-
-
Notifications
You must be signed in to change notification settings - Fork 1
0 IndiMail Wiki
- INTRODUCTION
- LICENSING
- TERMINOLOGY used for commands
- indimail-mta Internals
- Setting Environment Variables
- IndiMail Queue Mechanism
- Using systemd to start IndiMail
- Eliminating Duplicate Emails during local delivery
- Using procmail with IndiMail
- Writing Filters for IndiMail
- SPAM and Virus Filtering
- IndiMail Delivery mechanism explained
- Controlling Delivery Rates
- Delivery Instructions for a virtual domain
- TURN Mechanisms
- Setting up TLS for SMTP (qmail-smtpd) and Remote Delivery (qmail-remote)
- Distributing your outgoing mails from Multiple IP addresses
- Handling Bounces
- Setting Disclaimers in your emails
- Email Archiving
- Envrules
- Domain Specific Queues
- indimail-mini / qmail-qmtpd / qmta Installation
- Using /usr/sbin/alternatives
- Post Handle Scripts
- Authenticated SMTP Mechanisms
- Relay Mechanism in IndiMail
- CHECKSENDER - Check Senders during SMTP
- CHECKRECIPIENT - Check Recipients during SMTP
- SMTP Access List
- IndiMail Control Files Formats
- indimail-mta Authentication Mechanisms
- Maildir Quotas
- Setting limits for your domain
- SPF implementation in IndiMail
- SRS implementation in IndiMail
- Greylisting in IndiMail
- Configuring dovecot as the IMAP/POP3 server
-
Configuring DKIM
- Create your DKIM signature
- Create your DNS records
- DKIM verification during SMTP
- DKIM verification during local delivery
- DKIM signing during SMTP
- DKIM signing, verification during remote,local delivery
- DKIM signing during mail injection
- DKIM Author Domain Signing Practices
- Testing outbound signatures
- DKIM signing for bounces
- iwebadmin – Web Administration of IndiMail
- Publishing statistics for IndiMail Server
- RoundCube Installation for IndiMail
- Setting up MySQL
- Using Docker Engine to Run IndiMail / IndiMail-MTA
- Taking Backups
- Installation & Repositories
- Support Information
- Features
- Current Compilation status of all IndiMail & related packages
- Performance / Benchmarks
- Credits
- History
- See also
Created by gh-md-toc
IndiMail is a messaging Platform comprising of multiple software packages including
- nssd - providing Name Service Switch
- pam-multi - PAM modules for flexible, configurable authentication methods
Core IndiMail consists of three main packages - indimail-mta, indimail-virtualdomains and indimail-access
- indimail-mta is a re-engineered version of qmail. indimail-mta provides you a MTA with all the features and functionality of qmail plus many additional features. indimail-mta is an independent package. You can install it without requiring indimail-virtualdomains or indimail-access.
- indimail-virtualdomains provides you tools to create and manage multiple virtual domains with its own set of users, who can send and receive mails. indimail-virtualdomains is dependent on indimail-mta to function.
- indimail-access provides you IMAP/POP3 protocols using courier-imap & mail retrieval using fetchmail program. It allows the users to access their emails delivered by indimail-mta locally on a host to users in /etc/passwd or to virtual users on a host (or multiple hosts) on the network having virtual domains created by indimail-virtualdomains. It is not a MUST that you have to install the indimail-access package. Since indimail-mta provides multiple authentication methods, protocols, PAM, NSS modules/plugins, you should be able to use your favourite IMAP/POP3 server with indimail. dovecot, courier-imap, RoundCubemail, SquirrelMail to name a few.
This document will refer to IndiMail as a combined package of indimail-virtualdomains, indimail-mta & other packages namely indimail-access, indimail-auth, indimail-utils, indimail-spamfilter. This is a reference document and mostly deals with the design of IndiMail. The setup and configuration examples, the usernames and passwords used are for demonstration purposes only. The setup and configuration is mostly automated if you install indimail using dnf, yum, apt-get, pkg. For source installation you can automate setup and configuration if you run the create_services(8) script after you complete the build in each of the source directories (see IndiMail Setup and Configuration. Almost all of the setup is done using a super script named svctool(8). create_services(8) script in fact calls svctool(8) with the necessary options.
The primary purpose of this document is to know indimail with intimate details while having fun trying out new commands. You will do well if you especially know how UNIX works. This is not a user guide and I suspect that the document will be incomprehensible for those who don't know UNIX and have been stuck their entire lives using GUIs surfing the web, creating documents, power point presentation for excel sheets. But if you are someone who knows what vt100, tvi955 means and not just the gnome-terminal, you will have some fun here.
When you install indimail-virtualdomains, a shared library from the package is dynamically loaded by indimail-mta to provide virtual domain support in indimail-mta, along with the ability to work with IMAP/POP3 retrieval daemons (provided by the indimail-access package). The shared library is a file named indimail.so and is placed in your system directory for shared libraries (/lib, /lib64, etc). The library allows one to use the standard C library functions to access user's home directory. This allows you to use any IMAP/POP3 retrieval daemons for accessing your local Maildirs. dovecot, courier-imap, RoundCubemail, SquirrelMail are few of the many IMAP/POP3 software that are being used by few users to access mails managed by indimail-virtualdomains. The indimail-access package is a fork of the courier-imap server optimized to work with daemontools, ucspi-tcp, indimail-mta and indimail-virtualdomains.
indimail-virtualdomains provides programs to manage multiple virtual domains on a single host. It allows extending any of the domains across multiple servers. With indimail-mta installed, two compoments - qmail-rspawn(8), qmail-remote(8) can act as an SMTP router/interceptor. Both the components use a MySQL database to know the location of each and every user. Similarly, the Mail Delivery Agent (MDA) vdelivermail(8) uses the same MySQL database, allowing it to re-route any email to any server where the user's mailbox is present. Additionally, indimail-virtualdomains provide proxyimap(8) and proxypop3(8) - proxies for IMAP and POP3 protocols, to retrieve the user's mailbox from any server. To deliver or retrieve any email, the user doesn't have to connect to any specific server. This is a very nifty feature which allows IndiMail to provide native horizontal scalability. It knows the location of each and every user and can distribute or retrieve mails for any user residing on any server located anywhere on the network. If one uses IndiMail, one can simply add one more server and cater to more users without changing any configuration, software or hardware of existing servers. To add a server is so easy. You setup a new server, copy a file named mcdinfo from an existing server, add an entry to the /etc/indimail/control/mcdinfo file and run the dbinfo(8) command and instantaly the new server becomes part of the existing cluster and all other hosts in the cluster become aware of the new server. To remove a server is also very easy. Just edit and remove entry for a host in /etc/indimail/control/mcdinfo file on any host and run the dbinfo(8) command.
Since the location of every user is known, the architecure does not force a filesystem architecture like NFS to be used for provisioning large number of users (typically in an ISP/MSP environment). In the architecture below, you can keep on increasing the number of servers (incoming relay, outgoing relay or mailstores) to cater to large number of users. This allows you to scale indimail easily to serve millions of users using commodity hardware. You can read the feature list to get an idea of the changes and new features that have been added over the original packages. You can see a pictorial representation of the architecture below
IndiMail allows servers to be distributed anywhere geographically. This is useful especially if you have users at different parts of the globe. e.g. Your Brazil users can have their server located in Brazil, Bombay users in Bombay, Delhi users in Delhi. And yet when your Brazil users comes to Delhi for a visit, he or she can access all emails sitting in Delhi by accessing the Delhi server. IndiMail provides this distributed feature using proxies for SMTP, IMAP and POP3 protocols. The proxy servers run using ucspi-tcp and are by default configured under supervise. You can use any IMAP/POP3 server behind the proxy. You can extend the domain across multiple servers without using any kind of NAS storage. Without something like indimail, to horizontally scale your email domain across multiple hosts, you will have to have your storage accessible on all hosts which do mail delivery or mail retrieval.
The ability of IndiMail to know user's location also allows IndiMail to setup a heterogeneous messaging environment. If you have IndiMail, you can have a server running MS exchange, few servers running IBM Lotus Notes, and few servers running IndiMail and all using a single domain. A utility called hostcntrl(8) allows you to add foreign users to IndiMail's database. This feature also allows you to migrate your users from a proprietary platform to IndiMail without causing downtime or disruption to existing users. In fact, this method has been used very successfully in migrating corporate users out of MS Exchange & IBM Lotus Notes to IndiMail without the end users realizing it.
To migrate from an existing proprietary mail server like MS Exchange requires 5 steps.
- You simply set up a new installation with IndiMail and create the existing domain using vadddomain(8).
- Add the IP address of the Exchange Server in host_table and the SMTP port of the Exchange Server in the table smtp_port.
- Add users on the exchange server to a table called hostcntrl (either manually or using the utility hostcntrl(8).
- Modify your user's mail configuration to use SMTP, IMAP Proxy, POP3 Proxy ports on the IndiMail server (proxypop3(8), proxyimap(8)).
- Change the MX to point to the indimail-mta server.
IndiMail is highly configurable. No hard-coded directories of qmail like /var/qmail/control or /var/qmail/queue. All directories are configurable using control files or at run time by setting environment variables. IndiMail has multiple queues and the queue destination directories are also configurable. You can have one IndiMail installation cater to multiple instances having different properties / configuration. To set up a new IndiMail instance requires you to just set few environment variables. Unlike qmail/netqmail, IndiMail doesn't force you to recompile each time you require a new instance. Multiple queues help you to distribute your IO load across multiple disks at software level. On older filesystems which have performance issues with large number of files in a single directory, the multi-queue property eliminates what is known as 'the silly qmail syndrome' and gives IndiMail the capability to perform better than a stock qmail installation. IndiMail's multiple queue architecture allows it to achieve tremendous inject rates using commodity hardware as can be read here. On a modern filesystem like EXT4, ZFS, BTRFS, XFS you can do good with just a single queue. You can see a pictorial representation of the queue as well as read the indimail-mta INTERNALS.
IndiMail is a pure messaging solution. It does not provide calendars, todo lists, address books, meeting requests and a web mail front-end. However, you can use RoundCubemail or any web mail front-end that works with IMAP or POP3 protocol with IndiMail. If you decide to install RoundCubemail, you can install the ircube package from the IndiMail's DNF/YUM/Debian Repository to have a fully functional web mail front-end. The ircube package provides plugins for Rouncube Mail to manage your passwords, vacation and SPAM filters.
IndiMail administrators can use a web administration tool called iwebadmin(1). It can be installed from source from here or from the DNF/YUM/Debian Repository on the openSUSE build Service.
IndiMail comes with a tcl/tk administration client called indium. It can be installed from source from here or from the DNF/YUM/Debian Repository on the openSUSE Build Service.
To install/configure IndiMail you can take the help of the following documents in the indimail-x/doc subdirectory of indimail-virtualdomains github repository. You can also jump to the section Installing Indimail using DNF/YUM/APT Repository towards the bottom of this document to install indimail without having to build and compile various components.
NOTE This file exceeds github's README size limit (also here). Click Here to access the full content of this wiki.
File | Description |
---|---|
README-indimail.md | Introduction to IndiMail (this file which is also available as the indimail/indimail-mta Wiki) |
INSTALL-indimail.md | Detailed Source Installation Instructions. A simpler version is this |
FAQ | Some quesions not answered by the wiki |
INSTALL-RPM.md | Install Instructions using RPM |
INSTALL-MYSQL.md | MySQL specific Installation Instructions |
README-CLUSTER.md | Steps on configuring a clustered setup |
Quick-INSTALL.md | A minimal documentation on Installation/Configuration |
Man Pages | Link to Man Pages for all General commands, administrative commands, file formats, APIs and Miscelleneous topics |
If you desire to do a full source installation and have enough experience on your belt, you can dive into this document.
Once you have installed IndiMail, you will find all man pages in /usr/share/man and documents in /usr/share/indimail/doc. To get started, you should read the man page for indimail-mta, indimail in section 7 of man pages. Additionally read the man pages for indimail-control and indimail-env to understand the control files and how you can use environment variables to configure IndiMail. The four documents below can help you understand IndiMail.
NOTE: Every command mentioned in this document is hyperlinked with the online version of the command's man page.
DISCLAIMER
There is no warranty implied or otherwise with this package. I believe in OpenSource Philosophy and this is an attempt to give back to the OpenSource community. I welcome anyone who can report bugs or provide some assistance for building few missing features (building new features, testing and documentation).
IndiMail uses GPLv3 License. See file LICENSE. Additional licenses (if any) may be found in subfolder of each component that IndiMail uses. If you need some other license for your use, let me know.
$ command - command was executed by a non-privileged user
# command - command was executed by the `root` user
$ sudo command - command requires root privilege to run. sudo was used to gain root privileges
Here's the data flow in the indimail-mta suite:
qmail-smtpd ----> qmail-queue, qmail-multi ---> todo-proc
/ or qmail-queue clients / \
qmail-inject _/ / \___ qmail-clean
__________________/
|
| .--> qmail-rspawn ---> qmail-remote
qmail-send -->.
.--> qmail-lspawn ---> qmail-local
As a minimum, you an go through the following online man pages - qmail-smtpd(8), qmail-inject(8), sendmail(1), qmail-queue(8), qmail-multi(8), qmail-queue-clients(7), qmail-internals(8), qmail-send(8), todo-proc, qmail-lspawn(8), qmail-local(8), qmail-rspawn(8), qmail-remote(8), dot-qmail(5), qmail-clean(8), qscheduler(8) and indimail-control(5).
The diagram below shows how qmail-multi(8) and qmail-queue(8) works
Every message is added to a central queue directory by qmail-queue(8). qmail-queue(8) is called by programs like qmail-smtpd(8), qmail-qmqpd(8), qmail-qmtpd(8), qmail-inject(8), sendmail(1) to submit messages to the queue. One can also use qmail-multi(8) to queue the message. The main purpose of qmail-multi(8) is to select a queue as discussed in IndiMail Queue Mechanism and run the message through a filter. Here is a pictorial representation of the IndiMail queue.
Every message is then pre-processed by todo-proc(8) and then processed by qmail-send(8) for delivery, in cooperation with qmail-lspawn(8), qmail-rspawn(8) and cleaned up by qmail-clean(8). These five programs are long-running daemons. The diagram also shows a separate queue named slowq. This queue is special. It is a single queue that has slowq-send(8) processing it instead of todo-proc(8), qmail-send(8) pair. This queue has a feature where the deliveries can be rate controlled. slowq-send(8) is like the orignal qmail's qmail-send(8) and unlike it, slowq-send(8) does both pre-processing and scheduling and is not as fast as qmail-send(8) and hence the name. However the queue slowq ain't a queue where we require speed, and so it is ok.
The queue is designed to be crash-proof, provided that the underlying filesystem is crash-proof. All cleanups are handled by qmail-send(8) and qmail-clean(8) without human intervention.
qmail-multi(8) is a frontend for qmail-queue(8). It selects one of the multiple queues, sets the environment variable QUEUEDIR and calls qmail-queue(8). It can additionally run the message through a filter before passing th emessage to qmail-queue(8). qmail-multi(8) is discussed in detail in IndiMail Queue Mechanism. In the current version of IndiMail, qmail-queue(8) can do what qmail-multi(8) does other than filter the message. So if one doesn't have any filter defined by FILTERARGS environment variable, qmail-multi(8) is not required.
indimail-mta has multiple queues. Each queue is represented by a number X, where X is the number 1, 2, upto N, where N is the total number of queues configured. Each message in any of these queues is identified by a unique number, let's say 3016451. This number is related to the inode number of file created in queueX/pid directory. More on that below. From now on, we will refer to 3016451 as inode The queue is organized into several directories, each of which may contain files related to message 3016451:
file | Description |
---|---|
queueX/mess/inode | the message |
queueX/todo/inode | the envelope: where the message came from, where it's going |
queueX/intd/inode | the envelope, under construction by qmail-queue(8) |
queueX/info/inode | the envelope sender address, after preprocessing |
queueX/local/inode | local envelope recipient addresses, after preprocessing |
queueX/remote/inode | remote envelope recipient addresses, after preprocessing |
queueX/bounce/inode | permanent delivery errors |
Here are all possible states for a message.
- + means a file exists
- - means it does not exist
- ? means it may or may not exist.
Message State | Possible states |
---|---|
S1 | -mess -intd -todo -info -local -remote -bounce |
S2 | +mess -intd -todo -info -local -remote -bounce |
S3 | +mess +intd -todo -info -local -remote -bounce |
S4 | +mess ?intd +todo ?info ?local ?remote -bounce (queued) |
S5 | +mess -intd -todo +info ?local ?remote ?bounce (preprocessed) |
Guarantee: If queueX/mess/inode exists, it has inode number inode.
qmail-queue(8)'s job is to accept a message from a client and submit it to the queue. It reads the message from file descriptor zero and the envelope from file descriptor one.
qmail-queue(8) adds a Received field to the message that looks like one of these
- Received: indimail-mta queue 37166 by host argos.indimail.org (invoked by alias); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta queue 37166 by host argos.indimail.org (invoked by uid 555); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta queue 37166 by host argos.indimail.org (invoked by uid xxx); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta queue 37166 by host argos.indimail.org (invoked from network ::1, by uid 1024); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta queue 37166 by host argos.indimail.org (invoked for bounce); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-virtual 37166 by host argos.indimail.org (invoked by uid 555); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta smtpd 37166 (HELO argos.indimail.org) ([email protected]@::1) by argos.indimail.org with ESMTPSA (TLSv1.3 TLS_AES_256_GCM_SHA384 bits=256); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta qmtpd 37166 (HELO argos.indimail.org) ([email protected]@::1) by argos.indimail.org with ESMTPSA (TLSv1.3 TLS_AES_256_GCM_SHA384 bits=256); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta qmqpd 37166 (HELO argos.indimail.org) ([email protected]@::1) by argos.indimail.org with ESMTPSA (TLSv1.3 TLS_AES_256_GCM_SHA384 bits=256); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta notify 37166 (HELO argos.indimail.org) ([email protected]@::1) by argos.indimail.org with ESMTPSA (TLSv1.3 TLS_AES_256_GCM_SHA384 bits=256); Fri, 21 Oct 2022 23:04:36 +0530
- Received: indimail-mta mini-smtpd 37166 (HELO argos.indimail.org) ([email protected]@::1) by argos.indimail.org with ESMTPSA (TLSv1.3 TLS_AES_256_GCM_SHA384 bits=256) ESMTPSA; Fri, 21 Oct 2022 23:04:36 +0530
where:
- 37166 is qmail-queue(8)'s process ID.
- invoked by alias means qmail-queue(8) was invoked by a process with uid of alias user. This will be through qmail-local(8) reading & processing a dot-qmail file
- invoked by uid xxx qmail-queue(8) was invoked by a process with uid of xxx. This will be through qmail-inject(8), sendmail(1) or any user run program that calls qmail-queue(8). The uid of the user is xxx. When the uid is 555, it will be delivery to a virtual domain address.
- invoked from network means qmail-queue(8) was invoked by user qmaild received from ::1. This means the mail was sent using SMTP by connecting to the IP ::1.
- invoked from bounce means that this was a bounce generated by qmail-send(8) running under uid qmails
- Received: indimail-virtual 37166 by host argos.indimail.org (invoked by uid 555). This is the Received line put by vdelivermail(8) delivering to a virtual domain address.
- Received: indimail-mta smtpd 37166 (HELO argos.indimail.org) ([email protected]@::1) by argos.indimail.org with ESMTPSA (TLSv1.3 TLS_AES_256_GCM_SHA384 bits=256) - This is the Received line put by qmail-smtpd(8) which tells the HELO argument was argos.indimail.org, using bits=256 channel with TLSv1.3 and TLS_AES_256_GCM_SHA384 cipher. Also this was an authenticated SMTP session using the account [email protected]
- Fri, 21 Oct 2022 23:04:36 +0530 is time and date (RFC 5322 format) at which qmail-queue(8) created the message.
NOTE: You can hide hosts/IP addresses in the Received headers by setting HIDE_HOST environment variable to any non-empty string. You may want to do that to hide your internal IP addresses and hosts.
qmail-queue(8) places a messages in the queue in four stages:
-
To add a message to the queue, qmail-queue(8) first creates a file in a separate directory, queueX/pid, with a unique name. The filesystem assigns that file a unique inode number. qmail-queue(8) looks at that number, say 3016451. By the guarantee above, message 3016451 must be in state S1.
-
The queueX/pid file is renamed to queueX/mess/split/inode, and the message is written to the file, moving to state S2. Here split is the remainder left from dividing inode number by the compile time conf-split value. For example, if inode is 3016451 and conf-split is the default, 151, then split is 75 (3016451 divided by 151 is 19976 which gives a remainder of (3016451 - 19976 * 151) = 75)
-
The file queueX/intd/inode is created and the envelope is written to it in the form
u1011\0p28966\[email protected]\[email protected]\[email protected]\0
It means the above message was sent by user [email protected] with uid 1011, process ID 28966 to two users [email protected], [email protected]. At this point, we have moved to state S3
-
queueX/todo/inode is linked to queueX/intd/inode, moving the state to S4. At this instant, message has been successfully queued for further classification into local or remoe delivery by todo-proc(8). After classification, todo-proc(8) communicates the inode number to qmail-send(8)for delivery.
At the moment queueX/todo/inode is created, the message has been queued. todo-proc(8) eventually (within 25 minutes) notices the new message, but to speed things up, qmail-queue(8) writes a single byte to lock/trigger, a named pipe that qmail-send(8) watches. When trigger contains readable data, qmail-send(8) is awakened, empties trigger, and scans the todo directory. If you are using slowq-send(8) the job of todo-proc(8) is done by slowq-send(8). If you are using qmta-send(8), the job of todo-proc(8) is done by qmta-send(8).
qmail-queue(8) starts a 24-hour timer before touching any files, and commits suicide if the timer expires.
Once a message is deposited in one of the indimail's queues, it will be sent by few programs working cooperatively. We will now look at qscheduler(8), qmail-start(8), qmail-send(8), qmail-lspawn(8), qmail-rspawn(8), qmail-local(8), and qmail-remote(8).
qscheduler(8) runs multiple instances of qmail-start(8) to invoke qmail-send(8), todo-proc(8), qmail-lspawn(8), qmail-rspawn(8), and qmail-clean(8) under the proper uids and gids for each of the multiple queues. The number of instances it runs is defined by the environment variable QUEUE_COUNT. For each instance the queue is defined by qscheduler(8) by setting the environment variable QUEUEDIR. A queue is defined by the integers defined by environment variables QUEUE_START and QUEUE_COUNT as described in section IndiMail Queue Mechanism. qscheduler(8) also monitors qmail-send(8) and todo-proc(8) and restart them if they go down. Apart from having a fixed number of queues defined by QUEUE_COUNT, qscheduler(8) can set the number of queues dynamically based on queue load. The dynamic queue option can be set by passing -d option to qscheduler(8)
qmail-start(8) runs todo-proc(8), qmail-send(8), qmail-lspawn(8), qmail-rspawn(8), and qmail-clean(8), under the proper uids and gids for a single queue. These five daemons cooperate to deliver messages from the queue. qmail-start(8) should be used if you desire to run only one queue. For running multiple parallel queues run qscheduler(8).
slowq-start(8) runs slowq-send(8), qmail-lspawn, qmail-rspawn(8), and qmail-clean(8), under the proper uids and gids for a single queue. slowq-send(8) is a special daemon that does the work of both todo-proc(8) and qmail-send(8) but handles a single, special queue named slowq. It also has an inbuilt dedicated todo processor and doesn't require a seperate todo-proc(8) process. These four daemons cooperate to deliver messages from the queue with control on the delivery rates. We will talk about this in the chapter Controlling Delivery Rates.
qmta-send(8) does the work of todo-proc(8), qmail-send(8), qmail-lspawn(8), qmail-rspawn(8) and qmail-clean(8) in a single daemon. It handles a single special queue named qmta. You can use qmta-send(8) instead of todo-proc(8)/qmail-send(8) for small systems which have negligible or sporadic mail traffic. Single Board Computers are an excellent fit for qmta-send(8). qmta-send(8) can be started on the command line, in RC scripts or in cron/shell scripts. It can be invoked to do just one time delivery without running as a daemon. It can also be enabled to start at boot by enabling qmta-service systemd.unit(5) configuration using the systemctl(1) command. You can learn more about qmta-send(8) in the chapter qmta - Using a minimal standalone qmta-send MTA
qscheduler(8), qmail-start(8), slowq-start(8), qmta-send(8) can be passed an argument - defaultdelivery. If defaultdelivery supplied, qmail-start(8) or qscheduler(8) passes it to qmail-lspawn(8). You can also have a control file named defaultdelivery. The mailbox type is picked up from the defaultdelivery control file. The table below outlines the choices /etc/indimail/control/defaultdelivery control file
Mailbox Format | Name | Location | defaultdelivery | Comments |
---|---|---|---|---|
mbox | Mailbox | $HOME | ./Mailbox | most common, works with most MUAs |
maildir | Maildir | $HOME | ./Maildir/ | more reliable, less common MUA support |
mbox | username | /var/spool/mail | See INSTALL.vsm | traditional mailbox |
Once a message has been queued, todo-proc(8) must decide which recipients are local and which recipients are remote. It may also rewrite some recipient addresses. todo-proc(8)/qmail-send(8) process messages in the queue and pass them to qmail-rspawn(8) and qmail-lspawn(8). We will talk about their function in the order that a message in the queue would experience them: preprocessing, delivery, and cleanup.
If you use slowq-send(8), slowq-send(8) will do the job of todo-proc(8) too. Like todo-proc(8), slowq-send(8) may also rewrite some recipient addresses. slowq-send(8) processes messages in the queue and pass them to qmail-rspawn(8) and qmail-lspawn(8).
As mentioned earlier, if you use qmta-send(8), it can by itself do the job of todo-proc(8). qmail-lspawn(8) and qmail-rspawn(8) and cleanups.
NOTE: Throughout this document, replace qmail-send(8) with slowq-send(8) or qmta-send(8) when you use those daemons instead of qmail-send(8) for deliveries.
todo-proc(8) does the preprocessing and like queuing, this is done in stages:
- When todo-proc(8) notices queueX/todo/inode, it knows that the message inode is in S4. todo-proc(8) deletes queueX/info/split/inode, queueX/local/split/inode, and queueX/remote/split/inode, if they exist. Then it reads through queueX/todo/inode.
- A new queueX/info/split/inode is created, containing the envelope sender address.
- If the message has local recipients, they're added to queueX/local/split/inode.
- If the message has remote recipients, they're added to queueX/remote/split/inode.
- queueX/intd/inode is deleted. The message is still in S4 at this point.
- queueX/todo/inode is deleted, moving to stage S5. At this instant the message has been succcesfully preprocessed. Recipients are considered local if the domain is listed in control/locals or the entire recipient or domain is listed in control/virtualdomains. If the recipient is virtual, the local part ofthe address is rewritten as specified in virtualdomains.
NOTE: When you use slowq-send(8) for deliveries, (point 1.) todo-proc(8)'s job is done by slowq-send(8). Similarly, when you use qmta-send(8) for deliveries, (point 1.) todo-proc(8)'s job is done by qmta-send(8).
Messages at S5 are handled as follows. Initially, all recipients in queueX/local/split/inode and queueX/remote/split/inode are marked NOT DONE, meaning that qmail-send(8) should attempt to deliver to them. On its own schedule, qmail-send(8) sends delivery commands to qmail-lspawn(8) and qmail-rspawn(8) using channels set up by qmail-start(8). When it receives responses from qmail-lspawn(8) or qmail-rspawn(8) that indicate successful delivery or permanent error, qmail-send(8) changes their status in queueX/local/split/inode or queueX/remote/split/inode to DONE, meaning that it should not attempt further deliveries. When qmail-send(8) receives a permanent error, it also records that in queueX/bounce/split/inode. Bounce messages are also handled on qmail-send(8)'s schedule. Bounces are handled by injecting a bounce message based on queueX/mess/split/inode and queueX/bounce/split/inode, and deleting queueX/bounce/split/inode. When all ofthe recipients in queueX/local/split/inode or queueX/remote/split/inode are marked DONE, the respective local or remote file is removed.
qmail-send(8) may at its leisure try to deliver a message to a NOT DONE address. If the message is successfully delivered, qmail-send(8) marks the address as DONE. If the delivery attempt meets with permanent failure, qmail-send(8) first appends a note to queueX/bounce/split/inode, creating queueX/bounce/split/inode if necessary; then it marks the address as DONE. Note that queueX/bounce/split/inode is not crash-proof.
qmail-send(8) may handle queueX/bounce/split/inode at any time, as follows: it
- injects a new bounce message, created from queueX/bounce/split/inode and queueX/mess/split/inode;
- deletes queueX/bounce/split/inode.
When all addresses in queueX/local/split/inode are DONE, qmail-send(8) deletes queueX/local/split/inode. Same for queueX/remote/split/inode.
When queueX/local/split/inode and queueX/remote/split/inode are gone, qmail-send(8) eliminates the message, as follows. First, if queueX/bounce/split/inode exists, qmail-send(8) handles it as described above. Once queueX/bounce/split/inode is definitely gone, qmail-send(8) deletes queueX/info/split/inode, moving to S2, and finally queueX/mess/split/inode, moving to S1.
Each message has its own retry schedule. The longer a message remains undeliverable, the less frequently qmail tries to send it. The retry schedule is not configurable. The tables below show the retry schedule for a message that's undeliverable to a recipient until it bounces (default queuelifetime of 604800 seconds). Local messages a similar, but more frequent, schedule than remote messages. qmail-send(8) uses a simple formula to determine the times at which messages in the queue are retried. If attempts is the number of failed delivery attempts so far, and birth is the time at which a message entered the queue (determined from the creation time ofthe queue/info file), then:
nextretry = birth + (attempts * chanskip) * (attempts * chanskip)
where chanskip is a retry factor equal to 10 for local deliveries and 20 for remote deliveries.
- Local Message Retry Schedule
qmail-send delivery retry times, for chanskip=10 (local)
Attempt ======= after ======= == delay until next =
seconds dd hh mm ss seconds dd hh mm ss
...................... ....................... ......................
#00 0 [00 00:00:00] 100 [00 00:01:40]
#01 100 [00 00:01:40] 300 [00 00:05:00]
#02 400 [00 00:06:40] 500 [00 00:08:20]
#03 900 [00 00:15:00] 700 [00 00:11:40]
#04 1600 [00 00:26:40] 900 [00 00:15:00]
#05 2500 [00 00:41:40] 1100 [00 00:18:20]
#06 3600 [00 01:00:00] 1300 [00 00:21:40]
#07 4900 [00 01:21:40] 1500 [00 00:25:00]
#08 6400 [00 01:46:40] 1700 [00 00:28:20]
#09 8100 [00 02:15:00] 1900 [00 00:31:40]
#10 10000 [00 02:46:40] 2100 [00 00:35:00]
#11 12100 [00 03:21:40] 2300 [00 00:38:20]
#12 14400 [00 04:00:00] 2500 [00 00:41:40]
#13 16900 [00 04:41:40] 2700 [00 00:45:00]
#14 19600 [00 05:26:40] 2900 [00 00:48:20]
#15 22500 [00 06:15:00] 3100 [00 00:51:40]
#16 25600 [00 07:06:40] 3300 [00 00:55:00]
#17 28900 [00 08:01:40] 3500 [00 00:58:20]
#18 32400 [00 09:00:00] 3700 [00 01:01:40]
#19 36100 [00 10:01:40] 3900 [00 01:05:00]
#20 40000 [00 11:06:40] 4100 [00 01:08:20]
#21 44100 [00 12:15:00] 4300 [00 01:11:40]
#22 48400 [00 13:26:40] 4500 [00 01:15:00]
#23 52900 [00 14:41:40] 4700 [00 01:18:20]
#24 57600 [00 16:00:00] 4900 [00 01:21:40]
#25 62500 [00 17:21:40] 5100 [00 01:25:00]
#26 67600 [00 18:46:40] 5300 [00 01:28:20]
#27 72900 [00 20:15:00] 5500 [00 01:31:40]
#28 78400 [00 21:46:40] 5700 [00 01:35:00]
#29 84100 [00 23:21:40] 5900 [00 01:38:20]
#30 90000 [01 01:00:00] 6100 [00 01:41:40]
#31 96100 [01 02:41:40] 6300 [00 01:45:00]
#32 102400 [01 04:26:40] 6500 [00 01:48:20]
#33 108900 [01 06:15:00] 6700 [00 01:51:40]
#34 115600 [01 08:06:40] 6900 [00 01:55:00]
#35 122500 [01 10:01:40] 7100 [00 01:58:20]
#36 129600 [01 12:00:00] 7300 [00 02:01:40]
#37 136900 [01 14:01:40] 7500 [00 02:05:00]
#38 144400 [01 16:06:40] 7700 [00 02:08:20]
#39 152100 [01 18:15:00] 7900 [00 02:11:40]
#40 160000 [01 20:26:40] 8100 [00 02:15:00]
#41 168100 [01 22:41:40] 8300 [00 02:18:20]
#42 176400 [02 01:00:00] 8500 [00 02:21:40]
#43 184900 [02 03:21:40] 8700 [00 02:25:00]
#44 193600 [02 05:46:40] 8900 [00 02:28:20]
#45 202500 [02 08:15:00] 9100 [00 02:31:40]
#46 211600 [02 10:46:40] 9300 [00 02:35:00]
#47 220900 [02 13:21:40] 9500 [00 02:38:20]
#48 230400 [02 16:00:00] 9700 [00 02:41:40]
#49 240100 [02 18:41:40] 9900 [00 02:45:00]
#50 250000 [02 21:26:40] 10100 [00 02:48:20]
#51 260100 [03 00:15:00] 10300 [00 02:51:40]
#52 270400 [03 03:06:40] 10500 [00 02:55:00]
#53 280900 [03 06:01:40] 10700 [00 02:58:20]
#54 291600 [03 09:00:00] 10900 [00 03:01:40]
#55 302500 [03 12:01:40] 11100 [00 03:05:00]
#56 313600 [03 15:06:40] 11300 [00 03:08:20]
#57 324900 [03 18:15:00] 11500 [00 03:11:40]
#58 336400 [03 21:26:40] 11700 [00 03:15:00]
#59 348100 [04 00:41:40] 11900 [00 03:18:20]
#60 360000 [04 04:00:00] 12100 [00 03:21:40]
#61 372100 [04 07:21:40] 12300 [00 03:25:00]
#62 384400 [04 10:46:40] 12500 [00 03:28:20]
#63 396900 [04 14:15:00] 12700 [00 03:31:40]
#64 409600 [04 17:46:40] 12900 [00 03:35:00]
#65 422500 [04 21:21:40] 13100 [00 03:38:20]
#66 435600 [05 01:00:00] 13300 [00 03:41:40]
#67 448900 [05 04:41:40] 13500 [00 03:45:00]
#68 462400 [05 08:26:40] 13700 [00 03:48:20]
#69 476100 [05 12:15:00] 13900 [00 03:51:40]
#70 490000 [05 16:06:40] 14100 [00 03:55:00]
#71 504100 [05 20:01:40] 14300 [00 03:58:20]
#72 518400 [06 00:00:00] 14500 [00 04:01:40]
#73 532900 [06 04:01:40] 14700 [00 04:05:00]
#74 547600 [06 08:06:40] 14900 [00 04:08:20]
- Remote Message Retry Schedule
qmail-send delivery retry times, for chanskip=20 (remote)
Attempt ======= after ======= == delay until next =
seconds dd hh mm ss seconds dd hh mm ss
#00 0 [00 00:00:00] 400 [00 00:06:40]
#01 400 [00 00:06:40] 1200 [00 00:20:00]
#02 1600 [00 00:26:40] 2000 [00 00:33:20]
#03 3600 [00 01:00:00] 2800 [00 00:46:40]
#04 6400 [00 01:46:40] 3600 [00 01:00:00]
#05 10000 [00 02:46:40] 4400 [00 01:13:20]
#06 14400 [00 04:00:00] 5200 [00 01:26:40]
#07 19600 [00 05:26:40] 6000 [00 01:40:00]
#08 25600 [00 07:06:40] 6800 [00 01:53:20]
#09 32400 [00 09:00:00] 7600 [00 02:06:40]
#10 40000 [00 11:06:40] 8400 [00 02:20:00]
#11 48400 [00 13:26:40] 9200 [00 02:33:20]
#12 57600 [00 16:00:00] 10000 [00 02:46:40]
#13 67600 [00 18:46:40] 10800 [00 03:00:00]
#14 78400 [00 21:46:40] 11600 [00 03:13:20]
#15 90000 [01 01:00:00] 12400 [00 03:26:40]
#16 102400 [01 04:26:40] 13200 [00 03:40:00]
#17 115600 [01 08:06:40] 14000 [00 03:53:20]
#18 129600 [01 12:00:00] 14800 [00 04:06:40]
#19 144400 [01 16:06:40] 15600 [00 04:20:00]
#20 160000 [01 20:26:40] 16400 [00 04:33:20]
#21 176400 [02 01:00:00] 17200 [00 04:46:40]
#22 193600 [02 05:46:40] 18000 [00 05:00:00]
#23 211600 [02 10:46:40] 18800 [00 05:13:20]
#24 230400 [02 16:00:00] 19600 [00 05:26:40]
#25 250000 [02 21:26:40] 20400 [00 05:40:00]
#26 270400 [03 03:06:40] 21200 [00 05:53:20]
#27 291600 [03 09:00:00] 22000 [00 06:06:40]
#28 313600 [03 15:06:40] 22800 [00 06:20:00]
#29 336400 [03 21:26:40] 23600 [00 06:33:20]
#30 360000 [04 04:00:00] 24400 [00 06:46:40]
#31 384400 [04 10:46:40] 25200 [00 07:00:00]
#32 409600 [04 17:46:40] 26000 [00 07:13:20]
#33 435600 [05 01:00:00] 26800 [00 07:26:40]
#34 462400 [05 08:26:40] 27600 [00 07:40:00]
#35 490000 [05 16:06:40] 28400 [00 07:53:20]
#36 518400 [06 00:00:00] 29200 [00 08:06:40]
#37 547600 [06 08:06:40] 30000 [00 08:20:00]
#38 577600 [06 16:26:40] 30800 [00 08:33:20]
#39 608400 [07 01:00:00] 31600 [00 08:46:40]
#40 640000 [07 09:46:40] 32400 [00 09:00:00]
#41 672400 [07 18:46:40] 33200 [00 09:13:20]
#42 705600 [08 04:00:00] 34000 [00 09:26:40]
#43 739600 [08 13:26:40] 34800 [00 09:40:00]
#44 774400 [08 23:06:40] 35600 [00 09:53:20]
#45 810000 [09 09:00:00] 36400 [00 10:06:40]
#46 846400 [09 19:06:40] 37200 [00 10:20:00]
#47 883600 [10 05:26:40] 38000 [00 10:33:20]
#48 921600 [10 16:00:00] 38800 [00 10:46:40]
#49 960400 [11 02:46:40] 39600 [00 11:00:00]
#50 1000000 [11 13:46:40] 40400 [00 11:13:20]
#51 1040400 [12 01:00:00] 41200 [00 11:26:40]
#52 1081600 [12 12:26:40] 42000 [00 11:40:00]
#53 1123600 [13 00:06:40] 42800 [00 11:53:20]
#54 1166400 [13 12:00:00] 43600 [00 12:06:40]
#55 1210000 [14 00:06:40] 44400 [00 12:20:00]
#56 1254400 [14 12:26:40] 45200 [00 12:33:20]
#57 1299600 [15 01:00:00] 46000 [00 12:46:40]
#58 1345600 [15 13:46:40] 46800 [00 13:00:00]
#59 1392400 [16 02:46:40] 47600 [00 13:13:20]
#60 1440000 [16 16:00:00] 48400 [00 13:26:40]
#61 1488400 [17 05:26:40] 49200 [00 13:40:00]
#62 1537600 [17 19:06:40] 50000 [00 13:53:20]
#63 1587600 [18 09:00:00] 50800 [00 14:06:40]
#64 1638400 [18 23:06:40] 51600 [00 14:20:00]
#65 1690000 [19 13:26:40] 52400 [00 14:33:20]
#66 1742400 [20 04:00:00] 53200 [00 14:46:40]
#67 1795600 [20 18:46:40] 54000 [00 15:00:00]
#68 1849600 [21 09:46:40] 54800 [00 15:13:20]
#69 1904400 [22 01:00:00] 55600 [00 15:26:40]
#70 1960000 [22 16:26:40] 56400 [00 15:40:00]
#71 2016400 [23 08:06:40] 57200 [00 15:53:20]
#72 2073600 [24 00:00:00] 58000 [00 16:06:40]
#73 2131600 [24 16:06:40] 58800 [00 16:20:00]
#74 2190400 [25 08:26:40] 59600 [00 16:33:20]
When both queueX/local/split/inode and queueX/remote/split/inode have been removed, the message is dequeued by:
- Processing queueX/bounce/split/inode, if it exists.
- Deleting queueX/info/split/inode.
- Deleting queueX/mess/split/inode.
Partially queued and partially dequeued messages, left when a system crash interrupts qmail-queue(8) or qmail-send(8), are deleted by qmail-send(8) using qmail-clean(8), another long-running daemon started by qmail-start(8). Messages with a queueX/mess/split/inode file and possibly an queueX/intd/inode, but no todo, info, local, remote, or bounce, are safe to delete after 36 hours because qmail-queue(8) kills itself after 24 hours. Similarly, files in the pid directory more than 36 hours old are also deleted.
If the computer crashes while qmail-queue(8) is trying to queue a message, or while qmail-send(8) is eliminating a message, the message may be left in state S2 or S3.
When qmail-send(8) sees a message in state S2 or S3, other than one it is currently eliminating, where queueX/mess/split/inode is more than 36 hours old, it deletes queueX/intd/split/inode if that exists, then deletes queueX/mess/split/inode. Note that any qmail-queue(8) handling the message must be dead.
Similarly, when qmail-send(8) sees a file in the queueX/pid directory that is more than 36 hours old, it deletes it.
Cleanups are not necessary if the computer crashes while qmail-send(8) is delivering a message. At worst a message may be delivered twice. (There is no way for a distributed mail system to eliminate the possibility of duplication. What if an SMTP connection is broken just before the server acknowledges successful receipt of the message. The client must assume the worst and send the message again. Similarly, if the computer crashes just before qmail-send(8) marks a message as DONE, the new qmail-send(8) must assume the worst and send the message again. The usual solutions in the database literature e.g., keeping log files amount to saying that it's the recipient's computer's job to discard duplicate messages.)
qmail-send(8) and todo-proc(8) have the ability to enter what is known as detached mode. In detached mode, todo-proc(8) stops communicating with qmail-send(8) and hence new jobs are not sent to qmail-send(8). todo-proc(8) continues to preprocess message and classify them. qmail-send(8) continues to schedule existing delivery jobs by communicating with qmail-lspawn(8) and qmail-rspawn(8) for local and remote deliveries respectively. When qmail-send(8) runs out of delivery jobs, it instructs todo-proc(8) to go back into attached mode. You can make qmail-send(8), todo-proc(8) enter detached mode by sending signal SIGUSR1 to qmail-send(8). When qmail-send(8) finishes scheduling jobs for delivery, it instructs todo-proc(8) to revert back to attached mode. You can also come out of detached mode by sending SIGUSR2 to qmail-send(8). Thus sending SIGUSR1 when there are existing delivery jobs will make qmail-send(8), todo-proc(8) to enter detached mode but revert back to attached mode when qmail-send(8) has no new deliveries to schedule. If there are no pending deliveries when SIGUSR1 is issued, qmail-send(8) and todo-proc(8) enters what is known as full-detached mode. In full-detached mode todo-proc(8) continues to process incoming mails but doesn't send the job to qmail-send(8). In full-detached mode, qmail-send(8) will remain idle until SIGUSR2 is issued. Entering detached mode is usefull when you have high injection rate or when you need to to maintenance wand you don't want mail deliveries to happen but don't want pre-processing to stop too.
qmail-lspawn(8) and qmail-rspawn(8) can do multiple concurrent deliveries. The default concurrency limit is 5 for local deliveries and 10 for remote deliveries. These can be increased upto a maximum of 500 by setting it in the control files concurrencylocal for local deliveries and concurrencyremote for remote deliveries. These two (like any other indimail control files) lie in /etc/indimail/control directory. These concurrency limits are inherited by each of the indimail's multiple queues. Additionally indimail allows you to have queue specific concurrency limits. e.g. You can have the control files concurrencyl.queue2, concurrencyr.queue2 for setting local, remote concurrency specific to /var/indimail/queue/queue2.
Currently queueX/info/split/inode serves two purposes: first, it records the envelope sender; second, its modification time is used to decide when a message has been in the queue too long. In the future queueX/info/split/inode may store more information. Any non-backwards-compatible changes will be identified by version numbers.
When qmail-queue(8) has successfully placed a message into the queue, it pulls a trigger offered by qmail-send(8). Here is the current triggering mechanism: lock/trigger is a named pipe. Before scanning todo subdir, qmail-send(8) opens lock/trigger O_NDELAY for reading. It then selects for readability on lock/trigger. qmail-queue(8) pulls the trigger by writing a byte O_NDELAY to lock/trigger. This makes lock/trigger readable and wakes up qmail-send(8). Before scanning todo subdir again, qmail-send(8) closes and reopens lock/trigger. When you use dynamic queues using qscheduler(8), instead of the trigger mechanism, qmail-queue(8) uses posix message queues to communicate with todo-proc(8). slowq-send(8) and qmta-send(8) do not use any other mechanism other than lock/trigger.
indimail-mta can be fine tuned and configured using environment variables (> 250) of them. Read indimail-env(7) and tcp-environ(5) to know more. This feature gives a significant edge to indimail-mta over other MTAs. It gives you the total flexibility to configure and customize indimail-mta. These variables can be customized to provide unique features, allowing you to customize indimail-mta without requiring to patch and recompile and help in setting up many instances of indimail-mta on the same machine catering to different needs. There are many methods of setting them.
-
Setting them in what is known as the variables directory. All indimail services are configured as supervised services in /service directory. Each of these services have a directory named after the service and a subdir inside it named variables. An example of this is the directory /service/qmail-smtpd.25/variables for SMTP service providing SMTP on the standard port 25. In the variables directory, you just need to create a file to create an environment variable. The name of the environment variable is the filename and the value of the environment variable is the content of the file. An empty file, removes the environment variable. As an exercise, explore the directory /service/qmail-smtpd.25/variables. All IndiMail services use the program envdir(8) to set environment variables using files in the variables directory. The envdir utility that indimail-mta provides is very different than what is provided by envdir from the daemontools package. indimail-mta's envdir(8) can take environment from multiple directories. You can have a file named .envdir in the variables directory. This file can contain multiple lines with each line naming directories that should be looked up for setting additional environment variables. In fact, the default installation creates .envdir linking to an additional directory: /etc/indimail/control/global_vars. Any variables in global_vars serve as global environment variables for all services. You can also have .envdir as a directory or as a link to another directory having environment variables. Regardless of having .envdir as a file, directory or a symbolic link, there is a built-in safety mechansim that prevents infinite recursive traversal. You can also have environment variables as key=value pairs in a file named .envfile. As an example, having /etc/indimail/control in the file /etc/indimail/control/global_vars/CONTROLDIR makes all programs use /etc/indimail/control as the control directory instead of the hard coded /var/qmail/control that each and every other qmail derivatives use.
-
Using environment directory defaultqueue in /etc/indimail/control directory. This is just like the supervise variables directory. The environment variables configured in this directory get used when calling qmail-inject(8), sendmail(1) and few other programs (See NOTE below). Read the man page for qmail-inject(8). Just like the variables directory mentioned above, you can have .envdir and .envfile in defaultqueue directory. The defaultqueue directory gets skipped if you have the QUEUE_BASE environment variable already set. envdir(8) will exit 111 if it has trouble reading any directory while processing the defaultqueue directory or any extra directories while processing.envdir. However, failure to read any environment variable file doesn't result in an error. This allows the administrator to set environment variables having access for specific users on the system. envdir(8) will continue the processing and skip files for which it doesn't have read permission.
-
Using environment directory .defaultqueue in HOME. This too is just like the supervise variables directory. The environment variables configured in this directory get used when calling qmail-inject(8), sendmail(1). Here HOME refers to the home directory of the user and is totally under the control of the user to set it. Read the man page for qmail-inject(8). The .defaultqueue directory too can have .envdir or .envfile to set additional environment variables. But unlike /etc/indimail/control/defaultqueue, any error processing this directory, additional directories from processing .envdir are ignored and no change is made to the existing set of environment variables. If you set QUEUE_BASE in this directory, then /etc/indimail/control/defaultqueue gets skipped, allowing you to override system configured environment variables. Programs that set environment variables from $HOME/.defaultqueue directory are condredirect(1), dot-forward(1), fastforward(1), filterto(1), forward(1), maildirserial(1), new-inject(1), qmail-inject(8), qmail-qread(8), qmail-showctl(8), qmonitor(8), qmta-send(8), qnotify(1), qreceipt(1), queue-fix(8), replier(1), rrforward(1) and rrt(1). Out of these programs, qmail-inject(8), new-inject(1), qmail-qread(8) and maildirserial(1) will process .defaultqueue regardless of the uid with they run, whereas the remaining programs process .defaultqueue when running with non-zero uid. You can however skip .defaultqueue processing by setting SKIP_LOCAL_ENVIRONMENT environment variable.
-
Using control files from.envrules, fromd.envrules, rcpt.envrules, auth.envrules - These are control files used by programs like qmail-smtpd(8), qmail-inject(8). They match on the sender or recipient address. Here you can set or unset environment variables for a sender, recipient. You can also use any regular expression to match multipler sender or recipients. To know these environment variables, read the man pages for qmail-smtpd(8), qmail-inject(8), spawn-filter(8).
-
Using control file domainqueue - This can be used to set environment variable for any recipient domain. Read the man page for qmail-smtpd(8), qmail-inject(8). Like envrules, You can configure domainqueue to have indimail-mta configure itself differently for different domains.
-
If you have installed ezmlm / ezmlm-idx, then you have an additional directory for configuring environment variables in /etc/indimail/ezmlm/global_vars.
-
Using the program ctrlenv(8). ctrlenv(8) can use a cdb file with simple assignments of variables to addresses and run a program with new environment variables. It works exactly like the simple and wildcard assignments in the qmail assign file. See the man page for ctrlenv(8) and cdb-database(8).
-
Nothing prevents a user from writing a shell script to set environment variables before calling any of indimail-mta programs. If you are familiar with UNIX, you will know how to set them. The mechanism for setting environment variables in a shell depends on the shell you are using and is beyond the scope of this document. You can read the man pages for the shell that your script uses. My favourite method of setting environment variables for a test run is something like this
$ env ENV_VARIABLE1=value1 ENV_VARIABLE2=value2 my-test-script
It is trivial to display the environment variable that would be set for your service by using the envdir command along with the env command. In fact this is what the svctool --print-variables --service-name=xxxx
or minisvc --print-variables --service-name=xxx
does internally. You can show environment variable set for a user (point 3 above) using the command qmail-showctl -E
Display environment variables set for defaultqueue
$ envdir -c /etc/indimail/control/defaultqueue env
USE_FSYNC=
QUEUE_START=1
QMAILQUEUE=/usr/sbin/qmail-dkim
QUEUE_COUNT=5
DKIMSIGN=/etc/indimail/control/domainkeys/%/default
CONFSPLIT=151
VIRUSCHECK=1
QHPSI=/usr/bin/clamdscan %s --config=/etc/clamd.d/scan.conf --fdpass --quiet --no-summary
USE_SYNCDIR=
QUEUE_BASE=/var/indimail/queue
MIN_FREE=52428800
Display environment variables set for SMTPS service
$ sudo minisvc --print-variables=qmail-smtpd.465
or
$ sudo envdir -c /service/qmail-smtpd.465/variables env
LOGFILTER=/run/indimail/logfifo
DISABLE_PLUGIN=
CONTROLDIR=/etc/indimail/control
INFIFO=infifo
USE_FSYNC=
PLUGIN1=/usr/lib/indimail/plugins/rblsmtpd.so
CHECKRECIPIENT=1
QUEUE_START=1
CHECKRELAY=
USE_DLMOPEN=1
SMTPS=
DEFAULT_DOMAIN=argos.indimail.org
QMAILQUEUE=/usr/sbin/qmail-dkim
INFIFODIR=/run/indimail/inlookup
SPAMEXITCODE=0
PLUGIN0_dir=/var/indimail
AUTHMODULES=/usr/sbin/sys-checkpwd /usr/sbin/vchkpass
QUEUE_COUNT=5
PORT=465
SPAMFILTER=/usr/bin/bogofilter -p -d /etc/indimail
RBLEHLO=1
PASSWD_CACHE=
MAXPERIP=25
SOFT_MEM=536870912
QUERY_CACHE=
PLUGIN0=/usr/lib/indimail/plugins/qmail_smtpd.so
CONFSPLIT=151
PLUGIN0_init=smtp_init
BODYCHECK=
DKIMVERIFY=
VIRUSCHECK=1
VIRTUAL_PKG_LIB=/usr/lib64/libindimail.so.3.0.0
QHPSI=/usr/bin/clamdscan %s --config=/etc/clamd.d/scan.conf --fdpass --quiet --no-summary
USE_SYNCDIR=
RBLCOMMAND=/usr/lib/indimail/plugins/rblsmtpd.so -rdnsbl-1.uceprotect.net -rzen.spamhaus.org
UNSIGNED_SUBJECT=
REJECTSPAM=0
MASQUERADE=
MAXDAEMONS=75
QUEUE_BASE=/var/indimail/queue
MAKE_SEEKABLE=1
MIN_FREE=52428800
PATH=/bin:/usr/bin:/usr/sbin:/sbin
LOCALIP=0
CERTDIR=/etc/indimail/certs
Display environment variables for a user logged in as a local user by using qmail-showctl(8)
$ qmail-showctl -E
------------------ begin show env ----------------------------
HOME=/home/localuser
QMAILDEFAULTHOST=argos.indimail.org
TLS_CIPHER_LIST=ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM:-EDH-RSA-DES-CBC3-SHA:-EDH-DSS-DES-CBC3-SHA:-DES-CBC3-SHA
:-DES-CBC3-MD5:+SSLv3:+TLSv1:-SSLv2:!DES:!MD5:!PSK:!RC4:!3DES:!SHA1:!SHA256:!SHA384
MAKE_SEEKABLE=1
QUEUE_BASE=/var/indimail/queue
QUEUE_START=1
defaultdomain=indimail.org
LOGFILTER=/run/indimail/logfifo
BIGTODO=0
VIRUSCHECK=1
DKIMSIGNOPTIONS=-z 2
SMTP_RATE=400
SPAMFILTER=/usr/bin/bogofilter -p -d /etc/indimail
CONFSPLIT=23
REJECTSPAM=0
QMAILQUEUE=/usr/sbin/qmail-dkim /usr/sbin/qmail-spamfilter
USER=localuser
DYNAMIC_QUEUE=1
SPAMEXITCODE=0
QMAILINJECT_FORCE_SRS=1
DKIMSIGNOPTIONSEXTRA=-z 4
QUEUE_COUNT=1
DKIMSIGN=/home/localuser/domainkeys/private
Display environment variables for any user by using qmail-showctl(8)
You just need to set the HOME environment variable to the home directory of the user. e.g.
$ sudo env HOME=/root qmail-showctl -E
------------------ begin show env ----------------------------
HOME=/root
QMAILDEFAULTHOST=argos.indimail.org
TLS_CIPHER_LIST=ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM:-EDH-RSA-DES-CBC3-SHA:-EDH-DSS-DES-CBC3-SHA:-DES-CBC3-SHA
:-DES-CBC3-MD5:+SSLv3:+TLSv1:-SSLv2:!DES:!MD5:!PSK:!RC4:!3DES:!SHA1:!SHA256:!SHA384
QUEUEDIR=/var/indimail/queue/qmta
QUEUE_COUNT=5
QUEUE_START=1
defaultdomain=indimail.org
BIGTODO=0
CONFSPLIT=23
DYNAMIC_QUEUE=1
QMAILQUEUE=/usr/sbin/qmail-queue
QUEUE_BASE=/var/indimail/queue
NOTE: The program envdir(8) that indimail-mta uses, is useful because of it's recursive feature. It has the ability to hyperlink additional directories/files having environment variables using .envdir and .envfile.
NOTE: The following clients use defaultqueue from /etc/indimail/control and .defaultqueue from $HOME - condredirect(1), dot-forward(1), fastforward(1), filterto(1), forward(1), maildirserial(1), new-inject(1), qmail-inject(8), qmail-qread(8), qmail-showctl(8), qmta-send(8), qnotify(1), qreceipt(1), queue-fix(8), replier(1), rrforward(1), rrt(1), qmail-tcpto(8), qmail-tcpok(8).
IndiMail has multiple queues and the queue destination directories are also configurable. You can have one IndiMail installation serve multiple instances having different properties / configuration. To set up a new IndiMail instance requires you to just set few environment variables. Unlike qmail and other derivatives, indimail-mta doesn't force you to recompile each time you require a new instance. Multiple queues eliminates what is known as 'the silly qmail syndrome' and gives IndiMail the capability to perform better than a stock qmail installation. IndiMail's multiple queue architecture allows it to achieve tremendous inject rates using commodity hardware as can be read here. When you have massive injecting rates, your software may place multiple files in a single directory. This drastically reduces file system performance for few of the older filesystems. IndiMail avoids this by injecting your email in a queue consisting of multiple directories and mails distributed as evenly as possible across these directories.
Balancing of emails across multiple queues is achieved by the programs qmail-queue(8) or qmail-multi(8). qmail-multi(8) allows the message to be passed through any filter defined by the FILTERARGS environment variable. Any qmail-queue(8) frontend can use qmail-multi(8). The list of qmail-queue(8) frontends in IndiMail are
- sendmail(1)
- qmail-inject(8)
- qmail-smtpd(8)
- qmail-qmqpd(8)
- qmail-qmtpd(8)
- qreceipt(1)
- condredirect(1)
- dot-forward(1)
- fastforward(1)
- forward(1)
- maildirserial(1)
- new-inject(1)
- ofmipd(8)
- replier(1)
- rrforward(1)
You just need to configure the following environment variables to have the qmail-queue(8) frontends use multiple queues.
- QUEUE_BASE – Base directory where all queues will be placed
- QUEUE_COUNT – number of queues
- QUEUE_START – numeric prefix of the first queue and optionally
- QMAILQUEUE - /usr/sbin/qmail-multi if you want to run messages through a filter (defaults to qmail-queue(8) if not set)
When using dynamic queues, the following additional variables are needed
- QUEUE_MAX - The maximum number of queues that qscheduler(8) will use.
- QUEUE_LOAD - The ratio of concurrency to the total concurrency percentage is the queue load. When the average QUEUE_LOAD for all queues goes beyond QUEUE_LOAD, qscheduler(8) increases the queue count.
All the above variables are bypassed if the QUEUEDIR is set.
- QUEUEDIR - Not required if you set QUEUE_BASE, QUEUE_COUNT, QUEUE_START. Else it should be full path to a queue (e.g. /var/indimail/queue/queue3). If QUEUEDIR is set, then QUEUE_BASE, QUEUE_COUNT and QUEUE_START are not used.
qmail-queue(8)'s job is to queue a message after selecting a queue. indimail-mta uses multiple queue. If QUEUEDIR is set, qmail-queue(8) queues the message in the queue defined by QUEUEDIR. If QUEUEDIR is not set, it uses three environment variables QUEUE_START, QUEUE_COUNT and QUEUE_BASE to select a queue. QUEUE_BASE is the common basename for all the queues. e.g. QUEUE_BASE=/var/indimail/queue. Now, if QUEUE_START is 1, QUEUE_COUNT is 5, then qmail-multi(8) will generate a random number and use the modulus operator to get a number ranging from 1 to 5. Older versions of indimail-mta, qmail-queue(8) did not have the ability to select a queue. It depended on qmail-multi(8) to do that. qmail-multi(8) works exactly like qmail-queue(8) for selecting a queue. If QUEUEDIR is set, it simply execs qmail-queue(8) after passing the message through a filter (defined by setting FILTERARGS environment variable). If QUEUEDIR is not set, it selects a queue and then sets the QUEUEDIR environment variable to set any of the 5 queues in /var/indimail/queue. e.g. QUEUEDIR=/var/indimail/queue/queueX, where X is the number selected between 1 to 5. It then does a exec of qmail-queue(8). Throughout this document we will abbreviate /var/indimail/queue/queueX as queueX.
e.g. If you want IndiMail to use 10 queues, this is what you will do
$ sudo /bin/bash
# for i in qmail-smtpd.25 qmail-smtpd.465 qmail-smtpd.587 qmail-send.25 \
qmail-qmqpd.628 qmail-qmtpd.209
do
echo 10 > /service/$i/variables/QUEUE_COUNT
echo “/var/indimail/queue” > /service/$i/variables/QUEUE_BASE
echo “1” > /service/$i/variables/QUEUE_START
done
You also need to make sure that you have ten queues in /var/indimail/queue. The queues can be created using the queue-fix(8) program.
$ sudo /bin/bash
# for i 1 2 3 4 5 6 7 8 9 10
do
/usr/bin/queue-fix /var/indimail/queue/queue”$i” > /dev/null
done
# exit
$ ls -ld var/indimail/queue/queue*
drwxr-x---. 12 qmailq qmail 4096 Mar 30 2017 /var/indimail/queue/queue1
drwxr-x---. 12 qmailq qmail 4096 Dec 7 10:45 /var/indimail/queue/queue10
drwxr-x---. 12 qmailq qmail 4096 Mar 30 2017 /var/indimail/queue/queue2
drwxr-x---. 12 qmailq qmail 4096 Mar 30 2017 /var/indimail/queue/queue3
drwxr-x---. 12 qmailq qmail 4096 Mar 30 2017 /var/indimail/queue/queue4
drwxr-x---. 12 qmailq qmail 4096 Mar 30 2017 /var/indimail/queue/queue5
drwxr-x---. 12 qmailq qmail 4096 Dec 7 10:45 /var/indimail/queue/queue6
drwxr-x---. 12 qmailq qmail 4096 Dec 7 10:45 /var/indimail/queue/queue7
drwxr-x---. 12 qmailq qmail 4096 Dec 7 10:45 /var/indimail/queue/queue8
drwxr-x---. 12 qmailq qmail 4096 Dec 7 10:45 /var/indimail/queue/queue9
Now all you need is a restart of all services (that depend on the queue configuration) to use the new QUEUE_BASE, QUEUE_COUNT, QUEUE_START environment variables. You can restart any indimail service using the svc(8) program.
$ sudo svc -r /service/qmail-smtpd* /service/qmail-send.25 /service/qmail-qm?pd.*
indimail-mta also has a special queue slowq where the deliveries can be rate controlled for messages injected into this queue. This is achived by setting the environment variable QUEUEDIR=/var/indimail/queue/slowq. indimail-mta provides you various methods to set environment variables. One of the method is using domainqueue control file discussed in Controlling Delivery Rates.
IndiMail gets started by svscan(8). IndiMail places all its services under indimail-mta's svscan directory /service. To start indimail services all that is required is to run svscan(8). Depending on your OS you can use various methods to start svscan(8) automatically. systemd has become the defacto init replacement and can be configured to start svscan(8) by using a systemd unit file. systemd is a system and service manager for Linux, compatible with SysV and LSB init scripts. systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, keeps track of processes using Linux cgroups, supports snapshots and restoring of the system state, maintains mount and automount points and implements an elaborate transactional dependency-based service control logic. It can work as a drop-in replacement for sysvinit. Personally I don't like systemd. It is horribly complicated and too vast to be understood easily. The RC used by distributions like FreeBSD, openrc of gentoo are much simpler. But let us without further ado look at how to use systemd.
The first step is to write the service configuration file for IndiMail in /lib/systemd/system/svscan.service. You can have PrivateTmp=yes if you desire indimail to use private /tmp which is inaccessible to outside. This will give you better security when you write scripts that use /var/tmp or /tmp.
[Unit]
Description=IndiMail Messaging Platform
After=local-fs.target network.target
[Service]
ExecStart=/usr/libexec/indimail/svscanboot /service
ExecStop=/etc/init.d/indimail stop
Restart=on-failure
Type=simple
PrivateTmp=no
[Install]
Alias=indimail.service
Alias=indimail-mta.service
WantedBy=multi-user.target
You can override values in the above file by creating a file override.conf in /etc/systemd/system/svscan.service.d. As an example, on a raspberry pi system, you should have svscan(8) started only after the system clock is synchronized with a NTP source (many SBC don't have battery backed Real Time Clock - RTC). This ensures that svscan(8) gets started when the system has a correct date, time so that logs created will not have absurd timestamps.
[Unit]
Wants=time-sync.target
After=local-fs.target remote-fs.target time-sync.target network.target network-online.target systemd-networkd-wait-online.service
So if you have a system without a battery backed RTC, you should do this (even when you do a binary installation)
$ sudo mkdir /etc/systemd/system/svscan.service.d
$ sudo cp /usr/share/indimail/boot/systemd.override.conf /etc/systemd/system/svscan.service.d/override.conf
$ sudo systemctl daemon-reload
NOTE: From Fedora 15 onwards, upstart has been replaced by a service called systemd. Due to improper rpm package upgrade scripts, some system services previously enabled in Fedora 14, may not be enabled after upgrading to Fedora 15. To determine if a service is impacted, run the systemctl status command as shown below.
# systemctl is-enabled svscan.service && echo "Enabled on boot" || echo "Disabled on boot"
To enable indimail service on boot, run the following systemctl command
# systemctl enable svscan.service
Now to start IndiMail you can use any of the below commands (commands for starting indimail on distributions other than Linux are also mentioned).
$ sudo systemctl start svscan # Linux
or
$ sudo service svscan start # Linux/FreeBSD
or
$ /etc/init.d/svscan start # Linux
or
$ sudo launchctl start org.indimail.svscan # Mac OSX
or
$ qmailctl start # Universal
NOTE: FreeBSD uses /usr/local/etc/rc.d/svscan. OSX uses LaunchDaemon with the configuration in /Library/LaunchDaemons/org.indimail.svscan.plist.
You can automate the above service creation for systemd by running the initsvc(1) command. In fact the command works for Linux, FreeBSD and OSX to enable IndiMail to get started at boot (even though FreeBSD, OSX do not use systemd).
# /usr/sbin/initsvc -on (to enable indimail service)
# /usr/sbin/initsvc -off (to disable indimail service)
You can now also query the status of the running IndiMail service by using the systemctl command
# systemctl status svscan.service
● svscan.service - SVscan Service
Loaded: loaded (/usr/lib/systemd/system/svscan.service; enabled; vendor preset: disabled)
Active: active (running) since Sun 2021-12-26 07:44:17 IST; 4h 11min ago
Main PID: 1041 (svscan)
Tasks: 229 (limit: 9405)
Memory: 2.3G
CGroup: /system.slice/svscan.service
├─ 1041 /usr/sbin/svscan /service
├─ 1066 supervise log .svscan
├─ 1068 /usr/sbin/multilog t /var/log/svc/svscan
├─ 1080 supervise qmail-qmqpd.628
├─ 1081 supervise log qmail-qmqpd.628
├─ 1082 supervise resolvconf
├─ 1083 supervise log resolvconf
├─ 1084 supervise mpdev
├─ 1085 supervise log mpdev
├─ 1086 supervise qmail-imapd.143
├─ 1087 supervise log qmail-imapd.143
├─ 1088 supervise qmail-poppass.106
├─ 1089 supervise log qmail-poppass.106
├─ 1090 supervise qmail-daned.1998
├─ 1091 supervise log qmail-daned.1998
├─ 1092 supervise qmail-imapd-ssl.993
├─ 1093 supervise log qmail-imapd-ssl.993
├─ 1094 supervise qmail-smtpd.25
├─ 1095 supervise log qmail-smtpd.25
├─ 1096 /usr/bin/tcpserver -v -H -R -l argos.indimail.org -x /etc/indimail/tcp/tcp.poppass.cdb -X -c variables/MAXDAEMONS -C 25 -o -b 40 -n /etc/indimail/certs/servercert.pem -u 1024 -g 1014 0 106 /usr/sbin/qmail-poppass argos.indimail.org /usr/sbin/vchkpass /bin/false
├─ 1097 /usr/sbin/multilog t /var/log/svc/qmqpd.628
├─ 1098 supervise indisrvr.4000
├─ 1099 supervise log indisrvr.4000
├─ 1100 supervise qmail-pop3d.110
├─ 1101 supervise log qmail-pop3d.110
├─ 1102 supervise slowq-send
├─ 1103 supervise log slowq-send
├─ 1104 supervise update
├─ 1105 /usr/sbin/qmail-daned -w /etc/indimail/control/tlsa.white -t 30 -s 5 -h 65535 127.0.0.1 /etc/indimail/control/tlsa.context
├─ 1106 supervise log update
├─ 1107 supervise qmail-smtpd.366
├─ 1108 supervise log qmail-smtpd.366
├─ 1109 supervise freshclam
├─ 1110 supervise log freshclam
├─ 1111 supervise fclient
├─ 1112 supervise log fclient
├─ 1113 supervise qmail-pop3d-ssl.995
├─ 1114 supervise log qmail-pop3d-ssl.995
├─ 1115 supervise qmail-qmtpd.209
├─ 1116 supervise log qmail-qmtpd.209
├─ 1117 supervise mrtg
├─ 1118 supervise log mrtg
├─ 1119 supervise rsync.873
├─ 1120 supervise log rsync.873
├─ 1121 supervise qmail-logfifo
├─ 1122 supervise log qmail-logfifo
├─ 1123 supervise qscanq
├─ 1124 supervise log qscanq
├─ 1125 supervise qmail-send.25
├─ 1126 supervise log qmail-send.25
├─ 1127 supervise greylist.1999
├─ 1128 supervise log greylist.1999
├─ 1129 supervise qmail-smtpd.465
├─ 1130 supervise log qmail-smtpd.465
├─ 1131 supervise proxy-imapd.4143
├─ 1132 supervise log proxy-imapd.4143
├─ 1133 supervise fetchmail
├─ 1134 supervise log fetchmail
├─ 1135 supervise qmail-smtpd.587
├─ 1136 supervise log qmail-smtpd.587
├─ 1137 supervise pwdlookup
├─ 1138 supervise log pwdlookup
├─ 1140 /usr/bin/freshclam -v --stdout --datadir=/var/indimail/clamd -d -c 2 --config-file=/etc/freshclam.conf
├─ 1141 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.imap.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 993 /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin /usr/libexec/indimail/imapmodules/authpwd /usr/libexec/indimail/imapmodules/authshadow /usr/libexec/indimail/imapmodules/authpam /usr/libexec/indimail/imapmodules/authindi /usr/bin/imapd Maildir
├─ 1143 /usr/bin/tcpserver -v -H -R -l argos.indimail.org -x /etc/indimail/tcp/tcp.smtp.cdb -c variables/MAXDAEMONS -o -b 150 -u 1024 -g 1015 0 366 /usr/sbin/qmail-smtpd
├─ 1144 /usr/sbin/indisrvr -i 0 -p 4000 -b 40 -t 300 -n /etc/indimail/certs/servercert.pem
├─ 1145 supervise proxy-imapd-ssl.9143
├─ 1146 supervise log proxy-imapd-ssl.9143
├─ 1147 supervise dnscache
├─ 1148 supervise log dnscache
├─ 1149 supervise proxy-pop3d-ssl.9110
├─ 1150 supervise log proxy-pop3d-ssl.9110
├─ 1151 supervise inlookup.infifo
├─ 1152 supervise log inlookup.infifo
├─ 1153 supervise clamd
├─ 1154 supervise log clamd
├─ 1155 supervise proxy-pop3d.4110
├─ 1156 supervise log proxy-pop3d.4110
├─ 1157 supervise mysql.3306
├─ 1158 supervise log mysql.3306
├─ 1159 supervise udplogger.3000
├─ 1160 supervise log udplogger.3000
├─ 1161 /bin/sh ./run
├─ 1162 /usr/sbin/multilog t /var/log/svc/poppass.106
├─ 1163 /bin/sh ./run
├─ 1164 /usr/bin/tcpserver -v -h -R -l argos.indimail.org -x /etc/indimail/tcp/tcp.smtp.cdb -c variables/MAXDAEMONS -o -b 75 -u 1024 -g 1015 0 25 /usr/lib/indimail/plugins/rblsmtpd.so -rdnsbl-1.uceprotect.net -rzen.spamhaus.org /usr/lib/indimail/plugins/qmail_smtpd.so
├─ 1166 /usr/sbin/cleanq -l -s 200 /var/indimail/qscanq/root/scanq
├─ 1167 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.pop3.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 995 /usr/bin/couriertls -server -tcpd /usr/sbin/pop3login /usr/libexec/indimail/imapmodules/authpwd /usr/libexec/indimail/imapmodules/authshadow /usr/libexec/indimail/imapmodules/authpam /usr/libexec/indimail/imapmodules/authindi /usr/bin/pop3d Maildir
├─ 1168 /usr/sbin/multilog t /var/log/svc/indisrvr.4000
├─ 1169 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.imap.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 143 /usr/sbin/imaplogin /usr/libexec/indimail/imapmodules/authpwd /usr/libexec/indimail/imapmodules/authshadow /usr/libexec/indimail/imapmodules/authpam /usr/libexec/indimail/imapmodules/authindi /usr/bin/imapd Maildir
├─ 1171 /usr/sbin/qmail-greyd -w /etc/indimail/control/greylist.white -t 30 -g 24 -m 2 -s 5 -h 65535 127.0.0.1 /etc/indimail/control/greylist.context
├─ 1172 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.pop3.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 110 /usr/sbin/pop3login /usr/libexec/indimail/imapmodules/authpwd /usr/libexec/indimail/imapmodules/authshadow /usr/libexec/indimail/imapmodules/authpam /usr/libexec/indimail/imapmodules/authindi /usr/bin/pop3d Maildir
├─ 1173 slowq-send /var/indimail/queue/slowq
├─ 1174 /usr/bin/qmail-cat /run/indimail/logfifo
├─ 1175 /usr/sbin/multilog t /var/log/svc/smtpd.366
├─ 1176 /usr/sbin/mysqld --defaults-file=/etc/indimail/indimail.cnf --port=3306 --basedir=/usr --datadir=/var/indimail/mysqldb/data --memlock --ssl --require-secure-transport --skip-external-locking --delay-key-write=all --skip-name-resolve --sql-mode=NO_ENGINE_SUBSTITUTION,NO_ZERO_IN_DATE,ERROR_FOR_DIVISION_BY_ZERO,STRICT_TRANS_TABLES --explicit-defaults-for-timestamp=TRUE --general-log=1 --general-log-file=/var/indimail/mysqldb/logs/general-log --slow-query-log=1 --slow-query-log-file=/var/indimail/mysqldb/logs/slowquery-log --log-queries-not-using-indexes --log-error-verbosity=3 --pid-file=/run/mysqld/mysqld.3306.pid
├─ 1177 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.imap.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 9143 /usr/bin/couriertls -server -tcpd /usr/bin/proxyimap /usr/bin/imapd Maildir
├─ 1178 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.imap.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 4143 /usr/bin/proxyimap /usr/bin/imapd Maildir
├─ 1179 /usr/sbin/udplogger -p 3000 -t 10 0
├─ 1180 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.pop3.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 4110 /usr/bin/proxypop3 /usr/bin/pop3d Maildir
├─ 1181 /usr/sbin/clamd --config-file=/etc/clamd.d/scan.conf
├─ 1182 /usr/bin/tcpserver -v -H -R -l argos.indimail.org -x /etc/indimail/tcp/tcp.smtp.cdb -c variables/MAXDAEMONS -o -b 75 -u 1024 -g 1015 0 587 /usr/lib/indimail/plugins/qmail_smtpd.so argos.indimail.org /usr/sbin/sys-checkpwd /usr/sbin/vchkpass /bin/false
├─ 1184 /usr/bin/tcpserver -v -h -R -l argos.indimail.org -x /etc/indimail/tcp/tcp.smtp.cdb -c variables/MAXDAEMONS -o -b 75 -u 1024 -g 1015 0 465 /usr/lib/indimail/plugins/rblsmtpd.so -rdnsbl-1.uceprotect.net -rzen.spamhaus.org /usr/lib/indimail/plugins/qmail_smtpd.so argos.indimail.org /usr/sbin/sys-checkpwd /usr/sbin/vchkpass /bin/false
├─ 1185 /usr/bin/dnscache
├─ 1187 /usr/bin/tcpserver -v -c variables/MAXDAEMONS -C 25 -x /etc/indimail/tcp/tcp.pop3.cdb -X -o -b 40 -H -l argos.indimail.org -R -u 555 -g 555 0 9110 /usr/bin/couriertls -server -tcpd /usr/bin/proxypop3 /usr/bin/pop3d Maildir
├─ 1188 /usr/sbin/multilog t /var/log/svc/update
├─ 1190 multilog t ./main
├─ 1191 /usr/sbin/multilog t /var/log/svc/inlookup.infifo
├─ 1194 /usr/sbin/multilog t /var/log/svc/slowq
├─ 1195 /usr/sbin/multilog t /var/log/svc/imapd.143
├─ 1196 /usr/sbin/multilog t /var/log/svc/logfifo
├─ 1197 /usr/sbin/multilog t /var/log/svc/pop3d.110
├─ 1200 /usr/sbin/multilog t /var/log/svc/pop3d-ssl.995
├─ 1201 /usr/sbin/multilog t /var/log/svc/mrtg
├─ 1203 /usr/sbin/multilog t /var/log/svc/mpdev
├─ 1204 /usr/sbin/multilog t /var/log/svc/smtpd.25
├─ 1205 /usr/sbin/multilog t /var/log/svc/resolvconf
├─ 1206 /usr/sbin/multilog t /var/log/svc/qmtpd.209
├─ 1208 /usr/sbin/multilog t /var/log/svc/freshclam
├─ 1209 /usr/sbin/multilog t /var/log/svc/fclient
├─ 1211 /usr/sbin/multilog t /var/log/svc/daned.1998
├─ 1213 /usr/sbin/multilog t /var/log/svc/imapd-ssl.993
├─ 1214 /usr/sbin/multilog t /var/log/svc/pwdlookup
├─ 1215 /usr/sbin/multilog t /var/log/svc/greylist.1999
├─ 1217 /usr/sbin/multilog t /var/log/svc/rsyncd.873
├─ 1218 /usr/sbin/multilog t /var/log/svc/proxyIMAP.4143
├─ 1219 /usr/sbin/multilog t /var/log/svc/smtpd.465
├─ 1220 /usr/sbin/multilog t /var/log/svc/deliver.25
├─ 1221 /usr/sbin/multilog t /var/log/svc/smtpd.587
├─ 1224 /usr/sbin/multilog t /var/log/svc/proxyIMAP.9143
├─ 1225 /usr/sbin/multilog t /var/log/svc/proxyPOP3.9110
├─ 1226 /usr/sbin/multilog t /var/log/svc/proxyPOP3.4110
├─ 1227 /usr/sbin/multilog t /var/log/svc/clamd
├─ 1229 /usr/sbin/multilog t /var/log/svc/mysql.3306
├─ 1230 /usr/sbin/multilog t /var/log/svc/udplogger.3000
├─ 1231 /usr/sbin/multilog t /var/log/svc/fetchmail
├─ 1232 /usr/sbin/multilog t /var/log/svc/qscanq
├─ 1290 /bin/sh ./run
├─ 1291 /usr/bin/inotify -n /etc
├─ 1292 /bin/sh ./run
├─ 1380 qmail-lspawn ./Maildir/ /var/indimail/queue/slowq
├─ 1381 qmail-rspawn /var/indimail/queue/slowq
├─ 1382 qmail-clean /var/indimail/queue/slowq slowq-send
├─ 1713 /usr/sbin/qscheduler -d ./Maildir/
├─ 1716 qmail-send -d /var/indimail/queue/queue1
├─ 1717 qmail-send -d /var/indimail/queue/queue2
├─ 1718 qmail-send -d /var/indimail/queue/queue3
├─ 1719 qmail-send -d /var/indimail/queue/queue4
├─ 1720 qmail-send -d /var/indimail/queue/queue5
├─ 1721 qmail-lspawn ./Maildir/ /var/indimail/queue/queue4
├─ 1722 qmail-rspawn /var/indimail/queue/queue4
├─ 1723 qmail-clean /var/indimail/queue/queue4 todo-proc
├─ 1724 todo-proc -d /var/indimail/queue/queue4
├─ 1725 qmail-clean /var/indimail/queue/queue4 qmail-send
├─ 1726 qmail-lspawn ./Maildir/ /var/indimail/queue/queue3
├─ 1727 qmail-rspawn /var/indimail/queue/queue3
├─ 1728 qmail-clean /var/indimail/queue/queue3 todo-proc
├─ 1729 todo-proc -d /var/indimail/queue/queue3
├─ 1730 qmail-clean /var/indimail/queue/queue3 qmail-send
├─ 1731 qmail-lspawn ./Maildir/ /var/indimail/queue/queue1
├─ 1732 qmail-rspawn /var/indimail/queue/queue1
├─ 1733 qmail-clean /var/indimail/queue/queue1 todo-proc
├─ 1734 todo-proc -d /var/indimail/queue/queue1
├─ 1735 qmail-clean /var/indimail/queue/queue1 qmail-send
├─ 1736 qmail-lspawn ./Maildir/ /var/indimail/queue/queue5
├─ 1737 qmail-rspawn /var/indimail/queue/queue5
├─ 1738 qmail-clean /var/indimail/queue/queue5 todo-proc
├─ 1739 todo-proc -d /var/indimail/queue/queue5
├─ 1740 qmail-clean /var/indimail/queue/queue5 qmail-send
├─ 1744 qmail-lspawn ./Maildir/ /var/indimail/queue/queue2
├─ 1746 qmail-rspawn /var/indimail/queue/queue2
├─ 1747 qmail-clean /var/indimail/queue/queue2 todo-proc
├─ 1748 todo-proc -d /var/indimail/queue/queue2
├─ 1749 qmail-clean /var/indimail/queue/queue2 qmail-send
├─ 3247 /usr/sbin/nssd -d notice
├─ 3255 /usr/sbin/inlookup -i 5 -c 5184000
├─ 3278 /usr/sbin/inlookup -i 5 -c 5184000
├─ 3279 /usr/sbin/inlookup -i 5 -c 5184000
├─ 3280 /usr/sbin/inlookup -i 5 -c 5184000
├─ 3281 /usr/sbin/inlookup -i 5 -c 5184000
├─ 3282 /usr/sbin/inlookup -i 5 -c 5184000
├─12992 sleep 300
├─13031 sh -c "\n sleep 10; /usr/libexec/pistop/client sleep 2>&1"
├─13038 /usr/bin/sh /usr/libexec/pistop/client sleep
└─13039 sleep 20
Dec 26 03:33:33 argos.indimail.org systemd[1]: Started svscan.service - SVscan Service.
IndiMail also provides the svps(1) command which gives a neat display on the status of all services configured for IndiMail. You can omit the -a flag to omit the logging processes.
$ sudo svps -a
------------ svscan ---------------
/usr/sbin/svscan /service up 9227 secs pid 44997
------------ main -----------------
/service/fetchmail down 9226 secs spid 45058
/service/qmail-qmqpd.628 down 9226 secs spid 45007
/service/inlookup.infifo up 9196 secs pid 46146
/service/pwdlookup up 9196 secs pid 46148
/service/dnscache up 9226 secs pid 45119
/service/freshclam up 9226 secs pid 45069
/service/greylist.1999 up 9226 secs pid 45102
/service/indisrvr.4000 up 9226 secs pid 45090
/service/mrtg up 9226 secs pid 45125
/service/mysql.3306 up 9226 secs pid 45148
/service/proxy-imapd.4143 up 9226 secs pid 45128
/service/proxy-imapd-ssl.9143 up 9226 secs pid 45141
/service/proxy-pop3d.4110 up 9226 secs pid 45147
/service/proxy-pop3d-ssl.9110 up 9226 secs pid 45120
/service/qmail-daned.1998 up 9226 secs pid 45067
/service/qmail-imapd.143 up 9226 secs pid 45064
/service/qmail-imapd-ssl.993 up 9226 secs pid 45072
/service/qmail-logfifo up 9226 secs pid 45091
/service/qmail-pop3d.110 up 9226 secs pid 45104
/service/qmail-pop3d-ssl.995 up 9226 secs pid 45114
/service/qmail-poppass.106 up 9226 secs pid 45081
/service/qmail-qmtpd.209 up 9226 secs pid 45107
/service/qmail-send.25 up 9226 secs pid 45131
/service/qmail-smtpd.25 up 9226 secs pid 45066
/service/qmail-smtpd.366 up 9226 secs pid 45065
/service/qmail-smtpd.465 up 9226 secs pid 45124
/service/qmail-smtpd.587 up 9226 secs pid 45136
/service/qscanq up 9226 secs pid 45096
/service/udplogger.3000 up 9226 secs pid 45150
------------ logs -----------------
/service/.svscan/log up 9226 secs pid 45024
/service/clamd/log up 9226 secs pid 45123
/service/fetchmail/log up 9226 secs pid 45137
/service/freshclam/log up 9226 secs pid 45074
/service/greylist.1999/log up 9226 secs pid 45097
/service/indisrvr.4000/log up 9226 secs pid 45063
/service/inlookup.infifo/log up 9226 secs pid 45118
/service/mrtg/log up 9226 secs pid 45099
/service/mysql.3306/log up 9226 secs pid 45142
/service/proxy-imapd.4143/log up 9226 secs pid 45101
/service/proxy-imapd-ssl.9143/log up 9226 secs pid 45126
/service/proxy-pop3d.4110/log up 9226 secs pid 45143
/service/proxy-pop3d-ssl.9110/log up 9226 secs pid 45117
/service/pwdlookup/log up 9226 secs pid 45132
/service/qmail-daned.1998/log up 9226 secs pid 45044
/service/qmail-imapd.143/log up 9226 secs pid 45075
/service/qmail-imapd-ssl.993/log up 9226 secs pid 45070
/service/qmail-logfifo/log up 9226 secs pid 45135
/service/qmail-pop3d.110/log up 9226 secs pid 45103
/service/qmail-pop3d-ssl.995/log up 9226 secs pid 45105
/service/qmail-poppass.106/log up 9226 secs pid 45046
/service/qmail-qmqpd.628/log up 9226 secs pid 45113
/service/qmail-qmtpd.209/log up 9226 secs pid 45106
/service/qmail-send.25/log up 9226 secs pid 45129
/service/qmail-smtpd.25/log up 9226 secs pid 45073
/service/qmail-smtpd.366/log up 9226 secs pid 45068
/service/qmail-smtpd.465/log up 9226 secs pid 45140
/service/qmail-smtpd.587/log up 9226 secs pid 45121
/service/qscanq/log up 9226 secs pid 45139
/service/udplogger.3000/log up 9226 secs pid 45149
Often you will find program like MS outlook, notorious for sending duplicate emails, flooding your inbox. IndiMail allows you to quickly deal with this proprietary nonsense by turning on duplicate eliminator in vdelivermail(8) - the default MDA. To turn on the duplicate eliminator in vdelivermail(8), you need to set ELIMINATE_DUPS environment variable.
$ sudo /bin/bash
# echo 1>/service/qmail-send.25/variables/ELIMINATE_DUPS
# svc -r /service/qmail-send.25
If you do not use vdelivermail(8) and want to use your own delivery agent? Fear not by using ismaildup(1). ismaildup expects the entire email on standard input and is easily scriptable like the example below in a dot-qmail file.
|/bin/ismaildup /home/manny/Maildir/ /usr/bin/maildirdeliver /home/manny/Maildir/
will deliver mails to /home/manny/Maildir while discarding duplicates.
If you are not happy with the 900 seconds (15 minutes) time interval for checking duplicates, you can change it by setting the ELIMINATE_DUPS_INT environment variable. The following will not allow a single duplicate to be entertained within 24 hours.
$ sudo /bin/bash
# echo 86400 > /service/qmail-send.25/variables/ELIMINATE_DUPS_INT
# svc -r /service/qmail-send.25
# exit
The duplicate eliminator uses 822header(1) program to extract all headers other than Received, Delivered-To and X-Delivered-To. The duplicate elimination is based on the md5sum values of these headers. You can alter this by running your own program (and arguments) by setting ELIMINATE_DUPS_ARGS environment variable. The program needs to read descriptor 0 to get the entire email.
IndiMail follows the traditional UNIX philosophy.
Write programs that do one thing and do it well. Write programs to work together.
Write programs to handle text streams, because that is a universal interface
This allows IndiMail to interface with many programs written by others. IndiMail uses a filter mechanism called vfilter(8). You may already be familiar with procmail. procmail is a mail delivery agent (MDA) capable of sorting incoming mail into various directories and filtering out messages. There are three ways in which you can use procmail with IndiMail.
-
inside .qmail
| preline procmail
-
edit .qmail-default
| preline -f procmail -p -m /etc/indimail/procmailrc
-
have an alias You can use valias(1) to create an alias to call procmail. The following alias calls procmail to deliver the mail using /etc/indimail/procmailrc as a procmail recipe
valias -i "|/usr/bin/preline -f /usr/bin/procmail -p -m /etc/indimail/procmailrc" [email protected]
The following procmailrc puts virus infected mails in /tmp/Maildir and calls maildirdeliver(1) to deliver the mail to /home/mail/T2Zsym/example.com/testuser01/Maildir.
SHELL=/bin/bash
VERBOSE="no"
unset DTLINE
unset RPLINE
:0w
*^X-Virus-Status: INFECTED
/tmp/Maildir/.Virus
:0w
| /usr/bin/maildirdeliver /home/mail/T2Zsym/example.com/testuser01/Maildir
You can replace maildirdeliver(1) in the last line with vdelivermail(8)
| /usr/sbin/vdelivermail '' bounce-no-mailbox
IndiMail provides multiple methods by which you can intercept an email in transit and modify the email headers or the email body. A filter can also just exit with a code to temporarily or permanently reject a mail. A filter is a simple program that expects the raw email on standard input (descriptor 0) and outputs the message text back on standard output (descriptor 1). The program /bin/cat can be used as a filter which simply copies the standard input to standard output without modifying anything. Some methods can be used before the mail gets queued and some methods can be used before the execution of local / remote delivery. The advantage of filtering before mail gets queued is when you are going to reject the message. In such a case the remote client has to handle the bounce. For SPAM mails it is prudent not to generate the bounce on your host as more often than not, the Return-Path address will be a fake one. Handling the bounces on your host will leave you a victim of joe job.
It is not necessary for a filter to modify the email. You can have a filter just to extract the headers or body and use that information for some purpose. You could also have a filter to reject the mail by doing exit 100. To help analyze the content of the mail, IndiMail provides the following programs - 822addr(1), 822headerfilter(1), 822bodyfilter(1), 822field(1), 822fields(1), 822header(1), 822body(1), 822headerok(1), 822received(1), 822date(1) to help in processing emails.
Let us say that we have written a script /usr/local/bin/myfilter. The myfilter program expects the raw email on stdin and outputs the email back (maybe modiying it) on stdout. A simple filter which simply passes the mail without modifying would be like this
#!/bin/sh
exec /usr/bin/qcat
Above we have used qcat(1) instead of the GNU cat command (/bin/cat). qcat(1) is more reliable than cat(1) as it will reliably fail in case of any error reading input or output. It has also been found to be faster than the GNU cat(1) command.
Another example of a filter that simply removes the X-SomeHeader header would be like this
#!/bin/sh
sed '0,/^X-SomeHeader:/{/X-SomeHeader:/d;}'
In the next few chapters we will discuss how to make something like /usr/local/bin/myfilter as a mail filter.
FILTERARGS is used by qmail-multi(8). qmail-multi uses uses sh -c command
where command is the value of FILTERARGS environment variable. All that you need is that command to be able to read descriptor 0 and write back the output to descriptor 1. command can be a pipeline of multiple commands like cmd1 | cmd2 | cmd3
The below configuration causes all inbound SMTP email to be fed through the filter /usr/local/bin/myfilter before DKIM signing by qmail-dkim(8). You can use the programs 822header(1), 822body(1) inside myfilter to get and manipulate the headers and body (See FILTERARGS script). FILTERARGS can be any program, with command line arguments, that can read the mail on descriptor 0 and write back the mail on descriptor 1.
$ sudo /bin/bash
# echo /usr/sbin/qmail-multi > /srevice/qmail-smtpd.25/variables/QMAILQUEUE
# echo /usr/local/bin/myfilter > /service/qmail-smtpd.25/variables/FILTERARGS
# echo "/usr/sbin/qmail-dkim" > /service/qmail-smtpd.25/variables/QUEUEPROG
# svc -r /service/qmail-smtpd.25
NOTE: If the program myfilter returns 31 or 100, the message will be bounced. If it returns 2 or 99, the message will be discarded (blackholed). You can have your own message returned to the client using exit code 88 and print your own custom message on descriptor 2. The custom message must be prefixed by the letter 'D' to indicate permanent error or letter 'Z' to indicate temporary error.
You can use qmail-qfilter(1). qmail-qfilter allows you to run multiple filters passed as command line arguments, with each filter separated by --
(two dashes). After executing all filters and none of the filters return error, qmail-qfilter(1) executes qmail-multi(8) to queue the mail. You can call any qmail-queue frontend by defining the environment variable QQF_QMAILQUEUE. Below I will demonstrate two ways to use qmail-qfilter(1) by defining QMAILQUEUE environment variable.
- You can write a shell script which calls qmail-qfilter(1) and have the shell script defined as QMAILQUEUE environment variable. The way qmail-qfilter(1) works is simple - The original content is available on descriptor 0. If your filter writes anything on the stdout, that becomes the new mail. If doesn't output anything on the stdout, the mail is passed unchanged. The envelope is available on descriptor 3. If your scripts writes on descriptor 4, that becomes the new envelope. A filter that exits 0, passes the mail unchanged. A filter that simply executes /bin/cat also passes the mail unchanged, except that qmail-qfilter(1) does a bit more work to make the new content as descriptor 0 for the next filter in the chain. You can have multiple filters passed to qmail-qfilter(1) each separated by
--
(two dashes). The example below will call myfilter script using qmail-qfilter followed by qmail-dkim. Please note that qmail-dkim(8) will call qmail-multi(8) unless you set DKIMQUEUE environment variable. So we have inserted two filters - myfilter and qmail-dkim in the chain before the mail gets queued.
$ sudo /bin/bash
# echo /usr/bin/qmail-qfilter /usr/local/bin/myfilter > /usr/local/bin/qfilter
# chmod +x /usr/local/bin/qfilter
# echo /usr/local/bin/qfilter > /service/qmail-smtpd.25/variables/QMAILQUEUE
# echo /usr/bin/qmail-dkim > /service/qmail-smtpd.25/variables/QQF_QMAILQUEUE
# svc -r /service/qmail-smtpd.25
NOTE: If the program myfilter returns 31 or 100, the message will be bounced. If it returns 2 or 99, the message will be discarded (blackholed). You can have your own message returned to the client with exit code 88 and printing your own custom message on descriptor 2. The custom message must be prefixed by the letter 'D' for permanent error or letter 'Z' to indicate temporary error.
- The other option is to set QMAILQUEUE to call qmail-qfilter(1) with /usr/local/bin/myfilter as an argument. Unlike qmail and derivatives, indimail-mta allows you to define QMAILQUEUE to have command line arguments. It also allows you to have QMAILQUEUE to be a pipeline of commands. The below examples make qmail-qfilter(1) run qmail-dkim(8) after running /usr/local/bin/myfilter.
$ sudo /bin/bash
# cd /service/qmail-smtpd.25/variables
# echo /usr/bin/qmail-qfilter /usr/local/bin/myfilter > QMAILQUEUE
# echo /usr/bin/qmail-dkim > /service/qmail-smtpd.25/variables/QQF_QMAILQUEUE
# svc -r /service/qmail-smtpd.25
Managing multiple filter scripts can become very unorganized. To make it easy, indimail-mta provides a frontend to call all filters by placing them in /etc/indimail/control/filters.d directory. qfrontend(1) can call all your filters placed in this directory without having to modify QMAILQUEUE each time you add a new filter. If this directory is absent, then few pre-installed filters in /usr/libexec/indimail/qfilters directory can be used. To enable the pre-installed filters edit the control file /etc/indimail/control/qfilters and add the filename (without the full path) in this file. Take a look at existing pre-installed filters in the /usr/libexec/indimail/qfilters. qfrontend(1) by default uses qmail-multi(8) (which uses FILTERARGS env variable) to run the filters, but can use qmail-qfilter(1) by defining USE_QMAILQFILTER environment variable.
$ sudo /bin/bash
$ cd /service/qmail-smtpd.25/variables
# echo /usr/bin/qfrontend > QMAILQUEUE
# mkdir -p /etc/indimail/control/filters.d
# mv /usr/local/bin/myfilter /etc/indimail/control/filters.d/qf-myfilter
# svc -r /service/qmail-smtpd.25
NOTE1: when using qmail-qfilter(1), you can also define QQF_MAILQUEUE to /usr/bin/qmail-nullqueue to discard the mail (blackhole) if you want to discard mails matching certain conditions that you want.
NOTE2: when using qmail-multi(8), you can also define QUEUEPROG to /usr/bin/qmail-nullqueue to discard the mail (blackhole) if you want to discard mails matching certain conditions that you want.
NOTE3: You can use exit code 88 in your filter to have your own rejection message given to the SMTP client. You can also prefix the message with D for permanent rejection and Z for a temporary rejection. e.g. DYour email contains an unacceptable Subject
will result in a permanent rejection with the message "Your email contains an unacceptable Subject".
NOTE4: When writing a filter for qmail-qfilter you can have exit 0 in the script to pass the original mail content. When writing a filter using qmail-multi (FILTERARGS), you have to call exec /bin/cat to pass the original mail content.
When you want to use your own program as QMAILQUEUE, then your program is responsible for queuing the email. It is trivial to queue the email by calling qmail-queue(8). Your script can read the stdin for the raw message (headers + body) and pipe the output (maybe after modifications) to qmail-queue(8). If you are doing DKIM signing, you can execute qmail-dkim(8) instead of qmail-queue(8). You can have qmail-dkim(8) call qmail-spamfilter(8) and have qmail-spamfilter(8) call qmail-queue(8) by setting SPAMQUEUE environment variable to /usr/sbin/qmail-queue. Assuming you want to do DKIM signing, and myfilter calls qmail-dkim(8), you can do the following
$ sudo /bin/bash
# echo /usr/local/bin/myfilter > /service/qmail-smtpd.25/variables/QMAILQUEUE
# echo /usr/sbin/qmail-spamfilter > /service/qmail-smtpd.25/variables/DKIMQUEUE
# echo /usr/sbin/qmail-queue > /service/qmail-smtpd.25/variables/SPAMQUEUE
# svc -r /service/qmail-smtpd.25
NOTE: You can set the environment variable NULLQUEUE before calling qmail-queue(8) to discard the mail completely (blackhole).
For using filters during local / remote deliveries, you can either use FILTERARGS environment variable or control file filterargs. This can be enabled if you set QMAILLOCAL or QMAILREMOTE or both to /usr/sbin/spawn-filter. Read the man page of spawn-filter(8) for more details. We will discuss below how to use spawn-filter. Enabling spawn-filter can be done like this
$ sudo bash
# cd /service/qmail-send.25/variables
# echo "/usr/sbin/spawn-filter" > QMAILLOCAL
# echo "/usr/sbin/spawn-filter" > QMAILREMOTE
# svc -r /service/qmail-send.25
The below configuration causes all local / remote deliveries to be fed through the filter /usr/local/bin/myfilter. You can use the programs 822header(1), 822body(1) inside myfilter to get and manipulate the headers and body.
$ sudo /bin/bash
# echo /usr/local/bin/myfilter > /service/qmail-send.25/variables/FILTERARGS
# svc -r /service/qmail-send.25
If you want to filter only for local delivery or only for remote delivery, you can use the environment variable QMAILLOCAL or QMAILREMOTE. QMAILLOCAL is defined only for local deliveries while QMAILREMOTE is defined only for remote deliveries.
NOTE: If the program myfilter returns 100, the message will be bounced. If it returns 2, the message will be discarded (blackholed). e.g. the below script skips filtering for remote deliveries
#!/bin/sh
if [ -n “$QMAILREMOTE” ] ; then
exec /bin/cat
fi
# rest of the script
...
...
exit 0
The control file /etc/indimail/control/filterargs gives you control to run filters individually for local or remote deliveries. It also allows you to run your filter for both local and remote deliveries. See spawn-filter(8) for full description on this control file. e.g. The following entry in /etc/indimail/control/filterargs causes all mails to yahoo.com be fed through the qmail-dkim(8) for DKIM signing.
yahoo.com:remote:/usr/sbin/qmail-dkim:DKIMQUEUE=/bin/cat
As mentioned earlier, you can use filterargs if you set QMAILLOCAL or QMAILREMOTE or both to /usr/sbin/spawn-filter
This filterargs file has the following formats.
For both local and remote deliveries
domain:args
or
domain:args:envstr
For remote deliveries
domain:remote:args
or
domain:remote:args:envstr
For local deliveries.
domain:local:args
or
domain:local:args:envstr
domain can be an exact match, wildcard or a regular expression (if QREGEX environment variable is defined). If there are multiple lines which match domain, the first line that matches domain will be used.
For local deliveries, domain refers to the recipient domain. You can have the match done on sender domain by setting MATCH_SENDER_DOMAIN.
For remote deliveries, domain refers to the sender domain. You can have the match done on recipient domain by setting MATCH_RECIPIENT_DOMAIN.
args refers to any program along with command line arguments.
envstr mentioned above is a string of environment variable additions or removals. e.g.
QREGEX=1,DKIMSIGNOPTIONS=-z 4,HOME=
sets QREGEX to 1, DKIMSIGNOPTIONS to "-z 4" and unsets HOME envrionment variable.
Here are two examples that calls qmail-dkim for DKIM signing / verification for all domains that end with .org. The first one uses regular expression and the second example uses simple wildcard match. qmail-dkim normally writes the email with the signed DKIM-Signature header to qmail-queue. But setting DKIMQUEUE=/bin/cat makes it write the signed email to standard output (descriptor 1).
.*.org:remote:/usr/sbin/qmail-dkim:DKIMQUEUE=/bin/cat,QREGEX=1
*.org:remote:/usr/sbin/qmail-dkim:DKIMQUEUE=/bin/cat,QREGEX=
NOTE: If the program referenced by args returns 100, the message will be bounced. If it returns 2, the message will be discarded (blackholed).
You can define QMAILLOCAL, QMAILREMOTE to your own program or script instead of /usr/sbin/spawn-filter. If you define QMAILLOCAL, indimail will execute the program/script defined by the QMAILLOCAL variable for all local deliveries. The arguments passed to this program/script will be the same as that for qmail-local(8). Similarly, if you define QMAILREMOTE, indimail will execute the program/script defined by the QMAILREMOTE variable for all remote deliveries. The argument passed to this program/script are the same as that for qmail-remote(8).
The raw email (header + body) is available on stdin. You can use 822header(1), 822body(1) for getting the headers and body. After your program is through with filtering, the output should be piped to qmail-local(8) for local deliveries and qmail-remote(8) for remote deliveries. You need to also call qmail-local(8) / qmail-remote(8) with the same arguments. i.e
exec qmail-local "$@" #(for local deliveries)
exec qmail-remote "$@" #(for remote deliveries)
NOTE: You can exit with value 0 instead of calling qmail-local(8) / qmail-remote(8) to discard the mail completely (blackhole)
The .qmail (known as dot-qmail(5) files allows you to control local message deliveries. See the man pages for dot-qmail(5), qmail-command(8) for more details. You can have the following in a .qmail file.
- A comment line begins with the '#' sign:
#This is a comment
- A program line begins with a veritical bar:
| maildirdeliver /home/manny/Maildir/.Important/
- A forward line begins with an ampersand:
&user@domain
- An mbox line begins with a slash or dot, and does not end with a slash:
/home/manny/Mailbox
- A maildir line begins with a slash or dot, and ends with a slash:
/home/manny/Maildir/
- A branch line begins with a question mark, and ends with a label. Read the dot-qmail(5) man page for details.
- A envdir line begins with the '%' sign:
%/home/manny/envdir. If you define envdir variables, qmail-local(8) will run programs defined in program line with these environment variables in addition to existing environment variables. You can clear existing environment variables (set for qmail-start(8) when it was invoked) by setting the SANITIZE_ENV. You can decide which environment variables to preserve from the existing list by define SANITIZE_ENV as a list of colon separated list of variables that you want to retain.
The program line | maildirdeliver /home/mannny/Maildir/.Important
can also be written as /home/manny/Maildir/.Important/
in which case qmail-local(8) will use it's internal maildir delivery function which will be faster as it eliminates a call to exec(2).
One can use | /bin/filterit <args> ...
to use a configurable filter to do some real easy filtering. The program line |/bin/filterit <args> ...
can replaced with |filterit <arguments> ...
to make qmail-local(8) use it's internal filter function, which has the same arguments as the external filterit(1) program, but will be slightly faster due to elimination of the exec(2) system call.
The filterit(1) program accepts many arguments, with -h header argument being the defining argument. The filterit(1) program can perform a match on any header in your email and take action like deliver to a Maildir, bounce or drop the mail, or forward the mail to any address. The match criteria is based on -k keyword and -c comparision arguments. The -k specifies a keyword to be used against the header specified by -h argument. The argument -c comparision specifies what type of match you want to perform. It is one of "Equals", "Starts with", "Ends with", "Contains". The -a type and -A action specifies what action to take when a match occurs. Here type can be one of "Exit", "Maildir" or "Forward". e.g. -a Maildir -A "./Maildir/.Spam/"
says that when a match occurs, deliver the mail to the Maildir ./Maildir/.Spam
folder. Apart from -a, -A argument, one needs to specify -d type -D action which specify the default action to take when a match doesn't occur. The match criteria can be reversed by using -r argument. If -r is used -c "Equals" becomes the opposite of -c "Equals". By default, filterit(1) exits with the value 99 when a match occurs. So if, filterit(1) is used in dot-qmail, a match will stop further processing of the dot-qmail file. You can use -x argument to insert X-FilterIT header having the original invocation arguments as the header value. You can also test filterit(1) on the command line by feeding it a RFC822 email on descriptor 0. You can pass the -n argument to make filterit(1) display the action it would take without actually taking any action. Here are examples (which are also in the man page of filterit(1).
# Move mail to Quarantine folder and exit 99, else exit 0
# when used with clamav, qmail-queue qhspi puts the header
# X-QHPSI: clean.
# passing -r option to filterit makes the filter match when the header
# does not have "clean" as the header value
# this filter will exit 99 on match, causing qmail-local to
# stop at this line
| filterit -xr -h X-QHPSI -k "clean" -c "Equals" -a Maildir -A ./Maildir/.Quarantine/ -d exit -D 0
# Move mail to Spam folder and exit 99, else exit 0
# bogofilter inserts the X-bogosity header like below
# X-Bogosity: No, spamicity=0.520000, cutoff=9.90e-01, ...
# The filter below will move the mail to Spam folder if X-Bogosity
# value starts with "Yes".
# additionally -e 0 is passed which makes the filter exit 0 on a
# match. This allows qmail-local to go to the next filter even
# though the filter has a match
| filterit -x -h X-Bogosity -k "Yes" -c "Starts with" -a Maildir -A ./Maildir/.Spam/ -d exit -D 0 -e 0
# match criteria same as above, but this filter forwards spam mails
# to [email protected] instead of putting it in Maildir
# this filter will exit 99 on match, causing qmail-local to
# stop at this line
| filterit -x -h X-Bogosity -k "Yes" -c "Starts with" -a forward -A [email protected] -d exit -D 0
# If the mail passes through the above filters, deliver it to Maildir
./Maildir/
If you want to manipulate the original mail, read it on descriptor 0 and pipe the output to maildirdeliver(1) for the final delivery to a Maildir folder.
The valias(1) mechanism allows you to execute your own programs for local deliveries to your virtual domain. See the man pages for valias(1) for more details. After manipulating the original raw email on stdin, you can pipe the output to the program maildirdeliver(1) for the final delivery to any Maildir of any virtual user. You can use the vuserinfo(1) command to get the Maildir for any virtual user.
Assuming you write the program /usr/local/bin/myfilter to call maildirdeliver(1) program, you can use the valias(1) command to add the following alias
$ valias -i "|/usr/local/bin/myfilter" [email protected]
Now any mail sent to [email protected] will be given to the program /usr/local/bin/myfilter as standard input.
NOTE: you can exit with value 0 instead of calling the maildirdeliver(1) program to discard the mail completely (blackhole).
indimail-mta's filterit(1) or IndiMail's vfilter(8) mechanism allows you to create rule based filter based on any keyword in the message headers or message body. You can create a vfilter by calling the vcfilter(8) program.
$ vcfilter -i -t myfilter -h Subject -c 0 -k "failure notice" -f /NoDeliver -b "2|/usr/local/bin/myfilter" [email protected]
NOTE: you can exit with value 0 instead of putting anything on standard output to discard the mail completely (blackhole). Also note that, vcfilter(1) stores filter configuration in MySQL.
e.g. the below filter looks for emails having "failure notice" in the subject line and inserts the line "sorry about that" in the first line of the message body and puts the line “sent by IndiMail Messaging platform” in the last line
#!/bin/sh
# create a temporary file
tmp_file=`mktemp -p /var/tmp -t myfilter.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file
exit 111
fi
# Copy the stdin
/bin/cat > $tmp_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file
exit 111
fi
subject=`/usr/bin/822header -I Subject < $tmp_file`
echo $subject | grep "failure notice" > /dev/null 2>&1
if [ $? -eq 0 ] ; then
(
/usr/bin/822header < $tmp_file
echo
echo "sorry about that"
/usr/bin/822body < $tmp_file
echo "sent by IndiMail Messaging platform"
)
else
/bin/cat $tmp_file
fi
/bin/rm -f $tmp_file
exit 0
#!/bin/sh
# create a temporary file
inp_file=`mktemp -p /var/tmp -t myfilteri.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file
exit 111
fi
out_file=`mktemp -p /var/tmp -t myfiltero.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
/bin/cat > $inp_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
subject=`/usr/bin/822header -I Subject < $inp_file`
echo $subject | grep "failure notice" > /dev/null 2>&1
if [ $? -eq 0 ] ; then
(
/usr/bin/822header < $inp_file
echo
echo "sorry about that"
/usr/bin/822body < $inp_file
echo "sent by IndiMail Messaging platform"
) > $out_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
exec 0<$out_file
else
exec 0<$inp_file
fi
/bin/rm -f $inp_file $out_file
# queue the message
exec /usr/bin/qmail-queue
exit 111
#!/bin/sh
# This scripts expects qmail-remote arguments on command line
# argv0 - qmail-remote
# argv1 - host (host)
# argv2 - sender (sender)
# argv3 - qqeh (qmail queue extra header)
# argv4 - size
# argv5 .. argvn - recipients
#
#
host=$1
sender=$2
qqeh=$3
size=$4
shift 4
#
# if needed you can modify host, sender, qqeh, size args above
#
if [ -z "$QMAILREMOTE" ] ; then # execute qmail-local
# call spawn-filter so that features like
# FILTERARGS, SPAMFILTER are not lost
exec -a qmail-local /usr/bin/spawn-filter "$@"
fi
if [ " $CONTROLDIR" = " " ] ; then
FN=/etc/indimail/control/filterargs
else
FN=$CONTROLDIR/filterargs
fi
if [ -n "$SPAMFILTER" -o -n "$FILTERARGS" -o -f $FN ] ; then
# execute spawn-filter if you have filters defined for remote/local deliveries
PROG="bin/spawn-filter"
else
PROG="bin/qmail-remote"
fi
# create a temporary file
inp_file=`mktemp -p /var/tmp -t myfilteri.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file
exit 111
fi
out_file=`mktemp -p /var/tmp -t myfiltero.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
/bin/cat > $inp_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
subject=`/usr/bin/822header -I Subject < $inp_file`
echo $subject | grep "failure notice" > /dev/null 2>&1
if [ $? -eq 0 ] ; then
(
/usr/bin/822header < $inp_file
echo
echo "sorry about that"
/usr/bin/822body < $inp_file
echo "sent by IndiMail Messaging platform"
) > $out_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
exec 0<$out_file
else
exec 0<$inp_file
fi
/bin/rm -f $inp_file $out_file
# $PROG points to spawn-filter if FILTERARGS or SPAMFILTER is set
# use $PROG so that features like FILTERARGS, SPAMFILTER are not lost
exec -a qmail-remote $PROG "$host" "$sender" "$qqeh" $size $*
exit 111
#!/bin/sh
# This scripts expects qmail-local arguments on command line
# argv0 - qmail-local
# argv1 - user
# argv2 - homedir
# argv3 - local
# argv4 - dash
# argv5 - ext
# argv6 - domain
# argv7 - sender
# argv8 - defaultdelivery (mbox, Maildir)
# argv9 - qqeh
#
user=$1
homedir=$2
local=$3
dash=$4
ext=$5
domain=$6
sender=$7
defaultdel=$8
qqeh=$9
if [ -z "$QMAILLOCAL" ] ; then # execute qmail-remote
# call spawn-filter so that features like
# FILTERARGS, SPAMFILTER are not lost
exec -a qmail-remote /usr/bin/spawn-filter "$@"
fi
# create a temporary file
inp_file=`mktemp -p /var/tmp -t myfilteri.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file
exit 111
fi
out_file=`mktemp -p /var/tmp -t myfiltero.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
/bin/cat > $inp_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
subject=`/usr/bin/822header -I Subject < $inp_file`
echo $subject | grep "failure notice" > /dev/null 2>&1
if [ $? -eq 0 ] ; then
(
/usr/bin/822header < $inp_file
echo
echo "sorry about that"
/usr/bin/822body < $inp_file
echo "sent by IndiMail Messaging platform"
) > $out_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
exec 0<$out_file
else
exec 0<$inp_file
fi
/bin/rm -f $inp_file $out_file
# call spawn-filter so that features like
# FILTERARGS, SPAMFILTER are not lost
exec -a qmail-local /usr/bin/spawn-filter "$@"
exit 111
#!/bin/sh
# create a temporary file
inp_file=`mktemp -p /var/tmp -t myfilteri.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file
exit 111
fi
out_file=`mktemp -p /var/tmp -t myfiltero.XXXXXXXXXXXXXXX`
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
/bin/cat > $inp_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
subject=`/usr/bin/822header -I Subject < $inp_file`
echo $subject | grep "failure notice" > /dev/null 2>&1
if [ $? -eq 0 ] ; then
(
/usr/bin/822header < $inp_file
echo
echo "sorry about that"
/usr/bin/822body < $inp_file
echo "sent by IndiMail Messaging platform"
) > $out_file
if [ $? -ne 0 ] ; then
/bin/rm -f $inp_file $out_file
exit 111
fi
exec 0<$out_file
else
exec 0<$inp_file
fi
/bin/rm -f $inp_file $out_file
#
# unset RPLINE so that maildirdeliver does not add a duplicate Return-Path line
# unset PWSTRUCT so that password structure cached is removed for vuserinfo to
# work correctly
#
unset RPLINE PWSTRUCT
dir=`/usr/bin/vuserinfo -d [email protected] | cut -d: -f2 |cut -c2-`
if [ $? -ne 0 -o " $dir" = " " ] ; then
echo "unable to get user's homedir" 1>&1
exit 111
fi
exec /usr/bin/maildirdeliver "$dir"/Maildir
exit 111
IndiMail has multiple methods to insert your script anywhere before or after queueing, before local or remote delivery. Refer to the chapter Writing Filters for IndiMail on how to do this. SPAM and Virus filtering use the same techniques for filtering emails discussed in the previous chapter.
If you have installed indimail-spamfilter package, you will have bogofilter providing a bayesian spam filter.
bogofilter(1) requires training to be able to classify emails as spam or ham. The next section tells you how to carry out this training. You can also have a pre-trained database installed by installing the bogofilter-wordlist package, but it is possible that this may not work well in your setup.
On of the easiest method to enable bogofilter(1) is to set few environment variable for indimail's qmail-spamfilter(8). qmail-spamfilter(8) is a frontend for qmail-queue(8) program. e.g. to enable spam filter on the incoming SMTP on port 25:
$ sudo /bin/bash
# cd /service/qmail-smtpd.25/variables
Move QMAILQUEUE to SPAMQUEUE only if QMAILQUEUE isn't defined
as /usr/sbin/qmail-spamfilter.
# cat QMAILQUEUE
/usr/sbin/qmail-queue
# mv QMAILQUEUE SPAMQUEUE
# echo /usr/sbin/qmail-spamfilter > QMAILQUEUE
# echo "/usr/bin/bogofilter -p -d /etc/indimail" > SPAMFILTER
# echo "0" > SPAMEXITCODE
# echo "0" > REJECTSPAM
# echo "1" > MAKE_SEEKABLE
# exit
$
You can also do spam filtering during local or remote delivery by using spawn-filter(8) by either setting SPAMFILTER environment variable or creating a control file /etc/indimail/control/spamfilter. Few examples are as below
# do spam filtering during all local deliveries
*:local:/bin/bogofilter -p -d /etc/indimail -u:SPAMEXITCODE=0
# do spam filtering during all remote deliveries
*:remote:/bin/bogofilter -p -d /etc/indimail -u:SPAMEXITCODE=0
# do spam filtering during all local deliveries to domain *.indimail.org
*.indimail.org:local:/bin/bogofilter -p -d /etc/indimail -u:SPAMEXITCODE=0
# do spam filtering during all remote deliveries from domain *.indimail.org
*.indimail.org:remote:/bin/bogofilter -p -d /etc/indimail -u:SPAMEXITCODE=0
If you don't want to use the spamfilter control file you can set SPAMFILTER, SPAMEXITCODE environment variables for qmail-send service.
$ sudo bash
$ cd /service/qmail-send.25/variables
$ echo "/bin/bogofilter -p -d /etc/indimail" > SPAMFILTER
$ echo "0" > SPAMEXITCODE
$ echo "0" > REJECTSPAM
We can reject mails identified as spam. We could instead accept all emails but put them in the Spam folder by using vcfilter(1) to create a vfilter, or by using filterit(1) in dot-qmail. vcfilter(1) can be used only if you have indimail-virtualdomains installed. Examples for using both are shown below.
$ sudo vcfilter -i -t spamFilter -c "Starts with" -k "Yes, spamicity=" -f Spam -b 0 -h X-Bogosity prefilt@domain
or
in dot-qmail
| filterit -x -h X-Bogosity -k "Yes" -c "Starts with" -a Maildir -A ./Maildir/.Spam/ -d exit -D 0 -e 0
Now qmail-spamfilter(8) will pass every mail through bogofilter(1) before it gets passed to qmail-queue(8). You can refer to chapter IndiMail Queue Mechanism and look at the picture to understand how it works. bogofilter(1) will add X-Bogosity in each and every mail. A spam mail will have the value Yes
along with a probabality number (e.g. 0.999616 below). You can configure bogofilter(1) in /etc/indimail/bogofilter.cf. The SMTP logs will also have lines having this X-Bogosity field. A detailed mechanism is depicted pictorially in the chapter Virus Scanning using QHPSI.
X-Bogosity: Yes, spamicity=0.999616, cutoff=9.90e-01, ham_cutoff=0.00e+00, queueID=6cs66604wfk,
The method describe above is a global SPAM filter. It will happen for all users, unless you use something like envrules to unset SPAMFILTER environment variable. You can use envrules to set SPAMFILTER for few specific email addresses. You can refer to the chapter Envrules for more details.
There is another way you can do spam filtering - during local delivery (you could do for remote delivery, but what would be the point?). IndiMail allows you to call an external program during local/remote delivery by settting QMAILLOCAL / QMAILREMOTE environment variable. You could use any method to call bogofilter(1) (either directly in filterargs control file, or your own script). You can see a Pictorial representation of how this happens.
Training bogofilter(1) requires creating a bogofilter databases with corpus of HAM and SPAM emails with SPAM comprising roughly 30% of the total. A good way to start is download an initial corpus from the spamassasin database. Do not run the below curl command with root privileges.
$ mkdir /home/manny/bogofilter
$ cd /home/manny/bogofilter
$ curl -s https://raw.githubusercontent.com/indimail/indimail-virtualdomains/master/bogofilter-wordlist-x/download.sh | sh
$ curl -s https://raw.githubusercontent.com/indimail/indimail-virtualdomains/master/bogofilter-wordlist-x/training.sh | sh
$ sudo cp wordlist.db /etc/indimail
$ sudo chmod 644 /etc/indimail/wordlist.db
$ sudo chown indimail:indimail /etc/indimail/wordlist.db
The above steps will download the spamasassin corpus in the directory /home/manny/bogofilter/training and also create a bogofilter spam database wordlist.db trained from spamassasin corpus at http://spamassassin.apache.org/old/publiccorpus.
You can keep on updating the subfolders easy_ham_2 and spam_2 subfolders in /home/manny/bogofilter/training directory and run the training.sh script. One possible method could be to have a script that uses the find command to copy ham emails from your Maildir subfolders, that you know for sure have non-spam emails, to the easy_ham_2 subfolder in the training directory. You can have folder named Spam
in your Maildir where you move spam emails using your mail client. This will be spam emails not caught by bogofilter(1). You can have the same script copy spam mails from Spam
folder to spam_2 subfolder in the training directory.
IndiMail has many methods to help deal with spam. For detecting spam, IndiMail uses bogofilter(1) a fast bayesian spam filter. IndiMail's qmail-smtpd(8) which provides SMTP protocol is neatly integrated with bogofilter(1). When bogofilter(1) detects spam, qmail-smtpd(8) prints the X-Bogosity header as part of SMTP transaction log
$ grep "X-Bogosity, Yes" /var/log/svc/smtpd.25/current
@400000004bc8183f01fcbc54 qmail-smtpd: pid 16158 from ::ffff:88.191.35.203 HELO X-Bogosity: Yes, spamicity=0.999616, cutoff=9.90e-01, ham_cutoff=0.00e+00, queueID=6cs66604wfk,
The value "Yes" in X-Bogosity indicates spam. You can tell qmail-smtpd(8) to reject such mails at SMTP just by doing
# echo 1 > /service/qmail-smtpd.25/variables/REJECTSPAM
# svc -r /service/qmail-smtpd.25
SMTP clients which tries to send a spam mail will get the following error at the end of the SMTP transaction
554 SPAM or junk mail threshold exceeded (#5.7.1)
The mail will get bounced. In some cases you would want to issue temporary error to such clients. In the above SMTP transaction log, the IP address of the client was 88.191.35.203. To put such client's into IndiMail's SPAM blacklist, you just need to put the IP address in the control file /etc/indimail/control/badip
# echo 88.191.35.203 >> /etc/indimail/control/badip
For turning on the BADIP functionality, you need to set the BADIPCHECK or the BADIP environment variable. i.e.
# echo badip > /service/qmail-smtpd.25/variables/BADIP
# svc -r /service/qmail-smtpd.25
Clients whose IP match an entry in badip will be greeted as below
421 indimail.org sorry, your IP (::ffff:88.191.35.203) is temporarily denied (#4.7.1)
Also the client will not be able to carry out any SMTP transactions like ehlo, MAIL FROM, RCPT TO, etc. A large ISP can run the following command every day once in cron
grep "X-Bogosity, Yes" /var/log/svc/qmail.smtpd.25/current > /etc/indimail/control/badip
If your /etc/indimail/control/badip file becomes very large, you can also take advantage of IndiMail's ability to use cdb (or you could use MySQL too)
$ sudo /usr/bin/qmail-cdb badip
A large fraction of today’s emails is infected by a virus or a worm. It is necessary to recognize those malicious emails as soon as possible already in the DATA phase of the SMTP conversation and to reject them.
When you use IndiMail, it is ultimately qmail-queue(8) which is responsible for queueing your messages. qmail-queue(8) stores the message component of queued mails (captured duing DATA phase of the SMTP conversation) under the mess subdirectory.
Files under the mess subdirectory are named after their i-node number. Let us look at a typical log sequence for a message received on the local system.
@400000004b9da2f03b424bb4 new msg 660188
@400000004b9da2f03b426324 info msg 660188: bytes 2794 from [email protected] qp 3223 uid 555
@400000004b9da2f03b42c0e4 starting delivery 6: msg 660188 to local [email protected]
@400000004b9da2f03b42dc3c status: local 1/10 remote 0/20
@400000004b9da2f106a1e234 delivery 6: success: did_1+0+0/
@400000004b9da2f1091e676c status: local 0/10 remote 0/20
@400000004b9da2f1091fa3d4 end msg 660188
The above lines indicates that indimail-mta has received a new message, and its queue ID is 660188. What this means is that is qmail-queue(8) has created a file named /var/indimail/queue/mess/NN/660188. The i-node number of the file is 660188. This is the queue file that contains the message. The queue ID is guaranteed to be unique as long as the message remains in the queue (you can't have two files with the same i-node in a filesystem).
To perform virus scanning, it would be trivial to do virus scanning on the mess file above in qmail-queue(8) itself. That is exactly what IndiMail does by using a feature called Qmail High Performance Virus Scanner (QHPSI). QHPSI was conceptualized by Erwin Hoffman and this feature comes from s/qmail. You can read here for more details.
IndiMail takes QHPSI forward by adding the ability to add plugins. The QHPSI extension for qmail-queue(8) allows to call an arbitary virus scanner directly, scanning the incoming data-stream on STDIN. Alternatively, it allows plugins to be loaded from the /usr/lib/indimail/plugins directory. This directory can be changed by defining PLUGINDIR environment variable. QHPSI can be advised to pass multiple arguments to the virus scanner for customization. To run external scanner or load scanner plugins, qmail-queue(8) calls qhpsi, a program setuid to qscand. By default, qhpsi looks for the symbol virusscan to invoke the scanner. The symbol can be changed by setting the environment variable QUEUE_PLUGIN to the desired symbol.
Today’s virus scanner -- in particluar Clam AV -- work in resource efficient client/server mode (clamd/clamdscan) and include the feature to detect virii/worms in the base64 encoded data stream. Thus, there is no necessity to call additional programs (like reformime or ripmime(1) except for the virus scanner itself.
You can see how the scanning works
To enable virus scanning in IndiMail during the SMTP data phase, you can implement either of the two methods below
Define QHPSI in tcp.smtp and rebuild tcp.smtp.cdb using tcprules.
:allow,QHPSI=’/usr/bin/clamdscan %s --quiet --no-summary’
Define QHPSI in SMTP service's variable directory
$ sudo /bin/bash
# echo "/usr/bin/clamdscan %s --quiet --no-summary" > /service/qmail-smtpd.25/variables/QHPSI
If you have installed IndiMail using RPM/Debian/Arch packages from OBS or RPM packages from COPR, QHPSI is enabled by default by defining it in the qmail-smtpd.25 variables directory. If you have clamd, clamav already installed on your server, the binary installation of indimail-mta also installs two services under supervise(8).
- freshclam - service to update the clamd virus databases
- clamd - service to run the clamd scanner
You may need to disable clamd, freshclam startup by your system boot process and enable the startup under indimail. Do have the clamd, freshclam service started up by indimail, remove the down file. i.e.
$ sudo /bin/rm /service/freshclam/down /service/clamd/down
$ sudo /usr/bin/svc -u /service/clamd /service/freshclam
$ tail -f /var/log/indimail/freshclam/current
@400000004b9da034170f6394 cdiff_apply: Parsed 17 lines and executed 17 commands
@400000004b9da03417103e54 Retrieving http://database.clamav.net/daily-10574.cdiff
@400000004b9da0342261b83c Trying to download http://database.clamav.net/daily-10574.cdiff (IP: 130.59.10.36)
Downloading daily-10574.cdiff [100%]g daily-10574.cdiff [ 13%]
@400000004b9da03509c39c64 cdiff_apply: Parsed 436 lines and executed 436 commands
@400000004b9da03510c3485c daily.cld updated (version: 10574, sigs: 24611, f-level: 44, builder: ccordes)
@400000004b9da03510c4d2e4 bytecode.cvd version from DNS: 2
@400000004b9da03510c4de9c bytecode.cvd is up to date (version: 2, sigs: 2, f-level: 44, builder: nervous)
@400000004b9da03510c82e44 Database updated (729340 signatures) from database.clamav.net (IP: 130.59.10.36)
$ cat /var/log/indimail/clamd/current
@400000004b9da0260d6c1a94 Limits: Global size limit set to 104857600 bytes.
@400000004b9da0260d6c264c Limits: File size limit set to 26214400 bytes.
@400000004b9da0260d6c3204 Limits: Recursion level limit set to 16.
@400000004b9da0260d6c3dbc Limits: Files limit set to 10000.
@400000004b9da0260d6c4974 Archive support enabled.
@400000004b9da0260d6c5144 Algorithmic detection enabled.
@400000004b9da0260d6c5cfc Portable Executable support enabled.
@400000004b9da0260d6c68b4 ELF support enabled.
@400000004b9da0260d6c7084 Detection of broken executables enabled.
@400000004b9da0260e7abfbc Mail files support enabled.
@400000004b9da0260e7acb74 OLE2 support enabled.
@400000004b9da0260e7ad344 PDF support enabled.
@400000004b9da0260e7adefc HTML support enabled.
@400000004b9da0260e7ae6cc Self checking every 600 seconds.
@400000004b9da2a3116a177c No stats for Database check - forcing reload
@400000004b9da2a3206deb04 Reading databases from /var/indimail/share/clamd
@400000004b9da2a70489facc Database correctly reloaded (728651 signatures)
@400000004b9da2a7061e372c /var/indimail/queue/queue2/mess/16/660188: OK
Once you have QHPSI enabled, qmail-queue(8) will add the X-QHPSI header in the mail. You will have the following header
X-QHPSI: clean
in case the email is clean and the following header if a virus is found
X-QHPSI: virus found
The default configuration of IndiMail will allow these emails to be delivered to the inbox. This is because some sites have have legislations like SOX, etc to enforce archiving of all emails that come into the system. In case you want to reject the email at SMTP you can do the following
$ sudo /bin/bash
# echo 1 > /service/qmail.smtpd/variables/REJECTVIRUS
# svc -r /service/qmail-smtpd.25
One can use filterit(1) in dot-qmail or create a vfilter using vcfilter(1) to create a vfilter, to deliver such email to the quarantine folder. vcfilter(1) can be used only if you have indimail-virtualdomains installed. Examples for using both are shown below.
/usr/bin/vcfilter -i -t virusFilter -c "Equals" -k "virus found" -f Quarantine -b 0 -h 28 prefilt@$1
or in dot-qmail
| filterit -xr -h X-QHPSI -k "clean" -c "Equals" -a Maildir -A ./Maildir/.Quarantine/ -d exit -D 0
If you implement different method, than explained above, let me know.
spamassassin is a popular spam detection tool that can be used with IndiMail.
IndiMail uses environment variables SPAMFILTER, SPAMEXITCODE to configure any spam filter to be used. All that is required for the spam filter is to read a mail message on stdin, output the message back on stdout and exit with a number which indicates whether the message is ham or spam.
The default installation of IndiMail creates a configuration where mails get scanned by bogofilter(1) for spam filtering. bogofilter(1) exits with value '0' in case the message is spam and with value '1' when message is ham. The settings for SPAMFILTER, SPAMEXITCODE is as below
SPAMFILTER="/usr/bin/bogofilter -p -u -d /etc/indimail"
SPAMEXITCODE=0 # return value from spam filter that should be treated as spam
Assuming that you have installed, setup and trained spamassassin, you can follow the instructions below to have IndiMail use spamassasin.
spamassasin has a client spamc which exits 1 when message is spam and exits 0 if the message is ham. To use spamassasin, just use the following for SPAMFILTER, SPAMEXITCODE.
SPAMFILTER="path_to_spamc_program -E-d host -p port -u user"
SPAMEXITCODE=1
(see the documentation on spamc for description of arguments to spamc program). You an also use -U socket_path, to use unix domain socket instead of -d host, which uses tcp/ip
Since IndiMail uses envdir(8) program to set environment variable, a simple way would be to set SPAMFILTER, SPAMEXITCODE is to do the following
$ sudo /bin/bash
# echo "spamcPath -E -d host -p port -u user" > /service/qmail-smtpd.25/variables/SPAMFILTER
# echo 1 > /service/qmail-smtpd.25/variables/SPAMEXITCODE
What if you want to use both bogofilter(1) and spamasssin. You can use a simple script like below as the SPAMFILTER program
#!/bin/bash
#
# you can -U option in spamc, pointing to a unix domain path instead of -d
#
DESTHOST=x.x.x.x
#
# pass the output of bogofilter to spamc and passthrough spamc output to stdout
# store the exit status of bogofilter in status1 and spamc in status2
#
/usr/bin/bogofilter -p -d /etc/indimail | /usr/bin/spamc -E -d $DESTHOST -p 783
STATUS=("${PIPESTATUS[@]}")
status1=${STATUS[0]}
status2=${STATUS[1]}
# bogofilter returned error
if [ $status1 -eq 2 ] ; then
exit 2
fi
# spamc returned error see the man page for spamc
if [ $status2 -ge 64 -a $status2 -le 78 ] ; then
exit 2
fi
#
# message is spam
# bogofilter returns 0 on spam, spamc returns 1 on spam
#
if [ $status1 -eq 0 -o $status2 -eq 1 ] ; then
exit 0
fi
exit 1
Let us call the above script as bogospamc and let us place it in /usr/bin
$ sudo /bin/bash
# echo /usr/bin/bogospamc > /service/qmail-smtpd.25/variables/SPAMFILTER
# echo 0 > /service/qmail-smtpd.25/variables/SPAMEXITCODE
Any email that needs to be delivered needs to be put into a queue before it can be taken up for delivery. Email can be submitted to the queue using qmail-queue(8) command or qmail_open() function. The following programs use the qmail_open() API - condredirect(1), dot-forward(1), fastforward(1), filterto(1), forward(1), maildirserial(1), new-inject(1), ofmipd(8), qmail-inject(8), qmail-local(8), qmail-qmqpd(8), qmail-qmtpd(8), qmail-queue(8), qmail-send(8), qreceipt(1), replier(1), rrforward(1), qmail-smtpd(8). Of these, qmail-smtpd(8) and qmail-qmtpd(8) accept an email for a domain only if the domain is listed in rcpthosts. Once an email is accepted into the queue, todo-proc(8) decides if the mail is to be delivered locally or to a remote address. If you are using slowq-send(8), it is slowq-send(8) that does the job of todo-proc(8) and qmail-send(8). If you are using qmta-send(8), it is qmta-send(8) that does the job of todo-proc(8) and qmail-send(8). If the email address corresponds to a domain listed in locals or virtualdomains control file, steps are taken to have the email delivered locally.
The delivery mode depends on the argument passed to qscheduler(8) during startup. The script /service/qmail-send.25/run passes the content of the file /etc/indimail/control/defaultdelivery as an argument to qscheduler(8). See INSTALL.mbox, INSTALL.maildir, and INSTALL.vsm for more information. To select your default mailbox type, just enter the defaultdelivery value from the table into /etc/indimail/control/defaultdelivery. e.g., to select the standard qmail Maildir delivery, do:
echo ./Maildir/ >/etc/indimail/control/defaultdelivery
NOTE: If you are using slowq-start(8), then the deliver mode depends on the argument passed to slowq-start(8). The slowq-send(8) startup script /service/slowq-send/run also uses /etc/indimail/control/defaultdelivery for the default delivery mode. If you are using qmta-send(8), the deliver mode depends on the -d option. qmta-send(8) doesn't use the defaultdelivery control file.
Once you have decided the delivery mode above, one needs to have some mechanism to assign a local address for the delivery. indimail-mta offers the following mechanisms.
locals
Any email addressed to user@domain listed in the file /etc/indimail/control/locals will be delivered to the local user user. If you have Maildir as the delivery mode and an email to user kanimoji@domain with home directory /home/blackmoney, will be delivered to /home/blackmoney/Maildir/new. qmail-lspawn(8) uses the program qmail-getpw(8) to the uid, gid, home, dash and extension for any user in the /etc/passwd file. You can set the environment variable QMAILGETPW to an alternate qmail-getpw(8) program. Read qmail-getpw(8) for more details.
virtualdomains
The control file /etc/indimail/control/virtualdomains allows you to have multiple domains configured on a single server. Entries in virtualdomains are of the form:
user@domain:prepend
qmail converts user@domain to prepend-user@domain and treats the result as if domain was local. The user@ part is optional. If it's omitted, the entry matches all @domain addresses. When you run the vadddomain(1) command
$ sudo vadddomain example.com some_password
It will add the following entry in virtualdomains control file
$ cat /etc/indimail/control/virtualdomains
example.com:example.com
What this means is that any email addressed to [email protected] will be delivered to the address [email protected]. indimail-mta further uses qmail-users(5) mechanism to deliver the email for users in a virtual domain. This is explained below
The file /etc/indimail/users/assign assigns addresses to users. A simple assignment is a line of the form
=local:user:uid:gid:homedir:dash:ext:
Here local is an address; user, uid, and gid are the account name, uid, and gid of the user in charge of local; and messages to local will be controlled by
homedir/.qmaildashext
If there are several assignments for the same local address, qmail-lspawn(8) will use the first one. local is interpreted without regard to case.
A wildcard assignment is a line of the form
+loc:user:uid:gid:homedir:dash:pre:
This assignment applies to any address beginning with loc, including loc itself. It means the same as
=locext:user:uid:gid:homedir:dash:preext:
for every string ext. When you add a virtualdomain using vadddomain(8), you will have the following entry
+example.com-:example.com:555:555:/var/indimail/domains/example.com:-::
As stated earlier, any email addressed to [email protected] will be delivered to local user [email protected] because of virtualdomains control file. The above address can be looked as
[email protected]:example.com:555:555:/var/indimail/domains/example.com:-:user:
So you can see that emails are controlled by .qmail-user in the directory /var/indimail/domains/example.com. if .qmail-user does not exist, then .qmail-default will be used. Adding the entry
+example.com-customer_care-:example.com:555:555:/var/indimail/domains/example.com/cc:-::
will cause emails to [email protected]
, [email protected]
, etc to be handled by /var/indimail/domains/cc/.qmail-default (if .qmail-customer_care-delhi
does does not exist).
In the indimail-mta system, you control all local addresses of the form user-anything, as well as the address user itself, where user is your account name. Delivery to user-anything is controlled by the file homedir/.qmail-anything. (These rules may be changed by editing the assign file as given above in qmail-users(5).
The alias user controls all other addresses. Delivery to user is controlled by the file homedir/.qmail-user, where homedir is alias's home directory. In the following description, qmail-local(8) is handling a message addressed to local@domain, where local is controlled by .qmail-ext. Here is what it does. If .qmail-ext is completely empty, qmail-local(8) follows the defaultdelivery instructions set by your system administrator. If .qmail-ext doesn't exist, qmail-local(8) will try some default .qmail files. For example, if ext is foo-bar, qmail-local(8) will try first .qmail-foo-bar, then .qmail-foo-default, and finally .qmail-default. If none of these exist, qmail-local(8) will bounce the message. (Exception: for the basic user address, qmail-local(8) treats a nonexistent .qmail the same as an empty .qmail.) The vadddomain(1) command creates the file .qmail-default in /var/domain/domains/domain_name. Hence any email addressed to [email protected] gets controlled by /var/indimail/domains/example.com/.qmail-default.
WARNING: For security, qmail-local(8) replaces any dots in ext with colons before checking .qmail-ext. For convenience, qmail-local(8) converts any uppercase letters in ext to lowercase.
qmail-send(8) has the ability to control delivery rates of jobs scheduled for delivery. Every queue can have a directory named ratelimit where you can store rate control definition for a domain. These rate control definition files can be created using the drate(1) command. All you need to provide is a mathematical expression that defines your rate. e.g. 100/3600 means 100 emails per hour. This rate control works at the queue level. indimail-mta uses multiple queues. Each queue has its own delivery handled by by its own set of todo-proc(8), qmail-send(8), qmail-lspawn(8), qmail-rspawn(8), qmail-clean(8) daemons. Enforcing rate control on such a queue has a practical problem of having to define rate control definition for each and every queue.
To avoid the practical problem of rate limiting every queue, we can use a dedicated queue to handle rate controllled delivery. The default indimail installation creates a special queue named as slowq and uses a daemon slowq-send(8) instead of qmail-send(8) to process the slowq queue. This is done by calling slowq-start(8) instead of qscheduler(8) / qmail-start(8). slowq-send(8) doesn't have its own todo-proc(8) process. We don't require it as we aren't looking at high delivery rates for this queue. slowq-start(8) is invoked using a supervised service in /service/slowq.
To create this special slowq service for delivery rate control you can use svctool(8) command as below. This will also create the queue /var/indimail/queue/slowq and logs to be in /var/log/svc/slowq/current.
# Create supervised service to call slowq-start instead of qmail-start
# This will also create a special queue in /var/indimail/queue/slowq that
# has a subdir named ratelimit to store rate defintion files for any domain
$ sudo /usr/sbin/svctool --slowq --servicedir=/service \
--qbase=/var/indimail/queue --cntrldir=control \
--persistdb --starttls --fsync --syncdir \
--dmemory=83886080 --min-free=52428800 \
--dkverify=dkim --dksign=dkim \
--private_key=/etc/indimail/control/domainkeys/%/default \
--remote-authsmtp="plain" --localfilter --remotefilter \
--deliverylimit-count="-1" --deliverylimit-size="-1"
Creating delivery only slowq
Creating Queue /var/indimail/queue/slowq
Having a dedicated service for rate controlled delivery also avoids having the main queue clogged up with email that need to be held back from delivery.
Below is an example of having emails to yahoo.com throttled to no more than 50 emails per hour
# create rate control definition file for yahoo.com which
# caps the delivery to a max of 50 emails per hour
$ sudo drate -d yahoo.com -r 50/3600
# Query the rate defition for yahoo.com
$ drate -d yahoo.com
Conf Rate: 50/3600 (0.0138888888)
Email Count: 0
Start Time: Fri, 28 May 2021 21:47:11 +0530
End Time: Fri, 28 May 2021 21:47:11 +0530
CurrentTime: Fri, 28 May 2021 21:48:23 +0530
CurrentRate: 0.0000000000
During the course of delivery you can use the drate(1) command to display the current delivery date.
# Query the rate defition for yahoo.com
$ drate -d yahoo.com
Conf Rate: 5/3600 (0.0013888888)
Email Count: 70
Start Time: Fri, 28 May 2021 21:47:11 +0530
LastUpdated: Sat, 29 May 2021 22:07:41 +0530
CurrentTime: Tue, 1 Jun 2021 10:23:01 +0530
CurrentRate: 0.0002298473 OK
Now that we have configured a separate queue slowq for rate controlled delivery, we need to queue emails for the configured domain in this queue rather than the any of the regular indimail-mta's multiple queues. To do that we must have any entry in the control file domainqueue to set the QUEUEDIR environment variable when using SMTP (qmail-smtpd(8). You can create, edit, delete entries from domainqueue using your favourite text editor.
$ cat /etc/indimail/control/domainqueue
# format of this file is
# domain:env variables to set or unset.
# e.g.
# domain:ENV1=val1,ENV2=,ENV3=val3
#
argos.indimail.org:QUEUEDIR=/var/indimail/queue/slowq
yahoo.com:QUEUEDIR=/var/indimail/queue/slowq
Once the delivery rate for a configured domain reaches the configured rate, emails will get queued but will not be picked up immediately for delivery. The slowq-send(8) logs will display when this happens. As you can see, the delivery finally happens when the delivery rate becomes lesser than the configured rate.
