Setting up razor2 agents

"Vipul's Razor is a distributed, collaborative, spam detection and filtering network. Through user contribution, Razor establishes a distributed and constantly updating catalogue of spam in propagation that is consulted by email clients to filter out known spam. Detection is done with statistical and randomized signatures that efficiently spot mutating spam content.

User input is validated through reputation assignments based on consensus on report and revoke assertions which in turn is used for computing confidence values associated with individual signatures."

Quoted from Vipul's Razor web site at http://razor.sourceforge.net

The razor client is automatically picked up by SpamAssassin as long as it's installed.

It send requests to public Razor servers on the Internet asking if an e-mail is known spam, by sending a special checksum of the e-mail it creates which guarantees it is unique to that e-mail (no e-mails are actually sent so your data is safe).

It sends these requests on outbound TCP port 2703, so your Internet firewall will need to let this out, and associated replies from your mail gateway.

To configure razor2, you need to create some defaults and register it with the razor network using the razor-client & razor-admin utilities.

You need to run the razor-admin utility as the vscan user so it's configuration file gets created in the right place with the correct permissions, but because the vscan user is a special system user it cannot normally run interactively on the system, but this can be changed by assigning a 'Login shell' to the user.

The reason that razor is run as this user is that it's the default for amavisd-new. From the diagram at the very start of this document you can see that razor is called by SA, which in turn is called by amavisd-new. All of these systems run as the vscan user so that they can easily pass the message between each other without problems.

After testing, you will set this back to help keep your system a little more secure.

Open YaST, select Security and Users then User Management.

YiiiTiig-ma ¡1 JCin

Ljiv-UC r* 2 ir-j'juisr sjfsmni. Several dilfnrenl us rrr. on br

I«j(ji0 i>i lu He system jii ihç same rime id avad ¿xlfllljxiún, EOjch wemusthaye a LriDqL'^ xJenlity Addhhxiiiy. util belongs tí) 51 least une grajp

Uíf lllii Ji nl . MjM lu'jn lüfín^míri H h- :. 111 exisüiig uters ji- J ¿ dd or modi); users

To create s ncwuitr click *dd

T<j td( si l'íIuk au existing mer. splçct criK Ujíji Trciri Lhc IisI and tJik Ed«t o» PtMt

EgtB. Chîfljt tic sel currerdy ihwn in +ie Lub't mi l in Filler Cwifcxnise ywjr-ííifw '.7'J tuslcmise Filter

Click Expert OjHimii lu edhvsricui esptfl idling^, V-11 I ■ aï

User and Group Administration

Finer Syriern Usefs

Finer Syriern Usefs

logri

1 NaiTi

|uir?

|<5notJ|)S

rwt

KMÍ

Was this article helpful?

0 0

Post a comment