Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Sendmail cookbook
Hunt C., O’Reilly & Associates, Inc., Sebastopol, CA, 2003. 456 pp. Type: Book (9780596004712)
Date Reviewed: Aug 10 2004

Sendmail administration is a complex and sometimes daunting task. To manage sendmail, dedicated professional administrators must work on configuration files written in a language with syntactic rules. This book is not an introduction to sendmail, but rather a recipe for addressing the various issues that administrators are often confronted with. The book’s overall philosophy is to define the problem, present a solution, discuss the solution in detail, and then offer references to other problems in the book.

The first chapter is an overall introduction to sendmail, including getting the sendmail software, and compiling it for specific features that are not part of the standard configuration. Many basic functions of sendmail, like delivery, forwarding, relaying, and masquerading, are discussed in chapters 2 through 4. Routing mail via mailertable is discussed in chapter 5. An entire chapter is devoted to spamming; a few years ago, this chapter would have been absent from a book of this kind. Various problems caused by, and solutions to, this growing menace are discussed, including using access database and the domain name system (DNS) blackhole list service, and filtering mail with procmail.

Chapter 7 addresses authentication using the AUTH protocol (RFC 2554). It supports strong authentication techniques, by offering a comprehensive introduction to the topic, followed by a discussion of various problems and solutions. Chapter 8 also covers authentication and encryption, using the transport layer security (TLS) protocol, and using STARTTLS extensions based on RFC 2487. It provides an in-depth discussion of authentication and encryption issues, for example, building a private certificate authority, and certificate-related problems. However, it is not clear on which occasions one would use the solutions presented in chapters 7 and 8; both chapters address similar high-level issues, and each presents different solutions, using different approaches. Security is an important part of sendmail. Though this is discussed in several places in the book, the last chapter is dedicated to a discussion of security issues. Frequently, many Internet security problems are blamed on sendmail, and the author provides solutions to many common sendmail configuration missteps.

Overall, this book will be a blessing for sendmail system administrators, its target audience.

]]
Reviewer:  Naga Narayanaswamy Review #: CR129983 (0502-0158)
Bookmark and Share
  Featured Reviewer  
 
Sendmail (C.2.0 ... )
 
 
Electronic Mail (H.4.3 ... )
 
 
Unix (D.4.0 ... )
 
 
Communications Applications (H.4.3 )
 
 
General (D.4.0 )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Sendmail": Date
sendmail
Costales B., Allman E., Rickert N., O’Reilly & Associates, Inc., Sebastopol, CA, 1993. Type: Book (9781569520567)
Sep 1 1994
Sendmail: theory and practice
Avolio F., Vixie P., Digital Press, Newton, MA, 1995. Type: Book (9781555581275)
Nov 1 1995
Sendmail performance tuning
Christenson N., Addison-Wesley Longman Publishing Co, Inc., Boston, MA, 2002.  256, Type: Book (9780321115706)
Apr 22 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy