Solved

Sendmail Setup

Posted on 1998-07-12
6
253 Views
Last Modified: 2013-12-15
I am running RedHat 5.0. I was wonding if someone could help me with setting up sendmail as a POP3 server.  I am new to the setup of mail servers and web servers.
0
Comment
Question by:davidwag
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 1

Accepted Solution

by:
chytrace earned 100 total points
ID: 1628337
Hi,

  sendmail itself has nothing to do with POP3 mail access. Sendmail should be configured in a usual for handling incoming and outgoing mail messages and for local delivering. For providing POP3 at your side just check if you have POP3 entries enabled in the files:

/etc/inetd.conf
/etc/services
/etc/hosts.{allow,deny}

and in.pop3d server installed.

Hope this helps

             Radovan

0
 

Author Comment

by:davidwag
ID: 1628338
What should I put in hosts.{allow,deny}?
Currently both are empty
0
 
LVL 1

Expert Comment

by:chytrace
ID: 1628339
In the case you want to make some access restrictions you can specify which services are allowed(denied) for which host or domain or IP address. For example:

----------------------- hosts.deny ----------------------------
# hosts.deny    This file describes the names of the hosts
#               which are
#               *not* allowed to use the local INET services,
#               as decided
#               by the '/usr/sbin/tcpd' server.
#
# Version:      @(#)/etc/hosts.deny     1.00    05/28/93
#
# Author:       Fred N. van Kempen, <waltje@uwalt.nl.mugnet.org
#
#
ALL: very.bad.domain :DENY
#ALL:ALL
# End of hosts.deny.

------------------- hosts.allow -----------------------------

# hosts.allow   This file describes the names of the hosts
#               which are
#               allowed to use the local INET services,
#               as decided by
#               the '/usr/sbin/tcpd' server.
#
# Version:      @(#)/etc/hosts.allow    1.00    05/28/93
#
# Author:       Fred N. van Kempen, <waltje@uwalt.nl.mugnet.org
#
#
ALL: LOCAL :ALLOW
# My network xxx.yyy.zzz.0
ALL: xxx.yyy.zzz. :ALLOW
ALL: .my.domain :ALLOW
# Explicitly allowed the following set of INET services
in.ftpd in.talkd in.fingerd in.telnetd: .friend.domain :ALLOW
in.ftpd in.telnetd in.rlogind : host.friend.domain :ALLOW

# Friend IP network address
in.ftpd in.talkd in.fingerd in.telnetd: 111.222.333. :ALLOW

# Everything else is not allowed
ALL:ALL:DENY
# End of hosts.allow.

More info man tcpd, hosts_access(5), hosts_options(5).

Regards

               Radovan

0
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

 

Author Comment

by:davidwag
ID: 1628340
Thank alot.
0
 

Author Comment

by:davidwag
ID: 1628341
One extra comment I just thought of...Do I hurt anything by leaving these files blank?
TIA
0
 
LVL 1

Expert Comment

by:chytrace
ID: 1628342
No, by default  these files are empty. You should use TCP wrappers just in the case your system policy needs to provide access resctrictions for outside users.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux Mailserver setup & redundancy 2 119
Apache module 5 80
Fuzzy search functionality DB2 UDB 3 56
Unbreakable Oracle Linux 6.8 installation problem 9 56
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question