I thought that getting this information from "filter_sender" was not
possible with out some more coding, but it is easier from filter_begin,
but this is no good for a filtering.
For example:
filter_begin has this in it:::
if ( defined($SendmailMacros{'auth_type'})) {
md_syslog('debug', "OK");
} else {
md_syslog('debug', "BAD");
}
}
or
filter_sender can have this:::
read_commands_file();
if ( defined($SendmailMacros{'auth_type'})) {
md_syslog('debug', "authid found");
return('ACCEPT_AND_NO_MORE_FILTERING', "authid");
} else {
md_syslog('debug', "authid No");
}
}
Andrew
--
Andrew Watkins * Birkbeck College
http://notallmicrosoft.blogspot.com/
On 19/02/2012 07:34, Jobst Schmalenbach wrote:
On Sat, Feb 18, 2012 at 04:17:58PM +0100, Tilman Schmidt
([email protected]) wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Am 18.02.2012 06:57, schrieb Jobst Schmalenbach:
I don't think you can find out on which port the connection was made,
but you can easily check whether it was authenticated. For example, I am
using
if (defined($SendmailMacros{"auth_type"})) {
to avoid running SpamAssassin on messages submitted by my customers.
(Not because of the server load it generates, but because my customers
tend to be miffed if my server marks their messages as spam. ;-)
Thanks for that.
I have tried this but I can't get it to work.
I added to sendmail.mc
define(`confMILTER_MACROS_ENVFROM', ``i, {auth_type}, {auth_authen},
{auth_ssf}, {auth_author}, {mail_mailer}, {mail_host}, {mail_addr}'')
and to /etc/mail/mimedefang.conf
MD_EXTRA="-a auth_type -a auth_authen -a auth_ssf -a auth_author -a mail_mailer -a
mail_host"
and restarted the lot (sendmail, all milters and mimedefang)
then in filter_sender I did:
if(defined($SendmailMacros{"auth_type"}))
{
md_syslog('info', "###################################### filter sender :
sendmail authtype SET.");
}
else
{
md_syslog('info', "###################################### filter sender :
sendmail authtype NOT set.");
}
but it did not work, here is the log of sendmail (I turned some debugging on).
Feb 19 18:19:03 sendmail[23578]: q1J7J3bQ023578: Milter (greylist): init
success to negotiate
Feb 19 18:19:03 sendmail[23578]: q1J7J3bQ023578: Milter (mimedefang): init
success to negotiate
Feb 19 18:19:03 sendmail[23578]: q1J7J3bQ023578: Milter (clamav): init success
to negotiate
Feb 19 18:19:03 sendmail[23578]: q1J7J3bQ023578: Milter: connect to filters
Feb 19 18:19:03 mimedefang.pl[21047]: filter relay :<175.36.163.211>
<[175.36.163.211]> <> Continue checking .....
Feb 19 18:19:04 sendmail[23578]: STARTTLS=server,
relay=pa175-36-163-211.pa.vic.optusnet.com.au [175.36.163.211] (may be forged),
version=TLSv1/SSLv3, verify=NO, cipher=RC4-MD5, bits=128/128
Feb 19 18:19:05 sendmail[23578]: AUTH=server,
relay=pa175-36-163-211.pa.vic.optusnet.com.au [175.36.163.211] (may be forged),
authid=jobst, mech=PLAIN, bits=0
Feb 19 18:19:05 milter-greylist: User jobst authenticated, bypassing
greylisting
Feb 19 18:19:05 mimedefang.pl[21171]: filter sender :<[email protected]>,
175.36.163.211, [175.36.163.211], pa175-36-163-211.pa.vic.optusnet.com.au
Feb 19 18:19:05 mimedefang.pl[21171]: ######################################
filter sender : sendmail authtype NOT set.
Feb 19 18:19:05 mimedefang.pl[21047]: filter
recipient:<[email protected]>,<[email protected]>, 175.36.163.211,
[175.36.163.211],<[email protected]>, pa175-36-163-211.pa.vic.optusnet.com.au,
?, ?, ?
Feb 19 18:19:05 sendmail[23578]: q1J7J3bQ023578: from=<[email protected]>,
size=690, class=0, nrcpts=1,
msgid=<[email protected]>, proto=ESMTP,
daemon=MTA-SSL, relay=pa175-36-163-211.pa.vic.optusnet.com.au [175.36.163.211] (may be
forged)
Feb 19 18:19:05 sendmail[23578]: q1J7J3bQ023578: Milter add: header:
X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by
milter-greylist-3.0a1 (mail.barrett.com.au [220.233.246.146]); Sun, 19 Feb 2012
18:19:05 +1100 (EST)
Feb 19 18:19:05 mimedefang.pl[21047]: filter main : 175.36.163.211 NOT DOMAIN
based -> continue checking ..
Feb 19 18:19:05 mimedefang.pl[21047]:
MDLOG,q1J7J3bQ023578,mail_in,,,<[email protected]>,<[email protected]>,Test
Feb 19 18:19:05 sendmail[23578]: q1J7J3bQ023578: Milter add: header:
X-Scanned-By: MIMEDefang 2.63 on 220.233.246.146
Feb 19 18:19:05 sendmail[23578]: q1J7J3bQ023578: Milter accept: message
Feb 19 18:19:07 sendmail[23585]: STARTTLS=client,
relay=gmail-smtp-in.l.google.com., version=TLSv1/SSLv3, verify=FAIL,
cipher=RC4-SHA, bits=128/128
Feb 19 18:19:09 sendmail[23585]: q1J7J3bQ023578:
to=<[email protected]>, delay=00:00:04, xdelay=00:00:04,
mailer=esmtp, pri=4690, relay=gmail-smtp-in.l.google.com. [74.125.127.27], dsn=2.0.0,
stat=Sent (OK 1329635949 g9si15313381pbd.311)
Jobst
_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID. You may ignore it.
Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang