SEMrush
exim.org

Please wait for loading...




    SEMrush

      (545):

    /
     1  ~ 2014 sep 18eximExim Internet MailerExim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. ‎Documentation - ‎Download - ‎Wiki - ‎Credits
     1  ~ 2014 sep 18exim mysqlChapter 9 - File and database lookups - EximExim can be configured to look up data in files or databases as it processes messages. ..... mysql : The format of the query is an SQL statement that is passed to a ...
     1  +1 2014 sep 07setting up exim on freebsd4. Building and installing EximEven if you do not use any DBM files in your configuration, Exim still needs a DBM
     1  ~ 2014 sep 06exim mail log51. Log files - EximThe main log records the arrival of each message and each delivery in a single line ... A Perl script called eximstats , which does simple analysis of main log files,  ...
     1  ~ 2014 aug 13exim log report52. Exim utilities52.7, eximstats , extract statistics from the log .... it is possible for eximstats to report more messages received than delivered, even though the queue is empty at ...
     1  ~ 2014 aug 12exim mail serverYou may wish to purchase The Exim SMTP Mail Server book, written by the original author of Exim, Philip Hazel. The table of contents, and a sample chapter  ... ‎Documentation - ‎Download - ‎Wiki - ‎Credits
     1  +2 2014 jul 16bes with exim[ exim -dev] [Bug 1469] Bruteforce logentry does show base64 You are receiving this mail because: ------- You are on the CC list for the bug. http: //bugs. exim .org/show_bug.cgi?id=1469 bes < bes .internal@?
     2  +2 2014 sep 25use rbl blockingHOWTO - Using DNS Block Lists (DNSBLs) - EximHOWTO - Using DNS Block Lists (DNSBLs). The MAPS (Mail Abuse Protection System) RBL (Realtime Blackhole List) was the first application of a way of using  ...
     2  ~ 2014 sep 16testing mail flow with eximExim Specification - Other policy controls on incoming mailExim provides a number of facilities for controlling incoming mail from remote hosts, ... At the start of an SMTP connection, a check on the remote host is made, leading to .... The normal flow of control is vertically down the left-hand set of boxes.
     2  -1 2014 sep 15path for exim logA Perl script called eximstats , which does simple analysis of main log files, ... A log file path may also contain %D or %M if datestamped log file names are in use  ...
     2  -1 2014 sep 03exim log path
     2  ~ 2014 jul 28encrypt exim messagesChapter 41 - Encrypted SMTP connections using TLS/SSL - EximYou also need to understand the basic concepts of encryption at a managerial level, and in ..... Multiple messages on the same encrypted TCP/IP connection.
     3  -1 2014 sep 13exim on plesk[ exim ] Exim and PleskHi, I have a virtual server hosting a private domain. The virtual server comes with web-based server management s/w called Plesk , and qmail.
     3  ~ 2014 sep 11quantifier typo[Pcre-svn] [1462] code/trunk: Fix typo that caused max/ min To: pcre-svn. Subject: [Pcre-svn] [1462] code/trunk: Fix typo that caused max/ min quantifiers in ungreedy mode not to work. Revision: 1462
     3  ~ 2014 sep 08exim not start13. Starting the daemon and the use of network interfaces - EximIn addition, TCP/IP software supports “loopback” interfaces (127.0.0.1 in IPv4 and ::1 in IPv6), which do not use any physical hardware. Exim requires knowledge ...
     3  ~ 2014 aug 29why exim checks accounts5. The Exim command lineFor a trusted user, there is never any check on the contents of the From: header ..... This prevents someone who has broken into the Exim account from running a  ...
     4  -1 2014 sep 30what is eximExim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet.
     4  -1 2014 jul 28checking exim for bounces48. Customizing bounce and warning messages - EximChapter 48 - Customizing bounce and warning messages. When a ... to all warning and bounce messages, ... Exim does not check the syntax of these headers.
     6  +11 2014 sep 24liste dns rentabiliwebRe: [exim] Exim bounce message content similar to postfix bounceHi everyone, I work for Rentabiliweb , french web company. > > I've one question, ... Remote-MTA: dns ; $host > Diagnostic-Code: smtp; > ****
     6  +2 2014 sep 08hosts route domain20. The manualroute router - EximIt is mainly used when you want to route addresses to remote hosts according ... The manualroute router compares a list of domain patterns with the domain it is ...
     6  +15 2014 aug 29smtp id password33. SMTP authentication - EximThe seventh authenticator supports Microsoft's Secure Password ... support two different identifiers for accounts: the authentication id and the authorization id .
     6  ~ 2014 aug 21fined cool domain names10. Domain , host, address, and local part lists - EximIf an item in a domain , host, address, or local part list is an absolute file name ( beginning with a slash character), each line of the file is read and processed as if it ...
