50 KiB
E-MailRelay Reference
Command line usage
The emailrelay
program supports the following command-line usage:
emailrelay [<option> [<option> ...]] [<config-file>]
where <option> is:
-
--address-verifier <program>
Runs the specified external program to verify a message recipent's e-mail address. A network verifier can be specified as
net:<transport-address>
. -
--admin <admin-port> (-a)
Enables an administration interface on the specified listening port number. Use telnet or something similar to connect. The administration interface can be used to trigger forwarding of spooled mail messages if the
--forward-to
option is used. -
--admin-terminate (-Q)
Enables the
terminate
command in the administration interface. -
--anonymous (-A)
Disables the server's SMTP VRFY command, sends less verbose SMTP responses and SMTP greeting, and stops
Received
lines being added to mail message content files. -
--as-client <host:port> (-q)
This is equivalent to
--log
,--no-syslog
,--no-daemon
,--dont-serve
,--forward
and--forward-to
. It is a convenient way of running a forwarding agent that forwards spooled mail messages and then terminates. -
--as-proxy <host:port> (-y)
This is equivalent to
--log
,--close-stderr
,--forward-on-disconnect
and--forward-to
. It is a convenient way of running a store-and-forward daemon. Use--log
,--forward-on-disconnect
and--forward-to
instead of--as-proxy
to keep the standard error stream open. -
--as-server (-d)
This is equivalent to
--log
and--close-stderr
. It is a convenient way of running a background storage daemon that accepts mail messages and spools them. Use--log
instead of--as-server
to keep standard error stream open. -
--client-auth <file> (-C)
Enables SMTP client authentication with the remote server, using the client account details taken from the specified secrets file. The secrets file should normally contain one line that starts with
client
and that line should have between four and five space-separated fields; the second field is the password encoding (plain
ormd5
), the third is the user-id and the fourth is the password. The user-id is RFC-1891 xtext encoded, and the password is either xtext encoded or generated byemailrelay-passwd
. If the remote server does not support SMTP authentication then the SMTP connection will fail. -
--client-auth-config <config>
Configures the SMTP client authentication module using a semicolon-separated list of configuration items. Each item is a single-character key, followed by a colon and then a comma-separated list. A 'm' character introduces an ordered list of authentication mechanisms, and an 'x' is used for blocklisted mechanisms.
-
--client-filter <program> (-Y)
Runs the specified external filter program whenever a mail message is forwarded. The filter is passed the name of the message file in the spool directory so that it can edit it as required. A network filter can be specified as
net:<transport-address>
and prefixes ofspam:
,spam-edit:
andexit:
are also allowed. The--filter
option is normally more useful than--client-filter
. -
--client-interface <ip-address> (-6)
Specifies the IP network address to be used to bind the local end of outgoing SMTP connections. By default the address will depend on the routing tables in the normal way. Use
0.0.0.0
to use only IPv4 addresses returned from DNS lookups of the--forward-to
address, or::
for IPv6. -
--client-tls (-j)
Enables negotiated TLS for outgoing SMTP connections; the SMTP STARTTLS command will be issued if the remote server supports it.
-
--client-tls-certificate <pem-file>
Defines the TLS certificate file when acting as a SMTP client. This file must contain the client's private key and certificate chain using the PEM file format. Keep the file permissions tight to avoid accidental exposure of the private key.
-
--client-tls-connection (-b)
Enables the use of a TLS tunnel for outgoing SMTP connections. This is for SMTP over TLS (SMTPS), not TLS negotiated within SMTP using STARTTLS.
-
--client-tls-required
Makes the use of TLS mandatory for outgoing SMTP connections. The SMTP STARTTLS command will be used before mail messages are sent out. If the remote server does not allow STARTTLS then the SMTP connection will fail.
-
--client-tls-server-name <hostname>
Defines the target server hostname in the TLS handshake. With
--client-tls-connection
this can be used for SNI, allowing the remote server to adopt an appropriate identity. -
--client-tls-verify <ca-list>
Enables verification of the remote SMTP server's certificate against any of the trusted CA certificates in the specified file or directory. In many use cases this should be a file containing just your self-signed root certificate.
-
--client-tls-verify-name <cname>
Enables verification of the CNAME within the remote SMTP server's certificate.
-
--close-stderr (-e)
Causes the standard error stream to be closed soon after start-up. This is useful when operating as a backgroud daemon and it is therefore implied by
--as-server
and--as-proxy
. -
--connection-timeout <time> (-U)
Specifies a timeout (in seconds) for establishing a TCP connection to remote SMTP servers. The default is 40 seconds.
-
--debug (-g)
Enables debug level logging, if built in. Debug messages are usually only useful when cross-referenced with the source code and they may expose plaintext passwords and mail message content.
-
--dnsbl <config>
Specifies a list of DNSBL servers that are used to reject SMTP connections from blocked addresses. The configuration string is made up of comma-separated fields: the DNS server's transport address, a timeout in milliseconds, a rejection threshold, and then the list of DNSBL servers.
-
--domain <fqdn> (-D)
Specifies the network name that is used in SMTP EHLO commands,
Received
lines, and for generating authentication challenges. The default is derived from a DNS lookup of the local hostname. -
--dont-serve (-x)
Disables all network serving, including SMTP, POP and administration interfaces. The program will terminate as soon as any initial forwarding is complete.
-
--filter <program> (-z)
Runs the specified external filter program whenever a mail message is stored. The filter is passed the name of the message file in the spool directory so that it can edit it as required. The mail message is rejected if the filter program terminates with an exit code between 1 and 99. Use
net:<transport-address>
to communicate with a filter daemon over the network, orspam:<transport-address>
for a spamassassin spamd daemon to accept or reject mail messages, orspam-edit:<transport-address>
to have spamassassin edit the message content without rejecting it, orexit:<number>
to emulate a filter program that just exits. -
--filter-timeout <time> (-W)
Specifies a timeout (in seconds) for running a
--filter
program. The default is 300 seconds. -
--forward (-f)
Causes spooled mail messages to be forwarded when the program first starts.
-
--forward-on-disconnect (-1)
Causes spooled mail messages to be forwarded whenever a SMTP client connection disconnects.
-
--forward-to <host:port> (-o)
Specifies the transport address of the remote SMTP server that is use for mail message forwarding.
-
--help (-h)
Displays help text and then exits. Use with
--verbose
for more complete output. -
--hidden (-H)
Windows only. Hides the application window and disables all message boxes. This is useful when running as a windows service.
-
--idle-timeout <time>
Specifies a timeout (in seconds) for receiving network traffic from remote SMTP and POP clients. The default is 1800 seconds.
-
--immediate (-m)
Causes mail messages to be forwarded as they are received, even before they have been accepted. This can be used to do proxying without store-and-forward, but in practice clients tend to to time out while waiting for their mail message to be accepted.
-
--interface <ip-address-list> (-I)
Specifies the IP network addresses used to bind listening ports. By default listening ports for incoming SMTP, POP and administration connections will bind the 'any' address for IPv4 and for IPv6, ie.
0.0.0.0
and::
. Use this option to limit listening to particular addresses (and by implication to particular network interfaces). Multiple addresses can be specified by using the option more than once or by using a comma-separated list. Use a prefix ofsmtp=
,pop=
oradmin=
on addresses that should apply only to those types of listening port. -
--log (-l)
Enables logging to the standard error stream and to the syslog. The
--close-stderr
and--no-syslog
options can be used to disable output to standard error stream and the syslog separately. Note that--as-server
,--as-client
and--as-proxy
imply--log
, and--as-server
and--as-proxy
also imply--close-stderr
. -
--log-file <file> (-N)
Redirects standard-error logging to the specified file. Logging to the log file is not affected by
--close-stderr
. The filename can include%d
to get daily log files; the%d
is replaced by the current date in the local timezone using aYYYYMMDD
format. -
--log-time (-L)
Adds a timestamp to the logging output using the local timezone.
-
--no-daemon (-t)
Disables the normal backgrounding at startup so that the program runs in the foreground, without forking or detaching from the terminal. On Windows this disables the system tray icon so the program uses a normal window; when the window is closed the program terminates.
-
--no-smtp (-X)
Disables listening for incoming SMTP connections.
-
--no-syslog (-n)
Disables logging to the syslog. Note that
--as-client
implies--no-syslog
. -
--pid-file <pid-file> (-i)
Causes the process-id to be written into the specified file when the program starts up, typically after it has become a backgroud daemon.
-
--poll <period> (-O)
Causes forwarding of spooled mail messages to happen at regular intervals (with the time given in seconds).
-
--pop (-B)
Enables the POP server listening, by default on port 110, providing access to spooled mail messages. Negotiated TLS using the POP
STLS
command will be enabled if the--server-tls
option is also given. -
--pop-auth <file> (-F)
Specifies a file containing valid POP account details. The file format is the same as for the SMTP server secrets file, ie. lines starting with
server
, with user-id and password in the third and fourth fields. A special value of/pam
can be used for authentication using linux PAM. -
--pop-by-name (-J)
Modifies the spool directory used by the POP server to be a sub-directory with the same name as the POP authentication user-id. This allows multiple POP clients to read the spooled messages without interfering with each other, particularly when also using
--pop-no-delete
. Content files can stay in the main spool directory with only the envelope files copied into user-specific sub-directories. Theemailrelay-filter-copy
program is a convenient way of doing this when run via--filter
. -
--pop-no-delete (-G)
Disables the POP DELE command so that the command appears to succeed but mail messages are not deleted from the spool directory.
-
--pop-port <port> (-E)
Sets the POP server's listening port number.
-
--port <port> (-p)
Sets the port number used for listening for incoming SMTP connections.
-
--prompt-timeout <time> (-w)
Specifies a timeout (in seconds) for getting the initial prompt from a remote SMTP server. If no prompt is received after this time then the SMTP dialog goes ahead without it.
-
--remote-clients (-r)
Allows incoming connections from addresses that are not local. The default behaviour is to ignore connections that are not local in order to prevent accidental exposure to the public internet, but a firewall should also be used. The definition of 'local' is different for IPv4 and IPv6.
-
--response-timeout <time> (-T)
Specifies a timeout (in seconds) for getting responses from remote SMTP servers. The default is 1800 seconds.
-
--server-auth <file> (-S)
Enables SMTP server authentication of remote SMTP clients. Account names and passwords are taken from the specified secrets file. The secrets file should contain lines that have four space-separated fields, starting with
server
in the first field; the second field is the password encoding (plain
ormd5
), the third is the client user-id and the fourth is the password. The user-id is RFC-1891 xtext encoded, and the password is either xtext encoded or generated byemailrelay-passwd
. A special value of/pam
can be used for authentication using linux PAM. -
--server-auth-config <config>
Configures the SMTP server authentication module using a semicolon-separated list of configuration items. Each item is a single-character key, followed by a colon and then a comma-separated list. A 'm' character introduces a preferred sub-set of the built-in authentication mechanisms, and an 'x' is used for blocklisted mechanisms.
-
--server-tls (-K)
Enables TLS for incoming SMTP and POP connections. SMTP clients can then request TLS encryption by issuing the STARTTLS command. The
--server-tls-certificate
option must be used to define the server certificate. -
--server-tls-certificate <pem-file>
Defines the TLS certificate file when acting as a SMTP or POP server. This file must contain the server's private key and certificate chain using the PEM file format. Keep the file permissions tight to avoid accidental exposure of the private key.
-
--server-tls-required
Makes the use of TLS mandatory for any incoming SMTP and POP connections. SMTP clients must use the STARTTLS command to establish a TLS session before they can issue SMTP AUTH or SMTP MAIL-TO commands.
-
--server-tls-verify <ca-list>
Enables verification of remote SMTP and POP clients' certificates against any of the trusted CA certificates in the specified file or directory. In many use cases this should be a file containing just your self-signed root certificate.
-
--size <bytes> (-M)
Limits the size of mail messages that can be submitted over SMTP.
-
--spool-dir <dir> (-s)
Specifies the directory used for holding mail messages that have been received but not yet forwarded.
-
--syslog (-k)
When used with
--log
this option enables logging to the syslog even if the--no-syslog
option is also used. This is typically used as a convenient override when using--as-client
. -
--tls-config <options> (-9)
Selects and configures the low-level TLS library, using a comma-separated list of keywords. If OpenSSL and mbedTLS are both built in then keywords of
openssl
andmbedtls
will select one or the other. Keywords liketlsv1.0
can be used to set a minimum TLS protocol version, or-tlsv1.2
to set a maximum version. -
--user <username> (-u)
When started as root the program switches to an non-privileged effective user-id when idle. This option can be used to define which user-id is used. Specify
root
to disable all user-id switching. Ignored on Windows. -
--verbose (-v)
Enables more verbose logging when used with
--log
, and more verbose help when used with--help
. -
--version (-V)
Displays version information and then exits.
A configuration file can be used to provide additional options; put each option on a separate line, use the long option names but without the double dash, and separate the option name from the option value with spaces.
All command-line options that specify a filename can use a special @app
substitution variable that is interpreted as the directory that contains
the emailrelay
executable or MacOS application bundle.
Message store
Mail messages are stored as text files in the configured spool directory. Each e-mail message is represented as an envelope file and a content file. The envelope file contains parameters relevant to the SMTP dialogue, and the content file contains the RFC-822 headers and body text.
The filenames used in the message store have a prefix of emailrelay
, followed
by a process-id, timestamp and sequence number, and then envelope
or
content
. The envelope files then have an additional suffix to implement a
simple locking scheme.
The envelope file suffixes are:
.new
-- while the envelope is first being written.busy
-- while the message is being forwarded.bad
-- if the message cannot be forwarded.local
-- for copies of the envelope file for delivery to local recipients
If an e-mail message cannot be forwarded the envelope file is given a .bad
suffix, and the failure reason is written into the file.
Forwarding
Spooled e-mail messages can be forwarded at various times, depending on the command-line options:
- when E-MailRelay first starts up (
--as-client
or--forward
) - as each message is submitted, just before receipt is acknowledged (
--immediate
) - as soon as the submitting client connection disconnects (
--forward-on-disconnect
) - periodically (
--poll=<seconds>
) - on demand using the administration interface's
flush
command (--admin=<port>
) - when a
--filter
script exits with an exit code of 103
These can be mixed.
When using --as-client
, or --dont-serve
and --forward
, the spooled
messages begin to be forwarded as soon as the program starts up, and the
program terminates once they have all been sent.
All recipient e-mail addresses must be accepted by the remote server when
E-MailRelay forwards an e-mail message. If any one recipient is rejected then
the message will be left in the spool directory with a .bad
suffix on the
envelope file.
Mail processing
The --filter
command-line option allows you to specify a mail processing
program which operates on e-mail messages as they pass through the E-MailRelay
system. The filter program is run as soon as the e-mail message has been stored
in the spool directory, with the full path of the content file and envelope
file put on the command-line.
For example, the following command will start a proxy server on port 587 which processes mail using the specified filter program, and then forwards the mail on to the system's default MTA (on port 25):
emailrelay --as-proxy=localhost:smtp --port=587 --no-syslog \
--filter=$HOME/myfilter --spool-dir=$HOME/spool
The filter program should terminate with an exit code of zero to indicate success, or a value between 1 and 99 to indicate failure. Exit codes between 100 and 115 are reserved for special processing: 100 is used to abandon the current e-mail message (so the filter can delete the files), and 103 has the effect of requesting a rescan of the spool directory if forwarding is enabled (typically to pick up on new messages that the filter program has created).
If the filter program terminates with a non-zero exit code then the first few
thousand characters of the standard output stream are searched for a line
starting with <<error text>>
or [[error text]]
. The text inside is taken
as a failure reason, and passed back to the SMTP client. A second error-text
line can be used for additional diagnostics that will not be visible to the
remote client.
The filter program can edit any part of the e-mail message's envelope file or content file: E-MailRelay remembers nothing about the e-mail message while the filter is running except the filename. However, if the message is deleted by the filter program then E-MailRelay will complain, so to avoid the error message use an exit code of 100.
If the filter program creates completely new e-mail messages in the spool
directory then they may not be processed immediately, or they may be completely
ignored. To get E-MailRelay to pick up any new messages you create in the
spool directory use the special 103 exit code, or rely on the --poll
mechanism, or perhaps run emailrelay --as-client
from within the filter
program.
As an example of a simple filter program processor this shell script examines
the sending client's IP address and conditionally passes the message into
sendmail
(using the sendmail command-line interface rather than SMTP):
#!/bin/sh
# filter.sh
content="${1}"
envelope="${2}"
ip="`awk '/MailRelay-Client:/ {print $2;exit}' \"${envelope}\"`"
if test "${ip}" = "192.168.0.2"
then
/usr/sbin/sendmail -t < "${content}"
rm -f "${envelope}" "${content}"
exit 100 # <= cancel further processing by emailrelay
fi
exit 0
The first thing this script does is convert the path of the content file which
it is given, into the corresponding envelope file. It then extracts the
client's IP address out of the envelope file using awk
. If this matches the
fixed address then it pipes the message content into sendmail, deletes the
e-mail message and exits with a value of 100. The exit value of 100 tells
E-MailRelay to forget the message, and not to complain about the files
disappearing.
For Windows this example can be rewritten in JavaScript:
// filter.js
var content = WScript.Arguments(0) ;
var envelope = WScript.Arguments(1) ;
var fs = WScript.CreateObject( "Scripting.FileSystemObject" ) ;
var ts = fs.OpenTextFile( envelope , 1 , false ) ;
var e = ts.ReadAll() ;
ts.Close() ;
var re = new RegExp( "MailRelay-Client: \(.*\)" ) ;
var ip = e.match(re)[1] ;
if( ip === "192.168.0.2" )
{
var sh = WScript.CreateObject( "Wscript.Shell" ) ;
sh.Run( "sendmail " + content ) ; // bogus
fs.DeleteFile( content ) ;
fs.DeleteFile( envelope ) ;
WScript.Quit( 100 )
}
WScript.Quit( 0 ) ;
Windows filter programs written in JavaScript can be run with an E-MailRelay
--filter
option something like this:
--filter="C:/Program Files/E-MailRelay/filter.js"
Note that double-quotes are needed because the file path contains a space. Either forward-slashes or back-slashes can be used.
E-MailRelay also has a --client-filter
option that enables processing of
e-mail messages just before they are forwarded, rather than after they are
stored. The disadvantage is that by then it is too late to notify the
submitting SMTP client of any processing failures, so in many store-and-forward
applications using --filter
is more useful. The special exit code of 100 can
be used to ignore the current message, and 102 to stop scanning for more
spooled messages after processing the current one (eg. for simple
rate-limiting).
Bear in mind the following points when writing --filter
programs:
- The standard input and output are not used; the message filename is passed on the command-line.
- Programs are run with a reduced set of environment variables.
- E-MailRelay files use CR-LF line terminators, as required by the RFCs.
- Envelope files will have a file extension of
.new
or.busy
when the program runs. - Windows scripts may need to be run via
cscript
or a batch file wrapper.
It is also possible to do message filtering in a separate process by using
net:<tcp-address>
as the --filter
or --client-filter
option parameter.
E-MailRelay connects to this address and then uses a simple line-based dialog
as each e-mail message is processed: it sends the full path of the message
content file in one line and expects the remote process to respond with an ok
line if the message is to be accepted or an error message. If the error message
contains a tab character then anything after the tab character is logged but
otherwise ignored.
Alternatively, use spam:<tcp-address>
or spam-edit:<tcp-address>
to connect
to a SpamAssassim spamd
server, or use exit:<exit-code>
for simulating a
filter program that just does an exit with the specified exit code.
Authentication
E-MailRelay can perform client-side
authentication when connecting to remote
SMTP servers, and server-side
authentication when remote clients connect to
the E-MailRelay server.
SMTP authentication is enabled with the --client-auth
and --server-auth
command-line options, followed by the name of a 'secrets' file containing
usernames and passwords:
emailrelay --as-server --server-auth=/etc/emailrelay-client.auth
emailrelay --as-client=example.com:smtp --client-auth=/etc/emailrelay-server.auth
The client-side secrets file specified with --client-auth
is used when
E-MailRelay acts as a client to talk to a remote server. The file should
contain at least one client
entry.
