Try using the _entire_ spamdyke command line, not just a portion of it:
# TCPREMOTEIP=1.2.3.4 spamdyke -linfo -f /etc/spamdyke.conf 
--config-test -- /var/qmail/bin/qmail-smtpd /var/qmail/bin/smtp_auth 
/var/qmail/bin/true /var/qmail/bin/cmd5checkpw /var/qmail/bin/true

That should resolve this error.

-- Sam Clippinger

Rafał Błaszczyk wrote:
> Hello,
>
> This is my output from running spamdyke with the |config-test| option.:
>
> "
> [r...@]# TCPREMOTEIP=1.2.3.4 spamdyke -linfo -f /etc/spamdyke.conf 
> --config-test /var/qmail/bin/qmail-smtpd
> spamdyke 4.0.10+TLS+CONFIGTEST+DEBUG (C)2008 Sam Clippinger, samc (at) 
> silence (dot) org
> http://www.spamdyke.org/
>
> Use -h for an option summary or see README.html for complete option details.
>
> Testing configuration...
> WARNING: Running tests as superuser root(0), group root(0). These test 
> results may not be valid if the mail server runs as another user.
> INFO(binary-check): Testing executable: /usr/local/bin/spamdyke
> SUCCESS(binary-check): File is executable: /usr/local/bin/spamdyke
> SUCCESS: spamdyke binary (/usr/local/bin/spamdyke) is not owned by root 
> and/or is not marked setuid.
> INFO: Running command to test capabilities: /var/qmail/bin/qmail-smtpd
> DEBUG(exec_command_argv()@exec.c:480): executing command: 
> /var/qmail/bin/qmail-smtpd
> SUCCESS: /var/qmail/bin/qmail-smtpd appears to offer TLS support but 
> spamdyke will intercept and decrypt the TLS traffic so all of its 
> filters can operate.
> ERROR: /var/qmail/bin/qmail-smtpd does not appear to offer SMTP AUTH 
> support but spamdyke cannot offer and process authentication itself 
> because one of the following options was not given: "access-file", 
> "local-domains-file" or "smtp-auth-command"
> INFO(config-file): Testing file read: /etc/spamdyke.conf
> SUCCESS(config-file): Opened for reading: /etc/spamdyke.conf
> INFO(ip-blacklist-file): Testing file read: /var/qmail/spamdyke/blacklist_ip
> SUCCESS(ip-blacklist-file): Opened for reading: 
> /var/qmail/spamdyke/blacklist_ip
> INFO(ip-whitelist-file): Testing file read: /var/qmail/spamdyke/whitelist_ip
> SUCCESS(ip-whitelist-file): Opened for reading: 
> /var/qmail/spamdyke/whitelist_ip
> INFO(local-domains-file): Testing file read: /var/qmail/control/rcpthosts
> SUCCESS(local-domains-file): Opened for reading: 
> /var/qmail/control/rcpthosts
> INFO(rdns-whitelist-file): Testing file read: 
> /var/qmail/spamdyke/whitelist_rdns
> SUCCESS(rdns-whitelist-file): Opened for reading: 
> /var/qmail/spamdyke/whitelist_rdns
> INFO(recipient-blacklist-file): Testing file read: 
> /var/qmail/spamdyke/blacklist_recipients
> SUCCESS(recipient-blacklist-file): Opened for reading: 
> /var/qmail/spamdyke/blacklist_recipients
> INFO(sender-blacklist-file): Testing file read: 
> /var/qmail/spamdyke/blacklist_senders
> SUCCESS(sender-blacklist-file): Opened for reading: 
> /var/qmail/spamdyke/blacklist_senders
> INFO(sender-whitelist-file): Testing file read: 
> /var/qmail/spamdyke/whitelist_senders
> SUCCESS(sender-whitelist-file): Opened for reading: 
> /var/qmail/spamdyke/whitelist_senders
> INFO(smtp-auth-level): Examining authentication command: 
> /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw 
> /var/qmail/bin/true
> SUCCESS(smtp-auth-level): File is executable: /var/qmail/bin/smtp_auth
> INFO(tls-certificate-file): Testing TLS by initializing SSL/TLS library 
> with certificate and key
> SUCCESS(tls-certificate-file): Opened for reading: 
> /var/qmail/control/servercert.pem
> SUCCESS(tls-certificate-file): Certificate and key loaded; SSL/TLS 
> library successfully initialized
> ERROR: Tests complete. Errors detected.
>
> "
>
> And there is no way I can solve this issue. Is there any way You could 
> help me with this?
> And here is some details on my config:
>
>    * our operating system: plesk 8.0.1.
>    * The complete spamdyke command line and/or configuration file(s)
>
> Spamdyke.conf:
>
> log-level=excessive                            
> local-domains-file=/var/qmail/control/rcpthosts
> max-recipients=20                              
> idle-timeout-secs=60                          
> sender-blacklist-file=/var/qmail/spamdyke/black
> sender-whitelist-file=/var/qmail/spamdyke/whitelist_senders
> recipient-blacklist-file=/var/qmail/spamdyke/blacklist_recipients
> ip-blacklist-file=/var/qmail/spamdyke/blacklist_ip
> rdns-whitelist-file=/var/qmail/spamdyke/whitelist_rdns
> ip-whitelist-file=/var/qmail/spamdyke/whitelist_ip
> reject-empty-rdns
> reject-unresolvable-rdns
> greeting-delay-secs=5
> reject-missing-sender-mx
> smtp-auth-level=always
> smtp-auth-command=/var/qmail/bin/smtp_auth /var/qmail/bin/true 
> /var/qmail/bin/cmd5checkpw /var/qmail/bin/true
> tls-certificate-file=/var/qmail/control/servercert.pem
> tls-level=smtp
>
> smtp_psa:
> service smtp
> {
>        socket_type     = stream
>        protocol        = tcp
>        wait            = no
>        disable         = no
>        user            = root
>        instances       = UNLIMITED
>        env             = SMTPAUTH=1
>        server          = /var/qmail/bin/tcp-env
>        server_args    = -Rt0 /var/qmail/bin/relaylock 
> /usr/local/bin/spamdyke -f /etc/spamdyke.conf -- 
> /var/qmail/bin/qmail-smtpd /var/qmail/bin/smtp_auth /var/qmail/bin/true 
> /var/qmail/bin/cmd5checkpw /var/qmail/bin/true
> }
>
> Best Regards
> Rafal
>
>
>
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to