138032Speter 238032Speter SENDMAIL RELEASE 8 338032Speter 4261363SgshapiroThis directory has the latest sendmail(TM) software from Proofpoint, Inc. 538032Speter 6157001SgshapiroReport any bugs to sendmail-bugs-YYYY@support.sendmail.org 7157001Sgshapirowhere YYYY is the current year, e.g., 2005. 838032Speter 9157001SgshapiroThere is a web site at http://www.sendmail.org/ -- see that site for 1038032Speterthe latest updates. 1138032Speter 1264562Sgshapiro+--------------+ 1364562Sgshapiro| INTRODUCTION | 1464562Sgshapiro+--------------+ 1538032Speter 16157001Sgshapiro0. The vast majority of queries about sendmail are answered in the 17157001Sgshapiro README files noted below. 1864562Sgshapiro 1964562Sgshapiro1. Read this README file, especially this introduction, and the DIRECTORY 2064562Sgshapiro PERMISSIONS sections. 2164562Sgshapiro 2280785Sgshapiro2. Read the INSTALL file in this directory. 2380785Sgshapiro 2480785Sgshapiro3. Read sendmail/README, especially: 2564562Sgshapiro a. the introduction 2664562Sgshapiro b. the BUILDING SENDMAIL section 2764562Sgshapiro c. the relevant part(s) of the OPERATING SYSTEM AND COMPILE QUIRKS section 2864562Sgshapiro 2964562Sgshapiro You may also find these useful: 3064562Sgshapiro 3190792Sgshapiro d. sendmail/SECURITY 3290792Sgshapiro e. devtools/README 3390792Sgshapiro f. devtools/Site/README 3490792Sgshapiro g. libmilter/README 3590792Sgshapiro h. mail.local/README 3690792Sgshapiro i. smrsh/README 3764562Sgshapiro 3880785Sgshapiro4. Read cf/README. 3964562Sgshapiro 40261363SgshapiroSendmail is a trademark of Proofpoint, Inc. 41203004SgshapiroUS Patent Numbers 6865671, 6986037. 4238032Speter 4338032Speter+-----------------------+ 4438032Speter| DIRECTORY PERMISSIONS | 4538032Speter+-----------------------+ 4638032Speter 4738032SpeterSendmail often gets blamed for many problems that are actually the 4838032Speterresult of other problems, such as overly permissive modes on directories. 4938032SpeterFor this reason, sendmail checks the modes on system directories and 5064562Sgshapirofiles to determine if they can be trusted. For sendmail to run without 5164562Sgshapirocomplaining, you MUST execute the following command: 5238032Speter 5338032Speter chmod go-w / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue 5438032Speter chown root / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue 5538032Speter 5638032SpeterYou will probably have to tweak this for your environment (for example, 5738032Spetersome systems put the spool directory into /usr/spool instead of 5864562Sgshapiro/var/spool). If you set the RunAsUser option in your sendmail.cf, the 5964562Sgshapiro/var/spool/mqueue directory will have to be owned by the RunAsUser user. 6064562SgshapiroAs a general rule, after you have compiled sendmail, run the command 6138032Speter 6238032Speter sendmail -v -bi 6338032Speter 6438032Speterto initialize the alias database. If it gives messages such as 6538032Speter 6638032Speter WARNING: writable directory /etc 6764562Sgshapiro WARNING: writable directory /var/spool/mqueue 6838032Speter 6938032Speterthen the directories listed have inappropriate write permissions and 7038032Spetershould be secured to avoid various possible security attacks. 7138032Speter 7238032SpeterBeginning with sendmail 8.9, these checks have become more strict to 7338032Speterprevent users from being able to access files they would normally not 7438032Speterbe able to read. In particular, .forward and :include: files in unsafe 7538032Speterdirectory paths (directory paths which are group or world writable) will 7638032Speterno longer be allowed. This would mean that if user joe's home directory 7738032Speterwas writable by group staff, sendmail would not use his .forward file. 7838032SpeterThis behavior can be altered, at the expense of system security, by 7938032Spetersetting the DontBlameSendmail option. For example, to allow .forward 8038032Speterfiles in group writable directories: 8138032Speter 8238032Speter O DontBlameSendmail=forwardfileingroupwritabledirpath 8338032Speter 8438032SpeterOr to allow them in both group and world writable directories: 8538032Speter 8638032Speter O DontBlameSendmail=forwardfileinunsafedirpath 8738032Speter 8838032SpeterItems from these unsafe .forward and :include: files will be marked 8938032Speteras unsafe addresses -- the items can not be deliveries to files or 9038032Speterprograms. This behavior can also be altered via DontBlameSendmail: 9138032Speter 9238032Speter O DontBlameSendmail=forwardfileinunsafedirpath, 9338032Speter forwardfileinunsafedirpathsafe 9438032Speter 9538032SpeterThe first flag allows the .forward file to be read, the second allows 9638032Speterthe items in the file to be marked as safe for file and program 9738032Speterdelivery. 9838032Speter 9938032SpeterOther files affected by this strengthened security include class 10090792Sgshapirofiles (i.e., Fw /etc/mail/local-host-names), persistent host status files, 10164562Sgshapiroand the files specified by the ErrorHeader and HelpFile options. Similar 10238032SpeterDontBlameSendmail flags are available for the class, ErrorHeader, and 10338032SpeterHelpFile files. 10438032Speter 10538032SpeterIf you have an unsafe configuration of .forward and :include: 10638032Speterfiles, you can make it safe by finding all such files, and doing 10738032Spetera "chmod go-w $FILE" on each. Also, do a "chmod go-w $DIR" for 10838032Spetereach directory in the file's path. 10938032Speter 11038032Speter 11198121Sgshapiro+--------------------------+ 11298121Sgshapiro| FILE AND MAP PERMISSIONS | 11398121Sgshapiro+--------------------------+ 11498121Sgshapiro 11598121SgshapiroAny application which uses either flock() or fcntl() style locking or 11698121Sgshapiroother APIs that use one of these locking methods (such as open() with 11798121SgshapiroO_EXLOCK and O_SHLOCK) on files readable by other local untrusted users 11898121Sgshapiromay be susceptible to local denial of service attacks. 11998121Sgshapiro 12098121SgshapiroFile locking is used throughout sendmail for a variety of files 12198121Sgshapiroincluding aliases, maps, statistics, and the pid file. Any user who 12298121Sgshapirocan open one of these files can prevent sendmail or it's associated 12398121Sgshapiroutilities, e.g., makemap or newaliases, from operating properly. This 12498121Sgshapirocan also affect sendmail's ability to update status files such as 12598121Sgshapirostatistics files. For system which use flock() for file locking, a 12698121Sgshapirouser's ability to obtain an exclusive lock prevents other sendmail 12798121Sgshapiroprocesses from reading certain files such as alias or map databases. 12898121Sgshapiro 12998121SgshapiroA workaround for this problem is to protect all sendmail files such 13098121Sgshapirothat they can't be opened by untrusted users. As long as users can 13198121Sgshapironot open a file, they can not lock it. Since queue files should 13298121Sgshapiroalready have restricted permissions, the only files that need 13398121Sgshapiroadjustment are alias, map, statistics, and pid files. These files 13498121Sgshapiroshould be owned by root or the trusted user specified in the 13598121SgshapiroTrustedUser option. Changing the permissions to be only readable and 13698121Sgshapirowritable by that user is sufficient to avoid the denial of service. 13798121SgshapiroFor example, depending on the paths you use, these commands would be 13898121Sgshapiroused: 13998121Sgshapiro 14098121Sgshapiro chmod 0640 /etc/mail/aliases /etc/mail/aliases.{db,pag,dir} 14198121Sgshapiro chmod 0640 /etc/mail/*.{db,pag,dir} 14298121Sgshapiro chmod 0640 /etc/mail/statistics /var/log/sendmail.st 14398121Sgshapiro chmod 0600 /var/run/sendmail.pid /etc/mail/sendmail.pid 14498121Sgshapiro 14598121SgshapiroIf the permissions 0640 are used, be sure that only trusted users belong 14698121Sgshapiroto the group assigned to those files. Otherwise, files should not even 14798121Sgshapirobe group readable. As of sendmail 8.12.4, the permissions shown above 14898121Sgshapiroare the default permissions for newly created files. 