The server-side secrets file specified with --server-auth
is used when a
remote client tries to authenticate with the E-MailRelay server. The file
should normally contain several server
entries, one for each remote client.
The same secrets file may be specified for both --client-auth
and
--server-auth
options.
The secrets file has a line-based format: blank lines are ignored and the hash character (#) is used for comments.
Lines have four white-space delimited fields:
client-or-server
password-type
userid
password
The client-or-server
field must be client
or server
; the password-type
field should be plain
or md5
; the userid
field is xtext-encoded
user identifier; and the password
field is the xtext-encoded plain password
or a base64-encoded HMAC-MD5
state. For client
lines the password-type can
also be oauth
.
The first two fields are case-insensitive. The xtext
encoding scheme is
defined properly in RFC-3461, but basically it says that non-alphanumeric
characters (including space, +
, #
and =
) should be represented in
uppercase hexadecimal ascii as +XX
. So a space should be written as +20
;
+
as +2B
; #
as +23
; and =
as +3D
. Also note that modern email
services will expect userids and passwords containing non-ASCII characters to
use UTF-8 encoding with RFC-4013 normalisation applied.
Authentication proceeds according to an authentication 'mechanism' that is advertised by the server and selected by the client. Many authentication mechanisms have been defined and standardised, and the simplest ones just exchange a username and plaintext password. E-MailRelay supports the PLAIN, LOGIN and CRAM-MD5 mechanisms for both client-side and server-side authentication as a minimum, but other mechanisms might be built in or available via PAM (see below).
The PLAIN, LOGIN and CRAM-MD5 mechanisms can use plaintext passwords, stored
in the secrets file using a password-type of plain
. In addition, the
CRAM-MD5 mechanism can also use hashed passwords generated by the
emailrelay-passwd
program and these are stored in the secrets file with a
password-type of md5
. (Hashed passwords are marginally more secure because
the plaintext password which might be used on other accounts, is not easily
recovered. However, hashed passwords can only be used for HMAC authentication
mechanisms that are based on the same hash function.) The XOAUTH2 mechanism
can be used for client-side authentication using tokens that have been
recently obtained from a third-party authentication server and added to the
secrets file with a password-type of oauth
.
In the following example bob
is the username that E-MailRelay uses when
it authenticates with a remote SMTP server, and two usernames (alice
and
carol
) can be used by remote clients when they authenticate with the
E-MailRelay server:
#
# emailrelay secrets file
#
client plain bob password123
server plain alice e+3Dmc2
server plain carol my+20password
Using MD5
hashes the same users would look like this:
#
# emailrelay secrets file
#
client md5 bob 9N2IRYVXqu7SkOW1Xat+wpR9NbA2R6fb61XlmqW+46E=
server md5 alice v1HOpuLIbbvgoJjhueeoqwfvtIp2C+gMA285ke+xxow=
server md5 carol x6UJKQF9f7HfhS1M+PW4s8rXIoT+L+WoqLz+rBwSKbw=
When the --server-auth
option is used clients must authenticate with the
E-MailRelay server but it is possible to configure some client IP addresses as
'trusted' so that connections from these addresses do not have to authenticate.
Trusted IP addresses are configured with lines in the secrets file having
server
in the first field, none
in the second field, a wildcarded IP
address in the third field, and an arbitrary keyword in the fourth field. The
keyword field is passed to any external address verifier program specified by
the --address-verifier
command-line option; it is not used for any other
purpose. Wildcarded IPv4 addresses can use a format like 192.168.0.0/24 or
192.168.0.*.
For example, this secrets file allows any client connecting over IPv4 from the 192.168.0.0/24 address range, or over IPv6 from the fe80::/64 or fc00::/7 ranges, to connect without authentication:
#
# emailrelay secrets file
#
server none 192.168.0.* localipv4
server none fe80::/64 localipv6
server plain alice e+3Dmc2
server plain carol my+20password
On the client side, authentication is performed when E-MailRelay connects to a server that implements the SMTP AUTH extension with one of the supported mechanisms. If client-side authentication is required but the remote server does not support the AUTH extension, or does not support mechanisms for which E-MailRelay has secrets, then an error will be logged and no messages will be forwarded.
When E-MailRelay successfully authenticates with the remote server the
authentication name is passed as the AUTH parameter of the SMTP MAIL FROM
command, ignoring any AUTH name from the original submission. This default
policy can be modified by editing the MailFromAuthOut
field in the message
envelope file, perhaps by using a --filter
or --client-filter
program. The
value in this envelope field should be empty for the default policy, <>
for
no AUTH name, or an xtext-encoded authentication name.
The TLS layer can also be used for authentication, independently of SMTP, as described below.
TLS encryption
E-MailRelay can use negotiated TLS to encrypt SMTP and POP sessions: to enable
client-side TLS encryption when E-MailRelay is acting as an SMTP client use the
--client-tls
command-line option, and to enable server-side TLS when
E-MailRelay is acting as an SMTP or POP server use --server-tls
. The
connections start off as unencrypted and the SMTP command STARTTLS
(or the
POP STLS
command) can be used to negotiate TLS encryption before any
passwords are exchanged.
The --server-tls
option requires that the --server-tls-certificate
option
is used to specify a PEM-format file containing a X.509 certificate and private
key.
This OpenSSL command can be used to create a self-signed certificate file suitable for testing:
$ openssl req -x509 -nodes -subj "/CN=$USER" -newkey rsa:2048 -keyout emailrelay.pem -out emailrelay.pem
TLS performs encryption to prevent eavesdropping, but it does not necessarily
do authentication to prevent man-in-the-middle attacks. For full TLS
authentication you must use private keys and X.509 certificates symmetrically
on both ends, with TLS verification enabled in both directions. Refer to the
documentation of all the --server-tls...
and --client-tls...
command-line
options for more details.
E-MailRelay can also make outgoing SMTP connections using TLS encryption where
the whole SMTP dialog is encrypted from the start (--client-tls-connection
).
This is sometimes called SMTP-over-TLS or secure SMTP (smtps) or implicit TLS
and it is normally used with port number 465.
PAM Authentication
E-MailRelay on Linux supports the use of PAM (Pluggable Authentication Modules)
for authentication if it has been built with the --with-pam
configure option.
PAM authentication can be used to authenticate SMTP and POP connections coming in from remote clients; it cannot be used by E-MailRelay to supply passwords when acting as an SMTP client.
Use --server-auth=/pam
and/or --pop-auth=/pam
on the command-line to use
PAM authentication for SMTP and POP respectively. The E-MailRelay server will
then advertise an SMTP authentication mechanism of PLAIN and do the actual
authentication via PAM.
The PAM system itself must be configured with a service of emailrelay
. This
normally involves creating a file /etc/pam.d/emailrelay
containing something
like the following:
auth requisite pam_unix.so nullok_secure
session required pam_permit.so
account required pam_permit.so
password required pam_deny.so
With this configuration the E-MailRelay server will use normal unix system account names and passwords to authenticate remote clients. On some systems this will require special permissioning to allow the E-MailRelay server to read the shadow password database.
When using PAM authentication E-MailRelay requires that remote clients establish an encrypted session using TLS before authentication can proceed.
IP addresses
By default the E-MailRelay server listens for connections on the wildcard IPv4 and IPv6 addresses, and when making outgoing connections it does not explicitly bind any address to the the local socket.
If a single network address is specified with the --interface
command-line
option then that address is used for listening.
Eg:
--interface 127.0.0.1
If the --client-interface
option is used then that address is used to bind
the local end of outgoing SMTP client connections.
Eg:
--client-interface 192.168.0.1
More than one address can be given in the --interface
option separated by
commas, or multiple --interface
options can be used. All of those addresses
will be used for listening.
Eg:
--interface 192.168.0.1,127.0.0.1,fc00::1,::1
--interface 192.168.0.1 --interface 127.0.0.1 --interface fc00::1 --interface ::1
A listening address can also be qualified by one of the prefixes smtp=
,
pop=
or admin=
so that it is only used in that context.
Eg:
--interface smtp=192.168.0.1 --interface pop=127.0.0.1 --interface admin=127.0.0.1
The IPv4 and IPv6 wildcard addresses (0.0.0.0
and ::
) can be used with
--interface
and --client-interface
to enable the use of IPv4 only or IPv6
only.
To use IPv4 only for incoming connections use --interface 0.0.0.0
; for IPv6
only on incoming connections use --interface ::
.
--interface 0.0.0.0 # IPv4 only
--interface :: # IPv6 only
To use IPv4 only on outgoing SMTP connection use --client-interface 0.0.0.0
;
for IPv6 only on outgoing SMTP connections use --client-interface ::
.
--client-interface 0.0.0.0 # IPv4 only
--client-interface :: # IPv6 only
Hostnames given in the --forward-to
, --as-proxy
and --as-client
options
are resolved to IPv4 addresses and/or IPv6 addresses using DNS. If both IPv4
and IPv6 records are returned from the DNS query then the --client-interface
option can be used to select either the IPv4 or IPv6 results. Otherwise the
first address is used, whether that is IPv4 or IPv6.
Eg:
--as-client ipv4or6.example.com:25 --client-interface 0.0.0.0
--as-client ipv4or6.example.com:25 --client-interface ::
SOCKS
E-MailRelay can use a SOCKS 4a proxy for establishing outgoing SMTP
connections; just append the SOCKS proxy address to the SMTP server's address,
separated by @
.
For example, this could be used to send e-mails via the Tor network, assuming there is a local Tor node running on port 9050:
emailrelay --forward-to example.com:smtp@localhost:9050 ...
The Tor system will then be used to resolve the example.com
domain name and
establish the connection. The target SMTP server will see a connection coming
from the Tor exit node rather than from the E-MailRelay server.
Address verification
By default the E-MailRelay server will accept all recipient addresses for
incoming e-mails as valid. This default behaviour can be modified by using an
external verifier program, specified with the --address-verifier
command-line
option, so that you get to choose which recipient addresses are accepted as
valid and which are rejected.
Your verifier program is passed a command-line containing: (1) the recipient
e-mail address as supplied by the remote client, (2) the from
e-mail address
as supplied by the client, or the empty string in the case of the VRFY
command, (3) the IP address and port of the far end of the client
connection, (4) the local fully qualified domain name, (5) the authentication
mechanism used by the client (if any, and none
if trusted), and (6) either
the authentication name or the fourth field from authentication secrets file
if a trusted IP address.
So, for example, a verifier program called myverifier
might be run as if with
the following command-line:
myverifier bob@local.net alice@example.com 192.168.0.1:123 local.net login alice
The verifier program is expected to generate two lines of output on the standard output stream and then terminate with a specific exit code.
For future-proofing a verifier must report a version number of 2.0
if called
with a command-line starting with --emailrelay-version
.
For valid addresses the first line of output is ignored, the second line should be copied from the first command-line argument, and the exit value should be one.
#!/bin/sh
# address verifier -- accept all (252)
echo ""
echo $1
exit 1
If the address is valid but it should be delivered to a local mailbox rather than forwarded then the verifier program should write two lines to the standard output -- the full name associated with the mailbox, and the canonical mailbox name -- and then exit with a value of zero.
#!/bin/sh
# address verifier -- accept as local (250)
echo Local Postmaster '<postmaster@localhost>'
echo postmaster
exit 0
For E-MailRelay local delivery just means that the message files in the spool
directory are copied to files with a .local
filename suffix. If all the
envelope recipients are local-mailboxes then no normal message files are
created. This mechanism can be used to create a separate channel for
administrative messages such as delivery reports.
For invalid addresses the exit value should be non-zero and the first line of output is the error response.
#!/bin/sh
# address verifier -- reject as invalid (550)
echo invalid mailbox: $1
exit 2
To indicate a temporary failure this can be changed to an exit code of 3.
#!/bin/sh
# address verifier -- reject as temporarily invalid (450)
echo mailbox unavailable: $1
exit 3
If the verifier exit code is 100 then the connection is aborted immediately, which may be useful in limiting the impact of denial of service attacks:
#!/bin/sh
# address verifier -- abort
exit 100
In this more complete example the verifier script accepts all addresses as
valid as long as they contain an at
character:
#!/bin/sh
# address verifier -- accept only if containing an at sign
address="$1"
expr "$address" : ".*@" > /dev/null || exit 2
echo ""
echo "$address"
exit 1 # accept
As another example, this verifier script accepts all recipient addresses by default but rejects remote addresses if the client has bypassed authentication by connecting on a trusted IP address:
#!/bin/sh
# address verifier
if test "$1" = "--emailrelay-version" ; then echo 2.0 ; exit 0 ; fi
address="$1"
local_domain="$4"
auth_mechanism="$5"
host="`echo \"$address\" | sed 's/.*@//'`"
if test "$auth_mechanism" = "none" -a "$host" != "$local_domain"
then
echo "cannot relay without authentication"
exit 2 # reject the recipient address
fi
echo ""
echo "$address"
exit 1 # accept the recipient address
or written in JavaScript for Windows:
// verifier.js
if( WScript.Arguments(0) === "--emailrelay-version" )
{
WScript.Stdout.WriteLine( "2.0" ) ;
WScript.Quit( 0 ) ;
}
try
{
var address = WScript.Arguments(0) ;
var local_domain = WScript.Arguments(3) ;
var auth_mechanism = WScript.Arguments(4) ;
var host = address.split(/@/)[1] || "" ;
if( ( auth_mechanism === "none" || !auth_mechanism ) && host !== local_domain )
{
WScript.Stdout.WriteLine( "cannot relay without authentication" ) ;
WScript.Quit( 2 ) ;
}
WScript.Stdout.WriteLine( "" ) ;
WScript.Stdout.WriteLine( address ) ;
WScript.Quit( 1 ) ;
}
catch( e )
{
WScript.Stdout.WriteLine( "mailbox unavailable" ) ;
WScript.Stdout.WriteLine( e ) ;
WScript.Quit( 3 ) ;
}
If this verifier script is used with a suitable --server-auth
file then it
can be used to prevent open relay without restricting authenticated clients.
It is also possible to verify addresses in a separate daemon process by using a
--address-verifier
option of the form net:<tcp-address>
. In this case
E-MailRelay will connect to the specified verifier daemon over the network and
send address verification requests as lines with pipe-delimited fields. The
expected response is another pipe-delimited line containing the same
information as returned by verifier scripts but in reverse, such as
3|address unavailable
or 0|postmaster|Local Postmaster <postmaster@eg.com>
.
Connection blocking
All incoming connections from remote network addresses are blocked by default,
but can be allowed by using the --remote-clients
/-r
option. This is to
guard against accidental exposure to the internet.
Incoming SMTP connections can also be checked against DNSBL blocklists in order
to block connections from known spammers. Use the --dnsbl
option to define a
list of DNSBL servers, together with a rejection threshold. If the threshold
number of servers 'deny' the incoming connection's network address then
E-MailRelay will drop the connection immediately.
The --dnsbl
configuration starts with the DNS server network address and a
millisond timeout, followed by the threshold and list of servers:
emailrelay -r --dnsbl 1.1.1.1:53,500,1,spam.example.com,block.example.com ...
A threshold of zero means that the DNSBL servers are consulted but connections
are always allowed. This can be combined with verbose logging (--log -v
)
for initial testing.
