11
11
# StorageDriver: Specifies the storage driver backend (library) to use.
12
# You'll only need to set this if you are using dynamic storage driver plugins.
13
# The default when one storage driver is specified is to statically link. Be
14
# sure to include the path to the library if necessary, and some systems may
15
# use an extension other than .so.
12
# You'll only need to set this if you are using dynamic storage driver plugins
13
# from a binary distribution. The default build statically links the storage
14
# driver (when only one is specified at configure time), overriding this
15
# setting, which only comes into play if multiple storage drivers are specified
16
# at configure time. When using dynamic linking, be sure to include the path
17
# to the library if necessary, and some systems may use an extension other
18
# than .so (e.g. OSX uses .dylib).
19
# libmysql_drv.so libpgsql_drv.so libsqlite_drv.so
20
# libsqlite3_drv.so libora_drv.so libhash_drv.so
22
# libmysql_drv.so libpgsql_drv.so
23
# libsqlite3_drv.so libhash_drv.so
22
25
# IMPORTANT: Switching storage drivers requires more than merely changing
23
26
# this option. If you do not wish to lose all of your data, you will need to
24
27
# migrate it to the new backend before making this change.
26
StorageDriver @libdir@/@storage_driver@
29
StorageDriver /usr/lib/dspam/libhash_drv.so
29
# Trusted Delivery Agent: Specifies the local delivery agent DSPAM should call
30
# when delivering mail as a trusted user. Use %u to specify the user DSPAM is
31
# processing mail for. It is generally a good idea to allow the MTA to specify
32
# Trusted Delivery Agent: Specifies the local delivery agent DSPAM should call
33
# when delivering mail as a trusted user. Use %u to specify the user DSPAM is
34
# processing mail for. It is generally a good idea to allow the MTA to specify
32
35
# the pass-through arguments at run-time, but they may also be specified here.
34
37
# Most operating system defaults:
48
51
# Untrusted Delivery Agent: Specifies the local delivery agent and arguments
49
52
# DSPAM should use when delivering mail and running in untrusted user mode.
50
# Because DSPAM will not allow pass-through arguments to be specified to
53
# Because DSPAM will not allow pass-through arguments to be specified to
51
54
# untrusted users, all arguments should be specified here. Use %u to specify
52
# the user DSPAM is processing mail for. This configuration parameter is only
55
# the user DSPAM is processing mail for. This configuration parameter is only
53
56
# necessary if you plan on allowing untrusted processing.
55
58
#UntrustedDeliveryAgent "/usr/bin/procmail -d %u"
58
# SMTP or LMTP Delivery: Alternatively, you may wish to use SMTP or LMTP
59
# delivery to deliver your message to the mail server. You will need to
60
# configure with --enable-daemon to use host delivery, however you do not need
61
# to operate in daemon mode. Specify an IP address or UNIX path to a domain
62
# socket below as a host.
61
# SMTP or LMTP Delivery: Alternatively, you may wish to use SMTP or LMTP
62
# delivery to deliver your message to the mail server instead of using a
63
# delivery agent. You will need to configure with --enable-daemon to use host
64
# delivery, however you do not need to operate in daemon mode. Specify an IP
65
# address or UNIX path to a domain socket below as a host.
64
67
# If you would like to set up DeliveryHost's on a per-domain basis, use
65
68
# the syntax: DeliveryHost.domain.com 1.2.3.4
67
#DeliveryHost 127.0.0.1
69
#DeliveryIdent localhost
70
#DeliveryHost 127.0.0.1
72
#DeliveryIdent localhost
73
76
# FallbackDomains: If you want to specify certain domains as fallback domains,
74
77
# enable this option. For example, you could create a user @domain.com, and
75
78
# if bob@domain.com does not resolve to a known user on the system, the user
76
79
# could default to your @domain.com user. NOTE: This also requires designating
77
# fallbackDomain for the domain name;
78
# e.g. dspam_admin ch pref domain.com fallbackDomain on
80
# fallbackDomain for the domain name;
81
# e.g. dspam_admin ch pref domain.com fallbackDomain on
80
83
#FallbackDomains on
83
# Quarantine Agent: DSPAM's default behavior is to quarantine all mail it
86
# Quarantine Agent: DSPAM's default behavior is to quarantine all mail it
84
87
# thinks is spam. If you wish to override this behavior, you may specify
85
88
# a quarantine agent which will be called with all messages DSPAM thinks is
86
89
# spam. Use %u to specify the user DSPAM is processing mail for.
215
233
Algorithm graham burton
218
# PValue: Specify the technique used for calculating PValues, overriding any
219
# defaults configured in the build. These options are:
220
# graham Graham's Technique ("A Plan for Spam")
221
# robinson Robinson's Technique
222
# markov Markovian Weighted Technique
224
# Unlike algorithms, you may only have one of these defined. Use of the
225
# chi-square algorithm automatically changes this to robinson.
236
# Tokenizer: Specify the tokenizer to use. The tokenizer is the piece
237
# responsible for parsing the message into individual tokens. Depending on
238
# how many resources you are willing to trade off vs. accuracy, you may
239
# choose to use a less or more detailed tokenizer:
240
# word uniGram (single word) tokenizer
241
# Tokenizes message into single individual words/tokens
242
# example: "free" and "viagra"
243
# chain biGram (chained tokens) tokenizer (default)
244
# Single words + chains adjacent tokens together
245
# example: "free" and "viagra" and "free viagra"
246
# sbph Sparse Binary Polynomial Hashing tokenizer
247
# Creates sparse token patterns across sliding window of 5-tokens
248
# example: "the quick * fox jumped" and "the * * fox jumped"
249
# osb Orthogonal Sparse biGram tokenizer
250
# Similar to SBPH, but only uses the biGrams
251
# example: "the * * fox" and "the * * * jumped"
256
# PValue: Specify the technique used for calculating Probability Values,
257
# overriding any defaults configured in the build. These options are:
258
# bcr Bayesian Chain Rule (Graham's Technique - "A Plan for Spam")
259
# robinson Robinson's Technique (used in Chi-Square)
260
# markov Markovian Weighted Technique (for Markovian discrimination)
262
# Unlike the "Algorithms" property, you may only have one of these defined.
263
# Use of the chi-square algorithm automatically changes this to robinson.
227
265
# Don't mess with this unless you know what you're doing.
234
# SupressWebStats: Enable this if you are not using the CGI, and don't want
235
# .stats files written.
272
# WebStats: Enable this if you are using the CGI, which writes .stats files
239
276
# ImprobabilityDrive: Calculate odds-ratios for ham/spam, and add to
240
277
# X-DSPAM-Improbability headers
241
279
#ImprobabilityDrive on
246
284
# If user or default.prefs are found, the user's preferences will override any
249
Preference "spamAction=quarantine"
250
Preference "signatureLocation=message" # 'message' or 'headers'
251
Preference "showFactors=on"
252
#Preference "spamAction=tag"
253
#Preference "spamSubject=SPAM"
287
Preference "trainingMode=TEFT" # { TOE | TUM | TEFT | NOTRAIN } -> default:teft
288
Preference "spamAction=tag" # { quarantine | tag | deliver } -> default:quarantine
289
Preference "spamSubject=[SPAM]" # { string } -> default:[SPAM]
290
Preference "statisticalSedation=5" # { 0 - 10 } -> default:0
291
Preference "enableBNR=on" # { on | off } -> default:off
292
Preference "enableWhitelist=on" # { on | off } -> default:on
293
Preference "signatureLocation=message" # { message | headers } -> default:message
294
Preference "tagSpam=off" # { on | off }
295
Preference "tagNonspam=off" # { on | off }
296
Preference "showFactors=off" # { on | off } -> default:off
297
Preference "optIn=off" # { on | off }
298
Preference "optOut=off" # { on | off }
299
Preference "whitelistThreshold=10" # { Integer } -> default:10
300
Preference "makeCorpus=off" # { on | off } -> default:off
301
Preference "storeFragments=off" # { on | off } -> default:off
302
Preference "localStore=" # { on | off } -> default:username
303
Preference "processorBias=on" # { on | off } -> default:on
304
Preference "fallbackDomain=off" # { on | off } -> default:off
305
Preference "trainPristine=off" # { on | off } -> default:off
306
Preference "optOutClamAV=off" # { on | off } -> default:off
307
Preference "ignoreRBLLookups=off" # { on | off } -> default:off
308
Preference "RBLInoculate=off" # { on | off } -> default:off
309
Preference "notifications=off" # { on | off } -> default:off
256
312
# Overrides: Specifies the user preferences which may override configuration
257
313
# and commandline defaults. Any other preferences supplied by an untrusted user
258
314
# will be ignored.
260
AllowOverride trainingMode
261
AllowOverride spamAction spamSubject
262
AllowOverride statisticalSedation
263
316
AllowOverride enableBNR
264
317
AllowOverride enableWhitelist
318
AllowOverride fallbackDomain
319
AllowOverride ignoreGroups
320
AllowOverride ignoreRBLLookups
321
AllowOverride localStore
322
AllowOverride makeCorpus
325
AllowOverride optOutClamAV
326
AllowOverride processorBias
327
AllowOverride RBLInoculate
328
AllowOverride showFactors
265
329
AllowOverride signatureLocation
266
AllowOverride showFactors
267
AllowOverride optIn optOut
330
AllowOverride spamAction
331
AllowOverride spamSubject
332
AllowOverride statisticalSedation
333
AllowOverride storeFragments
334
AllowOverride tagNonspam
335
AllowOverride tagSpam
336
AllowOverride trainPristine
337
AllowOverride trainingMode
268
338
AllowOverride whitelistThreshold
339
AllowOverride dailyQuarantineSummary
340
AllowOverride notifications
339
417
#PgSQLConnectionCache 3
341
# UIDInSignature: PgSQL supports the insertion of the user id into the DSPAM
342
# signature. This allows you to create one single spam or fp alias
419
# UIDInSignature: PgSQL supports the insertion of the user id into the DSPAM
420
# signature. This allows you to create one single spam or fp alias
343
421
# (pointing to some arbitrary user), and the uid in the signature will
344
422
# switch to the correct user. Result: you need only one spam alias
346
#PgSQLUIDInSignature on
424
#PgSQLUIDInSignature on
348
426
# If you're using vpopmail or some other type of virtual setup and wish to
349
427
# change the table dspam uses to perform username/uid lookups, you can over-
352
#PgSQLVirtualTable dspam_virtual_uids
353
#PgSQLVirtualUIDField uid
354
#PgSQLVirtualUsernameField username
358
#OraServer "(DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=127.0.0.1)(PORT=1521))(CONNECT_DATA=(SID=PROD)))"
430
#PgSQLVirtualTable dspam_virtual_uids
431
#PgSQLVirtualUIDField uid
432
#PgSQLVirtualUsernameField username
365
#SQLitePragma "synchronous = OFF"
436
#SQLitePragma "synchronous = OFF"
369
441
# HashRecMax: Default number of records to create in the initial segment when
370
442
# building hash files. 100,000 yields files 1.6MB in size, but can fill up
371
443
# fast, so be sure to increase this (to a million or more) if you're not using
446
# NOTE: If you're using a heavy-weight tokenizer, such as SBPH, you should be
447
# looking for settings in the 'millions' of records.
375
450
# 53, 97, 193, 389, 769, 1543, 3079, 6151, 12289, 24593, 49157, 98317, 196613,
376
# 393241, 786433, 1572869, 3145739, 6291469, 12582917, 25165843, 50331653,
377
# 100663319, 201326611, 402653189, 805306457, 1610612741, 3221225473,
451
# 393241, 786433, 1572869, 3145739, 6291469, 12582917, 25165843, 50331653,
452
# 100663319, 201326611, 402653189, 805306457, 1610612741, 3221225473,
382
458
# HashAutoExtend: Autoextend hash databases when they fill up. This allows
383
# them to continue to train by adding extents (extensions) to the file. There
384
# will be a small delay during the growth process, as everything needs to be
385
# closed and remapped.
459
# them to continue to train by adding extents (extensions) to the file. There
460
# will be a small delay during the growth process, as everything needs to be
461
# closed and remapped.
389
466
# HashMaxExtents: The maximum number of extents that may be created in a single
390
467
# hash file. Set this to zero for unlimited
394
# HashExtentSize: The record size for newly created extents. Creating this too
395
# small could result in many extents being created. Creating this too large
396
# could result in excessive disk space usage.
472
# HashExtentSize: The initial record size for newly created extents. Creating
473
# this too small could result in many extents being created. Creating this too
474
# large could result in excessive disk space usage. Typically, a value close
475
# to half of the HashRecMax size is good.
398
477
HashExtentSize 49157
400
# HashMaxSeek: The maximum number of records to seek to insert a new record
401
# before failing or adding a new extent. Setting this too high will exhaustively
402
# scan each segment and kill performance. Typically, a low value is acceptable
403
# as even older extents will continue to fill over time.
480
# HashPctIncrease: Increase the next extent size by n% from the size of the
481
# last extent. This is useful in accommodating systems where the default
482
# HashExtentSize can be too small for certain high-volume users, and can also
483
# help keep seeks nice and speedy and/or prevent too many unnecessary extents
484
# from being created when using a low HashMaxSeek. The default behavior, when
485
# HashPctIncrease is not used, is to always use # HashExtentSize with no
491
# HashMaxSeek: The maximum number of record seeks when inserting a new record
492
# before failing or adding a new extent. This ultimately translates into the
493
# max # of acceptable seeks per segment. Setting this too high will exhaustively
494
# scan each segment and hurt performance. Typically, a low value is acceptable
495
# as even older extents will continue to fill as training progresses.
407
500
# HashConcurrentUser: If you are using a single, stateful hash database in
408
# daemon mode, specifying a concurrent user will cause the user to be
409
# permanently mapped into memory and shared via rwlocks.
501
# daemon mode, specifying a concurrent user below will cause the user to be
502
# permanently mapped into memory and shared via rwlocks. This is very fast and
503
# very cool if you are running a "userless" relay appliance.
411
505
#HashConcurrentUser user
413
508
# HashConnectionCache: If running in daemon mode, this is the max # of
414
509
# concurrent connections that will be supported. NOTE: If you are using
415
510
# HashConcurrentUser, this option is ignored, as all connections are read-
416
511
# write locked instead of mutex locked.
417
513
HashConnectionCache 10
419
# LDAP: Perform various LDAP functions depending on LDAPMode variable.
420
# Presently, the only mode supported is 'verify', which will verify the existence
421
# of an unknown user in LDAP prior to creating them as a new user in the system.
422
# This is useful on some systems acting as gateway machines.
425
#LDAPHost ldaphost.mydomain.com
426
#LDAPFilter "(mail=%u)"
427
#LDAPBase ou=people,dc=domain,dc=com
429
# Optionally, you can specify storage profiles, and specify the server to
518
# ExtLookup: Perform various external lookup functions depending on user-
519
# defined variables. ExtLookup can either be set to 'on' or 'off'. The
520
# behavior of such lookups are defined by the use of ExtLookupMode, which
521
# can be set to 'verify', 'map' and 'strict'.
523
# verify Will cause dspam to validate the user, prior to
524
# creating the user entry in the system.
526
# map Will cause dspam to try to map the user address
527
# to a certain unique identifier.
529
# strict Will cause dspam to enforce both 'verify' and 'map'.
531
# ExtLookupDriver will set the engine behind the lookups. For now the only
532
# supported mechanisms are 'ldap' and 'program'. The first will make dspam
533
# talk directly to the configured LDAP server. The second will prefrom the
534
# various lookup functions by running a certain binary program or executable
535
# script. The program MUST be a binary executable or a script with a well
536
# defined interperter in its first line ( #!/path/to/interpreter ). There
537
# are plans to support TLS/SSL connections to backend databases.
539
#ExtLookup on # Turns on/off external lookup
540
#ExtLookupMode strict # available modes are 'verify', 'map' and 'strict'.
541
# 'strict' enforces both verify and map
542
#ExtLookupDriver ldap # Currently only ldap and program are supported.
543
# There are plans to support both MySQL and Postgres.
544
#ExtLookupServer ldap.domain.com # Can either be a database hostname or the full path to
545
# an executable lookup program and its arguments.
546
#ExtLookupPort 389 # Desired port when connecting to the lookup database.
547
#ExtLookupDB "ou=Users,dc=domain,dc=com" # Can either be an LDAP search base or a database name (TODO).
548
#ExtLookupQuery "(&(objectClass=qmailUser)(|(mail=%u)(mailAlternateAddress=%u)))" # Can either be an LDAP search filter or an SQL query (TODO)
549
#ExtLookupLDAPAttribute "mail" # Attribute to be used when ExtLookupDriver is 'ldap'
550
# and ExtLookupMode 'map' or 'strict'
551
#ExtLookupLDAPScope sub # Can be set to 'base', 'sub' or 'one'. Only used when ExtLookupDriver is 'ldap'.
552
#ExtLookupLDAPVersion 3 # Sets the LDAP protocol version (1, 2 or 3)
553
#ExtLookupLogin "cn=admin,dc=domain,dc=com" # Login to be used when connecting to any direct database backend.
554
#ExtLookupPassword itsasecret # Password to use with ExtLookupLogin.
555
#ExtLookupCrypto tls # Sets the use of TLS on backend communication (only compatible with LDAPv3)
561
# You can specify multiple storage profiles, and specify the server to
430
562
# use on the commandline with --profile. For example:
432
564
#Profile DECAlpha
433
#MySQLServer.DECAlpha 10.0.0.1
434
#MySQLPort.DECAlpha 3306
435
#MySQLUser.DECAlpha dspam
436
#MySQLPass.DECAlpha changeme
437
#MySQLDb.DECAlpha dspam
438
#MySQLCompress.DECAlpha true
565
#MySQLServer.DECAlpha 10.0.0.1
566
#MySQLPort.DECAlpha 3306
567
#MySQLUser.DECAlpha dspam
568
#MySQLPass.DECAlpha changeme
569
#MySQLDb.DECAlpha dspam
570
#MySQLCompress.DECAlpha true
571
#MySQLReconnect.DECAlpha true
441
#MySQLServer.Sun420R 10.0.0.2
442
#MySQLPort.Sun420R 3306
443
#MySQLUser.Sun420R dspam
444
#MySQLPass.Sun420R changeme
445
#MySQLDb.Sun420R dspam
446
#MySQLCompress.Sun420R false
574
#MySQLServer.Sun420R 10.0.0.2
575
#MySQLPort.Sun420R 3306
576
#MySQLUser.Sun420R dspam
577
#MySQLPass.Sun420R changeme
578
#MySQLDb.Sun420R dspam
579
#MySQLCompress.Sun420R false
580
#MySQLReconnect.Sun420R true
448
#DefaultProfile DECAlpha
582
#DefaultProfile DECAlpha
451
585
# If you're using storage profiles, you can set failovers for each profile.
507
641
Notifications off
644
# QuarantineWarnSize: You may specify a size when DSPAM should send a "Quarantine
645
# Full" message to each user. This is only working if you enable notifications
646
# (see above). Value is in bytes. Default is 2097152 -> 2MB.
648
#QuarantineWarnSize 2097152
510
651
# Purge configuration: Set dspam_clean purge default options, if not otherwise
511
652
# specified on the commandline
513
PurgeSignatures 14 # Stale signatures
514
PurgeNeutral 90 # Tokens with neutralish probabilities
515
PurgeUnused 90 # Unused tokens
516
PurgeHapaxes 30 # Tokens with less than 5 hits (hapaxes)
517
PurgeHits1S 15 # Tokens with only 1 spam hit
518
PurgeHits1I 15 # Tokens with only 1 innocent hit
654
PurgeSignatures 14 # Stale signatures
655
PurgeNeutral 90 # Tokens with neutralish probabilities
656
PurgeUnused 90 # Unused tokens
657
PurgeHapaxes 30 # Tokens with less than 5 hits (hapaxes)
658
PurgeHits1S 15 # Tokens with only 1 spam hit
659
PurgeHits1I 15 # Tokens with only 1 innocent hit
521
662
# Purge configuration for SQL-based installations using purge.sql
523
#PurgeSignature off # Specified in purge.sql
525
#PurgeUnused off # Specified in purge.sql
526
#PurgeHapaxes off # Specified in purge.sql
527
#PurgeHits1S off # Specified in purge.sql
528
#PurgeHits1I off # Specified in purge.sql
664
#PurgeSignature off # Specified in purge.sql
666
#PurgeUnused off # Specified in purge.sql
667
#PurgeHapaxes off # Specified in purge.sql
668
#PurgeHits1S off # Specified in purge.sql
669
#PurgeHits1I off # Specified in purge.sql
531
672
# Local Mail Exchangers: Used for source address tracking, tells DSPAM which
532
673
# mail exchangers are local and therefore should be ignored in the Received:
533
674
# header when tracking the source of an email. Note: you should use the address
534
675
# of the host as appears between brackets [ ] in the Received header.
676
# By default DSPAM is considering the following IPs always as LocalMX:
677
# 10.0.0.0/8 - Private IP addresses (RFC 1918)
678
# 127.0.0.0/8 - Localhost Loopback Address (RFC 1700)
679
# 169.254.0.0/16 - Zeroconf / APIPA (RFC 3330)
680
# 172.16.0.0/12 - Private IP addresses (RFC 1918)
681
# 192.168.0.0/16 - Private IP addresses (RFC 1918)
536
683
LocalMX 127.0.0.1
539
686
# Logging: Disabling logging for users will make usage graphs unavailable to
540
687
# them. Disabling system logging will make admin graphs unavailable.
546
# TrainPristine: for systems where the original message remains server side
693
# TrainPristine: for systems where the original message remains server side
547
694
# and can therefore be presented in pristine format for retraining. This option
548
# will cause DSPAM to cease all writing of signatures and DSPAM headers to the
695
# will cause DSPAM to cease all writing of signatures and DSPAM headers to the
549
696
# message, and deliver the message in as pristine format as possible. This mode
550
# REQUIRES that the original message in its pristine format (as of delivery)
551
# be presented for retraining, as in the case of webmail, imap, or other
552
# applications where the message is actually kept server-side during reading,
553
# and is preserved. DO NOT use this switch unless the original message can be
697
# REQUIRES that the original message in its pristine format (as of delivery)
698
# be presented for retraining, as in the case of webmail, imap, or other
699
# applications where the message is actually kept server-side during reading,
700
# and is preserved. DO NOT use this switch unless the original message can be
554
701
# presented for retraining with the ORIGINAL HEADERS and NO MODIFICATIONS.
703
# NOTE: You can't use this setting with dspam_trian; if you're going to use it,
704
# wait until after you train any corpora.
556
706
#TrainPristine on
559
709
# Opt: in or out; determines DSPAM's default filtering behavior. If this value
560
710
# is set to in, users must opt-in to filtering by dropping a .dspam file in
561
711
# /var/dspam/opt-in/user.dspam (or if you have homedirs configured, a .dspam
562
# folder in their home directory). The default is opt-out, which means all
563
# users will be filtered unless a .nodspam file is dropped in
712
# folder in their home directory). The default is opt-out, which means all
713
# users will be filtered unless a .nodspam file is dropped in
564
714
# /var/dspam/opt-out/user.nodspam
680
842
# you are running the client and server on the same machine, as it eliminates
681
843
# much of the bandwidth overhead.
683
#ServerDomainSocketPath "/tmp/dspam.sock"
845
#ServerDomainSocketPath "/var/run/dspam/dspam.sock"
686
848
# Client Mode: If you are running DSPAM in client/server mode, uncomment and
687
849
# set these variables. A ClientHost beginning with a / will be treated as
688
850
# a domain socket.
690
#ClientHost /tmp/dspam.sock
852
#ClientHost /var/run/dspam/dspam.sock
691
853
#ClientIdent "secret@Relay1"
693
855
#ClientHost 127.0.0.1
695
857
#ClientIdent "secret@Relay1"
697
861
# RABLQueue: Touch files in the RABL queue
698
862
# If you are a reporting streamlined blackhole list participant, you can
699
863
# touch ip addresses within the directory the rabl_client process is watching.
701
865
#RABLQueue /var/spool/rabl
703
869
# DataSource: If you are using any type of data source that does not include
704
870
# email-like headers (such as documents), uncomment the line below. This
705
871
# will cause the entire input to be treated like a message "body"
709
875
# ProcessorWordFrequency: By default, words are only counted once per message.
710
876
# If you are classifying large documents, however, you may wish to count once
711
877
# per occurrence instead.
713
#ProcessorWordFrequency occurrence
879
#ProcessorWordFrequency occurrence
881
# ProcessorURLContext: By default, a URL context is generated for URLs, which
882
# records their tokens as separate from words found in documents. To use
883
# URL tokens in the same context as words, turn this feature off.
885
ProcessorURLContext on
715
887
# ProcessorBias: Bias causes the filter to lean more toward 'innocent', and
716
888
# usually greatly reduces false positives. It is the default behavior of
717
# most Bayesian filters (including dspam).
889
# most Bayesian filters (including dspam).
719
891
# NOTE: You probably DONT want this if you're using Markovian Weighting, unless
720
892
# you are paranoid about false positives.
896
# StripRcptDomain: Cut the domain (including the at sign) from recipients.
897
# This is particularly useful if the recipient name is equal to real user
898
# accounts as recipients with domains tend to cause permission issues with
903
# --- Split Configuration File Support ---
905
# Include a directory with configuration items.
906
Include /etc/dspam/dspam.d/