<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 TRANSITIONAL//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; CHARSET=UTF-8">
<META NAME="GENERATOR" CONTENT="GtkHTML/3.3.2">
</HEAD>
<BODY>
Here's the output of a grep of "dnl"<BR>
<BR>
The netstat -talpen |grep :25 returned nothing.<BR>
<BR>
divert(-1)dnl<BR>
dnl #<BR>
dnl # This is the sendmail macro config file for m4. If you make changes to<BR>
dnl # /etc/mail/sendmail.mc, you will need to regenerate the<BR>
dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is<BR>
dnl # installed and then performing a<BR>
dnl #<BR>
dnl # make -C /etc/mail<BR>
dnl #<BR>
include(`/usr/share/sendmail-cf/m4/cf.m4')dnl<BR>
VERSIONID(`setup for Red Hat Linux')dnl<BR>
OSTYPE(`linux')dnl<BR>
dnl #<BR>
dnl # default logging level is 9, you might want to set it higher to<BR>
dnl # debug the configuration<BR>
dnl #<BR>
dnl define(`confLOG_LEVEL', `9')dnl<BR>
dnl #<BR>
dnl # Uncomment and edit the following line if your outgoing mail needs to<BR>
dnl # be sent out through an external mail server:<BR>
dnl #<BR>
dnl define(`SMART_HOST',`smtp.your.provider')<BR>
dnl #<BR>
define(`confDEF_USER_ID',``8:12'')dnl<BR>
dnl define(`confAUTO_REBUILD')dnl<BR>
define(`confTO_CONNECT', `1m')dnl<BR>
define(`confTRY_NULL_MX_LIST',true)dnl<BR>
define(`confDONT_PROBE_INTERFACES',true)dnl<BR>
define(`PROCMAIL_MAILER_PATH',`/usr/bin/procmail')dnl<BR>
define(`ALIAS_FILE', `/etc/aliases')dnl<BR>
define(`STATUS_FILE', `/var/log/mail/statistics')dnl<BR>
define(`UUCP_MAILER_MAX', `2000000')dnl<BR>
define(`confUSERDB_SPEC', `/etc/mail/userdb.db')dnl<BR>
define(`confPRIVACY_FLAGS', `authwarnings,novrfy,noexpn,restrictqrun')dnl<BR>
define(`confAUTH_OPTIONS', `A')dnl<BR>
dnl #<BR>
dnl # The following allows relaying if the user authenticates, and disallows<BR>
dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links<BR>
dnl #<BR>
dnl define(`confAUTH_OPTIONS', `A p')dnl<BR>
dnl #<BR>
dnl # PLAIN is the preferred plaintext authentication method and used by<BR>
dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do<BR>
dnl # use LOGIN. Other mechanisms should be used if the connection is not<BR>
dnl # guaranteed secure.<BR>
dnl # Please remember that saslauthd needs to be running for AUTH.<BR>
dnl #<BR>
dnl TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl<BR>
dnl define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl<BR>
dnl #<BR>
dnl # Rudimentary information on creating certificates for sendmail TLS:<BR>
dnl # cd /usr/share/ssl/certs; make sendmail.pem<BR>
dnl # Complete usage:<BR>
dnl # make -C /usr/share/ssl/certs usage<BR>
dnl #<BR>
dnl define(`confCACERT_PATH',`/usr/share/ssl/certs')<BR>
dnl define(`confCACERT',`/usr/share/ssl/certs/ca-bundle.crt')<BR>
dnl define(`confSERVER_CERT',`/usr/share/ssl/certs/sendmail.pem')<BR>
dnl define(`confSERVER_KEY',`/usr/share/ssl/certs/sendmail.pem')<BR>
dnl #<BR>
dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's<BR>
dnl # slapd, which requires the file to be readble by group ldap<BR>
dnl #<BR>
dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekeyfile')dnl<BR>
dnl #<BR>
dnl define(`confTO_QUEUEWARN', `4h')dnl<BR>
dnl define(`confTO_QUEUERETURN', `5d')dnl<BR>
dnl define(`confQUEUE_LA', `12')dnl<BR>
dnl define(`confREFUSE_LA', `18')dnl<BR>
define(`confTO_IDENT', `0')dnl<BR>
dnl FEATURE(delay_checks)dnl<BR>
FEATURE(`no_default_msa',`dnl')dnl<BR>
FEATURE(`smrsh',`/usr/sbin/smrsh')dnl<BR>
FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl<BR>
FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl<BR>
FEATURE(redirect)dnl<BR>
FEATURE(always_add_domain)dnl<BR>
FEATURE(use_cw_file)dnl<BR>
FEATURE(use_ct_file)dnl<BR>
dnl #<BR>
dnl # The following limits the number of processes sendmail can fork to accept<BR>