If the timeout period expires before a collective decision is reached then the connection is allowed. This default behaviour can be changed by using a negative timeout, but for finer control use a DNSBL proxy.
Connections from loopback and private (RFC-1918) network addresses are never checked.
Security issues
The following are some security issues that have been taken into consideration:
-
Effective userid
Suid privileges are revoked at start-up, switching the effective userid/groupid to be the real userid/groupid values. If started as
root
then the effective userid/groupid are switched at start-up to those of userdaemon
. Special privileges are only reclaimed when needed to bind sockets and do file i/o. Normally this means temporarily switching the userid and groupid back to what they were at start-up. However, when writing spool files after being started asroot
only the effective userid is changed, not the groupid, so that new files have group ownership corresponding to thedaemon
user. -
Execution environment
The external filter programs are run with an almost empty set of environment variables (
PATH
andIFS
), and with no open file descriptors other thanstdin
andstderr
open onto/dev/null
, andstdout
open onto a pipe. -
Umask
The program runs for most of the time with a
umask
of 177, switching to 117 when creating spool files. -
Remote clients
By default connections will be rejected if they come from remote machines.
-
Remote configuration
No configuration parameters can be changed through the administrative interface.
-
Use of exec() and system()
No exec(), system() or popen() calls are used other than execve() to spawn the mail filter and/or address verifier.
-
File permissions
After a normal installation the spool directory is has ownership of
root.daemon
with permissions of-rwxrwxr-x
and messages files are created with permissions of-rw-rw----
. This allows normal users to list messages files but not read them.The
emailrelay-submit
program is given group ownership ofdaemon
with its group set-user-id flag set. This allows it to create message files in the spool directory, and the files created end up owned by the submitter but with group ownership ofdaemon
. -
Logging
Logging output is conditioned so that ANSI escape sequences cannot appear in the log.
Passwords and message content are not logged (except if using the
--debug
option at run time with debug logging enabled at build time). -
Information leakage
The
--anonymous
option can be used to reduce the amount of information leaked to remote clients. -
Mandatory encryption
When using PAM for authentication all clients are required to use TLS/SSL encryption.
Security issues which relate to the SMTP protocol itself are beyond the scope of this document, but RFC-2821 makes the following observation: "SMTP mail is inherently insecure in that it is feasible for even [..] casual users to [..] create messages that will trick a [..] recipient into believing that they came from somewhere else. [..] Real [..] security lies [..] in end-to-end methods [..] such as those which use digital signatures."
The Authentication
, PAM Authentication
and TLS encryption
sections
above also relate to security.
Administration interface
If enabled with the --admin
command-line option, the E-MailRelay server will
provide a network interface for performing administration tasks. This is a
simple command-line interface which is compatible with netcat
and telnet
:
$ emailrelay --as-server --port=125 --forward-to=localhost:25 --admin=10026
$ telnet localhost 10026
E-MailRelay> help
E-MailRelay> quit
The flush
command is used to get the E-MailRelay server to forward spooled
mail to the next SMTP server.
The list
command lists the messages in the spool directory, status
provides
network status information and activity statistics, and notify
enables
asynchronous event notification.
Bcc handling
E-MailRelay transfers e-mail messages without changing their content in any
way, other than by adding a Received
header. In particular, if a message
contains a Bcc:
header when it is submitted to the E-MailRelay server it
will have the same Bcc:
header when forwarded.
It is normally the responsibility of the program that submits an e-mail
message to submit it separately for each Bcc
recipient, removing the Bcc:
header from the message content or changing it to contain only the 'current'
recipient. If this is not done, perhaps through mis-configuration of the
e-mail user agent program, then Bcc
recipients may be visible to the To
and Cc
message recipients.
An E-MailRelay --filter
script can be used to reject messages with incorrect
Bcc:
headers, and an example script is included.
Files and directories
On Unix-like systems E-MailRelay installs by default under /usr/local
, but
binary distributions will probably have been built to install elsewhere.
Installation directories can be defined at build-time by the following
configure
script command-line options:
- --mandir=<dir>
- --sbindir=<dir>
- e_bsdinitdir=<dir>
- e_docdir=<dir>
- e_examplesdir=<dir>
- e_icondir=<dir>
- e_initdir=<dir>
- e_libexecdir=<dir>
- e_pamdir=<dir>
- e_spooldir=<dir>
- e_sysconfdir=<dir>
- e_rundir=<dir>
These are all defaulted to paths that are ultimately based on --prefix
, so
./configure --prefix=$HOME
will work as expected.
For a directory structure conforming more closely to the FHS use this configure command:
./configure --prefix=/usr --localstatedir=/var --libexecdir=/usr/lib --sysconfdir=/etc e_initdir=/etc/init.d e_rundir=/run/emailrelay
It is possible to change the installation root directory after building by
using make DESTDIR=<root> install
or DESTDIR=<root> make -e install
.
However, this will not affect the default spool directory path built into the
scripts and executables so the correct spool directory will have to be
specified at run-time with the --spool-dir
command-line option.
On Windows the installation GUI prompts for two installation directories,
and these default to %ProgramFiles%/E-MailRelay
for programs and
%ProgramData%/E-MailRelay
for data.
Copyright (C) 2001-2019 Graeme Walker