Today's Deep-Dive: Sendmail
Ep. 366

Today's Deep-Dive: Sendmail

Episode description

Email might feel simple - but behind every message lies a complex infrastructure designed to guarantee trust, authenticity, and reliability. In this episode, we dive into Sendmail, one of the most influential mail transfer agents (MTAs) in internet history, and explore how enterprise-grade messaging systems secure the backbone of global communication.

We examine Sendmail Sentrion, the hardened enterprise platform used by organizations with massive messaging needs - from global banks to multinational corporations. These systems must process enormous volumes of email while maintaining strict security, reliability, and long-term infrastructure stability.

The episode breaks down the cryptographic foundations that make this possible. PGP signing keys verify the integrity of the software itself, ensuring that administrators install authentic, untampered code. Meanwhile, DKIM (DomainKeys Identified Mail) secures individual messages by cryptographically signing emails so recipients can verify both the sender’s domain and the message’s integrity.

Beyond technical safeguards, modern email security also focuses on the human factor. Tools designed to improve human resilience aim to reduce risks like phishing by analyzing behavior, measuring vulnerability, and helping organizations strengthen the weakest link in the security chain - the user.

Finally, we explore the strict communication standards that still govern the email infrastructure community today: plaintext communication, strict adherence to RFC protocols, and encrypted vulnerability reporting. These seemingly old-fashioned practices reveal an important lesson - when the stakes are highest, stability and precision outweigh convenience.

This deep dive uncovers the hidden layers of trust that keep email functioning as one of the internet’s most essential systems.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

Welcome to the deep dive. Today we're going past the browser window, way down into

0:05

the

0:06

foundational infrastructure that keeps the world's email running. Yep. We've

0:10

gathered a really deep

0:11

stack of sources for this one. Technical security docs, open source mailing list

0:16

protocols going

0:16

back decades, and some high-level corporate product pages. And our mission here is

0:21

really

0:22

to demystify this whole enterprise email stack. We're diving into a veteran mail

0:28

transfer agent,

0:29

an MTA called Sendmail. Right. And this isn't just about how an email gets from A

0:33

to B. It's about

0:34

how these massive organizations, the ones that handling billions of dollars of data,

0:38

make sure

0:38

they can absolutely trust the software they run. And not just the software, but the

0:42

messages

0:43

themselves. We're going to break down these cryptographic tools, things like PGP

0:46

and Decum,

0:47

and they're not some exotic defense. They're essential, completely non-negotiable

0:52

building

0:52

blocks for trust. So if you've ever wondered what really separates your standard

0:57

email service

0:58

from the backbone of global commerce, well, you're about to find out. We're giving

1:02

you a

1:02

shortcut into this high stakes world. Our goal is to give you a clear structured

1:07

intro to all this

1:08

so that even if you're new to infrastructure security, you'll walk away with some

1:12

real

1:12

insights into the systems you use every single day. And before we get started, this

1:17

deep dive

1:17

is proudly supported by Safe Server. Safe Server handles the crucial hosting of

1:22

this kind of complex

1:23

software, and they assist clients worldwide with their digital transformation roadmaps.

1:28

They really make these huge infrastructure transitions manageable. You can find out

1:32

more

1:32

at www.safeserver.de. Okay, let's unpack this. We're talking about SendMail, a name

1:39

that's,

1:40

I mean, it's pretty much synonymous with open source email. It is. But our sources

1:43

really focus

1:44

on the commercial version, the Sentrion platform. Why is that one specifically

1:48

called that as being,

1:49

and this is a quote, not for everyone? That phrase, not for everyone, is. It's the

1:54

clearest signal

1:54

of who it's for, organizations with just gargantuan messaging needs. Okay. SendMail

1:59

itself is an open

2:00

source platform, but Sentrion is the hardened, scaled-up enterprise engine. It's

2:05

built for these

2:06

huge complex environments. So if a company has, say, 100,000 employees or they're a

