1SMTP(8)                     System Manager's Manual                    SMTP(8)
2
3
4

NAME

6       smtp - Postfix SMTP+LMTP client
7

SYNOPSIS

9       smtp [generic Postfix daemon options] [flags=DORX]
10

DESCRIPTION

12       The Postfix SMTP+LMTP client implements the SMTP and LMTP mail delivery
13       protocols. It processes message delivery requests from the  queue  man‐
14       ager.  Each  request specifies a queue file, a sender address, a domain
15       or host to deliver to, and recipient information.  This program expects
16       to be run from the master(8) process manager.
17
18       The  SMTP+LMTP  client  updates  the queue file and marks recipients as
19       finished, or it informs the queue manager that delivery should be tried
20       again  at  a  later  time.  Delivery  status  reports  are  sent to the
21       bounce(8), defer(8) or trace(8) daemon as appropriate.
22
23       The SMTP+LMTP client looks up a list of mail  exchanger  addresses  for
24       the  destination  host,  sorts  the list by preference, and connects to
25       each listed address until it finds a server that responds.
26
27       When a server is not reachable, or when mail delivery fails  due  to  a
28       recoverable  error  condition, the SMTP+LMTP client will try to deliver
29       the mail to an alternate host.
30
31       After a successful mail transaction, a connection may be saved  to  the
32       scache(8)  connection  cache  server,  so  that  it  may be used by any
33       SMTP+LMTP client for a subsequent transaction.
34
35       By default, connection caching is enabled temporarily for  destinations
36       that have a high volume of mail in the active queue. Connection caching
37       can be enabled permanently for specific destinations.
38

SMTP DESTINATION SYNTAX

40       The Postfix SMTP+LMTP client supports multiple  destinations  separated
41       by comma or whitespace (Postfix 3.5 and later).  SMTP destinations have
42       the following form:
43
44       domainname
45
46       domainname:port
47              Look up the mail exchangers for the specified domain,  and  con‐
48              nect to the specified port (default: smtp).
49
50       [hostname]
51
52       [hostname]:port
53              Look  up  the  address(es) of the specified host, and connect to
54              the specified port (default: smtp).
55
56       [address]
57
58       [address]:port
59              Connect to the host at the specified address, and connect to the
60              specified  port (default: smtp). An IPv6 address must be format‐
61              ted as [ipv6:address].
62

LMTP DESTINATION SYNTAX

64       The Postfix SMTP+LMTP client supports multiple  destinations  separated
65       by comma or whitespace (Postfix 3.5 and later).  LMTP destinations have
66       the following form:
67
68       unix:pathname
69              Connect to the local UNIX-domain server that  is  bound  to  the
70              specified  pathname.  If  the process runs chrooted, an absolute
71              pathname is interpreted relative to the Postfix queue directory.
72
73       inet:hostname
74
75       inet:hostname:port
76
77       inet:[address]
78
79       inet:[address]:port
80              Connect to the specified TCP port on the specified local or  re‐
81              mote  host. If no port is specified, connect to the port defined
82              as lmtp in services(4).   If  no  such  service  is  found,  the
83              lmtp_tcp_port configuration parameter (default value of 24) will
84              be used.  An IPv6 address must be formatted as [ipv6:address].
85

SINGLE-RECIPIENT DELIVERY

87       By default, the Postfix SMTP+LMTP client delivers mail to multiple  re‐
88       cipients  per  delivery  request. This is undesirable when prepending a
89       Delivered-to: or X-Original-To: message header. To prevent Postfix from
90       sending multiple recipients per delivery request, specify
91
92           transport_destination_recipient_limit = 1
93
94       in  the  Postfix main.cf file, where transport is the name in the first
95       column of the Postfix master.cf entry for this mail delivery service.
96

COMMAND ATTRIBUTE SYNTAX

98       flags=DORX (optional)
99              Optional message processing flags.
100
101              D      Prepend a "Delivered-To: recipient" message  header  with
102                     the  envelope  recipient address. Note: for this to work,
103                     the transport_destination_recipient_limit must be 1  (see
104                     SINGLE-RECIPIENT DELIVERY above for details).
105
106                     The D flag also enforces loop detection: if a message al‐
107                     ready contains a Delivered-To: header with the  same  re‐
108                     cipient address, then the message is returned as undeliv‐
109                     erable. The address comparison is case insensitive.
110
111                     This feature is available as of Postfix 3.5.
112
113              O      Prepend an "X-Original-To: recipient" message header with
114                     the recipient address as given to Postfix. Note: for this
115                     to work, the  transport_destination_recipient_limit  must
116                     be 1 (see SINGLE-RECIPIENT DELIVERY above for details).
117
118                     This feature is available as of Postfix 3.5.
119
120              R      Prepend a "Return-Path: <sender>" message header with the
121                     envelope sender address.
122
123                     This feature is available as of Postfix 3.5.
124
125              X      Indicates that the delivery is final. This  flag  affects
126                     the status reported in "success" DSN (delivery status no‐
127                     tification) messages, and changes it from "relayed"  into
128                     "delivered".
129
130                     This feature is available as of Postfix 3.5.
131

SECURITY

133       The SMTP+LMTP client is moderately security-sensitive. It
134       talks to SMTP or LMTP servers and to DNS servers on the
135       network. The SMTP+LMTP client can be run chrooted at fixed
136       low privilege.
137

STANDARDS

139       RFC 821 (SMTP protocol)
140       RFC 822 (ARPA Internet Text Messages)
141       RFC 1651 (SMTP service extensions)
142       RFC 1652 (8bit-MIME transport)
143       RFC 1870 (Message Size Declaration)
144       RFC 2033 (LMTP protocol)
145       RFC 2034 (SMTP Enhanced Error Codes)
146       RFC 2045 (MIME: Format of Internet Message Bodies)
147       RFC 2046 (MIME: Media Types)
148       RFC 2554 (AUTH command)
149       RFC 2821 (SMTP protocol)
150       RFC 2920 (SMTP Pipelining)
151       RFC 3207 (STARTTLS command)
152       RFC 3461 (SMTP DSN Extension)
153       RFC 3463 (Enhanced Status Codes)
154       RFC 4954 (AUTH command)
155       RFC 5321 (SMTP protocol)
156       RFC 6531 (Internationalized SMTP)
157       RFC 6533 (Internationalized Delivery Status Notifications)
158       RFC 7672 (SMTP security via opportunistic DANE TLS)
159

DIAGNOSTICS

161       Problems  and  transactions  are  logged  to syslogd(8) or postlogd(8).
162       Corrupted message files are marked so that the queue manager  can  move
163       them to the corrupt queue for further inspection.
164
165       Depending  on the setting of the notify_classes parameter, the postmas‐
166       ter is notified of bounces, protocol problems, and of other trouble.
167

BUGS

169       SMTP and LMTP connection reuse for TLS (without  closing  the  SMTP  or
170       LMTP connection) is not supported before Postfix 3.4.
171
172       SMTP  and LMTP connection reuse assumes that SASL credentials are valid
173       for all destinations that map onto the same IP address and TCP port.
174

CONFIGURATION PARAMETERS

176       Before Postfix version 2.3, the LMTP client is a separate program  that
177       implements  only  a  subset  of  the functionality available with SMTP:
178       there is no support for TLS, and  connections  are  cached  in-process,
179       making it ineffective when the client is used for multiple domains.
180
181       Most smtp_xxx configuration parameters have an lmtp_xxx "mirror" param‐
182       eter for the equivalent LMTP  feature.  This  document  describes  only
183       those LMTP-related parameters that aren't simply "mirror" parameters.
184
185       Changes  to  main.cf  are picked up automatically, as smtp(8) processes
186       run for only a limited amount of time. Use the command "postfix reload"
187       to speed up a change.
188
189       The  text  below provides only a parameter summary. See postconf(5) for
190       more details including examples.
191

