我更新了我的/etc/spamassassin/local.cf
spamassassin 文件来更新一些评分规则。但是,即使重新启动 spamassassin(通过服务)后,新分数也不会显示在垃圾邮件中。事实上,该文件中的任何内容似乎都不会影响 spamassassin 的工作方式。
我使用 exim 作为我的 MTA,但这应该不重要。所有软件包均通过 apt-get 安装,最新版本为 14.04。
例如,我有这个:
score HTML_MESSAGE 2.0
定义在/etc/spamassassin/local.cf
.我重新启动了 exim 和 spamassassin。 spamassassing --lint
显示帽子文件中没有错误。然后又收到了另一封垃圾邮件:
0.0 HTML_MESSAGE BODY: HTML included in message
在 X-Spam-Report 字段中。
我运行了一下spamassassin -D < spam
,cfg文件的加载顺序似乎是错误的:
Jun 8 13:34:07.300 [21668] dbg: config: read file /etc/spamassassin/local.cf
...
Jun 8 13:34:07.600 [21668] dbg: config: read file /var/lib/spamassassin/3.004000/updates_spamassassin_org/50_scores.cf
...
Jun 8 13:34:07.787 [21668] dbg: config: read file /var/lib/spamassassin/3.004000/updates_spamassassin_org/73_sandbox_manual_scores.cf
Jun 8 13:34:07.788 [21668] dbg: config: fixed relative path: /var/lib/spamassas
sin/3.004000/updates_spamassassin_org/local.cf
...
到底是怎么回事?
根据以下评论森提曼:我尝试了strace -f -e trace=file spamassassin -D < spam
相同的结果:Spamassassin 在 local.cf 文件之后读取系统文件。因此,丢弃任何分数变化。
根据评论,这是该local.cf
文件,或多或少是普通文件。
# This is the right place to customize your installation of SpamAssassin.
#
# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be
# tweaked.
#
# Only a small subset of options are listed below
#
###########################################################################
# Add *****SPAM***** to the Subject header of spam e-mails
#
rewrite_header Subject *****SPAM*****
add_header spam Flag _YESNOCAPS_
add_header all Checker-Version SpamAssassin _VERSION_ (_SUBVERSION_) on _HOSTNAME_
