smtp 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. .TH SMTP 8
  2. .SH NAME
  3. smtp, smtpd \- mail transport
  4. .SH SYNOPSIS
  5. .PP
  6. .B upas/smtp
  7. [
  8. .B -dfas
  9. ][
  10. .B -g
  11. .I gateway
  12. ][
  13. .B -h
  14. .I host
  15. ][
  16. .B -u
  17. .I user
  18. ][
  19. .I .domain
  20. ]
  21. .I destaddr
  22. .I sender
  23. .I rcpt-list
  24. .PP
  25. .B upas/smtpd
  26. [
  27. .B -dfr
  28. ][
  29. .B -n
  30. .I netdir
  31. ][
  32. .B -h
  33. .I mydom
  34. ][
  35. .B -k
  36. .I evilipaddr
  37. ][
  38. .B -c
  39. .I certfile
  40. ]
  41. .SH DESCRIPTION
  42. .PP
  43. .I Smtp
  44. sends the mail message from standard input
  45. to the users
  46. .I rcpt-list
  47. on the host at network address
  48. .I address
  49. using the Simple Mail Transfer Protocol.
  50. .The options are:
  51. .TP
  52. .B -d
  53. turn on debugging to standard error.
  54. .TP
  55. .B -a
  56. authenticate ourself to the server if the server
  57. supports PLAIN authentication and allows us to first
  58. start up an encrypted TLS connection
  59. .TP
  60. .B -s
  61. if the server supports the ESMTP extension to use TLS encryption, turn it on for
  62. this session. See RFC3207 for details.
  63. .TP
  64. .B -a
  65. if the server supports the ESMTP extension to use TLS encryption, turn it
  66. on. If the server also supports the PLAIN (user + password) authentication,
  67. authenticate to the server using a password from
  68. .IR factotum (4). See RFC's 3207 and 2554.
  69. .TP
  70. .B -u
  71. specify a user name to be used in authentication. The default name is
  72. the current login id.
  73. .TP
  74. .B -h
  75. use
  76. .I host
  77. as the local system name;
  78. it may be fully-qualified or not. If not
  79. specified, the local system name will be
  80. contents of the environment variable
  81. .BR site .
  82. If that isn't specified, it will be the contents of
  83. .BR /dev/sysname .
  84. .TP
  85. .B -f
  86. just filter the converted message to standard
  87. output rather than sending it.
  88. .TP
  89. .B -g
  90. makes
  91. .I gateway
  92. the system to pass the message to if smtp can't
  93. find an address or MX entry for the destination system.
  94. .PD
  95. .PP
  96. Finally if
  97. .I .domain
  98. is given, it is appended to the end of any unqaulified system names
  99. in the envelope or header.
  100. .PP
  101. .I Smtpd
  102. receives a message using the Simple Mail Transfer Protocol.
  103. Standard input and output are the protocol connection.
  104. SMTP authentication by
  105. .I login
  106. and
  107. .I cram-md5
  108. protocols is supported; authenticated connections are permitted to relay.
  109. .PP
  110. The options are:
  111. .TP 1.1i
  112. .B -d
  113. turns on debugging output to standard error.
  114. .TP
  115. .B -r
  116. turns on forward DNS validation of non-trusted sender address.
  117. .TP
  118. .B -f
  119. prevents relaying from non-trusted networks.
  120. It also tags messages from non-trusted sites when they deliver mail
  121. from an address in a domain we believe we represent.
  122. .TP
  123. .B -n
  124. specifies the name of the network directory assigned to the incoming connection.
  125. This is used to determine the peer IP address. If this flag is not
  126. specified, the peer address is determined using standard input.
  127. .TP
  128. .B -h
  129. specifies the receiving domain. If this flag is not specified, the
  130. receiving domain is inferred from the host name.
  131. .TP
  132. .B -s
  133. causes copies of blocked messages to be saved in a sub-directory of
  134. .BR /mail/queue.dump .
  135. .TP
  136. .B -k
  137. causes connections from the host at
  138. the IP address,
  139. .IR evilipaddr ,
  140. to be dropped at program startup. Multiple addresses
  141. can be specified with several
  142. .B -k
  143. options. This option should be used carefully;
  144. it is intended to lessen the effects of denial of
  145. service attacks or broken mailers which continually
  146. connect. The connections are not logged and the
  147. remote system is not notified via the protocol.
  148. .TP
  149. .B -c
  150. specifies a certificate to use for TLS. Without this
  151. option, the capability to start TLS will not be advertised.
  152. .TP
  153. .B -a
  154. requires that all clients authenticate to be able to send mail.
  155. .TP
  156. .B -p
  157. permits clients to authenticate using protocols which transfer
  158. the password in the clear, e.g.
  159. .I login
  160. protocol. This should only be used if the connection has
  161. previously encrypted using e.g.
  162. .IR tlssrv (8).
  163. .PP
  164. .I Smtpd
  165. is normally run by a network listener such as
  166. .IR listen (8).
  167. Most of the command line options are more conveniently
  168. specified in the smtpd configuration file stored in
  169. .BR /mail/lib/smtpd.conf .
  170. .SH FILES
  171. .SH SOURCE
  172. .TP
  173. .B /sys/src/cmd/upas/smtp
  174. .SH "SEE ALSO"
  175. .IR aliasmail (8),
  176. .IR faces (1),
  177. .IR filter (1),
  178. .IR mail (1),
  179. .IR marshal (1),
  180. .IR mlmgr (1),
  181. .IR nedmail (1),
  182. .IR qer (8),
  183. .IR rewrite (6),
  184. .IR send (8),
  185. .IR tlssrv (8),
  186. .IR upasfs (4)