Books & Videos

Table of Contents

  1. Chapter 1 Getting Started

    1. Introduction

    2. Downloading the Latest Release

    3. Installing sendmail

    4. Compiling sendmail to Use LDAP

    5. Adding the regex Map Type to sendmail

    6. Compiling sendmail with SASL Support

    7. Compiling sendmail with STARTTLS Support

    8. Compiling in STARTTLS File Paths

    9. Building a sendmail Configuration

    10. Testing a New Configuration

    11. Logging sendmail

  2. Chapter 2 Delivery and Forwarding

    1. Introduction

    2. Accepting Mail for Other Hosts

    3. Fixing the Alias0 Missing Map Error and Creating Simple Aliases

    4. Reading Aliases via LDAP

    5. Configuring Red Hat 7.3 to Read Aliases from a NIS Server

    6. Configuring Solaris 8 to Read Aliases from a NIS Server

    7. Forwarding to an External Address

    8. Creating Mailing Lists

    9. Migrating Ex-Users to New Addresses

    10. Delivering Mail to a Program

    11. Using Program Names in Mailing Lists

    12. Allowing Nonlogin Users to Forward to Programs

    13. Fixing a .forward Loop

    14. Enabling the User Database

  3. Chapter 3 Relaying

    1. Introduction

    2. Passing All Mail to a Relay

    3. Passing Outbound Mail to a Relay

    4. Passing Local Mail to a Mail Hub

    5. Passing Apparently Local Mail to a Relay

    6. Passing UUCP Mail to a Relay

    7. Relaying Mail for All Hosts in a Domain

    8. Relaying Mail for Individual Hosts

    9. Configuring Relaying on a Mail Exchanger

    10. Loading Class $=R via LDAP

    11. Relaying Only Outbound Mail

  4. Chapter 4 Masquerading

    1. Introduction

    2. Adding Domains to All Sender Addresses

    3. Masquerading the Sender Hostname

    4. Eliminating Masquerading for the Local Mailer

    5. Forcing Masquerading of Local Mail

    6. Masquerading Recipient Addresses

    7. Masquerading at the Relay Host

    8. Limiting Masquerading

    9. Masquerading All Hosts in a Domain

    10. Masquerading Most of the Hosts in a Domain

    11. Masquerading the Envelope Address

    12. Rewriting the From Address with the genericstable

    13. Rewriting Sender Addresses for an Entire Domain

    14. Masquerading with LDAP

    15. Reading the genericstable via LDAP

  5. Chapter 5 Routing Mail

    1. Introduction

    2. Routing Mail to Special Purpose Mailers

    3. Sending Error Messages from the mailertable

    4. Disabling MX Processing to Avoid Loops

    5. Routing Mail for Local Delivery

    6. Reading the mailertable via LDAP

    7. Routing Mail for Individual Virtual Hosts

    8. Routing Mail for Entire Virtual Domains

    9. Reading the virtusertable via LDAP

    10. Routing Mail with LDAP

    11. Using LDAP Routing with Masquerading

  6. Chapter 6 Controlling Spam

    1. Introduction

    2. Blocking Spam with the access Database

    3. Preventing Local Users from Replying to Spammers

    4. Reading the access Database via LDAP

    5. Using a DNS Blackhole List Service

    6. Building Your Own DNS Blackhole List

    7. Whitelisting Blacklisted Sites

    8. Filtering Local Mail with procmail

    9. Filtering Outbound Mail with procmail

    10. Invoking Special Header Processing

    11. Using Regular Expressions in sendmail

    12. Identifying Local Problem Users

    13. Using MILTER

    14. Bypassing Spam Checks

    15. Enabling Spam Checks on a Per-User Basis

  7. Chapter 7 Authenticating with AUTH

    1. Introduction

    2. Offering AUTH Authentication

    3. Authenticating with AUTH

    4. Storing AUTH Credentials in the authinfo File

    5. Limiting Advertised Authentication Mechanisms

    6. Using AUTH to Permit Relaying

    7. Controlling the AUTH= Parameter

    8. Avoiding Double Encryption

    9. Requiring Authentication

    10. Selectively Requiring Authentication

  8. Chapter 8 Securing the Mail Transport

    1. Introduction

    2. Building a Private Certificate Authority

    3. Creating a Certificate Request

    4. Signing a Certificate Request

    5. Configuring sendmail for STARTTLS

    6. Relaying Based on the CA

    7. Relaying Based on the Certificate Subject

    8. Requiring Outbound Encryption

    9. Requiring Inbound Encryption

    10. Requiring a Verified Certificate

    11. Requiring TLS for a Recipient

    12. Refusing STARTTLS Service

    13. Selectively Advertising STARTTLS

    14. Requesting Client Certificates

  9. Chapter 9 Managing the Queue

    1. Introduction

    2. Creating Multiple Queues

    3. Using qf, df, and xf Subdirectories

    4. Defining Queue Groups

    5. Assigning Recipients to Specific Queues

    6. Using Persistent Queue Runners

    7. Using a Queue Server

    8. Setting Protocol Timers

  10. Chapter 10 Securing sendmail

    1. Introduction

    2. Limiting the Number of sendmail Servers

    3. Limiting the Number of Network Accessible Servers

    4. Updating to Close Security Holes

    5. Patching to Close Security Holes

    6. Disabling Delivery to Programs

    7. Controlling Delivery to Programs

    8. Disabling Delivery to Files

    9. Bypassing User .forward Files

    10. Controlling Delivery to Files

    11. Running sendmail Non-Set-User-ID root

    12. Setting a Safe Default User ID

    13. Defining Trusted Users

    14. Identifying the sendmail Administrator

    15. Limiting the SMTP Command Set

    16. Requiring a Valid HELO

    17. Restricting Command-Line Options

    18. Denying DoS Attacks

  1. Colophon