Hi Benedict,

I've checked my spam destination settings and grep output, without comments is 
as follows:

[root@spam log]# grep --ignore-case quarantine /etc/amavisd.conf | grep -v '#'
$QUARANTINEDIR = "/var/virusmails";
 $bad_header_quarantine_method = D_DISCARD;
    "-a s --timeout=60 --temp=$TEMPBASE -y $QUARANTINEDIR ".  <<< (this is 
under virus scanners)

I haven't specified any of the other options for bad header quarantine method, 
etc. 

Should I defined these explicitly? 

Kind Regards,
Alan Davies
Business Support 

ITCS - IT Computer Services
Bridgend Ind Estate
Bridgend
CF31 3TP
www.itcs.co.uk 

Tel:   08456 444 200
Fax:  01656 660 016 


-----Original Message-----
From: Benedict White [mailto:[email protected]] 
Sent: 03 September 2013 14:41
To: Alan Davies; [email protected]
Subject: RE: Amavisd question

-----Original Message-----
From: Alan Davies [mailto:[email protected]]
Sent: 03 September 2013 14:36
To: Benedict White; [email protected]
Subject: RE: Amavisd question

>Hi Benedict,
>
>I've upped the verbosity to 5, wow that's quite a bit of logging ;) From the 
>2-3 messages that are going through it appears to be scanning ok, classifying 
>it as spam due to bad headers but when it comes to quarantining it fails with 
>>the message no recognized protocol name. Are there any quarantine options 
>that I may be able to tweak here?
>
A grep quarantine amavisd.conf will return all lines with quarantine in it, so 
that we can confirm where the quarantine is for spam. 
For example my spam quarantine line looks like:

$spam_quarantine_method         = 'sql:';

Yours should be a valid quarantine, and if it's sql you should have a DSN for 
it, I use the same as lookup_dsn so mine looks like:

@lookup_sql_dsn = ( ['DBI:mysql:Amavisd:localhost', 'DBUSer', 'DBPassword] ); 
@storage_sql_dsn = @lookup_sql_dsn;

>I can append some log output if need be.

Hopefully the problem will get fixed without it.... 



Kindest regards,

Benedict White

Reply via email to