COMPATIBILITY CONTROLS

193       ignore_mx_lookup_error (no)
194              Ignore DNS MX lookups that produce no response.
195
196       smtp_always_send_ehlo (yes)
197              Always send EHLO at the start of an SMTP session.
198
199       smtp_never_send_ehlo (no)
200              Never send EHLO at the start of an SMTP session.
201
202       smtp_defer_if_no_mx_address_found (no)
203              Defer mail delivery when no MX record resolves to an IP address.
204
205       smtp_line_length_limit (998)
206              The maximal length of message header and body lines that Postfix
207              will send via SMTP.
208
209       smtp_pix_workaround_delay_time (10s)
210              How   long   the  Postfix  SMTP  client  pauses  before  sending
211              ".<CR><LF>"  in  order  to  work   around   the   PIX   firewall
212              "<CR><LF>.<CR><LF>" bug.
213
214       smtp_pix_workaround_threshold_time (500s)
215              How long a message must be queued before the Postfix SMTP client
216              turns on the PIX firewall "<CR><LF>.<CR><LF>" bug workaround for
217              delivery through firewalls with "smtp fixup" mode turned on.
218
219       smtp_pix_workarounds (disable_esmtp, delay_dotcrlf)
220              A  list  that  specifies  zero or more workarounds for CISCO PIX
221              firewall bugs.
222
223       smtp_pix_workaround_maps (empty)
224              Lookup tables, indexed by the remote SMTP server  address,  with
225              per-destination workarounds for CISCO PIX firewall bugs.
226
227       smtp_quote_rfc821_envelope (yes)
228              Quote  addresses  in  Postfix  SMTP client MAIL FROM and RCPT TO
229              commands as required by RFC 5321.
230
231       smtp_reply_filter (empty)
232              A mechanism to transform replies from remote  SMTP  servers  one
233              line at a time.
234
235       smtp_skip_5xx_greeting (yes)
236              Skip remote SMTP servers that greet with a 5XX status code.
237
238       smtp_skip_quit_response (yes)
239              Do not wait for the response to the SMTP QUIT command.
240
241       Available in Postfix version 2.0 and earlier:
242
243       smtp_skip_4xx_greeting (yes)
244              Skip  SMTP  servers  that greet with a 4XX status code (go away,
245              try again later).
246
247       Available in Postfix version 2.2 and later:
248
249       smtp_discard_ehlo_keyword_address_maps (empty)
250              Lookup tables, indexed by the remote SMTP server  address,  with
251              case  insensitive  lists of EHLO keywords (pipelining, starttls,
252              auth, etc.) that the Postfix SMTP client will ignore in the EHLO
253              response from a remote SMTP server.
254
255       smtp_discard_ehlo_keywords (empty)
256              A  case insensitive list of EHLO keywords (pipelining, starttls,
257              auth, etc.) that the Postfix SMTP client will ignore in the EHLO
258              response from a remote SMTP server.
259
260       smtp_generic_maps (empty)
261              Optional  lookup  tables  that  perform address rewriting in the
262              Postfix SMTP client, typically to transform a locally valid  ad‐
263              dress into a globally valid address when sending mail across the
264              Internet.
265
266       Available in Postfix version 2.2.9 and later:
267
268       smtp_cname_overrides_servername (version dependent)
269              When the remote SMTP servername is  a  DNS  CNAME,  replace  the
270              servername  with the result from CNAME expansion for the purpose
271              of logging, SASL password lookup, TLS policy decisions,  or  TLS
272              certificate verification.
273
274       Available in Postfix version 2.3 and later:
275
276       lmtp_discard_lhlo_keyword_address_maps (empty)
277              Lookup  tables,  indexed by the remote LMTP server address, with
278              case insensitive lists of LHLO keywords  (pipelining,  starttls,
279              auth, etc.) that the Postfix LMTP client will ignore in the LHLO
280              response from a remote LMTP server.
281
282       lmtp_discard_lhlo_keywords (empty)
283              A case insensitive list of LHLO keywords (pipelining,  starttls,
284              auth, etc.) that the Postfix LMTP client will ignore in the LHLO
285              response from a remote LMTP server.
286
287       Available in Postfix version 2.4.4 and later:
288
289       send_cyrus_sasl_authzid (no)
290              When authenticating to a remote SMTP or LMTP server with the de‐
291              fault  setting  "no",  send  no SASL authoriZation ID (authzid);
292              send only the SASL authentiCation ID (authcid)  plus  the  auth‐
293              cid's password.
294
295       Available in Postfix version 2.5 and later:
296
297       smtp_header_checks (empty)
298              Restricted header_checks(5) tables for the Postfix SMTP client.
299
300       smtp_mime_header_checks (empty)
301              Restricted  mime_header_checks(5)  tables  for  the Postfix SMTP
302              client.
303
304       smtp_nested_header_checks (empty)
305              Restricted nested_header_checks(5) tables for the  Postfix  SMTP
306              client.
307
308       smtp_body_checks (empty)
309              Restricted body_checks(5) tables for the Postfix SMTP client.
310
311       Available in Postfix version 2.6 and later:
312
313       tcp_windowsize (0)
314              An  optional  workaround for routers that break TCP window scal‐
315              ing.
316
317       Available in Postfix version 2.8 and later:
318
319       smtp_dns_resolver_options (empty)
320              DNS Resolver options for the Postfix SMTP client.
321
322       Available in Postfix version 2.9 - 3.6:
323
324       smtp_per_record_deadline (no)
325              Change the behavior of the smtp_*_timeout time  limits,  from  a
326              time  limit  per  read  or write system call, to a time limit to
327              send or receive a complete record (an SMTP  command  line,  SMTP
328              response  line,  SMTP message content line, or TLS protocol mes‐
329              sage).
330
331       Available in Postfix version 2.9 and later:
332
333       smtp_send_dummy_mail_auth (no)
334              Whether or not to append the "AUTH=<>" option to the  MAIL  FROM
335              command in SASL-authenticated SMTP sessions.
336
337       Available in Postfix version 2.11 and later:
338
339       smtp_dns_support_level (empty)
340              Level of DNS support in the Postfix SMTP client.
341
342       Available in Postfix version 3.0 and later:
343
344       smtp_delivery_status_filter ($default_delivery_status_filter)
345              Optional filter for the smtp(8) delivery agent to change the de‐
346              livery status code or explanatory text of successful  or  unsuc‐
347              cessful deliveries.
348
349       smtp_dns_reply_filter (empty)
350              Optional filter for Postfix SMTP client DNS lookup results.
351
352       Available in Postfix version 3.3 and later:
353
354       smtp_balance_inet_protocols (yes)
355              When  a remote destination resolves to a combination of IPv4 and
356              IPv6 addresses, ensure that the Postfix SMTP client can try both
357              address types before it runs into the smtp_mx_address_limit.
358
359       Available in Postfix 3.5 and later:
360
361       info_log_address_format (external)
362              The  email  address  form that will be used in non-debug logging
363              (info, warning, etc.).
364
365       Available in Postfix 3.6 and later:
366
367       dnssec_probe (ns:.)
368              The DNS query type (default: "ns") and DNS query name  (default:
369              ".") that Postfix may use to determine whether DNSSEC validation
370              is available.
371
372       known_tcp_ports  (lmtp=24,  smtp=25,   smtps=submissions=465,   submis‐
373       sion=587)
374              Optional  setting  that  avoids lookups in the services(5) data‐
375              base.
376
377       Available in Postfix version 3.7 and later:
378
379       smtp_per_request_deadline (no)
380              Change the behavior of the smtp_*_timeout time  limits,  from  a
381              time  limit  per  plaintext or TLS read or write call, to a com‐
382              bined time limit for sending a complete SMTP request and for re‐
383              ceiving a complete SMTP response.
384
385       smtp_min_data_rate (500)
386              The  minimum  plaintext  data  transfer rate in bytes/second for
387              DATA requests, when  deadlines  are  enabled  with  smtp_per_re‐
388              quest_deadline.
389
390       header_from_format (standard)
391              The format of the Postfix-generated From: header.
392

