Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Anil Aliyan
pretty smart question John, I also would like to hear the answer for it from 
the experts.



- Original Message - 
From: Tek Support [EMAIL PROTECTED]

To: qmailtoaster-list@qmailtoaster.com
Sent: Friday, August 08, 2008 8:37 AM
Subject: Re: [qmailtoaster] Authentication to bypass spam checks



Hi all, I have a few question.  Before I learned of this port 587, my
only option was to disable spamhaus.  And all I did to disable it was
to remove it from my /var/qmail/control/blacklists file.

So, the other day I needed some addition reporting and I remembered
the toaster plus, so I downloaded the Repo and ran the yum install
for it.  I then also decided to run the spamdyke filter.

So, now that I've realized that port 587 is available for my users to
send on, I went back to add the spamhaus.  However, it's no longer in
the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
has removed it.

So I have 2 questions:
1) Are spamdyke and spamhaus compatible?  Why would or why does
spamdyke remove blacklist from the run file.  Here are the before
and after.
---Begin---

---End---

2) Since I've just found out that port 587 is available, and 587 does
not run spamhaus the dynamic ip checker, then what is keeping a
spammer from trying to use this 587?  I mean I'm a little confused.
If my port 25 won't allow any non-authenticated users to send smtp
(presuming it's not an open relay), then why would I even need port
587?  I understand the need to have 587 if I'm using spamhaus on port
25, and 25 is now blocked to my dynamic users (workers from home).  So
it seems a bit unnecessary to have both ports.  And why couldn't a
spammer start sending spam to my users on 587 - if it even works that
way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
popular thing, so someone, somewhere would certainly try port 587 in
order to get around spamhaus wouldn't they?

Thanks for your time on this, I'm not trying to be difficult, only
trying to understand how and why.

Thanks
John

-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Johannes Weberhofer, Weberhofer GmbH

The answer to question 2) is quite simple:
Only authenticated users can relay via this port. Additionally usage of TLS 
is suggested. Qmailtoaster is prepeared for it, but each client must enable it; for 
security reasons (to force man in the middle attacs) each client should not only prefer 
but force TLS to be used.

Best regards,
Johannes Weberhofer

Anil Aliyan wrote:

pretty smart question John, I also would like to hear the answer for it
from the experts.


- Original Message - From: Tek Support [EMAIL PROTECTED]
To: qmailtoaster-list@qmailtoaster.com
Sent: Friday, August 08, 2008 8:37 AM
Subject: Re: [qmailtoaster] Authentication to bypass spam checks



Hi all, I have a few question. Before I learned of this port 587, my
only option was to disable spamhaus. And all I did to disable it was
to remove it from my /var/qmail/control/blacklists file.

So, the other day I needed some addition reporting and I remembered
the toaster plus, so I downloaded the Repo and ran the yum install
for it. I then also decided to run the spamdyke filter.

So, now that I've realized that port 587 is available for my users to
send on, I went back to add the spamhaus. However, it's no longer in
the /var/qmail/supervise/smtp/run file. It would appear that spamdyke
has removed it.

So I have 2 questions:
1) Are spamdyke and spamhaus compatible? Why would or why does
spamdyke remove blacklist from the run file. Here are the before
and after.
---Begin---

---End---

2) Since I've just found out that port 587 is available, and 587 does
not run spamhaus the dynamic ip checker, then what is keeping a
spammer from trying to use this 587? I mean I'm a little confused.
If my port 25 won't allow any non-authenticated users to send smtp
(presuming it's not an open relay), then why would I even need port
587? I understand the need to have 587 if I'm using spamhaus on port
25, and 25 is now blocked to my dynamic users (workers from home). So
it seems a bit unnecessary to have both ports. And why couldn't a
spammer start sending spam to my users on 587 - if it even works that
way, which I'm not sure yet if it can? Qmailtoaster is a pretty
popular thing, so someone, somewhere would certainly try port 587 in
order to get around spamhaus wouldn't they?

Thanks for your time on this, I'm not trying to be difficult, only
trying to understand how and why.

Thanks
John

-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



--


|-
|  weberhofer GmbH   | Johannes Weberhofer
|  information technologies
|  Austria, 1080 Wien, Blindengasse 52/3
|
|  Firmenbuch: 225566s, Handelsgericht Wien
|  UID: ATU55277701
|
|  phone : +43 (0)1 5454421 0| email: [EMAIL PROTECTED]
|  fax   : +43 (0)1 5454421 19   | web  : http://weberhofer.at
|  mobile: +43 (0)699 11998315
|---

-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Hostmaster
Hi,

you can check the file

/etc/spamdyke/spamdyke.conf

here are the rbl servers now.

Mario

- Mensaje original - 
De: Tek Support [EMAIL PROTECTED]
Para: qmailtoaster-list@qmailtoaster.com
Enviado: Jueves, 07 de Agosto de 2008 10:41 p.m.
Asunto: Re: [qmailtoaster] Authentication to bypass spam checks


Opps, I forgot to add the before and after /var/qmail/supervise/smtp/run 
file.

---Before Begin---
#!/bin/sh
QMAILDUID=`id -u vpopmail`
NOFILESGID=`id -g vpopmail`
MAXSMTPD=`cat /var/qmail/control/concurrencyincoming`
BLACKLIST=`cat /var/qmail/control/blacklists`
SMTPD=/var/qmail/bin/qmail-smtpd
TCP_CDB=/etc/tcprules.d/tcp.smtp.cdb
RBLSMTPD=/usr/bin/rblsmtpd
HOSTNAME=`hostname`
VCHKPW=/home/vpopmail/bin/vchkpw
REQUIRE_AUTH=0

exec /usr/bin/softlimit -m 8500 \
 /usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c $MAXSMTPD \
 -u $QMAILDUID -g $NOFILESGID 0 smtp \
 $RBLSMTPD $BLACKLIST $SMTPD $VCHKPW /bin/true 21
---Before End---

---After Begin---
#!/bin/sh
QMAILDUID=`id -u vpopmail`
NOFILESGID=`id -g vpopmail`
MAXSMTPD=`cat /var/qmail/control/concurrencyincoming`
SPAMDYKE=/usr/local/bin/spamdyke
SPAMDYKE_CONF=/etc/spamdyke/spamdyke.conf
SMTPD=/var/qmail/bin/qmail-smtpd
TCP_CDB=/etc/tcprules.d/tcp.smtp.cdb
HOSTNAME=`hostname`
VCHKPW=/home/vpopmail/bin/vchkpw
REQUIRE_AUTH=0

exec /usr/bin/softlimit -m 8500 \
 /usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c $MAXSMTPD \
 -u $QMAILDUID -g $NOFILESGID 0 smtp \
 $SPAMDYKE --config-file $SPAMDYKE_CONF \
 $SMTPD $VCHKPW /bin/true 21
---After End---



You can see the BLACKLIST=`cat /var/qmail/control/blacklists` is no
longer listed.

Thanks
John



On Thu, Aug 7, 2008 at 9:07 PM, Tek Support [EMAIL PROTECTED] wrote:
 Hi all, I have a few question.  Before I learned of this port 587, my
 only option was to disable spamhaus.  And all I did to disable it was
 to remove it from my /var/qmail/control/blacklists file.

 So, the other day I needed some addition reporting and I remembered
 the toaster plus, so I downloaded the Repo and ran the yum install
 for it.  I then also decided to run the spamdyke filter.

 So, now that I've realized that port 587 is available for my users to
 send on, I went back to add the spamhaus.  However, it's no longer in
 the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
 has removed it.

