Benny,
On Thu, 09 Jun 2011 22:38:25 -0400, Daryl C. W. O'Shea wrote:
header CUSTOM_X_SPAM_FLAG X-Spam-Flag:raw =~ /\bYES\b/i
Can't work, the M::S::PerMsgStatus::check_timed calls:
$self-{msg}-delete_header('X-Spam-.*');
before invoking any checks. Moving that call further down
makes it
Sandro,
if can(Mail::SpamAssassin::Plugin::URIDNSBL::has_tflags_domains_only)
urirhssub URIBL_DBL_REDIR dbl.spamhaus.org. A 127.0.1.3
bodyURIBL_DBL_REDIR eval:check_uridnsbl('URIBL_DBL_REDIR')
describeURIBL_DBL_REDIR Spamhaus spammed redirector
Sandro,
if can(Mail::SpamAssassin::Plugin::URIDNSBL::has_tflags_domains_only)
urirhssub URIBL_DBL_REDIR dbl.spamhaus.org. A 127.0.1.3
bodyURIBL_DBL_REDIR eval:check_uridnsbl('URIBL_DBL_REDIR')
describeURIBL_DBL_REDIR Spamhaus spammed redirector
Sandro,
I find a lot of spam that has already passed other spam-filters with
spamassassin better tuned than mine an already have a X-Spam-Flag to YES.
I tried to add a rule to match that case:
header CUSTOM_X_SPAM_FLAG X-Spam-Flag =~ /\bYES\b/i
score CUSTOM_X_SPAM_FLAG 5
But
Benny,
As a workaround, you may add some header rewrite rule to your MTA
which could rewrite a X-Spam-Flag to something else, like
X-X-Spam-Flag.
will not give invalid dkim ?
No, unless the X-Spam-Flag were signed, which is unlikely.
Mark
Sandro,
As an example I have a message that include a link to ow (dot) ly (/)
57lle. Querying host ow.ly.dbl.spamhaus.org clearly shows that it's s
spammer redirector.
If I feed the message to 'spamassassin -t' I get:
Content analysis details: (0.0 points, 5.0 required)
and feeding
Now that perl 5.14.0 is gaining traction (appeared in FreeBSD ports and
elsewhere), I'd like to point out that a module Crypt-OpenSSL-RSA 0.26
is still not fixed and an old bug now results in Mail::DKIM failing,
consequently DKIM checks in SpamAssassin and in amavisd fail.
The fix is rather
On Wednesday May 18 2011 09:42:55 monolit wrote:
do you have any experience with usage of SQLITE database as storage for
Spamassassin? Spamassassin uses Berkeley DB, but I need to replace it.
I could not find any manual, guide or just phorum discussion about
colaboration Sapmassassin with
John,
I am sure i am doing something trivially wrong. A new server and
Spamassassin installed from source. When I attempt top start spamd I
get
Starting spamd ..done
Spamd restarted on water2
defined(%hash) is deprecated at
/usr/lib/perl5/site_perl/5.12.1/Mail/SpamAssassin/Dns.pm line
David F. Skoll wrote:
That's a bad design. Our system can accept mail to multiple
recipients with individual filtering and without running many
SpamAssassin processes in parallel. It can be done.
Indeed.
Per Jessen wrote:
Sure, it's only a question of queueing.
I'd join David and say
Andreas Schulze wrote:
the perldoc in some files is minimalistic :-)
But sometimes the perldoc produces mangages with errors:
- lib/Mail/SpamAssassin/Plugin/OneLineBodyRuleType.pm
- lib/Mail/SpamAssassin/Util/DependencyInfo.pm
- lib/Mail/SpamAssassin/Util/RegistrarBoundaries.pm
Attached my
header L_AV_Unofficial X-Amavis-AV-Status =~
m{\bAV:Sanesecurity.TestSig_Type4_Hdr.2.UNOFFICIAL\b}
Which seems to be scoring 4 just fine:
X-Spam-Status: ... tests=[.. L_AV_Unofficial=4
Indeed.
The weird part is this:
X-Spam-Status: ...
Similar comments for the Spamhaus ZEN list, which includes the
PBL information. (The comment in 20_dnsbl_tests.cf saying that
Spamhaus SBL+XBL is now called Zen is in error -- the ZEN
list combines SBL, XBL, and PBL.)
