|
|
ru.unix.bsd- RU.UNIX.BSD ------------------------------------------------------------------ From : mitrohin a.s. 2:5020/400 04 Jul 2007 19:35:35 To : Alexander Gottlieb Subject : Re: (no subject) --------------------------------------------------------------------------------
On Wed, Jul 04, 2007 at 03:22:45PM +0400, Alexander Gottlieb wrote:
> Hail there Alexander!
>
> > Как я понял готового решения нет и подобного никто ещё не делал.
> > Спасибо всем ответившим.
> > Буду разбираться сам.
>
> Можно о результатах поинтересоваться?
>
> >> >> > Если есть рецепт, то поделись пожалуйста.
>
> У меня подобная задача стоит. В идеале мне бы надо отучить спамассассин
> проверять письма от аутентифицированных клиентов.
>
> В мане к spamass-milter я нашел, то что по идее должно помочь:
>
> -a Causes spamass-milter to pass through unchecked any
> messages from connections established using SMTP authentication. This
> is useful for sites with remote users.
>
> Hо не работает. Все равно сендмейл скармливает письмо милтеру, а тот
> скармливает его спамд. :-(
>
возможно это подскажет вам более правильное направление поиска ;)
2 Configuring sendmail with milter-greylist
===========================================
You need a few options in sendmail.cf to use milter-greylist:
O InputMailFilters=greylist
Xgreylist, S=local:/var/milter-greylist/milter-greylist.sock
O Milter.macros.connect=j,{if_addr}
O Milter.macros.envfrom=i
Note that InputMailFilters and Milter.macros.* options are shared
with other milters, and the other milters you have set up may
require additionnal macros. Therefore you need to merge what
milter-greylist needs with what other milters need. If you just
copy the lines proposed in this file, this is likely to break
other milters setup. In this section we simply list the macros
milter-greylist require. Your default sendmail.cf is likely to already
contain the proper Milter.macros.* setup.
If you want to bypass greylisting for users that succeeded SMTP AUTH,
you also need {auth_authen} in Milter.macros.envfrom:
O Milter.macros.envfrom=i, {auth_authen}
If you want to bybass greylisting for users that use STARTTLS with
a client certificate, you also need {verify} and {cert_subject}
in Milter.macros.helo:
O Milter.macros.helo={verify},{cert_subject}
If you want to use Sendmail access DB as a whitelisting source, you
will need {greylist} too. milter-greylist will whitelist a message
when the {greylist} macro is defined and set as WHITE.
O Milter.macros.envrcpt={greylist}
Alternatively, you can use the following m4 macro definitions
if you build sendmail.cf with m4 (contributed by Hubert Ulliac).
Here again, confMILTER_MACROS_* are shared with other milters,
so you need to merge the definitions with what others milters
require. Just copying the lines below is likely to cause other
milters to malfunction.
INPUT_MAIL_FILTER(`greylist',
`S=local:/var/milter-greylist/milter-greylist.sock')
define(`confMILTER_MACROS_CONNECT', `j, {if_addr}')
define(`confMILTER_MACROS_HELO', `{verify}, {cert_subject}')
define(`confMILTER_MACROS_ENVFROM', `i, {auth_authen}')
define(`confMILTER_MACROS_ENVRCPT', `{greylist}')
Ivan F. Martinez contributed the milter-greylist.m4 file that includes
thoses definitions and will take care of adding the macros required by
milter-greylist instead of overwriting what has already been done. This
should simplify an automatic generation of sendmail.cf.
/swp
--- ifmail v.2.15dev5.3
* Origin: Barnaul State Pedagogical University InterNetNews site (2:5020/400)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.unix.bsd/3499955ce783.html, оценка из 5, голосов 10
|