⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 op.ps

📁 早期freebsd实现
💻 PS
📖 第 1 页 / 共 5 页
字号:
(This technique is used to impro)102 120 Q .3 -.15(ve p)-.15 H(erformance.).15E -1.1(Yo)127 136.2 S 2.5(uc)1.1 G(an also use)150.06 136.2 Q/F3 9/Times-Roman@0 SF(NIS)2.5 E F1(-based alias \214les.)A -.15(Fo)5 G 2.5(re).15 G(xample, the speci\214cation:)305.069 136.2 Q -.35(OA)142 152.4 S(/etc/aliases).35 E -.35(OA)142 164.4 S(nis:mail.aliases@my).35 E(.nis.domain)-.65 E 1.725(w\ill \214rst search the /etc/aliases \214le and then the map named \231mail.ali\ases\232 in \231my)102 180.6 R(.nis.domain\232.)-.65 E -.8(Wa)102 192.6 S .589(rning: if you b).8 F .589(uild your o)-.2 F(wn)-.25 E F3(NIS)3.089 E F1 .589(-based alias \214les, be sure to pro)B .59(vide the)-.15 F F0<ad6c>3.09 E F1.59(\215ag to)3.09 F F2(mak)3.09 E(edbm)-.1 E F1(\(8\))A .159(to map upper case letters in the k)102 204.6 R -.15(ey)-.1 G 2.659(st).15 G2.659(ol)253.552 204.6 S -.25(ow)263.991 204.6 S .159(er case; otherwise, aliases with upper case letters in their).25 F(names w)102216.6 Q(on')-.1 E 2.5(tm)-.18 G(atch incoming addresses.)163.38 216.6 Q(Additional \215ags can be added after the colon e)127 232.8 Q(xactly lik)-.15E 2.5(ea)-.1 G F0(K)A F1(line \212 for e)2.5 E(xample:)-.15 E -.35(OA)142 249 S(nis:-N mail.aliases@my).35 E(.nis.domain)-.65 E(will search the appropriate NIS map and al)102 265.2 Q -.1(wa)-.1 G(ys include null bytes in the k).1 E -.15(ey)-.1 G(.)-.5 E F0 2.5(2.3.1. Reb)102 289.2 R(uilding the alias database)-.2 E F1 .542(The DB or DBM v)142 305.4R .542(ersion of the database may be reb)-.15 F .542(uilt e)-.2 F .542(xplicitly by e)-.15 F -.15(xe)-.15 G .542(cuting the com-).15 F(mand)117 317.4Q(ne)157 333.6 Q -.1(wa)-.25 G(liases).1 E(This is equi)117 349.8 Q -.25(va)-.25 G(lent to gi).25 E(ving)-.25 E F2(sendmail)2.5 E F1(the)2.5 E F0(\255bi)2.5 E F1(\215ag:)2.5 E(/usr/sbin/sendmail \255bi)157 366 Q .26(If the \231D\232 option is speci\214ed in the con\214guration,)142 386.4 R F2(sendmail)2.759 E F1 .259(will reb)2.759 F .259(uild the alias database)-.2 F1.92(automatically if possible when it is out of date.)117 398.4 R(Auto-reb)6.921 E 1.921(uild can be dangerous on hea)-.2 F(vily)-.2 E 1.451(loaded machines with lar)117 410.4 R 1.451(ge alias \214les; if it might tak)-.18 F 3.951(em)-.1 G 1.45(ore than \214v)355.66 410.4 R 3.95(em)-.15 G 1.45(inutes to reb)420.13 410.4 R 1.45(uild the)-.2 F(database, there is a chance that se)117 422.4 Q -.15(ve)-.25 G(ral processes will start the reb).15 E(uild process simultaneously)-.2 E(.)-.65 E 1.77(If you ha)142 438.6 R 2.07 -.15(ve m)-.2 H 1.77(ultiple aliases databases speci\214ed, the).15 F F0(\255bi)4.27 E F1 1.77(\215ag reb)4.27 F 1.77(uilds all the database)-.2 F(types it understands \(for e)117 450.6 Q(xample, it can reb)-.15 E(uild dbm databases b)-.2 E(ut not nis databases\).)-.2 E F0 2.5(2.3.2. P)102474.6 R(otential pr)-.2 E(oblems)-.18 E F1 1.131(There are a number of problems that can occur with the alias database.)142490.8 R(The)6.13 E 3.63(ya)-.15 G 1.13(ll result)472.59 490.8 R 1.103(from a)117 502.8 R F2(sendmail)3.603 E F1 1.103(process accessing the DBM v)3.603 F1.103(ersion while it is only partially b)-.15 F 3.604(uilt. This)-.2 F(can)3.604 E 1.249(happen under tw)117 514.8 R 3.749(oc)-.1 G 1.248(ircumstances: One process accesses the database while another process is)199.237 514.8 R(reb)117 526.8 Q .518(uilding it, or the process reb)-.2 F .518(uilding the database dies \(due to being killed or a system crash\))-.2 F(before completing the reb)117 538.8 Q(uild.)-.2 E .793(Sendmail has tw)142 555R 3.293(ot)-.1 G .792(echniques to try to relie)220.669 555 R 1.092 -.15(ve t)-.25 H .792(hese problems.).15 F .792(First, it ignores interrupts)5.792 F .045(while reb)117 567 R .045(uilding the database; this a)-.2 F -.2(vo)-.2 G .045(ids the problem of someone aborting the process lea).2 F .045(ving a)-.2 F(partially reb)117 579 Q(uilt database.)-.2 E(Second, at the end of the reb)5 E(uild it adds an alias of the form)-.2 E(@: @)157 595.2 Q .336(\(which is not normally le)117 611.4 R -.05(ga)-.15 G 2.836(l\). Before).05 FF2(sendmail)2.836 E F1 .336(will access the database, it checks to insure that)2.836 F(this entry e)117 625.4 Q(xists)-.15 E/F4 7/Times-Roman@0 SF(5)179.63621.4 Q F1(.)183.13 625.4 Q F0 2.5(2.3.3. List)102 649.4 R -.1(ow)2.5 G(ners).1E F1 .4(If an error occurs on sending to a certain address, say \231)142 665.6R F2(x)A F1<9a2c>A F2(sendmail)2.901 E F1 .401(will look for an alias)2.901 F.418(of the form \231o)117 677.6 R(wner)-.25 E(-)-.2 E F2(x)A F1 2.918<9a74>C2.918(or)212.632 677.6 S(ecei)223.88 677.6 Q .718 -.15(ve t)-.25 H .418(he errors.).15 F .417(This is typically useful for a mailing list where the)5.418 F .32 LW 76 687.2 72 687.2 DL 80 687.2 76 687.2 DL 84 687.2 80 687.2 DL88 687.2 84 687.2 DL 92 687.2 88 687.2 DL 96 687.2 92 687.2 DL 100 687.2 96687.2 DL 104 687.2 100 687.2 DL 108 687.2 104 687.2 DL 112 687.2 108 687.2 DL116 687.2 112 687.2 DL 120 687.2 116 687.2 DL 124 687.2 120 687.2 DL 128 687.2124 687.2 DL 132 687.2 128 687.2 DL 136 687.2 132 687.2 DL 140 687.2 136 687.2DL 144 687.2 140 687.2 DL 148 687.2 144 687.2 DL 152 687.2 148 687.2 DL 156687.2 152 687.2 DL 160 687.2 156 687.2 DL 164 687.2 160 687.2 DL 168 687.2 164687.2 DL 172 687.2 168 687.2 DL 176 687.2 172 687.2 DL 180 687.2 176 687.2 DL184 687.2 180 687.2 DL 188 687.2 184 687.2 DL 192 687.2 188 687.2 DL 196 687.2192 687.2 DL 200 687.2 196 687.2 DL 204 687.2 200 687.2 DL 208 687.2 204 687.2DL 212 687.2 208 687.2 DL 216 687.2 212 687.2 DL/F5 5/Times-Roman@0 SF(5)93.6697.6 Q/F6 8/Times-Roman@0 SF(The \231a\232 option is required in the con\214g\uration for this action to occur)3.2 I 4(.T)-.44 G(his should normally be speci\214ed.)329.18 700.8 Q EP%%Page: 15 10%%BeginPageSetupBP%%EndPageSetup/F0 10/Times-Bold@0 SF(Sendmail Installation and Operation Guide)72 60 Q(SMM:08-15)452.9 60 Q/F1 10/Times-Roman@0 SF 1.116(submitter of the list has no control o)117 96 R -.15(ve)-.15 G 3.617(rt).15 G1.117(he maintenance of the list itself; in this case the list)288.4 96 R(maintainer w)117 108 Q(ould be the o)-.1 E(wner of the list.)