search for books and compare prices
Tables of Contents for Sendmail
Chapter/Section Title
Page #
Page Count
Preface
xv
 
I: A Tutorial
1
190
1: Introduction
3
10
1.1 MUA Versus MTA
4
1
1.2 Why Is sendmail So Complex?
4
1
1.3 Three Important Parts
5
1
1.4 Run sendmail by Hand
6
2
1.5 The Header
8
1
1.6 The Body
8
1
1.7 The Envelope
9
1
1.8 Things to Try
10
3
2: Have a V8
13
10
2.1 Get the Source
13
1
2.2 Read the Documents
14
2
2.3 What's What in src
15
1
2.4 Preliminaries
16
3
2.5 Build
19
1
2.6 Test It
20
1
2.7 Things to Try
21
2
3: The Roles of sendmail
23
10
3.1 Role in the Filesystem
23
4
3.2 Role in Local Delivery
27
2
3.3 Role in Networks Transport
29
1
3.4 Role as a Daemon
30
1
3.5 Things to Try
31
2
4: How to Run sendmail
33
14
4.1 Become a Mode (-b)
34
5
4.2 Verbose (-v)
39
4
4.3 Debugging (-d)
43
1
4.4 Things to Try
44
3
5: The sendmail cf File
47
10
5.1 Overview
47
2
5.2 The Minimal File
49
1
5.3 A Quick Tour
50
5
5.4 Things to Try
55
2
6: The Mail Hub and Delivery Agents
57
12
6.1 The client. cf File
59
1
6.2 Define a Mail Delivery Agent
59
2
6.3 The local Delivery Agent
61
5
6.4 Add the Missing Parts to Mhub
66
1
6.5 Things to Try
67
2
7: Macros
69
8
7.1 Overview
69
2
7.2 Defining Macros
71
1
7.3 Predefined Macros
72
3
7.4 Things to Try
75
2
8: Addresses and Rules
77
18
8.1 A Fictional Network
77
4
8.2 Why Rules?
81
2
8.3 Rule Sets
83
2
8.4 Rules
85
1
8.5 The Workspace
86
1
8.6 The Flow of Addresses Through Rules
87
2
8.7 Wildcard Operators
89
5
8.8 Things to Try
94
1
9: Rules Set O
95
8
9.1 Introducing Rule Set O
96
1
9.2 The RHS Triple
96
3
9.3 Testing Rule Set O
99
1
9.4 The error Delivery Agent
100
1
9.5 Things to Try
101
2
10: Rule Set 3
103
12
10.1 Why Preprocess?
104
1
10.2 Rule Set 3
105
3
10.3 Missing Addresses
108
1
10.4 Nested Angle Brackets
109
2
10.5 Details of Rule Flow
111
2
10.6 Things to Try
113
2
11: Rule Sets 1 and S=
115
12
11.1 Flow of the Sender's Address
115
1
11.2 Rule Set S=
116
1
11.3 All Mail from the Hub
117
1
Rule Set Hubset
117
3
11.5 Testing So Far
120
1
11.6 Handling user@thishost
121
2
11.7 Rule Set 1
123
1
11.8 Things to Try
124
3
12: Class
127
12
12.1 The Class Command
128
7
12.2 The File Form of Class
135
3
12.3 Things to Try
138
1
13: Setting Options
139
10
13.1 Options: An Overview
139
1
13.2 Required Options
140
6
13.3 Testing the Options
146
1
13.4 Sending Mail
147
1
13.5 Things to Try
148
1
14: Headers, Precedence, and Trust
149
12
14.1 Headers
149
4
14.2 Headers Versus Delivery Agent Flags
153
2
14.3 Headers Learned So Far
155
1
14.4 Precedence
156
1
14.5 Sending Real Mail
157
1
14.6 Trusted User
158
1
14.7 Things to Try
159
2
15: Install and Test the client.cf File
161
12
15.1 Test the Configuration File
161
2
15.2 The Real Queue Directory
163
1
15.3 MX Records
164
2
15.4 Hub Accepts Mail for Client
166
3
15.5 Prevent the Daemon from Running
169
1
15.6 Install the client.cf File
170
1
15.7 Things to Try
171
2
16: The null.mc File and m4
173
6
16.1 The cf/cf Directory
173
1
16.2 The null.mc File
174
1
16.3 Run m4
175
1
16.4 Test the Result
176
1
16.5 Qualify All Addresses?
177
1
16.6 Things to Try
178
1
17: The Hub's Complex Rules
179
12
17.1 Rule Set 3
180
5
17.2 Rule Set 96
185
2
17.3 Rule Set O
187
1
17.4 Rule Set 4
188
1
17.5 Things to Try
189
2
II: Build and Install
191
112
18: Compile and Install sendmail
193
48
18.1 To Use or Not to Use
193
1
18.2 Vendor Versus Compiling
194
1
18.3 Obtain the Source
195
3
18.4 Turning Makefile
198
5
18.5 Run Make
203
1
18.6 Install sendmail
204
1
18.7 Pitfalls
205
1
18.8 Alphabetized Reference
206
35
19: V8 m4 Configuration
241
44
19.1 The m4 Preprocessor
241
3
19.2 Build with m4
244
2
19.3 The Minimal mc File
246
5
19.4 m4 Macros by Function
251
5
19.5 Pitfalls
256
1
19.6 Alphabetized m4 Macros
256
29
20: The checkcompat() Cookbook
285
18
20.1 How Checkcompat() Works
286
2
20.2 The Cookbook
288
9
20.3 Alphabetized V8.8 Subroutines
297
6
III: Administration
303
154
21: DNS and Sendmail
305
22
21.1 Overview
305
4
21.2 How sendmail Uses DNS
309
5
21.3 Set Up MX Records
314
6
21.4 How to Use nslookup
320
2
Prepare for Disaster
322
4
21.6 Pitfalls
326
1
22: Security
327
30
22.1 Why root ?
327
2
22.2 The Environment
329
1
22.3 SMTP Probes
330
3
22.4 The Configuration File
333
5
22.5 Permissions
338
5
22.6 The Aliases File
343
1
22.7 Forged Mail
344
3
22.8 Security Features
347
8
22.9 Pitfalls
355
2
23: The Queue
357
36
23.1 Overview of the Queue
358
1
23.2 Parts of a Queued Message
359
5
23.3 A Bogus of File (V8 only) Qf
364
2
23.4 Printing the Queue
366
3
23.5 How the Queue Is Processed
369
2
23.6 Cause the Queue to Be Processed
371
5
23.7 Process Alternate Queue
376
2
23.8 Pitfalls
378
1
23.9 The qf File Internals
379
14
24: Aliases
393
22
24.1 The aliases (5) File
393
4
24.2 Forms of Alias Delivery
397
5
24.3 Write a Delivery Agent Script
402
2
24.4 Special Aliases
404
4
24.5 The Aliases Database
408
3
24.6 Prevent Aliasing with -n
411
2
24.7 Pitfalls
413
2
25: Mailing Lists and - / .forward
415
20
25.1 Internal Mailing Lists
415
1
25.2 :include: Mailing Lists
416
4
25.3 Defining a Mailing List Owner
420
1
25.4 Exploder Mailing Lists
421
1
25.5 Problems with Mailing Lists
422
3
25.6 Packages That Help
425
1
25.7 The User's - / .forward File
426
6
25.8 Pitfalls
432
3
26: Logging and Statistics
435
22
26.1 Logging with syslog
435
11
26.2 Statistic
446
3
26.3 Signaling the Daemon
449
4
26.4 Log Transactions with -X
453
1
26.5 Pitfalls
454
3
IV: Reference
457
516
27: The Configuration File
459
6
27.1 Overall Syntax
460
1
27.2 Comments
461
1
27.3 V8 Comments
461
1
27.4 Continuation Lines
462
1
27.5 The V Configuration Command
462
2
27.6 Pitfalls
464
1
28: Rules
465
22
28.1 Overview
465
4
28.2 Tokenizing Rules
469
3
28.3 The Workspace
472
1
28.4 The Behavior of a Rule
472
1
28.5 The LHS
473
2
28.6 The RHS
475
11
28.7 Pitfalls
486
1
29: Rule Sets
487
28
29.1 The S Configuration Command
487
5
29.2 Rule Sets and m4
492
2
29.3 The Sequence of Rule Sets
494
2
29.4 Rule Set 3
496
4
29.5 Rule Set 4
500
1
29.6 Rule Set 0
501
4
29.7 Rule Set 5
505
1
29.8 Rule Set 2
506
1
29.9 Rule Set 1
507
1
29.10 The check_... Rule Sets
507
6
29.11 Pitfalls
513
2
30: Delivery Agents
515
54
30.1 Configuration File Syntax
515
1
30.2 The Symbolic Name
516
1
30.3 m4 Configuration Syntax
517
2
30.4 The Equates
519
19
30.5 Internally Defined Names
538
4
30.6 How Executed
542
2
30.7 Pitfalls
544
1
30.8 Alphabetized F= Flags
545
24
31: Defined Macros
569
40
31.1 Preassigned Macros
570
1
31.2 Command-Line Definitions
570
2
31.3 Configuration File Definitions
572
2
31.4 Macro Names
574
2
31.5 Macro Expansion: $ and $&
576
4
31.6 Macro Conditionals: $?, $I, and $.
580
1
31.7 Categories of Macros
581
1
31.8 Macros with the m4 Technique
582
1
31.9 Pitfalls
583
1
31.10 Alphabetized Reference
584
25
32: Class Macros
609
16
32.1 Class Configuration Commands
609
4
32.2 Access Class in Rules
613
4
32.3 Class with m4
617
1
32.4 Pitfalls
618
1
32.5 Alphabetized Reference
619
6
33: Database Macros
625
38
33.1 Enable at Compile Times
626
1
33.2 Create Files with makemap
627
3
33.3 The K Configuration Command
630
8
33.4 Use Maps with $(and $) in Rules
638
4
33.5 The User Database
642
3
33.6 Database Maps and m4
645
1
33.7 Pitfalls
646
1
33.8 Alphabetized Reference
647
16
34: Options
663
110
34.1 Command-Line Options
664
3
34.2 Configuration-File Options
667
1
34.3 Configuration with V8 m4 Options
668
3
Alphabetical Table of All Options
671
2
34.5 Options Argument Types
673
3
34.6 Interrelating Options
676
3
34.7 Pitfalls
679
1
34.8 Alphabetized Reference
680
93
35: Headers
773
38
35.1 The H Configuration Command
773
2
35.2 Header Names
775
1
35.5 Header Field Contents
776
4
35.4 ?flags? in Header Definitions
780
1
35.5 Header Behavior in conf.c
781
3
35.6 Headers by Category
784
4
35.7 Forwarding with Resent-Headers
788
2
35.8 Precedence
790
1
35.9 Pitfalls
791
1
35.10 Alphabetized Reference
792
19
36: The Command Line
811
34
36.1 Alternative argv[O] Names
811
4
36.2 Command-Line Switches
815
2
36.3 List of Recipient Addresses
817
1
36.4 Processing the Command Line
817
2
36.5 sendmail's exit() Status
819
8
36.6 Pitfalls
827
1
36.7 Alphabetized Reference
828
17
37: Debugging with -d
845
104
37.1 The Syntax of -d
845
2
37.2 Debugging Behavior
847
1
37.3 Interpreting the Output
847
3
37.4 Pitfalls
850
1
37.5 Reference in Numerical Order
850
99
38: Rule-Set Testing with -bt
949
24
38.1 Overview
949
2
38.2 Configuration Lines
951
2
38.3 Dump a Macro
953
2
38.4 Show and Item
955
2
38.5 Complex Actions Made Simple
957
9
38.6 Process-Specified Address
966
4
38.7 Add Debugging for Detail
970
1
38.8 Batch Rule-Set Testing
971
1
38.9 Pitfalls
972
1
V: Appendixes
973
2
A: The client of File
975
2
B: Host Status File Internals
977
4
C: The Berkeley DB Database
981
4
D: Sun Enhancements
985
6
Bibliography
991
6
Index
997