On Thu, May 30, 2002 at 12:44:40PM +0200, Andreas Jellinghaus wrote: > Hi, > > i'm using SA with spamproxyd and postfix. > some changes i needed to make: > - eliminate the usual print statements, as i wanted to run it as daemon > started by init.d script, so i don't need that info.
spamproxyd is not yet a daemon. see my note about the daemonization. see my local.cf for having only a small report in headers. > - the parameter check is wrong. first ARGV == 2 is tested, > later ARGV == 3, which cannot happen (the optional spam target email > address) to be put on the todo list, but should'nt be too hard to solve. > - the newline between header and body is lost. as a result the body > till the first empty line is recognized as header by the email apps > and that way usualy hidden. bug #339 (fixed by the patch attached) (see http://hughes-family.org/bugzilla/show_bug.cgi?id=339) I don't know why this patch hasn't been commited into cvs (that's an important bug) > > also, killing spamproxyd isn't easy. there should be a way to shut it > down cleanly without losing email. here is a startup script who should ease the thing... until spamproxyd is a daemon and catch the signals (then closing the port, delivering the lasts emails and exiting (see todo)) you can do spamproxyd.sh debug (spamproxyd.sh is attached to my mail) see when there is no mail in transit (by looking at the originating ports of postfix, and ^C the time you want. (you need screen to do that) This is ugly, but it works until someone (may be me) will implement spamproxyd as a daemon. Please commit it so other people can use it too... (eww... there is hardcoded paths in it... sorry for that) > > based on the 11/21/2001 version... > > anyone else had similiar problems? > > btw: does postfix also allow lmtp filtering? i would prefer socket/lmtp > communication over tcp/ip, since it is easier to secure. i don't know, sorry. i use tcpip on localhost. bye xavier
spamproxyd.sh
Description: Bourne shell script
#required_hits 5 auto_report_threshold 50 rewrite_subject 0 report_header 1 use_terse_report 1 defang_mime 0 auto_whitelist_factor 0.5 clear-terse-report-template terse-report _HITS_ hits, _REQD_ required; skip_rbl_checks 1 auto_whitelist_factor 0.5 # required_hits 5 # whitelist_from [EMAIL PROTECTED] score GAPPY_TEXT 0.3 #score NO_EXPERIENCE 0.3 # img src -> cumulatif ? header FLOWGO_IN_HEADERS ALL =~ /flowgo\.com/i describe FLOWGO_IN_HEADERS flowgo (spammer) found in headers score FLOWGO_IN_HEADERS 3 body FLOWGO_IN_BODY /flowgo\.com/i describe FLOWGO_IN_BODY flowgo (spammer) found in body score FLOWGO_IN_BODY 2