[Postfixbuch-users] keine Spaminfos im Header

Ralf Prengel ralf.prengel at rprengel.de
Mo Okt 30 18:58:43 CET 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hallo,

wenn ich das richtig sehe nutzt mein Amavis Spamassin.
Mein Problem:
Ich bekomme es nicht hin das in Mailheader die Infos eingetragen werden.

Hat jemand einen Tip







Oct 30 19:00:37 srvmail amavis[19053]: (19053-05) timer stopped after
DATA end
Oct 30 19:00:37 srvmail amavis[19053]: (19053-05) strip_tempdir:
/var/spool/amavis/tmp/amavis-20061030T190002-19053
Oct 30 19:00:37 srvmail amavis[19053]: (19053-05) rmdir_recursively:
/var/spool/amavis/tmp/amavis-20061030T190002-19053/parts, excl=1
Oct 30 19:00:37 srvmail amavis[19053]: (19053-05) TIMING [total 2547 ms]
- - SMTP EHLO: 8 (0%)0, SMTP pre-MAIL: 12 (0%)1, SMTP pre-DATA-flush: 9
(0%)1, SMTP DATA: 43 (2%)3, body_digest: 4 (0%)3, gen_mail_id: 0 (0%)3,
mime_decode: 33 (1%)4, get-file-type2: 63 (2%)7, decompose_part: 1
(0%)7, parts_decode: 2 (0%)7, AV-scan-1: 1271 (50%)57, AV-scan-2: 729
(29%)85, spam-wb-list: 20 (1%)86, SA msg read: 1 (0%)86, SA parse: 8
(0%)87, SA check: 184 (7%)94, update_cache: 4 (0%)94, fwd-connect: 24
(1%)95, fwd-mail-from: 4 (0%)95, fwd-rcpt-to: 8 (0%)95, write-header: 4
(0%)95, fwd-data: 3 (0%)96, fwd-data-end: 55 (2%)98, fwd-rundown: 5
(0%)98, main_log_entry: 44 (2%)100, update_snmp: 3 (0%)100,
unlink-2-files: 4 (0%)100, rundown: 1 (0%)100
Oct 30 19:00:37 srvmail amavis[19053]: (19053-05) ESMTP> 250 2.6.0 Ok,
id=19053-05, from MTA([127.0.0.1]:10025): 250 Ok: queued as


$max_servers = 2;            # number of pre-forked children (2..15 is
common)
$daemon_user = 'vscan';
$daemon_group = 'vscan';

$mydomain = 'rprengel.de';   # a convenient default for other settings

$MYHOME = '/var/spool/amavis';
$TEMPBASE = "$MYHOME/tmp";   # working directory, needs to be created
manually
$ENV{TMPDIR} = $TEMPBASE;    # environment variable TMPDIR
$QUARANTINEDIR = '/var/spool/amavis/virusmails';
# $quarantine_subdir_levels = 1;  # add level of subdirs to disperse
quarantine

# $daemon_chroot_dir = $MYHOME;   # chroot directory or undef

# $db_home   = "$MYHOME/db";
# $helpers_home = "$MYHOME/var";  # prefer $MYHOME clean and owned by root?
# $pid_file  = "$MYHOME/var/amavisd.pid";
# $lock_file = "$MYHOME/var/amavisd.lock";
#NOTE: create directories $MYHOME/tmp, $MYHOME/var, $MYHOME/db manually

@local_domains_maps = ( [".$mydomain"] );
@mynetworks = qw( 127.0.0.0/8 );

$log_level = 5;              # verbosity 0..5
$log_recip_templ = undef;    # disable by-recipient level-0 log entries
$DO_SYSLOG = 1;              # log via syslogd (preferred)
$SYSLOG_LEVEL = 'mail.debug';

$enable_db = 1;              # enable use of BerkeleyDB/libdb (SNMP and
nanny)
$enable_global_cache = 1;    # enable use of libdb-based cache if
$enable_db=1

$inet_socket_port = 10024;   # listen on this local TCP port(s) (see
$protocol)
$unix_socketname = "$MYHOME/amavisd.sock";  # when using sendmail milter

$sa_tag_level_deflt  = undef;  # add spam info headers if at, or above
that level
$sa_tag2_level_deflt = 5.0;
$sa_kill_level_deflt = 6.31; # triggers spam evasive actions
$sa_dsn_cutoff_level = 9;    # spam level beyond which a DSN is not sent
# $sa_quarantine_cutoff_level = 20; # spam level beyond which quarantine
is off

$sa_mail_body_size_limit = 200*1024; # don't waste time on SA if mail is
larger
$sa_local_tests_only = 1;    # only tests which do not require internet
access?
$sa_auto_whitelist = 1;      # turn on AWL in SA 2.63 or older (irrelevant
                             # for SA 3.0, cf option is
'use_auto_whitelist')

# @lookup_sql_dsn =
#   ( ['DBI:mysql:database=mail;host=128.0.0.1;port=3306', 'user1',
'passwd1'],
#     ['DBI:mysql:database=mail;host=host2', 'username2', 'password2'],
#     ["DBI:SQLite:dbname=$MYHOME/sql/mail_prefs.sqlite", '', ''] );
# @storage_sql_dsn = @lookup_sql_dsn;  # none, same, or separate database



$virus_admin               = "virusalert\@$mydomain";  # notifications
recip.

$mailfrom_notify_admin     = "virusalert\@$mydomain";  # notifications
sender
$mailfrom_notify_recip     = "virusalert\@$mydomain";  # notifications
sender
$mailfrom_notify_spamadmin = "spam.police\@$mydomain"; # notifications
sender
$mailfrom_to_quarantine = ''; # null return path; uses original sender
if undef

@addr_extension_virus_maps      = ('virus');
@addr_extension_spam_maps       = ('spam');
@addr_extension_banned_maps     = ('banned');
@addr_extension_bad_header_maps = ('badh');
# $recipient_delimiter = '+';  # undef disables address extensions
altogether
# when enabling addr extensions do also Postfix/main.cf:
recipient_delimiter=+

$path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
#$dspam = 'dspam';

$MAXLEVELS = 14;
$MAXFILES = 1500;
$MIN_EXPANSION_QUOTA =      100*1024;  # bytes  (default undef, not
enforced)
$MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not
enforced)

$sa_spam_subject_tag = '***SPAM*** ';
$defang_virus  = 1;  # MIME-wrap passed infected mail
$defang_banned = 1;  # MIME-wrap passed mail containing banned name


# OTHER MORE COMMON SETTINGS (defaults may suffice):

$myhostname = 'srvmail.rprengel.de';

# $notify_method  = 'smtp:[127.0.0.1]:10025';
# $forward_method = 'smtp:[127.0.0.1]:10025';  # set to undef with milter!

# $final_virus_destiny      = D_DISCARD;
# $final_banned_destiny     = D_BOUNCE;
# $final_spam_destiny = D_PASS;
# $final_bad_header_destiny = D_PASS;


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org

iD8DBQFFRj1NgRRKXJrQjTsRAh83AKCfTFdN1PcP09QeKiBsAlBgmR3WaACghzVm
2iqZNZLpYb30oznjJD5BBBk=
=H+xF
-----END PGP SIGNATURE-----



Mehr Informationen über die Mailingliste Postfixbuch-users