Flylib.com
sendmail, 4th Edition
sendmail, 4th Edition
ISBN: 0596510292
EAN: 2147483647
Year: 2002
Pages: 1174
Authors:
Bryan Costales
,
Claus Assmann
,
George Jansen
,
Gregory Neil Shapiro
BUY ON AMAZON
Main Page
Table of content
Copyright
Dedication
Preface
Changes Since the Previous Edition
Why This Book Is Necessary
History
Eric Allman Speaks
Organization
Audience and Assumptions
Unix and sendmail Versions
Conventions Used in This Handbook
Additional Sources of Information
Other Books, Other Problems
How to Contact Us
Acknowledgments
Chapter 1. Some Basics
1.1 Email Basics
1.2 Requests for Comments (RFCs)
1.3 Email and sendmail
1.4 Basic Parts of sendmail
1.5 Basic Parts of a Mail Message
1.6 Basic Roles of sendmail
1.7 Basic Modes of sendmail
1.8 The sendmail.cf File
Part I: Build and Install
Chapter 2. Build and Install sendmail
2.1 Vendor Versus Compiling
2.2 Obtain the Source
2.3 The Build Script
2.4 Building with m4
2.5 Build sendmail
2.6 Install sendmail
2.7 Pitfalls
2.8 Build m4 Macro Reference
APPENDDEF( )
confBEFORE
confBLDVARIANT
confBUILDBIN
confCC
confCCOPTS
confCCOPTS_SO
confCOPY
confDEPEND_TYPE
confDEPLIBS
confDONT_INSTALL_CATMAN
confEBINDIR
confENVDEF and conf_prog_ENVDEF
confFORCE_RMAIL
confGBIN...
confHFDIR
confHFFILE
confINCDIRS
confINC...
confINSTALL
confINSTALL_RAWMAN
confLD
confLDOPTS
confLDOPTS_SO
confLIB...
confLIBDIRS
confLIBS and conf_prog_LIBS
confLIBSEARCH
confLIBSEARCHPATH
confLN
confLNOPTS
confLINKS
confMAN...
confMAPDEF
confMBIN...
confMSPQOWN
confMSP_QUEUE_DIR
confMTCCOPTS
confMTLDOPTS
confNO_HELPFILE_INSTALL
confNO_MAN_BUILD
confNO_MAN_INSTALL
confNO_STATISTICS_INSTALL
confOBJADD
confOPTIMIZE
confRANLIB
confRANLIBOPTS
confREQUIRE_LIBSM
confSBINDIR
confSBINGRP
confSBINMODE
confSBINOWN
confSHAREDLIB...
confSHELL
confSM_OS_HEADER
confSMOBJADD
confSMSRCADD
confSONAME
conf_prog_OBJADD
conf_prog_SRCADD
confSRCDIR
confSTDIOTYPE
confSTDIR
confSTFILE
confSTRIP
confSTRIPOPTS
confUBINDIR
confUBINGRP
confUBINMODE
confUBINOWN
PREPENDDEF( )
Chapter 3. Tune sendmail with Compile-Time Macros
3.1 Before You Begin, a Checklist
3.2 To Port, Tune, or Debug
3.3 Pitfalls
3.4 Compile-Time Macro Reference
AUTO_NIS_ALIASES
BSD4_3
BSD4_4
DATA_PROGRESS_TIMEOUT
DNSMAP
DSN
EGD
ERRLIST_PREDEFINED
FAST_PID_RECYCLE
_FFR...
FORK
HAS...
HESIOD
HES_GETMAILHOST
IDENTPROTO
IP_SRCROUTE
...IS_BROKEN
LA_TYPE
LDAPMAP
LOG
MATCHGECOS
MAX...
MEMCHUNKSIZE
MILTER
MIME7TO8
MIME8TO7
NAMED_BIND
MAP_NSD
MAP_REGEX
NDBM
NEED...
NET...
NETINFO
NEWDB
NIS
NISPLUS
NOFTRUNCATE
NO_GROUP_SET
NOTUNIX
_PATH...
PH_MAP
PICKY_HELO_CHECK
PIPELINING
PSBUFSIZ
QUEUE
QUEUESEGSIZE
REQUIRES_DIR_FSYNC
SASL
SCANF
SECUREWARE
SFS_TYPE
SHARE_V1
SM_...
SM_HEAP_CHECK
SM_CONF_SHM
SMTP
SMTPDEBUG
SMTPLINELIM
SPT_TYPE
STARTTLS
SUID_ROOT_FILES_OK
SYSLOG_BUFSIZE
SYSTEM5
TCPWRAPPERS
TLS_NO_RSA
TOBUFSIZE
TTYNAME
...T
UDB_DEFAULT_SPEC
USE_DOUBLE_FORK
USE_ENVIRON
USING_NETSCAPE_LDAP
USERDB
USESETEUID
WILDCARD_SHELL
XDEBUG
Chapter 4. Configure sendmail.cf with m4
4.1 The m4 Preprocessor
4.2 Configure with m4
4.3 m4 Macros by Function
4.4 Masquerading
4.5 Relays
4.6 UUCP Support
4.7 Pitfalls
4.8 Configuration File Feature Reference
FEATURE(accept_unqualified_senders)
FEATURE(accept_unresolvable_domains)
FEATURE(access_db)
FEATURE(allmasquerade)
FEATURE(always_add_domain)
FEATURE(authinfo)
FEATURE(bestmx_is_local)
FEATURE(bitdomain)
FEATURE(blacklist_recipients)
FEATURE(compat_check)
FEATURE(delay_checks)
FEATURE(dnsbl)
FEATURE(domaintable)
FEATURE(enhdnsbl)
FEATURE(generics_entire_domain)
FEATURE(genericstable)
FEATURE(ldap_routing)
FEATURE(limited_masquerade)
FEATURE(local_lmtp)
FEATURE(local_no_masquerade)
FEATURE(local_procmail)
FEATURE(lookupdotdomain)
FEATURE(loose_relay_check)
FEATURE(mailertable)
FEATURE(masquerade_entire_domain)
FEATURE(masquerade_envelope)
FEATURE(msp)
FEATURE(nocanonify)
FEATURE(nodns)
FEATURE(no_default_msa)
FEATURE(notsticky)
FEATURE(nouucp)
FEATURE(nullclient)
FEATURE(promiscuous_relay)
FEATURE(preserve_local_plus_detail)
FEATURE(preserve_luser_host)
FEATURE(queuegroup)
FEATURE(rbl)
FEATURE(redirect)
FEATURE(relay_based_on_MX)
FEATURE(relay_entire_domain)
FEATURE(relay_hosts_only)
FEATURE(relay_local_from)
FEATURE(relay_mail_from)
FEATURE(smrsh)
FEATURE(stickyhost)
FEATURE(use_ct_file)
FEATURE(use_cw_file)
FEATURE(uucpdomain)
FEATURE(virtuser_entire_domain)
FEATURE(virtusertable)
Chapter 5. Build and Use Companion Programs
5.1 The Build Script
-A
-c
-E
-f
-I
-L
-M
-m
-n
-O
-Q
-S
-v
5.2 The editmap Program
-C
-f
-N
-q
-u
-x
5.3 The mail.local Delivery Agent
-7
-b
-d
-D
-f
-h
-l (lowercase L)
-r
5.4 The mailstats Program
-c
-C
-f
-o
-p
-P
5.5 The makemap Program
-c
-C
-d
-e
-f
-l (lowercase L)
-N
-o
-r
-s
-t
-u
-v
5.6 The praliases Program
-C
-f
5.7 The rmail Delivery Agent
5.8 The smrsh Program
5.9 The vacation Program
-a
-C
-d
-f
-i or -I
-l (lowercase L)
-m
-r
-s
-t
-U
-x
-z
5.10 Pitfalls
Part II: Administration
Chapter 6. Tune Performance
6.1 Handle Deep Queues
