spamassassin-milter/spamassassin-milter.8

139 lines
3.9 KiB
Groff
Raw Normal View History

2020-04-13 14:44:35 +00:00
.TH SPAMASSASSIN-MILTER 8 2020-04-13
2020-01-30 20:27:28 +00:00
.SH NAME
spamassassin-milter \- milter for spam filtering with SpamAssassin
.SH SYNOPSIS
.B spamassassin-milter
.RB [ \-a ]
.RB [ \-B ]
.RB [ \-H ]
.RB [ \-n ]
.RB [ \-r ]
2020-02-08 09:43:52 +00:00
[\fB\-s\fR \fIBYTES\fR]
[\fB\-t\fR \fINETS\fR]
.RB [ \-v ]
2020-01-30 20:27:28 +00:00
.IR SOCKET
[\fB\-\-\fR \fISPAMC_ARGS\fR...]
.SH DESCRIPTION
.B spamassassin-milter
2020-02-09 17:18:22 +00:00
is a milter that filters email through SpamAssassin server using the
.B spamc
2020-02-08 09:43:52 +00:00
client.
It reads the response from SpamAssassin and adds its diagnostic
2020-02-08 09:43:52 +00:00
.B X-Spam-
headers to the message, and can optionally apply header and body rewriting to
2020-02-09 17:18:22 +00:00
messages flagged as spam, or reject such messages at the SMTP level.
A message \*(lqflagged as spam\*(rq is a message with a header
2020-02-08 09:43:52 +00:00
.BR "X-Spam-Flag: YES" .
2020-01-30 20:27:28 +00:00
.PP
2020-02-08 09:43:52 +00:00
The mandatory
.I SOCKET
argument specifies the listening socket to open.
.I SOCKET
2020-02-09 17:18:22 +00:00
can be either an IPv4/IPv6 TCP socket in the form
.BI inet: PORT @ HOST
2020-02-08 09:43:52 +00:00
or
.BI inet6: PORT @ HOST
2020-02-08 09:43:52 +00:00
(for example,
2020-02-09 17:18:22 +00:00
.BR inet:3000@localhost ),
2020-02-08 09:43:52 +00:00
or a UNIX domain socket in the form
.BI unix: PATH
2020-02-08 09:43:52 +00:00
(for example,
.BR unix:/run/spamassassin-milter.sock ).
After the options and argument, additional arguments
.I SPAMC_ARGS
2020-02-08 09:43:52 +00:00
listed after
.B \-\-
are gathered as arguments to pass to the
.B spamc
invocation.
.B spamassassin-milter
2020-02-23 06:57:49 +00:00
uses sensible defaults and if run with no options, will apply modifications
2020-02-08 09:43:52 +00:00
received from SpamAssassin server.
.PP
.B spamassassin-milter
is a light-weight integration component, enabling use of SpamAssassin with a
milter-capable MTA.
Users are advised to familiarize themselves with the setup and configuration
options of the components participating, namely, the SpamAssassin programs
2020-02-08 09:43:52 +00:00
.B spamd
(SpamAssassin server) and
.BR spamc ,
and the MTA (Postfix).
2020-01-30 20:27:28 +00:00
.SH OPTIONS
.TP
2020-02-08 09:43:52 +00:00
.BR \-a ", " \-\-auth-untrusted
Treat authenticated senders as untrusted.
2020-02-09 17:18:22 +00:00
If this option is not used, authenticated senders are trusted, and their
messages are not processed with SpamAssassin.
2020-02-08 09:43:52 +00:00
.TP
.BR \-n ", " \-\-dry-run
Process messages as usual, but do not take action or apply any modifications.
Combined with
.BR \-\-verbose ,
this gives accurate insight into what would happen if run without
.BR \-\-dry-run .
.TP
.BR \-h ", " \-\-help
Print usage information.
.TP
.BR \-s ", " \-\-max-message-size " \fIBYTES\fR"
Maximum message size in bytes to pass to
.BR spamc .
.I BYTES
must be equal to or greater than the max size configured for
.BR spamc ,
else it is possible that the body of spam messages is truncated to the size
configured for
.BR spamc .
Defaults to the
.B spamc
default, 512000.
.TP
.BR \-B ", " \-\-preserve-body
Suppress rewriting of spam message body.
2020-02-12 08:35:32 +00:00
If this option is not used, the message body of messages flagged as spam is
replaced with the body received from SpamAssassin (as are the values of related
headers
2020-02-08 09:43:52 +00:00
.B MIME-Version
and
.BR Content-Type ,
2020-02-12 08:35:32 +00:00
if necessary).
2020-02-08 09:43:52 +00:00
.TP
.BR \-H ", " \-\-preserve-headers
Suppress rewriting of headers
2020-02-09 17:18:22 +00:00
.BR Subject ,
.BR From ,
and
2020-02-08 09:43:52 +00:00
.B To
of spam messages.
2020-02-12 08:35:32 +00:00
If this option is not used, these headers of messages flagged as spam will have
their values replaced with the values received from SpamAssassin, if necessary.
2020-02-08 09:43:52 +00:00
.TP
.BR \-r ", " \-\-reject-spam
Reject messages flagged as spam at the SMTP level.
Rejection results in a permanent SMTP error being returned to the client, and
the message is not delivered.
2020-02-08 09:43:52 +00:00
.TP
.BR \-t ", " \-\-trusted-networks " \fINETS\fR"
Trust connections coming from the IP networks or addresses
.IR NETS .
Connections from IP addresses contained in trusted networks are not processed
with SpamAssassin.
.I NETS
is a comma-separated list of IP network addresses, for example,
.BR ::1/128,127.0.0.0/8,192.168.1.39 .
If this option is not used, all connections from loopback addresses are trusted.
.TP
2020-01-30 20:27:28 +00:00
.BR \-v ", " \-\-verbose
Enable verbose operation logging.
2020-02-08 09:43:52 +00:00
If this option is not used, only unexpected error conditions are logged (that
is, printed to standard error).
2020-01-30 20:27:28 +00:00
.TP
2020-02-08 09:43:52 +00:00
.BR \-V ", " \-\-version
Print version information.
2020-01-30 20:27:28 +00:00
.SH SEE ALSO
2020-02-23 06:57:49 +00:00
.BR spamassassin (1),
.BR spamc (1),
2020-02-23 06:57:49 +00:00
.BR Mail::SpamAssassin::Conf (3),
.BR spamd (8)