Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #
- # this has been tested on centos 5.x and 6.x and seems to work just fine.
- # when downloading this patch in raw mode you may need to convert it using dos2unix.
- #
- --- sendmail.mc 2012-12-09 14:21:02.000000000 -0500
- +++ sendmail.mc.gmail 2012-12-09 14:24:44.000000000 -0500
- @@ -24,6 +24,9 @@
- dnl # be sent out through an external mail server:
- dnl #
- dnl define(`SMART_HOST', `smtp.your.provider')dnl
- +define(`SMART_HOST', `smtp.gmail.com')dnl
- +define(`RELAY_MAILER_ARGS', `TCP $h 587')dnl
- +define(`ESMTP_MAILER_ARGS', `TCP $h 587')dnl
- dnl #
- define(`confDEF_USER_ID', ``8:12'')dnl
- dnl define(`confAUTO_REBUILD')dnl
- @@ -41,7 +44,7 @@
- dnl # The following allows relaying if the user authenticates, and disallows
- dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links
- dnl #
- -dnl define(`confAUTH_OPTIONS', `A p')dnl
- +define(`confAUTH_OPTIONS', `A p')dnl
- dnl #
- dnl # PLAIN is the preferred plaintext authentication method and used by
- dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do
- @@ -49,18 +52,20 @@
- dnl # guaranteed secure.
- dnl # Please remember that saslauthd needs to be running for AUTH.
- dnl #
- -dnl TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
- -dnl define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
- +TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
- +define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
- dnl #
- dnl # Rudimentary information on creating certificates for sendmail TLS:
- dnl # cd /etc/pki/tls/certs; make sendmail.pem
- dnl # Complete usage:
- dnl # make -C /etc/pki/tls/certs usage
- dnl #
- -dnl define(`confCACERT_PATH', `/etc/pki/tls/certs')dnl
- -dnl define(`confCACERT', `/etc/pki/tls/certs/ca-bundle.crt')dnl
- -dnl define(`confSERVER_CERT', `/etc/pki/tls/certs/sendmail.pem')dnl
- -dnl define(`confSERVER_KEY', `/etc/pki/tls/certs/sendmail.pem')dnl
- +define(`confCACERT_PATH', `/etc/pki/tls/certs')dnl
- +define(`confCACERT', `/etc/pki/tls/certs/ca-bundle.crt')dnl
- +define(`confSERVER_CERT', `/etc/pki/tls/certs/sendmail.pem')dnl
- +define(`confSERVER_KEY', `/etc/pki/tls/certs/sendmail.pem')dnl
- +define(`confCLIENT_CERT', `/etc/pki/tls/certs/sendmail.pem')dnl
- +define(`confCLIENT_KEY', `/etc/pki/tls/certs/sendmail.pem')dnl
- dnl #
- dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's
- dnl # slapd, which requires the file to be readble by group ldap
- @@ -75,6 +80,7 @@
- dnl FEATURE(delay_checks)dnl
- FEATURE(`no_default_msa', `dnl')dnl
- FEATURE(`smrsh', `/usr/sbin/smrsh')dnl
- +FEATURE(`authinfo', `hash -o /etc/mail/auth/client-info.db')dnl
- FEATURE(`mailertable', `hash -o /etc/mail/mailertable.db')dnl
- FEATURE(`virtusertable', `hash -o /etc/mail/virtusertable.db')dnl
- FEATURE(redirect)dnl
- @@ -113,14 +119,14 @@
- dnl # 127.0.0.1 and not on any other network devices. Remove the loopback
- dnl # address restriction to accept email from the internet or intranet.
- dnl #
- -DAEMON_OPTIONS(`Port=smtp,Addr=127.0.0.1, Name=MTA')dnl
- +DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnl
- dnl #
- dnl # The following causes sendmail to additionally listen to port 587 for
- dnl # mail from MUAs that authenticate. Roaming users who can't reach their
- dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
- dnl # this useful.
- dnl #
- -dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
- +DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
- dnl #
- dnl # The following causes sendmail to additionally listen to port 465, but
- dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed
- @@ -153,24 +159,25 @@
- dnl # Also accept email sent to "localhost.localdomain" as local email.
- dnl #
- LOCAL_DOMAIN(`localhost.localdomain')dnl
- +LOCAL_DOMAIN(`mail.int.foobar.com')dnl
- +LOCAL_DOMAIN(`int.foobar.com')dnl
- dnl #
- dnl # The following example makes mail from this host and any additional
- dnl # specified domains appear to be sent from mydomain.com
- dnl #
- -dnl MASQUERADE_AS(`mydomain.com')dnl
- +dnl # MASQUERADE_AS(`mydomain.com')dnl
- dnl #
- dnl # masquerade not just the headers, but the envelope as well
- dnl #
- -dnl FEATURE(masquerade_envelope)dnl
- +dnl # FEATURE(masquerade_envelope)dnl
- dnl #
- dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well
- dnl #
- -dnl FEATURE(masquerade_entire_domain)dnl
- +dnl # FEATURE(masquerade_entire_domain)dnl
- dnl #
- dnl MASQUERADE_DOMAIN(localhost)dnl
- dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
- -dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl
- -dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
- +dnl MASQUERADE_DOMAIN(int.foobar.com)dnl
- MAILER(smtp)dnl
- MAILER(procmail)dnl
- dnl MAILER(cyrusv2)dnl
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement