Solved

Multiple mail domains, single machine

Posted on 2001-09-13
6
218 Views
Last Modified: 2013-12-17
I have a single machine connected to the internet 24/7, and configured as a Sendmail mail server for a domain, say a.com. I would like to configure it as a mail server for another domain, say a.org. The problem is that I must have different accounts for each of the two domains. In other words, I would like to have the option of making an account k@a.com without an account k@a.org working, and vice versa.
I don't know if virtual hosting can do this.

My machine can use two IP's to appear as two servers to the world..
Can this be done?
0
Comment
Question by:karouri
  • 3
  • 3
6 Comments
 
LVL 3

Author Comment

by:karouri
Comment Utility
and how?
0
 
LVL 40

Accepted Solution

by:
jlevie earned 250 total points
Comment Utility
You need to look at http://www.sendmail.org/virtual-hosting.html which explains what's involved in hosting multiple domains from sendmail's perspective. There's no problem with having usernames at the virtual domains being the same or different from users in the other domains. However, the actual email accounts names must be unique across all domains. After you read the above document all of that will make a lot more sense.

Now, if you want to host virtual domains and don't want the email accounts for your virtual users to be Linux accounts that can be done by using Cyrus  and SASL to implement the client access portion (POP, IMAP) of the email system (see http://asg.web.cmu.edu/). That combination allows for the email accounts to be divorced from the Linux system authentication process and eliminates the need for each email account to have a home directory. The result of that is that you can have email accounts that don't correspond to a Linux account.

By the way the question is phrased it would seem that your virtual email accounts will be accessed by individuals that aren't within your local domain. This will present a problem if those accounts will also need to send outgoing email via your sendmail server. The cleanest and safest solution is to use SMTP AUTH (see http://www.sendmail.org/~ca/email/auth.html) and SASL to authenticate your remote users. A properly authenticated user is allowed to bypass the anti-relay restricions.
0
 
LVL 3

Author Comment

by:karouri
Comment Utility
Thanks jlevie, your answer is the thing I need and the guess is quite right.
Where can I find an good introductory how-to/ tutorial on these?
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 40

Expert Comment

by:jlevie
Comment Utility
The references that I cited above are the most complete and accurate documents that I know of. Of course the definitive reference on sendmail is the Sendmail book by O'Rielly, but one would hardly call that an introductory reference. There is some information in the Linux HowTo's also (http://howto.tucows.com/). If, after reading through the documentation above you have specific qurestions, I'd be most willing to try to answer those questions.
0
 
LVL 3

Author Comment

by:karouri
Comment Utility
Thanks jlevie for the answers.
I am now trying to do it. If I had a problem, I will post it as a seperate question..
0
 
LVL 40

Expert Comment

by:jlevie
Comment Utility
Within reason, you can ask other questions related to this on this question and I'll try to answer them here. It's your choice as to whether to open a new question or not.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

The Microsoft Exchange server database may become damaged or corrupted due to many reasons, such as system failure. When this happens, it is usually urgent to restore the system to a stable and working state. There are different symptoms and causes …
Granting full access permission allows users to access mailboxes present in their database. By giving full access permission one can open and read the content of any mailbox but cannot send emails from that mailbox.
In this video we show how to create a mailbox database in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Servers >> Data…
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now