martes, 30 de junio de 2009

Bayes en Mysql + Mailscanner

Dependencias: perl-DBI and perl-DBD-MySQL

Datos:
SpamAssassin Bayes Database Name: sa_bayes
SpamAssassin
Bayes Database UserName: sa_user
SpamAssassin
Bayes Database Password: sa_password
Your database server’s real name: local_fqdn


Crear tabla bayes y usuario bayes desde phpmyadmin o consola
# mysql -u root -p #(some distros like redhat and clones have no password set by default.)
mysql> create database sa_bayes;
mysql> GRANT ALL ON sa_bayes.* TO sa_user@localhost IDENTIFIED BY 'sa_password';
mysql> GRANT ALL ON sa_bayes.* TO sa_user@local_fqdn IDENTIFIED BY 'sa_password';
mysql> GRANT ALL ON sa_bayes.* TO sa_user@remote_fqdn IDENTIFIED BY 'sa_password';
mysql> flush privileges;

Localizar el fichero bayes_mysql.sql

En sistemas RED HAT /usr/share/doc/spamassassin-%version%/sql/bayes_mysql.sql
Para Otros: find / -name bayes_mysql.sql

# mysql -u sa_user -p sa_bayes < /path/to/bayes_mysql.sql

Backup
sa-learn -p /path/to/spam.assassin.prefs.conf --backup > sa_bayes_backup.txt

Limpieza
sa-learn -p /path/to/spam.assassin.prefs.conf --clear #(entirely optional, incase you want to rollback)

cambios en spam.sassassin.prefs.conf
bayes_store_module Mail::SpamAssassin::BayesStore::SQL
bayes_sql_dsn DBI:mysql:**sa_bayes**:**localhost**
bayes_sql_username **sa_user**
bayes_sql_password **sa_password**
bayes_sql_override_username root

comentar
bayes_path /etc/MailScanner/bayes/bayes
bayes_file_mode 0660

Pasar el backup al mysql
# sa-learn -p /path/to/spam.assassin.prefs.conf --restore sa_bayes_backup.txt

Comprobar
# spamassassin -x -D -p /path/to/spam.assassin.prefs.conf --lint

parar y arrancar mailscanner

añadir cron
minute hour * * * /path/to/sa-learn --force-expire --sync -p /path/to/spam.assassin.prefs.conf

No hay comentarios:

Publicar un comentario