Sun Microsystems Sun Workstation 100U System Manager's Manual page 249

Table of Contents

Advertisement

SENDMAIL ( 8 )
MAINTENANCE COMMANDS
SENDMAIL ( 8 )
NAME
sendmail- send mail over the internet
SYNOPSIS
/usr /Ub/sendmaD ( -ba ) ( -bd ) ( -bl) ( -bm ) ( -bp ) ( -bs ) ( -bt ) ( -by ) ( -bz )
[ -Cfile] ( -dX) (
-Ffullname) ( -tname] [
-hN] (
-D ) ( -0%
value) (
-q(
time
I)
( -rname ) ( -t ) (
-v ) (
address ••• )
DESCRIPTION
Sendmail sends a message to one or more people, routing the message over whatever networks are
necessary. Sendmail does internetwork forwarding as necessary to deliver the message to the
correct place.
Sendmail is not intended as a user interrace routine; other programs provide user-friendly front
ends; 8endmail is used only to deliver pre-formatted messages.
With no flags, 8endmail reads its standard input up to a control-D or a line with a single dot and
sends a copy of the letter found there to all of the addresses listed. It determines the network to
use based on the syntax and contents of the addresses.
Local addresses are looked up in a file and aliased appropriately. Aliasing can be prevented by
preceding the address with a backslash. Normally the sender is not included in any alias expan-
sions, for example, if 'john' sends
to
'group', and 'group' includes 'john' in the expansion, then
the letter will not be delivered to 'john'.
OPTIONS
-ba
-bel
-bl
-bm
-bp
-be
-bt
-by
-bs
-Cfile
-dX
-F /ullname
-tname
-hN
-D
-0%
value
94
Go into ARPANET mode. All input lines must end with a CR-LF, and all
messages will be generated with a CR-LF at the end. Also, the "From:" and
"Sender:" fields are examined for the na.me of the sender.
Run as a daemon. This requires Berkeley IPC.
Initialize the alias database.
Deliver mail in the usual way (default).
Print a summary of the mail queue.
Use the
SMTP
protocol as described in RFC821. This flag implies all the
operations of the -ba flag that are compatible with
SMTP.
R un in address test mode. This mode reads addresses and shows the steps in
parsing; it is used for debugging configuration tables.
Verify names only - do not try to collect or deliver a message. Verify mode is
normally used for validating users or mailing lists.
Create the configuration freeze file.
Use alternate configuration file.
Set debugging value
to
X.
Set the full name of the sender.
Sets the name of the "from" person (that is, the sender of the mail). -t can
only be used by the special users root, daemon, and network, or if the person
you are trying
to
become is the same as the person you are.
Set the hop count to N. The hop count is incremented every time the mail is
processed. When it reaches a limit, the mail is returned with an error mes-
sage, the victim of an aliasing loop.
Don't do aliasing.
Set option z to the specified value. Options are described below.
Last change: 6 March 1984
Sun Release 1.1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sun workstation 150u

Table of Contents