Mail delivery and spamassassin

when I originally sert this server up i chose postfix for email… then changed it to sendmail in roder to use email address as login…

in this process my sendmail config became completely FUBAR.

i have sendmail working. and if mail is set to forward to someone it does.

but it fails on local delivery.

if i emailk user ‘jlw’ it will say

Feb 7 11:49:00 shareweb sendmail[[10173]]: k17HmvYl010172:, delay=00:00:03, xdelay=00:00:02, mailer=local, pri=32498, dsn=2.0.0, stat=Sent

-rw------- 1 mail 0 Feb 2 16:25

but here is his mail file.

it goes into lala land… never to be seen again.

also… it never goes through spamassassin at all…

whats up with this??

more info…

even weirder

if i erase the mail file… jlw@…

it remakes the file when i send him mail… it is just empty

i removed sendmail and procmail with --nodeps… and reinstalled them both…

still no email

anyone ??

Hey Benjamin,

I’ll first point out that we now support a bit of magic to allow Postfix to be used with “user@domain.tld” usernames. It’s a workaround (because Wietse believes strongly enough that @ in the username is a bad idea that it has been stripped from Postfix and will not be re-added), but it works.

Next up…I’m not sure what to make of what you’re seeing. The log looks like it is working. However, procmail is not being used as the delivery agent, as far as I can tell (but maybe it’s been too long since I looked at a sendmail log–maybe it doesn’t tell you that it is handing off the mail to a delivery agent the way Postfix does). But nonetheless, it looks like there is a successful delivery to somewhere.

Maybe you should post your Sendmail config and /etc/procmailrc. We might be able to spot where things are going astray.

Well i did remove and readd sendmail and procmail

and used a default installation with the exception of removing the addr= line from and regenerating…

is there any way to reinit virtualmins mail settings ?


