102
<a href="http://www.faqs.org/rfcs/rfc821.html">RFC 821</a> (SMTP protocol)
103
<a href="http://www.faqs.org/rfcs/rfc822.html">RFC 822</a> (ARPA Internet Text Messages)
104
<a href="http://www.faqs.org/rfcs/rfc1651.html">RFC 1651</a> (SMTP service extensions)
105
<a href="http://www.faqs.org/rfcs/rfc1652.html">RFC 1652</a> (8bit-MIME transport)
106
<a href="http://www.faqs.org/rfcs/rfc1870.html">RFC 1870</a> (Message Size Declaration)
107
<a href="http://www.faqs.org/rfcs/rfc2033.html">RFC 2033</a> (LMTP protocol)
108
<a href="http://www.faqs.org/rfcs/rfc2034.html">RFC 2034</a> (SMTP Enhanced Error Codes)
109
<a href="http://www.faqs.org/rfcs/rfc2045.html">RFC 2045</a> (MIME: Format of Internet Message Bodies)
110
<a href="http://www.faqs.org/rfcs/rfc2046.html">RFC 2046</a> (MIME: Media Types)
111
<a href="http://www.faqs.org/rfcs/rfc2554.html">RFC 2554</a> (AUTH command)
112
<a href="http://www.faqs.org/rfcs/rfc2821.html">RFC 2821</a> (SMTP protocol)
113
<a href="http://www.faqs.org/rfcs/rfc2920.html">RFC 2920</a> (SMTP Pipelining)
114
<a href="http://www.faqs.org/rfcs/rfc3207.html">RFC 3207</a> (STARTTLS command)
115
<a href="http://www.faqs.org/rfcs/rfc3461.html">RFC 3461</a> (SMTP DSN Extension)
116
<a href="http://www.faqs.org/rfcs/rfc3463.html">RFC 3463</a> (Enhanced Status Codes)
102
<a href="http://tools.ietf.org/html/rfc821">RFC 821</a> (SMTP protocol)
103
<a href="http://tools.ietf.org/html/rfc822">RFC 822</a> (ARPA Internet Text Messages)
104
<a href="http://tools.ietf.org/html/rfc1651">RFC 1651</a> (SMTP service extensions)
105
<a href="http://tools.ietf.org/html/rfc1652">RFC 1652</a> (8bit-MIME transport)
106
<a href="http://tools.ietf.org/html/rfc1870">RFC 1870</a> (Message Size Declaration)
107
<a href="http://tools.ietf.org/html/rfc2033">RFC 2033</a> (LMTP protocol)
108
<a href="http://tools.ietf.org/html/rfc2034">RFC 2034</a> (SMTP Enhanced Error Codes)
109
<a href="http://tools.ietf.org/html/rfc2045">RFC 2045</a> (MIME: Format of Internet Message Bodies)
110
<a href="http://tools.ietf.org/html/rfc2046">RFC 2046</a> (MIME: Media Types)
111
<a href="http://tools.ietf.org/html/rfc2554">RFC 2554</a> (AUTH command)
112
<a href="http://tools.ietf.org/html/rfc2821">RFC 2821</a> (SMTP protocol)
113
<a href="http://tools.ietf.org/html/rfc2920">RFC 2920</a> (SMTP Pipelining)
114
<a href="http://tools.ietf.org/html/rfc3207">RFC 3207</a> (STARTTLS command)
115
<a href="http://tools.ietf.org/html/rfc3461">RFC 3461</a> (SMTP DSN Extension)
116
<a href="http://tools.ietf.org/html/rfc3463">RFC 3463</a> (Enhanced Status Codes)
117
<a href="http://tools.ietf.org/html/rfc4954">RFC 4954</a> (AUTH command)
118
119
<b>DIAGNOSTICS</b>
119
120
Problems and transactions are logged to <b>syslogd</b>(8). Cor-
177
178
firewall "<CR><LF>.<CR><LF>" bug.
179
180
<b><a href="postconf.5.html#smtp_pix_workaround_threshold_time">smtp_pix_workaround_threshold_time</a> (500s)</b>
180
How long a message must be queued before the PIX
181
firewall "<CR><LF>.<CR><LF>" bug workaround is
182
turned on for delivery through firewalls with "smtp
183
fixup" mode turned on.
181
How long a message must be queued before the Post-
182
fix SMTP client turns on the PIX firewall
183
"<CR><LF>.<CR><LF>" bug workaround for delivery
184
through firewalls with "smtp fixup" mode turned on.
186
<b><a href="postconf.5.html#smtp_pix_workarounds">smtp_pix_workarounds</a> (disable_esmtp, delay_dotcrlf)</b>
187
A list that specifies zero or more workarounds for
188
CISCO PIX firewall bugs.
190
<b><a href="postconf.5.html#smtp_pix_workaround_maps">smtp_pix_workaround_maps</a> (empty)</b>
191
Lookup tables, indexed by the remote SMTP server
192
address, with per-destination workarounds for CISCO
185
195
<b><a href="postconf.5.html#smtp_quote_rfc821_envelope">smtp_quote_rfc821_envelope</a> (yes)</b>
186
196
Quote addresses in SMTP MAIL FROM and RCPT TO com-
187
mands as required by <a href="http://www.faqs.org/rfcs/rfc821.html">RFC 821</a>.
197
mands as required by <a href="http://tools.ietf.org/html/rfc821">RFC 821</a>.
189
199
<b><a href="postconf.5.html#smtp_skip_5xx_greeting">smtp_skip_5xx_greeting</a> (yes)</b>
190
200
Skip SMTP servers that greet with a 5XX status code
238
248
LMTP client will ignore in the LHLO response from a
239
249
remote LMTP server.
241
<b><a href="postconf.5.html#lmtp_discard_lhlo_keywords">lmtp_discard_lhlo_keywords</a> ($<a href="postconf.5.html#myhostname">myhostname</a>)</b>
251
<b><a href="postconf.5.html#lmtp_discard_lhlo_keywords">lmtp_discard_lhlo_keywords</a> (empty)</b>
242
252
A case insensitive list of LHLO keywords (pipelin-
243
253
ing, starttls, auth, etc.) that the LMTP client
244
254
will ignore in the LHLO response from a remote LMTP
257
Available in Postfix version 2.4.4 and later:
259
<b><a href="postconf.5.html#send_cyrus_sasl_authzid">send_cyrus_sasl_authzid</a> (no)</b>
260
When authenticating to a remote SMTP or LMTP server
261
with the default setting "no", send no SASL autho-
262
riZation ID (authzid); send only the SASL authenti-
263
Cation ID (authcid) plus the authcid's password.
265
Available in Postfix version 2.5 and later:
267
<b><a href="postconf.5.html#smtp_header_checks">smtp_header_checks</a> (empty)</b>
268
Restricted <a href="header_checks.5.html"><b>header_checks</b>(5)</a> tables for the Postfix
271
<b><a href="postconf.5.html#smtp_mime_header_checks">smtp_mime_header_checks</a> (empty)</b>
272
Restricted <b><a href="postconf.5.html#mime_header_checks">mime_header_checks</a></b>(5) tables for the
275
<b><a href="postconf.5.html#smtp_nested_header_checks">smtp_nested_header_checks</a> (empty)</b>
276
Restricted <b><a href="postconf.5.html#nested_header_checks">nested_header_checks</a></b>(5) tables for the
279
<b><a href="postconf.5.html#smtp_body_checks">smtp_body_checks</a> (empty)</b>
280
Restricted <a href="header_checks.5.html"><b>body_checks</b>(5)</a> tables for the Postfix
247
283
<b>MIME PROCESSING CONTROLS</b>
248
284
Available in Postfix version 2.0 and later:
250
286
<b><a href="postconf.5.html#disable_mime_output_conversion">disable_mime_output_conversion</a> (no)</b>
251
Disable the conversion of 8BITMIME format to 7BIT
287
Disable the conversion of 8BITMIME format to 7BIT
254
290
<b><a href="postconf.5.html#mime_boundary_length_limit">mime_boundary_length_limit</a> (2048)</b>
263
299
Available in Postfix version 2.1 and later:
265
301
<b><a href="postconf.5.html#smtp_send_xforward_command">smtp_send_xforward_command</a> (no)</b>
266
Send the non-standard XFORWARD command when the
267
Postfix SMTP server EHLO response announces XFOR-
302
Send the non-standard XFORWARD command when the
303
Postfix SMTP server EHLO response announces XFOR-
270
306
<b>SASL AUTHENTICATION CONTROLS</b>
271
307
<b><a href="postconf.5.html#smtp_sasl_auth_enable">smtp_sasl_auth_enable</a> (no)</b>
272
Enable SASL authentication in the Postfix SMTP
308
Enable SASL authentication in the Postfix SMTP
275
311
<b><a href="postconf.5.html#smtp_sasl_password_maps">smtp_sasl_password_maps</a> (empty)</b>
276
Optional SMTP client lookup tables with one user-
277
name:password entry per remote hostname or domain,
312
Optional SMTP client lookup tables with one user-
313
name:password entry per remote hostname or domain,
278
314
or sender address when sender-dependent authentica-
281
317
<b><a href="postconf.5.html#smtp_sasl_security_options">smtp_sasl_security_options</a> (noplaintext, noanonymous)</b>
282
SASL security options; as of Postfix 2.3 the list
283
of available features depends on the SASL client
284
implementation that is selected with
285
<b><a href="postconf.5.html#smtp_sasl_type">smtp_sasl_type</a></b>.
318
Postfix SMTP client SASL security options; as of
319
Postfix 2.3 the list of available features depends
320
on the SASL client implementation that is selected
321
with <b><a href="postconf.5.html#smtp_sasl_type">smtp_sasl_type</a></b>.
287
323
Available in Postfix version 2.2 and later:
289
325
<b><a href="postconf.5.html#smtp_sasl_mechanism_filter">smtp_sasl_mechanism_filter</a> (empty)</b>
290
If non-empty, a Postfix SMTP client filter for the
291
remote SMTP server's list of offered SASL mecha-
326
If non-empty, a Postfix SMTP client filter for the
327
remote SMTP server's list of offered SASL mecha-
294
330
Available in Postfix version 2.3 and later:
296
332
<b><a href="postconf.5.html#smtp_sender_dependent_authentication">smtp_sender_dependent_authentication</a> (no)</b>
297
333
Enable sender-dependent authentication in the Post-
298
fix SMTP client; this is available only with SASL
299
authentication, and disables SMTP connection
300
caching to ensure that mail from different senders
334
fix SMTP client; this is available only with SASL
335
authentication, and disables SMTP connection
336
caching to ensure that mail from different senders
301
337
will use the appropriate credentials.
303
339
<b><a href="postconf.5.html#smtp_sasl_path">smtp_sasl_path</a> (empty)</b>
304
Implementation-specific information that is passed
305
through to the SASL plug-in implementation that is
306
selected with <b><a href="postconf.5.html#smtp_sasl_type">smtp_sasl_type</a></b>.
340
Implementation-specific information that the Post-
341
fix SMTP client passes through to the SASL plug-in
342
implementation that is selected with
343
<b><a href="postconf.5.html#smtp_sasl_type">smtp_sasl_type</a></b>.
308
345
<b><a href="postconf.5.html#smtp_sasl_type">smtp_sasl_type</a> (cyrus)</b>
309
The SASL plug-in type that the Postfix SMTP client
346
The SASL plug-in type that the Postfix SMTP client
310
347
should use for authentication.
349
Available in Postfix version 2.5 and later:
351
<b><a href="postconf.5.html#smtp_sasl_auth_cache_name">smtp_sasl_auth_cache_name</a> (empty)</b>
352
An optional table to prevent repeated SASL authen-
353
tication failures with the same remote SMTP server
354
hostname, username and password.
356
<b><a href="postconf.5.html#smtp_sasl_auth_cache_time">smtp_sasl_auth_cache_time</a> (90d)</b>
357
The maximal age of an <a href="postconf.5.html#smtp_sasl_auth_cache_name">smtp_sasl_auth_cache_name</a>
358
entry before it is removed.
360
<b><a href="postconf.5.html#smtp_sasl_auth_soft_bounce">smtp_sasl_auth_soft_bounce</a> (yes)</b>
361
When a remote SMTP server rejects a SASL authenti-
362
cation request with a 535 reply code, defer mail
363
delivery instead of returning mail as undeliver-
312
366
<b>STARTTLS SUPPORT CONTROLS</b>
313
Detailed information about STARTTLS configuration may be
367
Detailed information about STARTTLS configuration may be
314
368
found in the <a href="TLS_README.html">TLS_README</a> document.
316
370
<b><a href="postconf.5.html#smtp_tls_security_level">smtp_tls_security_level</a> (empty)</b>
317
371
The default SMTP TLS security level for the Postfix
318
SMTP client; when a non-empty value is specified,
319
this overrides the obsolete parameters
372
SMTP client; when a non-empty value is specified,
373
this overrides the obsolete parameters
320
374
<a href="postconf.5.html#smtp_use_tls">smtp_use_tls</a>, <a href="postconf.5.html#smtp_enforce_tls">smtp_enforce_tls</a>, and
321
375
<a href="postconf.5.html#smtp_tls_enforce_peername">smtp_tls_enforce_peername</a>.
323
377
<b><a href="postconf.5.html#smtp_sasl_tls_security_options">smtp_sasl_tls_security_options</a> ($<a href="postconf.5.html#smtp_sasl_security_options">smtp_sasl_secu</a>-</b>
324
378
<b><a href="postconf.5.html#smtp_sasl_security_options">rity_options</a>)</b>
325
The SASL authentication security options that the
326
Postfix SMTP client uses for TLS encrypted SMTP
379
The SASL authentication security options that the
380
Postfix SMTP client uses for TLS encrypted SMTP
329
383
<b><a href="postconf.5.html#smtp_starttls_timeout">smtp_starttls_timeout</a> (300s)</b>
330
Time limit for Postfix SMTP client write and read
331
operations during TLS startup and shutdown hand-
384
Time limit for Postfix SMTP client write and read
385
operations during TLS startup and shutdown hand-
332
386
shake procedures.
334
388
<b><a href="postconf.5.html#smtp_tls_CAfile">smtp_tls_CAfile</a> (empty)</b>
335
The file with the certificate of the certification
336
authority (CA) that issued the Postfix SMTP client
389
The file with the certificate of the certification
390
authority (CA) that issued the Postfix SMTP client
339
393
<b><a href="postconf.5.html#smtp_tls_CApath">smtp_tls_CApath</a> (empty)</b>
340
Directory with PEM format certificate authority
341
certificates that the Postfix SMTP client uses to
394
Directory with PEM format certificate authority
395
certificates that the Postfix SMTP client uses to
342
396
verify a remote SMTP server certificate.
344
398
<b><a href="postconf.5.html#smtp_tls_cert_file">smtp_tls_cert_file</a> (empty)</b>
345
File with the Postfix SMTP client RSA certificate
399
File with the Postfix SMTP client RSA certificate
348
402
<b><a href="postconf.5.html#smtp_tls_mandatory_ciphers">smtp_tls_mandatory_ciphers</a> (medium)</b>
349
The minimum TLS cipher grade that the Postfix SMTP
403
The minimum TLS cipher grade that the Postfix SMTP
350
404
client will use with mandatory TLS encryption.
352
406
<b><a href="postconf.5.html#smtp_tls_exclude_ciphers">smtp_tls_exclude_ciphers</a> (empty)</b>
357
411
<b><a href="postconf.5.html#smtp_tls_mandatory_exclude_ciphers">smtp_tls_mandatory_exclude_ciphers</a> (empty)</b>
358
Additional list of ciphers or cipher types to
359
exclude from the SMTP client cipher list at manda-
412
Additional list of ciphers or cipher types to
413
exclude from the SMTP client cipher list at manda-
360
414
tory TLS security levels.
362
416
<b><a href="postconf.5.html#smtp_tls_dcert_file">smtp_tls_dcert_file</a> (empty)</b>
363
File with the Postfix SMTP client DSA certificate
417
File with the Postfix SMTP client DSA certificate
366
420
<b><a href="postconf.5.html#smtp_tls_dkey_file">smtp_tls_dkey_file</a> ($<a href="postconf.5.html#smtp_tls_dcert_file">smtp_tls_dcert_file</a>)</b>
367
File with the Postfix SMTP client DSA private key
421
File with the Postfix SMTP client DSA private key
370
424
<b><a href="postconf.5.html#smtp_tls_key_file">smtp_tls_key_file</a> ($<a href="postconf.5.html#smtp_tls_cert_file">smtp_tls_cert_file</a>)</b>
371
File with the Postfix SMTP client RSA private key
425
File with the Postfix SMTP client RSA private key
374
428
<b><a href="postconf.5.html#smtp_tls_loglevel">smtp_tls_loglevel</a> (0)</b>
375
Enable additional Postfix SMTP client logging of
429
Enable additional Postfix SMTP client logging of
378
432
<b><a href="postconf.5.html#smtp_tls_note_starttls_offer">smtp_tls_note_starttls_offer</a> (no)</b>
379
Log the hostname of a remote SMTP server that
380
offers STARTTLS, when TLS is not already enabled
433
Log the hostname of a remote SMTP server that
434
offers STARTTLS, when TLS is not already enabled
383
437
<b><a href="postconf.5.html#smtp_tls_policy_maps">smtp_tls_policy_maps</a> (empty)</b>
384
438
Optional lookup tables with the Postfix SMTP client
385
439
TLS security policy by next-hop destination; when a
386
non-empty value is specified, this overrides the
440
non-empty value is specified, this overrides the
387
441
obsolete <a href="postconf.5.html#smtp_tls_per_site">smtp_tls_per_site</a> parameter.
