Useful Tables

This chapter contains three useful tables:

  • Table 22-1 lists the mc macros used to fill class macros with values.

  • Table 22-2 lists all the class macros that use the mc technique.

  • Table 22-3 lists all the class macros defined internally by sendmail.

Use mc Macros to Fill Class Macros

Several mc macros are used to fill class macros with values based on a test file. These are listed in Table 22-1, along with the class macros they fill. Note that the classes shown should not be used directly because there is no guarantee that they will continue to be available in the future. To be safe, always use the mc macro instead. To reinforce this precaution, we use the mc name for the class (as the EXPOSED_USER class) instead of the class macro name (as the $=E class), as the leading items in the table.

Table 22-1. mc macros used to fill class macros

mc macro

sendmail text reference

Class macro

CANONIFY_DOMAIN_FILE

4.8.28[3ed]

$={Canonify}

confCT_FILE

4.8.47[3ed]

$=t

EXPOSED_USER_FILE

4.4.1[3ed]

$=E

GENERICS_DOMAIN_FILE

4.8.15[3ed]

$=G

LDAPROUTE_DOMAIN_FILE

23.7.11.18[3ed]

$={LDAPRoute}

LDAPROUTE_EQUIVALENT_FILE

23.7.11.18[3ed]

$={LDAPRouteEquiv}

LOCAL_USER_FILE

4.5.5[3ed]

$=L

MASQUERADE_DOMAIN_FILE

4.4.3[3ed]

$=M

MASQUERADE_EXCEPTION_FILE

4.4.6[3ed]

$=N

RELAY_DOMAIN_FILE

7.4.1.2[3ed]

$=R

VIRTUSER_DOMAIN_FILE

4.8.50[3ed]

$={VirtHost}

Classes with mc Configuration

In configuring with the mc technique, many classes are defined for your convenience. You need to be aware of these, not only to take advantage of them, but also to avoid reusing their names by mistake. Table 22-2 lists all the class macros that the mc technique uses as of Version 8.13.

Table 22-2. Class macros used with the mc configuration technique

Class

sendmail text reference

Description

$={Accept}

7.5.1[3ed]

With the access_db feature, the possible acceptance strings from the access database (V8.10 and later)

$=B

4.8.7[3ed]

With the bestmx_is_local feature, the domains to look up in bestmx in place of $=w

$={Canonify}

4.8.28[3ed]

With CANONIFY_DOMAIN or CANONIFY_DOMAIN_FILE, canonify these domains (V8.10 and later)

$=E

4.4.1[3ed]

With EXPOSED_USER or EXPOSED_USER_FILE, the list of exposed users

$=G

4.8.16.1[3ed]

With GENERICS_DOMAIN or GENERICS_DOMAIN_FILE, list of domains to look up in generics table

$=L

4.5.5[3ed]

With LOCAL_USER or LOCAL_USER_FILE, the list of local users

$={LDAPRoute}

23.7.11.18[3ed]

With LDAPROUTE_DOMAIN or LDAPROUTE_DOMAIN_FILE, route only LDAP hosts in this class (V8.10 and later)

$={LDAPRouteEquiv}

23.7.11.19[3ed]

With LDAPROUTE_EQUIVALENT or LDAPROUTE_EQUIVALENT_FILE, the host to treat as equivalent to $M for LDAP routing lookups (V8.12 and later)

$=M

4.4.3[3ed]

With MASQUERADE_DOMAIN or MASQUERADE_DOMAIN_FILE, the list of hosts to masquerade

$=N

4.4.5[3ed]

With MASQUERADE_EXCEPTION or MASQUERADE_EXCEPTION_FILE, the hosts excepted from masquerading

$=O

22.3[3ed]

The list of nonusername characters that can cause forwarding (@, %, and possibly !)

$=P

22.3[3ed]

The list of pseudo top-level domains (e.g., .uucp and .fax)

$={ResOk}

22.6.11[3ed]

Mark a successful DNS lookup (V8.12 and later)

$=R

7.4.1.1[3ed]

With RELAY_DOMAIN or RELAY_DOMAIN_FILE, the list of domains and hosts for which to relay

$={SpamTag}

7.5.6[3ed]

With the delay_checks feature, holds the strings SPAMFRIEND and SPAMHATER (V8.10 and later)

$={src}

22.3[3ed]

List of rule sets to call for searching the access database-map (V8.11 and V8.12)

$={Src}

22.3[3ed]

Same as above, but V8.13 and later

$={tls}

22.6.13[3ed]

Possible values for TLS policy in the access database-map (V8.11 and V8.12)

$={Tls}

22.6.13[3ed]

Same as above, but V8.13 and later

$={TrustAuthMech}

10.9.3[3ed]

With TRUST_AUTH_MECH, the mechanisms used to allow relaying (V8.10 and later)

$=U

4.6[3ed]

With MAILER(uucp), the locally connected UUCP hosts

$=V

4.6[3ed]

With MAILER(uucp), the hosts connected to UUCP relay $V

$={VirtHost}

4.8.50[3ed]

With VIRTUSER_DOMAIN or VIRTUSER_DOMAIN_FILE, the list of additional domains to look up in virtuser beyond $=w (V8.10 and later)

$=W

4.6[3ed]

With MAILER(uucp), the hosts connected to UUCP relay $W

$=X

4.6[3ed]

With MAILER(uucp), the hosts connected to UUCP relay $X

$=Y

4.6[3ed]

With MAILER(uucp), the locally connected smart UUCP hosts

$=Z

4.6[3ed]

With MAILER(uucp), the locally connected domainized UUCP hosts

Internal Class Macros

Prior to V8 sendmail, only the class $=w was used internally and only a small handful of classes were used in the configuration file. Recently, more and more classes have been added to that list. Table 22-3 lists all the class macros defined internally by sendmail as of V8.13.

Table 22-3. All the class macros defined internally by sendmail

Class

sendmail text reference

Description

$=b

22.6.1[3ed]

MIME types for no NL-to-CRLF translation

$={checkMIMEFieldHeaders}

22.6.2[3ed]

MIME headers for maximum parameter length checking

$={checkMIMEHeaders}

22.6.3[3ed]

MIME headers for maximum legal length checking

$={checkMIMETextHeaders}

22.6.4[3ed]

MIME headers for maximum arbitrary length checking

$=e

22.6.5[3ed]

Encode this Content-Transfer-Encoding:

$=k

22.6.6[3ed]

The local UUCP name

$=m

22.6.7[3ed]

List of local domains

$=n

22.6.8[3ed]

Don’t encode these Content-Types

$={persistentMacros}

22.6.9[3ed]

Macros preserved in the qf file

$=q

22.6.10[3ed]

Always quoted-printable encode Content-Type:

$=s

22.6.14[3ed]

Presume an RFC2822 7-bit body

$=t

22.6.15[3ed]

List trusted users

$=w

22.6.16[3ed]

List of our other names

Note that these classes really are used internally by sendmail, so don’t try to redefine their use in the configuration file. Such an attempt will be doomed to failure.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.255.162