All Global Settings

g_access_group

Access groups

Access rules defining groups of IP addresses with certain POP, IMAP and SMTP privileges. When a user is authenticated access is checked against group membership defined in the “mailaccess” field in the authentication database. See accounts for more information.

eg. this could allow you to charge webmail users for pop access privileges:
g_access_group group=paid_user access_pop=* access_imap=* access_smtp=* 
g_access_group group=free_user access_pop=webmail.svr.ip access_imap=webmail.svr.ip access_smtp=webmail.svr.ip 

with “Access type” set to “free_user” on accounts page or equivalently in nwauth authentication database:
marijn@mydomain.com:{ssha}tVANQo…:created=”1060034937″ mailaccess=”free_user” …

To prevent webmail access for some users you would do this:

g_access_group_default “normal”
g_access_group group=”normal” access_pop=”*” access_imap=*” access_smtp=”*”
g_access_group group=”nowebmail” access_pop=”*,!webmail.ip” access_imap=”*,!webmail.ip” access_smtp=”*”

And put the users you want to limit in a group called ‘nowebmail’ e.g.

lookup fred@domain
+OK fred@domaing config 0 mailaccess=”nowebmail”

Syntax: g_access_group group=string access_pop=string access_imap=string access_smtp=string access_incoming=string

g_access_group_default

Access group defaults

Access group defaults for users with no access groups set. (must be used in conjunction with g_access_group)

Syntax: g_access_group_default string

g_access_webonly

Users in this group can only use web not imap or pop

This setting has no further documentation currently available

Syntax: g_access_webonly string

g_access_surgeweb

Apply g_access_group rules to surgeweb sessions based on client’s address

This setting has no further documentation currently available

Syntax: g_access_surgeweb bool

g_acctlog_sum_inactive

Summarise local accounts that have not logged in yet as not_loggedin_yet@domain.com

This setting has no further documentation currently available

Syntax: g_acctlog_sum_inactive bool

g_admin_readonly

System admins with readonly access to the management interface

This setting has no further documentation currently available

Syntax: g_admin_readonly string

g_admin_ip

Admin IP access

Mask of valid IP addresses for admin users (default *), this is a security setting you can use to restrict remote web admin access to trusted IP addresses. One is always allowed to use manage SurgeMail using 127.0.0.1 regardless of whether this is explicitly specified.

eg. To restrict to local network as per net mask
g_admin_ip “10.0.0.*,10.1.2.*” 

Syntax: g_admin_ip string

g_admin_localhost

Allow localhost web admin without user/pass

Allows a localhost connection to access the web admin port without using the administrator username / password. This is good if you keep forgetting the admin password like I do.

Syntax: g_admin_localhost bool

g_admin_guesses

Number of guesses allowed for admin.

Syntax: g_admin_guesses “number”

This sets the number of guesses allowed for the admin username/password. Once this has been reached the ip is banned.

Syntax: g_admin_guesses int

g_alias_login_disable

Disable user login as alias

Stops the user login to pop or imap as the alias account

Syntax: g_alias_login_disable bool

g_apple_bug1

Apple bug allow content-length headers

This setting has no further documentation currently available

Syntax: g_apple_bug1 bool

g_apple_bug2

Apple bug2 don’t try and return bad if looping

This setting has no further documentation currently available

Syntax: g_apple_bug2 bool

g_archive

rchive-on-delete-off-disables-archive-and-instead-deletes-the-files-immediately" >

Purged monthly or by tellmail purge_deleted_users

Syntax: g_archive_on_delete_off bool

g_archive_tcpip

Rules for TCPIP archive process

Contact netwin for more details of this mechanism if you wish to use it.

Syntax: g_archive_tcpip to=string from=string path=string dom=string

g_archive_tcpip_host

Host to send archive data too

When using an archive server this defines the host that is running the archive server. Contact netwin if you need more info on this feature.

Syntax: g_archive_tcpip_host string

g_archive_bucketsize

Size for archive bucket files. Default is 1mb

Sets the size of the archive buckets used by the circular archives. If set too large then editing the buckets manually is awkward.

Syntax: g_archive_bucketsize int

g_archive_early

Apply all archive rules before content filtering is applied (obsolete)

This will apply the archive rules before content filtering is applied. This can be user to capture the source message if it is getting stored or bounced unnecessarily by any of the SurgeMail filters. The early flag on individual archive rules should be used instead of this setting.

Syntax: g_archive_early bool

g_archive_on_delete_off

Disables archive and instead deletes the files immediately

Purged monthly or by tellmail purge_deleted_users

Syntax: g_archive_on_delete_off bool

g_archive_on_delete_dir

Directory to archive user files to on delete

Directory to archive deleted users files to. Defaults to ‘archive_deleted’ in the SurgeMail installation folder.

Syntax: g_archive_on_delete_dir string

g_archive_files

Archive attachments to a directory

Each message to the named account will have it’s attachments removed and placed in the named directory. The path can contain the symbols $month$ $year$ $day$ $second$. The ‘second’ is only within this day. Together these variables can be used to ensure a unique path is used for each file if the names might conflict. Use g_redirect_cc to archive email going to an existing account because if you set ‘to’ equal to a real account then the real account will stop receiving messages!

Syntax: g_archive_files path=string to=string files=string

g_atrest_all

Auto encrypt all msgs when users next login

This setting has no further documentation currently available

Syntax: g_atrest_all bool

g_atrest_enable

At rest encryption. Unwise usually!

This setting has no further documentation currently available

Syntax: g_atrest_enable bool

g_atrest_crazy

No recovery admin password needed

This setting has no further documentation currently available

Syntax: g_atrest_crazy bool

g_atrest_api

Enabe api for enabling atrest encryption – not needed

This setting has no further documentation currently available

Syntax: g_atrest_api bool

g_attach_convert

Process matching attachments with specified command. Passed two files names

This setting has no further documentation currently available

Syntax: g_attach_convert to=string from=string subject=string files=string output=string command=str

g_atrn_server

On Demand Mail Relay settings to define user/pass for clients to fetch mail

This allows a client on a dynamic IP to connect and request mail for a specific domain after authenticating by using the ATRN command. Typically this is done on the special port 366

Syntax: g_atrn_server domain=string user=string pass=string

g_atrn_client

Define a rule for fetching email using ATRN protocol

This is the setting for clients to define to fetch mail from an upstream server. Typically this is done on the special port 366, to specify another port use host:port in the host setting. E.g. host=”smtp.upstream.com:25″

Syntax: g_atrn_client domain=string user=string pass=string host=string

g_atrn_port

Port to listen for ‘atrn’ (On Demand Relay) requests

See g_atrn_server for more details, the default is port 366, atrn is not obeyed on port 25

Syntax: g_atrn_port string

g_assume_created_epoch

If user has no ‘created’ field assume they were created an arbitrarily large time in the past

This setting effect the g_disable_smtp_after and g_delete_user_after settings which, by default, ignore users who have not logged in and have no created field.

Syntax: g_assume_created_epoch bool

g_backtrace_disable

Backtrace Disable

Disable backtrace information for unix systems.

Syntax: g_backtrace_disable bool

g_bad_login_mins

Minutes to block login for, if consecutive bad ones received

Minutes to block login for, if consecutive g_badlogin_allow or g_badlogin_ip_allow bad logins received=.

Syntax: g_bad_login_mins int

g_bad_login_allow

Number of consecutive bad logins for a user before blocking that user

Number of consecutive bad logins for a user before blocking that user.

Syntax: g_bad_login_allow int

g_bad_login_ip_allow

Number of bad logins from an IP before blocking that IP

Number of bad logins from a single IP before blocking that IP.

Syntax: g_bad_login_ip_allow int

g_bad_login_ip_ignore

IP address(es) to allow any number of bad logins from

Use for webmail system or other local gateway to stop bad login counter from locking out all users.

Syntax: g_bad_login_ip_ignore string

g_bad_login_dumb

Give login failures even if known address

This disables the smart feature so this setting will probably catch real users 🙂

Syntax: g_bad_login_dumb bool

g_bad_login_lockout

Lockout addresses permenantly – use if DOS attack

This can reduce load during DOS attack.

Syntax: g_bad_login_lockout bool

g_bank_url

URL to charge a credit card (experimental)

This allows automated monthly charging of users

Syntax: g_bank_url string

g_bank_user

Username for authenticated web request to banks system

See g_bank_url for details

Syntax: g_bank_user string

g_bank_pass

Password for authenticated web request to banks system

See g_bank_url for details

Syntax: g_bank_pass string

g_bank_ok

Find this in response, if found then charge was successful

See g_bank_url for details

Syntax: g_bank_ok string

g_bank_reason

This line is returned to user if it is found

See g_bank_url for details

Syntax: g_bank_reason string

g_bank_log

Log lines matching this in response.

See g_bank_url for details

Syntax: g_bank_log string

g_bank_debug

Log request to bank server

Use when trying to debug the g_bank_url post/response

Syntax: g_bank_debug bool

g_bank_group

Create price groups with descriptions

See g_bank_url for details

Syntax: g_bank_group group=string price=string desc=string

g_block_wild

Block wildcards in usernames

Block the ‘*’ wildcard character in usernames.

Syntax: g_block_wild bool

g_body_filter

Enable user email body filtering

Allows the user to configure filters which filter the body of incoming messages

Syntax: g_body_filter bool

g_broad_url

URL to this server

Customer specific feature

Syntax: g_broad_url string

g_broad_server

URL to BroadSoft server

Customer specific feature

Syntax: g_broad_server string

g_broad_user

BroadSoft user

Customer specific feature

Syntax: g_broad_user string

g_broad_pass

BroadSoft pass

Customer specific feature

Syntax: g_broad_pass string

g_broad_port

BroadSoft port

Customer specific feature

Syntax: g_broad_port string

g_broad_noadd

Disable buttons on message

Disables the added buttons for voice messages

Syntax: g_broad_noadd bool

g_bull_rule

Post bulletins to this domain

Senders must be authenticated user that matches the sender, domain can be blank to send to all domains, the to field is the address you will send posts to, typically something like: bulletins@your.domain.name

Syntax: g_bull_rule to=string domain=string sender=string

g_no_bull

Special accounts that should not get bulletins

This setting has no further documentation currently available

Syntax: g_no_bull string

g_calendar_version

CalDAV / SabreDAV calendaring configuration version number

This setting has no further documentation currently available

Syntax: g_calendar_version int

g_comment

Management notes and comments about the server

This is a dummy setting that lets you store information in the ini file that will survive setting changes from the web admin tool.

Syntax: g_comment date=string name=string comment=string

g_centipaid

see 

Authentication server and port for CentiPaid.

Syntax: g_centipaid string

g_country_ip

Tag messages with country of origin

Downloads a ip to country database and then adds a header based on that to each message to show where it came from. This file iptocountry2.csv.enc should appear in your surgemail home directory after enabling this setting (restart surgemail too), if the file doesn’t appear you can download it via http://updates.netwinsite.com/updates/iptocountry2.csv.enc , tellmail aspam_update may trigger the download!

Syntax: g_country_ip bool

g_country_login

List of countries to allow logins from, 2 letter codes

Make sure g_country_ip is enabled

Be aware that country based rules are only 99% reliable as the database for converting ip addresses to countries is never perfect

Syntax: g_country_login string

g_country_allow

user@domain list to bypass country_login rule

This setting has no further documentation currently available

Syntax: g_country_allow string

g_country_allowip

Ip addresses to bypass country_login rule

This setting has no further documentation currently available

Syntax: g_country_allowip string

g_cpu_slow

Email warning if no cpu for this many seconds

Default is 10 seconds, helps detect system lockups and alert the manager

Syntax: g_cpu_slow int

g_create_apply

List of user groups to apply create_* settings for.

This setting allows you to apply create_* settings to domain admin accounts. Specify g_access_group names and domain admins in these groups will have create_* settings applied to them when adding users in the domain admin interface.

Syntax: g_create_apply string

g_create_apply_admin

Apply allow* rules to the administrator

Without this setting the admin can create usernames that contain any characters pretty much

Syntax: g_create_apply_admin bool

g_create_allow

List of characters allowed in usernames/passwords

Defaults to A-Za-z0-9\-_. meaning usernames/password may contain letters, numbers, -, _ and . and nothing else.

Syntax: g_create_allow string

g_create_cleanup

Cleanup existing data before adding a user

This causes a delete to be actioned for a user before/as they are created. This ensures the new user does not end up with any files, on any mailing lists, with any aliases etc from a previous user of the same name/address. If you delete users from the authent database directly i.e. not using the surgemail web admin or calling ‘tellmail delete_user’ then this setting will cleanup the users files when their address is re-used.

Syntax: g_create_cleanup bool

g_create_allow_pass

List of characters allowed in passwords

Settting overriding g_create_allow just for passwords.

Syntax: g_create_allow_pass string

g_create_strict

Whether to apply strict rules to usernames/passwords

Checking this causes surgemail to check passwords do not contain words longer than 4 characters from g_create_dictionary as well as requiring the password to be 6+ characters, and usernames/passwords to contain more than 1 character.

Syntax: g_create_strict bool

g_create_pass_digit

Require one digit and letter in a password

This setting has no further documentation currently available

Syntax: g_create_pass_digit bool

g_create_pass_recheck

Recheck passwords during login and warn user if g_hack_touser is true

This setting has no further documentation currently available

Syntax: g_create_pass_recheck bool

g_create_pass_recheck_text

Added to end of recheck email to give users a url to a help page

This setting has no further documentation currently available

Syntax: g_create_pass_recheck_text string

g_create_strict_admin

Enforce strict rules for admins too, set g_create_strict AS WELL!!

This setting has no further documentation currently available

Syntax: g_create_strict_admin bool

g_create_dictionary

File containing dictionary words to compare passwords to

Text file containing one word per line, passwords are compared to all words longer than 4 characters in this file, if a username or password contains a word in this file it is not allowed. Only takes effect if g_create_strict is checked.

Syntax: g_create_dictionary string

g_create_badnames

List of illegal usernames

Comma separated list of illegal usernames, may contain wild cards, if username contains part of a non-wild card or matches a wildcard it is disallowed.

Syntax: g_create_badnames string

g_create_record_ip

Causes surgemail to store ipnum in the authent database

This setting has no further documentation currently available

Syntax: g_create_record_ip bool

g_create_user_length

Limit the length of usernames

This is applied during user self creation. Set admin to true to restrict the domain and global admin also.

Syntax: g_create_user_length min=int max=int admin=bool

g_create_pass_length

Limit the length of user passwords

This is applied during user self creation and when users change passwords. Set admin to true to restrict the domain and global admin also.

Syntax: g_create_pass_length min=int max=int admin=bool

g_create_pass_slack

Slacken restrictions on trivial password creation

Useful sometimes for provisioning, allows username=password

Syntax: g_create_pass_slack bool

g_create_pass_mixed

Require mixed case passwords

Require mixed case passwords

Syntax: g_create_pass_mixed bool

g_create_pass_special

Require special character, e.g. !@#$%^&*(){}[];:?><.,

Require a special character

Syntax: g_create_pass_special bool

g_create_pass_notuser

Ban password containing username

Ban password if it conains the username

Syntax: g_create_pass_notuser bool

g_pass_force

Force user to reset password if admin changes it

Makes the user change the password on the next login to user.cgi or surgeweb

Syntax: g_pass_force bool

g_pass_twofactor

factor-life-session-life-in-minutes-dflt-4-hours" >

Allow users to enable two factor authentication.

Syntax: g_pass_twofactor_life int

g_pass_twofactor_life

Session life in minutes, dflt 4 hours

Allow users to enable two factor authentication.

Syntax: g_pass_twofactor_life int

g_pass_twofactor_merged

Require +code for imap/pop logins sometimes

Requires merged login.

Syntax: g_pass_twofactor_merged bool

g_recover_noquestions

Remove question based password recovery system

This setting has no further documentation currently available

Syntax: g_recover_noquestions bool

g_recover_reminder

Send users reminder email monthly until they set a recovery email address

This setting has no further documentation currently available

Syntax: g_recover_reminder bool

g_disable_smtp_after

Number of days an account can remain unread before delivery is disabled

DO NOT USE THIS SETTING IN A MIRROR/CLUSTER SETUP

Number of days an account can remain unread before delivery is disabled. 

Syntax: g_disable_smtp_after int

g_disable_skip

Ip address of senders to accept email from even if user account is disabled due to g_disable_smtp_after

Useful to ensure delivery for important company notices

Syntax: g_disable_skip string

g_disable_exclude

Field and value that excludes an account from g_disable_smtp_after

If the authent response includes this field/value pair then the user account will not be disabled from receiving messages

Syntax: g_disable_exclude field=string value=string

Example: field=”noexpire” value=”true”

g_delete_user_after

Number of days an account can remain unread before it is deleted

Number of days an account can remain unread before it is deleted. This setting cannot be used on an authent_domain FALSE domain unless it has a prefix setting.

e.g.
DELETE_USER_AFTER “30”
Then issue the command:
tellmail expire_accounts
Then examine users_delete.rec to see it is a valid list of old accounts, then use:
tellmail delete_user FILE users_delete.rec

To actually delete the accounts.

Syntax: g_delete_user_after int

g_delete_user_mode

What to do when an account is unread

You can set this to “file” or “suspend”. “file” causes accounts to be written to the users_delete.rec file, which you can action by running “tellmail delete_user FILE” or “tellmail delete_user FILE users_delete.rec” (optionally specify the file). “suspend” causes accounts to be suspend, it does this by setting the field and value specified in the g_delete_user_suspend setting.

If this setting is blank the default is to use ‘file’ mode, accounts are NEVER deleted automatically except in the very oldest versions of surgemail (before version 3)

Syntax: g_delete_user_mode string

g_delete_user_suspend

If suspending an unread account set this field/value

Set the field and value to use when suspending an account due to g_delete_user_after and the g_delete_user_mode “suspend” settings.

Example: Disable accounts after 1 year 
       g_delete_user_after "365"
       g_delete_user_mode "suspend"
       g_delete_user_suspend field="mailstatus" value="closed"

Syntax: g_delete_user_suspend field=string value=string

g_delete_exclude

Field and value that excludes an account from g_delete_user_after

If the authent response includes this field/value pair then the user account will not expire

Syntax: g_delete_exclude field=string value=string

Example: field=”noexpire” value=”true”

g_diskio_abort

Shutdown if diskIO failure on queue files

Intended to make server die rather than to pretend to keep running when a major disk fault has occurred

Syntax: g_diskio_abort bool

g_disk_debug

Log slow disk access n

This setting has no further documentation currently available

Syntax: g_disk_debug bool

g_disk_warning

Give manager warning if disk % exceeded, default 95%

This setting has no further documentation currently available

Syntax: g_disk_warning string

g_dns_paranoid

Compare sender forward and reverse dns lookup and see if they match

Does a forward DNS lookup on the sender’s domain and matches this with a reverse lookup of the senders IP address. If these do not match the message is either bounced or stamped with the header “X-DNS-Paranoid: <explanation>”. Valid values for this field are “STAMP”,”RETRY” and “REJECT”.

STAMP = Add the X-DNS-Paranoid header if it fails

RETRY = Bounce the message with a 450 error. (so if the failure was temporary the sending server will retry)

REJECT = Bounce the message with a 550 error

Set g_dns_lookup_msg or g_dns_match_msg to define the reject/stamp strings respectively.

g_dns_match_msg

Message for stamp or bounce if forward and reverse lookup don’t match

The message given to the user when the forwar/reverse dns lookup doesn’t match

Syntax: g_dns_match_msg string

Example: “Sorry your ip address doesn’t translate into a name that translates into your ip address”

g_dns_noptr

Set to reject or retry, for ip addresses with no reverse dns entry (rdns)

If the ip number of a connecting user has no associated name in the reverse dns database then the connection is rejected or told to retry later.

Syntax: g_dns_noptr string

Example: “retry”

g_dns_noptr_skip

Skip RDNS for these ip addresses

This is an over-ride for local addresses which you trust.

Syntax: g_dns_noptr_skip string

Example: “retry”

g_dns_noptr_msg

Message for stamp or bounce if DNS lookup fails on ip address

See short description.

Syntax: g_dns_noptr_msg string

g_dns_nocache

Disables DNS cache for spf lookups (20 minute life)

This setting disables the small cache used for SPF lookups to improve performance.

Syntax: g_dns_nocache bool

g_dns_disk

Enables DNS disk cache

Not normally needed unless dns server is flakey…

Syntax: g_dns_disk bool

g_dns_cache_size

Set size of forward dns cache, default 7000

Best not to change this normally

Syntax: g_dns_cache_size int

g_dns_system

Use system code to do reverse lookups

If all channels hang in a state ‘lookup’ then turn this off so it will use the surgemail code for reverse dns lookups. This setting used to be g_dns_lookup and had the opposite meaning, we reversed it because the system dns code was faulty so often

Syntax: g_dns_system bool

g_dns_threaded

Enable threaded dns lookups

This setting has no further documentation currently available

Syntax: g_dns_threaded bool

g_dns_test_blank

Break dns lookups to test how it’s handled

This setting has no further documentation currently available

Syntax: g_dns_test_blank bool

g_dotstuff_fix

Convert the way mail is stored on disk from dotstuffed to non dot stuffed (beta)

In the dotstuffed format any attachments that have content (in encoded format) starting with a . get corrupted, as all single ‘.’ characters at the start of a line are converted to ‘..’. This is only very seldomly an issue as encoded text doesn’t usually have . characters. This feature can only be enabled and still need furhter production level testing to make sure there are no side effects… so if you play with it consider yourself adequately warned 🙂

Syntax: g_dotstuff_fix bool

g_domain_create_auto

Auto create domain if it doesn’t exist when creating a user

This setting has no further documentation currently available

Syntax: g_domain_create_auto bool

g_domain_create_route

Auto create route to mx mail server

This setting has no further documentation currently available

Syntax: g_domain_create_route bool

g_encrypt_disable

Disable encryption

Disable encryption mechanism

Syntax: g_encrypt_disable bool

g_encrypt_config

Encrypt some config settings (passwords)

This can be used if naked passwords in the config are a problem. This setting currently applies to g_gateway, and may apply to others in future. You must manually copy the file config.key from master to slave.

Syntax: g_encrypt_config bool

g_encrypt_path

Path to encrypted files, this is not supported when mirroring!

DO NOT USE

Syntax: g_encrypt_path string

g_encrypt_ssl_force

Require ssl on incoming encrypted messages

When a message is going to be encrypted this setting ensures it is sent from the user to the server via SSL

Syntax: g_encrypt_ssl_force bool

g_encrypt_ssl_noforce

Exceptions, e.g. surgeweb or localhost

When a message is going to be encrypted this setting ensures it is sent from the user to the server via SSL

Syntax: g_encrypt_ssl_noforce string

g_encrypt_expire

Days to keep encrypted messages, default 60

When a message is sent via encryption it is deleted after this many days

Syntax: g_encrypt_expire int

g_encrypt_inline

Use INLINE method by default

Sets the default encryption method when a rule does not apply

Syntax: g_encrypt_inline bool

g_encrypt_reply_plain

Send plain message for local replies

By default a reply to a local user is also encrypted this makes it not encrypt the reply as user should be reading the message via SSL so the data is secure anyway.

Syntax: g_encrypt_reply_plain bool

g_encrypt_pw_key

Central host password key

DO NOT USE

Syntax: g_encrypt_pw_key string

g_encrypt_pw_host

Central host for encryption password storage

DO NOT USE

Syntax: g_encrypt_pw_host string

g_encrypt_surgeweb_show

Show SurgeVault in SurgeWeb

Enables the display of surgevault encryption in the surgeweb interface (can be modified using encrypt_hide on surgeweb customisation page)

Syntax: g_encrypt_surgeweb_show bool

g_encrypt_max

Max encrypted per day server wide

Server wide limit to prevent abuse (or accidental over use)

Syntax: g_encrypt_max int

g_encrypt_none

Don’t encrypt if subject starts with this

Only significant if the setting to lock all messages is enabled.

Syntax: g_encrypt_none string

g_encrypt_noip

Don’t encrypt if from this ip range

Only significant if the setting to lock all messages is enabled.

Syntax: g_encrypt_noip string

g_encrypt_nofwd

Don’t encrypt forwarded

Known fault, this affects all recipeients, not generally good to use

Syntax: g_encrypt_nofwd bool

g_encrypt_nowater

Show this if no water mark defined yet

e.g. No watermark defined, please complete this form

Syntax: g_encrypt_nowater string

g_encrypt_limit

Max encrypted msgs per user per hour

Per user limit

Syntax: g_encrypt_limit int

g_encrypt_reset_safe

When users password is reset, delete all messages to them

This setting increases security and should be used if your server allows public account registrations.

Syntax: g_encrypt_reset_safe bool

g_encrypt_reset_user

Msg to person when they click on reset password button

The sender has been emailed a link they can use to reset your password

Syntax: g_encrypt_reset_user string

g_encrypt_reset_msg

Msg Body sent when password has been reset

Message body sent to end user when password is reset

Syntax: g_encrypt_reset_msg string

g_encrypt_reset_sender

Msg Body sent to sender when password reset requested

Message body sent to sender password reset is requested

Syntax: g_encrypt_reset_sender string

g_encrypt_rule

Matches will be encrypted when sent

If this rule matches then the message will be encrypted before it is sent to the user. method=server or inline, we recommend ‘server’ mode as it’s much simpler.

Syntax: g_encrypt_rule header=string contains=string from=string to=string noconfirm=bool method=string

g_encrypt_unlock

Unlock for these destinations. e.g. user@domain

Not for general use

Syntax: g_encrypt_unlock string

g_encrypt_reminders

Days before we send users a reminder to change passwords, not recommended

Not for general use, keywords (expire password reminder)

Syntax: g_encrypt_reminders int

g_encrypt_smart

Smart Encrypt Private Feature (not available)

Encrypt all messages except g_encrypt_unlock and surgeweb defined addresses – this feature not generally available till 9/March/2013, encrypt_smart per domain must also be turned on.

Syntax: g_encrypt_smart bool

g_encrypt_nodomain

Allow encryption for users without local domains

This lets you create accounts for domains that don’t exist, these users can then send encrypted messages.

Syntax: g_encrypt_nodomain bool

g_encrypt_nolate

Disable encryption on late forwarding

If default encrpting is enabled then you might need this setting to stop it for late forwarding.

Syntax: g_encrypt_nolate bool

g_encrypt_wall

Encrypt surgewall msgs

Normally surgewall skips encryption

Syntax: g_encrypt_wall bool

g_enotify_from

From address to use in email notification messages

This setting has no further documentation currently available

Syntax: g_enotify_from string

g_error_xlate

Change error messages

If wild card string matches smtp response code, then replace with ‘to’ response code, use %1 to replace the first wild card match etc…

Syntax: g_error_xlate was=string to=string

g_expire_trash

Expire any messages found in trash folders

Expires any messages more than 7 days old found in the ‘trash’ folder.

Syntax: g_expire_trash bool

g_expire_silent

Don’t send users emails telling them what was expired.

Some users get upset when they find messages have expired, this setting makes the expiration silent so the users don’t even notice. I think this is a bit nuts myself but some admins prefer it

Syntax: g_expire_silent bool

g_expire_every

Only expire spool once every ‘n’ days

Reduce load spent expiring old messages.

Syntax: g_expire_every int

g_expire_warning

Give warning ‘n’ days before deleting each file

This will help warn users before a file is actually deleted.

Syntax: g_expire_warning int

g_expire_onlyunread

For the inbox only expire message if they are unread

Useful if you only want to expire message the user never read

Syntax: g_expire_onlyunread bool

g_expire_all_rules

Scan all users for rule files (not needed usually)

Used if rule files added manually

Syntax: g_expire_all_rules bool

g_fallback

Fallback address

Default address for all local domains. If a local delivery is not to any valid user Emails will be delivered to this address. There is also a per domain default. 

We want to stress that this is a dangerous setting, you use at your own peril.
Spammers will turn up to your server and test sending to accounts, they will just run through a dictionary of names, with a fallback setting you will be telling the spammer that all these accounts exist. The spammer will then deliver spam to these addresses in volumes that can cripple a server almost.

Syntax: g_fallback string

g_fast_time_off

Disable faster time function

This setting has no further documentation currently available

Syntax: g_fast_time_off bool

g_from_valid

Require an @ and dotted domain in all return addresses

This forces the sender to either give ‘no’ reply address or a valid one with an @ and a dotted domain

Syntax: g_from_valid bool

g_to_valid

Require an @ and dotted domain in all dest addresses

This forces all destination addresses to contain a domain name (breaks cron job emails on unix)

Syntax: g_to_valid bool

g_from_header

From header used in delivery bounces

From header used in delivery bounces.

Syntax: g_from_header string

g_from_must_exist

Require local from addresses to exist or reject mail

Can be useful in blocking dumb spam robots

Syntax: g_from_must_exist bool

g_from_rewrite

Rewrite from envelope for outgoing email, e.g. *@this.domain -> %1@another.domain

This lets you change the ‘from’ address from an internal domain name to a valid public domain name. The change is performed on the From envelope (return path), not the from header. And the chanage does not affect the return path written in local deliveries, only outgoing email. Mfilter rules can be used to rewrite the actual message headers.

Syntax: g_from_rewrite was=string to=string

g_from_rewrite_header

Rewrite the from header as well

Replaces the From: header in the mesage with the new address.

Syntax: g_from_rewrite_header bool

g_from_rewrite_sender

Rewrite the sender header as well

Replaces the Sender: header in the mesage with the new address.

Syntax: g_from_rewrite_sender bool

g_from_force

From address for all sent messages

Used when you want to make all messages use the same valid bounce address, reply-to header will contain original from if it doesn’t exist

Syntax: g_from_force string

g_from_list_too

Also enforce from rules from lists

Doesn’t allow lists to bypass forge rules

Syntax: g_from_list_too bool

g_forward_illegal

Prevents users setting forward rules to certain addresses

Syntax: g_forward_illegal to=”address” apply=”user type “

This setting allows you to specify some addresses as being illegal for certain users. This stops users setting up forwarding rules to these addresses. They can still send mail to these addresses manually with their email client. These rules _ONLY_ apply to non local domains.

Some examples:

If you want to stop your users setting up forward rules that redirect to aol.com.
g_forward_illegal to=”*@aol.com” apply=”user”

If you want to stop your users setting a forward to all domains except aol.com
g_forward_illegal to=”*,!*@aol.com” apply=”user”

Stop domain admins sending to aol.com
g_forward_illegal to=”*@aol.com” apply=”domadmin”

Stop admins sending to netwinsite.com
g_forward_illegal to=”*@netwinsite.com” apply=”admin”

Syntax: g_forward_illegal to=string apply=string

g_forward_attach

When late forwarding send as attachment to these domains

Useful with hotmail.com, aol.com etc so that forwarded messages are not mistaken for spam

Syntax: g_forward_attach string

g_forward_fixfrom

When late forwarding rewrite from/return path as local user

This prevents problems with spf/identity checking as the forwarded message is sent with valid from and return path

Syntax: g_forward_fixfrom bool

g_forward_oops

Internal testing setting, not for general use sorry

Testing setting, please do not use.

Syntax: g_forward_oops string

g_about_disable

Disable about web page

This setting has no further documentation currently available

Syntax: g_about_disable bool

g_admin_access

Allow / Restrict domain admin access to features based on 

g_admin_access group=”wildcard” access=”list”

This setting matches the g_access_group the admin is in to the wildcard specified and applies the specified access list to that domain admin, giving / restricting thier access to certain features. The list may include any of the following:

ValueResult
aliasAccess to domain users “Alias” page and features.
aspamAccess to the “ASpam” page and features.
blogAccess to the “Blogs” page and features.
bulletinsAccess to the “Bulletins” page and features.
centipaidAccess to domain users “Centipaid” page and features.
enotifyAccess to domain users “Email Notification” page and features.
exceptionsAccess to domain users “Exceptions” page.
friendsAccess to domain users “Friends” pages, and system.
fwdAccess to domain users “Forwarding” features, forwarding, auto-responder.
fwdonlyAccess to domain users “Forwarding” features, forwarding
listsAccess to the “Lists” page and features.
logAccess to domain users “Log” page.
mailboxAccess to domain users “Mailbox” page, view mailbox, setup rules.
smsAccess to domain users “Sms” page.
spamAccess to domain users “Spam” page, and SmiteSpam and Aspam processing of messages.
spamprivAccess to domain users “Spam” pages’ spam private feature
spfAccess to domain users “Spf” page and features.
usageAccess to the “Usage” button, which shows a domain users usage.
usersAccess to the “Users” page and features.
redirectAccess to the “Redirect” page and settings.
redirect_ccAccess to the “Redirect CC” page and settings.

In addition you can prefix any of the above with ! to deny access. There are two other special case values, “all” and “none” which mean exactly what they say, access to “all” or “none” of the features.

Example:

g_admin_access group=”simple” access=”all,!users,!reports”

The above setting gives admins in the ‘simple’ group access to all the features except the users and reports features.

Syntax: g_admin_access group=string access=string

g_admin_access_default

Default features granted to domain admins

This setting is a default access list for all domain admins on the server, it is specified in the same maner as the g_admin_access settings ‘access’ parameter. eg:

g_user_access_default “all,!users,!reports”

Syntax: g_admin_access_default string

g_allow_bodyless

Allow bodyless email

This will allow bodyless email to be accepted. These are usually spam.  In particular Norton Antivirus in autoprotect mode closes the POP link which makes it appear that SurgeMail has terminated the connection when a bodyless email is encountered.

Syntax: g_allow_bodyless bool

g_allow_user_authent_field_get

A space separated list of authent process fields that users are allowed to view for themself using the POP xauthent_field_get command

This provides limited access to the user database for applications like webmail and surgeplus.

Syntax: g_allow_user_authent_field_get string

g_allow_user_authent_field_set

A space separated list of authent process fields that users are allowed to set for themself using the POP xauthent_field_set command

This provides limited access to the user database for applications like webmail and surgeplus.

Syntax: g_allow_user_authent_field_set string

g_allow_passzip_to

A list of addresses to allow unmonitorable archive messages to be sent to

These may of course contain viruses as they cannot be scanned, but some people still need to be able to accept such files.

Syntax: g_allow_passzip_to string

g_allow_passzip_from

A list of addresses to allow unmonitorable archive messages to be sent from

These may of course contain viruses as they cannot be scanned, but some people still need to be able to accept such files.

Syntax: g_allow_passzip_from string

g_aspam_headers

Add aspam information messages to messages.

Adds informational aspam headers to all messages.

Syntax: g_aspam_headers bool

g_aspam_need_ip

Require good matches to match external ip address

This prevents poluted bad messages in aspam_good causing spam to bypass the filters, but reduces effectiveness of the notspam address.

Syntax: g_aspam_need_ip bool

g_authent_always

Always lookup user, so virtual domains can exist just in authent module

Always lookup user, so virtual domains can exist just in authent module. This allows you to support 10,000 domains on one system without a ‘huge’ ini file. Be careful to not create/remove real domains with the same name as existing domains that only exist in the authent database as the ‘drop files/inboxes’ will move when this occurs and existing mail will vanish.

Syntax: g_authent_always bool

g_authent_any

Restore buggy behaviour of looking up users in domains that don’t exist

Previously surgemail would lookup a user even if the domain in question did not exist, if you need to restore this odd behaviour then you can use this setting…

Syntax: g_authent_any bool

g_authent_allow_badascii

Allow ascii chars outside the range 32 < 127

By default ascii characters < 32 and >= 127 are blocked as invalid. If you require these characters set this to TRUE.

Syntax: g_authent_allow_badascii bool

g_authent_case_sensitive

Make passwords case sensitive

By default surgemail avoids case sensitive passwords as they do little to increase security but causes endless frustration for users, but this is just an opinion and some people disagree so use this setting if you wish to have case sensitive passwords :-).

Syntax: g_authent_case_sensitive bool

g_authent_decrypt

Collect and store plain text passwords for migration in file pass.decrypted

This setting should only be used as part of a migration, it obviously exposes your customers passwords to risk!.

Syntax: g_authent_decrypt bool

g_authent_prefix_sep

Authent Prefix Separator (deprecated – for backward compatibility only)

Prefix separator for prefix based separator. Only relevant if enabled on a per vdomain basis using the “prefix” setting.

Syntax: g_authent_prefix_sep string

g_authent_process

Authent process

The command line of a NetWin authentication module. You can use one of our standard modules for LDAP, ODBCAuth, MySQL etc or write your own. For more information on these modules see the authentication section of the manual .

This will typically be something like:
g_authent_process “E:\surgemail\nwauth.exe -path E:\surgemail”
or
g_authent_process “/usr/local/surgemail/nwauth -path /usr/local/surgemail”

Syntax: g_authent_process string

g_authent_pass

Authent process to check passwords with

This setting has no further documentation currently available

Syntax: g_authent_pass string

g_authent_lookup

Check if accounts exist using g_authent_pass too

This setting has no further documentation currently available

Syntax: g_authent_lookup bool

g_authent_cachelife

Cache life of successful authent lookups

Set the life in seconds that successful cached lookups can be used, default 2 hours. Best left alone.

Syntax: g_authent_cachelife int

g_authent_cachebad

Cache life of failed authent lookups

Set the life in seconds that the cached failed lookups can be used, default 60 seconds. Best left alone unless your server is being hit by thousands of failed lookups and your authent module is slow.

Syntax: g_authent_cachebad int

g_authent_cachesize

Size of the authent cache

Set the size of the authent cache, default is 500 entries. Generally best left alone.

Syntax: g_authent_cachesize int

g_authent_domain

Authent domain

If this is ‘true’, the virtual domain name is appended to the username before it is passed to the authent process. This lets the authent process deal with virtual domains. As a general rule, this should ALWAYS be true. 

Syntax: g_authent_domain bool

g_authent_nodomain

If true dont add @virtual.domain.name to external user lookups (NOT RECOMMENDED)

Use this at your own risk, it is provided for compatibility with dmail installations, but should be avoided if at all possible.

Syntax: g_authent_nodomain bool

g_authent_encrypt_key

Encryption key config settings

Not for general use currently, used to partially obscure credit card info when stored in the authent module.

