Fact-checked by Grok 2 weeks ago

Sendmail

Sendmail is an open-source mail transfer agent () software application that routes and delivers electronic mail messages across computer networks, primarily on operating systems, using protocols such as the (SMTP). It accepts incoming mail from mail user agents (MUAs), interprets recipient addresses, performs rewriting and aliasing as needed, and forwards messages to destination hosts or local mailboxes, with built-in queuing and retry mechanisms for reliable delivery. Originally developed by as a graduate student and staff member at the , Sendmail evolved from Allman's earlier delivermail program, which he wrote in 1979 to handle local mail delivery on Berkeley Unix systems. The first version of Sendmail was released in 1981, and it became part of the standard (BSD) starting with 4.1 BSD in 1983, quickly establishing itself as the dominant on Unix platforms due to its flexibility in supporting diverse network environments and mail formats. By the 1990s, Sendmail powered the majority of servers, with an estimated 80% market share at its peak in 1996. One of Sendmail's defining characteristics is its highly configurable architecture, centered on the sendmail.cf file, which defines rules for address rewriting, routing, and delivery; this file is typically generated from human-readable input using the M4 macro processor to simplify administration. Key features include support for multiple transport protocols beyond SMTP (such as and ), spam and controls (introduced in version 8.9 in 1998), integration with authentication mechanisms like (DKIM), and modular components for queue management and policy enforcement. These capabilities made it suitable for complex enterprise environments, though its configuration complexity has led to the rise of alternatives like Postfix and . In 1998, Allman co-founded Sendmail, Inc. to offer commercial versions and support for the software, which released proprietary appliances and enhanced features while maintaining the open-source core under the Sendmail License. The company was acquired by in October 2013 for approximately $23 million, integrating Sendmail into Proofpoint's platform while continuing open-source development. As of 2024, the project remains active, with the latest stable release being version 8.18.1 from January 2024, focusing on enhancements, support, and compatibility with modern infrastructures.

History and Development

Origins and Early Versions

Sendmail was originally developed by Eric Allman in 1981 at the University of California, Berkeley, as a more flexible replacement for the delivermail program to manage email routing across the ARPANET and emerging networks like UUCP and BerkNet. Delivermail, written by Allman in 1980 and included in 4.0 and 4.1 BSD Unix releases, supported basic mail delivery but relied on compiled-in configurations that proved inadequate for the growing complexity of inter-network addressing and protocols. The initial development of Sendmail addressed these limitations by enabling runtime reconfiguration and support for the nascent TCP/IP stack, marking a shift toward a general-purpose mail transfer agent (MTA). The first public release of Sendmail occurred in 1981, with version 3 distributed in March alongside 4.1a BSD and enhanced in November with 4.1c BSD to incorporate SMTP for reliable transmission over TCP/IP. A significant milestone came in 1983, when a major rewrite of Sendmail was released as version 4 with 4.2 BSD, integrating it into the first BSD distribution with full TCP/IP networking and solidifying its role in academic computing environments. This version introduced foundational capabilities for handling diverse mail formats and routes, including aliasing, forwarding, and compatibility with ARPANET's FTP-based mail transfer. Early Sendmail versions featured rule-based routing implemented via a domain-specific rewriting , which parsed addresses through a series of production rules to canonicalize formats like "user@host" or ad hoc paths (e.g., ucsfcgl!tef), enabling seamless delivery across heterogeneous systems. Message queueing for temporary storage and retry mechanisms were also core from these initial releases, ensuring resilience against network failures. By Sendmail 5 in 1986, distributed with 4.3 , these queueing and retry features were refined for better performance and reliability in larger-scale deployments. Sendmail 8, released in 1993 with 4.4 BSD, further evolved the system by introducing enhanced M4 macro support for declarative configuration, allowing administrators to specify features like mailers and rulesets without directly editing complex rewrite rules. This abstraction simplified customization while maintaining . Throughout its early development, Sendmail became instrumental in standardizing SMTP as the de facto for transfer in systems, powering mail infrastructure on thousands of hosts and influencing the broader adoption of internetworking standards.

Commercialization and Acquisition

In 1998, and Greg Olson co-founded Sendmail, Inc. to commercialize the open-source Sendmail project by offering professional support services, proprietary enhancements, and enterprise-grade versions tailored for large-scale deployments. The company aimed to address the growing demands of organizations needing reliable infrastructure beyond the free distribution, which had originated as a university-developed tool in the . Sendmail, Inc. expanded its portfolio with the release of Sendmail Switch in 1998, a commercial mail transfer agent () designed as an enterprise messaging gateway with added features for high-volume traffic management, policy enforcement, and integration with security tools. This product built on the core Sendmail engine but included proprietary modules for scalability in corporate environments, such as advanced queuing and monitoring capabilities. Subsequent offerings, including the Sendmail Secure Messaging Gateway, focused on email hygiene, anti-spam filtering, and , providing a unified platform for secure inbound and outbound messaging. On October 1, 2013, announced the acquisition of Sendmail, Inc. for approximately $23 million in cash, aiming to integrate Sendmail's messaging technology into Proofpoint's broader ecosystem. The deal enabled Proofpoint to enhance its secure gateway solutions by leveraging Sendmail's robust for improved threat detection and policy routing, while transitioning proprietary products to a subscription model. Following the acquisition, Sendmail's technology was rebranded and evolved under Proofpoint as the Sendmail Sentrion platform by 2014, emphasizing cloud-compatible architectures for hybrid environments and seamless migrations to modern email systems. Proofpoint committed to ongoing of the distribution, with version 8.18.1 released in 2024 and remaining current as of 2025, ensuring continued availability for non-commercial and legacy uses. This shift facilitated the integration of Sendmail's capabilities into cloud-based security suites, broadening access to a subset of Sentrion features via while prioritizing enterprise-grade, cloud-integrated solutions for complex deployments.

Technical Overview

Core Functionality

Sendmail functions as a general-purpose Mail Transfer Agent () responsible for sending, receiving, and routing messages across networks, primarily utilizing the (SMTP) as defined in RFC 821. As an , it serves as an intermediary that relays messages between domains, performing limited header editing to ensure compatibility while focusing on reliable transport. This core role positions Sendmail as a foundational component in Unix-based systems, handling the transfer of messages without direct user interaction. The primary processes begin with accepting mail from clients, either through local submissions or remote connections via an SMTP daemon listener on port 25. Once accepted, Sendmail parses recipient addresses and rewrites both the message envelope and headers using configurable rulesets to standardize formats and resolve delivery paths. For messages that cannot be delivered immediately—due to network issues or recipient unavailability—Sendmail queues them in a spool directory, such as /var/spool/mqueue, and periodically retries delivery according to predefined intervals. This queuing mechanism ensures persistence and in routing. In addition to SMTP, Sendmail supports multiple transport protocols, including for inter-Unix communication and mechanisms for local delivery to user . It acts as a for outbound mail originating from local hosts and accepts inbound mail from external sources, facilitating seamless integration across heterogeneous networks. Sendmail integrates with Mail User Agents (MUAs), such as the client or contemporary applications like , by processing messages handed off for transport and delivering them to final destinations via aliases, forward files, or direct mailbox writes. A distinctive feature of Sendmail is its extensive configurability, enabling custom routing logic tailored to complex enterprise networks, which contributed to its widespread adoption as the on most Unix systems since the early era.

Architecture and Components

Sendmail employs a modular centered around a single mailer daemon process, known as the sendmail daemon, which handles SMTP transactions for incoming and outgoing mail. This daemon operates as a persistent server, listening on port 25 for connections and forking child processes to manage individual jobs, enabling concurrent handling of multiple messages without requiring a full restart. The design separates concerns such as address rewriting, queuing, and , allowing adaptation to diverse network environments while maintaining a core routing engine. Key components include the manager, which spools messages in the /var/spool/mqueue directory using flat files for control (qf), data (df), and transcripts (xf) to track and retries. Messages are held here during , with the queue runner periodically scanning and attempting , typically every 30 minutes by default, supporting multiple queue subdirectories for load distribution in high-volume setups. The alias database, stored in /etc/mail/aliases and compiled into a format like /etc/mail/aliases. using tools such as newaliases, enables address expansion and to user boxes or external forwards. Additionally, the resolver component queries DNS for MX records to determine recipient hosts, relying on the system's name resolution services with configurable options like timeouts and search limits to ensure reliable routing. Address handling occurs through a series of sets, defined in the as pattern-replacement pairs processed sequentially. For instance, Ruleset 0 parses sender and recipient into mailer-host triples for final routing, while Ruleset 3 performs to standardize formats like local-part@host-domain. These use tokenization and to transform across protocols, ensuring compatibility with varied mail systems. Delivery agents then interface with external programs for final handoff, such as /bin/mail for local inbox delivery or for user-defined filtering, specified via MAILER definitions that include flags for capabilities like handling multiple recipients. For scalability, Sendmail utilizes a forking model where the daemon spawns children per or queue job, controlled by options like MaxDaemonChildren to cap concurrent processes and prevent resource exhaustion under load. This approach supports environments with thousands of messages but can lead to overhead from frequent forking, with configurations allowing queue splitting across directories to distribute . In contrast to modern MTAs, Sendmail relies on flat-file and sequential retry logic rather than database-backed or parallelized queue managers, which can result in simpler but less efficient handling of very high volumes compared to systems like Postfix.

Configuration and Usage

Configuration Mechanisms

Sendmail's configuration is primarily managed through the sendmail.cf file, which serves as the runtime for the mail transfer agent (). This file is typically generated from a higher-level input file, such as sendmail.mc, using the m4 to simplify customization and avoid direct of the complex sendmail.cf syntax. The m4 approach allows administrators to define settings declaratively, with the preprocessor expanding macros into the appropriate directives in the output . The sendmail.mc file employs m4 macros to specify options, features, and domain-specific behaviors. Common macros include define for setting variables, such as define(confDOMAIN_NAME', example.com') to establish the host's , and FEATURE for enabling built-in capabilities, like FEATURE(masquerade_envelope')which rewrites [envelope](/page/Envelope) sender and recipient addresses to appear from the specified [domain](/page/Domain), aiding in outbound mail presentation.[](https://www.proofpoint.com/sites/default/files/configuration_readme.pdf)[](https://docs.oracle.com/cd/E19683-01/817-1717/sendmail-4/index.html) Other foundational macros encompassOSTYPEto select operating system-specific defaults (e.g.,OSTYPE(linux')), DOMAIN for site policies (e.g., DOMAIN(example')), and MAILERto include [transport](/page/Transport) protocols (e.g.,MAILER(smtp') for SMTP ). To generate the sendmail.cf, administrators run a command like m4 /etc/mail/sendmail.mc > /etc/mail/sendmail.cf, ensuring the configuration is rebuilt after modifications. The resulting sendmail.cf file is structured into key sections that control Sendmail's operation. The Options section uses O flags to set parameters, such as O Timeout.queuereturn=5d to configure the interval before returning undeliverable queued mail to the sender, defaulting to five days for queue management. Rulesets, defined with R lines, handle address parsing, rewriting, and routing through pattern matching and transformations; for instance, a rule like R$* < @ $+ .m. > $* $#smtp $@ &#36;2.$m. $: &#36;1 < @ &#36;2.$m. > &#36;3 rewrites addresses for local domains to use SMTP delivery. Mailers, specified with M definitions, outline transport agents, such as Mesmtp, P=[IPC], F=mDFMuX, A=IPC $h, which defines an extended SMTP mailer for outbound connections with specific flags for error handling and eight-bit data support. Sendmail supports integration with external databases for dynamic lookups, enhancing scalability for aliases, user mappings, and access controls. It accommodates LDAP for centralized authentication and mapping (e.g., define(ALIAS_FILE', ldap:')), NIS for network information services (e.g., via Kmaps nis hosts.byname), and Berkeley DB for local hashed databases (e.g., Kaccess hash /etc/mail/access). The virtusertable feature, enabled via FEATURE(virtusertable', hash /etc/mail/virtusertable'), uses a database to route virtual domain addresses, such as mapping [email protected] to a local alias or external recipient. Testing and debugging configurations are facilitated by command-line tools. The -bt option invokes an interactive address test mode, allowing simulation of rule processing (e.g., sendmail -bt followed by input like 3,1 <[email protected]> to trace rewriting). Debug output is enabled with -d flags, specifying verbosity levels (e.g., sendmail -d8.1 for connection ), which logs detailed traces to aid in complex setups. Common customizations leverage these mechanisms for operational control. The database, activated by FEATURE(access_db', hash -T<TMPF> /etc/mail/[access](/page/Access)'), permits fine-grained policies in a rebuilt into a DB map, such as From:[email protected] REJECT to block specific senders. Relay restrictions are managed through entries like Connect:authorized.host [RELAY](/page/Relay) in the file or macros such as RELAY_DOMAIN(sendmail.org')` to permit relaying only for trusted domains, preventing unauthorized use as an open relay. These tools enable tailored behaviors without altering Sendmail's core code.

Deployment and Integration

Sendmail can be installed on Unix-like systems using package managers for the open-source version, such as yum install sendmail sendmail-cf on Red Hat-based distributions like or RHEL, or apt-get install sendmail on Debian-based systems like . For enterprise environments, Proofpoint offers Sentrion, a commercial variant of Sendmail designed for high-volume messaging with advanced features like integrated policy enforcement. Basic deployment from involves downloading the from ftp.sendmail.org, navigating to the sendmail , and running ./Build to compile the binaries, followed by ./Build install to place the in /usr/sbin and create necessary links like /usr/bin/[mailq](/page/Mail). files are generated by editing a .mc file (e.g., sendmail.mc), it with m4 sendmail.mc > /etc/[mail](/page/Mail)/sendmail.cf, and then restarting the . The latest open-source release as of 2025 is version 8.18.1. Sendmail integrates with other mail transfer agents (MTAs) by configuring it as a relay to forward mail to a secondary MTA like Postfix, achieved by defining a smart host in the .mc file (e.g., define(SMART_HOST', postfix.example.com')) and regenerating the .cf file. In cloud environments such as AWS EC2, Sendmail is commonly deployed for outbound email relays by integrating with Amazon Simple Email Service (SES), involving installation via package manager, editing /etc/mail/sendmail.mc to specify the SES smart host, and verifying domain identities in the AWS console to bypass port 25 throttling. Performance tuning for high-volume deployments includes adjusting the queue processing interval in /etc/sysconfig/sendmail (e.g., setting QUEUE=15m for more frequent retries) to balance load and delivery speed, while monitoring queue status with the mailq command to identify deferred messages. The open-source version 8.18.1 supports basic tuning options, whereas Proofpoint's Sentrion provides enterprise clustering for load balancing and failover across multiple nodes, enabling centralized reporting and high-availability in large-scale setups. Migration from older Sendmail versions requires updating configuration files to address deprecated features, such as obsolete UUCP mailers (e.g., uucp-old), which have been consolidated into the mailertable feature for modern routing; users must review and rewrite affected rules in the .mc file before regenerating .cf and testing delivery.

Security Considerations

Historical Vulnerabilities

Sendmail has faced several significant security vulnerabilities throughout its history, particularly in its early versions, which were widely deployed on Unix systems. One of the earliest notable flaws occurred in 1988, when the debug mode feature in Sendmail versions prior to 5.59 was enabled by default, allowing remote attackers to execute arbitrary commands as by invoking the SMTP DEBUG command. This vulnerability was prominently exploited by the , which used it to propagate across networks, infecting thousands of systems and causing widespread disruption. The issue stemmed from inadequate access controls on the debug functionality, intended for troubleshooting but left exposed in production environments. In the , Sendmail continued to be targeted due to errors in its SMTP handling. A critical remote exploit affected versions 5.58 and 5.59, where a in the processing of EXPN and VRFY SMTP commands enabled attackers to overflow a buffer and execute arbitrary code with privileges. This flaw arose from insufficient bounds checking during command , allowing malicious input to overwrite memory. Although the exact CVE identifier in historical records varies, it impacted numerous installations and highlighted ongoing risks in address resolution mechanisms. Exploitation was feasible remotely without , leading to compromise on vulnerable Unix servers. The saw further issues related to input validation and controls. In 2003, a in Sendmail allowed unauthorized mail ing due to default settings in sendmail.cf that enabled promiscuous and accepted unresolvable domains, permitting remote attackers to use affected systems as open relays for distribution. This stemmed from misconfigured rules in vendor distributions like AIX, facilitating abuse without direct code execution but enabling large-scale unauthorized . Later that year, additional parsing flaws in the prescan function of versions 8.12.9 permitted buffer overflows via crafted addresses, potentially allowing . By 2006, a use-after-free in header processing affected versions before 8.13.8, where long header lines caused memory corruption, resulting in denial-of-service crashes through repeated pointer deallocation. This could be triggered remotely, exhausting resources on busy mail servers. The Sendmail Consortium, formed to manage open-source development, issued regular patches to address these flaws, with version 8.13.8 released in 2007 incorporating fixes for the use-after-free issue along with multiple other bugs and regressions from prior updates. Common patterns across these vulnerabilities included failures in input validation within SMTP handlers—such as inadequate bounds checking in address and command parsers—and configuration parsers that defaulted to insecure settings. These weaknesses often enabled remote without , leading to root access, service disruptions, or relay abuse. The impact of these historical vulnerabilities was profound, as Sendmail powered the majority of Unix-based email servers during the era, resulting in widespread exploitation and network outages. Incidents like the prompted mandatory upgrades across academic and government networks, accelerating the adoption of security best practices and contributing to the formation of response teams like CERT. Over time, these events underscored the need for robust input sanitization and secure defaults in mail transfer agents.

Modern Security Features and Practices

Sendmail incorporates several built-in security features to enhance email transmission security, notably the support for STARTTLS, which enables encrypted SMTP connections using (TLS). This feature was introduced in version 8.13, released in 2003, allowing of mail transfer sessions to protect against eavesdropping and man-in-the-middle attacks. Additionally, Sendmail supports integration with (DKIM) signing through its Milter (mail filter) API, enabling administrators to digitally sign outgoing messages and verify incoming ones to prevent spoofing and tampering. Following Proofpoint's acquisition of Sendmail in , the commercial Sentrion platform introduced advanced enhancements, including AI-driven threat detection that analyzes content and metadata in real-time to identify sophisticated attacks like and . Sentrion also implements to throttle excessive connections and prevent denial-of-service attempts, as well as sandboxing for attachments, where suspicious files are detonated in isolated environments to assess malicious behavior before delivery. Recommended best practices for securing Sendmail deployments include enabling encryption by configuring the smtpd_tls_cert_file directive in the sendmail.cf file, which specifies the server certificate for incoming connections and ensures encrypted sessions where possible. Administrators should also utilize the FEATURE(access_db')macro in thesendmail.mc` file to enable IP-based , allowing of known malicious sources via a database lookup to block unauthorized relaying. Regular updates to the latest stable release, such as version 8.18.x, are essential, as these incorporate patches for vulnerabilities like SMTP smuggling (CVE-2023-51765) and other zero-day issues. Sendmail supports compliance with modern email authentication standards through integration with tools like OpenSPF for () validation, which checks the sending IP against domain records to reject unauthorized senders, and OpenDMARC for (), enabling policy enforcement to mitigate domain spoofing. For ongoing monitoring, Sendmail logs can be analyzed using tools like Logwatch, which generates periodic summaries to detect anomalies such as unusual relay attempts or volume spikes indicative of campaigns or abuse. This integration helps in identifying and responding to modern threats, including unauthorized relays used in operations. As of 2025, the open-source Sendmail project continues to release patches addressing zero-day vulnerabilities, often in collaboration with community contributors, while the commercial Proofpoint version of Sentrion incorporates behavioral analysis powered by to profile user and email patterns, flagging deviations that signal advanced persistent threats.

References

  1. [1]
    What Is Sendmail? Definition, How it Works & More | Proofpoint US
    Sendmail is a server application providing a way to send email using the Simple Mail Transfer Protocol (SMTP). Learn how Sendmail works and how to use it.
  2. [2]
    19.3.2. Sendmail | Deployment Guide | Red Hat Enterprise Linux | 6
    One common Sendmail configuration is to have a single machine act as a mail gateway for all machines on the network. For example, a company may want to have a ...
  3. [3]
    sendmail.sendmail(8) - Linux man page - Linux Documentation
    Sendmail sends a message to one or more recipients, routing the message over whatever networks are necessary. Sendmail does internetwork forwarding as ...<|separator|>
  4. [4]
    sendmail - Linux in a Nutshell, Fourth Edition [Book] - O'Reilly Media
    sendmail is a mail transfer agent (MTA) or, more simply, a mail router. It accepts mail from a user's mail program, interprets the mail address, rewrites ...
  5. [5]
    Eric Allman - People of ACM
    Eric Allman developed sendmail and its precursor delivermail in the late 1970s and early 1980s at the University of California, Berkeley.
  6. [6]
    [PDF] Sendmail Evolution: 8.10 and Beyond
    The sendmail mail transfer agent (MTA) is used on most UNIX. TM systems today ... “Plus detail” information, the portion of the mail address used to ...
  7. [7]
    History - sendmail, 4th Edition [Book] - O'Reilly Media
    HistoryThe sendmail program was originally written by Eric Allman while he was a student and staff member at the University of California at Berkeley.
  8. [8]
    History - Sendmail, 3rd Edition [Book] - O'Reilly
    The sendmail program was originally written by Eric Allman while he was a student and staff member at the University of California at Berkeley. At the time, one ...
  9. [9]
    THE WHOLE SCOOP ON THE CONFIGURATION FILE
    The configuration file is organized as a series of lines, each of which begins with a single character defining the semantics for the rest of the line.
  10. [10]
    sendmail Configuration File Syntax
    sendmail Configuration File. This section describes the configuration file in detail, including hints for writing your own file.
  11. [11]
    Sendmail Sentrion Open Source - Open Source Email Server | Proofpoint US
    ### Summary of Sendmail from https://www.sendmail.org/
  12. [12]
    10.3.2. Sendmail - Jeff's Home Page
    One common Sendmail configuration is to have a single machine act as a mail gateway for all machines on the network. For instance, a company may want to have a ...
  13. [13]
    Sendmail X: Architecture
    Queue manager (QMGR): controls message routing through the MTA, mail delivery, and implements general policy.
  14. [14]
    A Conversation with Steve Bourne, Eric Allman, and Bryan Cantrill
    Sep 24, 2008 · Allman is chief science officer of Sendmail Inc., the company he cofounded in 1998 as the commercial wing of the open source sendmail project.
  15. [15]
    Proofpoint, Inc. Acquires Sendmail, Inc.
    Oct 2, 2013 · Proofpoint, Inc., (NASDAQ: PFPT), a leading security-as-a-service provider, today announced that it has acquired Silicon Valley based Sendmail, Inc.
  16. [16]
    The Architecture of Open Source Applications (Volume 1)Sendmail
    The first versions of the program that would become known as sendmail were written in 1980. It started as a quick hack to forward messages between different ...
  17. [17]
    [PDF] SENDMAIL — An Internetwork Mail Router
    An Internetwork Mail Router. Eric Allman*. University of California, Berkeley. Mammoth Project. ABSTRACT. Routing mail through a heterogenous ...<|control11|><|separator|>
  18. [18]
    Taking an Open Source Project to Market: A Parable of Sendmail
    In 1998, as sendmail neared a "success disaster" (where the success of the project outstrips the ability of the development team to support it), a commercial ...
  19. [19]
    [PDF] Managing Email with Brightmail - One ISP's Account
    Apr 3, 2002 · For the MTA, we chose the Sendmail Switch product, using the managed MTA software, which is based on Sendmail v 8.11. The server was ...Missing: enterprise | Show results with:enterprise
  20. [20]
    [PDF] Sendmail Installation and Operation Guide
    The configuration defines the mail delivery mechanisms understood at this site, how to access them, how to forward email to remote mail systems, and a number of ...
  21. [21]
    Sendmail X: Requirements, Architecture, Functional Specification ...
    Sep 20, 2004 · Queue manager (QMGR): controls message routing through the MTA, mail delivery, and implements general policy. SMTP server (SMTPS): Accepts ...
  22. [22]
    [PDF] SENDMAIL RELEASE NOTES $Id: RELEASE_NOTES,v 8.1909 ...
    This listing shows the version of the sendmail binary, the version of the sendmail configuration files, the date of release, and a summary of the changes in ...Missing: 1986 | Show results with:1986
  23. [23]
    MaxDaemonChildren - Sendmail, 3rd Edition [Book] - O'Reilly
    You can limit the number of forked children that the listening sendmail daemon produces by defining the MaxDaemonChildren option.Missing: scalability | Show results with:scalability
  24. [24]
    [PDF] Configuration Readme SENDMAIL CONFIGURATION FILES
    This document describes the sendmail configuration files. It explains how to create a sendmail.cf file for use with sendmail. It also describes how to set ...<|control11|><|separator|>
  25. [25]
    New and Revised m4 Configuration Macros for sendmail
    This section contains a table of new and revised m4 configuration macros for sendmail . Use the following syntax to declare these macros. symbolic_name (` value ...
  26. [26]
    Sendmail 8.12.3 cf/README - Features
    By default, only hosts listed as RELAY in the access db will be allowed to relay. This option also allows any host in your domain as defined by class {m} ...
  27. [27]
    How to Send Email in Linux from the Command Line with Sendmail ...
    Jul 11, 2024 · First, update your system packages with `sudo apt-get update`, then install sendmail using `sudo apt-get install sendmail`. Configure it ...Products That Might Interest... · Installing Mailx · Mailx Configuration Basics
  28. [28]
    BASIC INSTALLATION - Sendmail Sentrion Open Source
    There are two basic steps to installing sendmail. First, you have to compile and install the binary. If sendmail has already been ported to your operating ...
  29. [29]
    Quick-Tip: Configuring Sendmail with m4 and the sendmail.mc file
    On most Linux systems you will find Sendmail's configuration in either /etc or /etc/mail. There should be a file named sendmail.mc if you've found it you're in ...
  30. [30]
    How can I set up sendmail to forward all mail to an external MTA?
    Aug 26, 2009 · I want to set up an internal MTA (i guess with sendmail) that queues all mails, and have the internal MTA forward these emails to the external MTA.Is Postfix the same thing as Sendmail? - Server FaultSendmail delivering locally instead of to MTA in MX recordMore results from serverfault.com
  31. [31]
    Integrating Amazon SES with Sendmail - AWS Documentation
    You can download the open source version of Sendmail from the Proofpoint website, or through the package managers of most Linux distributions. The procedure in ...
  32. [32]
    How/Where To Set Sendmail Requeue Interval - Server Fault
    Mar 2, 2010 · By default SendMail is configured to retry delivery of deferred messages once every hour. I'd like to set that to be more frequent.Missing: performance | Show results with:performance
  33. [33]
    [PDF] Tile Goes Here Sentrion Message Processors - Proofpoint
    Sentrion appliances are architected to enable enterprises to modernize messaging infrastructure with an intelligent email backbone for policy-based message ...
  34. [34]
    4.6. UUCP Support - Sendmail, 3rd Edition [Book] - O'Reilly
    Note that two items in the table are marked as obsolete. This is because all their functions have been moved into the mailertable feature (FEATURE(mailertable)) ...Missing: older deprecated
  35. [35]
    Migration of Sendmail from RHEL 3 to RHEL 6
    Aug 19, 2016 · Can copy existing sendmail.cf to new mail server and restart sendmail . But this may lead to issues like deprecated configuration items and ...Missing: UUCP | Show results with:UUCP
  36. [36]
    CVE-1999-0095 Detail - NVD
    Description. The debug command in Sendmail is enabled, allowing attackers to execute commands as root. Metrics. CVSS Version 4.0
  37. [37]
    CVE-1999-0203 Detail - NVD
    Description. In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that ...Missing: RULESET parsing
  38. [38]
    CVE-2003-0285 Detail - NVD
    Jun 16, 2003 · IBM AIX 5.2 and earlier distributes Sendmail with a configuration file (sendmail.cf) with the (1) promiscuous_relay, (2) accept_unresolvable_domains, and (3) ...
  39. [39]
  40. [40]
    CVE-2006-4434 - NVD
    Aug 28, 2006 · Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long header line.
  41. [41]
    ftp.sendmail.org/past-releases/
    ftp.sendmail.org/past-releases/. This directory contains old (unsupported) versions of the sendmail 8.x source distributions. Add-ons for the open source ...Missing: Switch | Show results with:Switch
  42. [42]
    Support for Running SMTP With TLS in Version 8.13 of sendmail
    Starting in the Solaris 10 1/06 release, SMTP can use Transport Layer Security (TLS) in version 8.13 of sendmail to resolve this problem. This extended service ...
  43. [43]
    Proofpoint Sets New Industry Standard in Email Security with ...
    May 6, 2024 · Proofpoint's new semantic, AI-based detection innovations provide comprehensive protection before they can reach Microsoft 365 and Google Workplace inboxes and ...Missing: 2013 rate limiting
  44. [44]
    Email Security Service: Threat Protection Solutions | Proofpoint US
    Proofpoint stops 99.99% of email attacks, integrates with Microsoft/Google, uses AI, and stops a broad range of cyberattacks.Security Awareness Training · Get a demo · Solution Brief · How to BuyMissing: 2013 rate limiting
  45. [45]
    Securing sendmail with SSL/TLS on RHEL8
    Sep 28, 2021 · Sendmail expects separate PEM format files for key and certificate, and another for the CA chain. It also needs a CA bundle for verification ...
  46. [46]
    Solaris 11.4 - Sendmail issue after sendmail 8.18.1 update
    May 14, 2024 · Sendmail 8.18 incorporates a fix for CVE-2023-51765 which has stricter rules for blank lines: 8.18.1/8.18.1 2024/01/31 sendmail is now ...Missing: smtpd_tls_cert_file | Show results with:smtpd_tls_cert_file
  47. [47]
    How to configure DKIM & SPF & DMARC on Sendmail for multiple ...
    Oct 21, 2019 · DKIM is DomainKeys Identified Mail and is used in mail servers, such as Postfix or Sendmail to sign e-mails and thus authenticating the sender ...Missing: integration | Show results with:integration
  48. [48]
    how to monitor Linux system logs with Logwatch - VPS Mart
    Logwatch automates parsing and summarizing system logs, providing concise reports for identifying issues, security threats, and performance trends.Missing: detection phishing
  49. [49]
    results for - sendmail - CVE: Common Vulnerabilities and Exposures
    EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail options configuration page. In the location of the "sendmail" application ...