Mar 1 19:09:21 digi29a spamd: spamd: result. Mar 1 19:09:21 digi29a spamd: plugin: eval failed: bayes: (in learn) locker: safe_lock: cannot create tmp lockfile /.spamassassin/.com.14851 for /.spamassassin/bayes.lock: No such file or directory Mar 1 19:09:21 digi29a spamd: internal error, python traceback seen in response: Traceback (most recent call last):\n File "/usr/bin/pyzor", line 8, in \n ()\n File "/usr/lib/python2.7/site-packages/pyzor/client.py", line 1022, in run\n ExecCall().run()\n File "/usr/lib/python2.7/site-packages/pyzor/client.py", line 180, in run\n os.mkdir(homedir)\nOSError: Permission denied: '/.pyzor' at /usr/share/perl5/Mail/SpamAssassin/Plugin/Pyzor.pm line 308, line 434. Mar 1 19:09:21 digi29a spamd: spamd: checking message for (unknown):99 Mar 1 19:09:21 digi29a spamd: spamd: still running as root: user not specified with -u, not found, or set to root, falling back to nobody Mar 1 19:09:21 digi29a spamd: spamd: handle_user (getpwnam) unable to find user: '' Based on the SpamAssassin plugin from Haraka. Mar 1 19:09:21 digi29a spamd: spamd: connection from 127.0.0.1 :41090 to port 783, fd 5 This library use sockets to send a message to SpamAssassin daemon for evaluation. We usually expect a host to have both forward and reverse DNS to point to each other, so resolves to 1.2.3.4, and 1.2.3.4 rDNS resolves to, when I check my log, it seems spam is not working This is a wildcard host list, containing a remote sending server's hostname. However, this value can be spoofed, and thus would typically not be the best way to whitelist a sender. Useful if you must receive emails from a specific sender. Basically means any spam can arrive to this local domain list, which is not usually what would be desired.Īn wilcard address list of sending/From emails that should be accepted without any scanning. Our client base is very nervous about spam-delivered malware but even more. It should be 0 bytes 99.999% of the time. However this is for the destination domains, meaning NO SCANNING WILL BE DONE on these recipient domains. This is also an nwildsearch, so the same format at the blacklist_domains applies. These 3 files are meant to block OUTBOUND email from leaving your server. etc/virtual/blacklist_usernames /etc/virtual/blacklist_smtp_usernames /etc/virtual/blacklist_script_usernames # Outbound DirectAdmin Username/SMTP login blocks Make sure "Use RBL Blocking" is enabled, else the blacklist files will not have any effect. Usually, you'd just go to Admin Level -> Admin Settings -> Use RBL Blocking to enable it, which replaces the use_rbl_domains file, with a symlink to the domains file (all domains on the server). NOTE: These 2 files will only be activated on domains which are enabled in the /etc/virtual/use_rbl_domains file. To enable RBL blocking for all current and future domains via the command line as root, run the following: If you enable it, the file will be deleted and it will be replaced by a link to "domains". So, if you are using the use_rbl_domains as a file and are manually updating it, leave the option disabled. Note: This option will show enabled if /etc/virtual/use_rbl_domains is a a link, and disabled if it's a file. As I mentioned before, you can have SpamAssassin. For example, in Thunderbird, you have to subscribe to your Spam Folder or you won’t automatically see it. Depending on your email client, you may have to enable or specify that this folder be visible. To enable RBL blocking for all current and future domains via the DirectAdmin GUI, use the following:Īdmin Level -> Admin Settings -> Use RBL Blocking By default, SpamAssassin puts all email it detects as spam into a Spam Folder in your email. Only use this option if you are certain that you want very aggressive RBL blocking. # How to enable realtime blocklists (RBLs) with Eximīecause SpamAssassin already factors in RBLs in its spam scoring and blocking, you can leave this option disabled and still benefit from RBLs. Which tells all DNS queries that your server makes, to call your local copy of "named", instead of querying the remote DNS server for lookups.Īs RBLs are all DNS based, this means your RBL queries to the RBL servers would now be coming from your server, and not from a big DNS server, like 8.8.8.8, so it's most likely to go through.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |