+++ /dev/null
-#Currently configurable parameters:
-#- srvtab (for KERBEROS_V4): [/etc/srvtab] path
-# where to find the srvtab
-#
-#- pwcheck_method: [PAM] one of {PAM, kerberos_v4, passwd, shadow, sasldb}
-# how to check plaintext passwords.
-#
-#- auto_transition: [false]
-# if true, automatically add secrets to the secret database when
-# PLAIN or check_password is used, so in the future the user can
-# use the more secure mechanisms.
-#
-#*** For a more detailed guide on configuring SASL, please look at
-#doc/sysadmin.html.
-#
-#pwcheck_method: sasldb
-pwcheck_method: PAM
-auto_transition: true
+++ /dev/null
-# /etc/mail/access
-# Copyright (c) 1998, Richard Nelson <cowboy@debian.org>.
-# Time-stamp: <1998/10/27 10:00:00 cowboy>
-# GPL'd config file, please feed any gripes, suggestions, etc. to me
-#
-# Function:
-# Access Control for this smtp server - determines:
-# * Who we accept mail from
-# * Who we accept relaying from
-# * Who we will not send to
-#
-# Usage:
-# FEATURE(access_db[, type [-o] /etc/mail/access])dnl
-# makemap hash access < access
-#
-# Format:
-# lhs:
-# email addr <user@[host.domain]>
-# domain name unless FEATURE(relay_hosts_only) is used,
-# then this is a fqdn - and relay-domains ($=R)
-# must also be fqdns.
-# network number must end on an octet boundary, or
-# you're stuck going the longwinded way ;-{
-# rhs:
-# OK accept mail even if other rules in the
-# running ruleset would reject it.
-# RELAY Allow domain to relay through your SMTP
-# server. RELAY also serves an implicit
-# OK for the other checks.
-# REJECT reject the sender/recipient with a general
-# purpose message that can be customized.
-# confREJECT_MSG [550 Access denied] will be issued
-# DISCARD discard the message completely using
-# the $#discard mailer.
-# ### any text where ### is an RFC 821 compliant error code
-# and "any text" is a message to return for
-# the command
-# Examples:
-# spammer@aol.com REJECT
-# FREE.STEALTH.MAILER@ 550 Spam not accepted
-#
-# Notes:
-# With FEATURE(blacklist_recipients) this is also possible:
-# badlocaluser 550 Mailbox disabled for this username
-# host.mydomain.com 550 That host does not accept mail
-# user@otherhost.mydomain.com 550 Mailbox disabled for this recipient
-#
-# Related:
-# define(`confREJECT_MSG', `550 Access denied')dnl
-# define(`confCR_FILE', `-o /etc/mail/relay-domains')dnl <<- $=R
-# FEATURE(relay_hosts_only)dnl
-# FEATURE(relay_entire_domain)dnl <<- relays any host in the $=m class
-# FEATURE(relay_based_on_MX)dnl <<- relaying for boxes MX'd to you
-# FEATURE(blacklist_recipients)dnl
-# FEATURE(rbl[,alternate server])dnl
-# FEATURE(orbs[,alternate server])dnl <<- Debian addition
-# FEATURE(orca[,alternate server])dnl <<- Debian addition
-# FEATURE(accept_unqualified_senders)dnl
-# FEATURE(accept_unresolvable_domains)dnl
-#
-# Local addresses 10.x.x.x, 127.x.x.x, 172.16-31.x.x 192.168.x.x can relay
-# Note Well! You *must* make sure these address can't be spoofed externally
-10 RELAY
-127 RELAY
-172.16 RELAY
-172.17 RELAY
-172.18 RELAY
-172.19 RELAY
-172.20 RELAY
-172.21 RELAY
-172.22 RELAY
-172.23 RELAY
-172.24 RELAY
-172.25 RELAY
-172.26 RELAY
-172.27 RELAY
-172.28 RELAY
-172.29 RELAY
-172.30 RELAY
-172.31 RELAY
-192.168 RELAY
-#
-# Hosts that are allowed to talk to me
-#
-#
-# Blacklisted users
-#
-reject@ REJECT
+++ /dev/null
-
-# BSDI $Id$
-
-# Sample address resolution file for checksendmail(8)
-
-# local addresses
-user
-user@hilltop
-user@hilltop.BSDI.COM
-hilltop!polk
-
-# within-domain addresses
-user@bsdi.com
-user@ibapah
-user@ibapah.bsdi.com
-ibapah!user
-
-# faraway addresses
-user@xxxxxxx.com
-user@xxxxxxx.dom
-site!user
-
-# addresses with routing, etc.
-site1!site2!user
-user@xxxxxxx.dom@bar.dom
-site!user@xxxxxxx.dom
-site!user@uunet.uu.net
+++ /dev/null
-#
-# Mail aliases for sendmail
-#
-# You must run newaliases(1) after making changes to this file.
