Lines Matching refs:MTA

206 	Experimental support for SMTP MTA Strict Transport Security
207 (MTA-STS, see RFC 8461) is available when using
219 flags are available: D/M to disable DANE/MTA-STS,
495 If a connection to the MTA is dropped by the client before its
641 Drop support for IPv4-mapped IPv6 addresses to prevent the MTA
671 two AUTH lines, the MTA would not read them after
684 with the MTA, the MTA might experience a write() timeout.
805 the MTA was delaying connections due to DelayLA.
937 the MTA to deal with some input (i.e., "=") itself.
972 Even though a milter rejects a recipient the MTA will still keep
997 LIBMILTER: The MTA did not offer SMFIF_SETSYMLIST during option
1077 enabled, the MTA can be asked to select a shared memory
1129 the MTA will not attempt to open a statistics file on
1177 protocol actions and features of the MTA and also to
1205 wants to receive from the MTA for each protocol step
1210 protocol action. Also, if the flag is set then the MTA
1446 the LDAP map -1 argument which tells the MTA to only
1448 Add additional error checks in the MTA for milter communication
1741 to the MTA which in turn will show the delivery just like
1743 MTA. Based on patch by Per Hedeland.
1934 to notify the MTA that an EOM operation is still in progress,
2055 LIBMILTER: Add extra checks in case a broken MTA sends bogus data
2133 Note: an MTA that is not patched might be vulnerable to
2193 only needs to relay all mail to the MTA. Problem found
2281 an error in the communication from/to the MTA occurs.
3284 MTA is running. For example, during a queue run.
3288 The maximum number of commands before the MTA slows down when too
3588 Note: an MTA that is not patched might be vulnerable to
3943 another MTA. The change will re-appear in a future
4876 Do not report a Remote-MTA on local deliveries. Problem noted by
5100 sendmail was talking to the Mercury 1.43 MTA.
7784 that this is the initial MUA->MTA submission. The flag current
8961 MTA names, addresses, and diagnostics respectively.