 So I have 2 questions:
 1) Are spamdyke and spamhaus compatible?  Why would or why does
 spamdyke remove blacklist from the run file.  Here are the before
 and after.
 ---Begin---

 ---End---

 2) Since I've just found out that port 587 is available, and 587 does
 not run spamhaus the dynamic ip checker, then what is keeping a
 spammer from trying to use this 587?  I mean I'm a little confused.
 If my port 25 won't allow any non-authenticated users to send smtp
 (presuming it's not an open relay), then why would I even need port
 587?  I understand the need to have 587 if I'm using spamhaus on port
 25, and 25 is now blocked to my dynamic users (workers from home).  So
 it seems a bit unnecessary to have both ports.  And why couldn't a
 spammer start sending spam to my users on 587 - if it even works that
 way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
 popular thing, so someone, somewhere would certainly try port 587 in
 order to get around spamhaus wouldn't they?

 Thanks for your time on this, I'm not trying to be difficult, only
 trying to understand how and why.

 Thanks
 John


-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.138 / Virus Database: 270.5.12/1599 - Release Date: 07/08/2008 
20:49




-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] relaying in Centos5

2008-08-08 Thread Gaby Kule
Hi all, I increassed (more) the smtp softlimit from 85000... to 185000... I 
think that was the problem. Apparently It could not load the vckpw process 
dinamically but no message was logged.
Now I have a new error (error 554 from spanhaus). (DENIED_RBL_MATCH) I´ll 
check this.


best regards
Gabriel

- Original Message - 
From: Gaby Kule [EMAIL PROTECTED]
To: qmailtoaster-list@qmailtoaster.com
Sent: Thursday, August 07, 2008 7:11 PM
Subject: Re: [qmailtoaster] relaying in Centos5


Thanks Eric, I have a static IP,
If I add my public static IP into the /etc/tcprules.d/tcp.smtp it works
fine, but I need it for sending emails from dimamic IPs, for all the users
hosted in my server.

I dont understand why must be 587 port opened. I know it is closed cause the
firewall is not administered by me (I have a hardware firewall in that
server), but must I request this port to be opened to the administrator ?
why ?

Is there other usefull test that ou recommend?
regards
Gabriel

- Original Message - 
From: Eric Shubert [EMAIL PROTECTED]
To: qmailtoaster-list@qmailtoaster.com
Sent: Thursday, August 07, 2008 4:53 PM
Subject: Re: [qmailtoaster] relaying in Centos5


Gaby Kule wrote:
 Hi all,

 I installed las week latest versions of qmt + spamdyke on Centos5 updated,
 x86_64,

 My problem is than I can not send outgoing emails from this server, I get
 5.5.3 error.
 I can do pop3 login,
 I can send email from localhost (squirredmail)
 I can telnet from localhost and smtp auth looks good.

 telnet localhost 25
 Trying 127.0.0.1...
 Connected to localhost.localdomain (127.0.0.1).
 Escape character is '^]'.
 220 Welcome to Bob Esponja ESMTP ESMTP
 ehlo localhost
 250-Welcome to Bob Esponja ESMTP
 250-STARTTLS
 250-PIPELINING
 250-8BITMIME
 250-SIZE 20971520
 250 AUTH LOGIN PLAIN CRAM-MD5
 quit
 221 Welcome to Bob Esponja ESMTP
 Connection closed by foreign host.

 If I telnet from other host, it opens connection but does not prints
 welcome
 message.
 It prints:

 telnet localhost 25
 Trying 127.0.0.1...
 Connected to localhost.localdomain (127.0.0.1).
 Escape character is '^]'.
 220 **



 This is my /etc/tcprules.d/tcp.smtp

 127.:allow,RELAYCLIENT=,DKSIGN=/var/qmail/control/domainkeys/%/private
 :allow,BADMIMETYPE=,BADLOADERTYPE=M,CHKUSER_RCPTLIMIT=50,CHKUSER_WRONGRCPTLIMIT=10,DKVERIFY=DEGIJKfh,QMAILQUEUE=/var/qmail/bin/simscan,DKQUEUE=/var/qmail/bin/qmail-queue.orig,DKSIGN=/var/qmail/control/domainkeys/%/private,NOP0FCHECK=1

 This is my tail /var/log/qmail/smtp/current
 @4000489b41282bec2dc4 CHKUSER accepted sender: from [EMAIL PROTECTED]::
 remote GabyK:unknown:xxx.xxx.xxx.xxx rcpt  : sender accepted
 @4000489b412a281c97c4 CHKUSER rejected relaying: from
 [EMAIL PROTECTED]::
 remote GabyK:unknown:xxx.xxx.xxx.xxx rcpt [EMAIL PROTECTED] : client
 not
 allowed to relay
 @4000489b412b2b1e816c tcpserver: end 26060 status 0
 @4000489b412b2b1e8554 tcpserver: status: 0/100

 I have another server with an older version working on Centos4 and this
 works good. I dont know what else to check. Do you have some ideas ?
 best regards
 Gabriel


Are you trying to send from a dynamic IP address? That would most likely be
blocked. Try sending on port 587.

-- 
-Eric 'shubes'

-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Marco Cordeiro
All , I tried update spamassassin at Centos 4.2 using qtp-newmodel
And I get this message :

Installing spamassassin-toaster-3.2.5-1.3.14 in the sandbox ...
error: Failed dependencies:
perl(HTTP::Date) is needed by spamassassin-toaster-3.2.5-1.3.14.i686
perl(LWP::UserAgent) is needed by
spamassassin-toaster-3.2.5-1.3.14.i686

but , this perl modules are up to date !

any idea ???

tks.Marco


-Original Message-
From: Eric Shubert [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, August 06, 2008 2:00 PM
To: qmailtoaster-list@qmailtoaster.com
Subject: Re: [qmailtoaster] Issue upgrading Spamassassin

The official spamassassin-toaster versions don't work with MakeMaker 6.44+
yet. I've modified the spamassassin-toaster.spec file to work with MakeMaker
6.44+, and Erik Espinoza's in the process of testing it for official
release. I can send you the unofficial source rpm if you'd like. Please
contact me off list for that.

Ben King wrote:
 I have MakeMaker.pm version 6.44 revision 54639 on CentOS 5.2
 
 I have the same exact error that person in the message I quoted is
getting.
 
 + rm -f /var/tmp/spamassassin-toaster-root/etc/mail/spamassassin/v310.pre
 + install -m 0644 /usr/src/redhat/SOURCES/qmailtoaster.local.cf.bz2
 /var/tmp/spamassassin-toaster-root/etc/mail/spamassassin/local.cf.bz2
 install: cannot create regular file
 `/var/tmp/spamassassin-toaster-root/etc/mail/spamassassin/local.cf.bz2':
 No such file or directory
 error: Bad exit status from /var/tmp/rpm-tmp.37388 (%install)
 
 The rpm build fails at the local.cf.bz2 file.
 
 I tried doing a cpan bundle update and then loaded  IO::Compress::Bzip2.
 CPAN doesn't fail or load this as a dependency. If you don't watch the
 build then you could easily miss the note on the screen about it
 missing. This didn't help me either.
 
 
 
 - Original Message - From: Eric Shubert [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Monday, August 04, 2008 11:37 AM
 Subject: Re: [qmailtoaster] Issue upgrading Spamassassin
 
 
 There's a good chance that there's a fix to your problem, but it's a good
 idea to verify that you're having the problem which the fix fixes. ;)
 Please post the error you're getting, along with the version of your
 MakeMaker.pm module.

 Ben King wrote:
 I'm having the same trouble updating spamassassin on Centos5.2.
 Does anybody know if there an  updated package to try?


 - Original Message - From: Erik A. Espinoza
 [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Saturday, July 12, 2008 5:15 PM
 Subject: Re: [qmailtoaster] Issue upgrading Spamassassin


 This issue appears to be caused by a mismatch of a perl module between
 the source and destination.

 Eric Schubes has created a work around that I haven't had a chance to
 validate on all the platforms yet, but once done I will release it.

 Thanks,
 EE

 On Sat, Jul 12, 2008 at 4:57 PM, James Palmer [EMAIL PROTECTED]
 wrote:
 Hi all,

 Ran into an issue when upgrading SA to the latest version.

 I removed the package (as I always do)

 rpm -e spamassassin-toaster

 And whilst building the new spamassassin src.rpm (rpmbuild --rebuild
 --with
 cnt50 spamassassin-toaster-3.2.5-1.3.14.src.rpm) I get the following
 error:

 + rm -f
 /var/tmp/spamassassin-toaster-root/etc/mail/spamassassin/local.cf
 + rm -f
 /var/tmp/spamassassin-toaster-root/etc/mail/spamassassin/v310.pre
 + install -m 0644 /usr/src/redhat/SOURCES/qmailtoaster.local.cf.bz2
 /var/tmp/spamassassin-toaster-root/etc/mail/spamassassin/local.cf.bz2
 install: cannot create regular file

`/var/tmp/spamassassin-toaster-root/etc/mail/spamassassin/local.cf.bz2':

 No
 such file or directory
 error: Bad exit status from /var/tmp/rpm-tmp.47733 (%install)


 RPM build errors:
   Bad exit status from /var/tmp/rpm-tmp.47733 (%install)


 Probably something really simple..but hey!

 Also, I inadvertently got QTP to create a qtp sandbox - how can I get
 rid of
 that?

 Cheers,


 James



 -- 
 -Eric 'shubes'



-- 
-Eric 'shubes'

-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Jake Vickers

Marco Cordeiro wrote:

All , I tried update spamassassin at Centos 4.2 using qtp-newmodel
And I get this message :

Installing spamassassin-toaster-3.2.5-1.3.14 in the sandbox ...
error: Failed dependencies:
perl(HTTP::Date) is needed by spamassassin-toaster-3.2.5-1.3.14.i686
perl(LWP::UserAgent) is needed by
spamassassin-toaster-3.2.5-1.3.14.i686

but , this perl modules are up to date !

any idea ???

  


It's in the archives.
You have to install the perl modules via a RPM repo - the spamassassin 
RPM file does not check the see if the files are installed (via CPAN), 
it only looks to see if the RPMs for them are installed.  That was coded 
by the Spamassassin people.



-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Sam Clippinger
To answer #1, spamdyke will definitely use Spamhaus' DNS RBLs.  The 
default configuration of spamdyke (as installed by QTP) does not include 
Spamhaus, however.


If you are using spamdyke version 3.1.x, edit the configuration file 
/etc/spamdyke/spamdyke.conf and add the following line:

   check-dnsrbl=zen.spamhaus.org

If you are using spamdyke version 4.x, edit the configuration file 
/etc/spamdyke/spamdyke.conf and add the following line:

   dns-blacklist-entry=zen.spamhaus.org

To add multiple DNS RBLs, simply repeat the line with different values.

-- Sam Clippinger

Anil Aliyan wrote:
pretty smart question John, I also would like to hear the answer for 
it from the experts.



- Original Message - From: Tek Support [EMAIL PROTECTED]
To: qmailtoaster-list@qmailtoaster.com
Sent: Friday, August 08, 2008 8:37 AM
Subject: Re: [qmailtoaster] Authentication to bypass spam checks



Hi all, I have a few question.  Before I learned of this port 587, my
only option was to disable spamhaus.  And all I did to disable it was
to remove it from my /var/qmail/control/blacklists file.

So, the other day I needed some addition reporting and I remembered
the toaster plus, so I downloaded the Repo and ran the yum install
for it.  I then also decided to run the spamdyke filter.

So, now that I've realized that port 587 is available for my users to
send on, I went back to add the spamhaus.  However, it's no longer in
the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
has removed it.

So I have 2 questions:
1) Are spamdyke and spamhaus compatible?  Why would or why does
spamdyke remove blacklist from the run file.  Here are the before
and after.
---Begin---

---End---

2) Since I've just found out that port 587 is available, and 587 does
not run spamhaus the dynamic ip checker, then what is keeping a
spammer from trying to use this 587?  I mean I'm a little confused.
If my port 25 won't allow any non-authenticated users to send smtp
(presuming it's not an open relay), then why would I even need port
587?  I understand the need to have 587 if I'm using spamhaus on port
25, and 25 is now blocked to my dynamic users (workers from home).  So
it seems a bit unnecessary to have both ports.  And why couldn't a
spammer start sending spam to my users on 587 - if it even works that
way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
popular thing, so someone, somewhere would certainly try port 587 in
order to get around spamhaus wouldn't they?

Thanks for your time on this, I'm not trying to be difficult, only
trying to understand how and why.

Thanks
John

-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Marco Cordeiro
I'm using perl repository already ...
 
yum upgrade perl*
Loading fastestmirror plugin
Loading mirror speeds from cached hostfile
 * rpmforge: fr2.rpmfind.net
 * base: centos.oi.com.br
 * updates: centos.oi.com.br
 * addons: centos.oi.com.br
 * extras: centos.oi.com.br
Setting up Upgrade Process
Could not find update match for perl*
No Packages marked for Update

All perl packages are up to date using repository 

Marco.


-Original Message-
From: Jake Vickers [mailto:[EMAIL PROTECTED] 
Sent: Friday, August 08, 2008 11:08 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: Re: [qmailtoaster] Issue upgrading Spamassassin

Marco Cordeiro wrote:
 All , I tried update spamassassin at Centos 4.2 using qtp-newmodel
 And I get this message :

 Installing spamassassin-toaster-3.2.5-1.3.14 in the sandbox ...
 error: Failed dependencies:
 perl(HTTP::Date) is needed by
spamassassin-toaster-3.2.5-1.3.14.i686
 perl(LWP::UserAgent) is needed by
 spamassassin-toaster-3.2.5-1.3.14.i686

 but , this perl modules are up to date !

 any idea ???

   

It's in the archives.
You have to install the perl modules via a RPM repo - the spamassassin 
RPM file does not check the see if the files are installed (via CPAN), 
it only looks to see if the RPMs for them are installed.  That was coded 
by the Spamassassin people.


-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Jake Vickers

Marco Cordeiro wrote:

I'm using perl repository already ...
 
yum upgrade perl*

Loading fastestmirror plugin
Loading mirror speeds from cached hostfile
 * rpmforge: fr2.rpmfind.net
 * base: centos.oi.com.br
 * updates: centos.oi.com.br
 * addons: centos.oi.com.br
 * extras: centos.oi.com.br
Setting up Upgrade Process
Could not find update match for perl*
No Packages marked for Update

All perl packages are up to date using repository 
  


What does  rpm -qa | grep perl- show? (I'm on my way out, so I'll 
check back later)



-
QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Marco Cordeiro
Jake,
You're right, I don't have perl-HTTP-Date and perl-LWP-UserAgent installed
from repo ;-(
And worse I can't find this packages using yum list !

How can I get this packages for centos5 ??

Tks, Marco.

rpm -qa | grep perl-
perl-Digest-HMAC-1.01-15
perl-HTML-Tagset-3.20-1.el5.rf
perl-PlRPC-0.2020-1.el5.rf
perl-Sys-Hostname-Long-1.4-1.2.el5.rf
perl-IO-Zlib-1.09-1.el5.rf
perl-5.8.8-10.el5_2.3
perl-IO-Compress-Zlib-2.011-1.el5.rf
perl-String-CRC32-1.4-2.fc6
perl-Net-IP-1.25-2.fc6
perl-Digest-SHA1-2.11-1.2.1
perl-Socket6-0.20-1.el5.rf
perl-Net-Daemon-0.43-1.el5.rf
perl-Crypt-PasswdMD5-1.3-1.2.el5.rf
perl-Net-CIDR-Lite-0.20-1.2.el5.rf
perl-Crypt-OpenSSL-RSA-0.25-1.el5.rf
perl-TimeDate-1.16-5.el5
perl-LWP-UserAgent-Determined-1.03-1.2.el5.rf
perl-Compress-Raw-Zlib-2.011-1.el5.rf
perl-Compress-Zlib-2.011-1.el5.rf
perl-IO-Socket-INET6-2.54-1.el5.rf
perl-Archive-Tar-1.38-1.el5.rf
perl-Mail-DomainKeys-1.0-1.el5.rf
perl-DBI-1.605-1.el5.rf
perl-DBD-MySQL-3.0007-1.fc6
perl-HTML-Parser-3.56-1.el5.rf
perl-Net-DNS-0.63-1.el5.rf
perl-URI-1.35-3
perl-Mail-SPF-Query-1.999.1-2.el5.rf
perl-MailTools-2.03-1.el5.rf
perl-libwww-perl-5.805-1.1.1
perl-IO-Compress-Base-2.011-1.el5.rf

-Original Message-
From: Jake Vickers [mailto:[EMAIL PROTECTED] 
Sent: Friday, August 08, 2008 11:20 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: Re: [qmailtoaster] Issue upgrading Spamassassin

Marco Cordeiro wrote:
 I'm using perl repository already ...
  
 yum upgrade perl*
 Loading fastestmirror plugin
 Loading mirror speeds from cached hostfile
  * rpmforge: fr2.rpmfind.net
  * base: centos.oi.com.br
  * updates: centos.oi.com.br
  * addons: centos.oi.com.br
  * extras: centos.oi.com.br
 Setting up Upgrade Process
 Could not find update match for perl*
 No Packages marked for Update

 All perl packages are up to date using repository 
   

What does  rpm -qa | grep perl- show? (I'm on my way out, so I'll 
check back later)


-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



FW: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Marco Cordeiro
Jake,
You're right, I don't have perl-HTTP-Date and perl-LWP-UserAgent installed
from repo ;-(
And worse I can't find this packages using yum list !

How can I get this packages for centos5 ??

Tks, Marco.

rpm -qa | grep perl-
perl-Digest-HMAC-1.01-15
perl-HTML-Tagset-3.20-1.el5.rf
perl-PlRPC-0.2020-1.el5.rf
perl-Sys-Hostname-Long-1.4-1.2.el5.rf
perl-IO-Zlib-1.09-1.el5.rf
perl-5.8.8-10.el5_2.3
perl-IO-Compress-Zlib-2.011-1.el5.rf
perl-String-CRC32-1.4-2.fc6
perl-Net-IP-1.25-2.fc6
perl-Digest-SHA1-2.11-1.2.1
perl-Socket6-0.20-1.el5.rf
perl-Net-Daemon-0.43-1.el5.rf
perl-Crypt-PasswdMD5-1.3-1.2.el5.rf
perl-Net-CIDR-Lite-0.20-1.2.el5.rf
perl-Crypt-OpenSSL-RSA-0.25-1.el5.rf
perl-TimeDate-1.16-5.el5
perl-LWP-UserAgent-Determined-1.03-1.2.el5.rf
perl-Compress-Raw-Zlib-2.011-1.el5.rf
perl-Compress-Zlib-2.011-1.el5.rf
perl-IO-Socket-INET6-2.54-1.el5.rf
perl-Archive-Tar-1.38-1.el5.rf
perl-Mail-DomainKeys-1.0-1.el5.rf
perl-DBI-1.605-1.el5.rf
perl-DBD-MySQL-3.0007-1.fc6
perl-HTML-Parser-3.56-1.el5.rf
perl-Net-DNS-0.63-1.el5.rf
perl-URI-1.35-3
perl-Mail-SPF-Query-1.999.1-2.el5.rf
perl-MailTools-2.03-1.el5.rf
perl-libwww-perl-5.805-1.1.1
perl-IO-Compress-Base-2.011-1.el5.rf

-Original Message-
From: Jake Vickers [mailto:[EMAIL PROTECTED] 
Sent: Friday, August 08, 2008 11:20 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: Re: [qmailtoaster] Issue upgrading Spamassassin

Marco Cordeiro wrote:
 I'm using perl repository already ...
  
 yum upgrade perl*
 Loading fastestmirror plugin
 Loading mirror speeds from cached hostfile
  * rpmforge: fr2.rpmfind.net
  * base: centos.oi.com.br
  * updates: centos.oi.com.br
  * addons: centos.oi.com.br
  * extras: centos.oi.com.br
 Setting up Upgrade Process
 Could not find update match for perl*
 No Packages marked for Update

 All perl packages are up to date using repository 
   

What does  rpm -qa | grep perl- show? (I'm on my way out, so I'll 
check back later)


-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] relaying in Centos5

2008-08-08 Thread Eric Shubert
Your public IP address has apparently been blacklisted at spamhaus. Dynamic
addresses would be listed there too. You can either use port 587 (which
doesn't check RBLs but does require authentication), or install spamdyke.
Spamdyke bypasses RBL checking for authenticated users. I highly recommend
spamdyke. It does a terrific job blocking spam before the message is even
sent, which saves on bandwidth and scanning resources.

Gaby Kule wrote:
 Hi all, I increassed (more) the smtp softlimit from 85000... to 185000... I 
 think that was the problem. Apparently It could not load the vckpw process 
 dinamically but no message was logged.
 Now I have a new error (error 554 from spanhaus). (DENIED_RBL_MATCH) I´ll 
 check this.
 
 
 best regards
 Gabriel
 
 - Original Message - 
 From: Gaby Kule [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Thursday, August 07, 2008 7:11 PM
 Subject: Re: [qmailtoaster] relaying in Centos5
 
 
 Thanks Eric, I have a static IP,
 If I add my public static IP into the /etc/tcprules.d/tcp.smtp it works
 fine, but I need it for sending emails from dimamic IPs, for all the users
 hosted in my server.
 
 I dont understand why must be 587 port opened. I know it is closed cause the
 firewall is not administered by me (I have a hardware firewall in that
 server), but must I request this port to be opened to the administrator ?
 why ?
 
 Is there other usefull test that ou recommend?
 regards
 Gabriel
 
 - Original Message - 
 From: Eric Shubert [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Thursday, August 07, 2008 4:53 PM
 Subject: Re: [qmailtoaster] relaying in Centos5
 
 
 Gaby Kule wrote:
 Hi all,

 I installed las week latest versions of qmt + spamdyke on Centos5 updated,
 x86_64,

 My problem is than I can not send outgoing emails from this server, I get
 5.5.3 error.
 I can do pop3 login,
 I can send email from localhost (squirredmail)
 I can telnet from localhost and smtp auth looks good.

 telnet localhost 25
 Trying 127.0.0.1...
 Connected to localhost.localdomain (127.0.0.1).
 Escape character is '^]'.
 220 Welcome to Bob Esponja ESMTP ESMTP
 ehlo localhost
 250-Welcome to Bob Esponja ESMTP
 250-STARTTLS
 250-PIPELINING
 250-8BITMIME
 250-SIZE 20971520
 250 AUTH LOGIN PLAIN CRAM-MD5
 quit
 221 Welcome to Bob Esponja ESMTP
 Connection closed by foreign host.

 If I telnet from other host, it opens connection but does not prints
 welcome
 message.
 It prints:

 telnet localhost 25
 Trying 127.0.0.1...
 Connected to localhost.localdomain (127.0.0.1).
 Escape character is '^]'.
 220 **



 This is my /etc/tcprules.d/tcp.smtp

 127.:allow,RELAYCLIENT=,DKSIGN=/var/qmail/control/domainkeys/%/private
 :allow,BADMIMETYPE=,BADLOADERTYPE=M,CHKUSER_RCPTLIMIT=50,CHKUSER_WRONGRCPTLIMIT=10,DKVERIFY=DEGIJKfh,QMAILQUEUE=/var/qmail/bin/simscan,DKQUEUE=/var/qmail/bin/qmail-queue.orig,DKSIGN=/var/qmail/control/domainkeys/%/private,NOP0FCHECK=1

 This is my tail /var/log/qmail/smtp/current
 @4000489b41282bec2dc4 CHKUSER accepted sender: from [EMAIL PROTECTED]::
 remote GabyK:unknown:xxx.xxx.xxx.xxx rcpt  : sender accepted
 @4000489b412a281c97c4 CHKUSER rejected relaying: from
 [EMAIL PROTECTED]::
 remote GabyK:unknown:xxx.xxx.xxx.xxx rcpt [EMAIL PROTECTED] : client
 not
 allowed to relay
 @4000489b412b2b1e816c tcpserver: end 26060 status 0
 @4000489b412b2b1e8554 tcpserver: status: 0/100

 I have another server with an older version working on Centos4 and this
 works good. I dont know what else to check. Do you have some ideas ?
 best regards
 Gabriel

 
 Are you trying to send from a dynamic IP address? That would most likely be
 blocked. Try sending on port 587.
 


-- 
-Eric 'shubes'

-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Eric Shubert
Sam Clippinger wrote:
 To answer #1, spamdyke will definitely use Spamhaus' DNS RBLs.  The
 default configuration of spamdyke (as installed by QTP) does not include
 Spamhaus, however.

I beg your pardon. ;) Here are the default RBLs as installed by QTP:
check-dnsrbl=zen.spamhaus.org
check-dnsrbl=bl.spamcop.net
check-dnsrbl=list.dsbl.org

 If you are using spamdyke version 3.1.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
check-dnsrbl=zen.spamhaus.org
 
 If you are using spamdyke version 4.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
dns-blacklist-entry=zen.spamhaus.org
 
 To add multiple DNS RBLs, simply repeat the line with different values.
 
 -- Sam Clippinger

QTP only installs/upgrades spamdyke 3.1.x at this time. I hope to add 4.x
capability soon. It'll likely be a couple weeks before I get to it though.

 Anil Aliyan wrote:
 pretty smart question John, I also would like to hear the answer for
 it from the experts.


 - Original Message - From: Tek Support [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Friday, August 08, 2008 8:37 AM
 Subject: Re: [qmailtoaster] Authentication to bypass spam checks


 Hi all, I have a few question.  Before I learned of this port 587, my
 only option was to disable spamhaus.  And all I did to disable it was
 to remove it from my /var/qmail/control/blacklists file.

 So, the other day I needed some addition reporting and I remembered
 the toaster plus, so I downloaded the Repo and ran the yum install
 for it.  I then also decided to run the spamdyke filter.

 So, now that I've realized that port 587 is available for my users to
 send on, I went back to add the spamhaus.  However, it's no longer in
 the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
 has removed it.

 So I have 2 questions:
 1) Are spamdyke and spamhaus compatible?  Why would or why does
 spamdyke remove blacklist from the run file.  Here are the before
 and after.
 ---Begin---

 ---End---

 2) Since I've just found out that port 587 is available, and 587 does
 not run spamhaus the dynamic ip checker, then what is keeping a
 spammer from trying to use this 587?  I mean I'm a little confused.
 If my port 25 won't allow any non-authenticated users to send smtp
 (presuming it's not an open relay), then why would I even need port
 587?  I understand the need to have 587 if I'm using spamhaus on port
 25, and 25 is now blocked to my dynamic users (workers from home).  So
 it seems a bit unnecessary to have both ports.  And why couldn't a
 spammer start sending spam to my users on 587 - if it even works that
 way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
 popular thing, so someone, somewhere would certainly try port 587 in
 order to get around spamhaus wouldn't they?

 Thanks for your time on this, I'm not trying to be difficult, only
 trying to understand how and why.

 Thanks
 John



-- 
-Eric 'shubes'

-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Eric Shubert
I might suggest that you search the list archives, but I'll save you the
effort if you promise to update the wiki faqs with this one. ;) It seems to
come up quite a bit lately.

Simply follow the directions http://dag.wieers.com/rpm/FAQ.php#B2 for your
distro, then you'll be able to use yum to install/upgrade them.

Marco Cordeiro wrote:
 Jake,
 You're right, I don't have perl-HTTP-Date and perl-LWP-UserAgent installed
 from repo ;-(
 And worse I can't find this packages using yum list !
 
 How can I get this packages for centos5 ??
 
 Tks, Marco.
 
 rpm -qa | grep perl-
 perl-Digest-HMAC-1.01-15
 perl-HTML-Tagset-3.20-1.el5.rf
 perl-PlRPC-0.2020-1.el5.rf
 perl-Sys-Hostname-Long-1.4-1.2.el5.rf
 perl-IO-Zlib-1.09-1.el5.rf
 perl-5.8.8-10.el5_2.3
 perl-IO-Compress-Zlib-2.011-1.el5.rf
 perl-String-CRC32-1.4-2.fc6
 perl-Net-IP-1.25-2.fc6
 perl-Digest-SHA1-2.11-1.2.1
 perl-Socket6-0.20-1.el5.rf
 perl-Net-Daemon-0.43-1.el5.rf
 perl-Crypt-PasswdMD5-1.3-1.2.el5.rf
 perl-Net-CIDR-Lite-0.20-1.2.el5.rf
 perl-Crypt-OpenSSL-RSA-0.25-1.el5.rf
 perl-TimeDate-1.16-5.el5
 perl-LWP-UserAgent-Determined-1.03-1.2.el5.rf
 perl-Compress-Raw-Zlib-2.011-1.el5.rf
 perl-Compress-Zlib-2.011-1.el5.rf
 perl-IO-Socket-INET6-2.54-1.el5.rf
 perl-Archive-Tar-1.38-1.el5.rf
 perl-Mail-DomainKeys-1.0-1.el5.rf
 perl-DBI-1.605-1.el5.rf
 perl-DBD-MySQL-3.0007-1.fc6
 perl-HTML-Parser-3.56-1.el5.rf
 perl-Net-DNS-0.63-1.el5.rf
 perl-URI-1.35-3
 perl-Mail-SPF-Query-1.999.1-2.el5.rf
 perl-MailTools-2.03-1.el5.rf
 perl-libwww-perl-5.805-1.1.1
 perl-IO-Compress-Base-2.011-1.el5.rf
 
 -Original Message-
 From: Jake Vickers [mailto:[EMAIL PROTECTED] 
 Sent: Friday, August 08, 2008 11:20 AM
 To: qmailtoaster-list@qmailtoaster.com
 Subject: Re: [qmailtoaster] Issue upgrading Spamassassin
 
 Marco Cordeiro wrote:
 I'm using perl repository already ...
  
 yum upgrade perl*
 Loading fastestmirror plugin
 Loading mirror speeds from cached hostfile
  * rpmforge: fr2.rpmfind.net
  * base: centos.oi.com.br
  * updates: centos.oi.com.br
  * addons: centos.oi.com.br
  * extras: centos.oi.com.br
 Setting up Upgrade Process
 Could not find update match for perl*
 No Packages marked for Update

 All perl packages are up to date using repository 
   
 
 What does  rpm -qa | grep perl- show? (I'm on my way out, so I'll 
 check back later)
 
 


-- 
-Eric 'shubes'

-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Thiago - TI - Realeza




Marco, have you tried to use cpan ?

maybe it resolve your problem

Cheers

Thiago

Marco Cordeiro escreveu:

  Jake,
You're right, I don't have perl-HTTP-Date and perl-LWP-UserAgent installed
from repo ;-(
And worse I can't find this packages using yum list !

