Hi folks, I'm setting up spamd with pf, and I'm finding that whitelisted IP addresses are still being greylisted. For example:
$ spamdb | grep 205.150.199.217 WHITE|205.150.199.217|||1162757884|1162761340|1165871748|3|0 GREY|205.150.199.217|<[EMAIL PROTECTED]>|<[EMAIL PROTECTED]>|11627 65339|1162779739|1162779739|1|0 Notice how the same IP address is in both WHITE and GREY. Shortly after running the above, the greylist entry disappeared: $ spamdb | grep 205.150.199.217 WHITE|205.150.199.217|||1162765339|1162769339|1165879789|2|0 That makes sense to me... that's spamlogd doing the right thing. Of note, the spamd-white table is empty: [EMAIL PROTECTED]:~] # pfctl -t spamd-white -T show No ALTQ support in kernel ALTQ related functions disabled [EMAIL PROTECTED]:~] # The rules etc, and most of the stuff I'm doing is documented at http://beta.freebsddiary.org/pf.php Here are some extracts from the above: table <spamd> persist table <spamd-white> persist table <spamd-mywhite> persist file "/usr/local/etc/spamd-mywhite" scrub in all # redirect to spamd rdr pass inet proto tcp from <spamd-mywhite> to $external_addr port \ smtp -> 127.0.0.1 port smtp rdr pass inet proto tcp from <spamd> to $external_addr port \ smtp -> 127.0.0.1 port spamd rdr pass inet proto tcp from !<spamd-mywhite> to $external_addr port \ smtp -> 127.0.0.1 port spamd # mail! pass in log inet proto tcp from any to $external_addr port smtp flags S/SA \ synproxy state pass out log inet proto tcp from $external_addr to any port smtp flags S/SA \ synproxy state It seems as if the spamd-white table is never being updated. Ideas? Suggestions? Comments? Thanks. -- Dan Langille : Software Developer looking for work my resume: http://www.freebsddiary.org/dan_langille.php _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-pf To unsubscribe, send any mail to "[EMAIL PROTECTED]"
