ports/108679: [PATCH] mail/spamlogd fail without PF
Alex Samorukov
samm at os2.kiev.ua
Fri Feb 2 09:40:16 UTC 2007
>Number: 108679
>Category: ports
>Synopsis: [PATCH] mail/spamlogd fail without PF
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Feb 02 09:40:15 GMT 2007
>Closed-Date:
>Last-Modified:
>Originator: Alex Samorukov
>Release: FreeBSD 6.1-RELEASE i386
>Organization:
Shevchenko Didkovskiy and Partners
>Environment:
System: FreeBSD 6.1-RELEASE #0: Mon Aug 14 15:36:37 EEST 2006
root at samm.loc:/usr/obj/usr/src/sys/SAMMKRNL
>Description:
Current implementation of the spamlogd daemon depend on the PF firewall. It need to be patched to work without pflogd0 interface if spamlogd compiled with WITH_IPFW option. Current implementation use tcpdump spawn on interface pflogd0 interface to watch for the passed packets. Also it use "action pass" command which is not avaible on real interfaces.
>How-To-Repeat:
Run spamlogd on system without PF. It will fail
>Fix:
Currently i dont know solution for this problem. We need to do more work to see an optimal way to solv this. I think that good idea is to use ipfw "tee" socket to forward passed packets to the spamlogd, and then - process them as usual. Using this way we will not need to launch tcpdump - instead we will launch a child, which listen for the tee packets and output ip addresses. I am ready to help with this patch. My mail is samm at os2.kiev.ua.
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list