i have the same problem
When i use the whitelist, spamAssasin dont work.
How can i do to solve that??
i use Cpanel 11
When i use the whitelist, spamAssasin dont work.
How can i do to solve that??
i use Cpanel 11
Here's a relevant bugzilla entry I dug up:This definately needs to be an option in the Exim config editor. There is too much margin for breakage on updates and human error.
Is there a bugzilla on this? If not, I will make one.
touch /etc/exim_whitelist_senders
addresslist whitelist_senders = wildlsearch;/etc/exim_whitelist_senders
require verify = sender/callout=60s
deny
!verify = sender/callout=30s,defer_ok,maxwait=60s
!senders = +whitelist_senders
require verify = sender/callout=60s
2007-09-03 11:22:30 H=XXXXXXXXX [XXXXXXXXX] F=<XXXXXXXXX> temporarily rejected RCPT <XXXXXXXXX>: expected "sender[=address]", "recipient", "helo", "header_syntax", "header_sender" or "reverse_host_lookup" at start of ACL condition "verify sender,defer_ok,maxwait=60s"
Yes, I leave the boxes checked in their default settings on that screen (which includes "Use callouts to verify the existence of email senders. Basiclly, exim will connect to the mail exchanger for a given address to make sure it exists before accepting mail from it." and "Verify the existence of email senders." both being checked).Thanks JamieW but it may sound stupid but with the above solution do you check/enable the sender verify check box on the Configuration page
[% ACL_RBL_BLOCK %]
#require verify = sender/callout=60s
deny
!verify = sender/callout=30s,defer_ok,maxwait=60s
!senders = +whitelist_senders
# The only problem with this setup is that if the message is for multiple users on the same server
# and they are on different unix accounts, the settings for the first recipient which has spamassassin enabled will be used.
# This shouldn't be a problem 99.9% of the time, however its a very small price to pay for a massive speed increase.
warn domains = ! ${primary_hostname} : +local_domains
condition = ${if eq {${acl_m0}}{1}{0}{${perl{acl_checksa_deliver}{$domain}{${extract{5}{:}{${lookup{${lookup{$domain}lsearch*{/etc/userdomains}{$value}}}lsearch{/etc/passwd}{$value}}}}}}}}
set acl_m0 = 1
set acl_m1 = ${lookup{$domain}lsearch*{/etc/userdomains}{$value}}
warn domains = ${primary_hostname}
condition = ${if eq {${acl_m0}}{1}{0}{${perl{acl_checkusersa}{$local_part}{${extract{5}{:}{${lookup{$local_part}lsearch{/etc/passwd}{$value}}}}}}}}
set acl_m0 = 1
set acl_m1 = $local_part
accept domains = +relay_domains
deny message = $sender_fullhost is currently not permitted to \
relay through this server. Perhaps you \
have not logged into the pop/imap server in the \
last 30 minutes or do not have SMTP Authentication turned on in your email client.
#!!# ACL that is used after the DATA command
check_message:
# Enabling this will make the server non-rfc compliant
# require verify = header_sender
accept hosts = 127.0.0.1 : +relay_hosts
accept hosts = *
authenticated = *
warn
condition = ${if eq {${acl_m0}}{1}{1}{0}}
spam = ${acl_m1}/defer_ok
log_message = "SpamAssassin as ${acl_m1} detected message as spam"
add_header = X-Spam-Subject: [% ACL_SPAM_HEADER %] $h_subject
add_header = X-Spam-Status: Yes, score=$spam_score
add_header = X-Spam-Score: $spam_score_int
add_header = X-Spam-Bar: $spam_bar
add_header = X-Spam-Report: $spam_report
add_header = X-Spam-Flag: YES
set acl_m2 = 1
warn
condition = ${if eq {${acl_m0}}{1}{${if eq {${acl_m2}}{1}{0}{1}}}{0}}
add_header = X-Spam-Status: No, score=$spam_score
add_header = X-Spam-Score: $spam_score_int
add_header = X-Spam-Bar: $spam_bar
add_header = X-Spam-Flag: NO
log_message = "SpamAssassin as ${acl_m1} detected message as NOT spam"
deny message = This message contains a virus or other harmful content ($malware_name)
malware = *