Bryan Phinney grabbed a keyboard and wrote: > > The fetchmail log should be telling you what the error code is from Postfix > but if I had to guess, I would say it is a 501, fetchmail normally counts 55? > codes as spam rejects by default.
Not on *my* system, it didn't. :-) I had to put it in to cause fetchmail to behave itself when running into those. > Line should show: > > poll mail.whatever.com with proto whatever > user '[EMAIL PROTECTED]' there with password 'password' is 'localuser' here > antispam 554,550,501 Just a note for anyone reading: The "user" part above is for how you normally login to your POP or IMAP server to retrieve your mail. If you're using an ISP that has a login method of using your E-Mail address with them, then [EMAIL PROTECTED] is correct. If you're using a server that just requires a username, *don't* add the @domain.com part (I.E. don't use your address to login unless your provider requres that as your login). > Add that line and you should no longer see those errors or have misconfigured > spam piling up in your inbox. Only other way that I know of is to run > Fetchmail configured to flush the box which removes all messages that were > seen but no delivered. This is dangerous and could result in your losing > messages due to Postfix being down when fetchmail tries to pick up mail. > Another option is to periodically run fetchmail to pick up mail, then reload > fetchmail in flush mode to flush misconfigured messages, then rerun fetchmail > in normal mode. You could do this once a week but in the meantime would get > all those errors in your syslog. Last option is to simply bitbucket all > fetchmail-daemon notifications with procmail. That last option is kinda dangerous, though. :-) If you got other fetchmail errors, you would never know about them.... (Not saying don't do it if it's really needed, just be aware... :) --Dave -- David Guntner GEnie: Just say NO! http://www.akaMail.com/pgpkey/davidg or key server for PGP Public key
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com