On 2/27/08, Bartłomiej Rutkowski <[EMAIL PROTECTED]> wrote: > Hi all, > > I am using policy banks to properly distribute mail routes - different > destination and scores for mail incoming from legitimate (smtp > authorized) clients, different for mail incoming from the internet, > different for mail that is relayed and sent back to the net. All is > working great, but what I wanted to do, is to override default DNS > policy for my authorized clients (which is by now: NO DNS SENDING) so I > could inform them that their mail did not reach the recipient, because > of spammy text, or having a virus, or by any reason. So I changed my > policy banks like that, for hosts STASIS00 and STASIS01 like so: > > $interface_policy{'10009'} = 'QMAIL'; > $policy_bank{'QMAIL'} = { > forward_method => 'smtp:[10.10.3.9]:10025', > }; > > $interface_policy{'10048'} = 'STASIS00'; > $interface_policy{'10040'} = 'STASIS01'; > $policy_bank{'STASIS00'} = { > forward_method => 'smtp:[10.10.3.9]:10025', > spam_kill_level_maps => [8.5], > sa_dsn_cutoff_level => [25.0], > final_spam_destiny => 'D_BOUNCE', > final_virus_destiny => 'D_BOUNCE', > final_banned_destiny => 'D_BOUNCE', > }; > $policy_bank{'STASIS01'} = { > forward_method => 'smtp:[10.10.3.9]:10025', > spam_kill_level_maps => [8.5], > sa_dsn_cutoff_level => [25.0], > final_spam_destiny => 'D_BOUNCE', > final_virus_destiny => 'D_BOUNCE', > final_banned_destiny => 'D_BOUNCE', > }; > > $interface_policy{'10049'} = 'MX00'; > $interface_policy{'10050'} = 'MX01'; > $policy_bank{'MX00'} = { > forward_method => 'smtp:[10.10.3.9]:10025', > os_fingerprint_method => 'p0f:195.46.43.224:1234', > }; > $policy_bank{'MX01'} = { > forward_method => 'smtp:[10.10.3.9]:10025', > os_fingerprint_method => 'p0f:195.46.43.225:1234', > }; > > While the default settings are: > > $sa_tag_level_deflt = 0.0; > $sa_tag2_level_deflt = 5.0; > $sa_kill_level_deflt = 7.0; > $sa_dsn_cutoff_level = 0; > $sa_quarantine_cutoff_level = 25; > > $notify_method = 'smtp:[10.10.3.9]:10025'; > # $forward_method = 'smtp:[127.0.0.1]:10025'; > > # $final_virus_destiny = D_DISCARD; > # $final_banned_destiny = D_BOUNCE; > # $final_spam_destiny = D_BOUNCE; > # $final_bad_header_destiny = D_PASS; > > After that, everything in policy banks is working, and I cant find any > error messages in logs, but DNS sending still does not work. Why is > that? Where did I something wrong? > > Thanks for any help > B.R. >
sa_dsn_cutoff_level is not a valid policy bank key, you want spam_dsn_cutoff_level_maps. See amavisd.conf-default for a list of valid keys. Version 2.5 or newer should additionally require spam_dsn_cutoff_level_bysender_maps (and if mail is considered to originate from us, 'originating'). Here is an example: $policy_bank{'TRUSTED'} = { # mail originating from trusted senders originating => 1, spam_admin_maps => ["[EMAIL PROTECTED]"], # alert of internal spam final_spam_destiny => D_BOUNCE, # so the sender knows they are a spammer spam_kill_level_maps => [10.0], spam_dsn_cutoff_level_maps => [9999], spam_dsn_cutoff_level_bysender_maps => [9999], }; -- Gary V ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ _______________________________________________ AMaViS-user mailing list AMaViS-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/amavis-user AMaViS-FAQ:http://www.amavis.org/amavis-faq.php3 AMaViS-HowTos:http://www.amavis.org/howto/