|Original author(s)||Eric Allman|
|Developer(s)||Sendmail Consortium, Sendmail, Inc.|
|Stable release||8.15.2 Release Notes / July 3, 2015|
|Type||Mail transfer agent|
Sendmail is a general purpose internetwork email routing facility that supports many kinds of mail-transfer and delivery methods, including the Simple Mail Transfer Protocol (SMTP) used for email transport over the Internet.
A descendant of the delivermail program written by Eric Allman, Sendmail is a well-known project of the free and open source software and Unix communities. It has spread both as free software and proprietary software.
Allman had written the original ARPANET delivermail which shipped in 1979 with 4.0 and 4.1 BSD. He wrote Sendmail as a derivative of delivermail in the early 1980s at UC Berkeley. It shipped with BSD 4.1c in 1983, the first BSD version that included TCP/IP protocols.
In 1996, approximately 80% of the publicly reachable mail-servers on the Internet ran Sendmail. More recent surveys have suggested a decline, with 6.06% of mail servers in April 2016 detected as running Sendmail in a study performed by E-Soft, Inc. Other surveys have suggested a slight decrease, with 24% of mail servers in August 2015 detected as running Sendmail in a study performed by Mail Radar.
Allman designed Sendmail to incorporate great flexibility, but it can be daunting to configure for novices. Standard configuration packages delivered with the source code distribution require the use of the M4 macro language which hides much of the configuration complexity. The configuration defines the site-local mail delivery options and their access parameters, the mechanism of forwarding mail to remote sites, as well as many application tuning parameters.
Sendmail supports a variety of mail transfer protocols, including SMTP, ESMTP, DECnet's Mail-11, HylaFax, QuickPage and UUCP. Additionally, Sendmail v8.12 as of September 2001[update] introduced support for milters - external mail filtering programs that can participate in each step of the SMTP conversation.
Acquisition by Proofpoint, Inc.
Sendmail 8 releases
- Sendmail-8.15.2 2015-07-03 Release Notes
- Sendmail-8.15.1 2014-12-06
- Sendmail-8.14.9 2014-05-21
- Sendmail-8.14.8 2014-01-26
- Sendmail-8.14.7 2013-04-21
- Sendmail-8.14.6 2012-12-23
- Sendmail-8.14.5 2011-05-17
- Sendmail-8.14.4 2009-12-30
- Sendmail-8.14.3 2008-05-03
- Sendmail-8.14.2 2007-11-01
- Sendmail-8.14.1 2007-04-03
- Sendmail-8.14.0 2007-01-31
- Sendmail-8.13.0 2004-06-20
- Sendmail-8.12.0 2001-09-08
- Sendmail-8.11.0 2000-07-19
- Sendmail-8.10.0 2000-03-01
- Sendmail-8.9.0 1998-05-19
- Sendmail-8.8.0 1996-09-26
- Sendmail-8.7 1995-09-16
- Sendmail-8.6 1993-10-05
- Sendmail-8.1 1993-06-07 - 4.4BSD freeze. No semantic changes.
The information derives from RELEASE_NOTES file from sendmail distribution.
Sendmail originated in the early days of the Internet, an era when considerations of security did not play a primary role in the development of network software. Early versions of Sendmail suffered from a number of security vulnerabilities that have been corrected over the years.
Sendmail itself incorporated a certain amount of privilege separation in order to avoid exposure to security issues. As of 2009[update], current versions of Sendmail, like other modern MTAs, incorporate a number of security improvements and optional features that can be configured to improve security and help prevent abuse.
History of vulnerabilities
Sendmail vulnerabilities in CERT advisories and alerts:
- "TA06-081A Sendmail Race Condition Vulnerability". US-CERT Alerts.
- "CA-2003-25 Buffer Overflow in Sendmail". CERT Advisories. Retrieved January 7, 2005.
- "CA-2003-12 Buffer Overflow in Sendmail". CERT Advisories. Retrieved January 7, 2005.
- "CA-2003-07 Remote Buffer Overflow in Sendmail". CERT Advisories. Retrieved January 7, 2005.
- "CA-1997-05 MIME Conversion Buffer Overflow in Sendmail Versions 8.8.3 and 8.8.4". CERT Advisories. Retrieved January 7, 2005.
- "CA-1996-25 Sendmail Group Permissions Vulnerability". CERT Advisories. Retrieved January 7, 2005.
- "CA-1996-24 Sendmail Daemon Mode Vulnerability". CERT Advisories. Retrieved January 7, 2005.
- "CA-1996-20 Sendmail Vulnerabilities". CERT Advisories. Retrieved January 7, 2005.
The UNIX-HATERS Handbook dedicated an entire chapter to perceived problems and weaknesses of sendmail.
As of sendmail release 8.12.0 the default implementation of sendmail runs as the Unix user smmsp — the sendmail message submission program.
- List of mail servers
- Comparison of mail servers
- Mail delivery agent
- Mail user agent
- Internet messaging platform
- Morris worm
- D. J. Bernstein (1996-11-27). "Internet host SMTP server survey".
- "E-Soft MX survey". securityspace.com. E-Soft Inc. 1 April 2016. Retrieved 3 April 2016.
- "Mail Radar survey".
- "Sendmail Installation and Operations Guide" (PDF).
- "Proofpoint, Inc. Acquires Sendmail, Inc.".
- "Sendmail release notes". sendmail.org. The Sendmail Consortium. Retrieved 2009-08-30.
- Bryan Costales with Eric Allman (October 2007). sendmail, 4th Edition. O'Reilly and Associates. — This is the Sendmail "bible" containing 1308 pages about Sendmail. It is also known as "The Bat Book", because of the picture on its cover. The 1st Edition was published in November 1993.
- Bryan Costales; George Jansen; Claus Assmann; Gregory Shapiro (September 2004). sendmail 8.13 Companion. O'Reilly and Associates. — A companion to sendmail, 3rd Edition, this book documents the improvements in V8.13 in parallel with its release.
- Craig Hunt (December 2003). sendmail Cookbook. O'Reilly.
- Nick Christenson (2002-09-13). sendmail Performance Tuning. Addison-Wesley. 
- Lourier, Philippe (1999). "History of Sendmail: Interview with Eric Allman". Dr. Dobb's Journal.
- Eric Allman; et al. (1999). "Sendmail Evolution: 8.10 and Beyond" (PDF). — presented at the USENIX Annual Technical Conference
- Williamson, Alan (2003-08-11). "A Talk with the Father of sendmail". LinuxWorld.