Chapter 10. Maintain Security with sendmailWhen the administrator is not careful, the misuse or misconfiguration of sendmail can lead to an insecure and possibly compromised system. Since pre-V8.12 sendmail is often installed to run as a set-user-id root process, it is a prime target for intrusion.[1] The "Internet worm," for example, used a flaw in old versions of sendmail as one way to gain entry to thousands of machines.[2] If sendmail is not properly installed, improper file permissions can be used to trick the system into giving away root privilege.
In this chapter we present several ways to protect your site from intrusion via sendmail. Most of these are just good common sense, and the experienced system administrator might be offended that we state the obvious. But not all system administrators are experienced, and not all who administer systems are system administrators. If you fall into the latter category, you might wish to keep a good, general Unix reference by your side to better appreciate our suggestions. |