Solved

Is there a way to get sendmail to log traffic on AIX?

Posted on 2011-03-24
5
880 Views
Last Modified: 2012-08-13

I am using an AIX server to relay smtp messages from one subnet to our main Smart relay host. I am also trying to send mail through it using a java application on our webserver. The Java application complains that the "Domain" can't be found for my "FROM" field????   I think this is a setting in the java application but I want to rule out any other reasons so I would like to capture the traffic that goes to my sendmail relay to make sure that NOTHING is going through there... can this be done? and are there log files for sendmail?
0
Comment
Question by:bganoush
  • 2
  • 2
5 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 35210061
Domain: If sendmail cannot determine your domain from /etc/resolv.conf set a domain in the "Dj" macro of sendmail.cf

Logging: To get the highest logging level add an entry to /etc/syslog.conf like

mail.debug   /var/adm/mail.log

Issue

touch   /var/adm/mail.log

and

refresh -s syslogd
refresh -s sendmail

/var/adm/mail.log will contain your sendmail log.

wmp
0
 

Author Comment

by:bganoush
ID: 35210090

How do you use Dj?
0
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 35210133
In /etc/mail/sendmail.cf:

Dj$w.mydomain.com

$w contains the respective hostname from

"Dw" or "Cw" or "Fw". See the appropriate comments in /etc/mail/sendmail.cf.


0
 
LVL 5

Expert Comment

by:balasundaram_s
ID: 35216036
Is your Java Application using "javamail" to send the e-mails ?  In that case, sendmail does not play a major role here.
0
 

Author Comment

by:bganoush
ID: 35367511

Thanks, it turns out that the server did not have an MX entry so the domain I was using to send "from" errored out with a "domain not found" error... The logs worked fine.. thanks.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Microsoft Outlook is not just an email client but it is full featured Personal Information Manager. But sometimes Outlook gets disconnected and you simply can’t access it. What steps can you perform before calling IT support? In this article we will…
Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now