MIME PROCESSING CONTROLS

394       Available in Postfix version 2.0 and later:
395
396       disable_mime_output_conversion (no)
397              Disable the conversion of 8BITMIME format to 7BIT format.
398
399       mime_boundary_length_limit (2048)
400              The maximal length of MIME multipart boundary strings.
401
402       mime_nesting_limit (100)
403              The maximal recursion level that the MIME processor will handle.
404

EXTERNAL CONTENT INSPECTION CONTROLS

406       Available in Postfix version 2.1 and later:
407
408       smtp_send_xforward_command (no)
409              Send  the  non-standard  XFORWARD  command when the Postfix SMTP
410              server EHLO response announces XFORWARD support.
411

SASL AUTHENTICATION CONTROLS

413       smtp_sasl_auth_enable (no)
414              Enable SASL authentication in the Postfix SMTP client.
415
416       smtp_sasl_password_maps (empty)
417              Optional Postfix  SMTP  client  lookup  tables  with  one  user‐
418              name:password  entry per sender, remote hostname or next-hop do‐
419              main.
420
421       smtp_sasl_security_options (noplaintext, noanonymous)
422              Postfix SMTP client SASL security options; as of Postfix 2.3 the
423              list  of available features depends on the SASL client implemen‐
424              tation that is selected with smtp_sasl_type.
425
426       Available in Postfix version 2.2 and later:
427
428       smtp_sasl_mechanism_filter (empty)
429              If non-empty, a Postfix SMTP client filter for the  remote  SMTP
430              server's list of offered SASL mechanisms.
431
432       Available in Postfix version 2.3 and later:
433
434       smtp_sender_dependent_authentication (no)
435              Enable  sender-dependent  authentication  in  the  Postfix  SMTP
436              client; this is available only  with  SASL  authentication,  and
437              disables  SMTP  connection caching to ensure that mail from dif‐
438              ferent senders will use the appropriate credentials.
439
440       smtp_sasl_path (empty)
441              Implementation-specific information that the Postfix SMTP client
442              passes  through  to  the SASL plug-in implementation that is se‐
443              lected with smtp_sasl_type.
444
445       smtp_sasl_type (cyrus)
446              The SASL plug-in type that the Postfix SMTP  client  should  use
447              for authentication.
448
449       Available in Postfix version 2.5 and later:
450
451       smtp_sasl_auth_cache_name (empty)
452              An  optional table to prevent repeated SASL authentication fail‐
453              ures with the same remote SMTP  server  hostname,  username  and
454              password.
455
456       smtp_sasl_auth_cache_time (90d)
457              The  maximal age of an smtp_sasl_auth_cache_name entry before it
458              is removed.
459
460       smtp_sasl_auth_soft_bounce (yes)
461              When a remote SMTP server rejects a SASL authentication  request
462              with  a 535 reply code, defer mail delivery instead of returning
463              mail as undeliverable.
464
465       Available in Postfix version 2.9 and later:
466
467       smtp_send_dummy_mail_auth (no)
468              Whether or not to append the "AUTH=<>" option to the  MAIL  FROM
469              command in SASL-authenticated SMTP sessions.
470

STARTTLS SUPPORT CONTROLS

472       Detailed  information  about STARTTLS configuration may be found in the
473       TLS_README document.
474
475       smtp_tls_security_level (empty)
476              The default SMTP TLS security level for the Postfix SMTP client;
477              when a non-empty value is specified, this overrides the obsolete
478              parameters  smtp_use_tls,  smtp_enforce_tls,  and   smtp_tls_en‐
479              force_peername.
480
481       smtp_sasl_tls_security_options ($smtp_sasl_security_options)
482              The  SASL  authentication security options that the Postfix SMTP
483              client uses for TLS encrypted SMTP sessions.
484
485       smtp_starttls_timeout (300s)
486              Time limit for Postfix SMTP client  write  and  read  operations
487              during TLS startup and shutdown handshake procedures.
488
489       smtp_tls_CAfile (empty)
490              A  file  containing  CA certificates of root CAs trusted to sign
491              either remote SMTP server certificates or intermediate  CA  cer‐
492              tificates.
493
494       smtp_tls_CApath (empty)
495              Directory  with  PEM format Certification Authority certificates
496              that the Postfix SMTP client uses to verify a remote SMTP server
497              certificate.
498
499       smtp_tls_cert_file (empty)
500              File with the Postfix SMTP client RSA certificate in PEM format.
501
502       smtp_tls_mandatory_ciphers (medium)
503              The  minimum  TLS cipher grade that the Postfix SMTP client will
504              use with mandatory TLS encryption.
505
506       smtp_tls_exclude_ciphers (empty)
507              List of ciphers or cipher types to exclude from the Postfix SMTP
508              client cipher list at all TLS security levels.
509
510       smtp_tls_mandatory_exclude_ciphers (empty)
511              Additional  list  of ciphers or cipher types to exclude from the
512              Postfix SMTP client cipher list at mandatory TLS  security  lev‐
513              els.
514
515       smtp_tls_dcert_file (empty)
516              File with the Postfix SMTP client DSA certificate in PEM format.
517
518       smtp_tls_dkey_file ($smtp_tls_dcert_file)
519              File with the Postfix SMTP client DSA private key in PEM format.
520
521       smtp_tls_key_file ($smtp_tls_cert_file)
522              File with the Postfix SMTP client RSA private key in PEM format.
523
524       smtp_tls_loglevel (0)
525              Enable additional Postfix SMTP client logging of TLS activity.
526
527       smtp_tls_note_starttls_offer (no)
528              Log  the  hostname of a remote SMTP server that offers STARTTLS,
529              when TLS is not already enabled for that server.
530
531       smtp_tls_policy_maps (empty)
532              Optional lookup tables with the Postfix SMTP client TLS security
533              policy by next-hop destination; when a non-empty value is speci‐
534              fied, this overrides the obsolete smtp_tls_per_site parameter.
535
536       smtp_tls_mandatory_protocols (see 'postconf -d' output)
537              TLS protocols that the Postfix SMTP client will use with  manda‐
538              tory TLS encryption.
539
540       smtp_tls_scert_verifydepth (9)
541              The verification depth for remote SMTP server certificates.
542
543       smtp_tls_secure_cert_match (nexthop, dot-nexthop)
544              How  the  Postfix  SMTP  client  verifies the server certificate
545              peername for the "secure" TLS security level.
546
547       smtp_tls_session_cache_database (empty)
548              Name of the file containing the optional Postfix SMTP client TLS
549              session cache.
550
551       smtp_tls_session_cache_timeout (3600s)
552              The expiration time of Postfix SMTP client TLS session cache in‐
553              formation.
554
555       smtp_tls_verify_cert_match (hostname)
556              How the Postfix SMTP  client  verifies  the  server  certificate
557              peername for the "verify" TLS security level.
558
559       tls_daemon_random_bytes (32)
560              The  number  of  pseudo-random bytes that an smtp(8) or smtpd(8)
561              process requests from the tlsmgr(8) server in order to seed  its
562              internal pseudo random number generator (PRNG).
563
564       tls_high_cipherlist (see 'postconf -d' output)
565              The OpenSSL cipherlist for "high" grade ciphers.
566
567       tls_medium_cipherlist (see 'postconf -d' output)
568              The OpenSSL cipherlist for "medium" or higher grade ciphers.
569
570       tls_low_cipherlist (see 'postconf -d' output)
571              The OpenSSL cipherlist for "low" or higher grade ciphers.
572
573       tls_export_cipherlist (see 'postconf -d' output)
574              The OpenSSL cipherlist for "export" or higher grade ciphers.
575
576       tls_null_cipherlist (eNULL:!aNULL)
577              The OpenSSL cipherlist for "NULL" grade ciphers that provide au‐
578              thentication without encryption.
579
580       Available in Postfix version 2.4 and later:
581
582       smtp_sasl_tls_verified_security_options    ($smtp_sasl_tls_security_op‐
583       tions)
584              The  SASL  authentication security options that the Postfix SMTP
585              client uses for TLS encrypted  SMTP  sessions  with  a  verified
586              server certificate.
587
588       Available in Postfix version 2.5 and later:
589
590       smtp_tls_fingerprint_cert_match (empty)
591              List  of  acceptable remote SMTP server certificate fingerprints
592              for  the  "fingerprint"  TLS  security   level   (smtp_tls_secu‐
593              rity_level = fingerprint).
594
595       smtp_tls_fingerprint_digest (see 'postconf -d' output)
596              The  message  digest  algorithm  used  to  construct remote SMTP
597              server certificate fingerprints.
598
599       Available in Postfix version 2.6 and later:
600
601       smtp_tls_protocols (see postconf -d output)
602              TLS protocols that the Postfix SMTP client will use with  oppor‐
603              tunistic TLS encryption.
604
605       smtp_tls_ciphers (medium)
606              The  minimum  TLS cipher grade that the Postfix SMTP client will
607              use with opportunistic TLS encryption.
608
609       smtp_tls_eccert_file (empty)
610              File with the Postfix SMTP client ECDSA certificate in PEM  for‐
611              mat.
612
613       smtp_tls_eckey_file ($smtp_tls_eccert_file)
614              File  with the Postfix SMTP client ECDSA private key in PEM for‐
615              mat.
616
617       Available in Postfix version 2.7 and later:
618
619       smtp_tls_block_early_mail_reply (no)
620              Try to detect a mail hijacking attack based on  a  TLS  protocol
621              vulnerability  (CVE-2009-3555), where an attacker prepends mali‐
622              cious HELO, MAIL, RCPT, DATA commands to a Postfix  SMTP  client
623              TLS session.
624
625       Available in Postfix version 2.8 and later:
626
627       tls_disable_workarounds (see 'postconf -d' output)
628              List or bit-mask of OpenSSL bug work-arounds to disable.
629
630       Available in Postfix version 2.11-3.1:
631
632       tls_dane_digest_agility (on)
633              Configure RFC7671 DANE TLSA digest algorithm agility.
634
635       tls_dane_trust_anchor_digest_enable (yes)
636              Enable support for RFC 6698 (DANE TLSA) DNS records that contain
637              digests of trust-anchors with certificate usage "2".
638
639       Available in Postfix version 2.11 and later:
640
641       smtp_tls_trust_anchor_file (empty)
642              Zero or more PEM-format  files  with  trust-anchor  certificates
643              and/or public keys.
644
645       smtp_tls_force_insecure_host_tlsa_lookup (no)
646              Lookup  the  associated  DANE TLSA RRset even when a hostname is
647              not an alias and its address records lie in an unsigned zone.
648
649       tlsmgr_service_name (tlsmgr)
650              The name of the tlsmgr(8) service entry in master.cf.
651
652       Available in Postfix version 3.0 and later:
653
654       smtp_tls_wrappermode (no)
655              Request that the Postfix SMTP client connects using  the  legacy
656              SMTPS protocol instead of using the STARTTLS command.
657
658       Available in Postfix version 3.1 and later:
659
660       smtp_tls_dane_insecure_mx_policy (see 'postconf -d' output)
661              The  TLS policy for MX hosts with "secure" TLSA records when the
662              nexthop destination security level is dane, but  the  MX  record
663              was found via an "insecure" MX lookup.
664
665       Available in Postfix version 3.4 and later:
666
667       smtp_tls_connection_reuse (no)
668              Try to make multiple deliveries per TLS-encrypted connection.
669
670       smtp_tls_chain_files (empty)
671              List  of one or more PEM files, each holding one or more private
672              keys directly followed by a corresponding certificate chain.
673
674       smtp_tls_servername (empty)
675              Optional name to send to the  remote  SMTP  server  in  the  TLS
676              Server Name Indication (SNI) extension.
677
678       Available in Postfix 3.5, 3.4.6, 3.3.5, 3.2.10, 3.1.13 and later:
679
680       tls_fast_shutdown_enable (yes)
681              A  workaround  for implementations that hang Postfix while shut‐
682              ting down a TLS session, until Postfix times out.
683

