S4Y: falsche Sendmail-Konfiguration

Krümel

Registered User
Hi,

hab nen großen Fehler gemacht und mir hats nun die Sendmailkonfiguration zerschlagen! Ich brauche die sendmail.mc (und am besten die sendmail.cf), damit der Server wieder problemlos läuft (traue mir nicht zu, sendmail neu zu installieren und Neuinstalltion kommt nicht in Frage)

Bei mir läuft folgende Version: 8.12.8, config V10/Berkeley
Kann mir dazu bitte jemand die Standardkonfig (SMTP-Auth) zuschicken?

Meine Addy: kruemelbrot@gmx.net

Das wäre echt super!!!

Gruß
Krümel
 
Mit einer anderen .cf wirst Du i.d.R. nicht glücklich... ;)

Poste doch Deine .mc. Dann können wir evtl. sagen, was Du daran ändern mußt damit es wieder läuft.
Vieleicht beschreibst Du auch, was Du gemacht hast, damit wir wissen, in welche Richtung wir suchen müssen.

huschi.
 
Hi,

danke für die schnelle Antwort. Kurze Vorgeschichte:
Da die original Konfiguration scheinbar bei mir nicht auf SMTP-Auth konfiguriert war, hatte ich einen Open-Relay, den ich mit einer Backup sendmail.cf schließen konnte. Allerdings, so S4Y, ist diese cf zu meinem Mailserver inkompatibel. Zwar arbeitet er, aber sporadisch kommen Mails nicht an und ziemlich oft bekomme ich die Fehlermeldung:
SYSERR(root): hash map "popauth": missing map file /etc/mail/popauth.db: No such file or directory

Also irgendwie paßt das alles nicht so. Jedenfalls ist die mc, die ich gleich poste (aus webmin rauskopiert) eine andere Konfiguration, als die, die jetzt läuft. Schau einfach mal drüber, ich meine SMTP-Auth ist nicht aktiviert. Wäre super, wenn du was raus kriegst.

Andere divert(-1)dnl
Andere dnl #
Andere dnl # This is the sendmail macro config file for m4. If you make changes to
Andere dnl # /etc/mail/sendmail.mc, you will need to regenerate the
Andere dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is
Andere dnl # installed and then performing a
Andere dnl #
Andere dnl # make -C /etc/mail
Andere dnl #
Andere include(`/usr/share/sendmail-cf/m4/cf.m4')dnl
Andere VERSIONID(`setup for Red Hat Linux')dnl
OS Typ OSTYPE(`linux')dnl
Andere dnl #
Andere dnl # Uncomment and edit the following line if your outgoing mail needs to
Andere dnl # be sent out through an external mail server:
Andere dnl #
Andere dnl define(`SMART_HOST',`smtp.your.provider')
Andere dnl #
Definiert define(`confDEF_USER_ID',``8:12'')dnl
Definiert define(`confTRUSTED_USER', `smmsp')dnl
Andere dnl define(`confAUTO_REBUILD')dnl
Definiert define(`confTO_CONNECT', `1m')dnl
Definiert define(`confTRY_NULL_MX_LIST',true)dnl
Definiert define(`confDONT_PROBE_INTERFACES',true)dnl
Definiert define(`PROCMAIL_MAILER_PATH',`/usr/bin/procmail')dnl
Definiert define(`ALIAS_FILE', `/etc/aliases')dnl
Andere dnl define(`STATUS_FILE', `/etc/mail/statistics')dnl
Definiert define(`UUCP_MAILER_MAX', `2000000')dnl
Definiert define(`confUSERDB_SPEC', `/etc/mail/userdb.db')dnl
Definiert define(`confPRIVACY_FLAGS', `authwarnings,novrfy,noexpn,restrictqrun')dnl
Definiert define(`confAUTH_OPTIONS',`A p')
Andere dnl #
Andere dnl # The following allows relaying if the user authenticates, and disallows
Andere dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links
Andere dnl #
Andere dnl define(`confAUTH_OPTIONS', `A p')dnl
Andere dnl #
Andere dnl # PLAIN is the preferred plaintext authentication method and used by
Andere dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do
Andere dnl # use LOGIN. Other mechanisms should be used if the connection is not
Andere dnl # guaranteed secure.
Andere dnl #
Andere TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN')dnl
Andere dnl define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
Andere dnl #
Andere dnl # Rudimentary information on creating certificates for sendmail TLS:
Andere dnl # make -C /usr/share/ssl/certs usage
Andere dnl #
Andere dnl define(`confCACERT_PATH',`/usr/share/ssl/certs')
Andere dnl define(`confCACERT',`/usr/share/ssl/certs/ca-bundle.crt')
Andere dnl define(`confSERVER_CERT',`/usr/share/ssl/certs/sendmail.pem')
Andere dnl define(`confSERVER_KEY',`/usr/share/ssl/certs/sendmail.pem')
Andere dnl #
Andere dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's
Andere dnl # slapd, which requires the file to be readble by group ldap
Andere dnl #
Andere dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekeyfile')dnl
Andere dnl #
Andere dnl define(`confTO_QUEUEWARN', `4h')dnl
Andere dnl define(`confTO_QUEUERETURN', `5d')dnl
Andere dnl define(`confQUEUE_LA', `12')dnl
Andere dnl define(`confREFUSE_LA', `18')dnl
Definiert define(`confTO_IDENT', `0')dnl
Andere dnl FEATURE(delay_checks)dnl
Feature FEATURE(`no_default_msa',`dnl')dnl
Feature FEATURE(`smrsh',`/usr/sbin/smrsh')dnl
Feature FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl
Feature FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl
Feature FEATURE(redirect)dnl
Feature FEATURE(always_add_domain)dnl
Feature FEATURE(use_cw_file)dnl
Feature FEATURE(use_ct_file)dnl
Andere dnl #
Andere dnl # The -t option will retry delivery if e.g. the user runs over his quota.
Andere dnl #
Feature FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl
Feature FEATURE(`access_db',`hash -T<TMPF> -o /etc/mail/access.db')dnl
Feature FEATURE(`blacklist_recipients')dnl
Andere EXPOSED_USER(`root')dnl
Andere dnl #
Andere dnl # The following causes sendmail to only listen on the IPv4 loopback address
Andere dnl # 127.0.0.1 and not on any other network devices. Remove the loopback
Andere dnl # address restriction to accept email from the internet or intranet.
Andere dnl #
Andere DAEMON_OPTIONS(`Port=smtp,Addr=62.75.208.41, Name=MTA')dnl
Andere dnl #
Andere dnl # The following causes sendmail to additionally listen to port 587 for
Andere dnl # mail from MUAs that authenticate. Roaming users who can't reach their
Andere dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
Andere dnl # this useful.
Andere dnl #
Andere dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
Andere dnl #
Andere dnl # The following causes sendmail to additionally listen to port 465, but
Andere dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed
Andere dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can't
Andere dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS
Andere dnl # and doesn't support the deprecated smtps; Evolution <1.1.1 uses smtps
Andere dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1.
Andere dnl #
Andere dnl # For this to work your OpenSSL certificates must be configured.
Andere dnl #
Andere dnl DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl
Andere dnl #
Andere dnl # The following causes sendmail to additionally listen on the IPv6 loopback
Andere dnl # device. Remove the loopback address restriction listen to the network.
Andere dnl #
Andere dnl # NOTE: binding both IPv4 and IPv6 daemon to the same port requires
Andere dnl # a kernel patch
Andere dnl #
Andere dnl DAEMON_OPTIONS(`port=smtp,Addr=::1, Name=MTA-v6, Family=inet6')dnl
Andere dnl #
Andere dnl # We strongly recommend not accepting unresolvable domains if you want to
Andere dnl # protect yourself from spam. However, the laptop and users on computers
Andere dnl # that do not have 24x7 DNS do need this.
Andere dnl #
Feature FEATURE(`accept_unresolvable_domains')dnl
Andere dnl #
Feature FEATURE(relay_local_from)dnl
Andere dnl #
Andere dnl # Also accept email sent to "localhost.localdomain" as local email.
Andere dnl #
Andere LOCAL_DOMAIN(`localhost.localdomain')dnl
Andere dnl #
Andere dnl # The following example makes mail from this host and any additional
Andere dnl # specified domains appear to be sent from mydomain.com
Andere dnl #
Andere dnl MASQUERADE_AS(`mydomain.com')dnl
Andere dnl #
Andere dnl # masquerade not just the headers, but the envelope as well
Andere dnl #
Andere dnl FEATURE(masquerade_envelope)dnl
Andere dnl #
Andere dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well
Andere dnl #
Andere dnl FEATURE(masquerade_entire_domain)dnl
Andere dnl #
Andere dnl MASQUERADE_DOMAIN(localhost)dnl
Andere dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
Andere dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl
Andere dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
Mailer MAILER(smtp)dnl
Mailer MAILER(procmail)dnl

Gruß
Krümel
 
Diese .mc hat offensichtlich SMTP-Auth eingeschaltet. Lediglich die Zeile
define(`confAUTH_OPTIONS',`A p')
sollte normalerweise mit einem 'dnl' abschliessen.

Teste diese .mc doch erstmal:
Backup der .cf, im Verzeichniss /etc/mail/ einmal 'make' starten und sendmail neustarten und sehen was passiert.

huschi.
 
Hi Huschi,

ok, das hab ich mal so gemacht. Das dnl hab ich auch noch hinten dran gehängt. Nachdem ich das make ausgeführt hab, kam folgende Meldung:

mv: can't stat source sendmail.cf
*** WARNING: FEATURE(`relay_local_from') may cause your system to act as open
relay. Use SMTP AUTH or STARTTLS instead. If you cannot use those,
try FEATURE(`relay_mail_from').

Und die Meldung hatte Recht, SMTP-Auth hat nicht gegriffen, ich hatte wieder einen OpenRelay. Also hab ich das relay_local_from durch relay_mail_from ersetzt. Ergebnis von make:

mv: can't stat source sendmail.cf
*** WARNING: FEATURE(`relay_mail_from') may cause your system to act as open
relay. Use SMTP AUTH or STARTTLS instead.

Ergebnis bei sendmail:
Wenn ich eine Mail ohne Authentifizierung schicken will, geht das zwar nicht mehr (kein OpenRelay mehr), allerdings gehts mit Authentifizierung auch nicht mehr! :confused:

Meldung von Outlook:
Die Nachricht konnte nicht gesendet werden, da einer der Empfänger vom Server nicht akzeptiert wurde. Die nicht akzeptierte E-Mail-Adresse ist 'me@web.de'. Betreff 'test', Konto: 'mydomain', Server: 'mydomain', Protokoll: SMTP, Serverantwort: '550 5.7.1 <me@web.de>... Relaying denied. Proper authentication required.', Anschluss: 25, Secure(SSL): Nein, Serverfehler: 550, Fehlernummer: 0x800CCC79

Das Problem hatte ich bisher immer, entweder komplett offener Mailserver oder komplett dicht, dass nix mehr rausgeht.

Hoffe du kannst mir helfen.
Gruß
Krümel
 
Ich hab die sendmail.mc mal etwas überarbeitet. Da es zuviele Änderungen waren poste ich die vollständige Datei (vorher Backup der alten Dateien machen!):
Code:
divert(-1)dnl
dnl #
dnl # This is the sendmail macro config file for m4. If you make changes to
dnl # /etc/mail/sendmail.mc, you will need to regenerate the
dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is
dnl # installed and then performing a
dnl #
dnl # make -C /etc/mail
dnl #
include(`/usr/share/sendmail-cf/m4/cf.m4')dnl
VERSIONID(`setup for Red Hat Linux')dnl
OS Typ OSTYPE(`linux')dnl
dnl #
dnl # Uncomment and edit the following line if your outgoing mail needs to
dnl # be sent out through an external mail server:
dnl #
dnl define(`SMART_HOST',`smtp.your.provider')
dnl #
define(`confDEF_USER_ID',``8:12'')dnl
define(`confTRUSTED_USER', `smmsp')dnl
define(`confAUTO_REBUILD')dnl
define(`confTO_CONNECT', `1m')dnl
define(`confTRY_NULL_MX_LIST',true)dnl
define(`confDONT_PROBE_INTERFACES',true)dnl
define(`PROCMAIL_MAILER_PATH',`/usr/bin/procmail')dnl
define(`ALIAS_FILE', `/etc/aliases')dnl
dnl define(`STATUS_FILE', `/etc/mail/statistics')dnl
define(`UUCP_MAILER_MAX', `2000000')dnl
define(`confUSERDB_SPEC', `/etc/mail/userdb.db')dnl
define(`confPRIVACY_FLAGS', `authwarnings,novrfy,noexpn,restrictqrun')dnl
define(`confAUTH_OPTIONS',`A p')
dnl #
dnl # The following allows relaying if the user authenticates, and disallows
dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links
dnl #
dnl define(`confAUTH_OPTIONS', `A p')dnl
dnl #
dnl # PLAIN is the preferred plaintext authentication method and used by
dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do
dnl # use LOGIN. Other mechanisms should be used if the connection is not
dnl # guaranteed secure.
dnl #
TRUST_AUTH_MECH(`DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
define(`confAUTH_MECHANISMS', `GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
dnl #
dnl # Rudimentary information on creating certificates for sendmail TLS:
dnl # make -C /usr/share/ssl/certs usage
dnl #
dnl define(`confCACERT_PATH',`/usr/share/ssl/certs')
dnl define(`confCACERT',`/usr/share/ssl/certs/ca-bundle.crt')
dnl define(`confSERVER_CERT',`/usr/share/ssl/certs/sendmail.pem')
dnl define(`confSERVER_KEY',`/usr/share/ssl/certs/sendmail.pem')
dnl #
dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's
dnl # slapd, which requires the file to be readble by group ldap
dnl #
dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekey file')dnl
dnl #
dnl define(`confTO_QUEUEWARN', `4h')dnl
dnl define(`confTO_QUEUERETURN', `5d')dnl
dnl define(`confQUEUE_LA', `12')dnl
dnl define(`confREFUSE_LA', `18')dnl
define(`confTO_IDENT', `0')dnl
dnl FEATURE(delay_checks)dnl
FEATURE(`no_default_msa',`dnl')dnl
FEATURE(`smrsh',`/usr/sbin/smrsh')dnl
FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl
FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl
FEATURE(redirect)dnl
FEATURE(always_add_domain)dnl
FEATURE(use_cw_file)dnl
FEATURE(use_ct_file)dnl
dnl #
dnl # The -t option will retry delivery if e.g. the user runs over his quota.
dnl #
FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl
FEATURE(`access_db',`hash -T<TMPF> -o /etc/mail/access.db')dnl
FEATURE(`blacklist_recipients')dnl
EXPOSED_USER(`root')dnl
dnl #
dnl # The following causes sendmail to only listen on the IPv4 loopback address
dnl # 127.0.0.1 and not on any other network devices. Remove the loopback
dnl # address restriction to accept email from the internet or intranet.
dnl #
dnl DAEMON_OPTIONS(`Port=smtp,Addr=62.75.208.41, Name=MTA')dnl
dnl #
dnl # The following causes sendmail to additionally listen to port 587 for
dnl # mail from MUAs that authenticate. Roaming users who can't reach their
dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
dnl # this useful.
dnl #
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
dnl #
dnl # The following causes sendmail to additionally listen to port 465, but
dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed
dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can't
dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS
dnl # and doesn't support the deprecated smtps; Evolution <1.1.1 uses smtps
dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1.
dnl #
dnl # For this to work your OpenSSL certificates must be configured.
dnl #
dnl DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl
dnl #
dnl # The following causes sendmail to additionally listen on the IPv6 loopback
dnl # device. Remove the loopback address restriction listen to the network.
dnl #
dnl # NOTE: binding both IPv4 and IPv6 daemon to the same port requires
dnl # a kernel patch
dnl #
dnl DAEMON_OPTIONS(`port=smtp,Addr=::1, Name=MTA-v6, Family=inet6')dnl
dnl #
dnl # We strongly recommend not accepting unresolvable domains if you want to
dnl # protect yourself from spam. However, the laptop and users on computers
dnl # that do not have 24x7 DNS do need this.
dnl #
FEATURE(`accept_unresolvable_domains')dnl
dnl #
dnl FEATURE(relay_local_from)dnl
dnl #
dnl # Also accept email sent to "localhost.localdomain" as local email.
dnl #
LOCAL_DOMAIN(`localhost.localdomain')dnl
dnl #
dnl # The following example makes mail from this host and any additional
dnl # specified domains appear to be sent from mydomain.com
dnl #
dnl MASQUERADE_AS(`mydomain.com')dnl
dnl #
dnl # masquerade not just the headers, but the envelope as well
dnl #
dnl FEATURE(masquerade_envelope)dnl
dnl #
dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well
dnl #
dnl FEATURE(masquerade_entire_domain)dnl
dnl #
dnl MASQUERADE_DOMAIN(localhost)dnl
dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl
dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
MAILER(smtp)dnl
MAILER(procmail)dnl

huschi.
 
Hi Huschi,

erst nochmal vielen Dank für deine Mühen, echt super.
Aber leider funktioniert es immer noch nicht. :-(

Nach einem make brachte er folgende Meldung:
WARNING: confAUTO_REBUILD is no longer valid. There was a potential for a denial of service attack if this is set.

Nachdem ich deine Config genommen habe, hat er auf Port 25 (SMTP) nicht mehr geantwortet. Hab das "dnl" vor der Zeile "DAEMON_OPTIONS(`Port=smtp,Addr=62.75.208.41, Name=MTA')" entfernt, danach konnte ich den SMTP zwar wieder ansprechen, aber er hat jede Mail nach außen mit Relaying denied abgelehnt.

Wenn du mal direkten Zugriff auf das System benötigst, schreib mich einfach mal per Mail an.

Krümel
 
Dann lass im Makro die Adresse weg, bzw. setzte sie auf 'Address=0.0.0.0'.
Evtl. ist es lediglich die Bindung an diese feste IP, die dabei stört.

huschi.
 
Das funktioniert leider auch nicht, denn dann kann ich nicht mehr auf Port 25 connecten.

Willst nicht doch mal auf das System schauen?

Krümel
 
Krümel said:
Hab das "dnl" vor der Zeile "DAEMON_OPTIONS(`Port=smtp,Addr=62.75.208.41, Name=MTA')" entfernt, danach konnte ich den SMTP zwar wieder ansprechen, aber er hat jede Mail nach außen mit Relaying denied abgelehnt.
Hast Du die lokal Domains und 'ausgehende Domains' geprüft? Dort sollten Deine Server-Domains eingetragen sein.

huschi.
 
Hi,

entschuldige die späte Antwort. Habe mittlerweile einen Testzugang beantragt, um an eine neue Konfig zu gelangen. So wie es aussieht, benutzen die aber die POPAuth. Schau mal drüber:

Other divert(-1)dnl
Other dnl #
Other dnl # This is the sendmail macro config file for m4. If you make changes to
Other dnl # /etc/mail/sendmail.mc, you will need to regenerate the
Other dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is
Other dnl # installed and then performing a
Other dnl #
Other dnl # make -C /etc/mail
Other dnl #
Other include(`/usr/share/sendmail-cf/m4/cf.m4')dnl
Other VERSIONID(`setup for Red Hat Linux')dnl
OS Type OSTYPE(`linux')dnl
Other dnl #
Other dnl # Uncomment and edit the following line if your outgoing mail needs to
Other dnl # be sent out through an external mail server:
Other dnl #
Other dnl define(`SMART_HOST',`smtp.your.provider')
Other dnl #
Define define(`confDEF_USER_ID',``8:12'')dnl
Define define(`confTRUSTED_USER', `smmsp')dnl
Other dnl define(`confAUTO_REBUILD')dnl
Define define(`confTO_CONNECT', `1m')dnl
Define define(`confTRY_NULL_MX_LIST',true)dnl
Define define(`confDONT_PROBE_INTERFACES',true)dnl
Define define(`PROCMAIL_MAILER_PATH',`/usr/bin/procmail')dnl
Define define(`ALIAS_FILE', `/etc/aliases')dnl
Other dnl define(`STATUS_FILE', `/etc/mail/statistics')dnl
Define define(`UUCP_MAILER_MAX', `2000000')dnl
Define define(`confUSERDB_SPEC', `/etc/mail/userdb.db')dnl
Define define(`confPRIVACY_FLAGS', `authwarnings,novrfy,noexpn,restrictqrun')dnl
Define define(`confAUTH_OPTIONS', `A')dnl
Define define(`POP_B4_SMTP_TAG')dnl
Other HACK(`popauth')dnl
Other dnl #
Other dnl # The following allows relaying if the user authenticates, and disallows
Other dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links
Other dnl #
Other dnl define(`confAUTH_OPTIONS', `A p')dnl
Other dnl #
Other dnl # PLAIN is the preferred plaintext authentication method and used by
Other dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do
Other dnl # use LOGIN. Other mechanisms should be used if the connection is not
Other dnl # guaranteed secure.
Other dnl #
Other TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
Define define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
Other dnl #
Other dnl # Rudimentary information on creating certificates for sendmail TLS:
Other dnl # make -C /usr/share/ssl/certs usage
Other dnl #
Other dnl define(`confCACERT_PATH',`/usr/share/ssl/certs')
Other dnl define(`confCACERT',`/usr/share/ssl/certs/ca-bundle.crt')
Other dnl define(`confSERVER_CERT',`/usr/share/ssl/certs/sendmail.pem')
Other dnl define(`confSERVER_KEY',`/usr/share/ssl/certs/sendmail.pem')
Other dnl #
Other dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's
Other dnl # slapd, which requires the file to be readble by group ldap
Other dnl #
Other dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekeyfile')dnl
Other dnl #
Other dnl define(`confTO_QUEUEWARN', `4h')dnl
Other dnl define(`confTO_QUEUERETURN', `5d')dnl
Other dnl define(`confQUEUE_LA', `12')dnl
Other dnl define(`confREFUSE_LA', `18')dnl
Define define(`confTO_IDENT', `0')dnl
Other dnl FEATURE(delay_checks)dnl
Feature FEATURE(`no_default_msa',`dnl')dnl
Feature FEATURE(`smrsh',`/usr/sbin/smrsh')dnl
Feature FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl
Feature FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl
Feature FEATURE(redirect)dnl
Feature FEATURE(always_add_domain)dnl
Feature FEATURE(use_cw_file)dnl
Feature FEATURE(use_ct_file)dnl
Other dnl #
Other dnl # The -t option will retry delivery if e.g. the user runs over his quota.
Other dnl #
Feature FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl
Feature FEATURE(`access_db',`hash -T<TMPF> -o /etc/mail/access.db')dnl
Feature FEATURE(`blacklist_recipients')dnl
Other EXPOSED_USER(`root')dnl
Other dnl #
Other dnl # The following causes sendmail to only listen on the IPv4 loopback address
Other dnl # 127.0.0.1 and not on any other network devices. Remove the loopback
Other dnl # address restriction to accept email from the internet or intranet.
Other dnl #
Other DAEMON_OPTIONS(`Port=smtp, Name=MSA, M=E')dnl
Other dnl #
Other dnl # The following causes sendmail to additionally listen to port 587 for
Other dnl # mail from MUAs that authenticate. Roaming users who can't reach their
Other dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
Other dnl # this useful.
Other dnl #
Other dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
Other dnl #
Other dnl # The following causes sendmail to additionally listen to port 465, but
Other dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed
Other dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can't
Other dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS
Other dnl # and doesn't support the deprecated smtps; Evolution <1.1.1 uses smtps
Other dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1.
Other dnl #
Other dnl # For this to work your OpenSSL certificates must be configured.
Other dnl #
Other dnl DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl
Other dnl #
Other dnl # The following causes sendmail to additionally listen on the IPv6 loopback
Other dnl # device. Remove the loopback address restriction listen to the network.
Other dnl #
Other dnl # NOTE: binding both IPv4 and IPv6 daemon to the same port requires
Other dnl # a kernel patch
Other dnl #
Other dnl DAEMON_OPTIONS(`port=smtp,Addr=::1, Name=MTA-v6, Family=inet6')dnl
Other dnl #
Other dnl # We strongly recommend not accepting unresolvable domains if you want to
Other dnl # protect yourself from spam. However, the laptop and users on computers
Other dnl # that do not have 24x7 DNS do need this.
Other dnl #
Feature FEATURE(`accept_unresolvable_domains')dnl
Other dnl #
Other dnl FEATURE(`relay_based_on_MX')dnl
Other dnl #
Other dnl # Also accept email sent to "localhost.localdomain" as local email.
Other dnl #
Other LOCAL_DOMAIN(`localhost.localdomain')dnl
Other dnl #
Other dnl # The following example makes mail from this host and any additional
Other dnl # specified domains appear to be sent from mydomain.com
Other dnl #
Other dnl MASQUERADE_AS(`mydomain.com')dnl
Other dnl #
Other dnl # masquerade not just the headers, but the envelope as well
Other dnl #
Other dnl FEATURE(masquerade_envelope)dnl
Other dnl #
Other dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well
Other dnl #
Other dnl FEATURE(masquerade_entire_domain)dnl
Other dnl #
Other dnl MASQUERADE_DOMAIN(localhost)dnl
Other dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
Other dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl
Other dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
Mailer MAILER(smtp)dnl
Mailer MAILER(procmail)dnl

So wie es aussieht, akzeptiert er von mir immer Mails, auch wenn ich die Auth für SMTP ausgeschaltet habe. Kannst du das mit der o.g. mc bestätigen? Wie kann ich das auf SMTP-Auth hinbiegen?

Laut Abuse ist der Server jedoch kein OpenRelay, auch wenn er von mir erstmal jede Mail annimmt.

Gruß
Krümel
 
Back
Top