From: <chr...@us...> - 2018-10-31 10:25:23
|
Revision: 13394 http://sourceforge.net/p/xoops/svn/13394 Author: chronolabscoop Date: 2018-10-31 10:25:03 +0000 (Wed, 31 Oct 2018) Log Message: ----------- Emails Propogation REST Services API 1.0.4! Modified Paths: -------------- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/README.md *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/include/version.php *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/include/page.php *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/language/english/install.php Added Paths: ----------- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/crons/get-spam-training.php *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Jessie (8.x)/spamassassin.html *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Wheezy (7.x)/spamassassin.html *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Gentoo (2.2)/spamassassin.html *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/RHEL CentOS (7)/spamassassin.html *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Ubuntu Precise (12.04)/spamassassin.html *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Ubuntu Trusty (14.04)/spamassassin.html *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/page_configspamassassin.php Modified: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/README.md =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/README.md 2018-10-26 18:38:15 UTC (rev 13393) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/README.md 2018-10-31 10:25:03 UTC (rev 13394) @@ -2,7 +2,7 @@ # Emails/Aliases Account's Propogation REST API Services -## Version: 1.0.1 (stable) +## Version: 1.0.4 (stable) ### Author: Dr. Simon Antony Roberts <simon@snails.email> @@ -47,6 +47,9 @@ Execute:- $ sudo crontab -e + +### CronTab Entry: + You have to add the following cronjobs to your cronjobs or on windows scheduled tasks! */41 */2 * * * /usr/bin/php /var/www/emails.snails.email/crons/find-mx-services.php @@ -54,9 +57,8 @@ */11 * * * * /usr/bin/php /var/www/emails.snails.email/crons/import-generated-keys.php */22 * * * * /usr/bin/php /var/www/emails.snails.email/crons/port-encryption-keys.php */11 */7 * * * /usr/bin/php /var/www/emails.snails.email/crons/peer-services.php - */5 * * * * sh /var/www/emails.snails.email/crons/* - -### CronTab Entry: + */11 */7 * * * /usr/bin/php /var/www/emails.snails.email/crons/get-spam-training.php + */5 * * * * sh /var/www/emails.snails.email/crons/*.sh ## Licensing Added: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/crons/get-spam-training.php =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/crons/get-spam-training.php (rev 0) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/crons/get-spam-training.php 2018-10-31 10:25:03 UTC (rev 13394) @@ -0,0 +1,76 @@ +<?php +/** + * Email Account Propogation REST Services API + * + * You may not change or alter any portion of this comment or credits + * of supporting developers from this source code or any supporting source code + * which is considered copyrighted (c) material of the original comment or credit authors. + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. + * + * @copyright Chronolabs Cooperative http://syd.au.snails.email + * @license ACADEMIC APL 2 (https://sourceforge.net/u/chronolabscoop/wiki/Academic%20Public%20License%2C%20version%202.0/) + * @license GNU GPL 3 (http://www.gnu.org/licenses/gpl.html) + * @package emails-api + * @since 1.1.11 + * @author Dr. Simon Antony Roberts <simon@snails.email> + * @version 1.1.11 + * @description A REST API for the creation and management of emails/forwarders and domain name parks for email + * @link http://internetfounder.wordpress.com + * @link https://github.com/Chronolabs-Cooperative/Emails-API-PHP + * @link https://sourceforge.net/p/chronolabs-cooperative + * @link https://facebook.com/ChronolabsCoop + * @link https://twitter.com/ChronolabsCoop + * + */ + +require_once dirname(__DIR__) . DIRECTORY_SEPARATOR . 'apiconfig.php'; +require_once dirname(__DIR__) . DIRECTORY_SEPARATOR . 'class' . DIRECTORY_SEPARATOR . 'apimailer.php'; + +$start = time(); +if ($staters = APICache::read('get-spam-training')) +{ + $staters[] = $start; + sort($staters, SORT_ASC); + if (count($starters)>50) + unset($starters[0]); + sort($staters, SORT_ASC); + APICache::write('get-spam-training', $staters, 3600 * 24 * 7 * 4 * 6); + $keys = array_key($starters); + $avg = array(); + foreach($starters as $key => $starting) { + if (isset($keys[$key - 1])) { + $avg[] = abs($starting - $starters[$keys[$key - 1]]); + } + } + if (count($avg) > 0 ) { + foreach($avg as $average) + $seconds += $average; + $seconds = $seconds / count($avg); + } else + $seconds = 1800; +} else { + APICache::write('get-spam-training', array(0=>$start), 3600 * 24 * 7 * 4 * 6); + $seconds = 1800; +} + + +define("SPAM_FOLDERS", 'spam|junk|Spam|SPAM|Junk|JUNK'); +$folders = getCompleteDirListAsArray(API_MAILDIR_PATH); +shuffle($folders); +shuffle($folders); +shuffle($folders); +foreach(explode("|", SPAM_FOLDERS) as $spamfolder) + foreach($folders as $folder) + if (strpos($folder, $spamfolder) > 0) { + foreach(getFileListAsArray($folder) as $file) { + if (file_exists(__DIR__ . DS . 'spamassassin-training.sh')) + $sh = file(__DIR__ . DS . 'spamassassin-training.sh'); + else + $sh = array(0=>'unlink "' . __DIR__ . DS . 'spamassassin-training.sh' . '"\n'); + $sh[] = "sa-learn --spam --file \"$folder" . DS . basename($file) . "\"\n"; + $sh[] = "unlink \"$folder" . DS . basename($file) . "\"\n"; + writeRawFile(__DIR__ . DS . 'spamassassin-training.sh', implode("", $sh)); + } + } \ No newline at end of file Modified: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/include/version.php =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/include/version.php 2018-10-26 18:38:15 UTC (rev 13393) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/include/version.php 2018-10-31 10:25:03 UTC (rev 13394) @@ -41,5 +41,5 @@ /** * Define API version */ -define('API_VERSION', 'Emails Propogation REST Services API 1.0.3'); +define('API_VERSION', 'Emails Propogation REST Services API 1.0.4'); define('API_TYPE', 'emails-api'); Added: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Jessie (8.x)/spamassassin.html =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Jessie (8.x)/spamassassin.html (rev 0) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Jessie (8.x)/spamassassin.html 2018-10-31 10:25:03 UTC (rev 13394) @@ -0,0 +1,319 @@ + +<article> +<section> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo apt-get install spamassassin spamc</textarea> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Adding Spamassassin User</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo groupadd spamd</textarea> + </div> +<div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo useradd -g spamd -s /bin/false -d /var/log/spamassassin spamd</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo mkdir /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo chown spamd:spamd /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin</legend> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/default/spamassassin</textarea> + <textarea class="filecontent" rows="21" readonly># /etc/default/spamassassin +# Duncan Findlay + +SAHOME="/var/log/spamassassin/" + +# WARNING: please read README.spamd before using. +# There may be security risks. + +# If you're using systemd (default for jessie), the ENABLED setting is +# not used. Instead, enable spamd by issuing: +# systemctl enable spamassassin.service +# Change to "1" to enable spamd on systems using sysvinit: +ENABLED=1 + +# Options +# See man spamd for possible options. The -d option is automatically added. + +# SpamAssassin uses a preforking model, so be careful! You need to +# make sure --max-children is not set to anything higher than 5, +# unless you know what you're doing. + +OPTIONS="--create-prefs --max-children 5 --helper-home-dir --username spamd \-H ${SAHOME} -s ${SAHOME}spamd.log" + +# Pid file +# Where should spamd write its PID to file? If you use the -u or +# --username option above, this needs to be writable by that user. +# Otherwise, the init script will not be able to shut spamd down. +PIDFILE="/var/run/spamd.pid" + +# Set nice level of spamd +#NICE="--nicelevel 15" + +# Cronjob +# Set to anything but 0 to enable the cron job to automatically update +# spamassassin's rules on a nightly basis +CRON=1 +</textarea> +</div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo service spamassassin start</textarea> + </div> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Postfix</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/postfix/master.cf</textarea> + <textarea class="filecontent" rows="21" readonly># +# Postfix master process configuration file. For details on the format +# of the file, see the master(5) manual page (command: "man 5 master" or +# on-line: http://www.postfix.org/master.5.html). +# +# Do not forget to execute "postfix reload" after editing this file. +# +# ========================================================================== +# service type private unpriv chroot wakeup maxproc command + args +# (yes) (yes) (no) (never) (100) +# ========================================================================== +smtp inet n - y - - smtpd + -o content_filter=spamassassin +#smtp inet n - y - 1 postscreen +#smtpd pass - - y - - smtpd +#dnsblog unix - - y - 0 dnsblog +#tlsproxy unix - - y - 0 tlsproxy +#submission inet n - y - - smtpd +# -o syslog_name=postfix/submission +# -o smtpd_tls_security_level=encrypt +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_tls_auth_only=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#smtps inet n - y - - smtpd +# -o syslog_name=postfix/smtps +# -o smtpd_tls_wrappermode=yes +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#628 inet n - y - - qmqpd +pickup unix n - y 60 1 pickup +cleanup unix n - y - 0 cleanup +qmgr unix n - n 300 1 qmgr +#qmgr unix n - n 300 1 oqmgr +tlsmgr unix - - y 1000? 1 tlsmgr +rewrite unix - - y - - trivial-rewrite +bounce unix - - y - 0 bounce +defer unix - - y - 0 bounce +trace unix - - y - 0 bounce +verify unix - - y - 1 verify +flush unix n - y 1000? 0 flush +proxymap unix - - n - - proxymap +proxywrite unix - - n - 1 proxymap +smtp unix - - y - - smtp +relay unix - - y - - smtp + -o syslog_name=postfix/$service_name +# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 +showq unix n - y - - showq +error unix - - y - - error +retry unix - - y - - error +discard unix - - y - - discard +local unix - n n - - local +virtual unix - n n - - virtual +lmtp unix - - y - - lmtp +anvil unix - - y - 1 anvil +scache unix - - y - 1 scache +# +# ==================================================================== +# Interfaces to non-Postfix software. Be sure to examine the manual +# pages of the non-Postfix software to find out what options it wants. +# +# Many of the following services use the Postfix pipe(8) delivery +# agent. See the pipe(8) man page for information about ${recipient} +# and other message envelope options. +# ==================================================================== +# +# maildrop. See the Postfix MAILDROP_README file for details. +# Also specify in main.cf: maildrop_destination_recipient_limit=1 +# +maildrop unix - n n - - pipe + flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient} +# +# ==================================================================== +# +# Recent Cyrus versions can use the existing "lmtp" master.cf entry. +# +# Specify in cyrus.conf: +# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4 +# +# Specify in main.cf one or more of the following: +# mailbox_transport = lmtp:inet:localhost +# virtual_transport = lmtp:inet:localhost +# +# ==================================================================== +# +# Cyrus 2.1.5 (Amos Gouaux) +# Also specify in main.cf: cyrus_destination_recipient_limit=1 +# +#cyrus unix - n n - - pipe +# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} +# +# ==================================================================== +# Old example of delivery via Cyrus. +# +#old-cyrus unix - n n - - pipe +# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user} +# +# ==================================================================== +# +# See the Postfix UUCP_README file for configuration details. +# +uucp unix - n n - - pipe + flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) +# +# Other external delivery methods. +# +ifmail unix - n n - - pipe + flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) +bsmtp unix - n n - - pipe + flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient +scalemail-backend unix - n n - 2 pipe + flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} +mailman unix - n n - - pipe + flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py + ${nexthop} ${user} +spamassassin unix - n n - - pipe + user=spamd argv=/usr/bin/spamc -f -e + /usr/sbin/sendmail -oi -f ${sender} ${recipient} + </textarea> + </div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service postfix restart</textarea> + </div> + +</fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin on your Email Services</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/spamassassin/local.cf</textarea> + <textarea class="filecontent" rows="8" readonly># This is the right place to customize your installation of SpamAssassin. +# +# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be +# tweaked. +# +# Only a small subset of options are listed below +# +########################################################################### + +# Add *****SPAM***** to the Subject header of spam e-mails +# +# rewrite_header Subject *****SPAM***** +rewrite_header [***** SPAM _SCORE_ *****] Subject + +# Save spam messages as a message/rfc822 MIME attachment instead of +# modifying the original message (0: off, 2: use text/plain instead) +# +# report_safe 1 + + +# Set which networks or hosts are considered 'trusted' by your mail +# server (i.e. not spammers) +# +# trusted_networks 212.17.35. + + +# Set file-locking method (flock is not safe over NFS, but is faster) +# +# lock_method flock + + +# Set the threshold at which a message is considered spam (default: 5.0) +# +# required_score 5.0 +required_score 3.75 + +# Use Bayesian classifier (default: 1) +# +# use_bayes 1 +use_bayes 1 + +# Bayesian classifier auto-learning (default: 1) +# +# bayes_auto_learn 1 +bayes_auto_learn 1 + +# Set headers which may provide inappropriate cues to the Bayesian +# classifier +# +# bayes_ignore_header X-Bogosity +# bayes_ignore_header X-Spam-Flag +# bayes_ignore_header X-Spam-Status + + +# Whether to decode non- UTF-8 and non-ASCII textual parts and recode +# them to UTF-8 before the text is given over to rules processing. +# +# normalize_charset 1 +normalize_charset 1 + +# Some shortcircuiting, if the plugin is enabled +# +ifplugin Mail::SpamAssassin::Plugin::Shortcircuit +# +# default: strongly-whitelisted mails are *really* whitelisted now, if the +# shortcircuiting plugin is active, causing early exit to save CPU load. +# Uncomment to turn this on +# +# shortcircuit USER_IN_WHITELIST on +# shortcircuit USER_IN_DEF_WHITELIST on +# shortcircuit USER_IN_ALL_SPAM_TO on +# shortcircuit SUBJECT_IN_WHITELIST on + +# the opposite; blacklisted mails can also save CPU +# +# shortcircuit USER_IN_BLACKLIST on +# shortcircuit USER_IN_BLACKLIST_TO on +# shortcircuit SUBJECT_IN_BLACKLIST on + +# if you have taken the time to correctly specify your "trusted_networks", +# this is another good way to save CPU +# +# shortcircuit ALL_TRUSTED on + +# and a well-trained bayes DB can save running rules, too +# +shortcircuit BAYES_99 spam +shortcircuit BAYES_00 ham + +endif # Mail::SpamAssassin::Plugin::Shortcircuit +</textarea> +</div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service spamassassin restart</textarea> + </div> + </fieldset> +</div> + </section> +</article> Property changes on: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Jessie (8.x)/spamassassin.html ___________________________________________________________________ Added: svn:executable ## -0,0 +1 ## +* \ No newline at end of property Added: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Wheezy (7.x)/spamassassin.html =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Wheezy (7.x)/spamassassin.html (rev 0) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Wheezy (7.x)/spamassassin.html 2018-10-31 10:25:03 UTC (rev 13394) @@ -0,0 +1,319 @@ + +<article> +<section> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo apt-get install spamassassin spamc</textarea> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Adding Spamassassin User</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo groupadd spamd</textarea> + </div> +<div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo useradd -g spamd -s /bin/false -d /var/log/spamassassin spamd</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo mkdir /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo chown spamd:spamd /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin</legend> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/default/spamassassin</textarea> + <textarea class="filecontent" rows="21" readonly># /etc/default/spamassassin +# Duncan Findlay + +SAHOME="/var/log/spamassassin/" + +# WARNING: please read README.spamd before using. +# There may be security risks. + +# If you're using systemd (default for jessie), the ENABLED setting is +# not used. Instead, enable spamd by issuing: +# systemctl enable spamassassin.service +# Change to "1" to enable spamd on systems using sysvinit: +ENABLED=1 + +# Options +# See