-#
-
-# Required aliases
-postmaster: root
-MAILER-DAEMON: postmaster
-
-# Common aliases
-abuse: postmaster
-spam: postmaster
-
-# Other aliases
+++ /dev/null
-# /etc/mail/domaintable
-# Copyright (c) 1998, Richard Nelson <cowboy@debian.org>.
-# Time-stamp: <1998/10/27 10:00:00 cowboy>
-# GPL'd config file, please feed any gripes, suggestions, etc. to me
-#
-# Function:
-# Specify a mapping from old host name to new host name.
-# Commonly used to support old (or merged) domain names.
-# The host name in the lhs will be rewritten to that in the rhs
-#
-# Usage:
-# FEATURE(domaintable[, type [-o] /etc/mail/domaintable])dnl
-# makemap hash domaintable < domaintable
-#
-# Format:
-# old fqdn new fqdn
-#
-# Examples:
-# debian.com debian.org
-# .debian.com %0.debian.org
-#
-# Notes:
-#
-# Related:
-#
-#.cv.lexington.ibm.com %0.lexington.ibm.com
+++ /dev/null
-# /etc/mail/genericstable
-# Copyright (c) 1998, Richard Nelson <cowboy@debian.org>.
-# Time-stamp: <1998/10/27 10:00:00 cowboy>
-# GPL'd config file, please feed any gripes, suggestions, etc. to me
-#
-# Function:
-# Cause certain addresses originating locally (unqualified), or
-# from a domain in $=G to be rewritten based upon the map below.
-# This mapping may change both the user and domain name.
-#
-# Usage:
-# FEATURE(genericstable[, type [-o] /etc/mail/genericstable])dnl
-# makemap hash genericstable < genericstable
-#
-# Format:
-# localuser realuser@realdomain <<- implied $j or masq domain
-# user@host realuser@realhost <<- tried first
-# user[@host] realuser[@realhost]
-#
-# Examples:
-#
-# Notes:
-# * Masquerading is *required* for genericstable support!
-# * Then genericstable should only be enabled if needed as it
-# causes every sender to be looked up in the database
-# * Members of $=w are *not* automatically placed in $=G
-# * For local mail, FEATURE(always_add_domain) is necessary
-#
-# Related:
-# EXPOSED_USER(root uucp)dnl <<- these are exempt from masquerading
-# FEATURE(allmasquerade)dnl <<- rewrite recipient addrs too
-# FEATURE(always_add_domain)dnl <<- add domain to unqualified names
-# FEATURE(limited_masquerade)dnl <<- only masq domains in $=M
-# FEATURE(masquerade_envelope)dnl <<- rewrite envelope return address too
-# GENERICS_DOMAIN_FILE(`/etc/mail/sendmail.cG')dnl <<- masq From:
-#
+++ /dev/null
-# /etc/mail/mailertable
-# Copyright (c) 1998, Richard Nelson <cowboy@debian.org>.
-# Time-stamp: <1998/10/27 10:00:00 cowboy>
-# GPL'd config file, please feed any gripes, suggestions, etc. to me
-#
-# Function:
-# Specify a mapping from old host name to new host name.
-# Commonly used to support old (or merged) domain names.
-# The host name in the lhs will be rewritten to that in the rhs
-#
-# Usage:
-# FEATURE(mailertable[, type [-o] /etc/mail/mailertable])dnl
-# makemap hash mailertable < mailertable
-#
-# Format:
-# Local recipients:
-# <address> local:user
-# <address> local: <<- will use same user
-# Error messages:
-# badhost error:nohost mail to %0 is prohibited
-# .baddomain error:nohost mail to %1%0 is prohibited
-#
-# Examples:
-# Local recipients:
-# <address> local:user
-# <address> local: <<- will use same user
-# Error messages:
-# badhost error:nohost mail to %0 is prohibited
-# .baddomain error:nohost mail to %1%0 is prohibited
-#
-# Notes:
-#
-# Related:
-#
-# Address rewrites for hosts *NOT IN* class $w
-# Direct delivery, %0 is left side
-# friend.dom smtp:[%0]:[some.smart.host]
-# Direct deliver of domain, smarthost as second choice
-# .friend.dom smtp:[%1%0]:[some.smart.host]
-# Default route, via smarthost
-# . smtp:[some.smart.host]
-#
-badhost error:nohost mail to %0 is prohibited
-.baddomain error:nohost mail to %1%0 is prohibited
-#
-# Sites we deliver directly to, bypassing SMARTHOST:
-#
-# Sites that use DUL: Dialup User Lists (or equivalent)
-#aol.com esmtp:[relay]
-#primenet.com esmtp:[relay]
+++ /dev/null
-#!/usr/bin/perl
-
-#
-# Convert GECOS information in password files to alias syntax.
-#
-# Contributed by Kari E. Hurtta <Kari.Hurtta@ozone.fmi.fi>
-#
-
-print "# Generated from passwd by $0\n";
-
-$wordpat = '([a-zA-Z]+?[a-zA-Z0-9-]*)?[a-zA-Z0-9]'; # 'DB2'
-while (@a = getpwent) {
- ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$dir,$shell) = @a;
-
- ($fullname = $gcos) =~ s/,.*$//;
-
- if (!-d $dir || !-x $shell || $shell =~ m!/bin/(false|true)$!) {
- print "$name: root\n"; # handle pseudo user
- }
-
- $fullname =~ s/\.*[ _]+\.*/./g;
- $fullname =~ tr [åäéöüÅÄÖÜ] [aaeouAAOU]; # <hakan@af.lu.se> 1997-06-15
- next if (!$fullname || lc($fullname) eq $name); # avoid nonsense
- if ($fullname =~ /^$wordpat(\.$wordpat)*$/o) { # Ulrich Windl
- print "$fullname: $name\n";
- } else {
- print "# $fullname: $name\n"; # avoid strange names
- }
-};
-
-endpwent;
+++ /dev/null
-# /etc/mail/relay-domains
-# Copyright (c) 1998, Richard Nelson <cowboy@debian.org>.
-# Time-stamp: <1998/10/27 10:00:00 cowboy>
-# GPL'd config file, please feed any gripes, suggestions, etc. to me
-#
-# Function:
-# Control what hosts are allowed to relay (or be a relay)
-#
-# Usage:
-# define(`confCR_FILE', `[-o ]/etc/mail/relay-domains')dnl
-#
-# Format:
-# lhs:
-#
-# Notes:
-# Class $=R
-# These are domains unless FEATURE(relay_hosts_only) is used,
-# then these names must be fully qualified host names!
-#
-# Related:
-# FEATURE(relay_hosts_only)dnl
-# FEATURE(relay_entire_domain)dnl <<- relays any host in the $=m class
-# FEATURE(relay_based_on_MX)dnl <<- relaying for boxes MX'd to you
-# FEATURE(access_db)dnl
-# EATURE(blacklist_recipients)dnl
-# FEATURE(rbl[,alternate server])dnl
-# FEATURE(orbs[,alternate server])dnl <<- Debian addition
-# FEATURE(accept_unqualified_senders)dnl
-# FEATURE(accept_unresolvable_domains)dnl
-#
-# Hosts that I will relay to:
-#
-# Hosts that can relay to me:
-#
+++ /dev/null
-#Currently configurable parameters:
-#- srvtab (for KERBEROS_V4): [/etc/srvtab] path
-# where to find the srvtab
-#
-#- pwcheck_method: [PAM] one of {PAM, kerberos_v4, passwd, shadow, sasldb}
-# how to check plaintext passwords.
-#
-#- auto_transition: [false]
-# if true, automatically add secrets to the secret database when
-# PLAIN or check_password is used, so in the future the user can
-# use the more secure mechanisms.
-#
-#*** For a more detailed guide on configuring SASL, please look at
-#doc/sysadmin.html.
-#
-pwcheck_method: sasldb
-auto_transition: true
+++ /dev/null
-# /etc/mail/sendmail.cM
-# Copyright (c) 1998, Richard Nelson <cowboy@debian.org>.
-# Time-stamp: <1998/10/27 10:00:00 cowboy>
-# GPL'd config file, please feed any gripes, suggestions, etc. to me
-#
-# Function:
-# Specify mail domains, which when relayed, will be rewritten
-# to appear as the MASQUERADE_AS address
-#
-# Usage:
-# MASQUERADE_DOMAIN_FILE(`[-o ]/etc/mail/sendmail.cM')dnl
-#
-# Format:
-# fqdn
-#
-# Examples:
-# debian.org
-#
-# Notes:
-# Class=$M
-#
-# Related:
-# EXPOSED_USER(root uucp)dnl <<- these are exempt from masquerading
-# FEATURE(allmasquerade)dnl <<- rewrite recipient addrs too
-# FEATURE(always_add_domain)dnl <<- add domain to unqualified names
-# FEATURE(limited_masquerade)dnl <<- only masq domains in $=M
-# FEATURE(masquerade_entire_domain)dnl <<- masq all hosts under domain
-# FEATURE(masquerade_envelope)dnl <<- rewrite envelope return address too
-# GENERICS_DOMAIN_FILE(`/etc/mail/sendmail.cG')dnl <<- masq From:
-#
-# Local names
-#
+++ /dev/null
-#%PAM-1.0
-#------------------------------------------------------------------------
-#
-# /etc/pam.d/smtp
-#
-# Copyright (c) 2000-2001 Richard Nelson. All Rights Reserved.
-# Version: 2.0.0
-# Time-stamp: <2001/05/29 12:00:00 cowboy>
-#
-# PAM configuration file used by SASL to authenticate a PLAIN password.
-#
-#------------------------------------------------------------------------
-#auth sufficient pam_ldap.so
-auth required pam_unix.so nullok try_first_pass
+++ /dev/null
-# Address rewrites for incomming mail
-# user@realdomain (must be in $w) localuser (may be an alias)
-# info@foo.com foo-info
-# info@bar.com bar-info
-# @baz.org jane@elsewhere.net
-# @foo.org %1@elsewhere.com
-# @bar.org error:nouser User unknown
-#