In the last episode (Jun 03), Cassandra Lynette Brockett said:
> I have seen many entries like this since configuring spamass-milter
> on my site (usernames and hosts addresses that count hidden) :-
> 
> Jun  3 16:12:16 hotline sendmail[2444]: h53NCEH02444: from=<[EMAIL PROTECTED]>, 
> size=3600, class=-60, nrcpts=1, msgid=<[EMAIL PROTECTED]>, proto=ESMTP, daemon=MTA, 
> relay=mailinglist.relay.com [<mailinglist_ip>]
> Jun  3 16:12:16 hotline spamd[1366]: connection from localhost.localdomain 
> [127.0.0.1] at port 4770
> Jun  3 16:12:16 hotline spamd[2446]: info: setuid to localuser succeeded
> Jun  3 16:12:19 hotline spamd[2446]: processing message <[EMAIL PROTECTED]> for 
> localuser:503.
> Jun  3 16:12:22 hotline spamd[2446]: clean message (-2.0/5.0) for localuser:503 in 
> 6.0 seconds, 3661 bytes.
> Jun  3 16:12:24 hotline spamd[1366]: connection from localhost.localdomain 
> [127.0.0.1] at port 4773
> Jun  3 16:12:24 hotline spamd[2457]: info: setuid to localuser succeeded
> Jun  3 16:12:24 hotline spamd[2457]: processing message <[EMAIL PROTECTED]> for 
> localuser:503.
> Jun  3 16:12:26 hotline spamd[2457]: clean message (-102.0/5.0) for localuser:503 in 
> 1.9 seconds, 4125 bytes.
> Jun  3 16:12:26 hotline sendmail[2453]: h53NCEH02444: to=<[EMAIL PROTECTED]>, 
> delay=00:00:12, xdelay=00:00:04, mailer=local, pri=139732, dsn=2.0.0, stat=Sent
> 
> Yes, spamd is being run twice for each message, this is because I
> don't want spamass-milter to do anything but test the message and if
> it is higher than a certain value - reject it.
> 
> On the first occassion spamd is being called (from what I can tell
> from spamass-milter via "spamc -c localuser") and on the second
> occassion it is from /etc/procmail as the running user.
> 
> All of my site-wide score modifications and user-preferences are in
> both the local user_prefs file, and an sql database that is checked
> when spamd is called (I patched my spamd process to handle both when
> called with -q as the documentation suggests should happen).  As far
> as I can tell the sql lookup is being done in both cases, but the
> system-wide and per-user settings are not being used in the first
> instance...  The user in question has a whitelist for every email
> originating from the mailinglist in their local user_prefs file so it
> should be being tagged with -102.0.  I tried running

Whitelist entries for remote addresses should work fine from a milter;
they work for me at least..

There _is_ a difference between running spamassassin from a milter and
running it from procmail, though.  The milter hooks are at the message
receipt stage of sendmail processing, so you're seeing the message
exactly at the remote system sent it.  Procmail sees the message after
it has been routed through sendmail, so the most obvious thing you'll
see is an extra Received: header for the local machine.  Depending on
your masquerading rules, your From: and To: headers may be modified as
well.  Notice that the message size is different on the "clean message"
lines.

If this particular list is only identified by its envelope FROM
address, then the first SA run will not see it at all.  Sendmail adds a
"Return-path:" header to the top of each message with this info, so
your second SA run from procmail can see it.  I'm thinking about adding
an option to spamass-milter that inserts the envelope header lines into
the message header during the SA check to work around this.

-- 
        Dan Nelson
        [EMAIL PROTECTED]


-------------------------------------------------------
This SF.net email is sponsored by:  Etnus, makers of TotalView, The best
thread debugger on the planet. Designed with thread debugging features
you've never dreamed of, try TotalView 6 free at www.etnus.com.
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to