-------- Original-Nachricht -------- > Datum: Tue, 11 Dec 2007 14:01:23 +0200 > Von: "Dudi Goldenberg" <[EMAIL PROTECTED]> > An: [email protected] > Betreff: [dspam-users] dspam stats
> Hello list, > > I'm testing a new installation of dspam 3.6.8 on Debian lenny (testing). > > Everything seems to work fine, dspam is at the early stages of learning... > > One thing I noticed, and could not find the cause for. > > When I look at the System Status page, it shows is has 1 spam message > today. > > I have tracked the message and found it in a user quarantine. > > The weird thing is that the user stats shows TP: 0 while there are 3 > messages in his quarantine, other counters looks valid: > > mr:~# dspam_stats [EMAIL PROTECTED] > [EMAIL PROTECTED] TP: 0 TN: 81 FP: 2 FN: 14 SC: 0 > NC: 0 > mr:~# > > I have checked dspam_stats again - it shows TP: 0 for all users while at > least some of them do have some spam detected and quarantined. > > dspam_stats table in mysql agrees with what dspam_stats shows so I don't > think the problem is within mysql. > I don't understand that. Who agrees with what? If you look in MySQL do you see different output then with dspam_stats? Could you run and post the output: select * from dspam_stats where uid=(select uid from dspam_virtual_uids where username='[EMAIL PROTECTED]' limit 1); Could you run and post the output of (execute one command at time): describe dspam_preferences; describe dspam_signature_data; describe dspam_stats; describe dspam_token_data; describe dspam_virtual_uids; What about groups? Do you have groups active in DSPAM? What are they? Would it be possible to post the DSPAM headers of such a mail which is not counted by dspam_stats? > dspam.conf follows: > > mr:~# cat /etc/dspam/dspam.conf| grep '^[^#]' > Home /var/spool/dspam > StorageDriver /usr/lib/dspam/libmysql_drv.so > DeliveryHost 127.0.0.1 > DeliveryPort 10029 > DeliveryIdent localhost > DeliveryProto SMTP > OnFail error > Trust root > Trust dspam > Trust mail > Trust mailnull > Trust smmsp > Trust daemon > Trust nobody > Trust postfix > Trust www-data > Trust cyrus > TrainingMode teft > TestConditionalTraining on > Feature noise > Feature chained > Feature whitelist > Algorithm graham burton > PValue graham > SupressWebStats off > ImprobabilityDrive on > Preference "spamAction=quarantine" > Preference "signatureLocation=headers" # 'message' or 'headers' > Preference "showFactors=off" > Preference "spamSubject=*SPAM*" > AllowOverride trainingMode > AllowOverride spamAction spamSubject > AllowOverride statisticalSedation > AllowOverride enableBNR > AllowOverride enableWhitelist > AllowOverride signatureLocation > AllowOverride showFactors > AllowOverride optIn optOut > AllowOverride whitelistThreshold > AllowOverride localStore > HashRecMax 98317 > HashAutoExtend on > HashMaxExtents 0 > HashExtentSize 49157 > HashMaxSeek 100 > HashConnectionCache 10 > Notifications off > PurgeSignatures 14 # Stale signatures > PurgeNeutral 90 # Tokens with neutralish probabilities > PurgeUnused 120 # Unused tokens > PurgeHapaxes 30 # Tokens with less than 5 hits (hapaxes) > PurgeHits1S 15 # Tokens with only 1 spam hit > PurgeHits1I 15 # Tokens with only 1 innocent hit > LocalMX 127.0.0.1 > LocalMX 192.117.168.211 > LocalMX 192.117.168.210 > LocalMX with the above addresses is not needed. DSPAM does automatically use LocalMX on addresses starting with: 127. 10. 172.16. 192.168. 169.254. > SystemLog on > UserLog on > Opt out > ParseToHeaders on > ChangeModeOnParse on > ChangeUserOnParse full > Broken case > Broken lineStripping > ClamAVPort 3310 > ClamAVHost 127.0.0.1 > ClamAVResponse spam > Could you look in the log if the message was a virus message? Search your log for messages containing "A virus was detected in the message contents" and/or "virus warning: infected message from <some_ip_address>" > ServerMode auto > ServerPass.Relay1 "dspam" > ServerParameters "--deliver=innocent -d %u" > ServerIdent "dspam.relay" > ServerDomainSocketPath "/tmp/dspam.sock" > ClientHost /tmp/dspam.sock > ClientIdent "[EMAIL PROTECTED]" > ProcessorBias on > Include /etc/dspam/dspam.d/ > mr:~# > > Pointers appreciated... > > Dudi Goldenberg > CTO > Kolcore Ltd. > Registered Linux user #79506 > > No virus found in this outgoing message. > Checked by AVG Free Edition. > Version: 7.5.503 / Virus Database: 269.17.0/1180 - Release Date: > 12/10/2007 14:51 > -- GMX FreeMail: 1 GB Postfach, 5 E-Mail-Adressen, 10 Free SMS. Alle Infos und kostenlose Anmeldung: http://www.gmx.net/de/go/freemail