-.25 E -.15(Fo)5G 2.5(re).15 G(xample:)309.38 108 Q(unix-wizards: eric@ucbarpa, wnj@monet, nosuchuser)157 124.2 Q(,)-.4 E(sam@matisse)193 136.2 Q -.25(ow)157 148.2 S(ner).25 E(-unix-wizards: eric@ucbarpa)-.2 E -.1(wo)117 164.4 S 1.959(uld cause \231eric\@ucbarpa\232 to get the error that will occur when someone sends to unix-).1 F(wizards due to the inclusion of \231nosuchuser\232 on the list.)117 176.4 Q.958(List o)142 192.6 R .958(wners also cause the en)-.25 F -.15(ve)-.4 G .959(lope sender address to be modi\214ed.).15 F .959(The contents of the)5.959 F-.25(ow)117 204.6 S .429(ner alias are used if the).25 F 2.929(yp)-.15 G .429(oint to a single user)236.364 204.6 R 2.928(,o)-.4 G .428(therwise the name of the alias itself is used.)326.436 204.6 R -.15(Fo)117216.6 S 2.5(rt).15 G(his reason, and to obe)136.02 216.6 Q 2.5(yI)-.15 G(nternet con)233.63 216.6 Q -.15(ve)-.4 G(ntions, a typical scheme w).15 E(ould be:)-.1 E 18.49(list: some,)157 232.8 R(set, of, addresses)2.5 E 22.28(list-request: list-admin-1,)157 244.8 R(list-admin-2, ...)2.5 E -.25(ow)157256.8 S(ner).25 E 26.62(-list: list-request)-.2 F F0 2.5(2.4. User)87 285 R(Inf)2.5 E(ormation Database)-.25 E F1 1.059(If you ha)127 301.2 R 1.359 -.15(ve a ve)-.2 H 1.059(rsion of).15 F/F2 10/Times-Italic@0 SF(sendmail)3.559 E F11.06(with the user information database compiled in, and you)3.559 F(ha)102313.2 Q 2.206 -.15(ve s)-.2 H 1.906(peci\214ed one or more databases using the).15 F F0(U)4.406 E F1 1.905(option, the databases will be searched for a)4.406F F2(user)102 325.2 Q F1(:maildrop entry)A 5(.I)-.65 G 2.5(ff)191.34 325.2 S(ound, the mail will be sent to the speci\214ed address.)200.5 325.2 Q 1.288(If the \214rst tok)127 341.4 R 1.288(en passed to user part of the \231local\\232 mailer is an at sign, the at sign will be)-.1 F(stripped of)102 353.4 Q2.5(fa)-.25 G(nd this step will be skipped.)155.07 353.4 Q F0 2.5(2.5. P)87377.4 R(er)-.2 E(-User F)-.37 E(orwarding \(.f)-.25 E(orward Files\))-.25 E F1.121(As an alternati)127 393.6 R .421 -.15(ve t)-.25 H 2.621(ot).15 G .121(he alias database, an)210.404 393.6 R 2.621(yu)-.15 G .12(ser may put a \214le with the name \231.forw)304.878 393.6 R .12(ard\232 in his)-.1 F .205(or her home directory)102 405.6 R 5.205(.I)-.65 G2.705(ft)199.92 405.6 S .205(his \214le e)208.735 405.6 R(xists,)-.15 E F2(sendmail)2.705 E F1 .205(redirects mail for that user to the list of addresses)2.705 F .909(listed in the .forw)102 417.6 R .908(ard \214le.)-.1 F -.15(Fo)5.908 G 3.408(re).15 G .908(xample, if the home directory for user \231mckusick\232 has a .forw)233.98417.6 R(ard)-.1 E(\214le with contents:)102 429.6 Q(mckusick@ernie)142 445.8 Q(kirk@calder)142 457.8 Q(then an)102 474 Q 2.5(ym)-.15 G(ail arri)146.29 474 Q(ving for \231mckusick\232 will be redirected to the speci\214ed accounts.)-.25E(Actually)127 490.2 Q 3.374(,t)-.65 G .874(he con\214guration \214le de\214nes a sequence of \214lenames to check.)169.444 490.2 R .875(By def)5.875 F .875(ault, this is)-.1 F .688(the user')102502.2 R 3.188(s.)-.55 G(forw)146.426 502.2 Q .688(ard \214le, b)-.1 F .687(ut can be de\214ned to be more generally using the)-.2 F F0(J)3.187 E F1 3.187(option. If)3.187 F .687(you change)3.187 F .393(this, you will ha)102 514.2 R.693 -.15(ve t)-.2 H 2.893(oi).15 G .393(nform your user base of the change; .forw)193.064 514.2 R .393(ard is pretty well incorporated into)-.1 F(the collecti)102 526.2 Q .3 -.15(ve s)-.25 H(ubconscious.).15 E F0 2.5(2.6. Special)87 550.2 R(Header Lines)2.5E F1(Se)127 566.4 Q -.15(ve)-.25 G 1.898(ral header lines ha).15 F 2.197 -.15(ve s)-.2 H 1.897(pecial interpretations de\214ned by the con\214guration \214le.).15 F(Others)6.897 E(ha)102 578.4 Q 1.205 -.15(ve i)-.2 H .905(nterpretations b).15 F .905(uilt into)-.2 F F2(sendmail)3.405 E F1 .906(that cannot be changed without changing the code.)3.405 F(These)5.906 E -.2(bu)102 590.4 S(iltins are described here.).2 E F0 2.5(2.6.1. Retur)102 614.4 R(n-Receipt-T)-.15 E(o:)-.92 E F1 1.371(If this header is sent, a message will be sent to an)142 630.6 R 3.87(ys)-.15G 1.37(peci\214ed addresses when the \214nal)366.88 630.6 R(deli)117 642.6 Q-.15(ve)-.25 G .367(ry is complete, that is, when successfully deli).15 F -.15(ve)-.25 G .368(red to a mailer with the).15 F F0(l)2.868 E F1 .368(\215ag \(local deli)2.868 F(v-)-.25 E .024(ery\) set in the mailer descriptor)117 656.6 R/F3 7/Times-Roman@0 SF(6)242.37 652.6 Q F1 5.023(.T)245.87 656.6 S.023(his header can be disabled with the \231noreceipts\232 pri)259.503 656.6 R-.25(va)-.25 G .323 -.15(cy \215).25 H(ag.).15 E .32 LW 76 666.2 72 666.2 DL 80666.2 76 666.2 DL 84 666.2 80 666.2 DL 88 666.2 84 666.2 DL 92 666.2 88 666.2DL 96 666.2 92 666.2 DL 100 666.2 96 666.2 DL 104 666.2 100 666.2 DL 108 666.2104 666.2 DL 112 666.2 108 666.2 DL 116 666.2 112 666.2 DL 120 666.2 116 666.2DL 124 666.2 120 666.2 DL 128 666.2 124 666.2 DL 132 666.2 128 666.2 DL 136666.2 132 666.2 DL 140 666.2 136 666.2 DL 144 666.2 140 666.2 DL 148 666.2 144666.2 DL 152 666.2 148 666.2 DL 156 666.2 152 666.2 DL 160 666.2 156 666.2 DL164 666.2 160 666.2 DL 168 666.2 164 666.2 DL 172 666.2 168 666.2 DL 176 666.2172 666.2 DL 180 666.2 176 666.2 DL 184 666.2 180 666.2 DL 188 666.2 184 666.2DL 192 666.2 188 666.2 DL 196 666.2 192 666.2 DL 200 666.2 196 666.2 DL 204666.2 200 666.2 DL 208 666.2 204 666.2 DL 212 666.2 208 666.2 DL 216 666.2 212666.2 DL/F4 5/Times-Roman@0 SF(6)93.6 676.6 Q/F5 8/Times-Roman@0 SF .127(Some sites disable this header)3.2 J 2.127(,a)-.32 G .127(nd other \(non-)199.959 679.8 R/F6 8/Times-Italic@0 SF(sendmail)A F5 2.127(\)s)C .127(ystems do not implement it.)282.772 679.8 R .127(Do not assume that a f)4.127F .126(ailure to get a re-)-.08 F .317(turn receipt means that the mail did not arri)72 689.4 R -.12(ve)-.2 G 4.317(.A).12 G .318(lso, do not assume that getting a return receipt means that the\ mail has been read; it)232.509 689.4 R(just means that the message has been deli)72 699 Q -.12(ve)-.2 G(red to the recipient').12 E 2(sm)-.44 G(ailbox.)285.648 699 Q EP%%Page: 16 11%%BeginPageSetupBP%%EndPageSetup/F0 10/Times-Bold@0 SF 193.36(SMM:08-16 Sendmail)72 60 R(Installation and Operation Guide)2.5 E 2.5(2.6.2. Err)102 96 R(ors-T)-.18 E(o:)-.92 E/F1 10/Times-Roman@0 SF .22(If errors occur an)142 112.2 R .22(ywhere during processing, this header will cause error messages to go to)-.15F(the listed addresses.)117 124.2 Q(This is intended for mailing lists.)5 E.385(The Errors-T)142 140.4 R .385(o: header w)-.8 F .384(as created in the bad old days when UUCP didn')-.1 F 2.884(tu)-.18 G .384(nderstand the)450.016 140.4 R .889(distinction between an en)117 152.4 R -.15(ve)-.4 G .889(lope and a header; this w).15 F .889(as a hack to pro)-.1 F .89(vide what should no)-.15 F 3.39(wb)-.25 G(e)499.56 152.4 Q(passed as the en)117 164.4 Q -.15(ve)-.4 G(lope sender address.).15 E(It should go a)5 E -.1(wa)-.15 G 3.8 -.65(y. I).1 H 2.5(ti).65 G 2.5(so)365.22 164.4 S(nly used if the)376.61 164.4 Q F0(l)2.5 E F1(option is set.)2.5 E F0 2.5(2.6.3. A)102 188.4 R(ppar)-.25 E(ently-T)-.18 E(o:)-.92 E F1 .22(If a message comes in with no recipients listed in the message \(in a T)142204.6 R .22(o:, Cc:, or Bcc: line\))-.8 F(then)117 216.6 Q/F2 10/Times-Italic@0SF(sendmail)2.789 E F1 .289(will add an \231)2.789 F(Apparently-T)-.8 E .289(o:\232 header line for an)-.8 F 2.789(yr)-.15 G .29(ecipients it is a)378.08216.6 R -.1(wa)-.15 G .29(re of.).1 F .29(This is)5.29 F(not put in as a standard recipient line to w)117 228.6 Q(arn an)-.1 E 2.5(yr)-.15 G(ecipients that the list is not complete.)319.77 228.6 Q(At least one recipient line is required under RFC 822.)142 244.8 Q F0 2.5(2.7. IDENT)87 268.8 R(Pr)2.5 E(otocol Support)-.18 E F2(Sendmail)127 285 Q F11.835(supports the IDENT protocol as de\214ned in RFC 1413.)4.335 F 1.835(Although this enhances)6.835 F .289(identi\214cation of the author of an email message by doing a `)102 297 R .29(`call back')-.74 F 2.79('t)-.74 G 2.79(ot)396.17 297 S .29(he originating system to)406.74 297 R .469(include the o)102 309 R .469(wner \of a particular TCP connection in the audit trail it is in no sense perfect; a\ deter)-.25 F(-)-.2 E 1.293(mined for)102 321 R 1.294(ger can easily spoof the IDENT protocol.)-.18 F 1.294(The follo)6.294 F 1.294(wing description is e)-.25 F 1.294(xcerpted from)-.15 F(RFC 1413:)102 333 Q2.5(6. Security)127 349.2 R(Considerations)2.5 E .006(The information returned by this protocol is at most as trustw)127 365.4 R(or

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -