Установил и сконфигурил связку postfix+amavisd+clamAV+spamassasin. запустил все по науке - работает, но после некоторого времени в логах всплывает ошибка:
(host 127.0.0.1[127.0.0.1] said: 451 4.5.0 Error in processing, id=11381-08, quar+notif FAILED: Can not quarantine: 501 5.1.0 Failed, id=11381-08, from MTA([127.0.0.1]:10025): 501 Bad address syntax at /usr/sbin/amavisd line 8662. (in reply to end of DATA command))
иду соответственно логу на строку 8662 файла amavisd вижу там следующее
die "Can not quarantine: $n_smtp_resp";
что нужно поправить, не подскажите, а то забиватеся очередь, и все начинает жутко тормозить......
прилагаю конфиг самого амавиза, мож в нем сего не так...
# Config File of Amavasd by Coyote v 0.1 (c) 2006 for Clearinghouse # #Main section #*************************************
use strict;
$MYHOME = '/var/amavis'; $mydomain = 'my.domen.spb.ru';
$daemon_user = 'amavisd'; $daemon_group = 'amavisd'; $QUARANTINEDIR = "$MYHOME/vir"; $TEMPBASE = "$MYHOME/tmp"; $ENV{TMPDIR} = $TEMPBASE; $helpers_home = $MYHOME;
$max_servers=3; $child_timeout=20*60; $pid_file = "/var/run/amavisd.pid"; $lock_file = "/var/amavis/amavisd.lock";
#Talking with Postfix #*********************************************
$forward_method = 'smtp:127.0.0.1:10025'; $notify_method = $forward_method;
$unix_socketname = "$MYHOME/amavisd.sock"; $inet_socket_port = 10024; $inet_socket_bind = '127.0.0.1'; @inet_acl = qw( 127.0.0.1 );
#@bypass_virus_checks_acl = qw( . ); #@local_domains_acl = ( ".$mydomain" );
#Logs #***************************************************
$DO_SYSLOG = 0; # (1 = syslog, 0 = logfile) $LOGFILE = "$MYHOME/amavis.log"; $log_level = 1; # (0-5) $log_templ = '[? %#V |[? %#F |[?%#D|Not-Delivered|Passed]|BANNED name/type (%F)]|INFECTED (%V)],<%o> -> [<%R>|,][? %i ||, quarantine %i], Message-ID: %m, Hits: %c';
#Filtering & Transpotting #**********************************************************
$hdr_encoding = 'windows-1251'; $bdy_encoding = 'windows-1251';
;$final_spam_destiny = D_PASS; read_hash(\%whitelist_sender, '/var/amavis/whitelist'); read_hash(\%blacklist_sender, '/var/amavis/blacklist'); $final_banned_destiny = D_DISCARD; $final_spam_destiny = D_DISCARD; $final_bad_header_destiny = D_PASS; $warnvirussender = 0; $warnspamsender = 0; $warnbannedsender = 1; $warnbadhsender = 1; $warnvirusrecip = 0; $warnbannedrecip = 0;
#defending against mail bombs $MAXLEVELS = 14; # Maximum recursion level for extraction/decoding $MAXFILES = 1500; # Maximum number of extracted files $MIN_EXPANSION_QUOTA = 100*1024; # bytes (default undef, not enforced) $MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes (default undef, not enforced) $MIN_EXPANSION_FACTOR = 5; # times original mail size (must be specified) $MAX_EXPANSION_FACTOR = 500; # times original mail size (must be specified)
#text blocking
$viruses_that_fake_sender_re = new_RE( qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,qr'tana tos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,qr'dloader|galil |gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,qr'frethem|sircam|be?ag le|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,qr'@mm|@MM',qr'Worm'i,[qr' ^(EICAR|Joke\.|Junk\.)'i => 0],[qr'^(WM97|OF97|W95/CIH-|JS/Fort)'i => 0],[qr/.*/ => 1],);
$X_HEADER_TAG = 'X-Virus-Scanned'; $X_HEADER_LINE = "by Coyote's mail server at $mydomain";
#Sending Infecting mail
#$virus_quarantine_method = "local:virus-%i-%n"; #$spam_quarantine_method = "local:spam-%i-%n";
$virus_quarantine_to = 'admin@$mydomain'; $spam_quarantine_to = 'admin@$mydomain';
# Blocking files
$banned_filename_re = new_RE(qr'\.[^.]*\.(vbs|pif|scr|bat|cmd|com|dll)$'i, qr'.\.(ade|adp|bas|bat|chm|cmd|com|cpl|crt|hlp)$'i,qr'.\.(hta|inf|ins|isp|js|jse |lnk|mdb|mde|msc|msi)$'i, qr'.\.(msp|mst|pcd|pif|reg|scr|sct|shs|shb|vb|vbe)$'i,qr'.\.(vbs|wsc|wsf|wsh)$'i x,qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i,);
# Neighbour programm #*******************************************************************
$path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
$file = 'file'; $gzip = 'gzip'; $bzip2 = 'bzip2'; $lzop = 'lzop'; $uncompress = ['uncompress', 'gzip -d', 'zcat']; $unfreeze = ['unfreeze', 'freeze -d', 'melt', 'fcat']; $arc = ['nomarch', 'arc']; $unarj = ['arj', 'unarj']; $unrar = ['rar', 'unrar']; $zoo = 'zoo'; $lha = 'lha'; $cpio = ['gcpio','cpio'];
# SpamAssassin settings #*********************************************************************8
$sa_local_tests_only = 0; $sa_auto_whitelist = 1; # comment this line out to turn off auto whitelist $sa_mail_body_size_limit =400*1024; $sa_tag_level_deflt = 3.0; # controls adding the X-Spam-Status and X-Spam-Level headers, $sa_tag2_level_deflt = 6.3; # controls adding 'X-Spam-Flag: YES', and editing Subject, $sa_kill_level_deflt = $sa_tag2_level_deflt; # triggers spam evasive actions: $sa_spam_subject_tag = '!!!!!SPAM!!!!! '; #$sa_debug = 1; # comment this line out to turn off debugging
# AV settings #************************************************************************
@av_scanners = ( ['Clam Antivirus-clamd', \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.ctl"],qr/\bOK$/, qr/\bFOUND$/, qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],); @av_scanners_backup = ( ['Clam Antivirus - clamscan', 'clamscan', '--stdout --no-summary -r {}', [0], [1], qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ], );
1; # insure a defined return