3 ### Transmission to remote hosts for distorted.org.uk Exim configuration.
5 ### (c) 2012 Mark Wooding
8 ###----- Licensing notice ---------------------------------------------------
10 ### This program is free software; you can redistribute it and/or modify
11 ### it under the terms of the GNU General Public License as published by
12 ### the Free Software Foundation; either version 2 of the License, or
13 ### (at your option) any later version.
15 ### This program is distributed in the hope that it will be useful,
16 ### but WITHOUT ANY WARRANTY; without even the implied warranty of
17 ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 ### GNU General Public License for more details.
20 ### You should have received a copy of the GNU General Public License
21 ### along with this program; if not, write to the Free Software Foundation,
22 ### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
24 ###--------------------------------------------------------------------------
25 ### Listen for incoming connections.
27 SECTION(global, daemon)m4_dnl
28 daemon_smtp_ports = CONF_smtp_port : CONF_submission_port
31 ###--------------------------------------------------------------------------
32 ### Check source addresses for apparently local senders.
34 SECTION(acl, mail-hooks)m4_dnl
35 ## Check that a submitted message's sender address is allowable.
36 require acl = mail_client_addr
38 SECTION(acl, misc)m4_dnl
41 ## If this is a message submission then that's handled elsewhere.
42 accept condition = ${if eq{$acl_c_mode}{submission}}
44 ## Make sure that the sender matches the client address. I feel like
45 ## I want to reject these, but that will break stuff. For example,
46 ## if I send mail to an externally hosted address which is really a
47 ## distribution list containing some local address, then we'll
48 ## (approximately legitimately) receive mail with an apparently-local
49 ## sender from a remote host.
50 warn !hosts = ${LOOKUP_DOMAIN($sender_address_domain,
51 {KV(hosts, {$value}{+allnets})},
52 {${if match_domain {$sender_address_domain} \
54 {+allnets}{! +allnets}}})}
55 ADD_HEADER(<:X-CONF_header_token-Warning: \
57 Apparently local sender, but received from remote \
59 sender=$sender_address \
60 host=$sender_host_address:>)
66 ###--------------------------------------------------------------------------
67 ### Rename locally-meaningful headers in mail from outside.
69 m4_define(<:DISTORTED_HEADERS:>,
70 <:X-CONF_header_token-Warning,
71 X-CONF_header_token-SpamAssassin-Score,
72 X-CONF_header_token-SpamAssassin-Status:>)
74 SECTION(acl, data)m4_dnl
75 ## If this message is coming from outside then rename headers which
76 ## look like the ones we're likely to add. This is most relevant for
77 ## our spam-report headers, because I'm not sure I understand why
78 ## someone would want to fake an X-Distorted-Warning header.
79 warn !condition = ${if eq{$acl_c_mode}{submission}}
81 set acl_m_hdradd = ${if def:acl_m_hdradd{$acl_m_hdradd}}\
82 RENAME_HEADERS_ADD(<:DISTORTED_HEADERS:>)
83 set acl_m_hdrrm = ${if def:acl_m_hdrrm{$acl_m_hdrrm:}}\
84 RENAME_HEADERS_REMOVE(<:DISTORTED_HEADERS:>)
87 ###--------------------------------------------------------------------------
88 ### The obvious trivial router.
90 SECTION(routers, remote)m4_dnl
91 ## Send mail on to a host in our own network. We must apply extra security.
94 domains = ${if bool {${LOOKUP_DOMAIN($domain,
95 {KV(service, {$value}{true})},
98 CONF_master_domain : \
99 *.CONF_master_domain }}
101 transport = smtp_local
104 ## Send mail on to unknown hosts.
107 domains = ${if bool {${LOOKUP_DOMAIN($domain,
108 {KV(service, {$value}{true})},
116 ###----- That's all, folks --------------------------------------------------