OBSOLETE STARTTLS CONTROLS

685       The following configuration parameters  exist  for  compatibility  with
686       Postfix versions before 2.3. Support for these will be removed in a fu‐
687       ture release.
688
689       smtp_use_tls (no)
690              Opportunistic mode: use TLS when a remote SMTP server  announces
691              STARTTLS support, otherwise send the mail in the clear.
692
693       smtp_enforce_tls (no)
694              Enforcement  mode:  require that remote SMTP servers use TLS en‐
695              cryption, and never send mail in the clear.
696
697       smtp_tls_enforce_peername (yes)
698              With mandatory TLS encryption,  require  that  the  remote  SMTP
699              server  hostname  matches  the  information  in  the remote SMTP
700              server certificate.
701
702       smtp_tls_per_site (empty)
703              Optional lookup tables with the Postfix SMTP  client  TLS  usage
704              policy  by  next-hop destination and by remote SMTP server host‐
705              name.
706
707       smtp_tls_cipherlist (empty)
708              Obsolete Postfix < 2.3 control for the Postfix SMTP  client  TLS
709              cipher list.
710

RESOURCE AND RATE CONTROLS

712       smtp_connect_timeout (30s)
713              The  Postfix SMTP client time limit for completing a TCP connec‐
714              tion, or zero (use the operating system built-in time limit).
715
716       smtp_helo_timeout (300s)
717              The Postfix SMTP client time limit for sending the HELO or  EHLO
718              command,  and  for  receiving the initial remote SMTP server re‐
719              sponse.
720
721       lmtp_lhlo_timeout (300s)
722              The Postfix LMTP client time limit for sending the LHLO command,
723              and for receiving the initial remote LMTP server response.
724
725       smtp_xforward_timeout (300s)
726              The Postfix SMTP client time limit for sending the XFORWARD com‐
727              mand, and for receiving the remote SMTP server response.
728
729       smtp_mail_timeout (300s)
730              The Postfix SMTP client time limit for  sending  the  MAIL  FROM
731              command, and for receiving the remote SMTP server response.
732
733       smtp_rcpt_timeout (300s)
734              The  Postfix SMTP client time limit for sending the SMTP RCPT TO
735              command, and for receiving the remote SMTP server response.
736
737       smtp_data_init_timeout (120s)
738              The Postfix SMTP client time limit for  sending  the  SMTP  DATA
739              command, and for receiving the remote SMTP server response.
740
741       smtp_data_xfer_timeout (180s)
742              The  Postfix SMTP client time limit for sending the SMTP message
743              content.
744
745       smtp_data_done_timeout (600s)
746              The Postfix SMTP client time limit for sending the SMTP ".", and
747              for receiving the remote SMTP server response.
748
749       smtp_quit_timeout (300s)
750              The Postfix SMTP client time limit for sending the QUIT command,
751              and for receiving the remote SMTP server response.
752
753       Available in Postfix version 2.1 and later:
754
755       smtp_mx_address_limit (5)
756              The maximal number of MX (mail exchanger) IP addresses that  can
757              result  from Postfix SMTP client mail exchanger lookups, or zero
758              (no limit).
759
760       smtp_mx_session_limit (2)
761              The maximal number of SMTP sessions per delivery request  before
762              the  Postfix SMTP client gives up or delivers to a fall-back re‐
763              lay host, or zero (no limit).
764
765       smtp_rset_timeout (20s)
766              The Postfix SMTP client time limit for sending the RSET command,
767              and for receiving the remote SMTP server response.
768
769       Available in Postfix version 2.2 and earlier:
770
771       lmtp_cache_connection (yes)
772              Keep  Postfix  LMTP  client connections open for up to $max_idle
773              seconds.
774
775       Available in Postfix version 2.2 and later:
776
777       smtp_connection_cache_destinations (empty)
778              Permanently enable SMTP connection  caching  for  the  specified
779              destinations.
780
781       smtp_connection_cache_on_demand (yes)
782              Temporarily  enable  SMTP connection caching while a destination
783              has a high volume of mail in the active queue.
784
785       smtp_connection_reuse_time_limit (300s)
786              The amount of time during which Postfix will use an SMTP connec‐
787              tion repeatedly.
788
789       smtp_connection_cache_time_limit (2s)
790              When SMTP connection caching is enabled, the amount of time that
791              an unused SMTP client socket is kept open before it is closed.
792
793       Available in Postfix version 2.3 and later:
794
795       connection_cache_protocol_timeout (5s)
796              Time limit for connection cache connect, send or receive  opera‐
797              tions.
798
799       Available in Postfix version 2.9 - 3.6:
800
801       smtp_per_record_deadline (no)
802              Change  the  behavior  of the smtp_*_timeout time limits, from a
803              time limit per read or write system call, to  a  time  limit  to
804              send  or  receive  a complete record (an SMTP command line, SMTP
805              response line, SMTP message content line, or TLS  protocol  mes‐
806              sage).
807
808       Available in Postfix version 2.11 and later:
809
810       smtp_connection_reuse_count_limit (0)
811              When  SMTP  connection  caching  is enabled, the number of times
812              that an SMTP session may be reused before it is closed, or  zero
813              (no limit).
814
815       Available in Postfix version 3.4 and later:
816
817       smtp_tls_connection_reuse (no)
818              Try to make multiple deliveries per TLS-encrypted connection.
819
820       Available in Postfix version 3.7 and later:
821
822       smtp_per_request_deadline (no)
823              Change  the  behavior  of the smtp_*_timeout time limits, from a
824              time limit per plaintext or TLS read or write call,  to  a  com‐
825              bined time limit for sending a complete SMTP request and for re‐
826              ceiving a complete SMTP response.
827
828       smtp_min_data_rate (500)
829              The minimum plaintext data transfer  rate  in  bytes/second  for
830              DATA  requests,  when  deadlines  are  enabled with smtp_per_re‐
831              quest_deadline.
832
833       Implemented in the qmgr(8) daemon:
834
835       transport_destination_concurrency_limit   ($default_destination_concur‐
836       rency_limit)
837              A  transport-specific  override for the default_destination_con‐
838              currency_limit parameter value, where transport is the master.cf
839              name of the message delivery transport.
840
841       transport_destination_recipient_limit     ($default_destination_recipi‐
842       ent_limit)
843              A transport-specific override for the default_destination_recip‐
844              ient_limit  parameter  value,  where  transport is the master.cf
845              name of the message delivery transport.
846

