On the original install you should have installed fedora repo which has
perl-Mail-MboxParser
dnf -y --enablerepo=fedora install dspam dspam-libs dspam-client
dspam-mysql dspam-web
On 2/1/2026 11:43 AM, Peter Peltonen wrote:
Hi,
Thanks for the tip:
I was not aware I did not have the latest version. I had the qmt
current repo enabled, but apparently I needed to have the testing repo
in use to get the latest version of spamdyke.
After updating to 5.0.1-6 my blacklist filtering now works also with
TLS, thanks!
I ran into another issue though: after enabling the testing repo, I
now get this:
# dnf update
Last metadata expiration check: 0:03:16 ago on Sun 01 Feb 2026
08:37:41 PM EET.
Error:
Problem: package simscan-1.4.0-9.qt.el8.x86_64 from qmt-testing
requires dspam, but none of the providers can be installed
- cannot install the best update candidate for package
simscan-1.4.0-5.qt.el8.x86_64
- nothing provides perl(Mail::MboxParser) needed by
dspam-3.10.2-33.qt.el8.x86_64 from qmt-testing
- nothing provides perl(Mail::MboxParser) needed by
dspam-3.10.2-34.qt.el8.x86_64 from qmt-testing
Not sure how to resolve this and I am unsure if I should install other
packages from testing than spamdyke?
Maybe I should just switch the testing repo off?
Best,
Peter
On Sun, Feb 1, 2026 at 5:46 PM Eric Broch <[email protected]> wrote:
Why haven't you upgraded spamdyke to 5.0.1-6?
On 2/1/2026 2:33 AM, Peter Peltonen wrote:
>
> I started digging why Spamdyke blacklisting sometimes fails on my
> qmailtoaster server. The cause seems to be that it's not
compiled with
> tls support and therefore msgs received with tls encryption are not
> being filtered.
>
> Is there a reason why tls is not compiled in? What I have
installed is:
> spamdyke-5.0.1-1.qt.el8.x86_64
>
> and here is my config-test result:
>
> # /usr/bin/spamdyke --config-file /etc/spamdyke/spamdyke.conf \
> > --config-test \
> > /var/qmail/bin/qmail-smtpd /home/vpopmail/bin/vchkpw /bin/true
> spamdyke 5.0.1+CONFIGTEST+DEBUG (C)2015 Sam Clippinger, samc (at)
> silence (dot) org
> http://www.spamdyke.org/
>
> Use --help for an option summary, --more-help for option details or
> see README.html for complete documentation.
>
> WARNING: Running tests as superuser root(0), group root(0).
These test
> results may not be valid if the mail server runs as another user.
> ERROR: /var/qmail/bin/qmail-smtpd appears to offer TLS support. The
> "tls-type" and "tls-certificate-file" options are being used but
TLS
> support is not compiled into spamdyke. Unless it is recompiled with
> TLS support, the following spamdyke features will not function
during
> TLS deliveries: graylisting, sender whitelisting, sender
blacklisting,
> sender domain MX checking, DNS RHSBL checking for sender domains,
> recipient whitelisting, recipient blacklisting, limited number of
> recipients and full logging.
> SUCCESS: /var/qmail/bin/qmail-smtpd does not appear to offer
SMTP AUTH
> support. spamdyke will observe any authentication and trust its
> response (although that appears unlikely to happen).
> SUCCESS(config-file): Opened for reading:
/etc/spamdyke/spamdyke.conf
> SUCCESS(dns-resolv-conf): Opened for reading: /etc/resolv.conf
> ERROR(graylist-level): The "graylist-level" option is "none" but
other
> graylist options were given. They will all be ignored.
> SUCCESS(header-blacklist-file): Opened for reading:
> /etc/spamdyke/blacklist_headers
> SUCCESS(ip-blacklist-file): Opened for reading:
/etc/spamdyke/blacklist_ip
> SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading:
> /etc/spamdyke/blacklist_keywords
> SUCCESS(ip-in-rdns-keyword-whitelist-file): Opened for reading:
> /etc/spamdyke/whitelist_keywords
> SUCCESS(ip-whitelist-file): Opened for reading:
/etc/spamdyke/whitelist_ip
> SUCCESS(qmail-rcpthosts-file): Opened for reading:
> /var/qmail/control/rcpthosts
> SUCCESS(rdns-blacklist-file): Opened for reading:
> /etc/spamdyke/blacklist_rdns
> SUCCESS(rdns-whitelist-file): Opened for reading:
> /etc/spamdyke/whitelist_rdns
> SUCCESS(recipient-blacklist-file): Opened for reading:
> /etc/spamdyke/blacklist_recipients
> SUCCESS(recipient-whitelist-file): Opened for reading:
> /etc/spamdyke/whitelist_recipients
> SUCCESS(sender-blacklist-file): Opened for reading:
> /etc/spamdyke/blacklist_senders
> SUCCESS(sender-whitelist-file): Opened for reading:
> /etc/spamdyke/whitelist_senders
> ERROR(tls-certificate-file): TLS support is not compiled into this
> executable but a TLS certificate file was given anyway:
> /var/qmail/control/servercert.pem
> ERROR: Tests complete. Errors detected.
>
> Best,
> Peter
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail:
[email protected]