Solved

Using Sendmail and Qpopper

Posted on 2003-12-03
4
294 Views
Last Modified: 2012-08-13
Hi,

I have a Gentoo Linux system set up and want to use it as a mail server using Sendmail and Qpopper.

Sendmail is installed ok, and I can send and receive mails. However, Qpopper never sees any of the mails that get received.

Now I think this is because sendmail is placing the incoming mails in my user directories i.e. ~/.maildir (I can see them in there), and Qpopper looks in /var/spool/mail (which is always empty).

What I need to do is either configure sendmail to place the mails in /var/spool/mail or setup Qpopper to look in the local mailboxes (at least that is what I think I need to do!). I don't seem to be able to find a way of doing either of these things.

Any help appreciated

Warren
0
Comment
Question by:frostw
4 Comments
 
LVL 1

Accepted Solution

by:
moshe3 earned 500 total points
ID: 9899757
To the best of my knowledge, sendmail is using /bin/mail for local delivery (usually).

/bin/mail (also called binmail) simply concatenates the message to the recepients e-mail box (/var/spool/mail/<user>).

It seems that this maildir behaviour you see is an outcome of a different program. (I bet it's procmail).

I don't know how you have configured your sendmail.cf file. Try to locate a line that starts with
Mlocal
and see what program i listed there as the delivery agent. If you would like to work with qpopper it should be /bin/mail.

If it isn't - reconfigure sendmail by editing sendmail.cf file

Goodluck
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

This article will describe some of the best ways to process an ex-employee from an Office 365 subscription. I will describe the methods I would recommend when the data needs to be kept for the ex-employee as well as how to manage any new email as we…
Email attacks are the most efficient and effective way for cyber criminals and hackers to compromise a computer or network. We often find our-self second guessing the authenticity of an email message, for such instances we can follow practical princ…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now