David,
I have two questions regarding amavisd:
I would like to use the character + instead of * in the header line
X-Spam-Level.
I changed it in /usr/sbin/amavisd-new and it works but I would prefer to
set it in a config file and not in the programm itself. Whenever there
comes an update,
Tapani,
Yes, moving from dual sendmail to milter would be an obvious
solution, but my past experiences with milter under heavy
load discourage me from going that route.
It's been some time since I looked at it though, perhaps
the issues have been solved since.
I wouldn't recommend it
Jim,
thanks. And how is it with mysql?
Same thing.
Example. ID 1 non-paying
All options to Y (YES)?
spam_lover, virus_lover, and so on
bypass_*, and so on
Right. Or just bypass* 'Y', and *_lovers at 'N',
which could let unpaying customers benefit from
alreay known check results made on
On Fri, 24 Nov 2006, Mark Martinec wrote:
A third way would be to write a SA plugin that would query
p0f-analyzer directly, after obtaining client IP address
from the first trusted Received header field, which is
already parsed and known by SA. This would perhaps be the
most general purpose
Vincent,
Any volunteers to prepare a SA plugin for p0f lookup?
Should be quite straightforward.
Suppose I have script like this:
...
sub p0f_lookup {
# get the first trusted header
.
What to do next?
I am still not clear how the fingering printing information
get
We've got a current setup that is doing quarantine via SMTP. We'd
like to try out SQL quarantine as well, but need to keep the current
method up and running while we try it and perhaps later transition to
the new setup.
Is it possible to have two different simultaneous quarantine methods,
It looks like starting p0f analyzer using the ports supplied rc.subr
script on Freebsd does something strange.
I installed amavisd-new with p0f via freebsd ports.
(this automatically installed p0f and created an rc.d init file for me)
I verified it worked on command line (I watched the mail log
Figured it out: gkovesdan: when you upgrade amavisd ports to 2.4.4, can
you apply this fix?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf
Of Michael Scheidell
Sent: Friday, November 24, 2006 2:30 PM
To: amavis-user@lists.sourceforge.net
Cc:
On Fri, 24 Nov 2006, Mark Martinec wrote:
- somehow determine the SMTP client's IP address following SA mechanisms
on trusted/internal etc settings and parsed Received header fields.
(can't help there, ask on SA list if necessary)
This should be an IP address of the remote host which
On Friday November 24 2006 22:24, Michael Scheidell wrote:
Figured it out: ...
It looks like starting p0f analyzer using the ports supplied
rc.subr script on Freebsd does something strange.
- /usr/local/bin/p0f ${amavis_p0f_daemon_flags} \
+ /usr/local/bin/p0f
Tom,
We've got a current setup that is doing quarantine via SMTP. We'd
like to try out SQL quarantine as well, but need to keep the current
method up and running while we try it and perhaps later transition to
the new setup.
Is it possible to have two different simultaneous quarantine
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf
Of Mark Martinec
Sent: Friday, November 24, 2006 6:42 PM
To: amavis-user@lists.sourceforge.net
Cc: Michael Scheidell; [EMAIL PROTECTED]
Subject: Re: [AMaViS-user] P0f strangeness with Freebsd
12 matches
Mail list logo