Solved

sendmail authentication

Posted on 2003-10-26
4
332 Views
Last Modified: 2012-06-21
hi,
  I am using sendmail 8.12.10 with sasl authentications for the user.
We have to restrict some of the users to send mails outside and receiving from outside while the others should have no restrictions.
  Could anybody suggest me how to accomplish this.

  Thanks.
0
Comment
Question by:shenasar
  • 3
4 Comments
 

Author Comment

by:shenasar
ID: 9648450
Is this feature not in sendmail. Is there any other MTA supports these type of feature.  please help me to achieve this.
Thanks.
0
 
LVL 3

Accepted Solution

by:
Sandy Kalugdan earned 400 total points
ID: 9648798
Edit the /etc/mail/access file.  From this file you can restrict using IP address
Example:
User1 is using 192.168.0.1. If you want to restrict is from sending out emails from the server you would add a line in the /etc/mail/access file such as this

192.168.0.1<TAB>REJECT or simply not to include this IP address from the list.

On the other hand, if you would like to allow this user to send out emails, add this line in the /etc/mail/access

192.168.0.1<TAB>RELAY

Just make sure after editing and saving the /etc/mail/access file you issue this
makemap hash access.db<access

Now with the sendmail-8.12.10 feature of AUTHENTICATION, this can be overided.  Even IP address are not included in the access file, they can send emails simply by AUTHENTICATION first.

Hope this helps.


0
 

Author Comment

by:shenasar
ID: 9649430
hi SandyKalugdan,
    Thanks for your reply. This is ok. But there is a loop hole if the user uses other machine and then sends mails to outside. Our sendmail is configured to use user authentication. So restriction should be user based not ip based.
0
 

Author Comment

by:shenasar
ID: 9784783
Well, I did not get any proper solutions. Now we made a serparate mail server  for those people.

0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question