Skip to Main Content
Linux Server Security, Second Edition
book

Linux Server Security, Second Edition

by Michael D. Bauer
January 2005
Intermediate to advanced content levelIntermediate to advanced
544 pages
23h 44m
English
O'Reilly Media, Inc.
Content preview from Linux Server Security, Second Edition
This is the Title of the Book, eMatter Edition
Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.
Sendmail
|
259
Sendmail Architecture
As I mentioned earlier, Sendmail is monolithic in that it does all its real work with
one executable, sendmail. sendmail has two modes of operation: it can be invoked as
needed, in which case it will process any queued mail and then quit, or it can be run
as a persistent background daemon.
Daemon mode is required only when Sendmail’s role is to receive mail from external
hosts; if you just use Sendmail to send mail, you shouldn’t run sendmail as a dae-
mon. In fact, you can probably stop reading now since sendmail doesn’t really need
any customization to do this, unless you wish to run it chrooted (see the section
“Configuring Sendmail to Run Semichrooted”).
The way sendmail works, then, depends on how it’s being run. If it’s running as a
daemon (i.e., with the
-bd flag), it listens for incoming SMTP connections on TCP
port 25 and periodically tries to send out any outbound messages in its queue direc-
tory, /var/spool/mqueue. If it’s being invoked on the fly, it attempts to deliver what-
ever outbound message it’s been invoked to send and/or checks /var/spool/mqueue
for other pending outbound messages.
A Disclaimer
I’m a Postfix fan myself. I run Postfix as my domain’s public SMTP gateway (though I
do use Sendmail on my private network for local mail delivery). ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux: Powerful Server Administration

Linux: Powerful Server Administration

Uday Sawant, Oliver Pelz, Jonathan Hobson, William Leemans
Linux Server Hacks

Linux Server Hacks

Rob Flickenger
Linux Server Hacks, Volume Two

Linux Server Hacks, Volume Two

William von Hagen, Brian K. Jones

Publisher Resources

ISBN: 0596006705Supplemental ContentCatalog PageErrata