ports/108679: [PATCH] mail/spamlogd fail without PF

Alex Samorukov samm at os2.kiev.ua
Fri Feb 2 09:40:16 UTC 2007


>Number:         108679
>Category:       ports
>Synopsis:       [PATCH] mail/spamlogd fail without PF
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Feb 02 09:40:15 GMT 2007
>Closed-Date:
>Last-Modified:
>Originator:     Alex Samorukov
>Release:        FreeBSD 6.1-RELEASE i386
>Organization:
Shevchenko Didkovskiy and Partners 
>Environment:


System: FreeBSD 6.1-RELEASE #0: Mon Aug 14 15:36:37 EEST 2006
    root at samm.loc:/usr/obj/usr/src/sys/SAMMKRNL



>Description:


Current implementation of the spamlogd daemon depend on the PF firewall. It need to be patched to work without pflogd0 interface if spamlogd compiled with WITH_IPFW option. Current implementation use tcpdump spawn on interface pflogd0 interface to watch for the passed packets. Also it use "action pass" command which is not avaible on real interfaces.


>How-To-Repeat:


Run spamlogd on system without PF. It will fail


>Fix:


Currently i dont know solution for this problem. We need to do more work to see an optimal way to solv this. I think that good idea is to use ipfw "tee" socket to forward passed packets to the spamlogd, and then - process them as usual. Using this way we will not need to launch tcpdump - instead we will launch a child, which listen for the tee packets and output ip addresses. I am ready to help with this patch. My mail is samm at os2.kiev.ua.


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list