Bug 51918 - Need to document dependence of sendmail on hosts.allow
Need to document dependence of sendmail on hosts.allow
Status: CLOSED WONTFIX
Product: Red Hat Linux
Classification: Retired
Component: sendmail (Show other bugs)
7.1
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Florian La Roche
David Lawrence
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2001-08-16 17:08 EDT by Need Real Name
Modified: 2007-04-18 12:35 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2001-08-19 10:30:16 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Need Real Name 2001-08-16 17:08:09 EDT
Description of Problem:

Under RH7.1 sendmail is checking /etc/hosts.allow to determine whether or
not to accept incoming connections, even though it "shouldn't" since this
isn't an xinetd-based service. Unfortunately the documentation doesn't seem
to mention this at all.

This can be fixed just by adding some notes to the docs that indicate that
a line should be added to hosts.allow for the service named "sendmail",
otherwise following the usual syntax.

If users set up a hosts.allow file without this line it can lead to an
overall failure of the sendmail system and dropped messages.

Version-Release number of selected component (if applicable):
sendmail-8.11.2-14 under RH7.1



How Reproducible: vide supra


Expected Results:


Additional Information:
	
Thanks!
Comment 1 Michael Schwendt 2001-08-19 10:30:12 EDT
/etc/hosts.allow and /etc/hosts.deny have nothing to do with xinetd. They are
used by the tcp_wrappers library (libwrap).

By default, RH7.1 does not deny access via hosts.deny. But you are right, this
should have been documented in the RELEASE-NOTES and not just in the sendmail
rpm changelog.

Note You need to log in before you can comment on or make changes to this bug.