>Michelle --
>
>...and then M. Brownsworth said...
>%
>% Suppose a recipient wanted a message that had been marked as spam by
>% mistake, intercepted, and archived.  Is there a way to deliver this
>% specific message to the recipient, preventing it from being
>
>Almost certainly; anything is possible :-)
>
>% intercepted again?  It would involve circumventing spamd's scanning
>
>Hmmm...  On this I'm not so sure, though...
>
>% this message so that it can be redelivered to the user's local
>% mailbox.
>
>In some recent posts there has been talk of SA automatically (that is, in
>the default configuration) pasing over, whitelisting, or otherwise
>handling x-spama or x-beenthere headers.  While I don't believe the
>latter gets injected by SA in a check pass, I think that the former does.
>
>Anything you hand off to sendmail, whether using /usr/bin/mail or
>anything else, will definitely go through your SA check because it has to
>be delivered (well, really, transferred by the MTA to hand off to the
>delivery agent MDA, procmail), so you'll want this sort of whitelisting
>in place.
>
>An alternative, I suppose, could be having SA or procmail or whatever add
>a header all your own (X-PrimeLogic-SpamTag or such) as it gets delivered
>to the archive system after interception, and then have your configs
>whitelist that.  [Note that I'm not sure if there is a way to actually
>tell SA to pass something through other than setting the whitelist value
>to a sufficiently (ridiculously?) low number like -1000.]  Another could
>be to have your recovery method, whatever that is, hand the mail directly
>to the user's procmail or mailbox so that you *do* bypass the transport
>step.
>
>HTH & HAND & have fun :-)
>
>:-D
>--
>David T-G                      * It's easier to fight for one's principles
>(play) [EMAIL PROTECTED] * than to live up to them. -- fortune cookie
>(work) [EMAIL PROTECTED]
>http://www.justpickone.org/davidtg/    Shpx gur Pbzzhavpngvbaf Qrprapl Npg!


Some good info and suggestions in your reply.  What do you think of 
this brute-force approach?

$cf = '/etc/mail/spamassassin/local.cf';
system("cp -p $cf ${cf}.tmp"); # Preserve original
open(CF, ">>$cf") || die "Can't open $cf $!\n";
flock(CF, LOCK_EX); # Lock file to prevent updates during processing
print CF "all_spam_to $username";
system("/usr/local/bin/formail -s /usr/sbin/sendmail $username < 
/var/log/spam/$file
flock(CF, LOCK_UN);
close(CF);
rename("${cf}.tmp", $cf); # Restore original

The routine would probably work, but it seems like a crude solution. 
But perhaps it's better than some alternatives.

.\\ichelle

_______________________________________________________________

Don't miss the 2002 Sprint PCS Application Developer's Conference
August 25-28 in Las Vegas -- http://devcon.sprintpcs.com/adp/index.cfm

_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to