138032Speter
238032Speter			SENDMAIL RELEASE 8
338032Speter
4261363SgshapiroThis directory has the latest sendmail(TM) software from Proofpoint, Inc.
538032Speter
6157001SgshapiroReport any bugs to sendmail-bugs-YYYY@support.sendmail.org
7157001Sgshapirowhere YYYY is the current year, e.g., 2005.
838032Speter
9157001SgshapiroThere is a web site at http://www.sendmail.org/ -- see that site for
1038032Speterthe latest updates.
1138032Speter
1264562Sgshapiro+--------------+
1364562Sgshapiro| INTRODUCTION |
1464562Sgshapiro+--------------+
1538032Speter
16157001Sgshapiro0. The vast majority of queries about sendmail are answered in the
17157001Sgshapiro   README files noted below.
1864562Sgshapiro
1964562Sgshapiro1. Read this README file, especially this introduction, and the DIRECTORY
2064562Sgshapiro   PERMISSIONS sections.
2164562Sgshapiro
2280785Sgshapiro2. Read the INSTALL file in this directory.
2380785Sgshapiro
2480785Sgshapiro3. Read sendmail/README, especially:
2564562Sgshapiro   a. the introduction
2664562Sgshapiro   b. the BUILDING SENDMAIL section
2764562Sgshapiro   c. the relevant part(s) of the OPERATING SYSTEM AND COMPILE QUIRKS section
2864562Sgshapiro
2964562Sgshapiro   You may also find these useful:
3064562Sgshapiro
3190792Sgshapiro   d. sendmail/SECURITY
3290792Sgshapiro   e. devtools/README
3390792Sgshapiro   f. devtools/Site/README
3490792Sgshapiro   g. libmilter/README
3590792Sgshapiro   h. mail.local/README
3690792Sgshapiro   i. smrsh/README
3764562Sgshapiro
3880785Sgshapiro4. Read cf/README.
3964562Sgshapiro
40261363SgshapiroSendmail is a trademark of Proofpoint, Inc.
41203004SgshapiroUS Patent Numbers 6865671, 6986037.
4238032Speter
4338032Speter+-----------------------+
4438032Speter| DIRECTORY PERMISSIONS |
4538032Speter+-----------------------+
4638032Speter
4738032SpeterSendmail often gets blamed for many problems that are actually the
4838032Speterresult of other problems, such as overly permissive modes on directories.
4938032SpeterFor this reason, sendmail checks the modes on system directories and
5064562Sgshapirofiles to determine if they can be trusted.  For sendmail to run without
5164562Sgshapirocomplaining, you MUST execute the following command:
5238032Speter
5338032Speter	chmod go-w / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
5438032Speter	chown root / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
5538032Speter
5638032SpeterYou will probably have to tweak this for your environment (for example,
5738032Spetersome systems put the spool directory into /usr/spool instead of
5864562Sgshapiro/var/spool).  If you set the RunAsUser option in your sendmail.cf, the
5964562Sgshapiro/var/spool/mqueue directory will have to be owned by the RunAsUser user.
6064562SgshapiroAs a general rule, after you have compiled sendmail, run the command
6138032Speter
6238032Speter	sendmail -v -bi
6338032Speter
6438032Speterto initialize the alias database.  If it gives messages such as
6538032Speter
6638032Speter	WARNING: writable directory /etc
6764562Sgshapiro	WARNING: writable directory /var/spool/mqueue
6838032Speter
6938032Speterthen the directories listed have inappropriate write permissions and
7038032Spetershould be secured to avoid various possible security attacks.
7138032Speter
7238032SpeterBeginning with sendmail 8.9, these checks have become more strict to
7338032Speterprevent users from being able to access files they would normally not
7438032Speterbe able to read.  In particular, .forward and :include: files in unsafe
7538032Speterdirectory paths (directory paths which are group or world writable) will
7638032Speterno longer be allowed.  This would mean that if user joe's home directory
7738032Speterwas writable by group staff, sendmail would not use his .forward file.
7838032SpeterThis behavior can be altered, at the expense of system security, by
7938032Spetersetting the DontBlameSendmail option.  For example, to allow .forward
8038032Speterfiles in group writable directories:
8138032Speter
8238032Speter	O DontBlameSendmail=forwardfileingroupwritabledirpath
8338032Speter
8438032SpeterOr to allow them in both group and world writable directories:
8538032Speter
8638032Speter	O DontBlameSendmail=forwardfileinunsafedirpath
8738032Speter
8838032SpeterItems from these unsafe .forward and :include: files will be marked
8938032Speteras unsafe addresses -- the items can not be deliveries to files or
9038032Speterprograms.  This behavior can also be altered via DontBlameSendmail:
9138032Speter
9238032Speter	O DontBlameSendmail=forwardfileinunsafedirpath,
9338032Speter		forwardfileinunsafedirpathsafe
9438032Speter
9538032SpeterThe first flag allows the .forward file to be read, the second allows
9638032Speterthe items in the file to be marked as safe for file and program
9738032Speterdelivery.
9838032Speter
9938032SpeterOther files affected by this strengthened security include class
10090792Sgshapirofiles (i.e., Fw /etc/mail/local-host-names), persistent host status files,
10164562Sgshapiroand the files specified by the ErrorHeader and HelpFile options.  Similar
10238032SpeterDontBlameSendmail flags are available for the class, ErrorHeader, and
10338032SpeterHelpFile files.
10438032Speter
10538032SpeterIf you have an unsafe configuration of .forward and :include:
10638032Speterfiles, you can make it safe by finding all such files, and doing
10738032Spetera "chmod go-w $FILE" on each.  Also, do a "chmod go-w $DIR" for
10838032Spetereach directory in the file's path.
10938032Speter
11038032Speter
11198121Sgshapiro+--------------------------+
11298121Sgshapiro| FILE AND MAP PERMISSIONS |
11398121Sgshapiro+--------------------------+
11498121Sgshapiro
11598121SgshapiroAny application which uses either flock() or fcntl() style locking or
11698121Sgshapiroother APIs that use one of these locking methods (such as open() with
11798121SgshapiroO_EXLOCK and O_SHLOCK) on files readable by other local untrusted users
11898121Sgshapiromay be susceptible to local denial of service attacks.
11998121Sgshapiro
12098121SgshapiroFile locking is used throughout sendmail for a variety of files
12198121Sgshapiroincluding aliases, maps, statistics, and the pid file.  Any user who
12298121Sgshapirocan open one of these files can prevent sendmail or it's associated
12398121Sgshapiroutilities, e.g., makemap or newaliases, from operating properly.  This
12498121Sgshapirocan also affect sendmail's ability to update status files such as
12598121Sgshapirostatistics files.  For system which use flock() for file locking, a
12698121Sgshapirouser's ability to obtain an exclusive lock prevents other sendmail
12798121Sgshapiroprocesses from reading certain files such as alias or map databases.
12898121Sgshapiro
12998121SgshapiroA workaround for this problem is to protect all sendmail files such
13098121Sgshapirothat they can't be opened by untrusted users.  As long as users can
13198121Sgshapironot open a file, they can not lock it.  Since queue files should
13298121Sgshapiroalready have restricted permissions, the only files that need
13398121Sgshapiroadjustment are alias, map, statistics, and pid files.  These files
13498121Sgshapiroshould be owned by root or the trusted user specified in the
13598121SgshapiroTrustedUser option.  Changing the permissions to be only readable and
13698121Sgshapirowritable by that user is sufficient to avoid the denial of service.
13798121SgshapiroFor example, depending on the paths you use, these commands would be
13898121Sgshapiroused:
13998121Sgshapiro
14098121Sgshapiro	chmod 0640 /etc/mail/aliases /etc/mail/aliases.{db,pag,dir}
14198121Sgshapiro	chmod 0640 /etc/mail/*.{db,pag,dir}
14298121Sgshapiro	chmod 0640 /etc/mail/statistics /var/log/sendmail.st
14398121Sgshapiro	chmod 0600 /var/run/sendmail.pid /etc/mail/sendmail.pid
14498121Sgshapiro
14598121SgshapiroIf the permissions 0640 are used, be sure that only trusted users belong
14698121Sgshapiroto the group assigned to those files.  Otherwise, files should not even
14798121Sgshapirobe group readable.  As of sendmail 8.12.4, the permissions shown above
14898121Sgshapiroare the default permissions for newly created files.
14998121Sgshapiro
15098121SgshapiroNote that the denial of service on the plain text aliases file
15198121Sgshapiro(/etc/mail/aliases) only prevents newaliases from rebuilding the
15298121Sgshapiroaliases file.  The same is true for the database files on systems which
15398121Sgshapirouse fcntl() style locking.  Since it does not interfere with normal
15498121Sgshapirooperations, sites may chose to leave these files readable.  Also, it is
15598121Sgshapironot necessary to protect the text files associated with map databases
15698121Sgshapiroas makemap does not lock those files.
15798121Sgshapiro
15898121Sgshapiro
15938032Speter+-----------------------+
16038032Speter| RELATED DOCUMENTATION |
16138032Speter+-----------------------+
16238032Speter
16338032SpeterThere are other files you should read.  Rooted in this directory are:
16438032Speter
16538032Speter  FAQ
16680785Sgshapiro	The FAQ (frequently answered questions) is no longer maintained
16780785Sgshapiro	with the sendmail release.  It is available at
16880785Sgshapiro	http://www.sendmail.org/faq/ .  The file FAQ is a reminder of
16980785Sgshapiro	this and a pointer to the web page.
17064562Sgshapiro  INSTALL
17164562Sgshapiro	Installation instructions for building and installing sendmail.
17238032Speter  KNOWNBUGS
17364562Sgshapiro	Known bugs in the current release.
17438032Speter  RELEASE_NOTES
17538032Speter	A detailed description of the changes in each version.  This
17638032Speter	is quite long, but informative.
17764562Sgshapiro  sendmail/README
17838032Speter	Details on compiling and installing sendmail.
17938032Speter  cf/README
18038032Speter	Details on configuring sendmail.
18138032Speter  doc/op/op.me
182110560Sgshapiro	The sendmail Installation & Operations Guide.  In addition
183110560Sgshapiro	to the shipped PostScript version, plain text and PDF versions
184110560Sgshapiro	can be generating using (assuming the required conversion software
185110560Sgshapiro	is installed on your system, see doc/op/Makefile):
18638032Speter
187110560Sgshapiro	cd doc/op && make op.txt op.pdf
188110560Sgshapiro
189110560Sgshapiro	Be warned: on some systems calling make in doc/op/ will cause
190110560Sgshapiro	errors due to nroff/groff problems.  Known problems are:
191110560Sgshapiro	- running this off on systems with an old version of -me, you
192110560Sgshapiro	need to add the following macro to the macros:
193110560Sgshapiro
19438032Speter		.de sm
19538032Speter		\s-1\\$1\\s0\\$2
19638032Speter		..
19738032Speter
19838032Speter	This sets a word in a smaller pointsize.
19938032Speter
200110560Sgshapiro	- with new groff versions (1.18 seems affected)
20138032Speter
202110560Sgshapiro	GROFF_NO_SGR=1
203110560Sgshapiro
204110560Sgshapiro	needs to be set, e.g., in doc/op/Makefile:
205110560Sgshapiro
206110560Sgshapiro	ROFF_CMD=	GROFF_NO_SGR=1 groff
207110560Sgshapiro
208110560Sgshapiro
20938032Speter+--------------+
21038032Speter| RELATED RFCS |
21138032Speter+--------------+
21238032Speter
21338032SpeterThere are several related RFCs that you may wish to read -- they are
214285303Sgshapiroavailable from several sites, see
21538032Speter
216285303Sgshapiro	http://www.rfc-editor.org/
21738032Speter	http://www.ietf.org/
21838032Speter
21938032SpeterImportant RFCs for electronic mail are:
22038032Speter
22138032Speter	RFC821	SMTP protocol
22238032Speter	RFC822	Mail header format
22338032Speter	RFC974	MX routing
22438032Speter	RFC976	UUCP mail format
22538032Speter	RFC1123	Host requirements (modifies 821, 822, and 974)
22690792Sgshapiro	RFC1344	Implications of MIME for Internet Mail Gateways
22738032Speter	RFC1413	Identification server
22890792Sgshapiro	RFC1428	Transition of Internet Mail from Just-Send-8 to
22990792Sgshapiro		8-bit SMTP/MIME
23090792Sgshapiro	RFC1652	SMTP Service Extension for 8bit-MIMEtransport
23138032Speter	RFC1869	SMTP Service Extensions (ESMTP spec)
23238032Speter	RFC1870	SMTP Service Extension for Message Size Declaration
23338032Speter	RFC1891	SMTP Service Extension for Delivery Status Notifications
23438032Speter	RFC1892	Multipart/Report Content Type for the Reporting of
23538032Speter		Mail System Administrative Messages
23638032Speter	RFC1893	Enhanced Mail System Status Codes
23738032Speter	RFC1894	An Extensible Message Format for Delivery Status
23838032Speter		Notifications
23938032Speter	RFC1985	SMTP Service Extension for Remote Message Queue Starting
24064562Sgshapiro	RFC2033 Local Mail Transfer Protocol (LMTP)
24164562Sgshapiro	RFC2034 SMTP Service Extension for Returning Enhanced Error Codes
24290792Sgshapiro	RFC2045	Multipurpose Internet Mail Extensions (MIME) Part One:
24390792Sgshapiro		Format of Internet Message Bodies
24464562Sgshapiro	RFC2476 Message Submission
24564562Sgshapiro	RFC2487 SMTP Service Extension for Secure SMTP over TLS
24664562Sgshapiro	RFC2554 SMTP Service Extension for Authentication
24790792Sgshapiro	RFC2821 Simple Mail Transfer Protocol
24890792Sgshapiro	RFC2822 Internet Message Format
24990792Sgshapiro	RFC2852 Deliver By SMTP Service Extension
25090792Sgshapiro	RFC2920 SMTP Service Extension for Command Pipelining
25138032Speter
25238032SpeterOther standards that may be of interest (but which are less directly
25338032Speterrelevant to sendmail) are:
25438032Speter
25538032Speter	RFC987	Mapping between RFC822 and X.400
25638032Speter	RFC1049	Content-Type header field (extension to RFC822)
25738032Speter
25838032SpeterWarning to AIX users: this version of sendmail does not implement
25938032SpeterMB, MR, or MG DNS resource records, as defined (as experiments) in
26038032SpeterRFC1035.
26138032Speter
26238032Speter
26364562Sgshapiro+---------+
26464562Sgshapiro| WARNING |
26564562Sgshapiro+---------+
26664562Sgshapiro
26764562SgshapiroSince sendmail 8.11 and later includes hooks to cryptography, the
26864562Sgshapirofollowing information from OpenSSL applies to sendmail as well.
26964562Sgshapiro
27064562SgshapiroPLEASE REMEMBER THAT EXPORT/IMPORT AND/OR USE OF STRONG CRYPTOGRAPHY
27164562SgshapiroSOFTWARE, PROVIDING CRYPTOGRAPHY HOOKS OR EVEN JUST COMMUNICATING
27264562SgshapiroTECHNICAL DETAILS ABOUT CRYPTOGRAPHY SOFTWARE IS ILLEGAL IN SOME
27364562SgshapiroPARTS OF THE WORLD.  SO, WHEN YOU IMPORT THIS PACKAGE TO YOUR
27464562SgshapiroCOUNTRY, RE-DISTRIBUTE IT FROM THERE OR EVEN JUST EMAIL TECHNICAL
27564562SgshapiroSUGGESTIONS OR EVEN SOURCE PATCHES TO THE AUTHOR OR OTHER PEOPLE
27664562SgshapiroYOU ARE STRONGLY ADVISED TO PAY CLOSE ATTENTION TO ANY EXPORT/IMPORT
27790792SgshapiroAND/OR USE LAWS WHICH APPLY TO YOU.  THE AUTHORS ARE NOT LIABLE FOR
27890792SgshapiroANY VIOLATIONS YOU MAKE HERE.  SO BE CAREFUL, IT IS YOUR RESPONSIBILITY.
27964562Sgshapiro
28064562SgshapiroIf you use OpenSSL then make sure you read their README file which
28164562Sgshapirocontains information about patents etc.
28264562Sgshapiro
28364562Sgshapiro
28438032Speter+-------------------+
28538032Speter| DATABASE ROUTINES |
28638032Speter+-------------------+
28738032Speter
28838032SpeterIF YOU WANT TO RUN THE NEW BERKELEY DB SOFTWARE:  ****  DO NOT  ****
28938032Speteruse the version that was on the Net2 tape -- it has a number of
29038032Speternefarious bugs that were bad enough when I got them; you shouldn't have
29138032Speterto go through the same thing.  Instead, get a new version via the web at
29238032Speterhttp://www.sleepycat.com/.  This software is highly recommended; it gets
29338032Speterrid of several stupid limits, it's much faster, and the interface is
29438032Speternicer to animals and plants.  If the Berkeley DB include files
29538032Speterare installed in a location other than those which your compiler searches,
29638032Speteryou will need to provide that directory when building:
29738032Speter
298182352Sgshapiro	./Build -I/path/to/include/directory
29938032Speter
30038032SpeterIf you are using Berkeley DB versions 1.85 or 1.86, you are *strongly*
30164562Sgshapirourged to upgrade to DB version 2 or later, available from
30264562Sgshapirohttp://www.sleepycat.com/.  Berkeley DB versions 1.85 and 1.86 are known to
30364562Sgshapirobe broken in various nasty ways (see http://www.sleepycat.com/db.185.html),
30464562Sgshapiroand can cause sendmail to dump core.  In addition, the newest versions of
30564562Sgshapirogcc and the Solaris compilers perform optimizations in those versions that
30664562Sgshapiromay cause fairly random core dumps.
30738032Speter
30838032SpeterIf you have no choice but to use Berkeley DB 1.85 or 1.86, and you are
30938032Speterusing both Berkeley DB and files in the UNIX ndbm format, remove ndbm.h
31038032Speterand ndbm.o from the DB library after building it.  You should also apply
31138032Speterall of the patches for DB 1.85 and 1.86 found at the Sleepycat web site
31238032Speter(see http://www.sleepycat.com/db.185.html), as they fix some of the known
31338032Speterproblems.
31438032Speter
31538032SpeterIf you are using a version of Berkeley DB 2 previous to 2.3.15, and you
31638032Speterare using both Berkeley DB and files in the UNIX ndbm format, remove dbm.o
31738032Speterfrom the DB library after building it.  No other changes are necessary.
31838032Speter
31938032SpeterIf you are using Berkeley DB version 2.3.15 or greater, no changes are
32038032Speternecessary.
32138032Speter
32238032SpeterThe underlying database file formats changed between Berkeley DB versions
32364562Sgshapiro1.85 and 1.86, again between DB 1.86 and version 2.0, and finally between
32464562SgshapiroDB 2.X and 3.X.  If you are upgrading from one of those versions, you must
32564562Sgshapirorecreate your database file(s).  Do this by rebuilding all maps with
32664562Sgshapiromakemap and rebuilding the alias file with newaliases.
32738032Speter
32838032Speter
32938032Speter+--------------------+
33038032Speter| HOST NAME SERVICES |
33138032Speter+--------------------+
33238032Speter
33338032SpeterIf you are using NIS or /etc/hosts, it is critical that you
33438032Speterlist the long (fully qualified) name somewhere (preferably first) in
33538032Speterthe /etc/hosts file used to build the NIS database.  For example, the
33638032Speterline should read
33738032Speter
33838032Speter	128.32.149.68   mastodon.CS.Berkeley.EDU mastodon
33938032Speter
34038032Speter**** NOT ****
34138032Speter
34238032Speter	128.32.149.68   mastodon
34338032Speter
34438032SpeterIf you do not include the long name, sendmail will complain loudly
34538032Speterabout ``unable to qualify my own domain name (mastodon) -- using
34638032Spetershort name'' and conclude that your canonical name is the short
34738032Speterversion and use that in messages.  The name "mastodon" doesn't mean
34838032Spetermuch outside of Berkeley, and so this creates incorrect and unreplyable
34938032Spetermessages.
35038032Speter
35138032Speter
35238032Speter+-------------+
35338032Speter| USE WITH MH |
35438032Speter+-------------+
35538032Speter
35638032SpeterThis version of sendmail notices and reports certain kinds of SMTP
35738032Speterprotocol violations that were ignored by older versions.  If you
35838032Speterare running MH you may wish to install the patch in contrib/mh.patch
35938032Speterthat will prevent these warning reports.  This patch also works
36038032Speterwith the old version of sendmail, so it's safe to go ahead and
36138032Speterinstall it.
36238032Speter
36338032Speter
36438032Speter+----------------+
36538032Speter| USE WITH IDENT |
36638032Speter+----------------+
36738032Speter
36838032SpeterSendmail 8 supports the IDENT protocol, as defined by RFC 1413.
36964562SgshapiroNote that the RFC states a client should wait at least 30 seconds
37064562Sgshapirofor a response.  As of 8.10.0, the default Timeout.ident is 5 seconds
37164562Sgshapiroas many sites have adopted the practice of dropping IDENT queries.
37264562SgshapiroThis has lead to delays processing mail.
37338032Speter
37464562SgshapiroNo ident server is included with this distribution.  It is available
37564562Sgshapirofrom:
37638032Speter
37764562Sgshapiro  ftp://ftp.lysator.liu.se/pub/ident/servers/
37864562Sgshapiro  http://sf.www.lysator.liu.se/~pen/pidentd/
37938032Speter
38043730Speter+-------------------------+
38143730Speter| INTEROPERATION PROBLEMS |
38243730Speter+-------------------------+
38343730Speter
38443730SpeterMicrosoft Exchange Server 5.0
38543730Speter	We have had a report that ``about 7% of messages from Sendmail
38643730Speter	to Exchange were not being delivered with status messages of
38743730Speter	"connection reset" and "I/O error".''  Upgrading Exchange from
38843730Speter	Version 5.0 to Version 5.5 Service Pack 2 solved this problem.
38943730Speter
39064562SgshapiroCommuniGate Pro
39164562Sgshapiro	CommuniGate Pro 3.2.4 does not accept the AUTH= -parameter on
39264562Sgshapiro	the MAIL FROM command if the client is not authenticated.  Use
39343730Speter
39464562Sgshapiro		define(`confAUTH_OPTIONS', `A')
39564562Sgshapiro
39664562Sgshapiro	in .mc file if you have compiled sendmail with Cyrus SASL
39764562Sgshapiro	and you communicate with CommuniGate Pro servers.
39864562Sgshapiro
39938032Speter+---------------------+
40038032Speter| DIRECTORY STRUCTURE |
40138032Speter+---------------------+
40238032Speter
40338032SpeterThe structure of this directory tree is:
40438032Speter
40538032Spetercf		Source for sendmail configuration files.  These are
40638032Speter		different than what you've seen before.  They are a
40738032Speter		fairly dramatic rewrite, requiring the new sendmail
40838032Speter		(since they use new features).
40938032Spetercontrib		Some contributed tools to help with sendmail.  THESE
41038032Speter		ARE NOT SUPPORTED by sendmail -- contact the original
41138032Speter		authors if you have problems.  (This directory is not
41238032Speter		on the 4.4BSD tape.)
41364562Sgshapirodevtools	Build environment.  See devtools/README.
41438032Speterdoc		Documentation.  If you are getting source, read
41538032Speter		op.me -- it's long, but worth it.
41690792Sgshapiroeditmap		A program to edit and query maps that have been created
41790792Sgshapiro		with makemap, e.g., adding and deleting entries.
41864562Sgshapiroinclude		Include files used by multiple programs in the distribution.
41964562Sgshapirolibsmdb		sendmail database library with support for Berkeley DB 1.X,
42064562Sgshapiro		Berkeley DB 2.X, Berkeley DB 3.X, and NDBM.
42164562Sgshapirolibsmutil	sendmail utility library with functions used by different
42264562Sgshapiro		programs.
42338032Spetermail.local	The source for the local delivery agent used for 4.4BSD.
42438032Speter		THIS IS NOT PART OF SENDMAIL! and may not compile
42538032Speter		everywhere, since it depends on some 4.4-isms.  Warning:
42638032Speter		it does mailbox locking differently than other systems.
42764562Sgshapiromailstats	Statistics printing program.
42838032Spetermakemap		A program that creates the keyed maps used by the $( ... $)
42938032Speter		construct in sendmail.  It is primitive but effective.
43038032Speter		It takes a very simple input format, so you will probably
43138032Speter		expect to preprocess must human-convenient formats
43238032Speter		using sed scripts before this program will like them.
43338032Speter		But it should be functionally complete.
43438032Speterpraliases	A program to print the DBM or NEWDB version of the
43538032Speter		aliases file.
43638032Speterrmail		Source for rmail(8).  This is used as a delivery
43738032Speter		agent for for UUCP, and could presumably be used by
43838032Speter		other non-socket oriented mailers.  Older versions of
43938032Speter		rmail are probably deficient.  RMAIL IS NOT PART OF
44038032Speter		SENDMAIL!!!  The 4.4BSD source is included for you to
44164562Sgshapiro		look at or try to port to your system.  There is no
44264562Sgshapiro		guarantee it will even compile on your operating system.
44338032Spetersmrsh		The "sendmail restricted shell", which can be used as
44438032Speter		a replacement for /bin/sh in the prog mailer to provide
44538032Speter		increased security control.  NOT PART OF SENDMAIL!
44664562Sgshapirosendmail	Source for the sendmail program itself.
44738032Spetertest		Some test scripts (currently only for compilation aids).
44864562Sgshapirovacation	Source for the vacation program.  NOT PART OF SENDMAIL!
44964562Sgshapiro
450266692Sgshapiro$Revision: 8.96 $, Last updated $Date: 2013-11-22 20:51:01 $
451