Solved

Sendmail masquerading on Solaris 10

Posted on 2006-11-17
5
575 Views
Last Modified: 2013-12-05
Hi,
I need to setup the return address of the box on a Solaris 10 system to be user@domainname.com.
On Linux, I configured a null client setup using /etc/mail/submit.mc.

I guess the same does work on solaris. I tried an alternative approach by adding the following line to /etc/mail/sendmail.cf.


#####################################
###   SMTP Mailer specification   ###
#####################################

R$+                     $@ $1 < @ $m >          add @domainname.com
## R$+                  $@ $1 < @ *LOCAL* >             add local qualification


But now I get this error

/etc/mail/sendmail.cf: line 1335: invalid rewrite line "R+                     @ 1 < @ m >          add @domainname.com" (tab expected)

0
Comment
Question by:wfaleiro
5 Comments
 
LVL 34

Accepted Solution

by:
PsiCop earned 25 total points
ID: 17964801
Note that EE has a sendmail-specific TA --> http://www.experts-exchange.com/Networking/Email_Groupware/Sendmail/

Your first mistake is hacking sendmail.cf directly. You mention "submit.mc" on Linux, so evidently you know about the .mc macro configuration method. Why would you hack sendmail.cf directly? Use the appropriate FEATURE macros in sendmail.mc.
0
 
LVL 26

Assisted Solution

by:jar3817
jar3817 earned 25 total points
ID: 17964862
sendmail.cf is riddled with finicky whitespaces; sometimes a tab, sometimes a bunch of spaces. The error you get suggests you didn't use a tab where you were supposed to. Since no human should have to figure this out, you should do like psicop says and config sendmail using the sendmail.mc file, not the cf file.
0
 
LVL 1

Author Comment

by:wfaleiro
ID: 18277020
No solution obtained from the above posts. Kindly refund the points or split between posts.

Thanks,
--Walter
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Access_log 17 101
Adding switches as opposed to running cables 4 99
By pass website on ASA for Websense 4 56
Adding a continue option in a script 9 22
This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now