Seems a little underpowered to me.
10 children w/ 448M is pushing it, IMHO.
Same opinion of a 550 P3 scanning EMail with
SA and clamAV.
Given your system, I would:
1) Reduce max-children to 8 or less. (Use 6 if you can).
2) Eliminate pre-forking (--round-robin option).
3) Set a timeout option
dalchri000 wrote:
What can I do to make the server wait on spamd? Is it a spamd, spamc,
spamass-milter, or sendmail setting? Most of the time the server is
hardly
If you had a postfix setup, you would (typically) adjust the max smtpd
daemons in master.cf - I'm sure you've got some similar
Hi,
for one of our customers our mail relays are the responsible
Mail-Server. Our servers are sending all of his mail to his own mail relay.
On our mail relays as well as on his on mail relay spamassassin is used
for spam tagging. Now we have the problem, that the customers mail relay
is
1) Reduce max-children to 8 or less. (Use 6 if you can).
When I go lower, I get server has reaacehd max children, consider raising
it
2) Eliminate pre-forking (--round-robin option).
Do no know how to this, do i just add --round-robin option to my rc.d
script?
3) Set a timeout option
Jean-Paul Natola wrote:
1) Reduce max-children to 8 or less. (Use 6 if you can).
When I go lower, I get server has reaacehd max children, consider
raising it
It is normal to receive this message from time to time. It just means
that all of your spamd processes are busy. If you have enough
Sebastian Ganschow wrote:
How is it possible to set up the customers spamassassin, that it uses
our Spamtagging for spam classification?
You could just disable all the Spamassassin-supplied rules and write
your own simple set that only looks at your classification. But, why
even try to
Chris Hoogendyk wrote:
Mar 13 15:46:11 eclogite mimedefang-multiplexor[7518]: [ID 980602
mail.info] Slave 3 stderr: config: path
/var/lib/spamassassin/3.002004/languages is inaccessible:
Permission denied
So, the syslog report is an error that occurs in spamassassin code, but
it is called
Hi
I was just Reading the article from
http://www.comptechdoc.org/os/linux/howlinuxworks/linux_hlbootproc.html
in the article
before the system can boot the BIOS detect the first available IDE device,
on this device is the MBR which contain the boot loader and partition
tables
now suppose i have
On 3/14/2008 2:53 PM, Agnello George wrote:
Hi
I was just Reading the article from
http://www.comptechdoc.org/os/linux/howlinuxworks/linux_hlbootproc.html
in the article
before the system can boot the BIOS detect the first available IDE device,
on this device is the MBR which contain the boot
On 3/14/2008 3:06 PM, Yet Another Ninja wrote:
On 3/14/2008 2:53 PM, Agnello George wrote:
Hi
I was just Reading the article from
http://www.comptechdoc.org/os/linux/howlinuxworks/linux_hlbootproc.html
in the article
before the system can boot the BIOS detect the first available IDE
device,
OS: Debian Sarge
SpamAssassin: 3.0.3-2
Problem description:
[EMAIL PROTECTED] sends a ham message to himself (i.e.
From:==To:[EMAIL PROTECTED]). Autowhiltelisting mechanism
adds [EMAIL PROTECTED] to the whiltelist.
A spammer sends spam to [EMAIL PROTECTED] from forged address
[EMAIL
Hi All,
I'm not exactly sure what the issue is nor do I really know where to look
right now. My *NIX skills are ok, but not great.
I have Spamassassin 3.2.4 running with Postfix 2.2.9 on SuSE Linux 10.1.
Everything appears to work properly except Spamassassin, no matter what,
will always return
At 18:38 13-03-2008, Jean-Paul Natola wrote:
1.We have a sitewide config
2.Startup parameters are
command_args=-d --min-children=2 --max-children=10 --min-spare=2
--max-spare=3 --max-conn-per-child=100 -r ${pidfile}
3.I do not scan messages over 250 k
4.We process roughly 5k messages daily
Kris Deugau wrote:
Chris Hoogendyk wrote:
Mar 13 15:46:11 eclogite mimedefang-multiplexor[7518]: [ID 980602
mail.info] Slave 3 stderr: config: path
/var/lib/spamassassin/3.002004/languages is inaccessible:
Permission denied
So, the syslog report is an error that occurs in spamassassin
Hello,
Were using sendmail and their feature mailertable for forwarding certain
domains to other mail servers. (using somedomain.com
esmtp:[mail.somedomain.com])
When an email comes in for one of these forwarded domains it will check
our greylist, our clamav, but will not do a
On Fri, 2008-03-14 at 11:52, Sebastian Ganschow wrote:
Hi,
for one of our customers our mail relays are the responsible
Mail-Server. Our servers are sending all of his mail to his own mail relay.
On our mail relays as well as on his on mail relay spamassassin is used
for spam tagging.
Checking into this more I notice this happens on any forwarded email to
another system. Spamassassin refuses to check it.
Any Ideas?
Thanks,
Ken
On Fri, 14 Mar 2008, User for SpamAssassin Mail List wrote:
Hello,
Were using sendmail and their feature mailertable for forwarding certain
Agnello George wrote:
Hi
I was just Reading the article from
http://www.comptechdoc.org/os/linux/howlinuxworks/linux_hlbootproc.html
in the article
before the system can boot the BIOS detect the first available IDE
device, on this device is the MBR which contain the boot loader and
What is the policy to report spam coming from systems in the
RCVD_IN_DNSWL_MED? I just recently got so many that I disabled
that whitelist.
Bob
From [EMAIL PROTECTED] Fri Mar 14 20:21:25 2008
X-Spam-Checker-Version: SpamAssassin 3.2.3 (2007-08-08) on regret.proulx.com
X-Spam-Level:
Bob Proulx wrote:
What is the policy to report spam coming from systems in the
RCVD_IN_DNSWL_MED? I just recently got so many that I disabled
that whitelist.
Um... the spam was posted to a mailing list [EMAIL PROTECTED]
The list server is the one in DNSWL_MED...
After looking through old list posts and the Wiki, I was under the
impression that I could enable autolearning by setting a tflags value
for the shortcircuited rule.
For instance:
priorityTEST-500
describeTESTMy Test
shortcircuitTESTspam
score TEST
Matt Kettler wrote:
Bob Proulx wrote:
What is the policy to report spam coming from systems in the
RCVD_IN_DNSWL_MED? I just recently got so many that I disabled
that whitelist.
Um... the spam was posted to a mailing list [EMAIL PROTECTED]
The list server is the one in
Matt Kettler wrote:
Wait.. Where is the Received: header generated by regret.prolux.com? or
any other prolux.com server for that matter...
'regret' is simply doing the spamassassin filtering for 'lists'. The
mail will go through lists and never really have gone through regret.
But regret is a
Bob Proulx wrote:
Matt Kettler wrote:
Bob Proulx wrote:
What is the policy to report spam coming from systems in the
RCVD_IN_DNSWL_MED? I just recently got so many that I disabled
that whitelist.
Um... the spam was posted to a mailing list [EMAIL PROTECTED]
The list
Bob Proulx wrote:
Matt Kettler wrote:
Wait.. Where is the Received: header generated by regret.prolux.com? or
any other prolux.com server for that matter...
'regret' is simply doing the spamassassin filtering for 'lists'. The
mail will go through lists and never really have gone
Jari Fredriksson wrote:
OS: Debian Sarge
SpamAssassin: 3.0.3-2
Problem description:
[EMAIL PROTECTED] sends a ham message to himself (i.e.
From:==To:[EMAIL PROTECTED]). Autowhiltelisting mechanism
adds [EMAIL PROTECTED] to the whiltelist.
A spammer sends spam to [EMAIL PROTECTED] from forged
Matt Kettler wrote:
Note the message was sent to [EMAIL PROTECTED], which
then relayed it to gnu.org. Does your list intentionally accept a feed
from lists at mit?
Follow-on thought.. if the list does accept a feed from mit, you should
add the mit server to your trusted_networks. This
Matt Kettler wrote:
Bob Proulx wrote:
-4.0 RCVD_IN_DNSWL_MED RBL: Sender listed at http://www.dnswl.org/,
medium trust
[128.30.16.9 listed in list.dnswl.org]
Yes, you're right, GNU is only in DNSWL LOW, and this message *SHOULD*
have matched that,
Bob Proulx wrote:
Actually it *can* teleport magically. Any sufficiently advanced
technology is indistinguishable from magic. Anything else is simply
insufficiently advanced!
ROTFL... Thanks for the laugh bob... and sorry I got confused...
Clayton Keller wrote:
After looking through old list posts and the Wiki, I was under the
impression that I could enable autolearning by setting a tflags value
for the shortcircuited rule.
For instance:
priorityTEST-500
describeTESTMy Test
shortcircuitTESTspam
score
30 matches
Mail list logo