Re: [spamdyke-users] Spamdyke and Plesk 8.3

2008-04-25 Thread Arne Metzger
I am running Plesk8.3.0 on SuSE10.0 with latest Spamdyke - and it works 
pretty fine, avg. >96% of Spam is blocked.

Regards
Arne

Christian Aust schrieb am 25.04.2008 08:51:
> Interesting, indeed. I'm running Plesk 8.3, too, and did not yet 
> encounter any problems. Can somebody else confirm issues or trouble-free 
> operations? Regards,
> 
> Christian
> 
> Arne Metzger ([EMAIL PROTECTED]) schrieb am Fri Apr 25 07:47:30 2008:
> 
>> It would be interesting to know, why it runs better before relaylock.
>> I have the same here: Plesk8.3.0, latest Spamdyke and my config
>> (/etc/xinetd/stmp_psa) calls first relaylock, then spamdyke and then the
>> rest.
>>
>> Regards
>> Arne
>>
>> Sam Clippinger schrieb am 24.04.2008 19:48:
>>> Also, I seem to recall that spamdyke and relaylock don't get along
>>> perfectly well; spamdyke does better when it runs before relaylock (I
>>> can't find my notes on this to explain why).
> 

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] feature request: Test mode

2008-04-25 Thread Bgs
Suggestion:

For enable/disable type parameters config could change like this:

old form: reject-ip-in-cc-rdns
new form: reject-ip-in-cc-rdns=(on|off|log)

For current settings with values:

old form: ip-blacklist-file=/path/to/file
new form: ip-blacklist-file=(on|off|log):/path/to/file

('off' in the later may seem awkward but if the switch system is 
implemented it can be a useful way to temporarily disable it. You do it 
by commeting it out now).

Regards
Bgs


Sam Clippinger wrote:
> Very interesting idea.  I'll definitely put that one on the list.
> 
> -- Sam Clippinger
> 
> Marcin Orlowski wrote:
>> Hi,
>>
>> I'd love to see sort of test mode. So I could i.e. enable
>> log-ip-in-cc-rdns which would work the same way known
>> reject-ip-in-cc-rdns works but without really denying
>> matching connection. It shall just log it (i.e. as
>> TEST_IP_IN_CC_RDNS) and that's it. That would be extremely
>> useful to run on production environment for some time
>> to find out how it would act "for real". I'd analyse
>> logs then to decide if I'd benefit or not, or how to
>> configure whitelists to have this option work as best
>> for my users as it possibly could.
>>
>> Test mode could be available for most options it'd
>> make sense for.
>>
>> Marcin
>> ___
>> spamdyke-users mailing list
>> spamdyke-users@spamdyke.org
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>   
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> 
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] feature request: Test mode

2008-04-25 Thread Bgs


N.Novozhilov wrote:
> Why do not comment string which you don't want at the moment?

"You do it by commeting it out now)."

That's what I wrote too. I just added that if we have a switch system 
implemented anyway, it would be a more elegant way to handle it.

> 
> 
> On Fri, 25 Apr 2008 11:40:59 +0200
> Bgs <[EMAIL PROTECTED]> wrote:
> 
>> Suggestion:
>>
>> For enable/disable type parameters config could change like this:
>>
>> old form: reject-ip-in-cc-rdns
>> new form: reject-ip-in-cc-rdns=(on|off|log)
>>
>> For current settings with values:
>>
>> old form: ip-blacklist-file=/path/to/file
>> new form: ip-blacklist-file=(on|off|log):/path/to/file
>>
>> ('off' in the later may seem awkward but if the switch system is 
>> implemented it can be a useful way to temporarily disable it. You do it 
>> by commeting it out now).
>>
>> Regards
>> Bgs
>>
>>
>> Sam Clippinger wrote:
>>> Very interesting idea.  I'll definitely put that one on the list.
>>>
>>> -- Sam Clippinger
>>>
>>> Marcin Orlowski wrote:
 Hi,

 I'd love to see sort of test mode. So I could i.e. enable
 log-ip-in-cc-rdns which would work the same way known
 reject-ip-in-cc-rdns works but without really denying
 matching connection. It shall just log it (i.e. as
 TEST_IP_IN_CC_RDNS) and that's it. That would be extremely
 useful to run on production environment for some time
 to find out how it would act "for real". I'd analyse
 logs then to decide if I'd benefit or not, or how to
 configure whitelists to have this option work as best
 for my users as it possibly could.

 Test mode could be available for most options it'd
 make sense for.

 Marcin
 ___
 spamdyke-users mailing list
 spamdyke-users@spamdyke.org
 http://www.spamdyke.org/mailman/listinfo/spamdyke-users
   
>>> ___
>>> spamdyke-users mailing list
>>> spamdyke-users@spamdyke.org
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>> ___
>> spamdyke-users mailing list
>> spamdyke-users@spamdyke.org
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> 
> 
> ~~
> Regards
> Nicholas A. Novozhilov, NAN6-RIPE
> 
>  NTR Lab
>  System administrator
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> 
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] feature request: Test mode

2008-04-25 Thread N.Novozhilov
Why do not comment string which you don't want at the moment?


On Fri, 25 Apr 2008 11:40:59 +0200
Bgs <[EMAIL PROTECTED]> wrote:

> Suggestion:
> 
> For enable/disable type parameters config could change like this:
> 
> old form: reject-ip-in-cc-rdns
> new form: reject-ip-in-cc-rdns=(on|off|log)
> 
> For current settings with values:
> 
> old form: ip-blacklist-file=/path/to/file
> new form: ip-blacklist-file=(on|off|log):/path/to/file
> 
> ('off' in the later may seem awkward but if the switch system is 
> implemented it can be a useful way to temporarily disable it. You do it 
> by commeting it out now).
> 
> Regards
> Bgs
> 
> 
> Sam Clippinger wrote:
> > Very interesting idea.  I'll definitely put that one on the list.
> > 
> > -- Sam Clippinger
> > 
> > Marcin Orlowski wrote:
> >> Hi,
> >>
> >> I'd love to see sort of test mode. So I could i.e. enable
> >> log-ip-in-cc-rdns which would work the same way known
> >> reject-ip-in-cc-rdns works but without really denying
> >> matching connection. It shall just log it (i.e. as
> >> TEST_IP_IN_CC_RDNS) and that's it. That would be extremely
> >> useful to run on production environment for some time
> >> to find out how it would act "for real". I'd analyse
> >> logs then to decide if I'd benefit or not, or how to
> >> configure whitelists to have this option work as best
> >> for my users as it possibly could.
> >>
> >> Test mode could be available for most options it'd
> >> make sense for.
> >>
> >> Marcin
> >> ___
> >> spamdyke-users mailing list
> >> spamdyke-users@spamdyke.org
> >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> >>   
> > ___
> > spamdyke-users mailing list
> > spamdyke-users@spamdyke.org
> > http://www.spamdyke.org/mailman/listinfo/spamdyke-users
> > 
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users


~~
Regards
Nicholas A. Novozhilov, NAN6-RIPE

 NTR Lab
 System administrator
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


[spamdyke-users] --help goes to stderr insead of stdout

2008-04-25 Thread Marcin Orlowski

Hi,

is there any reason output of --help goes to
stderr stream instead of stdout?

Regards,
-- 
"Daddy, what "Formatting drive C:" means?"...

Marcinhttp://wfmh.org.pl/carlos/
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] problems with DENIED_IP_IN_CC_RDNS

2008-04-25 Thread Marcin Orlowski
Sam Clippinger wrote:
> The defaults are described in the text of each section in the README 
> file but not in the table that shows all of the configuration options... 
> I didn't realize that.  The defaults are printed in the help screen when 
> you run "spamdyke -h".

--max-recipients NUM
   Allow a maximum of NUM recipients per connection for non-local senders.
   Default: unlimited recipients per connection.
   NUM must be between (or equal to) 0 and 2147483647.


Well, I still have to *guess* if 0 means "unlimited recipients" here ;)

BTW: There's no anchor for "Extra Utilities" on
http://spamdyke.org/documentation/README.html

Regards,
-- 
"Daddy, what "Formatting drive C:" means?"...

Marcinhttp://wfmh.org.pl/carlos/
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] problems with DENIED_IP_IN_CC_RDNS

2008-04-25 Thread Sam Clippinger
Sorry about that. :)  I've fixed the web page and the help text will be 
updated in version 4.0.0.

Thanks!

-- Sam Clippinger

Marcin Orlowski wrote:
> Sam Clippinger wrote:
>   
>> The defaults are described in the text of each section in the README 
>> file but not in the table that shows all of the configuration options... 
>> I didn't realize that.  The defaults are printed in the help screen when 
>> you run "spamdyke -h".
>> 
>
> --max-recipients NUM
>Allow a maximum of NUM recipients per connection for non-local senders.
>Default: unlimited recipients per connection.
>NUM must be between (or equal to) 0 and 2147483647.
>
>
> Well, I still have to *guess* if 0 means "unlimited recipients" here ;)
>
> BTW: There's no anchor for "Extra Utilities" on
> http://spamdyke.org/documentation/README.html
>
> Regards,
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] --help goes to stderr insead of stdout

2008-04-25 Thread Sam Clippinger
Yes.  spamdyke's error messages go to stderr, because configuration 
errors should be logged instead of being sent to the remote server 
(stdout goes to the network).  Because the error text is sent to stderr, 
it made sense to send the version banner and the help text to stderr 
also, for consistency.

-- Sam Clippinger

Marcin Orlowski wrote:
> Hi,
>
> is there any reason output of --help goes to
> stderr stream instead of stdout?
>
> Regards,
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] --help goes to stderr insead of stdout

2008-04-25 Thread Marcin Orlowski
Sam Clippinger wrote:

> Yes.  spamdyke's error messages go to stderr, because configuration 
> errors should be logged instead of being sent to the remote server 
> (stdout goes to the network).  Because the error text is sent to stderr, 
> it made sense to send the version banner and the help text to stderr 
> also, for consistency.

May I ask for --config-test-??? that could be invoked just in shell
so I do not need to put spamdyke in the qmail "chain", so I could
just craft new shiny .conf file and then do:

# spamdyke --config-test-??? -f shiny.conf

to see if my shiny.conf is fine and valid, all the external files, dirs
etc. are accessible etc.

Marcin
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] --help goes to stderr insead of stdout

2008-04-25 Thread Sam Clippinger
I'm not sure I understand how your suggestion is different from the 
existing "config-test" feature.

-- Sam Clippinger

Marcin Orlowski wrote:
> Sam Clippinger wrote:
>
>   
>> Yes.  spamdyke's error messages go to stderr, because configuration 
>> errors should be logged instead of being sent to the remote server 
>> (stdout goes to the network).  Because the error text is sent to stderr, 
>> it made sense to send the version banner and the help text to stderr 
>> also, for consistency.
>> 
>
> May I ask for --config-test-??? that could be invoked just in shell
> so I do not need to put spamdyke in the qmail "chain", so I could
> just craft new shiny .conf file and then do:
>
> # spamdyke --config-test-??? -f shiny.conf
>
> to see if my shiny.conf is fine and valid, all the external files, dirs
> etc. are accessible etc.
>
> Marcin
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] Spamdyke and Plesk 8.3

2008-04-25 Thread Markus Thüer
Hi Sam, 

many thanks for your help. 

I changed my spamdyke.conf and the smtp-psa like you suggested and it works.
:-))

Mails from our own users are no longer greylisted. 

I also checked the maillog, and I did not find any of the errors you listed.
So you don’t have look for bugs. 

Also using spamdyke for the blacklists has another advantage. I have a few
users in Africa and Indonesia and the rblsmptd kicked them out very often
because their providers often have "bad" IPs. Now the can bypass the
blacklist check. 

I still have a few questions but I start a new thread for them. 


Again Thanks

Greetings from the Black Forrest 

Markus Thüer

 




-Ursprüngliche Nachricht-
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Sam Clippinger
Gesendet: Donnerstag, 24. April 2008 19:49
An: spamdyke users
Betreff: Re: [spamdyke-users] Spamdyke and Plesk 8.3

You are correct -- authenticated connections should bypass graylisting 
and all other filters. If that isn't working, your users should be 
reporting lots of problems, because their MUAs (e.g. Outlook, 
Thunderbird) won't be able to deliver email to your server -- they'll 
get the graylist rejection message.

First, I would recommend several changes to your configuration. You're 
correct that you can remove rblsmtpd and allow spamdyke to check 
blacklists. This is a better solution because spamdyke will not check 
blacklists for authenticated users (once we fix your authentication 
problem, that is). So you should add the following lines to your 
spamdyke.conf file:
check-dnsrbl=list.dsbl.org
check-dnsrbl=dnsbl.njabl.org
check-dnsrbl=bl.spamcop.net
Changes to spamdyke.conf will take effect as soon as you save the file.

Also, I seem to recall that spamdyke and relaylock don't get along 
perfectly well; spamdyke does better when it runs before relaylock (I 
can't find my notes on this to explain why). Once you remove rblsmtpd 
and move relaylock around, your smtp_psa file should look like this:
service smtp
{
socket_type = stream
protocol = tcp
wait = no
disable = no
user = root
instances = UNLIMITED
server = /var/qmail/bin/tcp-env
server_args = -Rt0 /usr/local/bin/spamdyke -f /etc/spamdyke.conf 
/var/qmail/bin/relaylock /var/qmail/bin/qmail-smtpd 
/var/qmail/bin/smtp_auth /var/qmail/bin/true /var/qmail/bin/cmd5checkpw 
/var/qmail/bin/true
}
To force xinetd to reload its configuration, use this command:
killall -HUP xinetd

If those changes don't fix the problem, there are several things you can 
do to troubleshoot it. The fastest way is to look at the maillog file 
(Plesk moves it to /usr/local/psa/var/log/maillog). Look for spamdyke 
log entries that start with "DENIED_GRAYLISTED" and also show a username 
after "auth:" at the end of the line. If you find any, that means 
spamdyke saw the authorization but still performed graylisting. That 
would be a bug, so I'll need your help to fix it.

Next, look for spamdyke log entries that start with "DENIED_GRAYLISTED" 
and end with "auth: (unknown)". If the "to:" and "from:" indicate the 
messages are from your users to remote addresses, they probably should 
have authenticated and bypassed graylisting. If the graylist filter 
blocked them anyway, there might be a bug in spamdyke that isn't 
allowing it to snoop on the qmail authentication. If you could turn on 
full logging (with "full-log-dir") and send me the log of a connection 
that authenticated but was graylisted anyway, I would appreciate it.

-- Sam Clippinger

Markus Thüer wrote:
>
> Hi,
>
> I am new to this list, and first I want to say thank you for spamdyke.
>
> I installed it recently on a Plesk 8.3 System for greylisting and it 
> works fine.
>
> But I have problems with the authentification. I read the archive but 
> I am still a bit confused and I am new to server administration. So 
> please forgive me if I ask “silly” questions.
>
> I noticed that even mail accounts of my own domain were greylisted. 
> After they are authentificated they should bypass spamdyke. Shouldn’t 
> they?
>
> I read that from spamdyke 3.0.0 I don’t have to use the 
> authentifcation in spamdyke because the authtentification of qmail is 
> honored.
>
> So how do I get this working ?
>
> I am also using the blackhole daemon provided by plesk. Would it be 
> better to use spamdyke for this?
>
> I don’t dare to simply try things out on the server, for it is a live 
> system with more than 400 e-mail accounts and I will (probably) be 
> killed if it should stop working.
>
> So I want to be quite confident before I start to try anything. So 
> please boost my confidence by giving me some hints how it should work.
>
> This is my spamdyke.conf:
>
> log-level=2
>
> local-domains-file=/var/qmail/control/rcpthosts
>
> max-recipients=15
>
> idle-timeout-secs=60
>
> graylist-dir=/var/qmail/spamdyke/greylist
>
> graylist-min-secs=300
>
> graylist-max-secs=4814400
>
> #policy-url=http:/www.kapuziner.org/greylisting.html
>
> #sender-blacklist-file=/var/qmail/spam

[spamdyke-users] greylisting for not existend adresses

2008-04-25 Thread Markus Thüer
Hi, 

 

 

When I checked my greylisting directory:
/var/qmail/spamdyke/greylist/domain.org/  I found that there are a lot of
not existing user names. 

Like users which are deleted or misspelled addresses or obvious fantasy
addresses. 

It looks to me like every mail that is send to our server is greylisted even
if there isn’t an account where it could be delivered to.

 

Should it work in this way?  Or should they be rejected before greylisting
information is stored?

 

 

I work with plesk 8.3 and spamdyke 3.1.6  

 

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] Greylisting wishes

2008-04-25 Thread Sam Clippinger
OK, I guess I've been working on version 4.0.0 for too long now because 
I didn't realize I'd already implemented this feature (until I tried to 
add it again).  However, I didn't do it quite the way we described in 
this thread; instead of changing the "ALLOWED" messages, I added a new 
log level that will print out extra messages.  (In fact, the entire log 
level system has been revisited and reorganized).

When the logging level is "verbose" or higher, messages like these will 
be produced:
FILTER_RDNS_MISSING ip: 11.22.33.44
FILTER_RDNS_BLACKLIST ip: 11.22.33.44 rdns: 11-22-33-44.example.com 
file: /var/qmail/spamdyke/rdns_blacklist.txt(31)
FILTER_RBL_MATCH ip: 11.22.33.44 rbl: foorbl.example.com
FILTER_GRAYLISTED sender: [EMAIL PROTECTED] recipient: 
[EMAIL PROTECTED] path: 
/var/qmail/spamdyke/graylist.d/example.com/user/spamdomain.com/spammer
FILTER_WHITELIST_IP ip: 11.22.33.44 file: 
/var/qmail/spamdyke/whitelist_ip.txt(7)
...and so on.  Any filter that triggers either an acceptance or a 
rejection will produce a "FILTER" log message.  Filters that only 
examine the connection (but aren't triggered) won't produce any output 
(unless the log level is increased to "debug" or higher).

I chose this approach because it provides more information than just the 
matching filter; it gives the file and line numbers, the directory 
paths, etc.  Because it requires setting the log level higher, it can be 
enabled when someone wants to collect the data for analysis or turned 
off if it is not wanted.

Does that sound sufficient or should I remove it and change the 
"ALLOWED" messages instead?

-- Sam Clippinger

Sam Clippinger wrote:
> "ALLOWED_GRAYLISTED" could be useful if graylisting isn't active for all 
> domains.  It would mean that the graylisting filter had checked for the 
> existence of a graylist file for that connection (and found one).  I 
> agree it should be possible to match an "ALLOWED" with a previous 
> "DENIED_GRAYLISTED" but that could involve searching log files from 
> multiple days if the remote server doesn't attempt redelivery very quickly.
>
> -- Sam Clippinger
>
> Michael Colvin wrote:
>   
>> Doesn't it already log "DENIED GREYLISTED" when it greylists an address,
>> then when it is sent again, and passes the greylist test, it logs
>> "ALLOWED"...  Doesn't that already identify greylisted e-mails?  Or, are we
>> talking about logging the fact that e-mails are allowed AND have already
>> been greylisted?  Which, if you greylist all domains, would be every e-mail,
>> right?
>>
>> The "ALLOWED_WHITELISTED_*" items might be useful, but I don't see where
>> logging allowed greylisted e-mails makes sense...  In fact, "Allowed
>> Greylist" seems kind of contradictory to me...  :-)  Just my .02, which,
>> with the state of the dollar, is worth even less today than last week.  :-)
>>  
>>
>> Michael J. Colvin
>> NorCal Internet Services
>> www.norcalisp.com
>>
>>  
>>
>>
>>
>>  
>>
>>   
>> 
>>> -Original Message-
>>> From: [EMAIL PROTECTED] 
>>> [mailto:[EMAIL PROTECTED] On Behalf Of BC
>>> Sent: Wednesday, April 23, 2008 1:32 PM
>>> To: spamdyke-users@spamdyke.org
>>> Subject: Re: [spamdyke-users] Greylisting wishes
>>>
>>>
>>> On 4/23/2008 [EMAIL PROTECTED] wrote:
>>>
>>> 
>>>   
  I could do that if it would be useful.  Now is the time 
   
 
>>> for changes  
>>> 
>>>   
 like  this, since version 4.0 won't be backwards compatible 
   
 
>>> anyway.  
>>> 
>>>   
 What  about changing the log message for other reasons too?  For 
 example,  ALLOWED_WHITELISTED_IP, ALLOWED_WHITELISTED_SENDER, etc.
   
 
>>> I'd like to see that sort of addition to the logging, too.
>>>
>>> Thanks,
>>>
>>> Bucky
>>>
>>> ___
>>> spamdyke-users mailing list
>>> spamdyke-users@spamdyke.org
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>>> 
>>>   
>> ___
>> spamdyke-users mailing list
>> spamdyke-users@spamdyke.org
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>   
>> 
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] greylisting for not existend adresses

2008-04-25 Thread Sam Clippinger
Unfortunately spamdyke is not able to determine if a recipient address 
is valid before qmail accepts it. This feature has been frequently 
requested and I plan to add it very soon. Until then, all recipients 
will be graylisted, whether they are invalid or not.

-- Sam Clippinger

Markus Thüer wrote:
>
> Hi,
>
> When I checked my greylisting directory: 
> /var/qmail/spamdyke/greylist/domain.org/ I found that there are a lot 
> of not existing user names.
>
> Like users which are deleted or misspelled addresses or obvious 
> fantasy addresses.
>
> It looks to me like every mail that is send to our server is 
> greylisted even if there isn’t an account where it could be delivered to.
>
> Should it work in this way? Or should they be rejected before 
> greylisting information is stored?
>
> I work with plesk 8.3 and spamdyke 3.1.6
>
> 
>
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


[spamdyke-users] Plesk Whitelist and Spamdyke

2008-04-25 Thread Markus Thüer
Hi, 

 

just a simple question for the experts. 

I don’t know the mail processing order of plesk. So I am wondering will
mails from Senders who are whitelisted in Plesk (global or personal) be
checked by spamdyke?

 

 

Markus Thüer

___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] Greylisting wishes

2008-04-25 Thread Eric Shubert
I think I sorta like both.

Sam Clippinger wrote:
> OK, I guess I've been working on version 4.0.0 for too long now because 
> I didn't realize I'd already implemented this feature (until I tried to 
> add it again).  However, I didn't do it quite the way we described in 
> this thread; instead of changing the "ALLOWED" messages, I added a new 
> log level that will print out extra messages.  (In fact, the entire log 
> level system has been revisited and reorganized).
> 
> When the logging level is "verbose" or higher, messages like these will 
> be produced:
> FILTER_RDNS_MISSING ip: 11.22.33.44
> FILTER_RDNS_BLACKLIST ip: 11.22.33.44 rdns: 11-22-33-44.example.com 
> file: /var/qmail/spamdyke/rdns_blacklist.txt(31)
> FILTER_RBL_MATCH ip: 11.22.33.44 rbl: foorbl.example.com
> FILTER_GRAYLISTED sender: [EMAIL PROTECTED] recipient: 
> [EMAIL PROTECTED] path: 
> /var/qmail/spamdyke/graylist.d/example.com/user/spamdomain.com/spammer
> FILTER_WHITELIST_IP ip: 11.22.33.44 file: 
> /var/qmail/spamdyke/whitelist_ip.txt(7)
> ...and so on.  Any filter that triggers either an acceptance or a 
> rejection will produce a "FILTER" log message.  Filters that only 
> examine the connection (but aren't triggered) won't produce any output 
> (unless the log level is increased to "debug" or higher).
> 
> I chose this approach because it provides more information than just the 
> matching filter; it gives the file and line numbers, the directory 
> paths, etc.  Because it requires setting the log level higher, it can be 
> enabled when someone wants to collect the data for analysis or turned 
> off if it is not wanted.
> 
> Does that sound sufficient or should I remove it and change the 
> "ALLOWED" messages instead?
> 
> -- Sam Clippinger
> 
> Sam Clippinger wrote:
>> "ALLOWED_GRAYLISTED" could be useful if graylisting isn't active for all 
>> domains.  It would mean that the graylisting filter had checked for the 
>> existence of a graylist file for that connection (and found one).  I 
>> agree it should be possible to match an "ALLOWED" with a previous 
>> "DENIED_GRAYLISTED" but that could involve searching log files from 
>> multiple days if the remote server doesn't attempt redelivery very quickly.
>>
>> -- Sam Clippinger
>>
>> Michael Colvin wrote:
>>   
>>> Doesn't it already log "DENIED GREYLISTED" when it greylists an address,
>>> then when it is sent again, and passes the greylist test, it logs
>>> "ALLOWED"...  Doesn't that already identify greylisted e-mails?  Or, are we
>>> talking about logging the fact that e-mails are allowed AND have already
>>> been greylisted?  Which, if you greylist all domains, would be every e-mail,
>>> right?
>>>
>>> The "ALLOWED_WHITELISTED_*" items might be useful, but I don't see where
>>> logging allowed greylisted e-mails makes sense...  In fact, "Allowed
>>> Greylist" seems kind of contradictory to me...  :-)  Just my .02, which,
>>> with the state of the dollar, is worth even less today than last week.  :-)
>>>  
>>>
>>> Michael J. Colvin
>>> NorCal Internet Services
>>> www.norcalisp.com
>>>
>>>  
>>>
>>>
>>>
>>>  
>>>
>>>   
>>> 
 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of BC
 Sent: Wednesday, April 23, 2008 1:32 PM
 To: spamdyke-users@spamdyke.org
 Subject: Re: [spamdyke-users] Greylisting wishes


 On 4/23/2008 [EMAIL PROTECTED] wrote:

 
   
>  I could do that if it would be useful.  Now is the time 
>   
> 
 for changes  
 
   
> like  this, since version 4.0 won't be backwards compatible 
>   
> 
 anyway.  
 
   
> What  about changing the log message for other reasons too?  For 
> example,  ALLOWED_WHITELISTED_IP, ALLOWED_WHITELISTED_SENDER, etc.
>   
> 
 I'd like to see that sort of addition to the logging, too.

 Thanks,

 Bucky



-- 
-Eric 'shubes'
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users


Re: [spamdyke-users] Plesk Whitelist and Spamdyke

2008-04-25 Thread Sam Clippinger
spamdyke doesn't check Plesk's whitelists, so it will not honor them. In 
fact, I don't know how Plesk's whitelists work. If they're stored in 
files (doubtful), spamdyke may be able to read those files and use them.

-- Sam Clippinger

Markus Thüer wrote:
>
> Hi,
>
> just a simple question for the experts.
>
> I don’t know the mail processing order of plesk. So I am wondering 
> will mails from Senders who are whitelisted in Plesk (global or 
> personal) be checked by spamdyke?
>
> Markus Thüer
>
> 
>
> ___
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>   
___
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users