Solved

Setting Up E-Mail using ISP

Posted on 1997-03-11
4
187 Views
Last Modified: 2010-03-18
I'm trying ot get e-mail working with my ISP.  I have PPP working.  I can send and receive e-mail using Netscape.  I would like to be able to use sendmail and popclient.

I got everything configured and I can use popclient.  The problem arises when I'm sending e-mail.

I use "derek" as the user name on my Linux machine.  My username at my ISP is "leewo" and my e-mail address is leewo@icanect.net.  If I send any e-mail using sendmail, the From: header is set to "derek@icanect.net" which is wrong.

How can I get all my outgoing e-mail to have "leewo@icanect.net" without changing my username on my Linux machine.
0
Comment
Question by:leewo
  • 2
4 Comments
 

Expert Comment

by:timc
ID: 1584017
One simple way to do it, would just be to configure your mail program to setup a 'Reply-To:' header and include leewo@etc instead of derek@etc.  That way, when people get your mail and return it, it should point to leewo instead of derek.

Failing that simple approach, you add some sendmail rules to rewrite your mail headers which change derek@etc to leewo@icanect.net, but that starts to get complicated.

0
 

Author Comment

by:leewo
ID: 1584018
I already know about the "Reply-To" header option, but that isn't really the solution I had in mind.  Someone just casually examining an e-mail I send may still think that "derek@icanect.net" is my e-mail address.

Ideally, I would like to have "sendmail" do the rewriting, just as it put the "icanect.net" part as my domain, even though the name of my machine is "apollo"
0
 

Author Comment

by:leewo
ID: 1584019
Adjusted points to 150
0
 
LVL 1

Accepted Solution

by:
ping0621 earned 150 total points
ID: 1584020
It's easier to use smail instead of sendmail.

See http://www.ping.be/~ping0754/linux.html
At this page they explain how to configure smail.
Let me know if the page doesn't exist anymore
I have still a printout.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now