[atomic] spamdyke 4.1.0-1 / psa-spamdyke 2.4

Atomic repository announcements, new release notifications and other news regarding the atomic yum repository.
scott
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 8355
Joined: Wed Dec 31, 1969 8:00 pm
Location: earth
Contact:

[atomic] spamdyke 4.1.0-1 / psa-spamdyke 2.4

Unread post by scott »

This update includes both spamdyke, and the plesk psa-spamdyke package.

Changelog:

* Changed the option "hostname-file" to read /var/qmail/control/me by default.
* Added the option "dns-resolv-conf" to read the nameserver from a file other than /etc/resolv.conf if necessary. Multiple files can be read, if needed.
* Changed all uses of strncpy() to memcpy() because strncpy() will fill the remainder of the destination buffer with zeroes if the source string is too short. This is not needed because all strings are being explicitly terminated after copies anyway.
* Added two new parameters to search_file() to allow the matching line data to be returned to the caller.
* Changed process_access() to save the contents of the RELAYCLIENT environment variable, if set.
* Added the timefilter program to the utils folder.
* Reversed a small change to spamdyke_log() made 4.0.8 that will prevent buffer overflows in obscure situations.
* Changed is_ip_in_name() to look for more patterns of IP addresses in rDNS names: 044.033.022.011, 44.033.022.011, 44.33.022.011 and 44.33.22.011. Thanks to Eduard Svarc for suggesting this one. Changed the syslog output to include an "encryption:" tag at the end that shows the current status of TLS/SSL encryption. Thanks to Eric Shubert for suggesting this one.
* Added a "-R" option to smtpdummy so it will reject all recipients.
* Completely rewrote find_address() to completely conform to RFC 2822 when parsing addresses, including quoting, comments, folded whitespace and all the rest.
* Added the option "reject-identical-sender-recipient" to block any messages where the sender and recipient are the same. Thanks to almost everyone on the mailing list for suggesting this one.
* Changed nihdns_mx() to tolerate MX records that contain IP addresses (illegal) instead of names.
* Fixed Makefile.in to use the CPPFLAGS variable from the "configure" script, if the user provided it in an environment variable. Thanks to Iavor Stoev for reporting this one.
* Fixed the "configure" script to correctly include header files on FreeBSD 7.0. Thanks to Andrew Khon for reporting this one.
* Added a "-S" flag to sendrecv to prevent it from starting a TLS session when it sees "STARTTLS".
* Improved sendrecv's usage display to document what each option does.
* Changed do_spamdyke() to set the stdin and stdout file descriptors to nonblocking before calling middleman(). This works around a bug in the SSL library that will block forever waiting for input, even after SSL_pending() and/or select() has already indicated the socket is ready. Thanks to Teodor Milkov for identifying this problem more than a year ago and trog for producing a patch to fix it!
* Fixed process_config_file() to reject configuration file lines with bad/missing characters.
* Fixed process_config_file() to print an "unknown option" error message instead of an "illegal option" message when an unknown option is found in a configuration file.
* Added option "rejection-text-identical-sender-recipient" to set the rejection message for the identical sender/recipient filter.
* Created dnsdummy to simulate a nameserver but exit after a short while for testing spamdyke's DNS routines.
* Converted all DNS-related tests to use dnsdummy and removed all references to spamdyke.org and silence.org. This will also allow the removal of the (hundreds of) bogus entries from the spamdyke.org zone file. Removed the use of getprotobyname() from dns.c and used the defined protocol values in netinet/in.h.
* Changed nihdns_query() to retry DNS queries via TCP if the response received via UDP has the "truncation" flag set (indicating the answers are too large for a UDP packet). Thanks to Roland Moelle for suggesting this one.
* Added option "dns-tcp" to control if spamdyke will retry DNS queries via TCP. Added option "dns-spoof" to control if spamdyke will attempt to detect DNS spoofing and, if so, what it should do about it.
* Fixed smtp_filter() to offer and accept SMTP AUTH (when appropriate) even if the connection is already whitelisted. Thanks to Ratko Rudic for reporting this one.
* Merged in mysql patches from haggybear.de


To Upgrade:

yum upgrade spamdyke psa-spamdyke
arctic_ged
Forum User
Forum User
Posts: 18
Joined: Tue Jun 08, 2010 4:50 am

Re: [atomic] spamdyke 4.1.0-1 / psa-spamdyke 2.4

Unread post by arctic_ged »

Hi there I have just updated and i have a few questions:

When I type in yum info spamdyke i get this

Code: Select all

Installed Packages
Name       : spamdyke
Arch       : x86_64
Version    : 4.1.0
Release    : 1.el5.art
Size       : 656 k
Repo       : installed
Summary    : A drop-in connection-time spam filter for qmail.
URL        : http://www.spamdyke.org/
License    : GPL
Description: spamdyke is a filter for monitoring and intercepting incoming SMTP connections
           : to a qmail server. It acts as a transparent middleman, observing the conversation
           : without interference unless it sees something it should block. Because it can
           : silently monitor, it can also log mail traffic in several different ways.
However when I run spamdyke -v i get output saying its 4.0.10, how is this possible did I do something wrong?

Code: Select all

spamdyke 4.0.10+CONFIGTEST+DEBUG (C)2008 Sam Clippinger, samc (at) silence (dot) org
http://www.spamdyke.org/
biggles
Forum Regular
Forum Regular
Posts: 806
Joined: Tue Jul 15, 2008 2:38 pm
Location: Sweden
Contact:

Re: [atomic] spamdyke 4.1.0-1 / psa-spamdyke 2.4

Unread post by biggles »

You might be in the same situation as me, having first installed spamdyke manually and then installed the art-version. Check which version you are using by looking into /etc/xinetd.d/smtp_psa. I am using /usr/bin/spamdyke which displays:


Code: Select all

/usr/local/bin/spamdyke -v
spamdyke 4.0.10+TLS+CONFIGTEST+DEBUG+MYSQL[haggybear.de] (C)2008 Sam Clippinger, samc (at) silence (dot) org
http://www.spamdyke.org/
Using
find / -name spamdyke
might help you find different instances you have installed.
Post Reply