This page briefly describes how to setup sendmail to run without ever having root security
This article discusses the implementation of sendmail on the firewall and focuses on features new to sendmail 8.9.3.
This article covers the intricacies of sendmail configuration file and shows you how to generate, build, and test a config file for your firewall.
This final article in the series covers installation, optional features, and testing techniques. An example of configurations for a special situation is described.
As an exercise in the application of the concept of least privilege, we have modified the pieces of an ordinary UNIX* mail system, sendmail in particular, to require little or no privilege in their operation.
|