     6  +1 2014 jul 25sender address verificationExim Specification - 45. Verification of incoming mailVerification failures can cause the message to be rejected, or they can just be logged. ... A host name that is obtained from looking up the sender's IP address is  ...
     7  +94 2014 sep 26whose address starts with10. Domain, host, address , and local part lists - EximFor example, the hold_domains option contains a list of domains whose .... The four kinds of named list are created by configuration lines starting with the words  ...
     7  +2 2014 sep 19vérifier email routage3. How Exim receives and delivers mailSee chapter 22 (about the redirect router ) for the configuration needed to support this, ..... When an address is being verified, the routers are run in “ verify mode”.
     7  -5 2014 sep 13path for exim mailogThe main log records the arrival of each message and each delivery in a .... A log file path may also contain %D or %M if datestamped log file names are in use ...
     7  -3 2014 sep 08exim queue managementConsequently, Exim does not maintain independent queues of messages for specific domains or hosts, though it does try to send several messages in a single  ...
     7  -1 2014 sep 07configuring exim relay in freebsd7. The default configuration file - EximThe first three non-comment configuration lines are as follows: domainlist local_domains = @ domainlist relay_to_domains = hostlist relay_from_hosts = 127.0.
     8  +1 2014 sep 11starttls is not available41. Encrypted SMTP connections using TLS /SSL - EximThere is no cryptographic code in the Exim distribution itself for implementing TLS . In order to use this feature you must install OpenSSL or GnuTLS, and then ...
     8  +35 2014 aug 16chapter in doc files9. File and database lookups - EximExim can be configured to look up data in files or databases as it processes messages. ... See chapter 11, where string expansions are described in detail.
     9  -1 2014 sep 23auth smtpThe “authenticators” section of Exim's run time configuration is concerned with SMTP authentication . This facility is an extension to the SMTP protocol, described  ...
     9  -4 2014 sep 05constructzero autoresponse27. The autoreply transport - EximInstead, it generates a new mail message as an automatic reply to the
     9  +9 2014 aug 23blocking hosts directadminThe MAPS (Mail Abuse Protection System) RBL (Realtime Blackhole List) was the first application of a way of using a DNS list as a means of identifying hosts  ...
     9  ~ 2014 aug 13mail transfer agentSpecification of the Exim Mail Transfer AgentSpecification of the Exim Mail. Transfer Agent. Exim Maintainers. Page 2. Specification of the Exim Mail Transfer Agent .... How Exim receives and delivers mail .
     10  -1 2014 sep 15smtp over tlsYou need to turn off SMTP scanning for these products in order to get TLS to ... by this option apply to all SMTP connections, both via the daemon and via inetd.
     10  +1 2014 sep 11acl reached42. Access control lists - EximYou can have as many lists as you like in the ACL section, and the order in which ... of batched SMTP input, it runs after the DATA command has been reached .
     10  -1 2014 aug 21mask domain listFor example, the hold_domains option contains a list of domains whose delivery is ..... If the pattern is an IP address followed by a slash and a mask length (for ...
     10  -1 2014 aug 11how to rewrite emails31. Address rewriting - EximAt the start of an ACL for MAIL , the sender address may have been rewritten by a special SMTP-time rewrite rule (see section 31.9), but no ordinary rewrite rules ...
     10  -2 2014 aug 02exim logs deleteExim writes three different logs , referred to as the main log , the reject log , and the
     11  -2 2014 sep 30smtp tlsWarning: Certain types of firewall and certain anti-virus products can disrupt TLS connections. You need to turn off SMTP scanning for these products in order to ...
     11  +7 2014 sep 10check outhoing email spamassianRe: [exim] Spamassassin with Exim for filtering outgoing mails... tried spamassassin with exim exim for checking outgoing mails? ... Some may scoff at the higher spam score allowed for outbound mail .
     11  +2 2014 aug 22style check domain formIf a positive item is matched, the subject that is being checked is in the set; if a
     11  ~ 2014 aug 06service exim restartExim's command line takes the standard Unix form of a sequence of options, each .... using, you must exit and restart Exim before trying the same lookup again.
     12  -2 2014 aug 09rbl check hostThe MAPS (Mail Abuse Protection System) RBL (Realtime Blackhole List) was the ... a means of identifying hosts that have been associated with the sending of spam mail. ... x a DNSBL lookup can be used in any of the incoming SMTP ACLs.
     12  -4 2014 jul 27mail delivery softwareSubject: Warning: message $message_exim_id delayed $warn_message_delay **** This message was created automatically by mail delivery software .
     13  -3 2014 sep 29rbl listThe MAPS (Mail Abuse Protection System) RBL ( Realtime Blackhole List ) was the first application of a way of using a DNS list as a means of identifying hosts ...
