+ Responder ao Tópico



  1. #1
    seniDEac
    Visitante

    Padrão Apanhando pra isntalar o Spandyke

    alguem ae tem experiencia com essse carinha...?

    a instalação é fácil, e colocar a linha no run do qmail tbem parace tranquila, mas qdo fça isso o smtp para de funcionar.

    alguma dica de linha que eu posso colocar no "run" do meu SMTP do qmail pra funcionar com o spandyke ??

    agradeço qualquer ajuda!

    []s Sena

  2. #2
    Moderador Avatar de Bruno
    Ingresso
    Nov 2002
    Localização
    Guarapuava-PR
    Posts
    4.181
    Posts de Blog
    1

    Padrão

    eu uso aki é super simples

  3. #3
    seniDEac
    Visitante

    Padrão

    bom.

    será que se eu descrever meu problema, voce me ajuda?

    tudo foi simples aqui tbém, tudo funciona webmail, recebendo e enviando etc..
    bloqueando tudo oque é porcaria!

    MENOS....
    enviar pelo leitor de email, outlook por exemplo, ele fica enviando infinitamente ..... sem completar...

    []s Sena

  4. #4
    Moderador Avatar de Bruno
    Ingresso
    Nov 2002
    Localização
    Guarapuava-PR
    Posts
    4.181
    Posts de Blog
    1

    Padrão

    estranho
    posta como esta seu tcp.smtp e seu run do smtp

  5. #5
    seniDEac
    Visitante

    Padrão

    olha:

    more /etc/tcp.smtp
    127.:allow,RELAYCLIENT=""


    O RUN


    !/bin/sh

    QMAILQUEUE="/var/qmail/bin/qmail-scanner-queue.pl"
    export QMAILQUEUE
    QMAILDUID=`id -u qmaild`
    NOFILESGID=`id -g qmaild`
    MAXSMTPD=`cat /var/qmail/control/concurrencyincoming`
    LOCAL=`head -1 /var/qmail/control/me`

    if [ -z "$QMAILDUID" -o -z "$NOFILESGID" -o -z "$MAXSMTPD" -o -z "$LOCAL" ]; then
    echo QMAILDUID, NOFILESGID, MAXSMTPD, or LOCAL is unset in
    echo /var/qmail/supervise/qmail-smtpd/run
    exit 1
    fi

    if [ ! -f /var/qmail/control/rcpthosts ]; then
    echo "No /var/qmail/control/rcpthosts!"
    echo "Refusing to start SMTP listener because it'll create an open relay"
    exit 1
    fi

    # From http://www.dnsbl.au.sorbs.net/using.shtml:
    #
    # dnsbl.sorbs.net - Aggregate zone (contains all the following DNS zones)
    # http.dnsbl.sorbs.net - List of Open HTTP Proxy Servers.
    # socks.dnsbl.sorbs.net - List of Open SOCKS Proxy Servers.
    # misc.dnsbl.sorbs.net - List of open Proxy Servers not listed in
    # the SOCKS or HTTP lists.
    # smtp.dnsbl.sorbs.net - List of Open SMTP relay servers.
    # web.dnsbl.sorbs.net - List of web (WWW) servers which have spammer
    # abusable vulnerabilities (e.g. FormMail scripts)
    # Note: This zone now includes non-webserver
    # IP addresses that have abusable vulnerabilities.
    # spam.dnsbl.sorbs.net - List of hosts that have been noted as sending
    # spam/UCE/UBE to the admins of SORBS. This
    # zone also contains netblocks of spam supporting
    # service providers, including those who provide
    # websites, DNS or drop boxes for a spammer. Spam
    # supporters are added on a 'third strike and you are
    # out' basis, where the third spam will cause the
    # supporter to be added to the list.
    # block.dnsbl.sorbs.net - List of hosts demanding that they never be tested
    # by SORBS.
    # zombie.dnsbl.sorbs.net - List of networks hijacked from their original
    # owners, some of which have already used for spamming.
    # dul.dnsbl.sorbs.net - Dynamic IP Address ranges (NOT a Dial Up list!)
    # rhsbl.sorbs.net - Aggregate zone (contains all RHS zones)
    #badconf.rhsbl.sorbs.net - List of domain names where the A or MX
    # records point to bad address space.
    # nomail.rhsbl.sorbs.net - List of domain names where the owners have
    # indicated no email should ever originate from these
    # domains.
    #




    exec /usr/local/bin/softlimit -m 40000000 \
    /usr/local/bin/tcpserver -v -R -l "$LOCAL" -x /etc/tcp.smtp.cdb -c "$MAXSMTPD" \
    -u "$QMAILDUID" -g "$NOFILESGID" 0 smtp /usr/local/bin/spamdyke -l -d /var/qmail/control/rcpthosts -a 5 -T 60 -g /home/vpopmail/graylist -m 300 -M 1814400 -u http://spam.dnsbl.sorbs.net/ -s /home/vpopmail/blacklist_senders -S /home/vpopmail/blacklist_recipients -k /home/vpopmail/blacklist_keywords -B /home/vpopmail/blacklist_ip -b /home/vpopmail/blacklist_rdns.d -rRc -w /home/vpopmail/whitelist_rdns -W /home/vpopmail/whitelist_ip -e 5 -x zombie.dnsbl.sorbs.net -x dul.dnsbl.sorbs.net -x bogons.cymru.com --reject-missing-sender-mx --smtp-auth-command-encryption "/home/vpopmail/bin/vchkpw /bin/true" --hostname ${LOCAL} --access-file /etc/tcp.smtp --tls-certificate-file /var/qmail/control/servercert.pem \
    /var/qmail/bin/qmail-smtpd /home/vpopmail/bin/vchkpw /bin/true \
    2>&1

    #exec /usr/local/bin/softlimit -m 50000000 \
    # /usr/local/bin/tcpserver -H -v -R -l "$LOCAL" -x /etc/tcp.smtp.cdb -c "$MAXSMTPD" \
    # -u "$QMAILDUID" -g "$NOFILESGID" 0 smtp /var/qmail/bin/qmail-smtpd centralpc.com.br /home/vpopmail/bin/vchkpw /bin/true 2>&1

  6. #6
    Moderador Avatar de Bruno
    Ingresso
    Nov 2002
    Localização
    Guarapuava-PR
    Posts
    4.181
    Posts de Blog
    1

    Padrão

    aparentemente esta certo
    só aumenta a memoria de 4 colcoa 8

  7. #7

    Padrão

    veja onde esta o spamdyke no arquivo qmail-smtpd/run


    ------------------------------------

    exec /usr/local/bin/softlimit -m 21000000 \
    /usr/local/bin/tcpserver -v -R -l "$LOCAL" -x /etc/tcp.smtp.cdb -c "$MAXSMTPD" \
    -u "$QMAILDUID" -g "$NOFILESGID" 0 smtp \
    /usr/local/bin/spamdyke /var/qmail/bin/qmail-smtpd meu_dominio.com.br \
    /var/vpopmail/bin/vchkpw /bin/true 2>&1



    eu utilizo desta forma e funciona muito bem, mas aconselho vc a ler a documentacao sobre ele no site do desenvolvedor, pois ele apresenta n opcoes de configuracoes