Sahil Tandon writes:
That comment is harmless, and likely an artifact
Marco,
When spamd is started at boot time I get the error:
warn: Use of uninitialized value $opt{syslog-socket} in lc at
/usr/local/bin/spamd line 444
It has been there for a long time but doesn't seem to be damaging, but I
was wondering what it means, and if I can get rid of it.
PS:
On Friday April 15 2011 18:53:47 dar...@chaosreigns.com wrote:
apt-get install python-software-properties # the add-apt-repository command
add-apt-repository ppa:darxus/spamassassin-daily
apt-get update
apt-get install spamassassin spamc
It's building for Karmic (9.10), Lucid (10.04),
On 13/04/2011 10:08 PM, Noel Butler wrote:
I've looked high and low and dont seem to be adding this locally,
shouldn't it be a negative score of 0.1?
Or better still, null, and only get a score if valid which is applied
(DKIM_VALID=-0.1,), Seems the above only cancels this out and either
Marcin,
This option doesn't work as i wish ;) spamd child isn't killing after
time set in --timeout-child, it is working, and working and utilizes
100% CPU until i send kill signal.
It seems for me this option works as described below:
(for this example --timeout-child=10 sec)
Should i
David F. Skoll wrote:
Using Pg for Bayes data will be really slow. We don't use the SpamAssassin
Bayes implementation and we went through three iterations of storage
back-ends before finding one we liked.
1) PostgreSQL: Convenient but slow.
2) Berkeley DB: Faster than PostgreSQL, but
Btw, I forgot to add that the:
bayes_auto_learn_on_error 1
feature in SpamAssassin trunk is a big help in keeping an
auto-learning Bayes database growth in check.
$ man Mail::SpamAssassin::Plugin::AutoLearnThreshold
bayes_auto_learn_on_error (0 | 1)(default: 0)
With
eval:check_rbl_sub('iprep-firsttrusted', '127.\d+.\d+.100') describe
Do not forget to backslash-quote dots in a regular expression
if you mean a literal dot instead of 'any character'.
Mark
Do not forget to backslash-quote dots in a regular expression
if you mean a literal dot instead of 'any character'.
Eep. That was copied from existing rules. I believe you're right, and
there are a bunch of rules that need more escaping. Thanks.
True, there is a bunch of rules that
Kris Deugau wrote:
Mark Martinec wrote:
When we started using SpamAssassin years back our bayes and awl
databases were on a Berkeley DB. This worked reasonably well (sharing
your opinion on being 'occasionally flaky'), but the auto-expiration
long times started to grow from minutes
when local dns server is working there must only be one single nameserver
in resolv.conf and options rotate nust not be enabled
On Friday March 18 2011 04:04:23 Karsten Bräckelmann wrote:
In the SA case, due to some issues with the underlying DNS Perl module,
IIRC the first nameserver is
Margrit,
...it is a very serious problem...
Test , from 11 to 13 today...
I've configured our central system filter (before
transfering mail to receipients)
...logging X-Sam-Score/X-SPAM-Report if Score 5
there were 160 mails with only such
MISSING_HEADERS ...but all of
Just in case one would like to attach additional spam score to faked twitter
messages with original twitter text, faked signatures, and actual URL links
to spam sites, here are the rules (for SA 3.3.*, DKIM plugin enabled):
full __L_DKIM_VALID_TWITTER eval:check_dkim_valid(twitter.com)
header
Benny,
full __L_DKIM_VALID_TWITTER eval:check_dkim_valid(twitter.com)
why not check_dkim_invalid(foo) ?
There is not such eval rule 'check_dkim_invalid'.
Even if it were, it would be misleading: a bad signature is supposed
to be indistinguishable from a missing signature.
if its valid,
Stefan,
I'm currently doing research for my bachelor thesis on how to
automatically extract FAQs from unstructured data.
For this I've built a system automatically performing the following:
- Load thousands of conversations from forums and mailing lists (don't
mind the categories there).
Darxus,
And I'm curious if you are asking the question you mean to. What exactly
is the way postfix checks this? Specifically, I'm wondering if you're
referring to reject_unknown_client, which I've used for years, and which
does not use MX addresses.
I don't know of an option to reject
David F. Skoll writes:
Well... any domain that sends mail must be prepared to receive it
also, if only to receive DSNs.
It is routine to block mail from a sending domain if it lacks MX, A and
records. Sendmail does that by default.
