Check:
http://www.spamdyke.org/documentation/README.html#CONFIGURATION_TEST

To use the testing feature:

   1. Find and copy the entire spamdyke command line from your "supervise"
script or xinetd configuration file, including the qmail command(s).
   2. At a command prompt, login as root and paste the spamdyke command without
running it.
   3. Add the option --config-test among the spamdyke options (before the qmail
command). If appropriate, add the options --config-test-smtpauth-username and
--config-test-smtpauth-password.
   4. Run the command and carefully read the results. More output can be
obtained by increasing the logging level (no test output goes to syslog). 

If the run-as-user option is not given in your spamdyke configuration, it should
be used on the command line to give spamdyke the name (or user ID) of the
account used to run the mail server. The group name (or ID) can also be given.
Before spamdyke runs its configuration tests, it will change process ownership
to run as the given user. That way, the filesystem permissions tests will be
accurate.

If spamdyke is configured to provide SMTP AUTH (using the smtp-auth-level and
smtp-auth-command options), the --config-test-smtpauth-username and
--config-test-smtpauth-password options should be used to provide a valid
username and password for authentication. spamdyke will run the SMTP AUTH
command to test its capabilities and make recommendations.

IMPORTANT! DANGER! WARNING! DO NOT EVER PUT THE --config-test OPTION IN THE
SPAMDYKE COMMAND LINE THAT IS RUN FOR INCOMING CONNECTIONS! YOUR MAIL SERVER
WILL IMMEDIATELY STOP RECEIVING MAIL AND REMOTE USERS WILL SEE ONLY THE
DIAGNOSTIC OUTPUT! If you make this mistake and ask for help, expect to be
publicly mocked. You have been warned. 

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of nightduke
> Sent: Monday, July 21, 2008 6:08 PM
> To: spamdyke users
> Subject: Re: [spamdyke-users] check new configuration of my 
> spamdyke.conf
> 
> 
> how can i check with config-test?
> spamdyke -f /etc/spamdyke/spamdyke.conf 
> /var/qmail/bin/qmail-smtpd 220 vps ESMTP or configure timeout?
> 
>  spamdyke -f /etc/spamdyke/spamdyke.conf 
> /var/qmail/bin/qmail-smtpd 220 vps ESMTP 421 Timeout. Talk 
> faster next time. See: http://www.spamhaus.org/#TIMEOUT
> 
> Thanks
> 
> 2008/7/21 Sam Clippinger <[EMAIL PROTECTED]>:
> > Quick questions: Is your Outlook client authenticating with 
> SMTP AUTH? 
> > What log messages do you see from spamdyke?  Have you run the 
> > "config-test" feature to look for problems?
> >
> > Also, please don't use "http://www.spamhaus.org/"; as your 
> policy URL. 
> > The Spamhaus website doesn't explain spamdyke rejection 
> messages, so 
> > sending users there will only increase their confusion.  You should 
> > either write your own policy page to explain rejections (and how to 
> > contact you if they need a whitelist entry) or just remove the 
> > "policy-url" option entirely.
> >
> > -- Sam Clippinger
> >
> > nightduke wrote:
> >> Hi i have upgraded from version 3.1.7 to version 4.0.1
> >>
> >> But at my microsoft outlook i can't send emails rbl match.
> >>
> >> How can i verify my spamdyke.conf it's correct?
> >>
> >> cat spamdyke.conf
> >> log-level=verbose local-domains-file=/var/qmail/control/rcpthosts
> >> max-recipients=10
> >> idle-timeout-secs=60
> >> policy-url= http://www.spamhaus.org/
> >> ip-whitelist-file=/etc/spamdyke/whitelist_ip
> >> greeting-delay-secs=5
> >> reject-missing-sender-mx
> >> tls-certificate-file=/var/qmail/control/servercert.pem
> >> policy-url= http://www.spamhaus.org/
> >> # check-dnsrbl=bogons.cymru.com
> >> dns-blacklist-entry=zen.spamhaus.org
> >> dns-blacklist-entry=bl.spamcop.net
> >> #check-dnsrbl=cbl.abuseat.org
> >> # check-dnsrbl=sbl-xbl.spamhaus.org
> >> # check-dnsrbl=list.dsbl.org
> >> # check-dnsrbl=ubl.unsubscore.com
> >> # check-dnsrbl=dhcp.tqmcube.com
> >> # check-dnsrbl=prc.tqmcube.com
> >> reject-missing-sender-mx
> >> idle-timeout-secs=300
> >> graylist-dir=/etc/spamdyke/graylist
> >> graylist-max-secs=1814400
> >> graylist-min-secs=300
> >> sender-blacklist-file=/etc/spamdyke/blacklist_senders
> >> smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true
> >> # smtp-auth-command=/home/lxadmin/mail/bin/vchkpw /bin/true
> >> smtp-auth-command=/var/qmail/bin/cmd5checkpw /var/qmail/bin/true
> >> _______________________________________________
> >> spamdyke-users mailing list
> >> [email protected]
> >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >>
> > _______________________________________________
> > spamdyke-users mailing list
> > [email protected] 
> > http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >
> _______________________________________________
> spamdyke-users mailing list
> [email protected] 
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> 

_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to