Thank you for your answer.

> UUOC, '/usr/sbin/sendmail -t t...@test.test < mail.txt' :)

I know it doesn't make sense. I just prefer reading from left to right.

> Note, this is controlling the envelope sender, not the From: header.

True, thanks.

> 1. Get rid of untrusted shell users. If you cannot trust them to
> follow the policies you have set, you definitely do not want them
> running commands on your system.

It's not only about shell users. The same problem concerns e.g. PHP scripts.

> 2. Limit shell users' access to sendmail(1) using
> authorized_submit_users:

That would break, for example, the 'at' command. It would like to
allow my users to send emails. I just want to prevent them from faking
"sender" header.

> 3. Alternatively, you could limit access to sendmail(1) using
> filesystem permissions, but this might break in an upgrade.

The same problem as above.

Thanks,
Bartek

Reply via email to