Sendmail Security
A mail administrator should ensure that no one should be able to get special permissions or privileges in the mail system. You should carefully consider the read, write, and execute permissions that are assigned. An unauthorized user with write access can cause considerable damage. You should provide the minimum permissions required. There are many more security measures that can strengthen sendmail security. Some of these measures are listed here:
- Check the file and directory permissions. You should ensure that users have only the minimal permissions required.
- Use the sendmail restricted shell (smrsh) program to limit the programs that can be executed in .forward, aliases, and include files.
- Use the SafeFileEnvironment option to limit where the file system mailbox files can be written.
In this tutorial:
- Linux Other Network Servers
- Setting the FTP User Account
- Configurations File for FTP Server
- ftpusers
- Anonymous FTP
- Using Proper Password and Group Files
- Anonymous FTP Warnings
- Sendmail
- Sendmail Security
- Domain Name Service
- Domain Name Space
- Services Offered By a DNS Server
- DNS Transactions
- BIND
- BIND Configuration
- Resource Records (RR)
- Start of Authority (SOA)
- nslookup
- BIND Security
- Host Name Spoofing
- Running BIND with Least Privileges
- DNS Security Extensions (DNSEC)
- SAMBA
- SMB Protocol
- Mounting the SMB File System
- SAMBA Security
- Server-Level Security