I applied an update to the ISPConfig last night, and I'm now having issues with postfix. I'm getting an error in my "mail.err" log, Code: Jun 30 10:00:48 loosestring-designs postfix/smtp[29544]: fatal: open dictionary: expecting "type:name" form instead of "=" When I look at the mail queue, I saw some errors like, Code: delivery temporarily suspended: connect to 127.0.0.1[127.0.0.1]:10026: Connection refused which I can confirm that amavis doesn't look like it's running. Code: root@loosestring-designs:/var/log# netstat -tap | grep 100 tcp 0 0 localhost:10025 0.0.0.0:* LISTEN 2540/master tcp 0 0 localhost:10027 0.0.0.0:* LISTEN 2540/master Code: root@loosestring-designs:/var/log# amavisd-new debug Jun 30 10:10:49.831 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: logging initialized, log level 0, syslog: amavis.mail Jun 30 10:10:49.831 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: sd_notify (no socket): STATUS=Config files have been read, modules loaded. Jun 30 10:10:49.832 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: starting. /usr/sbin/amavisd-new at loosestring-designs.ca amavisd-new-2.11.0 (20160426), Unicode aware, LANG="en_US.UTF-8" Jun 30 10:10:49.832 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: perl=5.026001, user=, EUID: 119 (119); group=, EGID: 125 125 (125 125) Jun 30 10:10:49.876 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: INFO: no optional modules: unicore::lib::Nt::De.pl Unix::Getrusage Jun 30 10:10:49.876 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: SpamControl: attempting to load scanner SpamAssassin, module Amavis::SpamControl::SpamAssassin Jun 30 10:10:49.876 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: SpamControl: scanner SpamAssassin, module Amavis::SpamControl::SpamAssassin Jun 30 10:10:50.035 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: INFO: SA version: 3.4.2, 3.004002, no optional modules: Encode::Detect Razor2::Client::Agent Image::Info Image::Info::GIF Image::Info::JPEG Image::Info::PNG Image::Info::BMP Image::Info::TIFF Jun 30 10:10:50.036 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: SpamControl: init_pre_chroot on SpamAssassin done Jun 30 10:10:50.036 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: socket module IO::Socket::IP, protocol families available: INET, INET6 Jun 30 10:10:50.036 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: will bind to /var/lib/amavis/amavisd.sock|unix, 127.0.0.1:10024/tcp, [::1]:10024/tcp, 127.0.0.1:10026/tcp, [::1]:10026/tcp Jun 30 10:10:50.036 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: sd_notify (no socket): STATUS=Transferring control to Net::Server. Jun 30 10:10:50.037 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: sd_notify (no socket): STATUS=Preparing to bind sockets. Jun 30 10:10:50.037 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: Net::Server: 2020/06/30-10:10:50 Amavis (type Net::Server::PreForkSimple) starting! pid(22082) Jun 30 10:10:50.040 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: Net::Server: Binding to UNIX socket file "/var/lib/amavis/amavisd.sock" Jun 30 10:10:50.040 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: Net::Server: Binding to TCP port 10024 on host 127.0.0.1 with IPv4 Jun 30 10:10:50.040 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: Net::Server: Binding to TCP port 10024 on host ::1 with IPv6 Jun 30 10:10:50.041 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: (!)Net::Server: 2020/06/30-10:10:50 Can't connect to TCP port 10024 on ::1 [Cannot assign requested address]\n at line 64 in file /usr/share/perl5/Net/Server/Proto/TCP.pm Jun 30 10:10:50.041 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: sd_notify (no socket): STOPPING=1\nSTATUS=Server rundown, notifying child processes. Jun 30 10:10:50.041 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: Net::Server: 2020/06/30-10:10:50 Server closing! Jun 30 10:10:50.041 loosestring-designs.ca /usr/sbin/amavisd-new[22082]: sd_notify (no socket): STATUS=Child processes have been stopped. I've tried re-downloading the installer from the ISPConfig website, and re-ran the update, but I still have the issue of emails queuing up. Any ideas?
main.cf config Code: # # Debian specific: Specifying a file name will cause the first # line of that file to be used as the name. The Debian default # is /etc/mailname. #myorigin = /etc/mailname smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu) biff = no # appending .domain is the MUA's job. append_dot_mydomain = no # Uncomment the next line to generate "delayed mail" warnings #delay_warning_time = 4h readme_directory = /usr/share/doc/postfix # See http://www.postfix.org/COMPATIBILITY_README.html -- default to 2 on # fresh installs. compatibility_level = 2 # TLS parameters smtpd_tls_cert_file = /etc/postfix/smtpd.cert smtpd_tls_key_file = /etc/postfix/smtpd.key smtpd_use_tls = yes smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache # See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for # information on enabling SSL in the smtp client. smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination myhostname = mail.loosestring-designs.ca alias_maps = hash:/etc/aliases, hash:/var/lib/mailman/data/aliases alias_database = hash:/etc/aliases, hash:/var/lib/mailman/data/aliases myorigin = /etc/mailname mydomain = loosestring-designs.ca mydestination = localhost, localhost.localdomain, mail.loosestring-designs.ca mynetworks = 127.0.0.0/8 [::1]/128 mailbox_size_limit = 0 recipient_delimiter = + html_directory = /usr/share/doc/postfix/html virtual_alias_domains = virtual_alias_maps = hash:/var/lib/mailman/data/virtual-mailman, proxy:mysql:/etc/postfix/mysql-virtual_forwardings.cf, proxy:mysql:/etc/postfix/mysql-virtual_email2email.cf virtual_mailbox_domains = proxy:mysql:/etc/postfix/mysql-virtual_domains.cf virtual_mailbox_maps = proxy:mysql:/etc/postfix/mysql-virtual_mailboxes.cf virtual_mailbox_base = /var/vmail virtual_uid_maps = mysql:/etc/postfix/mysql-virtual_uids.cf virtual_gid_maps = mysql:/etc/postfix/mysql-virtual_gids.cf sender_bcc_maps = proxy:mysql:/etc/postfix/mysql-virtual_outgoing_bcc.cf smtpd_sasl_auth_enable = yes broken_sasl_auth_clients = yes smtpd_sasl_authenticated_header = yes smtpd_restriction_classes = greylisting greylisting = check_policy_service inet:127.0.0.1:10023 smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination, reject_rbl_client zen.spamhaus.org, check_recipient_access mysql:/etc/postfix/mysql-virtual_recipient.cf, check_recipient_access mysql:/etc/postfix/mysql-virtual_policy_greylist.cf smtpd_tls_security_level = may transport_maps = hash:/var/lib/mailman/data/transport-mailman, proxy:mysql:/etc/postfix/mysql-virtual_transports.cf relay_domains = mysql:/etc/postfix/mysql-virtual_relaydomains.cf relay_recipient_maps = mysql:/etc/postfix/mysql-virtual_relayrecipientmaps.cf smtpd_sender_login_maps = proxy:mysql:/etc/postfix/mysql-virtual_sender_login_maps.cf proxy_read_maps = $local_recipient_maps $mydestination $virtual_alias_maps $virtual_alias_domains $sender_bcc_maps $virtual_mailbox_maps $virtual_mailbox_domains $relay_recipient_maps $relay_domains $canonical_maps $sender_canonical_maps $recipient_canonical_maps $relocated_maps $transport_maps $mynetworks $smtpd_sender_login_maps smtpd_helo_required = yes smtpd_helo_restrictions = permit_sasl_authenticated, permit_mynetworks, check_helo_access regexp:/etc/postfix/helo_access, reject_invalid_hostname, reject_non_fqdn_hostname, reject_invalid_helo_hostname, reject_unknown_helo_hostname, check_helo_access regexp:/etc/postfix/blacklist_helo smtpd_sender_restrictions = check_sender_access regexp:/etc/postfix/tag_as_originating.re , permit_mynetworks, permit_sasl_authenticated, check_sender_access mysql:/etc/postfix/mysql-virtual_sender.cf, check_sender_access regexp:/etc/postfix/tag_as_foreign.re smtpd_client_restrictions = check_client_access mysql:/etc/postfix/mysql-virtual_client.cf smtpd_client_message_rate_limit = 100 maildrop_destination_concurrency_limit = 1 maildrop_destination_recipient_limit = 1 virtual_transport = dovecot header_checks = regexp:/etc/postfix/header_checks mime_header_checks = regexp:/etc/postfix/mime_header_checks nested_header_checks = regexp:/etc/postfix/nested_header_checks body_checks = regexp:/etc/postfix/body_checks owner_request_special = no smtp_tls_security_level = may smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3 smtpd_tls_protocols = !SSLv2,!SSLv3 smtp_tls_protocols = !SSLv2,!SSLv3 smtpd_tls_exclude_ciphers = RC4, aNULL smtp_tls_exclude_ciphers = RC4, aNULL dovecot_destination_recipient_limit = 1 smtpd_sasl_type = dovecot smtpd_sasl_path = private/auth receive_override_options = no_address_mappings message_size_limit = 0 minimal_backoff_time = 120s queue_run_delay = 120s mynetworks_style = subnet hopcount_limit = 100 smtputf8_enable = yes disable_vrfy_command = yes inet_protocols = all smtp_sender_dependent_authentication = yes smtp_sasl_security_options = noanonymous sender_dependent_relayhost_maps = hash:/etc/postfix/bysender smtp_sasl_auth_enable = yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd = all content_filter = amavis:[127.0.0.1]:10024 inet_interfaces = all
master.cf file Code: # # Postfix master process configuration file. For details on the format # of the file, see the master(5) manual page (command: "man 5 master" or # on-line: http://www.postfix.org/master.5.html). # # Do not forget to execute "postfix reload" after editing this file. # # ========================================================================== # service type private unpriv chroot wakeup maxproc command + args # (yes) (yes) (no) (never) (100) # ========================================================================== smtp inet n - y - 0 smtpd 555 inet n - n - 0 smtpd #smtp inet n - y - 1 postscreen #smtpd pass - - y - - smtpd #dnsblog unix - - y - 0 dnsblog #tlsproxy unix - - y - 0 tlsproxy submission inet n - y - - smtpd -o syslog_name=postfix/submission -o smtpd_tls_security_level=encrypt -o smtpd_sasl_auth_enable=yes -o smtpd_client_restrictions=permit_sasl_authenticated,reject # -o smtpd_tls_auth_only=yes # -o smtpd_reject_unlisted_recipient=no # -o smtpd_client_restrictions=$mua_client_restrictions # -o smtpd_helo_restrictions=$mua_helo_restrictions # -o smtpd_sender_restrictions=$mua_sender_restrictions # -o smtpd_recipient_restrictions= # -o smtpd_relay_restrictions=permit_sasl_authenticated,reject # -o milter_macro_daemon_name=ORIGINATING smtps inet n - y - - smtpd -o syslog_name=postfix/smtps -o smtpd_tls_wrappermode=yes -o smtpd_sasl_auth_enable=yes -o smtpd_client_restrictions=permit_sasl_authenticated,reject # -o smtpd_reject_unlisted_recipient=no # -o smtpd_client_restrictions=$mua_client_restrictions # -o smtpd_helo_restrictions=$mua_helo_restrictions # -o smtpd_sender_restrictions=$mua_sender_restrictions # -o smtpd_recipient_restrictions= # -o smtpd_relay_restrictions=permit_sasl_authenticated,reject # -o milter_macro_daemon_name=ORIGINATING #628 inet n - y - - qmqpd pickup unix n - y 60 1 pickup cleanup unix n - y - 0 cleanup qmgr unix n - n 300 1 qmgr #qmgr unix n - n 300 1 oqmgr tlsmgr unix - - y 1000? 1 tlsmgr rewrite unix - - y - - trivial-rewrite bounce unix - - y - 0 bounce defer unix - - y - 0 bounce trace unix - - y - 0 bounce verify unix - - y - 1 verify flush unix n - y 1000? 0 flush proxymap unix - - n - - proxymap proxywrite unix - - n - 1 proxymap smtp unix - - y - - smtp relay unix - - y - - smtp -o syslog_name=postfix/$service_name # -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 showq unix n - y - - showq error unix - - y - - error retry unix - - y - - error discard unix - - y - - discard local unix - n n - - local virtual unix - n n - - virtual lmtp unix - - y - - lmtp anvil unix - - y - 1 anvil scache unix - - y - 1 scache # # ==================================================================== # Interfaces to non-Postfix software. Be sure to examine the manual # pages of the non-Postfix software to find out what options it wants. # # Many of the following services use the Postfix pipe(8) delivery # agent. See the pipe(8) man page for information about ${recipient} # and other message envelope options. # ==================================================================== # # maildrop. See the Postfix MAILDROP_README file for details. # Also specify in main.cf: maildrop_destination_recipient_limit=1 # maildrop unix - n n - - pipe flags=DRhu user=vmail argv=/usr/bin/maildrop -d vmail ${extension} ${recipient} ${user} ${nexthop} ${sender} # # ==================================================================== # # Recent Cyrus versions can use the existing "lmtp" master.cf entry. # # Specify in cyrus.conf: # lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4 # # Specify in main.cf one or more of the following: # mailbox_transport = lmtp:inet:localhost # virtual_transport = lmtp:inet:localhost # # ==================================================================== # # Cyrus 2.1.5 (Amos Gouaux) # Also specify in main.cf: cyrus_destination_recipient_limit=1 # #cyrus unix - n n - - pipe # user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} # # ==================================================================== # Old example of delivery via Cyrus. # #old-cyrus unix - n n - - pipe # flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user} # # ==================================================================== # # See the Postfix UUCP_README file for configuration details. # uucp unix - n n - - pipe flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) # # Other external delivery methods. # ifmail unix - n n - - pipe flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) bsmtp unix - n n - - pipe flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient scalemail-backend unix - n n - 2 pipe flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} mailman unix - n n - - pipe flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py ${nexthop} ${user} dovecot unix - n n - - pipe flags=DRhu user=vmail:vmail argv=/usr/lib/dovecot/deliver -f ${sender} -d ${user}@${nexthop} amavis unix - - - - 2 smtp -o smtp_data_done_timeout=1200 -o smtp_send_xforward_command=yes -o smtp_bind_address= 127.0.0.1:10025 inet n - n - - smtpd -o content_filter= -o local_recipient_maps= -o relay_recipient_maps= -o smtpd_restriction_classes= -o smtpd_client_restrictions= -o smtpd_helo_restrictions= -o smtpd_sender_restrictions= -o smtpd_recipient_restrictions=permit_mynetworks,reject -o smtpd_end_of_data_restrictions= -o mynetworks=127.0.0.0/8 -o strict_rfc821_envelopes=yes -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks -o smtp_send_xforward_command=yes -o disable_dns_lookups=yes 127.0.0.1:10027 inet n - n - - smtpd -o content_filter= -o local_recipient_maps= -o relay_recipient_maps= -o smtpd_restriction_classes= -o smtpd_client_restrictions= -o smtpd_helo_restrictions= -o smtpd_sender_restrictions= -o smtpd_recipient_restrictions=permit_mynetworks,reject -o smtpd_end_of_data_restrictions= -o mynetworks=127.0.0.0/8 -o strict_rfc821_envelopes=yes -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks -o smtp_send_xforward_command=yes -o milter_default_action=accept -o milter_macro_daemon_name=ORIGINATING -o disable_dns_lookups=yes
Seems as if your system has an ipv6 problem, amavis tries to open that port on 12.0.0.1 ipv4 and ::1 ipv6 and it fails on ipv6.
Is it possible to disable the ipv6 for amavis? After making the change on the previous post as you suggest, all my emails in queue now have the, Code: delivery temporarily suspended: connect to 127.0.0.1[127.0.0.1]:10024: Connection refused
That's because amavis can't start and not caused by the previous change. Try to remove [::1] inside the file /etc/amavis/conf.d/50-user wherever it occurs and then restart amavis. Back up the file /etc/amavis/conf.d/50-user before you change it in another directory (do not save it in the same directory!).
Before Code: use strict; # # Place your configuration directives here. They will override those in # earlier files. # # See /usr/share/doc/amavisd-new/ for documentation and examples of # the directives you can use in this file # @bypass_virus_checks_maps = ( \%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re); @bypass_spam_checks_maps = ( \%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re); # # Database connection settings # @lookup_sql_dsn = ( ['DBI:mysql:database=dbispconfig;host=127.0.0.1;port=3306', 'ispconfig', '42d05dfe6a65869dc29291265737e4e4'] ); # @storage_sql_dsn = @lookup_sql_dsn; # none, same, or separate database #$sql_select_policy = 'SELECT "Y" as local FROM mail_domain WHERE CONCAT("@",domain) IN (%k)'; # $banned_files_quarantine_method = 'sql'; # $spam_quarantine_method = 'sql'; # # SQL Select statements # $sql_select_policy = 'SELECT *,spamfilter_users.id'. ' FROM spamfilter_users LEFT JOIN spamfilter_policy ON spamfilter_users.policy_id=spamfilter_policy.id'. ' WHERE spamfilter_users.email IN (%k) ORDER BY spamfilter_users.priority DESC'; $sql_select_white_black_list = 'SELECT wb FROM spamfilter_wblist'. ' WHERE (spamfilter_wblist.rid=?) AND (spamfilter_wblist.email IN (%k)) AND (spamfilter_wblist.active="y")' . ' ORDER BY spamfilter_wblist.priority DESC'; # # Quarantine settings # $final_virus_destiny = D_BOUNCE; $final_spam_destiny = D_DISCARD; $final_banned_destiny = D_BOUNCE; $final_bad_header_destiny = D_PASS; # Default settings, we st this very high to not filter aut emails accidently $sa_spam_subject_tag = '***SPAM*** '; $sa_tag_level_deflt = 20.0; # add spam info headers if at, or above that level $sa_tag2_level_deflt = 60.0; # add 'spam detected' headers at that level $sa_kill_level_deflt = 60.0; # triggers spam evasive actions $sa_dsn_cutoff_level = 100; # spam level beyond which a DSN is not sent # # Disable spam and virus notifications for the admin user. # Can be overridden by the policies in mysql # $virus_admin = undef; $spam_admin = undef; # # Enable Logging # $DO_SYSLOG = 1; $LOGFILE = "/var/log/amavis.log"; # (defaults to empty, no log) # Set the log_level to 5 for debugging $log_level = 0; # (defaults to 0) $inet_socket_port = [10024,10026]; # :* = send to incoming Port + 1 $forward_method = 'smtp:127.0.0.1:*'; $notify_method = 'smtp:127.0.0.1:*'; $interface_policy{'10026'} = 'ORIGINATING'; $policy_bank{'ORIGINATING'} = { originating => 1, }; # IP-Addresses for internal networks => load policy MYNETS # - requires -o smtp_send_xforward_command=yes in postfix master.cf @mynetworks = qw(0.0.0.0/8 127.0.0.0/8 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 [::1] [FE80::]/10 [FEC0::]/10); # Allow SMTP access from IPs in @inet_acl to amvisd SMTP Port @inet_acl = qw( 127.0.0.1 [::1] 192.168.0.0/16 ); # DKIM $enable_dkim_verification = 1; $enable_dkim_signing = 1; # load DKIM signing code $signed_header_fields{'received'} = 0; # turn off signing of Received @dkim_signature_options_bysender_maps = ( { '.' => { ttl => 21*24*3600, c => 'relaxed/simple' } } ); #------------ Do not modify anything below this line ------------- 1; # insure a defined return After Code: use strict; # # Place your configuration directives here. They will override those in # earlier files. # # See /usr/share/doc/amavisd-new/ for documentation and examples of # the directives you can use in this file # @bypass_virus_checks_maps = ( \%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re); @bypass_spam_checks_maps = ( \%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re); # # Database connection settings # @lookup_sql_dsn = ( ['DBI:mysql:database=dbispconfig;host=127.0.0.1;port=3306', 'ispconfig', '42d05dfe6a65869dc29291265737e4e4'] ); # @storage_sql_dsn = @lookup_sql_dsn; # none, same, or separate database #$sql_select_policy = 'SELECT "Y" as local FROM mail_domain WHERE CONCAT("@",domain) IN (%k)'; # $banned_files_quarantine_method = 'sql'; # $spam_quarantine_method = 'sql'; # # SQL Select statements # $sql_select_policy = 'SELECT *,spamfilter_users.id'. ' FROM spamfilter_users LEFT JOIN spamfilter_policy ON spamfilter_users.policy_id=spamfilter_policy.id'. ' WHERE spamfilter_users.email IN (%k) ORDER BY spamfilter_users.priority DESC'; $sql_select_white_black_list = 'SELECT wb FROM spamfilter_wblist'. ' WHERE (spamfilter_wblist.rid=?) AND (spamfilter_wblist.email IN (%k)) AND (spamfilter_wblist.active="y")' . ' ORDER BY spamfilter_wblist.priority DESC'; # # Quarantine settings # $final_virus_destiny = D_BOUNCE; $final_spam_destiny = D_DISCARD; $final_banned_destiny = D_BOUNCE; $final_bad_header_destiny = D_PASS; # Default settings, we st this very high to not filter aut emails accidently $sa_spam_subject_tag = '***SPAM*** '; $sa_tag_level_deflt = 20.0; # add spam info headers if at, or above that level $sa_tag2_level_deflt = 60.0; # add 'spam detected' headers at that level $sa_kill_level_deflt = 60.0; # triggers spam evasive actions $sa_dsn_cutoff_level = 100; # spam level beyond which a DSN is not sent # # Disable spam and virus notifications for the admin user. # Can be overridden by the policies in mysql # $virus_admin = undef; $spam_admin = undef; # # Enable Logging # $DO_SYSLOG = 1; $LOGFILE = "/var/log/amavis.log"; # (defaults to empty, no log) # Set the log_level to 5 for debugging $log_level = 0; # (defaults to 0) $inet_socket_port = [10024,10026]; # :* = send to incoming Port + 1 $forward_method = 'smtp:127.0.0.1:*'; $notify_method = 'smtp:127.0.0.1:*'; $interface_policy{'10026'} = 'ORIGINATING'; $policy_bank{'ORIGINATING'} = { originating => 1, }; # IP-Addresses for internal networks => load policy MYNETS # - requires -o smtp_send_xforward_command=yes in postfix master.cf @mynetworks = qw(0.0.0.0/8 127.0.0.0/8 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 [FE80::]/10 [FEC0::]/10); # Allow SMTP access from IPs in @inet_acl to amvisd SMTP Port @inet_acl = qw( 127.0.0.1 192.168.0.0/16 ); # DKIM $enable_dkim_verification = 1; $enable_dkim_signing = 1; # load DKIM signing code $signed_header_fields{'received'} = 0; # turn off signing of Received @dkim_signature_options_bysender_maps = ( { '.' => { ttl => 21*24*3600, c => 'relaxed/simple' } } ); #------------ Do not modify anything below this line ------------- 1; # insure a defined return
Still the same issue when running the debug. Code: Jun 30 10:37:41.095 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: logging initialized, log level 0, syslog: amavis.mail Jun 30 10:37:41.095 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: sd_notify (no socket): STATUS=Config files have been read, modules loaded. Jun 30 10:37:41.095 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: starting. /usr/sbin/amavisd-new at loosestring-designs.ca amavisd-new-2.11.0 (20160426), Unicode aware, LANG="en_US.UTF-8" Jun 30 10:37:41.095 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: perl=5.026001, user=, EUID: 119 (119); group=, EGID: 125 125 (125 125) Jun 30 10:37:41.140 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: INFO: no optional modules: unicore::lib::Nt::De.pl Unix::Getrusage Jun 30 10:37:41.140 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: SpamControl: attempting to load scanner SpamAssassin, module Amavis::SpamControl::SpamAssassin Jun 30 10:37:41.140 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: SpamControl: scanner SpamAssassin, module Amavis::SpamControl::SpamAssassin Jun 30 10:37:41.295 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: INFO: SA version: 3.4.2, 3.004002, no optional modules: Encode::Detect Razor2::Client::Agent Image::Info Image::Info::GIF Image::Info::JPEG Image::Info::PNG Image::Info::BMP Image::Info::TIFF Jun 30 10:37:41.295 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: SpamControl: init_pre_chroot on SpamAssassin done Jun 30 10:37:41.295 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: socket module IO::Socket::IP, protocol families available: INET, INET6 Jun 30 10:37:41.296 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: will bind to /var/lib/amavis/amavisd.sock|unix, 127.0.0.1:10024/tcp, [::1]:10024/tcp, 127.0.0.1:10026/tcp, [::1]:10026/tcp Jun 30 10:37:41.296 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: sd_notify (no socket): STATUS=Transferring control to Net::Server. Jun 30 10:37:41.296 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: sd_notify (no socket): STATUS=Preparing to bind sockets. Jun 30 10:37:41.297 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: Net::Server: 2020/06/30-10:37:41 Amavis (type Net::Server::PreForkSimple) starting! pid(26940) Jun 30 10:37:41.300 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: Net::Server: Binding to UNIX socket file "/var/lib/amavis/amavisd.sock" Jun 30 10:37:41.300 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: Net::Server: Binding to TCP port 10024 on host 127.0.0.1 with IPv4 Jun 30 10:37:41.301 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: Net::Server: Binding to TCP port 10024 on host ::1 with IPv6 Jun 30 10:37:41.301 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: (!)Net::Server: 2020/06/30-10:37:41 Can't connect to TCP port 10024 on ::1 [Cannot assign requested address]\n at line 64 in file /usr/share/perl5/Net/Server/Proto/TCP.pm Jun 30 10:37:41.301 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: sd_notify (no socket): STOPPING=1\nSTATUS=Server rundown, notifying child processes. Jun 30 10:37:41.301 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: Net::Server: 2020/06/30-10:37:41 Server closing! Jun 30 10:37:41.301 loosestring-designs.ca /usr/sbin/amavisd-new[26940]: sd_notify (no socket): STATUS=Child processes have been stopped.
Code: root@loosestring-designs:/etc/amavis/conf.d# /etc/init.d/amavis restart [ ok ] Restarting amavis (via systemctl): amavis.service. root@loosestring-designs:/etc/amavis/conf.d# /etc/init.d/amavis stop [ ok ] Stopping amavis (via systemctl): amavis.service. root@loosestring-designs:/etc/amavis/conf.d# /etc/init.d/amavis start [ ok ] Starting amavis (via systemctl): amavis.service. root@loosestring-designs:/etc/amavis/conf.d# netstat -tap | grep 100 tcp 0 0 localhost:10025 0.0.0.0:* LISTEN 21847/master tcp 0 0 localhost:10027 0.0.0.0:* LISTEN 21847/master tcp6 0 0 loosestring-design:http ip196.ip-54-36-24:60100 TIME_WAIT -
Can I disable email content filtering for the moment to allow email to flow while I work on this? I use an external spam filtering solution before email arrives to my host. Is it as simple as removing the "content_filter = amavis:[127.0.0.1]:10024" line from my main.cf file?
amavis is also responsible for dkim signing and it's an integral part of the setup, so it's not that easy to remove it, especially as the queued mails won't get delivered just by disabling it
Try to add: $inet_socket_bind = '127.0.0.1'; in the file at the end, but before the 1; line. then restart amavis.
Ok.. I'm trying to reach paid business support now, but do you know of any companies in North America that would provide ISPConfig support? Any other thoughts, it's a production server?
Adding $inet_socket_bind = '127.0.0.1'; at the end of the 50-user file seems to have done the trick. The mailqueue is starting to process. Code: root@loosestring-designs:/etc/amavis/conf.d# netstat -tap | grep 100 tcp 0 0 localhost:10024 0.0.0.0:* LISTEN 19225/amavisd-new ( tcp 0 0 localhost:10025 0.0.0.0:* LISTEN 20741/master tcp 0 0 localhost:10026 0.0.0.0:* LISTEN 19225/amavisd-new ( tcp 0 0 localhost:10027 0.0.0.0:* LISTEN 20741/master tcp 0 0 localhost:38202 localhost:10025 TIME_WAIT - tcp 0 0 localhost:53642 localhost:10024 TIME_WAIT - tcp 0 0 localhost:35730 localhost:10026 TIME_WAIT -
If you want to make IPv4 traffic prio, not sure if it fixes your problem, but your can easy try. Code: #Prio ipv4 when ipv6 exist: nano /etc/gai.conf # uncomment this line and save: precedence ::ffff:0:0/96 100
I always have this issue after a reboot, running Code: systemctl restart amavis always fixes it for me
Thank you all for your input, but till's comment corrected the issue for me in post #12 Tho0rn: Command I have to run on Ubuntu to restart the service is "/etc/init.d/amavis restart" elmacus: Thank you for the suggestion
Is that a very old version of Ubuntu? If memory serves me, Ubuntu 16.04 started using systemctl command, so you should use the command @Th0m wrote. https://wiki.ubuntu.com/SystemdForUpstartUsers