Ok, that's what i'm just looking at. ;) Just setting up another XEN 
Virtual machine to check it out.
I'll have to read the docs anyway. So don't worry. :)

Sam Clippinger schrieb:
> Actually, the QmailToaster project I'm thinking of is hosted at:
>     http://www.qmailtoaster.org/
> It's basically a set of SRPMs you can download, build and install to get 
> a fully functioning, fully patched qmail server.  It's pretty slick.  
> They have an active mailing list with some pretty knowledgeable people.  
> Best of all, they release updates for important packages like 
> SpamAssassin and ClamAV, so you can easily stay on the latest version.
>
> Also, I should mention that my example configuration directory was wrong 
> (oops).  To configure spamdyke for "domain.com", you should actually 
> create a file named "_recipient_/com/domain".  When in doubt, read the 
> docs, don't take my word for anything. :)
>
> -- Sam Clippinger
>
> David Stiller wrote:
>   
>> Yes i looked at the sources and as far as i saw, that's very
>> complex analysis, wich isn't necessary in my case. As my server is
>> connecting to the internet, the module from Haggybear is rotating
>> downloads of an update-script, ignoring that it should use a proxy
>> and times out but doesn't recognize.
>> I just need to know, who spammed, wich senders are important and
>> black- or whitelist them.
>> I'll modify my version to use the below mentioned config-dirs. As
>> i'm always programming shell-scripts, it won't be hard to make it
>> compatible to other systems, like QmailToaster.
>> BTW, is "http://www.shupp.org/toaster/"; meant with that, or something
>> else?
>>
>> Sam Clippinger schrieb:
>>     
>>> This sounds like a great project to me -- it's exactly what I had in 
>>> mind when I added support for configuration directories.
>>>
>>> Specifically, if your tool updates the configuration file named 
>>> "_recipient_/domain.com", the changes will only affect recipients in 
>>> domain.com.  That way, your users can do anything they want (including 
>>> completely disabling spamdyke's filters) and it will only affect their 
>>> mail.  This is a much better solution than allowing any user to edit the 
>>> server's global configuration and affect everyone's mail.  Not every 
>>> filter can be activated or deactivated through configuration directories 
>>> but most of them can (whitelists, blacklists, graylisting, rDNS filters 
>>> and others).
>>>
>>> You should also check out the Plesk control panel that Haggybear is 
>>> working on.  That code may already include the features you're trying to 
>>> build:
>>>     
>>> http://www.haggybear.de/component/option,com_docman/task,doc_details/gid,21/Itemid,54/
>>>
>>> BTW, if you build your tool to also work on non-Plesk servers, you'd 
>>> probably find a large audience for it (especially on the QmailToaster 
>>> mailing list).
>>>
>>> -- Sam Clippinger
>>>
>>> David Stiller wrote:
>>>   
>>>       
>>>> Hi all,
>>>>
>>>> i've written a Spamdyke GUI for Plesk for my customers, so that they all 
>>>> have their own responsibility,
>>>> if they want to use greylisting and are able to maintain their black-and 
>>>> whitelists. It's nice, as they all can see, what's
>>>> really happening in the mailsystem and keep away spammers and welcome 
>>>> their customers... Rejecting
>>>> mails without letting the customers know, is near the border to being 
>>>> illegal in Germany, because the customers
>>>> can make me, or my company responsible for missing mails.
>>>>
>>>> But one problem i have is the logic of where i keep those lists. At the 
>>>> moment i just save them to the Plesk
>>>> database and dump them regularly by cron-job to special files called 
>>>> customer_blacklist_ip, customer_blacklist_rdns,
>>>> and so on, which are used by spamdyke. That's a good way to write them 
>>>> with root and keep all privileges healthy
>>>> and i can let it send a report to me, what has been done.
>>>>
>>>> Do you think it's a good politic to activate them globally? I understand 
>>>> it in the way that every whitelisted entry
>>>> should be a possible "good" sender for the others too. The critial point 
>>>> are the blacklists:
>>>> Of course i avoided that they add known IP's, i.e. my mail server's 
>>>> network and local IP's and also created
>>>> a button to check the reverse data. As far as i know, thats a way the 
>>>> "big" providers do it, i mean tagging
>>>> mails manually as spam or ham.
>>>>
>>>> Am i right?
>>>>
>>>> Greetz,
>>>> David
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> spamdyke-users mailing list
>>>> [email protected]
>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>   
>>>>     
>>>>         
>>> _______________________________________________
>>> spamdyke-users mailing list
>>> [email protected]
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>   
>>>       
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> spamdyke-users mailing list
>> [email protected]
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>   
>>     
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   

_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to