Dear clapf-users,

after 5 months silence (read: development :-)) I've just released
the 0.4.6-rc2 version of clapf.


Health monitor
---------------

Added a health monitor feature to the webui. It displays the smtp status of clapf and postfix. It also reveals the output of qshape. Qshape is a postfix
utility, see http://www.postfix.org/QSHAPE_README.html for details.

To enable the qshape stats in the health monitor, you have to create the
following cronjob for _root_ user:

*/5 * * * * PATH=$PATH:/usr/local/sbin /usr/local/bin/qshape > /var/lib/clapf/stat/active+incoming */5 * * * * PATH=$PATH:/usr/local/sbin /usr/local/bin/qshape -s > /var/lib/clapf/stat/active+incoming-sender */5 * * * * PATH=$PATH:/usr/local/sbin /usr/local/bin/qshape deferred > /var/lib/clapf/stat/deferred */5 * * * * PATH=$PATH:/usr/local/sbin /usr/local/bin/qshape -s deferred > /var/lib/clapf/stat/deferred-sender

Setup improvement
------------------

The setup utility is able to read data from previous config.php
in case of an upgrade.

Daily quarantine report
------------------------

Added a new utility to send a daily quarantine report (util/quarantine-daily-report.php) You can run it as php /usr/local/libexec/clapf/quarantine-daily-report.php /path/to/webui/installation

Improved history
-----------------

You can search for not only domain name, but email addresses as well in the "Sender" and
"Recipient" fields.

Important! You cannot write partial matches, eg. mail.com (for gmail.com or hotmail.com), you
have to specify them as gmail.com, and hotmail.com respectively.

maillog.pl fix
---------------

The maillog.pl history collector script will lowercase the email addresses and domain names, so be sure to use lowercase names for searching in the history.

"mynetwork" feature
--------------------

Added the mynetwork feature to prevent clapf running spam check on
emails coming from certain IP-addresses.

The mynetwork variable is a similar comma separated list like skipped_received_ips.

Let's say, your postfix box running clapf relays emails coming from your LAN
(11.22.33.0/24), and you don't want clapf to spamcheck these emails.
All you have to do is to specify your LAN, eg. "mynetwork=11.22.33."

If the client IP-address matches "mynetwork", clapf will add
"<clapf-header-field>: mynetwork" to the message header.

Note 1: clapf checks for viruses even in emails coming from "mynetwork". Note 2: the following addresses are explicitly on "mynetwork": 127.,192.168.,172.16.,10.

To use this feature, you have to activate XFORWARD in postfix, ie.
/etc/postfix/main.cf:

lmtp_send_xforward_command = yes
smtp_send_xforward_command = yes
smtpd_authorized_xforward_hosts = 127.0.0.0/8


You can download it from the clapf site, http://clapf.acts.hu/clapf-0.4.6-rc2.tar.gz
(md5: bcea2440bd43d0f3eeaa95b10eb725f5).

If you have any problem, idea, whatever, just let me know.

Best regards,
Janos

Reply via email to