14998121Sgshapiro 15098121SgshapiroNote that the denial of service on the plain text aliases file 15198121Sgshapiro(/etc/mail/aliases) only prevents newaliases from rebuilding the 15298121Sgshapiroaliases file. The same is true for the database files on systems which 15398121Sgshapirouse fcntl() style locking. Since it does not interfere with normal 15498121Sgshapirooperations, sites may chose to leave these files readable. Also, it is 15598121Sgshapironot necessary to protect the text files associated with map databases 15698121Sgshapiroas makemap does not lock those files. 15798121Sgshapiro 15898121Sgshapiro 15938032Speter+-----------------------+ 16038032Speter| RELATED DOCUMENTATION | 16138032Speter+-----------------------+ 16238032Speter 16338032SpeterThere are other files you should read. Rooted in this directory are: 16438032Speter 16538032Speter FAQ 16680785Sgshapiro The FAQ (frequently answered questions) is no longer maintained 16780785Sgshapiro with the sendmail release. It is available at 16880785Sgshapiro http://www.sendmail.org/faq/ . The file FAQ is a reminder of 16980785Sgshapiro this and a pointer to the web page. 17064562Sgshapiro INSTALL 17164562Sgshapiro Installation instructions for building and installing sendmail. 17238032Speter KNOWNBUGS 17364562Sgshapiro Known bugs in the current release. 17438032Speter RELEASE_NOTES 17538032Speter A detailed description of the changes in each version. This 17638032Speter is quite long, but informative. 17764562Sgshapiro sendmail/README 17838032Speter Details on compiling and installing sendmail. 17938032Speter cf/README 18038032Speter Details on configuring sendmail. 18138032Speter doc/op/op.me 182110560Sgshapiro The sendmail Installation & Operations Guide. In addition 183110560Sgshapiro to the shipped PostScript version, plain text and PDF versions 184110560Sgshapiro can be generating using (assuming the required conversion software 185110560Sgshapiro is installed on your system, see doc/op/Makefile): 18638032Speter 187110560Sgshapiro cd doc/op && make op.txt op.pdf 188110560Sgshapiro 189110560Sgshapiro Be warned: on some systems calling make in doc/op/ will cause 190110560Sgshapiro errors due to nroff/groff problems. Known problems are: 191110560Sgshapiro - running this off on systems with an old version of -me, you 192110560Sgshapiro need to add the following macro to the macros: 193110560Sgshapiro 19438032Speter .de sm 19538032Speter \s-1\\$1\\s0\\$2 19638032Speter .. 19738032Speter 19838032Speter This sets a word in a smaller pointsize. 19938032Speter 200110560Sgshapiro - with new groff versions (1.18 seems affected) 20138032Speter 202110560Sgshapiro GROFF_NO_SGR=1 203110560Sgshapiro 204110560Sgshapiro needs to be set, e.g., in doc/op/Makefile: 205110560Sgshapiro 206110560Sgshapiro ROFF_CMD= GROFF_NO_SGR=1 groff 207110560Sgshapiro 208110560Sgshapiro 20938032Speter+--------------+ 21038032Speter| RELATED RFCS | 21138032Speter+--------------+ 21238032Speter 21338032SpeterThere are several related RFCs that you may wish to read -- they are 21464562Sgshapiroavailable via anonymous FTP to several sites. For a list of the 21564562Sgshapiroprimary repositories see: 21638032Speter 21738032Speter http://www.isi.edu/in-notes/rfc-retrieval.txt 21838032Speter 21938032SpeterThey are also online at: 22038032Speter 22138032Speter http://www.ietf.org/ 22238032Speter 22338032SpeterThey can also be retrieved via electronic mail by sending 22438032Speteremail to one of: 22538032Speter 22638032Speter mail-server@nisc.sri.com 22738032Speter Put "send rfcNNN" in message body 22838032Speter nis-info@nis.nsf.net 22938032Speter Put "send RFCnnn.TXT-1" in message body 23038032Speter sendrfc@jvnc.net 23138032Speter Put "RFCnnn" as Subject: line 23238032Speter 23338032SpeterFor further instructions see: 23438032Speter 23538032Speter http://www.isi.edu/in-notes/rfc-editor/rfc-info 23638032Speter 23738032SpeterImportant RFCs for electronic mail are: 23838032Speter 23938032Speter RFC821 SMTP protocol 24038032Speter RFC822 Mail header format 24138032Speter RFC974 MX routing 24238032Speter RFC976 UUCP mail format 24338032Speter RFC1123 Host requirements (modifies 821, 822, and 974) 24490792Sgshapiro RFC1344 Implications of MIME for Internet Mail Gateways 24538032Speter RFC1413 Identification server 24690792Sgshapiro RFC1428 Transition of Internet Mail from Just-Send-8 to 24790792Sgshapiro 8-bit SMTP/MIME 24890792Sgshapiro RFC1652 SMTP Service Extension for 8bit-MIMEtransport 24938032Speter RFC1869 SMTP Service Extensions (ESMTP spec) 25038032Speter RFC1870 SMTP Service Extension for Message Size Declaration 25138032Speter RFC1891 SMTP Service Extension for Delivery Status Notifications 25238032Speter RFC1892 Multipart/Report Content Type for the Reporting of 25338032Speter Mail System Administrative Messages 25438032Speter RFC1893 Enhanced Mail System Status Codes 25538032Speter RFC1894 An Extensible Message Format for Delivery Status 25638032Speter Notifications 25738032Speter RFC1985 SMTP Service Extension for Remote Message Queue Starting 25864562Sgshapiro RFC2033 Local Mail Transfer Protocol (LMTP) 25964562Sgshapiro RFC2034 SMTP Service Extension for Returning Enhanced Error Codes 26090792Sgshapiro RFC2045 Multipurpose Internet Mail Extensions (MIME) Part One: 26190792Sgshapiro Format of Internet Message Bodies 26264562Sgshapiro RFC2476 Message Submission 26364562Sgshapiro RFC2487 SMTP Service Extension for Secure SMTP over TLS 26464562Sgshapiro RFC2554 SMTP Service Extension for Authentication 26590792Sgshapiro RFC2821 Simple Mail Transfer Protocol 26690792Sgshapiro RFC2822 Internet Message Format 26790792Sgshapiro RFC2852 Deliver By SMTP Service Extension 26890792Sgshapiro RFC2920 SMTP Service Extension for Command Pipelining 26938032Speter 27038032SpeterOther standards that may be of interest (but which are less directly 27138032Speterrelevant to sendmail) are: 27238032Speter 27338032Speter RFC987 Mapping between RFC822 and X.400 27438032Speter RFC1049 Content-Type header field (extension to RFC822) 27538032Speter 27638032SpeterWarning to AIX users: this version of sendmail does not implement 27738032SpeterMB, MR, or MG DNS resource records, as defined (as experiments) in 27838032SpeterRFC1035. 27938032Speter 28038032Speter 28164562Sgshapiro+---------+ 28264562Sgshapiro| WARNING | 28364562Sgshapiro+---------+ 28464562Sgshapiro 28564562SgshapiroSince sendmail 8.11 and later includes hooks to cryptography, the 28664562Sgshapirofollowing information from OpenSSL applies to sendmail as well. 28764562Sgshapiro 28864562SgshapiroPLEASE REMEMBER THAT EXPORT/IMPORT AND/OR USE OF STRONG CRYPTOGRAPHY 28964562SgshapiroSOFTWARE, PROVIDING CRYPTOGRAPHY HOOKS OR EVEN JUST COMMUNICATING 29064562SgshapiroTECHNICAL DETAILS ABOUT CRYPTOGRAPHY SOFTWARE IS ILLEGAL IN SOME 29164562SgshapiroPARTS OF THE WORLD. SO, WHEN YOU IMPORT THIS PACKAGE TO YOUR 29264562SgshapiroCOUNTRY, RE-DISTRIBUTE IT FROM THERE OR EVEN JUST EMAIL TECHNICAL 29364562SgshapiroSUGGESTIONS OR EVEN SOURCE PATCHES TO THE AUTHOR OR OTHER PEOPLE 29464562SgshapiroYOU ARE STRONGLY ADVISED TO PAY CLOSE ATTENTION TO ANY EXPORT/IMPORT 29590792SgshapiroAND/OR USE LAWS WHICH APPLY TO YOU. THE AUTHORS ARE NOT LIABLE FOR 29690792SgshapiroANY VIOLATIONS YOU MAKE HERE. SO BE CAREFUL, IT IS YOUR RESPONSIBILITY. 29764562Sgshapiro 29864562SgshapiroIf you use OpenSSL then make sure you read their README file which 29964562Sgshapirocontains information about patents etc. 30064562Sgshapiro 30164562Sgshapiro 30238032Speter+-------------------+ 30338032Speter| DATABASE ROUTINES | 30438032Speter+-------------------+ 30538032Speter 30638032SpeterIF YOU WANT TO RUN THE NEW BERKELEY DB SOFTWARE: **** DO NOT **** 30738032Speteruse the version that was on the Net2 tape -- it has a number of 30838032Speternefarious bugs that were bad enough when I got them; you shouldn't have 30938032Speterto go through the same thing. Instead, get a new version via the web at 31038032Speterhttp://www.sleepycat.com/. This software is highly recommended; it gets 31138032Speterrid of several stupid limits, it's much faster, and the interface is 31238032Speternicer to animals and plants. If the Berkeley DB include files 31338032Speterare installed in a location other than those which your compiler searches, 31438032Speteryou will need to provide that directory when building: 31538032Speter 316182352Sgshapiro ./Build -I/path/to/include/directory 31738032Speter 31838032SpeterIf you are using Berkeley DB versions 1.85 or 1.86, you are *strongly* 31964562Sgshapirourged to upgrade to DB version 2 or later, available from 32064562Sgshapirohttp://www.sleepycat.com/. Berkeley DB versions 1.85 and 1.86 are known to 32164562Sgshapirobe broken in various nasty ways (see http://www.sleepycat.com/db.185.html), 32264562Sgshapiroand can cause sendmail to dump core. In addition, the newest versions of 32364562Sgshapirogcc and the Solaris compilers perform optimizations in those versions that 32464562Sgshapiromay cause fairly random core dumps. 32538032Speter 32638032SpeterIf you have no choice but to use Berkeley DB 1.85 or 1.86, and you are 32738032Speterusing both Berkeley DB and files in the UNIX ndbm format, remove ndbm.h 32838032Speterand ndbm.o from the DB library after building it. You should also apply 32938032Speterall of the patches for DB 1.85 and 1.86 found at the Sleepycat web site 33038032Speter(see http://www.sleepycat.com/db.185.html), as they fix some of the known 33138032Speterproblems. 33238032Speter 33338032SpeterIf you are using a version of Berkeley DB 2 previous to 2.3.15, and you 33438032Speterare using both Berkeley DB and files in the UNIX ndbm format, remove dbm.o 33538032Speterfrom the DB library after building it. No other changes are necessary. 33638032Speter 33738032SpeterIf you are using Berkeley DB version 2.3.15 or greater, no changes are 33838032Speternecessary. 33938032Speter 34038032SpeterThe underlying database file formats changed between Berkeley DB versions 34164562Sgshapiro1.85 and 1.86, again between DB 1.86 and version 2.0, and finally between 34264562SgshapiroDB 2.X and 3.X. If you are upgrading from one of those versions, you must 34364562Sgshapirorecreate your database file(s). Do this by rebuilding all maps with 34464562Sgshapiromakemap and rebuilding the alias file with newaliases. 34538032Speter 34638032Speter 34738032Speter+--------------------+ 34838032Speter| HOST NAME SERVICES | 34938032Speter+--------------------+ 35038032Speter 35138032SpeterIf you are using NIS or /etc/hosts, it is critical that you 35238032Speterlist the long (fully qualified) name somewhere (preferably first) in 35338032Speterthe /etc/hosts file used to build the NIS database. For example, the 35438032Speterline should read 35538032Speter 35638032Speter 128.32.149.68 mastodon.CS.Berkeley.EDU mastodon 35738032Speter 35838032Speter**** NOT **** 35938032Speter 36038032Speter 128.32.149.68 mastodon 36138032Speter 36238032SpeterIf you do not include the long name, sendmail will complain loudly 36338032Speterabout ``unable to qualify my own domain name (mastodon) -- using 36438032Spetershort name'' and conclude that your canonical name is the short 36538032Speterversion and use that in messages. The name "mastodon" doesn't mean 36638032Spetermuch outside of Berkeley, and so this creates incorrect and unreplyable 36738032Spetermessages. 36838032Speter 36938032Speter 37038032Speter+-------------+ 37138032Speter| USE WITH MH | 37238032Speter+-------------+ 37338032Speter 37438032SpeterThis version of sendmail notices and reports certain kinds of SMTP 37538032Speterprotocol violations that were ignored by older versions. If you 37638032Speterare running MH you may wish to install the patch in contrib/mh.patch 37738032Speterthat will prevent these warning reports. This patch also works 37838032Speterwith the old version of sendmail, so it's safe to go ahead and 37938032Speterinstall it. 38038032Speter 38138032Speter 38238032Speter+----------------+ 38338032Speter| USE WITH IDENT | 38438032Speter+----------------+ 38538032Speter 38638032SpeterSendmail 8 supports the IDENT protocol, as defined by RFC 1413. 38764562SgshapiroNote that the RFC states a client should wait at least 30 seconds 38864562Sgshapirofor a response. As of 8.10.0, the default Timeout.ident is 5 seconds 38964562Sgshapiroas many sites have adopted the practice of dropping IDENT queries. 39064562SgshapiroThis has lead to delays processing mail. 39138032Speter 39264562SgshapiroNo ident server is included with this distribution. It is available 39364562Sgshapirofrom: 39438032Speter 39564562Sgshapiro ftp://ftp.lysator.liu.se/pub/ident/servers/ 39664562Sgshapiro http://sf.www.lysator.liu.se/~pen/pidentd/ 39738032Speter 39843730Speter+-------------------------+ 39943730Speter| INTEROPERATION PROBLEMS | 40043730Speter+-------------------------+ 40143730Speter 40243730SpeterMicrosoft Exchange Server 5.0 40343730Speter We have had a report that ``about 7% of messages from Sendmail 40443730Speter to Exchange were not being delivered with status messages of 40543730Speter "connection reset" and "I/O error".'' Upgrading Exchange from 40643730Speter Version 5.0 to Version 5.5 Service Pack 2 solved this problem. 40743730Speter 40864562SgshapiroCommuniGate Pro 40964562Sgshapiro CommuniGate Pro 3.2.4 does not accept the AUTH= -parameter on 41064562Sgshapiro the MAIL FROM command if the client is not authenticated. Use 41143730Speter 41264562Sgshapiro define(`confAUTH_OPTIONS', `A') 41364562Sgshapiro 41464562Sgshapiro in .mc file if you have compiled sendmail with Cyrus SASL 41564562Sgshapiro and you communicate with CommuniGate Pro servers. 41664562Sgshapiro 41738032Speter+---------------------+ 41838032Speter| DIRECTORY STRUCTURE | 41938032Speter+---------------------+ 42038032Speter 42138032SpeterThe structure of this directory tree is: 42238032Speter 42338032Spetercf Source for sendmail configuration files. These are 42438032Speter different than what you've seen before. They are a 42538032Speter fairly dramatic rewrite, requiring the new sendmail 42638032Speter (since they use new features). 42738032Spetercontrib Some contributed tools to help with sendmail. THESE 42838032Speter ARE NOT SUPPORTED by sendmail -- contact the original 42938032Speter authors if you have problems. (This directory is not 43038032Speter on the 4.4BSD tape.) 43164562Sgshapirodevtools Build environment. See devtools/README. 43238032Speterdoc Documentation. If you are getting source, read 43338032Speter op.me -- it's long, but worth it. 43490792Sgshapiroeditmap A program to edit and query maps that have been created 43590792Sgshapiro with makemap, e.g., adding and deleting entries. 43664562Sgshapiroinclude Include files used by multiple programs in the distribution. 43764562Sgshapirolibsmdb sendmail database library with support for Berkeley DB 1.X, 43864562Sgshapiro Berkeley DB 2.X, Berkeley DB 3.X, and NDBM. 43964562Sgshapirolibsmutil sendmail utility library with functions used by different 44064562Sgshapiro programs. 44138032Spetermail.local The source for the local delivery agent used for 4.4BSD. 44238032Speter THIS IS NOT PART OF SENDMAIL! and may not compile 44338032Speter everywhere, since it depends on some 4.4-isms. Warning: 44438032Speter it does mailbox locking differently than other systems. 44564562Sgshapiromailstats Statistics printing program. 44638032Spetermakemap A program that creates the keyed maps used by the $( ... $) 44738032Speter construct in sendmail. It is primitive but effective. 44838032Speter It takes a very simple input format, so you will probably 44938032Speter expect to preprocess must human-convenient formats 45038032Speter using sed scripts before this program will like them. 45138032Speter But it should be functionally complete. 45238032Speterpraliases A program to print the DBM or NEWDB version of the 45338032Speter aliases file. 45438032Speterrmail Source for rmail(8). This is used as a delivery 45538032Speter agent for for UUCP, and could presumably be used by 45638032Speter other non-socket oriented mailers. Older versions of 45738032Speter rmail are probably deficient. RMAIL IS NOT PART OF 45838032Speter SENDMAIL!!! The 4.4BSD source is included for you to 45964562Sgshapiro look at or try to port to your system. There is no 46064562Sgshapiro guarantee it will even compile on your operating system. 46138032Spetersmrsh The "sendmail restricted shell", which can be used as 46238032Speter a replacement for /bin/sh in the prog mailer to provide 46338032Speter increased security control. NOT PART OF SENDMAIL! 46464562Sgshapirosendmail Source for the sendmail program itself. 46538032Spetertest Some test scripts (currently only for compilation aids). 46664562Sgshapirovacation Source for the vacation program. NOT PART OF SENDMAIL! 46764562Sgshapiro 468266692Sgshapiro$Revision: 8.96 $, Last updated $Date: 2013-11-22 20:51:01 $ 469