README revision 182352
138032Speter
238032Speter			SENDMAIL RELEASE 8
338032Speter
438032SpeterThis directory has the latest sendmail(TM) software from Sendmail, Inc.
538032Speter
6157001SgshapiroReport any bugs to sendmail-bugs-YYYY@support.sendmail.org
7157001Sgshapirowhere YYYY is the current year, e.g., 2005.
838032Speter
9157001SgshapiroThere is a web site at http://www.sendmail.org/ -- see that site for
1038032Speterthe latest updates.
1138032Speter
1264562Sgshapiro+--------------+
1364562Sgshapiro| INTRODUCTION |
1464562Sgshapiro+--------------+
1538032Speter
16157001Sgshapiro0. The vast majority of queries about sendmail are answered in the
17157001Sgshapiro   README files noted below.
1864562Sgshapiro
1964562Sgshapiro1. Read this README file, especially this introduction, and the DIRECTORY
2064562Sgshapiro   PERMISSIONS sections.
2164562Sgshapiro
2280785Sgshapiro2. Read the INSTALL file in this directory.
2380785Sgshapiro
2480785Sgshapiro3. Read sendmail/README, especially:
2564562Sgshapiro   a. the introduction
2664562Sgshapiro   b. the BUILDING SENDMAIL section
2764562Sgshapiro   c. the relevant part(s) of the OPERATING SYSTEM AND COMPILE QUIRKS section
2864562Sgshapiro
2964562Sgshapiro   You may also find these useful:
3064562Sgshapiro
3190792Sgshapiro   d. sendmail/SECURITY
3290792Sgshapiro   e. devtools/README
3390792Sgshapiro   f. devtools/Site/README
3490792Sgshapiro   g. libmilter/README
3590792Sgshapiro   h. mail.local/README
3690792Sgshapiro   i. smrsh/README
3764562Sgshapiro
3880785Sgshapiro4. Read cf/README.
3964562Sgshapiro
4038032SpeterSendmail is a trademark of Sendmail, Inc.
4138032Speter
4238032Speter+-----------------------+
4338032Speter| DIRECTORY PERMISSIONS |
4438032Speter+-----------------------+
4538032Speter
4638032SpeterSendmail often gets blamed for many problems that are actually the
4738032Speterresult of other problems, such as overly permissive modes on directories.
4838032SpeterFor this reason, sendmail checks the modes on system directories and
4964562Sgshapirofiles to determine if they can be trusted.  For sendmail to run without
5064562Sgshapirocomplaining, you MUST execute the following command:
5138032Speter
5238032Speter	chmod go-w / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
5338032Speter	chown root / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
5438032Speter
5538032SpeterYou will probably have to tweak this for your environment (for example,
5638032Spetersome systems put the spool directory into /usr/spool instead of
5764562Sgshapiro/var/spool).  If you set the RunAsUser option in your sendmail.cf, the
5864562Sgshapiro/var/spool/mqueue directory will have to be owned by the RunAsUser user.
5964562SgshapiroAs a general rule, after you have compiled sendmail, run the command
6038032Speter
6138032Speter	sendmail -v -bi
6238032Speter
6338032Speterto initialize the alias database.  If it gives messages such as
6438032Speter
6538032Speter	WARNING: writable directory /etc
6664562Sgshapiro	WARNING: writable directory /var/spool/mqueue
6738032Speter
6838032Speterthen the directories listed have inappropriate write permissions and
6938032Spetershould be secured to avoid various possible security attacks.
7038032Speter
7138032SpeterBeginning with sendmail 8.9, these checks have become more strict to
7238032Speterprevent users from being able to access files they would normally not
7338032Speterbe able to read.  In particular, .forward and :include: files in unsafe
7438032Speterdirectory paths (directory paths which are group or world writable) will
7538032Speterno longer be allowed.  This would mean that if user joe's home directory
7638032Speterwas writable by group staff, sendmail would not use his .forward file.
7738032SpeterThis behavior can be altered, at the expense of system security, by
7838032Spetersetting the DontBlameSendmail option.  For example, to allow .forward
7938032Speterfiles in group writable directories:
8038032Speter
8138032Speter	O DontBlameSendmail=forwardfileingroupwritabledirpath
8238032Speter
8338032SpeterOr to allow them in both group and world writable directories:
8438032Speter
8538032Speter	O DontBlameSendmail=forwardfileinunsafedirpath
8638032Speter
8738032SpeterItems from these unsafe .forward and :include: files will be marked
8838032Speteras unsafe addresses -- the items can not be deliveries to files or
8938032Speterprograms.  This behavior can also be altered via DontBlameSendmail:
9038032Speter
9138032Speter	O DontBlameSendmail=forwardfileinunsafedirpath,
9238032Speter		forwardfileinunsafedirpathsafe
9338032Speter
9438032SpeterThe first flag allows the .forward file to be read, the second allows
9538032Speterthe items in the file to be marked as safe for file and program
9638032Speterdelivery.
9738032Speter
9838032SpeterOther files affected by this strengthened security include class
9990792Sgshapirofiles (i.e., Fw /etc/mail/local-host-names), persistent host status files,
10064562Sgshapiroand the files specified by the ErrorHeader and HelpFile options.  Similar
10138032SpeterDontBlameSendmail flags are available for the class, ErrorHeader, and
10238032SpeterHelpFile files.
10338032Speter
10438032SpeterIf you have an unsafe configuration of .forward and :include:
10538032Speterfiles, you can make it safe by finding all such files, and doing
10638032Spetera "chmod go-w $FILE" on each.  Also, do a "chmod go-w $DIR" for
10738032Spetereach directory in the file's path.
10838032Speter
10938032Speter
11098121Sgshapiro+--------------------------+
11198121Sgshapiro| FILE AND MAP PERMISSIONS |
11298121Sgshapiro+--------------------------+
11398121Sgshapiro
11498121SgshapiroAny application which uses either flock() or fcntl() style locking or
11598121Sgshapiroother APIs that use one of these locking methods (such as open() with
11698121SgshapiroO_EXLOCK and O_SHLOCK) on files readable by other local untrusted users
11798121Sgshapiromay be susceptible to local denial of service attacks.
11898121Sgshapiro
11998121SgshapiroFile locking is used throughout sendmail for a variety of files
12098121Sgshapiroincluding aliases, maps, statistics, and the pid file.  Any user who
12198121Sgshapirocan open one of these files can prevent sendmail or it's associated
12298121Sgshapiroutilities, e.g., makemap or newaliases, from operating properly.  This
12398121Sgshapirocan also affect sendmail's ability to update status files such as
12498121Sgshapirostatistics files.  For system which use flock() for file locking, a
12598121Sgshapirouser's ability to obtain an exclusive lock prevents other sendmail
12698121Sgshapiroprocesses from reading certain files such as alias or map databases.
12798121Sgshapiro
12898121SgshapiroA workaround for this problem is to protect all sendmail files such
12998121Sgshapirothat they can't be opened by untrusted users.  As long as users can
13098121Sgshapironot open a file, they can not lock it.  Since queue files should
13198121Sgshapiroalready have restricted permissions, the only files that need
13298121Sgshapiroadjustment are alias, map, statistics, and pid files.  These files
13398121Sgshapiroshould be owned by root or the trusted user specified in the
13498121SgshapiroTrustedUser option.  Changing the permissions to be only readable and
13598121Sgshapirowritable by that user is sufficient to avoid the denial of service.
13698121SgshapiroFor example, depending on the paths you use, these commands would be
13798121Sgshapiroused:
13898121Sgshapiro
13998121Sgshapiro	chmod 0640 /etc/mail/aliases /etc/mail/aliases.{db,pag,dir}
14098121Sgshapiro	chmod 0640 /etc/mail/*.{db,pag,dir}
14198121Sgshapiro	chmod 0640 /etc/mail/statistics /var/log/sendmail.st
14298121Sgshapiro	chmod 0600 /var/run/sendmail.pid /etc/mail/sendmail.pid
14398121Sgshapiro
14498121SgshapiroIf the permissions 0640 are used, be sure that only trusted users belong
14598121Sgshapiroto the group assigned to those files.  Otherwise, files should not even
14698121Sgshapirobe group readable.  As of sendmail 8.12.4, the permissions shown above
14798121Sgshapiroare the default permissions for newly created files.
14898121Sgshapiro
14998121SgshapiroNote that the denial of service on the plain text aliases file
15098121Sgshapiro(/etc/mail/aliases) only prevents newaliases from rebuilding the
15198121Sgshapiroaliases file.  The same is true for the database files on systems which
15298121Sgshapirouse fcntl() style locking.  Since it does not interfere with normal
15398121Sgshapirooperations, sites may chose to leave these files readable.  Also, it is
15498121Sgshapironot necessary to protect the text files associated with map databases
15598121Sgshapiroas makemap does not lock those files.
15698121Sgshapiro
15798121Sgshapiro
15838032Speter+-----------------------+
15938032Speter| RELATED DOCUMENTATION |
16038032Speter+-----------------------+
16138032Speter
16238032SpeterThere are other files you should read.  Rooted in this directory are:
16338032Speter
16438032Speter  FAQ
16580785Sgshapiro	The FAQ (frequently answered questions) is no longer maintained
16680785Sgshapiro	with the sendmail release.  It is available at
16780785Sgshapiro	http://www.sendmail.org/faq/ .  The file FAQ is a reminder of
16880785Sgshapiro	this and a pointer to the web page.
16964562Sgshapiro  INSTALL
17064562Sgshapiro	Installation instructions for building and installing sendmail.
17138032Speter  KNOWNBUGS
17264562Sgshapiro	Known bugs in the current release.
17338032Speter  RELEASE_NOTES
17438032Speter	A detailed description of the changes in each version.  This
17538032Speter	is quite long, but informative.
17664562Sgshapiro  sendmail/README
17738032Speter	Details on compiling and installing sendmail.
17838032Speter  cf/README
17938032Speter	Details on configuring sendmail.
18038032Speter  doc/op/op.me
181110560Sgshapiro	The sendmail Installation & Operations Guide.  In addition
182110560Sgshapiro	to the shipped PostScript version, plain text and PDF versions
183110560Sgshapiro	can be generating using (assuming the required conversion software
184110560Sgshapiro	is installed on your system, see doc/op/Makefile):
18538032Speter
186110560Sgshapiro	cd doc/op && make op.txt op.pdf
187110560Sgshapiro
188110560Sgshapiro	Be warned: on some systems calling make in doc/op/ will cause
189110560Sgshapiro	errors due to nroff/groff problems.  Known problems are:
190110560Sgshapiro	- running this off on systems with an old version of -me, you
191110560Sgshapiro	need to add the following macro to the macros:
192110560Sgshapiro
19338032Speter		.de sm
19438032Speter		\s-1\\$1\\s0\\$2
19538032Speter		..
19638032Speter
19738032Speter	This sets a word in a smaller pointsize.
19838032Speter
199110560Sgshapiro	- with new groff versions (1.18 seems affected)
20038032Speter
201110560Sgshapiro	GROFF_NO_SGR=1
202110560Sgshapiro
203110560Sgshapiro	needs to be set, e.g., in doc/op/Makefile:
204110560Sgshapiro
205110560Sgshapiro	ROFF_CMD=	GROFF_NO_SGR=1 groff
206110560Sgshapiro
207110560Sgshapiro
20838032Speter+--------------+
20938032Speter| RELATED RFCS |
21038032Speter+--------------+
21138032Speter
21238032SpeterThere are several related RFCs that you may wish to read -- they are
21364562Sgshapiroavailable via anonymous FTP to several sites.  For a list of the
21464562Sgshapiroprimary repositories see:
21538032Speter
21638032Speter	http://www.isi.edu/in-notes/rfc-retrieval.txt
21738032Speter
21838032SpeterThey are also online at:
21938032Speter
22038032Speter	http://www.ietf.org/
22138032Speter
22238032SpeterThey can also be retrieved via electronic mail by sending
22338032Speteremail to one of:
22438032Speter
22538032Speter	mail-server@nisc.sri.com
22638032Speter		Put "send rfcNNN" in message body
22738032Speter	nis-info@nis.nsf.net
22838032Speter		Put "send RFCnnn.TXT-1" in message body
22938032Speter	sendrfc@jvnc.net
23038032Speter		Put "RFCnnn" as Subject: line
23138032Speter
23238032SpeterFor further instructions see:
23338032Speter
23438032Speter	http://www.isi.edu/in-notes/rfc-editor/rfc-info
23538032Speter
23638032SpeterImportant RFCs for electronic mail are:
23738032Speter
23838032Speter	RFC821	SMTP protocol
23938032Speter	RFC822	Mail header format
24038032Speter	RFC974	MX routing
24138032Speter	RFC976	UUCP mail format
24238032Speter	RFC1123	Host requirements (modifies 821, 822, and 974)
24390792Sgshapiro	RFC1344	Implications of MIME for Internet Mail Gateways
24438032Speter	RFC1413	Identification server
24590792Sgshapiro	RFC1428	Transition of Internet Mail from Just-Send-8 to
24690792Sgshapiro		8-bit SMTP/MIME
24790792Sgshapiro	RFC1652	SMTP Service Extension for 8bit-MIMEtransport
24838032Speter	RFC1869	SMTP Service Extensions (ESMTP spec)
24938032Speter	RFC1870	SMTP Service Extension for Message Size Declaration
25038032Speter	RFC1891	SMTP Service Extension for Delivery Status Notifications
25138032Speter	RFC1892	Multipart/Report Content Type for the Reporting of
25238032Speter		Mail System Administrative Messages
25338032Speter	RFC1893	Enhanced Mail System Status Codes
25438032Speter	RFC1894	An Extensible Message Format for Delivery Status
25538032Speter		Notifications
25638032Speter	RFC1985	SMTP Service Extension for Remote Message Queue Starting
25764562Sgshapiro	RFC2033 Local Mail Transfer Protocol (LMTP)
25864562Sgshapiro	RFC2034 SMTP Service Extension for Returning Enhanced Error Codes
25990792Sgshapiro	RFC2045	Multipurpose Internet Mail Extensions (MIME) Part One:
26090792Sgshapiro		Format of Internet Message Bodies
26164562Sgshapiro	RFC2476 Message Submission
26264562Sgshapiro	RFC2487 SMTP Service Extension for Secure SMTP over TLS
26364562Sgshapiro	RFC2554 SMTP Service Extension for Authentication
26490792Sgshapiro	RFC2821 Simple Mail Transfer Protocol
26590792Sgshapiro	RFC2822 Internet Message Format
26690792Sgshapiro	RFC2852 Deliver By SMTP Service Extension
26790792Sgshapiro	RFC2920 SMTP Service Extension for Command Pipelining
26838032Speter
26938032SpeterOther standards that may be of interest (but which are less directly
27038032Speterrelevant to sendmail) are:
27138032Speter
27238032Speter	RFC987	Mapping between RFC822 and X.400
27338032Speter	RFC1049	Content-Type header field (extension to RFC822)
27438032Speter
27538032SpeterWarning to AIX users: this version of sendmail does not implement
27638032SpeterMB, MR, or MG DNS resource records, as defined (as experiments) in
27738032SpeterRFC1035.
27838032Speter
27938032Speter
28064562Sgshapiro+---------+
28164562Sgshapiro| WARNING |
28264562Sgshapiro+---------+
28364562Sgshapiro
28464562SgshapiroSince sendmail 8.11 and later includes hooks to cryptography, the
28564562Sgshapirofollowing information from OpenSSL applies to sendmail as well.
28664562Sgshapiro
28764562SgshapiroPLEASE REMEMBER THAT EXPORT/IMPORT AND/OR USE OF STRONG CRYPTOGRAPHY
28864562SgshapiroSOFTWARE, PROVIDING CRYPTOGRAPHY HOOKS OR EVEN JUST COMMUNICATING
28964562SgshapiroTECHNICAL DETAILS ABOUT CRYPTOGRAPHY SOFTWARE IS ILLEGAL IN SOME
29064562SgshapiroPARTS OF THE WORLD.  SO, WHEN YOU IMPORT THIS PACKAGE TO YOUR
29164562SgshapiroCOUNTRY, RE-DISTRIBUTE IT FROM THERE OR EVEN JUST EMAIL TECHNICAL
29264562SgshapiroSUGGESTIONS OR EVEN SOURCE PATCHES TO THE AUTHOR OR OTHER PEOPLE
29364562SgshapiroYOU ARE STRONGLY ADVISED TO PAY CLOSE ATTENTION TO ANY EXPORT/IMPORT
29490792SgshapiroAND/OR USE LAWS WHICH APPLY TO YOU.  THE AUTHORS ARE NOT LIABLE FOR
29590792SgshapiroANY VIOLATIONS YOU MAKE HERE.  SO BE CAREFUL, IT IS YOUR RESPONSIBILITY.
29664562Sgshapiro
29764562SgshapiroIf you use OpenSSL then make sure you read their README file which
29864562Sgshapirocontains information about patents etc.
29964562Sgshapiro
30064562Sgshapiro
30138032Speter+-------------------+
30238032Speter| DATABASE ROUTINES |
30338032Speter+-------------------+
30438032Speter
30538032SpeterIF YOU WANT TO RUN THE NEW BERKELEY DB SOFTWARE:  ****  DO NOT  ****
30638032Speteruse the version that was on the Net2 tape -- it has a number of
30738032Speternefarious bugs that were bad enough when I got them; you shouldn't have
30838032Speterto go through the same thing.  Instead, get a new version via the web at
30938032Speterhttp://www.sleepycat.com/.  This software is highly recommended; it gets
31038032Speterrid of several stupid limits, it's much faster, and the interface is
31138032Speternicer to animals and plants.  If the Berkeley DB include files
31238032Speterare installed in a location other than those which your compiler searches,
31338032Speteryou will need to provide that directory when building:
31438032Speter
315182352Sgshapiro	./Build -I/path/to/include/directory
31638032Speter
31738032SpeterIf you are using Berkeley DB versions 1.85 or 1.86, you are *strongly*
31864562Sgshapirourged to upgrade to DB version 2 or later, available from
31964562Sgshapirohttp://www.sleepycat.com/.  Berkeley DB versions 1.85 and 1.86 are known to
32064562Sgshapirobe broken in various nasty ways (see http://www.sleepycat.com/db.185.html),
32164562Sgshapiroand can cause sendmail to dump core.  In addition, the newest versions of
32264562Sgshapirogcc and the Solaris compilers perform optimizations in those versions that
32364562Sgshapiromay cause fairly random core dumps.
32438032Speter
32538032SpeterIf you have no choice but to use Berkeley DB 1.85 or 1.86, and you are
32638032Speterusing both Berkeley DB and files in the UNIX ndbm format, remove ndbm.h
32738032Speterand ndbm.o from the DB library after building it.  You should also apply
32838032Speterall of the patches for DB 1.85 and 1.86 found at the Sleepycat web site
32938032Speter(see http://www.sleepycat.com/db.185.html), as they fix some of the known
33038032Speterproblems.
33138032Speter
33238032SpeterIf you are using a version of Berkeley DB 2 previous to 2.3.15, and you
33338032Speterare using both Berkeley DB and files in the UNIX ndbm format, remove dbm.o
33438032Speterfrom the DB library after building it.  No other changes are necessary.
33538032Speter
33638032SpeterIf you are using Berkeley DB version 2.3.15 or greater, no changes are
33738032Speternecessary.
33838032Speter
33938032SpeterThe underlying database file formats changed between Berkeley DB versions
34064562Sgshapiro1.85 and 1.86, again between DB 1.86 and version 2.0, and finally between
34164562SgshapiroDB 2.X and 3.X.  If you are upgrading from one of those versions, you must
34264562Sgshapirorecreate your database file(s).  Do this by rebuilding all maps with
34364562Sgshapiromakemap and rebuilding the alias file with newaliases.
34438032Speter
34538032Speter
34638032Speter+--------------------+
34738032Speter| HOST NAME SERVICES |
34838032Speter+--------------------+
34938032Speter
35038032SpeterIf you are using NIS or /etc/hosts, it is critical that you
35138032Speterlist the long (fully qualified) name somewhere (preferably first) in
35238032Speterthe /etc/hosts file used to build the NIS database.  For example, the
35338032Speterline should read
35438032Speter
35538032Speter	128.32.149.68   mastodon.CS.Berkeley.EDU mastodon
35638032Speter
35738032Speter**** NOT ****
35838032Speter
35938032Speter	128.32.149.68   mastodon
36038032Speter
36138032SpeterIf you do not include the long name, sendmail will complain loudly
36238032Speterabout ``unable to qualify my own domain name (mastodon) -- using
36338032Spetershort name'' and conclude that your canonical name is the short
36438032Speterversion and use that in messages.  The name "mastodon" doesn't mean
36538032Spetermuch outside of Berkeley, and so this creates incorrect and unreplyable
36638032Spetermessages.
36738032Speter
36838032Speter
36938032Speter+-------------+
37038032Speter| USE WITH MH |
37138032Speter+-------------+
37238032Speter
37338032SpeterThis version of sendmail notices and reports certain kinds of SMTP
37438032Speterprotocol violations that were ignored by older versions.  If you
37538032Speterare running MH you may wish to install the patch in contrib/mh.patch
37638032Speterthat will prevent these warning reports.  This patch also works
37738032Speterwith the old version of sendmail, so it's safe to go ahead and
37838032Speterinstall it.
37938032Speter
38038032Speter
38138032Speter+----------------+
38238032Speter| USE WITH IDENT |
38338032Speter+----------------+
38438032Speter
38538032SpeterSendmail 8 supports the IDENT protocol, as defined by RFC 1413.
38664562SgshapiroNote that the RFC states a client should wait at least 30 seconds
38764562Sgshapirofor a response.  As of 8.10.0, the default Timeout.ident is 5 seconds
38864562Sgshapiroas many sites have adopted the practice of dropping IDENT queries.
38964562SgshapiroThis has lead to delays processing mail.
39038032Speter
39164562SgshapiroNo ident server is included with this distribution.  It is available
39264562Sgshapirofrom:
39338032Speter
39464562Sgshapiro  ftp://ftp.lysator.liu.se/pub/ident/servers/
39564562Sgshapiro  http://sf.www.lysator.liu.se/~pen/pidentd/
39638032Speter
39743730Speter+-------------------------+
39843730Speter| INTEROPERATION PROBLEMS |
39943730Speter+-------------------------+
40043730Speter
40143730SpeterMicrosoft Exchange Server 5.0
40243730Speter	We have had a report that ``about 7% of messages from Sendmail
40343730Speter	to Exchange were not being delivered with status messages of
40443730Speter	"connection reset" and "I/O error".''  Upgrading Exchange from
40543730Speter	Version 5.0 to Version 5.5 Service Pack 2 solved this problem.
40643730Speter
40764562SgshapiroCommuniGate Pro
40864562Sgshapiro	CommuniGate Pro 3.2.4 does not accept the AUTH= -parameter on
40964562Sgshapiro	the MAIL FROM command if the client is not authenticated.  Use
41043730Speter
41164562Sgshapiro		define(`confAUTH_OPTIONS', `A')
41264562Sgshapiro
41364562Sgshapiro	in .mc file if you have compiled sendmail with Cyrus SASL
41464562Sgshapiro	and you communicate with CommuniGate Pro servers.
41564562Sgshapiro
41638032Speter+---------------------+
41738032Speter| DIRECTORY STRUCTURE |
41838032Speter+---------------------+
41938032Speter
42038032SpeterThe structure of this directory tree is:
42138032Speter
42238032Spetercf		Source for sendmail configuration files.  These are
42338032Speter		different than what you've seen before.  They are a
42438032Speter		fairly dramatic rewrite, requiring the new sendmail
42538032Speter		(since they use new features).
42638032Spetercontrib		Some contributed tools to help with sendmail.  THESE
42738032Speter		ARE NOT SUPPORTED by sendmail -- contact the original
42838032Speter		authors if you have problems.  (This directory is not
42938032Speter		on the 4.4BSD tape.)
43064562Sgshapirodevtools	Build environment.  See devtools/README.
43138032Speterdoc		Documentation.  If you are getting source, read
43238032Speter		op.me -- it's long, but worth it.
43390792Sgshapiroeditmap		A program to edit and query maps that have been created
43490792Sgshapiro		with makemap, e.g., adding and deleting entries.
43564562Sgshapiroinclude		Include files used by multiple programs in the distribution.
43664562Sgshapirolibsmdb		sendmail database library with support for Berkeley DB 1.X,
43764562Sgshapiro		Berkeley DB 2.X, Berkeley DB 3.X, and NDBM.
43864562Sgshapirolibsmutil	sendmail utility library with functions used by different
43964562Sgshapiro		programs.
44038032Spetermail.local	The source for the local delivery agent used for 4.4BSD.
44138032Speter		THIS IS NOT PART OF SENDMAIL! and may not compile
44238032Speter		everywhere, since it depends on some 4.4-isms.  Warning:
44338032Speter		it does mailbox locking differently than other systems.
44464562Sgshapiromailstats	Statistics printing program.
44538032Spetermakemap		A program that creates the keyed maps used by the $( ... $)
44638032Speter		construct in sendmail.  It is primitive but effective.
44738032Speter		It takes a very simple input format, so you will probably
44838032Speter		expect to preprocess must human-convenient formats
44938032Speter		using sed scripts before this program will like them.
45038032Speter		But it should be functionally complete.
45138032Speterpraliases	A program to print the DBM or NEWDB version of the
45238032Speter		aliases file.
45338032Speterrmail		Source for rmail(8).  This is used as a delivery
45438032Speter		agent for for UUCP, and could presumably be used by
45538032Speter		other non-socket oriented mailers.  Older versions of
45638032Speter		rmail are probably deficient.  RMAIL IS NOT PART OF
45738032Speter		SENDMAIL!!!  The 4.4BSD source is included for you to
45864562Sgshapiro		look at or try to port to your system.  There is no
45964562Sgshapiro		guarantee it will even compile on your operating system.
46038032Spetersmrsh		The "sendmail restricted shell", which can be used as
46138032Speter		a replacement for /bin/sh in the prog mailer to provide
46238032Speter		increased security control.  NOT PART OF SENDMAIL!
46364562Sgshapirosendmail	Source for the sendmail program itself.
46438032Spetertest		Some test scripts (currently only for compilation aids).
46564562Sgshapirovacation	Source for the vacation program.  NOT PART OF SENDMAIL!
46664562Sgshapiro
467182352Sgshapiro$Revision: 8.94 $, Last updated $Date: 2008/02/12 16:40:05 $
468