Syntax: g_authent_encrypt_key string

g_authent_number

Authent number

The number of concurrent authent processes to run. If you are using a slow external authent module (e.g. sql) then it is probably worth running 3-4, there is no need to have more than 1 when using nwauth.exe. (Default = 1) 

Syntax: g_authent_number int

g_authent_info

Authent info

Defines a piece of information to store about the user in the user database (phone number, name, address etc). Each piece of information is given a name, a field, an access mode, a default and a type. The name defines what appears in the web management display. The field is what is sent to the authent_process. The access mode can be one of the following: user, domadmin, or admin, createonly, none. The default is what value is assigned upon creation of a new user. The type can be one of: date, readonly, encrypt or any custom string which you want to check for or match on the na_details.htm page with a template function like: ||ifequal||user_info_type||custom|| .. do things .. ||endif||

An access mode of ‘admin’ means that only the system admin can see the information, ‘domadmin’ means the sysadmin and any domain admin can see the information, ‘user’ means the user can see the information, ‘createonly’ means the user sets the information at creation time but cannot see it after that and ‘none’ ensures that no-one can see or modify the information (used for information that is handled by SurgeMail itself, either through the interface or otherwise)

e.g.
     g_authent_info      name="Phone Number" field="phone" access="user" default="" type=""

See here for a complete list of default settings.

Syntax: g_authent_info name=string field=string access=string default=string type=string

g_authent_info_grp

Fields to show to users in this group

Specifies the authent fields this user group is allowed to see and change. This applies only to the fields visible on the account properties page and the domain admin “Users” page it cannot be used to prevent access to fields which are managed by the web interface i.e. ‘fwd’

Syntax: g_authent_info_grp group=string fields=string tag=string

g_authent_addip

Send ip address as third parameter to authent module

This setting has no further documentation currently available

Syntax: g_authent_addip bool

g_authent_ip

Authent Lookup IP numbers via authent modules – enables relaying

If enabled each connecting IP address will be looked up in your user database as x.x.x.x@ip eg: “127.0.0.1@ip” and if the user is found then relaying is allowed and if ‘send_limit=”nn”‘ is defined then that will set the tarpit send limit for that user.

For per IP tarpit limits to work you need to define the g_tarpit_max and g_tarpit_max_remote settings. And g_tarpit_drop to make the limit effective.

Syntax: g_authent_ip bool

g_authent_single

Allow local users with a single quote char in their name

This let’s users exist who contain the single quote ‘ character. It is not supported with some authent modules though, nwauth does allow it.

Syntax: g_authent_single bool

g_authent_spaces

Allow spaces in passwords DO NOT USE

Not supported for most authent modules, requires nwauth 4.0r or later, If you have already got users with spaces in their passwords and you turn this setting on, they will no longer be able to login until they reset their passwords. Authent module must support slash encoding, for nwauth add -spaces to command line

Syntax: g_authent_spaces bool

g_authent_strip_domain

Strip domain for authent lookups

Use when your database expects one ‘primary’ domain to do lookups without a domain name then SurgeMail will strip that domain only from lookups. Typically this is only necessary with old DMail authent modules.

Syntax: g_authent_strip_domain string

g_authent_restart

Cycle auth modules every 1000 lookups

This is useful if there are resource allocation issues in the authentication module. Eg OBDCAuth

Syntax: g_authent_restart bool

g_authent_logall

Turns on logging of authent requests

If enabled, authentication requests are logged in mail.log as “<day> <time> Authent[<action> <info>]”.

Syntax: g_authent_logall bool

g_authent_fwdfile

Use DMail forward files (deprecated – for backward compatibility only)

Allows old style DMail forward files to be read.

Syntax: g_authent_fwdfile bool

g_authent_timeout

Timeout for authent response

Timeout for authent response, default 60 seconds.

Syntax: g_authent_timeout int

g_authent_last_login

Store users last login time in the database

This setting will cause the authent field ‘last_login’ to be updated when a user logs in. The field is set to a timestamp which is ‘the number of seconds since midnight January 1, 1970’. This field is updated ‘at most’ once every 24 hours. Other features i.e. delete_user_after and disable_smtp_after will look for this field.

Syntax: g_authent_last_login bool

g_authent_reminders

Days till we remind user to change password

Days until we remind user to change password.

Syntax: g_authent_reminders int

g_authent_require

Days till we require user to change password

This is the one to use, only requires change in surgeweb, expire password

Syntax: g_authent_require int

g_authent_enforce

Days till we prevent user from logging in, NOT RECOMMENDED

Days until we block logins if password is not changed. This setting will annoy your customers but not really achieve anything useful, it shouldn’t be used in most situations

Syntax: g_authent_enforce int

g_auth_hide

Disable SMTP Authentication

Per default SMTP authentication is enabled. If a user matches this IP range/list they will NOT be shown the ESMTP extension for SMTP authentication. This will usually stop the mail client from prompting the user for authentication. We STRONGLY recommend you do NOT use this feature. It is much better to let users authenticate when sending email.

Syntax: g_auth_hide string

g_auth_norelay

orelay-webok-allow-surgeweb-sessions-anyway" >

This means relaying only occurs if g_relay_allow_ip matches

Syntax: g_auth_norelay_webok bool

g_auth_norelay_webok

Allow surgeweb sessions anyway.

This means relaying only occurs if g_relay_allow_ip matches

Syntax: g_auth_norelay_webok bool

g_auth_skipgateway

Skip gateway rules if we get a proxy SMTP auth command

Skip gateway rules if we get a proxy SMTP auth command. This is not for general use. It can be used if you are using SurgeMail in front of another mail server with a wild card gateway to gateway all domains to a back end mail server. Then an authenticated user is a local user trying to send out so the gateway rules are ignored. (this is strongly not recommended)

Syntax: g_auth_skipgateway bool

g_auth_path

Path to nwauth files

Needed for mirroring if using multiauth

Syntax: g_auth_path string

g_autologin_pop

Enables WebMail Autologin using POP when on another server

Webmail needs the ability to automatically login to SurgeMail to changes passwords etc. This setting will do this via an extension to the pop protocol allowing WebMail to autologin whilst running on another server. (Normally this is done using a temporary file)

Syntax: g_autologin_pop bool

g_autologin_file

File to use to share auto login information on NFS based cluster

This allows webmail to autologin when using an nfs based cluster and a load sharing device.

Syntax: g_autologin_file string

g_autologin_imap_disable

Disable IMAP based autologins

IMAP autologins allow autologin to surgeweb.

Syntax: g_autologin_imap_disable bool

g_badfrom_noip

Check envelope from domain exists and is a valid IP number

Check envelope from domain exists and is a valid ip number, if not bounce message.

Syntax: g_badfrom_noip bool

g_badfrom_noip_temp

Makes g_badfrom_noip return a temporary error instead of a 501 error

Use g_verify_mx_skip to bypass/whitelist ip addresses from this check

Syntax: g_badfrom_noip_temp bool

g_badfrom_check

Check if ‘from’ envelope can be delivered to

If this is set to “true” then SurgeMail will connect back to the envelope ‘from’ address and check that the address is valid, a cache is used to improve performance, if it cannot connect then the message is bounced as probable spam. It’s nicer to use the following setting “g_badfrom_stamp” as well, then if SurgeMail cannot connect back or the user is invalid then a header is added to indicate this, and our SmiteSpam rules will use this to increase the spam weighting.

You can use g_spam_allow to exempt an IP from this check as well as g_badfrom_whitelist for a domain. Please note that by default SurgeMail uses a blank mail from to do its check.
MAIL FROM: <>
Some servers might reject this, though they shouldn’t because its a standard bounce, however if they do you can use g_badfrom_from to set a mail from address to be used for this check.

Syntax: g_badfrom_check bool

g_badfrom_stamp

If ‘g_badfrom_check’ is bad then stamp a header on the message

g_badfrom_check must also be set to true. If this is set to “true” then SurgeMail will connect back to the envelope ‘from’ address and check that the address is valid, a cache is used to improve performance, if it cannot connect then a header is added to indicate this, and our SmiteSpam rules will use this to increase the spam weighting.

Syntax: g_badfrom_stamp bool

g_badfrom_badmx

Drop message if this MX

If mx host is one of these addresses then drop the message, it’s definitely spam (e.g. 127.*).

Syntax: g_badfrom_badmx string

g_badfrom_from

Mail from account for g_badfrom_check

From to use when doing the g_badfrom_check check, not normally needed, if set must be set to valid account.

Syntax: g_badfrom_from string

g_badfrom_whitelist

Whitelist of domains to skip from checks

Whitelist of “from” address domains to skip g_badfrom_* checks.

eg.
g_badfrom_whitelist “specialdomain.com”

Syntax: g_badfrom_whitelist string

g_ban_helo

Ban any machine that gives a matching ‘helo’ string

This is a simple spam protection system to block known spam/problem users based on the ‘helo’ name they send to your system. This name is recorded in the ‘received’ header along with the IP address. This name is very easy to ‘fake’ so is not a high security level of protection, but it is simple for stopping stupid robots etc, that have gone insane.

Example: *junkmail.com 

Syntax: g_ban_helo string

g_ban_from

Ban any matching MAIL FROM: envelope

Same as ‘ban_helo’ but applies to the from (return address) part of the mail envelope. This is NOT the same as the from/sender header in the message itself!!! This equates to the ‘Return-path:’ header that the mail server adds. 

Syntax: g_ban_from string

g_ban_rcpt

Ban any matching RCPT TO: envelope

Same as ‘ban_helo’ but applies to the recipient part of the envelope (destination users) this is NOT the same as the ‘To:’ header in the message itself!!! This can sometimes be used to block really simple spamming programs that always send to the same invalid users. 

Syntax: g_ban_rcpt string

g_ban_blackhole

Leave connected but reject all recipients without looking them up

Leave connected but reject all recipients without looking them up. This is good of dealing with high volume spammers without wasting resources doing user lookups. 

Syntax: g_ban_blackhole bool

g_bind_byfromip

Bind outgoing SMTP connections to the specified IP based on the sender IP

This setting has no further documentation currently available

Syntax: g_bind_byfromip fromip=string bindip=string

g_bind_to

Bind outgoing SMTP if to address matches

This setting has no further documentation currently available

Syntax: g_bind_to string

g_bind_to_ip

The address to bind to

This setting has no further documentation currently available

Syntax: g_bind_to_ip string

g_bind_to_name

The name to use in the ehlo

This setting has no further documentation currently available

Syntax: g_bind_to_name string

g_bind_out

Bind outgoing smtp connections to IP

Bind outgoing smtp connections to this IP number. 

Syntax: g_bind_out string

g_bind_from

Bind outgoing SMTP connections based on ‘from’ envelope

Bind outgoing SMTP connections based on the IP of the virtual domain in ‘from’ envelope. This is only useful if you are using IP based virtual domains. 

Syntax: g_bind_from bool

g_bind_incoming

Bind outgoing SMTP connections based on incoming ip address

So if the incomnig mail came in on interface address 1.2.3.4 then that same address is used to send the email

Syntax: g_bind_incoming bool

g_bind_in_always

Bind on incoming in preference to g_bind_from

So if the incomnig mail came in on interface address 1.2.3.4 then that same address is used to send the email

Syntax: g_bind_in_always bool

g_bind_authent_default

Bind to default if authenticated

So authenticated users get the default binding not g_bind_byfromip

Syntax: g_bind_authent_default bool

g_black_above

Level for spam detection for g_black_count

Level for spam detection for blacklisting IP number e.g. 7. 

Syntax: g_black_above int

g_black_count

Blacklist sender IP based on spam sent

Number of spam in a row before IP blacklisted for 30 minutes eg: 30 (default = disabled)

Syntax: g_black_count int

g_black_to

Blacklist sender IP based on catch addresses

Blacklist senders IP address for 30 minutes if they deliver to these spam catch email addresses.

eg. g_black_to “smith@mydomain.com,catcher@myotherdomain.com”

Syntax: g_black_to string

g_black_isspam

Blacklist ip address for any spam training event

This setting has no further documentation currently available

Syntax: g_black_isspam bool

g_black_nbad

Blacklist ip address if this many bad recipients in a row (e.g. 8)

There is no default. The ip is blacklisted for the time specified by G_MAX_BAD_IP_TIME or one day. Whitelist with G_BLACK_WHITE for ip address or from matches. This limit is related to a single connection, not all errors from an ip over time.

Syntax: g_black_nbad int

g_black_white

Whitelist to prevent blacklisting, e.g. 1.2.3.*,mail*.aol.com

This setting has no further documentation currently available

Syntax: g_black_white string

g_blogs_enable

Surgemail blogs

Allow users to create blogs

Syntax: g_blogs_enable bool

g_blogs_maximum_image_width

Default maximum image width

Images larger than this that are posted to blogs are scaled down, default is 390, per blog setting can overide this.

Syntax: g_blogs_maximum_image_width int

g_blogs_maximum_image_size

Default maximum image size

Images larger than this (in largest dimension) that are posted to blogs are scaled down, default is 390, per blog setting can overide this.

Syntax: g_blogs_maximum_image_size int

g_blogs_maximum_items_in_top_page

Maximum number of items on the top blog page

Maximum number of post bodies to appear on a blog top page, default is 10

Syntax: g_blogs_maximum_items_in_top_page int

g_blogs_max_per_user

Maximum number of blogs per user

Maximum number of blogs per user, default is 5

Syntax: g_blogs_max_per_user int

g_blogs_default_template

Default template set that is used by newly created blogs

This setting can have a value of the name of any directory in the SurgeMail blogtpl directory

Syntax: g_blogs_default_template string

g_blogs_use_sub_domains

Make blogs accessible at http://blog_name.domain/

If you’re DNS entry supports it, turn on this setting to make blogs accessible at http://blog_name.blogs.domain/ instead of http://domain/blogs/blog_name

Syntax: g_blogs_use_sub_domains bool

g_blogs_sub_domain_prefix

Prefix to use instead of blogs. for blog subdomains. use ! to have no prefix.

Experimental feature do not use

Syntax: g_blogs_sub_domain_prefix string

g_blogs_not_unique

Allow the same blog name in multiple domains

If set you can create different blogs with the same name in different virtual domains, this is not recommended.

Syntax: g_blogs_not_unique bool

g_blogs_not_global

Only allows access to a blog onthe domain it is defined on

Only allows access to a blog on the domain it is defined on, this is not recommended. (probably want to use g_blogs_not_unique, g_blogs_domonly too)

Syntax: g_blogs_not_global bool

g_blogs_no_suffix

Shortens URL, url_blogs must be defined for each domain

This shortens http://a.com/blog/juggling to http:/a.com/juggling, but does require that you define a specific name for the blogs in the domain based url_blogs setting

Syntax: g_blogs_no_suffix bool

g_blogs_ping

Sites to ping on each post

Host and path to ping on each blog post. eg: host=rpc.weblog.com path=/RPC2

Syntax: g_blogs_ping host=string path=string

g_blogs_domonly

Only list blogs in a users domain

By default all blogs in all domains are listed/shown to the user. This setting causes it to only list blogs in the users domain.

Syntax: g_blogs_domonly bool

g_blogs_image_optional

Allow users to specify if image verification is required for comments

By default image verification is now required, this prevents spammers from abusing the many ‘test’ blogs set up by your users.

Syntax: g_blogs_image_optional bool

Allow users to post comments that contain urls

Due to widespread abuse of blogs this is not recommended.

Syntax: g_blogs_allow_links bool

Delete existing posts that contain urls

This setting will help cleanup existing spam postings to your users blogs.

Syntax: g_blogs_cleanup_links bool

g_blogs_comment_rev

Show blog comments newest first

Helps if there are lots of comments, this is a global setting not per blog..

Syntax: g_blogs_comment_rev bool

g_blogs_https

Use https for blog urls

This setting has no further documentation currently available

Syntax: g_blogs_https bool

g_bomb_max

Max messages to a single address per hour

Simple system to prevent intentional or more likely, accidental mail loops or mail bombs where thousands of Emails are sent to a single user. A setting in the range of 100-1000 is generally good depending on your sensitivity to incorrectly blocking real mail.  We suggest 1000 is a good setting if you are unsure.

This counts the messages from a single IP address to a single recipient. If a single IP sends more than this many messages to any single recipient then they will be tarpitted (slowed down and rejected).

Use spam_allow ip.address.list to over-ride the limit for known local systems that might exceed this limit (unlikely anything will).

Syntax: g_bomb_max int

g_bomb_max_from

Max msgs from a single email address/hour

Max msgs from a single email address/hour.

Syntax: g_bomb_max_from int

g_bomb_white

don’t apply bomb_max limit if to address matches

Useful for robots etc that expect high volume

Syntax: g_bomb_white string

g_bounce_disable

Bounce Disable

Disable all bounces. This is particularly useful when under spam attack. This is for outgoing bounces it stops SurgeMail generating bounces it won’t affect incomming bounces from other servers.

example:
g_bounce_disable “true”

Syntax: g_bounce_disable bool

g_bounce_redirect

Send all bounces to a local address

This can be used to avoid ‘back scatter’ which can get your server listed in various black listed sites. In general your server should not generate bounces so if you get lots you may find changing config settings can stop them. Note this only redirects bounces to non local recipients, so your users sending outgoing mail will still get their own bounce messages.

Syntax: g_bounce_redirect string

g_bounce_reject

Reject bounces by ip address from known dumb mail servers

Some mail servers (exchange) will accept email, then bounce it, this is now considered a ‘crime’ and will get your server black listed, so if you have surgemail running as a gateway for such servers you can tell it to reject any bounce that server is foolish enough to send you.

Syntax: g_bounce_reject string

g_bounce_limit

Max size of bounce messages

Max size in bytes of message to send back as bounce message is truncated if necessary.

Syntax: g_bounce_limit int

g_bounce_some_stop

Disables locally generated bounces for partial message failure – NEVER use this!

This can decrease back scatter, but it has other bad effects, it can result in duplicate messasges arriving. Never never use this setting

Syntax: g_bounce_some_stop bool

g_bounce_nodrop

Enables locally generated bounces for non local users

This setting makes bounces occur normally, the reason bounces are normally dropped for non local users is that they are almost always spam bouncing off another server due to forwarding settings, and as such sending a bounce email will get your server black listed, so we decided it was best to drop them by default since they are rarely useful. Turn this setting on at your own risk :-). Instead use g_bounce_to to list domains that it is safe to bounce to.

Syntax: g_bounce_nodrop bool

g_bounce_to

Domains to treat as local and send bounces to

This setting makes bounces occur normally, the reason bounces are normally dropped for non local users is that they are almost always spam bouncing off another server due to forwarding settings, and as such sending a bounce email will get your server black listed, so we decided it was best to drop them by default since they are rarely useful. Turn this setting on at your own risk :-). Instead use g_bounce_to to list domains that it is safe to bounce to. e.g. *@a.com,*@b.com

Syntax: g_bounce_to string

g_warning_to

Addresses to treat as local and send warning bounces to

This may cause back scatter to use with caution

Syntax: g_warning_to string

g_bounce_to_recipient

Bounce suregewall failure to the recipient

This can help prevent message loss in rare cases where quota/size limits prevent a delivery from surgewall server to destination server.

Syntax: g_bounce_to_recipient bool

g_bounce_bind

Use a specific ip address for outgoing bounces

Some RBL sites blacklist machines for sending bounces, which is probably a good thing. But even with spf running your server may occasionally send a bounce to a forged address, and so you can use an alternate ip address for these bounces to avoid blacklisting your main mail server address. First you must assign the ip address to your network interface etc

Syntax: g_bounce_bind string

g_bounce_suggest

Send bounces to postmaster if spf cannot be verified

This may help stop black listing for backscatter while still alerting the sending domain admin that one of their users emails to your server bounced, You can specify a template file suggest.eml if you don’t like the default message suggesting the postmaster add spf records for their domain

Syntax: g_bounce_suggest bool

g_bounce_paranoid

Prevent external bounces going through surgemail

This can help stop back scatter from another server going through your server to an external domain

Syntax: g_bounce_paranoid bool

g_bounce_safe

Only send bounces to local domains

This may result in lost messages, but can also avoid backscatter issues

Syntax: g_bounce_safe bool

g_block_files

Block certain attachments

Allow you to block any mail with certain files attached. 

g_block_files “*.exe,*.cmd,*.com”

Syntax: g_block_files string

g_block_skip

From or To address to bypass g_block_files

Some users will need to send various attachments, these users are excempt to the g_block_files rule

Syntax: g_block_skip string

g_block_longok

If true allow long file names (more than 180 char)

By default files names over this length are ALWAYS blocked if g_block_files is used, in rare situations these are not just viruses attempting to get around the filter.

Syntax: g_block_longok bool

g_breakin_enable

Stop multiple ip logins for one account in a few seconds

When a hacker guesses a password on your system they will often send outgoing spam to your server from multiple ip addresses, Surgemail detects this and emails the administrator when it occurs, use g_breakin_white to enable specific users who need to do this (this is very unusual though)

Syntax: g_breakin_enable bool

g_breakin_short

Match on 1.2.3.* for ip addresses, helps with google sending

When a hacker guesses a password on your system they will often send outgoing spam to your server from multiple ip addresses, Surgemail detects this and emails the administrator when it occurs, use g_breakin_white to enable specific users who need to do this (this is very unusual though)

Syntax: g_breakin_short bool

g_breakin_white

Email addresses that can send concurrently from mulltiple ips (use * to allow everyone)

When a hacker guesses a password on your system they will often send outgoing spam to your server from multiple ip addresses, Surgemail detects this and emails the administrator when it occurs, use this setting to enable specific users who need to do this (this is very unusual though), it also accepts wild cards, e.g. * if you wish to disable teh feature. A list is given as “user@domin,user2@domain2”

Syntax: g_breakin_white string

g_breakin_n

Number of different ip’s that trigger a lockout, default is 8

Only lower numbers are valid.

Syntax: g_breakin_n int

g_breakin_window

Window in seconds, default is 300

The window in which the multiple logins are counted

Syntax: g_breakin_window string

g_byname_old

Enable old slow domain lookup functions

This setting should not be needed.

Syntax: g_byname_old bool

g_convert_percent

Convert % signs top @ in recipient addresses

Some Spam tests send mail user%spamdomain.com@localdomain.com to see if a server is an open relay. If a default address is set up for the local domain this will be delivered to this local address and the test assumes the mail server is an open relay. This setting prevents this. 

Syntax: g_convert_percent bool

g_crash_normal

Crash without catching exceptions

Crash without catching signals 10,11. In particular this will generate correct core files on FreeBSD systems.

Syntax: g_crash_normal bool

g_crash_simple

Crash simpler for solaris to avoid deadlock situation

This setting has no further documentation currently available

Syntax: g_crash_simple bool

g_crash_nomini

Crash without minidump on windows

This setting has no further documentation currently available

Syntax: g_crash_nomini bool

g_cid_skip_to

Skip CID score, good for lawyers etc

Some users will trigger CID matches due to the nature of their business (accountants/lawyers) for these people you may want to list them here. CID is content matching, usually scams which often use legal language.

Syntax: g_cid_skip_to string

g_mailstatus_message

Error message to give when mailstatus is set to specified state

This allows you to specify the error message given to the user when they are set to certain states, you may use other authent fields in the message, for example:

g_mailstatus_message state=”payup” message=”Payment is due $full_name$, please pay here: http://your.site/path/file.htm”

Syntax: g_mailstatus_message state=string message=string

g_manager_username

Global domain managers username (for web based domain administration)

Specifies the local users which have manager rights for all domains. These users can login to the user self management interface and will recieve special domain manager options. This setting works slightly different to the domain level ‘manager_username’ setting in that if you specify an account without the @domain part i.e. ‘admin’ it gives all admin users in all domains domain rights over all domains.

Syntax: g_manager_username string

g_mirror_host

Mirror host 

This unique SurgeMail feature allows you to setup two identical mail servers across a local or widearea network. The waiting mail messages & folders etc are duplicated continuously between the two systems, so users can use either system. If either system fails for any hardware reason the other acts as an instant on line replacement without any interruption to the user. In addition when the faulty system is replaced the two automatically re-synchronize. 

See this page for Mirror overview

Syntax: g_mirror_host string

g_mirror_nossl

Disable SSL for mirror protocol connection

This is best turned off unless your servers are talking over a wide area untrusted network. 

Syntax: g_mirror_nossl bool

g_mirror_nwauth

Mirror NWAuth data files (deprecated – for backward compatibility only)

This setting is no longer used (as of SurgeMail 1.7d), the g_mirror_mode setting is used instead to decide whether do mirror the NWAuth database.

Syntax: g_mirror_nwauth bool

g_mirror_nwauth_always

Mirror nwauth database files

Set this if you’re using multiauth to run nwauth and you want those files mirrored. Requires you to add -isslave2 to multiauth.ini nwauth command line. Requires the nwauth files to be located in the surgemail root/install directory.

Syntax: g_mirror_nwauth_always bool

g_mirror_mode

Master / slave mirror system

Certain actions may only be run on the mirror master system (such as expire processing) or are different in behaviour between the master and slave (such as NWAuth mirrorring and dlist mirorring). This setting must be set to MASTER on one system and SLAVE on the other system for correct operation. (Note basic mirrorring of delivered mail will happen if this setting is the same on both systems it is just some of the special mirrorring functionality that this is required for)

Syntax: g_mirror_mode string

g_mirror_secret

Mirror secret shared password

This password is required to prevent the mirroring mechanisms being abused. We recommend a random string of letters at least 10 characters long. e.g. “urcajfielsjfs” 

Syntax: g_mirror_secret string

g_mirror_prune_age

Mirror minimum age for items to be pruned during sync_prune

Mirror minimum age for items to be pruned during sync_prune, default 14 days. 

Syntax: g_mirror_prune_age int

g_mirror_threads

Max threads we can use during resync_fast, default 6

During resync fast four threads are used, this is usually sufficient, more may overload your system and result in failures, if your system is not under load you could set it as high as eight, but this would only be sensible if your disk array has more than 4 drives in it!

Syntax: g_mirror_threads int

g_mirror_live

Mirror: Send incoming messages immediately

Enables a faster mirroring mechanism, strongly recomended, this setting will be the default in a future release

Syntax: g_mirror_live bool

g_mirror_live_max

Limit size of mirror_live default 60k

This prevents smtp delays when mirroring over a slowish link. The default is 60k

Syntax: g_mirror_live_max int

g_mirror_nsend

Sending threads to use, default 8

Sending threads for normal queue

Syntax: g_mirror_nsend int

g_mirror_config

Mirror surgemail.ini

Syntax: g_mirror_config “true/false”

You put this on both machines and it will attempt to mirror the surgemail.ini. There will be some settings that you do not wish to mirror and these can be exempted by using:

g_mirror_config_except “setting,setting,setting”

Some settings are not mirrored by default these are: g_mirror_host, g_mirror_nwauth*, g_mirror_mode, g_authent_path, g_dlist_path, g_log_path, g_record_path, g_home, g_authent_process, g_mfilter_file, g_webmail_work, g_work, g_virus_cmd, g_atrn_port, g_imap_port, g_imap_secure_port, g_ldap_port, g_manager_port, g_manager_secure_port, g_monitor_port, g_pop_port, g_pop_secure_port, g_ppd_port, g_smtp_port, g_smtp_secure_port, g_webmail_port, g_webmail_secure_port, g_surgeplus_port, g_surgeplus_secure_port, g_surgeplus_web_port, g_bind_out, g_virus_avast, dmail_drop_path, dmail_bin_path, web_path, webmail_work

(it is possible we will update this list over time)
* g_mirror_nwauth is obsolete don’t use it.

Syntax: g_mirror_config bool

g_mirror_config_except

Mirror surgemail.ini

Syntax: g_mirror_config “setting,setting,setting”

This will tell the server not to import the specified settings from the other mirror.

Example:
g_mirror_except “g_spam_allow”

This will tell the server not to change this setting. This only affects the machine its on, if the other server does not have this set, it will continue to mirror the setting. This setting accepts wildcards. This setting accepts a special case value “address” that will prevent mirroring of existing domain ip addresses, allowing different ips on each mirror machine. There are a number of settings which are not mirrored by default these are specified above in g_mirror_config.

In addition the mailbox_path setting is not mirrored, unless, the existing setting is a sub directory of the g_mailbox_path and the new setting is a sub directory of the g_mailbox_path from the other server, in which case the mailbox_path is set to the same sub directory using the existing g_mailbox_path setting eg.

[recieving server]
g_mailbox_path “c:\surgemail\mbox”
mailbox_path “c:\surgemail\mbox\domain”

[sending server]
g_mailbox_path “d:\surgemail\mbox”
mailbox_path “c:\surgemail\mbox\domain_moved_here”

[result on recieving server]
g_mailbox_path “c:\surgemail\mbox”
mailbox_path “c:\surgemail\mbox\domain_moved_here”

Syntax: g_mirror_config_except string

g_mirror_trash

Normally on a resync the trash folder is ignored.

This can be useful when you want to compare results so you want everything even if it’s a bit pointless

Syntax: g_mirror_trash bool

g_mirror_debug

Log more info to mirror log.

Helps when tracking down fault with nwauth or mirroring, never leave turned on as it can lead to mutex crashing

Syntax: g_mirror_debug bool

g_mirror_debug3

NEVER USE, MAKES MIRROR FAIL.

Helps when tracking down fault with nwauth or mirroring, never leave turned on as it can lead to mutex crashing

Syntax: g_mirror_debug3 bool

g_mirror_repair

Run resync_prune once per month, only set on master, TURN OFF DURING FAILURES

This setting runs a nighly resync to keep the cluster in sync. Maybe be resource intensive on a large system! This should always be disabled during a failure as it could cause messages loss when the master is re connected.

Syntax: g_mirror_repair bool

g_mirror_email

Email manager list of fixes sent

This is a debug setting to spot issues with mirroring, it emails the manager a log of the files that were resynced, set G_MIRROR_PRUNE_AGE 1 as well to cut down on false positives.

Syntax: g_mirror_email bool

g_mirror_max

Max items in one folder to mirror, default 160k currently

This setting has no further documentation currently available

Syntax: g_mirror_max int

g_mirror_lock

Lock master during slave bursts

This setting has no further documentation currently available

Syntax: g_mirror_lock bool

g_mirror_others

BETA Other hosts, for 3,4 host mirrors,(DO NOT USE)

This setting has no further documentation currently available

Syntax: g_mirror_others string

g_mirror_resync_inbox

BETA Resync inbox for active users once a day

This setting has no further documentation currently available

Syntax: g_mirror_resync_inbox bool

g_mtasts

Enable MTA-STS ssl/tls rules

Use DNS entries to discover if receiving server should have a signed SSL certificate

Syntax: g_mtasts bool

g_mtasts_white

Domains to ignore MTA-STS rules

Whitelist for destination domains we should just send to anyway

Syntax: g_mtasts_white string

g_mtasts_report

Alert manager on MTASTS failures

Most failures will be due to something other than real hackers, so this alert helps you resolve issues, and add whitelist rules g_mtasts_white settings for problem domains

Syntax: g_mtasts_report bool

g_callhome_disable

Disable misc features that reference netwinsite

Useful if you are paranoid about information 🙂

Syntax: g_callhome_disable bool

g_con_peruser

Connection limit per user for imap/pop. Set above 20

This setting has no further documentation currently available

Syntax: g_con_peruser int

g_con_peruser_except

Exception users to g_con_peruser, include domain name

This setting has no further documentation currently available

Syntax: g_con_peruser_except string

g_con_perip

Connections per IP

Maximum number of connections allowed per IP address. Primarily this is used to prevent simple denial of service attacks where one user could otherwise use up all the channels your system can support and then do nothing with them. 

Syntax: g_con_perip int

g_con_gateway

Connection limit per ip also applies to gateways

This setting has no further documentation currently available

Syntax: g_con_gateway int

g_con_perip_except

Connections per IP exception

IP list of exception addresses to g_con_perip. 

Syntax: g_con_perip_except string

g_con_persubnet

Maximum concurrent connections per subnet

Maximum number of concurrent connections per subnet. This limits concurrent connections from a sub net, great for automatically stopping professional spammers who use multiple addresses. A typical setting might be 20. Subnet is /24.

Syntax: g_con_persubnet int

g_date_add_utc

Add UTC if date header is missing it

Add timezone if date header is missing one

Syntax: g_date_add_utc bool

g_dbabble_smtp_port

DBabble SMTP port (do not manually change this setting – it should be set from the DBabble section of the web admin interface only)

This setting specifies the port that DBabble listens on. DBabble looks at surgemail.ini and if it sees this setting, overrides it’s own setting with this value. When you save changes to this setting from within the SurgeMail DBabble admin interface, SurgeMail automatically sets appropriate values for the g_redirect_iflocal and g_gateway settings.

Syntax: g_dbabble_smtp_port int

g_dbabble_smtp_prefix

DBabble SMTP prefix (do not manually change this setting – it should be set from the DBabble section of the web admin interface only)

This setting is used in conjunction with the dbabble_smtp_port setting to forward all mail with the specified prefix on to DBabble.

Syntax: g_dbabble_smtp_prefix string

Add web links to DBabble from other web interfaces (and vice versa)

This causes links to appear in the DBabble interface to switch to using WebMail (and SurgePlus if you have the g_surgeplus_links setting on).

Syntax: g_dbabble_links bool

g_debug_block

For catching bugs in block file processsing

For catching bugs in block file processsing.

Syntax: g_debug_block bool

g_debug_crt

Some CRT debugging on windows, do not use

This setting has no further documentation currently available

Syntax: g_debug_crt bool

g_debug_ini

Debugging, don’t use this

This is a temp setting used for testing

Syntax: g_debug_ini bool

g_debug_vanished

Name of file to check for, if file vanishes, crash

This is for tracking a particular bug, not for general use

Syntax: g_debug_vanished string

g_debug_free

Check free memory isn’t corrupted – slows performance slightly

This is for tracking a particular bug, not for general use

Syntax: g_debug_free bool

g_debug_imap

Log imap folder renames and deletes in kmsg.log

This is for tracking a particular bug or user error 🙂

Syntax: g_debug_imap bool

g_debug_ncpy

Debug ncpy function

This makes ncpy clear the entire destination buffer to increase the chance of a crash if the buffer length is wrong

Syntax: g_debug_ncpy bool

g_debug_timing

Record dfopen timing, tellmail dfopen_stats

This makes ncpy clear the entire destination buffer to increase the chance of a crash if the buffer length is wrong

Syntax: g_debug_timing bool

g_debug_image

Save image thumbnail files to find bug

This setting has no further documentation currently available

Syntax: g_debug_image bool

g_debug_body

Save msg body during processing

This setting has no further documentation currently available

Syntax: g_debug_body bool

g_debug_check

Use more dmalloc debugging, some performance impact. Also set g_debug_free

This setting has no further documentation currently available

Syntax: g_debug_check bool

g_demo

Demo mode lock unsafe admin features

This setting has no further documentation currently available

Syntax: g_demo bool

g_demo_to

Demo mode valid external destinations

This setting has no further documentation currently available

Syntax: g_demo_to string

g_deny

can clutter log

This setting has no further documentation currently available

Syntax: g_deny_log bool

g_deny_country

Block email from some countries, use 2 digit code not the full name, see IpToCountry.csv, turn on g_country_ip!

Block countries, examine the file IpToCountry.csv for the abbreviations, g_country_ip must be set true, and issue tellmail aspam_update

Syntax: g_deny_country string

g_deny_smtp

Deny SMTP based on IP address

Block users from some IP ranges connecting to SMTP only. 

Syntax: g_deny_smtp string

g_deny_login

Block users from some ip ranges logging in

This setting has no further documentation currently available

Syntax: g_deny_login string

g_deny_msg

Deny message

Message to give to users who are disconnected due to the above ‘deny’ setting. 

Syntax: g_deny_msg string

g_deny_log

Log g_deny rejections to msg.log – can clutter log

This setting has no further documentation currently available

Syntax: g_deny_log bool

g_download

Fetch an http file and do an ini reload

Can be used with g_include to have settings fetched from a central location, the file is fetched once an hour.

Syntax: g_download url=string user=string pass=string local=string

g_domainkeys_check

Check incoming DomainKeys signatures (obsolete turn off)

See domainkeys.htm

Syntax: g_domainkeys_check bool

g_domainkeys_sign

Sign outgoing messages (obsolete, turn off)

To turn off domainkeys for some domains see the per domain setting, domainkeys_disable. See domainkeys.htm for more info.

Syntax: g_domainkeys_sign bool

g_domainkeys_selector

Policy name for your server (used creating dns entry for domainkeys)

This defines the dns entry name for your policy record and public key entry in your dns. See domainkeys.htm for details

Syntax: g_domainkeys_selector string

g_domainkeys_only

Domains to sign for outgoing email

Normally all local domains are signed, but if this setting exists then it is used instead so you must list local domains as well as non local ones you want to sign messages for. G_domainkeys_sign must also be set to true!

Syntax: g_domainkeys_only string

g_domainkeys_headers

List which headers to sign

This will help get the message through gateways without breaking the signature, try a single header, e.g. from

Syntax: g_domainkeys_headers string

g_dkim_check

DKIM Check incoming DKIM signatures

See domainkeys.htm

Syntax: g_dkim_check bool

g_dkim_sign

DKIM Sign outgoing messages

To turn off dkim for some domains see the per domain setting, dkim_disable. See domainkeys.htm for more info.

Syntax: g_dkim_sign bool

g_dkim_selector

DKIM Policy name for your server (used creating dns entry for dkim)

This defines the dns entry name for your policy record and public key entry in your dns. See domainkeys.htm for details

Syntax: g_dkim_selector string

g_dkim_only

DKIM Domains to sign for outgoing email (default is all)

Normally all local domains are signed, but if this setting exists then it is used instead so you must list local domains as well as non local ones you want to sign messages for. G_dkim_sign must also be set to true! Never set to *

Syntax: g_dkim_only string

g_dkim_exclude

DKIM Domains to not sign for outgoing email

This can be used to exclude some domains

Syntax: g_dkim_exclude string

g_dkim_headers

DKIM List which headers to sign (blank=default, and is usually best)

This will help get the message through gateways without breaking the signature, try a single header, e.g. from

Syntax: g_dkim_headers string

g_dkim_skip

DKIM Destination Domains to not sign

This is useful if the destination server is faulty with it’s dkim processing

Syntax: g_dkim_skip string

g_dkim_nogateway

Don’t sign if gateway rule used

Useful to avoid double signing incoming messages

Syntax: g_dkim_nogateway bool

g_dkim_alt_domains

Use selector ‘alt_name’ for these domains

Use if you need to use a different selector when forwarding for a domain (so you can define a different dkim private key)

Syntax: g_dkim_alt_domains string

g_dkim_alt_name

Name of selector to use

Use if you need to use a different selector when forwarding for a domain (so you can define a different dkim private key)

Syntax: g_dkim_alt_name string

g_dkim_return

Sign if ‘return path’ matches g_dkim_only

Useful when you want to act as a signing gateway

Syntax: g_dkim_return bool

g_domain_templates

Check for domain specific templates

This setting has no further documentation currently available

Syntax: g_domain_templates bool

g_dlist_nostart

Disable dlist

If set disable (do not attempt to start) dlist for DMail compatibility mode.. 

