README revision 110560
138032Speter
238032Speter			SENDMAIL RELEASE 8
338032Speter
438032SpeterThis directory has the latest sendmail(TM) software from Sendmail, Inc.
538032Speter
638032SpeterReport any bugs to sendmail-bugs@sendmail.ORG
738032Speter
864562SgshapiroThere is a web site at http://WWW.Sendmail.ORG/ -- see that site for
938032Speterthe latest updates.
1038032Speter
1164562Sgshapiro+--------------+
1264562Sgshapiro| INTRODUCTION |
1364562Sgshapiro+--------------+
1438032Speter
1564562Sgshapiro0. The vast majority of queries to <sendmail-questions@sendmail.org>
1664562Sgshapiro   are answered in the README files noted below.
1764562Sgshapiro
1864562Sgshapiro1. Read this README file, especially this introduction, and the DIRECTORY
1964562Sgshapiro   PERMISSIONS sections.
2064562Sgshapiro
2180785Sgshapiro2. Read the INSTALL file in this directory.
2280785Sgshapiro
2380785Sgshapiro3. Read sendmail/README, especially:
2464562Sgshapiro   a. the introduction
2564562Sgshapiro   b. the BUILDING SENDMAIL section
2664562Sgshapiro   c. the relevant part(s) of the OPERATING SYSTEM AND COMPILE QUIRKS section
2764562Sgshapiro
2864562Sgshapiro   You may also find these useful:
2964562Sgshapiro
3090792Sgshapiro   d. sendmail/SECURITY
3190792Sgshapiro   e. devtools/README
3290792Sgshapiro   f. devtools/Site/README
3390792Sgshapiro   g. libmilter/README
3490792Sgshapiro   h. mail.local/README
3590792Sgshapiro   i. smrsh/README
3664562Sgshapiro
3780785Sgshapiro4. Read cf/README.
3864562Sgshapiro
3938032SpeterSendmail is a trademark of Sendmail, Inc.
4038032Speter
4138032Speter+-----------------------+
4238032Speter| DIRECTORY PERMISSIONS |
4338032Speter+-----------------------+
4438032Speter
4538032SpeterSendmail often gets blamed for many problems that are actually the
4638032Speterresult of other problems, such as overly permissive modes on directories.
4738032SpeterFor this reason, sendmail checks the modes on system directories and
4864562Sgshapirofiles to determine if they can be trusted.  For sendmail to run without
4964562Sgshapirocomplaining, you MUST execute the following command:
5038032Speter
5138032Speter	chmod go-w / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
5238032Speter	chown root / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
5338032Speter
5438032SpeterYou will probably have to tweak this for your environment (for example,
5538032Spetersome systems put the spool directory into /usr/spool instead of
5664562Sgshapiro/var/spool).  If you set the RunAsUser option in your sendmail.cf, the
5764562Sgshapiro/var/spool/mqueue directory will have to be owned by the RunAsUser user.
5864562SgshapiroAs a general rule, after you have compiled sendmail, run the command
5938032Speter
6038032Speter	sendmail -v -bi
6138032Speter
6238032Speterto initialize the alias database.  If it gives messages such as
6338032Speter
6438032Speter	WARNING: writable directory /etc
6564562Sgshapiro	WARNING: writable directory /var/spool/mqueue
6638032Speter
6738032Speterthen the directories listed have inappropriate write permissions and
6838032Spetershould be secured to avoid various possible security attacks.
6938032Speter
7038032SpeterBeginning with sendmail 8.9, these checks have become more strict to
7138032Speterprevent users from being able to access files they would normally not
7238032Speterbe able to read.  In particular, .forward and :include: files in unsafe
7338032Speterdirectory paths (directory paths which are group or world writable) will
7438032Speterno longer be allowed.  This would mean that if user joe's home directory
7538032Speterwas writable by group staff, sendmail would not use his .forward file.
7638032SpeterThis behavior can be altered, at the expense of system security, by
7738032Spetersetting the DontBlameSendmail option.  For example, to allow .forward
7838032Speterfiles in group writable directories:
7938032Speter
8038032Speter	O DontBlameSendmail=forwardfileingroupwritabledirpath
8138032Speter
8238032SpeterOr to allow them in both group and world writable directories:
8338032Speter
8438032Speter	O DontBlameSendmail=forwardfileinunsafedirpath
8538032Speter
8638032SpeterItems from these unsafe .forward and :include: files will be marked
8738032Speteras unsafe addresses -- the items can not be deliveries to files or
8838032Speterprograms.  This behavior can also be altered via DontBlameSendmail:
8938032Speter
9038032Speter	O DontBlameSendmail=forwardfileinunsafedirpath,
9138032Speter		forwardfileinunsafedirpathsafe
9238032Speter
9338032SpeterThe first flag allows the .forward file to be read, the second allows
9438032Speterthe items in the file to be marked as safe for file and program
9538032Speterdelivery.
9638032Speter
9738032SpeterOther files affected by this strengthened security include class
9890792Sgshapirofiles (i.e., Fw /etc/mail/local-host-names), persistent host status files,
9964562Sgshapiroand the files specified by the ErrorHeader and HelpFile options.  Similar
10038032SpeterDontBlameSendmail flags are available for the class, ErrorHeader, and
10138032SpeterHelpFile files.
10238032Speter
10338032SpeterIf you have an unsafe configuration of .forward and :include:
10438032Speterfiles, you can make it safe by finding all such files, and doing
10538032Spetera "chmod go-w $FILE" on each.  Also, do a "chmod go-w $DIR" for
10638032Spetereach directory in the file's path.
10738032Speter
10838032Speter
10998121Sgshapiro+--------------------------+
11098121Sgshapiro| FILE AND MAP PERMISSIONS |
11198121Sgshapiro+--------------------------+
11298121Sgshapiro
11398121SgshapiroAny application which uses either flock() or fcntl() style locking or
11498121Sgshapiroother APIs that use one of these locking methods (such as open() with
11598121SgshapiroO_EXLOCK and O_SHLOCK) on files readable by other local untrusted users
11698121Sgshapiromay be susceptible to local denial of service attacks.
11798121Sgshapiro
11898121SgshapiroFile locking is used throughout sendmail for a variety of files
11998121Sgshapiroincluding aliases, maps, statistics, and the pid file.  Any user who
12098121Sgshapirocan open one of these files can prevent sendmail or it's associated
12198121Sgshapiroutilities, e.g., makemap or newaliases, from operating properly.  This
12298121Sgshapirocan also affect sendmail's ability to update status files such as
12398121Sgshapirostatistics files.  For system which use flock() for file locking, a
12498121Sgshapirouser's ability to obtain an exclusive lock prevents other sendmail
12598121Sgshapiroprocesses from reading certain files such as alias or map databases.
12698121Sgshapiro
12798121SgshapiroA workaround for this problem is to protect all sendmail files such
12898121Sgshapirothat they can't be opened by untrusted users.  As long as users can
12998121Sgshapironot open a file, they can not lock it.  Since queue files should
13098121Sgshapiroalready have restricted permissions, the only files that need
13198121Sgshapiroadjustment are alias, map, statistics, and pid files.  These files
13298121Sgshapiroshould be owned by root or the trusted user specified in the
13398121SgshapiroTrustedUser option.  Changing the permissions to be only readable and
13498121Sgshapirowritable by that user is sufficient to avoid the denial of service.
13598121SgshapiroFor example, depending on the paths you use, these commands would be
13698121Sgshapiroused:
13798121Sgshapiro
13898121Sgshapiro	chmod 0640 /etc/mail/aliases /etc/mail/aliases.{db,pag,dir}
13998121Sgshapiro	chmod 0640 /etc/mail/*.{db,pag,dir}
14098121Sgshapiro	chmod 0640 /etc/mail/statistics /var/log/sendmail.st
14198121Sgshapiro	chmod 0600 /var/run/sendmail.pid /etc/mail/sendmail.pid
14298121Sgshapiro
14398121SgshapiroIf the permissions 0640 are used, be sure that only trusted users belong
14498121Sgshapiroto the group assigned to those files.  Otherwise, files should not even
14598121Sgshapirobe group readable.  As of sendmail 8.12.4, the permissions shown above
14698121Sgshapiroare the default permissions for newly created files.
14798121Sgshapiro
14898121SgshapiroNote that the denial of service on the plain text aliases file
14998121Sgshapiro(/etc/mail/aliases) only prevents newaliases from rebuilding the
15098121Sgshapiroaliases file.  The same is true for the database files on systems which
15198121Sgshapirouse fcntl() style locking.  Since it does not interfere with normal
15298121Sgshapirooperations, sites may chose to leave these files readable.  Also, it is
15398121Sgshapironot necessary to protect the text files associated with map databases
15498121Sgshapiroas makemap does not lock those files.
15598121Sgshapiro
15698121Sgshapiro
15738032Speter+-----------------------+
15838032Speter| RELATED DOCUMENTATION |
15938032Speter+-----------------------+
16038032Speter
16138032SpeterThere are other files you should read.  Rooted in this directory are:
16238032Speter
16338032Speter  FAQ
16480785Sgshapiro	The FAQ (frequently answered questions) is no longer maintained
16580785Sgshapiro	with the sendmail release.  It is available at
16680785Sgshapiro	http://www.sendmail.org/faq/ .  The file FAQ is a reminder of
16780785Sgshapiro	this and a pointer to the web page.
16864562Sgshapiro  INSTALL
16964562Sgshapiro	Installation instructions for building and installing sendmail.
17038032Speter  KNOWNBUGS
17164562Sgshapiro	Known bugs in the current release.
17238032Speter  RELEASE_NOTES
17338032Speter	A detailed description of the changes in each version.  This
17438032Speter	is quite long, but informative.
17564562Sgshapiro  sendmail/README
17638032Speter	Details on compiling and installing sendmail.
17738032Speter  cf/README
17838032Speter	Details on configuring sendmail.
17938032Speter  doc/op/op.me
180110560Sgshapiro	The sendmail Installation & Operations Guide.  In addition
181110560Sgshapiro	to the shipped PostScript version, plain text and PDF versions
182110560Sgshapiro	can be generating using (assuming the required conversion software
183110560Sgshapiro	is installed on your system, see doc/op/Makefile):
18438032Speter
185110560Sgshapiro	cd doc/op && make op.txt op.pdf
186110560Sgshapiro
187110560Sgshapiro	Be warned: on some systems calling make in doc/op/ will cause
188110560Sgshapiro	errors due to nroff/groff problems.  Known problems are:
189110560Sgshapiro	- running this off on systems with an old version of -me, you
190110560Sgshapiro	need to add the following macro to the macros:
191110560Sgshapiro
19238032Speter		.de sm
19338032Speter		\s-1\\$1\\s0\\$2
19438032Speter		..
19538032Speter
19638032Speter	This sets a word in a smaller pointsize.
19738032Speter
198110560Sgshapiro	- with new groff versions (1.18 seems affected)
19938032Speter
200110560Sgshapiro	GROFF_NO_SGR=1
201110560Sgshapiro
202110560Sgshapiro	needs to be set, e.g., in doc/op/Makefile:
203110560Sgshapiro
204110560Sgshapiro	ROFF_CMD=	GROFF_NO_SGR=1 groff
205110560Sgshapiro
206110560Sgshapiro
20738032Speter+--------------+
20838032Speter| RELATED RFCS |
20938032Speter+--------------+
21038032Speter
21138032SpeterThere are several related RFCs that you may wish to read -- they are
21264562Sgshapiroavailable via anonymous FTP to several sites.  For a list of the
21364562Sgshapiroprimary repositories see:
21438032Speter
21538032Speter	http://www.isi.edu/in-notes/rfc-retrieval.txt
21638032Speter
21738032SpeterThey are also online at:
21838032Speter
21938032Speter	http://www.ietf.org/
22038032Speter
22138032SpeterThey can also be retrieved via electronic mail by sending
22238032Speteremail to one of:
22338032Speter
22438032Speter	mail-server@nisc.sri.com
22538032Speter		Put "send rfcNNN" in message body
22638032Speter	nis-info@nis.nsf.net
22738032Speter		Put "send RFCnnn.TXT-1" in message body
22838032Speter	sendrfc@jvnc.net
22938032Speter		Put "RFCnnn" as Subject: line
23038032Speter
23138032SpeterFor further instructions see:
23238032Speter
23338032Speter	http://www.isi.edu/in-notes/rfc-editor/rfc-info
23438032Speter
23538032SpeterImportant RFCs for electronic mail are:
23638032Speter
23738032Speter	RFC821	SMTP protocol
23838032Speter	RFC822	Mail header format
23938032Speter	RFC974	MX routing
24038032Speter	RFC976	UUCP mail format
24138032Speter	RFC1123	Host requirements (modifies 821, 822, and 974)
24290792Sgshapiro	RFC1344	Implications of MIME for Internet Mail Gateways
24338032Speter	RFC1413	Identification server
24490792Sgshapiro	RFC1428	Transition of Internet Mail from Just-Send-8 to
24590792Sgshapiro		8-bit SMTP/MIME
24690792Sgshapiro	RFC1652	SMTP Service Extension for 8bit-MIMEtransport
24738032Speter	RFC1869	SMTP Service Extensions (ESMTP spec)
24838032Speter	RFC1870	SMTP Service Extension for Message Size Declaration
24938032Speter	RFC1891	SMTP Service Extension for Delivery Status Notifications
25038032Speter	RFC1892	Multipart/Report Content Type for the Reporting of
25138032Speter		Mail System Administrative Messages
25238032Speter	RFC1893	Enhanced Mail System Status Codes
25338032Speter	RFC1894	An Extensible Message Format for Delivery Status
25438032Speter		Notifications
25538032Speter	RFC1985	SMTP Service Extension for Remote Message Queue Starting
25664562Sgshapiro	RFC2033 Local Mail Transfer Protocol (LMTP)
25764562Sgshapiro	RFC2034 SMTP Service Extension for Returning Enhanced Error Codes
25890792Sgshapiro	RFC2045	Multipurpose Internet Mail Extensions (MIME) Part One:
25990792Sgshapiro		Format of Internet Message Bodies
26064562Sgshapiro	RFC2476 Message Submission
26164562Sgshapiro	RFC2487 SMTP Service Extension for Secure SMTP over TLS
26264562Sgshapiro	RFC2554 SMTP Service Extension for Authentication
26390792Sgshapiro	RFC2821 Simple Mail Transfer Protocol
26490792Sgshapiro	RFC2822 Internet Message Format
26590792Sgshapiro	RFC2852 Deliver By SMTP Service Extension
26690792Sgshapiro	RFC2920 SMTP Service Extension for Command Pipelining
26738032Speter
26838032SpeterOther standards that may be of interest (but which are less directly
26938032Speterrelevant to sendmail) are:
27038032Speter
27138032Speter	RFC987	Mapping between RFC822 and X.400
27238032Speter	RFC1049	Content-Type header field (extension to RFC822)
27338032Speter
27438032SpeterWarning to AIX users: this version of sendmail does not implement
27538032SpeterMB, MR, or MG DNS resource records, as defined (as experiments) in
27638032SpeterRFC1035.
27738032Speter
27838032Speter
27964562Sgshapiro+---------+
28064562Sgshapiro| WARNING |
28164562Sgshapiro+---------+
28264562Sgshapiro
28364562SgshapiroSince sendmail 8.11 and later includes hooks to cryptography, the
28464562Sgshapirofollowing information from OpenSSL applies to sendmail as well.
28564562Sgshapiro
28664562SgshapiroPLEASE REMEMBER THAT EXPORT/IMPORT AND/OR USE OF STRONG CRYPTOGRAPHY
28764562SgshapiroSOFTWARE, PROVIDING CRYPTOGRAPHY HOOKS OR EVEN JUST COMMUNICATING
28864562SgshapiroTECHNICAL DETAILS ABOUT CRYPTOGRAPHY SOFTWARE IS ILLEGAL IN SOME
28964562SgshapiroPARTS OF THE WORLD.  SO, WHEN YOU IMPORT THIS PACKAGE TO YOUR
29064562SgshapiroCOUNTRY, RE-DISTRIBUTE IT FROM THERE OR EVEN JUST EMAIL TECHNICAL
29164562SgshapiroSUGGESTIONS OR EVEN SOURCE PATCHES TO THE AUTHOR OR OTHER PEOPLE
29264562SgshapiroYOU ARE STRONGLY ADVISED TO PAY CLOSE ATTENTION TO ANY EXPORT/IMPORT
29390792SgshapiroAND/OR USE LAWS WHICH APPLY TO YOU.  THE AUTHORS ARE NOT LIABLE FOR
29490792SgshapiroANY VIOLATIONS YOU MAKE HERE.  SO BE CAREFUL, IT IS YOUR RESPONSIBILITY.
29564562Sgshapiro
29664562SgshapiroIf you use OpenSSL then make sure you read their README file which
29764562Sgshapirocontains information about patents etc.
29864562Sgshapiro
29964562Sgshapiro
30038032Speter+-------------------+
30138032Speter| DATABASE ROUTINES |
30238032Speter+-------------------+
30338032Speter
30438032SpeterIF YOU WANT TO RUN THE NEW BERKELEY DB SOFTWARE:  ****  DO NOT  ****
30538032Speteruse the version that was on the Net2 tape -- it has a number of
30638032Speternefarious bugs that were bad enough when I got them; you shouldn't have
30738032Speterto go through the same thing.  Instead, get a new version via the web at
30838032Speterhttp://www.sleepycat.com/.  This software is highly recommended; it gets
30938032Speterrid of several stupid limits, it's much faster, and the interface is
31038032Speternicer to animals and plants.  If the Berkeley DB include files
31138032Speterare installed in a location other than those which your compiler searches,
31238032Speteryou will need to provide that directory when building:
31338032Speter
31438032Speter	Build -I/path/to/include/directory
31538032Speter
31638032SpeterIf you are using Berkeley DB versions 1.85 or 1.86, you are *strongly*
31764562Sgshapirourged to upgrade to DB version 2 or later, available from
31864562Sgshapirohttp://www.sleepycat.com/.  Berkeley DB versions 1.85 and 1.86 are known to
31964562Sgshapirobe broken in various nasty ways (see http://www.sleepycat.com/db.185.html),
32064562Sgshapiroand can cause sendmail to dump core.  In addition, the newest versions of
32164562Sgshapirogcc and the Solaris compilers perform optimizations in those versions that
32264562Sgshapiromay cause fairly random core dumps.
32338032Speter
32438032SpeterIf you have no choice but to use Berkeley DB 1.85 or 1.86, and you are
32538032Speterusing both Berkeley DB and files in the UNIX ndbm format, remove ndbm.h
32638032Speterand ndbm.o from the DB library after building it.  You should also apply
32738032Speterall of the patches for DB 1.85 and 1.86 found at the Sleepycat web site
32838032Speter(see http://www.sleepycat.com/db.185.html), as they fix some of the known
32938032Speterproblems.
33038032Speter
33138032SpeterIf you are using a version of Berkeley DB 2 previous to 2.3.15, and you
33238032Speterare using both Berkeley DB and files in the UNIX ndbm format, remove dbm.o
33338032Speterfrom the DB library after building it.  No other changes are necessary.
33438032Speter
33538032SpeterIf you are using Berkeley DB version 2.3.15 or greater, no changes are
33638032Speternecessary.
33738032Speter
33838032SpeterThe underlying database file formats changed between Berkeley DB versions
33964562Sgshapiro1.85 and 1.86, again between DB 1.86 and version 2.0, and finally between
34064562SgshapiroDB 2.X and 3.X.  If you are upgrading from one of those versions, you must
34164562Sgshapirorecreate your database file(s).  Do this by rebuilding all maps with
34264562Sgshapiromakemap and rebuilding the alias file with newaliases.
34338032Speter
34438032Speter
34538032Speter+--------------------+
34638032Speter| HOST NAME SERVICES |
34738032Speter+--------------------+
34838032Speter
34938032SpeterIf you are using NIS or /etc/hosts, it is critical that you
35038032Speterlist the long (fully qualified) name somewhere (preferably first) in
35138032Speterthe /etc/hosts file used to build the NIS database.  For example, the
35238032Speterline should read
35338032Speter
35438032Speter	128.32.149.68   mastodon.CS.Berkeley.EDU mastodon
35538032Speter
35638032Speter**** NOT ****
35738032Speter
35838032Speter	128.32.149.68   mastodon
35938032Speter
36038032SpeterIf you do not include the long name, sendmail will complain loudly
36138032Speterabout ``unable to qualify my own domain name (mastodon) -- using
36238032Spetershort name'' and conclude that your canonical name is the short
36338032Speterversion and use that in messages.  The name "mastodon" doesn't mean
36438032Spetermuch outside of Berkeley, and so this creates incorrect and unreplyable
36538032Spetermessages.
36638032Speter
36738032Speter
36838032Speter+-------------+
36938032Speter| USE WITH MH |
37038032Speter+-------------+
37138032Speter
37238032SpeterThis version of sendmail notices and reports certain kinds of SMTP
37338032Speterprotocol violations that were ignored by older versions.  If you
37438032Speterare running MH you may wish to install the patch in contrib/mh.patch
37538032Speterthat will prevent these warning reports.  This patch also works
37638032Speterwith the old version of sendmail, so it's safe to go ahead and
37738032Speterinstall it.
37838032Speter
37938032Speter
38038032Speter+----------------+
38138032Speter| USE WITH IDENT |
38238032Speter+----------------+
38338032Speter
38438032SpeterSendmail 8 supports the IDENT protocol, as defined by RFC 1413.
38564562SgshapiroNote that the RFC states a client should wait at least 30 seconds
38664562Sgshapirofor a response.  As of 8.10.0, the default Timeout.ident is 5 seconds
38764562Sgshapiroas many sites have adopted the practice of dropping IDENT queries.
38864562SgshapiroThis has lead to delays processing mail.
38938032Speter
39064562SgshapiroNo ident server is included with this distribution.  It is available
39164562Sgshapirofrom:
39238032Speter
39364562Sgshapiro  ftp://ftp.lysator.liu.se/pub/ident/servers/
39464562Sgshapiro  http://sf.www.lysator.liu.se/~pen/pidentd/
39538032Speter
39643730Speter+-------------------------+
39743730Speter| INTEROPERATION PROBLEMS |
39843730Speter+-------------------------+
39943730Speter
40043730SpeterMicrosoft Exchange Server 5.0
40143730Speter	We have had a report that ``about 7% of messages from Sendmail
40243730Speter	to Exchange were not being delivered with status messages of
40343730Speter	"connection reset" and "I/O error".''  Upgrading Exchange from
40443730Speter	Version 5.0 to Version 5.5 Service Pack 2 solved this problem.
40543730Speter
40664562SgshapiroCommuniGate Pro
40764562Sgshapiro	CommuniGate Pro 3.2.4 does not accept the AUTH= -parameter on
40864562Sgshapiro	the MAIL FROM command if the client is not authenticated.  Use
40943730Speter
41064562Sgshapiro		define(`confAUTH_OPTIONS', `A')
41164562Sgshapiro
41264562Sgshapiro	in .mc file if you have compiled sendmail with Cyrus SASL
41364562Sgshapiro	and you communicate with CommuniGate Pro servers.
41464562Sgshapiro
41538032Speter+---------------------+
41638032Speter| DIRECTORY STRUCTURE |
41738032Speter+---------------------+
41838032Speter
41938032SpeterThe structure of this directory tree is:
42038032Speter
42138032Spetercf		Source for sendmail configuration files.  These are
42238032Speter		different than what you've seen before.  They are a
42338032Speter		fairly dramatic rewrite, requiring the new sendmail
42438032Speter		(since they use new features).
42538032Spetercontrib		Some contributed tools to help with sendmail.  THESE
42638032Speter		ARE NOT SUPPORTED by sendmail -- contact the original
42738032Speter		authors if you have problems.  (This directory is not
42838032Speter		on the 4.4BSD tape.)
42964562Sgshapirodevtools	Build environment.  See devtools/README.
43038032Speterdoc		Documentation.  If you are getting source, read
43138032Speter		op.me -- it's long, but worth it.
43290792Sgshapiroeditmap		A program to edit and query maps that have been created
43390792Sgshapiro		with makemap, e.g., adding and deleting entries.
43464562Sgshapiroinclude		Include files used by multiple programs in the distribution.
43564562Sgshapirolibsmdb		sendmail database library with support for Berkeley DB 1.X,
43664562Sgshapiro		Berkeley DB 2.X, Berkeley DB 3.X, and NDBM.
43764562Sgshapirolibsmutil	sendmail utility library with functions used by different
43864562Sgshapiro		programs.
43938032Spetermail.local	The source for the local delivery agent used for 4.4BSD.
44038032Speter		THIS IS NOT PART OF SENDMAIL! and may not compile
44138032Speter		everywhere, since it depends on some 4.4-isms.  Warning:
44238032Speter		it does mailbox locking differently than other systems.
44364562Sgshapiromailstats	Statistics printing program.
44438032Spetermakemap		A program that creates the keyed maps used by the $( ... $)
44538032Speter		construct in sendmail.  It is primitive but effective.
44638032Speter		It takes a very simple input format, so you will probably
44738032Speter		expect to preprocess must human-convenient formats
44838032Speter		using sed scripts before this program will like them.
44938032Speter		But it should be functionally complete.
45038032Speterpraliases	A program to print the DBM or NEWDB version of the
45138032Speter		aliases file.
45238032Speterrmail		Source for rmail(8).  This is used as a delivery
45338032Speter		agent for for UUCP, and could presumably be used by
45438032Speter		other non-socket oriented mailers.  Older versions of
45538032Speter		rmail are probably deficient.  RMAIL IS NOT PART OF
45638032Speter		SENDMAIL!!!  The 4.4BSD source is included for you to
45764562Sgshapiro		look at or try to port to your system.  There is no
45864562Sgshapiro		guarantee it will even compile on your operating system.
45938032Spetersmrsh		The "sendmail restricted shell", which can be used as
46038032Speter		a replacement for /bin/sh in the prog mailer to provide
46138032Speter		increased security control.  NOT PART OF SENDMAIL!
46264562Sgshapirosendmail	Source for the sendmail program itself.
46338032Spetertest		Some test scripts (currently only for compilation aids).
46464562Sgshapirovacation	Source for the vacation program.  NOT PART OF SENDMAIL!
46564562Sgshapiro
466110560Sgshapiro$Revision: 8.90.2.1 $, Last updated $Date: 2002/11/09 23:32:28 $
467