here is sendmail config

dnl #
dnl # This is the sendmail macro config file for m4. If you make changes to
dnl # /etc/mail/, you will need to regenerate the
dnl # /etc/mail/ file by confirming that the sendmail-cf package is
dnl # installed and then performing a
dnl #
dnl # make -C /etc/mail
dnl #
include(/usr/share/sendmail-cf/m4/cf.m4')dnl VERSIONID(setup for Red Hat Linux’)dnl
OSTYPE(linux')dnl dnl # dnl # default logging level is 9, you might want to set it higher to dnl # debug the configuration dnl # dnl define(confLOG_LEVEL’, 9')dnl dnl # dnl # Uncomment and edit the following line if your outgoing mail needs to dnl # be sent out through an external mail server: dnl # dnl define(SMART_HOST’,smtp.your.provider') dnl # define(confDEF_USER_ID’,``8:12’’)dnl
dnl define(confAUTO_REBUILD')dnl define(confTO_CONNECT’, 1m')dnl define(confTRY_NULL_MX_LIST’,true)dnl
define(confDONT_PROBE_INTERFACES',true)dnl define(PROCMAIL_MAILER_PATH’,/usr/bin/procmail')dnl define(ALIAS_FILE’, /etc/aliases')dnl define(STATUS_FILE’, /var/log/mail/statistics')dnl define(UUCP_MAILER_MAX’, 2000000')dnl define(confUSERDB_SPEC’, /etc/mail/userdb.db')dnl define(confPRIVACY_FLAGS’, authwarnings,novrfy,noexpn,restrictqrun')dnl define(confAUTH_OPTIONS’, A')dnl dnl # dnl # The following allows relaying if the user authenticates, and disallows dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links dnl # dnl define(confAUTH_OPTIONS’, A p')dnl dnl # dnl # PLAIN is the preferred plaintext authentication method and used by dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do dnl # use LOGIN. Other mechanisms should be used if the connection is not dnl # guaranteed secure. dnl # Please remember that saslauthd needs to be running for AUTH. dnl # dnl TRUST_AUTH_MECH(EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN’)dnl
dnl #
dnl # Rudimentary information on creating certificates for sendmail TLS:
dnl # cd /usr/share/ssl/certs; make sendmail.pem
dnl # Complete usage:
dnl # make -C /usr/share/ssl/certs usage
dnl #
dnl define(confCACERT_PATH',/etc/pki/tls/certs’)
dnl define(confCACERT',/etc/pki/tls/certs/ca-bundle.crt’)
dnl define(confSERVER_CERT',/etc/pki/tls/certs/sendmail.pem’)
dnl define(confSERVER_KEY',/etc/pki/tls/certs/sendmail.pem’)
dnl #
dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP’s
dnl # slapd, which requires the file to be readble by group ldap
dnl #
dnl define(confDONT_BLAME_SENDMAIL',groupreadablekeyfile’)dnl
dnl #
dnl define(confTO_QUEUEWARN', 4h’)dnl
dnl define(confTO_QUEUERETURN', 5d’)dnl
dnl define(confQUEUE_LA', 12’)dnl
dnl define(confREFUSE_LA', 18’)dnl
define(confTO_IDENT', 0’)dnl
dnl FEATURE(delay_checks)dnl
FEATURE(mailertable',hash -o /etc/mail/mailertable.db’)dnl
FEATURE(virtusertable',hash -o /etc/mail/virtusertable.db’)dnl
dnl #
dnl # The following limits the number of processes sendmail can fork to accept
dnl # incoming messages or process its message queues to 12.) sendmail refuses
dnl # to accept connections once it has reached its quota of child processes.
dnl #
dnl define(confMAX_DAEMON_CHILDREN', 12)dnl dnl # dnl # Limits the number of new connections per second. This caps the overhead dnl # incurred due to forking new sendmail processes. May be useful against dnl # DoS attacks or barrages of spam. (As mentioned below, a per-IP address dnl # limit would be useful but is not available as an option at this writing.) dnl # dnl define(confCONNECTION_RATE_THROTTLE’, 3)dnl
dnl #
dnl # The -t option will retry delivery if e.g. the user runs over his quota.
dnl #
FEATURE(local_procmail,',procmail -t -Y -a $h -d $u’)dnl
FEATURE(access_db',hash -T[[tmpf]] -o /etc/mail/access.db’)dnl
FEATURE(blacklist_recipients')dnl EXPOSED_USER(root’)dnl
dnl #
dnl # For using Cyrus-IMAPd as POP3/IMAP server through LMTP delivery uncomment
dnl # the following 2 definitions and activate below in the MAILER section the
dnl # cyrusv2 mailer.
dnl #
dnl define(confLOCAL_MAILER', cyrusv2’)dnl
dnl define(CYRUSV2_MAILER_ARGS', FILE /var/lib/imap/socket/lmtp’)dnl
dnl #
dnl # The following causes sendmail to only listen on the IPv4 loopback address
dnl # and not on any other network devices. Remove the loopback
dnl # address restriction to accept email from the internet or intranet.
dnl #
DAEMON_OPTIONS(Port=smtp, Name=MTA')dnl dnl # dnl # The following causes sendmail to additionally listen to port 587 for dnl # mail from MUAs that authenticate. Roaming users who can't reach their dnl # preferred sendmail daemon due to port 25 being blocked or redirected find dnl # this useful. dnl # dnl DAEMON_OPTIONS(Port=submission, Name=MSA, M=Ea’)dnl
dnl #
dnl # The following causes sendmail to additionally listen to port 465, but
dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed
dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can’t
dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS
dnl # and doesn’t support the deprecated smtps; Evolution
dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1.
dnl #
dnl # For this to work your OpenSSL certificates must be configured.
dnl #
dnl DAEMON_OPTIONS(Port=smtps, Name=TLSMTA, M=s')dnl dnl # dnl # The following causes sendmail to additionally listen on the IPv6 loopback dnl # device. Remove the loopback address restriction listen to the network. dnl # dnl DAEMON_OPTIONS(port=smtp,Addr=::1, Name=MTA-v6, Family=inet6’)dnl
dnl #
dnl # enable both ipv6 and ipv4 in sendmail:
dnl #
dnl DAEMON_OPTIONS(Name=MTA-v4, Family=inet, Name=MTA-v6, Family=inet6') dnl # dnl # We strongly recommend not accepting unresolvable domains if you want to dnl # protect yourself from spam. However, the laptop and users on computers dnl # that do not have 24x7 DNS do need this. dnl # FEATURE(accept_unresolvable_domains’)dnl
dnl #
dnl FEATURE(relay_based_on_MX')dnl dnl # dnl # Also accept email sent to "localhost.localdomain" as local email. dnl # LOCAL_DOMAIN(localhost.localdomain’)dnl
dnl #
dnl # The following example makes mail from this host and any additional
dnl # specified domains appear to be sent from
dnl #
dnl MASQUERADE_AS(`’)dnl
dnl #
dnl # masquerade not just the headers, but the envelope as well
dnl #
dnl FEATURE(masquerade_envelope)dnl
dnl #
dnl # masquerade not just, but @* as well
dnl #
dnl FEATURE(masquerade_entire_domain)dnl
dnl #
dnl MASQUERADE_DOMAIN(localhost)dnl
dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
dnl MAILER(cyrusv2)dnl

is the procmailrc CORRECT for sendmail?

or is this perhaps for the postfix workaround?

what should the procmailrc be if using SENDMAIL ?

anyone ??

anyone ?

does anyone have an idea how this part works

is anyone going to try to help

I have a customer who has been SCREAMING at me for a week while I have been trying to find answers here with no help

Hi Benjamin,

I’m unfamiliar enough with Sendmail that I’m afraid I don’t really have any good answers.

Is there anything in the procmail log for the user in question? If not, you might turn on logging (it’s on by default, I think, but it might be getting disabled somewhere) with something like “VERBOSE=yes” and “LOGFILE=/var/log/procmail.log” in the procmailrc.

I also seem to recall some folks had trouble with the DEFAULT setting that Virtualmin uses by default. Perhaps simply removing that line will fix the problem. I don’t know if this was in a Sendmail environment or not…but it’s worth a try.

if I remove the virtualmin default config it will function…

but virtualmin puts it back in.

ill try it with the virtualmin settings "in" and verbose logging

okay… obviously the first assignment is failing right off the bat

procmail: Assigning "VIRTUALMIN="
procmail: [[13610]] Fri Feb 24 12:18:42 2006
procmail: Executing "/usr/bin/test,!=,"
procmail: [[13610]] Fri Feb 24 12:18:42 2006
procmail: Non-zero exitcode (1) from "/usr/bin/test"
procmail: No match on "/usr/bin/test != "
procmail: Assigning "PATH=/root/bin:/bin:/usr/bin:/sbin:/usr/sbin:/usr/local/bin:/usr/X11R6/bin"
From Fri Feb 24 12:18:40 2006
Subject: Postmaster notify: see transcript for details
Folder: /var/mail/root

tailed from the beginning of a test send

procmail: Executing “/etc/webmin/virtual-server/,”
procmail: Assigning “VIRTUALMIN=”
procmail: [[13753]] Fri Feb 24 12:25:09 2006
procmail: Executing “/usr/bin/test,113638365818656,!=,”
procmail: [[13753]] Fri Feb 24 12:25:09 2006
procmail: Match on "/usr/bin/test 113638365818656 != "
procmail: Assigning “INCLUDERC=/etc/webmin/virtual-server/procmail/113638365818656”
procmail: Assigning “DROPPRIVS=yes”
procmail: Assuming identity of the recipient, VERBOSE=off
LibClamAV Error: Wrote 0 instead of 512 (/tmp/clamav-d0e6f59770f5ddd4/main.db).
cli_untgz: Disk quota exceeded
LibClamAV Error: cli_cvdload(): Can’t unpack CVD file.
LibClamAV Error: Can’t load /var/clamav/main.cvd: CVD extraction failure
ERROR: CVD extraction failure
procmail: Program failure (50) of “/usr/bin/clamscan”
From Fri Feb 24 12:25:07 2006
Folder: /dev/null

i turned quotas off since i couldnt find any user whose quota would have been exceeded

now… mail gets delivered but it doesnt look like its getting scanned by clamav… there is no "scanned by" header and no record of it in the log

this is very odd

turned quotas on…

now it looks like clamav is back in the loop

but it fails again

procmail: Assigning “DROPPRIVS=yes”
procmail: Assuming identity of the recipient, VERBOSE=off
LibClamAV Error: Wrote 0 instead of 512 (/tmp/clamav-beb2644a5ec5d228/main.db).
cli_untgz: Disk quota exceeded
LibClamAV Error: cli_cvdload(): Can’t unpack CVD file.
LibClamAV Error: Can’t load /var/clamav/main.cvd: CVD extraction failure
ERROR: CVD extraction failure
procmail: Program failure (50) of “/usr/bin/clamscan”

turning virus filtering off for the domain…

leaving quotas on…

gives the same result… the mail goes through fine…

included procmail file below

| /usr/bin/clamscan -
| /usr/bin/spamassassin --siteconfigpath /etc/webmin/virtual-server/spam/113630204230033

so this only happens if CLAMAV is on AND quotas on / are enabled.

even if the recipient AND clamav both have unlimited files and space

scratch that…

i think i may have figured it out

the quota was set to 5Mb on the recipient

he only had 4Kb of files… but if the extracted AV files are greater than 5Mb it would fail…