Ok, something seems to be happening after I realligned the order of the recipient_check_restrictions. But still I can't see any amavis rules or processings in the debug log. I've even reassigned the amavis configuration to another policy just to be sure it's one of them which are listed. Can you please check that out?
Thank you.

This is what I get after that change:

        

    [2014/11/25-14:50:41 - 1342] [CORE] INFO: Starting "1" children
    [2014/11/25-14:50:41 - 2205] [CORE] DEBUG: Child Preforked (2205)
[2014/11/25-14:50:41 - 2205] [CBPOLICYD] DEBUG: Starting up caching engine [2014/11/25-14:50:41 - 1352] [CORE] INFO: 2014/11/25-14:50:41 CONNECT TCP Peer: "127.0.0.1:47384" Local: "127.0.0.1:10031" [2014/11/25-14:50:41 - 1352] [PROTOCOLS/Postfix] DEBUG: Possible Postfix protocol [2014/11/25-14:50:41 - 1352] [PROTOCOLS/Postfix] INFO: Identified Postfix protocol [2014/11/25-14:50:42 - 1352] [TRACKING] DEBUG: No session tracking data exists for request: $VAR1 = {
              'ccert_fingerprint' => '',
              'sasl_method' => '',
              'sasl_sender' => '',
              'size' => 0,
              '_timestamp' => 1416923441,
              'helo_name' => 'duda',
              'reverse_client_name' => 'unknown',
              'queue_id' => '',
              'encryption_cipher' => '',
              'encryption_protocol' => '',
              'etrn_domain' => '',
              'ccert_subject' => '',
              'request' => 'smtpd_access_policy',
              'protocol_state' => 'RCPT',
              'stress' => '',
              '_peer_address' => '127.0.0.1',
              'recipient' => '[email protected]',
              'sasl_username' => '',
              'instance' => '89b.54748930.cd277.0',
              'protocol_name' => 'ESMTP',
              'encryption_keysize' => '0',
              'recipient_count' => '0',
              'ccert_issuer' => '',
              'sender' => '[email protected]',
              'client_name' => 'unknown',
              'client_address' => '10.32.2.152',
              '_protocol_transport' => 'Postfix'
            };
[2014/11/25-14:50:42 - 1352] [TRACKING] DEBUG: Added session tracking information for: $VAR1 = {
              'ccert_fingerprint' => '',
              'sasl_method' => '',
              'sasl_sender' => '',
              'size' => 0,
              '_timestamp' => 1416923441,
              'helo_name' => 'duda',
              'reverse_client_name' => 'unknown',
              'queue_id' => '',
              'encryption_cipher' => '',
              'encryption_protocol' => '',
              'etrn_domain' => '',
              'ccert_subject' => '',
              'request' => 'smtpd_access_policy',
              'protocol_state' => 'RCPT',
              'stress' => '',
              '_peer_address' => '127.0.0.1',
              'recipient' => '[email protected]',
              'sasl_username' => '',
              'instance' => '89b.54748930.cd277.0',
              'protocol_name' => 'ESMTP',
              'encryption_keysize' => '0',
              'recipient_count' => '0',
              'ccert_issuer' => '',
              'sender' => '[email protected]',
              'client_name' => 'unknown',
              'client_address' => '10.32.2.152',
              '_protocol_transport' => 'Postfix'
            };
[2014/11/25-14:50:42 - 1352] [TRACKING] DEBUG: Protocol state is 'RCPT', resolving policy... [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: Going to resolve session data into policy: $VAR1 = {
              'Recipient' => '[email protected]',
              'SASLUsername' => '',
              'QueueID' => '',
              'RecipientData' => '',
              'Instance' => '89b.54748930.cd277.0',
              'EncryptionCipher' => '',
              'Size' => '0',
              'EncryptionKeySize' => '0',
              'EncryptionProtocol' => '',
              'Helo' => 'duda',
              'ClientAddress' => '10.32.2.152',
              'ClientName' => 'unknown',
              'Sender' => '[email protected]',
              'SASLSender' => '',
              '_ClientAddress' => bless( {
                                           'raw_ip' => '10.32.2.152',
                                           'ip' => '10.32.2.152',
                                           'ip_version' => 4,
                                           'cidr' => 32
                                         }, 'awitpt::netip' ),
              'Protocol' => 'ESMTP',
              'ClientReverseName' => 'unknown',
              'SASLMethod' => ''
            };
[2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: Found policy member with ID '2' in policy 'Default Outbound' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: Found policy member with ID '3' in policy 'Default Inbound' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: Found policy member with ID '4' in policy 'Default Internal' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: Found policy member with ID '5' in policy 'Test' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:2/Name:Default Outbound]: Main policy sources '%internal_ips,%internal_domains' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:2/Name:Default Outbound]: Group 'internal_ips' has 1 source(s) => 10.0.0.0/8 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:2/Name:Default Outbound]=>(group:internal_ips): - Resolved source '10.0.0.0/8' to a IP/CIDR specification, match = 1 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:2/Name:Default Outbound]=>(group:internal_ips): Source group result: matched=1 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:2/Name:Default Outbound]: Group 'internal_domains' has 1 source(s) => @domain.de [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:2/Name:Default Outbound]=>(group:internal_domains): - Resolved source '@domain.de' to a email address specification, match = 0 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:2/Name:Default Outbound]=>(group:internal_domains): Source group result: matched=0 [2014/11/25-14:50:42 - 1352] [POLICIES] INFO: [ID:2/Name:Default Outbound]: Source matching result: matched=0 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:3/Name:Default Inbound]: Main policy sources '!%internal_ips,!%internal_domains' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:3/Name:Default Inbound]: Group 'internal_ips' has 1 source(s) => 10.0.0.0/8 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:3/Name:Default Inbound]=>(group:internal_ips): - Resolved source '10.0.0.0/8' to a IP/CIDR specification, match = 1 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:3/Name:Default Inbound]=>(group:internal_ips): Source group result: matched=1 [2014/11/25-14:50:42 - 1352] [POLICIES] INFO: [ID:3/Name:Default Inbound]: Source matching result: matched=0 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:4/Name:Default Internal]: Main policy sources '%internal_ips,%internal_domains' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:4/Name:Default Internal]: Group 'internal_ips' has 1 source(s) => 10.0.0.0/8 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:4/Name:Default Internal]=>(group:internal_ips): - Resolved source '10.0.0.0/8' to a IP/CIDR specification, match = 1 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:4/Name:Default Internal]=>(group:internal_ips): Source group result: matched=1 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:4/Name:Default Internal]: Group 'internal_domains' has 1 source(s) => @domain.de [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:4/Name:Default Internal]=>(group:internal_domains): - Resolved source '@domain.de' to a email address specification, match = 0 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:4/Name:Default Internal]=>(group:internal_domains): Source group result: matched=0 [2014/11/25-14:50:42 - 1352] [POLICIES] INFO: [ID:4/Name:Default Internal]: Source matching result: matched=0 [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:5/Name:Test]: Main policy sources '@example.net' [2014/11/25-14:50:42 - 1352] [POLICIES] DEBUG: [ID:5/Name:Test]: - Resolved source '@example.net' to a email address specification, match = 0 [2014/11/25-14:50:42 - 1352] [POLICIES] INFO: [ID:5/Name:Test]: Source matching result: matched=0 [2014/11/25-14:50:42 - 1352] [TRACKING] DEBUG: Policy resolved into: $VAR1 = {}; [2014/11/25-14:50:42 - 1352] [TRACKING] DEBUG: Request translated into session data: $VAR1 = {
              'Recipient' => '[email protected]',
              'SASLUsername' => '',
              'QueueID' => '',
              'RecipientData' => '',
              'Instance' => '89b.54748930.cd277.0',
              'EncryptionCipher' => '',
              'Size' => '0',
              'EncryptionKeySize' => '0',
              'UnixTimestamp' => 1416923441,
              'ProtocolTransport' => 'Postfix',
              'EncryptionProtocol' => '',
              'Helo' => 'duda',
              'ClientAddress' => '10.32.2.152',
              'ClientName' => 'unknown',
              'Sender' => '[email protected]',
              'SASLSender' => '',
              '_ClientAddress' => bless( {
                                           'raw_ip' => '10.32.2.152',
                                           'ip' => '10.32.2.152',
                                           'ip_version' => 4,
'ip_bin' => '00001010001000000000001010011000',
                                           'cidr' => 32
                                         }, 'awitpt::netip' ),
              'ProtocolState' => 'RCPT',
              'Policy' => {},
              'Protocol' => 'ESMTP',
              'ClientReverseName' => 'unknown',
              'SASLMethod' => ''
            };
    [2014/11/25-14:50:42 - 1352] [CBPOLICYD] INFO: Got request #1
[2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Running module: Access Control Plugin [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Module 'Access Control Plugin' returned CBP_CONTINUE [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Running module: HELO/EHLO Check Plugin [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Module 'HELO/EHLO Check Plugin' returned CBP_CONTINUE [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Running module: SPF Check Plugin [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Module 'SPF Check Plugin' returned CBP_CONTINUE [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Running module: Greylisting Plugin [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Module 'Greylisting Plugin' returned CBP_CONTINUE [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Running module: Quotas Plugin [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Module 'Quotas Plugin' returned CBP_CONTINUE [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Running module: Accounting Plugin [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Module 'Accounting Plugin' returned CBP_CONTINUE
    [2014/11/25-14:50:42 - 1352] [CBPOLICYD] DEBUG: Done with modules
[2014/11/25-14:50:43 - 1352] [PROTOCOLS/Postfix] DEBUG: Possible Postfix protocol [2014/11/25-14:50:43 - 1352] [PROTOCOLS/Postfix] INFO: Identified Postfix protocol [2014/11/25-14:50:43 - 1352] [TRACKING] DEBUG: Protocol state is 'END-OF-MESSAGE', decoding policy... [2014/11/25-14:50:43 - 1352] [TRACKING] DEBUG: Decoded into: $VAR1 = {}; [2014/11/25-14:50:43 - 1352] [TRACKING] DEBUG: Request translated into session data: $VAR1 = {
              'SASLUsername' => '',
              'QueueID' => '4480D20937',
              'RecipientData' => '/<[email protected]>#',
              'EncryptionCipher' => '',
              'Instance' => '89b.54748930.cd277.0',
              'Size' => '3',
              'EncryptionKeySize' => '0',
              'UnixTimestamp' => 1416923443,
              'ProtocolTransport' => 'Postfix',
              'EncryptionProtocol' => '',
              'Helo' => 'duda',
              'ClientAddress' => '10.32.2.152',
              'ClientName' => 'unknown',
              'Sender' => '[email protected]',
              'SASLSender' => '',
              '_ClientAddress' => bless( {
                                           'raw_ip' => '10.32.2.152',
                                           'ip' => '10.32.2.152',
                                           'ip_version' => 4,
                                           'cidr' => 32
                                         }, 'awitpt::netip' ),
              'ProtocolState' => 'END-OF-MESSAGE',
              '_Recipient_To_Policy' => {},
              'Protocol' => 'ESMTP',
              'ClientReverseName' => 'unknown',
              'SASLMethod' => ''
            };
[2014/11/25-14:50:43 - 1352] [CBPOLICYD] INFO: Got request #2 (pipelined) [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Running module: Access Control Plugin [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Module 'Access Control Plugin' returned CBP_SKIP [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Running module: HELO/EHLO Check Plugin [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Module 'HELO/EHLO Check Plugin' returned CBP_SKIP [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Running module: SPF Check Plugin [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Module 'SPF Check Plugin' returned CBP_SKIP [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Running module: Greylisting Plugin [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Module 'Greylisting Plugin' returned CBP_SKIP [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Running module: Quotas Plugin [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Module 'Quotas Plugin' returned CBP_CONTINUE [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Running module: Accounting Plugin [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Module 'Accounting Plugin' returned CBP_CONTINUE
    [2014/11/25-14:50:43 - 1352] [CBPOLICYD] DEBUG: Done with modules
[2014/11/25-14:52:25 - 1352] [CBPOLICYD] WARNING: Client closed connection => Peer: 127.0.0.1:47384, Local: 127.0.0.1:10031
    [2014/11/25-14:52:25 - 1342] [CORE] INFO: Killing "1" children
[2014/11/25-14:52:25 - 1355] [CBPOLICYD] DEBUG: Caching engine: hits = 8, misses = 0 [2014/11/25-14:52:25 - 1355] [CBPOLICYD] DEBUG: Shutting down caching engine (1355)



