Appendix A. Exim Implementation

Table of Contents

1. Prerequisites
2. The Exim Configuration File
2.1. Access Control Lists
2.2. Expansions
3. Options and Settings
4. Building the ACLs - First Pass
4.1. acl_connect
4.2. acl_helo
4.3. acl_mail_from
4.4. acl_rcpt_to
4.5. acl_data
5. Adding SMTP transaction delays
5.1. The simple way
5.2. Selective Delays
6. Adding Greylisting Support
6.1. greylistd
6.2. MySQL implementation
7. Adding SPF Checks
7.1. SPF checks via Exiscan-ACL
7.2. SPF checks via Mail::SPF::Query
8. Adding MIME and Filetype Checks
9. Adding Anti-Virus Software
10. Adding SpamAssassin
10.1. Invoke SpamAssassin via Exiscan
10.2. Configure SpamAssassin
10.3. User Settings and Data
11. Adding Envelope Sender Signatures
11.1. Create a Transport to Sign the Sender Address
11.2. Create a New Router for Remote Deliveries
11.3. Create New Redirect Router for Local Deliveries
11.4. ACL Signature Check
12. Accept Bounces Only for Real Users
12.1. Check for Recipient Mailbox
12.2. Check for Empty Sender in Aliases Router
13. Exempting Forwarded Mail
14. Final ACLs
14.1. acl_connect
14.2. acl_helo
14.3. acl_mail_from
14.4. acl_rcpt_to
14.5. acl_data

Abstract

Here we cover the integration of techniques and tools described in this document into the Exim Mail Transport Agent.