tls_advertise_hosts = <; !127.0.0.1 ; !::1
+# Configured TLS cipher selection.
+
+tls_require_ciphers = <%= node[:ssl][:gnutls_ciphers] %>:%SERVER_PRECEDENCE
+
# Specify the location of the Exim server's TLS certificate and private key.
# The private key must not be encrypted (password protected). You can put
# the certificate and private key in the same file, in which case you only
# need the first setting, or in separate files, in which case you need both
# options.
+<% if node[:exim][:certificate_names] -%>
+tls_certificate = /etc/ssl/certs/<%= node[:exim][:certificate_names].first %>.pem
+tls_privatekey = /etc/ssl/private/<%= node[:exim][:certificate_names].first %>.key
+<% else -%>
tls_certificate = /etc/ssl/certs/exim.pem
tls_privatekey = /etc/ssl/private/exim.key
+<% end -%>
# In order to support roaming users who wish to send email from anywhere,
# you may want to make Exim listen on other ports as well as port 25, in
trusted_users = <%= node[:exim][:trusted_users].join(" : ") %>
+# Don't keep any environment when starting programs - this is the
+# default but setting it stops exim warning
+
+keep_environment =
+
+
######################################################################
# ACL CONFIGURATION #
# testing for an empty sending host field.
accept hosts = :
-<% if node[:lsb][:release].to_i >= 10.04 -%>
control = dkim_disable_verify
-<% end -%>
#############################################################################
# The following section of the ACL is concerned with local parts that contain
deny message = Restricted characters in address
domains = !+local_domains
- local_parts = ^[./|] : ^.*[@%!] : ^.*/\\.\\./
+ local_parts = ^[./|] : ^.*[@!] : ^.*/\\.\\./
#############################################################################
+ # Block bounces to selected addresses
+
+ deny local_parts = root:postmaster:webmaster:abuse:support
+ senders = :
+
+ # Block blacklisted senders
+
+ deny senders = lsearch*@;/etc/exim4/blocked-senders
+ message = Rejected because $sender_address is blacklisted\nQueries to postmaster@$qualify_domain
+ !hosts = +relay_from_hosts
+
# Accept mail to postmaster in any local domain, regardless of the source,
# and without verifying the sender.
deny !hosts = +relay_from_hosts
!verify = sender
- deny !hosts = +relay_from_hosts
- !senders = lsearch*@;/etc/exim4/callout_exempt_senders
- !verify = sender/callout/defer_ok
-
# Accept if the message comes from one of the hosts for which we are an
# outgoing relay. It is assumed that such hosts are most likely to be MUAs,
# so we set control=submission to make Exim treat the message as a
accept hosts = +relay_from_hosts
control = submission
-<% if node[:lsb][:release].to_i >= 10.04 -%>
control = dkim_disable_verify
-<% end -%>
# Accept if the message arrived over an authenticated connection, from
# any host. Again, these messages are usually from MUAs, so recipient
accept authenticated = *
control = submission
-<% if node[:lsb][:release].to_i >= 10.04 -%>
control = dkim_disable_verify
-<% end -%>
# Insist that any other recipient address that we accept is either in one of
# our local domains, or is in a domain for which we explicitly allow
# Deny if the message contains a virus. Before enabling this check, you
# must install a virus scanner and set the av_scanner option above.
#
- deny demime = *
- malware = *
- message = This message contains a virus ($malware_name).
+ deny malware = *
+ message = This message was detected as possible malware ($malware_name).
<% end -%>
<% if File.exist?("/var/run/spamd.pid") -%>
message = This message scored $spam_score SpamAssassin points.
<% end -%>
+ # Deny spammy messages with headers of the form:
+ # X-PHP-Originating-Script: <digits>:<name>.php
+ # X-PHP-Originating-Script: <digits>:<name>.class.php
+ deny condition = ${if match {$h_X-PHP-Originating-Script:}{^[0-9]+:[A-Za-z]+(\\.class)?\\.php\$}}
+ !hosts = +relay_from_hosts
+ message = This message failed local spam checks.
+
# Accept the message.
accept
system_aliases:
driver = redirect
- domains = +local_domains
+ domains = !noreply.openstreetmap.org : +local_domains
allow_fail
allow_defer
data = ${lookup{$local_part}lsearch{/etc/aliases}}
remote_smtp:
driver = smtp
+ multi_domain = false
+ tls_require_ciphers = <%= node[:ssl][:gnutls_ciphers] %>:%LATEST_RECORD_VERSION
# This transport is used for handling pipe deliveries generated by alias or
driver = pipe
command = <%= details[:command] %>
home_directory = <%= details[:home_directory] %>
- return_output
+ path = <%= details[:path] || "/bin:/usr/bin" %>
+<% if details[:environment] -%>
+ environment = <%= details[:environment].map { |k,v| "#{k}=#{v}" }.join(":") %>
+<% end -%>
+ return_fail_output
<% else -%>
driver = appendfile
<% if details[:file] -%>
# There are no rewriting specifications in this default configuration file.
begin rewrite
+*@<%= node[:fqdn] %> "${if !match {${lookup{$1}lsearch{/etc/aliases}{$value}}}{@} {$1@openstreetmap.org}fail}" Eh
+<% node[:exim][:rewrites].each do |rewrite| -%>
+<%= rewrite[:pattern] %> <%= rewrite[:replacement] %> <%= rewrite[:flags] %>
+<% end -%>