6.2 Sidestep Slow Hosts
6.3 Deliver to Files
6.4 Buffered File IO
6.5 Use Multiple Queues
6.6 Condition the Network
6.7 Tune the Kernel
6.8 Pitfalls
Chapter 7. How to Handle spam
7.1 The Local_check_ Rule Sets
7.2 How DNSBL Works
7.3 Check Headers with Rule Sets
7.4 Relaying
7.5 The access Database
7.6 The Milter Library
7.7 Pitfalls
Chapter 8. Test Rule Sets with -bt
8.1 Overview
8.2 Configuration Lines
8.3 Dump a sendmail Macro or Class
8.4 Show an Item
8.5 Complex Actions Made Simple
8.6 Process-Specified Addresses
8.7 Add Debugging for Detail
8.8 Batch Rule-Set Testing
8.9 Pitfalls
Chapter 9. DNS and sendmail
9.1 Overview
9.2 How sendmail Uses DNS
9.3 Set Up MX Records
9.4 How to Use nslookup
9.5 Prepare for Disaster
9.6 Pitfalls
Chapter 10. Maintain Security with sendmail
10.1 Why root?
10.2 The Environment
10.3 SMTP Probes
10.4 The Configuration File
10.5 Permissions
10.6 The Aliases File
10.7 Forged Mail
10.8 Security Features
10.9 Support SMTP AUTH
10.10 STARTTLS
10.11 Other Security Information
10.12 Pitfalls
Chapter 11. Manage the Queue
11.1 Overview of the Queue
11.2 Parts of a Queued Message
11.3 Using Multiple Queue Directories
11.4 Queue Groups (V8.12 and Above)
11.5 Bogus qf Files
11.6 Printing the Queue
11.7 How the Queue Is Processed
11.8 Cause Queues to Be Processed
11.9 Process Alternate Queues
11.10 Pitfalls
11.11 The qf File Internals
A line
B line
C line
d line
D line
E line
F line
H line
I line
K line
M line
N line
P line
Q line
r line
R line
S line
T line
V line
Z line
line
line
. line
Chapter 12. Maintain Aliases
12.1 The aliases(5) File
12.2 Forms of Alias Delivery
12.3 Write a Delivery Agent Script
12.4 Special Aliases
12.5 The Aliases Database
12.6 Prevent Aliasing with -n
12.7 Pitfalls
Chapter 13. Mailing Lists and .forward
13.1 Internal Mailing Lists
13.2 :include: Mailing Lists
13.3 Defining a Mailing List Owner
13.4 Exploder Mailing Lists
13.5 Problems with Mailing Lists
13.6 Packages That Help
13.7 The User s .forward File
13.8 Pitfalls
Chapter 14. Signals, Transactions, and Syslog
14.1 Signal the Daemon
SIGTERM
SIGINT
SIGKILL
SIGHUP
SIGUSR1
14.2 Log Transactions with -X
14.3 Log with syslog
14.4 Pitfalls
14.5 Alphabetized syslog Equates
arg1
bodytype
class
ctladdr
daemon
delay
dsn
from
intvl
len
mailer
msgid
nrcpts
ntries
pri
proto
reject
relay
ruleset
size
stat
to
xdelay
Chapter 15. The sendmail Command Line
15.1 Alternative argv0 Names
15.2 Command-Line Switches
15.3 List of Recipient Addresses
15.4 Processing the Command Line
15.5 sendmail s exit( ) Status
EX_CANTCREAT
EX_CONFIG
EX_IOERR
EX_OK
EX_OSERR
EX_OSFILE
EX_SOFTWARE
EX_TEMPFAIL
EX_UNAVAILABLE
EX_USAGE
15.6 Pitfalls
15.7 Alphabetized Command-Line Switches
-A
-B
-b
-ba
-bD
-bd
-bH
-bh
-bi
-bm
-bP
-bp
-bs
-bt
-bv
-bz
-C
-c
-d
-E
-e
-F
-f
-G
-h
-I
-i
-J
-L
-M
-m
-N
-n
-O
-o
-p
-q
-R
-r
-s
-T
-t
-U
-V
-v
-X
-x
Chapter 16. Debug sendmail with -d
16.1 The Syntax of -d
16.2 The Behavior of -d
16.3 Interpret the Output
16.4 Table of All -d Categories
16.5 Pitfalls
16.6 Reference for -d in Numerical Order
-d0.1
-d0.4
-d0.10
-d0.12
-d0.13
-d0.15
-d0.20
-d2.1
-d2.9
-d4.80
-d6.1
-d8.1
-d8.2
-d8.3
-d8.5
-d8.7
-d8.8
-d11.1
-d11.2
-d12.1
-d13.1
-d20.1
-d21.1
-d21.2
-d22.1
-d22.11
-d22.12
-d25.1
-d26.1
-d27.1
-d27.2
-d27.3
-d27.4
-d27.5
-d27.8
-d27.9
-d28.1
-d29.1
-d29.4
-d31.2
-d34.1
-d34.11
-d35.9
-d37.1
-d37.8
-d38.2
-d38.3
-d38.4
-d38.9
-d38.10
-d38.12
-d38.19
-d38.20
-d41.1
-d44.4
-d44.5
-d48.2
-d49.1
-d52.1
-d52.100
-d60.1
-d99.100
Part III: The Configuration File
Chapter 17. Configuration File Overview
17.1 Overall Syntax
17.2 Comments
17.3 V8 Comments
17.4 Continuation Lines
17.5 The V Configuration Command
17.6 Pitfalls
Chapter 18. The R (Rules) Configuration Command
18.1 Why Rules?
18.2 The R Configuration Command
18.3 Tokenizing Rules
18.4 The Workspace
18.5 The Behavior of a Rule
18.6 The LHS
18.7 The RHS
18.8 Pitfalls
18.9 Rule Operator Reference
:
:
:
:
( )
-
Chapter 19. The S (Rule Sets) Configuration Command
19.1 The S Configuration Command
19.2 The Sequence of Rule Sets
19.3 The canonify Rule Set 3
19.4 The final Rule Set 4
19.5 The parse Rule Set 0
19.6 The localaddr Rule Set 5
19.7 Rule Sets 1 and 2
19.8 Pitfalls
19.9 Policy Rule-Set Reference
check_data
check_etrn
check_vrfy and check_expn
srv_features
Chapter 20. The M (Mail Delivery Agent) Configuration Command
20.1 The M Configuration Command
20.2 The Symbolic Delivery Agent Name
20.3 The mc Configuration Syntax
20.4 Delivery Agents by Name
cyrus
cyrusv2
discard
error
fax
file and include
local and prog
mail11
ph
pop
procmail
qpage
smtp, etc.
usenet
uucp
20.5 Delivery Agent Equates
(forward slash)
A
C
D
E
F
L
M
m
N
P
Q
R
r
S
T
U
W
20.6 How a Delivery Agent Is Executed
20.7 Pitfalls
20.8 Delivery Agent FFlags
F
F0 (zero)
F1 (one)
F2
F3
F5
F6
F7
F8
F9
F: (colon)
F (vertical bar)
F (forward slash)
F
Fa
FA
Fb
Fc
FC
Fd
FD
Fe
FE
Ff
FF
Fg
Fh
Fi
FI (uppercase i)
Fj
Fk
Fl (lowercase L)
FL
Fm
FM
Fn
Fo
Fp
FP
Fq
Fr
FR
Fs
FS
Fu
FU
Fw
Fx
FX
Fz
FZ
Chapter 21. The D (Define a Macro) Configuration Command
21.1 Preassigned sendmail Macros
21.2 Command-Line Definitions
21.3 Configuration-File Definitions
21.4 Macro Names
21.5 Macro Expansion: and
21.6 Macro Conditionals: ?, , and .
21.7 Macros with mc Configuration
21.8 Pitfalls
21.9 Alphabetized sendmail Macros
Array
161
(lowercase L)
71
Chapter 22. The C and F (Class Macro) Configuration Commands
22.1 Class Configuration Commands
22.2 Access Classes in Rules
22.3 Classes with mc Configuration
22.4 Internal Class Macros
22.5 Pitfalls
22.6 Alphabetized Class Macros
b
checkMIMEFieldHeaders
checkMIMEHeaders
checkMIMETextHeaders
e
k
m
n
persistentMacros
q
ResOk
R
tls
s
t
w
Chapter 23. The K (Database-Map) Configuration Command
23.1 Enable at Compile Time
23.2 The K Configuration Command
23.3 The K Command switches
-A
-a
-D
-f
-k
-l (lowercase L)
-m
-N
-O
-o
-q
-S
-T
-t
-v
-z
23.4 Use ( and ) in Rules
23.5 Database Maps with mc Configuration
23.6 Pitfalls
23.7 Alphabetized Database-Map Types
arith
btree
bestmx
dbm
dequote
dns
hash
hesiod
host
implicit
ldap (was ldapx)
macro
netinfo
nis
nisplus
nsd
null
ph
program
regex
sequence
stab
switch
syslog
text
userdb
user
Chapter 24. The O (Options) Configuration Command
24.1 Overview
24.2 Command-Line Options
24.3 Configuration File Options
24.4 Options in the mc File
24.5 Alphabetical Table of All Options
24.6 Option Argument Types
24.7 Interrelating Options
24.8 Pitfalls
24.9 Alphabetized Options
AliasFile
AliasWait
AllowBogusHELO
AuthMaxBits
AuthMechanisms
AuthOptions
AutoRebuildAliases
BadRcptThrottle
BlankSub
CACertFile
CACertPath
CheckAliases
CheckpointInterval
ClassFactor
ClientCertFile
ClientKeyFile
ClientPortOptions
ColonOkInAddr
ConnectionCacheSize
ConnectionCacheTimeout
ConnectionRateThrottle
ConnectOnlyTo
ControlSocketName
DaemonPortOptions
DataFileBufferSize
DeadLetterDrop
DefaultAuthInfo
DefaultCharSet
DefaultUser
DelayLA
DeliverByMin
DeliveryMode
DHParameters
DialDelay
DirectSubmissionModifiers
DontBlameSendmail
DontExpandCnames
DontInitGroups
DontProbeInterfaces
DontPruneRoutes
DoubleBounceAddress
EightBitMode
ErrorHeader
ErrorMode
FallbackMXhost
FastSplit
ForkEachJob
ForwardPath
HelpFile
HoldExpensive
HostsFile
HostStatusDirectory
IgnoreDots
InputMailFilters
LDAPDefaultSpec
LogLevel
MailboxDatabase
MatchGECOS
MaxAliasRecursion
MaxDaemonChildren
MaxHeadersLength
MaxHopCount
MaxMessageSize
MaxMimeHeaderLength
MaxQueueChildren
MaxQueueRunSize
MaxRecipientsPerMessage
MaxRunnersPerQueue
MeToo
Milter
MinFreeBlocks
MinQueueAge
MustQuoteChars
NiceQueueRun
NoRecipientAction
OldStyleHeaders
OperatorChars
PidFile
PostmasterCopy
PrivacyOptions
ProcessTitlePrefix
QueueDirectory
QueueFactor
QueueFileMode
QueueLA
QueueSortOrder
QueueTimeout
RandFile
RecipientFactor
RefuseLA
ResolverOptions
RetryFactor
RrtImpliesDsn
RunAsUser
SafeFileEnvironment
SaveFromLine
SendMimeErrors
ServerCertFile
ServerKeyFile
ServiceSwitchFile
SevenBitInput
SharedMemoryKey
SingleLineFromHeader
SingleThreadDelivery
SmtpGreetingMessage
StatusFile
SuperSafe
TempFileMode
Timeout
TimeZoneSpec
TLSSrvOptions
TrustedUser
TryNullMXList
UnixFromLine
UnsafeGroupWrites
UseErrorsTo
UseMSP
UserDatabaseSpec
Verbose
XscriptFileBufferSize
M
Chapter 25. The H (Headers) Configuration Command
25.1 Overview
25.2 Header Names
25.3 Header Field Contents
25.4 ?flags? in Header Definitions
25.5 Rules Check Header Contents
25.6 Header Behavior in conf.c
25.7 Headers and mc Configuration
25.8 Headers by Category
25.9 Forwarding with Resent Headers
25.10 Precedence
25.11 Pitfalls
25.12 Alphabetized Header Reference
Apparently-From:
Apparently-To:
Auto-Submitted:
Bcc:
Cc:
Comments:
Content-Description:
Content-Disposition:
Content-Id:
Content-Length:
Content-Transfer-Encoding:
Content-Type:
Date:
Delivered-To:
Disposition-Notification-To:
Encrypted:
Errors-To:
From:
Full-Name:
In-Reply-To:
Keywords:
Mail-From:
Message-ID:
Message:
MIME-Version:
Posted-Date:
Precedence:
Priority:
Received:
References:
Reply-To:
Return-Path:
Return-Receipt-To:
Sender:
Subject:
Text:
To:
Via:
X-Authentication-Warning:
X400-Received:
Part IV: Appendixes
Appendix A. The mc Configuration Macros and Directives
Appendix B. What s New Since V8.8
B.1 Chapter 1
B.2 Chapter 2
B.3 Chapter 3
B.4 Chapter 4
B.5 Chapter 5
B.6 Chapter 6
B.7 Chapter 7
B.8 Chapter 8
B.9 Chapter 9
B.10 Chapter 10
B.11 Chapter 11
B.12 Chapter 12
B.13 Chapter 13
B.14 Chapter 14
B.15 Chapter 15
B.16 Chapter 16
B.17 Chapter 17
B.18 Chapter 18
B.19 Chapter 19
B.20 Chapter 20
B.21 Chapter 21
B.22 Chapter 22
B.23 Chapter 23
B.24 Chapter 24
B.25 Chapter 25
Appendix C. Error Message Reference
C.1 Where Errors Are Printed
C.2 Alphabetized Error Reference
Appendix D. The checkcompat( ) Cookbook
D.1 How checkcompat( ) Works
D.2 Reject Bad Body Lines
D.3 Reject Excess 8-Bit Characters
Appendix E. A Map to Tutorial Information
E.1 How to Use This Guide
E.2 The Guide
Bibliography
Requests for Comments
Publications and Postings
Colophon
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
sendmail, 4th Edition
ISBN: 0596510292
EAN: 2147483647
Year: 2002
Pages: 1174
Authors:
Bryan Costales
,
Claus Assmann
,
George Jansen
,
Gregory Neil Shapiro
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Executing Queries That Use COMPUTE BY
Serializing Data
Binding Complex Data to Web Forms Controls
Debugging a SQL Server Stored Procedure
Enumerating and Maintaining Database Objects
ERP and Data Warehousing in Organizations: Issues and Challenges
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Context Management of ERP Processes in Virtual Communities
Distributed Data Warehouse for Geo-spatial Services
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
Special Edition Using Crystal Reports 10
Understanding the Different Join Types
Introduction
Crystal Analysis Excel Plug-in
Managing Accounts
Understanding the Crystal Enterprise Object Model
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
Captology Looking Forward
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco Firewall Products
Cisco VPN Products
RSH
Deployment Scenarios
Security Contexts
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Querying WMI
The WMI Schema
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies