Provided by: opensmtpd_6.6.4p1-1_amd64 bug

NAME

     smtpd.conf — Simple Mail Transfer Protocol daemon configuration file

DESCRIPTION

     smtpd.conf is the configuration file for the mail daemon smtpd(8).

     When mail arrives, each “RCPT TO:” command generates a mail envelope.  If an envelope
     matches any of a pre-designated set of criteria (using the match directive), the message is
     accepted for delivery.  A copy of the message, as well as its associated envelopes, is saved
     in the mail queue and later dispatched according to an associated set of actions (using the
     action directive).  If an envelope does not match any options, it is rejected.  The match
     rules are evaluated sequentially, with the first match winning.

     The format of the configuration file is fairly flexible.  The current line can be extended
     over multiple lines using a backslash (‘\’).  Comments can be put anywhere in the file using
     a hash mark (‘#’), and extend to the end of the current line.  Care should be taken when
     commenting out multi-line text: the comment is effective until the end of the entire block.
     Argument names not beginning with a letter, digit, or underscore, as well as reserved words
     (such as listen, match, and port), must be quoted.  Arguments containing whitespace should
     be surrounded by double quotes (").

     Macros can be defined that are later expanded in context.  Macro names must start with a
     letter, digit, or underscore, and may contain any of those characters, but may not be
     reserved words.  Macros are not expanded inside quotes.  For example:

           lan_addr = "192.168.0.1"
           listen on $lan_addr
           listen on $lan_addr tls auth

     The syntax of smtpd.conf is described below.

     action name method [options]
             When the queue runner processes an envelope from the mail queue, it carries out the
             action name, selected by the match ... action directive when the message was
             received.  The action directive provides configuration data for delivery attempts.
             Required lookups are performed at the time of each delivery attempt.  Consequently,
             changing an action directive or the files it references and restarting the smtpd(8)
             daemon causes the changes to take effect for subsequent delivery attempts for the
             respective dispatcher name, even for messages that were already stuck in the queue
             prior to the configuration changes.

             The delivery method parameter may be one of the following:

             expand-only
                     Only accept the message if a delivery method was specified in an aliases or
                     .forward file.

             forward-only
                     Only accept the message if the recipient results in a remote address after
                     the processing of aliases or forward file.

             lmtp destination [rcpt-to]
                     Deliver the message to an LMTP server at destination.  The location may be
                     expressed as host:port or as a UNIX socket.

                     Optionally, rcpt-to might be specified to use the recipient email address
                     (after expansion) instead of the local user in the LMTP session as RCPT TO.

             maildir [pathname [junk]]
                     Deliver the message to the maildir in pathname if specified, or by default
                     to ~/Maildir.

                     The pathname may contain format specifiers that are expanded before use (see
                     FORMAT SPECIFIERS).

                     If the junk argument is provided, the message will be moved to the Junk
                     folder if it contains a positive X-Spam header.

             mbox    Deliver the message to the user's mbox with mail.local(8).

             mda command
                     Delegate the delivery to a command that receives the message on its standard
                     input.

                     The command may contain format specifiers that are expanded before use (see
                     FORMAT SPECIFIERS).

             relay   Relay the message to another SMTP server.

             The local delivery methods support additional options:

             alias <table>
                     Use the mapping table for aliases(5) expansion.

             ttl n{s|m|h|d}
                     Specify how long a message may remain in the queue.

             user username
                     Specify the username for performing the delivery, to be looked up with
                     getpwnam(3).

                     This is used for virtual hosting where a single username is in charge of
                     handling delivery for all virtual users.

                     This option is not usable with the mbox delivery method.

             userbase <table>
                     Use the mapping table for user lookups instead of the getpwnam(3) function.

                     The userbase does not apply for the user option.

             virtual <table>
                     Use the mapping table for virtual expansion.  The aliasing table format is
                     described in table(5).

             wrapper name
                     Use the wrapper specified in mda wrapper.

             The relay delivery methods also support additional options:

             backup  Operate as a backup mail exchanger delivering messages to any mail exchanger
                     with higher priority.

             backup mx name
                     Operate as a backup mail exchanger delivering messages to any mail exchanger
                     with higher priority than mail exchanger identified as name.

             helo heloname
                     Advertise heloname as the hostname to other mail exchangers during the HELO
                     phase.

             helo-src <table>
                     Use the mapping table to look up a hostname matching the source address, to
                     advertise during the HELO phase.

             host relay-url
                     Do not perform MX lookups but relay messages to the relay host described by
                     relay-url.  The format for relay-url is [proto://[label@]]host[:port].  The
                     following protocols are available:

                     smtp        Normal SMTP session with opportunistic STARTTLS (the default).
                     smtp+tls    Normal SMTP session with mandatory STARTTLS.
                     smtp+notls  Plain text SMTP session without TLS.
                     lmtp        LMTP session.  port is required.
                     smtps       SMTP session with forced TLS on connection, default port is 465.
                     Unless noted, port defaults to 25.

                     The label corresponds to an entry in a credentials table, as documented in
                     table(5).  It is used with the “smtp+tls” and “smtps” protocols for
                     authentication.  Server certificates for those protocols are verified by
                     default.

             srs     When relaying a mail resulting from a forward, use the Sender Rewriting
                     Scheme to rewrite sender address.

             tls [no-verify]
                     Require TLS to be used when relaying, using mandatory STARTTLS by default.
                     When used with a smarthost, the protocol must not be “smtp+notls://”.  If
                     no-verify is specified, do not require a valid certificate.

             auth <table>
                     Use the mapping table for connecting to relay-url using credentials.  This
                     option is usable only with host option.  The credential table format is
                     described in table(5).

             mail-from mailaddr
                     Use mailaddr as the MAIL FROM address within the SMTP transaction.

             src address | <address>
                     Use the string or list table address for the source IP address.  If the list
                     contains more than one address, all of them are used in such a way that
                     traffic is routed as efficiently as possible.

     bounce warn-interval delay [, delay ...]
             Send warning messages to the envelope sender when temporary delivery failures cause
             a message to remain on the queue for longer than delay.  Each delay parameter
             consists of a positive decimal integer and a unit s, m, h, or d.  At most four delay
             parameters can be specified.  The default is "bounce warn-interval 4h", sending a
             single warning after four hours.

     ca caname cert cafile
             Associate the Certificate Authority (CA) certificate file cafile with host caname,
             and use that file as the CA certificate for that host.  caname is the server's name,
             derived from the default hostname or set using either /etc/mailname or using the
             hostname directive.

     filter chain-name chain {filter-name [, ...]}
             Register a chain of filters named chain-name and consisting of the filters listed
             from filter-name.  Filters part of a filter chain are executed in order of
             declaration for each phase that they are registered for.  A filter chain may be used
             in place of a filter for any directive but filter chains themselves.

     filter filter-name phase phase-name match conditions disconnect message
             Register builtin filter filter-name matching conditions to disconnect session with
             message.  Phase and matching conditions are documented in a specific section, see
             BUILTIN FILTERING.

     filter filter-name phase phase-name match conditions junk
             Register builtin filter filter-name matching conditions to mark a session or a
             transaction as junk.  Phase and matching conditions are documented in a specific
             section, see BUILTIN FILTERING.

     filter filter-name phase phase-name match conditions reject message
             Register builtin filter filter-name matching conditions to reject session with
             message.  Phase and matching conditions are documented in a specific section, see
             BUILTIN FILTERING.

     filter filter-name phase phase-name match conditions report message
             Register builtin filter filter-name matching conditions to report on session with
             message and proceed with the transaction.  Phase and matching conditions are
             documented in a specific section, see BUILTIN FILTERING.

     filter filter-name phase phase-name match conditions rewrite value
             Register builtin filter filter-name matching conditions to rewrite phase parameter
             with new value.  Phase and matching conditions are documented in a specific section,
             see BUILTIN FILTERING.

     filter filter-name proc proc-name
             Register "proc" filter filter-name backed by the proc-name process.

     filter filter-name proc-exec command
             Register and execute "proc" filter filter-name from command.  If command starts with
             a slash it is executed with an absolute path, else it will be run from
             “/usr/local/libexec/smtpd/”.

     include "pathname"
             Replace this directive with the content of the additional configuration file at the
             absolute pathname.

     listen on interface [family] [options]
             Listen on the interface for incoming connections, using the same syntax as for
             ifconfig(8).  The interface parameter may also be an interface group, an IP address,
             or a domain name.  Listening can optionally be restricted to a specific address
             family, which can be either inet4 or inet6.