389
443
<b><a href="postconf.5.html#smtp_tls_mandatory_protocols">smtp_tls_mandatory_protocols</a> (SSLv3, TLSv1)</b>
390
List of TLS protocols that the Postfix SMTP client
391
will use with mandatory TLS encryption.
444
List of SSL/TLS protocols that the Postfix SMTP
445
client will use with mandatory TLS encryption.
393
<b><a href="postconf.5.html#smtp_tls_scert_verifydepth">smtp_tls_scert_verifydepth</a> (5)</b>
447
<b><a href="postconf.5.html#smtp_tls_scert_verifydepth">smtp_tls_scert_verifydepth</a> (9)</b>
394
448
The verification depth for remote SMTP server cer-
427
481
<b><a href="postconf.5.html#tls_low_cipherlist">tls_low_cipherlist</a> (ALL:!EXPORT:+RC4:@STRENGTH)</b>
428
The OpenSSL cipherlist for "LOW" or higher grade
482
The OpenSSL cipherlist for "LOW" or higher grade
431
485
<b><a href="postconf.5.html#tls_export_cipherlist">tls_export_cipherlist</a> (ALL:+RC4:@STRENGTH)</b>
432
486
The OpenSSL cipherlist for "EXPORT" or higher grade
435
<b><a href="postconf.5.html#tls_null_cipherlist">tls_null_cipherlist</a> (!aNULL:eNULL+kRSA)</b>
436
The OpenSSL cipherlist for "NULL" grade ciphers
489
<b><a href="postconf.5.html#tls_null_cipherlist">tls_null_cipherlist</a> (eNULL:!aNULL)</b>
490
The OpenSSL cipherlist for "NULL" grade ciphers
437
491
that provide authentication without encryption.
439
493
Available in Postfix version 2.4 and later:
441
495
<b><a href="postconf.5.html#smtp_sasl_tls_verified_security_options">smtp_sasl_tls_verified_security_options</a></b>
442
496
<b>($<a href="postconf.5.html#smtp_sasl_tls_security_options">smtp_sasl_tls_security_options</a>)</b>
443
The SASL authentication security options that the
444
Postfix SMTP client uses for TLS encrypted SMTP
497
The SASL authentication security options that the
498
Postfix SMTP client uses for TLS encrypted SMTP
445
499
sessions with a verified server certificate.
501
Available in Postfix version 2.5 and later:
503
<b><a href="postconf.5.html#smtp_tls_fingerprint_cert_match">smtp_tls_fingerprint_cert_match</a> (empty)</b>
504
List of acceptable remote SMTP server certificate
505
fingerprints for the "fingerprint" TLS security
506
level (<b><a href="postconf.5.html#smtp_tls_security_level">smtp_tls_security_level</a></b> = fingerprint).
508
<b><a href="postconf.5.html#smtp_tls_fingerprint_digest">smtp_tls_fingerprint_digest</a> (md5)</b>
509
The message digest algorithm used to construct
510
remote SMTP server certificate fingerprints.
447
512
<b>OBSOLETE STARTTLS CONTROLS</b>
448
The following configuration parameters exist for compati-
513
The following configuration parameters exist for compati-
449
514
bility with Postfix versions before 2.3. Support for these
450
515
will be removed in a future release.
452
517
<b><a href="postconf.5.html#smtp_use_tls">smtp_use_tls</a> (no)</b>
453
Opportunistic mode: use TLS when a remote SMTP
454
server announces STARTTLS support, otherwise send
518
Opportunistic mode: use TLS when a remote SMTP
519
server announces STARTTLS support, otherwise send
455
520
the mail in the clear.
