assp

最後更新: 2015-11-15

 

目錄

  • 介紹
  • 安裝 ASSP 2.2.X
  • 安裝別人打包好的 module - assp.mod.zip
  • Perl cpan
  • Install ASSP.pl
  • 執行
  • 基本設定(最快上馬的方法)
  • Panel
  • Auto - Startup
  • Troubeshoot
  • ASSP 設定
  • 建立 cron job
  • Admin 介面的設定
  • starterdb
  • Mail SSL/TLS
  • Web SSL
  • Greylist 的有關設定
  • URIBL
  • Cache File
  • Upgrade ASSP
  • NoprocessingOK
  • ClamAV
  • Tips

 


介紹

ASSP is a proxy and not a store-and-forward smtp server.

Perl version >= v5.10.1        <-- ASSP 2.4.X

TCP Port: 55555 | 55553

現在 ASSP 有 3 個版(2015-09):

  • ASSP 1.9.X (stopped at the end of 2014)
  • ASSP 2.2.X
  • ASSP 2.4.X

ASSP features

  • Uses your existing message transport and existing SMTP server.
  • Adds SSL/TLS support and Spam Analysis even for your non SSL aware MTA
  • Automatically customizes to your site's unique email profile.
  • Automatic whitelist -- noone you email will ever be blocked.
  • Early Sender validation -- Kills most spam before it ever reaches the server.
  • Advanced Virus Scanning with ClamAV and your File-System Virusscanner
  • Senders receive immediate notification if mail is blocked but no erroneous bounces are ever generated.
  • Redlist keeps an address off the whitelist.
  • No-processing addresses pass through.
  • Makes use of honeypot type spambucket addresses to automatically recognize spam and update your spam database.
  • Bayesian filter intelligently classifies email into spam and non-spam.
  • Community based grey IP list, Senderbase, SPF, DKIM support even if your MTA does not support it.
  • Supports additional site-defined regular expressions to identify spam or non-spam email.
  • Can optionally block all non-whitelisted email (for anti-spam zelots).
  • Mime encoded and other camouflaged spam is also recognized.
  • Automatically maintains the spam and non-spam databases.
  • Accepts whitelist submissions and spam error reports by authorized email.
  • Optionally rejects executable attachments from non-whitelisted (or all) addresses.
  • Practically no maintenance required.
  • Optionally blocks no mail but adds an email header and/or updates the message subject.
  • Optionally uses community-based spam statistics to identify hosts that are likely to send spam or non-spam mail.
  • Individual users can be configured to receive all mail.
  • Shows detailed analysis of spam rating process for specific messages.
  • Option to forward a copy of every rejected mail to an address or to resend blocked Mails.
  • Can block spam-bombs (when spammers forge your domain in the from field) and fake Bounces
  • Keeps spam statistics for your site.

 

 


安裝 ASSP 1.9.X

 

ASSP 1.9.X Download (2015-09)

http://sourceforge.net/projects/assp/files/ASSP%20Installation/

 

安裝 ASSP 2.2.X

Debian:

Install the necessary Perl modules.

    aptitude install libcompress-zlib-perl libemail-valid-perl libfile-readbackwards-perl libmail-spf-perl libemail-mime-perl \
    libemail-mime-modifier-perl libmail-srs-perl libnet-dns-perl libsys-syslog-perl libnet-ldap-perl unzip clamav \
    clamav-daemon libemail-send-perl libio-socket-ssl-perl libio-socket-inet6-perl libnet-cidr-lite-perl \
    libmail-spf-query-perl

Install the necessary CPAN

apt-get install build-essential

perl -MCPAN -e shell

很可惜在 Debian 上安裝 peal module 失敗了 -__-

cpan[1]> install File::Scan::ClamAV

ERROR: LOCAL: Socket file /root/.cpan/build/File-Scan-ClamAV-1.91-YSAWTK/clamsock could not be bound: Permission denied

 


安裝別人打包好的 module - assp.mod.zip

 

在 sourceforge 下載的 module 都已經很舊了 ..

下載: assp.mod.zip   <-- 有成 9M

# 一定要放它在 assp 的 sub-folder 下, 之後執行:

/usr/share/assp/assp.mod/install# perl mod_inst.pl

 


Perl cpan

 

在 Centos6 上安裝 assp 2.4 所須的 Modules:

安裝在 EPEL 內的 package:

rpm -Uvh http://dl.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm

yum install perl-Compress-Zlib perl-Compress-Raw-Zlib perl-Compress-Raw-Bzip2 \
  perl-Digest-SHA perl-Digest-SHA1 perl-Digest-MD5-File \
  perl-Email-MIME perl-Email-MIME-Modifier perl-Email-Send \
  perl-Email-Valid perl-Mail-SPF perl-File-ReadBackwards \
  perl-IO-Socket-SSL perl-Net-CIDR-Lite perl-Net-DNS \
  perl-Net-IP-Match-Regexp perl-Mail-DKIM perl-Text-Glob \
  perl-Number-Compare perl-Convert-TNEF perl-File-ReadBackwards \
  perl-MIME-Types perl-Net-SMTP-SSL perl-Tie-DBI \
  perl-Time-HiRes perl-Schedule-Cron-Events perl-Sys-MemInfo \
  perl-BerkeleyDB perl-Crypt-CBC perl-Crypt-OpenSSL-AES \
  perl-Set-Scalar

安裝在 Cpan 內的 package

yum groupinstall "Development Tools"

yum install cpan perl-YAML

之後

# 在這裡一個一個行較好 !

threads/1.74                             <-- cpan -i threads
threads::shared/1.32                <-- cpan -i threads::shared
Thread::Queue/2.11                 <-- cpan -i Thread::Queue
Thread::State/0.09                   <-- cpan -i Thread::State

LWP::Simple                             <-- cpan -i LWP::Simple

Net::LDAP                                 <-- cpan -i Net::LDAP
Net::SMTP                                 <-- cpan -i Net::SMTP
Net::SenderBase                       <-- cpan -i Net::SenderBase
Net::Syslog                               <-- cpan -i Net::Syslog

Sys::Syslog                               <-- cpan -i Sys::Syslog

Mail::SRS                                 <--  cpan -i Mail::SRS

Mail::SPF::Query                     <-- cpan -i Mail::SPF::Query

* 一次過安裝

cpan -i threads threads::shared Thread::Queue Thread::State \
  LWP::Simple Net::LDAP Net::SMTP Net::SenderBase \
  Net::Syslog Sys::Syslog Mail::SRS Mail::SPF::Query

# Centos 7

yum

yum install perl-threads perl-threads-shared perl-Thread-Queue \
 perl-Sys-Syslog perl-Mail-SPF perl-Net-IP perl-Text-Unidecode perl-Authen-SASL

cpam

cpan -i Regexp::Optimizer
cpan -i Sys::CpuAffinity
cpan -i Net::LDAP
cpan -i Unicode::GCString
cpan -i Tie::RDBM
cpan -i Thread::State
cpan -i Schedule::Cron

cpan -f Mail::SPF::Query
cpan -i File::Scan::ClamAV

cpan -i ASSP_WordStem
cpan -i ASSP_FC

spf

make: *** [test_dynamic] Error 255
  JMEHNLE/mail-spf-query/Mail-SPF-Query-1.999.1.tar.gz
  /usr/bin/make test -- NOT OK

cpan -f -i Mail::SPF::Query

clamav

ln -s /etc/clamd.d/scan.conf /etc/clamd.conf
export CLAMD_PATH=/usr/sbin/

Remark

perl assp.pl 執行後, 它會生成 moduleLoadErrors.txt

裡面有邁系統重差咩 package

firewall

firewall-cmd --permanent --zone=public \
--add-rich-rule='rule family="ipv4" source address="w.x.y.z" port protocol="tcp" port="55553" accept'

firewall-cmd --permanent --zone=public \
--add-rich-rule='rule family="ipv4" source address="w.x.y.z" port protocol="tcp" port="55553" accept'

firewall-cmd --reload

 


