
1.8.5.8 (0.0.07)


------   Configuration Sharing   -----------------------------------------------

-enableCFGShare (Enable Configuration Sharing) 
Read all positions in this section carefully (multiple times is recommended!!!)! A wrong configuration sequence or wrong configuration values can lead in to a destroyed ASSP configuration!
  If set, the configuration value and option files synchronization will be enabled. This synchronization belong to the configuration values, to the file that is possibly defined in a value and to the include files that are possibly defined in the configured file.
  If the configuration of all values in this section is valid, the synchronization status will be shown in the GUI for each config value that is, or could be shared. There are several configuration values, that could not be shared. The list of all shareable values could be found in the distributed file assp_sync.cfg
  For an initial synchronization setup set the following config values in this order: setup syncServer, syncConfigFile, syncTestMode and as last syncCFGPass (leave isShareSlave and isShareMaster off). Use the default (distributed syncConfigFile assp_sync.cfg) file and configure all values to your needs - do this on all peers by removing lines or setting the general sync flag to 0 or 1 (see the description of syncConfigFile ).
  If you have finished this initial setup, enable isShareMaster or isShareSlave - now assp will setup all entrys in the configuration file for all sync peers to the configured default values (to 1 if isShareMaster or to 3 if isShareSlave is selected). Do this on all peers. Now you can configure the synchronization behavior for each single configuration value for each peer, if it should differ from the default setup.
  For the initial synchronization, configure only one ASSP installation as master (all others as slave). If the initial synchronization has finished, which will take up to one hour, you can configure all or some assp as master and slave. On the initial master simply switch on isShareSlave. On the inital slaves, switch on isShareMaster and change all values in the sync config file that should be bedirectional shared from 3 to 1. As last action enable enableCFGShare on the SyncSlaves first and then on the SyncMaster.
  After such an initial setup, any changes of the peers (syncServer) will have no effect to the configuration file (syncConfigFile)! To add or remove a sync peer after an initial setup, you have to configure syncServer and you have to edit the sync config file manualy.
  This option can only be enabled, if isShareMaster and/or isShareSlave and syncServer and syncConfigFile and syncCFGPass are configured!
  Because the synchronization is done using a special SMTP protocol (without "mail from" and "rcpt to"), this option requires an installed  module in PERL. This special SMTP protocol is not usable to for any MTA for security reasons, so the "sync mails" could not be forwarded via any MTA.
  For this reason all sync peers must have a direct or routed TCP connection to each other peer.
    

-isShareMaster (This is a Share Master) 
If selected, ASSP will send configured configuration changes to sync peers.  

-isShareSlave (This is a Share Slave) 
If selected, ASSP will receive configured configuration changes from sync peers. To accept a sync request, every sending peer has to be defined in syncServer - even if there are manualy made entrys in the sync config file for a peer.  

-syncServer (Default Sync Peers) 
Define all configuration sync peers here (to send changes to or to receive changes from). Sepatate multiple values by "|". Any value must be a pair of hostname or ip-address and :port, like 10.10.10.10:25 or mypeerhost:125 or mypeerhost.mydomain.com:225. The :port must be defined!
  The target port can be the listenPort , listenPort2 or relayPort of the peer.  

-syncTestMode (Test Mode for Config Sync) 
If selected, a master (isShareMaster) will process all steps to send configuration changes, but will not really send the request to the peers. A slave (isShareSlave) will receive all sync requests, but it will not change the configuration values and possibly sent configuration files will be stored at the original location and will get an extension of ".synctest".  

-syncConfigFile (Configuration File for Config Sync*) 
Define the synchronization configuration file here (default is file:assp_sync.cfg).
 This file holds the configuration and the current status of all synchronized assp configuration values.
 The format of an initial value is:  "varname:=syncflag" - where syncflag could be 0 -not shared and 1 -is shared - for example: HeaderMaxLength:=1 . The syncflag is a general sign, which meens, a value of 0 disables the synchronization of the config value for all peers. A value of 1, enables the peer configuration that possibly follows.
 The format after an initial setup is: "varname:=syncflag,syncServer1=status,syncServer2=status,......". The "status" could be one of the following:
 0 - no sync - changes of this value will not be sent to this syncServer - I will ignore all change requests for this value from there
 1 - I am a SyncMaster, the value is still out of sync to this peer and should be synchronized as soon as possible
 2 - I am a SyncMaster, the value is still in sync to this peer
 3 - I am not a SyncMaster but a SyncSlave - only this SyncMaster (peer) knows the current sync status to me
 4 - I am a SyncMaster and a SyncSlave (bidirectional sync) - a change of this value was still received from this syncServer (peer) and should not be sent back to this syncServer - this flag will be automaticaly set back to 2 at the next synchronization check
  
Default: file:assp_sync.cfg 

-syncCFGPass (Config Sync Password) 
The password that is used and required (additionaly to the sending IP address) to identify a valid sync request. This password has to be set equal in all ASSP installations, from where and/or to where the configuration should be synchronized.
  The password must be at least six characters long.
  If you want or need to change this password, first disable enableCFGShare here an on all peers, change the password on all peers, enable enableCFGShare on SyncSlaves then enable enableCFGShare on SyncMasters.  

-syncShowGUIDetails (Show Detail Sync Information in GUI) 
If selected, the detail synchronization status is shown at the top of each configuration parameter like:
  nothing shown - there is no entry defined for this parameter in the syncConfigFile or it is an unsharable parameter
  "(shareable)" - the parameter is shareable but the general sync sign in the syncConfigFile is zero
  "(shared: ...)" - the detail sync status for each sync peer
  If not selected, only different colored bulls are shown at the top of each configuration parameter like:
  nothing shown - no entry in the syncConfigFile or it is an unsharable parameter
  "black bull &bull;" - the parameter is shareable but the general sync sign in the syncConfigFile is zero
  "green bull &bull;" - the parameter is shared and in sync to each peer
  "red bull &bull;" - the parameter is shared but it is currently out of sync to at least one peer
  If you move the mouse over the bull, a hint box will show the detail synchronization status.
  Notes Config Sync
    

------   Network Setup    -----------------------------------------------

-ConnectionLog (Connections Logging) 
  

-listenPort (SMTP Listen Port ) 
The port number on which ASSP will listen for incoming SMTP connections (normally 25). You can specify both an IP address and port number to limit connections to a specific interface. Multiple ports  (interface:port) are possible separated by a pipe (|).Examples: 25 123.123.123.1:25|123.123.123.5:25 
Default: 25 

-smtpDestination (SMTP Destination) 
The IP address and port number of the MTA you want ASSP to proxy the messages to. If multiple servers are listed and the first listed MTA does not respond, each additional MTA will be tried. If only a port number is entered, or the dynamic keyword INBOUND is used with a port number, then the connection will be established to the local IP address on which the connection was received. This is useful when you have several IP addresses with different domains or profiles in your MTA. If INBOUND:PORT is used you need to set up EmailReportDestination (for Email-Interface, Blockreporting and Notifies) and sendAllDestination (Copy Spam )Examples:125123.123.123.1:125 123.123.123.1:125|123.123.123.5:125 
Default: 125 

-EmailReportDestination (ASSP Internal Mail Destination) 
Port to connect to when  ASSP sends replies to email-interface mails, notifications and block reports. Must be set when smtpDestination contains INBOUND. For example "10.0.1.3:1025", etc.  

-listenPort2 (Second SMTP Listen Port) 
A secondary port number on which ASSP can accept SMTP connections. This is useful as a dedicated port for TLS or VPN clients or for those who cannot directly send mail to a mail server outside of their ISP's network because the ISP is blocking port 25. You may also specify an IP address to limit connections to a specific interface. Multiple ports  (interface:port) are possible separated by a pipe (|).Examples: 587587192.168.0.100:587192.168.0.100:587|192.168.0.101:587 
Default: 587 

-smtpAuthServer (Second SMTP Destination) 
The IP address! and port number to connect to when mail is received on the second SMTP listen port. If the field is blank, smtpDestination will be used. The purpose of this setting is to allow remote users to make authenticated connections and transmit their email without encountering SPF failures.Examples:127.0.0.1:687, [::1]:687  

-EnforceAuth (Force SMTP AUTH on Second SMTP Listen Port) 
Force clients connecting to listenPort2 to authenticate before transferring mail. To use this setting, both listenPort2 (Second SMTP Listen Port) and smtpAuthServer (Second SMTP Destination) must be configured.  

