Useful Tables
Two tables are of interest for aiding the suppression of spam:
Relay Features
Several mc
configuration features
affect
relaying. Table 7-1 lists the features that
determine how mail will, or will not, be relayed.
Table 7-1. Relay features
Feature |
sendmail text reference |
Description |
---|---|---|
|
7.5[3ed] |
Screen addresses and set policy |
|
7.4.2[3ed] |
Allow percent-hack relaying |
|
7.4.3[3ed] |
Allow all relaying |
|
7.4.4[3ed] |
Relay for any site for which you are an MX server |
|
7.4.5[3ed] |
Relay based on |
|
7.4.6[3ed] |
Interpret domains in relay-domains and access database as hosts |
|
7.4.7[3ed] |
Relay if SMTP MAIL domain is in |
|
7.4.8[3ed] |
Relay if SMTP MAIL address is |
Access Database Righthand-Side Values
The access
database was introduced in V8.9
sendmail
and improved upon in V8.10. It provides
a single, central database with rules to accept, reject, and discard
messages based on the sender name, address, or IP number. It is
enabled with the access_db
feature.[11]
In Table 7-2, we list the possible
access
database
righthand-side values (which can be keywords or values) and describe the affect each has ...
Get sendmail 8.13 Companion now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.