     13  +3 2014 sep 20group mail 5 manual5 . The Exim command lineThe -bp option requests a listing of the contents of the mail queue on the
     13  +12 2014 sep 06local domain searchIf an item in a domain , host, address, or local part list is an absolute file name .... The MX lookup that takes place when matching a pattern of this type is ...
     13  ~ 2014 aug 31chapter view doc formatThe format is as compact as possible, in an attempt to keep down the size of log .... For those that do not, a utility script called exicyclog is provided ( see section  ...
     13  +66 2014 aug 09email sender verificationThere are a number of options that cause Exim to verify the semantic validity ... The sender verification check is performed when the MAIL command is received.
     13  +5 2014 jul 30email domain listA number of Exim configuration options contain lists of domains , hosts, email addresses, or local parts. For example, the hold_domains option contains a list of  ...
     14  -1 2014 sep 25routage mailSee chapter 22 (about the redirect router ) for the configuration needed to support this, and the separate document entitled Exim's interfaces to mail filtering for ...
     14  +27 2014 sep 15daemon max matches14. Main configuration - Eximqueue_run_max, maximum simultaneous queue runners ..... This “ magic string” matches the domain literal form of all the local host's IP addresses.
     14  ~ 2014 jul 22zimbra e-mail dresdenRe: [exim] rewrite aliasesI have a installation with Zimbra as the main-mailserver. It runs LDAP and knows all users (by e - mail -address) and all aliases. I also have ... Best regards from Dresden /Germany Viele Grüße aus Dresden Heiko Schlittermann ...
     15  +16 2014 sep 25$domain
     15  +7 2014 aug 23smtp auth supportIf you are setting up a client, and want to know which authentication mechanisms the server supports , you can use Telnet to connect to port 25 (the SMTP port) ...
     15  +6 2014 aug 17email address patternsEach item in one of these lists is a pattern to be matched against a domain, host, email address , or local part, respectively. In the sections below, the different ...
     15  +8 2014 aug 16encrypted connections only41. Encrypted SMTP connections using TLS/SSL - EximRFC 3207 defines how SMTP connections can make use of encryption . Once a ... The tls_dh_min_bits SMTP transport option is only honoured by GnuTLS.
     15  +1 2014 aug 09smtp auth loginSMTP authentication is not of relevance to the transfer of mail between servers ... the PLAIN authentication mechanism (RFC 2595) or the LOGIN mechanism, ...
     16  +10 2014 oct 01ultimate mailing list verification keyExim Specification - Table of Contents6.1 Single- key lookup types · 6.2 An lsearch file is not an item list
     16  -4 2014 sep 10cram md535. The cram_md5 authenticator - EximThe CRAM - MD5 authentication mechanism is described in RFC 2195. The server sends a challenge string to the client, and the response consists of a user  ...
     16  +85 2014 aug 03scan for spam43. Content scanning at ACL time - EximIt is also possible to scan the content of messages at other times. .... The spam ACL condition calls SpamAssassin's spamd daemon to get a spam score and a ...
     17  -5 2014 sep 28restart exim ssh
     17  +9 2014 sep 22mx lookup17. The dnslookup router - EximIn the case of an SRV lookup, this means that the router proceeds to look for MX records; in the case of an MX lookup , it proceeds to look for A or AAAA records, ...
     17  -3 2014 sep 14how to change exim ipWhen Exim is routing an address, it needs to know which IP addresses are ... When IPv6 addresses are involved, it is usually best to change the separator to ...
     17  +20 2014 sep 02dkim how to implement56. Support for DKIM (DomainKeys Identified Mail) - EximExim's DKIM implementation allows to. Sign outgoing messages: This function is implemented in the SMTP transport. It can co-exist with all other Exim features ...
     18  +6 2014 sep 30smtp telnet authIf you are setting up a client, and want to know which authentication mechanisms the server supports, you can use Telnet to connect to port 25 (the SMTP port) ...
     18  -2 2014 sep 27encrypted connectionRFC 3207 defines how SMTP connections can make use of encryption . Once a connection is established, the client issues a STARTTLS command. If the server ...
     18  +83 2014 sep 26c builder tperlregexRe: [pcre-dev] Compiling a PCRE 8.32 library file for use with C++ How to build the PCRE 8.32 library for C++ Builder 2007 (CB2007) and higher. Is there any ... class which contain a version of TPerlRegEx .
     18  +3 2014 sep 26maİl serverThere is a great deal of flexibility in the way mail can be routed, and there are ... You may wish to purchase The Exim SMTP Mail Server book, written by the ...
     18  +3 2014 sep 03dns lookup errorThe dnslookup router looks up the hosts that handle mail for the recipient's domain in the ... Some mis-behaving servers return a DNS error or timeout when a ...
