Chapter 1. Some Basics
Section 1.1. Email Basics
Section 1.2. Requests for Comments (RFCs)
Section 1.3. Email and sendmail
Section 1.4. Basic Parts of sendmail
Section 1.5. Basic Parts of a Mail Message
Section 1.6. Basic Roles of sendmail
Section 1.7. Basic Modes of sendmail
Section 1.8. The sendmail.cf File
Part I: Build and Install
Chapter 2. Build and Install sendmail
Section 2.1. Vendor Versus Compiling
Section 2.2. Obtain the Source
Section 2.3. The Build Script
Section 2.4. Building with m4
Section 2.5. Build sendmail
Section 2.6. Install sendmail
Section 2.7. Pitfalls
Section 2.8. Build m4 Macro Reference
Chapter 3. Tune sendmail with Compile-Time Macros
Section 3.1. Before You Begin, a Checklist
Section 3.2. To Port, Tune, or Debug
Section 3.3. Pitfalls
Section 3.4. Compile-Time Macro Reference
Chapter 4. Configure sendmail.cf with m4
Section 4.1. The m4 Preprocessor
Section 4.2. Configure with m4
Section 4.3. m4 Macros by Function
Section 4.4. Masquerading
Section 4.5. Relays
Section 4.6. UUCP Support
Section 4.7. Pitfalls
Section 4.8. Configuration File Feature Reference
Chapter 5. Build and Use Companion Programs
Section 5.1. The Build Script
Section 5.2. The editmap Program
Section 5.3. The mail.local Delivery Agent
Section 5.4. The mailstats Program
Section 5.5. The makemap Program
Section 5.6. The praliases Program
Section 5.7. The rmail Delivery Agent
Section 5.8. The smrsh Program
Section 5.9. The vacation Program
Section 5.10. Pitfalls
Part II: Administration
Chapter 6. Tune Performance
Section 6.1. Handle Deep Queues
Section 6.2. Sidestep Slow Hosts
Section 6.3. Deliver to Files
Section 6.4. Buffered File I/O
Section 6.5. Use Multiple Queues
Section 6.6. Condition the Network
Section 6.7. Tune the Kernel
Section 6.8. Pitfalls
Chapter 7. How to Handle spam
Section 7.1. The Local_check_ Rule Sets
Section 7.2. How DNSBL Works
Section 7.3. Check Headers with Rule Sets
Section 7.4. Relaying
Section 7.5. The access Database
Section 7.6. The Milter Library
Section 7.7. Pitfalls
Chapter 8. Test Rule Sets with -bt
Section 8.1. Overview
Section 8.2. Configuration Lines
Section 8.3. Dump a sendmail Macro or Class
Section 8.4. Show an Item
Section 8.5. Complex Actions Made Simple
Section 8.6. Process-Specified Addresses
Section 8.7. Add Debugging for Detail
Section 8.8. Batch Rule-Set Testing
Section 8.9. Pitfalls
Chapter 9. DNS and sendmail
Section 9.1. Overview
Section 9.2. How sendmail Uses DNS
Section 9.3. Set Up MX Records
Section 9.4. How to Use nslookup
Section 9.5. Prepare for Disaster
Section 9.6. Pitfalls
Chapter 10. Maintain Security with sendmail
Section 10.1. Why root?
Section 10.2. The Environment
Section 10.3. SMTP Probes
Section 10.4. The Configuration File
Section 10.5. Permissions
Section 10.6. The Aliases File
Section 10.7. Forged Mail
Section 10.8. Security Features
Section 10.9. Support SMTP AUTH
Section 10.10. STARTTLS
Section 10.11. Other Security Information
Section 10.12. Pitfalls
Chapter 11. Manage the Queue
Section 11.1. Overview of the Queue
Section 11.2. Parts of a Queued Message
Section 11.3. Using Multiple Queue Directories
Section 11.4. Queue Groups (V8.12 and Above)
Section 11.5. Bogus qf Files
Section 11.6. Printing the Queue
Section 11.7. How the Queue Is Processed
Section 11.8. Cause Queues to Be Processed
Section 11.9. Process Alternate Queues
Section 11.10. Pitfalls
Section 11.11. The qf File Internals
Chapter 12. Maintain Aliases
Section 12.1. The aliases(5) File
Section 12.2. Forms of Alias Delivery
Section 12.3. Write a Delivery Agent Script
Section 12.4. Special Aliases
Section 12.5. The Aliases Database
Section 12.6. Prevent Aliasing with -n
Section 12.7. Pitfalls
Chapter 13. Mailing Lists and ~/.forward
Section 13.1. Internal Mailing Lists
Section 13.2. :include: Mailing Lists
Section 13.3. Defining a Mailing List Owner
Section 13.4. Exploder Mailing Lists
Section 13.5. Problems with Mailing Lists
Section 13.6. Packages That Help
Section 13.7. The User's ~/.forward File
Section 13.8. Pitfalls
Chapter 14. Signals, Transactions, and Syslog
Section 14.1. Signal the Daemon
Section 14.2. Log Transactions with -X
Section 14.3. Log with syslog
Section 14.4. Pitfalls
Section 14.5. Alphabetized syslog Equates
Chapter 15. The sendmail Command Line
Section 15.1. Alternative argv[0] Names
Section 15.2. Command-Line Switches
Section 15.3. List of Recipient Addresses
Section 15.4. Processing the Command Line
Section 15.5. sendmail's exit( ) Status
Section 15.6. Pitfalls
Section 15.7. Alphabetized Command-Line Switches
Chapter 16. Debug sendmail with -d
Section 16.1. The Syntax of -d
Section 16.2. The Behavior of -d
Section 16.3. Interpret the Output
Section 16.4. Table of All -d Categories
Section 16.5. Pitfalls
Section 16.6. Reference for -d in Numerical Order
Part III: The Configuration File
Chapter 17. Configuration File Overview
Section 17.1. Overall Syntax
Section 17.2. Comments
Section 17.3. V8 Comments
Section 17.4. Continuation Lines
Section 17.5. The V Configuration Command
Section 17.6. Pitfalls
Chapter 18. The R (Rules) Configuration Command
Section 18.1. Why Rules?
Section 18.2. The R Configuration Command
Section 18.3. Tokenizing Rules
Section 18.4. The Workspace
Section 18.5. The Behavior of a Rule
Section 18.6. The LHS
Section 18.7. The RHS
Section 18.8. Pitfalls
Section 18.9. Rule Operator Reference
Chapter 19. The S (Rule Sets) Configuration Command
Section 19.1. The S Configuration Command
Section 19.2. The Sequence of Rule Sets
Section 19.3. The canonify Rule Set 3
Section 19.4. The final Rule Set 4
Section 19.5. The parse Rule Set 0
Section 19.6. The localaddr Rule Set 5
Section 19.7. Rule Sets 1 and 2
Section 19.8. Pitfalls
Section 19.9. Policy Rule-Set Reference
check_data
check_etrn
check_vrfy and check_expn
srv_features
Chapter 20. The M (Mail Delivery Agent) Configuration Command
Section 20.1. The M Configuration Command
Section 20.2. The Symbolic Delivery Agent Name
Section 20.3. The mc Configuration Syntax
Section 20.4. Delivery Agents by Name
Section 20.5. Delivery Agent Equates
Section 20.6. How a Delivery Agent Is Executed
Section 20.7. Pitfalls
Section 20.8. Delivery Agent F= Flags
Chapter 21. The D (Define a Macro) Configuration Command
Section 21.1. Preassigned sendmail Macros
Section 21.2. Command-Line Definitions
Section 21.3. Configuration-File Definitions
Section 21.4. Macro Names
Section 21.5. Macro Expansion: $ and $&
Section 21.6. Macro Conditionals: $?, $|, and $.
Section 21.7. Macros with mc Configuration
Section 21.8. Pitfalls
Section 21.9. Alphabetized sendmail Macros
Chapter 22. The C and F (Class Macro) Configuration Commands
Section 22.1. Class Configuration Commands
Section 22.2. Access Classes in Rules
Section 22.3. Classes with mc Configuration
Section 22.4. Internal Class Macros
Section 22.5. Pitfalls
Section 22.6. Alphabetized Class Macros
Chapter 23. The K (Database-Map) Configuration Command
Section 23.1. Enable at Compile Time
Section 23.2. The K Configuration Command
Section 23.3. The K Command switches
Section 23.4. Use $( and $) in Rules
Section 23.5. Database Maps with mc Configuration
Section 23.6. Pitfalls
Section 23.7. Alphabetized Database-Map Types
Chapter 24. The O (Options) Configuration Command
Section 24.1. Overview
Section 24.2. Command-Line Options
Section 24.3. Configuration File Options
Section 24.4. Options in the mc File
Section 24.5. Alphabetical Table of All Options
Section 24.6. Option Argument Types
Section 24.7. Interrelating Options
Section 24.8. Pitfalls
Section 24.9. Alphabetized Options
Chapter 25. The H (Headers) Configuration Command
Section 25.1. Overview
Section 25.2. Header Names
Section 25.3. Header Field Contents
Section 25.4. ?flags? in Header Definitions
Section 25.5. Rules Check Header Contents
Section 25.6. Header Behavior in conf.c
Section 25.7. Headers and mc Configuration
Section 25.8. Headers by Category
Section 25.9. Forwarding with Resent Headers
Section 25.10. Precedence
Section 25.11. Pitfalls
Section 25.12. Alphabetized Header Reference
Part IV: Appendixes
Appendix A. The mc Configuration Macros and Directives
Appendix B. What's New Since V8.8
Appendix C. Error Message Reference
Section C.1. Where Errors Are Printed
Section C.2. Alphabetized Error Reference
Appendix D. The checkcompat( ) Cookbook
Section D.1. How checkcompat( ) Works
Section D.2. Reject Bad Body Lines
Section D.3. Reject Excess 8-Bit Characters
Appendix E. A Map to Tutorial Information
Section E.1. How to Use This Guide
Section E.2. The Guide

No comments:
Post a Comment