How can I get this packages for centos5 ??

Tks, Marco.

rpm -qa | grep perl-
perl-Digest-HMAC-1.01-15
perl-HTML-Tagset-3.20-1.el5.rf
perl-PlRPC-0.2020-1.el5.rf
perl-Sys-Hostname-Long-1.4-1.2.el5.rf
perl-IO-Zlib-1.09-1.el5.rf
perl-5.8.8-10.el5_2.3
perl-IO-Compress-Zlib-2.011-1.el5.rf
perl-String-CRC32-1.4-2.fc6
perl-Net-IP-1.25-2.fc6
perl-Digest-SHA1-2.11-1.2.1
perl-Socket6-0.20-1.el5.rf
perl-Net-Daemon-0.43-1.el5.rf
perl-Crypt-PasswdMD5-1.3-1.2.el5.rf
perl-Net-CIDR-Lite-0.20-1.2.el5.rf
perl-Crypt-OpenSSL-RSA-0.25-1.el5.rf
perl-TimeDate-1.16-5.el5
perl-LWP-UserAgent-Determined-1.03-1.2.el5.rf
perl-Compress-Raw-Zlib-2.011-1.el5.rf
perl-Compress-Zlib-2.011-1.el5.rf
perl-IO-Socket-INET6-2.54-1.el5.rf
perl-Archive-Tar-1.38-1.el5.rf
perl-Mail-DomainKeys-1.0-1.el5.rf
perl-DBI-1.605-1.el5.rf
perl-DBD-MySQL-3.0007-1.fc6
perl-HTML-Parser-3.56-1.el5.rf
perl-Net-DNS-0.63-1.el5.rf
perl-URI-1.35-3
perl-Mail-SPF-Query-1.999.1-2.el5.rf
perl-MailTools-2.03-1.el5.rf
perl-libwww-perl-5.805-1.1.1
perl-IO-Compress-Base-2.011-1.el5.rf

-Original Message-
From: Jake Vickers [mailto:[EMAIL PROTECTED]] 
Sent: Friday, August 08, 2008 11:20 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: Re: [qmailtoaster] Issue upgrading Spamassassin

Marco Cordeiro wrote:
  
  
I'm using perl repository already ...
 
yum upgrade perl*
Loading "fastestmirror" plugin
Loading mirror speeds from cached hostfile
 * rpmforge: fr2.rpmfind.net
 * base: centos.oi.com.br
 * updates: centos.oi.com.br
 * addons: centos.oi.com.br
 * extras: centos.oi.com.br
Setting up Upgrade Process
Could not find update match for perl*
No Packages marked for Update

All perl packages are up to date using repository 
  

  
  
What does  "rpm -qa | grep perl-" show? (I'm on my way out, so I'll 
check back later)


-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



  




-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Eric Shubert
No, cpan is part of the problem, not the solution. When packages are updated
with cpan, rpm doesn't see them. That's the problem. These packages are
specified (rightly so) as dependencies, and rpm doesn't know that they're
installed when cpan installs them.

Thiago - TI - Realeza wrote:
 Marco, have you tried to use cpan ?
 
 maybe it resolve your problem
 
 Cheers
 
 Thiago
 
 Marco Cordeiro escreveu:
 Jake,
 You're right, I don't have perl-HTTP-Date and perl-LWP-UserAgent installed
 from repo ;-(
 And worse I can't find this packages using yum list !

 How can I get this packages for centos5 ??

 Tks, Marco.

 rpm -qa | grep perl-
 perl-Digest-HMAC-1.01-15
 perl-HTML-Tagset-3.20-1.el5.rf
 perl-PlRPC-0.2020-1.el5.rf
 perl-Sys-Hostname-Long-1.4-1.2.el5.rf
 perl-IO-Zlib-1.09-1.el5.rf
 perl-5.8.8-10.el5_2.3
 perl-IO-Compress-Zlib-2.011-1.el5.rf
 perl-String-CRC32-1.4-2.fc6
 perl-Net-IP-1.25-2.fc6
 perl-Digest-SHA1-2.11-1.2.1
 perl-Socket6-0.20-1.el5.rf
 perl-Net-Daemon-0.43-1.el5.rf
 perl-Crypt-PasswdMD5-1.3-1.2.el5.rf
 perl-Net-CIDR-Lite-0.20-1.2.el5.rf
 perl-Crypt-OpenSSL-RSA-0.25-1.el5.rf
 perl-TimeDate-1.16-5.el5
 perl-LWP-UserAgent-Determined-1.03-1.2.el5.rf
 perl-Compress-Raw-Zlib-2.011-1.el5.rf
 perl-Compress-Zlib-2.011-1.el5.rf
 perl-IO-Socket-INET6-2.54-1.el5.rf
 perl-Archive-Tar-1.38-1.el5.rf
 perl-Mail-DomainKeys-1.0-1.el5.rf
 perl-DBI-1.605-1.el5.rf
 perl-DBD-MySQL-3.0007-1.fc6
 perl-HTML-Parser-3.56-1.el5.rf
 perl-Net-DNS-0.63-1.el5.rf
 perl-URI-1.35-3
 perl-Mail-SPF-Query-1.999.1-2.el5.rf
 perl-MailTools-2.03-1.el5.rf
 perl-libwww-perl-5.805-1.1.1
 perl-IO-Compress-Base-2.011-1.el5.rf

 -Original Message-
 From: Jake Vickers [mailto:[EMAIL PROTECTED] 
 Sent: Friday, August 08, 2008 11:20 AM
 To: qmailtoaster-list@qmailtoaster.com
 Subject: Re: [qmailtoaster] Issue upgrading Spamassassin

 Marco Cordeiro wrote:
   
 I'm using perl repository already ...
  
 yum upgrade perl*
 Loading fastestmirror plugin
 Loading mirror speeds from cached hostfile
  * rpmforge: fr2.rpmfind.net
  * base: centos.oi.com.br
  * updates: centos.oi.com.br
  * addons: centos.oi.com.br
  * extras: centos.oi.com.br
 Setting up Upgrade Process
 Could not find update match for perl*
 No Packages marked for Update

 All perl packages are up to date using repository 
   
 

 What does  rpm -qa | grep perl- show? (I'm on my way out, so I'll 
 check back later)




-- 
-Eric 'shubes'

-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Tek Support
So if I understand correctly, spamdyke can use spamhaus, and I do see
it in my /etc/spamdyke/spamdyke.conf file (uncommented).  Which means
I don't need the BLACKLIST= in my run file, is this correct?

And if I might ask a followup question,  it was said in another post
that spamdyke allows authenticated users in past spamhaus.  Ok, but if
spamdyke allows authenticated users in, while using spamhaus, then why
do I need port 587?

And just out of curiosity, if spamdyke is a more versitile product,
allowing my dynamic users to authenticate and send mail on port 25
while also using spamhaus dynamic blocking, why isn't spamdyke
installed by default?

Thanks
John




On Fri, Aug 8, 2008 at 10:02 AM, Eric Shubert [EMAIL PROTECTED] wrote:
 Sam Clippinger wrote:
 To answer #1, spamdyke will definitely use Spamhaus' DNS RBLs.  The
 default configuration of spamdyke (as installed by QTP) does not include
 Spamhaus, however.

 I beg your pardon. ;) Here are the default RBLs as installed by QTP:
 check-dnsrbl=zen.spamhaus.org
 check-dnsrbl=bl.spamcop.net
 check-dnsrbl=list.dsbl.org

 If you are using spamdyke version 3.1.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
check-dnsrbl=zen.spamhaus.org

 If you are using spamdyke version 4.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
dns-blacklist-entry=zen.spamhaus.org

 To add multiple DNS RBLs, simply repeat the line with different values.

 -- Sam Clippinger

 QTP only installs/upgrades spamdyke 3.1.x at this time. I hope to add 4.x
 capability soon. It'll likely be a couple weeks before I get to it though.

 Anil Aliyan wrote:
 pretty smart question John, I also would like to hear the answer for
 it from the experts.


 - Original Message - From: Tek Support [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Friday, August 08, 2008 8:37 AM
 Subject: Re: [qmailtoaster] Authentication to bypass spam checks


 Hi all, I have a few question.  Before I learned of this port 587, my
 only option was to disable spamhaus.  And all I did to disable it was
 to remove it from my /var/qmail/control/blacklists file.

 So, the other day I needed some addition reporting and I remembered
 the toaster plus, so I downloaded the Repo and ran the yum install
 for it.  I then also decided to run the spamdyke filter.

 So, now that I've realized that port 587 is available for my users to
 send on, I went back to add the spamhaus.  However, it's no longer in
 the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
 has removed it.

 So I have 2 questions:
 1) Are spamdyke and spamhaus compatible?  Why would or why does
 spamdyke remove blacklist from the run file.  Here are the before
 and after.
 ---Begin---

 ---End---

 2) Since I've just found out that port 587 is available, and 587 does
 not run spamhaus the dynamic ip checker, then what is keeping a
 spammer from trying to use this 587?  I mean I'm a little confused.
 If my port 25 won't allow any non-authenticated users to send smtp
 (presuming it's not an open relay), then why would I even need port
 587?  I understand the need to have 587 if I'm using spamhaus on port
 25, and 25 is now blocked to my dynamic users (workers from home).  So
 it seems a bit unnecessary to have both ports.  And why couldn't a
 spammer start sending spam to my users on 587 - if it even works that
 way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
 popular thing, so someone, somewhere would certainly try port 587 in
 order to get around spamhaus wouldn't they?

 Thanks for your time on this, I'm not trying to be difficult, only
 trying to understand how and why.

 Thanks
 John



 --
 -Eric 'shubes'

 -
 QmailToaster hosted by: VR Hosted http://www.vr.org
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]



-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Issue upgrading Spamassassin

2008-08-08 Thread Thiago - TI - Realeza




hmm Eric... good to know that.

thanks man!

Thiago

Eric Shubert escreveu:

  No, cpan is part of the problem, not the solution. When packages are updated
with cpan, rpm doesn't see them. That's the problem. These packages are
specified (rightly so) as dependencies, and rpm doesn't know that they're
installed when cpan installs them.

Thiago - TI - Realeza wrote:
  
  
Marco, have you tried to use cpan ?

maybe it resolve your problem

Cheers

Thiago

Marco Cordeiro escreveu:


  Jake,
You're right, I don't have perl-HTTP-Date and perl-LWP-UserAgent installed
from repo ;-(
And worse I can't find this packages using yum list !

How can I get this packages for centos5 ??

Tks, Marco.

rpm -qa | grep perl-
perl-Digest-HMAC-1.01-15
perl-HTML-Tagset-3.20-1.el5.rf
perl-PlRPC-0.2020-1.el5.rf
perl-Sys-Hostname-Long-1.4-1.2.el5.rf
perl-IO-Zlib-1.09-1.el5.rf
perl-5.8.8-10.el5_2.3
perl-IO-Compress-Zlib-2.011-1.el5.rf
perl-String-CRC32-1.4-2.fc6
perl-Net-IP-1.25-2.fc6
perl-Digest-SHA1-2.11-1.2.1
perl-Socket6-0.20-1.el5.rf
perl-Net-Daemon-0.43-1.el5.rf
perl-Crypt-PasswdMD5-1.3-1.2.el5.rf
perl-Net-CIDR-Lite-0.20-1.2.el5.rf
perl-Crypt-OpenSSL-RSA-0.25-1.el5.rf
perl-TimeDate-1.16-5.el5
perl-LWP-UserAgent-Determined-1.03-1.2.el5.rf
perl-Compress-Raw-Zlib-2.011-1.el5.rf
perl-Compress-Zlib-2.011-1.el5.rf
perl-IO-Socket-INET6-2.54-1.el5.rf
perl-Archive-Tar-1.38-1.el5.rf
perl-Mail-DomainKeys-1.0-1.el5.rf
perl-DBI-1.605-1.el5.rf
perl-DBD-MySQL-3.0007-1.fc6
perl-HTML-Parser-3.56-1.el5.rf
perl-Net-DNS-0.63-1.el5.rf
perl-URI-1.35-3
perl-Mail-SPF-Query-1.999.1-2.el5.rf
perl-MailTools-2.03-1.el5.rf
perl-libwww-perl-5.805-1.1.1
perl-IO-Compress-Base-2.011-1.el5.rf

-Original Message-
From: Jake Vickers [mailto:[EMAIL PROTECTED]] 
Sent: Friday, August 08, 2008 11:20 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: Re: [qmailtoaster] Issue upgrading Spamassassin

Marco Cordeiro wrote:
  
  
  
I'm using perl repository already ...
 
yum upgrade perl*
Loading "fastestmirror" plugin
Loading mirror speeds from cached hostfile
 * rpmforge: fr2.rpmfind.net
 * base: centos.oi.com.br
 * updates: centos.oi.com.br
 * addons: centos.oi.com.br
 * extras: centos.oi.com.br
Setting up Upgrade Process
Could not find update match for perl*
No Packages marked for Update

All perl packages are up to date using repository 
  


  
  What does  "rpm -qa | grep perl-" show? (I'm on my way out, so I'll 
check back later)


  

  
  

  




-
 QmailToaster hosted by: VR Hosted 
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Eric Shubert
Tek Support wrote:
 So if I understand correctly, spamdyke can use spamhaus, and I do see
 it in my /etc/spamdyke/spamdyke.conf file (uncommented).  Which means
 I don't need the BLACKLIST= in my run file, is this correct?

Yes. Spamdyke does everything that rblsmtpd used to do (and a lot more).

 And if I might ask a followup question,  it was said in another post
 that spamdyke allows authenticated users in past spamhaus.  Ok, but if
 spamdyke allows authenticated users in, while using spamhaus, then why
 do I need port 587?

You don't need port 587 if you're using spamdyke.
You do need port 587 if you're not using spamdyke.

 And just out of curiosity, if spamdyke is a more versitile product,
 allowing my dynamic users to authenticate and send mail on port 25
 while also using spamhaus dynamic blocking, why isn't spamdyke
 installed by default?

spamdyke is fairly new to the toaster. I expect that it will become part of
the stock toaster at some point, but that's up to Erik Espinoza, who is the
toaster maintainer.

 Thanks
 John
 
 
 
 
 On Fri, Aug 8, 2008 at 10:02 AM, Eric Shubert [EMAIL PROTECTED] wrote:
 Sam Clippinger wrote:
 To answer #1, spamdyke will definitely use Spamhaus' DNS RBLs.  The
 default configuration of spamdyke (as installed by QTP) does not include
 Spamhaus, however.
 I beg your pardon. ;) Here are the default RBLs as installed by QTP:
 check-dnsrbl=zen.spamhaus.org
 check-dnsrbl=bl.spamcop.net
 check-dnsrbl=list.dsbl.org

 If you are using spamdyke version 3.1.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
check-dnsrbl=zen.spamhaus.org

 If you are using spamdyke version 4.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
dns-blacklist-entry=zen.spamhaus.org

 To add multiple DNS RBLs, simply repeat the line with different values.

 -- Sam Clippinger
 QTP only installs/upgrades spamdyke 3.1.x at this time. I hope to add 4.x
 capability soon. It'll likely be a couple weeks before I get to it though.

 Anil Aliyan wrote:
 pretty smart question John, I also would like to hear the answer for
 it from the experts.


 - Original Message - From: Tek Support [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Friday, August 08, 2008 8:37 AM
 Subject: Re: [qmailtoaster] Authentication to bypass spam checks


 Hi all, I have a few question.  Before I learned of this port 587, my
 only option was to disable spamhaus.  And all I did to disable it was
 to remove it from my /var/qmail/control/blacklists file.

 So, the other day I needed some addition reporting and I remembered
 the toaster plus, so I downloaded the Repo and ran the yum install
 for it.  I then also decided to run the spamdyke filter.

 So, now that I've realized that port 587 is available for my users to
 send on, I went back to add the spamhaus.  However, it's no longer in
 the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
 has removed it.

 So I have 2 questions:
 1) Are spamdyke and spamhaus compatible?  Why would or why does
 spamdyke remove blacklist from the run file.  Here are the before
 and after.
 ---Begin---

 ---End---

 2) Since I've just found out that port 587 is available, and 587 does
 not run spamhaus the dynamic ip checker, then what is keeping a
 spammer from trying to use this 587?  I mean I'm a little confused.
 If my port 25 won't allow any non-authenticated users to send smtp
 (presuming it's not an open relay), then why would I even need port
 587?  I understand the need to have 587 if I'm using spamhaus on port
 25, and 25 is now blocked to my dynamic users (workers from home).  So
 it seems a bit unnecessary to have both ports.  And why couldn't a
 spammer start sending spam to my users on 587 - if it even works that
 way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
 popular thing, so someone, somewhere would certainly try port 587 in
 order to get around spamhaus wouldn't they?

 Thanks for your time on this, I'm not trying to be difficult, only
 trying to understand how and why.

 Thanks
 John


 --
 -Eric 'shubes'

 -
 QmailToaster hosted by: VR Hosted http://www.vr.org
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]


 
 -
  QmailToaster hosted by: VR Hosted http://www.vr.org
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 


-- 
-Eric 'shubes'

-
 QmailToaster hosted by: VR Hosted http://www.vr.org
-
To unsubscribe, e-mail: [EMAIL 

Re: [qmailtoaster] Authentication to bypass spam checks

2008-08-08 Thread Tek Support
Thanks Eric, I realize I don't need 587 at all with spamdyke, I was
trying to ask if I needed 587 if spamdyke was using spamhaus.  Since
spamhaus used by itself was causing rejections to my at home dynamic
users it seemed strange that spamhaus was blocking my dynamic users
but it was not blocking them when run with spamdyke.  Since I don't
fully understand the internals, I was asking about that specifically
so I don't screw up my at home users.

And I believe it is true, that if I have dynamic IP users, and I'm
using spamhaus by itself, then I do require port 587.  Isn't that
true?  And again if I have dynamic IP users, and I'm using spamdyke
which includes spamhaus, then I don't need to use 587.  Is that right?

Thanks again, I'm just trying to be clear.

John




On Fri, Aug 8, 2008 at 1:33 PM, Eric Shubert [EMAIL PROTECTED] wrote:
 Tek Support wrote:
 So if I understand correctly, spamdyke can use spamhaus, and I do see
 it in my /etc/spamdyke/spamdyke.conf file (uncommented).  Which means
 I don't need the BLACKLIST= in my run file, is this correct?

 Yes. Spamdyke does everything that rblsmtpd used to do (and a lot more).

 And if I might ask a followup question,  it was said in another post
 that spamdyke allows authenticated users in past spamhaus.  Ok, but if
 spamdyke allows authenticated users in, while using spamhaus, then why
 do I need port 587?

 You don't need port 587 if you're using spamdyke.
 You do need port 587 if you're not using spamdyke.

 And just out of curiosity, if spamdyke is a more versitile product,
 allowing my dynamic users to authenticate and send mail on port 25
 while also using spamhaus dynamic blocking, why isn't spamdyke
 installed by default?

 spamdyke is fairly new to the toaster. I expect that it will become part of
 the stock toaster at some point, but that's up to Erik Espinoza, who is the
 toaster maintainer.

 Thanks
 John




 On Fri, Aug 8, 2008 at 10:02 AM, Eric Shubert [EMAIL PROTECTED] wrote:
 Sam Clippinger wrote:
 To answer #1, spamdyke will definitely use Spamhaus' DNS RBLs.  The
 default configuration of spamdyke (as installed by QTP) does not include
 Spamhaus, however.
 I beg your pardon. ;) Here are the default RBLs as installed by QTP:
 check-dnsrbl=zen.spamhaus.org
 check-dnsrbl=bl.spamcop.net
 check-dnsrbl=list.dsbl.org

 If you are using spamdyke version 3.1.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
check-dnsrbl=zen.spamhaus.org

 If you are using spamdyke version 4.x, edit the configuration file
 /etc/spamdyke/spamdyke.conf and add the following line:
dns-blacklist-entry=zen.spamhaus.org

 To add multiple DNS RBLs, simply repeat the line with different values.

 -- Sam Clippinger
 QTP only installs/upgrades spamdyke 3.1.x at this time. I hope to add 4.x
 capability soon. It'll likely be a couple weeks before I get to it though.

 Anil Aliyan wrote:
 pretty smart question John, I also would like to hear the answer for
 it from the experts.


 - Original Message - From: Tek Support [EMAIL PROTECTED]
 To: qmailtoaster-list@qmailtoaster.com
 Sent: Friday, August 08, 2008 8:37 AM
 Subject: Re: [qmailtoaster] Authentication to bypass spam checks


 Hi all, I have a few question.  Before I learned of this port 587, my
 only option was to disable spamhaus.  And all I did to disable it was
 to remove it from my /var/qmail/control/blacklists file.

 So, the other day I needed some addition reporting and I remembered
 the toaster plus, so I downloaded the Repo and ran the yum install
 for it.  I then also decided to run the spamdyke filter.

 So, now that I've realized that port 587 is available for my users to
 send on, I went back to add the spamhaus.  However, it's no longer in
 the /var/qmail/supervise/smtp/run file.  It would appear that spamdyke
 has removed it.

 So I have 2 questions:
 1) Are spamdyke and spamhaus compatible?  Why would or why does
 spamdyke remove blacklist from the run file.  Here are the before
 and after.
 ---Begin---

 ---End---

 2) Since I've just found out that port 587 is available, and 587 does
 not run spamhaus the dynamic ip checker, then what is keeping a
 spammer from trying to use this 587?  I mean I'm a little confused.
 If my port 25 won't allow any non-authenticated users to send smtp
 (presuming it's not an open relay), then why would I even need port
 587?  I understand the need to have 587 if I'm using spamhaus on port
 25, and 25 is now blocked to my dynamic users (workers from home).  So
 it seems a bit unnecessary to have both ports.  And why couldn't a
 spammer start sending spam to my users on 587 - if it even works that
 way, which I'm not sure yet if it can?  Qmailtoaster is a pretty
 popular thing, so someone, somewhere would certainly try port 587 in
 order to get around spamhaus wouldn't they?

 Thanks for your time on this, I'm not trying to be difficult, only
 trying to understand how and why.

 Thanks
 John


 --
 -Eric 'shubes'