dnl # incoming messages or process its message queues to 12.) sendmail refuses<BR>
dnl # to accept connections once it has reached its quota of child processes.<BR>
dnl #<BR>
dnl define(`confMAX_DAEMON_CHILDREN', 12)dnl<BR>
dnl #<BR>
dnl # Limits the number of new connections per second. This caps the overhead<BR>
dnl # incurred due to forking new sendmail processes. May be useful against<BR>
dnl # DoS attacks or barrages of spam. (As mentioned below, a per-IP address<BR>
dnl # limit would be useful but is not available as an option at this writing.)<BR>
dnl #<BR>
dnl define(`confCONNECTION_RATE_THROTTLE', 3)dnl<BR>
dnl #<BR>
dnl # The -t option will retry delivery if e.g. the user runs over his quota.<BR>
dnl #<BR>
FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl<BR>
FEATURE(`access_db',`hash -T<TMPF> -o /etc/mail/access.db')dnl<BR>
FEATURE(`blacklist_recipients')dnl<BR>
EXPOSED_USER(`root')dnl<BR>
dnl #<BR>
dnl # The following causes sendmail to only listen on the IPv4 loopback address<BR>
dnl # 127.0.0.1 and not on any other network devices. Remove the loopback<BR>
dnl # address restriction to accept email from the internet or intranet.<BR>
dnl #<BR>
dnl # DAEMON_OPTIONS(`Port=smtp,Addr=127.0.0.1, Name=MTA')dnl<BR>
dnl #<BR>
dnl # The following causes sendmail to additionally listen to port 587 for<BR>
dnl # mail from MUAs that authenticate. Roaming users who can't reach their<BR>
dnl # preferred sendmail daemon due to port 25 being blocked or redirected find<BR>
dnl # this useful.<BR>
dnl #<BR>
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl<BR>
dnl #<BR>
dnl # The following causes sendmail to additionally listen to port 465, but<BR>
dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed<BR>
dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can't<BR>
dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS<BR>
dnl # and doesn't support the deprecated smtps; Evolution <1.1.1 uses smtps<BR>
dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1.<BR>
dnl #<BR>
dnl # For this to work your OpenSSL certificates must be configured.<BR>
dnl #<BR>
DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl<BR>
dnl #<BR>
dnl # The following causes sendmail to additionally listen on the IPv6 loopback<BR>
dnl # device. Remove the loopback address restriction listen to the network.<BR>
dnl #<BR>
dnl DAEMON_OPTIONS(`port=smtp,Addr=::1, Name=MTA-v6, Family=inet6')dnl<BR>
dnl #<BR>
dnl # enable both ipv6 and ipv4 in sendmail:<BR>
dnl #<BR>
dnl DAEMON_OPTIONS(`Name=MTA-v4, Family=inet, Name=MTA-v6, Family=inet6')<BR>
dnl #<BR>
dnl # We strongly recommend not accepting unresolvable domains if you want to<BR>
dnl # protect yourself from spam. However, the laptop and users on computers<BR>
dnl # that do not have 24x7 DNS do need this.<BR>
dnl #<BR>
FEATURE(`accept_unresolvable_domains')dnl<BR>
dnl #<BR>
dnl FEATURE(`relay_based_on_MX')dnl<BR>
dnl #<BR>
dnl # Also accept email sent to "localhost.localdomain" as local email.<BR>
dnl #<BR>
dnl LOCAL_DOMAIN(`localhost.localdomain')dnl<BR>
dnl #<BR>
dnl # The following example makes mail from this host and any additional<BR>
dnl # specified domains appear to be sent from mydomain.com<BR>
dnl #<BR>
dnl MASQUERADE_AS(`mydomain.com')dnl<BR>
dnl #<BR>
dnl # masquerade not just the headers, but the envelope as well<BR>
dnl #<BR>
dnl FEATURE(masquerade_envelope)dnl<BR>
dnl #<BR>
dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well<BR>
dnl #<BR>
dnl FEATURE(masquerade_entire_domain)dnl<BR>
dnl #<BR>
dnl MASQUERADE_DOMAIN(localhost)dnl<BR>
dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl<BR>
dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl<BR>
dnl MASQUERADE_DOMAIN(mydomain.lan)dnl<BR>
MAILER(smtp)dnl<BR>
MAILER(procmail)dnl<BR>
<BR>
</BODY>
</HTML>