Try using the _entire_ spamdyke command line, not just a portion of it: # TCPREMOTEIP=1.2.3.4 spamdyke -linfo -f /etc/spamdyke.conf --config-test -- /var/qmail/bin/qmail-smtpd /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw /var/qmail/bin/true
That should resolve this error. -- Sam Clippinger Rafał Błaszczyk wrote: > Hello, > > This is my output from running spamdyke with the |config-test| option.: > > " > [r...@]# TCPREMOTEIP=1.2.3.4 spamdyke -linfo -f /etc/spamdyke.conf > --config-test /var/qmail/bin/qmail-smtpd > spamdyke 4.0.10+TLS+CONFIGTEST+DEBUG (C)2008 Sam Clippinger, samc (at) > silence (dot) org > http://www.spamdyke.org/ > > Use -h for an option summary or see README.html for complete option details. > > Testing configuration... > WARNING: Running tests as superuser root(0), group root(0). These test > results may not be valid if the mail server runs as another user. > INFO(binary-check): Testing executable: /usr/local/bin/spamdyke > SUCCESS(binary-check): File is executable: /usr/local/bin/spamdyke > SUCCESS: spamdyke binary (/usr/local/bin/spamdyke) is not owned by root > and/or is not marked setuid. > INFO: Running command to test capabilities: /var/qmail/bin/qmail-smtpd > DEBUG(exec_command_argv()@exec.c:480): executing command: > /var/qmail/bin/qmail-smtpd > SUCCESS: /var/qmail/bin/qmail-smtpd appears to offer TLS support but > spamdyke will intercept and decrypt the TLS traffic so all of its > filters can operate. > ERROR: /var/qmail/bin/qmail-smtpd does not appear to offer SMTP AUTH > support but spamdyke cannot offer and process authentication itself > because one of the following options was not given: "access-file", > "local-domains-file" or "smtp-auth-command" > INFO(config-file): Testing file read: /etc/spamdyke.conf > SUCCESS(config-file): Opened for reading: /etc/spamdyke.conf > INFO(ip-blacklist-file): Testing file read: /var/qmail/spamdyke/blacklist_ip > SUCCESS(ip-blacklist-file): Opened for reading: > /var/qmail/spamdyke/blacklist_ip > INFO(ip-whitelist-file): Testing file read: /var/qmail/spamdyke/whitelist_ip > SUCCESS(ip-whitelist-file): Opened for reading: > /var/qmail/spamdyke/whitelist_ip > INFO(local-domains-file): Testing file read: /var/qmail/control/rcpthosts > SUCCESS(local-domains-file): Opened for reading: > /var/qmail/control/rcpthosts > INFO(rdns-whitelist-file): Testing file read: > /var/qmail/spamdyke/whitelist_rdns > SUCCESS(rdns-whitelist-file): Opened for reading: > /var/qmail/spamdyke/whitelist_rdns > INFO(recipient-blacklist-file): Testing file read: > /var/qmail/spamdyke/blacklist_recipients > SUCCESS(recipient-blacklist-file): Opened for reading: > /var/qmail/spamdyke/blacklist_recipients > INFO(sender-blacklist-file): Testing file read: > /var/qmail/spamdyke/blacklist_senders > SUCCESS(sender-blacklist-file): Opened for reading: > /var/qmail/spamdyke/blacklist_senders > INFO(sender-whitelist-file): Testing file read: > /var/qmail/spamdyke/whitelist_senders > SUCCESS(sender-whitelist-file): Opened for reading: > /var/qmail/spamdyke/whitelist_senders > INFO(smtp-auth-level): Examining authentication command: > /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw > /var/qmail/bin/true > SUCCESS(smtp-auth-level): File is executable: /var/qmail/bin/smtp_auth > INFO(tls-certificate-file): Testing TLS by initializing SSL/TLS library > with certificate and key > SUCCESS(tls-certificate-file): Opened for reading: > /var/qmail/control/servercert.pem > SUCCESS(tls-certificate-file): Certificate and key loaded; SSL/TLS > library successfully initialized > ERROR: Tests complete. Errors detected. > > " > > And there is no way I can solve this issue. Is there any way You could > help me with this? > And here is some details on my config: > > * our operating system: plesk 8.0.1. > * The complete spamdyke command line and/or configuration file(s) > > Spamdyke.conf: > > log-level=excessive > local-domains-file=/var/qmail/control/rcpthosts > max-recipients=20 > idle-timeout-secs=60 > sender-blacklist-file=/var/qmail/spamdyke/black > sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders > recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients > ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip > rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns > ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip > reject-empty-rdns > reject-unresolvable-rdns > greeting-delay-secs=5 > reject-missing-sender-mx > smtp-auth-level=always > smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true > /var/qmail/bin/cmd5checkpw /var/qmail/bin/true > tls-certificate-file=/var/qmail/control/servercert.pem > tls-level=smtp > > smtp_psa: > service smtp > { > socket_type = stream > protocol = tcp > wait = no > disable = no > user = root > instances = UNLIMITED > env = SMTPAUTH=1 > server = /var/qmail/bin/tcp-env > server_args = -Rt0 /var/qmail/bin/relaylock > /usr/local/bin/spamdyke -f /etc/spamdyke.conf -- > /var/qmail/bin/qmail-smtpd /var/qmail/bin/smtp_auth /var/qmail/bin/true > /var/qmail/bin/cmd5checkpw /var/qmail/bin/true > } > > Best Regards > Rafal > > > > _______________________________________________ > spamdyke-users mailing list > [email protected] > http://www.spamdyke.org/mailman/listinfo/spamdyke-users > _______________________________________________ spamdyke-users mailing list [email protected] http://www.spamdyke.org/mailman/listinfo/spamdyke-users