     18  -7 2014 aug 25exim whitelist ipChapter 10 - Domain, host, address, and local part lists - EximThis provides a list of domains that depends only on the sending host's IP address ..... be used with care, probably only in non-critical host lists such as whitelists .
     18  +32 2014 aug 18realtime blackhole list
     18  -6 2014 aug 08smtp auth plainSMTP authentication is not of relevance to the transfer of mail between servers ... The sixth can be configured to support the PLAIN authentication mechanism ...
     18  +1 2014 jul 25smtp authentication optionsSMTP authentication is not of relevance to the transfer of mail between servers ... use of the AUTH option on the MAIL command to pass an authenticated sender ...
     18  -11 2014 jul 17mailjet exim howto34. The plaintext authenticator - EximFor compatibility with previous releases of Exim , the values are also placed in the .... This is an example of a client configuration that implements the PLAIN ...
     18  +6 2014 jul 17access control listsAccess Control Lists (ACLs) are defined in a separate section of the run time configuration file, headed by “begin acl ”. Each ACL definition starts with a name,  ...
     19  -3 2014 sep 26change the exim ip
     19  +17 2014 aug 31open source mailer
     19  +50 2014 jul 28auth smtp accountSMTP authentication is not of relevance to the transfer of mail between .... presented by a server to a client to help it select an account and credentials to use.
     20  +2 2014 oct 04dkim exim cpanelThe majority of ACLs are used to control Exim's behaviour when it receives .... The acl_smtp_dkim ACL is available only when Exim is compiled with DKIM  ...
     20  +21 2014 aug 21shell email pipingExim Filter Specification - The pipe commandpipe <command> e.g. pipe "$home/bin/countmail $sender_address"
     20  +16 2014 jul 29encrypted mail serverRFC 3207 defines how SMTP connections can make use of encryption . Once a connection is established, the client issues a STARTTLS command. If the server ...
     21  +15 2014 sep 19whm telnet
     21  +1 2014 aug 14email list separator10. Domain, host, address, and local part lists - EximA number of Exim configuration options contain lists of domains, hosts, email ... By default, colon is the separator character, but this can be varied if necessary.
     21  +18 2014 jul 31routing without a routerHowever, if more than one mail address is routed by the same router to the ... are automatically given the same routing without processing them independently.
     21  ~ 2014 jul 30sender verify failed batA host name that is obtained from looking up the sender's IP address is placed in the $ sender_host_name variable. If no lookup was done, or if the lookup failed , ...
     21  +36 2014 jul 29smtp connection outboundRFC 3207 defines how SMTP connections can make use of encryption. Once a connection is established, the client issues a STARTTLS command. If the server ...
     22  +5 2014 sep 14iplookup19. The iplookup router - EximThe iplookup router was written to fulfil a specific requirement in Cambridge University (which in fact no longer exists). For this reason, it is not included in the  ...
     22  -3 2014 aug 12envelope sender addressUnqualified envelope addresses are accepted only for locally submitted ... The outgoing envelope sender can be rewritten by means of the return_path transport  ...
     22  -2 2014 jul 31sender verification callouts40. The spa authenticator - EximChapter 40 - The spa authenticator. The spa authenticator provides client support for Microsoft's Secure Password Authentication mechanism, which is also ...
     22  -6 2014 jul 26exim server load monitoringIn order to use this feature you must install OpenSSL or GnuTLS, and then build a ... If the server accepts this, the client and the server negotiate an encryption ...
     23  +1 2014 sep 22dnslookupThe dnslookup router looks up the hosts that handle mail for the recipient's domain in the DNS. A transport must always be set for this router, unless verify_only ...
     23  +7 2014 sep 13mail server
     23  +78 2014 sep 05sample auto reply messageThe autoreply transport is usually run as the result of mail filtering, a “vacation” message being the standard example . However, it can also be run directly from a  ...
     23  -11 2014 aug 10database look upExim can be configured to look up data in files or databases as it processes messages. ... The query-style type accepts a generalized database query.
     23  +59 2014 jul 26mister domain server virtualiAn example of how this lookup can be used to support virtual domains is given in section
     24  +1 2014 oct 03test rewrite rulesThe main rewriting rules that appear in the “rewrite” section of the .... At the present time, there is no equivalent way of testing rewriting rules that are set for a  ...
     24  -5 2014 aug 28gnutls vs openssl2. OpenSSL vs GnuTLS . The first TLS support in Exim was implemented using OpenSSL . Support for GnuTLS followed later, when the first versions of GnuTLS  ...
     24  -13 2014 aug 25smtp ssl port41. Encrypted SMTP connections using TLS/ SSL - EximSupport for TLS (Transport Layer Security), formerly known as SSL ( Secure Sockets ... Early implementations of encrypted SMTP used a different TCP port from ...
    1 2 of 6 pages    




    SEMrush