Thanks Eric!

Though it was hard for me to understand and pimp the commands for my Plesk
installation, I think that I managed (more or less) to run the config-test.
But now I need help in reading the results (see below). What looks strange
to me is:
"ERROR: unable to stat() path /var/qmail/spamdyke/conf.s" 
There is a directory /var/qmail/spamdyke/conf.d but nothing like conf.s or
what does this mean?
Also I found that the files in /var/qmail/spamdyke/greylist are beeing
updated when messages arrive (first with the size of zero, when they get
passed with IP and RDNS-name), but not for this special mail from
[email protected].

Once you have an account there, you get an email-message everytime you type
your password wrong, so I could test it for a while. The message is
rejected, a file info (with size 0) is created, but it keeps on rejecting
any further attempt to deliver the same message. Once I do the entries in
/var/qmail/spamdyke/greylist/.../info manually, the messages get past. 
So far, this seems to be the only message (sender, ip, rdns) that won't work
out, but I saw this by hazard and I'm afraid there might be more messages
that are permanently beeing rejected. Whitelisting works of course. Also
every other mail, but not this special one. Magic?
Any further hints are appreciated!

Regards,
Roland

My test-commands and the results:

r...@mail:/usr/local/bin# PROTO=TCP export TCPLOCALHOST=$(hostname --fqdn)
export TCPLOCALIP=127.0.0.1 export TCPLOCALPORT=25025
r...@mail:/usr/local/bin# spamdyke --config-file /etc/spamdyke.conf
--config-test --run-as-user vpopmail:vchkpw /var/qmail/bin/qmail-smtpd
/var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw
/var/qmail/bin/true 2>&1
spamdyke 4.1.0+TLS+CONFIGTEST+DEBUG (C)2010 Sam Clippinger, samc (at)
silence (dot) org
http://www.spamdyke.org/

Use -h for an option summary or see README.html for complete option details.

WARNING: Running tests as superuser root(0), group root(0). These test
results may not be valid if the mail server runs as another user.
SUCCESS(binary-check): File is executable: /usr/local/bin/spamdyke
SUCCESS: /var/qmail/bin/qmail-smtpd appears to offer TLS support but
spamdyke will intercept and decrypt the TLS traffic so all of its filters
can operate.
ERROR: /var/qmail/bin/qmail-smtpd appears to offer SMTP AUTH support.
spamdyke will observe any authentication and trust its response but spamdyke
cannot process responses itself because one or more of the following options
was not given: "access-file", "local-domains-file" or "smtp-auth-command"
SUCCESS(ip-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_ip_moelle_biz
SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_keywords_moelle_biz
SUCCESS(ip-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_ip_moelle_biz
SUCCESS(rdns-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_rdns_moelle_biz
SUCCESS(rdns-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_rdns_moelle_biz
SUCCESS(recipient-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_recipient_moelle_biz
SUCCESS(recipient-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_recipient_moelle_biz
SUCCESS(sender-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_senders_moelle_biz
SUCCESS(sender-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_senders_moelle_biz
SUCCESS(ip-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_ip_skala-net_de
SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_keywords_skala-net_de
SUCCESS(ip-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_ip_skala-net_de
SUCCESS(rdns-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_rdns_skala-net_de
SUCCESS(rdns-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_rdns_skala-net_de
SUCCESS(recipient-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_recipient_skala-net_de
SUCCESS(recipient-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_recipient_skala-net_de
SUCCESS(sender-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_senders_skala-net_de
SUCCESS(sender-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_senders_skala-net_de
ERROR: unable to stat() path /var/qmail/spamdyke/conf.s
SUCCESS(config-file): Opened for reading: /etc/spamdyke.conf
SUCCESS(dns-resolv-conf): Opened for reading: /etc/resolv.conf
INFO(graylist-level): Local domain has no domain directory; no graylisting
will take place for the domain: skala-net.com
INFO(graylist-level): Local domain has no domain directory; no graylisting
will take place for the domain: mail.moelle.biz
SUCCESS(graylist-level): Graylist directory tests succeeded:
/var/qmail/spamdyke/greylist
SUCCESS(hostname-file): Opened for reading: /var/qmail/control/me
SUCCESS(ip-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_ip
SUCCESS(ip-in-rdns-keyword-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_keywords
SUCCESS(ip-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_ip
SUCCESS(local-domains-file): Opened for reading:
/var/qmail/control/rcpthosts
SUCCESS(rdns-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_rdns
SUCCESS(recipient-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_recipients
SUCCESS(sender-blacklist-file): Opened for reading:
/var/qmail/spamdyke/blacklist_senders
SUCCESS(sender-whitelist-file): Opened for reading:
/var/qmail/spamdyke/whitelist_senders
SUCCESS(smtp-auth-level): File is executable: /var/qmail/bin/qmail-smtpd
WARNING(smtp-auth-level): Authentication command is owned by root but not
setuid. Some require being setuid root to read system passwords:
/var/qmail/bin/qmail-smtpd
SUCCESS(tls-certificate-file): Opened for reading:
/var/qmail/control/servercert.pem
SUCCESS(tls-certificate-file): Certificate and key loaded; SSL/TLS library
successfully initialized
ERROR: Tests complete. Errors detected.



_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to