Hi, Thanks for the tip:
I was not aware I did not have the latest version. I had the qmt current repo enabled, but apparently I needed to have the testing repo in use to get the latest version of spamdyke. After updating to 5.0.1-6 my blacklist filtering now works also with TLS, thanks! I ran into another issue though: after enabling the testing repo, I now get this: # dnf update Last metadata expiration check: 0:03:16 ago on Sun 01 Feb 2026 08:37:41 PM EET. Error: Problem: package simscan-1.4.0-9.qt.el8.x86_64 from qmt-testing requires dspam, but none of the providers can be installed - cannot install the best update candidate for package simscan-1.4.0-5.qt.el8.x86_64 - nothing provides perl(Mail::MboxParser) needed by dspam-3.10.2-33.qt.el8.x86_64 from qmt-testing - nothing provides perl(Mail::MboxParser) needed by dspam-3.10.2-34.qt.el8.x86_64 from qmt-testing Not sure how to resolve this and I am unsure if I should install other packages from testing than spamdyke? Maybe I should just switch the testing repo off? Best, Peter On Sun, Feb 1, 2026 at 5:46 PM Eric Broch <[email protected]> wrote: > Why haven't you upgraded spamdyke to 5.0.1-6? > > On 2/1/2026 2:33 AM, Peter Peltonen wrote: > > > > I started digging why Spamdyke blacklisting sometimes fails on my > > qmailtoaster server. The cause seems to be that it's not compiled with > > tls support and therefore msgs received with tls encryption are not > > being filtered. > > > > Is there a reason why tls is not compiled in? What I have installed is: > > spamdyke-5.0.1-1.qt.el8.x86_64 > > > > and here is my config-test result: > > > > # /usr/bin/spamdyke --config-file /etc/spamdyke/spamdyke.conf \ > > > --config-test \ > > > /var/qmail/bin/qmail-smtpd /home/vpopmail/bin/vchkpw /bin/true > > spamdyke 5.0.1+CONFIGTEST+DEBUG (C)2015 Sam Clippinger, samc (at) > > silence (dot) org > > http://www.spamdyke.org/ > > > > Use --help for an option summary, --more-help for option details or > > see README.html for complete documentation. > > > > WARNING: Running tests as superuser root(0), group root(0). These test > > results may not be valid if the mail server runs as another user. > > ERROR: /var/qmail/bin/qmail-smtpd appears to offer TLS support. The > > "tls-type" and "tls-certificate-file" options are being used but TLS > > support is not compiled into spamdyke. Unless it is recompiled with > > TLS support, the following spamdyke features will not function during > > TLS deliveries: graylisting, sender whitelisting, sender blacklisting, > > sender domain MX checking, DNS RHSBL checking for sender domains, > > recipient whitelisting, recipient blacklisting, limited number of > > recipients and full logging. > > SUCCESS: /var/qmail/bin/qmail-smtpd does not appear to offer SMTP AUTH > > support. spamdyke will observe any authentication and trust its > > response (although that appears unlikely to happen). > > SUCCESS(config-file): Opened for reading: /etc/spamdyke/spamdyke.conf > > SUCCESS(dns-resolv-conf): Opened for reading: /etc/resolv.conf > > ERROR(graylist-level): The "graylist-level" option is "none" but other > > graylist options were given. They will all be ignored. > > SUCCESS(header-blacklist-file): Opened for reading: > > /etc/spamdyke/blacklist_headers > > SUCCESS(ip-blacklist-file): Opened for reading: > /etc/spamdyke/blacklist_ip > > SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading: > > /etc/spamdyke/blacklist_keywords > > SUCCESS(ip-in-rdns-keyword-whitelist-file): Opened for reading: > > /etc/spamdyke/whitelist_keywords > > SUCCESS(ip-whitelist-file): Opened for reading: > /etc/spamdyke/whitelist_ip > > SUCCESS(qmail-rcpthosts-file): Opened for reading: > > /var/qmail/control/rcpthosts > > SUCCESS(rdns-blacklist-file): Opened for reading: > > /etc/spamdyke/blacklist_rdns > > SUCCESS(rdns-whitelist-file): Opened for reading: > > /etc/spamdyke/whitelist_rdns > > SUCCESS(recipient-blacklist-file): Opened for reading: > > /etc/spamdyke/blacklist_recipients > > SUCCESS(recipient-whitelist-file): Opened for reading: > > /etc/spamdyke/whitelist_recipients > > SUCCESS(sender-blacklist-file): Opened for reading: > > /etc/spamdyke/blacklist_senders > > SUCCESS(sender-whitelist-file): Opened for reading: > > /etc/spamdyke/whitelist_senders > > ERROR(tls-certificate-file): TLS support is not compiled into this > > executable but a TLS certificate file was given anyway: > > /var/qmail/control/servercert.pem > > ERROR: Tests complete. Errors detected. > > > > Best, > > Peter > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [email protected] > For additional commands, e-mail: [email protected] > >
