
This is the Title of the Book, eMatter Edition
Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.
312
|
Chapter 9: Securing Internet Email
Sendmail Information
Costales, Bryan, with Eric Allman. sendmail, Sebastopol, CA: O’Reilly, 1997.
The definitive guide to Sendmail. Chapters 19 and 34 are of particular interest,
as they concern use of the m4 macros. Most of the rest of this weighty tome cov-
ers the ugly insides of sendmail.cf.
Fennelly, Carole. “Setting up Sendmail on a Firewall, Part III.” Unix Insider 06/01/
1999 (http://www.itworld.com/Net/3314/swol-0699-security/)
Excellent article on running Sendmail 8.9 and later in a chroot environment.
Allman, Eric and Greg Shapiro. “Securing Sendmail.” (http://www.sendmail.net/
000705securitygeneral.shtml)
Describes many built-in security features in Sendmail and offers security tips
applicable to most Sendmail installations.
Durham, Mark. “Securing Sendmail on Four Types of Systems.” (http://www.
sendmail.net/000710securitytaxonomy.shtml)
Durham, Mark. “Using SMTP AUTH in Sendmail 8.10.” (http://www.sendmail.net/
usingsmtpauth.shtml)
“Using New AntiSpam Features in Sendmail 8.10.” (http://www.sendmail.net/
810usingantispam.shtml)
“SMTP STARTTLS in sendmail/Secure Switch.” (http://www.sendmail.org/~ca/email/
starttls.html)
http://mail-abuse.com/services/mds-rbl.html
Home of the Realtime Blackhole List, which is a list of known sources of UCE. ...