Thanks Eric! Though it was hard for me to understand and pimp the commands for my Plesk installation, I think that I managed (more or less) to run the config-test. But now I need help in reading the results (see below). What looks strange to me is: "ERROR: unable to stat() path /var/qmail/spamdyke/conf.s" There is a directory /var/qmail/spamdyke/conf.d but nothing like conf.s or what does this mean? Also I found that the files in /var/qmail/spamdyke/greylist are beeing updated when messages arrive (first with the size of zero, when they get passed with IP and RDNS-name), but not for this special mail from [email protected].
Once you have an account there, you get an email-message everytime you type your password wrong, so I could test it for a while. The message is rejected, a file info (with size 0) is created, but it keeps on rejecting any further attempt to deliver the same message. Once I do the entries in /var/qmail/spamdyke/greylist/.../info manually, the messages get past. So far, this seems to be the only message (sender, ip, rdns) that won't work out, but I saw this by hazard and I'm afraid there might be more messages that are permanently beeing rejected. Whitelisting works of course. Also every other mail, but not this special one. Magic? Any further hints are appreciated! Regards, Roland My test-commands and the results: r...@mail:/usr/local/bin# PROTO=TCP export TCPLOCALHOST=$(hostname --fqdn) export TCPLOCALIP=127.0.0.1 export TCPLOCALPORT=25025 r...@mail:/usr/local/bin# spamdyke --config-file /etc/spamdyke.conf --config-test --run-as-user vpopmail:vchkpw /var/qmail/bin/qmail-smtpd /var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw /var/qmail/bin/true 2>&1 spamdyke 4.1.0+TLS+CONFIGTEST+DEBUG (C)2010 Sam Clippinger, samc (at) silence (dot) org http://www.spamdyke.org/ Use -h for an option summary or see README.html for complete option details. WARNING: Running tests as superuser root(0), group root(0). These test results may not be valid if the mail server runs as another user. SUCCESS(binary-check): File is executable: /usr/local/bin/spamdyke SUCCESS: /var/qmail/bin/qmail-smtpd appears to offer TLS support but spamdyke will intercept and decrypt the TLS traffic so all of its filters can operate. ERROR: /var/qmail/bin/qmail-smtpd appears to offer SMTP AUTH support. spamdyke will observe any authentication and trust its response but spamdyke cannot process responses itself because one or more of the following options was not given: "access-file", "local-domains-file" or "smtp-auth-command" SUCCESS(ip-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_ip_moelle_biz SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_keywords_moelle_biz SUCCESS(ip-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_ip_moelle_biz SUCCESS(rdns-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_rdns_moelle_biz SUCCESS(rdns-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_rdns_moelle_biz SUCCESS(recipient-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_recipient_moelle_biz SUCCESS(recipient-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_recipient_moelle_biz SUCCESS(sender-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_senders_moelle_biz SUCCESS(sender-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_senders_moelle_biz SUCCESS(ip-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_ip_skala-net_de SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_keywords_skala-net_de SUCCESS(ip-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_ip_skala-net_de SUCCESS(rdns-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_rdns_skala-net_de SUCCESS(rdns-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_rdns_skala-net_de SUCCESS(recipient-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_recipient_skala-net_de SUCCESS(recipient-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_recipient_skala-net_de SUCCESS(sender-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_senders_skala-net_de SUCCESS(sender-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_senders_skala-net_de ERROR: unable to stat() path /var/qmail/spamdyke/conf.s SUCCESS(config-file): Opened for reading: /etc/spamdyke.conf SUCCESS(dns-resolv-conf): Opened for reading: /etc/resolv.conf INFO(graylist-level): Local domain has no domain directory; no graylisting will take place for the domain: skala-net.com INFO(graylist-level): Local domain has no domain directory; no graylisting will take place for the domain: mail.moelle.biz SUCCESS(graylist-level): Graylist directory tests succeeded: /var/qmail/spamdyke/greylist SUCCESS(hostname-file): Opened for reading: /var/qmail/control/me SUCCESS(ip-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_ip SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_keywords SUCCESS(ip-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_ip SUCCESS(local-domains-file): Opened for reading: /var/qmail/control/rcpthosts SUCCESS(rdns-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_rdns SUCCESS(recipient-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_recipients SUCCESS(sender-blacklist-file): Opened for reading: /var/qmail/spamdyke/blacklist_senders SUCCESS(sender-whitelist-file): Opened for reading: /var/qmail/spamdyke/whitelist_senders SUCCESS(smtp-auth-level): File is executable: /var/qmail/bin/qmail-smtpd WARNING(smtp-auth-level): Authentication command is owned by root but not setuid. Some require being setuid root to read system passwords: /var/qmail/bin/qmail-smtpd SUCCESS(tls-certificate-file): Opened for reading: /var/qmail/control/servercert.pem SUCCESS(tls-certificate-file): Certificate and key loaded; SSL/TLS library successfully initialized ERROR: Tests complete. Errors detected. _______________________________________________ spamdyke-users mailing list [email protected] http://www.spamdyke.org/mailman/listinfo/spamdyke-users
