Spamd log analyzer

2004-05-21 Thread Mark Gangl
I am running OpenBSD 3.5 on a mail server, using postfix with pf and spamd redirection. I have syslog setup to redirect log info from spamd to a separate log file. I was hoping someone knows of a spamd log analyzing tool that I could run via cron and receive an email spamd report. Basically

Re: Fwd: Re: Things pf can't do?

2004-05-21 Thread Greg Hennessy
On 20 May 2004 13:42:50 -0700, [EMAIL PROTECTED] (Jeff Simmons) wrote: On May 20, 2004, at 6:19 AM, Greg Hennessy wrote: Actually, it's a breath of fresh air compared to other filters I've worked with. *cough* iptables *cough* LOL One of Linus' stated goals for the 2.7 kernel is to improve

Fw: memory issue

2004-05-21 Thread Michiel van Baak
On Fri, 21 May 2004 09:55:56 +1200 Russell Fulton [EMAIL PROTECTED] wrote: On Fri, 2004-05-21 at 00:15, Michiel van Baak wrote: On Thu, 13 May 2004 12:47:42 +0200 Michiel van Baak [EMAIL PROTECTED] wrote: Hi all, I'm trying to setup my spamd table in pf. I used Daniel's script

filter rule numbering

2004-05-21 Thread Per olof Ljungmark
This is probably a dumb question, but anyway... I'm unable to figure out which rule is actually hit. The pflog output gives you rule numbers like rule 3/0(match): block in on fxp0 bla bla. But, which pfctl command gives you the corresponding rule number in pf.conf? thanks / per olof

Re: How To Get More Kernel Memory for BIG PF Tables (Re: memory issue)

2004-05-21 Thread Theo de Raadt
But note -- due to other fears, this patch will *not* be put into -stable by us. Hi all, I'm trying to setup my spamd table in pf. I used Daniel's script as he posted it on http://www.benzedrine.cx/relaydb.html as a template for my own script (see below) When I run my script it fails with

ftp download test

2004-05-21 Thread Juri Malinovski
Just for fun... http://www.microcom.ee/holdman/docs/ftp_test.txt pgpMqs0b1NN1N.pgp Description: PGP signature

question about flags

2004-05-21 Thread Chad M Stewart
This is my first adventure with PF, coming from Linux, FW-1, etc. For the moment I've decided that I'll allow all outbound packets on every interface to create state. Not sure if that is a good idea or not. Thoughts? I've also set two default rules block in log-all on { $all_if } all