hugh at math.byu.edu
Wed Feb 9 12:41:25 MST 2000
look into sendmail's smrsh capabilities.
I believe it requires that the script to be executed is listed in
Ian Hall-Beyer wrote:
> This is vaguely off-topic, since it's on an AIX platform, but it does
> relate to sendmail..
> We have an application which does secure data exchange via e-mail, and
> requires the .forward file in this application's home directory to be as
> |"TEMPLAR_ROOT=/home/templar/templar /home/templar/templar/bin/rcvmail
> This, naturally, calls a program.
> The problem is, sendmial 8.9.3's stringent security checking is basically
> saying, "that program is a stanger and my admin told me not to talk to
> Feb 9 11:42:33 wwds7
> sendmail: LAA20938: LAA13832: DSN: /home/templar/.forward: line
> 1: |"TEMPLAR_ROOT=/home/templar/templar
> /home/templar/templar/bin/rcvma...mplar/templar/Assembly"... Address
> <templar at wwds7.boulder.ibm.com> is unsafe for mailing to programs
> and then sends the message back to me.
> Does anyone know how to tell sendmail that this stranger is OK to talk
> to? ,forward works fine with an e-mail address in it, so it doesn't appear
> to be permissions-related, and the DontBlameSendmail lines don't seem to
> help any.
> Web Page: http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
More information about the LUG