Version 2.5

 

service

cp /opt/assp/rc/assp /etc/init.d

chmod 755 /etc/init.d/assp

/usr/local/bin/perl assp.pl 2>&1 > /dev/null &

改成

/usr/bin/perl assp.pl 2>&1 > /dev/null &

/etc/init.d/assp start

watchdog

mkdir /root/scripts

cp assp_watchdog /root/scripts

chmod 755 /root/scripts/assp_watchdog

/root/scripts/assp_watchdog &

 

 


使用 ClamAV

 

File::Scan::ClamAV                   <--  cpan -i File::Scan::ClamAV

Compile 前一安要安裝 clamav clamd

yum install clamav clamd

否則會見到

Cannot find clamd in /root/bin (or a number of other places)
 - are you sure clamav in installed?

assp.cfg

# 啟用
UseAvClamd:=1

# 大個 4 Mbytes 的信不 scan
ClamAVBytes:=4000000

# Virus detected Score
vdValencePB:=50

# ClamAV will timeout after this many seconds.
ClamAVtimeout:=20

# default value 是錯的
AvClamdPort:=/var/run/clamav/clamd.sock

P.S.

在某些 list pass 了的情況下是不用被 scan 的

LOG:
[WhitelistedOK]
[NoprocessingOK]

測試:

1 無毒

Apr-04-14 09:45:07 m-39657-00279 [VIRUS] 198.160.xx.xx <sender@domain> 
to: recipient@domain ClamAV: scanned 63304 bytes in  message - OK ;

2 有毒

Apr-04-14 03:36:57 m-39655-00189 [VIRUS] 114.25.xx.xx <sender@domain> 
to: recipient@domain ClamAV: scanned 13460 bytes in  message - FOUND Heuristics.Phishing.Email.SpoofedDomain;

Service:

/etc/init.d/clamd start

chkconfig clamd on

 

Troubleshoot

Log:

Apr-03-14 12:48:55 File::Scan::ClamAV module version 1.91 installed but AvClamdPort not ready,
error: Cannot connect to unix socket '/var/run/clamav/clamd.ct': connect: No such file or directory;

Setting:

Centos 6 的 clamd socket default 是 /var/run/clamav/clamd.sock

 


Install ASSP.pl

 

yum install unzip

cd /usr/src

mkdir assp

cd assp

wget http://datahunter.org/files/story/481/assp_2.4.3_14258_install.zip

mv assp /usr/share

/usr/share

chmod 770 assp

# -r: Create a system account

useradd -r assp

chown root.assp assp

cd assp

chown -R assp. *

cp -a assp.cfg.defaults assp.cfg

cd /etc/init.d

wget http://datahunter.org/files/story/481/assp_centos.txt -O assp

chmod 700 assp

ln -s /usr/share/assp /usr/share/ASSP

/etc/sysconfig/iptables

................................................................
-A INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT
-A INPUT -s x.x.x.x -m state --state NEW -m tcp -p tcp --dport 55555 -j ACCEPT
-A INPUT -s x.x.x.x -m state --state NEW -m tcp -p tcp --dport 55553 -j ACCEPT

 


執行

 

第一次執行會見到以下 info:

perl assp.pl

Dec-14-12 16:40:30 [Main_Thread] Saving config
Dec-14-12 16:40:31 [Main_Thread] Info: saved config to /usr/share/assp/assp.cfg.tmp - which is now renamed to /usr/share/assp/assp.cfg
Dec-14-12 16:40:31 [Main_Thread] Finished saving config

第二次執行會見到以下 info:

# 2.2

loading modules.........U                               [failed] - errors are written to file /usr/share/assp/moduleLoadErrors.txt
starting maintenance worker thread -> init all databases
starting maintenance worker thread                      [OK]                                             
starting rebuild SpamDB worker thread                   [OK]
starting 5 communication worker threads ..

