最後更新: 2015-11-15
目錄
- 介紹
- 安裝 ASSP 2.2.X
- 安裝別人打包好的 module - assp.mod.zip
- Perl cpan
- Install ASSP.pl
- 執行
- 基本設定(最快上馬的方法)
- Panel
- Auto - Startup
- Troubeshoot
- ASSP 設定
- 建立 cron job
- Admin 介面的設定
- starterdb
- Mail SSL/TLS
- Web SSL
- Greylist 的有關設定
- URIBL
- Cache File
- Upgrade ASSP
- NoprocessingOK
- ClamAV
- Tips
介紹
ASSP is a proxy and not a store-and-forward smtp server.
Perl version >= v5.10.1 <-- ASSP 2.4.X
TCP Port: 55555 | 55553
現在 ASSP 有 3 個版(2015-09):
- ASSP 1.9.X (stopped at the end of 2014)
- ASSP 2.2.X
- ASSP 2.4.X
ASSP features
- Uses your existing message transport and existing SMTP server.
- Adds SSL/TLS support and Spam Analysis even for your non SSL aware MTA
- Automatically customizes to your site's unique email profile.
- Automatic whitelist -- noone you email will ever be blocked.
- Early Sender validation -- Kills most spam before it ever reaches the server.
- Advanced Virus Scanning with ClamAV and your File-System Virusscanner
- Senders receive immediate notification if mail is blocked but no erroneous bounces are ever generated.
- Redlist keeps an address off the whitelist.
- No-processing addresses pass through.
- Makes use of honeypot type spambucket addresses to automatically recognize spam and update your spam database.
- Bayesian filter intelligently classifies email into spam and non-spam.
- Community based grey IP list, Senderbase, SPF, DKIM support even if your MTA does not support it.
- Supports additional site-defined regular expressions to identify spam or non-spam email.
- Can optionally block all non-whitelisted email (for anti-spam zelots).
- Mime encoded and other camouflaged spam is also recognized.
- Automatically maintains the spam and non-spam databases.
- Accepts whitelist submissions and spam error reports by authorized email.
- Optionally rejects executable attachments from non-whitelisted (or all) addresses.
- Practically no maintenance required.
- Optionally blocks no mail but adds an email header and/or updates the message subject.
- Optionally uses community-based spam statistics to identify hosts that are likely to send spam or non-spam mail.
- Individual users can be configured to receive all mail.
- Shows detailed analysis of spam rating process for specific messages.
- Option to forward a copy of every rejected mail to an address or to resend blocked Mails.
- Can block spam-bombs (when spammers forge your domain in the from field) and fake Bounces
- Keeps spam statistics for your site.
安裝 ASSP 1.9.X
ASSP 1.9.X Download (2015-09)
http://sourceforge.net/projects/assp/files/ASSP%20Installation/
安裝 ASSP 2.2.X
Debian:
Install the necessary Perl modules.
aptitude install libcompress-zlib-perl libemail-valid-perl libfile-readbackwards-perl libmail-spf-perl libemail-mime-perl \
libemail-mime-modifier-perl libmail-srs-perl libnet-dns-perl libsys-syslog-perl libnet-ldap-perl unzip clamav \
clamav-daemon libemail-send-perl libio-socket-ssl-perl libio-socket-inet6-perl libnet-cidr-lite-perl \
libmail-spf-query-perl
Install the necessary CPAN
apt-get install build-essential
perl -MCPAN -e shell
很可惜在 Debian 上安裝 peal module 失敗了 -__-
cpan[1]> install File::Scan::ClamAV
ERROR: LOCAL: Socket file /root/.cpan/build/File-Scan-ClamAV-1.91-YSAWTK/clamsock could not be bound: Permission denied
安裝別人打包好的 module - assp.mod.zip
在 sourceforge 下載的 module 都已經很舊了 ..
下載: assp.mod.zip <-- 有成 9M
# 一定要放它在 assp 的 sub-folder 下, 之後執行:
/usr/share/assp/assp.mod/install# perl mod_inst.pl
Perl cpan
在 Centos6 上安裝 assp 2.4 所須的 Modules:
安裝在 EPEL 內的 package:
rpm -Uvh http://dl.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
yum install perl-Compress-Zlib perl-Compress-Raw-Zlib perl-Compress-Raw-Bzip2 \ perl-Digest-SHA perl-Digest-SHA1 perl-Digest-MD5-File \ perl-Email-MIME perl-Email-MIME-Modifier perl-Email-Send \ perl-Email-Valid perl-Mail-SPF perl-File-ReadBackwards \ perl-IO-Socket-SSL perl-Net-CIDR-Lite perl-Net-DNS \ perl-Net-IP-Match-Regexp perl-Mail-DKIM perl-Text-Glob \ perl-Number-Compare perl-Convert-TNEF perl-File-ReadBackwards \ perl-MIME-Types perl-Net-SMTP-SSL perl-Tie-DBI \ perl-Time-HiRes perl-Schedule-Cron-Events perl-Sys-MemInfo \ perl-BerkeleyDB perl-Crypt-CBC perl-Crypt-OpenSSL-AES \ perl-Set-Scalar
安裝在 Cpan 內的 package
yum groupinstall "Development Tools"
yum install cpan perl-YAML
之後
# 在這裡一個一個行較好 !
threads/1.74 <-- cpan -i threads
threads::shared/1.32 <-- cpan -i threads::shared
Thread::Queue/2.11 <-- cpan -i Thread::Queue
Thread::State/0.09 <-- cpan -i Thread::State
LWP::Simple <-- cpan -i LWP::Simple
Net::LDAP <-- cpan -i Net::LDAP
Net::SMTP <-- cpan -i Net::SMTP
Net::SenderBase <-- cpan -i Net::SenderBase
Net::Syslog <-- cpan -i Net::Syslog
Sys::Syslog <-- cpan -i Sys::Syslog
Mail::SRS <-- cpan -i Mail::SRS
Mail::SPF::Query <-- cpan -i Mail::SPF::Query
* 一次過安裝
cpan -i threads threads::shared Thread::Queue Thread::State \ LWP::Simple Net::LDAP Net::SMTP Net::SenderBase \ Net::Syslog Sys::Syslog Mail::SRS Mail::SPF::Query
# Centos 7
yum
yum install perl-threads perl-threads-shared perl-Thread-Queue \ perl-Sys-Syslog perl-Mail-SPF perl-Net-IP perl-Text-Unidecode perl-Authen-SASL
cpam
cpan -i Regexp::Optimizer cpan -i Sys::CpuAffinity cpan -i Net::LDAP cpan -i Unicode::GCString cpan -i Tie::RDBM cpan -i Thread::State cpan -i Schedule::Cron cpan -f Mail::SPF::Query cpan -i File::Scan::ClamAV cpan -i ASSP_WordStem cpan -i ASSP_FC
spf
make: *** [test_dynamic] Error 255 JMEHNLE/mail-spf-query/Mail-SPF-Query-1.999.1.tar.gz /usr/bin/make test -- NOT OK
cpan -f -i Mail::SPF::Query
clamav
ln -s /etc/clamd.d/scan.conf /etc/clamd.conf
export CLAMD_PATH=/usr/sbin/
Remark
perl assp.pl 執行後, 它會生成 moduleLoadErrors.txt
裡面有邁系統重差咩 package
firewall
firewall-cmd --permanent --zone=public \
--add-rich-rule='rule family="ipv4" source address="w.x.y.z" port protocol="tcp" port="55553" accept'
firewall-cmd --permanent --zone=public \
--add-rich-rule='rule family="ipv4" source address="w.x.y.z" port protocol="tcp" port="55553" accept'
firewall-cmd --reload
Version 2.5
service
cp /opt/assp/rc/assp /etc/init.d
chmod 755 /etc/init.d/assp
將
/usr/local/bin/perl assp.pl 2>&1 > /dev/null &
改成
/usr/bin/perl assp.pl 2>&1 > /dev/null &
/etc/init.d/assp start
watchdog
mkdir /root/scripts
cp assp_watchdog /root/scripts
chmod 755 /root/scripts/assp_watchdog
/root/scripts/assp_watchdog &
使用 ClamAV
File::Scan::ClamAV <-- cpan -i File::Scan::ClamAV
Compile 前一安要安裝 clamav clamd
yum install clamav clamd
否則會見到
Cannot find clamd in /root/bin (or a number of other places) - are you sure clamav in installed?
assp.cfg
# 啟用
UseAvClamd:=1
# 大個 4 Mbytes 的信不 scan
ClamAVBytes:=4000000
# Virus detected Score
vdValencePB:=50
# ClamAV will timeout after this many seconds.
ClamAVtimeout:=20
# default value 是錯的
AvClamdPort:=/var/run/clamav/clamd.sock
P.S.
在某些 list pass 了的情況下是不用被 scan 的
LOG: [WhitelistedOK] [NoprocessingOK]
測試:
1 無毒
Apr-04-14 09:45:07 m-39657-00279 [VIRUS] 198.160.xx.xx <sender@domain> to: recipient@domain ClamAV: scanned 63304 bytes in message - OK ;
2 有毒
Apr-04-14 03:36:57 m-39655-00189 [VIRUS] 114.25.xx.xx <sender@domain> to: recipient@domain ClamAV: scanned 13460 bytes in message - FOUND Heuristics.Phishing.Email.SpoofedDomain;
Service:
/etc/init.d/clamd start
chkconfig clamd on
Troubleshoot
Log:
Apr-03-14 12:48:55 File::Scan::ClamAV module version 1.91 installed but AvClamdPort not ready, error: Cannot connect to unix socket '/var/run/clamav/clamd.ct': connect: No such file or directory;
Setting:
Centos 6 的 clamd socket default 是 /var/run/clamav/clamd.sock
Install ASSP.pl
yum install unzip
cd /usr/src
mkdir assp
cd assp
wget http://datahunter.org/files/story/481/assp_2.4.3_14258_install.zip
mv assp /usr/share
/usr/share
chmod 770 assp
# -r: Create a system account
useradd -r assp
chown root.assp assp
cd assp
chown -R assp. *
cp -a assp.cfg.defaults assp.cfg
cd /etc/init.d
wget http://datahunter.org/files/story/481/assp_centos.txt -O assp
chmod 700 assp
ln -s /usr/share/assp /usr/share/ASSP
/etc/sysconfig/iptables
................................................................ -A INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT -A INPUT -s x.x.x.x -m state --state NEW -m tcp -p tcp --dport 55555 -j ACCEPT -A INPUT -s x.x.x.x -m state --state NEW -m tcp -p tcp --dport 55553 -j ACCEPT
執行
第一次執行會見到以下 info:
perl assp.pl
Dec-14-12 16:40:30 [Main_Thread] Saving config Dec-14-12 16:40:31 [Main_Thread] Info: saved config to /usr/share/assp/assp.cfg.tmp - which is now renamed to /usr/share/assp/assp.cfg Dec-14-12 16:40:31 [Main_Thread] Finished saving config
第二次執行會見到以下 info:
# 2.2
loading modules.........U [failed] - errors are written to file /usr/share/assp/moduleLoadErrors.txt starting maintenance worker thread -> init all databases starting maintenance worker thread [OK] starting rebuild SpamDB worker thread [OK] starting 5 communication worker threads ..
# 2.4
Nov-05-14 16:56:14 [Main_Thread] MainThread started
loading modules 有 failed 多數安裝回 missing package 就可, 比如我的 Error:
module Mail::SPF::Query could not be loaded module Mail::DKIM::Verifier could not be loaded File::Scan::ClamAV could not be loaded
解決:
perl -MCPAN -e shell
cpan[1]> install Mail::SPF::Query
cpan[1]> install Mail::DKIM::Verifier
cpan[1]> force install File::Scan::ClamAV
P.S.
有咩事記得看 log file !!
基本設定(最快上馬的方法)
設定檔:
assp.cfg
設定用戶:
# 不用 root 行的話, auto-restart 會唔 work
# after startup runAsUser:=assp runAsGroup:=assp
Daemon:
# fork and exit AsADaemon:=1
# 停用左手邊 Menu 不用 ajax
hideAlphaIndex:=1
設定被保護的 Mail Server 在那裡:
1 對 1
<Network Setup Network Flow>
# your primary SMTP mail transfer agent (MTA)
SMTP Destination (smtpDestination)
進階:
localDomains:=file:files/localdomains.txt
domain1.com=>mx.domain.com:25 domain2.com=>mx.domain2.com:1025
Checking
[root@assp ASSP]# ps aux | grep -i assp
assp 4608 0.7 13.9 79028 71032 pts/2 S 10:33 0:11 perl assp.pl
Service:
/etc/init.d/clamd start
chkconfig assp on
chkconfig clamd on
Panel
Web Admin:
127.0.0.1:55555
有關設定:
webAdminPort:=55555 allowAdminConnectionsFrom:= 127.0.0.1 webAdminPassword:= <-- 不用 pw
V2.2.x 的 Default PW: root / nospam4me
報表:
127.0.0.1:55553
有關設定:
webStatPort:=55553 allowStatConnectionsFrom:=127.0.0.1
Auto - Startup Script
建立 /etc/init.d/assp
# Centos cp rc/assp /etc/init.d/
修改設定
asspbase=/usr/share/ASSP # /usr/local/bin/perl /usr/bin/perl
chmod 755 assp
/etc/init.d/assp start
# Auto Start
# Debian
update-rc.d assp defaults 50
# Centos
chkconfig assp on
Watchdog
修改
#!/bin/bash # 對應 assp 內的 "$asspbase/pid" assppidfile=/usr/share/ASSP/pid logfile=/var/log/assp_watchdog.log
chmod 755 /usr/share/ASSP/rc/assp_watchdog
/etc/rc.local
/usr/share/ASSP/rc/assp_watchdog &
Troubeshoot
收到以下的 Return Mail
Return1
Return2
情況:
[email protected] -- send --> B@mydomain [email protected] <-- return -- B@anotherdomain
有關設定:
2 dns server
assp configure
# SMTP error message to reject spam # The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. # SESSIONID will be replaced by the unique ASSP identifier. assp.cfg:defaultLocalHost:= # Copy Spam and Send to this Address (collection mode, eg. baysSpamLog) assp.cfg:sendAllSpam:=
ASSP 設定
# mx server 沒有 connection 的限制
noMaxSMTPSessions:=127.0.0.1 noGRIP:=127.0.0.1
# SMTP Session Limits:
maxSMTPSessions:=32 maxSMTPipSessions:5 maxSMTPipConnects:=5 maxSMTPipDuration:=90 smtpIdleTimeout:=300
# 當一個 Domain 由多過 10 個不同 IP 收過信後, 那它會被 Ban 2 小時
maxSMTPdomainIP:=10 maxSMTPdomainIPExpiration:=7200
#
localDomains:=file:files/localdomains.txt nolocalDomains:= # Enter any addresses that are your ISP or backup MX servers, separated by pipes (|). ispip:=127.0.0.1
# Validate Sender Domain MX/A
DoDomainCheck:=1
# Enable SPF Validation
ValidateSPF:=1
# RBL
RBLServiceProvider:=zen.spamhaus.org|bl.spamcop.net
# 210.0.255.250 是 DNS Server # 209.85.160.50 是 Sender 的 IP Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on zen.spamhaus.org for RBL checks on 209.85.160.50 Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on psbl.surriel.com for RBL checks on 209.85.160.50 Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on ix.dnsbl.manitu.net for RBL checks on 209.85.160.50 Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on bl.spamcop.net for RBL checks on 209.85.160.50 Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on l2.apews.org for RBL checks on 209.85.160.50 Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on no-more-funn.moensted.dk for RBL checks on 209.85.160.50 Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on combined.njabl.org for RBL checks on 209.85.160.50 Dec-23-13 18:29:29 Sending DNS-query to 210.0.255.250 on safe.dnsbl.sorbs.net for RBL checks on 209.85.160.50
# 設定用什麼 DNS Server
DNSServers:=xxx|xxx
# 其他 turning
enableINET6:=0
# reload 人手修改過的 assp
kill -HUP <pid>
建立 cron job
- stat.pl <-- To list statistics from your maillog.txt (daily)
- rebuildspamdb.pl <-- rebuild the bayes database (weekly)
Rebuild SpamDB - rebuildspamdb
rebuildspamdb.pl builds the statistical model that is used to test incoming mail.
Directories:
- spam
- notspam
- errors/spam
- errors/notspam
usage:
perl rebuildspamdb.pl path/to/assp-base-dir
新版會自動 rebuildspam 的
assp.cfg
# Download and Install (rebuildspamdb.pl) AutoUpdateREBUILD:=2 # run rebuildspamdb.pl at 3:00 06:00 .. 24:00 RebuildSchedule:=3|6|9|12|15|18|21|24 RebuildNotify:=admin@domain
mailreport.sh
#!/bin/sh _report=/tmp/daily_report.txt _recipient="[email protected]" echo "assp Daily Report" | mail -s "assp report" -a $_report $_recipient
stat.pl
list statistics from your maillog.txt file
/usr/share/ASSP/stat.pl /usr/share/ASSP/logs/maillog.txt As of Fri Jun 7 10:52:25 2013 the mail logfile shows: 3 proxy / smtp connections 0 were dropped for attempted relays (0.0% of total). 3 messages for 3.0 messages per day were spam (0.0%) or 0.0 spams per day 0 additions to / verifications of the whitelist (0.0 per day) 6 were judged spam by the bayesian filter (0.0% of spam) 0 were to spam addresses (0.0% of spam) 3 were nonspam (100.0%) or 3.0 nonspam per day 0 were sent from local clients (0.0% of nonspam) 3 were from whitelisted addresses (100.0% of nonspam) were from/to noprocessing addresses (0.0% of nonspam) 0 messages were passed to SPAMLOVERs 0 were ok after all checks (0.0% of nonspam) -1 addresses are on the whitelist
cron jobs
crontab -u assp -e
# assp 1 1 * * 1 /usr/share/assp/rebuildspamdb.pl /usr/share/assp > /dev/null 2>&1 # daily report 50 23 * * * /usr/share/assp/stat.pl /usr/share/assp/logs/maillog.txt > /tmp/daily_report.txt 10 0 * * * /home/assp/mailreport.sh
Admin 介面的設定
# 限制那裡的人可以 connect 來
allowAdminConnectionsFrom allowStatConnectionsFrom
# 安全及效能
enableWebAdminSSL:=1 EnableHTTPCompression:=1
# 左手邊 Menu 不用 ajax
hideAlphaIndex:=1
# 不 upload 東西
noGriplistUpload:=1 noGriplistDownload:=1 totalizeSpamStats:=0
# 防毒設定
# 對 whitelist 的人照 scan virus
ScanWL:=0 FileScanWL:=0
For an UPDATE installation
# go to installation dir
cd /usr/share/ASSP
# backup
BAKDIR=backup-`date +%Y%m%d`
mkdir $BAKDIR
mv *.pl $BAKDIR
cp assp.cfg $BAKDIR
# upgrade
cp -a /usr/share/ASSP.new/*.pl ./
# testing
perl assp.pl
starterdb
Bayesian Starter Database
解壓後放入 assp/starterdb
Mail SSL/TLS
enableSSL:=1 SSLCertFile:=/usr/share/ASSP/certs/server-cert.pem SSLKeyFile:=/usr/share/ASSP/certs/server-key.pem SSLtimeout:=5 SSLCacheInterval:=0 SSLLog:=1 SSLRetryOnError:=1
Greylist 的有關設定
assp.cfg
EnableDelaying:=1
# DelayWL: Whitelisted Greylisting - Enable Greylisting for whitelisted users.
DelayWL:=0
DelayNP:=0
DelaySL:=0
# 'Enter the number of minutes for which delivery, related with IP address of the sending host,
# is refused with a temporary failure.(Default: 5 minutes)
DelayEmbargoTime:=1
# 'Enable simple delaying for IP\'s in black penaltybox with totalscore above this value.'
DelayIP:=50
DelayIPTime:=1
# Add X-Assp-Delayed Header
DelayAddHeader:=1
# number of days for which whitelisted 'Tuplet' is considered valid.
DelayExpiryTime:=36
# /24 subnet rather than the specific IP, default: 1
DelayUseNetblocks:=1
# associated with spam, viri, failed rbl, spf etc, it is deleted from the safelist.
DelayExpireOnSpam:=1
# default: 1. adds some level of security to the delay database.
DelayMD5:=0
# noDelay:=file:files/nodelay.txt
noDelay: 145.145.145.145|145.146.
DelayShowDB:=file:files/delaydb
DelayShowDBwhite:=file:files/delaydb.white
DelayError:=451 4.7.1 Please try again later
# default: 10800
CleanDelayDBInterval:=120
檔案 delaydb 及 delaydb.white 只會在 CleanDelayDBInterval 生效後才建立 !
Dec-23-13 19:28:19 Cleaning up delaying databases ... Dec-23-13 19:28:19 Cleaning delaying database (triplets) finished; keys before=1, deleted=0 Dec-23-13 19:28:19 Cleaning delaying database (safelisted tuplets) finished; keys before=0, deleted=0
第一次接觸
Dec-23-13 18:32:41 94761-11364 202.181.xxx.xxx <[email protected]> adding new triplet: (202.181.xx.xx,[email protected],[email protected]) Dec-23-13 18:32:41 94761-11364 202.181.xxx.xxx <[email protected]> to: [email protected] recipient delaying queued: [email protected] Dec-23-13 18:32:41 94761-11364 202.181.xxx.xxx <[email protected]> to: [email protected] recipient delayed: [email protected]
第二次接觸
Dec-23-13 19:45:34 99134-10282 202.181.201.11 <[email protected]> accepting triplet: (202.181.201.0,tim@[email protected],[email protected]) waited: 1m 2s
之後的接觸
Dec-23-13 19:50:17 99417-04927 202.181.201.11 <[email protected]> renewing tuplet: (202.181.201.0,[email protected]) age: 0s
NoprocessingOK
設定 Over 某 Size 的信不 Scan
設定:
# 5 MB npSize:=5000000 npSizeOut:=5000000
Log i.e.
Apr-03-14 11:03:13 m-39649-00005 [NoprocessingOK] 202.181.201.11 <sender@domain> to: recipient@domain noprocessing - message size (8555350) is above 2000000 (npSize) - [test mail @ 1106] - attachment '6.1mb.7z'
URIBL
信件內的所有 URL 都會去 check uribl 的.
assp.cfg
ValidateURIBL:=1 uriblTestMode:= uriblnValencePB:=20 uriblValencePB:=25 URIBLWL:=1 URIBLNP:=1 URIBLLocal:=1 URIBLISP:=1 URIBLServiceProvider:=multi.surbl.org|black.uribl.com URIBLCCTLDS:=file:files/URIBLCCTLDS.txt URIBLmaxuris:=0 URIBLmaxdomains:=0 URIBLNoObfuscated:=1 URIBLmaxreplies:=2 URIBLmaxhits:=1 URIBLmaxtime:=10 URIBLsocktime:=1 URIBLwhitelist:=doubleclick.net noURIBL:= AddURIBLHeader:=1 URIBLCacheExp:=24 URIBLError:=554 5.7.1 Blacklisted by URIBLNAME
ValidateURIBL
Enable URI Blocklist Validation about (Default: 1)
URIBLwhitelist (Whitelisted URIBL Domains)
This prevents specific domains from being checked by URIBL module. For example:files/uriblwhite.txt.
URIBLCacheInterval (URIBL Cache Refresh Interval for Hits)
Domains in cache will be removed after this interval in days. Empty or 0 will disable the cache.
URIBLCacheIntervalMiss (URIBL Cache Refresh Interval for Misses)
Domains in cache with status=2 (miss) will be removed after this interval in days. Empty or 0 will prevent caching of non-hits.
Cache File:
pb/pbdb.uribl.db
Cache File
在 pb Folder 內
global pbdb.mxa.db pbdb.rbl.db.bak pbdb.spf.db pbdb.white.db.bak
pbdb.back.db pbdb.mxa.db.bak pbdb.rwl.db pbdb.spf.db.bak
pbdb.back.db.bak pbdb.ptr.db pbdb.rwl.db.bak pbdb.uribl.db
pbdb.black.db pbdb.ptr.db.bak pbdb.sb.db pbdb.uribl.db.bak
pbdb.black.db.bak pbdb.rbl.db pbdb.sb.db.bak pbdb.white.db
Upgrade ASSP
copy the following files to your existing ASSP folder:
- assp.pl <-- 必要的
- rebuildspamdb.pl
copy the following folders to your existing ASSP folder:
- images
- reports
- certs
- docs
- notes
copy from folder "files" into the folder "files" inside your old ASSP folder
(merge your modifications in the old files)
Tips
保持最新版:
# Download update 到 "/usr/share/ASSP/download (assp.pl)" AutoUpdateASSP:=1
保持 ASSP 正常行:
# Exception 時 restart AutoRestart:=1 # second MainloopTimeout:=600 # Mainloop Timeout AutoRestartAfterTimeOut:=1 # reload configuration data, combat potential memory leaks AutoRestartInterval:=12 # 所有 restart 都會 call 它 AutoRestartCmd:=sleep 30;"/usr/bin/perl" "/usr/share/ASSP/assp.pl" "/usr/share/ASSP" & NoMultipleASSPs:=1
附加檔案 | 大小 |
---|---|
assp.txt | 2.59 KB |
assp_centos.txt | 1.08 KB |
55553.jpg | 223.07 KB |
assp_2.4.3_14258_install.zip | 1.46 MB |