On Tue, Jan 14, 2003 at 11:00:35PM -0500, David Raeker-Jordan wrote: > All of my entries in /etc/aliases associate one known user with one alias. > What would one alias for many addresses look like?
like this--local users are listed by login (mailbox) name; remote users are [EMAIL PROTECTED] # synonyms, u-pick-a the ones you-like-a: jerry: [EMAIL PROTECTED] buddy: [EMAIL PROTECTED] budreaux: [EMAIL PROTECTED] donnie: [EMAIL PROTECTED] xmas: [EMAIL PROTECTED] karen: kat # easy broadcasts: staff: [EMAIL PROTECTED], [EMAIL PROTECTED], kat, will jed: [EMAIL PROTECTED], [EMAIL PROTECTED] # catch-all (when search_type = "lsearch*") *: will even cooler is having exim look up your domains in a text file, and each domain can have its own unique aliases; so [EMAIL PROTECTED] could be different than [EMAIL PROTECTED] <snip> local_domains = localhost:*mydomain.com:partial-lsearch;/etc/exim/DOMAINS <snip> # check virtual hosts for aliases -- # virtual hostname-->alias file mapping is in /etc/exim/DOMAINS # <alias>@<virtualhost>-->is in /etc/exim/<virtualhost> from DOMAINS # and global default aliases '*: someone' is possible in each # virtual host alias file, because we use 'search_type=lsearch*' virtual_aliases: driver = aliasfile domains = "partial-lsearch;/etc/exim/DOMAINS" file_transport = address_file pipe_transport = address_pipe file = /etc/exim/${domain_data} search_type = "lsearch*" <snip> and /etc/exim/DOMAINS looks like this: # *.domain.name /etc/exim/<aliasfile> *.serensoft.com: serensoft *.dontuthink.com: dontuthink *.admincomputing.com: admincomputing *.admincomputing.org: admincomputing so then /etc/exim/dontuthink looks like this: kat: kat karen: kat abuse: will webmaster: will wdt: will *: will ...i think, maybe, sort of, probably. ymmv. :) -- I use Debian/GNU Linux version 3.0; Linux server 2.2.17 #1 Sun Jun 25 09:24:41 EST 2000 i586 unknown DEBIAN NEWBIE TIP #40 from Will Trillich <[EMAIL PROTECTED]> : Why are ROOT LOGINS EVIL? The main problem is this: if you have a handful of trusted people who know the root password, you can't tell -- not just by looking in the logs -- which one logged in as root! But if you have them log in as themselves first, they can "su" or "sudo" to get root privileges, and then the logs will reflect who they actually are. To facilitate this, empty out /etc/securetty (see /etc/pam.d/login for info). Also see http://newbieDoc.sourceForge.net/ ... -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]