• Willkommen im Linux Club - dem deutschsprachigen Supportforum für GNU/Linux. Registriere dich kostenlos, um alle Inhalte zu sehen und Fragen zu stellen.

SA-amavisd-new markiert keine SPAMs, seit...

Status
Für weitere Antworten geschlossen.

fly

Newbie
Moin!

SA-amavisd-new tut nichts mehr gegen SPAM, seit die Mails nicht mehr am Mailserver umgeschrieben werden, obwohl ich in der amavisd.conf bzw. local.conf nichts mehr geändert habe. spamd bzw. amavisd habe ich natürlich neu gestartet.

Hier meine amavisd.conf
Code:
use strict;
$MYHOME = '/var/lib/amavis';   # (default is '/var/amavis')
$mydomain = 'localhost';      # (no useful default)
$daemon_user  = 'amavis';       # (no default (undef))
$daemon_group = 'amavis';       # (no default (undef))
$TEMPBASE = $MYHOME;           # (must be set if other config vars use is)
$pid_file  = "/var/run/amavis/amavisd.pid";  # (default: "$MYHOME/amavisd.pid")
$lock_file = "/var/run/amavis/amavisd.lock"; # (default: "$MYHOME/amavisd.lock")
$ENV{TMPDIR} = $TEMPBASE;       # wise to set TMPDIR, but not obligatory
$max_servers  =  2;   # number of pre-forked children          (default 2)
$max_requests = 10;   # retire a child after that many accepts (default 10)
$child_timeout=5*60;  # abort child if it does not complete each task in n sec
                      # (default: 8*60 seconds)
@local_domains_acl = ( ".$mydomain" );  # $mydomain and its subdomains
$relayhost_is_client = 0;         # (defaults to false)
$insert_received_line = 1;        # behave like MTA: insert 'Received:' header
                                  # (does not apply to sendmail/milter)
                                  # (default is true (1) )
$unix_socketname = undef;         # disable listening on a unix socket
                                  # (default is undef, i.e. disabled)
$inet_socket_port = 10024;        # accept SMTP on this local TCP port
                                  # (default is undef, i.e. disabled)
$inet_socket_bind = '127.0.0.1';  # limit socket bind to loopback interface
                                  # (default is '127.0.0.1')
@inet_acl = qw( 127.0.0.1 );      # allow SMTP access only from localhost IP
                                  # (default is qw( 127.0.0.1 ) )
$DO_SYSLOG = 1;                 # (defaults to false)
$LOGFILE = "/var/log/amavis.log";  # (defaults to empty, no log)
$log_templ = '[? %#V |[? %#F |[?%#D|Not-Delivered|Passed]|BANNED name/type (%F)]|INFECTED (%V)], #
[?%o|(?)|<%o>] -> [<%R>|,][? %i ||, quarantine %i], Message-ID: %m, Hits: %c';
read_l10n_templates('en_US', '/etc/amavis');
$final_virus_destiny      = D_REJECT; # (defaults to D_BOUNCE)
$final_banned_destiny     = D_REJECT;  # (defaults to D_BOUNCE)
$final_spam_destiny       = D_PASS;  # (defaults to D_REJECT)
$final_bad_header_destiny = D_PASS;  # (defaults to D_PASS), D_BOUNCE suggested
$viruses_that_fake_sender_re = new_RE(
  qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,
  qr'tanatos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,
  qr'dloader|galil|gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,
  qr'frethem|sircam|be?agle|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,
  qr'@mm|@MM',    # mass mailing viruses as labeled by f-prot and uvscan
  qr'Worm'i,      # worms as labeled by ClamAV, Kaspersky, etc
  [qr'^(EICAR|Joke\.|Junk\.)'i         => 0],
  [qr'^(WM97|OF97|W95/CIH-|JS/Fort)'i  => 0],
  [qr/.*/ => 1],  # true by default  (remove or comment-out if undesired)
);
$virus_admin = "postmaster\@$mydomain";         # due to D_DISCARD default
$mailfrom_to_quarantine = '';   # override sender address with null return path
$QUARANTINEDIR = '/var/lib/amavis/virusmails';
$virus_quarantine_to  = 'virus-quarantine';    # traditional local quarantine
$spam_quarantine_to = 'spam-quarantine';
$X_HEADER_TAG = 'X-Virus-Scanned';      # (default: undef)
$X_HEADER_LINE = "by $myversion (Debian) at $mydomain";
$undecipherable_subject_tag = '***UNCHECKED*** ';  # undef disables it
$remove_existing_x_scanned_headers = 0; # leave existing X-Virus-Scanned alone
                                        # (defaults to false)
$remove_existing_spam_headers  = 1;     # remove existing spam headers if
                                        # spam scanning is enabled (default)
$keep_decoded_original_re = new_RE(
  qr'^MAIL-UNDECIPHERABLE$',  # retain full mail if it contains undecipherables
  qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
);
$banned_filename_re = new_RE(
   qr'\.[^.]*\.(exe|vbs|pif|scr|bat|cmd|com|dll)$'i, # some double extensions
   qr'[{}]',     # curly braces in names (serve as Class ID extensions - CLSID)
   qr'^message/partial$'i,  # rfc2046. this one is deadly for Outcrook
);
$sql_select_white_black_list = undef;  # undef disables SQL white/blacklisting
$recipient_delimiter = '+';             # (default is '+')
$replace_existing_extension = 1;        # (default is false)
$localpart_is_case_sensitive = 0;       # (default is false)
$blacklist_sender_re = new_RE(
    qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou|greatcasino)@'i,
    qr'^(investments|lose_weight_today|market\.alert|money2you|MyGreenCard)@'i,
    qr'^(new\.tld\.registry|opt-out|opt-in|optin|saveonl|smoking2002k)@'i,
    qr'^(specialoffer|specialoffers|stockalert|stopsnoring|wantsome)@'i,
    qr'^(workathome|yesitsfree|your_friend|greatoffers)@'i,
    qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i,
);
map { $whitelist_sender{lc($_)}=1 } (qw(
  nobody@cert.org
  owner-alert@iss.net
  slashdot@slashdot.org
  bugtraq@securityfocus.com
  NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
  security-alerts@linuxsecurity.com
  amavis-user-admin@lists.sourceforge.net
  razor-users-admin@lists.sourceforge.net
  notification-return@lists.sophos.com
  mailman-announce-admin@python.org
  zope-announce-admin@zope.org
  owner-postfix-users@postfix.org
  owner-postfix-announce@postfix.org
  owner-sendmail-announce@lists.sendmail.org
  sendmail-announce-request@lists.sendmail.org
  ca+envelope@sendmail.org
  owner-technews@postel.ACM.ORG
  lvs-users-admin@LinuxVirtualServer.org
  ietf-123-owner@loki.ietf.org
  cvs-commits-list-admin@gnome.org
  rt-users-admin@lists.fsck.com
  owner-announce@mnogosearch.org
  owner-hackers@ntp.org
  owner-bugs@ntp.org
  clp-request@comp.nus.edu.sg
  surveys-errors@lists.nua.ie
  emailNews@genomeweb.com
  owner-textbreakingnews@CNNIMAIL12.CNN.COM
  yahoo-dev-null@yahoo-inc.com
));
$MAXLEVELS = 14;                # (default is undef, no limit)
$MAXFILES = 1500;               # (default is undef, no limit)
$MIN_EXPANSION_QUOTA =      100*1024;  # bytes  (default undef, not enforced)
$MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not enforced)
$MIN_EXPANSION_FACTOR =   5;  # times original mail size  (must be specified)
$MAX_EXPANSION_FACTOR = 500;  # times original mail size  (must be specified)
$path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
$file   = 'file';   # file(1) utility; use 3.41 or later to avoid vulnerability
$gzip   = 'gzip';
$bzip2  = 'bzip2';
$lzop   = 'lzop';
$uncompress = ['uncompress', 'gzip -d', 'zcat'];
$unfreeze   = ['unfreeze', 'freeze -d', 'melt', 'fcat'];
$arc        = ['nomarch', 'arc'];
$unarj      = ['arj', 'unarj'];  # both can extract, arj is recommended
$unrar      = ['rar', 'unrar'];  # both can extract, same options
$zoo    = 'zoo';
$lha    = 'lha';
$cpio   = 'cpio';   # comment out if cpio does not support GNU options
$sa_local_tests_only = 0;   # (default: false)
$sa_timeout = 30;           # timeout in seconds for a call to SpamAssassin
                            # (default is 30 seconds, undef disables it)
$sa_mail_body_size_limit = 150*1024;  # don't waste time on SA is mail is larger
                            # (less than 1% of spam is > 64k)
                            # default: undef, no limitations
$sa_tag_level_deflt  = -1000; # add spam info headers if at, or above that level
$sa_tag2_level_deflt = 2.5; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 10; #$sa_tag2_level_deflt; # triggers spam evasive actions
                           # at or above that level: bounce/reject/drop,
                           # quarantine, and adding mail address extension
$sa_dsn_cutoff_level = 10;  # spam level beyond which a DSN is not sent,
                            # effectively turning D_BOUNCE into D_DISCARD;
                            # undef disables this feature and is a default;
$sa_spam_subject_tag = '***SPAM*** ';   # (defaults to undef, disabled)
                             # (only seen when spam is not to be rejected
                             # and recipient is in local_domains*)
$first_infected_stops_scan = 1;  # default is false, all scanners are called
@av_scanners = (
  ### The kavdaemon and AVPDaemonClient have been removed from Kasperky
  ### products and replaced by aveserver and aveclient
    # change the startup-script in /etc/init.d/kavd to:
    #   DPARMS="-* -Y -dl -f=/var/amavis /var/amavis"
    #   (or perhaps:   DPARMS="-I0 -Y -* /var/amavis" )
    # adjusting /var/amavis above to match your $TEMPBASE.
    # The '-f=/var/amavis' is needed if not running it as root, so it
    # can find, read, and write its pid file, etc., see 'man kavdaemon'.
    # defUnix.prf: there must be an entry "*/var/amavis" (or whatever
    #   directory $TEMPBASE specifies) in the 'Names=' section.
    # cd /opt/AVP/DaemonClients; configure; cd Sample; make
    # cp AvpDaemonClient /opt/AVP/
    # su - vscan -c "${PREFIX}/kavdaemon ${DPARMS}"
  ### http://www.hbedv.com/ or http://www.centralcommand.com/
  ['H+BEDV AntiVir or CentralCommand Vexira Antivirus',
    ['antivir','vexira'],
    '--allfiles -noboot -nombr -rs -s -z {}', [0], qr/ALERT:|VIRUS:/,
    qr/(?x)^\s* (?: ALERT: \s* (?: \[ | [^']* ' ) |
         (?i) VIRUS:\ .*?\ virus\ '?) ( [^\]\s']+ )/ ],
    # NOTE: if you only have a demo version, remove -z and add 214, as in:

    #  '--allfiles -noboot -nombr -rs -s {}', [0,214], qr/ALERT:|VIRUS:/,
  ### http://www.commandsoftware.com/
  ### http://www.symantec.com/
  ### http://www.symantec.com/
    # NOTE: check options and patterns to see which entry better applies
  ### http://www.sald.com/, http://drweb.imshop.de/
  ### http://www.f-secure.com/products/anti-virus/
  ### http://www.nod32.com/
  ### http://www.nod32.com/
  ### http://www.norman.com/products_nvc.shtml
  ### http://www.pandasoftware.com/
  ### http://www.nai.com/
  # sub {$ENV{LD_PRELOAD}='/lib/libc.so.6'},
  # sub {delete $ENV{LD_PRELOAD}},
  # NOTE1: with RH9: force the dynamic linker to look at /lib/libc.so.6 before
  # anything else by setting environment variable LD_PRELOAD=/lib/libc.so.6
  # and then clear it when finished to avoid confusing anything else.
  # NOTE2: to treat encrypted files as viruses replace the [13] with:
  #  qr/^\s{5,}(Found|is password-protected|.*(virus|trojan))/
  ### http://www.virusbuster.hu/en/
    # VirusBuster Ltd. does not support the daemon version for the workstation
    # engine (vbuster-eng-1.12-linux-i386-libc6.tgz) any longer. The names of
    # binaries, some parameters AND return codes (from 3 to 1) changed.
  ### http://www.cyber.com/
  # sub {$ENV{VSTK_HOME}='/usr/lib/vstk'},
  ### http://www.ikarus-software.com/
  ### http://www.bitdefender.com/
);
@av_scanners_backup = (
  ### http://www.clamav.net/
  ['Clam Antivirus - clamscan', 'clamscan',
    "--stdout --no-summary -r --tempdir=$TEMPBASE {}", [0], [1],
    qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
 
