DragonFly On-Line Manual Pages
exact.conf(5) DragonFly File Formats Manual exact.conf(5)
NAME
exact.conf - exact(8) configuration file
DESCRIPTION
The exact configuration file is the only configuration file for
exact(5) which provides POP-before-SMTP-relay-authentication for unix
systems. This file specifies all configuration parameters required for
exact to function. The file consists of name value pairs, separated by
whitespace. Comments are introduced using a hash ('#') character.
PARAMETERS
user the username the EXACT daemon should run under. It is strongly
recommended that you run this in a mail group, or something
similar, and allow access to the appropriate system logs to that
group. See the SECURITY document distributed with EXACT.
Defaults to mailnull.
group the group the EXACT daemon should use. Defaults to mailnull
pidfile
the daemon will write it's process id to this file, to allow it
to be controlled. Defaults to /var/run/exact/exact.pid.
maillog
this is the file the daemon watches. Defaults to
/var/log/maillog.
match the regular expression used to identify the user and ip address
to authenticate. The first bracketed expression should be the
username and the second the hostname.
authtype
the type of relay state table used. If exact was compiled with
the --with-db switch to configure, then you can use Berkeley DB
format state tables. Otherwise you must use text format tables.
The only valid values for this parameter are 'db' and 'text'.
authfile
the file the ip addresses to allow relay for are written to.
Defaults to /var/state/exact/relay.
authtemp
a temporary file for writing the relay data to. This is then
moved to "authfile" atomically, to avoid race conditions. This
should be on the same disk as "authfile". Defaults to
/var/state/exact/relay.tmp.
dumpfile
if you send the exact process a SIGUSR1, it will dump it's state
table to this file. Defaults to /var/state/exact/dump.
timeout
the number of seconds before an ip address is removed from the
relay file. Defaults to 1800 seconds (30 minutes).
flush the period, in seconds, between flush cycles. The daemon checks
this often to see if ip addresses should be removed, if they are
older than (timeout) seconds. Defaults to 300 (5 minutes).
suspicious
the time, in seconds, for which an unchanged logfile will
trigger a reopen. this is designed to detect rotated logfiles.
Defaults to 120 (2 minutes).
SEE ALSO
exact(8)
AUTHOR
Doug Winter <doug@pigeonhold.com>
LICENSE
This software is released under the GNU General Public License
exact.conf(5)