The patch appended below makes it easyer to reliably start and stop
the milter. Moreover it gives access to the "local policy"
configuration, which may be used if some of your users have set up
forwardings to their account on your host.
The patch is made against the 1.21 version, as found on spf.pobox.com
Starting the milter:
--------------------
I have moved the daemon fork() closer to the end of the script.
Moreover, I've made sure that the parent only exits if the socket
has already been created. That way, it is easyer to put the milter
into sendmail's /etc/init.d/sendmail script: now we can be sure that
as soon as the milter gives control back to the script, it is
completely set up.
Without this, sendmail often cannot connect to the milter, because
the socket is not yet there when sendmail is called.
Moreover, I added a #!/usr/bin/perl to the top, to make it more
easily startable, without needing to explicitly invoke Perl.
Stopping the milter:
--------------------
There is now a -k flag, to easily shut down the milter (it basically
kills the pid contained in /var/spf-milter/spf-milter.pid) First it
attempts to send a "nice" kill (SIGQUIT), and if that doesn't help,
it sends a kill -9
Local policy:
-------------
There is now an interface to the local policy parameter of
Mail::SPF::Query
This is a local version of trusted-forwarder.org
New command line options:
-------------------------
-k kill running milter
-l add local trust record
-t don't add trusted-forwarder.org record
-m trust recipient's MX hosts
-h print this help message
The existing options still continue to work
mx trust recipient's MX hosts (same as -m)
dt don't add trusted-forwarder.org (same as -t)
Installation mini-doc:
----------------------
The top comment now contains a mini-howto how to install the milter.
Regards,
Alain
-------
To unsubscribe, change your address, or temporarily deactivate your subscription,
please go to http://v2.listbox.com/member/?listname@Ë`Ì{5¤¨wâÇSÓ°)h
the milter. Moreover it gives access to the "local policy"
configuration, which may be used if some of your users have set up
forwardings to their account on your host.
The patch is made against the 1.21 version, as found on spf.pobox.com
Starting the milter:
--------------------
I have moved the daemon fork() closer to the end of the script.
Moreover, I've made sure that the parent only exits if the socket
has already been created. That way, it is easyer to put the milter
into sendmail's /etc/init.d/sendmail script: now we can be sure that
as soon as the milter gives control back to the script, it is
completely set up.
Without this, sendmail often cannot connect to the milter, because
the socket is not yet there when sendmail is called.
Moreover, I added a #!/usr/bin/perl to the top, to make it more
easily startable, without needing to explicitly invoke Perl.
Stopping the milter:
--------------------
There is now a -k flag, to easily shut down the milter (it basically
kills the pid contained in /var/spf-milter/spf-milter.pid) First it
attempts to send a "nice" kill (SIGQUIT), and if that doesn't help,
it sends a kill -9
Local policy:
-------------
There is now an interface to the local policy parameter of
Mail::SPF::Query
This is a local version of trusted-forwarder.org
New command line options:
-------------------------
-k kill running milter
-l add local trust record
-t don't add trusted-forwarder.org record
-m trust recipient's MX hosts
-h print this help message
The existing options still continue to work
mx trust recipient's MX hosts (same as -m)
dt don't add trusted-forwarder.org (same as -t)
Installation mini-doc:
----------------------
The top comment now contains a mini-howto how to install the milter.
Regards,
Alain
-------
To unsubscribe, change your address, or temporarily deactivate your subscription,
please go to http://v2.listbox.com/member/?listname@Ë`Ì{5¤¨wâÇSÓ°)h