-DisableAUTH (Disable SMTP AUTH for External Clients) 
If you do not want  external clients to use SMTP AUTH - select this option.  

-PrimaryMX (Primary MX Host) 
The IP number of the Primary MX if there is one.   

-PrimaryMXping (Ping Primary MX Host) 
Disable connections on port 25 if PrimaryMX is up and running.  

-enableINET6 (Enable IPv6 support) 
For IPv6 to be enabled, check this box. NOTE: Changing this requires a restart of ASSP.  

-smtpDestinationRT (SMTP Destination Routing Table ) 
If INBOUND is used in the SMTP Destination field, the rules specified here are used to route the inbound IP address to a different outbound IP address. You must specify a port number with the outbound IP address. This feature works by assigning as many IP numbers to ASSP as you have different receiving Mailservers. This can be avoided by using the advanced flow we recommend: 
  Example:141.120.110.1=>141.120.110.129:25|141.120.110.2=>141.120.110.130:125|141.120.110.3=>141.120.110.130:125 requires ASSP restart
Notes On Network Setup
  

------   SMTP Session Limits    -----------------------------------------------

-SessionLog (Session Limit Logging) 
 
Default: standard 

-MaxErrors (Maximum Errors Per Session) 
The maximum number of SMTP session errors encountered before the
connection is dropped. Scoring is done  with meValencePB. 
Default: 5 

-maxSMTPSessions (Maximum Sessions) 
The maximum number of simultaneous SMTP sessions. This can prevent server overloading and DoS attacks. 64 simultaneous sessions are typically enough. No entry or zero means no limit. 
Default: 64 

-noMaxSMTPSessions (No Maximum Sessions IP numbers*) 
Mail from any of these IP numbers will pass through without checking maximum number of simultaneous SMTP sessions. For example: 145.145.145.145  

-maxSMTPipSessions (Maximum Sessions Per IP Number) 
The maximum number of SMTP sessions allowed per IP number. Use this setting to prevent server overloading and DoS attacks. 5 sessions are typically enough. If left blank or set to 0 there is no limit imposed by ASSP. ispip (ISP/Secondary MX Servers) and acceptAllMail (Accept All Mail) matches are excluded from SMTP session limiting. Scoring is done  with iplValencePB. 
Default: 5 

-maxSMTPipSessionsISPIP (ispip is included in Maximum Sessions Per IP Check) 
ispip (ISP/Secondary MX Servers) matches are not excluded from SMTP session limiting  

-HeaderMaxLength (Maximum Header Size) 
The maximum allowed header length, in bytes. At each mail hop header information is added by the mail server. A large mail header can indicate a mail loop. If the value is blank or 0 the header size will not be checked. 
Default: 100000 

-MaxEqualXHeader (Maximum Equal X-Header Lines) 
The maximum allowed equal X-header lines - eg. "X-SubscriberID:". If the value is set to 0 the header will not be checked for equal X-header lines. This check will be skipped for noprocessing, whitelisted and outgoing mails. 
Default: 20 

-detectMailLoop (Detect Possible Mailloop) 
If set to a value higher than 0, ASSP count its own Received-header in the header of the mail. If this count exceeds the defined value, the transmission of the message will be canceled. 
Default: 3 

-maxSize (Max Size of Outgoing Message) 
If the value of ([message size]) exceeds maxSize in bytes the transmission of the local message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the transmit size.  

-maxSizeExternal (Max Size of Incoming Message) 
If the value of ([message size]) exceeds maxSizeExternal in bytes the transmission of the message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the transmit size.  

-maxSizeError (Max Message Size Error) 
SMTP error message to reject maxSize / maxSizeExternal exceeding mails. For example:552 message exceeds MAXSIZE byte (size)! MAXSIZE will be replaced by the value of maxSize / maxSizeExternal. 
Default: 552 message exceeds MAXSIZE byte (size) 

-maxRealSize (Max Real Size of Outgoing Message) 
If the value of (number of [rcpt to] * [message size]) exceeds maxRealSize in bytes the transmission of the message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the total transmit size.  

-maxRealSizeExternal (Max Real Size of Incoming Message) 
If the value of (number of [rcpt to] * [message size]) exceeds maxRealSizeExternal in bytes the transmission of the external message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the total transmit size.  

-maxRealSizeError (Max Real Size Error Message) 
SMTP error message to reject maxRealSize exceeding mails. For example:552 message exceeds MAXREALSIZE byte (size * rcpt)! MAXREALSIZE will be replaced by the value of maxRealSize. 
Default: 552 message exceeds MAXREALSIZE byte (size * rcpt) 

-MaxAUTHErrors (Max Number of AUTHentication Errors) 
If an IP exceeds this number of authentication errors (535) the transmission of the current message will be canceled and any new connection from that IP will be blocked for 5-10 minutes.
  Every 5 Minutes the 'AUTHError' -counter of the IP will be decreased by one. autValencePB is used for the penalty box.
  No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to prevent external bruteforce or dictionary attacks via AUTH command. Whitelisted and NoProcessing IP's and IP's in npPB are ignored like any relayed connection.  

-smtpIdleTimeout (SMTP Idle Timeout) 
The number of seconds a session is allowed to be idle before being forcibly disconnected. No limit is imposed by ASSP if the field is left blank or set to 0. If you have not defined an IdleTimeout on your MTA, this value should not be set to 0, because then a connection will never be timed out! Scoring is done  with toValencePB. 
Default: 300 

-CheckEarlyTalker (Check for Misbehaving SMTP session) 
  

-smtpNOOPIdleTimeout (SMTP Idle Timeout after NOOP) 
The number of seconds a session is allowed to be idle after a "NOOP" command is received, before being forcibly disconnected. No limit is imposed by ASSP if the field is left blank or set to 0.
  This should prevent hackers to hold and block connections by sending "NOOP" commands short before the "smtpIdleTimeout" is reached.  

-smtpNOOPIdleTimeoutCount (SMTP Idle Timeout after NOOP Count) 
The number of counts a session is allowed send "NOOP" commands following on each other, before being forcibly disconnected. No limit is imposed by ASSP if the field is left blank or set to 0.
  This in cooperation with "smtpNOOPIdleTimeout" should prevent hackers to hold and block connections by sending repeatedly "NOOP" commands short before the "smtpNOOPIdleTimeout" is reached. If "smtpNOOPIdleTimeout" is not defined or 0, this value will be ignored!Notes On SMTP Session Limits  

------   TestMode/Spam Control   -----------------------------------------------

-spamSubject (Prepend Spam Subject ) 
Setting a filter to TestMode will tell ASSP not to reject the mail but rather build up the whitelist and spam and notspam collections. This can go on for some time without disturbing normal operation. Be sure spamSubject is blank, no user should see anything strange. After this very important phase TestMode can be used to tag the message. For example: [SPAM]  

-allTestMode (All TestModes ON ) 
Set all filters to TestMode   

-attachTestMode (Bad Attachment TestMode) 
-> DoBlockExes  

-baysTestMode (Bayesian TestMode) 
-> DoBayesian 
Default: On 

-blTestMode (BlackDomain TestMode) 
-> DoBlackDomain  

-bombheaderTestMode (Bomb Header Regex TestMode) 
-> DoBombHeaderRe  

-bombTestMode (Bomb Regex TestMode) 
-> DoBombRe  

-blackTestMode (Black Regex TestMode) 
-> DoBlackRe  

-fhTestMode (Forged Helo TestMode) 
-> DoFakedLocalHelo  

-fromTestMode (No From TestMode) 
-> DoNoFrom  

-flsTestMode (No Spoofing TestMode) 
-> DoNoValidLocalSender, DoNoSpoofing  

-hlTestMode (Helo Blacklist TestMode) 
-> useHeloBlacklist  

-ihTestMode (Invalid Helo TestMode) 
-> DoInvalidFormatHelo  

-msTestMode (Message Scoring TestMode) 
-> DoPenaltyMessage  

-mxaTestMode (Missing MX Record TestMode) 
-> DoMXACheck  

-pbTestMode (Penalty Box TestMode) 
-> DoPenalty, DoPenaltyExtreme,DoDenySMTP  

-ptrTestMode (Reversed Lookup TestMode) 
-> DoReversed  

-rblTestMode (DNSBL TestMode) 
-> ValidateRBL  

-scriptTestMode (Script Regex TestMode) 
-> DoScriptRe  

-sbTestMode (SenderBase TestMode) 
-> DoSenderBase DoCountryBlocking DoOrgBlocking   

-sigTestMode (Message-ID Signing TestMode) 
-> DoMSGIDsig  

-spfTestMode (SPF TestMode) 
-> ValidateSPF  

-srsTestMode (SRS TestMode) 
-> EnableSRS  

-uriblTestMode (URIBL TestMode) 
-> ValidateURIBL  

-switchTestToScoring (Switch Testmode to Message Scoring) 
Put the filter automatically in "Message Scoring Mode" when DoPenaltyMessage is set  (instead of stopping spam processing altogether).  

