Package: amavisd-new Version: 1:2.11.1-5 Severity: important X-Debbugs-Cc: l...@lupe-christoph.de
Sometimes the owner and group of /var/lib/amavis/.spamassassin/bayes_toks change to root:root. This makes the cronjob fail: Date: Sat, 6 Jan 2024 15:18:04 +0100 (CET) From: Cron Daemon <r...@octomain.octogon.de> To: ama...@octomain.octogon.de Subject: Cron <amavis@octomain> test -e /usr/sbin/amavisd-new-cronjob && /usr/sbin/amavisd-new-cronjob sa-sync bayes: cannot open bayes databases /var/lib/amavis/.spamassassin/bayes_* R/O: tie failed: Permission denied bayes: cannot open bayes databases /var/lib/amavis/.spamassassin/bayes_* R/O: tie failed: Permission denied Manually restting to amavis:amavis allows the cronjob to run. I have no idea what is changing owner and group, especially since the other files in /var/lib/amavis/.spamassassin/ are unchanged: # ls -l /var/lib/amavis/.spamassassin/ total 19712 -rw-rw-rw- 1 amavis amavis 20406272 Jan 6 14:58 bayes_seen -rw------- 1 root root 5484544 Jan 6 14:58 bayes_toks -rw------- 1 amavis amavis 2539520 Jan 25 2019 bayes_toks.expire4427 -rw-r--r-- 1 amavis amavis 1869 Jul 13 2014 user_prefs The change happened at the same time as the last access: # ls -l --full-time /var/lib/amavis/.spamassassin/bayes_toks -rw------- 1 root root 5484544 2024-01-06 14:58:43.988842231 +0100 /var/lib/amavis/.spamassassin/bayes_toks # ls -lc --full-time /var/lib/amavis/.spamassassin/bayes_toks -rw------- 1 root root 5484544 2024-01-06 14:58:43.988842231 +0100 /var/lib/amavis/.spamassassin/bayes_toks -- System Information: Debian Release: 11.8 APT prefers oldstable-updates APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500, 'oldstable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-27-amd64 (SMP w/1 CPU thread) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages amavisd-new depends on: ii adduser 3.118+deb11u1 ii debconf [debconf-2.0] 1.5.77 ii file 1:5.39-3+deb11u1 ii init-system-helpers 1.60 pn libarchive-tar-perl <none> ii libarchive-zip-perl 1.68-1 ii libberkeleydb-perl 0.64-1+b1 ii libconvert-tnef-perl 0.18-1.1 ii libconvert-uulib-perl 1:1.5~dfsg-1+b3 pn libdigest-md5-perl <none> ii libio-stringy-perl 2.111-3 ii libmail-dkim-perl 1.20200907-1 ii libmailtools-perl 2.21-1 pn libmime-base64-perl <none> ii libmime-tools-perl 5.509-1 ii libnet-libidn-perl 0.12.ds-3+b3 ii libnet-server-perl 2.009-2 ii libnet-snmp-perl 6.0.1-6 ii libunix-syslog-perl 1.1-3+b3 ii lsb-base 11.1.0 ii pax 1:20201030-1 ii perl [libtime-hires-perl] 5.32.1-4+deb11u2 Versions of packages amavisd-new recommends: ii altermime 0.3.10-12 ii libnet-patricia-perl 1.22-1+b7 pn ripole <none> Versions of packages amavisd-new suggests: ii apt-listchanges 3.24 pn arj <none> pn cabextract <none> ii clamav 0.103.10+dfsg-0+deb11u1 ii clamav-daemon 0.103.10+dfsg-0+deb11u1 ii cpio 2.13+dfsg-7.1~deb11u1 pn dspam <none> pn lhasa <none> ii libauthen-sasl-perl 2.1600-1.1 ii libdbi-perl 1.643-3+b1 ii libmail-dkim-perl 1.20200907-1 pn libnet-ldap-perl <none> pn libsnmp-perl <none> pn libzeromq-perl <none> pn lzop <none> pn nomarch <none> ii p7zip 16.02+dfsg-8 pn rpm <none> ii spamassassin 3.4.6-1 pn unrar <none> -- Configuration Files: /etc/amavis/conf.d/15-content_filter_mode changed: use strict; @bypass_virus_checks_maps = ( \%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re); @bypass_spam_checks_maps = ( \%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re); 1; # ensure a defined return /etc/amavis/conf.d/50-user changed: use strict; $max_servers = 4; # number of pre-forked children $final_virus_destiny = D_PASS; undef $virus_quarantine_to; undef $virus_admin; $final_banned_destiny = D_PASS; undef $banned_quarantine_to; undef $banned_admin; $final_bad_header_destiny = D_PASS; undef $bad_header_quarantine_to; undef $bad_header_admin; $final_spam_destiny = D_PASS; undef $spam_quarantine_to; undef $spam_admin; $sa_tag2_level_deflt = 5.0; # add 'spam detected' headers at that level $sa_kill_level_deflt = 99999; # triggers spam evasive actions $sa_dsn_cutoff_level = 0; # spam level beyond which a DSN is not sent undef $sa_spam_subject_tag; @local_domains_acl = qw(octogon.de octogon-gmbh.de med-data.de toscanatradizionale.de); $recipient_delimiter = '+'; @addr_extension_spam_maps = ('spam'); @bypass_virus_checks_maps = ( \%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re); @bypass_spam_checks_maps = ( \%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re); $log_level = 10; 1; # ensure a defined return -- no debconf information