Pál László (Sq.) wrote:
It looks this entry has been skipped somehow. Other rule moving spam police messages to /dev/nul works fine.
I'm not seeing where SA is called. It appears that SA is being invoked from outside procmail.
Can you give more info about your system's processing chain?
Here is my complete .procmailrc Is there any way to set-up this /dev/nul behaviour systemwide?
There should be an /etc/procmailrc where you can specify global procmail recipes.
# Please check if all the paths in PATH are reachable, remove the onesthat # are not.PATH= $PATH:$HOME/bin:/usr/bin:/usr/local/bin:.MAILDIR=$HOME/mail # You'd better make sure it exists #DEFAULT=$MAILDIR/egyeb LOGFILE=$MAILDIR/procmail.log LOCKFILE=$HOME/.lockmail:0* ^From.*spamassassin.apache.org spamassassin:0* ^X-Spam-Level: \*\*\*\*\*\*\*\*\*\* /dev/null/:0* [EMAIL PROTECTED] /dev/null:0* ^To: [EMAIL PROTECTED] Bp_Free:0* ^To.*lotuszpagoda* Pagoda:0* [EMAIL PROTECTED] Rendszer:0* [EMAIL PROTECTED] Rendszer:0* ^From.*randivonal* Randivonal :0 * !^Content-Type: message/ * !^Content-Type: multipart/ * !^Content-Type: application/pgp { :0 fBw * ^-----BEGIN PGP MESSAGE----- * ^-----END PGP MESSAGE----- | formail \ -i "Content-Type: application/pgp; format=text; x-action=encrypt":0 fBw* ^-----BEGIN PGP SIGNED MESSAGE----- * ^-----BEGIN PGP SIGNATURE----- * ^-----END PGP SIGNATURE----- | formail \ -i "Content-Type: application/pgp; format=text; x-action=sign" }:0 fBw* ^-----BEGIN PGP PUBLIC KEY BLOCK----- * ^-----END PGP PUBLIC KEY BLOCK----- | formail -i "Content-Type: application/pgp-keys; format=text;" # Mail that is very likely spam (>15) can be dropped on the floor. # Move the # up one line to save it on the server instead. # Note that dropping mail on the floor is a *bad* # idea unless you really, really believe no false positives will # have a score greater than 15.
signature.asc
Description: OpenPGP digital signature