Date: Fri, 2 Feb 2007 11:17:01 +0200 From: "Alex Samorukov" <samm@os2.kiev.ua> To: "FreeBSD gnats submit" <FreeBSD-gnats-submit@FreeBSD.org> Cc: samm@os2.kiev.ua Subject: ports/108679: [PATCH] mail/spamlogd fail without PF Message-ID: <1170407821.1218@samm.loc> Resent-Message-ID: <200702020940.l129eFkh004321@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 108679 >Category: ports >Synopsis: [PATCH] mail/spamlogd fail without PF >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Feb 02 09:40:15 GMT 2007 >Closed-Date: >Last-Modified: >Originator: Alex Samorukov >Release: FreeBSD 6.1-RELEASE i386 >Organization: Shevchenko Didkovskiy and Partners >Environment: System: FreeBSD 6.1-RELEASE #0: Mon Aug 14 15:36:37 EEST 2006 root@samm.loc:/usr/obj/usr/src/sys/SAMMKRNL >Description: Current implementation of the spamlogd daemon depend on the PF firewall. It need to be patched to work without pflogd0 interface if spamlogd compiled with WITH_IPFW option. Current implementation use tcpdump spawn on interface pflogd0 interface to watch for the passed packets. Also it use "action pass" command which is not avaible on real interfaces. >How-To-Repeat: Run spamlogd on system without PF. It will fail >Fix: Currently i dont know solution for this problem. We need to do more work to see an optimal way to solv this. I think that good idea is to use ipfw "tee" socket to forward passed packets to the spamlogd, and then - process them as usual. Using this way we will not need to launch tcpdump - instead we will launch a child, which listen for the tee packets and output ip addresses. I am ready to help with this patch. My mail is samm@os2.kiev.ua. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1170407821.1218>