-------- Original-Nachricht -------- > Datum: Thu, 13 Dec 2007 17:03:01 -0500 > Von: Richard Freeman <[EMAIL PROTECTED]> > An: [email protected] > Betreff: Re: [dspam-users] MySQLUIDInSignature
> Elias Oltmanns wrote: > > > > 1. Specify the actual user instead of root on the commandline. > > > > Message successfully retrained > > > 2. Execute > > # /usr/bin/dspam --source=error --class=spam --user root > --signature=1000,47601b27117601804284693 > > > > Message successfully retrained > > > > 3. The same with user instead of root. > > Message successfully retrained > > > > > 4. Add --mode=TEFT to the commandline options. > > When used with the failing commandline (--user=root, message content > piped in) it still doesn't work. > > > > > If you keep seeing these messages for all the commands above, I'd > > suggest you double check your dspam configuration. In particular, make > > sure that mysql is the selected storage driver and that dspam actually > > uses the databases and tables it is supposed to use. Perhaps you'd want > > to do a whole classify + retrain cycle with a test message like this: > > > > # dspam --user testuser --stdout < prestine.msg > tagged.msg > > # dspam --source=error --class=[previous result] --user root < > tagged.msg > > > > I didn't do this, since all the commands you suggested worked. The > problem is that I can't hard-code the user on the command line since > then it will only work for one user... > > I guess I can create a script that will pipe the message through formail > and extract the DSPAM signature header and then invoke #2 above. Before > I do that any ideas as to getting dspam to do this on its own? > Would it be possible for you to quickly (probably again) post your: dspam.conf main.cf master.cf // Steve -- Der GMX SmartSurfer hilft bis zu 70% Ihrer Onlinekosten zu sparen! Ideal für Modem und ISDN: http://www.gmx.net/de/go/smartsurfer
