One other thing I should caution you on though, I'm also running the
RBL lists at the frontend to block as many that way before it actually
reaches SimScan, without those then you would likely see resource
issues. Specifically the following RBL checks are used ...
-r cbl.abuseat.org -r dyn
[EMAIL PROTECTED] wrote:
I’m just fishing for
comments on the pros or cons with
simscan plus spamassassin
with razor2. I have just finished a toaster install and also placed
razor2 on
top of the standard spamassassin,
everything is
working like a charm … kudos to Bill
Joe Young wrote:
Sorry, They have a DSL connection with verizon. Their connection
with verizon is 640k down and 256k up.They The server is inhouse and
they will send email to it. The emails will somethings be 8megs big
sent to multiple people. The server will then send multiple 8meg
emails a
Jason 'XenoPhage' Frisvold wrote:
Oh? Have you posted at all on the simscan list? I'm running it here
with no problem...
nm, figured out what was stopping it .. combo of testing qscanq and not
uninstalling their wrapper and also wrong perms on /var/qmail/simscan/
directory.
Seems to work now
Jason 'XenoPhage' Frisvold wrote:
simscan is another one. I can vouch for simscan.. :)
Wish I could get that thing to work, tried a couple a times now and it
just doesn't seem to work, mail seems to just disappear.
John
Eric Noel wrote:
Thanks to all those who responded to my previous question about patching.
Ive been trying to find the ipaddress of most senders both
outside/local, i tried qmailanalog but i only get recipients list or
senders list with no ip. Are there any good scripts there to list a
summary w
Bill Shupp wrote:
Do this MTA have the equivalent of chkuser? If so, you could amend
the chkuser patch to check if the domain is listed in
/var/qmail/control/ntdomains (or whatever you want to call it), and if
so, then call a perl script or something to make an smtp connection
and see if that
Bill Shupp wrote:
I run backup MX for some clients, and mail goes through just fine. I
have not examined the patch closely in a while, but it appears that if
vpopmail does not have a listing for the domain, chkuser does not fail.
I can confirm this, I run a pass-thru virus/spamassassin scanning
trevor wrote:
I use spamassasin site wide with qmail-scanner. So far no problems,
although the more memory you can get the better with this option.
I'm currently using this just fine on about 3 other qmail servers, just
this one RH ES is having the problems, it could be tied to the fact
Perl-Se
Bill Shupp wrote:
I use qscanq/clamav with spamassassin, but spamassassin is on a
per-user config, not site-wide. Works great.
I assume site wide isn't an issue too? :-)
I'll have to do more research into getting SpamAssassin firing up after
qscanq me thinks.
Bill Shupp wrote:
I am working on linux mail server area. I am using qmail mail as my
MTA. I
used to install the entire mail setup as per the instructions given
in the
qmail-toaster. I installed the qmail-scanner and virus guard as the
trend
interscan virus wall. I experienced a problem of repe
I was just thinking and it might be an idea to leave the roaming users
option in the toaster, at least as an additional option for those using
the RBLs to stem the tide of spam. Not really required on a server with
a fairly static range of accessing IPs but for others it is needed when
used in
Bill Shupp wrote:
This makes sense, as rblsmtpd is run *before* smtp-auth happens. With
roaming users, RELAYCLIENT is already set before rblsmtpd runs. The
best solution for you is to turn roaming-users back on.
Thanks Bill, was hoping it was going to be that easy, wasn't sure if a
special
Hi all,
I have a question about the new toaster version. I noticed that the
relay window that used to be opened by successful POP checks was removed
in vpopmail (roaming users?) being used.
One of the issues I've run across here is by removing that users can no
longer use SMTP if they are list
Bill Shupp wrote:
Secondly, after installing the toaster do I need to setup logrotate
to rotate any files for qmail, vpopmail, etc...? My main concern is
qmail.
Nope. This toaster install uses multilog, which rotates logs for you.
One of the things I love about this is the smallness of the
Does your IP have reverse mapping working right (reverse lookup).
If the IP only looks up to a number there's your problem, AOL requires
reverse lookup to connect to them now.
I wish everyone would get it fixed too ... I turned this on at the
local ISPs mail server and man does that cut back
Bill Shupp wrote:
Just wanted to let any of you that use djbdns know about a web
administration tool I just wrote for managing tinydns data, VegaDNS.
It's available here: www.vegadns.org. This is the first public
release, so use with caution, and keep in mind that it will likely
change a lot
pmaag wrote:
Bill,
The only thing that I really need to replicate is user account
details(username and passwords), so people can atleast POP into their account
and send mail if the primary goes down. As of right now uptime is not an
issue, but I really want to prepare for something that knocks
trevor wrote:
ahhh I see yes that would be nice. btw, where did you find the sobig
patch? we got clogged up by that one and i couldn't figure out how to
make qmail-scanner/clamav just drop those emails. it ended up sending
back a reply to all those senders saying they had sobig, even though
trevor wrote:
This is all doable and pretty easy to add to the current toaster. I've
done it. All you need to install is qmail-scanner, spamassassin, and
clamav. Spamassassin uses qmail-scanner to checks all incoming emails and
makes a score based on a rules file. It can then mark the subject
ally their server now
rejects anything with a 6.0+ score in SA at the SMTP level! Slick indeed.
3: Virus refusal at SMTP level, probably doable using the subject line
rejection but could also be done by looking at attachments I think. I
know a patch exists for this one too.
--
John Melvil
Andy Drexler wrote:
I added the host name to the /var/qmail/supervise/qmail-smtpd/run file
and re-ran the tests from http://spamlart.homeunix.org and got the
same results (a lot of "Potential Vulnerabilities"). I guess I need to
"grab the 0.5 patch from shupp.org. You'll have to patch a fresh
(Sorry about the dupe here Bill, forgot to remove your address and put
in the list address, but I feel this should be in the thread archives
for future reference so forwarding to list too)
Bill Shupp wrote:
Which version of the toaster and patch worked without the hostname?
Not sure what ver
qmail didn't exhibit the smtp-auth relay problem (I
rolled back to it until I found the fix).
John Melville
Dynanet Network Services
http://www.dynanet.ca/
Bill Shupp wrote:
So, unless you removed "domain.com" from the script, you should be
fine. Perhaps you upgraded from a much earlier toaster? I don't
recall if/when I added the hostname argument to the default run file.
Yeah that was likely my issue, I've been running it since pretty early
o
Well I found it.
Yes there is a method being employed by spammers to get mail relayed via
our servers using SMTP-AUTH.
If the last line of your /var/qmail/supervise/qmail-smtpd/run file looks
like this ...
/var/qmail/bin/qmail-smtpd /home/vpopmail/bin/vchkpw /bin/true 2>&1
AND you've updated t
-
From: "John Melville" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, August 15, 2003 9:16 AM
Subject: [toaster] Wierd Positive Relay test
Hey gang,
http://relaytest.kundenserver.de/view.php?id=25599688
Is there a bug in the smtp authentication that let
Hey gang,
http://relaytest.kundenserver.de/view.php?id=25599688
Is there a bug in the smtp authentication that let's anyone just use
[EMAIL PROTECTED]
First time I've seen this one and I'd like to keep that type of hole
closed, rediculous what these guys come up with really but then it is a
h
28 matches
Mail list logo