Blocking simply for a lack of MX records is wrong,
Jeremy, Noel,
I'm using SpamAssassin 3.2.5, and the FreeMail.pm plugin v2.001 from
http://sa.hege.li, along with the rules from the 20_freemail.cf file at the
same location.
My first question is why does (mr.anthonywalter2010[at]gmail.com) appear
twice within the FREEMAIL_FROM entry
Henrik,
Hmm yes I was wondering about this... so $pms-{conf} isn't actually per
message then? Too busy to dive into that right now..
No, the $pms-{conf} is just another ref or shortcut to $main-{conf}.
Changes there affect the global configuration.
The calls to $pms-clear_test_state and
Adam Katz wrote:
I consider it a mission-critical component to be able to deliver a
rejection notice at SMTP-time (to avoid backscatter from an emailed
bounce message). The other systems out there (specifically amavis and
mailscanner) just can't do this while spamass-milter does it with very
On Thursday February 10 2011 21:14:59 Adam Katz wrote:
Does this affect sendmail as well as postfix? I assume so,
but wanted an explicit confirmation.
Yes, the security hole is entirely within the milter,
independent of the MTA.
Mark
On Thursday February 10 2011 22:26:37 Patrick Ben Koetter wrote:
I tried the exploit and it seems that Postfix' restrictions that check for
FQDN address and correct recipient syntax prevent the exploit from getting
through:
RCPT TO:root+:|touch /tmp/foo
501 5.1.3 Bad recipient address syntax
Adam Katz wrote:
... Why is Amavis here for the ride? They don't use spamass-milter!
Unrelated. Just Michael being at home on both mailing lists.
Mark
-- Forwarded Message --
Subject: Hurricane Electric IPv6 Update
Date: Friday February 4 2011, 04:13:01
From: Hurricane Electric i...@he.net
* IANA IPv4 Exhaustion
At a ceremony held on 3 February, 2011 the Internet Assigned
Numbers Authority (IANA) allocated the remaining
On Saturday January 29 2011 15:51:25 James Lay wrote:
Just did a new install and I'm seeing the below when spamassassin is
checking an email:
Jan 29 07:47:42 gateway spamd[15540]: dns: sendto() failed: Connection
refused at
/usr/lib64/perl5/site_perl/5.10.1/Mail/SpamAssassin/DnsResolver.pm
J4,
warn: dcc: dccifd - check skipped: dcc: failed to connect to a
socket /var/dcc/dccifd: Connection refused
The socket is there:
srw-rw-rw- 1 dcc spamd 0 Jan 10 09:40 /var/dcc/dccifd
local.cf has :-
use_dcc 1
dcc_path /usr/local/bin/dccproc
If a Unix socket is giving you trouble,
Mauricio,
I want to use whitelist_from_rcvd, so I am trying to understand
TrustPAth. If you had your MTA outside of your LAN (outside IP LANIP,
internal subnet LANSUB) with its own public IP (say MAILIP), would you have
internal_networks = MAILIP LANIP LANSUB
trusted_networks = MAILIP
Consider for a moment how hard it would be for an average spammer to
spoof rDNS
This has nothing to do with DNS. The trusted/internal/msa networks
only checks an IP address as it stands in an Received header field,
it does not check nor depend on its rDNS or forward DNS.
Mark
On 1/5/2011 5:11 PM, Mark Martinec wrote:
Btw, the BOTNET plugin also produces a FP hit for any IPv6 connection,
regardless of its rDNS. If someone is interested in a quick hack
patch, I can post it.
Mark, please do post the patch. It's good to see that someone is
supporting
$3|v3n,
Jan 5 12:39:34 spamassasin-test amavis[53483]: (53483-01) SA dbg: async:
completed in 0.131 s: URI-DNSBL, DNSBL:dbl.spamhaus.org.:pornhunter.co.tv
Jan 5 12:39:34 spamassasin-test amavis[53483]: (53483-01) SA dbg: async:
completed in 0.128 s: URI-DNSBL,
Combining p0f with BOTNET is indended to *reduce* the high number
of false positives that BOTNET alone produces, *at least* for the
non-windows machines. The windows hosts are left alone and are
not protected by p0f from BOTNET FP.
If someone is scoring p0f in combination with BOTNET differently,
On Wednesday December 29 2010 20:05:20 Per Jessen wrote:
How about the case of rejecting/scoring obviously forged senders?
I.e. from-address = facebook.com and dkim verification completed,
but failed. That is a pretty good reason for a high score or a
reject, whereas from-address =
Jonas,
config: warning: score set for non-existent rule
SANE_7429530a7398f43f1f1b795f9420714e
config: warning: score set for non-existent rule
SANE_91eb43f705d25c804374a746d7519660
config: warning: score set for non-existent rule
SANE_04e8bf28eb445199a7f11b943c44d209
config: warning:
Alright thanks for clearing that up, do you think the other warnings
about missing rules is also just sloppiness?
The DKIMDOMAIN_IN_DWL*, ACCESSDB and SHORTCIRCUIT are fixed
now, and SUBJ_RE_NUM removed:
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6499
trunk (and 3.3, assuming
Rolf,
running (soon to be upgraded):
SpamAssassin Server version 3.2.5
running on Perl 5.8.8
I'm new to this list, although I'm not new to SpamAssassin. Looking at
http://spamassassin.apache.org/tests_3_3_x.html, and particularly at the
following DKIM tests:
DKIM_VERIFIED
Rolf,
Does it mean http://spamassassin.apache.org/tests_3_3_x.html needs a
correction of the score (1) for these tests?
I guess so. Not sure where these scores came from. Anyway, that page
is just a development/testing tool, don't worry too much about it.
What matters is the score in your
On Tuesday December 21 2010 08:45:03 Per Jessen wrote:
I think I must have asked this before, so I must have forgotten the
answer - is there any way of distinguising between DKIM verification
negative and DKIM could not verify?
No, there currently is no way to distinguish a temporary failure
myself wrote:
No, there currently is no way to distinguish a temporary failure
(e.g. a timeout due to network problems) from other DNS failures
in SpamAssassin's DKIM plugin.
On the other hand, this isn't too bad. A DKIM validity is commonly
associated with whitelisting or reputation, so a
Jeffrey,
I'm running SpamAssassin version 3.3.1, running on Perl version 5.10.0.
I'm seeing a lot of errors similar to:
config: failed to parse line, skipping, in
/tmp/.spamassassin13924v0B7j5tmp/60_adsp_override_dkim.cf:
adsp_override ebay.com
during the daily cron run. (the entire
Michael,
can we use the askdns.pm for SA 3.3 or do we have some missing dependencies?
(I noticed some rules in latest couple of saupdates:
20_dnsbl_tests.cf:askdns DKIMDOMAIN_IN_DWL
_DKIMDOMAIN_._vouch.dwl.spamhaus.org TXT /^([a-z]+
)*(transaction|list|all)( [a-z]+)*$/
Angel,
I have run it with amavis user. I attach you the output of the command.
There you can see some checks (dns checks), but it seems that none of
them is passed.
I only one serious issue that I can see:
Assuming the xenon12.um.es is your MX, it needs to be declared as such
in your
Angel,
Since a time, I'm observing that I have a lot of messages with:
have you tried a debug?
spamassassin -t -D spam-message
Now I've done. This is an example for a message:
Content analysis details: (0.0 points, 5.0 required)
pts rule name description
On Tuesday November 9 2010 09:29:57 Marcin Mirosław wrote:
Trying 66.232.79.143...
Connected to mail.redfish-solutions.com.
554 mail.redfish-solutions.com ESMTP not accepting messages
(the message is now sitting in our queue, retrying periodically)
Just from curiosity, You mail
Philip,
Try the following patch. If it works for you, I'll rerelease as 1.19:
my ($self, $ip, $bits, $data) = @_;
- $data ||= $bits ? $ip/$bits : $ip;
+ $data ||= defined $bits ? $ip/$bits : $ip;
my $packed = inet_pton(AF_INET6, $ip) || croak(invalid key);
Hmm. What I had in
Philip,
Thanks for your off-list reply. Unfortunately I cannot
reply, as your mailer is refusing connections:
$ host -t mx redfish-solutions.com
redfish-solutions.com mail is handled by 10 mail.redfish-solutions.com.
$ telnet -s mail4.ijs.si mail.redfish-solutions.com 25
Trying
Michael,
debug seems to indicate a DNS problem, but, all 'manual' dns tests come
back immediately (fine)
running a caching dns server, perl 5.10.1, SA 3.3.1. Net::DNS version: 0.66
NOT using ipv6.
ran 'spamassassin -D {email}'
everthing scrolled past pretty quickly. then:
Nov 5
On Tuesday November 2 2010 16:40:49 Rob McMahon wrote:
The fix to NetAddr::IP seems to be as simple as
--- NetAddr/IP/Lite.pm.bak Fri Oct 29 00:33:06 2010
+++ NetAddr/IP/Lite.pm Tue Nov 2 15:18:05 2010
@@ -740,7 +740,7 @@
if ($mval == 128) { # cidr 128
You might be able to get better results with: Net-Patricia-1.18
which I released earlier this week.
Thank you for bringing it to our attention. Now that you have added
the AF_INET6 support is became useful. I toyed with it for a while,
looks good and fast
(and a bit memory fat compared
On Thursday 28 October 2010 17:34:28 Giampaolo Tomassoni wrote:
I'm too late: Steve Huff already did it...
See: https://rt.cpan.org/Public/Bug/Display.html?id=62521 .
Perfect. Thank you guys.
| Thu Oct 28 19:41:16 2010 michael [...] bizsystems.com
fixed in release 4.035
Mark
| Thu Oct 28 19:41:16 2010 michael [...] bizsystems.com
fixed in release 4.035
Actually ... maybe not fixed ... investigating
Mark
On Friday 29 October 2010 16:35:31 Mark Martinec wrote:
| Thu Oct 28 19:41:16 2010 michael [...] bizsystems.com
fixed in release 4.035
Actually ... maybe not fixed ... investigating
NetAddr::IP 4.035:
correct, this case is now fixed:
$ perl -le 'use NetAddr::IP; print NetAddr::IP
Giampaolo,
still incorrect:
$ perl -le 'use NetAddr::IP; print NetAddr::IP-new6(127/8)'
0:0:0:0:0:0:7F00:0/8
This seems way too ambiguos to me, isn't?
No, it isn't ambiguous, it is a perfectly valid syntax for an IPv4
network, although nowadays somewhat deprecated in favour for the
On Thursday 28 October 2010 14:29:41 Giampaolo Tomassoni wrote:
this morning Gentoo people liked to upgrade NetAddr::IP from 4.033 to
4.034.
People with stable systems (a Gentoo feature) actually runs SpamAssassin
3.3.1.
Soon after upgrading NetAddr::IP, a lint run reported these:
Looking into it...
I know NetAddr::IP recently got a re-design and probably SA have to cope
with this.
Looks like a but in NetAddr::IP 4.034, it forgets to adjust the CIDR mask
when converting an IPv4 address to an IPv6 notation:
correct (NetAddr-IP-4.033):
$ perl -le 'use NetAddr::IP;
Looks like a but in NetAddr::IP 4.034, it forgets to adjust the CIDR
mask when converting an IPv4 address to an IPv6 notation:
s/but/BUG/:)
correct (NetAddr-IP-4.033):
$ perl -le 'use NetAddr::IP; print NetAddr::IP-new6(127.0.0.0/8)'
0:0:0:0:0:0:7F00:0/104
wrong
On Tuesday October 26 2010 19:30:55 Daniel McDonald wrote:
On 10/26/10 12:18 PM, Carlos Mennens carlosw...@gmail.com wrote:
Today for the 1st time on my mail server I attempted to manually run
the 'sa-update' command in the shell and got the following:
[r...@mail ~]# sa-update
On Sunday 24 October 2010 14:34:04 escalera wrote:
Fol all messages, spamassassin takes 14++ seconds. Version: 3.3.1
Debuging it, the times are:
Oct 24 14:03:20 email spamd[22477]: timing: total 14237 ms -
read_scoreonly_config: 4 (0.0%),
signal_user_changed: 6 (0.0%),
parse: 6 (0.0%),
On Sunday 24 October 2010 16:09:08 Cedric Knight wrote:
I'm trying to get some performance data on a customised ruleset using
the instructions at
http://wiki.apache.org/spamassassin/ProfilingRulesWithDprof
and have two problems.
Firstly, I'm not actually getting any *_body_test or
On 07.10.10 13:28, Giampaolo Tomassoni wrote:
I see what you mean, but, well, I personally would vote no to this.
I'm really tired of all that mailing lists which can't stay from
attaching their own banners and general hints at the message tail.
