home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


sendmail

sendmailSearch this book
Previous: 14.5 Sending Real Mail Chapter 14
Headers, Precedence, and Trust
Next: 14.7 Things to Try
 

14.6 Trusted User

A trusted user is one who has three privileges that most users don't have:

  • When mail is delivered via a program of the user's choosing (such as procmail (1)), most users need to have a valid shell in the password file. Without a valid shell, such program delivery is prohibited. Invalid shells often exist for pseudo-users such as news and for all users on restricted servers. A trusted user is exempted from this test.

  • The -f switch causes sendmail to take its idea of the sender from the command line rather than from the envelope or header. Because the -f command line switch can be used to forge mail, sendmail always inserts a warning into the message header. A trusted user is one who is exempted from having such warnings included.

    X-Authentication-Warning: here.us.edu: 
    badperson
     set sender to 
    bogusname
     using -f

  • In one of its myriad roles, sendmail can speak SMTP to another program on the same machine. That other program merely has to execute sendmail with a -bs command-line switch and talk on its standard output. The mh (1) program is one such program that can do this. If sendmail is run in this way and if the sender's address doesn't match the executing user's address, then a forged message may be in the works. When sendmail detects such a possible forgery, it inserts a warning into the message header:

    X-Authentication-Warning: here.us.edu: 
    badperson
     owned process doing -bs

    A trusted user is one who is exempted from having such warnings included.

Trusted users are declared in the configuration file in two ways:

T 

user1 user2 ....


Ct 

user1 user2 ....

The first line is the old form of declaration, and the second is the new form (beginning with V8.7 sendmail ) form. The two are equivalent, but the second is recommended. In the latter form, names of users are added to the class t .

Trusted users are declared in the client.cf file like this:

Ct root daemon

We list root because some root-run programs need to send mail under the identity of other users. We list daemon for the same reasons and because most long-running background processes are owned by the user daemon . If your local machine is set up to receive UUCP mail, you need to add uucp to this list.

Once you add trusted users to the client.cf file, you are almost ready to use that file as the official configuration file.