cameramonkey
MIS
Ok, so I think this may not be the best method as it can probably easily be forged, but its only a temporary fix.
We have a server we recently had clamav and spamassassin installed. The amount of traffic that is now hitting the box is causing it to get terribly overworked to the point it is starting to refuse connections until the processor load drops.
Until we can upgrade the server, I thought it might help to be able to put in a rule that any internal email could be ignored by clam and spamassasin, as we have the viruses and whatnot under control internally with desktop scanners. That should reduce some of the processor load by simply delivering internal mail without scanning it first. All outside mail would still be scanned as it comes in.
Is there an easy way to get those packages to not scan a particular message based on the IP of the sender with a .conf setting?
I verified by looking at the logs, and all of the stations in question are seen by the server as the same single IP (the LAN interface of the firewall). Yes, I am sure the spammers and whatnot COULD spoof that IP address somehow, but at the moment, thats not a very big concern.
anyone?
We have a server we recently had clamav and spamassassin installed. The amount of traffic that is now hitting the box is causing it to get terribly overworked to the point it is starting to refuse connections until the processor load drops.
Until we can upgrade the server, I thought it might help to be able to put in a rule that any internal email could be ignored by clam and spamassasin, as we have the viruses and whatnot under control internally with desktop scanners. That should reduce some of the processor load by simply delivering internal mail without scanning it first. All outside mail would still be scanned as it comes in.
Is there an easy way to get those packages to not scan a particular message based on the IP of the sender with a .conf setting?
I verified by looking at the logs, and all of the stations in question are seen by the server as the same single IP (the LAN interface of the firewall). Yes, I am sure the spammers and whatnot COULD spoof that IP address somehow, but at the moment, thats not a very big concern.
anyone?