             The options are as follows:

             auth [<authtable>]
                     Support SMTPAUTH: clients may only start SMTP transactions after successful
                     authentication.  Users are authenticated against either their own normal
                     login credentials or a credentials table authtable, the format of which is
                     described in table(5).

             auth-optional [<authtable>]
                     Support SMTPAUTH optionally: clients need not authenticate, but may do so.
                     This allows a listen on directive to both accept incoming mail from
                     untrusted senders and permit outgoing mail from authenticated users (using
                     match auth).  It can be used in situations where it is not possible to
                     listen on a separate port (usually the submission port, 587) for users to
                     authenticate.

             ca caname
                     For secure connections, use the CA certificate associated with caname
                     (declared in a ca directive) as the CA certificate when verifying client
                     certificates.

             filter name
                     Apply filter name on connections handled by this listener.

             hostname hostname
                     Use hostname in the greeting banner instead of the default server name.

             hostnames <names>
                     Override the server name for specific addresses.  The names table contains a
                     mapping of IP addresses to hostnames.  If the address on which the
                     connection arrives appears in the mapping, the associated hostname is used.

             mask-src
                     Omit the from part when prepending “Received” headers.

             no-dsn  Disable the DSN (Delivery Status Notification) extension.

             pki pkiname
                     For secure connections, use the certificate associated with pkiname
                     (declared in a pki directive) to prove a mail server's identity.

             port [port]
                     Listen on the given port instead of the default port 25.

             proxy-v2
                     Support the PROXYv2 protocol, rewriting appropriately source address
                     received from proxy.

             received-auth
                     In “Received” headers, report whether the session was authenticated and by
                     which local user.

             senders <users> [masquerade]
                     Look up the authenticated user in the users mapping table to find the email
                     addresses that user is allowed to submit mail as.  In addition, if the
                     masquerade option is provided, the From header is rewritten to match the
                     sender provided in the SMTP session.

             smtps   Support SMTPS, by default on port 465.  Mutually exclusive with tls.

             tag tag
                     Clients connecting to the listener are tagged with the given tag.

             tls     Support STARTTLS, by default on port 25.  Mutually exclusive with smtps.

             tls-require [verify]
                     Like tls, but force clients to establish a secure connection before being
                     allowed to start an SMTP transaction.  With the verify option, clients must
                     also provide a valid certificate to establish an SMTP session.

     listen on socket [mask-src]
             Listen for incoming SMTP connections on the Unix domain socket /var/run/smtpd.sock.
             This is done by default, even if the directive is absent.  If the mask-src option is
             specified, printing of the HELO name, hostname, and IP address of the originating
             host is suppressed in Received: header lines.

     match options action name
             If at least one mail envelope matches the options of one match action directive,
             receive the incoming message, put a copy into each matching envelope, and atomically
             save the envelopes to the mail spool for later processing by the respective
             dispatcher name.

             The following matching options are supported and can all be negated:

             [!] for any
                     Specify that session may address any destination.

             [!] for local
                     Specify that session may address any local domain.  This is the default, and
                     may be omitted.

             [!] for domain domain | <domain>
                     Specify that session may address the string or list table domain.

             [!] for domain regex domain | <domain>
                     Specify that session may address the regex or regex table domain.

             [!] from any
                     Specify that session may originate from any source.

             [!] from local
                     Specify that session may only originate from a local IP address, or from the
                     local enqueuer.  This is the default, and may be omitted.

             [!] from rdns
                     Specify that session may only originate from an IP address that resolves to
                     a reverse DNS.

             [!] from rdns hostname | <hostname>
                     Specify that session may only originate from an IP address that resolves to
                     a reverse DNS matching string or list string hostname.

             [!] from rdns regex hostname | <hostname>
                     Specify that session may only originate from an IP address that resolves to
                     a reverse DNS matching regex or list regex hostname.

             [!] from socket
                     Specify that session may only originate from the local enqueuer.

             [!] from src address | <address>
                     Specify that session may only originate from string or list table address
                     which can be a specific address or a subnet expressed in CIDR-notation.

             [!] from src regex address | <address>
                     Specify that session may only originate from regex or regex table address
                     which can be a specific address or a subnet expressed in CIDR-notation.

             In addition, the following transaction options:

             [!] auth
                     Matches transactions which have been authenticated.

             [!] helo helo-name | <helo-name>
                     Specify that session's HELO / EHLO should match the string or list table
                     helo-name.

             [!] helo regex helo-name | <helo-name>
                     Specify that session's HELO / EHLO should match the regex or regex table
                     helo-name.

             [!] mail-from sender | <sender>
                     Specify that transactions's MAIL FROM should match the string or list table
                     sender.

             [!] mail-from regex sender | <sender>
                     Specify that transactions's MAIL FROM should match the regex or regex table
                     sender.

             [!] rcpt-to recipient | <recipient>
                     Specify that transaction's RCPT TO should match the string or list table
                     recipient.

             [!] rcpt-to regex recipient | <recipient>
                     Specify that transaction's RCPT TO should match the regex or regex table
                     recipient.

             [!] tag tag
                     Matches transactions tagged with the given tag.

             [!] tag regex tag
                     Matches transactions tagged with the given tag regex.

             [!] tls
                     Specify that transaction should take place in a TLS channel.

     match options reject
             Reject the incoming message during the SMTP dialogue.  The same options are
             supported as for the match action directive.

     mda wrapper name command
             Associate command with the mail delivery agent wrapper named name.  When a local
             delivery specifies a wrapper, the command associated with the wrapper will be
             executed instead.  The command may contain format specifiers (see FORMAT
             SPECIFIERS).

     mta max-deferred number
             When delivery to a given host is suspended due to temporary failures, cache at most
             number envelopes for that host such that they can be delivered as soon as another
             delivery succeeds to that host.  The default is 100.

     pki pkiname cert certfile
             Associate certificate file certfile with host pkiname, and use that file to prove
             the identity of the mail server to clients.  pkiname is the server's name, derived
             from the default hostname or set using either /etc/mailname or using the hostname
             directive.  If a fallback certificate or SNI is wanted, the ‘*’ wildcard may be used
             as pkiname.

             A certificate chain may be created by appending one or many certificates, including
             a Certificate Authority certificate, to certfile.  The creation of certificates is
             documented in starttls(8).

     pki pkiname key keyfile
             Associate the key located in keyfile with host pkiname.

     pki pkiname dhe params
             Specify the DHE parameters to use for DHE cipher suites with host pkiname.  Valid
             parameter values are none, legacy, and auto.  For legacy, a fixed key length of 1024
             bits is used, whereas for auto, the key length is determined automatically.  The
             default is none, which disables DHE cipher suites.

     proc proc-name command
             Register an external process named proc-name from command.  Such processes may be
             used to share the same instance between multiple filters.  If command starts with a
             slash it is executed with an absolute path, else it will be run from
             “/usr/local/libexec/smtpd/”.

     queue compression
             Store queue files in a compressed format.  This may be useful to save disk space.

     queue encryption [key]
             Encrypt queue files with EVP_aes_256_gcm(3).  If no key is specified, it is read
             with getpass(3).  If the string stdin or a single dash (‘-’) is given instead of a
             key, the key is read from the standard input.

     queue ttl delay
             Set the default expiration time for temporarily undeliverable messages, given as a
             positive decimal integer followed by a unit s, m, h, or d.  The default is four days
             (4d).

     smtp ciphers control
             Set the control string for SSL_CTX_set_cipher_list(3).  The default is
             "HIGH:!aNULL:!MD5".

     smtp limit max-mails count
             Limit the number of messages to count for each session.  The default is 100.

     smtp limit max-rcpt count
             Limit the number of recipients to count for each transaction.  The default is 1000.

     smtp max-message-size size
             Reject messages larger than size, given as a positive number of bytes or as a string
             to be parsed with scan_scaled(3).  The default is "35M".

     smtp sub-addr-delim character
             When resolving the local part of a local email address, ignore the ASCII character
             and all characters following it.  The default is ‘+’.

     srs key secret
             Set the secret key to use for SRS, the Sender Rewriting Scheme.

     srs key backup secret
             Set a backup secret key to use as a fallback for SRS.  This can be used to implement
             SRS key rotation.

     srs ttl delay
             Set the time-to-live delay for SRS envelopes.  After this delay, a bounce reply to
             the SRS address will be discarded to limit risks of forged addresses.  The default
             is four days (4d).

     table name [type:]pathname
             Tables provide additional configuration information for smtpd(8) in the form of
             lists or key-value mappings.  The format of the entries depends on what the table is
             used for.  Refer to table(5) for the exhaustive documentation.

             Each table is identified by an arbitrary, unique name.

             If the type is db, information is stored in a file created with makemap(8); if it is
             file or omitted, information is stored in a plain text file using the format
             described in table(5).  The pathname to the file must be absolute.

     table name {value [, ...]}
             Instead of using a separate file, declare a list table containing the given static
             values.  The table must contain at least one value and may declare multiple values
             as a comma-separated (whitespace optional) list.

     table name {key=value [, ...]}
             Instead of using a separate file, declare a mapping table containing the given
             static key-value pairs.  The table must contain at least one key-value pair and may
             declare multiple pairs as a comma-separated (whitespace optional) list.

   BUILTIN FILTERING
     In a regular workflow, smtpd(8) may accept or reject a message based only on the content of
     envelopes.  Its decisions are about the handling of the message, not about the handling of
     an active session.

     Filtering extends the decision making process by allowing smtpd(8) to stop at each phase of
     an SMTP session, check that conditions are met, then decide if a session is allowed to move
     forward.

     With filtering, a session may be interrupted at any phase before an envelope is complete.  A
     message may also be rejected after being submitted, disregarding if the envelope was
     accepted or not.

     The following phases are currently supported:

           connect      upon connection, before a banner is displayed
           helo         after HELO command is submitted
           ehlo         after EHLO command is submitted
           mail-from    after MAIL FROM command is submitted
           rcpt-to      after RCPT TO command is submitted
           data         after DATA command is submitted
           commit       after message is fully is submitted

     At each phase, multiple criteria may be checked:

           fcrdns                   forward-confirmed reverse DNS is valid
           rdns                     session has a reverse DNS
           rdns <table>             session has a reverse DNS in table
           src <table>              source address is in table
           helo <table>             helo name is in table
           mail-from <table>        sender address is in table
           rcpt-to <table>          recipient address is in table

     All criteria from previous phases are available to subsequent phases, so while the helo
     criteria is not available before the helo or ehlo phase, the fcrdns criteria is available in
     all phases.

     Criteria may all be negated by prefixing them with an exclamation mark:

           ! fcrdns                 forward-confirmed reverse DNS is invalid

     Any criteria using a table may indicate that tables hold regex by prefixing the table name
     with the keyword regex.

           helo regex <table>       helo name matches a regex in table
     Finally, four decisions may be taken:

           disconnect message       the session is disconnected with message
           junk                     the session or transaction is junked
           reject message           the command is rejected with message
           rewrite value            the command parameter is rewritten with value

     Decisions that involve a message require that the message be RFC valid, meaning that they
     should either start with a 4xx or 5xx status code.  Descisions can be taken at any phase,
     however junking can only happen before a message is committed.

   FORMAT SPECIFIERS
     Some configuration directives support expansion of their parameters at runtime.  Such
     directives (for example action maildir, action mda) may use format specifiers which are
     expanded before delivery or relaying.  The following formats are currently supported:

           %{sender}            sender email address, may be empty string
           %{sender.user}       user part of the sender email address, may be empty
           %{sender.domain}     domain part of the sender email address, may be empty
           %{rcpt}              recipient email address
           %{rcpt.user}         user part of the recipient email address
           %{rcpt.domain}       domain part of the recipient email address
           %{dest}              recipient email address after expansion
           %{dest.user}         user part after expansion
           %{dest.domain}       domain part after expansion
           %{user.username}     local user
           %{user.directory}    home directory of the local user
           %{mbox.from}         name used in mbox From separator lines
           %{mda}               mda command, only available for mda wrappers

     Expansion formats also support partial expansion using the optional bracket notations with
     substring offset.  For example, with recipient domain “example.org”:

           %{rcpt.domain[0]}       expands to “e”
           %{rcpt.domain[1]}       expands to “x”
           %{rcpt.domain[8:]}      expands to “org”
           %{rcpt.domain[-3:]}     expands to “org”
           %{rcpt.domain[0:6]}     expands to “example”
           %{rcpt.domain[0:-4]}    expands to “example”

     In addition, modifiers may be applied to the token.  For example, with recipient
     “User+Tag@Example.org”:

           %{rcpt:lowercase}          expands to “user+tag@example.org”
           %{rcpt:uppercase}          expands to “USER+TAG@EXAMPLE.ORG”
           %{rcpt:strip}              expands to “User@Example.org”
           %{rcpt:lowercase|strip}    expands to “user@example.org”

     For security concerns, expanded values are sanitized and potentially dangerous characters
     are replaced with ‘:’.  In situations where they are desirable, the “raw” modifier may be
     applied.  For example, with recipient “user+t?g@example.org”:

           %{rcpt}        expands to “user+t:g@example.org”
           %{rcpt:raw}    expands to “user+t?g@example.org

FILES

     /etc/smtpd.conf     Default smtpd(8) configuration file.
     /etc/mailname       If this file exists, the first line is used as the server name.
                         Otherwise, the server name is derived from the local hostname returned
                         by gethostname(3), either directly if it is a fully qualified domain
                         name, or by retrieving the associated canonical name through
                         getaddrinfo(3).
     /var/run/smtpd.sock
                         Unix domain socket for incoming SMTP connections.
     /var/spool/smtpd/   Spool directories for mail during processing.

EXAMPLES

     The default smtpd.conf file which ships with OpenBSD listens on the loopback network
     interface (lo0) and allows for mail from users and daemons on the local machine, as well as
     permitting email to remote servers.  Some more complex configurations are given below.

     This first example is the same as the default configuration, but all outgoing mail is
     forwarded to a remote SMTP server.  A secrets file is needed to specify a username and
     password:

           # touch /etc/secrets
           # chmod 640 /etc/secrets
           # chown root:_smtpd /etc/secrets
           # echo "bob username:password" > /etc/secrets

     smtpd.conf would look like this:

           table aliases file:/etc/aliases
           table secrets file:/etc/secrets

           listen on lo0

           action "local_mail" mbox alias <aliases>
           action "outbound" relay host smtp+tls://bob@smtp.example.com \
                   auth <secrets>

           match for local action "local_mail"
           match for any action "outbound"

     In this second example, the aim is to permit mail delivery and relaying only for users that
     can authenticate (using their normal login credentials).  An RSA certificate must be
     provided to prove the server's identity.  The mail server listens on all interfaces the
     default routes point to.  Mail with a local destination is sent to an external MDA.  First,
     the RSA certificate is created:

           # openssl genrsa -out /etc/ssl/private/mail.example.com.key 4096
           # openssl req -new -x509 -key /etc/ssl/private/mail.example.com.key \
                   -out /etc/ssl/mail.example.com.crt -days 365
           # chmod 600 /etc/ssl/mail.example.com.crt
           # chmod 600 /etc/ssl/private/mail.example.com.key

     In the example above, a certificate valid for one year was created.  The configuration file
     would look like this:

           pki mail.example.com cert "/etc/ssl/mail.example.com.crt"
           pki mail.example.com key "/etc/ssl/private/mail.example.com.key"

           table aliases file:/etc/aliases

           listen on lo0
           listen on egress tls pki mail.example.com auth

           action mda_with_aliases mda "/path/to/mda -f -" alias <aliases>
           action mda_without_aliases mda "/path/to/mda -f -"
           action "outbound" relay

           match for local action mda_with_aliases
           match from any for domain example.com action mda_without_aliases
           match for any action "outbound"
           match auth from any for any action "outbound"

     For sites that wish to sign messages using DKIM, the dkimproxy package may be used as a
     filter.  The following example is the same as the default configuration, but all outgoing
     mail is passed to dkimproxy_out on port 10027 for signing.  The signed messages are received
     on port 10028 and tagged for relaying.

           table aliases file:/etc/aliases

           listen on lo0
           listen on lo0 port 10028 tag DKIM

           action "local_mail" mbox alias <aliases>
           action "outbound" relay
           action "relay_dkim" relay host smtp://127.0.0.1:10027

           match for local action "local_mail"
           match tag DKIM for any action "outbound"
           match for any action "relay_dkim"

     Sites that accept non-local messages may be able to cut down on the volume of spam received
     by rejecting forged messages that claim to be from the local domain.  The following example
     uses a list table other-relays to specify the IP addresses of relays that may legitimately
     originate mail with the owner's domain as the sender.

           table aliases file:/etc/aliases
           table other-relays file:/etc/other-relays

           listen on lo0
           listen on egress

           action "local_mail" mbox alias <aliases>
           action "outbound" relay

           match for local action "local_mail"
           match for any action "outbound"
           match !from src <other-relays> mail-from "@example.com" for any \
                 reject
           match from any for domain example.com action "local_mail"

SEE ALSO

     mailer.conf(5), table(5), makemap(8), smtpd(8)

HISTORY

     smtpd(8) first appeared in OpenBSD 4.6.