Перейти к содержимому


radionuk2

Дата рег: 04 Мар 2019
Оффлайн Был(а) онлайн: Вчера, 09:52
-----

Темы пользователя

падает maild помогите!

09 Декабрь 2019 - 13:06

Добрый день!

 

Сегодня с 11-00 примерно стал падать maild помогите где рыть! Его циклит, почта не ходит!

 

Dec  9 13:02:11 daemonm drweb-se[26069]: drw11001.vdb 11.00 6db570480ef6338abdc5efdf88c8cbb6 2016/04/01 08:00,  881516 records
Dec  9 13:02:12 daemonm drweb-se[26069]: drw11020.vdb 11.00 31e487447aa82bb0041e0f25d1831ff8 2016/08/15 07:12,   14849 records
Dec  9 13:02:12 daemonm drweb-se[26069]: drw11078.vdb 11.00 a716e6cb43f673be60ae32a8f741bcb5 2017/10/09 07:16,   11130 records
Dec  9 13:02:12 daemonm drweb-se[26069]: dwn11001.vdb 11.00 b2d0a42fabd3774b3efbb1094b0e9670 2016/06/27 07:29,    6324 records
Dec  9 13:02:12 daemonm drweb-se[26069]: drw11071.vdb 11.00 191cbf171af36f5971817bc3cdd317a2 2017/08/21 07:16,   11762 records
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: BEGIN
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: Segmentation fault at 0000000000000000
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: RAX=0000000000000000 RBX=0000000002100140 RCX=0000000000000000 RDX=000056404CA51900
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: RSI=0000000002100140 RDI=0000000000000000 RBP=FFFFFFFFFFFFFF90 RFL=0000000000010246
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: R08=00000000041FF6F0 R09=0000000000000000 R10=0000000000000000 R11=00007F9B08CEA240
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: R12=00007FFD070D07C8 R13=1FFFFFFFFFFFFFFF R14=0000000000000001 R15=000056404CA51700
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: RSP=00007F9B08BFE240 (0100 0000 0000 0000 3857 D609 9B7F 0000 0208 0000 0000 0000 C300 1400 0000 0000)
Dec  9 13:02:12 daemonm drweb-configd[19593]: SE-26069: Dump: RIP=000056404C9B7EFE (470F B61C 2F4E 8B34 DAE9 C4FC FFFF 0F1F 4000 48C7 C3F0 FFFF FF41 BF01 0000 00B9)
Dec  9 13:02:12 daemonm drweb-netcheck[25793]: Cannot get ScanEngine: Unexpected process termination
Dec  9 13:02:12 daemonm drweb-maild[20336]: Milter client eee0-cf9d-0f58: Error while executing milter hook for message ID <b554870c76d6447494a78597caaca259@travelmart.ru> from Natalia.Polezhaeva@travelmart.ru to ssolodchuk@Alkaloid.com.mk: NetCheck: No facilities were able to process the job
Dec  9 13:02:12 daemonm drweb-maild[20336]: Milter client 8b79-f067-88ec: Error while executing milter hook for message ID <CTS/NMC-RUSSIA/C547015C2F36/1@tds.amadeus.com> from tdsfndprd@amadeus.com to elena.agafonova@travelmart.ru: NetCheck: No facilities were able to process the job
Dec  9 13:02:14 daemonm drweb-se[26135]: ScanEngine 11.1.0.1812291746
Dec  9 13:02:14 daemonm drweb-se[26135]: Core engine 7.00.42.09300 (700) API 2.2, shell API 2.2
Dec  9 13:02:14 daemonm drweb-se[26135]: Loading bases from /var/opt/drweb.com/bases
Dec  9 13:02:14 daemonm drweb-se[26135]: drw11043.vdb 11.00 0bb4f4947c22a1f8f1c7436969fc6803 2017/01/23 19:40,   15927 records
Dec  9 13:02:14 daemonm drweb-se[26135]: drw1109v.vdb 11.00 4c18b8a75c286749ee6fd8dd3f9f9ef1 2018/12/31 07:12,   12373 records
Dec  9 13:02:14 daemonm drweb-se[26135]: drw1109g.vdb 11.00 d82e15fed7dd2a5f4fdebd2e9fd72329 2018/05/21 07:16,   21065 records
Dec  9 13:02:14 daemonm drweb-se[26135]: drw110a2.vdb 11.00 d4740ff0d25190b166208d06f68dff59 2019/04/15 09:09,   22752 records
Dec  9 13:02:14 daemonm drweb-se[26135]: dwf11000.vdb 11.00 4df4421d7993f674d890c949325ca986 2016/04/01 02:00,       4 records
Dec  9 13:02:14 daemonm drweb-se[26135]: drw1109k.vdb 11.00 028bef5b3411b6df41619b0dee982820 2018/07/16 07:17,   27692 records
Dec  9 13:02:15 daemonm drweb-se[26135]: drw11000.vdb 11.00 66f864aa2289ec98763c386c82231ab9 2016/04/01 07:00,  775743 records
Dec  9 13:02:15 daemonm drweb-se[26135]: drw11010.vdb 11.00 8adf22bf75f38e4ceb7372d9d64e04ff 2016/06/06 07:14,   15815 records
Dec  9 13:02:15 daemonm drweb-se[26135]: drw11093.vdb 11.00 597c1ef11c2907f4bc2545e07b065186 2018/01/22 07:14,    6670 records

Lua помощь

04 Март 2019 - 12:32

Уважаемые коллеги, буду очень Вам признателен, если наведете меня на мысль где я мог ошибиться.
Очень надеюсь на Вашу помощь!
 