457
522
<b><a href="postconf.5.html#smtp_enforce_tls">smtp_enforce_tls</a> (no)</b>
458
Enforcement mode: require that remote SMTP servers
459
use TLS encryption, and never send mail in the
523
Enforcement mode: require that remote SMTP servers
524
use TLS encryption, and never send mail in the
462
527
<b><a href="postconf.5.html#smtp_tls_enforce_peername">smtp_tls_enforce_peername</a> (yes)</b>
463
With mandatory TLS encryption, require that the
528
With mandatory TLS encryption, require that the
464
529
remote SMTP server hostname matches the information
465
530
in the remote SMTP server certificate.
467
532
<b><a href="postconf.5.html#smtp_tls_per_site">smtp_tls_per_site</a> (empty)</b>
468
533
Optional lookup tables with the Postfix SMTP client
469
TLS usage policy by next-hop destination and by
534
TLS usage policy by next-hop destination and by
470
535
remote SMTP server hostname.
472
537
<b><a href="postconf.5.html#smtp_tls_cipherlist">smtp_tls_cipherlist</a> (empty)</b>
476
541
<b>RESOURCE AND RATE CONTROLS</b>
477
542
<b><a href="postconf.5.html#smtp_destination_concurrency_limit">smtp_destination_concurrency_limit</a> ($<a href="postconf.5.html#default_destination_concurrency_limit">default_destina</a>-</b>
478
543
<b><a href="postconf.5.html#default_destination_concurrency_limit">tion_concurrency_limit</a>)</b>
479
The maximal number of parallel deliveries to the
480
same destination via the smtp message delivery
544
The maximal number of parallel deliveries to the
545
same destination via the smtp message delivery
483
548
<b><a href="postconf.5.html#smtp_destination_recipient_limit">smtp_destination_recipient_limit</a> ($<a href="postconf.5.html#default_destination_recipient_limit">default_destina</a>-</b>
484
549
<b><a href="postconf.5.html#default_destination_recipient_limit">tion_recipient_limit</a>)</b>
485
The maximal number of recipients per delivery via
550
The maximal number of recipients per delivery via
486
551
the smtp message delivery transport.
488
553
<b><a href="postconf.5.html#smtp_connect_timeout">smtp_connect_timeout</a> (30s)</b>
489
The SMTP client time limit for completing a TCP
554
The SMTP client time limit for completing a TCP
490
555
connection, or zero (use the operating system
491
556
built-in time limit).
493
558
<b><a href="postconf.5.html#smtp_helo_timeout">smtp_helo_timeout</a> (300s)</b>
494
The SMTP client time limit for sending the HELO or
495
EHLO command, and for receiving the initial server
559
The SMTP client time limit for sending the HELO or
560
EHLO command, and for receiving the initial server
498
563
<b><a href="postconf.5.html#lmtp_lhlo_timeout">lmtp_lhlo_timeout</a> (300s)</b>
499
The LMTP client time limit for sending the LHLO
564
The LMTP client time limit for sending the LHLO
500
565
command, and for receiving the initial server
505
570
command, and for receiving the server response.
507
572
<b><a href="postconf.5.html#smtp_mail_timeout">smtp_mail_timeout</a> (300s)</b>
508
The SMTP client time limit for sending the MAIL
509
FROM command, and for receiving the server
573
The SMTP client time limit for sending the MAIL
574
FROM command, and for receiving the server
512
577
<b><a href="postconf.5.html#smtp_rcpt_timeout">smtp_rcpt_timeout</a> (300s)</b>
513
The SMTP client time limit for sending the SMTP
514
RCPT TO command, and for receiving the server
578
The SMTP client time limit for sending the SMTP
579
RCPT TO command, and for receiving the server
517
582
<b><a href="postconf.5.html#smtp_data_init_timeout">smtp_data_init_timeout</a> (120s)</b>
518
The SMTP client time limit for sending the SMTP
519
DATA command, and for receiving the server
583
The SMTP client time limit for sending the SMTP
584
DATA command, and for receiving the server
522
587
<b><a href="postconf.5.html#smtp_data_xfer_timeout">smtp_data_xfer_timeout</a> (180s)</b>
523
The SMTP client time limit for sending the SMTP
588
The SMTP client time limit for sending the SMTP
526
591
<b><a href="postconf.5.html#smtp_data_done_timeout">smtp_data_done_timeout</a> (600s)</b>
527
The SMTP client time limit for sending the SMTP
592
The SMTP client time limit for sending the SMTP
528
593
".", and for receiving the server response.
530
595
<b><a href="postconf.5.html#smtp_quit_timeout">smtp_quit_timeout</a> (300s)</b>
531
The SMTP client time limit for sending the QUIT
596
The SMTP client time limit for sending the QUIT
532
597
command, and for receiving the server response.
534
599
Available in Postfix version 2.1 and later:
571
636
<b><a href="postconf.5.html#smtp_connection_cache_time_limit">smtp_connection_cache_time_limit</a> (2s)</b>
572
637
When SMTP connection caching is enabled, the amount
573
of time that an unused SMTP client socket is kept
638
of time that an unused SMTP client socket is kept
574
639
open before it is closed.
576
641
Available in Postfix version 2.3 and later:
578
643
<b><a href="postconf.5.html#connection_cache_protocol_timeout">connection_cache_protocol_timeout</a> (5s)</b>
579
Time limit for connection cache connect, send or
644
Time limit for connection cache connect, send or
580
645
receive operations.
582
647
<b>TROUBLE SHOOTING CONTROLS</b>
583
648
<b><a href="postconf.5.html#debug_peer_level">debug_peer_level</a> (2)</b>
584
The increment in verbose logging level when a
585
remote client or server matches a pattern in the
649
The increment in verbose logging level when a
650
remote client or server matches a pattern in the
586
651
<a href="postconf.5.html#debug_peer_list">debug_peer_list</a> parameter.
588
653
<b><a href="postconf.5.html#debug_peer_list">debug_peer_list</a> (empty)</b>
589
Optional list of remote client or server hostname
590
or network address patterns that cause the verbose
591
logging level to increase by the amount specified
654
Optional list of remote client or server hostname
655
or network address patterns that cause the verbose
656
logging level to increase by the amount specified
592
657
in $<a href="postconf.5.html#debug_peer_level">debug_peer_level</a>.
594
659
<b><a href="postconf.5.html#error_notice_recipient">error_notice_recipient</a> (postmaster)</b>
595
The recipient of postmaster notifications about
596
mail delivery problems that are caused by policy,
660
The recipient of postmaster notifications about
661
mail delivery problems that are caused by policy,
597
662
resource, software or protocol errors.
599
664
<b><a href="postconf.5.html#internal_mail_filter_classes">internal_mail_filter_classes</a> (empty)</b>
600
What categories of Postfix-generated mail are sub-
601
ject to before-queue content inspection by
665
What categories of Postfix-generated mail are sub-
666
ject to before-queue content inspection by
602
667
<a href="postconf.5.html#non_smtpd_milters">non_smtpd_milters</a>, <a href="postconf.5.html#header_checks">header_checks</a> and <a href="postconf.5.html#body_checks">body_checks</a>.
604
669
<b><a href="postconf.5.html#notify_classes">notify_classes</a> (resource, software)</b>
605
The list of error classes that are reported to the
670
The list of error classes that are reported to the
608
673
<b>MISCELLANEOUS CONTROLS</b>
609
674
<b><a href="postconf.5.html#best_mx_transport">best_mx_transport</a> (empty)</b>
610
Where the Postfix SMTP client should deliver mail
675
Where the Postfix SMTP client should deliver mail
611
676
when it detects a "mail loops back to myself" error
614
679
<b><a href="postconf.5.html#config_directory">config_directory</a> (see 'postconf -d' output)</b>
615
The default location of the Postfix <a href="postconf.5.html">main.cf</a> and
680
The default location of the Postfix <a href="postconf.5.html">main.cf</a> and
616
681
<a href="master.5.html">master.cf</a> configuration files.
618
683
<b><a href="postconf.5.html#daemon_timeout">daemon_timeout</a> (18000s)</b>
619
How much time a Postfix daemon process may take to
620
handle a request before it is terminated by a
684
How much time a Postfix daemon process may take to
685
handle a request before it is terminated by a
621
686
built-in watchdog timer.
623
688
<b><a href="postconf.5.html#delay_logging_resolution_limit">delay_logging_resolution_limit</a> (2)</b>
624
The maximal number of digits after the decimal
689
The maximal number of digits after the decimal
625
690
point when logging sub-second delay values.
627
692
<b><a href="postconf.5.html#disable_dns_lookups">disable_dns_lookups</a> (no)</b>
628
Disable DNS lookups in the Postfix SMTP and LMTP
693
Disable DNS lookups in the Postfix SMTP and LMTP
631
696
<b><a href="postconf.5.html#inet_interfaces">inet_interfaces</a> (all)</b>