomize the order of equal-preference MX host addresses.
619 .IP "\fBsyslog_facility (mail)\fR"
620 The syslog facility of Postfix logging.
621 .IP "\fBsyslog_name (see 'postconf -d' output)\fR"
622 The mail system name that is prepended to the process name in syslog
623 records, so that "smtpd" becomes, for example, "postfix/smtpd".
625 Available with Postfix 2.2 and earlier:
626 .IP "\fBfallback_relay (empty)\fR"
627 Optional list of relay hosts for SMTP destinations that can't be
628 found or that are unreachable.
630 Available with Postfix 2.3 and later:
631 .IP "\fBsmtp_fallback_relay ($fallback_relay)\fR"
632 Optional list of relay hosts for SMTP destinations that can't be
633 found or that are unreachable.
637 generic(5), output address rewriting
638 header_checks(5), message header content inspection
639 body_checks(5), body parts content inspection
640 qmgr(8), queue manager
641 bounce(8), delivery status reports
642 scache(8), connection cache server
643 postconf(5), configuration parameters
644 master(5), generic daemon options
645 master(8), process manager
646 tlsmgr(8), TLS session and PRNG management
647 syslogd(8), system logging
653 Use "\fBpostconf readme_directory\fR" or
654 "\fBpostconf html_directory\fR" to locate this information.
657 SASL_README, Postfix SASL howto
658 TLS_README, Postfix STARTTLS howto
664 The Secure Mailer license must be distributed with this software.
669 IBM T.J. Watson Research
671 Yorktown Heights, NY 10598, USA
673 Command pipelining in cooperation with:
675 Oaktree Internet Solutions Ltd.,
679 CV1 4LY, United Kingdom.
681 SASL support originally by:
684 65760 Eschborn, Germany
686 TLS support originally by:
689 Allgemeine Elektrotechnik
690 Universitaetsplatz 3-4
691 D-03044 Cottbus, Germany
693 Revised TLS and SMTP connection cache support by: