Solved

MAILER-DAEMON and aliases

Posted on 1998-01-27
2
728 Views
Last Modified: 2008-07-03
Hello,

How do I change the message that are sent from the MAILER-DAEMON address, when someone sends a message to an email address on my server(s) that doesn´t excist?
I run a Redhat Linux 4.2 and a Redhat Linux 5.0 server.

BTW, where is the alias file (the one that alias email addresses to excisting users) on a Linux 1.3.97 system? In Redhat it is located at /etc/aliases...but in Linux 1.3.97???

Thanks in advance.
0
Comment
Question by:thornbush
2 Comments
 
LVL 2

Expert Comment

by:jeffa072897
ID: 1587451
For the MAILER-DEAMON address look into the sendmail.cf file.
Also, dowload the source code for sendmail form www.sendmail.org. When you un-tar it in the sendmail-x.x.x/cf/cf directory is a file with all the sendmail options to build a new sendmail.cf file. If all else fails follow the doc and build a new sendmail.cf file to suit your needs.

For the aliases have you tried -

find / -name aliases -print

If you have an aliases file that should find it. In all the Linux machines I've setup the aliases file was in /etc.
If you run newaliases does it complain there is no alias files?


0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 100 total points
ID: 1587452
See  OA  option in sendmail.cf wher to find the alias file.
See  OE  option for filename with error message (default: /etc/sendmail.oE)

0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question