# 2.4

Nov-05-14 16:56:14 [Main_Thread] MainThread started

loading modules 有 failed 多數安裝回 missing package 就可, 比如我的 Error:

module Mail::SPF::Query could not be loaded
module Mail::DKIM::Verifier could not be loaded
File::Scan::ClamAV could not be loaded

解決:

perl -MCPAN -e shell

cpan[1]> install Mail::SPF::Query

cpan[1]> install Mail::DKIM::Verifier

cpan[1]> force install File::Scan::ClamAV

P.S.

有咩事記得看 log file !!


基本設定(最快上馬的方法)

 

設定檔:

assp.cfg

設定用戶:

# 不用 root 行的話, auto-restart 會唔 work

# after startup
runAsUser:=assp
runAsGroup:=assp

Daemon:

# fork and exit
AsADaemon:=1

# 停用左手邊  Menu 不用 ajax

hideAlphaIndex:=1

設定被保護的 Mail Server 在那裡:

1 對 1

<Network Setup Network Flow>

# your primary SMTP mail transfer agent (MTA)

SMTP Destination (smtpDestination)

進階:

localDomains:=file:files/localdomains.txt

domain1.com=>mx.domain.com:25
domain2.com=>mx.domain2.com:1025

Checking

[root@assp ASSP]# ps aux | grep -i assp

assp      4608  0.7 13.9  79028 71032 pts/2    S    10:33   0:11 perl assp.pl

Service:

/etc/init.d/clamd start

chkconfig assp on

chkconfig clamd on

 


Panel

 

Web Admin:

127.0.0.1:55555

有關設定:

webAdminPort:=55555
allowAdminConnectionsFrom:= 127.0.0.1
webAdminPassword:=                                           <-- 不用 pw

V2.2.x 的 Default PW:  root / nospam4me

報表:

127.0.0.1:55553

有關設定:

webStatPort:=55553
allowStatConnectionsFrom:=127.0.0.1

 


Auto - Startup Script

 

建立 /etc/init.d/assp

# Centos

cp rc/assp /etc/init.d/

修改設定

asspbase=/usr/share/ASSP

# /usr/local/bin/perl
/usr/bin/perl

 

chmod 755 assp

/etc/init.d/assp start

# Auto Start

# Debian

update-rc.d assp defaults 50

# Centos

chkconfig assp on

 


Watchdog

 

修改

#!/bin/bash

# 對應 assp 內的 "$asspbase/pid"
assppidfile=/usr/share/ASSP/pid

logfile=/var/log/assp_watchdog.log

 

chmod 755 /usr/share/ASSP/rc/assp_watchdog

/etc/rc.local

/usr/share/ASSP/rc/assp_watchdog &

 


Troubeshoot

 

收到以下的 Return Mail

 

Return1

 

Return2

 

情況:

[email protected]  -- send --> B@mydomain
[email protected] <-- return -- B@anotherdomain

 

有關設定:

2 dns server

assp configure

# SMTP error message to reject spam
# The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost.
# SESSIONID will be replaced by the unique ASSP identifier.
assp.cfg:defaultLocalHost:=

# Copy Spam and Send to this Address (collection mode, eg. baysSpamLog)
assp.cfg:sendAllSpam:=

 


ASSP 設定

 

# mx server  沒有 connection 的限制

noMaxSMTPSessions:=127.0.0.1
noGRIP:=127.0.0.1

# SMTP Session Limits:

maxSMTPSessions:=32
maxSMTPipSessions:5
maxSMTPipConnects:=5
maxSMTPipDuration:=90
smtpIdleTimeout:=300

# 當一個 Domain 由多過 10 個不同 IP 收過信後, 那它會被 Ban 2 小時

maxSMTPdomainIP:=10
maxSMTPdomainIPExpiration:=7200

#

localDomains:=file:files/localdomains.txt

nolocalDomains:=

# Enter any addresses that are your ISP or backup MX servers, separated by pipes (|).
ispip:=127.0.0.1

# Validate Sender Domain MX/A

DoDomainCheck:=1

# Enable SPF Validation

ValidateSPF:=1

# RBL

RBLServiceProvider:=zen.spamhaus.org|bl.spamcop.net

# 210.0.255.250 是 DNS Server
# 209.85.160.50 是 Sender 的 IP
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on zen.spamhaus.org for RBL checks on 209.85.160.50
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on psbl.surriel.com for RBL checks on 209.85.160.50
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on ix.dnsbl.manitu.net for RBL checks on 209.85.160.50
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on bl.spamcop.net for RBL checks on 209.85.160.50
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on l2.apews.org for RBL checks on 209.85.160.50
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on no-more-funn.moensted.dk for RBL checks on 209.85.160.50
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on combined.njabl.org for RBL checks on 209.85.160.50
Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on safe.dnsbl.sorbs.net for RBL checks on 209.85.160.50

# 設定用什麼 DNS Server

DNSServers:=xxx|xxx

# 其他 turning

enableINET6:=0

# reload 人手修改過的 assp

kill -HUP <pid>

 


建立 cron job

 

  • stat.pl                      <-- To list statistics from your maillog.txt (daily)
  • rebuildspamdb.pl       <-- rebuild the bayes database (weekly)

 

Rebuild SpamDB - rebuildspamdb

rebuildspamdb.pl builds the statistical model that is used to test incoming mail.

Directories:

  • spam
  • notspam
  • errors/spam
  • errors/notspam

usage:

perl rebuildspamdb.pl path/to/assp-base-dir

新版會自動 rebuildspam 的

assp.cfg

# Download and Install (rebuildspamdb.pl)
AutoUpdateREBUILD:=2

# run rebuildspamdb.pl at 3:00 06:00 .. 24:00
RebuildSchedule:=3|6|9|12|15|18|21|24

RebuildNotify:=admin@domain

mailreport.sh

#!/bin/sh
_report=/tmp/daily_report.txt
_recipient="[email protected]"

echo "assp Daily Report" | mail -s "assp report" -a $_report $_recipient

stat.pl

list statistics from your maillog.txt file

/usr/share/ASSP/stat.pl /usr/share/ASSP/logs/maillog.txt

As of Fri Jun  7 10:52:25 2013 the mail logfile shows:
3 proxy / smtp connections
0 were dropped for attempted relays (0.0% of total).
3 messages for 3.0 messages per day
 were spam (0.0%) or 0.0 spams per day
0 additions to / verifications of the whitelist (0.0 per day)
6 were judged spam by the bayesian filter (0.0% of spam)
0 were to spam addresses (0.0% of spam)
3 were nonspam (100.0%) or 3.0 nonspam per day
0 were sent from local clients (0.0% of nonspam)
3 were from whitelisted addresses (100.0% of nonspam)
 were from/to noprocessing addresses (0.0% of nonspam)
0 messages were passed to SPAMLOVERs
0 were ok after all checks (0.0% of nonspam)
-1 addresses are on the whitelist

cron jobs

crontab -u assp -e

# assp
1 1 * * 1       /usr/share/assp/rebuildspamdb.pl /usr/share/assp > /dev/null 2>&1

# daily report
50 23 * * *     /usr/share/assp/stat.pl /usr/share/assp/logs/maillog.txt > /tmp/daily_report.txt
10 0  * * *     /home/assp/mailreport.sh

 


Admin 介面的設定

 

# 限制那裡的人可以 connect 來

allowAdminConnectionsFrom
allowStatConnectionsFrom

# 安全及效能

enableWebAdminSSL:=1
EnableHTTPCompression:=1

# 左手邊  Menu 不用 ajax

hideAlphaIndex:=1

# 不 upload 東西

noGriplistUpload:=1
noGriplistDownload:=1
totalizeSpamStats:=0

# 防毒設定

# 對 whitelist 的人照 scan virus

ScanWL:=0
FileScanWL:=0

 


For an UPDATE installation

 

# go to installation dir

cd /usr/share/ASSP

# backup

BAKDIR=backup-`date +%Y%m%d`

mkdir $BAKDIR

mv *.pl $BAKDIR

cp assp.cfg $BAKDIR

# upgrade

cp -a /usr/share/ASSP.new/*.pl ./

# testing

perl assp.pl

 


starterdb

 

Bayesian Starter Database

下載

解壓後放入 assp/starterdb

 


Mail SSL/TLS

 

enableSSL:=1

SSLCertFile:=/usr/share/ASSP/certs/server-cert.pem
SSLKeyFile:=/usr/share/ASSP/certs/server-key.pem

SSLtimeout:=5
SSLCacheInterval:=0
SSLLog:=1
SSLRetryOnError:=1

 


Greylist 的有關設定

 

assp.cfg

EnableDelaying:=1

# DelayWL: Whitelisted Greylisting - Enable Greylisting for whitelisted users.

DelayWL:=0
DelayNP:=0
DelaySL:=0

# 'Enter the number of minutes for which delivery, related with IP address of the sending host, 
# is refused with a temporary failure.(Default: 5 minutes)
DelayEmbargoTime:=1

# 'Enable simple delaying for IP\'s in black penaltybox with totalscore above this value.'
DelayIP:=50
DelayIPTime:=1

# Add X-Assp-Delayed Header
DelayAddHeader:=1

# number of days for which whitelisted 'Tuplet' is considered valid.
DelayExpiryTime:=36

# /24 subnet rather than the specific IP, default: 1
DelayUseNetblocks:=1

# associated with spam, viri, failed rbl, spf etc, it is deleted from the safelist.
DelayExpireOnSpam:=1

# default: 1. adds some level of security to the delay database.
DelayMD5:=0

# noDelay:=file:files/nodelay.txt
noDelay: 145.145.145.145|145.146.

DelayShowDB:=file:files/delaydb
DelayShowDBwhite:=file:files/delaydb.white

DelayError:=451 4.7.1 Please try again later

# default: 10800
CleanDelayDBInterval:=120

檔案 delaydb 及 delaydb.white 只會在 CleanDelayDBInterval 生效後才建立 !

Dec-23-13 19:28:19 Cleaning up delaying databases ...
Dec-23-13 19:28:19 Cleaning delaying database (triplets) finished; keys before=1, deleted=0
Dec-23-13 19:28:19 Cleaning delaying database (safelisted tuplets) finished; keys before=0, deleted=0

第一次接觸

Dec-23-13 18:32:41 94761-11364 202.181.xxx.xxx <[email protected]> adding new triplet: (202.181.xx.xx,[email protected],[email protected])
Dec-23-13 18:32:41 94761-11364 202.181.xxx.xxx <[email protected]> to: [email protected] recipient delaying queued: [email protected]
Dec-23-13 18:32:41 94761-11364 202.181.xxx.xxx <[email protected]> to: [email protected] recipient delayed: [email protected]

第二次接觸

Dec-23-13 19:45:34 99134-10282 202.181.201.11 <[email protected]> accepting triplet: (202.181.201.0,tim@[email protected],[email protected]) waited: 1m 2s

之後的接觸

Dec-23-13 19:50:17 99417-04927 202.181.201.11 <[email protected]> renewing tuplet: (202.181.201.0,[email protected]) age: 0s

 

 


NoprocessingOK

 

設定 Over 某 Size 的信不 Scan

設定:

# 5 MB
npSize:=5000000
npSizeOut:=5000000

Log i.e.

Apr-03-14 11:03:13 m-39649-00005 [NoprocessingOK] 202.181.201.11 <sender@domain>
to: recipient@domain noprocessing -
message size (8555350) is above 2000000 (npSize) - [test mail @ 1106] - attachment '6.1mb.7z'

 


URIBL

 

信件內的所有 URL 都會去 check uribl 的.

assp.cfg

ValidateURIBL:=1
uriblTestMode:=
uriblnValencePB:=20
uriblValencePB:=25
URIBLWL:=1
URIBLNP:=1
URIBLLocal:=1
URIBLISP:=1
URIBLServiceProvider:=multi.surbl.org|black.uribl.com
URIBLCCTLDS:=file:files/URIBLCCTLDS.txt
URIBLmaxuris:=0
URIBLmaxdomains:=0
URIBLNoObfuscated:=1
URIBLmaxreplies:=2
URIBLmaxhits:=1
URIBLmaxtime:=10
URIBLsocktime:=1
URIBLwhitelist:=doubleclick.net
noURIBL:=
AddURIBLHeader:=1
URIBLCacheExp:=24
URIBLError:=554 5.7.1 Blacklisted by URIBLNAME

ValidateURIBL

Enable URI Blocklist Validation about (Default: 1)

URIBLwhitelist (Whitelisted URIBL Domains)

This prevents specific domains from being checked by URIBL module. For example:files/uriblwhite.txt.

URIBLCacheInterval (URIBL Cache Refresh Interval for Hits)

Domains in cache will be removed after this interval in days. Empty or 0 will disable the cache.

URIBLCacheIntervalMiss (URIBL Cache Refresh Interval for Misses)

Domains in cache with status=2 (miss) will be removed after this interval in days. Empty or 0 will prevent caching of non-hits.

Cache File:

pb/pbdb.uribl.db

 


Cache File

 

在 pb Folder 內

global             pbdb.mxa.db      pbdb.rbl.db.bak  pbdb.spf.db        pbdb.white.db.bak
pbdb.back.db       pbdb.mxa.db.bak  pbdb.rwl.db      pbdb.spf.db.bak
pbdb.back.db.bak   pbdb.ptr.db      pbdb.rwl.db.bak  pbdb.uribl.db
pbdb.black.db      pbdb.ptr.db.bak  pbdb.sb.db       pbdb.uribl.db.bak
pbdb.black.db.bak  pbdb.rbl.db      pbdb.sb.db.bak   pbdb.white.db

 


Upgrade ASSP

 

copy the following files  to your existing  ASSP folder:
- assp.pl                               <-- 必要的
- rebuildspamdb.pl

copy the following folders  to your existing  ASSP folder:
- images
- reports
- certs
- docs
- notes

copy from folder "files" into the folder "files" inside your old ASSP folder
(merge your modifications in the old files)

 


Tips

 

保持最新版:

# Download update 到 "/usr/share/ASSP/download (assp.pl)"
AutoUpdateASSP:=1

 

保持 ASSP 正常行:

# Exception 時 restart
AutoRestart:=1

# second
MainloopTimeout:=600

# Mainloop Timeout
AutoRestartAfterTimeOut:=1

# reload configuration data, combat potential memory leaks
AutoRestartInterval:=12

# 所有 restart 都會 call 它
AutoRestartCmd:=sleep 30;"/usr/bin/perl" "/usr/share/ASSP/assp.pl" "/usr/share/ASSP" &

NoMultipleASSPs:=1

 

附加檔案大小
assp.txt2.59 KB
assp_centos.txt1.08 KB
55553.jpg223.07 KB
assp_2.4.3_14258_install.zip1.46 MB

Creative Commons license icon Creative Commons license icon