From samm@os2.kiev.ua  Fri Feb  2 09:35:07 2007
Return-Path: <samm@os2.kiev.ua>
Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52])
	by hub.freebsd.org (Postfix) with ESMTP id 3558916A400
	for <FreeBSD-gnats-submit@freebsd.org>; Fri,  2 Feb 2007 09:35:07 +0000 (UTC)
	(envelope-from samm@os2.kiev.ua)
Received: from umka.yurteh.net (umka.yurteh.net [213.186.208.24])
	by mx1.freebsd.org (Postfix) with ESMTP id A203013C442
	for <FreeBSD-gnats-submit@freebsd.org>; Fri,  2 Feb 2007 09:35:06 +0000 (UTC)
	(envelope-from samm@os2.kiev.ua)
Received: from samm.loc ([213.186.208.4])
	by umka.yurteh.net (8.12.9p2/8.12.9) with ESMTP id l129Am5x067851;
	Fri, 2 Feb 2007 11:10:49 +0200 (EET)
	(envelope-from samm@os2.kiev.ua)
Message-Id: <1170407821.1218@samm.loc>
Date: Fri, 2 Feb 2007 11:17:01 +0200
From: "Alex Samorukov" <samm@os2.kiev.ua>
To: "FreeBSD gnats submit" <FreeBSD-gnats-submit@freebsd.org>
Cc: samm@os2.kiev.ua
Subject: [PATCH] mail/spamlogd fail without PF
X-Send-Pr-Version: gtk-send-pr 0.4.7 
X-GNATS-Notify:

>Number:         108679
>Category:       ports
>Synopsis:       [PATCH] mail/spamd: spamlogd fail without PF
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Feb 02 09:40:15 GMT 2007
>Closed-Date:    Mon Mar 26 07:41:03 GMT 2007
>Last-Modified:  Mon Mar 26 07:41:03 GMT 2007
>Originator:     Alex Samorukov
>Release:        FreeBSD 6.1-RELEASE i386
>Organization:
Shevchenko Didkovskiy and Partners 
>Environment:


System: FreeBSD 6.1-RELEASE #0: Mon Aug 14 15:36:37 EEST 2006
    root@samm.loc:/usr/obj/usr/src/sys/SAMMKRNL



>Description:


Current implementation of the spamlogd daemon depend on the PF firewall. It
need to be patched to work without pflogd0 interface if spamlogd compiled with
WITH_IPFW option. Current implementation use tcpdump spawn on interface pflogd0
interface to watch for the passed packets. Also it use "action pass" command
which is not avaible on real interfaces.


>How-To-Repeat:


Run spamlogd on system without PF. It will fail


>Fix:


Currently i dont know solution for this problem. We need to do more work to see
an optimal way to solv this. I think that good idea is to use ipfw "tee" socket
to forward passed packets to the spamlogd, and then - process them as usual.
Using this way we will not need to launch tcpdump - instead we will launch a
child, which listen for the tee packets and output ip addresses. I am ready to
help with this patch. My mail is samm@os2.kiev.ua.


>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->feedback 
State-Changed-By: edwin 
State-Changed-When: Fri Feb 2 09:56:40 UTC 2007 
State-Changed-Why:  
which port are we talking abou there? 

http://www.freebsd.org/cgi/query-pr.cgi?pr=108679 

From: Alex Samorukov <samorukov@shevdid.com>
To: bug-followup@FreeBSD.org, samm@os2.kiev.ua
Cc:  
Subject: Re: ports/108679: [PATCH] mail/spamlogd fail without PF
Date: Fri, 02 Feb 2007 15:49:37 +0200

 about mail/spamd. Sorry for wrong subject.
Responsible-Changed-From-To: freebsd-ports-bugs->delphij 
Responsible-Changed-By: edwin 
Responsible-Changed-When: Fri Feb 2 18:58:18 UTC 2007 
Responsible-Changed-Why:  
Over to maintainer 

http://www.freebsd.org/cgi/query-pr.cgi?pr=108679 
State-Changed-From-To: feedback->open 
State-Changed-By: edwin 
State-Changed-When: Fri Feb 2 18:59:20 UTC 2007 
State-Changed-Why:  
feedback received 

http://www.freebsd.org/cgi/query-pr.cgi?pr=108679 
Responsible-Changed-From-To: delphij->freebsd-ports 
Responsible-Changed-By: delphij 
Responsible-Changed-When: Tue Mar 20 14:17:28 UTC 2007 
Responsible-Changed-Why:  
Return to pool. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=108679 
State-Changed-From-To: open->closed 
State-Changed-By: pav 
State-Changed-When: Mon Mar 26 07:40:47 UTC 2007 
State-Changed-Why:  
Close on submitter's request 

http://www.freebsd.org/cgi/query-pr.cgi?pr=108679 
>Unformatted:
