Thanks Matt!  Points well taken.  As I only use SA on a gateway with very
limited access, I have not been too worried about the potential spamd
exploit.  However, user_prefs is not my first choice.  In fact, I would
rather use local.cf with spamd.  I just don't like the idea of restarting
spamd every time I would care to implement a rule.

Regards,
Larry


> -----Original Message-----
> From: Matt Kettler

> Well, it's going to be VERY dependant on message rate and cpu 
> power.. So tossing it aside is a pretty gross assumption. The level
> of "unacceptable" is entirely dependent on these.. If I get 1
> message per hour,  10 milliseconds of processing a message isn't a
> big deal, if I get 1 million messages per second, well,  even 1ms
> of processing is going to break the system.
> 
> It's also going to be very dependant on the rules themselves. 
> Rules which use backtracing are _massively_ more expensive than
> simple rules.
> 
> Also, with spamd allowing rules in user_prefs is a security 
> risk if you have any untrusted users who can log in and make their
> own user_prefs files. Theoreticaly they might be able to construct
> a clever regex and abuse that to exploit spamd and gain it's
> privileges (usually root). Thus I warn you to think very carefully
> before putting "allow_user_rules 1" into your local.cf. That
> feature is disabled by default for a good reason.
> 
> 
> Really for timing probably your best bet is to measure it 
> yourself using the time command. Run a sample message through "time
> spamc <message" a few times, then do it a few more with a bunch of
> rules added to user_prefs. You might want to disable RBLs and
> network checks for this test so that they aren't adding extra
> randomness to the behavior of the test.



-------------------------------------------------------
This SF.net email is sponsored by: VM Ware
With VMware you can run multiple operating systems on a single machine.
WITHOUT REBOOTING! Mix Linux / Windows / Novell virtual machines
at the same time. Free trial click here:http://www.vmware.com/wl/offer/358/0
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to