Syntax: g_dlist_nostart bool

g_dlist_nolocal

Remove add local button from mailing lists

Prevents address havesting etc by users – strongly recommended on public servers, not necessary on small or private servers

Syntax: g_dlist_nolocal bool

g_dlist_path

Path for dlist

DList Path normally defaults to $g_home/dlist.

Syntax: g_dlist_path string

g_dlist_one

Only allow one recipient if message is to a mailing list

This setting has no further documentation currently available

Syntax: g_dlist_one bool

g_dmail_filter

Run DMail compatible filter files (deprecated – for backward compatibility only)

Run DMail compatible filter files. Mfilter rule files should be used instead.

Syntax: g_dmail_filter string

g_dns_blank_fail

NEVER USE! Bounce email if dns response blank rather than retry

This setting has no further documentation currently available

Syntax: g_dns_blank_fail bool

g_dns_host

DNS host(s) for MX lookups

This setting can normally be left blank as the mail server will find your system DNS settings. However, you can specify one or more DNS servers for the mail server to use instead to lookup names. 

DNS lookups are cached to disk so SurgeMail will generally continue to work even if your dns server is temporarily unavailable.

Test your dns server with this command. If working it should return two ip addresses for that domain.

 	tellmail dns_test "netwinsite.com"

Prior to SurgeMail 2.0h dns lookups were done using tcp instead of udp, they are now down with UDP unless the response exceeds UDP packet size (as per RFC).

NOTE: All dns servers listed in this setting must be fully recursive, a non recursive dns server will create many dns lookup failures!

Syntax: g_dns_host string

g_dns_nlookup

Concurrent MX lookups

Concurrent DNS lookups to send to DNS server (Default=20) (not used after version 2.0h)

Syntax: g_dns_nlookup int

g_dns_require

Require reverse DNS names match

Require MAIL FROM header to match the reverse dns lookup based of the sender based on the sender’s IP.

eg. from=*@hotmail.com hosts=*hotmail.com

Syntax: g_dns_paranoid string

g_dns_translate

If mx response is x.x.x.x translate to y.y.y.y:port

Useful for translating ip numbers inside a local intranet and doing other fancy routing of various sorts.

Syntax: g_dns_translate from=string to=string

g_dsn_loggedin

Enable DSN (Delivery Status Notification) for trusted senders.

Safer alternative to real DSN as it only applies to local users. This guesses if the user is trusted based on previous logins

Syntax: g_dsn_loggedin bool

g_dsn_enable

Enable DSN (Delivery Status Notification) esmtp extension.

Not recommended. Delivery Status Notification is used by spammers to find addresses to spam to.

Syntax: g_dsn_enable bool

g_dsn_nofinal

Try not to show real final recepients but just original recipients

This setting helps hide internal addresses in bounce messages (after forwarding etc). Not recommended.

Syntax: g_dsn_nofinal bool

g_domain_separator

Separator characters for virtual POP

For POP logins where your virtual domain is NOT distinguished by IP address users can login with ‘user@domain’ or user/domain.name etc and the mail server will pickup the domain name correctly. By default only ‘user@domain.name’ is accepted unless this setting is used which can be useful for brain dead mail clients which don’t allow the user to specify ‘user@domain.name’ as the username eg:

g_domain_separator “/”

Syntax: g_domain_separator string

g_domain_list_max

Maximum number of domains to list at once

Maximum number of domains to list at once in the admin user interface. 

Syntax: g_domain_list_max int

g_domain_default

Default domain when POP/IMAP user does not specify one

This is probably not what you think it is, generally the ‘first’ domain in surgemail.ini is used in this situation, but in some instances, when using domuser.dat for example to translate users back to virtual domains, you will want the default domain to be a ‘generic’ made up domain that doesn’t really exist.

For example lets say you have users fred@a.com, bob@b.com, then in domusers.dat you have

fred@a.com fred@a.com
bob@b.com bob@b.com
bob@xxx bob@b.com
fred@xxx fred@a.com

And the result is that users who login to pop as bob or fred, will be correctly mapped to the correct virtual domain user even though the actual domain is different in those two cases.

Clear as mud I expect?

Syntax: g_domain_default string

g_domuser_file

Domain users to thousands of virtual domains easily

Specifies a file which contains lines that translate an email address to the username that should be looked up in the database. This file can contain a domain name not previously specified in surgemail.ini allowing you to create unique sub-domain addresses. eg:

g_domuser_file “c:\surgemail\domuser.dat”

Example entries…

*@domain.com postmaster@domain.com
userA@domain.com userB@domain.com
firstname@lastname.domain.com firstname@lastname.domain.com

Syntax: g_domuser_file string

g_dotlock_minutes

NFS lock waits

Minutes to wait for nfs lock file, default 20 minutes.

Syntax: g_dotlock_minutes int

g_drop_use_len

Use the content-len header for drop file processing

For use on Solaris when using sendmail for incoming mail delivery.

Syntax: g_drop_use_len bool

g_encrypt_prefix

Prefix for encrypted messages must match encrypt rule so replies are encrypted

This setting has no further documentation currently available

Syntax: g_encrypt_prefix string

g_ehlo_simple

Ip addresses to give simple ehlo respone to

This is a debugging setting, do not use.

Syntax: g_ehlo_simple string

g_ehlo_8bitmime

Enable 8bit mime in ehlo response (not recommended)

This is probably a bad idea, it is best to reject 8bit mime and stop people sending it as the destination server may not support it

Syntax: g_ehlo_8bitmime bool

g_ehlo_log

Log ehlo/bind to msg*.rec logs

This setting has no further documentation currently available

Syntax: g_ehlo_log bool

g_event_url

Send msg events to a url

The parameters sent include, (given url)&mode=xx&mid=xx&from=x&to=xx&qnum=xx

Syntax: g_event_url string

g_event_list

Events wanted by url

e.g. New,Sent,Bounced,Later,Failed,Stored,Dropped,Rejected

Syntax: g_event_list string

g_emailreg_enable

Enable whitelist http://www.emailreg.org register to use

Be aware that this setting will not work until you register on their server and tell them the ip address of your server/dns to permit lookups. They charge $20 to verify your domain and this will help to get your email delivered more reliably

Syntax: g_emailreg_enable bool

g_external_warn

Tag external messages from non friends

This tags any external email with a warning

Syntax: g_external_warn bool

g_external_all

Tag messages from friends too

This tags any external email with a warning

Syntax: g_external_all bool

g_external_msg

Msg to insert at the top of external mails

This tags any external email with a warning

Syntax: g_external_msg string

g_external_style

css style for the warning

Used to set the color/font etc…

Syntax: g_external_style string

g_external_spam

Tag messages in spam folder too

Tags most msgs placed in the spam folder too.

Syntax: g_external_spam bool

g_external_white

Disable for return path matches

This setting has no further documentation currently available

Syntax: g_external_white string

g_external_only

Enable only these destionations

e.g. *@xyz.com,*@fred.com

Syntax: g_external_only string

g_external_white_to

Disable for these recipients

People who don’t need warning.

Syntax: g_external_white_to string

g_external_ip_disable

Do not add X-External-IP header

Removes external ip address from headers.

Syntax: g_external_ip_disable bool

g_fallback_relay_if_exists

Use FALLBACK_RELAY if not logged in but user exists (OLD_POPHOST_CREATEUSER_DISABLE)

This can be used to relay users where you have a user database that can be checked on the front end system directly (odbcauth, tcpauth, etc)

Syntax: g_fallback_relay_if_exists bool

g_feat_testing

Testing setting do not use

Used to test alternate spam filter weigtings

Syntax: g_feat_testing bool

g_filter_pipe

Filter pipe allowing external message processing

This allows external applications to filter and modify incoming messages. Example: Integration with Spam Assassin (on UNIX) could be achieved as follows:

g_filter_pipe “/usr/local/bin/spamassassin -P”

it expects a normal unix ‘filter’ so, read the message on ‘stdin’ and write the identical (or modified) message to ‘stdout’.

The input will be ‘crlf’ terminated and so should the output file.

That’s all you can do with this mechanism, if you want to bounce the message or flag it as spam you ‘add’ a header and then use something in surgemail to detect and act on the header you’ve added (mfilter)

Syntax: g_filter_pipe string

g_filter_pipe_skip

Skip filter if ip matches this

Set this for local servers that don’t need filtering, e.g. mailing list servers, local trusted robots.

Syntax: g_filter_pipe_skip string

g_filter_pipe_noauth

Skip for auth users

Skip for authenticated users

Syntax: g_filter_pipe_noauth bool

g_filter_pipe_headers

Re-read headers after pipe finishes

Needed if you want headers to be seen by later surgemail processing

Syntax: g_filter_pipe_headers bool

g_filter_max

Max size of messages to send through the filter pipe

Messages over this size (in bytes) are skipped. default = no limit

Syntax: g_filter_max int

g_filter_n

Number of filters to run simultaneously

Default is 20, when this limit is reached the incoming thread waits a few seconds then skips the filter if necessary, this is intended to prevent a log jam/melt down effect.

Syntax: g_filter_n int

g_filter_timeout

Filter pipe timeout

Filter timeout (g_filter_pipe) in seconds, default is 360.

Syntax: g_filter_timeout int

g_fix_crcrlf

Fix email messages containing crcrlf for line termination

This is best not used, it’s best to fix the faulty email application, results are not gauranteed.

Syntax: g_fix_crcrlf bool

g_fix_imap_lf

During IMAP import fix email messages containing lf

This is best not used, it’s best to fix the faulty email server, results are not gauranteed.

Syntax: g_fix_imap_lf bool

g_friends_spf

Refine friends matching using spf/dmarc when possible

This setting has no further documentation currently available

Syntax: g_friends_spf bool

g_friends_only

Friends system

An anti-spam feature which screens incoming mail to ensure it comes from a human. For incoming mail from unknown addresses a message is sent to this person requesting them to reply to confirm they are human and the original message will be delivered. See this page for more details.

Syntax: g_friends_only bool

g_friends_bounce_rej

Reject blank return path as friends failures

This setting has no further documentation currently available

Syntax: g_friends_bounce_rej bool

g_friends_bounce_friend

Allow exception rules to bounce a mesesage from a friend

This setting has no further documentation currently available

Syntax: g_friends_bounce_friend bool

g_friends_cleanup

Cleanup/repair large friend.lst files

This setting has no further documentation currently available

Syntax: g_friends_cleanup bool

g_friends_daemon_ok

Accept emails from any mailer deamon

This setting has no further documentation currently available

Syntax: g_friends_daemon_ok bool

g_friends_name

What to call the friends system

This specifies what to call the friends system when referring to it on web pages and in email to our users, you can call it whatever you like

Syntax: g_friends_name string

g_friends_pending_name

The imap name of the friends_pending (and spam store) quarantine folder – should match surgeweb imap_spam_folder – default is ‘Friends Pending’

This shouldn’t be changed unless this feature has not been used before as it will confuse your users. Any matching folder the user has of the same name will become invisible. So at least make it something other than simply Spam!!

Syntax: g_friends_pending_name string

g_friends_silent

Disable friends responses to users

This setting is to simply disable the confirm emails, not generally recommended as this makes friends a bit pointless.

Syntax: g_friends_silent bool

g_friends_silent_level

If spam score above this then don’t send friends message

Not generally recommended.

Syntax: g_friends_silent_level int

g_friends_ignore

List of addresses considered friends for all users on the system

List of addresses considered friends for all users on the system eg: the system manager email address

Syntax: g_friends_ignore string

g_friends_skip_ip

List of ip addresses considered friends for all users on the system

This setting has no further documentation currently available

Syntax: g_friends_skip_ip string

g_friends_confirm_subject

String to use as the subject of a friends confirmation email

String to use as the subject of a friends confirmation email. Defaults to: “Please reply to ||confirm|| message and allow delivery”. This value must contain the text ||confirm||, this text is replaced by the unique message id that allows SurgeMail to find the message to release eg. confirm(1150419513.1880_1180.domain). It is also advisable to place the ||confirm|| near the start of the string as some clients will truncate long subjects and any truncation of the ||confirm|| value will result in failure to release the message.

Syntax: g_friends_confirm_subject string

g_friends_default_mode

Default friends mode, smite (recommended) silent, or list

Valid settings are kids,disabled,smite,silent,list. Recommended silent or smite, in silent mode no challenge email is sent, in smite mode a challenge email is sent if the score is exceeded.

Syntax: g_friends_default_mode string

g_friends_default_autoadd

Default auto addition when sending (recommended)

This setting has no further documentation currently available

Syntax: g_friends_default_autoadd bool

g_friends_msg

Message used for friends bounce.

e.g. Delivery pending, to deliver you must send an email to

Syntax: g_friends_msg string

Message used for friends link bounce.

e.g. Note: Delivery will ONLY occur if you click on this link

Syntax: g_friends_msg_link string

g_friends_latest_headers

Friends system re-read message headers

Causes friends to re-read message headers, allowing rules based on headers added during delivery

Syntax: g_friends_latest_headers bool

g_friends_lang_auto

Set users language settings automatically based on observed emails from friends

This setting improves spam handling

Syntax: g_friends_lang_auto bool

g_friends_pending_keep

Time to keep friend pending messages

How long to store users friends pending messages before deleting them (days)

Syntax: g_friends_pending_keep int

g_friends_pending_max

Max items in pending before deleting them

The default is 10000 Items

Syntax: g_friends_pending_max int

g_friends_pending_vanish

Enable auto-vanish of pending messages on confirmation bounce

When a bounce for a confirmation message is received we vanish it, this setting will also delete the original message.

Syntax: g_friends_pending_vanish bool

g_friends_at_rcpt

Whether to check users friends list at rcpt stage

This setting is automatically added/removed by the web admin when global friends defaults are configured. It allows us to check friends at rcpt stage without paying a disk access cost for non-friends users.

Syntax: g_friends_at_rcpt bool

g_friends_allow_spf

Allow all email through as if it was a friend during temporary allow

The user click on a button to disable friends for a few hours, during this time all messages will get treated as a friend and thus bypass SPF too.

Syntax: g_friends_allow_spf bool

g_friends_spf_fail_bounce

Bounce SPF failures, do not send friends confirmations (Not recommended)

The default behaviour is to only send confirmations if SPF checks pass, if they fail friends checking is skipped, no confirmation request is sent and the email is not blocked by friends.

Syntax: g_friends_spf_fail_bounce bool

g_friends_check_spf

Disable friends bounces if SPF headers missing/failed to avoid backscatter.

If the incoming message may be forged it will bounce messages using an smtp error code to deny delivery but it will allow any real sender to bypass this. This settings is good if spamcop block your domain for sending friends challenges as it cuts down on the number of such messages. This avoids backscatter

Syntax: g_friends_check_spf bool

g_friends_safer

Make friends always avoid back scatter.

By using a rejection during the incoming message instead of sending an email back scatter is completely avoided.

Syntax: g_friends_safer bool

g_friends_always

Always use friends list.

This enables the “Add all outgoing email addresses to list” feature and always checks incoming messages against the friends list so that SurgeMail can correctly tag or filter it.

Syntax: g_friends_always bool

g_friends_add_trusted

Add to friends list when if sender is trusted

This is useful if senders are not using smtp auth but you still want friends to be added, typically used with surgewall…

Syntax: g_friends_add_trusted bool

g_friends_global_add

Add to a global friends list if ip matches and sender doesn’t match authenticated user

Used when you wish to whitelist outgoing addresses even though the sender/reply address does not match the authenticated user (e.g. messages sent via exchange)

Syntax: g_friends_global_add string

g_friends_global_exclude

Addresses not to auto add, e.g. *@paypal.com

This is good for avoiding meaningless entries or obvious entries that people might send email to by mistake

Syntax: g_friends_global_exclude string

g_friends_confirm_debug

Log sucessful friends confirmation responses

This enables us to examine suspect replies to friends confirmations for indications that they were sent by spammers or mail robots.

Syntax: g_friends_confirm_debug bool

g_friends_rotate

Rotate user level log file, default 30k

Set log size, the log is also rotated when a friends report email is sent (if configured)

Syntax: g_friends_rotate int

g_friends_long

In friends web release addresses use a longer url

Uses an older style link

Syntax: g_friends_long bool

g_friends_ignore_trusted

If from trusted ip still apply friends

Useful when you have a gateway that is sending to surgemail

Syntax: g_friends_ignore_trusted bool

g_friends_url

Specify default global url for friends release http://domain.name:port

Normally the default will work.

Syntax: g_friends_url string

g_friends_testurl

Test g_friends_url and status_url and url_host work externally

Reports to manager if any fail

Syntax: g_friends_testurl bool

g_friends_autodom

Auto whitelist friends based on domain/ip

This means a friend or trained message will whitelist the entire domain/ip address combination until contradicted for all users

Syntax: g_friends_autodom bool

g_speech_cmd

Command to convert sound file to text (append .txt to filename)

This setting has no further documentation currently available

Syntax: g_speech_cmd string

g_speech_from

Only attempt conversion if from this email address

This setting has no further documentation currently available

Syntax: g_speech_from string

g_speech_size

Default 10mb, will not convert larger files

This setting has no further documentation currently available

Syntax: g_speech_size int

Example: 10mb

g_status_url

Specify default global url for status messages

Normally the default will work.

Syntax: g_status_url string

g_status_view_html

Obsolete setting

Setting is no longer used.

Syntax: g_status_view_html bool

g_status_login

Require login for spam status actions

This setting has no further documentation currently available

Syntax: g_status_login bool

g_friends_byemail

Use old email based friends rejections

This restores the old beahviour, you would normally only use this if your mail server was unaccessable via http as email based rejections are not as easy to use or as reliable as web based human confirmations

Syntax: g_friends_byemail bool

g_friends_bounce_second

Bounce the next time the user sends a message if waiting for confirm still

This can make it clearer that email is not getting through to the destination

Syntax: g_friends_bounce_second bool

g_friends_old_status_email

Use older status email & processing

Use status.eml instead of status_html.eml

Syntax: g_friends_old_status_email bool

g_friends_obey_spf

If SPF failed then no friends match allowed for local domains

If spf failed then don’t allow a friends match

Syntax: g_friends_obey_spf bool

g_friends_local_match

If from!=returnpath and one is local, then block friends match

This setting has no further documentation currently available

Syntax: g_friends_local_match bool

g_friends_spam_score

Default level to quaranteen message in spam folder (Recommended 8 or 10)

This sets the default when no friends.ini file exists, a level of 8 will give best all round results, a level of 10 will stop less spam but avoid false positives.

Syntax: g_friends_spam_score int

g_friends_status_sort

Sort friends status messages with low scores at the top

This setting has no further documentation currently available

Syntax: g_friends_status_sort bool

g_friends_release_wash

Clean any subject marking (ie stars) when releasing/allowing

This setting has no further documentation currently available

Syntax: g_friends_release_wash bool

g_friends_warnonce

Give bounce on only the first message

This used to be the default, but it meant people thought delivery was occurring!

Syntax: g_friends_warnonce bool

g_friends_debug1

NEVER USE, only for NetWin testing

This makes surgemail always send an email bounce rather than a safe reject, only intended for testing bounce messages

Syntax: g_friends_debug1 bool

Footer file

Footer file which is appended to all plain text mail messages.

Syntax: g_footer_file string

Footer file (HTML mail)

Footer file which is appended to all HTML mail messages.

Syntax: g_footer_html string

Footer file (outbound only)

Plain text footer file which is appended to all outbound mail messages only.

Syntax: g_footer_send string

Enable outbound footer

Add g_footer_send to all messages when sending to non local users.

Syntax: g_footer_sendonly bool

Only add footer for authenticated local users

This essentially adds the footers to ‘outgoing’ email… if the user is a member of the group nofooter then the footer is also skipped.

Syntax: g_footer_auth bool

Skip footers for these users

This skips the footer for matching users (e.g. cell phones etc)

Syntax: g_footer_skip string

Only add footers if sender is trusted

This prevents the footer from being added for a message that pretends to come from your domain.

Syntax: g_footer_trusted bool

Only add footer if footer is not in message already

This works by examining the message contents to try and find part of the footer.

Syntax: g_footer_notfound bool

Only add footer if this text is not already in the message, requires g_footer_notfound

This can be used to make the footer optional

Syntax: g_footer_skipfound string

g_from_bl

Domain Based Blacklist Zones, lookups FROM domain in dns

The ‘from’ domain is checked against the specified RBL which must be a special ‘FROM’ based rbl which lists spammers by from address. Most spammers fake from addresses so this is a fairly marginally useful method.

Syntax: g_from_bl name=string stamp=string

g_from_bounce

Bounce if from is probably faked

Bounce if from address is probably faked.

This check is activated for any mail with a local domain in the from address but not using SMTP authentcation, relay allow IP address or spam allow IP address.

Syntax: g_from_bounce bool

g_from_body_bounce

Reject if local from header address is probably faked

Checks if the sender is authenticated or from an address that can relay, if not then the message is bounced if it claims to be from a local domain. One of the settings to prevent forgery

Syntax: g_from_body_bounce bool

g_from_stamp

Stamp if from is probably faked

Stamp message with “X-Verify-Failed:” header if from address is probably faked.

eg: X-Verify-Failed: <user@mydomain.com> From mydomain.com is local but user not authenticated or from g_relay_allow_ip

This check is activated based on the same conditions as g_from_bounce.

Syntax: g_from_stamp bool

g_from_timeout

Timeout on g_badfrom_* checks

Timeout in seconds of g_badfrom_* checks. Default = 60 seconds. If this timeout is reached the g_badfrom check will be classed as having failed.

Syntax: g_from_timeout int

g_from_check

Check from matches valid local domain

Check from domains match valid local domains if user is authenticated, or g_from_allow.Should be used with g_from_bounce “true” which basically forces them to authenticate and then makes this setting work properly.

Syntax: g_from_check bool

g_from_noforge

If envelope or from is local domain then the other must be too

This can prevent many common forms of forgery, this will bounce some real email, so probably better to use the noforgeme setting instead. One of the settings to prevent forgery

Syntax: g_from_noforge bool

g_from_noforge_some

If from matches this then from/envelope must match

Prevent forgeries of important local addresses, e.g. *support*

Syntax: g_from_noforge_some string

g_from_noforgeme

If to==from then from and env from must match

This can prevent many common forms of forgery, this is safer than the noforge setting above, and generally almost as effective. One of the settings to prevent forgery

Syntax: g_from_noforgeme bool

g_from_noforgename

If from contains two addresses the domains must match

Prevents forgery where the descriptive name is a fake email address that doesn’t match the real address

Syntax: g_from_noforgename bool

g_from_nofriend

If forge setting would bounce message then allow message but don’t allow friend match

This setting modifies the g_from_noforgeme behaviour so it doesn’t block the message but does prevent a friend match occurring

Syntax: g_from_nofriend bool

g_notlocal

Add ALERT to message subject if domain is local but origin is external

This setting has no further documentation currently available

Syntax: g_notlocal bool

g_notlocal_message

ALERT text to add to suspect messages that appear to be from a local domain

This setting has no further documentation currently available

Syntax: g_notlocal_message string

g_from_allow

-allow-ip-ip-addresses-to-bypass-local-from-check" >

This setting has no further documentation currently available

Syntax: g_from_allow_ip string

g_from_allow_ip

IP addresses to bypass local from check

This setting has no further documentation currently available

Syntax: g_from_allow_ip string

g_from_allow_to

destination user to bypass local from check

This setting has no further documentation currently available

Syntax: g_from_allow_to string

g_from_exact

Check from matches authenticated user

Check from matches authenticated user. If user is not authenticated the setting is skipped.

Should be used with g_from_bounce “true” which basically forces them to authenticate and then makes this setting work properly.

Syntax: g_from_exact bool

g_from_relay

If not authenticated and g_relay_allow_ip matched then block if not local domain or whitelisted

This one helps prevent a local virus sending out spam. It basically says non authenticated users who can relay due to a g_relay_allow_ip rule must send from one of your domains or use smtp authentication or be in a white list. Note this test is performed on the message envelope not the body. We recommend insisting on smtp authentication to reduce your risk of this type of problem.

Syntax: g_from_relay bool

g_from_relay_white

White list of domains for g_from_relay setting

This is domains that can be used as a ‘from’ address for non authenticated users, in addition to local domains

Syntax: g_from_relay_white string

g_from_domain

Default domain for from envelope

Fixes the ‘from’ envelope if the email client failed to specify a domain name, this doesn’t fix the from header currently but we may change that in future!

Syntax: g_from_domain string

g_gateway

Gateway messages to a particular domain (Or smarthost)

Used to gateway messages to another local mail server.  Typically this other server is inside a fire wall so it’s local IP address is not known by the DNS server.  You specify the domain and IP address to send messages to and this server is treated as ‘local’ rather than remote in terms of open relay restrictions. eg: nonauthenticated users are able to send in mail. Open relay restrictions do not apply to messages sent to this domain because they are considered as if they were local users and not ‘relaying’. 

This setting has the fields domain(required), to(required), user(optional), pass(optional), relay=true/false(optional),check=true/false (optional)

Normally “domain” and “to” are the only fields that need to be filled in. eg. To relay mail from anyone to user accounts in the domain somedomain.com to the host 1.2.3.4.
g_gateway domain=”somedomain.com” to=”1.2.3.4″

user=”username” pass=”password”

If SMTP authentication is required on the destination server the user and pass fields need to be completed.check=true

The check=true setting tells surgemail to actually connect to the server and check that recipients exist before accepting an incoming email for that user, this is STRONGLY recommended, as it stops the server having to bounce thousands of messages when spammers send to invalid addresses on your server. If SurgeMail cannot connect it will assume the user does exist so nothing is bounced except when the connection is successful.

Classic smarthost setting

This is where you want to send all outgoing email to another server, that may require authentication, note that we don’t use relay=”true” as that would make the server an open relay.

g_gateway domain=”*” to=”isp.mail.server” user=”user@isp.server” pass=”xxx”

relay=”true” (warning, usually not needed or wise, this can make your server into an open relay for spammers to abuse!)

As a safety measure to prevent accidental openrelays, SurgeMail will not relay for non authenticated users or trusted users (users that are allowed to relay due to relaying settings eg g_relay_allow_ip) if the domain is “*”. This can be overridden by placing “true” in the “relay” field. eg: To relay all mail for all users to host 1.2.3.4:

g_gateway domain=”*” to=”1.2.3.4″ relay=”false”

It is possible to use domain=”c:\domains.txt” where domains.txt is a file listing the domains to be gatewayed, this should only be done for one gateway rule, and is only worth doing if you have thousands of domains to gateway.

local=”true”

Requires that the destination addresses exist in the local account database.

g_gateway_open

Allows an open relay setting in g_gateway

This lets you set g_gateway domain=* and relay=true, this makes your server an open relay so is never a good idea!

Syntax: g_gateway_open bool

g_gateway_allow

Known hosts that act as incoming SMTP or surgewall servers for us

Some spam prevention mechanisms which use the ip address of the incoming system must be disabled for incoming SMTP servers/surgewall/firewall boxes so that stupid limits don’t block all the incoming messages from your backup mx server etc. Settings this affects: g_tarpit_max, g_tarpit_max_remote, g_con_perip, RBL checks,

Syntax: g_gateway_allow string

g_gateway_auth

Send SMTP auth requests to another host

Send SMTP auth requests to another host.

Syntax: g_gateway_auth string

g_gateway_always

Always send to gateway even if local domain exists

Always send to gateway even if local domain exists. Not sure why you would want to use this setting other than to temporarily send mail on to another server whilst keeping the local domain and accounts intact and untouced.

Syntax: g_gateway_always bool

g_gateway_data

Gateway at the data stage

To allow bounces to be handled cleanly gateway messages before responding to the data comman so bounces can go direct without being generated and creating back scatter.

Syntax: g_gateway_data bool

g_gateway_ifnot

Send mail to gateway in preference to local delivery unless IP matches

The use of g_gateway_ifnot will deliver mail to the g_gateway rule in preference to local delivery unless the IP number matches. This would typically be used to pass mail through an external SMTP server for certain or all domains for scanning purposes etc.

Syntax: g_gateway_ifnot string

g_gateway_ignorewild_ip

Ignore * gateway rules if from ip matches (allows outbound email scanning using gateway * to external scanner)

This setting has no further documentation currently available

Syntax: g_gateway_ignorewild_ip string

g_gateway_helo

Header that must exist in incoming bounces (g_send_helo) or bounces are dropped

An incoming filter can discard the majority of incoming bounces by using this setting to figure out if a bounce is valid without having to do a user lookup first! Usually this would be the setting g_send_helo from your ‘outgoing’ mail server, this setting can be a list of host names.

Syntax: g_gateway_helo string

g_gateway_orcpt

Writes an original receipt header when forwarding a message, this may disclose multiple recipients, cc/bcc etc use only for tracking faults

This writes a header X-Rcpt-Original: …, when forwarding a message to another server, good for tracking problems. This may disclose multiple hidden recipients, it should not be used normally

Syntax: g_gateway_orcpt bool

g_gateway_from

Pass ‘from’ header thru during gatewawy check

In some cases to verify an email address the correct ‘from’ must be passed through, normally this is a bad idea as it will cause spf failures, but it is sometimes necessary

Syntax: g_gateway_from bool

g_gateway_mx

If specified IP address is found in mx record for destination then allow relay (not recommended)

This can be useful if you have thousands of servers using your machine for mx backup and you want to allow them simply because the mx records exist, it’s much better to use g_gateway or g_relay settings instead as this saves lookups and makes the results entirely more predictable 🙂

Syntax: g_gateway_mx string

g_gateway_shuffle

Round robbin shuffle of to ip addresses for gateway rules

Use if you wish to spread outgoing load evenly to multiple outgoing servers.

Syntax: g_gateway_shuffle bool

g_group_field

Group Field from authentication database

Based upon a match on an arbitrary field in the authentication database a user can be defined as being part of an access_group. All fields (field, value, group) are required. eg: To add the user to the access_group “paid_user” if the field “mystatus” has the value “fullaccess”:

g_group_field field=”mystatus” value=”fullaccess” group=”paid_user”

Syntax: g_group_field field=string value=string group=string

g_gzip_disable

Disable gzip web compression

This setting has no further documentation currently available

Syntax: g_gzip_disable bool

g_hack_detect_disable

Stop admin emails when users login with a weak password

Useful if you must have weak passwords for some reason

Syntax: g_hack_detect_disable bool

g_hack_touser

Send warnings about hacking directly to users

Send warnings directly to users

Syntax: g_hack_touser bool

g_hack_url

Url for users to change password

Url to your server for users to change password, if not given the user.cgi url will be generated

Syntax: g_hack_url string

g_hack_msg

Message to send to users with a weak password

Message to send to users with a weak password

Syntax: g_hack_msg string

g_hack_report

Address to send weak password reports to

This setting has no further documentation currently available

Syntax: g_hack_report string

g_hack_noemail

Disable weak password reports

This setting has no further documentation currently available

Syntax: g_hack_noemail bool

g_hacker_max

Login guesses for one ip address before we lockout the ip address

Stops hackers from guessing passwords every day until they find one, use tellmail unlock ip.number to unlock, or whitelist it…

Syntax: g_hacker_max int

g_hacker_whitelist

Ip addresses to avoid guessing issues

Whitelist for gateways or other systems that you expect multiple failed logins from (e.g. webmail host)

Syntax: g_hacker_whitelist string

g_hacker_poison

Poison accounts. Instantly blacklist ip address e.g. root@*

If user tries to login with this account then their ip address is blocked from further logins. Give full domain name or wild card, e.g. root@your.domain,staff@*

Syntax: g_hacker_poison string

g_hacker_weak

If user tries weak password, lockout ip address

If someone is ‘guessing’ weak passwords their ip address will be locked out

Syntax: g_hacker_weak bool

g_hacker_password

If hacker attempts to login with account name as password, then blacklist ip

Good for stopping robots guessing accounts

Syntax: g_hacker_password bool

g_hacker_passwords

Failed logins that use these passwords will lockout the ip address

List commonly guessed passwords, e.g. 12345678

Syntax: g_hacker_passwords string

g_hacker_alert

Email manager if address is locked out

This setting has no further documentation currently available

Syntax: g_hacker_alert bool

g_hacker_fwd

Email manager if user sets fowarding rule

Useful to identify a spammer trying to set a bounce address to pickup incoming email

Syntax: g_hacker_fwd bool

g_hacker_days

Days to keep ipaddress locked out, default 7

This setting has no further documentation currently available

Syntax: g_hacker_days int

g_hacker_more

Be more restrictive, don’t allow /24 netblocks based on loginip

This setting has no further documentation currently available

Syntax: g_hacker_more bool

g_header_out

Header to add to outgoing posts

Mail header to add to outgoing mailing list posts.

Syntax: g_header_out string

g_help_local

Make all help references to the local help files

This setting has no further documentation currently available

Syntax: g_help_local bool

g_help_url

Link to another website for help instead of surgemail.com

This setting has no further documentation currently available

Syntax: g_help_url string

g_helo_optional

Make the SMTP Helo optional

Helo is optional for SMTP protocol (not recommended).

Syntax: g_helo_optional bool

g_home

Root directory of the mail server

This setting controls where the mail server runs including the many sub directories it creates below this directory for work files and log files for each domain. Not something you should generally change. 

Syntax: g_home string

g_honeypot_key

Key for HTTP RBL service www.projecthoneypot.org – not recommended

Do not share your key you can get a key for free from this web site. By defining this setting you will enable honeypot lookups, which in turn will block web imap pop and smtp authentication connections from listed sites, it does not block normal incoming email, but does reduce the permitted guess count to ‘1’. You can whitelist an ip address using g_spam_allow or g_hacker_whitelist, this setting will tend to cause false positives which will stop users logging in, we don’t recommend you use this setting currently.

Syntax: g_honeypot_key string

g_honeypot_rbl

RBL name to lookup, typically dnsbl.httpbl.org

This is the name of the rbl database we are going to query

Syntax: g_honeypot_rbl string

g_host_redirect

Redirection based on host for surgeweb’s https_required redirection

This setting has no further documentation currently available

Syntax: g_host_redirect from=string to=string

g_http_proxy

Proxy web server for fetching files via HTTP

Proxy web server for fetching files if direct access fails. (mainly for updates to the spam prevention rules from netwinsite.com and for downloading the latest version of the SurgePlus Windows client to make available to your users.) 

Syntax: g_http_proxy string

g_http_11

Use http 1.1 requests to netwinsite (do not use)

Experimental setting do not use

Syntax: g_http_11 bool

g_ipv6_enable

Enable IPV6 networking only use if you have an IPV6 address for some reason

Enable IPV6 networking, Best avoided unless your mail server is in ipv6 address space.

Syntax: g_ipv6_enable bool

g_ipv6_notrim

Prevent automatic conversion of ::ffff:x.x.x.x to x.x.x.x

Disables the automatic conversion of addresses to ipv4 format strings on linux

Syntax: g_ipv6_notrim bool

g_imap_acl

Enable ACL (shared folders) in imap

This setting allows folders to be shared between users. See the domain setting ‘imap_public’. Requires surgemail 3.9d or later! For this to work you will need an imap client that supports ACL’s to create and map shared folders (.e.g. thunderbird)

Syntax: g_imap_acl bool

g_imap_auto_create

Create folders matching this list in response to ‘select’ commands

Some imap clients assume certain folders exist, this setting can be used to let surgemail auto create such folders when the imap client requests some action involving the folder

Syntax: g_imap_auto_create string

g_imap_auto_subscribe

Auto subscribe folders for users

This setting has no further documentation currently available

Syntax: g_imap_auto_subscribe bool

g_imap_blacklist

Test if imap users are in rbl’s and email admin

This lets you find any of your users who’s ip address has been blacklisted, at most it will email once a day, any additional entries are logged in mail.err log file (search for ‘blacklist’)

Syntax: g_imap_blacklist bool

g_imap_cram_enable

Enable CRAM-MD5 authentication (requires nwauth 4.0h or greater)

Please note that CRAM-MD5 does have security implications, specifically it means that the local users password must be stored in a semi reversable state in the authent database. Also you must be using the new version of the NWAuth module.

Syntax: g_imap_cram_enable bool

g_imap_capa

Where to get the CAPABILITY value from

When you have suffix based domains and you’re using SurgeWall the CAPABILITY request comes before the domain of the user is known. As such SurgeMail cannot determine whether to send the real servers CAPABILITY or it’s own. This setting will choose the default behaviour, valid values are: Local, . By default SurgeMail defaults to the behaviour of the primary domain, if it’s surgewall then it obtains the real server capability. “Local” defaults to SurgeMails own capability, and defaults to the real server capability.

Syntax: g_imap_capa string

g_imap_capa_strip

Capability values to hide

In some situations you might not want to advertise server capabilities, for example SURGEMAIL and XFLDDATA when they cause problems with SurgeWall operations. Or perhaps the IDLE capability. Specifying the capability strings to hide here will cause SurgeMail to stop advertising those capabilies.

Syntax: g_imap_capa_strip string

g_imap_debug

For NetWin use only

This setting has no further documentation currently available

Syntax: g_imap_debug bool

g_imap_expunge_close

Expunge on every close, not recommended

This setting has no further documentation currently available

Syntax: g_imap_expunge_close bool

g_imap_folder

folder-create-auto-create-default-folders-for-trash-sent-etc" >

Warning this may change the default folder currently used by creating one the user didn’t previously have

Syntax: g_imap_folder_create bool

g_imap_folder_create

Auto create default folders for Trash/Sent etc

Warning this may change the default folder currently used by creating one the user didn’t previously have

Syntax: g_imap_folder_create bool

g_imap_idle_free

Releases threads in ‘idle’ state

This setting has no further documentation currently available

Syntax: g_imap_idle_free bool

g_imap_inactive_free

Releases threads not active

This setting has no further documentation currently available

Syntax: g_imap_inactive_free bool

g_imap_log_protocol

Log IMAP protocol

Log IMAP protocol and other IMAP information to the mail.log file.

Syntax: g_imap_log_protocol bool

g_imap_log_main

Log imap to mail.log too (not recommended)

This setting has no further documentation currently available

Syntax: g_imap_log_main bool

g_imap_log_size

Size of imap.log file

This sets the imap.log file size, default is 2mb

Syntax: g_imap_log_size int

g_imap_log_flush

IMAP log flush

Flush IMAP log on every write (for debugging).

Syntax: g_imap_log_flush bool

g_imap_log_copy

Log imap copy commands to msg*.rec log files

This setting has no further documentation currently available

Syntax: g_imap_log_copy bool

g_imap_log_header

Log imap fetch header commands to msg*.rec log files (not usually needed)

This logs rather a lot so may create excessive logging. Probably the log body setting is more wise.

Syntax: g_imap_log_header bool

g_imap_log_body

Log imap fetch body commands to msg*.rec log files

This only logs when a body or body part is read via imap

Syntax: g_imap_log_body bool

g_imap_loop_report

Report imap loops of bad email clients

This only logs when a body or body part is read via imap

Syntax: g_imap_loop_report bool

g_imap_move

IMAP move extension

This setting has no further documentation currently available

Syntax: g_imap_move bool

g_imap_maxdup

Max duplicate imap fetch commands before we throttle connection, default 500

This setting has no further documentation currently available

Syntax: g_imap_maxdup int

g_imap_port

IMAP Port (default 143)

Specifies the PORT to listen for IMAP connections on. IMAP is an alternative to POP protocol where the messages and folders all exist on the server. This is ideal when sharing a mail account between several users or when using Email from more than one computer.  Use the keyword ‘disabled’ to disable this part of the surgemail service.

Syntax: g_imap_port int

g_imap_delay

Glob data into bigger packets, never use this

This setting has no further documentation currently available

Syntax: g_imap_delay bool

g_imap_secure_port

IMAP Port (default 993)

Specifies the PORT to listen for dedicated SSL IMAP connections.

Syntax: g_imap_secure_port int

g_imap_search_noattach

Skip non text attachments when searching

This setting has no further documentation currently available

Syntax: g_imap_search_noattach bool

g_imap_search_index

Build and use indexes for imap header searching

This setting has no further documentation currently available

Syntax: g_imap_search_index bool

g_imap_search_body

Build and use indexes for imap body searching

This setting has no further documentation currently available

Syntax: g_imap_search_body bool

g_imap_search_text

Use only body and header indexes, fast but won’t get all matches

This setting has no further documentation currently available

Syntax: g_imap_search_text bool

g_imap_search_timeout

Limit on imap search, default is 180 seconds

This setting has no further documentation currently available

Syntax: g_imap_search_timeout int

g_imap_spam_train

Train if moving message to ‘spam’ folder, or from ‘spam’ folder to inbox

This setting has no further documentation currently available

Syntax: g_imap_spam_train bool

g_imap_status_cache

Cache imap status responses (Obsolete, use _stored setting)

Improves performance/reduces disk IO for imap

Syntax: g_imap_status_cache bool

g_imap_status_stored

Keep imap folder counts stored on disk

Improves performance/reduces disk IO for imap

Syntax: g_imap_status_stored bool

g_imap_no_internal_date

Disable the internal date output on IMAP commands

The RFC implementation of internal dateis broken wiht MS outlook. SurgeMail has been modified to conform to the outlook inplementation of internal date making this setting redundant..

Syntax: g_imap_no_internal_date bool

g_imap_maxbusy

Limit for concurrent requests per user, user is throttled if exceeded

This setting has no further documentation currently available

Syntax: g_imap_maxbusy int

g_imap_throttle

Limit for sustained imap commands per second before warning admin, default is 5

Useful for detecting an email client in a loop wasting your resources

Syntax: g_imap_throttle int

g_imap_throttle_speed

Limit to this speed in bytes per second when throttling, e.g. 50k

This setting has no further documentation currently available

Syntax: g_imap_throttle_speed int

g_imap_throttle_limit

-limit-for-sustained-imap-commands-per-second-before-warning-admin-default-is-5" >

Useful for detecting an email client in a loop wasting your resources

Syntax: g_imap_throttle int

g_imap_throttle_exclude

Users who are not limited

This setting has no further documentation currently available

Syntax: g_imap_throttle_exclude string

g_imap_timezone

Timezone to display – for testing purposes only

as per title 🙂

Syntax: g_imap_timezone string

g_imap_timeout

Time, in minutes for imap timeout, RFC required default is 30

You may in some cases wish to reduce this below the RFC required default if your server is under very heavy load. Results may be unexpected when breaking RFC behavior!

Syntax: g_imap_timeout int

g_imap_timeout_login

Timeout prior to login in seconds

You may in some cases wish to reduce this below the RFC required default if your server is under very heavy load. Results may be unexpected when breaking RFC behavior!

Syntax: g_imap_timeout_login int

g_imap_trash_nocopy

Prevent copying from Trash to Trash folder

This setting has no further documentation currently available

Syntax: g_imap_trash_nocopy bool

g_imap_uidl_nofix

Disable UIDL auto repair of duplicate entries

If true disable auto repair of identical UIDL entries.

Syntax: g_imap_uidl_nofix bool

g_imap_unsub_auto

Unsubscribe if a folder doesn’t exist

Helps dumb email clients that get confused

Syntax: g_imap_unsub_auto bool

g_imap_size_fetch

If true, will display message sizes on fetch command. (ie * 123 EXISTS)

Displays message size in IMAP responses

Syntax: g_imap_size_fetch bool

g_imap_idle_nsf

The number of seconds before a complete directory rescan. To be used on NFS network drives

Number of seconds for IMAP IDLE to do directory rescan – , note setting is miss spelled, do not correct it!

Syntax: g_imap_idle_nsf int

g_imap_testing

Test imap module instead of normal one (not functional)

Replace normal imap with a test one, this is not functional, do not use this setting.

Syntax: g_imap_testing bool

g_imap_old

Revert to old imap module

Replace normal imap with old imap module, not recommended/supported

Syntax: g_imap_old bool

g_imap_old_ip

Revert to old imap module for some ip’s

Replace normal imap with old imap module, not recommended/supported

Syntax: g_imap_old_ip string

g_imap_pop_burst

Always burst using imap code

Prevents redownloading messages if file indicating user is using imap is lost. Generally this setting is not needed and should not be used. Turning it on/off will result in users getting duplicate messagese if they are using POP and have leave on server ticked

Syntax: g_imap_pop_burst bool

g_imap_friends

Make the friends_pending folder visible in imap

Setting to map the friends_pending folder into an imap folder. There is no corresponding setting for the ‘held’ folder as we believe people should always use the friends mechanism as it is a superset of the held folder in functionality

Syntax: g_imap_friends bool

g_imap_user_flags

This setting may confuse some email clients (mac) use with cautioun

This may confused some email clients if multiple clients are used on a single account as the user flags can conflict

Syntax: g_imap_user_flags bool

g_imap_max_messages

The number of messages in a single imap folder, default 200000

This setting helps limit impact when a user has a large folder, it will fail to load a folder larger than this and report errors in the log, it also will prevent new deliveries once this limit is reached.

To resolve do NOT increase this setting, the correct solution is to use one of the builtin archving features to clean up the mailbox automatically, large folders create SERIOUS performance issues.

Syntax: g_imap_max_messages int

g_imap_max_limit

Limits messages being put in folders

This setting helps limit impact when a user has a large folder, it will fail to load a folder larger than this and report errors in the log, it does not prevent the folder from having messages added to it, and it does not inform the user that the problem has occurred, this setting is primarily to limit impact of a crazy user :-), see also G_MAILDIR_MAX

Syntax: g_imap_max_limit int

g_imap_warn_big

Warn user if inbox or sent has more than this many messages

We recommend setting this at about 10000, users should use the auto cleanup features (via user.cgi) to archive older messages to another folder

Syntax: g_imap_warn_big int

g_imap_sync_nomax

Exception to imap_max_sync setting

This setting has no further documentation currently available

Syntax: g_imap_sync_nomax string

g_imap_sync_all

Apply imap_max_sync to all folders

This setting has no further documentation currently available

Syntax: g_imap_sync_all bool

g_imap_allow_trailing

Allow leading/trailing spaces on folder names on linux, not a good idea

This setting has no further documentation currently available

Syntax: g_imap_allow_trailing bool

g_imap_log_user

Log imap info to imap.log in users mdir folder

This setting has no further documentation currently available

Syntax: g_imap_log_user bool

g_recycling

ycling-imap-make-visible-to-imap-users-default-is-now-only-surgeweb-users" >

This setting has no further documentation currently available

Syntax: g_recycling_imap bool

g_recycling_life

Days to keep imap deleted messages, default 30

This setting has no further documentation currently available

Syntax: g_recycling_life int

g_recycling_visible

Only allow members of this group to see recycling folder

This setting has no further documentation currently available

Syntax: g_recycling_visible string

g_recycling_imap

Make visible to IMAP users, default is now ONLY surgeweb users

This setting has no further documentation currently available

Syntax: g_recycling_imap bool

g_recycling_del

Allow usergroup to delete messages from the recycle folder

This setting has no further documentation currently available

Syntax: g_recycling_del string

g_recycling_pop

Do recycling for POP deletes too

This setting has no further documentation currently available

Syntax: g_recycling_pop bool

g_inbox_archive

Archive old messages to Archives/yyyy/Inbox folder, age in days

Trigger with tellmail mail_rules (or it will run once a week)

Syntax: g_inbox_archive int

g_sent_archive

Archive old messages to Archives/yyyy/Sent folder, age in days

Trigger with tellmail mail_rules (or it will run once a week)

Syntax: g_sent_archive int

g_inbox_max

Max messages permitted in inbox e.g. 5000

This setting will stop users leaving lots of message in their inbox. Valid range would be 1000 to 10000 depending on the nature of your users. A smaller number can reduce load on your server. The user is warned when the reach 70% and 95% of the limit. Users can cleanup their inbox automatically by enabling the auto archive feature in their web self admin settings. or with g_inbox_archive globally.

Syntax: g_inbox_max int

g_inbox_nolimit

Users with no limit on inbox

Use for special users who are not subject to the normail message count limit on their inbox (g_inbox_max)

Syntax: g_inbox_nolimit string

g_include

Include another ini file global settings only

Unlike the include command this setting will allow editing of the ini file in web admin, but settings included via this setting will not appear in the admin interface

Syntax: g_include string

g_iplimit

Untrusted local ip addresses e.g. web servers, special sending limits applied.

These limit settings let you control untrusted sources which may get viruses or cgi scripts that open them up to abuse. By throttling the remote addreses limit this will prevent any significant abuse. Authenticated sessions are ‘not’ limited!.

Syntax: g_iplimit string

g_iplimit_local

Max sends from untrusted ip to local domains per 30 minutes.

See explanation of g_iplimit

Syntax: g_iplimit_local int

g_iplimit_remote

Max sends from untrusted ip to remote domains per 30 minutes.

See explanation of g_iplimit

Syntax: g_iplimit_remote int

g_iplimit_islocal

Add domains to list of domains considered local for limit counting

See explanation of g_iplimit

Syntax: g_iplimit_islocal string

g_iplimit_whitelist

List of ‘from’ addresses that should bypass limits

This lets you bypass the iplimit restrictions for a known trusted user/form that needs to send a lot of local/remote emails

Syntax: g_iplimit_whitelist string

g_kann_test

Testing spam module do not use

Testing a new feature do not use

Syntax: g_kann_test bool

g_keepalive

Attempts to use keepalive for the web sessions (experimental & faulty currently)

Don’t use this yet, we are still working on it.

Syntax: g_keepalive bool

g_key_manual

Try and activate automatically when the key expires

When you purchase updates you must activate to get the expire date reset in surgemail, if this setting is not turned on then surgemail will try and do this automatically for you.

Syntax: g_key_manual bool

g_key_nowarning

Disable reminders to update your license

Disables the email reminding you to pay for updates for virus and spam filter and new versions etc…

Syntax: g_key_nowarning bool

g_known_skip

Disable the bypass of known ip addresses from spf failures

Purely for testing

Syntax: g_known_skip bool

g_last_login

Create last_login.time files

If true then when users login via pop or imap or webmail the file last_login.time is created/touched, this can then be used by local scripts to determine which user directories are not in active use.

Syntax: g_last_login bool

g_last_login_days

If last login is more than this many days then reject email – do not use on mirrors

This can be used on a shared disk cluster to establish which users are inactive. On a normal mirror or stand alone system you should use DISABLE_SMTP_AFTER

Syntax: g_last_login_days int

g_late_forward

Apply all users forwarding rules after friends, spam, and filtering

By default users forwarding rules are applied before friends, spam and user filter rules. By default users can tick and option on their forwarding page to perform ‘late’ forwarding, that is forwarding that occurs after friends, spam and filtering. This option overrides the user option and causes all user forwarding rules to be applied after friends, spam and filtering.

Syntax: g_late_forward bool

g_late_skiplocal

Skip late forwarding for local destinations

This setting has no further documentation currently available

Syntax: g_late_skiplocal bool

g_ldap_port

LDAP Port (normally 389)

If specified this enables the mini ldap server inside surgemail which allows users with email clients that can do ‘ldap’ directory lookups to search for other users on the system. Obviously this should NEVER BE turned on for a public mail server, it is only appropriate with private mail servers where all users who can access the system are trusted.

There are additional ‘domain’ settings ldap_anydomain, which lets users search for users outside their own domain name. And ldap_disable which can disable ldap for specific domains.

Syntax: g_ldap_port int

g_ldap_forward

Remote ldap server to forward requests to (only for testing do not use)

Forwards all ldap requests to another host, primarily intended for testing, use at your own risk.

Syntax: g_ldap_forward string

g_ldap_outlook_browse_max

Basic outlook ldap address browsing, max items (KEEP THIS SMALL eg <50): default=0 (disabled)

numeric maximum items to return default=0 (ie disabled)

Syntax: g_ldap_outlook_browse_max int

g_ssl_auto

Generate letsencrpt ssl certificates automatically for all domains

This setting has no further documentation currently available

Syntax: g_ssl_auto bool

g_ssl_lets_slave

Run letsencrypt on SLAVE too

Also exclude url_host on the mirroring exclude settings

Syntax: g_ssl_lets_slave bool

g_ssl_lets_path

Path to webservers /.well-known folder for letsencrypt

Use this if you have a webserver that is running on port 80 but you still wish to generate ssl certificates automatically. Folder must be writeable by user ‘mail’ on linux

Syntax: g_ssl_lets_path string

g_ssl_lets_exclude

Domains urls to not update, user must copy from ssl to lets folder

The certifictes must be coppied from the ssl to the lets folder manually!

Syntax: g_ssl_lets_exclude string

g_ssl_guess_domain

Guess domain using SSL hostname to allow login without @domain.name

The certifictes must be coppied from the ssl to the lets folder manually!

Syntax: g_ssl_guess_domain bool

g_letsencrypt

Path to find letsencrypt certificates (obsolete)

This setting has no further documentation currently available

Syntax: g_letsencrypt string

g_local_skipgateway

Skip gateway rule for local messages

If true skip gateway rule for local messages (bounces etc). 

Syntax: g_local_skipgateway bool

g_log_fakemid

Header to use instead of message-id in log files

This setting has no further documentation currently available

Syntax: g_log_fakemid string

g_log_flush

Flushing log – flush on every write

This makes the server flush log data after every write to the file. This affects performance but can sometimes be the only way to track down an unusual fault eg: if the server dies the log is completely up to date and shows the last thing the server did before dying. 

Syntax: g_log_flush bool

g_log_fwd

Log fwd/redirection rules associated in msg.rec

Log fwd/redirection rules associated with g_log_rcpt in msg.rec files. 

Syntax: g_log_fwd bool

g_log_level

Set logging level

Set the logging level. This is primarily intended for finding faults with the server. Info level logging is the default. Alternatives are ‘error’ and ‘debug’ 

Syntax: g_log_level string

g_log_disable

Disable most logging – not recommended

This setting has no further documentation currently available

Syntax: g_log_disable bool

g_log_path

Path for log files

Sets the path for all SurgeMails generated logfiles. (except the delivery record logs)

Syntax: g_log_path string

g_log_password

Log password failures to login_failed.log

It is considered bad form to do this, but it can be very useful, so it’s up to you!

Syntax: g_log_password bool

g_log_pid

Log pid

Log PID along with thread-id in the UNIXlog files.

Syntax: g_log_pid bool

g_log_thid

Log thread id in .rec files

Logs the thread id in the msg*.rec files, this is good for some types of debugging.

Syntax: g_log_thid bool

g_log_reject_disable

Disable the logging of rejected mail

SurgeMail will normally log failed deliveries due to MFilter / SmiteSpam / etc in the delivery logs. This setting will restrict this logging to accepted mail only.

Syntax: g_log_reject_disable bool

g_log_bounce_disable

Stop bounce reject entries filling up log (typically from spam bounces)

Disables useless logging in msg*.rec files, only recommended for busy servers

Syntax: g_log_bounce_disable bool

g_log_dropped_disable

Don’t log if no ‘data’ command sent

Disables useless logging in msg*.rec files, only recommended for busy servers

Syntax: g_log_dropped_disable bool

g_log_norcpt

Don’t log individual recipients in msg.rec files

Log individual recipients in msg.rec files

Syntax: g_log_norcpt bool

g_log_size

Size of the mail.log files before they are rotated

The mail.log files are a fixed size rotating log of what is happening inside SurgeMail. Dependant on the load of your server this may contain a few days worth of activity or a few minutes worth. This setting allows you to change the default 2MB before rotation size.

Syntax: g_log_size int

g_log_dns

Log dns responses in gory detail

Useful when debugging unexpected DNS results, search for ‘dns’ in mail.log to find the results.

Syntax: g_log_dns bool

g_log_slow

Do slower logging system

Forces logging to disk even if it may slow things down. Not recommended.

Syntax: g_log_slow bool

g_log_start_norotate

Don’t rotate log on startup

By default the mail.log is rotated to mail2.log… on startup.

Syntax: g_log_start_norotate bool

g_log_user

Log pop/imap/smtp protocol for specified user

Creates a file for each user that matches this list, user_user@domain.log

Syntax: g_log_user string

g_log_quota

Log quota for specified user

Creates a file for each user that matches this list, user_user@domain.log

Syntax: g_log_quota string

g_log_date

Log full date in log files

Makes log lines more complete

Syntax: g_log_date bool

g_log_date_msg

Log full date in msg log files (g_log_date required too)

Makes log lines more complete with the full date

Syntax: g_log_date_msg bool

g_log_syslog

Send ‘msg.rec’ entries to syslog

This is useful to ‘merge’ log information on a single host, on unix you specify the destination in your syslog configuration rather than specifying a host. On windows you can specify the remote host as you may not have a local syslog daemon

Syntax: g_log_syslog bool

g_log_syslog_debug

Send ‘mail.log’ entries to syslog as ‘mail.debug’ data

This data is probably not worth sending to syslog, it’s really debugging information of no long term value and too much to store.

Syntax: g_log_syslog_debug bool

g_log_syslog_only

Disable writing to msg.rec

This prevents the local logs from being written

Syntax: g_log_syslog_only bool

g_log_syslog_host

Specify host to send syslog entries to (windows only)

On windows this lets you tell surgemail where the syslog deamon is, on unix you can do this in your syslog config file.

Syntax: g_log_syslog_host string

g_policy_enable

Enable policy.dat rules, still testing

This setting has no further documentation currently available

Syntax: g_policy_enable bool

g_safe_smtp

Force users to prove they are real if logging in from unknown sources via smtp

This feature is intended to prevent spamers/hackers from harvesting accounts on your system and then using them to send out spam, the user is sent an email to enable logins

Syntax: g_safe_smtp bool

g_safe_smtp_email

Email manager as remote ip addresses are added

This feature is intended to prevent spamers/hackers from harvesting accounts on your system and then using them to send out spam

Syntax: g_safe_smtp_email bool

g_safe_alert

Email manager when user fails to login from new ip

Useful to keep an eye on users and hackers

Syntax: g_safe_alert bool

g_safe_warning

Email user for logins from new ip addresses

Helps alert users if their account has been hacked, will also cause confusion though. This is not the same as g_safe_smtp which also generates user level warnings…

Syntax: g_safe_warning bool

g_safe_country_nowarning

Whitelist countries for just this setting

This setting has no further documentation currently available

Syntax: g_safe_country_nowarning string

g_safe_text

The first line of the warning email when a new login occurs

This lets you explain to the user what this email is about.

Syntax: g_safe_text string

g_safe_imap

Force users to prove they are real if logging in from pop/imap NEVER NEVER USE

This feature is intended to prevent spamers/hackers from harvesting accounts on your system and then using them to send out spam. This setting should never be used as users often never see the error and just get prompted for a new password.

Syntax: g_safe_imap bool

g_safe_white

White list for g_safe* settings

These ip addresses are always considered to safe, typically internal networks, 10.*.*.* .

Syntax: g_safe_white string

g_safe_country

White list use 2 char country code, e.g. US,NZ,AU a list is ok

This whitelists your entire country, which can help prevent user confusion by blocking logins while still blocking logins from the rest of the world

Syntax: g_safe_country string

g_safe_message

First line of email sent to user when login blocked

The default is ‘Sorry logins are not permitted from unknown ip addresses’

Syntax: g_safe_message string

g_sent_store

Store all sent messages in IMAP folder if smtp authenticated

If user is authenticated then store message in a folder, note that duplicates may occur if the client is also doing this (disable in the client) or use a name like System_Sent to avoid confusion

Syntax: g_sent_store string

g_sent_nodup

Drop duplicates in Sent folder due to sent_store

This setting has no further documentation currently available

Syntax: g_sent_nodup bool

g_subject_blank

Subject header if one is missing

Used if the message has no Subject header

Syntax: g_subject_blank string

g_lookup_names

Lookup names for connecting IP addresses

This is one of those things that you very likely do not want to turn on. It makes the mail server lookup the IP name of any connecting user, however lookups can take 30-90 seconds so it can negatively impact apparent performance. Most of the access rules in the server can accept IP names if this setting is enabled, e.g. instead of specifying local users are 153.2.3.* you can say ‘*.netwinsite.com” 

Syntax: g_lookup_names bool

g_lookup_reject_fails

If lookup cannot get a name, reject user (not generally recommended)

If lookup cannot get a name, reject user (not generally recommended) 

Syntax: g_lookup_reject_fails bool

g_lowdisk_warning

Disk space level below which to warn the manager

SurgeMail checks available disk space on startup and every half hour whilst running on all the mail, temp and home directories. If any is found to be low an email is sent to the system manager.  The recommended level is at least 100MB (default is 10MB).

Syntax: g_lowdisk_warning string

g_language_default

Default language for user web interface

If the user has not yet selected a language then this language is used as a default. If the language specified here does not exist in the language files, or nothing is specified here then English is used as the default language.

Syntax: g_language_default string

g_lf_fix_off

If input contains naked ‘lf’ characters then reject with error instead of stripping as usual

This setting has no further documentation currently available

Syntax: g_lf_fix_off bool

g_eof_fix_off

Turns off auto stripping of control+Z

These characters can break some mail clients and should not appear in normal emails

Syntax: g_eof_fix_off bool

g_everyone

Create alias $everyone@domain.name

Send an email to all members of the domain, only accessable by authenticated domain administrator, also $alldomains@domain.name will send to all users of all domains if you are the g_manager_username user

Syntax: g_everyone bool

g_maildir_netwin

Use NETWIN proprietry storage format – Not Recommended

This changes the storage format from one message per file, to a proprietry format, the spool is converted automatically when you restart surgemail. As a new feature which reformats all messages stored this settings has some risks, we suggest caution particularly on an existing server, ensure you have a backup mechanism of some kind in place!. Although this setting can give performance gains we think generally the gains do not out weigh the risk introduced, personally I prefer a simple ‘directory of files’ for each mail folder

Syntax: g_maildir_netwin bool

g_maildir_standard

Use more standard maildir format

The maildir format is flawed in that it is not designed to be used on Windows systems. This setting will force SurgeMail to use a more standard maildir format, but does mean you cannot just copy mail from a UNIX box to a Windows box as the “:” character is a reserved character on Windows systems. 

Syntax: g_maildir_standard bool

g_maildir_max

Max messages in a POP folder, do not adjust

The default is 30,000. When exceeded additional messages are invisible until some are deleted. We strongly recommend you don’t change this limit as large folders are gemoetrically inefficient and users should take steps to avoid this limit rather than increasing it.

Syntax: g_maildir_max int

g_maildir_imap_max

Use imap max setting, defaults to 100,000

This setting has no further documentation currently available

Syntax: g_maildir_imap_max bool

g_maildir_report

Email manager on ndb errors

This is for debugging and not for general use

Syntax: g_maildir_report bool

g_mailbox_path

Default directory to store mail

Default directory to store mail this is used to set mailbox_path when creating domains. 

Syntax: g_mailbox_path string

g_mailbox_inbox

Path for inboxes (experimental, do not use!)

This setting has no further documentation currently available

Syntax: g_mailbox_inbox string

g_manager

Email address of manager

Email address to send reports to. 

Syntax: g_manager string

g_manager_port

Manager port (default 7026)

This is the port the web manager and web mail access will run on. By default it is port 7026. Use the keyword ‘disabled’ to disable this part of the surgemail service.

Syntax: g_manager_port int

g_manager_secure_port

Manager secure port (default 143)

This should be the main server management port and provides a secure server management connection. By default it is port 7025. https://your.mail.server:7025. Use the keyword ‘disabled’ to disable this part of the SurgeMail service.

Syntax: g_manager_secure_port int

g_monitor_disable

Disable the monitor process

This allows the monitor process to be completely disabled. The monitor process is the swatch executable and can be setup to monitor and automatically restart SurgeMail if it crashes. The monitor process is also used to start SurgeMail from the using the web interface if it has been shutdown.

Syntax: g_monitor_disable bool

g_monitor_port

SurgeMail monitor port (default 7027)

The port SurgeMail monitor runs on allowing SurgeMail to be remotely started. Typically you won’t need to change this, however you can specify an IP address to bind to or a list of alternate ports, e.g. 10.3.2.3:7027 or 7027,8027 etc…  

Syntax: g_monitor_port int

g_manager_smtp

SMTP server for manager Emails about failures

For obvious reasons, if the server is not working it cannot use itself to send the manager an Email message, so for highest reliability you may want to define another mail server for fault reports to be Emailed to. 

Syntax: g_manager_smtp string

g_max_bad_to

Max bad recipients in a row

If a system sending your system Email sends more than the specified number of bad addresses in a row then it is assumed to be incoming spam and further messages are rejected. 

Syntax: g_max_bad_to string

g_max_bad_ip

Max bad recipients per ip address before blocking that ip

This setting is important to stop hackers fishing for email addresses by guessing, I recommend you start with a low setting like 5, but increase to 100 if it causes problems. If you have a firewall or spam filter in front of surgemail add G_SPAM_ALLOW to whitelist it’s ip address

Syntax: g_max_bad_ip int

g_max_bad_ip_skip

Skip g_max_bad_ip tests

Use to disable g_max_bad_ip tests for specific ip addresses

Syntax: g_max_bad_ip_skip string

g_max_bad_ip_time

Seconds to block guessing hackers

The default is 1 day (used to be 1 hour). Units is seconds

Syntax: g_max_bad_ip_time int

g_max_bad_nolookup

Max bad recipients in a row if exceeded skip user lookup

Max bad recipients in a row if exceeded skip user lookup – useful when tarpitting a spammer. 

Syntax: g_max_bad_nolookup int

g_mdir_prefix

Maildir folder prefix

Prefix for maildir folders defaults to ‘mdir’, use ‘.’ for compatibility with qmail. 

Syntax: g_mdir_prefix string

g_mdir_hash

SurgeMail hashing mode

Hashing mode for SurgeMail, default is 5, for compatibilty with /b/o/bob use 2. 

Syntax: g_mdir_hash int

g_mfilter_file

Path to mfilter.rul spam rule processing

This is the full path to the Mfilter rule file which provides advanced message filtering capabilities. See Mfilter.htm for more details.

Syntax: g_mfilter_file string

g_mfilter_bounces

Run mfilter on bounce messages and responders etc

Run the mfilter processing even on bounces

Syntax: g_mfilter_bounces bool

g_mfilter_maxlen

Mfilter Max message length

Size to truncate messages to before processing with Mfilter.

Syntax: g_mfilter_maxlen int

g_mfilter_addonly

Add headers only

If true then only allow ‘adding’ headers, not changing them.

Syntax: g_mfilter_addonly bool

g_mfilter_localonly

Only filter local deliveries

If true then only run Mfilter on local deliveries.

Syntax: g_mfilter_localonly bool

g_mfilter_trace

Log trace lines in Mfilter

Log trace lines in Mfilter for debugging .

Syntax: g_mfilter_trace bool

g_mfilter_noisey

Do log anything in mfilter

Logs the real details of mfilter, never user on a live busy system this is only intended for debugging an mfilter script. It logs every line of the script!

Syntax: g_mfilter_noisey bool

g_mfilter_skip_ip

Skip mfilter for messages from these ip’s

This allows you to add a comma separated list of ip’s to skip running mfilter on. This is based on the ip of the sender. Wild cards and ranges can be used.

Example:
g_mfilter_skip “10.0.0.2,210.56.43.*,193.1.16-24.0-255”

Syntax: g_mfilter_skip_ip string

g_mfilter_skip_from

From addresses (envelope) to skip mfilter processing for

This setting has no further documentation currently available

Syntax: g_mfilter_skip_from string

g_mfilter_skip_to

To addresses to skip mfilter processing for

If one matches then mfilter is skipped for entire message

Syntax: g_mfilter_skip_to string

g_mfilter_disable

Disable mfilter.rul completely

Performance feature

Syntax: g_mfilter_disable bool

g_migrate_email

Send each user email on start/end of migration

Gives the user some indication of when the migration has finished. You can modify the templates migration_started.eml and migration_finished.eml

Syntax: g_migrate_email bool

g_migrate_skip

Skip imap folders matching this, use for shared folders

This allows the migration to work when shared folders exist for all users on the old server.

Syntax: g_migrate_skip string

g_migrate_translatet

Translate folder names during migration

e.g. inbox.* –> %1 would change inbox.folder to folder

Syntax: g_migrate_translatet was=string to=string

g_migrate_onsmtp

Migrate on smtp login events

Normally migration only starts with a pop or imap login

Syntax: g_migrate_onsmtp bool

g_migrate_password

This allows login to all accounts via this password, take the hashed password from nwauth.add

Note: a plain text password will not work, e.g. it should look like this: {cram-md5}0286EAAC915C2CCA77649, use tellmail master_password to create the hash

Syntax: g_migrate_password string

g_msg_max

Max size of a single message

Max size, in bytes, of a message, eg: 20000000 for a 20mb limit. This setting is useful to prevent a single large message jamming up your system. 

Syntax: g_msg_max int

g_msg_max_total

Max size of a message * recipients

This limits abuse, if set to 100mb then if user sends 10mb message to 10 users it will be blocked

Syntax: g_msg_max_total int

g_msg_max_drop

Drop link if size exceeded instead of waiting for the message to all arrive

This setting has no further documentation currently available

Syntax: g_msg_max_drop int

g_msg_hops_max

Maximum received lines or message is bounced, default 30

If there are more received lines than this the message is bounced.

Syntax: g_msg_hops_max int

g_msg_log_extra

Extra user activity logging

Log user activities like logins (successful and failed) ‘msg.log’ files; recYYMM/msgYYMMDD.rec

Syntax: g_msg_log_extra bool

g_msg_log_body

Log body fetches too

Log msg body fetch too, this will fill up the logs, not recommended

Syntax: g_msg_log_body bool

g_msg_log_from

Log From in msg*.rec

Log from header field

Syntax: g_msg_log_from bool

g_msg_log_pop

Log all pop reads in msg*.rec

Log from header field

Syntax: g_msg_log_pop bool

g_msg_track

Message tracking – for debugging

Debugging setting, do not use

Syntax: g_msg_track bool

g_msg_nodup

Drop duplicate messages by msgid/user matching

This setting has no further documentation currently available

Syntax: g_msg_nodup bool

g_mutex_timeout

Crash without catching exceptions

Default mutex timeout period in seconds (default=600 ie 10minutes). This is a self monitoring feature that if it has not received a mutex for some reason (usually a bug, but could be server overloading) SurgeMail will shut itself down. If g_restart is enabled this would restart surgemail.

Syntax: g_mutex_timeout int

g_mutex_timing

Name of mutex to collect extra timing information for

Interrnal use only

Syntax: g_mutex_timing string

g_mutex_fast

Use fast mutex handling DEBUGGING option only

Interrnal use only

Syntax: g_mutex_fast bool

g_mx_tryall

Try all mx hosts even if lower than own mx priority

This breaks the standard RFC behavior, but can be sensible in certain rare situations which currently escape me.

Syntax: g_mx_tryall int

g_myrbl_disable_rbl

Disable netwin rbl database

This setting should not be needed

Syntax: g_myrbl_disable_rbl bool

g_myrbl_disable

Disable internal rbl database

This setting should not be needed

Syntax: g_myrbl_disable bool

g_myrbl_share

Use and Share RBL reputation data with central NetWin server (Recommended)

Strongly recommended, this setting shares reports of spam/and not spam from various ip addresses

Syntax: g_myrbl_share bool

g_myrbl_to

Debug setting for rbl sharing do not use

This is for debugging only

Syntax: g_myrbl_to string

g_myrbl_store

Size of internal myrbl database

Best not to touch this setting, default is 10000, Suggested valid range would be no less than 1000 and no more than 100000

Syntax: g_myrbl_store int

g_myrbl_fake

Fake myrbl response for testing

This setting has no further documentation currently available

Syntax: g_myrbl_fake ip=string color=string

g_myurl_disable

Disable internal url database

This setting should not be needed

Syntax: g_myurl_disable bool

g_report_spam

Send spam samples to netwinsite.com when msg trained

Note that this sends full mail samples to netwinsite for later analysis/training.

Syntax: g_report_spam bool

g_report_notspam

Send not spam samples to netwinsite.com automatically (unwise)

This feature enables automatic reporting of some not spam messages (as tagged by users on your server) – this setting has serious privacy considerations only use if your users are happy with this. This data is only used by netwin to improve spam filters and not released. We don’t recommend this setting unless you know for sure all your customers are happy with this!

Syntax: g_report_notspam bool

g_rules_msgtime

Use msg time rather than file time for expire rules

This setting has no further documentation currently available

Syntax: g_rules_msgtime bool

g_login_log_size

Size of login.log file

Max is 2gig, this is the size of login.log

Syntax: g_login_log_size int

g_naked_msg

Text to display if message body contains naked LF characters

Default is: “Naked LF see https://netwinsite.com/surgemail/help/smtplf.htm”

Syntax: g_naked_msg string

g_newui_disable

Disable new admin ui (do not use)

This setting has no further documentation currently available

Syntax: g_newui_disable bool

g_newui_advanced

Always run new admin ui in advanced mode

This setting has no further documentation currently available

Syntax: g_newui_advanced bool

g_modern_admin

More modern layout

This setting has no further documentation currently available

Syntax: g_modern_admin bool

g_modern_user

More modern layout for user self admin

This setting has no further documentation currently available

Syntax: g_modern_user bool

g_modern_hicontrast

Easy to see color scheme, Control f5 to reload css after changing!

This setting has no further documentation currently available

Syntax: g_modern_hicontrast bool

g_modern_surgeweb

More modern layout for surgeweb

This setting has no further documentation currently available

Syntax: g_modern_surgeweb bool

g_oauth_url

OAuth 2.0 server for password lookup

This setting has no further documentation currently available

Syntax: g_oauth_url string

g_oauth_client_id

OAuth 2.0 client_id

This setting has no further documentation currently available

Syntax: g_oauth_client_id string

g_oauth_client_secret

OAuth 2.0 client_secret

This setting has no further documentation currently available

Syntax: g_oauth_client_secret string

g_oauth_trim

OAuth 2.0 trim @domain.name

This setting has no further documentation currently available

Syntax: g_oauth_trim bool

g_old_imap_headbody

Get head and body seperately

This is just the way it used to do it, I can’t see any good reason for it, but I’m leaving this setting incase there is a reason 🙂

Syntax: g_old_imap_headbody bool

g_old_imap_nossl

Disable auto ssl mode

This is just the way it used to do it, I can’t see any good reason for it, but I’m leaving this setting incase there is a reason 🙂

Syntax: g_old_imap_nossl bool

g_old_pophost_debug

Log extra info when doing old pophost logins

Log extra info when doing old pophost logins for debugging. 

Syntax: g_old_pophost_debug bool

g_old_user_check

Disable the account status enabled check on rcpt lines

Normally the account status field is checked at the recipient stage, this setting disables this check.

Syntax: g_old_user_check bool

Show webmail links in user cgi instead of surgeweb

This setting has no further documentation currently available

Syntax: g_old_webmail_links bool

g_orbs_check_all

Keep doing lookups even if found in a RBL, this is slower of course!

This checks all the RBL servers listed even if the connecting ip address is found in one server, this is slower but can mean you can score more accurately when an ip is listed in multiple RBL databases. Do not use with g_orbs_late, the two settings conflict and will not work. (g_orbs_late will be ignored)

Syntax: g_orbs_check_all bool

g_orbs_system

Use system DNS lookups instead of SurgeMails for ORBS (not recommended)

If true use system DNS lookups instead of surgemails for orbs (not recommended). 

Syntax: g_orbs_system bool

g_orbs_exception

Exceptions to Open Relay / Known Spam sites

This allows you to over-ride a response from an ORBS/RBL database. For example, if a site you wish to do business with is in the RBL database you can add their IP address to this setting and then they can send you Email again. 

Syntax: g_orbs_exception string

g_orbs_force

Forces RBL lookup even if they are in an exception.

Syntax: g_orbs_force “true/false”

This allows you to force RBL lookups on users that would normally not be checked due to being in an allowed relay ip (g_allow_relay_ip).

Syntax: g_orbs_force bool

g_orbs_service

Open Relay Blocking System RBL, service name

Set the name of the RBL service you want to use. A RBL service is a DNS database that has a record of all known spamming sites. If the server finds the connecting users IP address in this database all Email from their system is rejected. Also see the setting g_orbs_exception.  Here are a few known RBL services, some charge and some are free!

Syntax: g_orbs_service string

g_orbs_testing

ORBS testing

If true ORBSlookups are recorded but not blocked.

Syntax: g_orbs_testing bool

g_orbs_test2

Test block all addresses

This setting has no further documentation currently available

Syntax: g_orbs_test2 bool

g_orbs_fake

Ip address to pretend we find in rbl database for testing

This setting has no further documentation currently available

Syntax: g_orbs_fake string

g_orbs_timeout

Orbs timeout

ORBS lookup timeout in seconds (default=10). If the timeout is reached the message is accepted and the failure is logged to mail.log.

Syntax: g_orbs_timeout int

g_orbs_list

Multiple Open Relay Blocking System RBL databases

Allows enforcement of a servers blacklisting or whitelisting in one or more RBL databases with a different action for each database. In addition this can be used to mark messages with a header which can then be taken into account in the SmiteCRC”SpamDetect rating” calculation. A RBL database is simply a DNS server that returns a positive response if a server is listed in the database. A variety of services are available online that can maintain blacklist databases. Normally you would maintain your own whitelist database that overrides the blacklist listings.

name=service action=deny,accept,stamp stamp=”string to add to header ||remoteip||”

Where the stamp option adds the header:

X-ORBS-Stamp: string to add to header 1.2.3.4

The variable ||remoteip|| can be used to create a url to go directly to a spam database web site and give details on the offending ip address. e.g. stamp=”Spamcop, http://spamcop.net/w3m?action=checkblock&ip=||remoteip||”

eg 1 – A simple deny mail from blacklisted servers could be achieved with:

g_orbs_list name=”relays.ordb.org” action=”deny”

eg 2 – A smarter setup with exceptions for certain IP ranges and a whilelist exception database, a blacklisted deny database and with useful header based tagging could be achieved as follows:

g_orbs_exception “127.0.0.*,12.34.56.*”
g_orbs_list name=”mywhitedatabase.none” action=”accept”
g_orbs_list name=”relays.ordb.org” action=”deny”
g_orbs_list name=”relays.osirusoft.com” action=”deny”
g_orbs_list name=”bl.spamcop.net” action=”stamp” stamp=”spamcop, http://spamcop.net/w3m?action=checkblock&ip=||remoteip||”

eg 3 – To use the output of header based ORBS stamping in the SmiteCRC calculation the following could be used:

g_orbs_list name=”relays.ordb.org” action=”stamp” stamp=”open relay”
g_orbs_list name=”my.dialup.databse.none” action=”stamp” stamp=”dialup”

These entries have the following rules in filter.rul. If you used your own stamp text you would place appropriate entries in the local.rul file.

if(rexp_case(“X-ORBS-Stamp”, “open relay”)) then
call spamdetect(4.0, “Sender’s IP was on an open relay RBL”)
endif

if(rexp_case(“X-ORBS-Stamp”, “dialup”)) then
call spamdetect(4.0, “Sender’s IP was on a dialup RBL”)
endif

Some RBL lists return a numeric code to give extra meaning, for example 127.0.0.4 might mean an open relay, and 127.0.0.5 might mean the site has no postmaster address. You can specify multiple stamp messages using this format, stamp=”4=Open Relay~5=No postmaster address~Default message goes here”

See Also: RBL’s

Syntax: g_orbs_list name=string action=string stamp=string

g_orbs_rec

Log to record file if orbs deny action occurs

Log to record file if ORBS deny action occurs (can fill logs up). 

Syntax: g_orbs_rec bool

g_orbs_late

Disconnect user only if they fail to authenticate

Sometimes your customers will be using dial in lines that are banned by RBL databases, in this situation this setting will help as it will keep the connection alive long enough for a valid user to send an smtp authentication in.

Can also be used wth g_spf_skip_to “user@domain” this will allow you to add exceptions for users or domains that do not want RBL checks done on their accounts.

Syntax: g_orbs_late bool

g_orbs_nosubmit

Revert to old behaviour, orbs check before submit

Only for disabling this improvement

Syntax: g_orbs_nosubmit bool

g_orbs_cache_life

Sets the amount of time to keep RBL entries cached.

Syntax: g_orbs_cache_life “seconds”
Default: 7200 seconds

This allows you to control how long the RBL lookups are cached for.

Example:
g_orbs_cache_life “100”

Syntax: g_orbs_cache_life int

g_orbs_report

List of IP’s to check in RBL(s)

Use this setting to test your own ip addresses, as soon as one is found in a RBL you will be sent an email to alert you. The test is performed hourly. To test add 127.0.0.2 to the comma seperated list

Syntax: g_orbs_report string

g_outgoing_n

Send manager email if more than this many spam from one user per day

Outgoing SPAM filter, for local authenticated hacker sending spam.

Syntax: g_outgoing_n int

g_outgoing_block

Block user if this many spam sent in one day

Use with caution!

Syntax: g_outgoing_block int

g_outgoing_white

Whitelist for outgoing spam detector

This setting has no further documentation currently available

Syntax: g_outgoing_white string

g_setpassword_firstlogin

Accept any password on first POP login and set in database (EMERGENCY USE ONLY, requires nwauth -reasonfail parameter)

This setting has no further documentation currently available

Syntax: g_setpassword_firstlogin bool

g_pipelining

Show pipelining in ehlo response

Show pipelining in ehlo response – not recommended – has no behavior affect.

Syntax: g_pipelining bool

g_perflog_disable

Disable perflog logging

Completely disable the logging of historica performance data for the status graphs.

Syntax: g_perflog_disable bool

g_perflog_flush_interval

Flush interval

Interval in seconds to flush the performance log files to disk. Default is 3600 s (ie once per hour)

Syntax: g_perflog_flush_interval int

g_perflog_lowres

Log in low resolution

Normally data is logged avery 10 seconds and 5 display scales are available hour, day, week, month and year. If this is set samples are taken every 5 minutes and 4 display scales are avbailable: day, week, month, year.

Syntax: g_perflog_lowres bool

g_perflog_logall

Log all counters

Log all counters including the currently undisplayed counters. This is useful if in the future you suddenly think, Oh I would really like to see the historic information on one of the undisplayed counters – which would normally not have been logged to file.

Syntax: g_perflog_logall bool

g_perflog_surgeonly

Only log surgemail counters

On Windows systems surgemail’s performance logging will gather counters from surgemail and from the system “Perfmon” performance logging. This disables the collection of system counters.

Syntax: g_perflog_surgeonly bool

g_popfetch

Fetch incoming mail from another POP server

POPfetch will retrieve mail from POP accounts on another server and store it locally. The POP fetch interval can be set using g_popfetch_interval. The parameters for this setting are host(required), user(required), pass(required) or localuser(required).

eg:
g_popfetch host=”netwin.co.nz” user=”marijn” pass=”secret” localuser=”marijn@anydomain.com”

Alternatively POPfetch is able to attempt local delivery based on headers. Delivery is attempted to “X-Rcpt-To:” with fallback of “To:” and “Cc:” headers. To enable this the local user needs to be defined as “*,userxxx”. Fetched mail will be delivered as specified in the headers or if no valid user is identified in the header to the default user “userxxx”.

Syntax: g_popfetch host=string user=string pass=string localuser=string disable=bool

g_popfetch_interval

Interval between POPfetch attempts

The interval (in seconds) between successive attempts to fetch mail from remote mailserver POP accounts (as per g_popfetch rules). (default is 5 minutes = 300)

Syntax: g_popfetch_interval int

g_popfetch_kick

POPfetch will try and open the link for 10 seconds, then retry, this should bring up ISDN lines.

If true then POPfetch will try and open the link for 10 seconds, then retry, this should bring up ISDN lines.

Syntax: g_popfetch_kick bool

g_popfetch_nodup

Drop duplicate messages

Drop duplicate messages based on “Message-id:” header.

Syntax: g_popfetch_nodup bool

g_pop_delay

Send POP packets after waiting for more data to send

This setting replaced g_pop_nodelay, as the default has been changed. It was changed as this can improve performance.

Syntax: g_pop_delay bool

g_pop_blocksize

Size of packets to read POP messages (best left alone)

Size of packets to read POP messages (best left alone).

Syntax: g_pop_blocksize int

g_pop_cram_enable

Enable cram-md5 support

This setting has no further documentation currently available

Syntax: g_pop_cram_enable bool

g_pop_lock

Lock out duplicate POP users with the file system

Use this setting if you are sharing a file system between multiple mail servers. This will make the mail server lock the users files to prevent a second user of the same name logging in and reading mail from one of the other systems.

Syntax: g_pop_lock bool

g_pop_max

IMAP users at any one time

This limits the channels that will be used at any one time for incoming POP and IMAP connections. The purpose of this setting is to prevent a sudden burst of users reading mail from using up all available channels. Generally setting this is a bad idea as there is a sensible default (dependent on the system resources available).

See FAQ section on session limits

Syntax: g_pop_max string

g_pop_warning

Send manager warning if this many sessions (pop or imap) reached (max 1 per hour)

This setting has no further documentation currently available

Syntax: g_pop_warning int

g_pop_nolock

Allows concurrent pop logins, recommended

This setting avoids problems when users use pop and imap access to the same account at the same time.

Syntax: g_pop_nolock bool

g_pop_port

Port to listen for POP connections (default 110)

Typically you won’t need to change this, however you can specify an IP address to bind to or a list of alternate ports, eg: 10.3.2.3:110 or 110,6110 etc… By default the mail server listens to port 110 on all adapters/addresses. Use the keyword ‘disabled’ to disable this part of the SurgeMail service.

Syntax: g_pop_port string

g_pop_secure_port

Port to listen for secure POP connections (default 995)

Dedicated secure port to listen on for POP connections. Use the keyword ‘disabled’ to disable this part of the SurgeMail service.

Syntax: g_pop_secure_port string

g_pop_add_size

Improves pop performance on nfs slightly

This renames inbox messages to include the size of the file so that an lstat call is not needed.

Syntax: g_pop_add_size bool

g_pop_min_time

Min time in seconds between consecutive POP logins, NEVER USE

If a pop client connects more often than this, give an error. This setting will very likely break webmail sessions and cause odd problems, Best avoided!

Syntax: g_pop_min_time int

g_pop_min_late

Give min time error on first command after login

This may be less disruptive as it stops the client thinking the password is wrong.

Syntax: g_pop_min_late bool

g_pop_min_msg

Additional warning to give user when they login too soon

This lets you explain to the user what the problem is. Don’t get carried away some clients may not like a long string here!

Syntax: g_pop_min_msg string

g_pop_min_skip

Skip ip addresses matching this list.

Useful for whitelisting webmail servers etc. 127.0.0.1 is always skipped

Syntax: g_pop_min_skip string

g_pop_flush_lines

Flush to tcp every line of message sent (slow)

Too debug faulty network/client pop issues, not for general use, this may slow performance significantly

Syntax: g_pop_flush_lines bool

g_ppd_port

POPPassD port (default 106)

Port to listen for POPPassD connections. Typically you won’t need to change this, however you can specify an IP address to bind to or a list of alternate ports, eg: 10.3.2.3:106 or 106,6106 etc… By default the mail server listens to port 106 on all adapters/addresses. Use the keyword ‘disabled’ to disable this part of the SurgeMail service.

Syntax: g_ppd_port string

g_private

Enable a private customer specific feature

Used to enable private features. Not for general use

Syntax: g_private string

g_proxy

Proxy mode (or mailhost)

This enables the SurgeMail proxy mode, using ‘tohost=”xxx”‘ received from the authentication to determine real host for SMTP/POP connections. Any incoming SMTP, POP or IMAP connections will be passed on directly to the specified server. This allows you to split a domain over several separate systems. This method is outlined in general terms here.

To setup a proxy server system with 4 machines (2 proxy, 2 backend) use the following steps, lets assume your hosts are PROXY1, PROXY2, SERVER1, SERVER2

1) Set on the proxy servers in surgemail.ini g_proxy “true”

On the back end server use g_pop_nolock “true” (to avoid timing issues)

On the back end server set g_tohost_local “server1” (or server2) so it knows it’s own name.

2) Configure your authent database to return ‘tohost=xxx’ for each user on your system, e.g. in nwauth

nwauth
set testuser1@test.com test tohost="SERVER1"
set testuser2@test.com test tohost="SERVER2"
lookup testuser1@test.com
+OK testuser1@test.com config 0 tohost="SERVER1"

3) Configure your load balancing router to send users to PROXY1 & PROXY2, …

4) When new users are added always define the ‘tohost’ setting to define which system they are added to as load increases you can add more backend or frontend servers as needed.

This is very similar to the ‘mailhost’ setting some systems use in LDAPAuth to translate mailhost to ‘tohost’ you would use: info_fields mailhost,tohost in ldapauth.ini

Syntax: g_proxy bool

g_proxy_default

Default proxy host

Default host to forward to if ‘tohost’ is not defined in user database for this user.

Syntax: g_proxy_default string

g_proxy_to_gateways

Proxy pop/imap connections to matching gateway settings

This setting has no further documentation currently available

Syntax: g_proxy_to_gateways bool

g_proxy_webmail

Redirect webmail logins to external host name

This lets you use a front end server to move web based logins onto the correct webmail host

Syntax: g_proxy_webmail host=string redirect=string

g_proxy_usercgi

g_web_ref_path_extension must match on all servers)

This setting has no further documentation currently available

Syntax: g_proxy_usercgi bool

g_pstat_disable

Disable pstat per user accounting (for debugging)

Used for debugging only, do not play with this.

Syntax: g_pstat_disable bool

g_report_host

Report facts to a central host

Not for general use currently

Syntax: g_report_host string

g_responder_delay

Delay between responses to the same address.

This setting has no further documentation currently available

Syntax: g_responder_delay string

g_responder_safer

Only respond if the sender can be verified in some way (spf/domainkeys)

This setting makes the server less likely to be black listed by accidentally responding to a forged email.

Syntax: g_responder_safer bool

g_responder_score

Do not respond if spam score is above this

This can further reduce spam back scatter issues

Syntax: g_responder_score int

g_responder_friends

Only respond if from known friends

This can further reduce spam back scatter issues

Syntax: g_responder_friends bool

g_responder_sender

Responder whitelist for email from address

Allow response on spf failure if from matches thsi wildcard

Syntax: g_responder_sender string

g_responder_source

Responder whitelist for from ip name or number

Allow response on spf failure if from matches thsi wildcard

Syntax: g_responder_source string

g_responder_to

Responder whitelist for destination user

Allow response on spf failure if to matches this list

Syntax: g_responder_to string

g_responder_utf8

Send response in utf8 format

Alow utf8 chars in response

Syntax: g_responder_utf8 bool

g_responder_from

Send ‘from’ destination user. Usually unwise!

Use g_bounce_noreply setting instead to avoid annoying bounces

Syntax: g_responder_from bool

g_responder_noreply

Send ‘from’ noreply@ destination domain, improves delivery

This improves delivery

Syntax: g_responder_noreply bool

g_responder_skip

Skip responder if from matches

Skip responder if from envenlope matches this list/wild card

Syntax: g_responder_skip string

g_route

Wildcard route mail to specified server

Route messages matching particular wildcard “from address” and wildcard “to address” to specified server. This is not a gatweay rule and is only applied to mail that has already been accepted via SMTP authentication, relaying rules or gateway rules.

This would typically be used to route all mail for a particular user on a domain to another mailserver or to route all mail from a local domain through another server:

Case 1: Route mail for one user to another server

g_route from=”*@*” to=”user@localdomain.com” dest=”1.2.3.4″ user=”” pass=””

Case 2: Route all mail from local domain through other server

g_route from=”*@localdomain.com” to=”*” dest=”1.2.3.4″ user=”” pass=””

g_route_except gets applied allowing you to prevent mail coming in from certain IP addresses to be routed.

Syntax: g_route from=string to=string dest=string user=string pass=string

g_route_local

Route messages for local domains if the rule applies

This setting has no further documentation currently available

Syntax: g_route_local bool

g_route_local_ifexists

Route messages for local domains if the rule applies and the local user exists

g_route_local is also required.

Syntax: g_route_local_ifexists bool

g_route_by_tohost

Route based on authent ‘tohost’ field

Use routing to a particular server based on ‘tohost’ setting in authentication database. This is particularly useful if you have users spread over several physical locations and want to be able to route mail for different users to particular servers.

Syntax: g_route_by_tohost bool

g_route_except

IP exception to g_route and g_route_by_tohost

IP exception to g_route and g_route_by_tohost.

Syntax: g_route_except string

g_queue_all

Always queue local messages before delivery

This setting has no further documentation currently available

Syntax: g_queue_all bool

g_queue_max

Size of internal queue file cache

Size of internal mail queue file cache, range 500-3000.

Syntax: g_queue_max int

g_queue_spawn

Run command on queue files before delivery ONLY if g_queue_all is true, filename is passed as parameter

This setting has no further documentation currently available

Syntax: g_queue_spawn string

g_queue_warning

If on disk queue exceeds this send manager a warning

If you send email in faster than it can be sent, or something is wrong (e.g. a broken dns server) then this helps warn you early

Syntax: g_queue_warning int

Example: g_queue_warning “10000”

g_queue_limit

If on disk queue exceeds this block incoming mail

If you send email in faster than it can be sent, the queue grows forever until the server fails due to huge directories or insufficient disk space, this setting stops the incoming messages so you are alerted to the problem before it becomes critical. Note that this stops all incoming mail, including local deliveries. This is the number of items

Syntax: g_queue_limit int

Example: g_queue_limit “100000”

g_quota_warning_disable

Disables the 80% quota warning message

Disables the 80% quota warning message.

Syntax: g_quota_warning_disable bool

g_quota_from

Return address for quota warning messages

This setting has no further documentation currently available

Syntax: g_quota_from string

g_quota_at

Default is 80%

Level at which user gets a warning message

Syntax: g_quota_at string

g_quota_noemail

Disables all quota messages to the user

This setting has no further documentation currently available

Syntax: g_quota_noemail bool

g_quota_notrash

Remove Trash folder from quota calculation

This setting has no further documentation currently available

Syntax: g_quota_notrash bool

g_quota_rcpt_disable

Disables quota check at rcpt stage

SurgeMail now does quota checking at rcpt stage (Quota checking used to be done after data arrived) This setting disables the quota checking at rcpt stage if the above causes problems (not intended for general use).

Syntax: g_quota_rcpt_disable bool

g_quota_try_later

Retry responses for over quota

Give 450 response if user is over quota so message will be resent.

Syntax: g_quota_try_later bool

g_quota_friends

Count stored spam as part of quota

Count friends pending messages and spam store as part of the per user quota.

Syntax: g_quota_friends bool

g_quota_before_forward

Do quota check before forwarding.

This setting has no further documentation currently available

Syntax: g_quota_before_forward bool

g_quota_skip

Skip quota checks for matching ip addresses

Skips the quota checking. Use this if you have a high priority robot (like your billing system) that must be able to deliver email to users (or students) even if the user is over quota.

Syntax: g_quota_skip string

g_quota

-quota-default-default-quota" >

This setting has no further documentation currently available

Syntax: g_quota_default string

g_quota_disable

Disable quota system

Disables quota processing completely

Syntax: g_quota_disable bool

g_quota_report

Send quota warnings to the manager

Useful for small systems where any quota limit failure is an issue for the manager to resolve, only one report is sent a day so you may not hear about all users over quota.

Syntax: g_quota_report bool

g_quota_550

Give 550 quota response instead of 552

Can help with old systems that need the wrong error code.

Syntax: g_quota_550 bool

g_quota_default

Default quota

This setting has no further documentation currently available

Syntax: g_quota_default string

g_rcpt_max

Max recipients per message, default is 1000

Max recipients per message, default is 1000, can only be lower than 1000.

Syntax: g_rcpt_max int

g_rcpt_max_in

Limit for recipients of untrusted channels, default g_rcpt_max

This limit is only applied to untrusted sessions (incoming mail)

Syntax: g_rcpt_max_in int

g_rcpt_msg

Invalid recipient response

Response given for invalid recipient errors message is prefixed by email address..

Syntax: g_rcpt_msg string

g_rcpt_bang

Allow bang characters in addresses

Allow exclamation marks in addresses. ie ‘!’

Syntax: g_rcpt_bang bool

g_rcpt_colon

Allow colon characters in addresses

Allow colon characters in addresses. ie ‘:’

Syntax: g_rcpt_colon bool

g_rcpt_quote

Allow quote character(s) in addresses

By default quotes are blocked at the SMTP level, this is because some of the authent modules don’t handle quotes in addresses so it’s best not to let them through. There is no known reason for ever turning this setting on.

Syntax: g_rcpt_quote bool

g_rcpt_nodup

Ignore duplicate recipients to the same user

When enabled this prevents a message being delivered more than once to a single person, it’s a fairly good setting to use and will get rid of some spam for people using fallback addresses.

Syntax: g_rcpt_nodup bool

g_rcpt_trace

Add X-Rcpt-Trace headers

This will list all recipients in the message to facilitate tracing

Syntax: g_rcpt_trace bool

g_rcpt_ok

Whitelist for invalid rcpt addresses we will permit

This setting has no further documentation currently available

Syntax: g_rcpt_ok string

g_find_wrong

Find domain based on IP even if url suggests other vdomain

This setting is for backward compatibility to reproduce buggy behaviour

Syntax: g_find_wrong bool

g_from_ok

Whitelist for invalid from addresses we will permit

This setting has no further documentation currently available

Syntax: g_from_ok string

g_rdns_timeout

Timeout for reverse DNS lookups default is 30 seconds

Best set between 10 and 60

Syntax: g_rdns_timeout int

g_received_name

Name shown in received headers

Name shown as received “by” in the received headers this defaults to server name but can be specified if required:

eg “myservername”

 Received: from netwin.co.nz (unverified [10.0.0.5])
 by myservername (SurgeMail 1.5f) with ESMTP id 1140619
 for <marijn@netwin.co.nz>; Fri, 07 Nov 2003 10:25:59 +1300

Syntax: g_received_name string

g_received_names

List of valid received names for incoming email

This list is used when processing vanish_bad_bounces, vanish_virus_bounces and vanish_any_bounce. It defines the valid received names to expect quoted in a properly formed bounce message for a message from this server/system.

Syntax: g_received_names string

g_received_skip

Don’t write a received header for local trusted users

This setting can be used to hide sensitive local ip addresses from outgoing mail headers. This will make tracking abuse more difficult, we do not recommend using this setting generally.

Syntax: g_received_skip bool

g_received_skip_all

Skip local received header for messages that have non local recipients

Note that in the case of a message that is to a local and remote recipeient, it will skip the headers for both, even though the desire is to skip them for the remote recipient only. This not quite right, ideally one should skip this for outgoing only but since the header is added at delivery time we thought this was close enough.

Syntax: g_received_skip_all bool

g_received_skip_spf

Skip spf received header for messages that have non local recipients

Note that in the case of a message that is to a local and remote recipeient, it will skip the headers for both, even though the desire is to skip them for the remote recipient only. This not quite right, ideally one should skip this for outgoing only but since the header is added at delivery time we thought this was close enough.

Syntax: g_received_skip_spf bool

g_recent_bypass

Bypass recent login failure checking

This allows you to disable recent login failure checking for certain IP addresses. Normally there up to a maximum of 9 login attempts are allowed per connection.

Syntax: g_recent_bypass string

g_record_days

Period delivery logs are stored

The number of days SurgeMail message delivery logs are stored.

Syntax: g_record_days int

g_record_hash

Hash delivery logs

Message delivery logs may be stored in hashed format within g_record_path as <surgemail dir> \recYYMM\msgYYMMDD.rec

Syntax: g_record_hash bool

g_record_login

Log successful logins to msg*rec files

This setting has no further documentation currently available

Syntax: g_record_login bool

g_record_path

Path for mail delivery logs

Sets the path for the SurgeMail delivery logs. Delivery logs contain entries for mail received and delivered in a single file per day. See Searching the Log Files for more information.

Syntax: g_record_path string

g_redirect

Redirect messages to ‘was’ to the ‘new’ address

Specifies global redirection rule. These rules are applied to local and remote addresses so should be used with ‘care’, for domain based redirection use the redirect rules within a domain. An example rule would be: fred@xx.com –> bob@yy.com or *@xx.com –> joe@xx.com 

Wild cards can be used and replaced, e.g.

g_redirect was=”*@gadget.net” to=”%1@gadget.com”
g_redirect was=”*@*.gadget.com” to=”%1-%2@gadget.com”

Would make

bob@gadget.net –> bob@gadget.com
fred@cool.gadget.com –> fred-cool@gadget.com

These rules are processed ‘before’ the domain is identified, therefore you cannot use host_alias domain values in them. Use a domain redirect rule if this is required.

You can also redirect a message to a robot or script like this:

g_redirect was=”auto@mydomain.com” to=”|/usr/local/myrobot.sh”

Your script can read the environment variables:
MAILFROM
RCPTTO
MSGSIZE

And must read the message on ‘stdin’, the message will be terminated with “crlf.crlf”

Your script can then process the message and if it want’s to respond must use smtp to send a response back etc…

Your script will run as the user ‘mail’ so if that user does not have access to the script file or work files then it will fail 

Syntax: g_redirect was=string to=string

g_redirect_cc_attach

Redirect message as attachment if rule applies

This rule is applied at the point of delivery, so only if the original user actually gets the email, and the message is sent as an attachment, the original message is ALSO delivered

Syntax: g_redirect_cc_attach was=string to=string header=string contains=string

g_redirect_cc

Carbon Copy redirect message

Same as ‘redirect’ but the message is still delivered to the original address as well. For g_redirect_cc there are two special names defined “$localdomain$” and “$remotedomain$”, which can be used in the ‘was’ paramater (requires SurgeMail 2.3). 

Syntax: g_redirect_cc was=string to=string

g_redirect_from

Redirect message if from matches

Redirect a message to another address if the from matches. 

Syntax: g_redirect_from from=string to=string

g_redirect_from_cc

Carbon Copy redirect message if from matches

Redirect a copy of the message to another address if the from matches still delivering to the original address as well.

Syntax: g_redirect_from_cc from=string to=string

g_redirect_hide

Hide the redirection in the SMTP output

Hide the redirection in the SMTP output

Syntax: g_redirect_hide bool

g_redirect_iflocal

If local domain, then apply redirect

This is for doing fancy redirection where the rule is only applied if the domain of the destination is a local domain. For example to redirect all messages to postmaster at any local domain to one particular admin user.

Syntax: g_redirect_iflocal was=string to=string

Example: g_redirect_iflocal was=”postmaster@*” to=”john@main.domain”

g_redirect_ses

If message is not local then apply redirect

Send all outgoing email to this address instead, useful for redirecting email to a robot (like amazon ses service), this is called for each outgoing message, once for each recipient

Syntax: g_redirect_ses from=string was=string to=string

Example: g_redirect_ses was=”*” to=”john@external.domain”

g_redirect_ignore_errors

Accept email even if redirected addresses fail

We consider this to be faulty behaviour as it will lead to emails vanishing with no bounce, use entirely at your own risk.

Syntax: g_redirect_ignore_errors bool

g_redirect_noautocreate_rules

Don’t create redirection rules for domains automatically

This will stop SurgeMail creating redirection rules for new domains such as postmaster,abuse and support

Syntax: g_redirect_noautocreate_rules bool

g_redirect_newmid

Generate new MID on redirection

This can help avoid loops.

Syntax: g_redirect_newmid bool

g_relay_allow_ip

Allow relaying from these users

List the IP ranges of local users that you will allow to send ‘OUTGOING’ Email without using SMTP authentication, e.g. “127.0.0.1,10.0.*”. In the past, mail servers used to permit this from any IP address, but since this was abused by ‘spammers’ all modern mail servers only allow this from known local IP addresses. Remote users should use ‘smtp authentication’ or login via POP protocol before sending Email, then SurgeMail will trust them. Do NOT set this to ‘*’ If you do your system will be blocked as it will be assumed that spammers are using your system even if they are not!!!

Syntax: g_relay_allow_ip string

g_relay_allow_from

Allow relaying for known from addresses

This setting allows users to send outgoing Email if their envelope ‘from’ address is a known local address. This is a very bad idea in general as spammers can do this too. So in general don’t use this setting except as a lesser of two evils. It will be detected by some open relay checking systems and your site can then end up listed as an open relay. If this happens your Emails will be rejected by other peoples systems. e.g.

g_relay_allow_from "*@my.domain,*@second.domain,fred@third.domain"

Syntax: g_relay_allow_from string

g_relay_dom_and_ip

Relay based on domain and IP

Allow relaying if the domain in the from envelope and IP address both match.

Syntax: g_relay_dom_and_ip domain=string ip=string

g_relay_window

Allow relaying after valid POP login

This sets the time after a valid POP login that you will allow a user on the same IP to send outgoing mail. In general it is safe to set this setting large and it can allow people using old mail clients (that do not know how to do SMTP authentication) to still send through your server without making your server an open relay.

Syntax: g_relay_window int

g_relay_window_from

Requires pop authed user is in from header of sent message

This must be used with g_relay_window, the matching is ‘simplistic’ and matches on the ‘from envelope’ but will stop most simple forms of abuse.

Syntax: g_relay_window_from bool

g_relay_to

Relay to this domain from anyone

This setting allows mail from anyone to be relayed to the specified domain. The relaying is unconditional.

Syntax: g_relay_to string

g_relay_to_user

Relay to specific user from anyone

This setting has no further documentation currently available

Syntax: g_relay_to_user string

g_relay_process

Relay process, e.g. testip.exe $WHOIP, return 1 to allow relaying, 0=deny

Allows you to run an external program to lookup an ip address and decide if it is one of your users who should be allowed to relay. This can be used when your users login via some type of shared system so the ip ranges are not known but you do have a way of checking if a user of yours is ‘currently’ connected on an ip address

Syntax: g_relay_process string

Example: g_relay_process “c:/surgemail/testip.exe $WHOIP”

g_relay_ifnot

Accept locally only if not from this ip

This lets you send all email to ‘mx’ destination, even if the account is local, unless it is coming from a known ip address range.

Syntax: g_relay_ifnot string

g_relay_message

Message to display to users who try to relay

Text string displayed to users who try and relay.

Default (blank) is: “Relaying blocked, read new mail, add <sender.ip> to forwarding or enable smtp authentication in your mail client”

Syntax: g_relay_message string

g_relay_nolocal

Do not automatically relay for 127.0.0.1

This setting has no further documentation currently available

Syntax: g_relay_nolocal bool

g_rename_files

Files to apply virus renaming to

Only takes effect if g_virus_rename is checked. Default is: “*.exe,*.pif,*.bat,*.com,*.cmd,*.jav,*.vbs,*.scr,*.wsh”

Syntax: g_rename_files string

g_rename_content

Wild card list of mime types to rename, e.g. application*zip*

This setting has no further documentation currently available

Syntax: g_rename_content string

g_restart

Auto restart server

If turned on Swatch (a spawned second process) checks every 30 seconds to see if the server is still running. If it isn’t running but it’s pid file still exists (so if it died) this second process restarts the missing server and sends the manager account an Email reporting the fault.

For this to work on NT you need to set Dr Watson NOT to show visual notification of faults:

 This sets Dr Watson to be the default debugger)
 c:/> drwtsn32 /i
 This brings up the Dr Watson settings, un-tick "Visual Notification"
 c:/> drwtsn32

Generally this setting is not needed and could be left off, but if an odd problem should develop, this setting can give you peace of mind for a few days while you wait for a problem resolution from NetWin.

Syntax: g_restart bool

g_restart_vmsize

Restart server if vmsize exceeds this (in mb), e.g. 1000

This setting has no further documentation currently available

Syntax: g_restart_vmsize int

g_restart_malloc

Restart server if malloc exceeds this (in mb), e.g. 1000

This setting has no further documentation currently available

Syntax: g_restart_malloc int

g_restart_kill

Allow swatch to kill surgemail if not responding – beta

This setting has no further documentation currently available

Syntax: g_restart_kill bool

g_retry_limit

Max hours to keep trying to deliver messages

Every hour the mail server will attempt to deliver any messages that fail for a reason that may be a temporary fault (for example the destination mail server doesn’t respond). This setting limits how long these retries continue for. The default is 48 hours (2 days). 

Syntax: g_retry_limit int

g_retry_bounces

Max hours to keep trying to bounce messages

Max hours to keep trying to deliver a bounce the default is 48hrs

Syntax: g_retry_bounces int

g_retry_dns

Hours to keep trying if dns response suggested invalid domain name, default 0

By default, if the DNS server says a domain doesn’t exist, the message is immediately bounced so the sending user can take action. In some rare cases this will occur with a valid domain name because the actual DNS of the domain you are sending to is temporarily down. In this situation making SurgeMail retry for 1 hour can prevent these false bounces. I don’t recommend this setting as mostly the DNS response and cache etc is very very reliable because SurgeMail keeps a local cache of DNS lookups that worked on disk. So for a failure like this to occur it must be the first time the server has EVER looked up the domain, so the odds are extremely remote. Delaying a useful response to the user for 1 hour just for this remote chance is not wise in my opinion.

Syntax: g_retry_dns int

Example: g_retry_dns “1”

g_retry_warn

Send user a warning if first send fails

I like this setting myself but it can confuse users as the first send attempt will often fail and the user will mis read the bounce and think it’s failed completely. It does mean when a message is urgent the user gets told right away, instead of 2 days later, that there is a problem sending the message so for a business it’s a nice setting to enable.

Syntax: g_retry_warn bool

g_retry_unwarn

Send user sent on confirmation if warning sent

This complements the warning setting, so the user can see the message did eventually go through and after how long…

Syntax: g_retry_unwarn bool

g_retry_warn_n

Send user a warning if nth send fails

Similar to the above setting but this one reduces the false warnings as messasges often fail on the first attempt

Syntax: g_retry_warn_n int

g_retry_minutes

Time between attempted retries

Time in minutes that SurgeMail will try and resend a message that has failed to be delivered.
(default = 60 minutes).

Syntax: g_retry_minutes int

g_retry_rule

Retry rules overriding g_retry_limit

Rules that allow you to specify the retry_limit in hours on a per destination domain basis.

Example:
g_retry_rule domain=”test.com” hours=”48″

That will make it keep retrying to send to the domain test.com for 48 hours.

Syntax: g_retry_rule domain=string hours=string

g_retry_from

Time to keep messages from these domains

This setting has no further documentation currently available

Syntax: g_retry_from domain=string hours=string

Enable legal archive

This setting has no further documentation currently available

Syntax: g_legal_archive_enable bool

Store files locally only

This setting has no further documentation currently available

Syntax: g_legal_archive_local bool

Store files even if identified as spam (OBSOLETE)

Messages are always stored now regardless of spam score

Syntax: g_legal_archive_spam bool

Users must belong to this group to get their email archived

This setting has no further documentation currently available

Syntax: g_legal_archive_add string

Users must belong to ‘archive_show’ group to see their own archive

This setting has no further documentation currently available

Syntax: g_legal_archive_show bool

bucket for for net service

This setting has no further documentation currently available

Syntax: g_legal_archive_bucket string

Local path for archive indexes

This setting has no further documentation currently available

Syntax: g_legal_archive_path string

Unique integer for this host 1-9 use if sharing mail spool

This setting has no further documentation currently available

Syntax: g_legal_archive_hostid int

Key for encrypting the data, you MUST never loose this

This setting has no further documentation currently available

Syntax: g_legal_archive_encrypt_key string

Days to keep legal archive, units=days unless you specify years or months, default 5 years

This setting has no further documentation currently available

Syntax: g_legal_archive_keep int

Amazon s3 awsaccesskeyid

This setting has no further documentation currently available

Syntax: g_legal_archive_accesskey string

Amazon s3 awssecretkey

This setting has no further documentation currently available

Syntax: g_legal_archive_secretkey string

Drop all messages after archiving them!

This setting has no further documentation currently available

Syntax: g_legal_archive_only bool

Don’t bounce messages if archvie fails

This setting has no further documentation currently available

Syntax: g_legal_archive_nofail bool

g_sabre_version

SabreDAV version (DO NOT CHANGE, for debugging only)

This setting has no further documentation currently available

Syntax: g_sabre_version string

g_sample_get

Sample account to check if deliveries work

The idea is to create several accounts on various public mail servers. Then send a test message using a mailing list or g_redirect rule to these test accounts, then use the command tellmail sample_get CODE DELETE to check if the messages have arrived. The first paramter of tellmail sample_get is a code it expects to find in the message headers (or subject) and the second paramter should be the keyword ‘delete’ if you want it to delete the sample messages.

Syntax: g_sample_get host=string user=string pass=string

g_sample_show

Headers to show from sample messages

Typicall you will list headers that are added by spam filters

Syntax: g_sample_show string

g_scan_cmd

Run command on message, and return integer

Run command on message, and return integer, see g_scan_action.

Syntax: g_scan_cmd string

g_scan_cmd_skip

Skip for matching ip addresses

This setting has no further documentation currently available

Syntax: g_scan_cmd_skip string

g_scan_cmd_testing

Don’t reject, (for testing)

This setting has no further documentation currently available

Syntax: g_scan_cmd_testing bool

g_scan_cmd_failok

Don’t reject if script fails

This setting has no further documentation currently available

Syntax: g_scan_cmd_failok bool

g_scan_action

Converts return value from g_scan_cmd to action on email

Converts return value from g_scan_cmd, action=drop,accept,bounce.

Syntax: g_scan_action code=int action=string reason=string

g_send_first_retry

Minutes for first retry, default is 16 minutes, do not adjust!

It’s best not to change this generally, if you set it too low then grey listing may fail, if you set it higher then email is delayed.

Syntax: g_send_first_retry int

g_send_helo

Domain to use for all outgoing SMTP helo commands

Fully qualified domain to use for all outgoing SMTP helo commands.

Syntax: g_send_helo string

g_send_helo_from

Use the sending domain for the helo command

If the senders domain name (in return path envelope) is a valid local domain, then it is used in the ‘helo’ command.

Not generally recommended. The correct use of the helo is to identify the sending machine, not the domain, so although this makes the headers look pretty it doesn’t make them more correct in my opinion.

Syntax: g_send_helo_from bool

g_send_helo_in

Lookup dns name of incoming ip connection on local interface

So this is the local ip name it looks up not the remote ip address name.

Syntax: g_send_helo_in bool

g_send_backoff

Backoff slow hosts

Seconds to leave slow responding host alone (default 900).

Syntax: g_send_backoff int

g_send_lines

Send single line packets

Send messages in single line packets, slow! (for debugging)

Syntax: g_send_lines bool

g_send_nopoll

Use sleep loop instead of poll (debugging only)

This is to try and find an elusive fault on some systems sending large emails, not for general use

Syntax: g_send_nopoll bool

g_send_lowpriority

Ip address of bulk sending servers

This limits the impact from mailing lists that would otherwise clogg the server and prevent normal individual emails going through quickly, typically set to *bounce@* to lower mailing list priority

Syntax: g_send_lowpriority string

g_send_max

Max concurrent sending sessions

Maximum concurrent outgoing SMTP connections . You should not have to change this. The default is 100.

Syntax: g_send_max int

g_send_max_perchan

Msgs to send on one open channel

This may help delivery if a server is incorrectly identifying your server as a spam source. A value of 1-5 would be reasonable

Syntax: g_send_max_perchan int

g_send_max_perdom

Max concurrent sending sessions to a single domain

Maximum concurrent outgoing SMTP connections to a single domain. The default is 2. This can be set higher and the default used to be 6 however there are a few servers out there that don’t like more than 2 channels being opened to them.

Syntax: g_send_max_perdom int

g_send_max_rcpt

How many rcpt’s to send per message when sending

Default is unlimited, Setting this to a small value like 10 may help some mail servers.

Syntax: g_send_max_rcpt int

g_send_nolimit

Don’t apply g_max_perdom limit when sending to this domain

Use this on incomng mx severs for the local domain so it can use lots of channels to send the data through.

Syntax: g_send_nolimit string

g_send_nosize

Don’t send size with from envelope

Revert to old style sending, no known reason for doing this

Syntax: g_send_nosize bool

g_send_no_domain

Message to show when domain points to us but can’t find user or domain

Most useful when using g_authent_always, as this error will be shown to local users when sending to local users that don’t exist.

Syntax: g_send_no_domain string

g_send_onpopfetch

Only send outgoing while doing a POPfetch

Only send outgoing while doing a POPfetch (For dialup use).

Syntax: g_send_onpopfetch bool

g_send_retry_550

Retry on 550 responses (general failure)

Might be useful to stop messages bouncing when destination server is temporarily rejecting everything

Syntax: g_send_retry_550 bool

g_send_retry_552

Retry on 552 responses (typically quota exceeded)

Some faulty hosts return a 552 error when a user is over quota, this means that by the RFC SurgeMail must not try again to deliver the message. However this is clearly not a permanent error and so it’s often wise to retry in this situation, This setting makes SurgeMail attempt retries when faced with this odd response.

Syntax: g_send_retry_552 bool

g_send_rewrite

Rewrite envelope recipient at send stage, does not change destination server

This rewrites the recipient envelope, you can use wild cards, e.g. *@this.domain %1@another.domain, to rewrite ‘from’ addresses use g_from_rewrite

Syntax: g_send_rewrite was=string to=string

g_send_noskipslow

Don’t skip slow hosts

Normally surgemail remembers hosts that are slow to open, fail and doesn’t retry for 60 minutes.

Syntax: g_send_noskipslow bool

g_send_speed

max outbound bandwidth

Bytes per second to limit each outgoing channel to. eg: 10k

Syntax: g_send_speed int

g_send_conspeed

Outgoing connections per second per destination, default is 4

This helps prevent surgemail exceed tarpit throttles common in unix mail servers, adjust at your own risk. This won’t generally limit outgoing email speed so you don’t need to touch it. A value of ‘1’ means surgemail can make one connection each second.

Syntax: g_send_conspeed int

g_send_delay

Wait this many seconds after sending each item.

This is a simple throttle to limit sending speed to any single domain, a value of 2 seconds is probably reasonable. In general you would also set G_SEND_MAX_PERDOM to 1.

Syntax: g_send_delay int

g_send_timeout

Send timeout

Timeout, in seconds when sending mail, default is 540 (9 minutes)

Syntax: g_send_timeout int

g_send_tolimit

Limit speed to send to one or more domains.

Some large providers will assume you are a spammer if you send too many messagse in an hour. If you have a large mailing list it’s easy to break these limits, in which case some rules like this can prevent this problem.

Syntax: g_send_tolimit domain=string perhour=int

Example: g_send_tolimit domain=”hotmail.com,*hotmail.com” perhour=”60″

g_send_open_timeout

SMTP link open timeout

Timeout, in seconds when opening an SMTP link.

Syntax: g_send_open_timeout int

g_send_body_noretry

Don’t try and resend if failure during body send

By default SurgeMail retries to send messages if the tcp connection is lost during the body send part of sending an email message. In rare situations this may cause problems, for example while sending a large file if the receiving software is faulty and is dieing rather than responding with ‘don’t try again’ error code. This behaviour was reversed before version 2.0h (e.g. it never retried)

Syntax: g_send_body_noretry bool

g_send_body_end_retry

Try again if connection fails after entire body sent

This setting will tend to result in ‘duplicate’ messages being received, so should not be used, but strictly speaking it is valid to retry in this situation, the trouble is the receiving mail server ‘may’ have a real copy of the message so may deliver it even though the connection was dropped.

Syntax: g_send_body_end_retry bool

g_send_body_once

Don’t try 3 times if failure occurs sending body

This setting disables the new feature where the server tries harder to deliver a message even if it ‘might’ result in duplicates being delivered.

Syntax: g_send_body_once bool

g_send_bug1

Fail while sending messages

Debugging feature.

Syntax: g_send_bug1 bool

g_send_sslheader

Add x-encrypted header when sending via ssl

This setting has no further documentation currently available

Syntax: g_send_sslheader bool

g_send_strip

Headers to strip when sending

This setting has no further documentation currently available

Syntax: g_send_strip string

g_send_store_disable

Disable sendstore smtp extenstion

This setting disables the ability to save the message to the sent folder as part of the smtp command (only used by SurgeAlert)

Syntax: g_send_store_disable bool

g_server_name

Wildcard “SERVER_NAME” translation for domain identification

The vdomain a user connects on is normally identified automatically for “user account self management” and for “webmail”. In the event that the domain name is not the same as the host name (eg hostname = mail.domain.com, domainname = domain.com) the WebMail web server can automatically translate the SERVER_NAME variable.

This setting specifies a wild card list of URLs ‘URL’ with associated translated host name for “SERVER_NAME”. If the URL matches then SERVER_NAME is set to the second part of this setting ‘name’. eg: to host the domains domain.com and mail.domain.com on host mail.domain.com:

g_server_name url=”*.domain.com” name=”domain.com”

Note: If your server name is not the same as your domain name also check the per domain setting URL_host.

Syntax: g_server_name url=string name=string

g_server_stamp

Replaces SurgeMail and version string in “Received” headers

Replaces SurgeMail and version string in Received headers of process mail

Syntax: g_server_stamp string

g_sf_disable

Smart Filter Disable

This setting has no further documentation currently available

Syntax: g_sf_disable bool

g_sf_obey_users

Obey user submissions about non spam, usually not a good idea

This setting has no further documentation currently available

Syntax: g_sf_obey_users bool

g_sf_ignore_users

Ignore user submissions just use automatic samples (obsolete)

This setting has no further documentation currently available

Syntax: g_sf_ignore_users bool

g_sf_generate

Build local smart filter

Creates feature_gen.dat from sf_mfilter.txt (instead of using feature_gen.net downloaded from netwinsite.com). This requires your server to have a reasonable sample of spam in the train… folders, this is collected automatically over a few days.

Syntax: g_sf_generate bool

g_sf_nnet

Use Neural Network (Experimental, ONLY FOR TESTING)

Experimental setting

Syntax: g_sf_nnet bool

g_sf_binary

Use Binary Network

Binary tree for scoring – this mechanism scores based on finding the sample or samples with the closes matching features, and counting how many are spam/not spam. This method is the best choice (currently)

Syntax: g_sf_binary bool

g_sf_list

Use list mechanism for scoring

A new mechanism to score more rationally based on the known data.

Syntax: g_sf_list bool

g_sf_nosanity

Disables improved g_sf_binary with sanity checks

This smoothes out the nonsense a bit if g_sf_binary over-reacts to training or small samples

Syntax: g_sf_nosanity bool

g_sf_sanity2

Enables improved sanity scoring

This second sanity check improves scores over 8 to be a bit more useful.

Syntax: g_sf_sanity2 bool

g_sf_sanity_test

Experimental setting never use

Test another spam scoring method

Syntax: g_sf_sanity_test bool

g_sf_saneonly

Sane score only

Experimental setting

Syntax: g_sf_saneonly bool

g_sf_test2

Testing

Experimental setting

Syntax: g_sf_test2 bool

g_sf_rules

Use manual rules to improve scoring

Use additional manual rules

Syntax: g_sf_rules bool

g_sf_limit

Limit range of self training

This setting has no further documentation currently available

Syntax: g_sf_limit bool

g_share_home

Allow sharing of home directory

This allows sharing of the home directory in the unlikely situation that you might want to run separate surgemail processes. eg one process to cope with SMTP and another to cope with POP access.

Syntax: g_share_home bool

g_share_mail

Allow sharing of mail directory

Set true if mail area is shared (by nfs or other mechanism)

Syntax: g_share_mail bool

g_share_quota

Do quota on disk (e.g. when using nfs shared spool)

Normally SurgeMail keeps track of quota for all users in memory, this is efficient, but means if your are using a shared mail spool the quota figures are completely wrong, so use this setting to make surgemail keep track of quota’s on disk, it increases disk load a bit of course but not too much.

Syntax: g_share_quota bool

g_shutdown_slow

Delay shutdown

Add 20 second delay to shutdown for testing purposes only.

Syntax: g_shutdown_slow bool

g_slow_welcome

Delay the welcome message

Add 20 second delay to welcome message for testing purposes only.

Syntax: g_slow_welcome bool

g_sms_gateway

Address and port of your SMS gateway

This is the ip and port of an ’email to sms gateway’. The gateway should accept SMTP messages on this port and convert the email into an sms message then deliver to the phone number in the ‘to’ address. SMSGate is our ’email to sms gateway’ and is FREE with SurgeMail. Setting user_sms to “true” for a domain allows users to specify a phone number (or email address) and rules for when to notify them.

Syntax: g_sms_gateway string

g_sms_gateway_force

Force sms notifications to go to g_sms_gateway

If a user sets their sms number to an email address, perhaps to make use of an existing gateway, then surgemail will send the message to the domain in that address. If you set this you can force the email to go to g_sms_gateway. NOTE: It is possible to configure SMSGate with ‘send_mode smtp’, ‘recv_mode none’ and no GSM modem. In this setup it simply reformats messages passing them on to the configured smtp_outserver for delivery as email messages.

Syntax: g_sms_gateway_force bool

g_sms_gateway_msgbytes

Maximum amount of message to send to g_sms_gatway (bytes)

Defines the maximum number of bytes of ‘body’ text to send to the g_sms_gateway. All headers are sent, then the defined number of bytes of ‘body’ text. Defaults to 160. May be set larger than the default if you have a lot of html messages or multipart html and text messages. Should not be set too large as there is no point sending binary attachments and the like to an sms gateway.

Syntax: g_sms_gateway_msgbytes int

g_sms_gateway_subjbytes

Maximum length of subject in sms message

Defines the maximum number of bytes of ‘subject’ text to send to the g_sms_gateway.

Syntax: g_sms_gateway_subjbytes int

g_sms_forward

Specifies IP’s which are allowed to forward to SMS gateways

Normally sms gateways are restricted to authenticated users (SMTP authentication) this allows you to specify IP’s which can send without authentication. For example you may want your dlist server to send SMS, in which case you might add 127.0.0.1 to this setting.

Syntax: g_sms_forward string

g_smite_all

Add smite headers to all messages passing through server

Normally SmiteSpam headers are only added for locally delivered messages. This setting to all messages passing through this server.

Syntax: g_smite_all bool

g_smite_gateway

Add smite headers to gatewayed messages

Normally SmiteSpam headers are only added for locally delivered messages. This setting adds the headers for gatewayed messages too. This also adds headers to messages that are redirected by forward rules as well.

Syntax: g_smite_gateway bool

g_smite_level

Smite level to discard message

If SmiteSpam gives a message a “smite score” above this, throw it awayl. This setting is best never used. If used it should be set to ‘1 or 2’. A value of 1 = “has been reported”, 2 = “has been reported multiple times”. If smite match score is above this drop message. This is applied when the user downloads the email not at delivery time. What you probably want is ‘g_spam_bounce’ described elsewhere on this page.

Syntax: g_smite_level int

g_smite_skip

Skip smitecrc processing for messages from these domains

This will skip running SmiteCRC for messages whose from address matches these domains. This is the mail from envelope header NOT the from header in the message (you can check the return path header in the message to check what you need to add for this setting).

Note this is a wildcard field so to match any mail claiming to be from safedomain.com you would have to set:

g_smite_skip “*@safedomain.com”

Syntax: g_smite_skip string

g_smite_skip_from

Skip spam scanner if from header/env matches this wild card

This setting has no further documentation currently available

Syntax: g_smite_skip_from string

g_smite_skip_to

o>

Skip smite scanner if to matches this wild card to <address>.

Syntax: g_smite_skip_to string

g_smite_skip_only

Skip spam scanner if to matches this wild card and no other recipients that ‘don’t’ match…

This setting has no further documentation currently available

Syntax: g_smite_skip_only string

g_smite_skip_ip

Skip smite based on sender IP

Skip smite scanner if sender IP matches this wild card list.

Syntax: g_smite_skip_ip string

g_smite_skip_auth

Skip spam scanner if user logged in

Skips spam checks and spam header generation for any authenticated local user.

Syntax: g_smite_skip_auth bool

g_smite_skip_relay

Skip spam scanner if ip can relay

Skips spam checks and spam header generation for any local user.

Syntax: g_smite_skip_relay bool

g_smite_tag

Tag message if in SmiteSpam database

If set to true will tag messages already in the SmiteSpam database. A value of 1 = “has been reported”, 2 = “has been reported multiple times”.

Syntax: g_smite_tag bool

g_smtp_allow_invalid

Allow messages with invalid headers

This setting has no further documentation currently available

Syntax: g_smtp_allow_invalid bool

g_smtp_auth_debug

Auth Debug (do not use)

This setting has no further documentation currently available

Syntax: g_smtp_auth_debug bool

g_smtp_bounce_nslow

Number of handles to use for doing slow rejections of smtp connections

If external servers are over loading your server so much that it ends up in a cpu loop rejecting connections then increaseing this might help. But beware your system must not run out of file handles so don’t set it too large, The default is 100

Syntax: g_smtp_bounce_nslow int

g_smtp_cmd_timeout

SMTP command timeout

Seconds to wait after getting a message for next command (workaround for sendmail bug)

Syntax: g_smtp_cmd_timeout int

g_smtp_data_timeout

SMTP data timeout

Seconds to wait for SMTP data input.

Syntax: g_smtp_data_timeout int

g_smtp_data_bug

Fail on incoming emails for debugging

This setting has no further documentation currently available

Syntax: g_smtp_data_bug bool

g_smtp_delay_stamp

Stamp message if sender doesn’t wait for welcome

If true then if any smtp commands arrive before the ‘helo’ greeting is sent then a header is added to messages which will result in a higher spam score.

Syntax: g_smtp_delay_stamp bool

g_smtp_delay

Seconds to wait before responding to rcpts, 1-20, this reduces load on bulk senders

Only applies if more than 2 connections from the same ip address, so it only throttles bulk senders not people

Syntax: g_smtp_delay int

g_smtp_welcome_delay

delays welcome message

Syntax: g_smtp_welcome_delay “seconds”

This delays the welcome message sent by SurgeMail to a connecting server. If the server sends data to SurgeMail during this waiting time SurgeMail will drop their connection. The theory is that any well behaved server will wait for prompts and check them, but a lot of spamming software never takes any notice of prompts/responses and sends blindly. We believe a value of 1-3 seconds is ideal. You can also exempt ip’s from this setting by using g_spam_allow “ip”. Settings too high will cause real mail to be lost.

Examples:
g_smtp_welcome_delay “3”
g_spam_allow “127.0.0.1”

So above, delay giving the welcome message for 3 seconds, anyone that sends data in that 3 seconds will be dropped, but anything connecting from 127.0.0.1 will be able to send immediately (you should make sure webmail is exempt).

Syntax: g_smtp_welcome_delay int

g_smtp_log_protocol

Log SMTP protocol

If enabled, the SMTP protocol is logged to the mail.log file as “smtp: In” and “smtp: Out” entries.

Syntax: g_smtp_log_protocol bool

g_smtp_log_size

Size of smtp.log file

This sets the smtp.log file size, default is 2mb

Syntax: g_smtp_log_size int

g_smtp_max

Max total incoming SMTP connections

This limits the channels that will be used at any one time for incoming SMTP connections. The purpose of this setting is to prevent a sudden burst of spam from using up all available channels. Generally you do not need to change this. (Default = 250). Use the related setting g_smtp_max_reason to over-write the detailed error if you don’t want spammers to know what your limits are set to.

Syntax: g_smtp_max int

g_smtp_warning

Send manager warning if this many sessions reached (max 1 per hour)

This setting has no further documentation currently available

Syntax: g_smtp_warning int

g_smtp_max_reason

Reason to give to user if g_smtp_max is exceeded

This is most useful when the host in question is being used for the wrong purpose (incoming when it’s intended for outgoing etc), or simply to advise the user of a potential solution

Syntax: g_smtp_max_reason string

g_smtp_max_nolimit

IP based exceptions to g_smtp_max

This lets you specify IP based exceptions to g_smtp_max, so if you need a certain IP to open up many connections you would add that IP here.

eg. g_smtp_max_nolimit “10.0.0.50”

Syntax: g_smtp_max_nolimit string

g_smtp_maxbad

Max bad SMTP commands

The maximum number of bad commands accepted per session before SurgeMail will drop the connection.

Example: g_smtp_maxbad “10”

Syntax: g_smtp_maxbad int

g_smtp_port

p:port>

This allows SurgeMail to listen on a specified port and IP, you can add multiple IPs if you wish to listen on more than one and multiple ports also.

eg:
g_smtp_port “1.1.1.1:25, 2.2.2.2:1025”

g_smtp_portauth

SMTP ports which require smtp authentication, typically 587

It is recommended (by some) that users send email to port 587, and it requires smtp authentication, and port 25 be blocked from client ip addresses to prevent viruses etc using email servers. Be sure to add ,587 to the g_smtp_port setting too!

Syntax: g_smtp_portauth string

g_smtp_portforce

Block logins for ports not listed in g_smtp_portauth

Use this to prevent local users logging into port 25, this also stops many spammers abusing your system as they will try and send on port 25

Syntax: g_smtp_portforce bool

g_smtp_secure_port

Port to listen for secure SMTP connections (default 465)

Port to listen on for dedicated SSL SMTP connections.

Syntax: g_smtp_secure_port int

g_smtp_vrfy_msg

VRFY response

Change Response to VRFY, e.g. 252 Not telling.

Syntax: g_smtp_vrfy_msg string

g_smtp_vrfy_allow

Allow vrfy from these addresses, not recommended

This setting is rarely a good idea, vrfy is best left disabled

Syntax: g_smtp_vrfy_allow string

g_smtp_etrn_auth

etrn if authenticatd

Only do etrn processing if user is authenticated.

Syntax: g_smtp_etrn_auth bool

g_smtp_help_disable

disable smtp help command

Disable SMTP help command (minor security percaution).

Syntax: g_smtp_help_disable bool

g_smtp_plain_hide

Hide ‘plain’ from the ehlo response

This is to keep stupid scanners happy, for security you should disable non SSL logins, disabling plain is pointless and annoying.

Syntax: g_smtp_plain_hide bool

g_smtp_cram_enable

Enable CRAM-MD5 authentication (requires nwauth 4.0h or greater) – Not Recommended

Please note that CRAM-MD5 does have security implications, specifically it means that the local users password must be stored in a semi reversable state in the authent database. Also you must be using the new version of the NWAuth module. Also Cram-md5 cannot be used with Migration from an old server (since by definiton the old password is never sent)

Syntax: g_smtp_cram_enable bool

g_smtp_no_brackets

Allow from/rcpt without angle brackets

Some faulty mail clients forget to put the brackets <> around the recipient, this setting allows such faulty behavior. Not generally recommended.

Syntax: g_smtp_no_brackets bool

g_smtp_big

Slow down incoming SMTP reads to get bigger packets (experimental)

This setting tries to prevent thrashing by making the server slow down the speed it reads data in an attempt to get larger packets. This seemed to have no affect when I tested it, but play with it if you want, It is only intended to be useful when you have hundreds of incoming connections all very slowly sending in data, and the server is short of CPU.

Syntax: g_smtp_big bool

g_smtp_fast_bounce

Reject bad connections immediately

Normally SurgeMail waits 1-10 seconds before rejecting a bad connection (rbl/limits,…), this reduces cpu usage and prevents some DOS attacks, this setting disables this behaviour.

Syntax: g_smtp_fast_bounce bool

g_smtp_fix_nohead

Accept messages with no headers and try and cope

This setting tries to cope if the message contains no headers at all, it is not recommended of course but may be needed on occasion for bad scripts

Syntax: g_smtp_fix_nohead bool

g_smtp_thread

Use seperate thread for incoming SMTP connections

This makes the server run a seperate thread just to process incoming smtp connections, this can help on a busy system to stop a huge load of smtp connections clogging up the pop/imap connection processing, it is rarely needed.

Syntax: g_smtp_thread bool

g_smtp_auth_off

Disable SMTP AUTH from unknown ip addresses (NOT RECOMMENDED)

This prevents a hacker sending out spam by cracking a users account details, users must login from an address specified in g_smtp_auth_ip or g_relay_allow_ip, NEVER USE THIS!

Syntax: g_smtp_auth_off bool

g_smtp_auth_ip

Ip Addresses to accept smtp authentication from

This prevents a hacker sending out spam by cracking a users account details, users must login from an address specified in g_smtp_auth_ip or g_relay_allow_ip

Syntax: g_smtp_auth_ip string

g_smtp_noauth

Limit SMTP to just these addresses (not generally useful)

Mail sent from other IP addresses is only accepted if user is authenticated. Typically used if your server is behind a firewall of some kind and should only allow incoming email from a particular IP address. Users will be able to send as from any IP address if they use smtp authentication. This setting is only useful if your incoming email always comes through a gateway or filter, it’s not a normally useful setting

Syntax: g_smtp_noauth string

g_smtp_noauthm

Limit SMTP to just these addresses (not generally useful)

Mail sent from other IP addresses is only accepted if user is authenticated. Typically used if your server is behind a firewall of some kind and should only allow incoming email from a particular IP address. Users will be able to send as from any IP address if they use smtp authentication.

Syntax: g_smtp_noauthm string

g_smtp_noauth_msg

Message given when sender is told to use authentication because of g_smtp_noauth

Message sent to sender when they try and send to the server but are required to authenticate because of g_smtp_noauth

Syntax: g_smtp_noauth_msg string

g_smtp_noclear

Disable smtp buffer clear after starttls command

Testing feature.

Syntax: g_smtp_noclear bool

g_spam_allow

IP wild card of sites to exempt from spam limits

Typically use this to allow known mailing list servers that use your system to send messages in without being tarpitted. e.g. “127.0.0.1,local.ip.number”. This same setting is an exception to the other spam rules. 

Syntax: g_spam_allow string

g_spam_allow_disable

Disable allow bounce messages

Normally when SurgeMail detects an SPF failure it will give the sending an opportunity to send an email to a special address, If the sender does this then their IP address is permitted in future, this saves a lot of hassle generally, in rare situations you may not want this system, this setting will just simply bounce the message instead.

Syntax: g_spam_allow_disable bool

g_spam_allow_rbl

Give unblock message to RBL bounces too

This setting extends the ‘allow’ email system used by SPF to the RBL style of failures. This makes it much safer to use RBL lists is block mode instead of stamping mode. You really must have g_spam_block enabled for this setting to work, otherwise the ‘allow’ mechanism lets everything through so this becomes pointless 🙂

Syntax: g_spam_allow_rbl bool

g_spam_allow_rdns

Trust ip name for spam checking, not recommended

Spammers can trivially forge a reverse dns name, so it’s very unwise to use it for bypassing spam checking except for rare/local domain names that spammers won’t know to use

Syntax: g_spam_allow_rdns bool

g_spam_allow_msg

Template for unblock messages, use ||reason|| and ||allow|| and maybe a url

This lets you tailor the ‘allow’ bounce message given to incoming messages that fail the SPF checks. ||reason|| becomes the reason for the failure and ||allow|| is either the allow email to send to, or a link to use (if using g_spf_byweb “TRUE”).

Syntax: g_spam_allow_msg string

Example: g_spam_allow_msg “||reason||, to fix send an email to ||allow|| then resend original email.”

g_spam_block_msg

Template for spf blocked message if allow is disabled

This error is given for SPF failures when the allow system is disabled. You are probably looking for the setting g_spam_allow_msg, as it is the one that is normally used when a user is ‘blocked’ by spf.

Syntax: g_spam_block_msg string

g_spam_allow_known

Unblock IP address if we have received messages from it for 3 days (so it’s not a transient spammer)

This setting makes the SPF strict settings much softer, basically it says any IP address we’ve known about for 3 days, is considered safe. This will still stop most spammers, particularly when used in combination with RBL lists which will block the ‘repeat’ offenders.

Syntax: g_spam_allow_known bool

g_spam_allow_recent

Exempt recent POP from spam limits

Skip spam rules if recent POP IP number (see g_relay_window). 

Syntax: g_spam_allow_recent bool

g_spam_autotrain

Autotrain “good” filter

Auto train spam filter good messages based on first 1,000 outgoing emails.

Syntax: g_spam_autotrain bool

g_spam_block

-block-msg-template-for-spf-blocked-message-if-allow-is-disabled" >

This error is given for SPF failures when the allow system is disabled. You are probably looking for the setting g_spam_allow_msg, as it is the one that is normally used when a user is ‘blocked’ by spf.

Syntax: g_spam_block_msg string

g_spam_block_gateway

Block spam gatewayed messages too

Use this setting on incoming mail servers or servers that relay to servers that implement SPF. Without this SPF blocking will not work as the back end server cannot perform the SPF checks/blocking.

Syntax: g_spam_block_gateway bool

g_spam_check_auth

Enable spam rules for authenticated users

Normally authenticated users are exempt from spam rules when sending mail. This enables all spam checking rules for authenticated users.

Syntax: g_spam_check_auth bool

g_spam_content_disable

Disable aspam_content.txt rules

The file aspam_content.txt is fetched from netwinsite and used to identify certain common spam messages based on content. Each line in the file gives a list of words or phrases, if most of the words are found, then the rule matches. You can add your own rules to aspam_content_local.txt. In a message that matches a rule you will see in the spamdetect header, Content: cid=NNN cid=NNN, you can then match the NNN with the unique id of each rule in aspam_content.txt

Syntax: g_spam_content_disable bool

g_spam_body

Add SpamDetect header in body

If spamdetect score is above this, add spamdetect header at top of message body (in addition to the header). This allows mail clients that are not able to filter mail based on headers to filter out spam email. This can be set on a per user basis too. A value of 3 or 4 would be reasonable. The only real reason for this setting is some common mail clients are unable to scan non standard headers so cannot automatically file spam in a folder unless this is used. My recommendation is for such users to use the web interface to set actions individually.

Syntax: g_spam_body int

g_spam_body_url

Text part of info to add to body, usually a url to your site

On this page you should explain to your users why this tag was added to their message, and how they can adjust their spam settings etc.

Syntax: g_spam_body_url string

g_spam_body_more

Add more info to spam body (ip address, ptr address, reply to and bounce address)

This can help the user decide if the message really is spam

Syntax: g_spam_body_more bool

g_spam_folders

Train on any message dropped into the relevant folders

This allows a user to create two folders ‘-Train Is Spam-‘ and ‘-Train Not Spam-‘ and then run the aspam training mechanism by dropping messages into those folders, items are expired ffrom train is spam folder after 30 days if G_EXPIRE_TRASH is TRUE

Syntax: g_spam_folders bool

g_spam_folders_show

List the special folders for all users

Without this setting the user must create the folder name correctly for training to work from imap folders

Syntax: g_spam_folders_show bool

g_spam_flag

Add X-SPAM-FLAG: Yes header if smite score is above this level

Some filters and servers like to see this header, a good value for this might be 7. Valid range would be 1-15, with 1 marking almost everything as spam, and 15 marking almost nothing.

Syntax: g_spam_flag int

g_spam_from_blacklist

Fetch list of bad domains to reject email from – not recommended

This feature fetches the file http://www.sa-blacklist.stearns.org/sa-blacklist/sa-blacklist.current and then uses it efficiently to block senders, it is a huge file (26mb). Not currently recommended, we don’t think the hit rate of this filter method is high enough to be useful. url used is http://www.sa-blacklist.stearns.org/sa-blacklist/sa-blacklist.current

Syntax: g_spam_from_blacklist string

g_spam_grey

OBSOLETE DO NOT USE, Enable old greylisting for spf mechanism

The grey listing mechanism relies on the principle that spammers are not using real mail servers but using dumb robots that won’t ‘retry’. So if all incoming messages are asked to ‘retry’ then the spam will not be received but the non spam will get in eventually. This does create a delay on all incoming mail, and may stop some stupid mail servers from successfully delivering. I would tend not to use this setting myself.

Syntax: g_spam_grey bool

g_spam_grey_classc

Apply grey listing to x.x.x.*

In theory this broadens slightly what grey listing will accept.

Syntax: g_spam_grey_classc bool

g_spam_grey_dflt

Enable greylisting for spf default accept events (not recommended)

If a message is going to be accepted due to the spf default rule (so there was no real spf record), then this comes into play. If the message is not from a trusted person, or a domain that we have previously checked using grey listings. Then the message is bounced. If the sender then tries again to send the same message (from/to pair) within a few hours, but not within 1 minute, then that ip address is marked as ‘good’ and future messages from them are accepted. This setting will result in some real email bouncing but slightly reduce spam, we no longer recommend this setting.

Syntax: g_spam_grey_dflt bool

g_spam_grey_dflt_bad

Enable greylisting instead of allow in some cases (recommended for block or strict)

This setting enables grey listing for spf default failure events only, and only if it’s the first message from that ip address if more arrive before the grey listing succeeds then allow bounces are sent instead

Syntax: g_spam_grey_dflt_bad bool

g_spam_grey_verify

Skip grey listing if host was not listening

Skips the grey listing if the host didn’t resond to the g_smtp_verify probe for g_spam_grey_dflt_bad

Syntax: g_spam_grey_verify bool

g_spam_grey_size

Size of grey listing table, default is 3000

On busy servers set this to a larger figure, e.g. 9000 so it can remember more grey listing events

Syntax: g_spam_grey_size int

g_spam_grey_bounce

Bounce if message was allowed due to grey listing, and spam score is above this, default 8 (was 4)

Since messages which are allowed in due to grey listing generally can’t accept friends bounces (as the sender is unverified) it’s important to bounce them with an allow message instead if they look like spam

Syntax: g_spam_grey_bounce string

g_spam_grey_window

Window to block bad messages, typically 60 seconds

This prevents a fast retry by a stupid robot, some robots now wait 5-6 minutes but some mail servers may retry that fast too 🙂

Syntax: g_spam_grey_window int

g_spam_grey_nofive

Skip 5-6 minute black window for these domains

Use this for domains that retry at 5 minute intervals, e.g. (*@cs.com,*@xyz.com), this skips a test used to detect a particularly virrulent spammer who uses a robot that retries at exactly 5 minute intervals

Syntax: g_spam_grey_nofive string

g_spam_grey_nseen

Number of messages from an unknown host, default is 6

When a host is unknown if it sends more than this many messages before the grey listing resend occurs then it’s considered to be a spammer.

Syntax: g_spam_grey_nseen int

g_spam_grey_nohard

Avoid hard spf bounces always try and do a grey list instead

This avoids the hard bounce you would normally get for failed real spf records.

Syntax: g_spam_grey_nohard bool

g_spam_nolang

Don’t add header with a guess at body language

This adds a header which makes a best guess at the contents of the message, it should not be assumed to be 100 percent reliable! Also note that empty messages or messages containing only images may be classified as ‘Unknown (English)’

Syntax: g_spam_nolang bool

g_spam_phrase

Enable auto spam phrase filter

Enables a Bayesian word and phrase filter to enhance spam filtering. The filter auto trains based on the train folders each night

Syntax: g_spam_phrase bool

g_spam_probe_enable

Probe suspect urls to find spammers – can cause RBL

This setting searches email messagse from dodgy/unknown sources for urls, then looks at the page those urls refer to to see if those pages in turn point to a listed SURBL. Only domains matching a specific list of rules are scanned so there is almost no risk of this feature clicking on a page that might do something bad.

Syntax: g_spam_probe_enable bool

g_spam_probe_unknown

Probe any unknown url (dangerous)

This setting increases the remote chance of probing a web page that might have some action (like a confirmation signup request, unsubscribe etc…), in practice there are a bunch of tests we perform so it would be most unusual for this problem to occur but it’s safer not to use this option.

Syntax: g_spam_probe_unknown bool

g_spam_probe_more

Probe even if email is from a known ip address

Generally not advised

Syntax: g_spam_probe_more bool

g_spam_probe_friends

Probe even if email is from a friend

Generally not advised

Syntax: g_spam_probe_friends bool

g_spam_probe_whois

Do whois lookups on web pages found in probe

Some spammers register new domains each day, this probe checks the whois data to find if the new web site is owned by a known spammer

Syntax: g_spam_probe_whois bool

g_spam_subject

Modify message subject line based on spam rating

If spamdetect score is above this add spam rating Spam:**** to subject.

Syntax: g_spam_subject int

g_spam_subject_dom

Destination domains to tag subject for

Note that g_spam_subject_gateway and G_SMITE_GATEWAY or G_SMITE_ALL must also be set to true for this to work. If this setting is blank then all gatewayed domains would get tagged. Tagging won’t occur if the message is not sent through a g_gateway rule or redirect rule

Syntax: g_spam_subject_dom string

g_spam_subject_gateway

Modify message subject lime based on spam rating for gatewayed messages

If true then spam_subject setting applies to gatewayed messages too

Syntax: g_spam_subject_gateway bool

g_spam_subject_word

Allow arbitrary modification of message subject line

This is a string that is prefixed to the subject of incoming mail caught by g_spam_subject. You can use ||score|| and ||stars|| which will contain the actual spam rating. Good examples might be: “[SPAM]” or “SPAM(||score||), “

Syntax: g_spam_subject_word string

g_spam_userconfig

Enable per user spam settings

Allow users to opt in / out of specific anti spam features. If this is enabled this will add a “Spam” button on the users account self management pages.

The most useful antispam feature is that user’s mail that is suspected spam, can be stored on the server so that these messages do not need to be downloaded to your normail email client over what could well be a low bandwidth connection.

Syntax: g_spam_userconfig bool

g_spam_user_max

Max messages for authenticated users

Max messages an authenticated user can send per 30 minutes, eg: 5000

Syntax: g_spam_user_max int

g_spam_user_warn

Alert user when they send this many messages in one day, .8 to alert at 80% of max

This setting has no further documentation currently available

Syntax: g_spam_user_warn string

g_spam_user_warn_msg

Message when user approaches send limit

This setting has no further documentation currently available

Syntax: g_spam_user_warn_msg string

g_spam_user_badto

Max bad recipients from authenticated user per 30 minutes, e.g. 50

Whitelist using G_SPAM_USER_SKIP, limits bad recipients for an authenticated user, if exceeded then sending is paused for 30 minutes.  A value of 50 might be reasonable as normal users would never exceed that.  A value as low as 10 might be workable.  Whitelist accounts using: G_SPAM_USER_SKIP. An email is sent to the manager account when this limit is hit

Syntax: g_spam_user_badto int

g_spam_from_max

Max outgoing messages per ipaddress/return path pair, 30 minutes, e.g. 5000

This limit is useful where a local machine is sending on behalf of many users without authentication and you want to limit potential abuse

Syntax: g_spam_from_max int

g_spam_user_skip

Users to skip g_spam_user_max limit for

Set this for special known users who send lots of email

Syntax: g_spam_user_skip string

g_spam_bounce

Bounce local delivery based on spamdetect score

If spamdetect score (number of ‘*’s) is above this, bounce message if local delivery. 14 is a reasonable value, never set below 10.

Syntax: g_spam_bounce int

g_spam_bounce_store

If true store rejected spam in Spam_Rejected folder

This setting enables rejected spam to be saved in the spam_rejected folder, this makes it safe to use the spam rejection level again.

Syntax: g_spam_bounce_store bool

g_spam_bounce_text

Error text when message is bounced due to g_spam_bounce setting

As per description. Default is: “554 Failure Message looks like spam, sorry not wanted here q=311”, where q is the message queue id.

Syntax: g_spam_bounce_text string

g_spam_bounce_all

Bounce local and remote delivery based on spamdetect score

If spamdetect score (number of ‘*’s) is above this, bounce message, this applies to all messages regardless of user settings. e.g. 7 or 8 would be reasonable, 3 would be very strict, and less than 3 would certainly bounce real emails. I recommend you don’t set this below 5. This rule is applied as soon as the message is submitted, user spam settings do not override it.

Syntax: g_spam_bounce_all int

g_spam_bounce_trusted

If spamdetect score is above this, bounce message if trusted (spam_allow or authenticated)

Normally trusted users (spam_allow or smtp authenticated users) are never bounced due to spam content, this setting forces those users to also be checked for spam content.

Syntax: g_spam_bounce_trusted int

g_spam_cmd

Command line spam checker, use $FILE$ in cmd parameters

This allows you to run a simple external spam filter the return value is added as a header, X-SpamCmd: r=N, Is Spam/Not Spam, use local.rul file to translate this return value to a spam score. e.g. G_SPAM_CMD “snfrv2r3.exe xnk05x5vmipeaof7 $FILE$” if used with http://www.armresearch.com/message-sniffer/. If the program returns 0 then the words Not Spam are added, if the value is non zero then Is Spam is added, this makes filtering rules easier to add to local.rul, see http://netwinsite.com/surgemail/help/spam.htm#external

Syntax: g_spam_cmd string

g_spam_cmd_if

If internal spam rating is below this number, then run external filter

This allows you to only scan messages with an external filter if the message is not obviously spam

Syntax: g_spam_cmd_if int

g_spam_cmd_skip

If internal spam rating is below this number, then skip external filter

This allows whitelisting to work

Syntax: g_spam_cmd_skip int

g_spam_cmd_reject

If external filter returns number larger than this reject

Filters based on return code of external spam filter program

Syntax: g_spam_cmd_reject int

g_spam_vanish

Vanish local delivery based on spamdetect score

If spamdetect score (number of ‘*’s) is above this, vanish message if local delivery. eg: 12 would be reasonable.

Syntax: g_spam_vanish int

g_spam_vanish_all

Vanish local and remote delivery based on spamdetect score

If spamdetect score (number of ‘*’s) is above this, drop message, applies to all messages regardless of user settings. e.g. 14. This rule is applied as soon as the message is submitted, user spam settings do not override it.

Syntax: g_spam_vanish_all int

g_spam_info_hide

Remove x-spamdetect-info header line

Removes the x-spamdetect-info header line.

Syntax: g_spam_info_hide bool

g_spam_info

m-info-hide-remove-x-spamdetect-info-header-line" >

Removes the x-spamdetect-info header line.

Syntax: g_spam_info_hide bool

g_spam_internal

Enable internal Aspam spam processing system

Enable new ‘internal’ spam processing system, note this disables SmiteCRC too!

Syntax: g_spam_internal bool

g_spam_noupdate

Disable aspam updates

Disable fetch of aspam filter rules etc from netwinsite.

Syntax: g_spam_noupdate bool

g_spam_notrain

Disable isspam and notspam addresses

Disable isspam and notspam addresses for user training.

Syntax: g_spam_notrain bool

g_spam_isspam_kind

Allow isspam from recent pop, gateway to etc

Allow ASPAM training messages to (isspam) from any trusted source (e.g. any source that would be allowed to relay/send outgoing email). This setting is recommended.

Syntax: g_spam_isspam_kind bool

g_spam_isspam_ignore

Don’t block messages from ip addresses recorded as a spam source

This bounces all email from an address recorded as a spam source until it is recorded as a ‘notspam’ source, the blocking message allows the sender to bypass the block.

Syntax: g_spam_isspam_ignore bool

g_spam_aspam

Aspam rating

Scale for Aspam default is 1.0. Valid range is zero to two.

The aspam matching based on it’s database of known spam and non spam produces a score in the range -5 –> 5. Tthe g_spam_aspam setting lets you ‘scale’ this score to increase/decrease the importance of the aspam rating. The result is then applied (added to) the spamdetect header.

Syntax: g_spam_aspam string

g_spam_poly

Scale for poly word matching

Scale for poly word matching, default is 0.1, Valid range is zero to two, Use 1.0 to enable.

Syntax: g_spam_poly string

g_spam_poly_disable

Disable poly code.

Disables the poly statistical scoring feature which is part of Aspam. Poly tries to analyze the frequency of word combinations in spam and not spam to identify if a message is likely to be spam or not. We don’t consider the poly system to be very useful, it has two faults, it’s behaviour is not ‘understandable’ and it is ‘content based’, SPF is a much superior system!

Syntax: g_spam_poly_disable bool

g_spam_private

Enable private email addresses for users to avoid spam

Note: The user will define these settings, after turning on this global setting the user can use the Web Self administration interface, press the ‘Spam’ button and the private email address is defined on that page.

This setting adds the ability for each user to create a private email address to bypass SPF/ Spam filters. The user would then typically increase the spam settings for their non private account to ‘friends mode’ and enable SPF. So only known friends will be able to contact them via the old address.

This allows the user to live ‘spam free’ without the risk of blocking email from real people.

The user must be careful with their new private address, it should only be used with humans, when entering an address in a web form or mailing list a special variant should be used e.g. user–from-WEBDOMAINNAME@users.domain

The user defines their private address, in the form user–PRIVATE@domain.com, e.g. if the users public address is joe@cool.com, and the user defines a private extension of “juggle” then the private address would be:

joe–juggle@cool.com

Email addressed to joe–juggle@cool.com is delivered without SPF or SPAM filtering / tagging.

In addition the user can enable ‘from’ matching which must look like this: username–KEYWORD-STRING@cool.com, the user specifies a keyword e.g. “match”. Then anything addressed to the user in this form:

joe–match-STRING@cool.com

Will only be delivered if ‘STRING’ is found in the ‘from’ envelope address, otherwise it will bounce. So when entering an email address in a web page called “toys.com” the user would enter:

joe–match-toys@cool.com

Any — extension that is not recognized will return a bounce suggesting they remove the extension and try again.

Syntax: g_spam_private bool

g_spam_alias_any

User aliase string e.g. “++” if defined then strip suffix from emails – not advised!

This allows each user an infinite number of aliases of the form user+extension@domain.name, this can cause problems so only enable with caution. Usually set to “++” but can be set to a single plus, but this will break any email address that contains a plus so not normally recommended. If used avoid defining it as a single character at least!

Syntax: g_spam_alias_any string

g_spam_url

Scale for url word matching

Scale for URL word matching, default is 0.3, Valid range is zero to two (recommend 1.0)

Syntax: g_spam_url string

g_spam_catcher

Spam catcher addresses

Addresses on web pages that shouldn’t get any email (robot bait), only for use with Aspam.
Any email going to the specified address will be sent to the isspam address for processing and the message will also be dropped. If the message has multiple rctp’s and some are valid users, but one matches the catcher address, it is not delivered to anyone. If you need to enter a lot of spam catcher addresses then the best way is to just setup a single spam catcher address and then use g_redirect to redirect other addresses to the spam catcher address.

eg
g_spam_catcher “johnsmith@mydomain.com”

Syntax: g_spam_catcher string

g_spam_char

Character to use instead of ‘*’ for smitespam headers (best left alone if possible)

Changing this will cause no end of problems, so only do this when initially installing SurgeMail

Syntax: g_spam_char string

g_spam_notspam

Spam collection address

Address that non authenticated users can send non spam to.

Example: g_spam_notspam “notspam@domain.com”

Syntax: g_spam_notspam string

g_spam_hold_keep

Spam hold timeout

How many days to store users spam hold messages before deleting them.
Default is 14 days.
eg. g_spam_hold “14”

Syntax: g_spam_hold_keep int

g_spam_hold_hide

Hide spam hold settings for end users and other held2pend user.cgi tweaks

This setting has no further documentation currently available

Syntax: g_spam_hold_hide bool

g_spam_header_trust_ip

List of IP addresses from which to trust/accept existing X-SpamDetect headers in emails

Use this setting to specify the filter machines which perform spam scanning for this machine. Use this on the filter machine, to specify itself so that mailing list messages do not get scanning/tagged twice. Ensure your users are sending messages via the filter machine.

Syntax: g_spam_header_trust_ip string

g_spam_share

Use and share some spam/aspam information with central server (netwin) experimental

This setting enables some features which let surgemail share information about spam and non spamming ip addresses with a central netwin server.

Syntax: g_spam_share bool

g_spam_status_hour

Process all spam status messages at this time (disk io intensive)

Normally the spam status emails are sent in response to incoming messages at undefined times, this allows all spam status emails to be sent at a predefined time.

Syntax: g_spam_status_hour int

g_spam_status_monthly

Send monthly spam status even if no messages pending

This is good to make sure all users know about their spam settings and how to change them.

Syntax: g_spam_status_monthly bool

g_spam_phishing

Download list of known phishing addresses and block outgoing email to them

Use this to stop your users resonding via email to a known phishing address. See http://code.google.com/p/anti-phishing-email-reply/

Syntax: g_spam_phishing bool

g_spam_phishing_ok

Allow to these addresses even if phishing database blocks them

Use this to stop your users resonding via email to a known phishing address. See http://code.google.com/p/anti-phishing-email-reply/

Syntax: g_spam_phishing_ok string

g_spam_nobounce

Remove old user held/vanish but after 5.2 will allow bounce

This removes the old spam settings that should never be used. In version 5 this disabled hold/vanish/bounce, now it only disables hold/vanish but allows ‘bounce’, the bounce behaviour has been made considerably safer by tuning the spam filter and changing the actual bounce to allow the sender to bypass via captcha

Syntax: g_spam_nobounce bool

g_spam_black_auto

Auto blacklist for user when isspam pressed

Changes blacklist handling to only place in spam folder (not auto reject) and to automatically blacklist when isspam button pressed

Syntax: g_spam_black_auto bool

g_spam_black_tospam

Put blacklist matches in spam folder

Place in spam rather than bouncing hard.

Syntax: g_spam_black_tospam bool

g_spam_allbad

Auto blacklist from/ip/to combinations

Makes blacklisting automatic

Syntax: g_spam_allbad bool

g_spamdetect_some

Only show spamdetect header for bad scores

This setting has no further documentation currently available

Syntax: g_spamdetect_some bool

g_spawn_log

If true the spawns are logged to lib_spawn.log

Useful for finding obscure problems with spawned modules of various kinds, webmail, nwauth, virus checkers etc.

Syntax: g_spawn_log bool

g_spf_mode

Sender Permitted From

See https://netwinsite.com/spf.htm for details.

Syntax: g_spf_mode string

g_spf_nocache

Disable SPF cache

There is a small cache used for SPF results, This setting disables it.

Syntax: g_spf_nocache bool

g_spf_rewrite

Rewrite ‘from’ envelope in redirected mail (SRS)

When messages are redircted/forwarded to another server from you server, the ‘from’ address of the existing message envelope will no longer obey SPF rules as it will be coming from your server rather then the original server. So to fix this enable this rewrite setting and then the from envelope is rewritten to point to your system using a short life token. The ‘from’ header of the message is not modified.

Syntax: g_spf_rewrite bool

g_spf_rewrite_relay

Rewrite even if from ip is a host to relay for

In some cases you will want SRS rewriting for relay hosts, In which case you should turn this on.

Syntax: g_spf_rewrite_relay bool

g_spf_rewrite_gateway

Rewrite even if gateway rule applies

In some cases you will want SRS rewriting for relay hosts, In which case you should turn this on.

Syntax: g_spf_rewrite_gateway bool

g_spf_norewrite

Exceptions to rewrite rule, e.g. *@my.domain,bob@this.domain

Where you allow users to send through your server you may want to stop rewriting for their domains so that their from address is not munged. Local domains are automatically excempt from ‘rewriting’. Specify *@domain.name not just domain.name

Syntax: g_spf_norewrite string

g_spf_dns_timeout

Seconds to wait for dns lookups for spf, best not to change

Generally a ten or twenty second timeout is reasonable. Adjusting the default is probably not necessary.

Syntax: g_spf_dns_timeout int

g_spf_timeout

Seconds to wait for all spf lookups to finish, default 48 seconds

Best not to change

Syntax: g_spf_timeout int

g_spf_domain

Domain for SPF rewrite and allow messages (defaults to first domain on server)

When SurgeMail relays/forwards a message the ‘from’ address is rewritten (g_spf_rewrite should be true). The new address is ‘from’ your domain and this setting tells surgemail which local domain to use for these from addresses.

Syntax: g_spf_domain string

g_spf_user_domain

Make allow bounces use destination user domain name

This can be useful if you need to ensure emails bounce with an address that is similar to the destination

Syntax: g_spf_user_domain bool

g_spf_very_strict

(strict only) Only give ‘allow’ option for default spf rule failures not real ones

In this mode real SPF failures are hard failures, but if there is no SPF record for a domain then the friendly ‘allow’ system is used to let the user send mail with only mild difficulty.

Syntax: g_spf_very_strict bool

g_spf_debug_log

Enable spf.log file

By default this log is not generated as it’s not usually needed.

Syntax: g_spf_debug_log bool

g_spf_default

(strict only) Default spf record if none found default ‘mx/16 a ptr:%{d2} -all’

The example shown isn’t entirely true, we adjust the ‘d2’ depending on the domain, so it’s usually unwise to change this.

Syntax: g_spf_default string

g_spf_default_noblock

(strict only) Only stamp headers if default spf record fails when no real spf header

This setting makes blocking occur only for REAL spf records, not for the default one applied to domains that have no SPF record defined.

Syntax: g_spf_default_noblock bool

g_spf_skip

Skip spf checks for these ip addresses, e.g. other mx hosts

List the ip addresses of your other MX servers so SPF checks wont fail when a message comes in via an mx host instead of directly. The SPF checking must therefore be done on all the MX servers.

Syntax: g_spf_skip string

g_spf_skip_from

Skip based on from, e.g. noreply@*paypal.com,…, Also skips RBL

Good for skipping SPF checking if a domain is in some way incompatible with SPF checking

Syntax: g_spf_skip_from string

g_spf_skip_to

Skips SPF checks based on rcpt address and RBL checks.

Syntax: g_spf_skip_to “user@domain.com”

This setting can be used to skip spf checks based on the rcpt address, if used with g_orbs_late “true” then it can also be used to skip rbl checks if the rcpt matches this setting.

Syntax: g_spf_skip_to string

g_spf_rev_skip

Skip SPF checks if reverse ip name matches in this list, e.g. *.yahoo.com

Where you identify a domain that does not support SPF and is often used in a manner which breaks SPF default rules this setting can safely allow the problem domain. This setting is probably not needed now most large mail systems are using SPF.

Syntax: g_spf_rev_skip string

g_spf_share

List of hosts to share allow ips with. Must all have same srs.secret file

List your other incoming mail servers (which must be running surgemail). This lets SurgeMail share the list of known IP addresses which have sent ‘allow’ emails. You must copy your srs.secret file across all of the servers in question so they can verify each other correctly.

Syntax: g_spf_share string

g_spf_header

Use g_verify_mx_skip and apply to resulting ip

If the sending host matches g_verify_mx_skip, then spf tests are performed on the first received header not listed in that setting. Only stamping is possible though since this indicates a front end gateway and a reject would cause a ‘bounce’ which would not be safe

Syntax: g_spf_header bool

g_spf_baddns_skip

If spf dns failure then allow message through (instead of giving retry error)

This setting is not normally needed as lookups generate retry failures so the sending server tries again and the dns failure (which is usually temporary) won’t occur the second time. Normally on a DNS failure SPF should give a ‘retry’ message, this is because spammers often have faulty DNS servers so that SPF checks always fail for their domain, so letting the message through will let some spam into your system. But in some situations the normal behavior might loose you real email so then using this setting at least until your dns problems are resolved might be wise.

Syntax: g_spf_baddns_skip bool

g_spf_nogrey

Skip SPF grey listing for these domains (require allow response)

This toughens spf for the domains in question, requiring that they really pass an ‘allow’ test rather than simply a grey listing test. Good for commonly forged domains which do normally obey spf.

Syntax: g_spf_nogrey string

g_spf_noallow

ignore friends

This toughens spf for critical domains (banks etc) where you don’t want any forged messages leaking through. This setting over-rides the users spf/friends settings for these domains (so should be used with some caution)

Syntax: g_spf_noallow string

g_spf_nofriend

Ignore friends for spf

This toughens spf so friends matches don’t bypass it

Syntax: g_spf_nofriend bool

g_spf_enforce

List of wildcard/domains to enforce spf for, e.g. paypal.com,*bank*

This enforces spf for domain that must be trusted.

Syntax: g_spf_enforce string

g_spf_enforce_real

Enforce spf for domains with strong spf entries

Enforces spf if the domains spf record ends with -all

Syntax: g_spf_enforce_real bool

g_spf_enforce_auto

Enforce spf for commonly forged domains paypal.com,*bank*

If enabled this will enforce spf for some common domains that get forged.

Syntax: g_spf_enforce_auto bool

g_spf_required

Require an spf entry for these domains

Used to make select domains add spf to talk to you

Syntax: g_spf_required string

g_spf_enforce_local

If spf fails and it’s a local domain then skip grey listing and bounce

This settings stops spammers who fake your own email domains, but it may upset users who are not authenticating or are using their own mail servers, so you will have to expect a few minor issues like that when you turn this on. This setting over-rides the ‘users’ spf and friends settings for local domains. (was miss documented as give allow message)

Syntax: g_spf_enforce_local bool

g_spflog_enable

Enable this if this server is a frontend for a SurgeMail server users log into.

Enable this if this server is a frontend for a SurgeMail server users log into.

Syntax: g_spflog_enable bool

g_spflog_domains

Specify which domains should get spflog entries sent to them.

If some of your backend servers are not surgemail then this setting will be needed to turn off the spflog messages to the non surgemail servers

Syntax: g_spflog_domains string

g_spf_byemail

Perform allow bounce confirmation via email.

This gives an email to the sender in the allow bounce message instead of aa url.

Syntax: g_spf_byemail bool

g_spf_web_url

Specify full url for spf byweb commands http://domain.name:port

Normally the default will work.

Syntax: g_spf_web_url string

g_spool_path

Allows SurgeMail to scan a directory for messages to send.

Syntax: g_spool_path “directory of spool”

SurgeMail will scan this directory every few seconds and check for any messages in this directory if found SurgeMail will then send them the messages (must end in the extension .msg). The format of the messages is as follows (without the quotes).

filename: test.msg


To: you@domain.com
From: blah@domain.com
Subject: blah blah

This is a test

Syntax: g_spool_path string

g_ssl_allow

IP Wild card of connections to allow to use SSL

This setting controls which connecting IP numbers are permitted to use SSL on POP and IMAP. They will see TLS in the protocol extension command (ETRN for SMTPor CAPA for POP). Typically, to enable SSL you set this to “*” after getting a certificate. If you don’t have a valid certificate then turning this on can cause problems as mail clients will try to use SSL and fail. 

Syntax: g_ssl_allow string

g_ssl_allow_imap

IP Wild card list to allow SSL encryption from for imap

This setting controls which connecting IP numbers are permitted to use SSL on IMAP.

Syntax: g_ssl_allow_imap string

g_ssl_allow_fix

Disable incoming ssl on ssl failure from an ip

This setting has no further documentation currently available

Syntax: g_ssl_allow_fix bool

g_ssl_disable

isable-renegotiation-disable-ssl-renegotiation" >

GEnerally this shouldn’t be used unless you have to keep some paranoid security scan happy

Syntax: g_ssl_disable_renegotiation bool

g_ssl_disable_web

Disable protocols for web only

This setting has no further documentation currently available

Syntax: g_ssl_disable_web string

g_ssl_disable_port25

Prevent ssl on port 25

May help virus fire walls to detect viruses, that’s the theory anyway…

Syntax: g_ssl_disable_port25 bool

g_ssl_disable_des

Disable DES ciphers, breaks outlook on XP

This setting has no further documentation currently available

Syntax: g_ssl_disable_des bool

g_ssl_test_fail

Break ssl to test auto downgrade

Break ssl for outgoing sends

Syntax: g_ssl_test_fail bool

g_ssl_require

equire-smtp-if-ip-matches-then-require-ssl-for-incoming-smtp-message" >

This setting has no further documentation currently available

Syntax: g_ssl_require_smtp string

g_ssl_require_in

Local domains that must only receive SSL messages

This setting has no further documentation currently available

Syntax: g_ssl_require_in string

g_ssl_require_smtp

If IP matches then require SSL for incoming SMTP message

This setting has no further documentation currently available

Syntax: g_ssl_require_smtp string

g_ssl_require_imap

IP Wild card of connections to require to use SSL for IMAP

This forces all matching IP addresses to use SSL for IMAP connections.

Syntax: g_ssl_require_imap string

g_ssl_require_login

IP wildcard of connections fur users needing to use SSL

This setting forces all matching IP addresses to use SSL for any action that requires a user login. eg: POP, IMAP and SMTP authentication but not plain SMTP. So this is ideal if you want all users to use SSL but still want email to come in from non SSL SMTP servers.

Syntax: g_ssl_require_login string

g_ssl_require_out

Other machines we only send to using SSL

This forces all matching IP addresses to use SSL for SMTP outgoing connections. Typically you would use this for outgoing connections to increase security. 

Syntax: g_ssl_require_out string

g_ssl_require_web

Require https for most web features (excluding blogs file sharing and surgeplus)

This setting has no further documentation currently available

Syntax: g_ssl_require_web bool

g_ssl_retry_seconds

Second to try and establish ssl connection, default is 5

Best not to change generally

Syntax: g_ssl_retry_seconds int

g_ssl_try_out

Try and start ssl mode to these hosts

If the hosts match then SurgeMail tries to start SSL security on the SMTP session. Note that this may cause failures if the link is dropped by the receiving server.

Syntax: g_ssl_try_out string

g_ssl_try_not

Skip ssl for these hosts

If the hosts match then SurgeMail Does not try ssl even if g_ssl_try_out matches.

Syntax: g_ssl_try_not string

g_ssl_try_from

Try and start ssl mode if from this user, e.g. *@xyz.com

Must also match the g_ssl_try_out rule, this lets you only do ssl when the email is ‘from’ certain domains/users

Syntax: g_ssl_try_from string

g_ssl_per_domain

Create/use an SSL certificate for each domain

SurgeMail can be set to use a single SSL certificate for the server or individual certificates on a per domain basis.

SurgeMail will create private key / certificate pairs if required on startup. Alternatively these can be created using the ‘SSL Config’ link on the global settings page. These can be replaced with your own trusted signed certificates using the web admin interface or by placing the appropriate private key and certificate pem files in the following location: <surgemail>/ssl for a single certificate for the whole server and under <surgemail>/ssl/<vdomain> for per vdomain certificates.

Some mail clients and web browsers will complain if the certificate domain does not match the domain they are connecting to.

Changing g_ssl_per_domain will require surgemail to be restarted to take affect. Changes to certificates using the web admin interface now take affect immediately.

Syntax: g_ssl_per_domain bool

g_ssl_ciphers

List permitted ciphers

This can be used to enhance security, not recommended but is useful if you are trying to pass a security audit of some kind. A value of MEDIUM:HIGH is probably what you want to set it to. It is case sensitive. If your list exceeds 800 bytes use g_ssl_ciphers_add for the second half

Syntax: g_ssl_ciphers string

g_ssl_ciphers_web

List permitted ciphers for web

This list is for web connections only, restart surgemail after changing

Syntax: g_ssl_ciphers_web string

g_ssl_ciphers_add

More permitted ciphers (added to g_ssl_ciphers)

This can be used to enhance security, not recommended but is useful if you are trying to pass a security audit of some kind. A value of MEDIUM:HIGH is probably what you want to set it to. It is case sensitive.

Syntax: g_ssl_ciphers_add string

g_ssl_disable_tlsv1

Obsolte, Disable tls 1.0, not recommended

Use g_ssl_disable and g_ssl_disable_web instead

Syntax: g_ssl_disable_tlsv1 bool

g_ssl_disable_tlsv1_1

Obsolte, Disable tls 1.1 support, not recommended

Use g_ssl_disable and g_ssl_disable_web instead

Syntax: g_ssl_disable_tlsv1_1 bool

g_ssl_disable_tlsv1_2

Obsolte, Disable tls 1.2 support, not recommended

Use g_ssl_disable and g_ssl_disable_web instead

Syntax: g_ssl_disable_tlsv1_2 bool

g_ssl_disable_sslv2

Obsolte, Disable ssl 2.0 support for enhanced security

Disables one of the older ssl protocols which slightly increases security and decreases compatibility with older clients. Use g_ssl_disable and g_ssl_disable_web instead

Syntax: g_ssl_disable_sslv2 bool

g_ssl_disable_sslv3

Obsolte, Disable ssl 3.0 support for enhanced security

Disables one of the ssl protocols which slightly increases security. Use g_ssl_disable and g_ssl_disable_web instead

Syntax: g_ssl_disable_sslv3 bool

g_ssl_sha1_sign

Obsolete, sha256 is now always used

This will probably be made the default in the near future

Syntax: g_ssl_sha1_sign bool

g_ssl_disable_renegotiation

Disable SSL renegotiation.

GEnerally this shouldn’t be used unless you have to keep some paranoid security scan happy

Syntax: g_ssl_disable_renegotiation bool

g_ssl_honor

Honor server cipher order

Maybe useful to force certain types of security/encryption

Syntax: g_ssl_honor bool

g_ssl_perfect

Apply good SSL settings, best to remove g_ssl_ciphers setting too

Just an easy way of setting the ciphers etc for perfect forward secrecy

Syntax: g_ssl_perfect bool

g_ssl_fips

Enable FIPS mode crash if not available (DO NOT USE)

For future use

Syntax: g_ssl_fips bool

g_ssl_dmalloc

Enable dmalloc tracking in ssl

This setting has no further documentation currently available

Syntax: g_ssl_dmalloc bool

g_ssl_warn

Send users weekly reminder if they keep using non SSL logins

This setting has no further documentation currently available

Syntax: g_ssl_warn bool

g_ssl_warn_ignore

Don’t give warnings if user is from this trusted host

This setting has no further documentation currently available

Syntax: g_ssl_warn_ignore string

g_ssl_warn_text

Last line of email warning sent to user if SSL not used

This setting has no further documentation currently available

Syntax: g_ssl_warn_text string

g_sstat_disable

Disable netwin statistics gathering.

We use this to keep track of which features customers use/like

Syntax: g_sstat_disable bool

g_stack

For testing only, NEVER SET THIS

Never set this, it can make the server unstable

Syntax: g_stack int

g_stack_imap

For testing only, NEVER SET THIS

Never set this, it can make the server unstable

Syntax: g_stack_imap int

g_startup_delay

Startup delay

Seconds to wait before accepting inbound connections when starting SurgeMail .

Syntax: g_startup_delay int

g_store_dropped

Store upto 5000 bad bounces in the dropped directory

This is useful to check if vanish_bad_bounces is working correctly

Syntax: g_store_dropped bool

g_header_strip

Strip listed headers from incoming messages

Useful for stripping headers that you don’t trust or don’t want for some reason

Syntax: g_header_strip string

g_surgewall_split

Split up surgewall messages, one per recipient

Split up incoming messages so subject tagging should work

Syntax: g_surgewall_split bool

g_surgewall_redirect

Allow redirect/responder for surgewall

Allows redirect/responder settings to work for surgewall

Syntax: g_surgewall_redirect bool

g_surgewall_ignore_error

Deliver even if some rule sais bounce

This setting should never be used we think…

Syntax: g_surgewall_ignore_error bool

g_surgeblog

Specialize SurgeMail as a Blog server

This setting causes SurgeMail’s interface to specialize itself for the purposes of being a Blog server.

Syntax: g_surgeblog bool

g_surbl

SURBL Spam URI Realtime Blocklists

This looks up each url found in each mail message and checks it against the SURBL database of your choice, the multi database can be used. See http://www.surbl.org/, adds headers of the form: X-Surbl: stamp urlfound nameofsurbl. PLEASE NOTE: Access to surbl is only provided freely in some conditions, larger ISP’s may need to purchase a feed, see http://www.surbl.org/usage-policy

Syntax: g_surbl name=string stamp=string

Example: g_surbl name=”multi.surbl.org” stamp=”sc.surbl.org,ws.surbl.org,phishing,ob.surbl.org,ab.surbl.org,jp”

g_surbl_reject

Reject email with SURBL hits

This can reduce spam on your server by completely rejecting all email containing surbl web links…

Syntax: g_surbl_reject bool

g_surbl_whois

Also check whois info on suspect urls – not for busy servers!

This setting searches whois information and compares what it finds to a list of known persistent spammers who register new domains regularly – if a match is found a surbl header is added. The whois servers don’t like getting heavy load so don’t use this setting if your server is very busy. A cache is used to minimize the load.

Syntax: g_surbl_whois bool

g_surbl_skip

URL’s to allow even if listed in surbl

Sometimes you will want to whitelist a url that is listed in one or more surbl databases, use this setting to do that.

Syntax: g_surbl_skip string

g_surbl_skip_ip

Skip SURBL check if sender is from listed ip

Sometimes you will want to whitelist an ip from SURBL checks. Use this setting to do this.

Syntax: g_surbl_skip_ip string

g_surbl_from

Also check the return path

Adds return path domain/from check in the surbl database, use with Spamhaus DBL

Syntax: g_surbl_from bool

g_vipre_enable

Enable vipre scanner on windows

Enable the vipre scanner module

Syntax: g_vipre_enable bool

g_notag_notascii

Don’t add x-notascii: charset to any non ascii message

This can be used by user exception rules for users that don’t expect any foreign language messages

Syntax: g_notag_notascii bool

g_notag_url_forgery

Don’t add x-UrlForgery when a ref urls seem to not match

Many scam’s will use legit urls with aref links to their own site, this tries to tag such messages which can then be scored as spam via aspam_mfilter.rul

Syntax: g_notag_url_forgery bool

g_tarpit_blackhole

Reject email one recipient at a time to make spammers go away

If tarpit_blackhole is true then if it was going to drop the connection to that user. Instead it will keep it and let the user talk and try and send messages, but will reject all recipients, it only does this for a max of 200 channels, any more are dropped.

Syntax: g_tarpit_blackhole bool

g_tarpit_badrcpt

Delay rejection of bad recipients

Delay rejection of bad recipients (in seconds, default 4s).

Syntax: g_tarpit_badrcpt int

g_tarpit_drop

Max recipients per hour from one IP

Drop link and ban for 1 hour if g_tarpit_max or g_max_bad_to has been exceeded.

Syntax: g_tarpit_drop bool

g_tarpit_retry

Send retry error, 450 if tarpit limits exceeded

This setting has no further documentation currently available

Syntax: g_tarpit_retry bool

g_tarpit_max

Max number of local recipients per hour from one IP

If this limit is exceeded, the offending client is “tarpitted”. This means the mail server starts pretending to go slowly. This is better than simply closing the connection as that will not stop the sending system from trying to reconnect rapidly or send to other systems rapidly, but tarpitting jams the sending system and limits the damage they can do to you and others. Cool huh? 

Unlike G_BOMB_MAX, the g_tarpit_max setting counts the total of all recipients to all addresses from this IP address.

A setting of about 200-10,000 is probably good but be careful with mailing lists it will break them. Use an exclusion for IP addresses of known mailing lists or set the limit higher than known mailing lists, eg: 2,000 is probably a good setting just to avoid disasters without disrupting many real users.

Use spam_allow ip.address.list to over-ride the limit for known systems (eg: mailing list servers) that would be exceed the limit.

Syntax: g_tarpit_max int

g_tarpit_max_remote

Max remote recipients from one IP

The maximum number of remote recipients before slowing down.

Syntax: g_tarpit_max_remote int

g_tarpit_skip

Skip tarpit limit for these destination users or domains, e.g. *@xyz.com

This setting has no further documentation currently available

Syntax: g_tarpit_skip string

g_tarpit_skip_from

Skip tarpit limit for messages from these users e.g. *@xyz.com

This setting has no further documentation currently available

Syntax: g_tarpit_skip_from string

g_tarpit_hacker

Slow DOS attacks in some situations

This setting has no further documentation currently available

Syntax: g_tarpit_hacker bool

g_tellmail_ip

Tellmail IP restriction

Restrict remote tellmail commands to these IP addresses.

Syntax: g_tellmail_ip string

g_tcp_read_timeout

Timeout in ‘seconds’ on POP connections (do not adjust)

Timeout in ‘seconds’ on POP connections, do not adjust. (default 600).

Syntax: g_tcp_read_timeout int

g_tcp_que_len

Length of listen queue for incoming connections

Default is 25 or 200 on windows, to reduce non paged pool on windows reduce to 20

Syntax: g_tcp_que_len int

g_tcp_proxy_ip

Enable TCP proxy protocol for specific address

Enables the tcp proxy protocol on new connections for this address for pop,imap,smtp.

Syntax: g_tcp_proxy_ip string

g_tcp_bf_size

Set tcpip snd/rcv buffer sizes, best left blank

This setting has no further documentation currently available

Syntax: g_tcp_bf_size int

Set all cookies to secure mode on https connections

This setting has no further documentation currently available

Syntax: g_cookie_secure bool

g_token_secure

Use secure flag for surgeweb, stops http access to token, so requires https to work

This setting has no further documentation currently available

Syntax: g_token_secure bool

g_token_httponly

Use httponly flag, stop scripts using token, may break attachments

This setting has no further documentation currently available

Syntax: g_token_httponly bool

g_thread_max

Total maximum number of threads allowed

Total maximum number of threads allowed on this system. This should not normally be changed. If you do increase it start small, eg: 400 is a safe number on most systems. Generally if you need to increase it more than that then you have a performance problem that needs fixing and increasing it more is unlikely to be a good idea. On Linux if your thread_max setting is above 500 then you must modify surgemail_start.sh to increase the handle limit from 1024 to 2048 (at least twice the g_thread_max value). If you get crashes with ‘handle_limit’ recorded in the logs then it’s likely that your operating system handle limit is too small for your g_thread_max setting. On Solaris you will need the 64 bit build of SurgeMail to increase this limit as the Solaris 32 bit ‘c’ libraries are limited to 256 file handles (I kid you not

See FAQ section on session limits

Syntax: g_thread_max int

g_thread_pool

Keep all threads in a common pool

This setting has no further documentation currently available

Syntax: g_thread_pool bool

g_thread_spinlock

Spin more before sleeping when waiting for mutex

This setting has no further documentation currently available

Syntax: g_thread_spinlock bool

g_thread_smooth

Throttle thread creation as max hit to reduce peaks

This setting has no further documentation currently available

Syntax: g_thread_smooth bool

g_timezone

Timezone text

Text to be placed in the timezone part of the date string. e.g. +1200 NZT

Syntax: g_timezone string

g_timezone_force

Hours offset to local time, e.g. 5 (best left blank)

This setting has no further documentation currently available

Syntax: g_timezone_force string

g_timeout_try_later

If timeout while waiting for message to arrive tell other end to retry

This ‘may’ cause faulty servers to endlessly retry a message. But should be ok. Normally this sort of timeout is very rare but can be caused by faulty virus scanner so retrying won’t always help

Syntax: g_timeout_try_later bool

g_tohost_local

Tohost entries to deliver locally

Authentication database tohost name entry to deliver locally. This setting only applies if g_proxy or g_route_by_tohost is enabled. This is useful to allow the configuration of multisite systems using g_route_tohost with a single shared authentication database.

Syntax: g_tohost_local string

g_toscan_path

Path used for mime parts for virus scanner

The default is the toscan directory under the home path, using this setting can help sometimes if permissions are a problem

Syntax: g_toscan_path string

g_train_store

Number of messages to store in each spam training directory (1000-5000)

We recommend about 10000 – dont get carried away, more is not necessarily better!

Syntax: g_train_store int

g_url_alias

Allows translation from one URL to another

Allows translation from one URL or beginning of a URL to another. eg:

g_url_alias from=”/cgi-bin/” to=”/scripts/”

will cause the URL http://localhost:7025/cgi-bin/fred.cgi to reference the same file as http://localhost:7025/scripts/fred.cgi would have, the fred.cgi in the SurgeMail ‘scripts’ directory. The domain url_alias settings are checked before these, the first matching rule is used, settings are checked in the order specified.

Syntax: g_url_alias from=string to=string ports=string

g_url_redirect

Sends http 301 redirect to tell browser resource has moved

Typical usage to move users from http to https automatically, e.g. g_url_redirect from=”http://*/surgeweb” to=”https://%1:7443/surgeweb” ports=”80,7080″

Or you may wish to change the default page to webmail, e.g.

g_url_redirect from=”/” to=”/surgeweb” ports=”443,80″

Syntax: g_url_redirect from=string to=string ports=string

g_url_enable

Enables widearea url database

Syntax: g_url_enable <true/false>

If set then SurgeMail fetches the url database and updates from netwinsite.com every few hours. Messages which contain matches will get a header X-SpamUrl:… which will be used in the spam score. Once enabled you will contribute to Netwin’s central server and also download from their once every couple of days.
Additions to your isspam/notspam training addresses are also sent to netwinsite.com (just the url’s for white list/blacklist)

Syntax: g_url_enable bool

g_url_master

Not for general use

Used by netwin to manage the master server. Sorry this doesn’t allow you to run your own master.
Should be left blank

Syntax: g_url_master bool

g_url_master_to

Not for general use

Not for general use. Used by netwin for testing.

Syntax: g_url_master_to string

g_url_host_noscan

Disable the scan for url_host settings matching the domain in an incoming web request

SurgeMail uses g_server_name and url_host settings to determine the default domain to select for web requests, this setting stops it using the url_host settings (which may be slow on systems with a large number of domains)

Syntax: g_url_host_noscan bool

g_user_alias_file

User aliases configuration file

This setting specifies the configuration file for user aliases. This file is in the following format:

domain alias_domain,access[,access]…

where domain is the domain name eg: email.com, alias_domain is the domain in which aliases can be created, and access specifies who is allowed to create these aliases, it can have one of the following values:

userUsers can create these aliases.
domadminDomain administrators can create these aliases.
adminThe Administrator can create these aliases.
privateSame as domadmin,admin. The Administrator and the Domain administrators can create these aliases.
publicSame as user,domadmin,admin. Everyone can create these aliases.

Example alias.dat file:

email.com *.email.com,public
email.com sport.email.com,public
internal.email.com email.com,private
internal.email.com internal.email.com,admin

Syntax: g_user_alias_file string

g_user_alias

Number of aliases accounts can create

This setting specifies the maximum number of account aliases an account (optionally in specified group) can create. The format of these aliases is specified in the file specified by the g_user_alias_file setting. eg.

g_user_alias quota=”10″ group=””
g_user_alias quota=”20″ group=”grp1″
g_user_alias quota=”30″ group=”grp2″

Syntax: g_user_alias group=string quota=int

g_user_blogs

Number of blogs accounts can create

Specifies blog limit based on user group.

Syntax: g_user_blogs group=string quota=int

Example: g_user_blogs group=premium quota=15

g_user_domainlist

Show domains list on user pages

This setting decides who will see the drop-down list of domains on the user check, add, login, and management pages. It has three possible values: user, domadmin and admin. A value of ‘user’ allows everyone to see the list, ‘domadmin’ allows domain admins and the admin to see the list, and ‘admin’ allows only the admin to see the domains list.

Syntax: g_user_domainlist string

g_user_virus_scan

Allow users to enable / disable virus scanner for themselves

This setting adds a tickbox to the Spam page in user self administration that allows the user to enable and disable the virus scanner for them selves.

Syntax: g_user_virus_scan bool

g_user_access

Allow / Restrict user access to features based on 

g_user_access group=”wildcard” access=”list”

This setting matches the g_access_group the user is in to the wildcard specified and applies the specified list to that user, giving / restricting thier access to certain features. The list may include any of the following:

ValueResult
aliasAccess to the “Alias” page and features.
blogAccess to the “Blogs” page and features.
centipaidAccess to the “Centipaid” page and features.
deleteAccess to the “Delete” button, which deletes the email account.
enotifyAccess to the “Email Notification” page and features.
exceptionsAccess to the “Exceptions” page.
filterAccess to filtering of messages. (g_filter_pipeg_mfilter_fileg_dmail_filter)
friendsAccess to the “Friends” pages, and system.
fwdAccess to the “Forwarding” features, forwarding, auto-responder.
fwdonlyAccess to the “Forwarding” features. Without this only the auto responder is shown on the forwarding page
listsAccess to the “Lists” page and features.
logAccess to the “Log” page.
mailboxAccess to the “Mailbox” page, view mailbox, setup rules.
mainAccess to the “Main” page containing user details.
passAccess to the “Password” features, change password, password retrieval.
smsAccess to the “Sms” page.
spamAccess to the “Spam” page, and SmiteSpam and Aspam processing of messages.
spamprivAccess to the “Spam” pages’ spam private feature
spfAccess to the “Spf” page and features.
surgeplusAble to connect to SurgeMail using the SurgePlus client.
virusAccess to virus scanning of messages. (g_virus_cmdg_virus_filterg_virus_avastg_scan_cmd)
webmailAccess to the “WebMail” button which logs the user into WebMail.

In addition you can prefix any of the above with ! to deny access. There are two other special case values, “all” and “none” which mean exactly what they say, access to “all” or “none” of the features.

Example:

g_user_access group=”simple” access=”all,!spam,!virus”

The above setting gives users in the ‘simple’ group access to all the features except spam and virus features.

Syntax: g_user_access group=string access=string

g_user_access_default

Default user features granted to users

This setting is a default access list for all users on the server, it is specified in the same maner as the g_user_access settings ‘access’ parameter. eg:

g_user_access_default “all,!spam,!virus”

Syntax: g_user_access_default string

g_user_access_from

When sending use from for useraccess rules

When sending a message the user access rules which are applied can be based on the ‘from’ header, this is not secure but is sometimes useful.

Syntax: g_user_access_from bool

g_user_access_webonly

Means user_access rules only stop web interface not actual spam checking etc

This setting has no further documentation currently available

Syntax: g_user_access_webonly bool

g_user_cookies

Enable browser cookies for user self management

Enable browser cookies for user self management.

Syntax: g_user_cookies bool

g_user_delete

Let users delete themselves

Enables the user delete button in the user self management page, assuming the use access rules also allow it

Syntax: g_user_delete bool

g_user_filter_early

Process user ex

g_user_friends_domain_log_disable

Disable domain level friend.log file

By default a friend.log file is written to each domain mailbox_path. This file is a collection of all users friends.log entries that rotates when it reaches 2mb in size.

Syntax: g_user_friends_domain_log_disable bool

g_user_friends_log_disable

Disable user level friend.log file

By default a friend.log file and 1 rotation is written for each user. Each log should only be approx 10k in size.

Syntax: g_user_friends_log_disable bool

g_user_utoken_days

Length of time a user self management login token is valid

Length of time a user self management login token is valid for. Length of time a user self management cookie is valid for. After this time period the login token will stop allowing the user access and they will need to login again.

Syntax: g_user_utoken_days int

g_user_utoken_expire

Length of time a user self management login token is valid for

This setting has no further documentation currently available

Syntax: g_user_utoken_expire int

g_user_mail_view

Whether an admin/manager can view/display users inbox mail

This setting enables the ‘view’ links on the users mailbox page. These links will show the content of the users email. They also log the access to the users log file, identifying the IP from which the admin viewed the message.

Syntax: g_user_mail_view bool

g_user_hide_security

Hide user level security.log access

This setting has no further documentation currently available

Syntax: g_user_hide_security bool

g_user_disable

Filename listing users to disable

This setting has no further documentation currently available

Syntax: g_user_disable string

g_user_report

Daily,Weekly,Monthly, emailed to managers of each domain

This setting has no further documentation currently available

Syntax: g_user_report string

g_admin_utoken_expire

Length of time a web admin session is valid for

This setting has no further documentation currently available

Syntax: g_admin_utoken_expire int

g_domadmin_utoken_expire

Length of time a domain admin login token is valid for in seconds

Default unit is seconds. You can specify units e.g. 3 minutes, 10 hours etc…

Syntax: g_domadmin_utoken_expire int

g_uidl_big

Use random uidl if uidl not found

This can avoid uid collisions if uidl files are lost mysteriously

Syntax: g_uidl_big bool

g_user_utoken_idle

Length of time a user self management login token may remain idle for

This setting has no further documentation currently available

Syntax: g_user_utoken_idle int

g_admin_utoken_idle

Length of time a web admin session may remain idle for

This setting has no further documentation currently available

Syntax: g_admin_utoken_idle int

g_domadmin_utoken_idle

Length of time a domain admin login token may remain idle for

This setting has no further documentation currently available

Syntax: g_domadmin_utoken_idle int

g_user_pipe

Local delivery filter pipe

Pipe run on file just before delivery to user, $USER$ available on command line. This allows the message to be modified (also see g_filter_pipe).

Syntax: g_user_pipe string

g_user_mfilter

Local delivery Mfilter rules

Mfilter rules to run late in the delivery process after the email messages have become “user specirfic”, In particular this allows filtering based on the output of g_user_pipe.

Syntax: g_user_mfilter string

g_user_receive_rule

Define valid source addresses for users in a group

This setting has no further documentation currently available

Syntax: g_user_receive_rule group=string from=string

g_user_sms_quota

SMS quota

Number of SMS messages accounts can send.

Syntax: g_user_sms_quota group=string initial=int period=string

g_user_status_send

Number of days after which to send user status messages (0 = never)

When the user enables friends then this setting will send them a regular report on what is pending and what filter rules have done. User Spam report.

Syntax: g_user_status_send int

g_user_status_from

Send status with return address of the user

Adding a return address can assist with delivery in some situations

Syntax: g_user_status_from bool

g_user_status_fromhdr

Send status with return address of this

Adding a return address can assist with delivery in some situations

Syntax: g_user_status_fromhdr string

g_user_send_rule

Define valid recipient addresses for users in a group (requires SMTP AUTH)

This rule allows you to define which domains users in the specified group can send email to.

g_user_send_rule group=”wildcard” to=”number”

If ‘group’ is set to ‘*’ then it applies to users who are not in a group (see g_access_group), and/or whose group does not match another g_user_send_rule setting. The ‘to’ field contains a wildcard list of allowed email addresses.

Syntax: g_user_send_max group=string max=int

g_user_send_warning

Warn manager if any user sends more than this many messages per day, e.g. 5000

This setting is useful to detect a spammer sending out bulk email from your system, this setting only applies to authenticated users, so someone who has figured out the password of one of your users (or a virus on their computer) or a registered user of some sort. If g_user_send_ip is defined then warnings will also be sent if an ip address exceeds this limit.

Syntax: g_user_send_warning int

g_user_send_ip

Block any ip that sends more than this many emails per day

This does not apply to g_user_send_white addresses. This will also enable counting of sends for users using g_relay_window. Whitelist ip addresses with g_user_send_white setting. This limit is ‘per day’

Syntax: g_user_send_ip int

g_user_send_white

No limit for these ip addresses/users

This is a white list for the ip and user send limits.

Syntax: g_user_send_white string

g_user_send_all

Apply all g_user_send_rules that match

This setting has no further documentation currently available

Syntax: g_user_send_all bool

g_user_list_quota

Number of mailing lists users can create

g_user_list_quota group=”” quota=”100″

This setting configures the number of mailing lists a user can create on this server. The group field is optional, specifying none effects all users globally, otherwise it matches this against the users access group. See also user_list_quota which can set quota per domain. Also the list_quota authent field can set quota per user.

Syntax: g_user_list_quota group=string quota=int

g_unique_name

A unique name for this server

This name is used in place of the machine hostname in message filenames and thus friends confirmation message subjects

Syntax: g_unique_name string

g_utf8_case_insensitive

Use case insensitive compare for surgeweb and imap searches

This setting has no further documentation currently available

Syntax: g_utf8_case_insensitive bool

g_vanish_bad_bounces

Vanish suspected spam bounces

Vanish suspected spam bounces (requires g_received_name).

Syntax: g_vanish_bad_bounces bool

g_vanish_virus_bounces

Vanish suspected virus bounces (requires g_received_name)

This setting gets rid of most of those stupid virus bounces you get from emails you haven’t sent. It works by checking incoming virus bounces for the received header that must exist if it was sent with your mail server. If the header is not found, the message is dropped. Recomended.

Syntax: g_vanish_virus_bounces bool

g_vanish_any_bounce

Vanish all bounces, requires g_vanish_bad_bounces

This setting will vanish spam pretending to be a bounce, it is possible it will vanish a real but badly formed bounce (badly formed as it contains no indication that it came from this server). Note: You MUST have g_vanish_bad_bounces true as well!

Syntax: g_vanish_any_bounce bool

g_vanish_relay

Vanish bad bounces before relaying email too

Requires g_vanish_bad_bounces too, and g_received_name must be set to something other than the email domain, e.g. bounces.your.domain

Syntax: g_vanish_relay bool

g_verify_smtp2

Verify we can talk back to the SMTP port on incoming ip address

This setting has no further documentation currently available

Syntax: g_verify_smtp2 bool

g_verify_timeout

Seconds to wait for SMTP response, default is 10 seconds

As the verification of incoming addresses is done while the message is arriving at the ‘data’ stage, it is critical that it not take more than 30-60 seconds or the sending server will give up and the message will be lost. Generally this setting should not be changed.

Syntax: g_verify_timeout int

g_verify_mx

Verify sender IP by MX

Verify MX records contain senders IP address (also see g_verify_mx_skip).

Syntax: g_verify_mx bool

g_verify_mx_skip

Skip verify sender IP by MX

Use to define incoming mail gateway IPs so the MX verify doesn’t fail on them.

Syntax: g_verify_mx_skip string

g_verify_helo

Verify helo name translates to same network as sending system.

Syntax: g_verify_helo “true/false”

It will skip this check for any trusted connection (smtp authenticated, or any ip it would allow to forward)

It adds this header:
X-Verify-Helo

It simply takes the helo name, and turns it into a number a.b.c.d, then it checks that the connection is coming from ‘a.b.*.*’
if it isn’t it adds a header saying as much.

Syntax: g_verify_helo bool

g_verify_image_hard

Use extra difficult human verification image (used in blogs)

This setting has no further documentation currently available

Syntax: g_verify_image_hard bool

g_virus_scanner_list

List of files to be virus scanned *.exe,*.bat,etc…

Use this to over-ride the default

Syntax: g_virus_scanner_list string

g_virus_simple

Enable internal simple virus scanner

This scanner simply blocks dangerous attachments, it’s fast, and effective.

Syntax: g_virus_simple bool

g_virus_simple_list

List of dangerous file extensions, *.exe,*.bat,etc…

Use this setting to replace the default list

Syntax: g_virus_simple_list string

g_virus_simple_skip

Skip simple check for from/to addresses

This setting has no further documentation currently available

Syntax: g_virus_simple_skip string

g_virus_simple_skipauth

Skip simple virus if user sending is authenticated local user

This setting has no further documentation currently available

Syntax: g_virus_simple_skipauth bool

g_virus_simple_zip

Check zip files for executables and block

This can be used to stop many types of viruses

Syntax: g_virus_simple_zip bool

g_virus_simple_test

Compare with avast results

This scanner simply blocks dangerous attachments, it’s fast, and effective.

Syntax: g_virus_simple_test bool

g_virus_avast_old

Enable AVAST virus scanner integration, OBSOLETE, DO NOT USE

This setting has no further documentation currently available

Syntax: g_virus_avast_old bool

g_virus_avast_attachments

Only scan messages with suspect attachments (windows only currently)

This setting has no further documentation currently available

Syntax: g_virus_avast_attachments bool

Not recommended, now use the anti virus config page to configure surgemail to use your system scanner.

g_virus_allow_unmonitorable

Allow unmonitorable content (avast antivirus)

By default messages that cannot be scanned (eg as they contain password protected archive files) are blocked by the avast virus scanner. This setting allows unmonitorable contect to be sent.

Syntax: g_virus_allow_unmonitorable bool

g_virus_cmd

Command line virus checker to run on MIME parts

If defined the mail server will extract MIME parts in a multi part message and run the virus scanner over the extracted file. The command line can include $FILE$ which will be replaced with the actual file name of the extracted part. An intelligent cache is used so mailing lists, etc, will not require running the virus scanner on every message sent. If you set this to “do_not_run” then SurgeMail will extract the MIME parts but not actually run any program, some virus scanners scan all files on the system so the file is deleted magically and SurgeMail will notice and bounce the message. If your scanner supports the returning of return codes if a virus is found then you should use g_virus_cmd_codes with this setting as this is more reliable than having to detect if a file is deleted and also means also will work on viruses in archives which a lot of scanners won’t delete.

Syntax: g_virus_cmd string

g_virus_cmd_codes

Return codes to bounce message

Accept return codes from virus scanner as a confirmation that the scanned file is infected, eg: 1,2,3,4,5.

Lets SurgeMail check the return code from g_virus_cmd and if the code matches
one in the above setting assumes its a virus and bounces it.

g_virus_cmd_codes “10,12”

This would assume its a virus if the scanner returns return code 10 or 12 and then will bounce the message.

Syntax: g_virus_cmd_codes string

g_virus_cmd_nodel

Do not delete scanned files

Disables cleanup of scanned files, so you can test manually. The files are extracted to the “toscan” directory inside the SurgeMail directory. You should never normally need this on unless for debugging purposes.

Syntax: g_virus_cmd_nodel bool

g_virus_cmd_size

Max size of messages to scan

Useful to stop scanning of huge files, e.g. 1mb or bigger

Syntax: g_virus_cmd_size int

g_virus_cmd_sleep

Wait after g_virus_cmd incase delete is not immediate

Milli seconds to wait after g_virus_cmd incase delete is not immediate, eg: 500 = half a second.

Syntax: g_virus_cmd_sleep int

g_virus_cmd_max

Maximum number of concurrent threads to use for scanning

Syntax: g_virus_cmd_max “number of threads”

This sets the maximum number of threads that be used for running the virus scanner set by g_virus_cmd. Some scanners can take a while to scan a message and if the server is very busy this can tie up many channels and drain the cpu slowing down the entire mail server. When the maximum has been reached any messages coming in will be passed on without being run through the scanner – although this is not the best, it’s better than the mail server grinding to a halt.

Syntax: g_virus_cmd_max int

g_virus_cmd_drop

Drop silently instead of reject at data stage – not recommended

This should only be used when your front end server is not scanning for viruses and your back end server then rejects the message generating back scatter on the front end server.

Syntax: g_virus_cmd_drop bool

g_virus_cmd_email

Set if scanner can understand email message files

If this is set then then the scanner is responsible for extracting the mime parts of a message and scanning them

Syntax: g_virus_cmd_email bool

g_virus_cmd_body

Scan raw msg file too

This setting has no further documentation currently available

Syntax: g_virus_cmd_body bool

g_virus_cmd_test

Continue after virus found to compare scanners

This setting has no further documentation currently available

Syntax: g_virus_cmd_test bool

g_virus_cmd_log

Log stdout of virus command line scanner to vcmd.log

This setting has no further documentation currently available

Syntax: g_virus_cmd_log bool

g_virus_debug3

Testing virus scanners do not use

Do not use

Syntax: g_virus_debug3 bool

g_virus_disable_remote

Disable virus scans for non-local addresses

By default SurgeMail scans incoming messages from non-local senders, this disables that behaviour so scans will only occur if any recipient has virus scan access. You will probably need g_user_virus_scan true as well.

Syntax: g_virus_disable_remote bool

g_virus_disable_local

Disable scanning for local trusted users

Skip virus scanner for authenticated users and 127.0.0.1

Syntax: g_virus_disable_local bool

g_virus_filter

Virus checker or filter that takes commands on stdin and response on stdout

Virus filters use the following protocol the process is run continuously and sent on STDIN a command of the form, “nnn CHECK fullfilename envelopefilename\r\n” and in response it must send back is “nnn OK|REJECT|ERROR reason text\r\n”

It can modify the file directly and then respond with ‘ok’, however if it does this it must maintain the crlf line terminated and dot stuffed nature of the file.

Here is an example test of a virus filter

c:\surgemail> vfilter.exe
 1 check c:\surgemail\work\a.itm c:\surgemail\work\a.hdr
 1 REJECT Found something bad in that file
 2 check c:\surgemail\work\a.itm c:\surgemail\work\a.hdr
 2 OK send message along

a.hdr would contain:

From: bob@domain.com
 To: xyz@thisdomain.com
 To: xyz3@thisdomain.com

Syntax: g_virus_filter cmd=string type=string

g_virus_filter_require

Require filter pipe

If any g_virus_filter pipe fails bounce messages rather than allow to continue.

Syntax: g_virus_filter_require bool

g_virus_fprot

Set F-PROT port for mail scanning

Typically set this to 11200

First install f-prot virus scanner, exact steps will vary depending on platform so follow your F-Prot install instructions, but as an example on Linux we did this:

cd /usr/local
gunzip DISTRIBUTION.tar.gz
tar -xvf DISTRIBUTION.tar
cd f-prot
./install-f-prot.pl
cd tools
# Now start mail scanner as user 'mail'
su mail -c"/usr/local/f-prot/tools/scan-mail.pl -server -daemon"
 

Your will also need to start the scanner as above in your startup scripts (e.g. rc.local)

Then lastly in surgemail.ini set

g_virus_fprot 11200

When a message is scanned a header X-Fprot: … is added giving some informational status.

Syntax: g_virus_fprot int

g_virus_recent_skip

Skip recent virus cache

Skip virus recent cache which attempts to speed up virus scanners.

Syntax: g_virus_recent_skip bool

g_virus_rename

Rename attached executables to prevent autorun

If enabled SurgeMail will rename dangerous executable files by replacing the ‘.’ with an ‘_’. This will stop many autorun viruses. This is name

Syntax: g_virus_rename bool

g_virus_rename_skip

Skip rename for these from/to addresses

This setting has no further documentation currently available

Syntax: g_virus_rename_skip string

g_virus_rename_skipauth

Skip rename if user sending is authenticated local user

This setting has no further documentation currently available

Syntax: g_virus_rename_skipauth bool

g_virus_report

Report detected viruses to someone

Sends an email report to the specified address when a virus comes in.

Syntax: g_virus_report string

g_virus_report_user

Report virus to recipients

This setting has no further documentation currently available

Syntax: g_virus_report_user bool

g_virus_report_all

Report every virus using g_virus_report

This setting has no further documentation currently available

Syntax: g_virus_report_all bool

g_virus_restart

Restart vpipe virus scanners

Restart vpipe virus scanners every this many items.

Syntax: g_virus_restart int

g_virus_late

Run virus scan after most spam filter processing

This can reduce load on virus scanner which is often a slow process

Syntax: g_virus_late bool

g_virus_localhost

Don’t skip virus checks for 127.0.0.1 originating emails

This setting should not normally be used, it will make it scan locally generated emails, dlist messages etc…

Syntax: g_virus_localhost bool

g_virus_strangers

Use simple attachment filter for non friends

This setting can stop zero hour attacks as it blocks any attachment that might be a virus if it’s not from a friend

Syntax: g_virus_strangers bool

g_virus_cloud

Use cloud scanner, not recommended

Enables the cloud scanner for inbox delivered messages if clamav is in use, this does send samples to an external system for scanning so may not be appropriate in all situations. It should only be used on systems where ‘clamav’ is the primary scanner with less than 1000 users.

Syntax: g_virus_cloud bool

g_virus_cloud_wild

File types to cloud scan *.exe,*.com

Best left as default

Syntax: g_virus_cloud_wild string

g_vpipe_concurrent

Concurrent requests to vpipe process

Concurrent requests to vpipe process, default is 7, set to 1 to debug vpipe issues

Syntax: g_vpipe_concurrent int

g_vpipe_fail_crash

Crash if vpipe fails

Crash SurgeMail if vpipe fails. This is for debugging purposes only.

Syntax: g_vpipe_fail_crash bool

g_vpipe_timeout

Timeout for firus filters (default 60s)

The timeout in second that SurgeMail will wait for a virus filter (defined by g_virus_filter) to complete. If after this time the virus filter has not responded the message will be let through and the following line logged in mail.log:

“Virus filter not responding, stuck on <msg file> allowing message through”

Syntax: g_vpipe_timeout int

Use the online HTML beautifier to maximize your web content composing efficiency.

g_vpipe_skip

Skip virus filter checks per IP address

Disable virus and crc checking for known safe bulk mailers that would otherwise overload the server. This setting affects the virus checker.
Example: g_vpipe_skip “20.0.0.2”

  • g_virus_cmd
  • virus filters (g_virus_filter)
  • filter program (g_filter_pipe)
  • F-Prot in daemon mode (g_virus_fprot)

Syntax: g_vpipe_skip string

g_vpipe_notag

Disable vpipe result headers

Disable headers showing vpipe results in messages.

Syntax: g_vpipe_notag bool

g_web_add

Add http headers

This setting has no further documentation currently available

Syntax: g_web_add string

g_web_api_ip

Allow access to web based API for msg access

This setting has no further documentation currently available

Syntax: g_web_api_ip string

g_web_charset

Charset for html pages

Sets the charset to use for each language i.e. e.g. iso-8859-1

Syntax: g_web_charset lang=string charset=string

g_web_max

Max concurrent web connections, default is 100

This includes web admin, webmail etc…., The default limit should be sufficient for most systems. Although a limit of 10 would be tons for most systems we had to set the default high as this setting was added recently.

Syntax: g_web_max int

g_web_max_perip

Max concurrent web connections per-ip, default is 30

This includes web admin, webmail etc…., The default limit should be sufficient for most systems unless all your users are coming through a common proxy

Syntax: g_web_max_perip int

g_web_timeout

Timeout for web requests

Timeout for web requests, the default is 180 seconds, generally it should not be set below 61 seconds

Syntax: g_web_timeout int

g_web_admin_max

Maximum number of concurrent web admin sessions

Web admin requests are recorded, the remote IP and local port are used to identify a particular session. This setting places a limit on the number of sessions at any one time.

Syntax: g_web_admin_max int

g_web_access_ip

Restrict access to web ports based on ip

Specifies a list of ports and a wildcard list of valid ip addresses who can connect to those ports.

Syntax: g_web_access_ip ports=string ip=string

g_web_access_grp

Restrict user groups to specific ports

Specifies a user group or groups and a list of valid web ports for that group.

Syntax: g_web_access_grp group=string ports=string

g_web_access_max

Maximum number of concurrent web logins for group

Specifies the maximum number of concurrent web logins for a certain group of users.

Syntax: g_web_access_max group=string max=int

g_web_noserver

Disable Server header in http responses

Some security firms require this in order to hide the software application information

Syntax: g_web_noserver bool

g_web_old_behaviour

Revert to old style webserver behaviour

To pass various auditing tests admin interface no longer responds to arbitrary url. This restores old behaviour.

Syntax: g_web_old_behaviour bool

g_web_policy_disable

Disable obscure web policy security headers

This setting has no further documentation currently available

Syntax: g_web_policy_disable bool

g_web_php_exe

Path to php.exe

Experimental support for php

Syntax: g_web_php_exe string

g_web_trust_ip

Trust ip address from rev proxy web server X-Forwarded-For

This setting has no further documentation currently available

Syntax: g_web_trust_ip string

g_web_forwarded_test

Fake the forwarded-for header

This setting has no further documentation currently available

Syntax: g_web_forwarded_test bool

g_web_forwarded_uselast

Use last address in multiple item forwarded-for header

This setting has no further documentation currently available

Syntax: g_web_forwarded_uselast bool

g_webdav_enable

Enable webdav access for users (do not use)

Enable ‘webdav’ features so users can store data, you must also define g_webdav_path

Syntax: g_webdav_enable bool

g_webdav_group

Only allow webdav if member of webdav access group

Require that users be members of the webdav group

Syntax: g_webdav_group bool

g_webdav_public

Enable non authenticated access to pub folder (readonly)

This setting enables the user to place web pages (static) up on their email account, the public url would be http://your.server/wd/username/pub/…

Syntax: g_webdav_public bool

g_webdav_path

Root path for webdav storage

For example c:\surgemail\webdav

Syntax: g_webdav_path string

g_webmail_limit

Maximum number of concurrent webmail requests

This should not generally be adjusted, it is simply a limit to prevent DOS attacks or overloading from web requests. A value of 10-300 would be reasonable. The default is 200

Syntax: g_webmail_limit int

g_webmail_port

WebMail port (default 7080)

This is the port that WebMail users should connect through (unless you want better security, then use the secure port and HTTPS protocol listed below) By default it is port 7080, but if you are not running a web server you probably want to change it or add port 80, eg:”7025,80″ so that people can get to it with a URL like this: http://your.mail.server instead of http://your.mail.server:7080. Use the keyword ‘disabled’ to disable this part of the SurgeMail service.

Syntax: g_webmail_port int

g_webmail_save

Write surgehost.ini and other obsolete webmail config info

This setting enables writing the webmail surgehost.ini file, it is not needed generally unless your users keep using the old webmail (which they shouldn’t)

Syntax: g_webmail_save bool

g_webmail_secure_port

WebMail secure port (default 7443)

This is the port that WebMail users should connect through.. By default it is port 7443, but if you are not running a web server you probably want to change it or add port 443, eg:”443″ so that people can get to it with a URL like this: https://your.mail.sever Instead of https://your.mail.server:7443. Use the keyword ‘disabled’ to disable this part of the SurgeMail service.

Syntax: g_webmail_secure_port int

g_webmail_timeout

Timeout for webmail or any cgi process (in seconds, default 360)

If he webmail cgi fails to respond this limits how long SurgeMail will wait before killing the process.

Syntax: g_webmail_timeout int

g_webmail_useip

Use the ip address in g_webmail_port setting

By default it will use the same url as the user connects on which is generally better.

Syntax: g_webmail_useip bool

g_webmail_popmode

Use POP3 instead of IMAP in WebMail.

This results in pophost being passed to webmails domain configuration file, surgehost.ini. If you change this setting you should delete surgehost.ini and run “tellmail surgehost_update” to rebuild it.

Syntax: g_webmail_popmode bool

g_webmail_url

Url to the WebMail cgi

If WebMail is not in the default place and/or is not on the SurgeMail machine then this setting tells SurgeMail where it is so links to WebMail from SurgeMail function correctly.

Syntax: g_webmail_url string

g_webmail_urladd

Url data to append to WebMail auto-login link

This setting allows you to specify additional information and settings which are passed to WebMail when SurgeMail links to it.

Syntax: g_webmail_urladd string

g_webmail_workarea

Path to WebMail workarea

If WebMail is not installed in the default location on this SurgeMail machine this setting tells SurgeMail where to find it.

Syntax: g_webmail_workarea string

g_webmail_select_domain

Send select_domain instead of host in webmail autologins

Recommended. This uses the select_domain method of auto-logins with WebMail, it often works where the old method fails.

Syntax: g_webmail_select_domain bool

g_webmail_secret

Secret string used by webmail when sending the ip address of connecting users

This is used with webmail when you want surgemail access rules to apply to webmail users, webmail has a matching setting which makes it pass the ip address through

Syntax: g_webmail_secret string

g_web_hide_source_names

Hide the name of the source template page in output web pages.

To aid tailoring each web page in the web admin shows it’s own address so you can find it to modify it. Some admins consider this a security issue, or just a bit ugly, so use this setting to hide this information when you don’t need it.

Syntax: g_web_hide_source_names bool

g_web_force_doctype_first_disable

Disable webserver behaviour to force doctype definitions to be displayed first.

Comments displayed on the webpages (including template filenames), mean IE does not use the doctype definiton. Surgemail tries to display doctype first. This setting reverts to old behaviour.

Syntax: g_web_force_doctype_first_disable bool

g_web_ref_path_extension

Path extension to add to web page image/css references.

This setting is used for caching purposes. See SurgeMail template caching for details

Syntax: g_web_ref_path_extension string

g_work

Workarea Path

Work area for SurgeMail temporary work files.

Syntax: g_work string

g_web_url_path

Url to path translation with access specifier

This lets you set up aliases and translations of urls partly based on the access rights of the user.

Syntax: g_web_url_path url=string path=string access=string

g_web_title

Title to use on specified web page

This lets you customize the title of each management web page.

Syntax: g_web_title page=string title=string

g_web_utf8

Make sure all user.cgi handling is done in UTF8

Make sure user.cgi handlign is all done in UTF8 rather than paged character sets.

Syntax: g_web_utf8 bool

g_web_appsroot

Apply apps interface at web root ie /

This setting has no further documentation currently available

Syntax: g_web_appsroot bool

g_web_appsname

Apps url name on unified web interface

This setting has no further documentation currently available

Syntax: g_web_appsname string

g_winmail_fix

Replace winmail.dat with normal attachments, requires tnef installed first http://netwinsite.com/tnef.htm

First install tnef, on unix use: apt-get install tnef, on windows download tnef.exe from our website

Syntax: g_winmail_fix bool

g_autologin_newlogic

Streamlined logic for surgeweb to user.cgi autologin handover

Improved logic for user.cgi autologin url generation. Notably affects proxy mode, frontend-backend configurations, and whether ssl is used.

Syntax: g_autologin_newlogic bool

g_surgeweb_disable

Disable access to SurgeWeb

Completely disable surgeweb access for whatever reason.

Syntax: g_surgeweb_disable bool

g_surgeweb_work

Path to Surgeweb cache/work files

This is where Surgeweb stores it’s temporary or working files, default I_G_HOME\surgeweb\work

Syntax: g_surgeweb_work string

g_surgeweb_backend_server

Backend machine to connect to

This specifies the backend machine where Surgeweb connects for email and to store user settings. Surgeweb will cache data here but store the master copy of anything on the backend machine.

Syntax: g_surgeweb_backend_server string

g_surgeweb_backend_web

Backend machine to connect to

This specifies the internet resolvable hostnaem or url for all user.cgi access connected to a backend server eg. myserver.com or https://myserver.com:7443

Syntax: g_surgeweb_backend_web string

g_surgeweb_benchmark

Log web request timing info for surgeweb benchmarking – matches ip addresses

Netwin testing use only

Syntax: g_surgeweb_benchmark string

g_surgeweb_debug

Log surgeweb debug info – matches ip addresses or email addresses – avoid

Note this setting should be used minimally as it affects performance

Syntax: g_surgeweb_debug string

g_surgeweb_logall

For requests matching g_surgeweb_debug also leave all webio & temp files – avoid

Netwin testing use only

Syntax: g_surgeweb_logall bool

g_surgeweb_restrict

Restrict surgeweb use to these accounts only

Allow surgeweb access to a matching set of email addresses

Syntax: g_surgeweb_restrict string

g_surgeweb_idle_timeout

Idle timeout for surgeweb sessions (hours, default=48)

If no manual action is taken during this time the surgeweb session gets logged out

Syntax: g_surgeweb_idle_timeout int

g_surgeweb_remember_timeout

“Remember” timeout / max session length for surgeweb sessions (days, default=14)

Maximum time for Remember me and for single sessions

Syntax: g_surgeweb_remember_timeout int

g_surgeweb_cache_less

Reduce surgeweb caching

Reduce the length of time that surgeweb caches message bodies in its g_surgeweb_work folder to save disk space usage

Syntax: g_surgeweb_cache_less bool

g_surgeweb_path

Change surgeweb path

This setting has no further documentation currently available

Syntax: g_surgeweb_path string

g_surgeweb_process

Run surgeweb in it’s own process (beta)

Intended to increase resilience

Syntax: g_surgeweb_process bool

g_surgeweb_testing

NEVER USE

Not for general use

Syntax: g_surgeweb_testing bool

g_surgeweb_ics

Surgeweb email/calendaring integration (ie ics file processing and sending)

Enable surgeweb ICS handling smarts to allow calender invites to be replied to and to allow calender invites to be sent

Syntax: g_surgeweb_ics bool

g_surgeweb_forgot_show

Show forgot password link on surgeweb login page

Default for forgot password link visibility on surgeweb login page. (note: gets overidden by older showlink_forget_pass surgeweb setting)

Syntax: g_surgeweb_forgot_show bool

g_surgeweb_testrig

Disable session cache for testrig

This setting has no further documentation currently available

Syntax: g_surgeweb_testrig bool

g_xauthuser_hide

Hide X-Authenticated-User header

The header X-Authenticated-User is added to all local deliveries for users that login using SMTP authentication. This is the most reliable way to determine who actually sent this email. This setting will disable the addition of this header.

Syntax: g_xauthuser_hide bool

g_xrcptoriginal_hide

Hide X-Rcpt-Original header

The X-Rcpt header is added indicating which local account this message was delivered to. If the mail has been redirected for any reason the original delivery address is added as an X-Rcpt-Original header. This setting will disable the addition of this header.

Syntax: g_xrcptoriginal_hide bool

g_xrcpt_hide

Hide X-Rcpt header

The X-Rcpt header is added indicating which local account this message was delivered to. This setting will disable the addition of this header.

Syntax: g_xrcpt_hide bool

g_xserver_hide

Hide XServer header

This wil hide the X-Server header.

g_sched_utoken_timeout

Timeout for sched utokens in minutes

Timeout for sched utokens in minutes.

Syntax: g_sched_utoken_timeout int

g_xfile_allow

IP address to allow xfile and WebMail features from

Allow xfile & web upload features for users. Set to ‘*’ or the WebMail servers IP address.

Syntax: g_xfile_allow string

g_deliver_robot

Robot/Script to run at delivery time $FILE$ AND $TO$ parameters

This setting has no further documentation currently available

Syntax: g_deliver_robot string

g_disable_surgeplus

Disable SurgePlus Calendar and File Sharing client

Disable users from logging in using the SurgePlus Calendar and File Sharing client. See SurgePlus

Syntax: g_disable_surgeplus bool

Add web links to SurgePlus from other web interfaces (and vice versa) for users allowed to use SurgePlus.

This causes links to appear in the SurgePlus interface to switch to using WebMail (and DBabble if you have the g_dbabble_links setting on).

Syntax: g_surgeplus_links bool

g_disable_surgeplus_updates

Disable automated downloading of new versions of SurgePlus client from netwinsite.com

New versions of the SurgePlus client are automatically downloaded from netwinsite.com and made available for download form your server by your users. See SurgePlus

Syntax: g_disable_surgeplus_updates bool

g_surgeplus_log_level

SurgePlus log level. ‘none’, ‘info’, or ‘debug’. Default is ‘info’

Sets the amount of logging done for SurgePlus. When using ‘debug’ level, data is logged to surgeplusd.log in addition to surgeplus.log

Syntax: g_surgeplus_log_level string

Example: debug

g_surgeplus_port

s-port-g-surgeplus-secure-port-surgeplus-port-and-surgeplus-secure-port" >

SurgePlus uses the POP protocol to communicate with SurgeMail. However, some virus scanners running on the clients machine prevent the SurgePlus client from using POP commands that the virus scanner does not know about. In order to avoid this problem, SurgePlus uses port 7110 by default instead of port 110. However, clients not using a virus scanner (or clients using some virus scanners we have made SurgePlus work with – e.g. Norton) can safely use port 110 if they would otherwise be prevented from connecting to SurgeMail by a firewall. The SurgePlus client will quietly switch to using port 110 if it is not able to connect to the server using port 7110.

Syntax: g_surgeplus_secure_port int

g_surgeplus_web_port

SurgePlus web port.

If you want your SurgePlus users to view shared files over a different port than WebMail uses give this setting a value.

Syntax: g_surgeplus_web_port int

g_surgeplus_web_url

Direct SurgePlus users to access shared files at this url

Use this to override the default location that users are directed to to view shared SurgePlus web files. If you don’t specify a value for this setting then it defaults to using the non-secure webmail port.

Syntax: g_surgeplus_web_url string

Example: https://||domain||:7443

g_surgeplus_hide_client_downloads

Hide the links to download and install SurgePlus Windows client

Use this setting if you don’t want your users to know about the SurgePlus Windows client. All this setting does is to hide the download links from the web interface.

Syntax: g_surgeplus_hide_client_downloads bool

g_surgeplus_pop_server_name

Default pop server to set SurgePlus client download to connect to.

SurgePlus Windows client downloads are set to connect to this POP server by default. This setting only applies if the user is downloading the client from a URL that does not match a valid domain on the server. If the URL does match a domain on the server, the domain specific version of this setting applies instead.

Syntax: g_surgeplus_pop_server_name string

g_surgeplus_smtp_server_name

Default smtp server to set SurgePlus client download to connect to.

SurgePlus Windows client downloads are set to connect to this SMTP server by default. This setting only applies if the user is downloading the client from a URL that does not match a valid domain on the server. If the URL does match a domain on the server, the domain specific version of this setting applies instead.

Syntax: g_surgeplus_smtp_server_name string

g_surgeplus_delay_tell_upgrade

Delay informing existing users about new SurgePlus versions for

Delay informing existing users about new versions of SurgePlus for this long after the new version is downloaded to your server. SurgePlus clients poll the server once an hour so they won’t be informed about the new version for up to an hour longer than the value of this setting. Use this setting combined with the g_surgeplus_delay_tell_upgrade_exempt setting so that only administrator users are informed about new versions at first so you can confirm the new version works fine with your existing server configuration before everyone upgrades. Example values: “3 hours” or “2 days”

Syntax: g_surgeplus_delay_tell_upgrade string

g_surgeplus_delay_tell_upgrade_exempt

Users exempt from delayed new version informing

See the above setting for information. Example value: “user1@domain.name,user2@domain.name”

Syntax: g_surgeplus_delay_tell_upgrade_exempt string

g_surgeplus_online

Enable online tracking in surgeplus

Not recommended.

Syntax: g_surgeplus_online bool

Was this article helpful?

Related Articles

Contents

Need Support?

Can't find the answer you're looking for?
Contact Support