2:12

global bank,

2:12

they can't just run a basic server. They absolutely cannot. No way. They're facing

2:17

these huge

2:18

long-term technical challenges. They need a platform built to handle a messaging

2:24

roadmap

2:24

that might last a decade. Wow. We're talking about supporting critical tasks like

2:29

virtualization,

2:30

which is running multiple servers on fewer physical machines, or consolidation. Merging

2:36

a bunch of smaller systems into one big one. Exactly. Maging numerous regional

2:40

systems into

2:40

one secure global entity. And of course, the big one today, cloud migration. Sentrion

2:46

is just designed

2:47

to sustain that kind of scale and evolution without failing. It's the industrial-grade

2:52

workhorse. And just for context, the sources are really clear about the pedigree

2:56

here.

2:56

The current open-source core, the engine that powers even Sentrion, is sendmail 8.1.8.2.

3:02

Right.

3:02

And you can download it as a zipped tar file right from FTP.sendmail.org. And even

3:08

the way it's

3:08

distributed tells you something, right? It's a raw package. It implies that the

3:12

people running it

3:13

aren't using some simple installer. No point-and-click setup here. Not at all. They

3:17

are building mission

3:17

critical infrastructure from the ground up, and that requires some serious

3:21

technical diligence from

3:22

the engineers. Which brings us to the first huge security challenge, trusting the

3:27

source. If you're

3:28

downloading a raw package that's going to handle every sensitive piece of data in

3:32

your multi-billion

3:33

dollar company, how do you know it hasn't been, I don't know, intercepted and

3:37

messed with? This is

3:39

where we stop relying on human trust and start relying on pure mathematics. The

3:43

solution is

3:44

cryptographic integrity, specifically using PGP signing keys. Every single send

3:51

mail distribution

3:52

is digitally signed. This signature is created with a private key, and you verify

3:57

it against

3:58

their public key, which is named something like Send Mail Signing Key 2026. And

4:02

this isn't optional,

4:03

is it? It's a mandatory check. The source material uses some very sharp language on

4:06

this. They do.

4:07

The documentation explicitly warns, and this is a direct quote, if the signature

4:12

does not match

4:12

any of these keys, you may have a forgery. The forgery. That is the single non-negotiable

4:17

threshold. If that signature doesn't match the public key you expect, you just, you

4:22

cannot install

4:23

that software. It could be anything. Malware. A backdoor. You just don't know. What

4:28

I found

4:28

fascinating is the history here. They list the current key fingerprint, but they

4:33

also document

4:34

this continuous traceable chain of trust that goes back for decades. All the way to

4:38

1997. Right. And

4:40

they even reference the key used by Eric Allman, one of the original developers,

4:43

before version

4:44

8.8.6. Why does an organization today care about a key fingerprint from 25 years

4:49

ago?

4:50

That's the core of enterprise longevity and compliance. Trust isn't just about the

4:55

newest

4:56

version. It's about the entire historical timeline. Oh. Because a company runs a

4:59

system for 15 years,

5:01

and an auditor comes in and asks them to verify the integrity of the code they used

5:05

a decade ago,

5:06

they have to be able to trace that cryptographic signature. This historical record

5:10

of fingerprints

5:10

like the 2025 key, starting with Aero 32312C7, establishes that continuity. So they

5:16

can prove,

5:17

years later, that everything was authentic. Precisely. They can prove every

5:22

component of

5:22

their system was authentically sourced from the trusted vendor. So the PGP key is

5:27

basically the

5:28

software's cryptographic passport. It verifies its identity and integrity across

5:33

time. That's

5:34

a great way to put it. Okay, so we have a trusted server, but that server sends out

5:38

millions of

5:38

messages. How do we make sure that those messages are equally trustworthy? The

5:42

trust has to shift

5:43

from the code to the payload, right? Exactly. Trusting the server is step one. But

5:48

what happens

5:49

when a message leaves the organization? Or what if a bad actor compromises just one

5:54

account and

5:54

starts sending things? PGP on the server won't help you then. So what does? That's

5:59

where we

5:59

transition to DKIM, or Domain Keys Identified Mail. For our listener who might be

6:03

hearing DKIM

6:04

for the first time, how should they visualize this? If PGP is the software's

6:09

passport,

6:10

what's DKIM? DKIM is the official, unforgeable, wax seal on the envelope of the

6:16

message.

6:16

It's an internet standard, RFC 4871, to be specific, that lets the sending domain

6:22

digitally sign their messages. And that signature is embedded right in the email

6:26

header. Right in

6:27

the header. And what two core security promises does that digital signature make to

6:33

the person

6:33

receiving it? It delivers two things instantly. First, authentication. The receiver

6:38

can verify

6:39

the message genuinely came from the domain it says it came from, so no more address

6:43

spoofing.

6:44

That's huge. And the second. Integrity. The receiver can mathematically verify that

6:49

the

6:49

message content, the headers, and the body has not been altered since it left the

6:53

signing server.

6:54

This is critical for stopping those man in the middle attacks where someone changes

6:58

banking info

6:59

or a delivery address. It's just a fundamental defense against phishing. I also

7:04

love that the

7:04

sources point out this wasn't a solo effort. No, it was a recognition of an

7:08

industry-wide problem.

7:10

DKIM was developed through cooperation between Sendmail, Cisco Systems, and Yahoo.

7:15

That's quite

7:15

a team. It is, and it shows how early these major players realized that message

7:20

verification needed

7:20

to be a universal standard to maintain trust in email as a whole. And the open

7:24

source community

7:26

kept that ball rolling. The sources mentioned the OpenDKIM project. They did. After

7:31

the standard

7:31

was adopted, the OpenDKIM project started. It's a community effort that produces a

7:36

C library

7:36

and an open source mail filter, a milter. A milter. It's like a plug-in that

7:41

processes email traffic.

7:42

Sort of, yeah. Think of it as a modular tool that filters email at key points. And

7:47

OpenDKIM

7:48

provides this capability. What's interesting is it started as a code fork of an

7:52

older sendmail

7:53

developed package. And now, it's the standard DKIM implementation that ships with

7:58

the Sentry

7:58

and Message Processing Engine. Okay, so we've secured the foundation with sendmail

8:02

and PGP,

8:03

and we've secured the content with DKIM. Let's zoom out to the broader context. All

8:08

of this exists

8:09

within a larger corporate environment, often managed by security companies like Proofpoint.

8:14

What are the modern concerns in that ecosystem? Well, the modern shift is huge.

8:18

Historically,

8:19

security was all about the perimeter firewalls, filters, that sort of thing. The

8:22

castle walls.

8:23

The castle walls, exactly. Today, the focus is squarely on the people aspect. The

8:28

industry

8:28

calls it human resilience. Human resilience, acknowledging that the employee

8:31

clicking the wrong

8:32

link is your weakest point. Yeah, precisely. The sources detail things like threat

8:37

protection and

8:38

data security. But human resilience is the key. It's about driving behavior change,

8:44

increasing risk

8:44

visibility. They realize that no amount of PGP or DCAM can stop someone from giving

8:50

away their

8:51

password in a sophisticated social engineering attack. So tools like ZenGuide,

8:55

which the sources

8:56

mention, aren't just about those annoying annual security videos we all have to

8:59

watch. No, they're

9:01

actively measuring and trying to modify employee risk behavior. Yeah. They aim to

9:06

move the needle

9:07

on human vulnerability. Instead of trying to block every single threat, which is

9:12

impossible,

9:12

they focus on minimizing the impact of the threat that inevitably gets through.

9:17

They're modeling risk scores based on who clicks on phishing tests, who reports

9:20

them.

9:20

It's a huge philosophical shift. That really is. Okay, shifting back to the nuts

9:25

and bolts of the

9:25

send mail community itself, let's talk about the rules of engagement. Even this

9:28

highly technical

9:29

world has these rigid, almost ancient protocols for reporting security issues. What

9:34

happens if

9:35

a server admin finds a zero-day flaw? They can't just send a quick email. The

9:39

procedure is deliberately

9:40

slow and secure. First, official advisories are issued globally by organizations

9:45

like Cert.

9:46

Okay. Second, server-related security problems have to be reported to a dedicated

9:50

confidential

9:51

email address, sendmailsecurity-yyyy at support.sendmail.org. And the crucial part,

9:59

you have to secure your own message. Absolutely. Security reports must use PGP

10:03

encryption. It

10:04

ensures confidentiality so vulnerability details don't leak while a patch is being

10:08

developed.

10:09

They simply will not process an unencrypted critical report.

10:13

And that's a hard line between that and just general support questions, right? You

10:16

can't mix

10:17

those up. No, you can't. Non-security questions like setup advice or how to avoid

10:21

spam are strictly

10:22

sent to the public Usenet group, comp.mail.sendmail. It keeps the security channel

10:26

clear for actual

10:27

threats. And if you look at their communication rules, they are incredibly strict.

10:32

No HTML,

10:33

no proprietary formats, plaintext only. Why the insistence on these, I mean, legacy

10:38

standards?

10:39

It links directly back to stability and backward compatibility. The systems

10:43

reviewing these patches

10:44

are often ancient, stable, non-chewo systems. Modern conveniences just introduce

10:50

fragility.

10:51

They break things.

10:52

They break things. By enforcing plaintext and 7-bit ASCII in the subject line,

10:57

you eliminate the risk of encoding errors that could mask a malicious payload or

11:01

just break

11:02

the parsing script on their end.

11:04

So if your fancy email client adds one little HTML tag, your crucial security

11:09

report just gets

11:09

trashed before a human even sees it.

11:11

Exactly. And it goes even further. They do what they call strict RFC checks. They'll

11:16

actively

11:16

reject mail if a domain's MX record points to an IP address instead of a hostname.

11:21

Which might work sometimes, but it's not the rule.

11:23

It's not the rule. The protocol demands a hostname. If you deviate, your message is

11:27

blocked because that deviation could signal a misconfigured, untrustworthy sender.

11:32

In this world, conformity to decades-old standards is everything.

11:36

It really reinforces that idea that true security often relies on stripping away

11:40

layers of complexity that modern software keeps adding.

11:43

Absolutely. Simplicity, defined by strict protocol, is the ultimate security

11:49

feature in this ecosystem.

11:50

That brings us to our synthesis. We've done a deep dive into Send Mail Sentrion,

11:55

the workhorse of enterprise email. We detailed the two pillars of cryptographic

12:00

trust.

12:01

PGP keys to verify the software itself. And D-A-M-M, the standard that verifies

12:06

the message content and the sender. And finally, we saw how enterprise

12:10

security has pivoted to address the human element through what they call human

12:14

resilience.

12:15

The takeaway, really, is that security isn't a single product. It's a layered

12:19

architecture,

12:19

built on non-negotiable standards and decades of diligent tracking. It's a world

12:24

where continuous

12:25

cryptographic verification is the only way to establish trust.

12:29

And for a final thought for you to mull over, consider those strict communication

12:33

rules again.

12:33

Plain text, no challenge response systems, strict RFC checks. These are the

12:38

communities

12:38

that literally keep the internet's core communication flowing. So why must they

12:42

rely on such rigid, seemingly simple standards just to communicate? It highlights

12:46

that when

12:47

the stakes are highest, precision and stability will trump every single modern

12:50

convenience.

12:51

Indeed. It's a powerful lesson.

12:53

And finally, a big thank you again to our sponsor.

12:57

This deep dive was made possible by SafeServer. They handle the hosting of complex

13:01

software like

13:01

Sendmail and support your digital transformation initiatives. You can learn more

13:05

at www.safeserver.de. Join us next time for another deep dive.

13:05

at www.safeserver.de. Join us next time for another deep dive.