SMTPUTF8 CONTROLS

848       Preliminary SMTPUTF8 support is introduced with Postfix 3.0.
849
850       smtputf8_enable (yes)
851              Enable preliminary SMTPUTF8 support for the protocols  described
852              in RFC 6531..6533.
853
854       smtputf8_autodetect_classes (sendmail, verify)
855              Detect  that  a message requires SMTPUTF8 support for the speci‐
856              fied mail origin classes.
857
858       Available in Postfix version 3.2 and later:
859
860       enable_idna2003_compatibility (no)
861              Enable  'transitional'  compatibility   between   IDNA2003   and
862              IDNA2008,  when  converting UTF-8 domain names to/from the ASCII
863              form that is used for DNS lookups.
864

TROUBLE SHOOTING CONTROLS

866       debug_peer_level (2)
867              The increment in verbose logging level when a  nexthop  destina‐
868              tion,  remote client or server name or network address matches a
869              pattern given with the debug_peer_list parameter.
870
871       debug_peer_list (empty)
872              Optional list of nexthop destination, remote  client  or  server
873              name  or  network  address  patterns that, if matched, cause the
874              verbose logging level to increase by  the  amount  specified  in
875              $debug_peer_level.
876
877       error_notice_recipient (postmaster)
878              The  recipient  of  postmaster notifications about mail delivery
879              problems that are caused by policy, resource, software or proto‐
880              col errors.
881
882       internal_mail_filter_classes (empty)
883              What  categories  of  Postfix-generated  mail are subject to be‐
884              fore-queue    content    inspection    by     non_smtpd_milters,
885              header_checks and body_checks.
886
887       notify_classes (resource, software)
888              The list of error classes that are reported to the postmaster.
889

MISCELLANEOUS CONTROLS

891       best_mx_transport (empty)
892              Where  the  Postfix  SMTP client should deliver mail when it de‐
893              tects a "mail loops back to myself" error condition.
894
895       config_directory (see 'postconf -d' output)
896              The default location of the Postfix main.cf and  master.cf  con‐
897              figuration files.
898
899       daemon_timeout (18000s)
900              How  much time a Postfix daemon process may take to handle a re‐
901              quest before it is terminated by a built-in watchdog timer.
902
903       delay_logging_resolution_limit (2)
904              The maximal number of digits after the decimal point  when  log‐
905              ging sub-second delay values.
906
907       disable_dns_lookups (no)
908              Disable DNS lookups in the Postfix SMTP and LMTP clients.
909
910       inet_interfaces (all)
911              The  network  interface addresses that this mail system receives
912              mail on.
913
914       inet_protocols (see 'postconf -d output')
915              The Internet protocols Postfix will attempt to use  when  making
916              or accepting connections.
917
918       ipc_timeout (3600s)
919              The  time limit for sending or receiving information over an in‐
920              ternal communication channel.
921
922       lmtp_assume_final (no)
923              When a remote LMTP server announces no DSN support, assume  that
924              the  server performs final delivery, and send "delivered" deliv‐
925              ery status notifications instead of "relayed".
926
927       lmtp_tcp_port (24)
928              The default TCP port that the Postfix LMTP client connects to.
929
930       max_idle (100s)
931              The maximum amount of time that an idle Postfix  daemon  process
932              waits for an incoming connection before terminating voluntarily.
933
934       max_use (100)
935              The maximal number of incoming connections that a Postfix daemon
936              process will service before terminating voluntarily.
937
938       process_id (read-only)
939              The process ID of a Postfix command or daemon process.
940
941       process_name (read-only)
942              The process name of a Postfix command or daemon process.
943
944       proxy_interfaces (empty)
945              The network interface addresses that this mail  system  receives
946              mail on by way of a proxy or network address translation unit.
947
948       smtp_address_preference (any)
949              The address type ("ipv6", "ipv4" or "any") that the Postfix SMTP
950              client will try first, when a destination has IPv6 and IPv4  ad‐
951              dresses with equal MX preference.
952
953       smtp_bind_address (empty)
954              An  optional  numerical  network  address  that the Postfix SMTP
955              client should bind to when making an IPv4 connection.
956
957       smtp_bind_address6 (empty)
958              An optional numerical network  address  that  the  Postfix  SMTP
959              client should bind to when making an IPv6 connection.
960
961       smtp_helo_name ($myhostname)
962              The hostname to send in the SMTP HELO or EHLO command.
963
964       lmtp_lhlo_name ($myhostname)
965              The hostname to send in the LMTP LHLO command.
966
967       smtp_host_lookup (dns)
968              What mechanisms the Postfix SMTP client uses to look up a host's
969              IP address.
970
971       smtp_randomize_addresses (yes)
972              Randomize the order of equal-preference MX host addresses.
973
974       syslog_facility (mail)
975              The syslog facility of Postfix logging.
976
977       syslog_name (see 'postconf -d' output)
978              A prefix that  is  prepended  to  the  process  name  in  syslog
979              records, so that, for example, "smtpd" becomes "prefix/smtpd".
980
981       Available with Postfix 2.2 and earlier:
982
983       fallback_relay (empty)
984              Optional list of relay hosts for SMTP destinations that can't be
985              found or that are unreachable.
986
987       Available with Postfix 2.3 and later:
988
989       smtp_fallback_relay ($fallback_relay)
990              Optional list of relay hosts for SMTP destinations that can't be
991              found or that are unreachable.
992
993       Available with Postfix 3.0 and later:
994
995       smtp_address_verify_target (rcpt)
996              In  the context of email address verification, the SMTP protocol
997              stage that determines whether an email address is deliverable.
998
999       Available with Postfix 3.1 and later:
1000
1001       lmtp_fallback_relay (empty)
1002              Optional list of relay hosts for LMTP destinations that can't be
1003              found or that are unreachable.
1004
1005       Available with Postfix 3.2 and later:
1006
1007       smtp_tcp_port (smtp)
1008              The default TCP port that the Postfix SMTP client connects to.
1009
1010       Available in Postfix 3.3 and later:
1011
1012       service_name (read-only)
1013              The master.cf service name of a Postfix daemon process.
1014
1015       Available in Postfix 3.7 and later:
1016
1017       smtp_bind_address_enforce (no)
1018              Defer  delivery  when  the  Postfix SMTP client cannot apply the
1019              smtp_bind_address or smtp_bind_address6 setting.
1020

SEE ALSO

1022       generic(5), output address rewriting
1023       header_checks(5), message header content inspection
1024       body_checks(5), body parts content inspection
1025       qmgr(8), queue manager
1026       bounce(8), delivery status reports
1027       scache(8), connection cache server
1028       postconf(5), configuration parameters
1029       master(5), generic daemon options
1030       master(8), process manager
1031       tlsmgr(8), TLS session and PRNG management
1032       postlogd(8), Postfix logging
1033       syslogd(8), system logging
1034

README FILES

1036       Use "postconf readme_directory" or "postconf html_directory" to  locate
1037       this information.
1038       SASL_README, Postfix SASL howto
1039       TLS_README, Postfix STARTTLS howto
1040

LICENSE

1042       The Secure Mailer license must be distributed with this software.
1043

AUTHOR(S)

1045       Wietse Venema
1046       IBM T.J. Watson Research
1047       P.O. Box 704
1048       Yorktown Heights, NY 10598, USA
1049
1050       Wietse Venema
1051       Google, Inc.
1052       111 8th Avenue
1053       New York, NY 10011, USA
1054
1055       Command pipelining in cooperation with:
1056       Jon Ribbens
1057       Oaktree Internet Solutions Ltd.,
1058       Internet House,
1059       Canal Basin,
1060       Coventry,
1061       CV1 4LY, United Kingdom.
1062
1063       SASL support originally by:
1064       Till Franke
1065       SuSE Rhein/Main AG
1066       65760 Eschborn, Germany
1067
1068       TLS support originally by:
1069       Lutz Jaenicke
1070       BTU Cottbus
1071       Allgemeine Elektrotechnik
1072       Universitaetsplatz 3-4
1073       D-03044 Cottbus, Germany
1074
1075       Revised TLS and SMTP connection cache support by:
1076       Victor Duchovni
1077       Morgan Stanley
1078
1079
1080
1081                                                                       SMTP(8)
Impressum