1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-21 11:13:30 +00:00
freebsd/etc/mail/README
Gregory Neil Shapiro b9888709dd Add a warning regarding localhost-only listening daemons inside jails.
Apparently binding only to 127.0.0.1 inside of a jail actually binds
to the jail IP address as well (in effect, bind to all available
interfaces in the jail).

Submitted by:	Helge Oldach <test-smtp@oldach.net>
MFC after:	1 day
		pending RE approval
2002-05-22 16:37:32 +00:00

59 lines
2.8 KiB
Plaintext

# $FreeBSD$
Sendmail Processes
As of sendmail 8.12, in order to improve security, the sendmail binary no
longer needs to be set-user-ID root. Instead, a set-group-ID binary
accepts command line mail and relays it to a full mail transfer agent via
SMTP. A group writable client mail queue (/var/spool/clientmqueue/ by
default) holds the mail if an MTA can not be contacted.
To accomplish this, under the default setup, an MTA must be listening on
localhost port 25. If the rc.conf sendmail_enable option is set to "NO",
a sendmail daemon will still be started and bound only to the localhost
interface in order to accept command line submitted mail (note that this
does not work inside jail(2) systems as jails do not allow binding to
just the localhost interface). If this is not a desirable solution, it
can be disabled using the sendmail_submit_enable rc.conf option. However,
if both sendmail_enable and sendmail_submit_enable are set to "NO", you
must do one of two things for command line submitted mail:
1. Designate an alternative host for the submission agent to contact
by altering /etc/mail/freebsd.submit.mc (or setting SENDMAIL_SUBMIT_MC
in /etc/make.conf to an alternate .mc file) and using
'make install-submit-cf' in /etc/mail/. Change the FEATURE(msp) line
to FEATURE(msp, hostname) where hostname is the fully qualified hostname
of the alternative host.
Or:
2. Return to using a set-user-ID root sendmail binary by changing the
ownership and permissions on the sendmail binary and removing the
/etc/mail/submit.cf file:
chown root /usr/libexec/sendmail/sendmail
chmod 4755 /usr/libexec/sendmail/sendmail
rm /etc/mail/submit.cf
If you install from source, set the SENDMAIL_SET_USER_ID flag in
/etc/make.conf.
Also, as of 8.12, a new queue-running daemon is started to make sure mail
doesn't remain in the client mail queue. By default, it simply runs the
client mail queue every 30 minutes. Its behavior can be adjusted by setting
the sendmail_msp_queue_enable and sendmail_msp_queue_flags rc.conf options.
Filtering out SPAM from your site
Sendmail now includes excellent tools to block spam. These tools are
available as FEATUREs that you can add to your site's .mc file. Proper use
of these FEATUREs will prevent spammer from using your site as a relay as
well as significantly decrease the amount of spam that arrives at your
site. No set of anti-spam tools will block all spam without blocking some
portion of legitimate mail as well. Therefore, these FEATUREs are designed
to prevent as much spam as possible without blocking legitimate mail.
These tools are discussed in /usr/share/sendmail/cf/README. Read the
section entitled "ANTI-SPAM CONFIGURATION CONTROL". Example usage and
additional tools can be found in /usr/share/sendmail/cf/cf/knecht.mc.