whitelist updating daemon
used for greylisting.
whitelist entries whenever a
connection to port 25 is logged to the
interface. The source
addresses of inbound connections are whitelisted when seen by
to ensure that their entries in
do not expire if the connecting
host continues to send legitimate mail. The destination addresses of outbound
connections are whitelisted when seen by spamlogd
so that replies to outbound mail may be received without initial greylisting
delays. Greylisting is explained more fully in
The options are as follows:
- Debugging mode. spamlogd does
not disassociate from the controlling terminal.
- Specify that spamlogd is only
to whitelist inbound SMTP connections. By default
spamlogd will whitelist the source of inbound
SMTP connections, and the target of outbound SMTP connections.
- Specify a network interface on which packets must arrive.
The default is to watch for connections logged from all interfaces.
- Specify a
pflog(4) interface to listen
for connection notifications. The default is to watch for connections
logged on “pflog0”.
- Adjust the time for
whiteexp in hours. The default is 864
hours (approximately 36 days); maximum is 2160 hours (approximately 90
- Add a target to receive synchronisation messages; see
below. This option can be specified multiple times.
It is important to log any connections to and from the real MTA in order for
to update the whitelist entries. See
for an example ruleset
for logging such connections.
sends log messages to
will log each connection it sees at level
supports realtime synchronisation of
whitelist states by sending the information it updates to a number of
daemons running on
multiple machines. To enable synchronisation, use the command line option
to specify the machines to which
will send messages when it updates the
state information. For more information, see
command first appeared in