I've had a rule filtering out that font color for several months with no
complaints. I tag it with the description "Spammers favorite color"
;-)
-Michael
>>> "Mose', Mark" <[EMAIL PROTECTED]> 11/14/03 02:33PM >>>
Folks:
Anybody have any experience in flagging this type of obscuration:
w
I am watching the log file of a new 2.60 upgrade go past my log file
viewer and I'm seeing some messages get caught as spam because they are
from AOL. These are known accounts with my company and we have received
many messages in the past that were not flagged as spam. Since the 2.6
install they
I wrote a short shell script that does the trick for me. It assumes that there is a
file, local.cf.top that has all the config info from the normal local.cf file,
everything except the white or blacklist info, and a file local.cf.names that contains
all the whitelist and blacklist lines.
Run w
Most of us know about the very helpful virus echo service by
mimesweeper. (If you don't, send an empty email to
[EMAIL PROTECTED] and you will get back an email containing
the virus test file called eicar.com. VERY useful for testing e-mail
anti-virus setups.)
How about setting up a service wher
I have a pid file running with my SA. It is a very minor hack to the
/etc/init.d/spamd file. Look for the two lines that reference
/var/run/spamd.pid and add them to your spamd (or spamassassin) init
file.
case "$1" in
start)
# Start daemon.
echo -n "Starting spamd: "
d
I'm trying to get the RPM's to install and their are failed
dependencies... But there shouldn't be!
Here's what I get:
# rpm -ivh perl-Mail-SpamAssassin-2.55-1.7.3.i386.rpm
error: failed dependencies:
perl(HTML::Parser) is needed by perl-Mail-SpamAssassin-2.55-1
But, when I try to update
smime.p7m
Description: S/MIME encrypted message
First, you will have to change the port spamd uses since only root
accounts can attach to port numbers < 1024.
Second, check the rights to ALL the spamassassin files. Spamd must be
able to read, and sometimes write to all the configs, databases, etc.
Third... Oh, forget it. Just run spamd as r
Use spamc/spamd. The actual spam filter (spamd) can reside on any host
that the spam client (spamc) can access on port 783.
spamc -d machine-with-spamd-running.domain.com
-Michael
>>> "Johnny L. Wales" <[EMAIL PROTECTED]> 06/12/03 01:43PM >>>
Hi folks!
I was wondering if anyone could tell me
I was reading the docs and it wasn't real clear what messages needed to
be sent through the sa-learn process. Do I need only ham that was
marked as spam and spam that was not marked? If SA auto-learns, is
there any value in sending messages that were correctly scored back
through the process?
Th
Hi!
>>> "Cassandra Lynette Brockett" <[EMAIL PROTECTED]> 06/02/03 12:42PM
>>>
> Personally not really liking rhat very much, I'd suggest another OS,
but for
> stability, so far 6.2 is the most stable of the rhat releases I've
played
> with, though 7.3 is a good runner up. I'd give 9 a while (read
Um... Here we go again!
I hope this won't be another 30+ message thread trying to convince a
user that he is not talking to the right group of people.
Mike,
This list is for users of the SpamAssassin product. None of us here
have any control whatsoever over the use or (probably in your opinion
If you have a Linux firewall between your Exchange server and the
Internet, you could run SA on it.
That's what I do with my GroupWise system. I'd be surprised if
Exchange didn't have some kind of 3rd party hooks for virus scanning
which should work just as well for spam.
-Michael
>>> "Bill O'R
Hey, Joe.
I am doing almost the same thing, except I hand off the email to
GroupWise.
Rather than use Sendmail which has just had another major security hole
published, I use postfix. The configuration is much simpler and there
is a great paper on integrating postfix with SA. Now if I could jus
I do something a little different. I have a script called whitelist
that adds the domain or email to the local.cf file for me. The script
is called /usr/local/sbin/whitelist. I created a soft link from there
to /usr/local/sbin/blacklist so I can maintain a single file.
Here's the script. If
Um... Am I missing something here?
I have spamc and spamd running on the same box. Spamd only listens to
127.0.0.1.
Why do we need to authenticate the user of spamc at all? Are we
worried about a remote user running spamc on their box and forging mail
through ours? A local user forging someth
Did you restart spamd?
service spamassassin restart
--or--
/etc/init.d/spamassassin restart
--or--
Whatever your flavor of *nix uses to stop and restart the spamd
service.
-Michael
>>> Patrick Bores <[EMAIL PROTECTED]> 11/11/02 10:34AM >>>
Hello,
I have the following in my user_prefs file:
ve the next
upgrade...
Quentin Krengel
http://www.oilsoflife.com/netmarket
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of
Michael Weber
Sent: Tuesday, November 05, 2002 11:52 AM
To: [EMAIL PROTECTED]
Subject: [SAtalk] Newbie to Spamassassin Q
Greetings!
I h
mand at the
end of my script. I just wasn't sure I needed to, or what would happen
if spamd was in the middle of processing a message when it got
restarted.
Thanx!
-Michael
>>> Theo Van Dinter <[EMAIL PROTECTED]> 11/05/02 12:12PM >>>
On Tue, Nov 05, 2002 at 11:52
Ok. I have written a script to update the local.cf file a little more
automatically. (It adds a correctly formatted whitelist entry for me.)
I am using spamd rather than calling spamassassin from my postfix
service. Do I need to HUP spamd everytime I make a change or does it
re-read the conf fi
Greetings!
I have just finished installing SA 2.4.2 and my users are pretty happy
with it. Except those who get html messages.
The message...
SPAM: Start SpamAssassin results
--
SPAM: End of SpamAssassin results
21 matches
Mail list logo