まず 何処かの場所で 展開しよう
# pwd /usr/local/src/002_sendmail # ls -l | sed -e 1d -rw------- 1 aruuser users 2010975 Dec 10 22:47 sendmail.8.13.8.tar.gz -rw------- 1 aruuser users 152 Dec 10 22:46 sendmail.8.13.8.tar.gz.sig
いつものぐち 何も ここで やる 必要は 無いのだけれど また root さんが やる必要も 無 いようなのですが ということで
# df Filesystem 1k-blocks Used Available Use% Mounted on /dev/sda5 4960464 3037328 1667088 65% / /dev/sda8 2822080 1311320 1367404 49% /var/data # tar zxvf sendmail.8.13.8.tar.gz 2>&1 | tee untar_send # df Filesystem 1k-blocks Used Available Use% Mounted on /dev/sda5 4960464 3045892 1658524 65% / /dev/sda8 2822080 1311324 1367400 49% /var/data # ls sendmail-8.13.8/ sendmail.8.13.8.tar.gz sendmail.8.13.8.tar.gz.sig untar_send
展開が終わったので 出来た ディレクトリに 移動して 少し 見ておこう
# cd sendmail-8.13.8/ # ls Build* Makefile devtools/ libsmdb/ rmail/ CACerts PGPKEYS doc/ libsmutil/ sendmail/ FAQ README editmap/ mail.local/ smrsh/ INSTALL RELEASE_NOTES include/ mailstats/ test/ KNOWNBUGS cf/ libmilter/ makemap/ vacation/ LICENSE contrib/ libsm/ praliases/
まず README の 抜粋
1. Read this README file, especially this introduction, and the DIRECTORY
   PERMISSIONS sections.
2. Read the INSTALL file in this directory.
3. Read sendmail/README, especially:
   a. the introduction
   b. the BUILDING SENDMAIL section
   c. the relevant part(s) of the OPERATING SYSTEM AND COMPILE QUIRKS section
   You may also find these useful:
   d. sendmail/SECURITY
   e. devtools/README
   f. devtools/Site/README
   g. libmilter/README
   h. mail.local/README
   i. smrsh/README
4. Read cf/README.
...
+-----------------------+
| DIRECTORY PERMISSIONS |
+-----------------------+
Sendmail often gets blamed for many problems that are actually the
result of other problems, such as overly permissive modes on directories.
For this reason, sendmail checks the modes on system directories and
files to determine if they can be trusted.  For sendmail to run without
complaining, you MUST execute the following command:
        chmod go-w / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
        chown root / /etc /etc/mail /usr /var /var/spool /var/spool/mqueue
You will probably have to tweak this for your environment (for example,
some systems put the spool directory into /usr/spool instead of
/var/spool).  If you set the RunAsUser option in your sendmail.cf, the
/var/spool/mqueue directory will have to be owned by the RunAsUser user.
As a general rule, after you have compiled sendmail, run the command
        sendmail -v -bi
to initialize the alias database.  If it gives messages such as
        WARNING: writable directory /etc
        WARNING: writable directory /var/spool/mqueue
then the directories listed have inappropriate write permissions and
should be secured to avoid various possible security attacks.
...
...
TrustedUser option.  Changing the permissions to be only readable and
writable by that user is sufficient to avoid the denial of service.
For example, depending on the paths you use, these commands would be
used:
        chmod 0640 /etc/mail/aliases /etc/mail/aliases.{db,pag,dir}
        chmod 0640 /etc/mail/*.{db,pag,dir}
        chmod 0640 /etc/mail/statistics /var/log/sendmail.st
        chmod 0600 /var/run/sendmail.pid /etc/mail/sendmail.pid
If the permissions 0640 are used, be sure that only trusted users belong
to the group assigned to those files.  Otherwise, files should not even
be group readable.  As of sendmail 8.12.4, the permissions shown above
are the default permissions for newly created files.
...
最後に sendmail-8.13.8/README は このようなもの 上記は 抜粋 ということです。ただ 見ただけで 内容を 理解しているわけでは ありません。
にゃんたろう 拝!
2006年12月12日 (火) 21:48:15 JST 作成