);
1;  # insure a defined return
habe auch versucht, den Parameter:
Code:
$mydomain
statt localhost auf Domainname, nix passiert. Im mail.info sehe ich keine einzige Fehlermeldung von amavisd bzw spamd... spamd läuft natürlich... Ich hoffe mir kann jemand helfen, denn nach dem Fehler suche ich schon verzweifelt seit einige Tagen...

[EDIT]
Folgendes sehe ich wenn Mails abgerufen werden, scheint auch OK zu sein...
Code:
Oct 31 14:06:43 mailserver amavis[14627]: (14627-07) Passed, <fly007@networld.at> -> <username@domainname.local>, Message-ID: <E28D122D4B431342804D06BD7630E31D33804E@mail.networld.com>, Hits: -102.31
[EDIT]
 

crazyrolf

Advanced Hacker
$mydomain = 'localhost'; # (no useful default)

@local_domains_acl = ( ".$mydomain" ); # $mydomain and its subdomains

Wie heißt denn dein Rechner?
--------------------------------------------------------

$mydomain = 'localhost'; ????????????????

--------------------------------------------------------

$mydomain = 'rolf.server.home'; z.B.

@local_domains_acl = ( ".$mydomain","localhost" );
 
OP
F

fly

Newbie
Danke für den Tipp! Leider hat das mir nicht geholfen.
Ich habe den Rechnername wie hostname --fqdn ausgibt bei mydomain hinzugefügt, anschliessend eine Testmail geschickt.

Bekomme von Amavisd folgendes ins Header geschrieben:
Code:
X-Amavis-Alert: BAD HEADER Improper folded header field made up entirely of whitespace (char 00 hex) in message header 'X-Spam-Report'
	^

Weiss jemand auf welche Hinweis die Meldung sagt?

PS: Ich will amavisd-new nicht unbedingt updaten, wenn es nicht sein muss. Bei mir hat amavisd-new mit SA perfekt funktioniert, leider genau seit die Mails nicht mehr umgeschrieben werden... Naja, ich hoffe ihr könnt mir weitere Tipps geben...
 

crazyrolf

Advanced Hacker
Vielleicht solltest du die Anleitung oben (Linik) mal Schritt für Schritt durchgehen und deine Einstellungen kontrollieren.

@local_domains_maps = ( [".$mydomain", "localhost"] );
 
OP
F

fly

Newbie
Hallo!

Jetzt habe ich amavisd-new neu installiert, dmit ich in der Konfiguration die folgende Zeile verwenden kann, wo die alte Version nicht damit startet:
Code:
@local_domains_maps = ( [".$mydomain", "localhost"] );

Leider lässt sich amavisd-new nicht starten. Bekomme folgende Meldung:
Code:
Problem in Amavis::DB or Amavis::DB::SNMP code: Can't locate BerkeleyDB.pm in @INC (@INC contains: /etc/perl /usr/local/lib/perl/5.8.4 /usr/local/share/perl/5.8.4 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.8 /usr/share/perl/5.8 /usr/local/lib/site_perl) at (eval 35) line 12.
BEGIN failed--compilation aborted at (eval 35) line 12.
Ich habe genau nach der INSTALL Anleitung konfiguriert....

Mir ist schon aufgefallen, dass bei mir perl Verzeichnis nicht unter /usr/local/... liegt sondern /usr/sbin/...

Ich hoffe, dass hier jemand schon solche Erfahrungen gemacht hat bzw. mir jemand weiterhelfen kann.
 
OP
F

fly

Newbie
musste noch die Berkeley-libararies installieren und jetzt komme ich weiter...
 
OP
F

fly

Newbie
Moin,

auch mit der neuen Version werden keine SPAMs mehr markiert, wie oben beschrieben... Kann es sein, dass die SPAMs nicht markiert werden, weil am mailserver die domain wie domain.local heisst?

Anbei die Konfiguration der neuen Amavisd-new
Code:
use strict;
$max_servers = 2;            # number of pre-forked children (2..15 is common)
$daemon_user  = 'amavis';     # (no default;  customary: vscan or amavis)
$daemon_group = 'amavis';     # (no default;  customary: vscan or amavis)
$mydomain = 'domain.at';   # a convenient default for other settings
$MYHOME   = '/var/amavis';   # a convenient default for other settings
$TEMPBASE = "$MYHOME/tmp";   # working directory, needs to be created manually
$ENV{TMPDIR} = $TEMPBASE;    # environment variable TMPDIR
$QUARANTINEDIR = '/var/virusmails';
@local_domains_maps = ( [".$mydomain","localhost"]);
$log_level = 0;              # verbosity 0..5
$log_recip_templ = undef;    # disable by-recipient level-0 log entries
$DO_SYSLOG = 1;              # log via syslogd (preferred)
$SYSLOG_LEVEL = 'mail.debug';
$enable_db = 1;              # enable use of BerkeleyDB/libdb (SNMP and nanny)
$enable_global_cache = 1;    # enable use of libdb-based cache if $enable_db=1
$inet_socket_port = 10024;   # listen on this local TCP port(s) (see $protocol)
$sa_tag_level_deflt  = -1000;  # add spam info headers if at, or above that level
$sa_tag2_level_deflt = 2.50; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 10; # triggers spam evasive actions
$sa_dsn_cutoff_level = 10;    # spam level beyond which a DSN is not sent
$sa_mail_body_size_limit = 200*1024; # don't waste time on SA if mail is larger
$sa_local_tests_only = 0;    # only tests which do not require internet access?
$sa_auto_whitelist = 3;      # turn on AWL in SA 2.63 or older (irrelevant
                             # for SA 3.0, cf option is 'use_auto_whitelist')
$virus_admin               = "virusalert\@$mydomain";  # notifications recip.
$mailfrom_notify_admin     = "virusalert\@$mydomain";  # notifications sender
$mailfrom_notify_recip     = "virusalert\@$mydomain";  # notifications sender
$mailfrom_notify_spamadmin = "spam.police\@$mydomain"; # notifications sender
$mailfrom_to_quarantine = ''; # null return path; uses original sender if undef
@addr_extension_virus_maps      = ('virus');
@addr_extension_spam_maps       = ('spam');
@addr_extension_banned_maps     = ('banned');
@addr_extension_bad_header_maps = ('badh');
$path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
$MAXLEVELS = 14;
$MAXFILES = 1500;
$MIN_EXPANSION_QUOTA =      100*1024;  # bytes  (default undef, not enforced)
$MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not enforced)
$sa_spam_subject_tag = '***SPAM*** ';
$defang_virus  = 1;  # MIME-wrap passed infected mail
$defang_banned = 1;  # MIME-wrap passed mail containing banned name
$myhostname = 'mailserver.domain.local';  # must be a fully-qualified domain name!
$final_virus_destiny      = D_REJECT;
$final_banned_destiny     = D_REJECT;
$final_spam_destiny       = D_PASS;
$final_bad_header_destiny = D_PASS;
@viruses_that_fake_sender_maps = (new_RE(
  [qr/^/ => 1],  # true for everything else
));
@keep_decoded_original_maps = (new_RE(
  qr'^MAIL-UNDECIPHERABLE$', # recheck full mail if it contains undecipherables
  qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
));
$banned_filename_re = new_RE(
  qr'\.[^./]*[A-Za-z][^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
  qr'^application/x-msdownload$'i,                  # block these MIME types
  qr'^application/x-msdos-program$'i,
  qr'^application/hta$'i,
  [ qr'^\.(rpm|cpio|tar)$'       => 0 ],  # allow any in Unix-type archives
  qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
  qr'^\.(exe-ms)$',                       # banned file(1) types
);
@score_sender_maps = ({ # a by-recipient hash lookup table,
  '.' => [  # the _first_ matching sender determines the score boost
   new_RE(  # regexp-type lookup table, just happens to be all soft-blacklist
    [qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i         => 5.0],
    [qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
    [qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
    [qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i   => 5.0],
    [qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i  => 5.0],
    [qr'^(your_friend|greatoffers)@'i                                => 5.0],
    [qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i                    => 5.0],
   ),
   { # a hash-type lookup table (associative array)
     'nobody@cert.org'                        => -3.0,
     'cert-advisory@us-cert.gov'              => -3.0,
     'owner-alert@iss.net'                    => -3.0,
     'slashdot@slashdot.org'                  => -3.0,
     'bugtraq@securityfocus.com'              => -3.0,
     'ntbugtraq@listserv.ntbugtraq.com'       => -3.0,
     'security-alerts@linuxsecurity.com'      => -3.0,
     'mailman-announce-admin@python.org'      => -3.0,
     'amavis-user-admin@lists.sourceforge.net'=> -3.0,
     'notification-return@lists.sophos.com'   => -3.0,
     'owner-postfix-users@postfix.org'        => -3.0,
     'owner-postfix-announce@postfix.org'     => -3.0,
     'owner-sendmail-announce@lists.sendmail.org'   => -3.0,
     'sendmail-announce-request@lists.sendmail.org' => -3.0,
     'donotreply@sendmail.org'                => -3.0,
     'ca+envelope@sendmail.org'               => -3.0,
     'noreply@freshmeat.net'                  => -3.0,
     'owner-technews@postel.acm.org'          => -3.0,
     'ietf-123-owner@loki.ietf.org'           => -3.0,
     'cvs-commits-list-admin@gnome.org'       => -3.0,
     'rt-users-admin@lists.fsck.com'          => -3.0,
     'clp-request@comp.nus.edu.sg'            => -3.0,
     'surveys-errors@lists.nua.ie'            => -3.0,
     'emailnews@genomeweb.com'                => -5.0,
     'yahoo-dev-null@yahoo-inc.com'           => -3.0,
     'returns.groups.yahoo.com'               => -3.0,
     'clusternews@linuxnetworx.com'           => -3.0,
     lc('lvs-users-admin@LinuxVirtualServer.org')    => -3.0,
     lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
     # soft-blacklisting (positive score)
     'sender@example.net'                     =>  3.0,
     '.example.net'                           =>  1.0,
   },
  ],  # end of site-wide tables
});
@decoders = (
  ['mail', \&do_mime_decode],
  ['asc',  \&do_ascii],
  ['uue',  \&do_ascii],
  ['hqx',  \&do_ascii],
  ['ync',  \&do_ascii],
  ['F',    \&do_uncompress, ['unfreeze','freeze -d','melt','fcat'] ],
  ['Z',    \&do_uncompress, ['uncompress','gzip -d','zcat'] ],
  ['gz',   \&do_gunzip],
  ['gz',   \&do_uncompress,  'gzip -d'],
  ['bz2',  \&do_uncompress,  'bzip2 -d'],
  ['lzo',  \&do_uncompress,  'lzop -d'],
  ['rpm',  \&do_uncompress, ['rpm2cpio.pl','rpm2cpio'] ],
  ['cpio', \&do_pax_cpio,   ['pax','gcpio','cpio'] ],
  ['tar',  \&do_pax_cpio,   ['pax','gcpio','cpio'] ],
  ['tar',  \&do_tar],
  ['deb',  \&do_ar,          'ar'],
  ['zip',  \&do_unzip],
  ['rar',  \&do_unrar,      ['rar','unrar'] ],
  ['arj',  \&do_unarj,      ['arj','unarj'] ],
  ['arc',  \&do_arc,        ['nomarch','arc'] ],
  ['zoo',  \&do_zoo,         'zoo'],
  ['lha',  \&do_lha,         'lha'],
  ['cab',  \&do_cabextract,  'cabextract'],
  ['tnef', \&do_tnef_ext,    'tnef'],
  ['tnef', \&do_tnef],
  ['exe',  \&do_executable, ['rar','unrar'], 'lha', ['arj','unarj'] ],
);

Testmail mit SPAM im Log:
Code:
Nov  2 15:04:01 mailserver postfix/cleanup[20424]: 941D112D13: message-id=<1130940191.4368c71fcc08c@webmail.networld.at>
Nov  2 15:04:01 mailserver postfix/qmgr[19155]: 941D112D13: from=<fly007@networld.at>, size=1421, nrcpt=1 (queue active)
Nov  2 15:04:13 mailserver amavis[20285]: (20285-04) INFO: unfolded 1 illegal all-whitespace continuation lines
Nov  2 15:04:13 mailserver postfix/smtpd[20432]: connect from localhost[127.0.0.1]
Nov  2 15:04:13 mailserver postfix/smtpd[20432]: B390A12D09: client=localhost[127.0.0.1]
Nov  2 15:04:13 mailserver postfix/cleanup[20424]: B390A12D09: message-id=<1130940191.4368c71fcc08c@webmail.networld.at>
Nov  2 15:04:13 mailserver postfix/qmgr[19155]: B390A12D09: from=<fly007@networld.at>, size=1262, nrcpt=1 (queue active)
Nov  2 15:04:13 mailserver postfix/smtpd[20432]: disconnect from localhost[127.0.0.1]
Nov  2 15:04:13 mailserver amavis[20285]: (20285-04) Passed SPAM, [212.241.81.79] <fly007@networld.at> -> <wag@domain.local>, quarantine: spam-FxdxOAV2CX4v.gz, Message-ID: <1130940191.4368c71fcc08c@webmail.networld.at>, mail_id: FxdxOAV2CX4v, Hits: 1000.781, 12120 ms
Nov  2 15:04:13 mailserver postfix/smtp[20425]: 941D112D13: to=<wag@domain.local>, orig_to=<wag@localhost>, relay=localhost[127.0.0.1], delay=12, status=sent (250 2.6.0 Ok, id=20285-04, from MTA([127.0.0.1]:10025): 250 Ok: queued as B390A12D09)
Nov  2 15:04:13 mailserver postfix/qmgr[19155]: 941D112D13: removed
Nov  2 15:04:14 mailserver postfix/pipe[20434]: B390A12D09: to=<wag@domain.local>, relay=cyrus, delay=1, status=sent (mailserver)
Nov  2 15:04:14 mailserver postfix/qmgr[19155]: B390A12D09: removed

Folgendes steht im Header:
Code:
X-Scanned-By: MIMEDefang 2.37
X-Virus-Scanned: amavisd-new at straeussl.at
X-Amavis-Alert: BAD HEADER Improper folded header field made up entirely of whitespace in message header 'X-Spam-Report':
Es wäre nett wenn mir jemand weiter helfen könnte!
 
Status
Für weitere Antworten geschlossen.
Oben