On 10 Jan 2019, at 23:15, listsb wrote:

On Jan 10, 2019, at 06.05, Kevin A. McGrail <kmcgr...@apache.org> wrote:

I believe this is a known issue fixed in svn. We need to get 3.4.3 out the door for this. Are you able to test with the 3.4 branch from svn?

thanks. i've done a crude test just grabbing sa-update from svn, with some progress:

sa-update -v --allowplugins --channelfile /etc/spamassassin/sa-update-conf.d/channels.txt --gpgkeyfile /etc/spamassassin/sa-update-conf.d/sa-update-keys.txt --gpghomedir /var/lib/spamassassin/sa-update-keys
Update available for channel sought.rules.yerp.org: -1 -> 3402014020421
http: (curl) GET http://yerp.org/rules/MIRRORED.BY, success
http: (curl) GET http://rules.yerp.org.s3.amazonaws.com/rules/stage/3402014020421.tar.gz, success http: (curl) GET http://rules.yerp.org.s3.amazonaws.com/rules/stage/3402014020421.tar.gz.sha512, FAILED, status: exit 22 http: (curl) GET http://rules.yerp.org.s3.amazonaws.com/rules/stage/3402014020421.tar.gz.sha256, FAILED, status: exit 22 http: (curl) GET http://rules.yerp.org.s3.amazonaws.com/rules/stage/3402014020421.tar.gz.asc, success channel 'sought.rules.yerp.org': could not find working mirror, channel failed
Update failed, exiting with code 4

it parses the url properly now, but still fails.

This breakage is a FEATURE, not a bug.

i guess it doesn't like only having the asc file?

Correct. That channel provides no usable hash file and so cannot work with sa-update. If you would like a version of sa-update that does not require hash files, hack it up at will: that's what open source is for.

Also, the signature is bad:

$ gpg --verify -v 3402014020421.tar.gz.asc
gpg: armor header: Version: GnuPG v1.4.10 (GNU/Linux)
gpg: assuming signed data in '3402014020421.tar.gz'
gpg: Signature made Tue Feb  4 16:48:02 2014 EST
gpg:                using DSA key DC85341F6C6191E3
gpg: Note: signature key DC85341F6C6191E3 expired Wed Aug 9 19:29:42 2017 EDT gpg: Note: signature key DC85341F6C6191E3 expired Wed Aug 9 19:29:42 2017 EDT gpg: Note: signature key DC85341F6C6191E3 expired Wed Aug 9 19:29:42 2017 EDT
gpg: using pgp trust model
gpg: BAD signature from "Justin Mason Signing Key (Code Signing Only) <signing...@jmason.org>" [expired]
gpg: binary signature, digest algorithm SHA1, key algorithm dsa1024


And finally: that rule channel has not been updated in almost 4 years and almost surely will never be updated again. Trying to use sa-update with it is pointless and dangerous and so it SHOULD break. If the theory and praxis behind the final round of generation and scoring of the SOUGHT rules was valid in 2014, they would be essentially worthless against the mythical average mailstream of 2019. They may or may not be useful for any particular mailstream today but in any case they are unmaintained and unsupported. No one should use them without local testing and ongoing local oversight of their performance against one's local mailstream.

Reply via email to