Hi.
Some mails are positive to this test.
In wiki section, I can't find any information about it.
Someone could explain me what does it means?!
Regards,
-f
On Thu, May 17, 2007 08:21, fRANz wrote:
Hi.
Some mails are positive to this test.
In wiki section, I can't find any information about it.
Someone could explain me what does it means?!
Regards,
-f
Hint: grep is your friend when searching your rule files.
From the FVGT ruleset (Fred):
On 5/17/07, Duncan Hill [EMAIL PROTECTED] wrote:
Hi Duncan,
thank you for your reply.
Hint: grep is your friend when searching your rule files.
From the FVGT ruleset (Fred):
header FH_HOST_EQ_D_D_D_D X-Spam-Relays-Untrusted =~ /^[^\]]+
rdns=[^
On Thu, May 17, 2007 09:00, fRANz wrote:
From the FVGT ruleset (Fred):
header FH_HOST_EQ_D_D_D_D X-Spam-Relays-Untrusted =~ /^[^\]]+
rdns=[^ ]+\d{1,3}[^0-9]\d{1,3}[^0-9]\d{1,3}[^0-9]\d{1,3}[^ ]+ / describe
FH_HOST_EQ_D_D_D_D Host starts with d-d-d-d
scoreFH_HOST_EQ_D_D_D_D
since upgrading to 3.2 i have been getting regular messages in the
exim's panic log.
2007-05-17 02:16:03 1HoVX0-0002df-PP spam acl condition: cannot parse
spamd output
anyone else seen this or know any reasons why it happens?
R
Regards
Ronan McGlue
===
Analyst /
Ronan McGlue wrote:
since upgrading to 3.2 i have been getting regular messages in the
exim's panic log.
2007-05-17 02:16:03 1HoVX0-0002df-PP spam acl condition: cannot parse
spamd output
anyone else seen this or know any reasons why it happens?
Looks like exim is directly parsing spamd's
Daniel Aquino wrote:
Is spam assassin smart enough to not auto-learn (bayesian) spam if the
default tests allready detect it as spam... ?
No, in fact, that's exactly what you DO NOT want to do.
Bayes training is not applicable to just one message. Bits learned from
one spam get applied to
I seem to see this message allot...
warn: auto-whitelist: open of auto-whitelist file failed: locker:
safe_lock: cannot create lockfile
/var/spool/MD-Databases/auto-whitelist.mutex: Permission denied
If I delete my databases all together it creates it fine...
But once its created then it keeps
Is it possible to have spamassassian only parse a small ruleset that is
basically a whitelist for allowing e-mails?
Specifically, can you specify a to address and say only allow e-mail from
these addresses?
And if the e-mail isn't addressed to one of the specified to addresses, do
not filtering?
At 09:15 AM 5/17/2007, jmp242 wrote:
Is it possible to have spamassassian only parse a small ruleset that is
basically a whitelist for allowing e-mails?
Specifically, can you specify a to address and say only allow e-mail from
these addresses?
And if the e-mail isn't addressed to one of the
On Thu, 17 May 2007, Evan Platt wrote:
At 09:15 AM 5/17/2007, jmp242 wrote:
Is it possible to have spamassassian only parse a small ruleset that is
basically a whitelist for allowing e-mails?
Specifically, can you specify a to address and say only allow e-mail from
these addresses?
And if the
At 09:41 AM 5/17/2007, Duane Hill wrote:
That sounds like it would be better suited for your MUA or for
something like procmail.
I believe the MTA is where the decision making would be done.
Yeahh.. That's the ticket.
Didn't get much sleep last night. Maybe I should just go home.
On Thu, May 17, 2007 at 12:19:39PM -0400, Robert Fitzpatrick wrote:
We have a mail server that got listed on Outblaze, below is their
evidence. The IP and reverse DNS points to our NAT firewall. Since that
is the only received header, is there any way for me to track where this
came from? I
You should start probably by checking file permissions on the dir awl
sits, and its parent...
Luix
2007/5/17, Daniel Aquino [EMAIL PROTECTED]:
I seem to see this message allot...
warn: auto-whitelist: open of auto-whitelist file failed: locker:
safe_lock: cannot create lockfile
I would think that should be done by the MTA but if you have none
local users and would like to check a ldap database or something
external you could use a filter something like Milter in Sendmail...
Should I be concerned with the following as a result of --lint -D?
config: SpamAssassin failed to parse line, skipping: check_mx_delay 5
warning: description for FS_START_DOYOU2 is over 50 chars
Thanks,
Clay
Hi,
When sending messages from clients using SMTP Auth to a server running
sendmail, I'm seeing issues with SPF and Botnet thinking these messages are
spam-like - I'm not sure if this issue lays with SA or with sendmail itself.
The below message is sent from a (broken) Cingular 8125 phone,
In my humble opinion, no. What you are seeing is a warning from SA
that the author of that rule has been too verbose in their description
section. SA has gotten more strict with many aspects of rules format
over the past several releases. The warning is not an indication that
the rule will not
The first line is either invalid or requires a plugin that isn't enabled. You
should probably check on that to see what is going on.
The second one is only complaining about a long description for what appears to
be a local rule, and is no particular concern.
Loren
- Original
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Matthew Dickinson wrote:
Hi,
When sending messages from clients using SMTP Auth to a server running
sendmail, I'm seeing issues with SPF and Botnet thinking these messages are
spam-like - I'm not sure if this issue lays with SA or with sendmail
Matthew Dickinson wrote:
When sending messages from clients using SMTP Auth to a server running
sendmail, I'm seeing issues with SPF and Botnet thinking these messages are
spam-like - I'm not sure if this issue lays with SA or with sendmail itself.
The issue is with SA, sendmail is an
Hi,
I believe I have things set:
(yes, this many are trusted)
trusted_networks 128.206/16
botnet_pass_auth 1
Will run through debug,
Matthew
-Original Message-
From: news [mailto:[EMAIL PROTECTED] On Behalf Of René Berber
Sent: Thursday, May 17, 2007 17:00
To:
René Berber wrote:
Matthew Dickinson wrote:
When sending messages from clients using SMTP Auth to a server running
sendmail, I'm seeing issues with SPF and Botnet thinking these
messages are spam-like - I'm not sure if this issue lays with SA or
with sendmail itself.
The issue is with SA,
Daryl C. W. O'Shea wrote:
René Berber wrote:
Matthew Dickinson wrote:
When sending messages from clients using SMTP Auth to a server
running sendmail, I'm seeing issues with SPF and Botnet thinking
these messages are spam-like - I'm not sure if this issue lays with
SA or with sendmail
René Berber wrote:
Looks more like MailScanner to me, not a milter, notice the virus
scan... and MS does include the full received headers. But your point
is valid, that could be the cause of the problem in some cases.
The virus scan looks like it's compliments of clamav-milter to me. :)
Hi,
A milter is being used:
Spamass-milter-0.3.1
Matthew
-Original Message-
From: Daryl C. W. O'Shea [EMAIL PROTECTED]
To: users@spamassassin.apache.org
Sent: 5/17/07 5:49 PM
Subject: Re: Sendmail SMTP auth'd message strange behavior with Botnet and SPF
René Berber wrote:
Looks
At 09:19 17-05-2007, Robert Fitzpatrick wrote:
We have a mail server that got listed on Outblaze, below is their
evidence. The IP and reverse DNS points to our NAT firewall. Since that
is the only received header, is there any way for me to track where this
came from? I check the mail logs on
Robert Fitzpatrick wrote:
We have a mail server that got listed on Outblaze, below is their
evidence. The IP and reverse DNS points to our NAT firewall. Since that
is the only received header, is there any way for me to track where this
came from?
What IPs do you NAT against that IP? All of
Someone had asked about a no tests/no score result, one just popped
up in my logs and it's even explains why there are no tests. This
could be a reason for that sort of result.
May 17 21:26:11 interstellar.com /usr/bin/amavisd[15704]: (15704-02)
spam_scan: not wasting time on SA, message
29 matches
Mail list logo