Changelog

Close this window to continue.

25 AUG 2012
In /etc/clamav-unofficial-sigs.conf which is downloaded from
http://verchick.com/mecham/public_html/spam/clamav-unofficial-sigs.conf.txt
I commented out the MalwarePatrol Database(s) database and I suggest you do the same:
#mbl_dbs="
# mbl.ndb
#"


26 NOV 2011
I added a new section:
http://verchick.com/mecham/public_html/spam/virtual3p1.html#aliasd

24 NOV 2011
This was added to the document:
It's possible that it took 30 seconds for you to log into Mailzu. This is because we have configured Dovecot to offer both PLAIN and CRAM-MD5 authentication methods and the imap_open PHP function (which uses c-client) tries to use CRAM-MD5 before trying PLAIN. If the CRAM-MD5 Auth fails (which it will if you have not manually entered a clear-text password in the 'mailbox.clear' field in the postfix database) then after 30 seconds it will try the next Auth method (PLAIN). PLAIN should work because we have a password in the 'mailbox.password' field. See https://bugs.php.net/bug.php?id=33500. If you want to avoid this delay, we can ask imap_open to not even try using CRAM-MD5. The only issue you may have by making this change would be if you do actually use clear-text passwords, you would have to ensure that the user also has a password in the 'mailbox.password' field. You can imagine that there could be potential issues if the two passwords differ. Regardless, if you want to turn off CRAM-MD5 Auth for MailZu in order to speed up log in, issue this command:

sed -i "s/imap_open(\$host, \$username, \$password);/imap_open(\$host, \$username, \$password, NULL, 1, array('DISABLE_AUTHENTICATOR' => 'CRAM-MD5'));/" /var/www/mailzu/lib/IMAPAuth.class.php

If you should ever want to turn revert this change:
sed -i "s/imap_open(\$host, \$username, \$password, NULL, 1, array('DISABLE_AUTHENTICATOR' => 'CRAM-MD5'));/imap_open(\$host, \$username, \$password);/" /var/www/mailzu/lib/IMAPAuth.class.php

16 SEP 2011
There is a bug in the autoresponder (vacation.pl). If a person that has an autoresponder activated is in the Cc: field, the sender is receiving the autoresponse message from a person listed in To: field, not from the person that has an autoresponder activated. Run this command to fix the issue. This changes line 342 of the script ($orig_to is changed to $email):

sed -i "s/do_mail_sendmail (\$orig_to/do_mail_sendmail (\$email/" /var/spool/vacation/vacation.pl

11 SEP 2011
There is a bug in SpamAssassin 3.3.x regarding Bayes that needs to be fixed. There is also a bug in MySQL that causes corruption of the Bayes database. Basically we need to patch SpamAssassin and wipe out the Bayes database and start over. To patch Spamassassin:

cd /usr/share/perl5/Mail/SpamAssassin/BayesStore
grep -q 46675 MySQL.pm || wget http://verchick.com/mecham/public_html/spam/mysql-bug-46675.patch.txt
grep -q 46675 MySQL.pm || patch MySQL.pm < mysql-bug-46675.patch.txt


To wipe out bayes and repair the SQL Schema, stop amavis and log into MySQL with roots_password:

/etc/init.d/amavis stop
mysql -p


Then repair the schema and rebuild the database from scratch:
USE sa_bayes;
DELETE from awl;
DELETE from bayes_expire;
DELETE from bayes_global_vars;
INSERT INTO bayes_global_vars VALUES ('VERSION','3');
DELETE from bayes_seen;
DELETE from bayes_token;
DELETE from bayes_vars;

ALTER TABLE bayes_token MODIFY token BINARY(5) NOT NULL DEFAULT '';
ALTER TABLE bayes_token DROP PRIMARY KEY;
ALTER TABLE bayes_token ADD PRIMARY KEY (id, token);

ALTER TABLE awl MODIFY email VARBINARY(255) NOT NULL DEFAULT '';
ALTER TABLE awl DROP PRIMARY KEY;
ALTER TABLE awl ADD PRIMARY KEY (username, email, signedby, ip);
quit

cd /var/lib/amavis
wget http://verchick.com/mecham/public_html/spam/sample-spam.txt
sa-learn --spam sample-spam.txt
sa-learn --dump magic
spamassassin --lint
/etc/init.d/amavis start


09 SEP 2011
If you are using policyd-weight, please make this change to avoid scoring higher than normal:

sed -i "s/'IX_MANITU',/'IX_MANITU'/" /usr/sbin/policyd-weight
sed -i "s/ 'rbl.ipv6-world.net'/#'rbl.ipv6-world.net'/" /usr/sbin/policyd-weight
/etc/init.d/policyd-weight stop
/etc/init.d/policyd-weight start


28 MAY 2011
Initial release.
http://verchick.com/mecham/public_html/spam/virtual3.html