Sendmail Cookbook

( 2 )

Overview

More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators—and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently—only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology.Fortunately, there's help. The sendmail Cookbook provides step-by-step solutions for the administrator ...

See more details below
Paperback (First Edition)
$32.27
BN.com price
(Save 28%)$44.95 List Price
Other sellers (Paperback)
  • All (26) from $1.99   
  • New (9) from $13.06   
  • Used (17) from $1.99   
sendmail Cookbook

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators—and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently—only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology.Fortunately, there's help. The sendmail Cookbook provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution—just go directly to the recipe that addresses your specific problem.Each recipe in the sendmail Cookbook outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances.The sendmail Cookbook begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as:

  • Delivering and forwarding mail
  • Relaying
  • Masquerading
  • Routing mail
  • Controlling spam
  • Strong authentication
  • Securing the mail transport
  • Managing the queue
  • Securing sendmail
sendmail Cookbook is more than just a new approach to discussing sendmail configuration. The book also provides lots of new material that doesn't get much coverage elsewhere—STARTTLS and AUTH are given entire chapters, and LDAP is covered in recipes throughout the book. But most of all, this book is about saving time—something that most system administrators have in short supply. Pick up the sendmail Cookbook and say good-bye to sendmail dread.
Read More Show Less

Product Details

  • ISBN-13: 9780596004712
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 12/28/2003
  • Edition description: First Edition
  • Edition number: 1
  • Pages: 408
  • Sales rank: 982,265
  • Product dimensions: 6.94 (w) x 9.32 (h) x 1.00 (d)

Meet the Author

Craig Hunt has worked with computer systems for the last twenty years, including a stint with the federal government as both a programmer and systems programmer. He joined Honeywell to work on the WWMCCS network in the days before TCP/IP, back when the network used NCP. After Honeywell, Craig went to work for the National Institute of Standards and Technology. He's still there today and is currently the leader of the Network Engineering Group. Craig is the author of TCP/IP Network Administration and other O'Reilly books.

Read More Show Less

Table of Contents

Dedication;
Preface;
Introduction;
Using This Cookbook;
Audience;
Organization;
Software Versions;
Conventions;
We'd Like to Hear from You;
Acknowledgments;
Chapter 1: Getting Started;
1.1 Introduction;
1.1 Downloading the Latest Release;
1.2 Installing sendmail;
1.3 Compiling sendmail to Use LDAP;
1.4 Adding the regex Map Type to sendmail;
1.5 Compiling sendmail with SASL Support;
1.6 Compiling sendmail with STARTTLS Support;
1.7 Compiling in STARTTLS File Paths;
1.8 Building a sendmail Configuration;
1.9 Testing a New Configuration;
1.10 Logging sendmail;
Chapter 2: Delivery and Forwarding;
2.1 Introduction;
2.1 Accepting Mail for Other Hosts;
2.2 Fixing the Alias0 Missing Map Error and Creating Simple Aliases;
2.3 Reading Aliases via LDAP;
2.4 Configuring Red Hat 7.3 to Read Aliases from a NIS Server;
2.5 Configuring Solaris 8 to Read Aliases from a NIS Server;
2.6 Forwarding to an External Address;
2.7 Creating Mailing Lists;
2.8 Migrating Ex-Users to New Addresses;
2.9 Delivering Mail to a Program;
2.10 Using Program Names in Mailing Lists;
2.11 Allowing Nonlogin Users to Forward to Programs;
2.12 Fixing a .forward Loop;
2.13 Enabling the User Database;
Chapter 3: Relaying;
3.1 Introduction;
3.1 Passing All Mail to a Relay;
3.2 Passing Outbound Mail to a Relay;
3.3 Passing Local Mail to a Mail Hub;
3.4 Passing Apparently Local Mail to a Relay;
3.5 Passing UUCP Mail to a Relay;
3.6 Relaying Mail for All Hosts in a Domain;
3.7 Relaying Mail for Individual Hosts;
3.8 Configuring Relaying on a Mail Exchanger;
3.9 Loading Class $=R via LDAP;
3.10 Relaying Only Outbound Mail;
Chapter 4: Masquerading;
4.1 Introduction;
4.1 Adding Domains to All Sender Addresses;
4.2 Masquerading the Sender Hostname;
4.3 Eliminating Masquerading for the Local Mailer;
4.4 Forcing Masquerading of Local Mail;
4.5 Masquerading Recipient Addresses;
4.6 Masquerading at the Relay Host;
4.7 Limiting Masquerading;
4.8 Masquerading All Hosts in a Domain;
4.9 Masquerading Most of the Hosts in a Domain;
4.10 Masquerading the Envelope Address;
4.11 Rewriting the From Address with the genericstable;
4.12 Rewriting Sender Addresses for an Entire Domain;
4.13 Masquerading with LDAP;
4.14 Reading the genericstable via LDAP;
Chapter 5: Routing Mail;
5.1 Introduction;
5.1 Routing Mail to Special Purpose Mailers;
5.2 Sending Error Messages from the mailertable;
5.3 Disabling MX Processing to Avoid Loops;
5.4 Routing Mail for Local Delivery;
5.5 Reading the mailertable via LDAP;
5.6 Routing Mail for Individual Virtual Hosts;
5.7 Routing Mail for Entire Virtual Domains;
5.8 Reading the virtusertable via LDAP;
5.9 Routing Mail with LDAP;
5.10 Using LDAP Routing with Masquerading;
Chapter 6: Controlling Spam;
6.1 Introduction;
6.1 Blocking Spam with the access Database;
6.2 Preventing Local Users from Replying to Spammers;
6.3 Reading the access Database via LDAP;
6.4 Using a DNS Blackhole List Service;
6.5 Building Your Own DNS Blackhole List;
6.6 Whitelisting Blacklisted Sites;
6.7 Filtering Local Mail with procmail;
6.8 Filtering Outbound Mail with procmail;
6.9 Invoking Special Header Processing;
6.10 Using Regular Expressions in sendmail;
6.11 Identifying Local Problem Users;
6.12 Using MILTER;
6.13 Bypassing Spam Checks;
6.14 Enabling Spam Checks on a Per-User Basis;
Chapter 7: Authenticating with AUTH;
7.1 Introduction;
7.1 Offering AUTH Authentication;
7.2 Authenticating with AUTH;
7.3 Storing AUTH Credentials in the authinfo File;
7.4 Limiting Advertised Authentication Mechanisms;
7.5 Using AUTH to Permit Relaying;
7.6 Controlling the AUTH= Parameter;
7.7 Avoiding Double Encryption;
7.8 Requiring Authentication;
7.9 Selectively Requiring Authentication;
Chapter 8: Securing the Mail Transport;
8.1 Introduction;
8.1 Building a Private Certificate Authority;
8.2 Creating a Certificate Request;
8.3 Signing a Certificate Request;
8.4 Configuring sendmail for STARTTLS;
8.5 Relaying Based on the CA;
8.6 Relaying Based on the Certificate Subject;
8.7 Requiring Outbound Encryption;
8.8 Requiring Inbound Encryption;
8.9 Requiring a Verified Certificate;
8.10 Requiring TLS for a Recipient;
8.11 Refusing STARTTLS Service;
8.12 Selectively Advertising STARTTLS;
8.13 Requesting Client Certificates;
Chapter 9: Managing the Queue;
9.1 Introduction;
9.1 Creating Multiple Queues;
9.2 Using qf, df, and xf Subdirectories;
9.3 Defining Queue Groups;
9.4 Assigning Recipients to Specific Queues;
9.5 Using Persistent Queue Runners;
9.6 Using a Queue Server;
9.7 Setting Protocol Timers;
Chapter 10: Securing sendmail;
10.1 Introduction;
10.1 Limiting the Number of sendmail Servers;
10.2 Limiting the Number of Network Accessible Servers;
10.3 Updating to Close Security Holes;
10.4 Patching to Close Security Holes;
10.5 Disabling Delivery to Programs;
10.6 Controlling Delivery to Programs;
10.7 Disabling Delivery to Files;
10.8 Bypassing User .forward Files;
10.9 Controlling Delivery to Files;
10.10 Running sendmail Non-Set-User-ID root;
10.11 Setting a Safe Default User ID;
10.12 Defining Trusted Users;
10.13 Identifying the sendmail Administrator;
10.14 Limiting the SMTP Command Set;
10.15 Requiring a Valid HELO;
10.16 Restricting Command-Line Options;
10.17 Denying DoS Attacks;
Colophon;

Read More Show Less

Customer Reviews

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted August 26, 2004

    Easy to read, concise, a must have for anyone working with sendmail!

    Working with sendmail can be very challenging at times; while the documentation for it is very complete, finding real-life use-cases can be tough and messing up a configuration is very easy. Fortunately the sendmail authors and community adopted the m4 language to help make building and managing sendmail configurations less painful (I remember having bad dreams about sendmail configuration language when I started learning it). Even with m4, understanding what goes where when and why in a sendmail configuration file can be a real challenge. O'Reilly helped we mere mortals out tremendously with the publication of 'Sendmail: The Definitive Guide,' a book that helped demystify and clarify many of sendmail's inner-workings and configuration options. Even with this book, it was still hard to answer real-life use case questions, like how to enable SMTP AUTH for sendmail, how do I use LDAP with sendmail, how do I use sendmail to accept email for multiple domains in a virtual hosting environment, how do I use blackhole list services? Enter 'Sendmail Cookbook.' This clear, easy to read, well-indexed book contains a wealth of useful recipies that make previously difficult to figure out tasks quite easy. The book is organized in typical Cookbook fashion; each chapter or section stands on it's own, and if it does require knowledge of other sendmail configuration topics, the section includes cross-references to other relevant recipies and references to appropriate sections in the 'Sendmail: The Definitive Guide' book, which is a nice additional feature. This cookbook starts with recipies that step the reader through building and installing sendmail, with sections on configuring the build so that sendmail compiles with SSL/STARTTLS support, LDAP support, and SASL support. Chapters that follow deal with everything from enabling and configuring SMTP AUTH, to securing sendmail itself, to controlling spam. Recipies use m4 whenever possible and only dip into the sendmail configuration language when necessary, another feature I found very impressive. I own quite a few O'Reilly books; this is one of a small number that I enjoy just picking up and flipping to a random page and reading; I always find something that I either didn't know or had forgotten. I wish I had this book seven years ago when I was struggling to learn the basics of sendmail configuration and administration; I might have more hair left if I had! I highly recommend this book to anyone who works with sendmail, be that daily administration or occassional troubleshooting.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 30, 2003

    A Much Easier Way to Handle Sendmail

    The first killer application of the Internet was email. For over twenty years, the most common program used to handle this was sendmail, written by Eric Allman. Over this time, sendmail has become a fully fledged language, with a very inelegant syntax. To learn how this, you need the book 'Sendmail' by Costales and Allman. The basic problem is that twenty years of ever increasing complexity in mail handling has created concomitant complexity in sendmail. For system adminstrators, the sendmail configuration files are probably the most complicated things they have to understand and maintain. The rub is that most sysadmins have many duties, and little time to thoroughly read the above book. What is needed is a crib sheet, that lets you quickly solve very common sendmail configuration issues. Wherein the need for this book. Hunt takes a pragmatic approach. He tells you enough to handle these common issues. Sometimes, this comes at a slight cost. For example, he never really fully explains the the sendmail class notation. For a rigorous explanation, you still need Allman's book. But as a practical matter, you probably not that curious about the notation anyway. Hunt's approach may solve your problems quicker! An interesting aspect of this Cookbook is that it shows the recent evolution of sendmail, as seen in the subtitle at the top of the cover, 'Spam-Fighting'. Sysadmins who dealt with sendmail from 5 years ago or earlier will recall nothing pertaining to antispam techniques. But just as email was the first killer application, the second killer application was the browser, starting in 1992-3. The third killer application was spam, often viewed via the second application. In the last 5 years, spam has grown amazingly. So much so that it has been debated on the floors of the US Parliament! It has gotten to the point that some alarmists are even claiming that this third killer app might be crippling the first app! Well, this Cookbook has several sections, including an entire chapter, focussed on various antispam techniques, like procmail parsing, or hooking up to Real Time Block Lists like spamhaus.org. The efficacy of such methods may vary widely, but you do get a choice. Though none of these currently appear to offer a truly effective countermeasure. You are still getting tons of spam, aren't you? Perhaps some genius in the not too distant future can help us!

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)