On Thursday 15 December 2005 11:59, Kai Schaetzl wrote:
>Gene Heskett wrote on Thu, 15 Dec 2005 11:26:18 -0500:
>> But where then does it get the local.cf data?
>
>>From /etc/mail/spamassassin.
>
>Kai

From another thread, I found the magic incantation to put 
in /etc/mail/spamassassin/local.cf to fix the auto-whitelist problems.

Now the one remaining error being logged for every session called is 
this:
Dec 15 18:21:43 coyote spamd[26507]: spamd: connection from 
localhost.localdomain [127.0.0.1] at port 37682
Dec 15 18:21:43 coyote spamd[26507]: spamd: creating 
default_prefs: /root/.spamassassin/user_prefs
Dec 15 18:21:43 coyote spamd[26507]: config: cannot write 
to /root/.spamassassin/user_prefs: Permission denied
Dec 15 18:21:43 coyote spamd[26507]: spamd: failed to create readable 
default_prefs: /root/.spamassassin/user_prefs

I tried adding a user_prefs_path and user_prefs_file_mode to local.cf, 
but it spits these out on a -SIGHUP.

So whats next?

-- 
Cheers, Gene
People having trouble with vz bouncing email to me should use this
address: <[EMAIL PROTECTED]> which bypasses vz's
stupid bounce rules.  I do use spamassassin too. :-)
Yahoo.com and AOL/TW attorneys please note, additions to the above
message by Gene Heskett are:
Copyright 2005 by Maurice Eugene Heskett, all rights reserved.

Reply via email to