sendmail access.db by example
Wed, 02/06/2008 - 00:02 — sandipThe sendmail access database file can be created to accept or reject mail from selected domains.
Since "/etc/mail/access" is a database, after creating the text file, use makemap to create the database map.
# makemap hash /etc/mail/access.db < /etc/mail/access
Below is what my access file currently looks like and can be used as a starting point. All internal addresses have been changed except for spammers!!
# by default we allow relaying from localhost... localhost.localdomain RELAY localhost RELAY 127.0.0.1 RELAY # Allow Connect from local server IPs Connect:207.44.206.144 OK # Accept Mail # accept mail from PayPal paypal.com OK # Reject Mail posterclub@e.allposters.c om REJECT posterclub@email.allpos ters.com REJECT plastmarket.com REJECT jr@jrtr.org REJECT 7b2.606@fe01.atl2.webus enet.com REJECT mysoldpad.com REJECT # Discard Mail 1and1-private-registratio n.com DISCARD # forum admin mails: fictionaluser@gmail.com DISCARD # Reject full mailbox fictionaluser@linuxweb log.com ERROR:4.2.2:450 mailbox full fictionaluser@linuxweblog .net REJECT # Blacklist recipients linuxweblog.net ERROR:550 That host does not accept mail # Spam friend domains: exempt domains from dnsbl list checking Spam:linuxweblog.org FRIEND # Spam friend users: exempt email users from dnsbl list checking # example: # Spam:user@domain.tld FRIEND # clients Spam:fictionalclient@h otmail.com FRIEND # Auto REJECT via hourly cron added below
STARTTLS: CRLFile missing (RESOLVED)
Fri, 10/19/2007 - 10:20 — sandipWhen starting sendmail, I would get the below messgage:
Oct 18 23:59:01 srv02 sendmail[20857]: alias database /etc/aliases rebuilt by root
Oct 18 23:59:01 srv02 sendmail[20857]: /etc/aliases: 79 aliases, longest 22 bytes, 860 bytes total
Oct 18 23:59:01 srv02 sendmail[20862]: starting daemon (8.13.1): SMTP+queueing@01:00:00
Oct 18 23:59:01 srv02 sendmail[20862]: STARTTLS: CRLFile missing
Oct 18 23:59:01 srv02 sendmail[20862]: STARTTLS=server, Diffie-Hellman init, key=512 bit (1)
Oct 18 23:59:01 srv02 sendmail[20862]: STARTTLS=server, init=1
Oct 18 23:59:01 srv02 sendmail[20862]: started as: /usr/sbin/sendmail -bd -q1h
Oct 18 23:59:01 srv02 sm-msp-queue[20872]: starting daemon (8.13.1): queueing@01:00:00
Although, sendmail would still run without the CRL File and just complain about it missing. A quick way to include it in the sendmail configuration is to download revoke.crl from cacert.org, add the below option in sendmail.mc and rebuild the sendmail conf file as below.
Download revoke.crl:
# cd /usr/share/ssl/certs
# wget http://www.cacert.org/revoke.c rl
Add the below line to "/etc/mail/sendmail.mc" just below the "confSERVER_KEY":
define(`confCRL', `/usr/share/ssl/certs/revoke.c rl')
Rebuild sendmail conf by running make:
# cd /etc/mail
# make
Check sendmail.cf with the revoke.crl listed as below:
O CRLFile=/usr/share/ssl/certs/r evoke.crl
Now restarting sendmail should not complain about the missing Certificate Revocation List (CRL) File.
- sandip's blog
- Login or register to post comments
Sendmail config regeneration
Wed, 11/08/2006 - 15:09 — sandipRegenerate sendmail config:
# m4 /etc/mail/sendmail.mc > /etc/mail/sendmail.cf
Regenerate access file:
# makemap hash /etc/mail/access.db < /etc/mail/access
Generate new aliases:
# newaliases
- sandip's blog
- Login or register to post comments
Reducing Spam with milter-greylist
Fri, 10/27/2006 - 08:55 — sandipmilter-greylist is a sendmail milter which implements the greylist filtering method, as proposed by Evan Harris.
Greylisting works by assuming that, unlike legitimate MTA, spam engines will not retry sending their junk mail on a temporary error. The filter will always reject mail temporarily on a first attempt, then accept it after some time has elapsed.
So this method of greylisting works very well if used with a combination of DNS-Based Blacklisting as the spammer would have gotten blacklisted in several real-time distributed black lists before the second attempt and effectively reducing spam emails.
Below is an outline of quickly building and installing the greylist milter and configuring sendmail to use the milter. This was done on a RHEL3 box.
Check mail server for open relay
Wed, 10/18/2006 - 16:10 — sandipIf you are new to setting up a mail server be cautious that you do not open your server accidently and relay mail...
One very simple way of testing it is to run:
$ telnet relay-test.mail-abuse.org
This will attempt to connect back to your machine and run a series of mail relaying tests against it. The success or failure will be printed at the end.
You may need to turn off firewall temporarily during the test or allow for outgoing connection through the firewall.