Answered by the Webhosting Experts
Tags +

Dedicated Servers

Bare Metal Computing
Tired of overpaying for outdated hardware or nonexistent technical support?

Click now and chat with our highly skilled account managers. Learn about Hivelocity's latest server deals or browse our bare metal servers by clicking the link below.

See the Hivelocity difference today!

Tags +

Configure Mail Server(Exim)

Exim is recommended and supported MTA for use with the @Mail application, as it includes additional functionality, including MySQL database lookups, which enhance the efficiency of @Mail and increase performance.

How Exim is configured

SMTP Configuration

Your Exim installation references configuration details from the file /usr/local/atmail/mailserver/configure. Open the file using your text editor (ex. Vi, Emacs, Notepad), and at the top of the file, you will find the following lines:

# Stop the SMTP if load > X
smtp_load_reserve = 20

# Avoid mail-delivery, queue messages if load > X
queue_only_load = 10

# Don’t run the queue if load > X
deliver_queue_load_max = 8

smtp_banner = “Welcome to the @Mail SMTP Server ( Exim v4 ) “

Details about the settings are given on the commented sentences before each declaration.The tags that follow each setting are the “markers” used by @Mail, so they can be configured via the WebAdmin easily. The values are changed when you edit your SMTP settings via the WebAdmin, so manual configuration of this part is not necessary.

MySQL Configuration

You can find the following lines in the “@Mail Custom Routers” section of your Exim configuration file:

# The MYSQL login details. hostname/database/username/password
hide mysql_servers = localhost/atmail/root/mypassword

Your SMTP service references SQL to get details like relay permissions, domain configuration among many others. This section defines the details needed by Exim to connect to MySQL. The mysql_servers line requires the hostname of the mySQL server, database name, username and password (Note: the password must be set in mySQL, as Exim does not accept a blank password)

In the same way as your SMTP settings, the tags are “markers” used by @Mail, so this can be easily configured via the WebAdmin – no manual configuration is necessary.

Mail Relaying – How it Works

When Exim delivers emails, they pass through a routine configured in the mailserver configuration file. This section defines how emails are handled, when they are sent or recieved by the server.

Address Routing

Before emails are recieved by the server, the sender-address is handled, or routed depending on how it is defined in your mailserver configuration file. The following is the default configuration for your @Mail installation, defined in the Routers section of your configuration file:

driver = dnslookup
domains = ! +local_domains
transport = remote_smtp
ignore_target_hosts = :

Exim checks if the domain is in the local domains by doing a DNS lookup on the domain name. If it is not in your local domains, the domain is treated as an outside address.

driver = redirect
data = ${lookup mysql{ MYSQL_ALIASES }}

Exim checks if the address has an alias. This router calls the custom @Mail router called MYSQL_ALIASES, which checks if the user has an alias in the database, or is included in a catch-all account.

driver = redirect
data = ${lookup mysql {MYSQL_FORWARD}{$value}}

Exim then checks if the account has a forwarding rule. If this is true, the message is diverted to the external account. This router calls the @Mail custom SQL router called MYSQL_FORWARD, which searches for configured forward-addresses in the database.

domains = ${lookup mysql {MYSQL_CHECKSPAM}{$value}}
senders = ! ${lookup mysql {MYSQL_WHITELIST}{$value}}
condition = ${if and { {!def:h_X-Spam-Flag:} {!eq {$received_protocol}{spam-scanned}} {!eq {$received_protocol}{local}} } {1}{0}}
driver = accept
transport = spamcheck

The address is then passed, and checked for any entries pertaining to it in the Whitelist. If the account is not in the whitelist, it is then checked for spam in the Transports section of the configuration file. This router uses the @Mail custom routers MYSQL_CHECKSPAM and MYSQL_WHITELIST, that check the domain names of the address in the Whitelist section of the database.

driver = manualroute
domains = ${lookup mysql {MYSQL_PURGESPAM}{$value}}
condition = “${if eq{$h_X-Spam-Flag:}{YES} {1}{0}}”
route_list = “* localhost byname”
transport = devnull
verify = false

If the email is marked as spam, Exim checks if the recipient has configured his/her account to automatically delete messages. If this is true, the email is automatically discarded.

driver = manualroute
domains = ${lookup mysql {MYSQL_MOVESPAMFOLDER}{$value}}
condition = “${if eq{$h_X-Spam-Flag:}{YES} {1}{0}}”
route_list = “* localhost byname”
transport = mysql_delivery_spamfolder
verify = false

Optionally, if the user has configured his/her account to forward messages to a “Spam” folder, the emails are placed in the folder the user has selected. It is then handled by mysql_delivery_spamfolder in the Transports section.

driver = accept
senders = ! ^.*[email protected]*:\
! ^bounce-.*@.*:\
! ^.*[email protected]*:\
! ^owner-.*@.*:\
! ^[email protected]*:\
! ^[email protected]*:\
! ^[email protected]*:\
! ^[email protected]*:\
domains = ${lookup mysql {MYSQL_CHECKAUTOREPLY}{$value}}
condition = “${if !eq{$h_X-Spam-Flag:}{YES} {1}{0}}”
transport = mysql_autoreply

The recipient is then checked is it has a



Need More Personalized Help?

If you have any further issues, questions, or would like some assistance checking on this or anything else, please reach out to us from your account and provide your server credentials within the encrypted field for the best possible security and support.

If you are unable to reach your account or if you are on the go, please reach out from your valid account email to us here at: [email protected] We are also available to you through our phone and live chat system 24/7/365.

Rapid Restore

Backup your entire server’s data every night and have access to 5 days of rolling restore points.  Restore your server’s data, OS and configuration any time you need it.

Our Rapid Restore service saves the day during accidental data loss, hardware failures and virus contraction. Simply pick your recovery point and restore the data from that day. 

DDoS Protection

While our competitors may advertise DDoS protection, most often, they are merely implementing easily evaded router rules or simply black-holing targeted servers. They consider this “DDoS protecting their network.” However, neither of these solutions should give comfort to any online business. Should your site be attacked, chances are likely both of these options will end with your server being taken offline. At Hivelocity, we take the responsibility of keeping your servers online very seriously. For this reason, we offer two very serious forms of DDoS protection.


Every solution we provide includes our Filtering Edge of Network System (FENS). FENS is a series of proprietary systems that proactively monitors and protects the entire Hivelocity Network from most common Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks.


For an extra fee, you can enhance your server’s protection further with the addition of our Server Defense System. Our Server Defense System sits in front of your server, inspecting inbound data and looking for malicious traffic. The moment an attack is detected, it instantly begins scrubbing each data packet. Hivelocity’s Server Defense System delivers business continuity even in the face of massive and complex attacks.

Our Server Defense System is like adding an alarm and armed guard to your business, alerting you to and destroying anything attempting to jump that fence. Our Server Defense System utilizes internally developed proprietary systems in addition to Corero’s Threat Defense Smartwalls for data packet scrubbing. Each of our data centers is a scrubbing center with Corero Smartwalls on-premise, allowing us to provide on-prem zero-lag data scrubbing.

SSL Certificates

The security of your online commerce and protecting your customers’ data is as important to us as it is to you. When your customers see the green bar, they will know their connection to you is protected. We offer single domain, multi-domain, and wild-card certificates.

We offer industry leading 128-bit encryption certificates, allowing you to conduct e-commerce with complete security. Inspire confidence in your customers by displaying any number of seals and indicators certifying that your site is secure.

Load Balancing

Adding this service to two servers with identical content will allow you to distribute your load evenly across your hardware. Don’t lose business because you couldn’t handle the demand. Load balance and handle your biggest resource spikes with ease.


Stop attacks, prevent unauthorized access, and achieve regulatory compliance. Our Juniper hardware firewalls offload the work so your server never has to consume resources protecting itself from malicious traffic. A single firewall can be used to protect multiple servers.

Cloud Storage

Cloud storage offers users redundancy and easy accessibility, ensuring your data remains secure and readily available. Scale to as much as you need for only a 20¢/GB.

Cloud Storage is distributed and replicated across many servers, protecting your data from hardware failure. Highly scalable, it can handle thousands of client connections via TCP/IP. Connect to your virtual drive with SFTP, FTP, and SSHMount and in the future NFS and AFP. Cloud Storage is based on a stackable design which is upgradeable up to 2TB per instance.