/usr/share/doc/dspam-doc/sendmail.txt is in dspam-doc 3.10.2+dfsg-13.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 | $Id: sendmail.txt,v 1.2 2010/06/12 15:12:15 sbajic Exp $
SENDMAIL INTEGRATION
Please follow the instructions in the README for building DSPAM. Once DSPAM
has been built, the following instructions may be used to integrate it with
sendmail.
DSPAM is best integrated with sendmail by masquerading as the local delivery
agent. This can be done by adding two lines to your config.mc file and
rebuilding your configuration:
define(`LOCAL_MAILER_PATH', `/usr/local/bin/dspam')
define(`LOCAL_MAILER_ARGS', `dspam "--deliver=innocent" --user $u -d %u')
Make sure these definitions are placed before the MAILER(local) definition.
Alternatively, you may define additional procmail arguments if you are using
procmail. For example:
define(`LOCAL_MAILER_PATH', `/usr/local/bin/dspam')
define(`LOCAL_MAILER_ARGS',
`dspam -t -Y -a $h "--deliver=innocent" --user $u -d %u')
NOTE: By default MAILER(local) define the flag F=w and sendmail check for a
valid user identity in passwd(5). This Flag does not play well with
virtual users - e.g. users authenticated via the saslauthd daemon. This
flag can be removed with: MODIFY_MAILER_FLAGS(`LOCAL', `-w')
If you don't feel like rebuilding your .cf files, you can alternatively
just replace your local mailer in the Mlocal block of sendmail.cf and
submit.cf. Be sure to update the path (P=) as well as arguments (A=).
NOTE: If you are using sendmail restricted shell (smrsh), you will
need to either disable it, or add /usr/local/bin/dspam to the allow list.
Some administrators have experienced problems using smrsh with DSPAM.
|