add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ bayes=_BAYES_
add_header all Report _SUMMARY_
# Save spam messages as a message/rfc822 MIME attachment instead of
# modifying the original message (0: off, 2: use text/plain instead)
#
# report_safe 1
# Set which networks or hosts are considered 'trusted' by your mail
# server (i.e. not spammers)
#
# trusted_networks 212.17.35.
# Set file-locking method (flock is not safe over NFS, but is faster)
#
# lock_method flock
# Set the threshold at which a message is considered spam (default: 5.0)
#
required_score 5.0
# Use Bayesian classifier (default: 1)
#
use_bayes 1
bayes_path /var/lib/spamassassin/bayes/bayes
bayes_file_mode 0777
# Bayesian classifier auto-learning (default: 1)
#
bayes_auto_learn 1
# Set headers which may provide inappropriate cues to the Bayesian
# classifier
#
bayes_ignore_header X-Bogosity
bayes_ignore_header X-Spam-Flag
bayes_ignore_header X-Spam-Status
# Some shortcircuiting, if the plugin is enabled
#
ifplugin Mail::SpamAssassin::Plugin::Shortcircuit
#
# default: strongly-whitelisted mails are *really* whitelisted now, if the
# shortcircuiting plugin is active, causing early exit to save CPU load.
# Uncomment to turn this on
#
shortcircuit USER_IN_WHITELIST on
shortcircuit USER_IN_DEF_WHITELIST on
shortcircuit USER_IN_ALL_SPAM_TO on
shortcircuit SUBJECT_IN_WHITELIST on
# the opposite; blacklisted mails can also save CPU
#
shortcircuit USER_IN_BLACKLIST on
shortcircuit USER_IN_BLACKLIST_TO on
shortcircuit SUBJECT_IN_BLACKLIST on
# if you have taken the time to correctly specify your "trusted_networks",
# this is another good way to save CPU
#
# shortcircuit ALL_TRUSTED on
# and a well-trained bayes DB can save running rules, too
#
shortcircuit BAYES_99 spam
shortcircuit BAYES_00 ham
blacklist_from wokfrance.com
blacklist_from brother-mailer.com
blacklist_from *.sd-soft.net
blacklist_from woifrance.com
blacklist_from adimacocl.net
blacklist_from bletspuranawyat.net
blacklist_from sd-soft.net
blacklist_from m1web-track.com
blacklist_from winntoniecline.net
blacklist_from kafod.org
blacklist_from *.kafod.org
blacklist_from [email protected]
blacklist_from *.bhlive.co.uk
blacklist_from *.regionasm.net
blacklist_from regionasm.net
## Tweaks.
score AC_BR_BONANZA 1.0
score ADMITS_SPAM 10.0
score A_HREF_TO_REMOVE 2.0
score DEAR_FRIEND 4.0
score FREEMAIL_FORGED_FROMDOMAIN 4.0
score FREEMAIL_FROM 1.0
score FROM_LOCAL_HEX 9.0
score HTML_MESSAGE 2.0
score RCVD_IN_MSPIKE_BL 2.0
score RCVD_IN_SORBS_WEB 2.0
score RCVD_IN_XBL 3.0
score RDNS_NONE 2.0
score SCVD_IN_DNSWL_BLOCKED 3.0
score T_DKIM_INVALID 1.0
score T_FREEMAIL_DOC_PDF 3.0
score T_REMOTE_IMAGE 3.0
score URIBL_BLOCKED 3.0
score URIBL_DBL_SPAM 3.0
score URIBL_JP_SURBL 3.0
score URIBL_WS_SURBL 3.0
endif # Mail::SpamAssassin::Plugin::Shortcircuit
整个输出spamassassin -D
对于这个来说太大了。然而,相关行在上面。如果您想了解更多信息,请告诉我要查找什么,我会添加它。
答案1
问题是你正在设置HTML_MESSAGE得分内短路插入。但该插件默认情况下处于禁用状态。尝试将分数设置在文件的最后一行,在短路 endif
操作说明:
# Some shortcircuiting, if the plugin is enabled
#
ifplugin Mail::SpamAssassin::Plugin::Shortcircuit
# [...]
endif # Mail::SpamAssassin::Plugin::Shortcircuit
score HTML_MESSAGE 2.0
如果您希望启用快捷方式插件,您需要从/etc/spamassassin/v320.pre文件:
# Shortcircuit - stop evaluation early if high-accuracy rules fire
#
loadplugin Mail::SpamAssassin::Plugin::Shortcircuit
答案2
SpamAssassin 的自述文件讨论了 SpamAssassin 读取其自身数据文件的复杂方式。
从第 95 行开始阅读: http://svn.apache.org/viewvc/spamassassin/branches/3.4/README?view=markup#l95
从阅读内容来看,SpamAssassin(至少在原始的官方来源中)似乎没有从
/etc/spamassassin/
根本不是,而是来自
/etc/mail/spamassassin/
尝试将文件移到那里! :D
答案3
在我的默认设置中,local.cf
我读到:
# These values can be overridden by editing ~/.spamassassin/user_prefs.cf
# (see spamassassin(1) for details)
您有用户 spamassassin 配置文件 (~/.spamassassin/user_prefs.cf) 吗?
也看看这个 perldoc:
perldoc Mail::SpamAssassin::Conf
在里面用户偏好我读到的部分:
用户首选项 以下选项可用于站点范围(“local.cf”)和用户特定(“user_prefs”)配置文件,以自定义 SpamAssassin 处理传入电子邮件的方式。