On Tue, 2013-09-24 at 21:12 -0700, google_t...@curranfamilynet.net wrote:
> Greetings, List!
> 
> I just installed 3.3.2 on Slackware 14.  I am seeing what looks like 
> duplicated effort in /var/log/mailog.  Here is the log for a single
> email. You can see the same message ID is processed first by root, then 
> twice as user bobo.  Is this normal?  I had been using SA 3.2.5 on
> the decommissioned server and i never saw this:

You will have to review the entire mail processing chain on that
machine. Here's what I can tell from your logs:


The first scan appears to be by a milter -- most likely some (changed)
default configuration of Sendmail on Slackware. It is obvious this first
scan is not intended by you (Bayes DB locking fails, and missing custom
required_score conf).

Disable the unwanted milter in your Sendmail config.

The following two scans are "identical", i.e. same user, custom config,
Bayes DB (see autolearn=ham and unavailable on the last run, since the
mail has been learned already). At some point you're calling spamc (or
similar) a second time.

Have a close look at per-user procmail recipes, site-wide procmail
recipes, and possibly Sendmail configuration.


Then there's another issue with your server -- you're using a DNS server
that is inappropriate for DNSxL queries.

You are triggering RCVD_IN_DNSWL_BLOCKED and URIBL_BLOCKED. The latter
always, the first one only in the milter-induced run without your custom
per-user conf where you disabled DNSWL rules.

The problem most likely is that you're using your ISP's DNS, who ends up
exceeding the DNSxL's query limit. The solution is to run a local
caching DNS in resolver mode (not forwarder) and using that DNS server
instead of your ISP's one.


-- 
char *t="\10pse\0r\0dtu\0.@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to