I fully agree.
not mentioning breakage
John,
Just installed spamassassin on a gentoo box with perl 5.12.
sa-update gives:
Constant subroutine IO::Socket::INET6::AF_INET6 redefined at
/usr/lib64/perl5/5.12.2/Exporter.pm line 64.
at /usr/lib64/perl5/vendor_perl/5.12.2/IO/Socket/INET6.pm line 16
Prototype mismatch: sub
On Thursday 30 September 2010 06:57:15 Gerald Turner wrote:
Hans-Werner Friedemann h-w.friedem...@vds-herzberg.de writes:
Hi @ all
what´s the matter with pyzor if I get the following hint by starting
spamd?
Wed Sep 29 11:23:29 2010 [5176] info: zoom: able to use 675/1223
'body_0'
Michael,
these new dkim tests confuse me :-)
DKIM_ADSP_DISCARD=1.8
seems like it decided this is a forged email?
It is implemented as per RFC 5617.
seems ok to me. I can pastebin it if someone wants.
spf pass, dkim passes (dkim_valid), rcvd_in_rp_certified,
rcvd_in_dnswl_med, rdns and
Jason,
After a new OpenSuSE 11.3 mail server build (SpamAssassin 3.3.1, Postfix
2.7.1, invoking SpamAssassin using Amavisd-new) I'm seeing messages getting
stuck in the Postfix queue with errors similar to this:
host 127.0.0.1[127.0.0.1] said: 451 4.5.0 Error in processing, id=24421-02,
On Thursday September 2 2010 01:52:28 Runbox wrote:
Would you please remove Runbox.com from that list as we have not been a
free email provider since 2001.
Kim
Thanks, removed!
Should propagate with the next sa-update.
Mark
On Saturday 28 August 2010 20:00:11 LAWRENCE WILLIAMS wrote:
He was talking about RBL checks when he said that, not the DBL. I think it
was just that he used a non-standard format in his reply, which confuses
some people
Regardless, it is still not working for me. I completely removed and
On Monday August 30 2010 21:19:22 LAWRENCE WILLIAMS wrote:
I think I was confused for a second. I merely posted the --lint output so
that a better eye could see if it showed anything that was obviously
wrong. I do not run SA this way normally.
Like I said before, I am using a stock SA 3.3.1
Lawrence,
Either your DNS resolver is borked, or your firewall/home-router
is playing jokes on you.
Are you using Google Public DNS for this? Don't!
This is a dedicated server in a facility in the US. The server is
configured to use the resolvers 4.2.2.1 and 4.2.2.2
I wouldn't dream
It is definitely something with those resolvers. When I try the host
command you gave me, I get the following error:
Host midpage.ru.dbl.spamhaus.org. not found: 3(NXDOMAIN)
I am contacting the DC now and will hopefully have no further need for
assistance on this mailing list :)
See also:
LuKreme,
adsp_override blizzard.com custom_high
adsp_override *.blizzard.com custom_high
OK, and than I just do that for every doamin?
Yes, for every domain that you are sure to always provide a valid
DKIM or DK signatures and always send directly, and after you
make sure that your mailer
LuKreme,
Been getting a lot of messages form hotmail and others claiming to be from
Blizzard account management or Aeon account services, or a whole host of
others.
They are not pegging SA at all, scoring usually close to 0 (they will get
Bayes_00 and sometimes a spamcop hit to balance
Alex,
My understanding is that the only way to avoid this, at least when
amavisd and postfix, is to create another instance and modifying the
smtpd and using policy banks, which is quite involved. Is this
correct?
Depends on your mail routing topology. Often it suffices to just:
Per,
I have a bit of SA code where I strip leading and trailing whitespace -
foreach (@addrs) { s/^\s*([^\s]+)\s*$/\1/; }
Whenever I run this I get the warning \1 better written as $1 which I
understand to be perl telling me that the right side of s/// should use
$digit, not \digit. I
Per,
There are no spaces in the string, it's an email address.
An email address can legitimately contain a space, see RFC 2822,
e.g.
some x user@example.com
I did try using $1 on the right side of the s///, but it didn't work.
Most weird. Which version of perl?
Try this:
$ perl -le
Alex,
I have a server that's frequently pretty busy during the day, and just
started to notice these messages periodically:
Jun 8 13:35:39 mail01 amavis[28784]: (28784-272) SA TIMED OUT,
backtrace: at /usr/lib/perl5/5.6.0/i386-linux/IO/Select.pm line
On Friday June 4 2010 07:09:25 Scot Meyer wrote:
I am unable to get a clean install using the directions in INSTALL from
working. I have a VM of the Mandriva image prior to installing any
version of spamassassin. Then I downloaded 3.3.1 and followed the
directions including running sa-update
On Thursday 03 June 2010 18:02:23 Charles Gregory wrote:
As I mentioned before, I noticed this difference myself, and presumed it
was just a characteristic of the 'improved' logic for deep-scanning the
body of emails, and perhaps just a larger number of rules than before
Though I am still
Andy,
FreeBSD 8.0-p2
Exim 4.71
SpamAssassin 3.3.1
Perl 5.10.1
All packages have been installed from source via FreeBSD ports.
The problem:
Two main issues really
1) Ever since this server was built (as a replacement for another
Exim/FreeBSD mail server) I have been seeing in the main
Jose Luis,
I have installed SA 3.3.1 with pyzor 0.5.0 on a server with CentOS 4.8,
reviewing SA logs shows the following message:
warn: pyzor: check failed: internal error, python traceback seen
in response
It should be noted that I recently updated to version 4.7 CentOS 4.8
So what
On Monday 31 May 2010 16:13:24 Per Jessen wrote:
Michael Scheidell wrote:
interesting that sa 3.3.1 only scores this as a +1 score. must mean
it doesn't match a lot of spam vs ham.
Must also mean that it is not an issue in SA 3.3, good. In my case, the
email is not spam as such, I
It's the same issue as was already resolved for the ClamAV plugin,
the data structure changed from hash to a list (so that ordering
of add_header can be maintained).
See:
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6254
Ah, thank you. I made this change in POPAuth.pm at
On Thursday 20 May 2010 08:46:25 Per Jessen wrote:
Per Jessen wrote:
Robert Mangiafico wrote:
On Tue, May 18, 2010 at 2:53 AM, Per Jessen p...@computer.org wrote:
I googled a bit, and found the following:
Pseudo-hashes have been removed from Perl, afaict as of 5.1.0. It's
really perl
On Tuesday May 18 2010 23:24:41 Michael Scheidell wrote:
probably not intentional, but with all the copies of the
SpamAssassin::CONF files all over the world (and the silly spammers
harvesting anything with @ in it)
The poor folks at http://www.ress.com must be wondering why they keep
On Tuesday 04 May 2010 16:40:28 Michael Scheidell wrote:
Have an email, Subject: header exists, but is blank (not even a space
after the :) but the MISSING_SUBJECT rule does not trigger.
should it? I have seen a couple of these in the past. so far, all spam.
(running sa 3.3.1 with latest
Kalpin Erlangga Silaen wrote:
I always get this error (once a day)
Apr 22 14:07:35 stargate amavis[7147]: (!)Net::Server: 2010/04/22-14:07:35
HUP'ing server
after that, amavis down and can not connect to port 10024
amavisd-new-2.6.4 (20090625)
Versions older than 2.7.0 (not yet
Michael,
Getting lots of twits sending out phishing emails 'from' twitter.com
(the spam looks good, the only thing they change is the a href in the
email, other than that, its exactly the twitter mail)
Twitter DKIM signs all their emails (and they come from
postmaster.twitter.com, NOT
You don't have an author domain signature, the signature there
is a 3rd party signature, twitter.com != postmaster.twitter.com
DKIM-Signature: [...] d=twitter.com
From: Twitter@postmaster.twitter.com
is there an author subdomain signature ?
No, it has no more value than any
On Sunday April 18 2010 21:33:20 Chris Welch wrote:
I just upgraded a CentOS 5.4 system to Spamassassin 3.3.1. The upgrade was
done by a CPAN install with Perl.
The previous version (3.2.5) had worked flawlessly for a couple of years.
However, the upgraded version reports an error in the
Patrick,
i could use some help to understand a failed SPF check ..
SPF record for Domain isrigb.co.uk is v=spf1 mx a:mail.isrigb.co.uk -all
Irrelevant. The SPF record in question is:
$ host -t txt mail.isrigb.co.uk
mail.isrigb.co.uk descriptive text v=spf1 mx -all
mail was send from
201 - 300 of 740 matches
Mail list logo