Установил и сконфигурил связку postfix+amavisd+clamAV+spamassasin.
запустил все по науке - работает, но после некоторого времени в логах всплывает ошибка:
(host 127.0.0.1[127.0.0.1] said: 451 4.5.0 Error in processing, id=11381-08, quar+notif FAILED: Can not quarantine: 501 5.1.0 Failed, id=11381-08, from MTA([127.0.0.1]:10025): 501 Bad address syntax at /usr/sbin/amavisd line 8662. (in reply to end of DATA command))
иду соответственно логу на строку 8662 файла amavisd
вижу там следующее
die "Can not quarantine: $n_smtp_resp";
что нужно поправить, не подскажите, а то забиватеся очередь, и все начинает жутко тормозить......
прилагаю конфиг самого амавиза, мож в нем сего не так...
# Config File of Amavasd by Coyote v 0.1 (c) 2006 for Clearinghouse
#
#Main section
#*************************************
use strict;
$MYHOME = '/var/amavis';
$mydomain = 'my.domen.spb.ru';
$daemon_user = 'amavisd';
$daemon_group = 'amavisd';
$QUARANTINEDIR = "$MYHOME/vir";
$TEMPBASE = "$MYHOME/tmp";
$ENV{TMPDIR} = $TEMPBASE;
$helpers_home = $MYHOME;
$max_servers=3;
$child_timeout=20*60;
$pid_file = "/var/run/amavisd.pid";
$lock_file = "/var/amavis/amavisd.lock";
#Talking with Postfix
#*********************************************
$forward_method = 'smtp:127.0.0.1:10025';
$notify_method = $forward_method;
$unix_socketname = "$MYHOME/amavisd.sock";
$inet_socket_port = 10024;
$inet_socket_bind = '127.0.0.1';
@inet_acl = qw( 127.0.0.1 );
#@bypass_virus_checks_acl = qw( . );
#@local_domains_acl = ( ".$mydomain" );
#Logs
#***************************************************
$DO_SYSLOG = 0; # (1 = syslog, 0 = logfile)
$LOGFILE = "$MYHOME/amavis.log";
$log_level = 1; # (0-5)
$log_templ = '[? %#V |[? %#F |[?%#D|Not-Delivered|Passed]|BANNED name/type (%F)]|INFECTED (%V)],<%o> -> [<%R>|,][? %i ||, quarantine %i], Message-ID: %m, Hits: %c';
#Filtering & Transpotting
#**********************************************************
$hdr_encoding = 'windows-1251';
$bdy_encoding = 'windows-1251';
;$final_spam_destiny = D_PASS;
read_hash(\%whitelist_sender, '/var/amavis/whitelist');
read_hash(\%blacklist_sender, '/var/amavis/blacklist');
$final_banned_destiny = D_DISCARD;
$final_spam_destiny = D_DISCARD;
$final_bad_header_destiny = D_PASS;
$warnvirussender = 0;
$warnspamsender = 0;
$warnbannedsender = 1;
$warnbadhsender = 1;
$warnvirusrecip = 0;
$warnbannedrecip = 0;
#defending against mail bombs
$MAXLEVELS = 14; # Maximum recursion level for extraction/decoding
$MAXFILES = 1500; # Maximum number of extracted files
$MIN_EXPANSION_QUOTA = 100*1024; # bytes (default undef, not enforced)
$MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes (default undef, not enforced)
$MIN_EXPANSION_FACTOR = 5; # times original mail size (must be specified)
$MAX_EXPANSION_FACTOR = 500; # times original mail size (must be specified)
#text blocking
$viruses_that_fake_sender_re = new_RE(
qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,qr'tana tos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,qr'dloader|galil |gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,qr'frethem|sircam|be?ag le|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,qr'@mm|@MM',qr'Worm'i,[qr' ^(EICAR|Joke\.|Junk\.)'i => 0],[qr'^(WM97|OF97|W95/CIH-|JS/Fort)'i => 0],[qr/.*/ => 1],);
$X_HEADER_TAG = 'X-Virus-Scanned';
$X_HEADER_LINE = "by Coyote's mail server at $mydomain";
#Sending Infecting mail
#$virus_quarantine_method = "local:virus-%i-%n";
#$spam_quarantine_method = "local:spam-%i-%n";
$virus_quarantine_to = 'admin@$mydomain';
$spam_quarantine_to = 'admin@$mydomain';
# Blocking files
$banned_filename_re = new_RE(qr'\.[^.]*\.(vbs|pif|scr|bat|cmd|com|dll)$'i, qr'.\.(ade|adp|bas|bat|chm|cmd|com|cpl|crt|hlp)$'i,qr'.\.(hta|inf|ins|isp|js|jse |lnk|mdb|mde|msc|msi)$'i, qr'.\.(msp|mst|pcd|pif|reg|scr|sct|shs|shb|vb|vbe)$'i,qr'.\.(vbs|wsc|wsf|wsh)$'i x,qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i,);
# Neighbour programm
#*******************************************************************
$path =
'/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
$file = 'file';
$gzip = 'gzip';
$bzip2 = 'bzip2';
$lzop = 'lzop';
$uncompress = ['uncompress', 'gzip -d', 'zcat'];
$unfreeze = ['unfreeze', 'freeze -d', 'melt', 'fcat'];
$arc = ['nomarch', 'arc'];
$unarj = ['arj', 'unarj'];
$unrar = ['rar', 'unrar'];
$zoo = 'zoo';
$lha = 'lha';
$cpio = ['gcpio','cpio'];
# SpamAssassin settings
#*********************************************************************8
$sa_local_tests_only = 0;
$sa_auto_whitelist = 1; # comment this line out to turn off auto whitelist
$sa_mail_body_size_limit =400*1024;
$sa_tag_level_deflt = 3.0; # controls adding the X-Spam-Status and X-Spam-Level headers,
$sa_tag2_level_deflt = 6.3; # controls adding 'X-Spam-Flag: YES', and editing Subject,
$sa_kill_level_deflt = $sa_tag2_level_deflt; # triggers spam evasive actions:
$sa_spam_subject_tag = '!!!!!SPAM!!!!! ';
#$sa_debug = 1; # comment this line out to turn off debugging
# AV settings
#************************************************************************
@av_scanners = ( ['Clam Antivirus-clamd', \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.ctl"],qr/\bOK$/, qr/\bFOUND$/, qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],);
@av_scanners_backup = ( ['Clam Antivirus - clamscan', 'clamscan', '--stdout --no-summary -r {}', [0], [1], qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ], );
1; # insure a defined return