Написал такую конструкцию и она работает -
 
------------ЭТО РАБОТАЕТ-----------
 
local dw = require "drweb"
 
function milter_hook(ctx)
    -- Reject the message if it is likely spam
    if ctx.message.spam.score >= 100 then
        dw.notice("Spam score: " .. ctx.message.spam.score)
        return {action = "reject"}
    else
        -- Assign X-Drweb-Spam headers in accordance with spam report
        ctx.modifier.add_header_field("X-DrWeb-SpamScore", ctx.message.spam.score)
        ctx.modifier.add_header_field("X-DrWeb-SpamState", ctx.message.spam.type)
        ctx.modifier.add_header_field("X-DrWeb-SpamDetail", ctx.message.spam.reason)
        ctx.modifier.add_header_field("X-DrWeb-SpamVersion", ctx.message.spam.version)
    end
    -- Check if the message contains viruses, repack if so
    for threat, path in ctx.message.threats{category = {"known_virus", "virus_modification", "unknown_virus", "adware", "dialer"}} do
        ctx.modifier.repack()
        dw.notice(threat.name .. " found in " .. (ctx.message.part_at(path).name or path))
    end
    -- Repack if unwanted URL has been found
    for url in ctx.message.urls{category = {"infection_source", "not_recommended", "owners_notice"}} do
        ctx.modifier.repack()
        dw.notice("URL found: " .. url .. "(" .. url.categories[1] .. ")")
    end
    -- Assign X-AntiVirus header
    ctx.modifier.add_header_field("X-AntiVirus", "Checked by Dr.Web [MailD version: ]")
    -- Accept the message with all scheduled transformations applied
    return {action = 'accept'}
end
 
Далее из примеров решил прикрутить к ней черный и белые листы, и все перестало работать, postfix и milterd валятся.
Где моя ошибка?
 
 

------------ЭТО НЕ РАБОТАЕТ-----------
 
local dw = require "drweb"
local regex = require "drweb.regex"
-- Load regexp patterns from files
local whitelist = drweb.load_set("/etc/postfix/whitemails.txt")
local blacklist = drweb.load_set("/etc/postfix/blackmails.txt")
 
function milter_hook(ctx)
    -- Stop checks if mail_from matchs one of the patterns loaded from file
for pattern, _ in pairs(whitelist) do
        if regex.match(pattern, ctx.from, regex.ignore_case) then
            return {action = "accept"}
        end
    end
    -- Stop checks if mail_from matchs one of the patterns loaded from file
    for pattern, _ in pairs(blacklist) do
        if regex.match(pattern, ctx.from, regex.ignore_case) then
            return {action = "reject", "Blacklist"}
        end
    end
-- Reject the message if it is likely spam
    if ctx.message.spam.score >= 100 then
        dw.notice("Spam score: " .. ctx.message.spam.score)
        return {action = "reject"}
    else
        -- Assign X-Drweb-Spam headers in accordance with spam report
        ctx.modifier.add_header_field("X-DrWeb-SpamScore", ctx.message.spam.score)
        ctx.modifier.add_header_field("X-DrWeb-SpamState", ctx.message.spam.type)
        ctx.modifier.add_header_field("X-DrWeb-SpamDetail", ctx.message.spam.reason)
        ctx.modifier.add_header_field("X-DrWeb-SpamVersion", ctx.message.spam.version)
    end
    -- Check if the message contains viruses, repack if so
    for threat, path in ctx.message.threats{category = {"known_virus", "virus_modification", "unknown_virus", "adware", "dialer"}} do
        ctx.modifier.repack()
        dw.notice(threat.name .. " found in " .. (ctx.message.part_at(path).name or path))
    end
    -- Repack if unwanted URL has been found
    for url in ctx.message.urls{category = {"infection_source", "not_recommended", "owners_notice"}} do
        ctx.modifier.repack()
        dw.notice("URL found: " .. url .. "(" .. url.categories[1] .. ")")
    end
    -- Assign X-AntiVirus header
    ctx.modifier.add_header_field("X-AntiVirus", "Checked by Dr.Web [MailD version: ]")
    -- Accept the message with all scheduled transformations applied
    return {action = 'accept'}
end