On 20.11.2014 15:10, Nigel Kukard wrote:
On 11/20/2014 10:54 AM, Sebastian Fohler wrote:
On 19.11.2014 08:11, Nigel Kukard wrote:
On 18.11.2014 15:40, Nigel Kukard wrote:
Remove the default policies and add yourself a policy to match the
mail
you wish to adjust the Amavis a parameters on.

1. Look that the policy match phase is being logged
2. Look that the module is being run
3. Check amavis logs
4. Check postfix logs
5...
6. PROFIT

:)
Please do not top post.

Its not possible you don't see policy resolutions if policyd is getting
requests. Best to double check your configuration.

-N



Ok, I guess we agree that policyd seems to get requests, the debug log
shows traffic on policyd so that should be the case. Could you take a
look at the cluebringer.conf I've posted before and check if there is
some missconfiguration you might notice?
I couldn't find anything wrong but maybe I don't unterstand some of
those options correctly.

Your check policy service is quite far down on the check list, you do
know if any item before it passes the mail in postfix, that no policy
request will be made in the RCPT stage? For instance nothing in your
my_networks is going to hit policyd.

The only thing in your logs is the END-OF-MESSAGE stage.

-N

_______________________________________________
Users mailing list
[email protected]
http://lists.policyd.org/mailman/listinfo/users_lists.policyd.org


_______________________________________________
Users mailing list
[email protected]
http://lists.policyd.org/mailman/listinfo/users_lists.policyd.org

Reply via email to