Thank you for your answer. > UUOC, '/usr/sbin/sendmail -t t...@test.test < mail.txt' :)
I know it doesn't make sense. I just prefer reading from left to right. > Note, this is controlling the envelope sender, not the From: header. True, thanks. > 1. Get rid of untrusted shell users. If you cannot trust them to > follow the policies you have set, you definitely do not want them > running commands on your system. It's not only about shell users. The same problem concerns e.g. PHP scripts. > 2. Limit shell users' access to sendmail(1) using > authorized_submit_users: That would break, for example, the 'at' command. It would like to allow my users to send emails. I just want to prevent them from faking "sender" header. > 3. Alternatively, you could limit access to sendmail(1) using > filesystem permissions, but this might break in an upgrade. The same problem as above. Thanks, Bartek