man spamd for possible options. The -d option is automatically added. + +# SpamAssassin uses a preforking model, so be careful! You need to +# make sure --max-children is not set to anything higher than 5, +# unless you know what you're doing. + +OPTIONS="--create-prefs --max-children 5 --helper-home-dir --username spamd \-H ${SAHOME} -s ${SAHOME}spamd.log" + +# Pid file +# Where should spamd write its PID to file? If you use the -u or +# --username option above, this needs to be writable by that user. +# Otherwise, the init script will not be able to shut spamd down. +PIDFILE="/var/run/spamd.pid" + +# Set nice level of spamd +#NICE="--nicelevel 15" + +# Cronjob +# Set to anything but 0 to enable the cron job to automatically update +# spamassassin's rules on a nightly basis +CRON=1 +</textarea> +</div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo service spamassassin start</textarea> + </div> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Postfix</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/postfix/master.cf</textarea> + <textarea class="filecontent" rows="21" readonly># +# Postfix master process configuration file. For details on the format +# of the file, see the master(5) manual page (command: "man 5 master" or +# on-line: http://www.postfix.org/master.5.html). +# +# Do not forget to execute "postfix reload" after editing this file. +# +# ========================================================================== +# service type private unpriv chroot wakeup maxproc command + args +# (yes) (yes) (no) (never) (100) +# ========================================================================== +smtp inet n - y - - smtpd + -o content_filter=spamassassin +#smtp inet n - y - 1 postscreen +#smtpd pass - - y - - smtpd +#dnsblog unix - - y - 0 dnsblog +#tlsproxy unix - - y - 0 tlsproxy +#submission inet n - y - - smtpd +# -o syslog_name=postfix/submission +# -o smtpd_tls_security_level=encrypt +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_tls_auth_only=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#smtps inet n - y - - smtpd +# -o syslog_name=postfix/smtps +# -o smtpd_tls_wrappermode=yes +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#628 inet n - y - - qmqpd +pickup unix n - y 60 1 pickup +cleanup unix n - y - 0 cleanup +qmgr unix n - n 300 1 qmgr +#qmgr unix n - n 300 1 oqmgr +tlsmgr unix - - y 1000? 1 tlsmgr +rewrite unix - - y - - trivial-rewrite +bounce unix - - y - 0 bounce +defer unix - - y - 0 bounce +trace unix - - y - 0 bounce +verify unix - - y - 1 verify +flush unix n - y 1000? 0 flush +proxymap unix - - n - - proxymap +proxywrite unix - - n - 1 proxymap +smtp unix - - y - - smtp +relay unix - - y - - smtp + -o syslog_name=postfix/$service_name +# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 +showq unix n - y - - showq +error unix - - y - - error +retry unix - - y - - error +discard unix - - y - - discard +local unix - n n - - local +virtual unix - n n - - virtual +lmtp unix - - y - - lmtp +anvil unix - - y - 1 anvil +scache unix - - y - 1 scache +# +# ==================================================================== +# Interfaces to non-Postfix software. Be sure to examine the manual +# pages of the non-Postfix software to find out what options it wants. +# +# Many of the following services use the Postfix pipe(8) delivery +# agent. See the pipe(8) man page for information about ${recipient} +# and other message envelope options. +# ==================================================================== +# +# maildrop. See the Postfix MAILDROP_README file for details. +# Also specify in main.cf: maildrop_destination_recipient_limit=1 +# +maildrop unix - n n - - pipe + flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient} +# +# ==================================================================== +# +# Recent Cyrus versions can use the existing "lmtp" master.cf entry. +# +# Specify in cyrus.conf: +# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4 +# +# Specify in main.cf one or more of the following: +# mailbox_transport = lmtp:inet:localhost +# virtual_transport = lmtp:inet:localhost +# +# ==================================================================== +# +# Cyrus 2.1.5 (Amos Gouaux) +# Also specify in main.cf: cyrus_destination_recipient_limit=1 +# +#cyrus unix - n n - - pipe +# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} +# +# ==================================================================== +# Old example of delivery via Cyrus. +# +#old-cyrus unix - n n - - pipe +# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user} +# +# ==================================================================== +# +# See the Postfix UUCP_README file for configuration details. +# +uucp unix - n n - - pipe + flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) +# +# Other external delivery methods. +# +ifmail unix - n n - - pipe + flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) +bsmtp unix - n n - - pipe + flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient +scalemail-backend unix - n n - 2 pipe + flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} +mailman unix - n n - - pipe + flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py + ${nexthop} ${user} +spamassassin unix - n n - - pipe + user=spamd argv=/usr/bin/spamc -f -e + /usr/sbin/sendmail -oi -f ${sender} ${recipient} + </textarea> + </div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service postfix restart</textarea> + </div> + +</fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin on your Email Services</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/spamassassin/local.cf</textarea> + <textarea class="filecontent" rows="8" readonly># This is the right place to customize your installation of SpamAssassin. +# +# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be +# tweaked. +# +# Only a small subset of options are listed below +# +########################################################################### + +# Add *****SPAM***** to the Subject header of spam e-mails +# +# rewrite_header Subject *****SPAM***** +rewrite_header [***** SPAM _SCORE_ *****] Subject + +# Save spam messages as a message/rfc822 MIME attachment instead of +# modifying the original message (0: off, 2: use text/plain instead) +# +# report_safe 1 + + +# Set which networks or hosts are considered 'trusted' by your mail +# server (i.e. not spammers) +# +# trusted_networks 212.17.35. + + +# Set file-locking method (flock is not safe over NFS, but is faster) +# +# lock_method flock + + +# Set the threshold at which a message is considered spam (default: 5.0) +# +# required_score 5.0 +required_score 3.75 + +# Use Bayesian classifier (default: 1) +# +# use_bayes 1 +use_bayes 1 + +# Bayesian classifier auto-learning (default: 1) +# +# bayes_auto_learn 1 +bayes_auto_learn 1 + +# Set headers which may provide inappropriate cues to the Bayesian +# classifier +# +# bayes_ignore_header X-Bogosity +# bayes_ignore_header X-Spam-Flag +# bayes_ignore_header X-Spam-Status + + +# Whether to decode non- UTF-8 and non-ASCII textual parts and recode +# them to UTF-8 before the text is given over to rules processing. +# +# normalize_charset 1 +normalize_charset 1 + +# Some shortcircuiting, if the plugin is enabled +# +ifplugin Mail::SpamAssassin::Plugin::Shortcircuit +# +# default: strongly-whitelisted mails are *really* whitelisted now, if the +# shortcircuiting plugin is active, causing early exit to save CPU load. +# Uncomment to turn this on +# +# shortcircuit USER_IN_WHITELIST on +# shortcircuit USER_IN_DEF_WHITELIST on +# shortcircuit USER_IN_ALL_SPAM_TO on +# shortcircuit SUBJECT_IN_WHITELIST on + +# the opposite; blacklisted mails can also save CPU +# +# shortcircuit USER_IN_BLACKLIST on +# shortcircuit USER_IN_BLACKLIST_TO on +# shortcircuit SUBJECT_IN_BLACKLIST on + +# if you have taken the time to correctly specify your "trusted_networks", +# this is another good way to save CPU +# +# shortcircuit ALL_TRUSTED on + +# and a well-trained bayes DB can save running rules, too +# +shortcircuit BAYES_99 spam +shortcircuit BAYES_00 ham + +endif # Mail::SpamAssassin::Plugin::Shortcircuit +</textarea> +</div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service spamassassin restart</textarea> + </div> + </fieldset> +</div> + </section> +</article> Property changes on: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Debian Wheezy (7.x)/spamassassin.html ___________________________________________________________________ Added: svn:executable ## -0,0 +1 ## +* \ No newline at end of property Added: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Gentoo (2.2)/spamassassin.html =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Gentoo (2.2)/spamassassin.html (rev 0) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Gentoo (2.2)/spamassassin.html 2018-10-31 10:25:03 UTC (rev 13394) @@ -0,0 +1,319 @@ + +<article> +<section> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo apt-get install spamassassin spamc</textarea> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Adding Spamassassin User</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo groupadd spamd</textarea> + </div> +<div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo useradd -g spamd -s /bin/false -d /var/log/spamassassin spamd</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo mkdir /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo chown spamd:spamd /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin</legend> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/default/spamassassin</textarea> + <textarea class="filecontent" rows="21" readonly># /etc/default/spamassassin +# Duncan Findlay + +SAHOME="/var/log/spamassassin/" + +# WARNING: please read README.spamd before using. +# There may be security risks. + +# If you're using systemd (default for jessie), the ENABLED setting is +# not used. Instead, enable spamd by issuing: +# systemctl enable spamassassin.service +# Change to "1" to enable spamd on systems using sysvinit: +ENABLED=1 + +# Options +# See man spamd for possible options. The -d option is automatically added. + +# SpamAssassin uses a preforking model, so be careful! You need to +# make sure --max-children is not set to anything higher than 5, +# unless you know what you're doing. + +OPTIONS="--create-prefs --max-children 5 --helper-home-dir --username spamd \-H ${SAHOME} -s ${SAHOME}spamd.log" + +# Pid file +# Where should spamd write its PID to file? If you use the -u or +# --username option above, this needs to be writable by that user. +# Otherwise, the init script will not be able to shut spamd down. +PIDFILE="/var/run/spamd.pid" + +# Set nice level of spamd +#NICE="--nicelevel 15" + +# Cronjob +# Set to anything but 0 to enable the cron job to automatically update +# spamassassin's rules on a nightly basis +CRON=1 +</textarea> +</div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo service spamassassin start</textarea> + </div> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Postfix</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/postfix/master.cf</textarea> + <textarea class="filecontent" rows="21" readonly># +# Postfix master process configuration file. For details on the format +# of the file, see the master(5) manual page (command: "man 5 master" or +# on-line: http://www.postfix.org/master.5.html). +# +# Do not forget to execute "postfix reload" after editing this file. +# +# ========================================================================== +# service type private unpriv chroot wakeup maxproc command + args +# (yes) (yes) (no) (never) (100) +# ========================================================================== +smtp inet n - y - - smtpd + -o content_filter=spamassassin +#smtp inet n - y - 1 postscreen +#smtpd pass - - y - - smtpd +#dnsblog unix - - y - 0 dnsblog +#tlsproxy unix - - y - 0 tlsproxy +#submission inet n - y - - smtpd +# -o syslog_name=postfix/submission +# -o smtpd_tls_security_level=encrypt +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_tls_auth_only=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#smtps inet n - y - - smtpd +# -o syslog_name=postfix/smtps +# -o smtpd_tls_wrappermode=yes +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#628 inet n - y - - qmqpd +pickup unix n - y 60 1 pickup +cleanup unix n - y - 0 cleanup +qmgr unix n - n 300 1 qmgr +#qmgr unix n - n 300 1 oqmgr +tlsmgr unix - - y 1000? 1 tlsmgr +rewrite unix - - y - - trivial-rewrite +bounce unix - - y - 0 bounce +defer unix - - y - 0 bounce +trace unix - - y - 0 bounce +verify unix - - y - 1 verify +flush unix n - y 1000? 0 flush +proxymap unix - - n - - proxymap +proxywrite unix - - n - 1 proxymap +smtp unix - - y - - smtp +relay unix - - y - - smtp + -o syslog_name=postfix/$service_name +# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 +showq unix n - y - - showq +error unix - - y - - error +retry unix - - y - - error +discard unix - - y - - discard +local unix - n n - - local +virtual unix - n n - - virtual +lmtp unix - - y - - lmtp +anvil unix - - y - 1 anvil +scache unix - - y - 1 scache +# +# ==================================================================== +# Interfaces to non-Postfix software. Be sure to examine the manual +# pages of the non-Postfix software to find out what options it wants. +# +# Many of the following services use the Postfix pipe(8) delivery +# agent. See the pipe(8) man page for information about ${recipient} +# and other message envelope options. +# ==================================================================== +# +# maildrop. See the Postfix MAILDROP_README file for details. +# Also specify in main.cf: maildrop_destination_recipient_limit=1 +# +maildrop unix - n n - - pipe + flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient} +# +# ==================================================================== +# +# Recent Cyrus versions can use the existing "lmtp" master.cf entry. +# +# Specify in cyrus.conf: +# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4 +# +# Specify in main.cf one or more of the following: +# mailbox_transport = lmtp:inet:localhost +# virtual_transport = lmtp:inet:localhost +# +# ==================================================================== +# +# Cyrus 2.1.5 (Amos Gouaux) +# Also specify in main.cf: cyrus_destination_recipient_limit=1 +# +#cyrus unix - n n - - pipe +# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} +# +# ==================================================================== +# Old example of delivery via Cyrus. +# +#old-cyrus unix - n n - - pipe +# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user} +# +# ==================================================================== +# +# See the Postfix UUCP_README file for configuration details. +# +uucp unix - n n - - pipe + flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) +# +# Other external delivery methods. +# +ifmail unix - n n - - pipe + flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) +bsmtp unix - n n - - pipe + flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient +scalemail-backend unix - n n - 2 pipe + flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} +mailman unix - n n - - pipe + flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py + ${nexthop} ${user} +spamassassin unix - n n - - pipe + user=spamd argv=/usr/bin/spamc -f -e + /usr/sbin/sendmail -oi -f ${sender} ${recipient} + </textarea> + </div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service postfix restart</textarea> + </div> + +</fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin on your Email Services</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/spamassassin/local.cf</textarea> + <textarea class="filecontent" rows="8" readonly># This is the right place to customize your installation of SpamAssassin. +# +# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be +# tweaked. +# +# Only a small subset of options are listed below +# +########################################################################### + +# Add *****SPAM***** to the Subject header of spam e-mails +# +# rewrite_header Subject *****SPAM***** +rewrite_header [***** SPAM _SCORE_ *****] Subject + +# Save spam messages as a message/rfc822 MIME attachment instead of +# modifying the original message (0: off, 2: use text/plain instead) +# +# report_safe 1 + + +# Set which networks or hosts are considered 'trusted' by your mail +# server (i.e. not spammers) +# +# trusted_networks 212.17.35. + + +# Set file-locking method (flock is not safe over NFS, but is faster) +# +# lock_method flock + + +# Set the threshold at which a message is considered spam (default: 5.0) +# +# required_score 5.0 +required_score 3.75 + +# Use Bayesian classifier (default: 1) +# +# use_bayes 1 +use_bayes 1 + +# Bayesian classifier auto-learning (default: 1) +# +# bayes_auto_learn 1 +bayes_auto_learn 1 + +# Set headers which may provide inappropriate cues to the Bayesian +# classifier +# +# bayes_ignore_header X-Bogosity +# bayes_ignore_header X-Spam-Flag +# bayes_ignore_header X-Spam-Status + + +# Whether to decode non- UTF-8 and non-ASCII textual parts and recode +# them to UTF-8 before the text is given over to rules processing. +# +# normalize_charset 1 +normalize_charset 1 + +# Some shortcircuiting, if the plugin is enabled +# +ifplugin Mail::SpamAssassin::Plugin::Shortcircuit +# +# default: strongly-whitelisted mails are *really* whitelisted now, if the +# shortcircuiting plugin is active, causing early exit to save CPU load. +# Uncomment to turn this on +# +# shortcircuit USER_IN_WHITELIST on +# shortcircuit USER_IN_DEF_WHITELIST on +# shortcircuit USER_IN_ALL_SPAM_TO on +# shortcircuit SUBJECT_IN_WHITELIST on + +# the opposite; blacklisted mails can also save CPU +# +# shortcircuit USER_IN_BLACKLIST on +# shortcircuit USER_IN_BLACKLIST_TO on +# shortcircuit SUBJECT_IN_BLACKLIST on + +# if you have taken the time to correctly specify your "trusted_networks", +# this is another good way to save CPU +# +# shortcircuit ALL_TRUSTED on + +# and a well-trained bayes DB can save running rules, too +# +shortcircuit BAYES_99 spam +shortcircuit BAYES_00 ham + +endif # Mail::SpamAssassin::Plugin::Shortcircuit +</textarea> +</div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service spamassassin restart</textarea> + </div> + </fieldset> +</div> + </section> +</article> Property changes on: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Gentoo (2.2)/spamassassin.html ___________________________________________________________________ Added: svn:executable ## -0,0 +1 ## +* \ No newline at end of property Added: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/RHEL CentOS (7)/spamassassin.html =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/RHEL CentOS (7)/spamassassin.html (rev 0) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/RHEL CentOS (7)/spamassassin.html 2018-10-31 10:25:03 UTC (rev 13394) @@ -0,0 +1,319 @@ + +<article> +<section> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo apt-get install spamassassin spamc</textarea> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Adding Spamassassin User</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo groupadd spamd</textarea> + </div> +<div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo useradd -g spamd -s /bin/false -d /var/log/spamassassin spamd</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo mkdir /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo chown spamd:spamd /var/log/spamassassin</textarea> + </div> + <div class="pushbot"> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin</legend> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/default/spamassassin</textarea> + <textarea class="filecontent" rows="21" readonly># /etc/default/spamassassin +# Duncan Findlay + +SAHOME="/var/log/spamassassin/" + +# WARNING: please read README.spamd before using. +# There may be security risks. + +# If you're using systemd (default for jessie), the ENABLED setting is +# not used. Instead, enable spamd by issuing: +# systemctl enable spamassassin.service +# Change to "1" to enable spamd on systems using sysvinit: +ENABLED=1 + +# Options +# See man spamd for possible options. The -d option is automatically added. + +# SpamAssassin uses a preforking model, so be careful! You need to +# make sure --max-children is not set to anything higher than 5, +# unless you know what you're doing. + +OPTIONS="--create-prefs --max-children 5 --helper-home-dir --username spamd \-H ${SAHOME} -s ${SAHOME}spamd.log" + +# Pid file +# Where should spamd write its PID to file? If you use the -u or +# --username option above, this needs to be writable by that user. +# Otherwise, the init script will not be able to shut spamd down. +PIDFILE="/var/run/spamd.pid" + +# Set nice level of spamd +#NICE="--nicelevel 15" + +# Cronjob +# Set to anything but 0 to enable the cron job to automatically update +# spamassassin's rules on a nightly basis +CRON=1 +</textarea> +</div> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo service spamassassin start</textarea> + </div> + </fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Postfix</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/postfix/master.cf</textarea> + <textarea class="filecontent" rows="21" readonly># +# Postfix master process configuration file. For details on the format +# of the file, see the master(5) manual page (command: "man 5 master" or +# on-line: http://www.postfix.org/master.5.html). +# +# Do not forget to execute "postfix reload" after editing this file. +# +# ========================================================================== +# service type private unpriv chroot wakeup maxproc command + args +# (yes) (yes) (no) (never) (100) +# ========================================================================== +smtp inet n - y - - smtpd + -o content_filter=spamassassin +#smtp inet n - y - 1 postscreen +#smtpd pass - - y - - smtpd +#dnsblog unix - - y - 0 dnsblog +#tlsproxy unix - - y - 0 tlsproxy +#submission inet n - y - - smtpd +# -o syslog_name=postfix/submission +# -o smtpd_tls_security_level=encrypt +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_tls_auth_only=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#smtps inet n - y - - smtpd +# -o syslog_name=postfix/smtps +# -o smtpd_tls_wrappermode=yes +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#628 inet n - y - - qmqpd +pickup unix n - y 60 1 pickup +cleanup unix n - y - 0 cleanup +qmgr unix n - n 300 1 qmgr +#qmgr unix n - n 300 1 oqmgr +tlsmgr unix - - y 1000? 1 tlsmgr +rewrite unix - - y - - trivial-rewrite +bounce unix - - y - 0 bounce +defer unix - - y - 0 bounce +trace unix - - y - 0 bounce +verify unix - - y - 1 verify +flush unix n - y 1000? 0 flush +proxymap unix - - n - - proxymap +proxywrite unix - - n - 1 proxymap +smtp unix - - y - - smtp +relay unix - - y - - smtp + -o syslog_name=postfix/$service_name +# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 +showq unix n - y - - showq +error unix - - y - - error +retry unix - - y - - error +discard unix - - y - - discard +local unix - n n - - local +virtual unix - n n - - virtual +lmtp unix - - y - - lmtp +anvil unix - - y - 1 anvil +scache unix - - y - 1 scache +# +# ==================================================================== +# Interfaces to non-Postfix software. Be sure to examine the manual +# pages of the non-Postfix software to find out what options it wants. +# +# Many of the following services use the Postfix pipe(8) delivery +# agent. See the pipe(8) man page for information about ${recipient} +# and other message envelope options. +# ==================================================================== +# +# maildrop. See the Postfix MAILDROP_README file for details. +# Also specify in main.cf: maildrop_destination_recipient_limit=1 +# +maildrop unix - n n - - pipe + flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient} +# +# ==================================================================== +# +# Recent Cyrus versions can use the existing "lmtp" master.cf entry. +# +# Specify in cyrus.conf: +# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4 +# +# Specify in main.cf one or more of the following: +# mailbox_transport = lmtp:inet:localhost +# virtual_transport = lmtp:inet:localhost +# +# ==================================================================== +# +# Cyrus 2.1.5 (Amos Gouaux) +# Also specify in main.cf: cyrus_destination_recipient_limit=1 +# +#cyrus unix - n n - - pipe +# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} +# +# ==================================================================== +# Old example of delivery via Cyrus. +# +#old-cyrus unix - n n - - pipe +# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user} +# +# ==================================================================== +# +# See the Postfix UUCP_README file for configuration details. +# +uucp unix - n n - - pipe + flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) +# +# Other external delivery methods. +# +ifmail unix - n n - - pipe + flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) +bsmtp unix - n n - - pipe + flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient +scalemail-backend unix - n n - 2 pipe + flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} +mailman unix - n n - - pipe + flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py + ${nexthop} ${user} +spamassassin unix - n n - - pipe + user=spamd argv=/usr/bin/spamc -f -e + /usr/sbin/sendmail -oi -f ${sender} ${recipient} + </textarea> + </div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service postfix restart</textarea> + </div> + +</fieldset> +</div> +<div class="filesub"> + <fieldset class="file"> + <legend>Configuring Spamassassin on your Email Services</legend> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo /usr/bin/nano /etc/spamassassin/local.cf</textarea> + <textarea class="filecontent" rows="8" readonly># This is the right place to customize your installation of SpamAssassin. +# +# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be +# tweaked. +# +# Only a small subset of options are listed below +# +########################################################################### + +# Add *****SPAM***** to the Subject header of spam e-mails +# +# rewrite_header Subject *****SPAM***** +rewrite_header [***** SPAM _SCORE_ *****] Subject + +# Save spam messages as a message/rfc822 MIME attachment instead of +# modifying the original message (0: off, 2: use text/plain instead) +# +# report_safe 1 + + +# Set which networks or hosts are considered 'trusted' by your mail +# server (i.e. not spammers) +# +# trusted_networks 212.17.35. + + +# Set file-locking method (flock is not safe over NFS, but is faster) +# +# lock_method flock + + +# Set the threshold at which a message is considered spam (default: 5.0) +# +# required_score 5.0 +required_score 3.75 + +# Use Bayesian classifier (default: 1) +# +# use_bayes 1 +use_bayes 1 + +# Bayesian classifier auto-learning (default: 1) +# +# bayes_auto_learn 1 +bayes_auto_learn 1 + +# Set headers which may provide inappropriate cues to the Bayesian +# classifier +# +# bayes_ignore_header X-Bogosity +# bayes_ignore_header X-Spam-Flag +# bayes_ignore_header X-Spam-Status + + +# Whether to decode non- UTF-8 and non-ASCII textual parts and recode +# them to UTF-8 before the text is given over to rules processing. +# +# normalize_charset 1 +normalize_charset 1 + +# Some shortcircuiting, if the plugin is enabled +# +ifplugin Mail::SpamAssassin::Plugin::Shortcircuit +# +# default: strongly-whitelisted mails are *really* whitelisted now, if the +# shortcircuiting plugin is active, causing early exit to save CPU load. +# Uncomment to turn this on +# +# shortcircuit USER_IN_WHITELIST on +# shortcircuit USER_IN_DEF_WHITELIST on +# shortcircuit USER_IN_ALL_SPAM_TO on +# shortcircuit SUBJECT_IN_WHITELIST on + +# the opposite; blacklisted mails can also save CPU +# +# shortcircuit USER_IN_BLACKLIST on +# shortcircuit USER_IN_BLACKLIST_TO on +# shortcircuit SUBJECT_IN_BLACKLIST on + +# if you have taken the time to correctly specify your "trusted_networks", +# this is another good way to save CPU +# +# shortcircuit ALL_TRUSTED on + +# and a well-trained bayes DB can save running rules, too +# +shortcircuit BAYES_99 spam +shortcircuit BAYES_00 ham + +endif # Mail::SpamAssassin::Plugin::Shortcircuit +</textarea> +</div> + + <div class="pushbot"> + <textarea class="shell" rows="2" readonly>sudo service spamassassin restart</textarea> + </div> + </fieldset> +</div> + </section> +</article> Property changes on: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/RHEL CentOS (7)/spamassassin.html ___________________________________________________________________ Added: svn:executable ## -0,0 +1 ## +* \ No newline at end of property Added: *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Ubuntu Precise (12.04)/spamassassin.html =================================================================== --- *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Ubuntu Precise (12.04)/spamassassin.html (rev 0) +++ *.xoops.org (Subdomain APIs & Sites)/email.xoops.org/install/assets/configs/Ubuntu Precise (12.04)/spamassassin.html 2018-10-31 10:25:03 UTC (rev 13394) @@ -0,0 +1,319 @@ + +<article> +<section> + <div class="pushbot"> + <textarea class="shell" rows="1" readonly>sudo apt-get install spamassassin spamc</textarea> +</div> +<... [truncated message content] |