ports/108679: [PATCH] mail/spamlogd fail without PF

Alex Samorukov samm at os2.kiev.ua
Fri Feb 2 09:40:16 UTC 2007

>Number:         108679
>Category:       ports
>Synopsis:       [PATCH] mail/spamlogd fail without PF
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Feb 02 09:40:15 GMT 2007
>Originator:     Alex Samorukov
>Release:        FreeBSD 6.1-RELEASE i386
Shevchenko Didkovskiy and Partners 

System: FreeBSD 6.1-RELEASE #0: Mon Aug 14 15:36:37 EEST 2006
    root at samm.loc:/usr/obj/usr/src/sys/SAMMKRNL


Current implementation of the spamlogd daemon depend on the PF firewall. It need to be patched to work without pflogd0 interface if spamlogd compiled with WITH_IPFW option. Current implementation use tcpdump spawn on interface pflogd0 interface to watch for the passed packets. Also it use "action pass" command which is not avaible on real interfaces.


Run spamlogd on system without PF. It will fail


Currently i dont know solution for this problem. We need to do more work to see an optimal way to solv this. I think that good idea is to use ipfw "tee" socket to forward passed packets to the spamlogd, and then - process them as usual. Using this way we will not need to launch tcpdump - instead we will launch a child, which listen for the tee packets and output ip addresses. I am ready to help with this patch. My mail is samm at os2.kiev.ua.


More information about the freebsd-ports-bugs mailing list