On Thursday 15 December 2005 11:59, Kai Schaetzl wrote: >Gene Heskett wrote on Thu, 15 Dec 2005 11:26:18 -0500: >> But where then does it get the local.cf data? > >>From /etc/mail/spamassassin. > >Kai
From another thread, I found the magic incantation to put in /etc/mail/spamassassin/local.cf to fix the auto-whitelist problems. Now the one remaining error being logged for every session called is this: Dec 15 18:21:43 coyote spamd[26507]: spamd: connection from localhost.localdomain [127.0.0.1] at port 37682 Dec 15 18:21:43 coyote spamd[26507]: spamd: creating default_prefs: /root/.spamassassin/user_prefs Dec 15 18:21:43 coyote spamd[26507]: config: cannot write to /root/.spamassassin/user_prefs: Permission denied Dec 15 18:21:43 coyote spamd[26507]: spamd: failed to create readable default_prefs: /root/.spamassassin/user_prefs I tried adding a user_prefs_path and user_prefs_file_mode to local.cf, but it spits these out on a -SIGHUP. So whats next? -- Cheers, Gene People having trouble with vz bouncing email to me should use this address: <[EMAIL PROTECTED]> which bypasses vz's stupid bounce rules. I do use spamassassin too. :-) Yahoo.com and AOL/TW attorneys please note, additions to the above message by Gene Heskett are: Copyright 2005 by Maurice Eugene Heskett, all rights reserved.