Re: spamd-setup in crontab

2012-04-14 Thread David Diggles
I had the same problem.  I found that changing the default timing fixed it.  
Thousands of OpenBSD default crons hitting openbsd.org at the same time. 

Le 14/11/2011 10:13, Manuel Giraud a C)crit :
 Hi,

 I've just set up a mail server with 5.0. I have put spamd in front (in
 default greylisting mode). It works great following the man pages but
 when I activate the spamd-setup entry in root's crontab, I receive the
 following error by mail:

 spamd-setup: ftp: Could not add blacklist uatrapsWriting -: : Illegal seek
 Broken pipe

 If i call spamd-setup as root i have no error message. (note: I've used
 the default /etc/mail/spamd.conf file). How can I sort this out?



Re: spamd-setup in crontab

2011-11-15 Thread Comète

Thanks for the tips but does anyone know where this problem come from ?


Le 14/11/2011 10:13, Manuel Giraud a C)crit :

Hi,

I've just set up a mail server with 5.0. I have put spamd in front (in
default greylisting mode). It works great following the man pages but
when I activate the spamd-setup entry in root's crontab, I receive the
following error by mail:

spamd-setup: ftp: Could not add blacklist uatrapsWriting -: : Illegal seek
Broken pipe

If i call spamd-setup as root i have no error message. (note: I've used
the default /etc/mail/spamd.conf file). How can I sort this out?




Re: spamd-setup in crontab

2011-11-15 Thread Raymond Lillard

On 11/14/2011 06:28 AM, James J. Lippard wrote:

I had the same problem, which I worked around by changing my
spamd.conf to use a local file instead of FTP, and downloading the
traplist.gz file in my daily.local.

That is, my spamd.conf now looks like this:

uatraps:\
 :black:\
 :msg=Your address %A has sent mail to a ualberta.ca spamtrap\n\
 within the last 24 hours:\
 :method=file:\
 :file=/etc/mail/traplist.gz:

And my daily.local now has this:

echo Getting traplist.gz.
/usr/bin/ftp -o /etc/mail/traplist.gz http://www.openbsd.org/spamd/traplist.gz



I question the wisdom of identifying the source of
your trapping info.  It outs ualberta.ca as a trap.

Spammers who actually read (I know most don't) reply
messages will know to black list ualberta.  Those
with infected machines who somehow might get see the
message need only know their machine is compromised.

Knowing who trapped their spam does not enable the
owner of the compromised machine to do any thing
they wouldn't do anyhow.  The still need to clean
up their machine.

Regards,
Ray



Re: spamd-setup in crontab

2011-11-15 Thread Benny Lofgren
On 2011-11-15 20.55, Raymond Lillard wrote:
 On 11/14/2011 06:28 AM, James J. Lippard wrote:
 That is, my spamd.conf now looks like this:
 uatraps:\
  :black:\
  :msg=Your address %A has sent mail to a ualberta.ca spamtrap\n\
  within the last 24 hours:\
  :method=file:\
  :file=/etc/mail/traplist.gz:
 
 I question the wisdom of identifying the source of
 your trapping info.  It outs ualberta.ca as a trap.

No, it doesn't. It might out University of Alberta as an organization
that fights spam but there is nothing that says that the *domain*
ualberta.ca itself contains any of the spam trap addresses.

 Spammers who actually read (I know most don't) reply
 messages will know to black list ualberta.  Those
 with infected machines who somehow might get see the
 message need only know their machine is compromised.

Spammers usually never get to see those messages, as they operate
through compromised mail servers or pc:s and most likely use fake
From: addresses anyway.

 Knowing who trapped their spam does not enable the
 owner of the compromised machine to do any thing
 they wouldn't do anyhow.  The still need to clean
 up their machine.

They won't get the messages either...


Regards,
/Benny

-- 
internetlabbet.se / work:   +46 8 551 124 80  / Words must
Benny Lofgren/  mobile: +46 70 718 11 90 /   be weighed,
/   fax:+46 8 551 124 89/not counted.
   /email:  benny -at- internetlabbet.se



Re: spamd-setup in crontab

2011-11-15 Thread Stuart Henderson
On 2011-11-15, Raymond Lillard r...@sonic.net wrote:
 I question the wisdom of identifying the source of
 your trapping info.  It outs ualberta.ca as a trap.

This is fine as far as I'm concerned. If it means the smarter spammers
avoid sending to ualberta.ca as a result, that is good for UofA.



spamd-setup in crontab

2011-11-14 Thread Manuel Giraud
Hi,

I've just set up a mail server with 5.0. I have put spamd in front (in
default greylisting mode). It works great following the man pages but
when I activate the spamd-setup entry in root's crontab, I receive the
following error by mail:

spamd-setup: ftp: Could not add blacklist uatrapsWriting -: : Illegal seek
Broken pipe

If i call spamd-setup as root i have no error message. (note: I've used
the default /etc/mail/spamd.conf file). How can I sort this out?
-- 
Manuel Giraud



Re: spamd-setup in crontab

2011-11-14 Thread Comète
Same error message since one week on an old 4.6 install. But i didn't 
find the origin yet...


Le 14/11/2011 10:13, Manuel Giraud a C)crit :

Hi,

I've just set up a mail server with 5.0. I have put spamd in front (in
default greylisting mode). It works great following the man pages but
when I activate the spamd-setup entry in root's crontab, I receive the
following error by mail:

spamd-setup: ftp: Could not add blacklist uatrapsWriting -: : Illegal seek
Broken pipe

If i call spamd-setup as root i have no error message. (note: I've used
the default /etc/mail/spamd.conf file). How can I sort this out?




Re: spamd-setup in crontab

2011-11-14 Thread James J. Lippard
I had the same problem, which I worked around by changing my
spamd.conf to use a local file instead of FTP, and downloading the
traplist.gz file in my daily.local.

That is, my spamd.conf now looks like this:

uatraps:\
:black:\
:msg=Your address %A has sent mail to a ualberta.ca spamtrap\n\
within the last 24 hours:\
:method=file:\
:file=/etc/mail/traplist.gz:

And my daily.local now has this:

echo Getting traplist.gz.
/usr/bin/ftp -o /etc/mail/traplist.gz http://www.openbsd.org/spamd/traplist.gz

-- 
Jim Lippardlippard-open...@discord.org   http://www.discord.org/
GPG Key ID: 0xF8D42CFE

On Mon, Nov 14, 2011 at 11:43:13AM +0100, Com??te wrote:
 Same error message since one week on an old 4.6 install. But i didn't 
 find the origin yet...
 
 Le 14/11/2011 10:13, Manuel Giraud a C)crit :
 Hi,
 
 I've just set up a mail server with 5.0. I have put spamd in front (in
 default greylisting mode). It works great following the man pages but
 when I activate the spamd-setup entry in root's crontab, I receive the
 following error by mail:
 
 spamd-setup: ftp: Could not add blacklist uatrapsWriting -: : Illegal seek
 Broken pipe
 
 If i call spamd-setup as root i have no error message. (note: I've used
 the default /etc/mail/spamd.conf file). How can I sort this out?



Re: spamd-setup in crontab

2011-11-14 Thread Boudewijn Dijkstra
Op Mon, 14 Nov 2011 15:28:43 +0100 schreef James J. Lippard  
lippard-open...@discord.org:

I had the same problem, which I worked around by changing my
spamd.conf to use a local file instead of FTP, and downloading the
traplist.gz file in my daily.local.

That is, my spamd.conf now looks like this:

uatraps:\
:black:\
:msg=Your address %A has sent mail to a ualberta.ca spamtrap\n\
within the last 24 hours:\
:method=file:\
:file=/etc/mail/traplist.gz:

And my daily.local now has this:

echo Getting traplist.gz.
/usr/bin/ftp -o /etc/mail/traplist.gz  
http://www.openbsd.org/spamd/traplist.gz


I have a slightly more complicated setup which fetches traplist and  
nixspam every two hours:


root's crontab:
# update spamd on :15 every two hours
15  */2 *   *   *   /etc/mail/spamd-setup.sh


spamd-setup.sh:
#!/bin/sh
# sleep 0..15 minutes
/bin/sleep $(($RANDOM / 72))
/usr/local/bin/wget -o /dev/null -NxP /home/ftp/pub/mirrors -nv \
http://www.openbsd.org/spamd/{traplist,nixspam}.gz
/usr/libexec/spamd-setup


Also, china and korea are fetched in daily.local:
# http://www.openbsd.org/spamd/{china,korea}cidr.txt.gz are not mirrored
# regularly, so we use the original source
/usr/local/bin/wget -NxP /home/ftp/pub/mirrors -nv \
http://www.okean.com/{china,korea}cidr.txt


The advantage of using wget(1) (or curl(1) if you like) is that it will  
only fetch the file if the timestamp has changed.




--
Gemaakt met Opera's revolutionaire e-mailprogramma:  
http://www.opera.com/mail/

(Remove the obvious prefix to reply.)