-------- Original-Nachricht --------
> Datum: Tue, 11 Dec 2007 14:01:23 +0200
> Von: "Dudi Goldenberg" <[EMAIL PROTECTED]>
> An: [email protected]
> Betreff: [dspam-users] dspam stats

> Hello list,
> 
> I'm testing a new installation of dspam 3.6.8 on Debian lenny (testing).
> 
> Everything seems to work fine, dspam is at the early stages of learning...
> 
> One thing I noticed, and could not find the cause for.
> 
> When I look at the System Status page, it shows is has 1 spam message
> today.
> 
> I have tracked the message and found it in a user quarantine.
> 
> The weird thing is that the user stats shows TP: 0 while there are 3
> messages in his quarantine, other counters looks valid:
> 
> mr:~# dspam_stats [EMAIL PROTECTED]
> [EMAIL PROTECTED]  TP:     0 TN:    81 FP:     2 FN:    14 SC:     0
> NC:     0
> mr:~#  
>  
> I have checked dspam_stats again - it shows TP: 0 for all users while at
> least some of them do have some spam detected and quarantined.
> 
> dspam_stats table in mysql agrees with what dspam_stats shows so I don't
> think the problem is within mysql.
> 
I don't understand that. Who agrees with what? If you look in MySQL do you see 
different output then with dspam_stats? Could you run and post the output:
select * from dspam_stats where uid=(select uid from dspam_virtual_uids where 
username='[EMAIL PROTECTED]' limit 1);

Could you run and post the output of (execute one command at time):
describe dspam_preferences;
describe dspam_signature_data;
describe dspam_stats;
describe dspam_token_data;
describe dspam_virtual_uids;

What about groups? Do you have groups active in DSPAM? What are they?

Would it be possible to post the DSPAM headers of such a mail which is not 
counted by dspam_stats?


> dspam.conf follows:
> 
> mr:~# cat /etc/dspam/dspam.conf| grep '^[^#]'   
> Home /var/spool/dspam
> StorageDriver /usr/lib/dspam/libmysql_drv.so
> DeliveryHost        127.0.0.1
> DeliveryPort        10029
> DeliveryIdent       localhost
> DeliveryProto       SMTP
> OnFail error
> Trust root
> Trust dspam
> Trust mail
> Trust mailnull 
> Trust smmsp
> Trust daemon
> Trust nobody
> Trust postfix
> Trust www-data
> Trust cyrus
> TrainingMode teft
> TestConditionalTraining on
> Feature noise
> Feature chained
> Feature whitelist
> Algorithm graham burton
> PValue graham
> SupressWebStats off
> ImprobabilityDrive on
> Preference "spamAction=quarantine"
> Preference "signatureLocation=headers"  # 'message' or 'headers'
> Preference "showFactors=off"
> Preference "spamSubject=*SPAM*"
> AllowOverride trainingMode
> AllowOverride spamAction spamSubject
> AllowOverride statisticalSedation
> AllowOverride enableBNR
> AllowOverride enableWhitelist
> AllowOverride signatureLocation
> AllowOverride showFactors
> AllowOverride optIn optOut
> AllowOverride whitelistThreshold
> AllowOverride localStore
> HashRecMax              98317
> HashAutoExtend          on  
> HashMaxExtents          0
> HashExtentSize          49157
> HashMaxSeek             100
> HashConnectionCache     10
> Notifications   off
> PurgeSignatures 14          # Stale signatures
> PurgeNeutral    90          # Tokens with neutralish probabilities
> PurgeUnused     120         # Unused tokens
> PurgeHapaxes    30          # Tokens with less than 5 hits (hapaxes)
> PurgeHits1S     15          # Tokens with only 1 spam hit
> PurgeHits1I     15          # Tokens with only 1 innocent hit
> LocalMX 127.0.0.1
> LocalMX 192.117.168.211
> LocalMX 192.117.168.210
>
LocalMX with the above addresses is not needed. DSPAM does automatically use 
LocalMX on addresses starting with:
127.
10.
172.16.
192.168.
169.254.


> SystemLog on
> UserLog   on
> Opt out
> ParseToHeaders on
> ChangeModeOnParse on
> ChangeUserOnParse full
> Broken case
> Broken lineStripping
> ClamAVPort      3310
> ClamAVHost      127.0.0.1
> ClamAVResponse spam
>
Could you look in the log if the message was a virus message? Search your log 
for messages containing "A virus was detected in the message contents" and/or 
"virus warning: infected message from <some_ip_address>"


> ServerMode auto
> ServerPass.Relay1       "dspam"
> ServerParameters        "--deliver=innocent -d %u"
> ServerIdent             "dspam.relay"
> ServerDomainSocketPath  "/tmp/dspam.sock"
> ClientHost      /tmp/dspam.sock
> ClientIdent     "[EMAIL PROTECTED]"
> ProcessorBias on
> Include /etc/dspam/dspam.d/
> mr:~# 
> 
> Pointers appreciated...
> 
> Dudi Goldenberg
> CTO
> Kolcore Ltd.
> Registered Linux user #79506
> 
> No virus found in this outgoing message.
> Checked by AVG Free Edition. 
> Version: 7.5.503 / Virus Database: 269.17.0/1180 - Release Date:
> 12/10/2007 14:51
>  

-- 
GMX FreeMail: 1 GB Postfach, 5 E-Mail-Adressen, 10 Free SMS.
Alle Infos und kostenlose Anmeldung: http://www.gmx.net/de/go/freemail

Reply via email to