2021-06-05 20:42:52.803287500 new msg 932523
2021-06-05 20:42:52.803328500 info msg 932523: bytes 792 from <[email protected]> qp 116584 uid 1000 slowq
2021-06-05 20:42:52.803475500 local: [email protected] [email protected] 932523 slowq
2021-06-05 20:42:52.803574500 info: slowq argos.indimail.org msg 932523: rate [1/0.0000000000/0.0013888888] ok since 6 secs
2021-06-05 20:42:52.803601500 starting delivery 4: msg 932523 to local [email protected] slowq
2021-06-05 20:42:52.803603500 status: local 1/5 remote 0/5 slowq
2021-06-05 20:42:52.844974500 delivery 4: success: did_1+0+0/ slowq
2021-06-05 20:42:52.845134500 status: local 0/5 remote 0/5 slowq
2021-06-05 20:42:52.845236500 end msg 932523 slowq
2021-06-05 20:42:57.593358500 new msg 932523
2021-06-05 20:42:57.593401500 info msg 932523: bytes 792 from <[email protected]> qp 116594 uid 1000 slowq
2021-06-05 20:42:57.593688500 local: [email protected] [email protected] 932523 slowq
2021-06-05 20:42:57.593692500 warning: slowq argos.indimail.org msg 932523: rate exceeded [2/0.0909090936/0.0013888888] need 709 secs; will try again later
2021-06-05 20:42:57.593695500 status: local 0/5 remote 0/5 delayed jobs=1 slowq
2021-06-05 20:43:11.447111500 new msg 933364
2021-06-05 20:43:11.447160500 info msg 933364: bytes 792 from <[email protected]> qp 116603 uid 1000 slowq
2021-06-05 20:43:11.447436500 local: [email protected] [email protected] 933364 slowq
2021-06-05 20:43:11.447439500 warning: slowq argos.indimail.org msg 933364: rate exceeded [2/0.0399999991/0.0013888888] need 695 secs; will try again later
2021-06-05 20:43:11.447441500 status: local 0/5 remote 0/5 delayed jobs=2 slowq
2021-06-05 20:54:47.546702500 info: slowq argos.indimail.org msg 932523: rate [2/0.0013869625/0.0013888888] ok since 1 secs
2021-06-05 20:54:47.546711500 starting delivery 5: msg 932523 to local [email protected] slowq
2021-06-05 20:54:47.546715500 status: local 1/5 remote 0/5 delayed jobs=1 slowq
2021-06-05 20:54:47.590367500 delivery 5: success: did_1+0+0/ slowq
2021-06-05 20:54:47.590563500 status: local 0/5 remote 0/5 delayed jobs=1 slowq
2021-06-05 20:54:47.590741500 warning: slowq argos.indimail.org msg 933364: rate exceeded [3/0.0027739251/0.0013888888] need 719 secs; will try again later
2021-06-05 20:54:47.590748500 status: local 0/5 remote 0/5 delayed jobs=1 slowq
2021-06-05 20:54:47.590829500 end msg 932523 slowq
2021-06-05 21:06:48.690469500 info: slowq argos.indimail.org msg 933364: rate [3/0.0013869625/0.0013888888] ok since 2 secs
2021-06-05 21:06:48.690478500 starting delivery 6: msg 933364 to local [email protected] slowq
2021-06-05 21:06:48.690483500 status: local 1/5 remote 0/5 slowq
2021-06-05 21:06:48.734485500 delivery 6: success: did_1+0+0/ slowq
2021-06-05 21:06:48.734666500 status: local 0/5 remote 0/5 slowq
2021-06-05 21:06:48.734762500 end msg 933364 slowq
IndiMail uses a modified version of qmail as the MTA. For local deliveries, qmail-lspawn(8) reads a series of local delivery commands from descriptor 0, invokes qmail-local(8) to perform the deliveries. qmail-local(8) reads a mail message and delivers to to a user by the procedure described in dot-qmail(8). IndiMail uses vdelivermail(8) as the local delivery agent. A virtual domain is created by the vadddomain(1) command.
$ sudo vadddomain example.com some_password
The above command creates a virtual domain with delivery instructions in /var/indimail/domains/example.com/.qmail-default file. A line in this file is of the form
/usr/sbin/vdelivermail '' delivery_instruction_for_non_existing_user
The delivery_instruction_for_non_existing_user
can have one of the following 5 forms
- delete
- bounce-no-mailbox
- Maildir
- emailAddress
- IPaddress
- Using delete as the delivery instruction causes IndiMail to discard all mails addressed to non-existing users. The original sender does not get notified of the delivery. On a real messaging system serving real users, you will not want to do this.
- The instruction bounce-no-mailbox causes a bounce to be generated to the sender in case an email is addressed to a non-existing user. This is the most common usage in .qmail-default which most IndiMail installations will have
- The instruction Maildir causes emails to be addressed to non-existing users to be saved in a Maildir. Here Maildir should refer to a full path of an existing Maildir.
- The instruction emailAddress causes emails to be addressed to non-existing users to be forwarded to an email address emailAddress.
- The instruction IPaddress causes emails to be addressed to non-existing users to be redirected to a remote SMTP server at IP IPaddress. The format of IPaddress is domain:ip:port where domain is the domain name, ip is the IP address of the remote SMTP server and port is the SMTP port on the remote SMTP server. It is expected that the non-existing user is present on the remote system. This type of delivery is used by IndiMail on a clustered setup. In a clustered setup, users are distributed across multiple server. A particular user will be located only on one particular server. However, the same domain will be present on multiple servers.
In the delivery instruction in .qmail-default, you can replace vdelivermail(8) with vfilter(8) to perform in-line filtering use IndiMail's poweful vfilter. You can create filters using the program vcfilter(1).
TURN stands for when a SMTP client and a SMTP server do a turn around and reverse the role of being a client or being a server. The SMTP server becomes a SMTP client and the SMTP client becomes a SMTP server. This mechanism usually requires both the server and the client to synchronize the turnaround but is not necessary as long as the SMTP server supports the mechanism (except for ATRN/ODMR protocol described later). This will become clear as you read the this full topic discussed here. indimail supports ETRN, ATRN and AUTOTURN mechanisms to fetch emails for a domain. These mechanisms are used by hosts that have part-time connectivity and have the services of an ISP or a host with full-time connectivity. For the same of brevity, I'm going to to refer to the ISP server as isp-server and the host with part-time connectivity as part-time-host throughout this document. The permanent connectivity allows the isp-server receive mails all the time and store mails temporarily. Once you have the mails stored somewhere on the isp-server, these can be delivered to part-time-host using either of the below two methods.
- The part-time-host wakes up the isp-server which then delivers queued mails to the part-time-host using SMTP. This is typically the case supported by ETRN or AUTOTURN. indimail-mta supports both these mechanisms if the part-time-host IP address is listed in the mail exchanger (MX) records for the domain or if the part-time-host is allowed access on the isp-server to access the queued mails. BOTH ETRN and AUTOTURN requires that the part-time-host be running a SMTP service at the time it issues the ETRN or the AUTOTURN command.
- If isp-server SMTP server supports ETRN, ATRN then any software on the part-time-host (that supports ETRN, ATRN) can connect to isp-server SMTP port and reverse the connection. i.e. The isp-server becomes an SMTP client and the part-time-host becomes a SMTP server. The connection gets reversed by simply issuing the ETRN or ATRN smtp command. The ETRN and ATRN command requires the domain name for which mails needs to be fetched as an argument. One of the few software that supports both ETRN and ATRN is fetchmail. As stated earlier, the ETRN command requires the part-time-host to be running a independent SMTP service. The isp-server should be able to connect to the SMTP port on the client. The ATRN command however is more complicated. It requires the client to start accepting SMTP commands on the same channel in which it issued the ATRN command. The part-time-host will not connect to the isp-server SMTP port, but rather use the same connection that the part-time-host created when connecting to the SMTP port on the isp-server.
You can read this document to understand more about TURN mechanisms. The original TURN mechanism had serious security implications. The Extended TURN (ETRN) was deviced to fix the security concerns with TURN and is defined by RFC-1985. The ATRN requrires SMTP authentication to work and hence is more secure. ATRN is also known as On-Demand Mail Relay (ODMR) and is defined by RFC-2645. To support ETRN all that is required is to issue the ETRN command. No other client side support is needed other than having a SMTP server running on the client to accept mails. However, it is upto the server to accept the request. In general only those IP addresses that are part of the MX records for a domain are allowed to fetch mails from a server supporting ETRN, AUTOTURN. AUTOTURN is even much more simpler and requires no special command or client-side software. All you need is to connect to the SMTP server from the client to trigger the server to send queued mails meant for the client. indimail-mta supports all the methods ETRN, ATRN and AUTOTURN. ETRN and ATRN is directly supported. AUTOTURN requires a simple modification to the SMTP run script in /service/qmail-smtpd.25/run. Now let us talk about setting up an indimail-mta server for ETRN, AUTOTURN and ODMR.
ETRN can be setup for a domain in two ways.
-
One method is to map the ETRN domain to the fixed IP address of the part-time-host. When qmail-smtpd(8) is triggered for the ETRN domain, it will always send queued mails to the configured fixed IP address of the part-time-host. An important point to realize is that the ETRN command can be issued by any host connecting to the SMTP port of the isp-server, but queued mails will always be sent to he IP address of the part-time-host.
-
The other method is not to have the domain mapped to a fixed IP address. This method requires to have the IP address of the part-time-host configured as a MX record for the ETRN domain in the DNS. When the part-time-host connects to the isp-server, the queued mails will be sent by SMTP to the IP address of the host that connects to the isp-server. An important point to realizes is that the ETRN command can be issued by any host that serves as a MX record for the ETRN domain. The ETRN command will be rejected for any host that does not serves as a MX record for the ETRN domain.
We will use the vadddomain(1) command from indimail-virtualdomains and will explain what it does. If you understand the steps than you can setup ETRN manually without using vadddomain(1) command. The below shows an usage to create an ETRN domain that will receive mails in the directory /var/indimail/autoturn/192.168.2.108/Maildir.
# Assumption
# IP of isp-server = 192.168.2.100
# IP of part-time-host = 192.168.2.108
# add the domain with qmaild permissions. This is because
# we are running qmail-smtpd under tcpserver with qmaild uid
$ sudo vadddomain -u qmaild -T 192.168.2.108 etrn1.dom
domain=etrn1.dom domaindir=/var/indimail, controldir=/etc/indimail/control
Sending SIGHUP to /service/qmail-send.25
Domain Directory content
drwxr-s--- 1 qmaild nofiles 14 Dec 3 17:45 /var/indimail/autoturn/192.168.2.108
total 0
drwxr-s--- 1 qmaild nofiles 14 Dec 3 17:45 .
drwxrwsr-x 1 indimail qmail 82 Dec 3 17:45 ..
drwxr-s--- 1 qmaild nofiles 18 Dec 3 17:45 Maildir
adding etrn1.dom to /etc/indimail/control/spamignore control file
adding etrn1.dom to /etc/indimail/control/nodnscheck control file
#
# assign address [email protected]
#
$ cat /etc/indimail/control/virtualdomains
etrn1.dom:autoturn-192.168.2.108
#
# now any mails to autoturn-user will be handled by .qmail-user-default in
# /var/indimail/autoturn
#
$ cat /etc/indimail/users/assign
+autoturn-:autoturn:1003:1001:/var/indimail/autoturn:-::
.
$ cat /var/indimail/autoturn/.qmail-192:168:2:108-default
./192.168.2.108/Maildir/
$ grep qmaild /etc/passwd
qmaild:x:1003:1001::/var/indimail:/sbin/nologin
$ grep nofiles /etc/group
nofiles:x:1001:
Now let is dissect what has been done. The vadddomain(1) command has done the following
- Added an entry to /etc/indimail/users/assign to create an autoturn user
autoturn
using qmail-users(5) mechanism. The entry for autoturn is done only the first time any ETRN or ATRN domain is created. - added entry
etrn1.dom:autoturn-192.168.2.108
to /etc/indimail/control/virtualdomains - Now any email to
etrn1.dom
will be controlled by /var/indimail/autoturn/.qmail-192:168:2:108-default, which has the entry ./192.168.2.108/Maildir/. This will result in qmail-send(8) delivering all emails foretrn1.dom
to /var/indimail/autoturn/192.168.2.108/Maildir.
Now all that is required is for the host with IP 192.168.2.108 issues the ETRN command like this
$ telnet 192.168.2.100 25
Trying 192.168.2.100...
Connected to 192.168.2.100.
Escape character is '^]'.
220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.313 Sun, 3 Dec 2023 18:31:08 +0530
etrn etrn1.dom
250 OK, queueing for node <etrn1.dom> started
quit
221 argos.indimail.org closing connection
Connection closed by foreign host.
Now if you look at the qmail-smtpd(8) and qmail-send(8) logs you will find the delivery happening
This method requires your part-time-host IP address to be setup as a MX record in your DNS. We again use the vadddomain(1) command as before, but without the -T argument.
# Assumption
# IP of isp-server = 192.168.2.100
# IP of part-time-host = 192.168.2.108
$ sudo vadddomain -u qmaild -t etrn2.dom
domain=etrn2.dom domaindir=/var/indimail, controldir=/etc/indimail/control
Sending SIGHUP to /service/qmail-send.25
Domain Directory content
drwxr-s--- 1 qmaild nofiles 14 Dec 3 18:52 /var/indimail/autoturn/etrn2.dom
total 0
drwxr-s--- 1 qmaild nofiles 14 Dec 3 18:52 .
drwxrwsr-x 1 indimail qmail 106 Dec 3 18:52 ..
drwxr-s--- 1 qmaild nofiles 18 Dec 3 18:52 Maildir
adding etrn2.dom to /etc/indimail/control/spamignore control file
adding etrn2.dom to /etc/indimail/control/nodnscheck control file
$ cat /etc/indimail/control/virtualdomains
etrn1.dom:autoturn-192.168.2.108
etrn2.dom:autoturn-etrn2.dom
$ cat /etc/indimail/users/assign
+autoturn-:autoturn:1003:1001:/var/indimail/autoturn:-::
.
$ cat /var/indimail/autoturn/.qmail-etrn2:dom-default
/var/indimail/autoturn/etrn2.dom/Maildir/
Now let us again dissect what has been done. The vadddomain(1) done has done the following
- It has changed nothing in the file /etc/indimail/users/assign.
- added entry
etrn2.dom:autoturn-etrn2.dom
to /etc/indimail/control/virtualdomains - Now any email to
etrn2.dom
will be controlled by /var/indimail/autoturn/.qmail-etrn2:dom-default, which has the entry /var/indimail/autoturn/etrn2.dom/Maildir/. This will result in qmail-send(8) delivering all emails foretrn1.dom
to /var/indimail/autoturn/etrn2.dom/Maildir.
Now let us see what happens when we issue the ETRN command from a host that is not a MX record for the ETRN domain.
$ telnet 192.168.2.100 smtp
Trying 192.168.2.100...
Connected to 192.168.2.100.
Escape character is '^]'.
220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.313 Sun, 3 Dec 2023 19:10:24 +0530
ETRN etrn2.dom
451 Unable to queue messages (#4.3.0)
quit
221 argos.indimail.org closing connection
Connection closed by foreign host.
The ETRN request as expected is denied. One can however bypass the requirement of the part-time-host to be a MX record by creating a whitelist file with the IP address of the connecting client on the isp-server. The whitelist filename is /var/indimail/autoturn/etrn2.dom/ipauth. Now, the ETRN request will be accepted as shown below.
$ sudo sh -c "echo 191.168.2.108 > /var/indimail/autoturn/etrn2.dom/ipauth"
$ telnet 192.168.2.100 smtp
Trying 192.168.2.100...
Connected to 192.168.2.100.
Escape character is '^]'.
220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.313 Sun, 3 Dec 2023 19:23:18 +0530
etrn etrn2.dom
250 OK, queueing for node <etrn2.dom> started
quit
221 argos.indimail.org closing connection
Connection closed by foreign host.
Seeing the examples above where we have used telnet, demonstrates the ETRN doesn't require special software. You can automate the process of pulling mails using ETRN by having a cron script that uses tcpclient(1) or the netcat command. Using nc is trivial like this snippet printf "ETRN etrn2.dom\r\nQUIT\r\n" | nc argos2 25
. This however doesn't check if the SMTP server has ETRN capability.
Here is a more sophisticated example of a script that uses tcpclient(1). Assuming this script is named tcpclient.atrn, then you need to execute the command tcpclient -vDHR 192.168.2.102 25 /usr/local/bin/tcpclient.atrn
. The script needs to have executable bit set.
#!/bin/sh
exec 0<&6
exec 1>&7
read key
greeting=$(echo $key | awk '{print $1}')
if [ $greeting -ne 220 ] ; then
echo "Greeting failed" 1>&2
printf "QUIT\r\n"
fi
printf "EHLO\r\n"
etrn_capa=0
while true
do
read line
echo $line | grep "250 " >/dev/null
ret=$?
echo $line | grep ETRN >/dev/null
if [ $? -eq 0 ] ; then
etrn_capa=1
fi
if [ $ret -eq 0 ] ; then
echo $line 1>&2
break
fi
echo $line 1>&2
done
if [ $etrn_capa -eq 1 ] ; then
printf "ETRN $1\r\n"
fi
read line
echo $line | grep "^250 " >/dev/null
if [ $? -eq 0 ] ; then
echo "ETRN triggered for $1" 1>&2
else
echo "failed to triggered ETRN for $1" 1>&2
fi
echo $line 1>&2
printf "QUIT\r\n"
ATRN stands for Authenticated Turn. ATRN requires indimail-virtualdomains to be installed. This is because a mapping needs to be maintained for ATRN domains against users. And ATRN domain can be fetched by any host that can authenticate. Unlike ETRN, ATRN requires special client-side software that can act as the SMTP server on the same channel that it used as a client. ATRN happens in multiple steps. The requirement of a database to maintain the mapping necessitates having indimail-virtualdomains.
- The client authenticates using some username. Let's say user.
- The client issues the ATRN command for a domain. Let's say domain
- The server checks if the user has the permission to access the domain.
- The server then replies with 250 OK and becomes a SMTP client immediately after that
- The client becomes a SMTP client and starts receiving SMTP commands and transaction from the server and starts acting on them.
- The server keeps on pushing all mails in the queue for domain to the client using SMTP. For each mail that the client accepts successfully or results in a permanent failure, the server removes the mail from the queue. For temporary failures, the mail is not removed from the queue.
- The client quits when the server issues the SMTP QUIT command.
Now let us look at the steps (listed below) to create a ATRN domain. You can see that steps needed are the same needed to create an ETRN domain. The extra stip is either creating the atrnaccess control file or using the vatrn(1) command. The vatrn commands is used to add access to the atrn domain for the user odmr@localhost
. odmr is a normal user in system password database without shell access. It can also be any user in indimail's virtual domain database. You can use a software like fetchmail. The indimail-access package comes with a version of fetchmail that is optimized for ODMR and ETRN. The original fetchmail is unusable for ODMR unless authentication is setup for CRAM-MD5 authentication. The version that comes with indimail-access allows other authentication methods supported by indimail-mta.
# Assumption
# IP of isp-server = 192.168.2.100
# IP of part-time-host = 192.168.2.108
$ sudo vadddomain -u qmaild -t atrn.dom
domain=atrn.dom domaindir=/var/indimail, controldir=/etc/indimail/control
Sending SIGHUP to /service/qmail-send.25
Domain Directory content
drwxr-s--- 1 qmaild nofiles 14 Dec 3 20:46 /var/indimail/autoturn/atrn.dom
total 0
drwxr-s--- 1 qmaild nofiles 14 Dec 3 20:46 .
drwxrwsr-x 1 indimail qmail 128 Dec 3 20:46 ..
drwxr-s--- 1 qmaild nofiles 18 Dec 3 20:46 Maildir
adding atrn.dom to /etc/indimail/control/spamignore control file
adding atrn.dom to /etc/indimail/control/nodnscheck control file
$ cat /etc/indimail/control/virtualdomains
etrn1.dom:autoturn-192.168.2.108
etrn2.dom:autoturn-etrn2.dom
atrn.dom:autoturn-atrn.dom
$ cat /var/indimail/autoturn/.qmail-atrn:dom-default
/var/indimail/autoturn/atrn.dom/Maildir/
# Either create atrnaccess control file
# or use the vatrn command
$ sudo sh -c "echo odmr@localhost:atrn.dom > /etc/indimail/control/atrnaccess"
or
$ vatrn -i atrn.dom odmr@localhost
Once you have done the above, you can use fetchmail(1). To use fetchmail(1), you have to create a config file, which is usually $HOME/.fetchmailrc. Here is an example that supports ETRN and ATRN for etrn1.dom, etrn2.dom and atrn.dom domains that we created above as an example
# Configuration created Sun Dec 3 09:17:01 2023 by fetchmailconf 1.66.0
set postmaster "mbhangui"
set bouncemail
set no spambounce
set no softbounce
set properties ""
# ODMR config
poll 192.168.2.100 with proto ODMR port 366 timeout 120 interval 1 smtphost 192.168.2.108/25 and options no dns
user '[email protected]' there with password 'xxxxyyyyzzzz' options
no rewrite forcecr pass8bits fetchlimit 50 batchlimit 250 expunge 50
fetchdomains atrn.dom
# Config for ETRN
poll 192.168.2.100 with proto ETRN port 25 timeout 120 interval 1 and options no dns
fetchdomains etrn1.dom
poll 192.168.2.100 with proto ETRN port 25 timeout 120 interval 1 and options no dns
fetchdomains etrn2.dom
To fetch the mails you just need to execute the fetchmail command. The output will be something like below.
# This is when there are no mails for atrn.dom in the queue
$ fetchmail -v
Dec 03 21:00:49 fetchmail: 6.5.0.beta9 querying argos2 (protocol ODMR) at Sun 03 Dec 2023 09:00:49 PM IST: poll started
Trying to connect to 192.168.2.100/366...connected.
Dec 03 21:00:49 fetchmail: SMTP< 220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.313 Sun, 3 Dec 2023 21:00:22 +0530
Dec 03 21:00:49 fetchmail: SMTP> EHLO argos.indimail.org
Dec 03 21:00:49 fetchmail: SMTP< 250-argos.indimail.org
Dec 03 21:00:49 fetchmail: SMTP< 250-AUTH LOGIN PLAIN XOAUTH2 CRAM-MD5 CRAM-SHA1 CRAM-SHA224 CRAM-SHA256 CRAM-SHA384 CRAM-SHA512 CRA
M-RIPEMD DIGEST-MD5 SCRAM-SHA-1 SCRAM-SHA-256
Dec 03 21:00:49 fetchmail: SMTP< 250-ATRN
Dec 03 21:00:49 fetchmail: SMTP< 250-STARTTLS
Dec 03 21:00:49 fetchmail: SMTP< 250 HELP
Dec 03 21:00:49 fetchmail: ESMTP> AUTH PLAIN
Dec 03 21:00:49 fetchmail: ESMTP> AG9kbXJAbG9jYWxob3N0AHh4eHh5eXl5enp6eg==
Dec 03 21:00:49 fetchmail: SMTP< 235 ok, go ahead (#2.0.0)
Dec 03 21:00:49 fetchmail: ODMR> ATRN atrn.dom
Dec 03 21:00:49 fetchmail: ODMR< 453 No message waiting for node(s) <atrn.dom> (#4.3.0)
Dec 03 21:00:49 fetchmail: You have no mail.
Dec 03 21:00:49 fetchmail: ODMR> QUIT
Dec 03 21:00:49 fetchmail: SMTP< 221 argos.indimail.org closing connection
Dec 03 21:00:49 fetchmail: 6.5.0.beta9 querying argos2 (protocol ODMR) at Sun 03 Dec 2023 09:00:49 PM IST: poll completed
Dec 03 21:00:49 fetchmail: normal termination, status 0
# This is when there are mails in the queue
$ fetchmail -v
Dec 03 21:06:12 fetchmail: 6.5.0.beta9 querying 192.168.2.100 (protocol ODMR) at Sun 03 Dec 2023 09:06:12 PM IST: poll started
Trying to connect to 192.168.2.100/366...connected.
Dec 03 21:06:12 fetchmail: SMTP< 220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.313 Sun, 3 Dec 2023 21:05:45 +0530
Dec 03 21:06:12 fetchmail: SMTP> EHLO argos.indimail.org
Dec 03 21:06:12 fetchmail: SMTP< 250-argos.indimail.org
Dec 03 21:06:12 fetchmail: SMTP< 250-AUTH LOGIN PLAIN XOAUTH2 CRAM-MD5 CRAM-SHA1 CRAM-SHA224 CRAM-SHA256 CRAM-SHA384 CRAM-SHA512 CRA
M-RIPEMD DIGEST-MD5 SCRAM-SHA-1 SCRAM-SHA-256
Dec 03 21:06:12 fetchmail: SMTP< 250-ATRN
Dec 03 21:06:12 fetchmail: SMTP< 250-STARTTLS
Dec 03 21:06:12 fetchmail: SMTP< 250 HELP
Dec 03 21:06:12 fetchmail: ESMTP> AUTH PLAIN
Dec 03 21:00:49 fetchmail: ESMTP> AG9kbXJAbG9jYWxob3N0AHh4eHh5eXl5enp6eg==
Dec 03 21:06:12 fetchmail: SMTP< 235 ok, go ahead (#2.0.0)
Dec 03 21:06:12 fetchmail: ODMR> ATRN atrn.dom
Dec 03 21:06:12 fetchmail: ODMR< 250 OK now reversing the connection
Dec 03 21:06:12 fetchmail: Turnaround now...
Trying to connect to 192.168.2.108/25...connected.
Dec 03 21:06:12 fetchmail: ODMR> 220 hades.indimail.org (NO UCE) ESMTP IndiMail 1.313 Sun, 3 Dec 2023 21:05:45 +0530
Dec 03 21:06:12 fetchmail: ODMR< EHLO AutoTURN
Dec 03 21:06:12 fetchmail: ODMR> 250-argos.indimail.org
Dec 03 21:06:12 fetchmail: ODMR> 250-PIPELINING
Dec 03 21:06:12 fetchmail: ODMR> 250-8BITMIME
Dec 03 21:06:12 fetchmail: ODMR> 250-SIZE 20971520
Dec 03 21:06:12 fetchmail: ODMR> 250-ETRN
Dec 03 21:06:12 fetchmail: ODMR> 250-STARTTLS
Dec 03 21:06:12 fetchmail: ODMR> 250 HELP
Dec 03 21:06:12 fetchmail: ODMR< MAIL FROM:<[email protected]>
Dec 03 21:06:12 fetchmail: ODMR< RCPT TO:<[email protected]>
Dec 03 21:06:12 fetchmail: ODMR< DATA
Dec 03 21:06:12 fetchmail: ODMR> 250 ok
Dec 03 21:06:12 fetchmail: ODMR> 250 ok
Dec 03 21:06:13 fetchmail: ODMR> 354 go ahead
Dec 03 21:06:13 fetchmail: receiving message data
Dec 03 21:06:13 fetchmail: ODMR> 250 ok 1701617773 qp 741611
Dec 03 21:06:13 fetchmail: ODMR< QUIT
Dec 03 21:06:13 fetchmail: ODMR> 221 hades.indimail.org closing connection
Dec 03 21:06:13 fetchmail: ODMR> QUIT
Dec 03 21:06:13 fetchmail: Polling 192.168.2.100
Dec 03 21:06:13 fetchmail: 6.5.0.beta9 querying 192.168.2.100 (protocol ODMR) at Sun 03 Dec 2023 09:06:13 PM IST: poll completed
Dec 03 21:06:13 fetchmail: normal termination, status 0
The advantage of ATRN is that the part-time-host need not be configured as a MX destination for the domain and can be accessed only by users granted access by the vatrn(1) command. The disadvantage is that it requires special software like fetchmail(1) to pull mails from the queue.
This method will require you to setup maildir delivery to /var/indimail/autoturn/$TCPREMOTEIP/Maildir as described here. Like ETRN, AUTOTURN is very simple. It doesn't require any special software on the part-time-host. Also, unlike ETRN and ATRN, it doesn't require any SMTP verb to initiate it. If setup, just a connect to the SMTP port, on the isp-server by the part-time-host, should trigger mail delivery to the part-time-host. To setup you need to create, modify your qmail-smtpd(8) run script to something like this
#!/bin/sh
sh -c '
/usr/sbin/qmail-smtpd
cd /var/indimail/autoturn
exec setlock -nx $TCPREMOTEIP/seriallock \
maildirsmtp $TCPREMOTEIP autoturn-$TCPREMOTEIP- $TCPREMOTEIP AutoTURN
'
Let's say this script is named as /usr/local/bin/autoturn. Then you can do this on port port 8025 or any other port that is free. You could also modify your existing run script for port 25.
$ sudo tcpserver -u qmaild -vHR -l $(uname -n) 0 8025 /usr/local/bin/autoturn
Now any client on the part-time-host can connect to port 8025 on the isp-server and when it quits, the script will initiate SMTP to the part-time-host using maildirsmtp.
There is another way to do AUTOTURN with indimail. Using the domainqueue control file (see chapter Domain Specific queue, you can queue emails for a domain to any queue directory. When you want to deliver the mails, instead of using qmail-send(8), you could use qmta-send in non-daemon mode and run 2-3 passes. Here is one example of setting up AUTOTURN
# create few directories
mkdir -p /service/smtpd/variables
mkdir -p /var/log/smtpd
mkdir -p /var/log/tcpclient
# create a queue for the AUTOTURN domain
$ sudo queue-fix -m -s 23 -b 0 /var/indimail/queue/atrn.dom
# create domainqueue control file
# now all mails to atrn.dom will go to
# /var/indimail/queue/atrn.dom
echo "atrn.dom:QUEUEDIR=/var/indimail/queue/atrn.dom,BIGTODO=0,CONFSPLIT=23" > /etc/indimail/control/domainqueue
# create a script which runs qmta-send which
# will process /var/indimail/queue/atrn.dom
(
echo "env - \\"
echo " PATH=/bin:/usr/sbin \\"
echo " QUEUEDIR=/var/indimail/queue/atrn.dom \\"
echo " BIGTODO=0 \\"
echo " CONFSPLIT=23 \\"
echo " $sbindir/qmta-send ./Maildir/"
) > /usr/local/bin/qmta
chmod +x /usr/local/bin/qmta
# Create a qmail-smtpd service which calls qmta-send
# when client connects to the SMTP port and quits
$ echo 1 > /service/smtpd/variables/USE_QPWGR
$ echo 0 > /service/smtpd/variables/BIGTODO
$ echo 23 > /service/smtpd/variables/CONFSPLIT
$ echo /var/indimail/queue/atrn.dom > /service/smtpd/variables/QUEUEDIR
$ echo 25 > /service/smtpd/variables/PORT
$ echo 1 > /service/smtpd/variables/MAKE_SEEKABLE
$ echo "/usr/sbin/qmail-queue" > /service/smtpd/variables/QMAILQUEUE
# write the below script to provide SMTP service on port 25
#!/bin/sh
(
HOSTNAME=$(uname -s)
sudo envdir -c /service/smtpd/variables \
tcpserver -l $HOSTNAME -HR 0 25 sh -c "setuidgid -g qmail qmaild /usr/sbin/qmail-smtpd;/usr/local/bin/qmta"
) > /var/log/smtpd/smtpd.log 2>&1 &
# trigger AUTOTURN
printf "QUIT\r\n" | nc smtp_host 25
indimail-mta supports multiple methods to achieve Transport Layer Security for both incoming and outgoing delivery through SMTP. It all depends on how you configure few variables. We will discuss below various methods along with examples. The example will demonstrate the versality of programs like tcpserver(1), tcpclient(1), qmail-smtpd(8) and qmail-remote(8). You can also use dotls(1) - A transparent TLS/SSL proxy that can help you to secure traffic for non-tls distributions like qmail, netqmail and others.
tcpserver(1) which comes with indimail-mta, can by itself provides TLS. All you have to do is use -n option and provide a Privacy Enhanced Mail (PEM) file as the certificate. The below example shows how to do that. It also shows the flexibility of indimail-mta to queue the mail anywhere of your chosing and deliver the mail to its destination.
First let us create a queue and start an encrypted ucspi-tcp service using tcpserver(1) on port 2025. You can use port 25 too, but then you will have to run tcpserver(1) as root. We will use queue-fix to create a queue in the home directory. For me it is /home/manny. The queue-fix command will create a queue named demo. We will use two terminals. One for running tcpserver(1) to accept mail using SMTP protocol and another for running tcpclient(1) to carry out a simple SMTP transaction.
Terminal 1 run tcpserver
# create a queue named 'demo' in your home directory
$ cd /home/manny
$ sudo queue-fix demo
# Run tcpserver on port 2025
$ tcpserver -v -n /etc/indimail/certs/servercert.pem 0 2025 \
env BIGTODO=0 CONFSPLIT=23 QUEUEDIR=/home/manny/demo qmail-smtpd
tcpserver: status: 0/40
Terminal 2 run tcpclient
Here we demonstrate a SMTP transaction using tcpclient(1). You can also use the openssl(1) command openssl s_client -connect localhost:2025
$ tcpclient -n "" 0 2025
220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.283 Fri, 6 Jan 2023 19:51:47 +0530
mail from:<[email protected]>
250 ok
rcpt to:<[email protected]>
250 ok
data
354 go ahead
To: Manny <[email protected]>
From: Manvendra <[email protected]>
Subject: Test message for Demo purpose
This is a test message
.
250 ok 1673014999 qp 68729
quit
221 argos.indimail.org closing connection
On Terminal 2 you should see that the mail has been successfully queued (a message like 250 ok 1673014999 qp 68729
).
... contd. from above
tcpserver: status: 1/40
tcpserver: pid 68722 from ::1
tcpserver: ok 68722 [::1]2025 [::1]:49105:maxperip=20
qmail-smtpd: pid 68723 gsasl header version=2.2.0 library version=2.2.0
qmail-smtpd: pid 68723 from ::1 HELO <unknown> MAIL from <[email protected]> RCPT <[email protected]> AUTH <local-rcpt> Size: 141 TLS=tcpserver
tcpserver: status: 0/40
To deliver the message from this custom queue all you have to do is run qmail-start(8).
$ sudo env QUEUEDIR=/home/manny/demo CONFSPLIT=23 BIGTODO=0 qmail-start ./Maildir/
info: qmail-send: /home/mbhangui/demo: ratelimit=OFF, loglock=disabled, conf split=23
status: local 0/10 remote 0/20 demo
info: todo-proc: /home/mbhangui/demo: conf split=23, todo chunk size=1, bigtodo=no
new msg 33829336 demo
info msg 33829336: bytes 566 from <[email protected]> qp 68729 uid 0 demo
local: [email protected] [email protected] 33829336 566 bytes demo opendir mode
starting delivery 1: msg 33829336 to local [email protected] demo
status: local 1/10 remote 0/20 demo
delivery 1: success: did_0+1+0/qp_68839/ demo
status: local 0/10 remote 0/20 demo
end msg 33829336 qmail-send: demo
The above qmail-send(8) log shows that the message with qp 68729 was successfully delivered. The next interesting thing is that indimail-mta puts details of the encrypted channel in the Received header in the message. It also tells you that the tls provider was tcpserver(1).
Received: indimail-mta smtpd 68723 (::1)
by argos.indimail.org with ESMTPS
(tls provider tcpserver, TLS Server=TLSv1.3, Client=TLSv1.3, Ciphers=TLS_AES_256_GCM_SHA384); Fri, 6 Jan 2023 19:52:09 +0530
indimail-mta has five programs that are TLS providers - tcpserver(1), tcpclient(1), dotls(1), qmail-smtpd(8) and qmail-remote(8). Out of these tcpclient(1), dotls(1) support STARTTLS method to connect to any SMTP server. qmail-smtpd(8) supports native SMTPS as well as STARTTLS. qmail-remote(8) can connect to any SMTPS server as well as use STARTTLS to start delayed encryption.
The method we used above, where we used tcpserver(1), only those SMTP clients that have the ability to do TLS/SSL encryption can transact. To support clients that do not have this ability, a SMTP server needs to provide the STARTTLS capability. But many SMTP servers don't have TLS/SSL capability and neither do they have STARTTLS capability. A proxy that sits between a TLS client and a plain-text communication SMTP server can solve this problem. The program dotls(1) is exacty that - a proxy that provides encrypted channel for programs that do not support TLS/SSL and STARTTLS capability. Using dotls(1) is very simple. All you have to do is insert dotls(1) in your tcpserver(1) command line. Once you do that any TLS client will be able to communicate with your non-TLS application through dotls(1). The first example shows how to use dotls(1) to provide SMTPS. The second example shows how to use dotls(1) to provide STARTTLS capability. Here we demonstrate how to use dotls(1) to provide SMTPS or STARTTLS for qmail, netqmail, notqmail which do not have native SMTPS/STARTTLS capability in their SMTP server. Just like the earlier example you can use tcpclient(1) or openssl command to carry out a SMTP transaction. When you use dotls(1), the Received headers will show the TLS provider as dotls. The dotls(1) program is as generic as it can be. It can be used for any program that can be run on the tcpserver(1) command line. dotls(1) also provides STLS capability for any non-tls pop3 daemon that can be run under tcpserver(1).
Provide SMTPS cabability using dotls
Here we use /var/qmail/bin/qmail-smtpd which comes from netqmail. This will work for qmail, notqmail and s/qmail too. Not a single line needs to be modified to provide SMTPS for these third party SMTP servers. Since telnet doesn't support TLS, we use tcpclient(1) to connect to the SMTPS port. You can very well use openssl s_client -connect localhost:2025
$ tcpserver 0 2025 /usr/bin/dotls /var/qmail/bin/qmail-smtpd &
[1] 251063
$ tcpclient -n "" 0 2025
220 argos.indimail.org ESMTP
help
214 netqmail home page: http://qmail.org/netqmail
Provide SMTPS STARTTLS cabability using dotls
Here we use /var/qmail/bin/qmail-smtpd which comes from notqmail. This will work for qmail, netqmail and s/qmail too. Not a single line needs to be modified to provide STARTTLS on behalf these third party SMTP servers. Here we have used telnet to connect to port 2025. You could also have used openssl s_client -starttls smtp -connect localhost:2025
. However, telnet cannot be used once you issue the starttls command. For that you can use tcpclient(1) or the openssl command.
# Run tcpserver in the background
$ tcpserver 0 2025 /usr/bin/dotls -s smtp /var/qmail/bin/qmail-smtpd &
[1] 251597
# First example: using telnet to connect to port 2025
$ telnet 0 2025
Trying 0.0.0.0...
Connected to 0.
Escape character is '^]'.
220 argos.indimail.org ESMTP
ehlo
250-argos.indimail.org
250-PIPELINING
250-STARTTLS
250 8BITMIME
help
214 notqmail home page: https://notqmail.org
# Second example: using tcpclient to connect to port 2025
# and issue the STARTTLS command
$ tcpclient -s smtp -n "" 0 2025
220 argos.indimail.org ESMTP
ehlo
250-argos.indimail.org
250-PIPELINING
250 8BITMIME
help
214 notqmail home page: https://notqmail.org
In the preceding examples we learnt how to use tcpserver(1) and dotls(1) to carry out a secure SMTP transaction. In fact, qmail-smtpd(8) by itself has native SMTPS/STARTTLS capability. indimail-mta's qmail-smtpd(8) can work without tcpserver(1) providing TLS capabilities. To use SMTPS all you have to do is set the SMTPS environment variable. You can use TLS/SSL capability of tcpclient(1) to connect to the SMTPS service
# Run tcpserver in the background
$ tcpserver 0 2025 env BIGTODO=0 SMTPS=1 CONFSPLIT=23 QUEUEDIR=/home/mbhangui/demo qmail-smtpd &
[1] 180420
$ tcpclient -n "" 0 2025
qmail-smtpd: pid 180431 gsasl header version=2.2.0 library version=2.2.0
qmail-smtpd: pid 180431 from ::1 ssl-version=TLSv1.3
220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.284 Sat, 7 Jan 2023 10:43:53 +0530
quit
221 argos.indimail.org closing connection
Without the SMTPS environment variable qmail-smtpd(8) supports STARTTLS capability if it finds the environment variable STARTTLS set. Here we show how tcpclient(1) can be used even for non-encrypted connection. You can use the popular telnet
command too. In fact the tcpclient(1) binary that comes with indimail-mta can be used like telnet for both encrypted as well as non-encrypted connections. However, with telnet you cannot use STARTTLS. For that we can use tcpclient(1) as shown in the second example below (you can also use openssl s_client -starttls smtp localhost:2025
)
# Run tcpserver in the background
$ tcpserver 0 2025 env BIGTODO=0 STARTTLS=1 CONFSPLIT=23 QUEUEDIR=/home/mbhangui/demo qmail-smtpd &
[1] 69996
# First example: using telnet to connect to port 2025
$ tcpclient 0 2025
220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.283 Fri, 6 Jan 2023 20:29:32 +0530
ehlo
250-argos.indimail.org [::1]
250-PIPELINING
250-8BITMIME
250-SIZE 10000000
250-ETRN
250-STARTTLS
250 HELP
# Second example: using tcpclient to connect to port 2025
# and issue the STARTTLS command. You will not see the STARTTLS
# capability because tcpclient has already issued the STARTTLS
# command
$ tcpclient -s smtp -n "" 0 2025
220 argos.indimail.org (NO UCE) ESMTP IndiMail 1.284 Sun, 8 Jan 2023 20:49:04 +0530
ehlo
250-argos.indimail.org [::1]
250-PIPELINING
250-8BITMIME
250-SIZE 10000000
250-ETRN
250 HELP
help
214-This is IndiMail SMTP Version 1.284
214-https://github.com/indimail/indimail-mta
214-This server supports the following commands:
214 HELO EHLO RSET NOOP MAIL RCPT DATA VRFY ETRN HELP QUIT
When you setup qmail-smtpd(8) to do the encryption, you will find the following Received header
Received: indimail-mta smtpd 176367 from localhost (HELO argos.indimail.org) (::ffff:127.0.0.1)
by argos.indimail.org with (TLSv1.3 TLS_AES_256_GCM_SHA384 encrypted) ESMTPS; Sat, 7 Jan 2023 08:14:56 +0530
The TLS/SSL connection can be customized by the following control files
tlsservermethod - The TLS protocol list. Accepted values are SSLv23, SSLv3, TLSv1, TLSv1_1, TLSv1_2, TLSv1_3. The default is TLSv1.2 for OpenSSL Version < 1.0.1. OpenSSL Version >= 1.0.1 uses TLS_server_method() where the actual protocol version used will be negotiated to the highest version mutually supported by the client and the server. The supported protocols are SSLv3, TLSv1, TLSv1.1, TLSv1.2 and TLSv1.3
servercipherlist serverciphersuite - A set of OpenSSL cipher strings. Multiple ciphers contained in a string should be separated by a colon. If the environment variable TLS_CIPHER_LIST is set to such a string, it takes precedence. servercipherlist is used for TLSv1.2 and below. clientciphersuite is used for TLSv1.3 and above.
tlsclients A list of email addresses. When relay rules would reject an incoming message, qmail-smtpd(8) can allow it if the client presents a certificate that can be verified against the CA list in clientca.pem and the certificate email address is in tlsclients
servercert.pem - SSL certificate to be presented to clients in TLS-encrypted sessions. Should contain both the certificate and the private key. Certifying Authority (CA) and intermediate certificates can be added at the end of the file. The filename can be overridden by the environment variable SERVERCERT. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
clientca.pem - A list of Certifying Authority (CA) certificates that are used to verify the client-presented certificates during a TLS-encrypted session. The filename can be overridden by the environment variable CLIENTCA. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
clientcrl.pem - A list of Certificate Revocation Lists (CRLs). If present it should contain the CRLs of the CAs in clientca.pem and client certs that will be checked for revocation. The filename can be overridden by the environment variable CLIENTCRL. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
rsa512.pem - If this 512 bit RSA key is provided, qmail-smtpd(8) will use it for TLS sessions instead of generating one on-the-fly. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
dh1024.pem - If these 1024 bit DH parameters are provided, qmail-smtpd(8) will use them for TLS sessions instead of generating one on-the-fly (which is very timeconsuming). The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
dh512.pem - 512 bit counterpart for dh1024.pem. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
qmail-remote will issue the STARTTLS command if it finds the remote server supports STARTTLS and it finds a valid certificate in /etc/indimail/certs/clientcert.pem. qmail-remote(8) will revert to non-encrypted session if the TLS connection fails. Let's us invoke qmail-remote(8) on the command line to simulate sending an email through a TLS session.
# create a sample rfc-822 email in /tmp/mail.txt
(
echo "From: [email protected]"
echo "To: [email protected]"
echo "Subject: Test message"
echo "Date: $(date --rfc-email)"
echo
echo "Test message"
) > /tmp/mail.txt
$ ls -l /tmp/mail.txt
-rw-r--r-- 1 mbhangui mbhangui 130 Jan 9 10:26 /tmp/mail.txt
# Run tcpserver in the background on terminal 1 which will run qmail-smtpd with STARTTLS capability enabled
# This capability will be seen by qmail-remote when it does EHLO
$ tcpserver 0 2025 env STARTTLS=1 BIGTODO=0 CONFSPLIT=23 QUEUE_START=1 QUEUE_COUNT=5 QUEUE_BASE=/var/indimail/queue qmail-smtpd &
[1] 7641
# Run qmail-remote by setting SMTPROUTE variable to your localhost. Run this on terminal 2
$ env SMTPROUTE='argos.indimail.org:127.0.0.1:2025' qmail-remote argos.indimail.org [email protected] "" 130 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1673240254 qp 7784
# This is what qmail-smtpd will log on descriptor 2 on terminal 1 when qmail-remote above does a SMTP transaction
qmail-smtpd: pid 7783 gsasl header version=2.2.0 library version=2.2.0
qmail-smtpd: pid 7783 from ::ffff:127.0.0.1 ssl-version=TLSv1.3
qmail-smtpd: pid 7783 from ::ffff:127.0.0.1 HELO <argos.indimail.org> MAIL from <[email protected]> RCPT <[email protected]> AUTH <local-rcpt> Size: 130 TLS=TLSv1.3
The TLS/SSL connection can be customized by the following control files
tlsclientmethod - The TLS protocol list. Accepted values are SSLv23, SSLv3, TLSv1, TLSv1_1, TLSv1_2, TLSv1_3. The default is TLSv1_2 for OpenSSL Version < 1.0.1. Without this control file OpenSSL Version >= 1.0.1 uses TLS_client_method(3ossl) where the actual protocol version used will be negotiated to the highest version mutually supported by the client and the server. The supported protocols are SSLv3, TLSv1, TLSv1.1, TLSv1.2 and TLSv1.3. The default location of /etc/indimail/control can be overridden by environment variable CONTROLDIR.
clientcipherlist clientciphersuite - A set of OpenSSL client cipher strings. Multiple ciphers contained in a string should be separated by a colon. The default location of /etc/indimail/control can be overridden by environment variable CONTROLDIR. clientcipherlist is used for TLSv1.2 and below. clientciphersuite is used for TLSv1.3 and above.
notlhosts - domains for which qmail-remote(8) will not initiate TLS sesson. This file in /etc/indimail/control or directory defined by the CONTROLDIR envirnoment variable, shouldn't be confused with /etc/indimail/certs/notlshosts directory in the directory or the directory defined by the CERTDIR environment variable.
For TLS sessions, the default location of /etc/indimail/certs can be overridden by environment variable CERTDIR. This affects the location of below files/directories clientcert.pem, servercert.pem, tlshosts/<FQDN>.pem, tlshosts/exhaustivelist, notlshosts/<FQDN>, notlshosts/host.
clientcert.pem - SSL certificate that is used to authenticate with the remote server during a TLS session. If clientcert.pem does not exist, qmail-remote(8) will not negotiate TLS. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR. clientcert.pem can be overridden by environment variable CLIENTCERT.
tlshosts/<FQDN>.pem - qmail-remote(8) requires TLS authentication from servers for which this file exists (<FQDN> is the fully-qualified domain name of the remote SMTP server). One of the dNSName or the CommonName attributes have to match. The file contains the trusted CA certificates. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
tlshosts/exhaustivelist - if this file exists no TLS will be tried on hosts other than those for which a file tlshosts/<FQDN>.pem exists. The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
WARNING: this option may cause mail to be delayed, bounced, doublebounced, or lost.
notlshosts/<FQDN> - qmail-remote(8) will not try TLS on servers for which this file exists (<FQDN> is the fully-qualified domain name of the remote SMTP server). (tlshosts/<FQDN>.pem takes precedence over this file however). The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
notlshosts/host - qmail-remote(8) will not try TLS on servers for which this file exists (host is the domain name of the recipient). (tlshosts/<FQDN>.pem takes precedence over this file however). The default location of /etc/indimail/certs can be overridden by environment variable CERTDIR.
As mentioned earlier, ciphers can be set using the control files servercipherlist, serverciphersuite, clientcipherlist, clientciphersuite and environment variables TLS_CIPHER_LIST and TLS_CIPHER_SUITE. Depending on the openssl library version, the tls_init() function from libqmail will use control files servercipherlist, clientcipherlist, environment variable TLS_CIPHER_LIST for TLSv1.2 and below and control files serverciphersuite, clientciphersuite, environment variable TLS_CIPHER_SUITE for TSLv1.3 and above. However things are not that simple.
This is what the man page says.
- The control string str for SSL_CTX_set_cipher_list(), SSL_set_cipher_list(), SSL_CTX_set_ciphersuites() and SSL_set_ciphersuites() should be universally usable and not depend on details of the library configuration (ciphers compiled in). Thus no syntax checking takes place. Items that are not recognized, because the corresponding ciphers are not compiled in or because they are mistyped, are simply ignored. Failure is only flagged if no ciphers could be collected at all.
The portion underlined above isn't true as written in the man page above (openssl 3.0.9). In some of the openssl versions you cannot combine the TLSv1.2 and TLSv1.3 ciphers in serverciphersuite, clientciphersuite, TLS_CIPHER_SUITE. In few version you need to have both TLSv1.2 ciphers and TLSv1.3 ciphers and in few versions, mixing TLSv1.2 and TLSv1.3 ciphers results in SSL_set_ciphersuites(), SSL_set_cipher_suites() to fail (contrary to what the man page says).
The table below shows the situation. So for ArchLinux, openSUSE Tumbleweed, alpine, Fedora 37, Fedora 38, Debian 12, Gentoo, AlmaLinux 9, Oracle 9, RockyLinux 9, CentOS Stream 9 Ubi 9, Ubuntu jammy you need not modify the install time defaults for [server|client]ciphersuite control files. For debian10, debian11, leap15.4 almalinux8, oracle8, rockylinux8, stream8, ubi8, do not combine the TLSv1.2 and TLSv1.3 ciphers in [server|client]suite control files. Just leave the install time defaults. For focal and bionic you need to combine TLSv1.2 and TLSv1.3 ciphes in [server|client]ciphersuite control files for both TLSv1.2 and TLSv1.3 to work. e.g. This is what you need to do immediately after installing indimail-mta for systems having openssl library version 1.1.1f and below. The TLS control files are created by the post install script using the command svctool --config=qmail
.
$ t1=$(cat /etc/indimail/control/servercipherlist)
$ t2=$(cat /etc/indimail/control/serverciphersuite)
$ sudo sh -c "echo $t1:$t2 > /etc/indimail/control/serverciphersuite"
OpenSSL library version | Cipher Status | Linux OS Distribution |
---|---|---|
3.1.2 | TLSv1.2+TLSv1.3 works but not needed | ArchLinux, openSUSE Tumbleweed, alpine |
3.0.9 | TLSv1.2+TLSv1.3 works but not needed | Fedora 37, Fedora 38, Fedora 39, Debian 12, Gentoo |
3.0.8 | TLSv1.2+TLSv1.3 works but not needed | Ubuntu lunar |
3.0.7 | TLSv1.2+TLSv1.3 works but not needed | AlmaLinux 9, Oracle 9, RockyLinux 9, CentOS Stream 9, Ubi 9 |
3.0.2 | TLSv1.2+TLSv1.3 works but not needed | Ubuntu jammy |
1.1.1n | TLSv1.2+TLSv1.3 results in failure | Debian 10, Debian 11 |
1.1.1l | TLSv1.2+TLSv1.3 results in failure | openSUSE leap15.4 |
1.1.1k | TLSv1.2+TLSv1.3 results in failure | AlmaLinux 8, Oracle 8, RockyLinux 8, CentOS Stream 8, Ubi 8 |
1.1.1f | TLSv1.2+TLSv1.3 needed to have both TLSv1.2 and TLSv1.3 work | Ubuntu focal |
1.1.1 | TLSv1.2+TLSv1.3 needed to have both TLSv1.2 and TLSv1.3 work | Ubuntu bionic |
1.0.2k-fips | TLSv1.3 not supported | CentOS 7 |
A script update_tmprsadh in cron uses the following openssl commands to pre-generate 2048 bites RSA and DH parameters. You can pass --maxbits argument to update_tmprsadh to generate these with higher bits. You can set the environment variable SSL_BITS to make tcpclient(1) choose specific bits for the RSA/DH parameters. These files are generated in /etc/indimail/certs. update_rmprsadh is installed to be run by cron if you have installed indimail from Open Build Service.
cd /etc/indimail/certs
/usr/bin/openssl genrsa -out rsa2048.pem 2048
/usr/bin/openssl dhparam -out -2 dh2048.pem 2048
Some ciphersuites may use ephemeral Diffie-Hellman (DH) key exchange. In these cases, the session data is negotiated using the ephemeral/temporary DH key and the key supplied and certified by the certificate chain is only used for signing. Anonymous ciphers (without a permanent server key) also use ephemeral DH keys.
Using ephemeral DH key exchange yields forward secrecy as the connection can only be decrypted when the DH key is known. By generating a temporary DH key inside the server application that is lost when the application is left, it becomes impossible for an attacker to decrypt past sessions, even if they get hold of the normal (certified) key, as this key was only used for signing.
In order to perform a DH key exchange the server must use a DH group (DH parameters) and generate a DH key. The server will always generate a new DH key during the negotiation.
As generating DH parameters is extremely time consuming, an application should not generate the parameters on the fly. DH parameters can be reused, as the actual key is newly generated during the negotiation.
Typically applications should use well known DH parameters that have built-in support in OpenSSL. The macro SSL_set_dh_auto(3ossl) configures OpenSSL to use the default built-in DH parameters for the SSL object. Passing a value of 1 in the onoff parameter switches the feature on, and passing a value of 0 switches it off. The default setting is off.
If "auto" DH parameters are switched on then the parameters will be selected to be consistent with the size of the key associated with the server's certificate. If there is no certificate (e.g. for PSK ciphersuites), then it it will be consistent with the size of the negotiated symmetric cipher key.
Applications may supply their own DH parameters instead of using the built-in values. This approach is discouraged and applications should in preference use the built-in parameter support described above. Applications wishing to supply their own DH parameters should call SSL_set0_tmp_dh_pkey(3ossl) to supply the parameters for SSL. The parameters should be supplied in the dhpkey argument as an EVP_PKEY containg DH parameters. Ownership of the dhpkey value is passed to the SSL_CTX or SSL object as a result of this call, and so the caller should not free it if the function call is succesful..
Some mail providers like hotmail, yahoo restrict the number of connections from a single IP and the number of mails that can be delivered in an hour from a single IP. To increase your ability to deliver large number of genuine emails from your users to such sites, you may want to send out mails from multiple IP addresses.
IndiMail has the ability to call a custom program instead of qmail-local(8) or qmail-remote(8). This is done by defining the environment variable QMAILLOCAL or QMAILREMOTE. qmail-remote(8) can use the environment variable OUTGOINGIP to set the IP address of the local interface when making outgoing connections. By writing a simple script and setting QMAILREMOTE environment variable pointing to this script, one can randomly chose an IP address from the control file /etc/indimail/control/outgoingip.
The script below also allows you to define multiple outgoing IP addresses for a single host. e.g. you can create the control file /etc/indimail/control/outgoingip.hotmail.com to send out mails from multiple IPs only for the domain hotmail.com.
Let us name the below script balance_outgoing
$ sudo /bin/bash
# svc -d /service/qmail-send.25
# echo "/usr/bin/balance_outgoing" > /service/qmail-send.25/variables/QMAILREMOTE
# svc -u /service/qmail-send.25
# exit
$
Finally the balance_outgoing script can be placed with execute bit in /usr/bin
# This scripts expects qmail-remote arguments on command line
# argv0 - qmail-remote
# argv1 - host (host)
# argv2 - sender (sender)
# argv3 - qqeh (qmail queue extra header)
# argv4 - size
# argv5 .. argvn - recipients
host=$1
sender=$2
qqeh=$3
size=$4
shift 4
cd QMAIL
if [ " $CONTROLDIR" = " " ] ; then
CONTROLDIR=@controldir@
fi
slash=`echo $CONTROLDIR | cut -c1`
if [ ! " $slash" = " /" ] ; then
cd QMAIL
fi
FN=$CONTROLDIR/filterargs
if [ -n "$SPAMFILTER" -o -n "$FILTERARGS" -o -f $FN ] ; then
# execute spawn-filter if you have filters defined for remote/local deliveries
PROG="bin/spawn-filter"
else
PROG="bin/qmail-remote"
fi
# Make an array of IP addresses in variable IP
if [ -f $CONTROLDIR/outgoingip.$host ] ; then
IP=(`cat $CONTROLDIR/outgoingip.$host`)
elif [ -f $CONTROLDIR/outgoingip ] ; then
IP=(`cat $CONTROLDIR/outgoingip`)
else
exec -a qmail-remote $PROG "$host" "$sender" "$qqeh" $size $*
fi
IP_COUNT=${#IP[*]} # array size
if [ $IP_COUNT -gt 1 ] ; then
i=`expr $RANDOM % $IP_COUNT` # chose an IP randomly
export OUTGOINGIP=${IP[$i]}
fi
exec -a qmail-remote $PROG "$host" "$sender" "$qqeh" $size $*
NOTE: The above script is no longer need. The functionality of the above script is now a built-in function of qmail-remote(8). You just need to have multiple IP addresses in /etc/indimail/control/outgoigip control file.
The sender address can be forged by spammers to look like a legitimate email address. If that email address belongs to you, all bounce backs will be received by your server. Your server ends up handling the entire processing load for the spammer. BATV allows your SMTP server to determine if the original email was ever initiated from your server. This is done by qmail-remote(8) marking each outbound email message with a key. When the bounce back arrives, qmail-smtpd(8) will identify that the key is either present or not present. If the key is not present then qmail-smtpd(8) knows it is not a valid bounce back and drops the email. This feature is known as Bounce Address Tag Validation (BATV). BATV allows qmail-smtpd(8) to distinguish between legitimate and illegitimate bounce (NDR) messages. Once you configure BATV, all outbound messages sent by qmail-remote(8) will be tagged using BATV. To enable BATV in IndiMail, all you need to do is create the batvkey control file. You can define BATVKEY environment variable to refer to another control file. You can also define BATVKEY environment variable for specific users or groups by using envrules. See Envrules.
IndiMail's BATV implementation is based on draft-levine-mass-batv-02.
$ cd /etc/indimail/control
$ sudo bash
# tr -dc 'A-Za-z0-9' </dev/urandom | head -c 16 > batvkey
You can exclude signing for remote deliveries to hosts that don't support signing by having the host in the control file batvnosignremote. You can also exclude signing for mails for your own domains by having the domain in the control file batvnosignlocals.
You can also control the validity period for bounces by creating the control file batvkeystale. The default validity is 7 days.
We just learnt how to configure IndiMail to rejected forged bounces. For legitimate bounces/NDRs, IndiMail allows a mechanism by which you can use your own script/program to handle bounces. All bounces in IndiMail is generated by qmail-send(8). qmail-send(8) generates a bounce when qmail-lspawn(8) or qmail-rspawn(8) reports a permanent failed delivery. A bounce is generated by qmail-send(8) by injecting a new mail in the queue using qmail-queue(8). This bounce generation by qmail-send(8) can be modified in three ways
When you define the environment variable BOUNCEPROCESSOR as a valid path to a program or script, the program gets called whenever a delivery fails permanently. The program runs with the uid qmails and is passed the following five arguments
- bounce_file
- bounce_report
- bounce_sender
- original_recipient
- bounce_recipient
To set BOUNCEPROCESSOR, you would do the following
$ sudo /bin/bash
# echo "bounce_processor_path" > /service/qmail-send.25/variables/BOUNCEPROCESSOR
# svc -r /service/qmail-send.25
There are few email marketing companies who are using BOUNCEPROCESSOR to insert the status of all bounces in MySQL table for their email marketing campaigns.
Using envrules, you can set specific environment variables only for bounced recipients. The format of this file is of the form
pat:envar1=val,envar2=val,...]
where pat is a regular expression which matches a bounce recipient. envar1, envar2 are list of environment variables to be set. If var is omitted, the environment variable is unset.
e.g.
[email protected]:CONTROLDIR=control2,QMAILQUEUE=/usr/bin/qmail-nullqueue
causes all bounces generated for the sender [email protected] to be discarded.
qmail-send(8) uses qmail-queue(8) to queue bounces and aliases/forwards. This can be changed by using QMAILQUEUE environment variable. If a different queue program is desired for bounces, it can be set by using BOUNCEQUEUE environment variable. e.g
$ sudo /bin/bash
# echo /usr/bin/qmail-nullqueue > /service/qmail-send.25/variables/BOUNCEQUEUE
# svc -r /service/qmail-send.25
disables bounces system-wide. Though disabling bounces may not be the right thing to do but in some situations where bounces are not at all needed, disabling bounces will surely result in performance improvements of your system, especially so if your system does mass-mailing.
In my earlier article, I showed how to set up automatic rule based archival. I had discussed email archival as one of the many compliance requirements you might have. Sometimes you may also require to configure disclaimers in your messaging system. e.g for UK Companies Act 2006, IRS Circular 230.
IndiMail provides a utility called altermime(1) to add your own disclaimers on each and every mail that goes out through your IndiMail messaging server. You can use any of the two options below to configure disclaimers
The filterargs control file allows you to insert any filter before remote or local delivery. You can use altermime to insert a disclaimer as below
*:/usr/bin/altermime --input=- --disclaimer=/etc/indimail/control/disclaimer
If you want disclaimer to be used only for your outgoing mails then, you could do the following
*:remote:/usr/bin/altermime --input=- --disclaimer=/etc/indimail/control/disclaimer
In both the above examples the file /etc/indimail/control/disclaimer contains the text of your disclaimer
Just like filterargs control file, the environment variable FILTERARGS allows you to set any custom filter before your mail gets deposited into the queue by qmail-queue(8).
$ sudo /bin/bash
# echo /usr/bin/altermime --input=- --disclaimer=/etc/indimail/control/disclaimer \
> /service/qmail-smtpd.587/variables/FILTERARGS
# svc -r /service/qmail-smtpd.587
Read altermime(1) man page for more details. Here are other use cases for altermime
/bin/altermime --multipart-insert --input=- --replace=disclaimer.txt --with /etc/indimail/control/disclaimer.txt"
/bin/altermime --input=- --disclaimer=/etc/indimail/control/disclaimer.txt \
--disclaimer-html=/etc/indimail/control/disclaimer.txt \
--xheader=\"X-Copyrighted-Material: Please visit http://www.indimail.org/privacy.htm\""
IndiMail provides multiple options for those who want their emails archived automatically. For easy retrieval, you can use tools like google desktop, beagle, etc If you use IndiMail, you have two methods to achieve automatic archiving of emails
If EXTRAQUEUE environment variable is set to any environment variable, qmail-queue(8) will deposit an extra copy of the email which it receives for putting it in the queue. Normally you would set EXTRAQUEUE variable in any of the clients which use qmail-queue(8). e.g. qmail-smtpd(8), qmail-inject(8), sendmail(1), etc. If you have setup IndiMail as per the official instructions, you can set EXTRAQUEUE environment variable for incoming and outgoing mails as given below
$ sudo /bin/bash
# echo "[email protected]" > /service/qmail-smtpd.25/variables/EXTRAQUEUE
# svc -r /service/qmail-smtpd.25 /service/qmail-smtpd.587
Now all your emails coming in and going out of the system, a copy will be sent to [email protected]. If [email protected] lies on IndiMail Messaging Platform, you can set filters (using vfilter) to automatically deposit the mails in different folders. The folders can be decided on various criteria like date, sender, recipient, domain, etc.
This control file allows you to set up rule based archiving. For any specific sender or recipient, you can set a rule to select a destination email for archiving. This is much more flexible than using EXTRAQUEUE which allowed you to archive emails to a single email address. A line in the control file mailarchive can be of the form
type:regexp:dest_address
- Here type is 'T' to set a rule on recipients. You can set the type as 'F' to set a rule on the sender.
- regexp is any email address which matches the sender or recipient (depending on whether type is 'T' or 'F').
- dest_address should expand to a valid email address. You can have a valid email address. You can also have the '%' sign followed by the letters u, d or e in the address to have the following substitutions made
$u - gets replaced by the user component of email address (without the '@' sign)
$d - gets replaced by the domain component of email address
$e - gets replaced by the email address
The email address in the above substitution will be the recipient (if type is 'T') and the sender (if type is 'F'). Here is another example and a cool tip.
T:*:%u@arch%d
Will make a hot standby of your incoming mails for yourdomain on another server hosting archyourdomain.
For some organizations, email archiving is a must due to compliance with regulatory standards like SOX, HIPAA, Basel II Accord (effective 2006), Canadian Privacy Act, Data Protection Act 1988, EU Data Protection Directive 95/46/FC, Federal Information Security Management Act (FISMA), Federal Rules of Civil Procedure (FRCP), Financial Services Act 198, regulated by FSA, Freedom of Information Act (FOIA), Freedom of Information Act (in force January 2005), The Gramm-Leach-Bliley Act (GLBA), MiFID (Markets in Financial Instruments Directives), PIPEDA (Personal Information Protection and Electronic Documents Act), SEC Rule 17a-4/ NASD 3010 (Securities Exchange Act 1934).
Apart from archiving, you would also want to set disclaimers. IndiMail allows you to set a disclaimer by setting the FILTERARGS environment variable and using altermime(1). The following acts/circular specifically require you to set disclaimers.
UK Companies Act 2006, IRS Circular 230,
Reference
• Email Compliance - A simple 5 step guide
• E-Mail archiving - Wikipedia
• Compliance Requirements for email archiving
• Email Legislation - Summary of UK, US, EU legislations
IndiMail allows you to configure most of its functionality through set of environment variables. In fact there more more than 250 features that can be controlled just by setting or un-setting environment variables. envrules is applicable to qmail-smtpd(8), qmail-inject(8), qmail-local(8), qmail-remote(8) as well. It can also be used to control programs called by the above programs (e.g qmail-queue(8). IndiMail allows you to configure quite many things using environment variables. Just set the environment variable CONTROLDIR=control2 and all qmail components of IndiMail start looking for control files in /etc/indimail/control2. You can set CONTROLDIR=/etc/indimail and all control files can be conveniently placed in /etc/indimail. Some of these environment variables can be set during the startup of various services. IndiMail has all its services configured as directories in the /service directory. As an example, if you want to force authenticated SMTP on all your users, setting the environment variable REQUIREAUTH allows you to do so.
$ sudo /bin/bash
# echo 1 > /service/qmail-smtpd.587/variables/REQUIREAUTH
# svc -r /service/qmail-smtpd.587
sets the qmail-smtpd(8) running on port 587 to force authentication.
Setting environment variables in your startup script, in your .profile or your shell forces you to permanently set the environment variable to a specific value. Using envrules, IndiMail allows you to set these environment variables specific to different senders or recipients envrules allows IndiMail platform to be tuned differently for different users. No other messaging platform, to the best of my knowledge, is capable of doing that. Another way of saying is that envrules allows your IndiMail platform to dynamically change its behavior for each and every user.
For the SMTP service, you can set different environment variables for different senders. All that is required is to define the following in the control file /etc/indimail/control/from.envrules. The format of this file is of the form
pattern:envar1=val,envar2=val,...]
where pattern is a regular expression which matches a sender. envar1, envar2 are list of environment variables to be set. If val is omitted, the environment variable is unset. The name of the control file can be overridden by the environment variable FROMRULES. e.g. having the following in from.envrules
*consultant:REQUIREAUTH=1,NORELAY=1
forces all users whose email ids end with 'consultant' to authenticate while sending mails. Also such users will be prevented from sending mails to outside your domain.
[email protected]:DATASIZE=
Removes all message size restrictions for the user whose email address is [email protected], by unsetting the environment variable DATASIZE.
You can also set envrules on per recipient basis. This gets set for qmail-local(8) and qmail-remote(8). The control file to be used in this case is /etc/indimail/control/rcpt.envrules. The filename can be overridden by RCPTRULES environment variable.
.e.g
*.yahoo.com:OUTGOINGIP=192.168.2.100
The OUTGOINGIP environment variable is used by qmail-remote(8) to bind on a specific IP address when connecting to the remote SMTP server. The above envrule forces qmail-remote(8) to use 192.168.2.100 as the outgoing IP address when sending mails to any recipient at yahoo.com.
For SMTP service the following the following list of environment variables can be modified using envrules
REQUIREAUTH, QREGEX, ENFORCE_FQDN_HELO, DATABYTES, BADHELOCHECK, BADHELO, BADHOST, BADHOSTCHECK, TCPPARANOID, NODNSCHECK, VIRUSCHECK, VIRUSFORWARD, REMOVEHEADERS, ENVHEADERS, LOGHEADERS, LOGHEADERFD, SIGNATURES, BODYCHECK, BADMAILFROM, BADMAILFROMPATTERNS, BOUNCEMAIL, CUGMAIL, MASQUERADE, BADRCPTTO, BADRCPTPATTERNS, GOODRCPTTO, GOODRCPTPATTERNS, GREYIP, GREETDELAY, CLIENTCA, TLSCIPHERS, SERVERCERT, BLACKHOLERCPT, BLACKHOLERCPTPATTERNS, SIGNKEY, SIGNKEYSTALE, SPFBEHAVIOR, SPFIPV6, SPFRULES, SPFGUESS, SPFEXP, TMPDIR, TARPITCOUNT, TARPITDELAY, MAXRECIPIENTS, MAX_RCPT_ERRCOUNT, AUTH_ALL, CHECKRELAY, CONTROLDIR, CHECKRECIPIENT, CHECKSENDER, SPAMFILTER, LOGFILTER, SPAMFILTERARGS, SPAMEXITCODE, REJECTSPAM, SPAMREDIRECT, SPAMIGNORE, SPAMIGNOREPATTERNS, FILTERARGS, QUEUEDIR, QUEUE_BASE, QUEUE_START, QUEUE_COUNT, QMAILQUEUE, QUEUEPROG, RELAYCLIENT, QQEH, BADEXT, BADEXTPATTERNS, ACCESSLIST, EXTRAQUEUE, QUARANTINE, QHPSI, QHPSIMINSIZE, QHPSIMAXSIZE, QHPSIRC, QHPSIRN, USE_FSYNC, SCANCMD, PLUGINDIR, QUEUE_PLUGIN, PASSWORD_HASH, MAKE_SEEKABLE, MIN_FREE, ERROR_FD, DKSIGN, DKVERIFY, DKSIGNOPTIONS, DKQUEUE, DKEXCLUDEHEADERS, DKIMSIGN, DKIMVERIFY, DKIMPRACTICE, DKIMIDENTITY, DKIMEXPIRE, SIGN_PRACTICE DKIMQUEUE, BATVKEY, BATVKEYSTALE, BATVNOSIGNLOCALS, BATVNOSIGNREMOTE, SRS_DOMAIN, SRS_SECRETS, SRS_MAXAGE, SRS_HASHLENGTH, SRS_HASHMIN, SRS_ALWAYSREWRITE, SRS_SEPARATOR, SIGNATUREDOMAINS, and NOSIGNATUREDOMAINS
The following list of environment variables can be modified using envrules if QMAILLOCAL and QMAILREMOTE is set to /usr/sbin/spawn-filter.
QREGEX, SPAMFILTER, LOGFILTER, SPAMFILTERARGS, FILTERARGS, SPAMEXITCODE, HAMEXITCODE, UNSUREEXITCODE, REJECTSPAM, SPAMREDIRECT, SPAMIGNORE, SPAMIGNOREPATTERNS, DATABYTES, MDA, MYSQL_INIT_COMMAND, MYSQL_READ_DEFAULT_FILE, MYSQL_READ_DEFAULT_GROUP, MYSQL_OPT_CONNECT_TIMEOUT, MYSQL_OPT_READ_TIMEOUT, MYSQL_OPT_WRITE_TIMEOUT, QUEUEDIR, QUEUE_BASE, QUEUE_START, QUEUE_COUNT, and TMPDIR
The following list of environment variables which can be modified using envrules are specfic to qmail-remote(8).
CONTROLDIR, SMTPROUTE, SIGNKEY, OUTGOINGIP, DOMAINBINDINGS, AUTH_SMTP, MIN_PENALTY, and MAX_TOLERANCE
The following list of environment variables which can be modified using envrules are specfic to qmail-local(8).
USE_SYNCDIR, USE_FSYNC, and LOCALDOMAINS
Do man qmail-smtpd(8), spawn-filter(8) to know the full list of environment variables that can be controlled using envrules.
This is actually an extension of envrules, but has its own control file named domainqueue for convenience. The control file /etc/indimail/control/domainqueue is of the form
pattern:envar1=val,envar2=val,...]
When the domain for an email being injected into the queue by qmail-smtpd(8) or qmail-inject(8), matches pattern, the environment variable list gets set. In the example below, emails injected into the queue by qmail-inject(8) go into the queue /var/indimail/queue/slowq
yahoo.com:QUEUEDIR=/var/indimail/queue/slowq
This feature becomes useful when setting domain specific delivery rate controls as mentioned in the chapter Controlling Delivery Rates
indimail-mta has multiple daemons qscheduler(8)/qmail-start(8), qmail-send(8), qmail-lspawn(8), qmail-rspawn(8) and qmail-clean(8) for processing a queue. The standard indimail-mta installation is meant for servers that can withstand high loads resulting from high inbound/outbound mail traffic. For small servers which have minimal or sporadic traffic, the full indimail-mta installation isn't required or necessary. In such cases you can either install indimail-mini to use QMQP protocol, configure qmail-qmtpd(8) to provide QMTP protocol. You can configure qmail-qmtpd(8) service to provide QMTP protocol. QMTP is the "Quick Mail Transport Protocol", developed by Daniel J. Bernstein. It is an alternative to SMTP, with a simpler and vastly more efficient client/server connection dialogue. Bernstein describes QMTP in this short document. You can also use qmta to use standard delivery mechanisms. indimail-mini comprises of just 10 binaries, whereas qmta comprises of 25 binaries. For most cases, you just require one binary qmail-qmqpc(8) if you use indimail-mini. For using QMTP you just need to setup qmail-qmtpd(8) service and setup qmtproutes. If you use qmta, for most cases you just require qmta-send(8) and qmail-queue(8) to process and send mails.
QMQP provides a centralized mail queue within a cluster of hosts. QMQP clients do not require local queue for queueing messages. QMQP is faster than SMTP. You can use QMQP to send mails from your relay servers (or any server) to servers running QMQP service. The QMQP server can deliver mails to your local mailboxes or/and relay mails to the outside world. In short, to use QMQP, you need a client that uses QMQP protocol and a server that provides the QMQP service. qmail-qmqpc(8) which uses QMQP protocol, is a QMQP client. qmail-qmqpd(8) is a server that you run to provide a central hub offering the QMQP service. qmail-qmqpd(8) can be run under tcpserver(1) under port 628 on the central hub. If you have qmail-send(8) running on the central hub, you can deliver local as well as relay mails. The central hub can also be a collection of multiple servers to aid performance. You just need to enter the IP addresses of these servers in /etc/indimail/control/qmqpservers on the client(s). The QMQP protocol doesn't require clients to have a local queue. In fact you can use QMQP protocol on a truly diskless client which doesn't even have any remote filesystem mounted. If you run web servers which need to send out emails, you can use QMQP to send emails without impacting performance. This is because you don't have the overhead of running an MTA like sendmail, postfix or qmail/netqmail/notqmail/indimail-mta. If you already have an installation of indimail-mta on your network, you can quickly setup a indimail-mini installation on your web server. The sendmail client provided by indimail-mini is fully compatible with PHP, python and any software that uses sendmail interface to push out emails. On a server, QMQP service is provided by having indimail-mta installed and enabling the qmail-qmqpd(8) service. On the client you just need to have indimail-mini / indimail-mta or qmta installed and configure sendmail/qmail-inject to use qmail-qmqpc(8). If you install indimail-mini, the installation will configure sendmail/qmail-inject to use qmail-qmqpc(8). If you have ezmlm, indimail-mta, qmta installed, you need to set QMAILQUEUE to use qmail-qmqpc(8). You can refer to Setting Environment Variables to set your QMAILQUEUE variable. The process for setting up QMQP service is outlined in the next chapter.
If you use a source installation, you can copy few binaries manually and run few commands manually, to have a indimail-mini installation. There is also a RPM package indimail-mini which does both installation and setup. An indimail-mini installation comes up with a bare minimum list of programs to enable you to send out mails.
You need to have at least one host on your network offering QMQP service to your clients. indimail-mta runs a QMQP service which handles incoming QMQP connections on port 628 using tcpserver. It uses multilog(8) to store log messages under /var/log/svc/qmqpd.628. The QMQP service is actually provided by qmail-qmqpd(8)
If you have installed indimail-mta using the RPM, QMQP service is installed by default. However, you need to enable it.
$ sudo /bin/bash
# /bin/rm /service/qmail-qmqpd.628/down
# /usr/bin/svc -u /service/qmail-qmqpd.628
If you have installed indimail-mta using the source, you may create the QMQP service using the following command
Create the service using svctool
$ sudo /usr/sbin/svctool --qmqp=628 --servicedir=/service \
--qbase=/var/indimail/queue --qcount=5 --qstart=1 \
--cntrldir=control --localip=0 --maxdaemons=75 --maxperip=25 \
--fsync --syncdir --memory=104857600 --min-free=52428800
Send a sighup to svscan to activate the new service immediately
rather than waiting for 5 minutes
$ sudo kill -1 `cat /run/svscan/.svscan.pid`
or
$ sudo svps -h
The above command will create a supervised service which runs qmail-qmqpd(8) under tcpserver. In case you are setting up this service to relay mails to outside world, you might want to also specify --dkfilter, --qhpsi, --virus-filter, etc arguments to svctool(8) so that tasks like virus scanning, dk, domainkey signing, etc is done by the QMQP service.
Note: Some of the tasks like virus/spam filtering, dk, dkim signing, etc can be done either by the client (if QMAILQUEUE=/usr/sbin/qmail-spamfilter), or can be performed by QMQP service if QMAILQUEUE is defined as qmail-qmqpc(8) in the service's variable directory.
A QMQP server shouldn't even have to glance at incoming messages; its only job is to queue them for qmail-send(8). Hence you should allow access to QMQP service only from your authorized clients. You can edit the file /etc/indimail/tcp/tcp.qmqp to grant specific access to clients. Here's how to set up QMQP service to authorized client hosts on your indimail-mta server.
first create /etc/indimail/tcp/tcp.qmqp in tcprules(1) format to allow queueing from the authorized hosts. make sure to deny connections from unauthorized hosts. for example, if queueing is allowed from 1.2.3.*:
1.2.3.:allow
:deny
Then create /etc/indimail/tcp/tcp.qmqp.cdb:
$ sudo qmailctl cdb
building /etc/indimail/tcp/tcp.qmqp.cdb: [ OK ]
You can change /etc/indimail/tcp/tcp.qmqp and run tcprules again at any time.
A indimail-mini installation is just like a indimail installation, except that it's much easier to set up:
- You don't need MySQL
- You don't need /var/indimail/alias. A indimail-mini installation doesn't do any local delivery.
- You don't require daemontools, ucspi-tcp. You don't need to add anything to inetd.conf. A null client doesn't receive incoming mail.
- You don't need indimail entries in /etc/group or /etc/passwd. indimail-mini runs with the same privileges as the user sending mail; it doesn't have any of its own files.
- You don't need to start anything from your boot scripts. indimail-mini doesn't have a queue, so it doesn't need a long-running queue manager.
Installation and setup is trivial if you use the RPM package (See the chapter Installing Indimail using DNF/YUM/APT Repository.
$ sudo dnf install indimail-mini
If you are doing a source installation then you need to manually copy few binaries and few shared librareis. Here's what you do need if you want to setup QMQP on the client.
- The following binaries are required in the path (for source installation only). sendmail(1) qmail-inject(8) irmail(8) predate(1) datemail(1) mailsubj(1) qmail-showctl(8) srsfilter(1) qmail-qmqpc(8) qmail-direct(8) mini-smtpd(8)
- shared libs that the above binaries reference. You can use the ldd command (or otool -L command on OSX) (for source installation only).
- symbolic links to /usr/bin/sendmail from /usr/sbin/sendmail and /usr/lib/sendmail (for source installation only);
- a list of IP addresses of QMQP servers, one per line, in /etc/indimail/control/qmqpservers;
- a copy of /etc/indimail/control/me, /etc/indimail/control/defaultdomain, and /etc/indimail/control/plusdomain from your central server, so that qmail-inject(8) uses appropriate host names in outgoing mail; and
- this host's name in /etc/indimail/control/idhost, so that qmail-inject(8) generates Message-ID without any risk of collision. Everything can be shared across hosts except for /etc/indimail/control/idhost.
- Setup QMAILQUEUE environment variable to have qmail-qmqpc(8) called instead of qmail-queue(8) when any client injects mails in the queue (for source installation only).
# mkdir /etc/indimail/control/defaultqueue # cd /etc/indimail/control/defaultqueue # echo /usr/sbin/qmail-qmqpc > QMAILQUEUE
- All manual pages for the above binaries (not a hard requirement but good for future reference) (for source installation only).
Remember that users won't be able to send mail if all the QMQP servers are down. Most sites have two or three independent QMQP servers.
Note that users can still use all the qmail-inject(8) environment variables to control the appearance of their outgoing messages. This will include environment variables in $HOME/.defaultqueue directory.
If you want to setup a SMTP service, you can setup mini-smtpd service. In case you setup SMTP service, you may want to handle tasks is DKIM signing, virus and spam filtering. You can use QHPSI along with a virus scanner like clamav. You can also choose not to have these tasks done at the client end, but rather have it carried out by the QMQP service. For virus scanning refer to chapter Virus Scanning using QHPSI. You can set QMAILQUEUE to qmail-multi(8), qmail-dkim(8), etc. However, you must remember to have qmail-qmqpc(8) called at the end in case you change QMAILQUEUE to something other than qmail-qmqpc(8). If you need to setup mini-smtpd(8), here can be an option
sudo /usr/sbin/svctool --smtp=25 --servicedir=/service --skipsend --no-multi \
--qmailqueue=/usr/sbin/qmail-qmqpc --qmailsmtpd=/usr/sbin/mini-smtpd \
--cntrldir=control --localip=0 --maxdaemons=20 --maxperip=5 \
--memory=104857600 --min-free=52428800 \
--rbl=-rzen.spamhaus.org --rbl=-rdnsbl-1.uceprotect.net
QMTP protocol is provided by qmail-qmtpd(8). You can create a QMTP service by running svctool as below.
sudo /usr/sbin/svctool --qmtp="209" --servicedir="/service" \
--qbase="/var/indimail/queue" --qcount="5" --qstart="1" \
--cntrldir="control" --localip="0" --maxdaemons="75" \
--maxperip="25" --memory="104857600" --min-free="52428800"
The above command will create a QMTP service with TCP access control rules file in /etc/indimail/tcp/tcp.qmtp. You need to edit this file to provide access to each client that needs access to the QMTP service. If this file is missing, first create /etc/indimail/tcp/tcp.qmtp in tcprules format to allow qccess from the authorized hosts. Make sure to deny connections from unauthorized hosts. for example, if access is allowed from 1.2.3.*:
1.2.3.:allow
:deny
Then create /etc/indimail/tcp/tcp.qmtp.cdb:
$ sudo qmailctl cdb
building /etc/indimail/tcp/tcp.qmtp.cdb: [ OK ]
You can change /etc/indimail/tcp/tcp.qmtp and run tcprules again at any time. Once you have setup the QMTP service you can create the file /etc/indimail/control/qmtproutes on each client as below.
Here w.x.y.z is the IP of the server running qmail-qmtpd(8) and example.com is the domain for which you want to deliver mails using QMTP.
example.com:w.x.y.z:209
Once you create the above file, qmail-remote(8) will use QMTP to deliver mails using QMTP to w.x.y.z using QMTP. If you have both qmtproutes and smtproutes files, qmtproutes takes precedence.
qmta-send(8) can work like qmail-send(8) to transfer local and remote mails, but unlike qmail-send(8), it doesn't require mutiple daemons (todo-proc(8), qmail-lspawn(8)/qmail-rspawn(8), qmail-clean(8) to process the queue. In case you don't have a central host running QMQP (provided by qmail-qmqpd(8) or you have a small host that sends out insignificant number of emails in a day, then qmta-send(8) is what you would want to setup. qmta-send(8) is well suited for tiny computers like raspberry pi, banana pi and other Single Board Computers.
qmta-send(8) can process messages queued by clients with differing split directory value. The only required is that qmta-send(8) should be running with a higher split dir value than that of the client. You can use the -s option to run with any split dir value.
A qmta installation using qmta-send(8)](https://github.com/indimail/indimail-mta/wiki/qmta-send.8) is just like an indimail-mini installation, except that it has a single queue named qmta. This queue is processed by a single daemon qmta-send(8). qmta-send(8) is like qmail-send(8) provided by indimail-mta, except that it doesn't require multiple daemons - todo-proc(8), qmail-lspawn(8)/qmail-rspawn(8), qmail-clean(8). Just like indimail-mini,
- You don't require MySQL
- You don't require daemontools, ucspi-tcp. You don't need to add anything to inetd.conf.
Installation and setup is trivial if you use the RPM package (See the chapter Installing Indimail using DNF/YUM/APT Repository.
Install <b>qmta</b> (you can use yum / dnf / apt-get depending on your distribution)
$ apt-get update && apt-get install qmta
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
libqmail libsrs2
The following NEW packages will be installed:
libqmail libsrs2 qmta
0 upgraded, 3 newly installed, 0 to remove and 0 not upgraded.
Need to get 439 kB of archives.
After this operation, 1605 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 http://download.opensuse.org/repositories/home:/mbhangui/Debian_10 libqmail 1.1-1.1+62.1 [118 kB]
Get:2 http://download.opensuse.org/repositories/home:/mbhangui/Debian_10 libsrs2 1.0.18-1.1+10.1 [26.2 kB]
Get:3 http://download.opensuse.org/repositories/home:/mbhangui/Debian_10 qmta 2.13-1.1+103.1 [295 kB]
Fetched 439 kB in 1s (309 kB/s)
Selecting previously unselected package libqmail.
(Reading database ... 12408 files and directories currently installed.)
Preparing to unpack .../libqmail_1.1-1.1+62.1_amd64.deb ...
Unpacking libqmail (1.1-1.1+62.1) ...
Selecting previously unselected package libsrs2.
Preparing to unpack .../libsrs2_1.0.18-1.1+10.1_amd64.deb ...
Unpacking libsrs2 (1.0.18-1.1+10.1) ...
Selecting previously unselected package qmta.
Preparing to unpack .../qmta_2.13-1.1+103.1_amd64.deb ...
Adding IndiMail users/groups
Unpacking qmta (2.13-1.1+103.1) ...
Setting up libsrs2 (1.0.18-1.1+10.1) ...
Setting up libqmail (1.1-1.1+62.1) ...
Setting up qmta (2.13-1.1+103.1) ...
Processing triggers for man-db (2.8.5-2) ...
enable qmta-send service
$ sudo systemctl enable qmta-send
Created symlink /etc/systemd/system/multi-user.target.wants/qmta-send.service → /usr/lib/systemd/system/qmta-send.service.
start qmta-send service
$ sudo systemctl start qmta-send
check processes using the humble ps command
$ ps -ef | grep qmta-send | grep -v grep
qmailq 258421 1 0 21:30 ? 00:00:00 /usr/sbin/qmta-send -d ./Maildir/ splogger qmta-send
qmaill 258422 258421 0 21:30 ? 00:00:00 splogger qmta-send
root 258423 258421 0 21:30 ? 00:00:00 /usr/sbin/MTAlspawn -d ./Maildir/ splogger qmta-send
qmailr 258424 258421 0 21:30 ? 00:00:00 /usr/sbin/MTArspawn -d ./Maildir/ splogger qmta-send
check processes using the mighty systemctl command
$ systemctl status qmta-send
● qmta-send.service - qmta Mail Transport Agent
Loaded: loaded (/usr/lib/systemd/system/qmta-send.service; enabled; vendor preset: disabled)
Active: active (running) since Fri 2021-07-16 21:30:35 IST; 57s ago
Main PID: 258421 (qmta-send)
Tasks: 4 (limit: 9421)
Memory: 3.5M
CGroup: /system.slice/qmta-send.service
├─258421 /usr/sbin/qmta-send -d ./Maildir/ splogger qmta-send
├─258422 splogger qmta-send
├─258423 /usr/sbin/MTAlspawn -d ./Maildir/ splogger qmta-send
└─258424 /usr/sbin/MTArspawn -d ./Maildir/ splogger qmta-send
Jul 16 21:30:35 argos.indimail.org systemd[1]: Started qmta Mail Transport Agent.
Jul 16 21:30:35 argos.indimail.org qmta-send[258422]: 1626451235.303814 status: local 0/10 remote 0/20
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.566547 new msg 1049084
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.566607 info msg 1049084: bytes 366 from <[email protected]> qp 258569 uid 0
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.566665 local: [email protected] [email protected] 1049084 366 bytes
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.567691 starting delivery 1: msg 1049084 to local [email protected]
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.567740 status: local 1/10 remote 0/20
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.573755 delivery 1: success: did_1+0+0/
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.573809 status: local 0/10 remote 0/20
Jul 16 21:31:27 argos.indimail.org qmta-send[258422]: 1626451287.573876 end msg 1049084
$ You have mail in /home/mbhangui/Maildir
At anytime if you want to view the logs you can use the journalctl command
$ journalctl -u qmta-send
Dec 08 08:28:36 argos.indimail.org systemd[1]: Started qmta-send.service - qmta Mail Transport Agent.
Dec 08 08:28:37 argos.indimail.org qmta-send[1197]: info: qmta-send: /var/indimail/queue/qmta: conf split=23, bigtodo=0
Dec 08 08:28:37 argos.indimail.org qmta-send[1197]: status: local 0/10 remote 0/20
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: new msg 13096002
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: info msg 13096002: bytes 12924 from <[email protected]> qp 14024 uid 0
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: local: [email protected] [email protected] 13096002 12924 bytes qmta
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: starting delivery 1: msg 13096002 to local [email protected]
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: status: local 1/10 remote 0/20
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: new msg 13096020
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: info msg 13096020: bytes 13144 from <[email protected]> qp 14030 uid 1002
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: local: [email protected] mbhangui 13096020 13144 bytes qmta
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: starting delivery 2: msg 13096020 to local [email protected]
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: status: local 2/10 remote 0/20
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: delivery 1: success: did_0+1+0/qp_14030/
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: status: local 1/10 remote 0/20
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: end msg 13096002
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: delivery 2: success: did_1+0+2/
Dec 08 09:10:19 argos.indimail.org qmta-send[1197]: status: local 0/10 remote 0/20
As you can see above that qmta-send is very easy to setup and consumes very little resource (3.5M in this case). In the above case, /usr/sbin/MTAlspawn and /usr/sbin/MTArspawn are in fact qmta-send processes with exactly the same code as qmail-lspawn(8) and qmail-rspawn(8). The only external process in the above case is the splogger command running with pid 258422. In future versions, I might make splogger too an internal process and eliminate the requirement of a separate binary. My ultimate goal for qmta-send(8)](https://github.com/indimail/indimail-mta/wiki/qmta-send.8) is to subsume qmail-local(8) and qmail-remote(8) too.
Just like for indimail-mini installation, If you want to setup a SMTP service, you can setup mini-smtpd service. In case you setup SMTP service, you may want to handle tasks is dkim, virus and spam filtering. You can use QHPSI along with a virus scanner like clamav. You can also choose not to have these tasks done at the client end, but rather have it carried out by the QMQP service. For virus scanning refer to chapter Virus Scanning using QHPSI. You can set QMAILQUEUE to qmail-multi(8), qmail-dkim(8), etc. However, you must remember to have qmail-qmqpc(8) called at the end in case you change QMAILQUEUE to something other than qmail-qmqpc(8). If you need to setup mini-smtpd(8), here can be an option
sudo /usr/sbin/svctool --smtp=25 --servicedir=/service --skipsend --no-multi \
--qmailqueue=/usr/sbin/qmail-qmqpc --qmailsmtpd=/usr/sbin/mini-smtpd \
--cntrldir=control --localip=0 --maxdaemons=20 --maxperip=5 \
--memory=104857600 --min-free=52428800 \
--rbl=-rzen.spamhaus.org --rbl=-rdnsbl-1.uceprotect.net
If you are doing a source installation then you need to manually copy few binaries and few shared libraries. Here's what you do need if you want to setup from a source installation.
-
The following binaries are required in the path sendmail(1) qmail-inject(8) irmail(8) forward(1) predate(1) datemail(1) mailsubj(1) qmail-showctl(8) qmaildirmake(1) maildir2mbox(1) maildirwatch(1) srsfilter(1) queue-fix(8) qmail-qmqpc(8) qmail-direct(8) qmta-send(8) qmail-lspawn(8) qmail-local(8) qmail-rspawn(8) qmail-remote(8) qmail-clean(8) qmail-tcpok(8) qmail-tcpto(8) mini-smtpd(8)
-
shared libs that the above binaries reference (libsrs2, libqmail). You can use the ldd command (or otool -L command on OSX) (for source installation only)
-
symbolic links to /usr/bin/sendmail from /usr/sbin/sendmail and /usr/lib/sendmail (for source installation only);
-
a list of IP addresses of QMQP servers, one per line, in /etc/indimail/control/qmqpservers;
-
a copy of /etc/indimail/control/me, /etc/indimail/control/defaultdomain, and /etc/indimail/control/plusdomain from your central server, so that qmail-inject(8) uses appropriate host names in outgoing mail; and
-
this host's name in /etc/indimail/control/idhost, so that qmail-inject(8) generates Message-ID without any risk of collision. Everything can be shared across hosts except for /etc/indimail/control/idhost.
-
Following groups in /etc/group (for source installation only). You can add them by running the command
groupadd group_name
. Here group_name are listed below. indimail nofiles qmail qscand -
Following users in /etc/passwd (for source installation only). indimail alias qmaill qmailq qmailr qmails qscand
You can add them by running the following command
# useradd -r -g indimail -d /var/indimail indimail # useradd -M -g nofiles -d /var/indimail/alias -s /sbin/nologin alias # useradd -M -g nofiles -d /var/indimail -s /sbin/nologin qmaill # useradd -M -g qmail -d /var/indimail -s /sbin/nologin qmailq # useradd -M -g qmail -d /var/indimail -s /sbin/nologin qmailr # useradd -M -g qmail -d /var/indimail -s /sbin/nologin qmails # useradd -M -g qscand -d /var/indimail/qscanq -G qmail,qscand -s /sbin/nologin qscand
-
Setup QMAILQUEUE environment variable to have qmail-qmqpc(8) called instead of qmail-queue(8) when any client injects mails in the queue (for source installation only).
# mkdir -p /etc/indimail/control/defaultqueue # cd /etc/indimail/control/defaultqueue # echo qmail-queue > QMAILQUEUE
-
Create a single queue for qmta-send (for source installation only).
# mkdir -p /var/indimail/queue # queue-fix /var/indimail/queue/qmta # cd /etc/indimail/control/defaultqueue # echo /var/indimail/queue/qmta > QUEUEDIR
-
Run qmta-send
- To run as a daemon run
qmta-send -d
. You can put this command in your system rc script. - To run as and when needed run
qmta-send
. You can call this command using cron or a script. - If you have installed the qmta RPM/debian package, this will be already setup for you in systemd. Else you can copy qmta-send.service to systemd unit directory.
# copy systemd unit file qmta-send.service $ sudo cp qmta-send /usr/lib/systemd/system # enable qmta-send service $ sudo systemctl enable qmta-send Created symlink /etc/systemd/system/multi-user.target.wants/qmta-send.service → /usr/lib/systemd/system/qmta-send.service. # start qmta-send service $ sudo systemctl start qmta-send # check processes using the humble ps command $ ps -ef | grep qmta-send | grep -v grep qmailq 39977 1 0 22:53 ? 00:00:00 /usr/sbin/qmta-send -d ./Maildir/ splogger qmta-send qmaill 39978 39977 0 22:53 ? 00:00:00 splogger qmta-send root 39979 39977 0 22:53 ? 00:00:00 /usr/sbin/MTAlspawn -d ./Maildir/ splogger qmta-send qmailr 39980 39977 0 22:53 ? 00:00:00 /usr/sbin/MTArspawn -d ./Maildir/ splogger qmta-send # check processes using the mighty systemctl command $ sysemctl status qmta-send ● qmta-send.service - qmta Mail Transport Agent Loaded: loaded (/usr/lib/systemd/system/qmta-send.service; enabled; vendor preset: disabled) Active: active (running) since Tue 2021-07-06 22:53:32 IST; 7s ago Main PID: 39977 (qmta-send) Tasks: 4 (limit: 9421) Memory: 3.5M CGroup: /system.slice/qmta-send.service ├─39977 /usr/sbin/qmta-send -d ./Maildir/ splogger qmta-send ├─39978 splogger qmta-send ├─39979 /usr/sbin/MTAlspawn -d ./Maildir/ splogger qmta-send └─39980 /usr/sbin/MTArspawn -d ./Maildir/ splogger qmta-send Jul 06 22:53:32 argos.indimail.org systemd[1]: Started qmta Mail Transport Agent. Jul 06 22:53:32 argos.indimail.org qmta-send[39978]: 1625592212.411851 status: local 0/10 remote 0/20
- To run as a daemon run
-
All manual pages for the above binaries (not a hard requirement but good for future reference).
Note that users can still use all the qmail-inject(8) environment variables to control the appearance of their outgoing messages. Also you can setup environment variables in $HOME/.defaultqueue apart from /etc/indimail/control/defaultqueue.
Sometimes two or more package exist that serve the same purpose. The alternatives system provides a mechanism for selecting an active default application from several valid alternatives. You can use the alternatives system to configure as an alternative MTA for your system. Using alternatives, you don't have to create the links to /usr/bin/sendmail manually as instructed above.
$ sudo /usr/sbin/alternatives --install \
/usr/sbin/sendmail mta /usr/bin/sendmail 120 \
--slave /usr/share/man/man8/sendmail.8.gz mta-sendmailman \
/usr/share/man/man8/qmail-inject.8.gz \
--slave /usr/lib/sendmail mta-sendmail \
/usr/bin/sendmail
/usr/sbin/alternatives --set mta /usr/bin/sendmail
NOTE: archlinux doesn't have the alternatives command.
IndiMail provides a handle post successful operation of few programs. A post execution handle is a program with the same name as that of the calling program but in the directory /usr/libexec/indimail. On successful completion, such programs will execute the handle program and return the status of the called handle program.
In my experience of setting up mail servers in the corporate world, often it is required that users be added to external databases which could be part of some strange enterprise applications. It could be as simple as adding users to your ldap server when creating a mailbox on IndiMail. Sometimes it could be as bad as adding users to ADS (ugh).
IndiMail (release 1.6.9 onwards) provides you a hook, to execute any program after successful completion of the programs, vadddomain(1), vaddaliasdomain(1), vdeldomain(1), vadduser(1), vdeluser(1), vrenamedomain(1), vrenameuser(1), vmoveuserdir(1), and vpasswd(1).
A hook can be defined by creating a script or an executable in /usr/libexec/indimail with the name of the program being executed. e.g. if you create a script named vadduser in the directory /usr/libexec/indimail, the script will get executed whenever the program vadduser is used to add a user to indimail. The execution happens only if the program completes successfully. Depending on what you need to do, you can customize the scripts in a jiffy.
The hook script name can be overridden by setting the POST_HANDLE environment variable. See the man pages of vadddomain(1), vaddaliasdomain(1), vdeldomain(1), vadduser(1), vmoduser(1), vmoveuserdir(1), vdeluser(1), vrenamedomain(1), vrenameuser(1), vpasswd(1) for more details.
Let me know if you create an interesting script.
Example of using a handle can be demonstrated when adding a user, vuserinfo is also run automatically
$ cat /usr/libexec/indimail/vadduser
exec /usr/bin/vuserinfo $1
because of the above, this is what happens when you add a user
$ sudo /usr/bin/vadduser [email protected]
New IndiMail password for [email protected]:
Retype new IndiMail password:
name : [email protected]
passwd : $1$awb5a5oV$/3rsmlKSu.wzwIFhBzMf7/ (MD5)
uid : 1
gid : 0
-all services available
gecos : test05
dir : /home/mail/T2Zsym/example.com/test05 (missing)
quota : 5242880 [5.00 Mb]
curr quota : 0S,0C
Mail Store IP : 192.168.1.100 (Clustered - local)
Mail Store ID : 1000
Sql Database : 192.168.1.100:indimail:abcdefgh
Table Name : indimail
Relay Allowed : NO
Days inact : 0 days 00 Hrs 00 Mins 00 Secs
Added On : ( 127.0.0.1) Sat Apr 24 19:49:06 2010
last auth : Not yet logged in
last IMAP : Not yet logged in
last POP3 : Not yet logged in
PassChange : Not yet Changed
Inact Date : Not yet Inactivated
Activ Date : ( 127.0.0.1) Sat Apr 24 19:49:06 2010
Delivery Time : No Mails Delivered yet / Per Day Limit not configured
I personally use post execution handle for adding some mandatory users every time I add a new domain. So this is what my vadddomain handle looks like
$ cat /usr/libexec/indimail/vadddomain
/usr/bin/vdominfo $1
/usr/bin/valias -i '®ister-spam' register-spam@$1
/usr/bin/valias -i '®ister-ham' register-ham@$1
/usr/bin/valias -i '&spam' spam@$1
/usr/bin/valias -i '&ham' ham@$1
/usr/bin/vadduser -e prefilt@$1 xxxxxxxx
/usr/bin/vadduser -e postfilt@$1 xxxxxxxx
/usr/bin/vcfilter -i -t spamFilter -c "Starts with" -k "Yes, spamicity=" -f Spam -b 0 -h "X-Bogosity" prefilt@$1
/bin/ls -dl /var/indimail/domains/$1
/bin/ls -al /var/indimail/domains/$1
exit 0
IndiMail provides you authenticated SMTP providing AUTH PLAIN, AUTH LOGIN, AUTH XOAUTH2, AUTH CRAM-MD5, CRAM-SHA1, CRAM-SHA224, CRAM-SHA256, CRAM-SHA384, CRAM-SHA512, CRAM-RIPEMD, DIGEST_MD5, SCRAM-SHA-1, SCRAM-SHA-256, SCRAM-SHA-1-PLUS, SCRAM-SHA-256-PLUS methods.
The most common practice to offer authentication is where the passwords are one-way hash and stored in a database. The UNIX passwd program is one such program that encrypts the user supplied password and stores it in the system's database (e.g. /etc/shadow). The passwd uses the crypt library function to encrypt passwords and it is the same function that IndiMail uses. IndiMail has the programs vpasswd(1) and vmoduser(1) that sets the encrypted password for a user in IndiMail's MySQL database. The vadduser(1) program too sets encrypted password using crypt(3). The original clear text passwords are not stored. If this database is stolen, the thief has possession of encrypted passwords which cannot be used for authentication. Authentication of a password is verified by encrypting the password and matching it with the value stored in the database. But this method requires the client to exchange the clear text password with the server. The LOGIN and PLAIN authentication methods require clients to exchange clear text passwords. The server receives the clear text password and then encrypts it to see if it matches with what is stored in the local database. This exchange of clear text passwords can be a concern on an un-encrypted connections. If you encrypt the session using TLS, this concern can be addressed. You can enable SECURE_AUTH in qmail-smtpd(8) and qmail-remote(8) to disallow LOGIN and PLAIN authentication when using un-encrypted connections. For example, you can do this for the SMTP submission port as below
$ sudo sh -c "echo 1 > /service/qmail-smtpd.587/variables/SECURE_AUTH"
To set this one-way hash encrypted passwords is simple. For example, use the vpasswd program to set the password for the user manny as supersecret
$ sudo vpasswd [email protected] supersecret
name : [email protected]
passwd : $5$edYmuYDig/cqixyh$0HWa5eEOn2MH2TuLfy51YsRPkcuEFWbRPqGs6m3/uS0 (SHA256)
uid : 1
gid : 0
-all services available
gecos : manny
dir : /home/mail/L2P/example.com/manny
quota : 524288000 [500.00 MiB]
curr quota : 0S,0C
Mail Store IP : 192.168.2.107 (Clustered - local
Mail Store ID : 100
Sql Database : 192.168.2.107:indimail:abcdefgh:3306:ssl
TCP/IP Port : 3306
Use SSL : Yes
SSL Cipher : TLS_AES_256_GCM_SHA384
Table Name : indimail
Relay Allowed : NO
Days inact : 0 days 10 Hrs 18 Mins 43 Secs
Added On : (127.0.0.1) Tue Jul 2 09:33:55 2019
last auth : (127.0.0.1) Sat Aug 27 11:07:24 2022
last POP3 : Not yet logged in
last IMAP : (127.0.0.1) Sat Aug 27 11:07:24 2022
PassChange : (127.0.0.1) Sat Aug 27 21:26:05 2022
Inact Date : Not yet Inactivated
Activ Date : (127.0.0.1) Tue Jul 2 09:33:55 2019
Delivery Time : No Mails Delivered yet / Per Day Limit not configured
If you notice the passwd field above, you will see the string $5$edYmuYDig/cqixyh$0HWa5eEOn2MH2TuLfy51YsRPkcuEFWbRPqGs6m3/uS0
. This is actually an encrypted password with the salt as edYmuYDig/cqixyh
and the encrypted value as 0HWa5eEOn2MH2TuLfy51YsRPkcuEFWbRPqGs6m3/uS0
. You can use the system crypt(3) function to encrypt the passphrase supersecret
using edYmuYDig/cqixyh
as the salt, you will always get the result $5$edYmuYDig/cqixyh$0HWa5eEOn2MH2TuLfy51YsRPkcuEFWbRPqGs6m3/uS0
. As an example, you can use the incrypt
program to verify this
$ incrypt -S 'edYmuYDig/cqixyh' supersecret
"$5$edYmuYDig/cqixyh$0HWa5eEOn2MH2TuLfy51YsRPkcuEFWbRPqGs6m3/uS0"
The other thing to notice in the password field is that it starts with $5$
. This is a SHA256 hashed password. If it is $6$
, it would have been a SHA512 hashed password, $1$
it would have been a MD5 hashed password. See crypt(5) for more details. You can use the -h argument to vpasswd to set a specific hash method (MD5, SHA256 or SHA512). With so much computing power available today, one shouldn't use any hash below SHA256.
In my opinion, using this scheme with TLS enabled connection is the most secure way to setup authentication. Your database is safe and by using TLS, you are safeguarded from MITM and credentials getting leaked by sniffing attacks.
XOAUTH2 is similar to LOGIN and PLAIN authentication. The idea behind XOAUTH2 is like this. You create your own private database and store tokens for your users. Since this database is private, these tokens do not give you wide access to resources. Hence risk gets limited in case the token is compromised. indimail-mta has qmail-smtpd and qmail-remote supporting XOAUTH2. At the moment, XOAUTH2 support in qmail-smtpd uses the system passwd database for authentication. In future, a small checkpassword compatible program to authenticate against a private database will be developed. When client issues XOAUTH2 authentication, the private database will be checked instead of the system passwd database. With XOAUTH2 you will be exchanging tokens in the clear text, just like the PLAIN and LOGIN methods.
The other method is to store passwords in clear text in the local database and setup any of the CRAM authentication methods explained later. When you setup CRAM, clear text passords are no long exchanged between the client and the server. Instead a server geneates a challenge. The client then responds with a response which can be correct only when the client has the knowledge of the user's password. So instead of exchanging clear text passwords, the client and the server exchange a challenge and a response to the challenge. This avoids the risk of sniffing the clear text password on the network. But this opens a huge risk of having each and every user's original password in the database. Someone steals the database, every user on the system gets compromised. My advice would be to stay away from all CRAM methods that require you to store the original password in the local database. The next chapter discusses this dangerous mechanism.
qmail-smtpd(8) and qmail-remote(8) also support various challange response (also known as CRAM) authenticaiton mechanisms. These methods have one side (the server) issue a challenge and the other side (client) respond with an answer. What is exchanged between the client and the server are the challenge and response. Passwords are not exchanged on the network, thus safeguarding you against sniffing and eavesdropping attacks. Though this method makes authentication safe even in a un-encrypted channel, the downside is that the both server and client need to know the clear text passwords. So for the CRAM authentication to work, the server requires the clear text passwords to be stored in the database. The huge security risk of using CRAM is safeguarding your database containing user's passwords. If the database is stolen, the thief walks away with all the passwords. If you are still ok after reading this, there are two ways you can setup CRAM authentication.
-
Use the -e argument to vpasswd(1), vmoduser(1) when changing password, or use the -e argument to vadddomain(1), vadduser(1) when adding the postmaster user or any user and setting the environment variable ENABLE_CRAM. If you store the clear text password in the pw_passwd field, LOGIN and PLAIN methods cannot be used.
-
Use the -C and -m arguments to vpasswd(1), vmoduser(1) when changing password, or use the -C and -m arguments to vadddomain(1), vadduser(1) when adding the postmaster user or any user. This method allows LOGIN, PLAIN, XOAUTH2 methods to work along with the CRAM authentication methods. Setting ENABLE_CRAM is not required.
Method 1 -------- $ sudo sh -c "echo 1 > /service/qmail-smtpd.587/variables/ENABLE_CRAM" $ sudo vpasswd -e [email protected] supersecret name : [email protected] passwd : supersecret (DES) uid : 1 gid : 0 -all services available gecos : manny dir : /home/mail/L2P/example.com/manny quota : 524288000 [500.00 MiB] curr quota : 0S,0C Mail Store IP : 192.168.2.107 (Clustered - local Mail Store ID : 100 Sql Database : 192.168.2.107:indimail:abcdefgh:3306:ssl TCP/IP Port : 3306 Use SSL : Yes SSL Cipher : TLS_AES_256_GCM_SHA384 Table Name : indimail Relay Allowed : NO Days inact : 0 days 10 Hrs 35 Mins 46 Secs Added On : (127.0.0.1) Tue Jul 2 09:33:55 2019 last auth : (127.0.0.1) Sat Aug 27 11:07:24 2022 last POP3 : Not yet logged in last IMAP : (127.0.0.1) Sat Aug 27 11:07:24 2022 PassChange : (127.0.0.1) Sat Aug 27 21:43:10 2022 Inact Date : Not yet Inactivated Activ Date : (127.0.0.1) Tue Jul 2 09:33:55 2019 Delivery Time : No Mails Delivered yet / Per Day Limit not configured Method 2 -------- $ sudo vpasswd -C [email protected] supersecret name : [email protected] passwd : {CRAM}pass3,$5$fbazeA/UC3RmSK15$V/GiMhfTuhRz1aUJv8QQvFt1qmFZrKgfw/4lK7d5KW0 (un-encrypted) uid : 1 gid : 0 -all services available gecos : manny dir : /home/mail/L2P/example.com/manny quota : 524288000 [500.00] MiB curr quota : 0S,0C Mail Store IP : 192.168.2.107 (Clustered - local Mail Store ID : 100 Sql Database : 192.168.2.107:indimail:abcdefgh:3306:ssl TCP/IP Port : 3306 Use SSL : Yes SSL Cipher : TLS_AES_256_GCM_SHA384 Table Name : indimail Relay Allowed : NO Days inact : 0 days 10 Hrs 35 Mins 46 Secs Added On : (127.0.0.1) Tue Jul 2 09:33:55 2019 last auth : (127.0.0.1) Sat Aug 27 11:07:24 2022 last POP3 : Not yet logged in last IMAP : (127.0.0.1) Sat Aug 27 11:07:24 2022 PassChange : (127.0.0.1) Sat Aug 27 21:43:10 2022 Inact Date : Not yet Inactivated Activ Date : (127.0.0.1) Tue Jul 2 09:33:55 2019 Delivery Time : No Mails Delivered yet / Per Day Limit not configured
There are many authentication methods in the CRAM family. IndiMail supports CRAM-MD5, CRAM-SHA1, CRAM-SHA224, CRAM-SHA256, CRAM-SHA384, CRAM-SHA512, CRAM-RIPEMD, DIGEST-MD5. CRAM-Md5 uses HMAC-MD5 hash based message authentication code. CRAM-SHA1 uses HMAC-SHA1. CRAM-SHA224 uses HMAC-SHA224. See this for more details.
Apart from the security issue of having the plain text passwords in the database, LOGIN, PLAIN, XOAUTH2 authentication will not work with clear text passwords in the database. A workaround for this issue is to store encrypted passwords in the database and set the environment variable ENABLE_CRAM and have the clients supply the encrypted password to the server as the password. But if you enable this and your database with encrypted passwords gets stolen, the attacker can use the encrypted password to successfully authenticate using the CRAM authentication methods.
Please think twice about setting ENABLE_CRAM environment variable or enabling clear text passwords using the -e option to vpasswd(1) program. I prefer using the LOGIN or PLAIN methods over an encrypted channel and disabling the CRAM authentication methods. Another option is to use the Salted Challenge Response Authentication Mechanisms explained below.
From RFC-5802
The secure authentication mechanism most widely deployed and used by Internet application protocols is the transmission of clear-text passwords over a channel protected by Transport Layer Security (TLS). There are some significant security concerns with that mechanism, which could be addressed by the use of a challenge response authentication mechanism protected by TLS. Unfortunately, the challenge response mechanisms presently on the standards track all fail to meet requirements necessary for widespread deployment, and have had success only in limited use.
SCRAM provides the following protocol features
The authentication information stored in the authentication database is not sufficient by itself to impersonate the client. The information is salted to prevent a pre-stored dictionary attack if the database is stolen.
- The server does not gain the ability to impersonate the client to other servers (with an exception for server-authorized proxies).
- The mechanism permits the use of a server-authorized proxy without requiring that proxy to have super-user rights with the back-end server.
- Mutual authentication is supported, but only the client is named (i.e., the server has no name).
- When used as a SASL mechanism, SCRAM is capable of transporting authorization identities (see [RFC4422], Section 2) from the client to the server.
The SCRAM method also allows the server to advertise channel binding. Channel Binding allows the server to enforce TLS and safeguard the connection from main-in-the-middle-attack. IndiMail supports the tls-unique channel binding for TLS1.2 and tls-exporter channel binding for TLS1.3 and above. When the server supports channel binding, it advertises
IndiMail supports SCRAM-SHA-1 and SCRAM-SHA-256 SCRAM authentication methods. qmail-smtpd(8) advertises these methods to an EHLO response. qmail-remote(8) issues the EHLO command to get the capability of the remote server. Both qmail-smtpd(8) and qmail-remote(8) support channel binding too. Hence qmail-smtpd(8) advertises SCRAM-SHA-1-PLUS and SCRAM-SHA-256-PLUS authentication methods. Similarly qmail-remote(8) uses tls-unique or the tls-exporter channel binding when the remote supports SCRAM-SHA*-PLUS methods. You can use the vpasswd(1) (or vmoduser(1) program to set passwords enabled for SCRAM authentication. For example, the below password will allow AUTH, LOGIN, PLAIN, XOAUTH2 and all SCRAM methods to work.
sudo vpasswd -m SCRAM-SHA-256 [email protected] supersecret
name : [email protected]
passwd : {SCRAM-SHA-256}4096,HWvKDMG1R9hSSt/e,thk3p9gV604V9A2chgmW/ovPgucUtFRhHJgfeWi2pJ4=,IvIc99nIBYdKFqW+ZTz1Ioz5nIxWXJDegzPlkq41tic=,$5$7.Jwtq6QiQaLsguq$RXUJkrI5PUhtqGa4jKGbLPZaLmJiGdpqXhe68qtqyE/ (SCRAM-SHA-256)
uid : 1
gid : 0
-all services available
gecos : manny
dir : /home/mail/L2P/example.com/manny
quota : 524288000 [500.00 MiB]
curr quota : 0S,0C
Mail Store IP : 192.168.2.107 (Clustered - local
Mail Store ID : 100
Sql Database : 192.168.2.107:indimail:abcdefgh:3306:ssl
TCP/IP Port : 3306
Use SSL : Yes
SSL Cipher : TLS_AES_256_GCM_SHA384
Table Name : indimail
Relay Allowed : NO
Days inact : 0 days 10 Hrs 28 Mins 37 Secs
Added On : (127.0.0.1) Tue Jul 2 09:33:55 2019
last auth : (127.0.0.1) Sat Aug 27 11:07:24 2022
last POP3 : Not yet logged in
last IMAP : (127.0.0.1) Sat Aug 27 11:07:24 2022
PassChange : (127.0.0.1) Sat Aug 27 21:36:01 2022
Inact Date : Not yet Inactivated
Activ Date : (127.0.0.1) Tue Jul 2 09:33:55 2019
Delivery Time : No Mails Delivered yet / Per Day Limit not configured
If you carefully notice the passwd field, you will see the password starting with {SCRAM-SHA-256}. The iteration count is 4096. This is the iteration used by the algorithm. The salt is HWvKDMG1R9hSSt/e
, the stored key is thk3p9gV604V9A2chgmW/ovPgucUtFRhHJgfeWi2pJ4=
, the server key is IvIc99nIBYdKFqW+ZTz1Ioz5nIxWXJDegzPlkq41tic=
and finally the salted password that will be used for AUTH LOGIN, AUTH PLAIN AUTH XOAUTH2 is $5$7.Jwtq6QiQaLsguq$RXUJkrI5PUhtqGa4jKGbLPZaLmJiGdpqXhe68qtqyE/
. When using SCRAM, the stored key and the server key is all that the server requires to verify if the client's response to the challenge is correct or not.
To additionally allow CRAM methods, use the -C argument to vpasswd(1) (or vmoduser(1). Now look carefull at the password field by doing vuserinfo.
sudo vpasswd -C -m SCRAM-SHA-256 [email protected] supersecret
name : [email protected]
passwd : {SCRAM-SHA-256}4096,fIne4ExD9h3vufYZ,k9LD3a/7yk3u7o5tVPTRR4IYHqgd7khpwbKLzvNGnos=,LCuD6/yMc5cjmCMrBAj+es27icwu5eoI5Drqmh4P+mQ=:a8bac1a24c7aa2725630c9ab6813a631b366c79c6bc959bf344d3af8e685a375:supersecret,$5$j59A2PxyHYy5q5OE$wzif22gTmb3SPhbtQN6Z9jzvNB5JA54He8pN.midpu7 (SCRAM-SHA-256)
uid : 1
gid : 0
-all services available
gecos : manny
dir : /home/mail/L2P/example.com/manny
quota : 524288000 [500.00 MiB]
curr quota : 0S,0C
Mail Store IP : 192.168.2.107 (Clustered - local
Mail Store ID : 100
Sql Database : 192.168.2.107:indimail:abcdefgh:3306:ssl
TCP/IP Port : 3306
Use SSL : Yes
SSL Cipher : TLS_AES_256_GCM_SHA384
Table Name : indimail
Relay Allowed : NO
Days inact : 0 days 11 Hrs 30 Mins 59 Secs
Added On : (127.0.0.1) Tue Jul 2 09:33:55 2019
last auth : (127.0.0.1) Sat Aug 27 11:07:24 2022
last POP3 : Not yet logged in
last IMAP : (127.0.0.1) Sat Aug 27 11:07:24 2022
PassChange : (127.0.0.1) Sat Aug 27 22:38:23 2022
Inact Date : Not yet Inactivated
Activ Date : (127.0.0.1) Tue Jul 2 09:33:55 2019
Delivery Time : No Mails Delivered yet / Per Day Limit not configured
You will notice two additional fields - the hex salted password a8bac1a24c7aa2725630c9ab6813a631b366c79c6bc959bf344d3af8e685a375
and the clear text password supersecret
following it (separated by a colon). This kind of password will allow you to use AUTH PLAIN, LOGIN, XOAUTH2 and all CRAM methods and all SCRAM / SCRAM-PLUS methods. When you set passwords using the -m and -C argument to vadddomain(1), vadduser(1), vgroup(1), vpasswd(1), vmoduser(1), CRAM authentication will not require setting of the environment variable ENABLE_CRAM. But the problem with enabling CRAM auth methods is that attackers can get hold of the clear text passwords for all your users in case your database is stolen. Apart from the clear text password, the hex salted password too allows the attacker to impersonate both client and the server. If you use SCRAM authentication, you can disable all CRAM authentication methods and not use the -C argument to vpasswd(1) (or vmoduser(1). This will give you the safety of of having all your passwords encrypted in the database.
Now that we have discussed the various authentication mechanism, let's talk about how to enable it in qmail-smtpd(8). If qmail-smptd(8) is called with the arguments hostname checkprogram subprogram subprogram, it will enable various authentication methods and pass authentication credentials to checkprogram, subprogram to validate authentication credentials. For example, the default installation invokes qmail-smtpd(8) as qmail-smtpd(8) /usr/sbin/sys-checkpwd /usr/sbin/vchkpass. The sys-checkpwd(8) checkprogram validates the user credentials in the system database (/etc/shadow, pam, ldap, etc) and the vchkpass(8) program validates user credentials against indimail's MySQL database. If the user is present in either of the two database and supplies the correct password, the authentication succeeds. Apart from using external programs called as command line arguments to qmail-smptd(8), there is an internal authentication mechanism to validate users using the SCRAM authentication methods. checkprogram are programs that use the checkpassword interface designed by djb. indimail-mta uses a modifed checkpassword interface that supports dovecot's checkpassword authentication and exits when the final subprogram is /bin/false. To enable authentication when using dovecot imap, one needs to set the environment variable NATIVE_PASSWORD.
IndiMail allows you to DISABLE individual authentication mechanism. e.g. the following will disable CRAM-MD5, CRAM-SHA1, CRAM-SHA224, CRAM-SHA256, CRAM-SHA384, CRAM-SHA512, CRAM-RIPEMD, DIGEST-MD5 authentication mechanisms.
$ sudo sh
# cd /service/qmail-smtpd.587/variables
# for i in MD5 SHA1 SHA224 SHA256 SHA384 SHA512
# do
# echo 1 > DISABLE_AUTH_CRAM_$i
# done
# echo 1 > DISABLE_DIGEST_MD5
Once you have enabled authentication methods, you can use tools like swaks(1), gsasl(1) to test the method. Few examples are given below.
# Using plaintext password
$ gsasl --no-cb -d --hostname=argos.indimail.org --x509-ca-file="" -a [email protected] --password supersecret --mechanism SCRAM-SHA-256 --smtp --connect argos:587
# Using hex salted password
$ gsasl --no-cb -d --hostname=argos.indimail.org --x509-ca-file="" -a [email protected] --password a8bac1a24c7aa2725630c9ab6813a631b366c79c6bc959bf344d3af8e685a375 --mechanism SCRAM-SHA-256 --smtp --connect argos:587
# Using channel binding
$ gsasl -d --hostname=argos.indimail.org --x509-ca-file="" -a [email protected] --password supersecret --mechanism SCRAM-SHA-256-PLUS --smtp --connect argos:587
# Using a CRAM method
$ swaks --to [email protected] --server localhost -port 587 --a CRAM-SHA1 -au [email protected] -ap supersecret
NOTES: 1. SCRAM authentication has a design flaw. It doesn't have a mechanism to negotiate the SCRAM variant to use, the iteration count to use. The result of this is that one will be restricted to create users wth passwords supporing just one fixed variant and a fixed iteration count. You can use either SCRAM-SHA-1 or SCRAM-SHA-256 and not both. See https://blog.josefsson.org/2021/06/08/whats-wrong-with-scram/. The other way is to break the unique user+domain combination for indimail table in the MySQL database and store passwords for all variants when you add/modify users. That would make password management having gargantuan complications and prone to password mismatch within the different variants. And what do you do if these armchair RFC writers come up with a new SCRAM variant? Ask the users to change passwords to support the new SCRAM variant? And if you want to put yourself in a soup, imagine few users having a different iteration count!!! 2. Rather than spending effort on implementing SCRAM authentication, it will require much less effort to encrypt the communication channel using SSL/TLS. I don't personally visualize SCRAM to ever get popular. It's too damn bloody complicated.
qmail-remote(8) supports the same authentication mechanism that qmail-smtpd(8) supports. It requires the user credentials to be present in the file /etc/indimail/control/smtproutes or the environment variable SMTPROUTE. The format of this file can be any one of the below forms. You can read in more detail in the qmail-remote(8) man page.
domain:relay username password
domain:relay username password envstr
domain:relay:port username password
domain:relay:port username password envstr
domain:relay:port:penalty:max_tolerance username password
domain:relay:port:penalty:max_tolerance username password envstr
# wildcard entries
:relay:port
:relay:port username password
:relay:port username password envstr
:relay:port:penalty:max_tolerance
:relay:port:penalty:max_tolerance username password
:relay:port:penalty:max_tolerance username password envstr
As an example, let us use the same password for the user manny
that we set above
(
echo "From: [email protected]"
echo "To: [email protected]"
echo "Subject: Test message"
echo "Date: $(date --rfc-email)"
echo
echo "Test message"
) > /tmp/mail.txt
$ ls -l /tmp/mail.txt
-rw-r--r-- 1 mbhangui mbhangui 123 Oct 31 09:55 /tmp/mail.txt
# use plain text password and authenticate using CRAM-MD5
$ env SMTPROUTE='example.com:127.0.0.1:587 [email protected] supersecret' AUTH_SMTP="CRAM-MD5" qmail-remote example.com [email protected] "" 123 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1661621762 qp 126027
# use plain text password and authenticate using CRAM-SHA-256 without channel binding
$ env SMTPROUTE='example.com:127.0.0.1:587 [email protected] supersecret' AUTH_SMTP="SCRAM-SHA-256" qmail-remote example.com [email protected] "" 123 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1661621906 qp 126055
# use plain text password and authenticate using CRAM-SHA-256 with channel binding
$ env SMTPROUTE='example.com:127.0.0.1:587 [email protected] supersecret' AUTH_SMTP="SCRAM-SHA-256-PLUS" qmail-remote example.com [email protected] "" 123 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1667103629 qp 20543
# use hex salted password and authenticate using CRAM-SHA-256 without channel binding
$ env SALTED_PASSWORD=1 SMTPROUTE='example.com:127.0.0.1:587 [email protected] a8bac1a24c7aa2725630c9ab6813a631b366c79c6bc959bf344d3af8e685a375' AUTH_SMTP="SCRAM-SHA-256" qmail-remote example.com [email protected] "" 123 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1667103594 qp 20526
If you are going to use smtproutes file to store user credentials, have the file owned by qmailr and permissions 0600. Instead of using smtproutes you can use the cdb file remote_auth.cdb to store credentials for authenticated smtp. This step involves using the cdb-database(8) program to create remote_auth.cdb from the text file remote_auth.
# demonstrating use of remote_auth.cdb for storing credentials for remote authenticated SMTP
$ cd /etc/indimail/control
$ cat > remote_auth <<EOF
[email protected]:[email protected] a8bac1a24c7aa2725630c9ab6813a631b366c79c6bc959bf344d3af8e685a375:
.
EOF
$ sudo cdb-database remote_auth
$ sudo chown qmailr:root remote_auth remote_auth.cdb
$ sudo chmod 600 remote_auth remote_auth.cdb
$ env SALTED_PASSWORD=1 SMTPROUTE='example.com:127.0.0.1:587 /s' AUTH_SMTP="SCRAM-SHA-256" qmail-remote example.com [email protected] "" 123 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1667151965 qp 136468
There is much more you can do with remote_auth.cdb. Please look at the CONTROL FILES section in the man page for qmail-remote(8).
Here is an another example of doing the same thing as above, but using ctrlenv(8) program to set environment variables based on an address. Here we create a cdb file ctrlenvdemo.cdb for fast lookups using the cdb-database(8) program.
# demonstrating ctrlenv
$ cd /etc/indimail/control
$ cat > ctrlenvdemo <<EOF
[email protected]:SALTED_PASSWORD=1,SMTPROUTE=example.com:127.0.0.1:587 /s,AUTH_SMTP=SCRAM-SHA-256:
.
EOF
$ sudo cdb-database ctrlenvdemo
$ sudo chown qmailr:root ctrlenvdemo ctrlenvdemo.cdb
$ sudo chmod 600 ctrlenvdemo ctrlenvdemo.cdb
$ ctrlenv -f ctrlenvdemo.cdb -a [email protected] qmail-remote example.com [email protected] "" 123 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1667189684 qp 67360
# You need not use the file ctrlenvdemo.cdb. You can directly use the file ctrlenvdemo if you have very few records.
$ ctrlenv -f ctrlenvdemo -a [email protected] qmail-remote example.com [email protected] "" 123 [email protected] </tmp/mail.txt
rFrom: <[email protected]> RCPT: <[email protected]> K127.0.0.1 accepted message - Protocol SMTP.
Remote host said: 250 ok 1667190974 qp 91502
A SMTP server is responsible for accepting mails from a sender and processing it for delivery to one or more recipients. In most situations, for domains which are under your administrative control (native addresses), the SMTP server should accept mails without authentication. However, when a mail is submitted for delivery to domains which are not under your administrative control, you should accept mails only after it satisfies security considerations like having the sender authenticate itself. This is to prevent abuse of external domains using your SMTP server. A SMTP server which accepts mails for external domains without any authentication is called an open relay. The act of accepting mails for external domains for delivery is called relaying.
The default configuration of IndiMail configures the SMTP as a closed system. Hence to be able to send mails to external domains, you need to setup mechanisms for relaying.
There are many methods. Choose any of the below after studying them. I prefer 3 or 4 for security reasons.
- Have Sender's IP addresses in tcp.smtp file.
- Use control file relayclients for IP addresses of clients allowed to relay mail through this host.
- Configure IndiMail to use MySQL relay table (good security). This is implemented as POP3/IMAP before SMTP.
- Use authenticated SMTP (good security).
- For allowing relay to specific domains use control file relaydomains.
- For allowing specific users (native addresses) use control file relaymailfrom.
NOTE: you should use 1 & 2 only if if the host having the sender's IP is under your control and you have good security policies for the host (however ‘what is a good security’ can be very subjective)
Your startup script for the qmail smtp server must use the tcpserver -x file option, similar to this startup line.
env - PATH="/usr/bin" tcpserver -H -R -x /etc/indimail/tcp/tcp.smtp.cdb \
-c 20 -u 555 -g 555 0 smtp /usr/sbin/qmail-smtpd 2>&1
IndiMail uses -x option to tcpserver and hence you need not bother about the above line. You however need to edit /etc/indimail/tcp.smtp and put in lines for all static IP's that you will always want to relay access to.
127.0.0.:allow,RELAYCLIENT=""
::ffff:127.0.0.:allow,RELAYCLIENT=""
::1:allow,RELAYCLIENT=""
10.1.1.:allow,RELAYCLIENT=""
::ffff:10.147.20.102:allow,RELAYCLIENT=""
The above lines will cause RELAYCLIENT environment variable to be set for localhost, all machines on the 10.1.1 class and the IP 10.147.20.102. Having RELAYCLIENT environment variable allows mails to relay through. Remember that any user on hosts on 10.1.1 class will be able to relay mails. You many not want this. The lines having 127.0.0., ::1 will allow any client on the IndiMail host (localhost) to use SMTP and relay mails. You can see some IPv4 addresses prefixed with ::ffff
. ::ffff
is a subnet prefix for IPv4 addresses that are placed inside an IPv6 space. It is the IPv6 prefix for an IPv4 address mapped into IPv6 space. It means that it is an IPv6 socket that is used for IPv4 communication. You need to do this if you are using indimail's ipv6 tcpserver(1). However this prefix shouldn't be used if you are running tcpserver in ipv4 mode (tcpserver -4).
If you modify the tcp.smtp file, you have to rebuild a cdb database tcp.smtp.cdb. To do that, you can run the following command
$ sudo /usr/bin/qmailctl cdb
NOTE: Remember that you are exposed to unrestricted relaying from any of the IP addresses listed in tcp.smtp
IP addresses of clients allowed to relay mail through this host. Each address should be followed by a colon and an (optional) string that should be appended to each incoming recipient address, just as with the RELAYCLIENT environment variable. Nearly always, the optional string should be null. The filename can be overridden by the environment variable RELAYCLIENTS. Addresses in relayclients may be wildcarded (2nd line in the example below):
192.168.0.1:
192.168.1.:
Run the command clearopensmtp(1) command in the cron every 30 Minutes.
By default every time, if anyone uses IndiMail's POP3 or IMAP service and authenticates, the following happens:
- On successful authentication, IMAP/POP3 daemon inserts entry into relay table, inserting email, IP address and timestamp
- If CHECKRELAY environment variable is enabled, SMTP checks the relay table for a entry within minutes specified by the RELAY_CLEAR_MINUTES environment variable. If the entry is there, RELAYCLIENT environment variable is set, which allows relaying. At this point, the SMTP server will allow that IP to relay for 60 Mins (default)
clearopensmtp(1) will clear all IP which have not authenticated in the past RELAY_CLEAR_MINUTES. clearopensmtp(8) should be enabled in cron to run every 30 minutes.
Whenever a user successfully authenticates through SMTP, the RELAYCLIENT environment variable gets set. qmail-smtpd(8) uses the RELAYCLIENT environment variable to allow relaying. Enabling authenticated smtp enables relaying when the user successfully authenticats.
Most of the email clients like thunderbird, evolution, outlook, outlook express have options to use authenticated SMTP. For a tutorial on authenticated SMTP, you can refer to this tutorial
Host and domain names allowed to relay mail through this host. Each address should be followed by a colon and an (optional) string that should be appended to each incoming recipient address, just as with the RELAYCLIENT environment variable. Nearly always, the optional string should be null. Addresses in relaydomains may be wildcarded:
heaven.af.mil:
.heaven.af.mil:
envelope senders (MAIL FROM) listed in this file will be allowed to relay independently of the RELAYCLIENT environment variable. Entries in relaymailfrom can be E-Mail addresses, or just the domain (with the @ sign).
Unlike relaydomains native addresses should be entered. A line in relaymailfrom may be of the form @host, meaning every address at host. relaymailfrom can also be in cdb format. You can use qmail-cdb(8) to convert relaymailfrom to relaymailfrom.cdb. If relaymailfrom.cdb is present, it will be searched first. Examples:
[email protected]
@domain2.com
If you use the control file /etc/indimail/control/relaymailfrom, you should really know what you are doing. Any mail from having a domain component of the address matching any domain in this file, relaying will be allowed without any authentication. You can most probably use this only if you have a closed SMTP server to which access from outside is not possible.
Setting CHECKSENDER environment variable enforces few checks when the domain component of return path address (MAIL FROM), is present in your rcpthosts control file. Setting this to a non-empty value enables for for all domains present in the rcpthosts control file. If you need to enable this only for few domains or a particular domain, have the domain (prefixed by the '@' symbol) in chksenderdomains control file. Refer to setting environment variables on how to set environment variables. This is what happens when you set the CHECKSENDER environment variables.
- The SMTP session will proceed only after some kind of authentication. The authentication method supported are Authenticated SMTP, POP or IMAP before SMTP. This implies that users who don't have an account in /etc/passwd (or MySQL database for indimail virtualdomains), will not be able to send emails with domains present in the rcpthosts control file. You can also force authentication by setting REQUIREAUTH, AUTH_ALL environment variabls or by having the domain (prefixed by '@' symbol) in authdomains control file. However, CHECKSENDER is very different than the other methods. It enforces only your local users to authenticate and can be safely set for your incoming SMTP server. Using other methods for your incoming server (port 25) will basically make your SMTP server rejecting mails for all outside domains (domains not listed in rcpthosts.
- For virtual users (if you are using IndiMail and not just the indimail-mta package), the SMTP session will proceed only if the user is an active user and doesn't have the NO_SMTP flag set by vmoduser(1) program.
- Since authenticaition is now enforced, the SMTP session will be rejected if the user uses a envelope return path address different from the authenticated username. This enforces an ANTISPOOFING check. You can however allow this by setting MASQUERADE environment variable. Since you have enforced authentication, the SMTP log will show log the SMTP transaction along with the authenticated username and if your users are spoofing the envelope return address, the fact will be visible in the logs. So setting MASQUERADE is ok (all other SMTP servers allow any envelope sender address anyways).
You can refer to qmail-smtpd(8) man page for more details.
IndiMail has a feature called CHECKRECIPIENT which allows indimail to check in a SMTP session, if the recipient to whom the mail is being addressed exists. Enabling CHECKRECIPIENT alows qmail-smtpd(8) to reject such users at SMTP rather than later during the actual delivery to the mailbox. Due to spam, in most of the cases, the Return Path will be forged or undeliverable. Hence you will be left with a condition where plenty of bounces will be left on your system, impacting the performance of your messaging system.
CHECKRECIPIENT can also be used to reject mails for inactive users, overquota users and users who do not have the privilege to receive mails. CHECKRECIPIENT can be enabled by setting the environment variable CHECKRECIPIENT to one of the following values
- Reject the user if not present in IndiMail's MySQL database
- Reject the user if not present in IndiMail's MySQL database and not found through recipients extension
- Reject user if not found through recipients extension
The recipients extension has been taken from s/qmail, an excellent modern replacement for qmail.
You can selectively turn on CHECKRECIPIENT for selective domains by including those domains (prefixing the domain with '@' sign) in the control file /etc/indimail/control/chkrcptdomains.
If the environment variable MAX_RCPT_ERRCOUNT is set, qmail-smtpd(8) will reject an email if in a SMTP session, the number of such recipients who do not exist, exceed MAX_RCPT_ERRCOUNT.
To make harvesting of email addresses difficult, CHECKRECIPIENT causes the RCPT TO command to be delayed by 5 seconds for every non-existent recipient.
If you do not have large number of users
$ sudo /bin/bash
# echo 1 > /service/qmail-smtpd.25/variables/CHECKRECIPIENT
# svc -r /service/qmail-smtpd.25
# exit
$
indimail-mta allows you many ways to create addresses that will be served by the MTA. In many cases addresses that you will configure which will not be present in the MySQL database. Such addresses can be aliases, autoresponders, forwards, addresses using .qmail files, addresses in ezmlm lists, local users in /etc/passwd. The recipients extension allows you to create rules or databases to accept such addresses and reject all other non-existent addresses. The recipient extension uses the cotrol file /etc/indimail/control/recipients. This control file contains list of external resources providing acceptable, full-qualified envelope addresses ('RCPT TO: recip@domain') to be used for recipient verification during the SMTP session. The external sources can be either fastforward(1) compliant cdbs including the envelope addresses, where the path to a cdb has to be referenced relative to /etc/indimail directory - or - checkpassword compatible Plugable Address Verfication Modules (PAVM), receiving the envelope address on FD 3 as 'recip@domain\0\0\0' and returning '0' in case of success and '1' in case of failure. The use of a PAVM is indicated with a delimiting '|' and the command and arguments given after '|' will be executed; while a cdb follows a ':', which can be omitted. The list of external sources is consulted line-by-line for each recipient envelope address until the first positive answer, or a final negative response is encountered. Which external source to be queried, depends on the domain part of the recipient envelope address specified on the left side of the recipients file, while the external resource is provided right from the delimiter.
The address's domain part is evaluated in lower-case.
* An entry '@example.com' serves as exact match for the domain address
* An entry 'example.com' is used to match 'example.com' and in addition all subdomain addresses '*.example.com'; provided if present in control/rcpthosts.
* The entry '*' will match all domains for the respective lookup.
* Reversely, domains flagged as '!domain.com' are not queried and all recipients for this domain are accepted.
* Additionally, a '!*' can be used as wildcard for all domains not encountered before in recipients (passthrough).
The control/recipients file is always constructed like domain:cdb
, domain|pam
, or simply cdb
. Few examples are given below
!nocheck.com
@mydomain.com:users/recipients.cdb
example.com|ldap_pam ldapserver host port DN passwd
example.org|/usr/libexec/ezmlm/checkrecipient-ezmlm
*:control/fastforward.cdb
*|ldap_pam otherserver
!*
Here is how the above will work
* The first line allows all addresses for nocheck.com to be accepted without any query.
* The second example will query all address for mydomain.com to be searched in <u>users/recipients.cdb</u>.
* The third example, ldap\_pam will be executed with the arguments following it and the email address written to descriptor 3. If ldap\_pam exits 0, the address will be assumed to exist.
* In the fourth examle, checkrecipient-ezmlm will be executed and the email address written to descripter 3. If checkrecipient-ezmlm exits 0, the address will be assumed to exist. Here, checkrecipient-ezmlm is a module that checks existence of a ezmlm distrubution list.
* In the fifth example, all addresses that do not match the first 3 lines will be searched in <u>control/fastforward.cdb</u>.
* In the sixth example, all addresses that don't match the first 4 lines, ldap\_pam will be executed and the address sent on descriptor 3.
* The last line allows all non-matching addresses to passthrough and get accepted.
A simple scheme would be to have your local domain as the line @localdomain:users/recipients.cdb
in control/recipients. Then add any local users to users/recipients and rebuild the users/recipients.cdb database. To build recipients.cdb you need qmail-cdb(8)
$ sudo qmail-cdb -r
You can use test-recipients to test your addresses in MySQL or through the recipients extension.
# test if [email protected] is present in MySQL database
# This will query the inlookup daemon which requires user
# to have qmaild privileges. Alternatively you can use the
# indimail user provided that FIFO gets created with 0666 file mode
$ sudo bash
# setuidgid -g qmail qmaild test-recipients -s [email protected]
test-recipients: user found in MySQL
# setuidgid -g indimail indimail env FIFO_MODE=0666 test-recipients -s [email protected]
test-recipients: user found in MySQL
# test if [email protected] is allowed by the recipients extension
$ test-recipient -r [email protected]
test-recipient: user found in cdb
Once can use the script make-recipients(8) to create a database for recipients extension.
You can refer to qmail-smtpd(8) man page for more details.
One of the feature that IndiMail adds to qmail-smtpd(8) is accesslist between senders and recipients. Accesslist can be enabled by creating a control file /etc/indimail/control/accesslist. A line in accesslist is of the form
type:sender:recipient
where type is either the word 'from' or 'rcpt'. sender and recipient can be the actual sender, recipient, a wildcard or a regular expression (uses regex(3))
The accesslist happens during SMTP session and mails which get restricted get rejected with permanent 5xx code.
To give some examples
rcpt:[email protected]:[email protected]
rcpt:[email protected]:[email protected]
from:[email protected]:[email protected]
- The above accesslist implies that only the users with email
[email protected]
and[email protected]
can send a mail to the email[email protected]
- The 3rd line implies that all outside mails from the sender
[email protected]
will be rejected at SMTP unless the recipient is[email protected]
IndiMail also provides a program called uacl(1) to test this accesslist. uacl(1) is useful especially when you use wildcards or regular expressions.
An extreme example where you want to restrict the communication between two domains only
$ cat /etc/indimail/control/accesslist
rcpt:*example.com:*@example1.com
from:*@example1.com:*@example.com
$ uacl [email protected] [email protected]
rule no 1: rcpt:*example.com:*@example1.com
matched recipient [[email protected]] with [*@example1.com]
matched sender [[email protected]] with [*example.com] --> access allowed
$
$ uacl [email protected] [email protected]
rule no 1: rcpt:*example.com:*@example1.com
matched recipient [[email protected]] with [*@example1.com]
sender not matched [[email protected]] --> access denied
$
$ uacl [email protected] [email protected]
rule no 2: from:*@example1.com:*@example.com
matched sender [[email protected]] with [*@example1.com]
matched recipient [[email protected]] with [*@example.com] --> access allowed
$
$ uacl [email protected] [email protected]
rule no 2: from:*@example1.com:*@example.com
matched sender [[email protected]] with [*@example1.com]
recipient not matched [[email protected]] --> access denied
$
You can refer to qmail-smtpd(8) man page for more details.
A little known feature of IndiMail allows some of your control files to be in plain text, cdb or in MySQL. These control files include authdomains, badhelo, badext, badmailfrom, badrcptto, blackholedsender, blackholedrcpt, chkrcptdomains, goodrcptto, relaymailfrom and spamignore. If you have quite a large number of entries in any of the above control files, you can expect significant performance gains by having these control files in cdb or MySQL.
The mechanism is quite simple. For example, if you have the control file badmailfrom, qmail-smtpd(8) will use badmailfrom. If you have the file badmailfrom.cdb, qmail-smtpd(8) will first do cdb lookup in badmailfrom.cdb. To create badmailfrom.cdb, you need to run the qmail-cdb(8) command.
$ sudo /usr/bin/qmail-cdb badmailfrom
You can also have your entries in a MySQL table. Let say you have a MySQL server on the server localhost, a database named 'indimail' with user 'indimail' having password 'abcdefgh'. To enable the control file in MySQL you need to create the control file with a .sql extension. The following enables the badmailfrom in MySQL
# echo "localhost:indimail:abcdefgh:indimail:badmailfrom" > badmailfrom.sql
Once you have created a file badmailfrom.sql, qmail-smtpd(8) will connect to the MySQL server on localhost and look for entry in the column 'email' in the table badmailfrom. If this table does not exist, qmail-smtpd(8) will create an empty table using the following SQL create statement
create table badmailfrom (email char(64) NOT NULL, \
timestamp timestamp NOT NULL, primary key (email), \
index timestamp (timestamp))
You can use the MySQL client to insert entries. e.g.
MySQL> insert into badmailfrom (email) \
MYSQL> values ('[email protected]');
If you have all the 3 versions of control files existing, IndiMail will first do a cdb lookup, followed by MySQL lookup and finally look into the plain text control file.
Version 1.7.4 of indiMail and above comes with a utility named qmail-sql(8) which allows you to create the MySQL table and also insert values from command line or convert an existing plain text version to MySQL. The below command will create a file badmailfrom.sql in /etc/indimail/control directory and table named bmf in MySQL
qmail-sql -s localhost -u indimail -p abcdefgh -d indimail -t bmf badmailfrom
Support for control files in MySQL support gets enabled by configuring the control file mysql_lib in /etc/indimail/control directory. This file should contain the full path to the MySQL shared library. e.g. /usr/lib64/mysql/libmysqlclient.so.21.2.30. The command svctool --fixsharedlibs
updates this file. In case you are not using indimail-virtualdomains or do not have MySQL server installed or do not want MySQL to be installed, you can choose to not have the mysql_lib control file.
indimail-mta provides multiple ways authentication methods.
- Using authentication modules.
- Using Name Service Switch Daemon - nssd(8).
- Using Password Authentication Modules (PAM).
- Using a PAM module to use pam-multi(8).
Authentication Modules
There are two categories of these modules. checkpassword based authentication modules and non-checkpassword modules. All of these modules are chain modules, where you can configure multiple modules to be called in a chain. Any application which uses these modules (qmail-smtpd, imapd, pop3d) call the modules in an order configured by the user. If a modules fails, it calls the next module in the chain and so on. Authentication is successful when at least one of the modules in the chain succeeds. This is discussed in detail authentication modules chapter.
Name Service Switch
indimail-mta provides the nssd(8) daemon which implements a Name Service Switch (NSS). This allows the libc/glibc functions getpwnam(3), getpwuid(3), getpwent(3), getspnam(3), getuserpw(3), getgrnam(3), getgrgid(3), getgrent(3) to fetch records from the passwd(5), shadow(5) and the group(5) databases to query IndiMail's MySQL database. This also enables PAM modules which uses these functions to fetch records from IndiMail's MySQL database. nssd(8) is discussed in the the Name Service Switch Daemon - nssd chapter. Apart from allowing auth modules like sys-checkpwd(8), pam-checkpwd(8), authpam(7), authshadow(7) to access MySQL, nssd allows any third-party application to access a MySQL database transparently. See this example to see how you can configure dovecot to use nssd(8) for authentication.
PAM Modules
indimail-mta provides pam-checkpwd(8), a checkpassword compliant module for authenticated SMTP service and authpam(7) for IMAP/POP3 authentication.
PAM Service
indimail-mta provides a configurable PAM service implmented using pam-multi(8). pam-multi can be used by any of the PAM configuration files in /etc/pam.d to authenticate against any database on your local system. pam-multi is discussed in detail in the pam-multi framework chapter. The default indimail setup doesn't use PAM and use authentication modules instead. However the default installation does provide PAM configuration using pam-multi(8) in /etc/pam.d/pam-multi, /etc/pam.d/imap, /etc/pam.d/pop3. You can configure indimail to authenticate using PAM. See this example to see how you can configure dovecot to use pam-multi(8) service for authentication.
indimail uses authentication modules as a default for authentication tasks. indimail-mta provides two categories of authentcation modules - checkpassword and non-checkpassword based modules. To configure authentication you will need to set few environment variables like AUTHMODULE, IMAPMODULE, QUERY_CACHE, etc. Read Setting Environment Variables to learn how to set environment variables.
-
checkpassword based authentication modules are vchkpass(8), ldap-checkpwd(8), pam-checkpwd(8), sys-checkpwd(8). qmail-smtpd(8) can use checkpassword authentication modules. These modules are all part of the indmail-mta package, except for pam-multi which is provided by the indimail-auth package.
-
non-checkpassword based modules are authindi(7), authpam(7), authshadow(7) used by imapd(8) and pop3d(8). authindi(7) is provided by the indimail package while the remaining are part of the indimail-access package.
The vchkpass(8) helps qmail-smtpd(8) and authindi(7) helps imapd,pop3d authenticate against IndiMail's MySQL database for virtual domain users. It can directly connnect to the MySQL database or can use a connection caching/pooling daemon inlookup(8) described in this chapter. For using inlookup daemon, the environment variable QUERY_CACHE needs to be set. Using inlookup can significantly boost performance and reduce time taken to perform authentication.
The ldap-checkpwd(8) module can authenticate against a LDAP server. This module is limited by the options provided by the ldap-checkpwd module.
The sys-checkpwd(8), authshadow(7) modules use libc/glibc functions getpwnam(3), getpwuid(3), getpwent(3), getspnam(3), getuserpw(3), getgrnam(3), getgrgid(3), getgrent(3) to fetch records from the passwd(5), shadow(5) and the group(5) databases. Apart from the configuration options provided by the modules itself, one can also exploit nsswitch.conf to redirect these calls to Name Service Switch Daemon - nssd(8) and use indimail's MySQL database as an alternate database to the local passwd(5), shadow(5) and the group(5) databases. The nssd(8) daemon allows any 3rd-party software that uses the standard libc/glibc functions for authentication to authenticate successfully against IndiMail's MySQL database without changing any code. This makes it trivial to replace indimail's IMAP/POP3 server with any IMAP/POP3 server of your choice.
The pam-checkpwd(8), authpam(7) modules are PAM modules. PAM, or Pluggable Authentication Modules, is a modular approach to authentication. It allows (third party) services to provide an authentication module for their service which can then be used on PAM enabled systems. Services that use PAM for authentication can immediately use these modules without the need for a rebuild. pam-checkpwd(8) is highly configurable and can use any PAM(8) service like the linux PAM configuration in /etc/pam.d/login to authenticate against system users configured by you or your system administrator. authpam(7) can authenticate using the pam service file /etc/pam.d/imap or /etc/pam.d/pop3. authpam(8) can be used by indimail's own imapd/pop3d to authenticate local users.
These authentication modules can be called as a chain of modules belonging to a particular category. For checkpassword based modules, you can have a chain consisting of vchkpass(8), ldap-checkpwd(8), sys-checkpwd(8) to authenticate against indimail's MySQL database, ldap database and the system passwd(5) database. Similary, for non-checkpassword based modules you can have a chain consisting of authindi(7), authshadow(7), authpam(7) to authenticate against indimail's MySQL database, /etc/shadow and PAM. The way the chain gets executed is different for checkpassword based module and non-checkpassword based module. For using these modules, the application just needs to call the first module in the chain. For the checkpassword based modules, the module which gets called is responsible for calling the next authentication module only when authentication fails. If authentication succeeds, it simply needs to exit with non-zero status. For non-checkpassword based module each module calls the next module in succession, regardless of the authentication result (success or failure). When a module succeeds, it sets the environment variable AUTHENTICATED before calling the next module. When a module sees this environment variable, it simply calls the next module in the chain without performing any authentication task. The last module always needs to be imapd(8) for IMAP and pop3d(8) for POP3. This is how the courier-imap authentication module works and is implemented by two programs imaplogin(8) and pop3login(8). So the major difference is that the checkpassword based modules return when the first successful authentication happens, whereas all modules in the chain get called for non-checkpassword based modules used for courier-imap.
To configure SMTP service to use these modules you need to setup AUTHMODULE environment variable. To configure IMAP/POP3 service to use these authentication modules you need to configure IMAPMODULE environment variable. This is how IndiMail uses these modules for authentication for qmail-smtpd(8) on port 465, 587 and courier-imap on ports 110, 143, 993, 995, 4143, 9143, 4110, 9110. For both types of modules, the module gets called by the invocation scripts. Below are examples for SMTP on port 587 and IMAP on port 143.
qmail-smtpd
# qmail-smtpd.587 run script snippet
$ tail -7 /service/qmail-smtpd.587/run
exec /usr/bin/envdir -c variables sh -c "
exec /usr/bin/softlimit -m \$SOFT_MEM -o 1024 \
/usr/bin/tcpserver -v -H -R -l $HOSTNAME \
-x /etc/indimail/tcp/tcp.smtp.cdb \
-c variables/MAXDAEMONS -o -b \$MAXDAEMONS \
-u qmaild -g qmail,indimail \$LOCALIP \$PORT \$RBLCOMMAND \
/usr/lib/indimail/plugins/qmail_smtpd.so $HOSTNAME \$AUTHMODULES /bin/false"
# qmail-smtpd.587 AUTHMODULE environment variable
$ sudo cat /service/qmail-smtpd.587/variables/AUTHMODULE
/usr/sbin/sys-checkpwd /usr/sbin/vchkpass
The environment variable AUTHMODULE="/usr/sbin/sys-checkpwd /usr/sbin/vchkpass" is essentially a chain consisting of sys-checkpwd(8) and vchkpass(8). This makes qmail-smtpd(8) to call the first module in the chain - sys-checkpwd(8). If sys-checkpwd(8) fails to authenticate, it calls vchkpass(8). Effectively this means that qmail-smtpd(8) first tries the system /etc/passwd, /etc/shadow for authentication. If this doesn't succeed, authentication is done against indimail's MySQL database. If bulk of your users are virtual users, it makes better sense to have AUTHMODULE="/usr/sbin/vchkpass /usr/sbin/sys-checkpwd". If you don't have local Maildirs you can just have AUTHMODULE=/usr/sbin/vchkpass.
imapd/pop3d
# qmail-imapd.143 run script snippet
$ tail -11 /service/qmail-imapd.143/run
exec /usr/bin/envdir -c variables sh -c "
IMAPAUTHMODULES=\"\"
for f in \`echo \$IMAPMODULES\`
do
IMAPAUTHMODULES=\"\$IMAPAUTHMODULES /usr/libexec/indimail/imapmodules/\$f\"
done
exec /usr/bin/softlimit -m \$SOFT_MEM -o 1024 \
/usr/bin/tcpserver -v -c variables/MAXDAEMONS -C \$MAXPERIP \
-x /etc/indimail/tcp/tcp.imap.cdb -X \
-o -b \$MAXDAEMONS -H -l $HOSTNAME -R -u indimail -g indimail,qmail \$LOCALIP \$PORT \
/usr/sbin/imaplogin \$IMAPAUTHMODULES /usr/bin/imapd Maildir"
# qmail-imapd.147 AUTHMODULE environment variable
$ sudo cat /service/qmail-imapd.143/variables/IMAPMODULES
authindi authpwd authshadow authpam
Since indimail-mta makes good use of environment variables and authentication methods can be easily adapted to work for any SMTP, IMAP/POP3 service. See this example to see how you can configure dovecot to use vchkpass(8) checkpassword module for authentication.
IndiMail uses MySQL for storing information of virtual domain users. The table indimail stores important user information like password, access permissions, quota and the mailbox path. Most of user related queries have to lookup the indimail table in MySQL.
Rather than making individual connections to MySQL for extracting information from the indimail table, IndiMail programs use the service of the inlookup(8) server. Programs use an API function inquery() to request service. inlookup(8) is a connection pooling server to serve requests for inquery() function. It is implemented over two fifos. One fixed fifo for reading the query and reading the path of a randomly generated fifo. The randomly generated fifo is used for writing the result of the query back. inlookup(8) creates a read FIFO determined by the environment variable INFIFO. If INFIFO is not defined, the default FIFO used is /run/indimail/inlookup/infifo. inlookup(8) then goes into an infinite loop reading this FIFO. If INFIFO is not an absolute path, inlookup(8) uses environment variable INFIFODIR to look for fifo named by INFIFO variable. inlookup(8) can be configured by setting environment variables in /service/inlookup.info/variables.
- inlookup(8) helps in optimizing connection to MySQL(1), by keeping the connections persistent.
- It also maintains the query result in a double link list.
- It uses binary tree algorithm to search the cache before actually sending the query to the database.
- IndiMail clients send requests for MySQL(1) queries to inlookup(8) through the function inquery() using a fifo.
- The inquery() API uses the InLookup service only if the environment variable QUERY_CACHE is set. If this environment variable is not set, the inquery() function makes a direct connecton to MySQL.
- Clients which are currently using inquery are qmail-smtpd(8), proxyimap(8), proxypop3(8) and the authentication modules vchkpass(8) and authindi(7). To use inlookup(8) you just need to set the UERY_CACHE environment variable.
- inlookup(8) service is one of the reasons why IndiMail is able to serve million+ users using commodity hardware.
The program inquerytest(8) simulates all the queries which inlookup(8) supports and can be used as a test/diagnostic tool for submitting queries to inlookup(8). e.g
$ sudo setuidgid -g qmail qmaild mkdir -p /tmp/inquerytest
$ sudo setuidgid -g qmail qmaild env TMPDIR=/tmp/inquerytest FIFO_MODE=0666 inquerytest -v -q 3 -i "" [email protected]
There are various functions to lookup users and groups in a local environment. Traditionally, this is done by using files (e.g. /etc/passwd, /etc/group, etc), but other name services (like the Network Information Service (NIS) and the Domain Name Service (DNS) are popular, and have been hacked into the C library, usually with a fixed search order. The Name Service Switch (NSS) provides a cleaner solution to extend the lookup to other databases. In Unix-like operating systems, the Name Service Switch (NSS) allows Unix configuration databases to be provided by different sources, including local files (e.g. /etc/passwd, /etc/shadow, /etc/group, /etc/hosts), LDAP, and other sources.
nssd(8) provides any MySQL database as an alternate Unix configuration database for the passwd(5), shadow(5) and the group(5) databases through standard libc interfaces, such as getpwnam(3), getpwuid(3), getpwent(3), getspnam(3), getspent(3), getgrnam(3), getgrgid(3) and getgrent(3). These functions are implemented as a shared library in libnss_nssd.so placed in your system lib directory (/usr/lib64 or /usr/lib). The actual implementation of nssd(8) having nssd listen on a UNIX domain socket /run/indimail/pwdlookup/nssd.sock and the libnss_nssd.so library which clients will load through a directive in /etc/nsswitch.conf. Once nsswitch.conf is configured, these functions will connect to the nssd(8) and nssd(8) result back from IndiMail´s MySQL database. One can use any MySQL database by modifying the relevant SQL query string in the nssd(8) configuration file /etc/indimail/etc/nssd.conf. Running nssd(8) allows any program, which uses standard libc interface to access the passwd(5), shadow(5) or the group(5) database, to authenticate against IndiMail's MySQL database. One practical use of nssd(8) is to use dovecot imap server without modifying a single line of code anywhere.
To configure nssd, you require to create a configuration file /etc/indimail/nssd.conf. To use the nssd library, you just need to have nssd
as a provider in /etc/nsswitch.conf. e.g. The below example is from /etc/nsswitch.conf on a Fedora Core 38 workstation. The example below will make getpwnam(3), getpwent(3) connect to nssd if the user is not found in /etc/passwd. It will also make getspnam(3) and getspent(3) connect to nssd when the /etc/shadow doesn't have any record for the user.
passwd: files nssd sss systemd
shadow: files nssd
nssd(8) doesn't provide caching of requests, but along with nssd(8) you can use nscd(8) daemon which provides caching for access of the passwd(5), group(5), databases through standard libc interfaces, such as getpwnam(3), getpwuid(3), getgrnam(3), getgrgid(3). Consult the man pages nscd(8) and nscd(5) to configure nscd(8).
Now let's have some fun with the MySQL database that IndiMail uses. Let us create a user for this demonstration. I'm assumeing we have already created a domain named example.com using the vadddomain(1) program. We will use the vadduser(1) program to add a user named [email protected]
# Create a user named testuser01
$ sudo vadduser [email protected] abcdefgh
name : [email protected]
passwd : $5$Q6JwFGYxvqrm6Xzb$Lr.d1CMxy7j0Y0xFgRY.FgHKy/LDXpA5tFo22ziz6aA (SHA256)
uid : 1
gid : 0
-all services available
gecos : testuser01
dir : /home/mail/T2Zsym/example.com/testuser01
quota : 524288000 [500.00] MiB
curr quota : 0S,0C
Mail Store IP : 192.168.2.127 (NonClustered - local)
Mail Store ID : non-clustered domain
Sql Database : localhost
Unix Socket : /var/run/mysqld/mysqld.sock
Table Name : indimail
Relay Allowed : NO
Days inact : 0 days 00 Hrs 00 Mins 00 Secs
Added On : (127.0.0.1) Fri Jun 9 11:08:27 2023
last auth : Not yet logged in
last IMAP : Not yet logged in
last POP3 : Not yet logged in
PassChange : Not yet Changed
Inact Date : Not yet Inactivated
Activ Date : (127.0.0.1) Fri Jun 9 11:08:27 2023
Delivery Time : No Mails Delivered yet / Per Day Limit not configured
# Get the MySQL table structure for IndiMail's user database
$ mysql --login-path=indimail -s indimail
mysql> desc indimail;
+-----------+-----------+------+-----+-------------------+-----------------------------------------------+
| Field | Type | Null | Key | Default | Extra |
+-----------+-----------+------+-----+-------------------+-----------------------------------------------+
| pw_name | char(40) | NO | PRI | NULL | |
| pw_domain | char(67) | NO | PRI | NULL | |
| pw_passwd | char(128) | NO | | NULL | |
| pw_uid | int | YES | MUL | NULL | |
| pw_gid | int | YES | | NULL | |
| pw_gecos | char(48) | NO | MUL | NULL | |
| pw_dir | char(156) | YES | | NULL | |
| pw_shell | char(30) | YES | | NULL | |
| scram | char(255) | YES | | NULL | |
| timestamp | timestamp | NO | | CURRENT_TIMESTAMP | DEFAULT_GENERATED on update CURRENT_TIMESTAMP |
+-----------+-----------+------+-----+-------------------+-----------------------------------------------+
10 rows in set (0.01 sec)
To fetch user details in a format similar to getpwnam(3) and getspnam(3) all we need are the following two SELECT
queries
mysql> SELECT pw_name,'x',555,555,pw_gecos,pw_dir,pw_shell FROM indimail \
mysql> WHERE pw_name='testuser01' and pw_domain='example.com' LIMIT 1;
+------------+---+-----+-----+------------+------------------------------------------+-----------+
| pw_name | x | 555 | 555 | pw_gecos | pw_dir | pw_shell |
+------------+---+-----+-----+------------+------------------------------------------+-----------+
| testuser01 | x | 555 | 555 | testuser01 | /home/mail/T2Zsym/example.com/testuser01 | 524288000 |
+------------+---+-----+-----+------------+------------------------------------------+-----------+
1 row in set (0.00 sec)
mysql> SELECT pw_name,pw_passwd,'1','0','99999','0','0','-1','0' FROM indimail \
mysql> WHERE pw_name='testuser01'and pw_domain='example.com' LIMIT 1;
+------------+-----------------------------------------------------------------+---+---+-------+---+---+----+---+
| pw_name | pw_passwd | 1 | 0 | 99999 | 0 | 0 | -1 | 0 |
+------------+-----------------------------------------------------------------+---+---+-------+---+---+----+---+
| testuser01 | $5$Q6JwFGYxvqrm6Xzb$Lr.d1CMxy7j0Y0xFgRY.FgHKy/LDXpA5tFo22ziz6aA | 1 | 0 | 99999 | 0 | 0 | -1 | 0 |
+------------+-----------------------------------------------------------------+---+---+-------+---+---+----+---+
With the information above and having the details on how to connect to the MySQL database we can configure nssd by creating /etc/indimail/nssd.conf configuration file. Note that nssd.conf uses %1$s
and %2$s
as placeholders for username and password respectively. getpwnam entry configures the getpwnam(3) libc call to fetch user details from the MySQL database using the correspoinding SELECT query. Read nssd.conf(5) for more details.
getpwnam SELECT pw_name,'x',555,555,pw_gecos,pw_dir,pw_shell \
FROM indimail \
WHERE pw_name='%1$s' and pw_domain='%2$s' \
LIMIT 1
getspnam SELECT pw_name,pw_passwd,'1','0','99999','0','0','-1','0' \
FROM indimail \
WHERE pw_name='%1$s'and pw_domain='%2$s' \
LIMIT 1
getpwent SELECT pw_name,'x',555,555,pw_gecos,pw_dir,pw_shell \
FROM indimail LIMIT 100
getspent SELECT pw_name,pw_passwd,'1','0','99999','0','0','-1','0' \
FROM indimail
host localhost
database indimail
username indimail
password mysql_database_password
socket /run/mysqld/mysqld.sock
pidfile /run/indimail/pwdlookup/nssd.pid
threads 5
timeout -1
facility daemon
priority err
Now that we have created the configuration file for nssd(8), let us configure /etc/nsswitch.conf to for your system to use nssd. This from a Fedora 38 system. Your /etc/nsswitch.conf maybe different, but all you need to do is add nssd
after files
as below.
passwd: files nssd sss systemd
shadow: files nssd
Now let us demonstrate the beauty of nssd by using a simple program which uses getpwent(3) to fetch user details from /etc/passwd database and getspnam(3) which fetches user password from /etc/shadow database.
# Program listing
$ cat try.c
#include <stdio.h>
#include <string.h>
#include <unistd.h>
#include <pwd.h>
#include <errno.h>
#ifdef HAVE_SHADOW_H
#include <shadow.h>
#endif
int
main(int argc, char **argv)
{
struct passwd *pw;
#ifdef HAVE_SHADOW_H
struct spwd *spw;
#endif
if (argc != 2) {
fprintf(stderr, "usage: getuser username\n");
_exit(1);
}
if (!(pw = getpwnam(argv[1]))) {
fprintf(stderr, "%s: No such user\n", argv[1]);
return(1);
}
printf("%s:", pw->pw_name);
#ifdef HAVE_SHADOW_H
if (!(spw = getspnam(argv[1]))) {
fprintf(stderr, "getspnam: %s: %s\n", argv[1], errno ? strerror(errno) : "not found in shadow");
printf("%s:", pw->pw_passwd);
} else
printf("%s:", spw->sp_pwdp);
#else
printf("%s:", pw->pw_passwd);
#endif
#if defined(__FreeBSD__)
printf("%d:%d:%ld:%s:%s:%s:%s:%ld\n", pw->pw_uid, pw->pw_gid, pw->pw_change, pw->pw_class,
pw->pw_gecos, pw->pw_dir, pw->pw_shell, pw->pw_expire);
#else
printf("%d:%d:%s:%s:%s\n", pw->pw_uid, pw->pw_gid, pw->pw_gecos, pw->pw_dir, pw->pw_shell);
#endif
}
# Compile try.c assuming you have /usr/include/shadow.h
$ gcc -DHAVE_SHADOW_H try.c -o try
# Run the program
$ ./try [email protected]
testuser01:$5$Q6JwFGYxvqrm6Xzb$Lr.d1CMxy7j0Y0xFgRY.FgHKy/LDXpA5tFo22ziz6aA:555:555:testuser01:/home/mail/T2Zsym/example.com/testuser01:524288000
And that ends the fun we had making libc functions which have nothing to do with MySQL, fetching records from a MySQL database.
pam-multi(8) is a framework that allows multiple configurable methods for authentication using PAM. pam-multi is a system to handle the authentication tasks of applications (services) on systems which use PAM, against any proprietary database. The system provides a stable general interface, that privilege granting programs (such as pam-checkpwd(8), authpam(7), login(1) and su(1) can defer to, to perform standard authentication tasks. The primary goal of pam-multi(8) was to allow authentication of IMAP/POP3 servers like courier-imap, dovecot against IndiMail(5)'s MySQL database. However, tt can be used for any application which can authenticate using pam(8) to authenticate against any proprietary database that you have. pam-multi(8) supports four methods for password hashing schemes. crypt (DES), MD5, SHA256, SHA512. To use pam-multi(8) for any application (which currently uses PAM), you need to modify the PAM configuration file for that application. Simply put, pam-multi(8) extends an existing pam module to authenticate against any database using any one of the three methods described below. Apart from supporting authentication, pam-multi(8) supports account management like password expiry and account expiry.
-
Using a SQL statement. This is provided by using the -m option to pam-multi(8). Currently only MySQL database is supported. You also need to pass connection parameters using -u, -p, -D, -H and -P options to connect to the MySQL database. When pam-multi(8) is used for authentication, it is expected that the sql_statement will return a row containing the encrypted password for the user. When used for account management, it is expected that the sql_statement will return the expiry date (as a long data type) for the account. The password expiry can be returned along with the account expiry separated by a ',' comma sign. If you are using this, make sure that your pam configuration file in /etc/pam.d is not world readable as it will expose your MySQL database password. In any case do not use a privileged MySQL user in the pam configuration. If is advised to use a MySQL user that has only SELECT privileges for your MySQL database.
-
Using a command. This is provided by using the -c option. pam-multi(8) will use sh -c "command". It is expected that the output of the command will be an encrypted password. When pam-multi(8) is used for account management, it is ex pected that the output of the command will be the expiry date for the account. The password expiry can be returned along with the account expiry separated by a ',' comma sign.
-
Using a shared library. This is currently provided by the shared library iauth.so in /usr/lib/indimail/modules directory. It is expected that the shared library implements a function named iauth() which returns the encrypted password for the user.
char *iauth(char *email, char *service, 0|1, int *size, int *nitems, int debug)
The function iauth() will be passed a username and a token service denoting the name of service. The service argument will be used only for identification purpose. It is expected for the function to return the data. The third argument is either 0 or 1 denoting authentication or account management respectively. size denotes the size of the result returned. nitems denotes the number of items that will be returned. The function should return 0 for successful authentication.
Here are two examples of pam configuration that uses pam-multi(8). You can use them with pam-checkpwd by using the -s option. e.g. pam-checkpwd -s pam-multi(8) will make pam-checkpwd use pam-multi(8) configuration from /etc/pam.d.
file /etc/pam.d/pam-multi
#
# $Id: pam-multi.in,v 1.2 2020-09-29 10:59:57+05:30 Cprogrammer Exp mbhangui $
#
# auth required pam-multi.so argv0 -m [select pw_passwd from indimail where pw_name='%u' and pw_domain='%d'] -u indimail -p abcdefgh -D indimail -H localhost -P 3306 -d
# auth required pam-multi.so argv0 -s /usr/lib/indimail/modules/iauth.so
# account required pam-multi.so argv0 -s /usr/lib/indimail/modules/iauth.so
# add -d argument to debug pam-multi lines
#
auth required pam-multi.so pam-multi -s /usr/lib/indimail/modules/iauth.so
account required pam-multi.so pam-multi -s /usr/lib/indimail/modules/iauth.so
file /etc/pam.d/imap. The file /etc/pam.d/pop3 is identical except that it passes -i pop3 to pam-multi(8) in the auth and account section.
# auth required pam-multi.so argv0 -m [select pw_passwd from indimail where pw_name='%u' and pw_domain='%d'] -u indimail -p abcdefgh -D indimail -H localhost -P 3306 -d
# auth required pam-multi.so argv0 -s /usr/lib/indimail/modules/iauth.so
# account required pam-multi.so argv0 -i imap -s /usr/lib/indimail/modules/iauth.so
# add -d argument to debug pam-multi lines
#
auth required pam-multi.so pam-multi -i imap -s /usr/lib/indimail/modules/iauth.so
account required pam-multi.so pam-multi -i imap -s /usr/lib/indimail/modules/iauth.so
#%PAM-1.0
auth include postlogin
account required pam_nologin.so
# pam_selinux.so close should be the first session rule
session required pam_selinux.so close
session optional pam_console.so
# pam_selinux.so open should only be followed by sessions to be executed in the user context
session required pam_selinux.so open
session optional pam_keyinit.so force revoke
session include postlogin
-session optional pam_ck_connector.so
When mail is delivered to a virtual domain, vdelivermail(8) delivers it to the users home directory. vdelivermail(8) will enter the users Maildir and add up the sizes of all the files in these directories. If the size is greater than the quota set by the vadduser(1) command, the email is bounced back to the sender. The quota for a user can be changed by using the vmoduser(1) command.
For new users when they are created by the vadduser(1) command, the default quota set is determinted by the compile HARD_QUOTA defition set by ./configure --enable-hardquota
option. You can override the the value set at configuration time by setting the environment variable HARD_QUOTA when running the vadduser(1) command. IndiMail uses maildir++ format which uses maildirquotas(7).
IndiMail comes with a program vlimit(1), which allows you to set global limits for your domain. Before using vlimit(1), you need to enable domain limits for a domain using vmoddomain(1).
$ vmoddomain -l 1 example.com
Once you have done the above, you can start using vlimit(1) for the domain example.com
$ vlimit -s example.com
Domain Expiry Date : Never Expires
Password Expiry Date : Never Expires
Max Domain Quota : -1
Max Domain Messages : -1
Default User Quota : -1
Default User Messages: -1
Max Pop Accounts : -1
Max Aliases : -1
Max Forwards : -1
Max Autoresponders : -1
Max Mailinglists : -1
GID Flags:
Flags for non postmaster accounts:
pop account : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
alias : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
forward : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
autoresponder : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist users : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist moderators: ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
domain quota : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
default quota : ALLOW_CREATE ALLOW_MODIFY
Using vlimit(1) you can set various limits or defaults for a domain. One of my favourite use of vlimit(1) is setting default quota for users created in a domain. The default quota compiled in IndiMail is 5Mb which is not good enough for today's users. So if you want to have a default quota of 50 Mb for your users when you add them using the vadduser(1) command -
$ vlimit -q 52428800 example.com
$ vlimit -s example.com
Domain Expiry Date : Never Expires
Password Expiry Date : Never Expires
Max Domain Quota : -1
Max Domain Messages : -1
Default User Quota : 52428800
Default User Messages: -1
Max Pop Accounts : -1
Max Aliases : -1
Max Forwards : -1
Max Autoresponders : -1
Max Mailinglists : -1
GID Flags:
Flags for non postmaster accounts:
pop account : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
alias : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
forward : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
autoresponder : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist users : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist moderators: ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
domain quota : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
default quota : ALLOW_CREATE ALLOW_MODIFY
You can also implement domain level restrictions. To disable POP3 for all users in example.com
$ vlimit -g p example.com
$ vlimit -s example.com
Domain Expiry Date : Never Expires
Password Expiry Date : Never Expires
Max Domain Quota : -1
Max Domain Messages : -1
Default User Quota : 52428800
Default User Messages: -1
Max Pop Accounts : -1
Max Aliases : -1
Max Forwards : -1
Max Autoresponders : -1
Max Mailinglists : -1
GID Flags:
NO_POP
Flags for non postmaster accounts:
pop account : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
alias : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
forward : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
autoresponder : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist users : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
mailinglist moderators: ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
domain quota : ALLOW_CREATE ALLOW_MODIFY ALLOW_DELETE
default quota : ALLOW_CREATE ALLOW_MODIFY
Sender Policy Framework (SPF) is an email authentication method designed to detect forging sender addresses during the delivery of the email. It is text record in DNS which allows to designate permitted senders for mails depending on the domain name. The goal is to disallow sender address forgery. qmail-smtpd(8) checks incoming mails, adds Received-SPF lines and optionally blocks undesired SMTP transactions. The check is performed at the envelope level. SPF allows the receiving mail server to check during mail delivery that a mail claiming to come from a specific domain is submitted by an IP address authorized by that domain's administrators. The list of authorized sending hosts and IP addresses for a domain is published in the DNS records for that domain. You can use dnstxt program to get the published TXT records in DNS. You can use the spfquery(1) program to check if an IP address is permitted to send mails on behalf of a domain. e.g.
$ dnstxt rr.com
v=spf1 ip4:24.30.203.0/24 ip4:24.28.200.0/24 ip4:24.28.204.0/24 ip4:24.30.218.0/24 ip4:75.180.132.0/24 ip4:71.74.56.0/24 ip4:107.14.166.0/24 ip4:107.14.73.0/24 +mx ~all
$ spfquery 24.30.203.1 rr.com [email protected]
result=pass
Received-SPF: pass (localhost: SPF record at rr.com designates 24.30.203.1 as permitted sender)
Indimail's SPF implementation has been adapted from SPF implementation for qmail written by Jana Saout and Christophe Saout. There are 5 configuration file in /etc/indimail/control directory that are used for configuring SPF.
-
spfbehavior Use this to turn on SPF checking. The default value is 0 (off). You can specify a value between 0 and 6:
- 0 Never do SPF lookups, don't create Received-SPF headers
- 1 Only create Received-SPF headers, never block
- 2 Use temporary errors when you have DNS lookup problems
- 3 Reject mails when SPF resolves to fail (deny)
- 4 Reject mails when SPF resolves to softfail
- 5 Reject mails when SPF resolves to neutral
- 6 Reject mails when SPF does not resolve to pass
Values bigger than 3 are strongly discouraged, you probably want to go with 2 or 3.
Important: This setting can be overridden using the environment variable SPFBEHAVIOR, e.g. from tcpserver(1) rules or from the supervise(8) variables directory.
Note: If RELAYCLIENT is set, SPF checks won't run at all.
-
spfrules You can specify a line with local rules. Local rules means: Rules that are executed before the real SPF rules for a domain would fail (fail, softfail, neutral). They are also executed for domains that don't publish SPF entries. It is suggested to add
include:spf.trusted-forwarder.org
You can also add mechanisms to trust known mail servers like backup MX servers, though I suggest that you should at least also use tcprules(1) or envrules (to modify SPFBEHAVIOR).
-
spfguess You can specify a line with guess rules. Guess rules means: Rules that are used if the domain doesn't publish SPF rules. The local spfrules are always executed afterwards. It is suggested to use a/24 mx/24 ptr. This isn't needed but generally gives good results (for spam filters scoring Received-SPF lines). The filename can be overridden by SPFGUESS* environment variable.
-
spfexp You can override the default SPF explanation if you want. The explanation is the line returned to the SMTP sender when a mail is rejected at the SMTP level. You can use macro expansion. If a domain specifies its own explanation it is going to be used instead.
The SMTP answer when rejecting mails will look like:
550 the expanded SPF explanation (#5.7.1)
If you want the macro expansion explained look at the SPF draft. The filename can be overridden by SPFEXP environment variable.
-
spfipv6 You can turn on spf for ipv6 connections by setting to value 1 or 0 to disable. You can override this control file with environment variable USE_SPFIPV6.
SPF macros are supported by qmail-smtpd(8) when doing SPF lookups. SPF macros are a feature of the SPF specification which allow for the creation of dynamic SPF policies. They allow for variables to be included within a policy, which are then evaluated by the receiving MTA and 'filled in' using data from the email being processed, such as the sender address or source IP address.
This enables various advanced SPF processing routines such as conditional lookups, and allows for additional email metadata to influence the decision.
SPF macros are present in the original SPF specification RFC4408, as well as the revised specification RFC7208.
SPF macros are represented by different single characters, surrounded by curly braces ({ }) and prepended by a percent (%) sign, e.g. %{i}. There are currently 8 'core' macros that are supported, as defined in section 7.2 of the RFC. These will be evaluated and expanded by qmail-smtpd(8).
* %{s}: The sender of the received email, e.g. [email protected].
* %{l}: The local part of the sender, e.g. joe.
* %{o}: The domain of the sender, e.g. example.com.
* %{d}: The authoritative domain of the current SPF policy --- usually the sender domain (%{o}), but may also represent other domains when evaluating include: statements.
* %{i}: The source IP address of the message, e.g. 203.0.113.1.
* %{p}: The validated reverse-DNS domain of the source IP, e.g. if example.com IN A is 203.0.113.1 and 1.113.0.203.in-addr.arpa IN PTR is example.com, the validated domain will be example.com.
* %{v}: The static string in-addr or ip6 depending on the protocol version of the source IP --- used to construct macros utilising reverse DNS/PTR record syntax as seen in the .arpa zone.
* %{h}: The domain used in the most recent SMTP HELO or EHLO command, e.g. mail.example.com.
* %{t}: The current time
* %{E}: Error message if any while doing spf lookup
* %{R}: IP adddress of the local host.
* %{S}: The SPF record for the domain of the sender
Hosts which adopt the [Sender Permitted From SPF) convention face a challenge when required to forward mail. If the forwarding host does not change the sender domain, it will fail the SPF test and may not be able to hand the message off to the recipient. The Sender Rewriting Scheme (SRS) is a scheme for bypassing the Sender Policy Framework's (SPF) methods of preventing forged sender addresses. SPF "breaks" email forwarding. SRS is a way to fix it. SRS is a simple way for forwarding MTAs to rewrite the sender address. The original concept was published in draft-mengwong-sender-rewrite and further expanded on in a paper by Shevek. IndiMail's SRS implementation has been adapted from Marcelo Coelho's qmail SRS patch and uses a forked version of the libsrs2 library. The Sender Rewriting Scheme is depicted pictorially below, taken from open-spf.org.
SRS is configured by setting libsrs2 parameters. To configure SRS in IndiMail you need to at the least configure the control files srs_domain and srs_secrets. The various SRS control files are given in the table below. Each control file controls SRS parameter of the same name as the control file. e.g. The control file srs_domain controls the libsrs2 parameter srs_domain. Each control filename can be overridden by corresponding environment variable with capital letters. e.g. The environment variable SRS_DOMAIN overrides the the control file srs_domain.
To support SRS, an MTA needs to do two kind of operations, and needs programs that can do one of the two operations. The SRS operation and the programs from the indimail-mta suite, that support that operation are listed below
- Rewrite the sender address using SRS.
- Rewrite a converted SRS address back to original.
Parameters | Description | Example |
---|---|---|
srs_domain | A domain to use in rewritten addresses. If not set, SRS is disabled. | srs.indimail.org |
srs_secrets | A random string to generate and check SRS addresses. You can specify a list of secrets (one per line). The first secret in the list is used for generating new SRS addresses. All secrets on the list may be used to verify SRS addresses. | b1YI?,uL7f=oH |
srs_maxage | The maximum permitted age of a rewritten address. SRS rewritten addresses expire after a specified number of days. libsrs2 default is 21, but I believe that a week is enougth to get all bounces, so I recommend you to use 7. | 7 |
srs_hashlength | The hash length to generate in a rewritten address. The hash length is a measure of security in the SRS system; longer is more secure. | 4 |
srs_hashmin | The hash length to require when checking an address. If the hash length is increased, there may be SRS addresses from your MTA in the wild which use a shorter hash length. This parameter may be set to permit checking of hashes shorter than srs_hashlength. This parameter must be at most srs_hashlength. | 4 |
srs_separator | The separator to appear immediately after SRS[01] in rewritten addresses. This must be -, + or =. Default value is =. | = |
srs_alwaysrewrite | Skip rcpthosts check and perform SRS rewriting for all forwarding, even when not required. This must be 0 (disabled) or 1 (enabled). Default value is 0 (disabled). | 0 |
Now that we have described the SRS parameters, we can go ahead and configure SRS by following the below steps.
-
Configure srs domain control file
$ cd /etc/indimail/control $ sudo bash # echo srs.domain.tld > srs_domain
-
Configure srs_secrets control file
$ cd /etc/indimail/control $ sudo bash # tr -dc 'A-Za-z0-9!"#$%&'\''()*+,-./:;<=>?@[\]^_`{|}~' \ </dev/urandom | head -c 24 > srs_secrets
-
Configure optional control files / parameters
$ cd /etc/indimail/control $ sudo bash # echo 7 > srs_maxage # echo 4 > srs_hashlength # echo 4 > srs_hashmin # echo = > srs_separator # echo 0 > srs_alwaysrewrite
-
Configure indimail to receive mails for your SRS domain.
$ cd /etc/indimail/control $ sudo bash # echo srs.domain.tld > rcpthosts The below steps are not needed if you use [qmail-smtpd(8)](https://github.com/indimail/indimail-mta/wiki/qmail-smtpd.8). [qmail-smtpd(8)](https://github.com/indimail/indimail-mta/wiki/qmail-smtpd.8) by itself has the ability to decode a SRS address. But you can do the below steps in case you are using mini-smtpd or other methods to receive mails from outside like [ofmipd(8)](https://github.com/indimail/indimail-mta/wiki/ofmipd.8), [qmail-smtpd(8)](https://github.com/indimail/indimail-mta/wiki/qmail-smtpd.8) from qmail, netqmail, notqmail, etc. In such cases you require [srsfilter(1)](https://github.com/indimail/indimail-mta/wiki/srsfilter.1) to decode SRS addresses. But in any case it is good have this if there are any non-SRS compliant programs on your system that will inject emails with the recipient address as a SRS encoded address. $ cd /etc/indimail/control $ sudo bash # echo srs.domain.tld:srs > virtualdomains # cd /var/indimail/alias # echo "|/bin/srsfilter" > .qmail-srs-default # svc -h /service/qmail-send.25
Greylisting is a method of defending email users against spam, by temporarily rejecting any email from a IP/Sender which it does not recognize. As per SMTP, the originating server should retry after a delay. A server implementing greylisting should accept the mail if sufficient time has elapsed. If the mail is from a spammer it will probably not be retried since a spammer goes through thousands of email addresses and typically cannot afford the time delay to retry.
IndiMail 1.6 onwards implements greylisting using qmail-greyd(8) daemon. You additionally need to set the environment variable GREYIP defined for the qmail-smtpd(8) process. The environment variable GREYIP specifies on which IP and port, qmail-greyd(8) is accepting greylisting requests. qmail-smtpd(8) uses UDP to send a triplet (IP+RETURN_PATH+RECIPIENT) to the greylisting server and waits for an answer which tells qmail-smtpd(8) to proceed ahead or to temporarily reject the mail. qmail-greyd(8) also accepts a list of whitelisted IP addresses for which greylisting should not be done.
$ sudo /usr/sbin/svctool --greylist=1999 --servicedir=/service --min-resend-min=2 \
--resend-win-hr=24 --timeout-days=30 --context-file=greylist.context \
--save-interval=5 --whitelist=greylist.whitelist
NOTE: The above service has already been setup for you, if you have done a binary installation of IndiMail/indimail-mta
Assuming you've setup your qmail-smtpd(8) service with tcpserver with the -x option (as in LWQ), you just need to update the cdb file referenced by this -x option. The source for this file is typically /etc/indimail/tcp.smtp. For example,
127.:allow,RELAYCLIENT=""
192.168.:allow,RELAYCLIENT=""
:allow
could become,
127.:allow,RELAYCLIENT=""
192.168.:allow,RELAYCLIENT=""
:allow,GREYIP="127.0.0.1@1999"
If you've setup qmail-greyd(8) on a non-default address (perhaps you're running qmail-greyd(8) on a separate machine), you'll also need to specify the address it's listening on - adjust the above to include GREYIP="192.168.5.5@1999", for example. Finally, don't forget to update the cdb file corresponding to the source file you've just edited. If you have a LWQ setup that's
$ sudo /bin/bash
# /usr/bin/qmailctl cdb
Alternatively (and particularly if you're not using the -x option to tcpserver) you can enable greylisting for all SMTP connections by setting GREYIP environment variable for qmail-smtpd(8) service.
$ sudo /bin/bash
# echo GREYIP=\"127.0.0.1@1999\" > /service/qmail-smtpd.25/variables/GREYIP
IndiMail stores it's virtual user information in MySQL. However, IndiMail can work with virtually any IMAP/POP3 server which has a mechanism to authenticate using checkpassword interface or has PAM, which can use the system's password database for user's home directory. This is because IndiMail provides checkpassword, PAM module and a NSS service, all independent of each other. The beauty of providing checkpassword, PAM module and NSS mechansism, is that you do not have to modify a single line of code anywhere. In this respect, IndiMail is probably the most flexible messaging server available at the moment.
- checkpassword module is vchkpass which is a checkpassword based authentication module. Authentication modules are discussed here.
- PAM module is pam-multi - PAM modules for flexible, configurable authentication methods. This is discussed in detail here.
- NSS is through nssd - providing Name Service Switch. This is discussed in detail here.
Dovecot is an open source IMAP and POP3 server for Linux/UNIX-like systems, written with security primarily in mind. Dovecot is an excellent choice for both small and large installations. It's fast, simple to set up, requires no special administration and it uses very little memory. Though I do not use dovecot, I have heard excellent reviews from users about dovecot. It took me less than 20 minutes to download dovecot today and have it working with IndiMail with all existing mails intact and accessible. So at the moment, my IndiMail installation is working with both courier-imap and dovecot simultaneously (with different IMAP/POP3 ports assigned to courier-imap and dovecot). dovecot isn't as modular and pluggable as courier-imap. Also it isn'textremely supervise friendly like courier-imap and you will need to install and configure it outside supervise.
To install dovecot you just need to use dnf/yum/apt to install
If you are doing to use dovecot, you need to disable courier-imap
$ sudo /bin/bash
# for i in /service/proxy-imapd.4143 /service/proxy-imapd-ssl.9143
/service/qmail-imapd.143 /service/qmail-imapd-ssl.993
/service/proxy-pop3d.4110 /service/proxy-pop3d-ssl.9110
/service/qmail-pop3d.110 /service/qmail-pop3d-ssl.995
do
touch $i/down
svc -dx $i $i/log
done
# dnf -h install dovecot dovecot-mysql
# systemctl enable dovecot
NOTE: replace dnf with yum for distros like RHEL, CentOS, etc. For openSUSE, SUSE replace dnf with zypper
# apt-get -y update
# apt-get -y install dovecot dovecot-mysql
# systemctl enable dovecot
Like most other IMAP/POP3 servers, dovecot is configurable and can use multiple methods to authenticate and as well get other information about the user such as home directory, user id, etc.
Dovecot uses /etc/dovecot/dovecot.conf as the main configuration file.
protocols = imap pop3
import_environment = QUERY_CACHE=1 DOMAIN_LIMITS=1 INFIFODIR=/run/indimail/inlookup INFIFO=infifo
NOTE: If you decide to use any of indimail's checkpassword authentication modules and if you need to enable QUERY_CACHE above, make sure to comment out #PrivateTmp=true
in the file /usr/lib/systemd/system/dovecot.service. If you don't disable PrivateTmp and you are using any of the indimail's checkpassword modules for authentication, the modules will not be able to communicate with inlookup query daemon. This is because the /tmp that inlookup uses will be different from the /tmp directory that dovecot auth process will use. checkpassword modules create a fifo in the /tmp directory and exchange the name with inlookup through another fifo. If you do disable PrivateTmp, then do not forget to issue the command
# systemctl daemon-reload
You need to have auth-system.conf.ext for authenticating users in your system's password database.
file /etc/dovecot/conf.d/10-auth.conf.
auth_mechanisms = plain login
!include auth-system.conf.ext
Indimail uses $HOME/Maildir for all virtual accounts
file /etc/dovecot/conf.d/10-mail.conf
mail_location = maildir:~/Maildir
It is important that the dovecot auth process runs as the user indimail so that it can read indimail control files and configuration.
file /etc/dovecot/conf.d/10-master.conf
service auth {
# auth_socket_path points to this userdb socket by default. It's typically
# used by dovecot-lda, doveadm, possibly imap process, etc. Users that have
# full permissions to this socket are able to get a list of all usernames and
# get the results of everyone's userdb lookups.
#
# The default 0666 mode allows anyone to connect to the socket, but the
# userdb lookups will succeed only if the userdb returns an "uid" field that
# matches the caller process's UID. Also if caller's uid or gid matches the
# socket's uid or gid the lookup succeeds. Anything else causes a failure.
#
# To give the caller full permissions to lookup all users, set the mode to
# something else than 0666 and Dovecot lets the kernel enforce the
# permissions (e.g. 0777 allows everyone full permissions).
unix_listener auth-userdb {
#mode = 0666
#user =
#group =
}
# Auth process is run as this user.
#user = $default_internal_user
user = indimail
group = qmail
}
service auth-worker {
unix_listener auth-worker {
mode = 0660
group = qmail
}
# Auth worker process is run as root by default, so that it can access
# /etc/shadow. If this isn't necessary, the user should be changed to
# $default_internal_user.
#user = root
group=qmail
}
You also need to configure the ssl certs. The default certificate used by indimail is /etc/indimail/certs/servercert.pem.
File /etc/dovecot/conf.d/10-ssl.conf.
ssl = required
ssl_cert = </etc/indimail/certs/servercert.pem
ssl_key = </etc/indimail/certs/servercert.pem
ssl_cipher_list = PROFILE=SYSTEM
There are four methods you can configure dovecot to work with indimail
file /etc/dovecot/conf.d/10-auth.conf
!include auth-sql.conf.ext
file /etc/dovecot/connf.d/auth-sql.conf.ext
passdb {
driver = sql
# Path for SQL configuration file, see example-config/dovecot-sql.conf.ext
args = /etc/dovecot/dovecot-sql.conf
}
userdb {
driver = prefetch
}
userdb {
driver = sql
args = /etc/dovecot/dovecot-sql.conf
}
file <u>/etc/dovecot/dovecot-sql.conf</u>
driver = mysql
default_pass_scheme = MD5
connect = host=/run/mysqld/mysqld.sock user=indimail password=abcdefgh dbname=indimail
#
user_query = SELECT pw_name,555 as uid, 555 as gid, pw_dir as home FROM indimail WHERE pw_name = '%n' AND pw_domain = '%d'
# The below passes all users and doesn't care for indimail vlimits (pw_gid column or vlimits table)
password_query = SELECT pw_passwd as password FROM indimail WHERE pw_name = '%n' AND pw_domain = '%d'
#
# A little bit more complicated query to support indimail pw_gid flags and vlimits for domain
# explanation:
# We're using bitwise operations on pw_gid.
# as defined in indimail.h:
# #define NO_POP 0x02 - no pop3
# #define NO_WEBMAIL 0x04 - no imap
# #define NO_IMAP 0x08 - no webmail
#
# !(pw_gid & 2) means - if 2nd bit of pw_gid is not set
# !(pw_gid & 4) means - if 4th bit of pw_gid is not set
# !(pw_gid & 8) means - if 8th bit of pw_gid is not set
# (pw_gid & 100) means - if 8 bits of pw_gid is set (ignore vlimits)
#
# additionally because we're using LEFT JOIN we have to take care of NULLs for rows
# that don't return any records from the right table hence the use of COALESCE() function
# !(pw_gid & 4) (disable webmail flag) is used in conjuntion with '%r'!="127.0.0.1"
# which means that it will only apply to connections originating from hosts other than localhost
#
# So the below query supports pw_gid and vlimits settings for user account and domains but no domain limit overrides
#
#password_query = select pw_passwd as password FROM indimail LEFT JOIN vlimits ON indimail.pw_domain=vlimits.domain WHERE pw_name='%n' and pw_domain='%d' and ( !(pw_gid & 8) and ('%r'!='127.0.0.1' or !(pw_gid & 4)) and ( '%r'!='127.0.0.1' or COALESCE(disable_webmail,0)!=1) and COALESCE(disable_imap,0)!=1);
#
# The below adds support for vlimits override on user account (vmoduser -o)
#
# logically this means: show password for user=%n at domain=%d when imap on the account
# is not disabled and connection is not comming from localhost when webmail access on
# the account is not disabled and if imap for the domain is not disabled and (connection
# is not comming from localhost when webmail access for the domain is not disabled) when
# vlimits are not overridden on the account
#
#password_query = select pw_passwd as password FROM indimail LEFT JOIN vlimits ON indimail.pw_domain=vlimits.domain WHERE pw_name='%n' and pw_domain='%d' and !(pw_gid & 8) and ('%r'!='127.0.0.1' or !(pw_gid & 4)) and ( ('%r'!='127.0.0.1' or COALESCE(disable_webmail,0)!=1) and COALESCE(disable_imap,0)!=1 or (pw_gid & 8192) );
The checkpassword interface used by dovecot uses dovecot specific extensions. IndiMail provides vchkpass(8), a checkpassword implementation compatible with dovecot.
file /etc/dovecot/conf.d/10-auth.conf
!include auth-checkpassword.conf.ext
file /etc/dovecot/conf.d/auth-checkpassword.conf.ext
passdb {
driver = checkpassword
args = /usr/sbin/vchkpass
}
userdb {
driver = prefetch
}
Create the file /etc/dovecot/conf.d/auth-indimail-conf.ext
# Authentication for system users. Included from 10-auth.conf.
#
# PAM authentication. Preferred nowadays by most systems.
# PAM is typically used with either userdb passwd or userdb static.
# REMEMBER: You'll need /etc/pam.d/dovecot file created for PAM
# authentication to actually work. See doc/wiki/PasswordDatabase.PAM.txt
# using pam-multi below causes dovecot to use PAM configuration in
# /etc/pam.d/pam-multi, which consist of
#
# auth required pam-multi.so pam-multi -s /usr/lib/indimail/modules/iauth.so
# account required pam-multi.so pam-multi -s /usr/lib/indimail/modules/iauth.so
#
passdb {
driver = pam
# [session=yes] [setcred=yes] [failure_show_msg=yes] [max_requests=<n>]
# [cache_key=<key>] [<service name>]
args = pam-multi
}
##
## User databases
##
# System users (NSS, /etc/passwd, or similar). In many systems nowadays this
# uses Name Service Switch, which is configured in /etc/nsswitch.conf.
userdb {
driver = passwd
}
file /etc/dovecot/conf.d/10-auth.conf
!include auth-indimail.conf.ext
file /etc/dovecot/conf.d/10-auth.conf
!include auth-system.conf.ext
In file /etc/nsswitch.conf
passwd: files nssd
shadow: files nssd
In file /etc/indimail/nssd.conf
getpwnam SELECT pw_name,'x',555,555,pw_gecos,pw_dir,pw_shell \
FROM indimail \
WHERE pw_name='%1$s' and pw_domain='%2$s' \
LIMIT 1
getspnam SELECT pw_name,pw_passwd,'1','0','99999','0','0','-1','0' \
FROM indimail \
WHERE pw_name='%1$s'and pw_domain='%2$s' \
LIMIT 1
getpwent SELECT pw_name,'x',555,555,pw_gecos,pw_dir,pw_shell \
FROM indimail LIMIT 100
getspent SELECT pw_name,pw_passwd,'1','0','99999','0','0','-1','0' \
FROM indimail
host localhost
database indimail
username indimail
password abcdefgh
socket /run/mysqld/mysqld.sock
pidfile /run/indimail/pwdlookup/nssd.pid
threads 5
timeout -1
facility daemon
priority err
You can start dovecot with a single command sudo service dovecot start
If you are already running courier-imap and want to migrate to dovecot, you need to convert your existing data or make dovecot read existing data.
When migrating mails from another IMAP server, you should make sure that these are preserved:
-
Message flags
- Lost flags can be really annoying, you most likely want to avoid it.
-
Message UIDs and UIDVALIDITY value
- If UIDs are lost, at the minimum clients' message cache gets cleaned and messages are re-downloaded as new.
- Some IMAP clients store metadata by assigning it to specific UID, if UIDs are changed these will be lost.
-
Mailbox subscription list
- Users would be able to manually subscribe them again if you don't want to mess with it.
When migrating mails from another POP3 server, you should try to preserve the old UIDLs. If POP3 client is configured to keep mails in the server and the messages' UIDLs change, all the messages are downloaded again as new messages.
Don't trust the migration scripts or anything you see in this wiki. Verify manually that the UIDLs are correct before exposing real clients to Dovecot. You can do this by logging in using your old POP3 server, issuing UIDL command and saving the output. Then log in using Dovecot and save its UIDL output as well. Use e.g. diff command to verify that the lists are identical. Note that:
- If a client already saw changed UIDLs and decided to start re-downloading mails, it's unlikely there is anything you can do to stop it. Even going back to your old server is unlikely to help at that point.
- Some (many?) POP3 clients also require that the message ordering is preserved.
- Some clients re-download all mails if you change the hostname in the client configuration. Be aware of this when testing.
Some servers (UW, Cyrus) implementing both IMAP and POP3 protocols use the IMAP UID and UIDVALIDITY values for generating the POP3 UIDL values. To preserve the POP3 UIDL from such servers you'll need to preserve the IMAP UIDs and set pop3_uidl_format properly.
If the server doesn't use IMAP UIDs for the POP3 UIDL, you'll need to figure out another way to do it. One way is to put the UIDL value into X-UIDL header in the mails and set pop3_reuse_xuidl=yes. Some POP3 servers (QPopper) write the X-UIDL header themselves, making the migration easy.
Some POP3 servers using Maildir uses the maildir base filename as the UIDL. You can use pop3_uidl_format = %f to do this.
courier-dovecot-migrate.pl does a perfect migration from Courier IMAP and POP3, preserving IMAP UIDs and POP3 UIDLs. It reads Courier's courierimapuiddb and courierpop3dsizelist files and produces dovecot-uidlist file from it.
Before doing the actual conversion you can run the script and see if it complains about any errors and such, for example:
# ./courier-dovecot-migrate.pl --to-dovecot --recursive /home
Finding maildirs under /home
/home/user/Maildir/dovecot-uidlist already exists, not overwritten
/home/user/Maildir2: No imap/pop3 uidlist files
Total: 69 mailboxes / 6 users
0 errors
No actual conversion done, use --convert parameter
The actual conversion can be done for all users at once by running the script with --convert --recursive parameters. Make sure the conversion worked by checking that dovecot-uidlist files were created to all maildirs (including to subfolders).
The --recursive option goes through only one level down in directory hierarchies. This means that if you have some kind of a directory hashing scheme (or even domain/username/), it won't convert all of the files.
You can also convert each user as they log in for the first time, using PostLoginScripting with a script something like:
#!/bin/sh
# WARNING: Be sure to use mail_drop_priv_before_exec=yes,
# otherwise the files are created as root!
courier-dovecot-migrate.pl --quiet --to-dovecot --convert Maildir
# This is for imap, create a similar script for pop3 too
exec /usr/local/libexec/dovecot/imap
FIXME: The script should rename also folder names that aren't valid mUTF-7. Dovecot can't otherwise access such folders.
Courier by default uses "INBOX." as the IMAP namespace for private mailboxes. If you want a transparent migration, you'll need to configure Dovecot to use a namespace with "INBOX." prefix as well. In /etc/dovecot/conf.d/10-mail.conf.
mail_location = maildir:~/Maildir
namespace inbox {
prefix = INBOX.
separator = .
inbox = yes
}
- Courier's courierimapsubscribed file is compatible with Dovecot's subscriptions file, but you need to remove the "INBOX." prefixes from the mailboxes. This is true even if you set namespace prefix to "INBOX." as described above.
- Courier's courierimapuiddb file is compatible with Dovecot's dovecot-uidlist file, just rename it.
- Courier's message flags are compatible with Dovecot (as they are specified by the Maildir specification)
- Courier's message keywords implementation isn't Dovecot compatible. There doesn't exist a simple way to convert the keywords manually.
What is DKIM
DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message while it is in transit. DKIM has been approved as a Proposed Standard by IETF and published it as RFC 4871, RFC 6376. There are number of vendors/software available which provide DKIM signing. IndiMail is one of them. You can see the full list here. IndiMail supports RSA-SHA1, RSA-SHA256 and Ed25519-SHA256 Cryptographic signature methods for DKIM.
DKIM uses public-key cryptography to allow the sender to electronically sign legitimate emails in a way that can be verified by recipients. Prominent email service providers implementing DKIM (or its slightly different predecessor, DomainKeys) include Yahoo and Gmail. Any mail from these domains should carry a DKIM signature, and if the recipient knows this, they can discard mail that hasn't been signed, or has an invalid signature.
indimail-mta comes with a drop-in replacement qmail-dkim(8) for qmail-queue(8), for DKIM signature signing and verification. Steps needed to enable DKIM are given below. Apart from being a qmail-queue(8) frontend, setting DKIMQUEUE to /bin/cat, qmail-dkim(8) can read from descriptor 0 and write to descriptor 1, for both signing and verification before mail is handed over to qmail-local(8) or qmail-remote(8) by using spawn-filter(8.
For DKIM verification two methods have been described - one during SMTP and one during local delivery. You need to select just one of the methods
For DKIM signing, three methods have been described - one during SMTP, one during remote delivery and one during mail injection. You need to select just one of the methods, else you will send out emails with multiple DKIM signatures. DKIM signing uses DKIMSIGN environment variable. Any '%' in this environment variable gets replaced by the domain name in the Return-Path, SENDER, X-Bounce-Address or the From header (which ever header is found first).
You may want to look at an excellent setup instructions by Roberto Puzzanghera for configuring dkim for qmail/netqmail. Much of indimail's DKIM comes from practical experience of supporting Roberto's users using qmail-dkim(8) and dkim(8).
To able to sign emails with a DKIM signature, you need to create a private/public key pair using openssl. indimail-mta provides a script dknewkey(8) to help you create this private/public key pair.
$ sudo /bin/bash
# mkdir -p /etcindimail/control/domainkeys
# chown root:qcerts /etc/indimail/control/domainkeys
# dknewkey -b 2048 /etc/indimail/control/domainkeys/default
The private key default created by dknewkey(7) can be read only by the root UNIX user or a user who is part of the qcerts UNIX group. This means that only the root user or users who are part of the qcerts group can sign messages to have a DKIM signature. This is required because you don't want someone else to send out emails with your signature using your private key. You are free to chose your own name for the private key instead of using the name default.
$ cd /etc/indimail/control/domainkeys
$ pubkey=$(openssl rsa -in default -pubout -outform PEM | grep -v '^--' | tr -d '\n')
The next command will print the text that you need to put in your txt record for default._domainkey.indimail.org. Replace indimail.org with our FQDN.
$ printf "default._domainkey.indimail.org\tIN\tTXT\t\"v=DKIM1; k=rsa; p=%s\"\n" "$pubkey"
default._domainkey.indimail.org IN TXT "v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2dvktnCXRavyuuoy2NUcHWpMp/Ia7Y5Y9tTwjjby7hS9wIvgecBz6UEMunOJdAZ2RVvSXKxPlxO4/rUgW6ow7vlEPY3IKagy+VFW1oHmvj4WU+BxZTJA2d8VrW9S9O1JMuPGGwdeYOC/Gcle/EviQtGYsz3jL/HrJb9rXXl4/gwIDAQAB"
choose the selector (e.g. my_selector) and publish this into DNS TXT record for:
my_selector._domainkey.indimail.org
(e.g. selector can be named 'default')
Wait until it's on all DNS servers and that's it. If all your domains can use my_selector you can set DKIMSIGN as /etc/indimail/control/domainkeys/%/my_selector. More in DKIMSIGN environment variable later.
You can setup qmail-smtpd(8) for verification by setting DKIMVERIFY environment variable instead of DKIMSIGN.
$ sudo /bin/bash
# cd /service/qmail-smtpd.25/variables
# echo "/usr/bin/qmail-dkim" > QMAILQUEUE
# echo FGHIKLMNOQRTUVWjp > DKIMVERIFY
# svc -r /service/qmail-smtpd.25
It makes sense just to do DKIM verification with qmail-local(8) on the host which serves as your incoming gateway for your local domains. This method is just an extension of Using FILTERARGS environment variable.
$ sudo /bin/bash
# cd /service/qmail-send.25/variables
# echo "/usr/bin/spawn-filter" > QMAILLOCAL
# echo "/bin/cat" > DKIMQUEUE
# echo "/usr/sbin/qmail-dkim" > FILTERARGS
# echo FGHIKLMNOQRTUVWjp > DKIMVERIFY
# svc -r /service/qmail-send.25
qmail-dkim(8) uses openssl libraries and there is some amount of memory allocation that happens. You may want to increase your softlimit (if any) in your qmail-smtpd(8) run script.
$ sudo /bin/bash
# cd /service/qmail-smtpd.25/variables
# echo "/usr/bin/qmail-dkim" > QMAILQUEUE
# echo "/etc/indimail/control/domainkeys/default" > DKIMSIGN
# svc -r /service/qmail-smtpd.25
In the above example you can use /etc/indimail/control/domainkeys/%/default for DKIMSIGN. During signing the '%' in the DKIMSIGN variable gets replaced with the domain name, allowing you to have different private keys for each domain.
This method is just an extension of what we discussed in Using FILTERARGS environment variable.
$ sudo /bin/bash
# cd /service/qmail-send.25/variables
# echo "/usr/bin/spawn-filter" > QMAILREMOTE
# echo "/bin/cat" > DKIMQUEUE
# echo "/usr/sbin/qmail-dkim" > FILTERARGS
# echo "/etc/indimail/control/domainkeys/default" > DKIMSIGN
# echo "-h" > DKIMSIGNOPTIONS
# svc -r /service/qmail-send.25
In the above example you can use /etc/indimail/control/domainkeys/%/default for DKIMSIGN. During signing the '%' in the DKIMSIGN variable gets replaced with the domain name, allowing you to have different private keys for each domain.
This method is just an extension of Using spawn-filter with control file filterargs.
$ sudo /bin/bash
# cd /service/qmail-send.25/variables
# echo "/usr/bin/spawn-filter" > QMAILREMOTE
# svc -r /service/qmail-send.25
# cat > /etc/indimail/control/filterargs <<EOF
# Sign emails by inserting DKIM-Signature in the email during remote delivery
*:remote:/usr/sbin/qmail-dkim:DKIMQUEUE=/usr/bin/qcat, DKIMSIGN=/etc/indimail/control/domainkeys/default,DKIMSIGNOPTIONS=-h
# Verify DKIM-Signature and Insert DKIM-Status header for email during local delivery
*:local:/usr/sbin/qmail-dkim:DKIMQUEUE=/usr/bin/qcat, DKIMVERIFY=FGHIKLMNOQRTUVWjp,DKIMSIGN=
EOF
In the above example you can use /etc/indimail/control/domainkeys/%/default for DKIMSIGN. During signing the '%' in the DKIMSIGN variable gets replaced with the domain name, allowing you to have different private keys for each domain.
Any UNIX user on the system can sign their outbound emails with DKIM signature during mail injection itself. All that is required is to have a DKIM public/private key created using dknewkey as given in Create your DKIM signature. Once you have done that, the user injecting the mail will require read access to the private key. We have two unique cases. One for system users and another for users having shell accounts.
System Users
If this is a system user (users without shell access) that will be sending out the email then you just need to add this user to the qcerts group. e.g. for php scripts sending out emails and beng served by the apache web server, the following command will add the user apache to have qcerts as a supplementary group. Since QMAILQUEUE is set to qmail-dkim(8), qmail-inject(8) or sendmail(1) will call qmail-dkim(8) as <apache user and will be able to access the private keys. You are free to set your own UNIX level permissions for the private keys to allow access to qmail-dkim(8) but restrict access to non-authorized users.
To add qcerts group as a supplementary group for apache, execute
$ sudo /usr/sbin/usermod -aG qcerts apache
Non-System users
If you want actual UNIX users who have shell access to the system, have the DKIM private key to have the read permission for the primary group of the user. e.g. A UNIX user with username user1 and primary group group1, do the following
$ sudo /bin/bash
# mkdir ~/domainkeys
# chmod 700 ~/domainkeys
# dknewkey -b 2048 ~/domainkeys/default
Now to use the above DKIM key, we need to set few environment variables specific to user1. To do that we just use the envdir property of indimail-mta where any file in ~/.defaultqueue becomes an environment variable. This is done by programs like qmail-inject(8) and sendmail(1) amongst many other programs. Refer to point 3 in Setting Environment Variables for reference. Assuming /home/user1 is the home directory for user1, we can create DKIMSIGN environment variable using the below steps.
$ mkdir ~/.defaultqueue
$ cd ~/.defaultqueue
$ echo "/usr/sbin/qmail-dkim" > QMAILQUEUE
$ echo "/home/user1/domainkeys/default" > DKIMSIGN
To verify a message, set the DKIMVERIFY environment variable to a desired set of letters. Precisely, if you want a qmail-dkim(8) return status to generate an error, include that letter, where A is the first return status (DKIM_SUCCESS), B is the second (DKIM_FINISHED_BODY), etc. The letter should be uppercase if you want a permanent error to be returned, and lowercase if you want a temporary error to be returned (exit code 88). If you omit the letter, qmail-dkim(8) will not issue any error inspite of DKIM verification failure. It will return success and the email will get delivered. The complete set of letters with the corresponding return status is given below
Letter | DKIM code | Description |
---|---|---|
A | DKIM_SUCCESS | Function executed successfully |
B | DKIM_FINISHED_BODY | process result: no more message body is needed |
C | DKIM_PARTIAL_SUCCESS | verify result: at least one but not all signatures verified |
D | DKIM_NEUTRAL | verify result: no signatures verified but message is not suspicious |
E | DKIM_SUCCESS_BUT_EXTRA | signature result: signature verified but it did not include all of the body |
F | DKIM_3PS_SIGNATURE | 3rd-party signature |
G | DKIM_FAIL | Function failed to execute |
H | DKIM_BAD_SYNTAX | signature error: DKIM-Signature could not parse or has bad tags/values |
I | DKIM_SIGNATURE_BAD | signature error: RSA verify failed |
J | DKIM_SIGNATURE_BAD_BUT_TESTING | signature error: RSA verify failed but testing |
K | DKIM_SIGNATURE_EXPIRED | signature error: x= is old |
L | DKIM_SELECTOR_INVALID | signature error: selector doesn't parse or contains invalid values |
M | DKIM_SELECTOR_GRANULARITY_MISMATCH | signature error: selector g= doesn't match i= |
N | DKIM_SELECTOR_KEY_REVOKED | signature error: selector p= empty |
O | DKIM_SELECTOR_DOMAIN_NAME_TOO_LONG | signature error: selector domain name too long to request |
P | DKIM_SELECTOR_DNS_TEMP_FAILURE | signature error: temporary dns failure requesting selector |
Q | DKIM_SELECTOR_DNS_PERM_FAILURE | signature error: permanent dns failure requesting selector |
R | DKIM_SELECTOR_PUBLIC_KEY_INVALID | signature error: selector p= value invalid or wrong format |
S | DKIM_NO_SIGNATURES | no signatures |
T | DKIM_NO_VALID_SIGNATURES | no valid signatures |
U | DKIM_BODY_HASH_MISMATCH | sigature verify error: message body does not hash to bh value |
V | DKIM_SELECTOR_ALGORITHM_MISMATCH | signature error: selector h= doesn't match signature a= |
W | DKIM_STAT_INCOMPAT | signature error: incompatible v= |
X | DKIM_UNSIGNED_FROM | signature error: not found message From headers in signature |
Y | DKIM_BAD_IDENTITY | signature error: invalid identity in signature |
Instead of permanently or temporarily rejecting mails, we could instead accept all emails but put them in the Spam folder. To do that set DKIMVERIFY to an empty string and use vcfilter(1) to create a vfilter. You can also use filterit(1) in dot-qmail(5). vcfilter(1) can be used only if you have indimail-virtualdomains installed. Examples for using both are shown below.
$ sudo vcfilter -i -t dkimFilter -h DKIM-Status -c "Does not contain" -k "good" -f Spam -b 0 prefilt@domain
or in [dot-qmail(5)](https://github.com/indimail/indimail-mta/wiki/dot-qmail.5)
| filterit -x -h DKIM-Status -c "Does not contain" -k "good" -a Maildir -A ./Maildir/.Spam/ -e 0 -d exit -D 0
IndiMail supports ADSP. A DKIM Author Signing Practice lookup is done by the verifier to determine whether it should expect email with the From: address to be signed.
The Sender Signing Practice is published with a DNS TXT record as follows:
_adsp._domainkey.indimail.org. IN TXT "dkim=unknown"
The dkim tag denotes the outbound signing Practice. unknown means that the indimail.org domain may sign some emails. You can have the values "discardable" or "all" as other values for dkim tag. discardable means that any unsigned email from indimail.org is recommended for rejection. all means that indimail.org signs all emails with dkim.
You may decide to consider ADSP as optional until the specifications are formalised. To set ADSP you need to set the environment variable SIGNPRACTICE=adsp. i.e
# echo adsp > /service/smtpd.25/variables/SIGN_PRACTICE
You may not want to do DKIM signing/verificaton by SMTP. In that case, you have the choice of using the QMAILREMOTE, QMAILLOCAL environment variables which allows IndiMail to run any script before it gets passed to qmail-remote(8), qmail-local(8) respectively. Setting qmail-remote(8) to sign with DKIM signatures On your host which sends out outgoing mails, it only make sense to do DKIM signing and not verification.
Once you have installed your private key file and added your public key to your DNS data, you should test the server and make sure that your outbound message are having the proper signatures added to them. You can test it by sending an email to sa-test (at) sendmail dot net. This reflector will reply (within seconds) to the envelope sender with a status of the DomainKeys and DKIM signatures.
If you experience problems, consult the qmail-dkim(8) man page or post a comment below and I’ll try to help. You can also use the following for testing.
- [email protected], is Yahoo!'s testing server. When you send a message to this address, it will send you back a message telling you whether or not the domainkeys signature was valid.
- [email protected] is a free service from the sendmail people. It's very similar to the Yahoo! address, but it also shows you the results of an SPF check as well.
All the above was quite easy. If you don't think so, you can always use the magic options --dkverify (for verification) or --dksign --private_key=domain_key_private_key_file
to svctool (svctool --help for all options) to create supervice run script for qmail-smtpd(8), qmail-send(8).
References
- http://www.brandonturner.net/blog/2009/03/dkim-and-domainkeys-for-qmail/
- http://qmail.jms1.net/patches/domainkeys.shtml
- http://notes.sagredo.eu/node/82
Bounces have NULL as the value for the Return-Path header. Due to this you cannot generate a signature from the original email using qmail-dkim(8). However both of them allow you to set a fixed domain (d=) tag in the DKIM signature for bounces, by setting environment variable BOUNCEDOMAIN. A simple way to set this is to use the bounce.envrules control file.
$ sudo bash
$ cd /etc/indimail/control
# echo "*:DKIMSIGN=/etc/indimail/control/domainkeys/default,BOUNCEQUEUE=/usr/sbin/qmail-dkim" > bounce.envrules
I always find using the web ugly. It is a pain using the mouse almost all the time to do anything. One of the reasons I have never focussed on building a web administration tool for Indimail.
iwebadmin(1) was born because my users pestered me to do something done about it. I have no knowledge of web scripting, etc. But using some bit of common sense, I have managed to make qmailadmin work with IndiMail by modifying the source code (lucky for me, qmailadmin was written in C).
For the admin user iwebadmin(1) provides
- user addition
- user deletion
- password change
- adding autoresponders
- deleting autoresponders
- modifying autoresponders
- adding forwarding addresses
- deleting forwarding addresses
- modifying forwarding addreses
- quota modification
- Managing ezmlm-idx mailing lists
For users other than the postmaster account iwebadmin(1) provides
- Password change
- add/modify/delete forwarding addresses
- add/modify/delete autoresponder
The RPM / Yum / APT Repo file can be installed using instructions at http://software.opensuse.org/download.html?project=home:indimail&package=iwebadmin
After installation, you just need to go to http://127.0.0.1/cgi-bin/iwebadmin
- The image assets get installed in /var/www/html/images/iwebadmin
- The html assets get installed in /usr/share/iwebadmin/html
- The language files get installed in /usr/share/iwebadmin/lang
The screen shots are below
You can now configure MRTG Graphs to show statistics for IndiMail. You need to have mrtg installed on your system. If you do not have mrtg, you can execute yum/dnf
$ sudo yum install mrtg
Bulk of the statistics is generated by a utility qmailmrtg(1) that reads log files created by multilog(8) in /var/log/svc directory. The statistics generated by qmailmrtg includes service uptimes. At the moment the graphs display status of SMTP, IMAP, POP3 (plain and encrypted) services, inlookup cache service, MySQL service, tinydns and dnscache services. Few of the graphs (load, disk, network and memory utilization) come from snmpd. If you don't have snmpd installed, these graphs won't be shown
You need to execute the following steps (assuming your web server document root is /var/www/html)
$ sudo /usr/sbin/svctool --mrtg=/var/www/html/mailmrtg --servicedir=/service
The above command will also create a base configuration for snmpd in /etc/indimail/snmpd.conf.
After the above command is run, you can edit /service/mrtg/etc/indimail.mrtg.cfg to add, modify or remove entries as per your requirements.
After carrying out the above step using svctool(8), check the status of mrtg service.
$ sudo svstat /service/mrtg
/service/mrtg/: up 35254 seconds pid 2443
Point your browser to http://localhost/mailmrtg/ and you should see graphs like below.
These instructions will work on CentOS, RHEL, Fedora. For Debian/Ubuntu and other distros, please use your knowledge to make changes accordingly. In this guide, replace indimail.org with your own hostname. Non SSL Version Install/Configuration (look below for SSL config)
-
Install RoundCube. On older systems, use the yum command
$ sudo dnf -y install roundcubemail php-mysqlnd
-
Connect to MySQL using a privileged user. IndiMail installation creates a privileged mysql user 'mysql'. It does not have the user 'root'. Look at the variable PRIV_PASS in /etc/indimail/svctool.cnf to know the password.
$ /usr/bin/mysql -u mysql -p mysql MySQL> create database RoundCube_db; MySQL> create user roundcube identified by 'subscribed'; MySQL> GRANT ALL PRIVILEGES on RoundCube_db.* to roundcube; MySQL> FLUSH PRIVILEGES; MySQL> QUIT; $ /usr/bin/mysql -u mysql -p RoundCube_db < /usr/share/roundcubemail/SQL/mysql.initial.sql
-
Copy /etc/roundcube/config.inc.php.sample to /etc/roundcube.inc.php
$ sudo cp /etc/roundcube/config.inc.php.sample /etc/roundcubemail/config.inc.php
Edit the lines in /etc/roundcube/config.inc.php
$config['db_dsnw'] = 'mysql://roundcube:subscribed@localhost/RoundCube_db'; $config['smtp_server'] = 'localhost'; $config['smtp_port'] = 587; $config['smtp_user'] = '%u'; $config['smtp_pass'] = '%p'; $config['support_url'] = 'http://indimail.sourceforge.net'; $config['product_name'] = 'IndiMail Webmail'; $config['plugins'] = array( 'archive', 'sauserprefs', 'markasjunk2', 'iwebadmin', );
NOTE: the iwebadmin plugin will not work for postmaster account or IndiMail users having QA_ADMIN privileges. man vmoduser(1) This file should have read permission for apache group
$ sudo chown root:apache /etc/roundcube/config.inc.php $ sudo chmod 640 /etc/roundcube/config.inc.php
For markasjunk2 to work you need to set permission for apache to write /etc/indimail/spamignore
$ sudo chown apache:indimail /etc/indimail/spamignore $ sudo chmod 644 /etc/indimail/spamignore
-
Edit the lines in /etc/roundcube/defaults.inc.php
$config['db_dsnw'] = 'mysql://roundcube:subscribed@localhost/RoundCube_db';$config['imap_auth_type'] = 'LOGIN'; $config['smtp_auth_type'] = 'LOGIN';
This file should have read permission for apache group
$ sudo chown root:apache /etc/roundcube/defaults.inc.php $ sudo chmod 640 /etc/roundcube/defaults.inc.php
-
Change iwebadmin path in /usr/share/roundcubemail/iwebadmin/config.inc.php
$rcmail_config['iwebadmin_path'] = 'http://127.0.0.1/cgi-bin/iwebadmin';
-
Change sauserprefs_db_dsnw in /usr/share/roundcubemail/sauserprefs/config.inc.php
$rcmail_config['sauserprefs_db_dsnw'] = 'mysql://roundcube:subscribed@localhost/RoundCube_db';
-
Restore indimail plugins for roundcube
$ sudo yum install ircube or $ cd /tmp $ wget http://downloads.sourceforge.net/indimail/indimail-roundcube-1.0.tar.gz # This file $ cd / $ sudo tar xvfz /tmp/indimail-roundcube-1.0.tar.gz usr/share/roundcubemail/plugins $ /usr/bin/mysql -u mysql -p RoundCube_db < /usr/share/roundcubemail/sauserprefs/sauserprefs.sql
-
change pdo_mysql.default_socket /etc/php.ini For some reason
pdo_mysql
uses wrong mysql socket on some systems. Uses/var/lib/mysql/mysql.sock
instead of/var/run/mysqld/mysqld.sock
. You need to edit the file/etc/php.ini
and definepdo_mysql.default_socket
pdo_mysql.default_socket= /var/run/mysqld/mysqld.sock
You can verify if the path has been correctly entered by executing the below command. The command should return without any error
$ php -r "new PDO('mysql:host=localhost;dbname=RoundCube_db', 'roundcube', 'subscribed');"
-
HTTPD config i. Edit file /etc/httpd/conf.d/roundcubemail.conf and edit the following lines
# # Round Cube Webmail is a browser-based multilingual IMAP client #Alias /indimail /usr/share/roundcubemail # Define who can access the Webmail # You can enlarge permissions once configured <Directory /usr/share/roundcubemail/> <IfModule mod_authz_core.c> # Apache 2.4 Require ip 127.0.0.1 Require all granted Require local </IfModule> <IfModule !mod_authz_core.c> # Apache 2.2 Order Deny,Allow Deny from all Allow from 127.0.0.1 Allow from ::1 </IfModule> </Directory>
This file should be owned by root
$ sudo chown root:root /etc/httpd/conf.d/roundcubemail.conf $ sudo chmod 644 /etc/httpd/conf.d/roundcubemail.conf
ii. Restart httpd
$ sudo service httpd restart
-
Login to webmail at http://localhost/indimail SSL / TLS Version
-
Install RoundCube. On older systems, use the yum command
$ sudo dnf -y install roundcubemail php-mysqlnd
-
Connect to MySQL using a privileged user. IndiMail installation creates a privileged mysql user 'mysql'. It does not have the user 'root'. Look at the variable PRIV_PASS in /usr/sbin/svctool to know the password.
$ /usr/bin/mysql -u mysql -p mysql MySQL> create database RoundCube_db; MySQL> create user roundcube identified by 'subscribed'; MySQL> GRANT ALL PRIVILEGES on RoundCube_db.* to roundcube; MySQL> FLUSH PRIVILEGES; MySQL> QUIT; $ /usr/bin/mysql -u mysql -p RoundCube_db < /usr/share/roundcubemail/SQL/mysql.initial.sql
-
Copy /etc/roundcube/config.inc.php.sample to /etc/roundcube.inc.php
$ sudo cp /etc/roundcube/config.inc.php.sample /etc/roundcubemail/config.inc.php
Edit the lines in /etc/roundcube/config.inc.php
$config['db_dsnw'] = 'mysql://roundcube:subscribed@localhost/RoundCube_db'; $config['default_host'] = 'ssl://indimail.org'; $config['smtp_server'] = 'localhost'; $config['smtp_port'] = 587; $config['smtp_user'] = '%u'; $config['smtp_pass'] = '%p'; $config['support_url'] = 'http://indimail.sourceforge.net'; $config['product_name'] = 'IndiMail Webmail'; $config['plugins'] = array( 'archive', 'sauserprefs', 'markasjunk2', 'iwebadmin', );
NOTE: the iwebadmin plugin will not work for postmaster account or IndiMail users having QA_ADMIN privileges. Read vmoduser(8). This file should have read permissions for apache group
$ sudo chown root:apache /etc/roundcube/config.inc.php $ sudo chmod 640 /etc/roundcube/config.inc.php
-
Edit the lines in /etc/roundcube/defaults.inc.php i.e.
$config['db_dsnw'] = 'mysql://roundcube:subscribed@localhost/RoundCube_db'; $config['default_host'] = 'ssl://indimail.org'; $config['default_port'] = 993; $config['imap_conn_options'] = array( 'ssl' => array( 'verify_peer' => false, 'verify_peer_name' => false, ), ); $config['imap_auth_type'] = 'LOGIN'; $config['smtp_auth_type'] = 'LOGIN'; $config['force_https'] = true; $config['product_name'] = 'IndiMail Webmail'; $config['useragent'] = 'IndiMail Webmail/'.RCMAIL_VERSION;
This file should have read permission for apache group$config['force_https'] = true;
$ sudo chown root:apache /etc/roundcube/defaults.inc.php $ sudo chmod 640 /etc/roundcube/defaults.inc.php
-
Change iwebadmin path in /usr/share/roundcubemail/iwebadmin/config.inc.php
$rcmail_config['iwebadmin_path'] = 'https://127.0.0.1/cgi-bin/iwebadmin';
-
Change
sauserprefs_db_dsnw
in /usr/share/roundcubemail/sauserprefs/config.inc.php$rcmail_config['sauserprefs_db_dsnw'] = 'mysql://roundcube:subscribed@localhost/RoundCube_db';
-
Restore indimail plugins for roundcube
$ cd /tmp $ wget http://downloads.sourceforge.net/indimail/indimail-roundcube-ssl-1.0.tar.gz # This file $ cd / $ sudo tar xvfz /tmp/indimail-roundcube-ssl-1.0.tar.gz usr/share/roundcubemail/plugins $ /usr/bin/mysql -u mysql -p RoundCube_db < /usr/share/roundcubemail/sauserprefs/sauserprefs.sql
-
Change pdo_mysql.default_socket /etc/php.ini For some reason pdo_mysql uses wrong mysql socket on some systems. Uses /var/lib/mysql/mysql.sock instead of /var/run/mysqld/mysqld.sock. You need to edit the file /etc/php.ini and define pdo_mysql.default_socket.
pdo_mysql.default_socket= /var/run/mysqld/mysqld.sock
You can verifiy if the path has been correctly entered by executing the below command. The command should return without any error
php -r "new PDO('mysql:host=localhost;dbname=RoundCube_db', 'roundcube', 'subscribed');"
-
HTTPD config i. Edit file /etc/httpd/conf.d/roundcubemail.conf and edit the following lines
# # Round Cube Webmail is a browser-based multilingual IMAP client #Alias /indimail /usr/share/roundcubemail # Define who can access the Webmail # You can enlarge permissions once configured <Directory /usr/share/roundcubemail/> <IfModule mod_authz_core.c> # Apache 2.4 Require ip 127.0.0.1 Require all granted Require local </IfModule> <IfModule !mod_authz_core.c> # Apache 2.2 Order Deny,Allow Deny from all Allow from 127.0.0.1 Allow from ::1 </IfModule> </Directory>
This file should be owned by root
$ sudo chown root:root /etc/httpd/conf.d/roundcubemail.conf $ sudo chmod 644 /etc/httpd/conf.d/roundcubemail.conf
ii. This is assuming you have already generated indimail cert after indimail installation. If not execute the following command. We will assume that your host is indimail.org
$ sudo /usr/sbin/svctool [email protected] –config=cert" --common_name=indimail.org
Edit the file /etc/httpd/conf.d/ssl.conf i.e.
ServerName indimail.org:443 SSLCertificateFile /etc/indimail/certs/servercert.pem
Now apache server needs access to servercert.pem. Add apache user to the qmail group. You can chose either of the below two options (Options 2 is less secure, as it gives httpd access to qmail files).
- Option 1
$ sudo chown indimail:apache /etc/indimail/certs/servercert.pem $ sudo chmod 640 /etc/indimail/certs/servercert.pem
- Option 2
$ sudo usermod -aG qmail apache
Now you should see apache getting qmail group access
$ grep "qmail:x:" /etc/group qmail:x:1002:qscand,apache
iii. Edit file /etc/php.ini. For some funny reason, the cert needs to be mentioned. i.e.
openssl.cafile=/etc/indimail/certs/servercert.pem openssl.capath=/etc/pki/tls/certs
Run the following command to get the cert locations. ini_cafile] should point to servercert.pem location.
$ php -r "print_r(openssl_get_cert_locations());" Array ( [default_cert_file] => /etc/pki/tls/cert.pem [default_cert_file_env] => SSL_CERT_FILE [default_cert_dir] => /etc/pki/tls/certs [default_cert_dir_env] => SSL_CERT_DIR [default_private_dir] => /etc/pki/tls/private [default_default_cert_area] => /etc/pki/tls [ini_cafile] => /etc/indimail/certs/servercert.pem [ini_capath] => /etc/pki/tls/certs )
iv. Follow instructions to setup https
https://wiki.centos.org/HowTos/Https
v. Restart httpd
$ sudo service httpd restart
vi. It appears that in PHP 5.6.0, functions are now validating SSL certificates(in a variety of ways). First, it appears to fail for untrusted certificates (i.e. no matching CA trusted locally), and secondly, it appears to fail for mismatched hostnames in the request and certificate. Verify that php is using the correct certificate with proper CN. Use the program testssl.php download from the location you downloaded this README/INSTALL file. In Step 9ii you created a certificate with common_name as indimail.org. Use the same host that you gave when creating the certificate.
$ php ./testssl.php indimail.org Success
-
-
Login to webmail
- edit /etc/hosts and edit the line for localhost i.e. 127.0.0.1 localhost indimail.org
- Restart httpd $ sudo service httpd restart
- Login to webmail at https://indimail.org/indimail
NOTE: Replace indimail.org with domain that you have configured
This section assumes that you have already installed MySQL or MariaDB. There are few difference between them. Also remember that the MySQL developers have a habit of changing & breaking things. Anything written here could stop working few versions down the road. This document has been written with MySQL Version 5.7 and MariaDB 5.5
There are few things that IndiMail requires
- A Database on which IndiMail has certain privileges. We will discuss this under the section ‘Database Initialization’
- A consistent method of starting MySQL daemon mysqld. This can easily be achieved by having mysqld under supervise. We will discuss this under the section ‘MySQL Service’
- Setting up MySQL users named mysql, indimail, admin and repl.
- A MySQL config file which sets variables like the socket path. This should be named indimail.cnf. This can be created by running the svctool(8) command. We will discuss this under the section ‘MySQL Configuration’
- A control file which is used by all IndiMail client to access MySQL. This control file will have the MySQL host, username, password, port or socket path. This can be created using any text editor or using the echo command on the shell. We will discuss this under the section ‘MySQL Control File’
The role of the users discussed in point 3. above are
- mysql to allow all administration access to MySQL database. This is equivalent to the MySQL root user created by default MySQL binary installation.
- indimail to allow IndiMail programs to access MySQL. This user does not have access to any other database.
- admin with reload and shutdown privileges on the MySQL database. This user can shutdown the MySQL database.
- repl to with replication privileges. This allows a slave MySQL setup to replicate database from the MySQL master. This is needed only when you want to have a Master Slave setup.
It is advisable not to store the MySQL passwords in scripts. You can use mysql_config_editor to store encrypted credentials in .mylogin.cnf file. This file is read by MySQL clients during startup, hence avoiding the need of passing passwords on the command line. Remember passing passwords on the command line is insecure. With the --password option, mysql_config_editor will prompt you for the password to store
$ mysql_config_editor set --login-path=admin --socket=/var/run/mysqld/mysqld.sock --user=mysql --password
Enter password:
Now to login to MySQL using mysql client you just need to execute
$ mysql –login-path=mysql
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 50
Server version: 5.7.20-log MySQL Community Server (GPL)
Copyright (c) 2000, 2017, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
mysql>
You can create a similar login path for indimail user
$ mysql_config_editor set --login-path=indimail --socket=/var/run/mysqld/mysqld.sock –user=indimail --password
Enter password:
Now for carrying out routine queries for the MySQL indimail database you can pass the option –login-path=indimail to /usr/bin/mysql client.
Using svctool
svctool(8) automates the process of MySQL db creation as required for IndiMail. You just need to run the following command
$ sudo /usr/sbin/svctool --config=mysqldb --mysqlPrefix=/usr \
--databasedir=/var/indimail/mysqldb --default-domain=`uname -n` \
--base_path=/home/mail
The above command will create and initialize a MySQL database for first time use by IndiMail. If the directory /var/indimail/mysqldb exists, svctool(8) will do nothing. Else, svctool(8) will also create the four users mysql, indimail, admin and repl. If you want to setup MySQL manually or want to use an existing MySQL instance/setup or want to do a manual initialization of MySQL database, you will have to create these users manually. The creation for these users will be discussed in Section 3.
Manual Initialization
In the examples shown here, the server is going to run under the user ID of the mysql login account. This assumes that such an account exists. Either create the account if it does not exist, or substitute the name of a different existing login account that you plan to use for running the server.
Create a directory whose location can be provided to the secure_file_priv system variable, which limits import/export operations to that specific directory:
$ mkdir -p /var/indimail/mysqldb/data
$ mkdir -p var/indimail/mysqldb/logs
$ chown -R mysql:mysql /var/indimail/mysqldb/data
$ chmod 750 /var/indimail/mysqldb/data
Initialize the data directory, including the mysql database containing the initial MySQL grant tables that determine how users are permitted to connect to the server.
Typically, data directory initialization need be done only after you first installed MySQL. If you are upgrading an existing installation, you should run mysql_upgrade instead (see mysql_upgrade — Check and Upgrade MySQL Tables). However, the command that initializes the data directory does not overwrite any existing privilege tables, so it should be safe to run in any circumstances. Use the server to initialize the data directory; for example:
For MySQL from Oracle
$ sudo mysqld --initialize --datadir=/var/indimail/mysqldb/data –user=mysql \
--log-error=/var/indimail/mysqldb/logs/mysqld.log
For MySQL from MariaDB
$ sudo mysql_install_db –datadir=/var/indimail/mysqldb/data –user=mysql
--log-error=/var/indimail/mysqldb/logs/mysqld.log
You can check if the database has been created by using the ls command. You should be able to see two directories mysql and indimail under /var/indimail/mysqldb/data, indicating creation of two databases named mysql and indimail.
$ ls -l /var/indimail/mysqldb/data
total 176228
-rw-rw----. 1 mysql mysql 16384 Dec 20 10:00 aria_log.00000001
-rw-rw----. 1 mysql mysql 52 Dec 20 10:00 aria_log_control
-rw-r-----. 1 mysql mysql 56 Mar 24 2017 auto.cnf
-rw-------. 1 mysql mysql 1675 Mar 24 2017 ca-key.pem
-rw-r--r--. 1 mysql mysql 1074 Mar 24 2017 ca.pem
-rw-r--r--. 1 mysql mysql 1078 Mar 24 2017 client-cert.pem
-rw-------. 1 mysql mysql 1675 Mar 24 2017 client-key.pem
drwxr-x---. 2 mysql mysql 4096 Mar 24 2017 ezmlm
-rw-r-----. 1 mysql mysql 726 Feb 8 07:59 ib_buffer_pool
-rw-r-----. 1 mysql mysql 79691776 Feb 8 07:59 ibdata1
-rw-r-----. 1 mysql mysql 50331648 Feb 8 07:59 ib_logfile0
-rw-r-----. 1 mysql mysql 50331648 Mar 24 2017 ib_logfile1
drwxr-x---. 2 mysql mysql 4096 Feb 3 18:02 indimail
-rw-rw----. 1 mysql mysql 0 Dec 17 18:52 multi-master.info
drwxr-x---. 2 mysql mysql 4096 Feb 3 18:02 mysql
drwxr-x---. 2 mysql mysql 4096 Mar 24 2017 performance_schema
-rw-------. 1 mysql mysql 1675 Mar 24 2017 private_key.pem
-rw-r--r--. 1 mysql mysql 451 Mar 24 2017 public_key.pem
-rw-r--r--. 1 mysql mysql 1078 Mar 24 2017 server-cert.pem
-rw-------. 1 mysql mysql 1675 Mar 24 2017 server-key.pem
drwxr-x---. 2 mysql mysql 12288 Mar 24 2017 sys
You now need to check the log /var/indimail/mysqldb/logs/mysqld.log. The last line in this log will give you the password for the root user. This user will have all privileges and we will use this to create the user indimail and grant it privileges to access the indimail database. Note down this password.
$ cat /var/indimail/mysqldb/logs/mysqld.log
2018-02-07T03:34:41.509241Z 0 [Warning] Changed limits: max_open_files: 1024 (requested 5000)
2018-02-07T03:34:41.509393Z 0 [Warning] Changed limits: table_open_cache: 431 (requested 2000)
2018-02-07T03:34:43.457211Z 0 [Warning] InnoDB: New log files created, LSN=45790
2018-02-07T03:34:43.712425Z 0 [Warning] InnoDB: Creating foreign key constraint system tables.
2018-02-07T03:34:43.801374Z 0 [Warning] No existing UUID has been found, so we assume that this is the first time that this server has been started. Generating a new UUID: d65b11f7-0bb7-11e8-b137-b8763fc3c7f1.
2018-02-07T03:34:43.811013Z 0 [Warning] Gtid table is not ready to be used. Table 'mysql.gtid_executed' cannot be opened.
2018-02-07T03:34:43.811968Z 1 [Note] A temporary password i