-blockTestModeExtreme (Block when Scoring is in Extreme Range) 
If set, TestMode will be ignored when the total score from DoPenaltyMessage surpasses MessageScoringExtremeLimit or the total score from DoPenalty surpasses PenaltyExtreme.  

-spamTag (Prepend Spam Tag) 
ASSP uses many methods. The method which caught the spam  will be prepended to the subject of the email. For example: [DNSBL]Notes On Testmode  

-SpamError (Spam Error) 
SMTP error message to reject spam. The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. SESSIONID will be replaced by the unique ASSP identifier set by uniqeIDLogging. REASON will be replaced by the actual reason. MYNAME will be replaced by myName. 
Default: 554 5.7.1 Mail (SESSIONID) appears to be unsolicited - REASON - contact postmaster@LOCALDOMAIN for resolution 

-send250OK (Send 250 OK ) 
Set this checkbox if you want ASSP to reply with '250 OK' instead of SMTP error code '554 5.7.1'.  

-AddSpamHeader (Add Spam Header) 
Adds a line to the email header "X-Assp-Spam: YES" if the message is spam. 
Default: On 

-StoreASSPHeader (Store Assp-Header into Spam Collection) 
Add "X-Assp-" to the collected spam-mails. 
Default: On 

-AddCustomHeader (Add Custom Header) 
Adds a line to the email header if the message is spam. For example:  
Default: X-Spam-Status:yes 

-AddLevelHeader (Add Graphical Level Header) 
Adds a line to the email header "X-Assp-Spam-Level:**** " showing the totalscore represented by stars.  

-AddSubjectHeader (Add X-ASSP-Original-Subject Header) 
Adds a line to the email header "X-ASSP-Original-Subject: the subject". 
Default: On 

-AddIPHeader (Add IP Match Header) 
Add X-Assp- header for all IP matches. 
Default: On 

-AddRegexHeader (Add  RegEx Match Header) 
 
Default: On 

-AddSpamReasonHeader (Add Spam Reason Header) 
Adds a line to the email header "X-Assp-Spam-Reason: " explaining why the message is spam.Notes On Spam Control 
Default: On 

------   SPAM Lovers/Haters/Friends   -----------------------------------------------

-spamSubjectSL (Suppress SpamSubject to SpamLover-Messages) 
If set spamSubject does NOT get prepended to the subject of any SpamLover-Message.  

-spamLoverSubjectSelected (Suppress SpamSubject For Selected Recipients*) 
spamSubject does NOT get prepended to the subject for these recipients. To enable the selection you need to uncheck spamSubjectSL. 
Default: ALL 

-SpamLoverTag (SpamLover Tag) 
 
Default: [sl] 

-spamTagSL (Suppress spamTags to SpamLover-Messages) 
If set, spamTags does NOT get prepended to the subject of the SpamLover-Message. 
Default: On 

-spamFriends (Spam Friends **) 
A list of addresses that when matched will reduce the messagescore with friendsValencePB. This will make the scoring filter more softly.  

-spamFoes (Spam Foes **) 
A list of addresses that when matched will increase the messagescore with foesValencePB. This will make the scoring filter more sharply.  

-spamLovers (All SpamLover*) 
SpamLovers are lists of addresses that when matched will allow a SMTP session through ASSP's filter process, regardless of what blocking functions match and would otherwise cause the message to be rejected. However, there is an exception to this when there are multiple recipients that do not all match the criteria of the spam Lovers match. In this exception the message will be processed normally and will be subjected to all blocking criteria.
 This can be specified per filter or (as in this field) for all messages. Messages to SpamLovers are processed and filtered by ASSP, but get tagged with spamSubject and are not blocked ( spamSubjectSL will suppress this. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  Wildcards are supported (fribo*@example.com).  
Default: abuse 

-SpamLoversRe (Regular Expression to Identify  SpamLover*) 
If a message matches this regular expression it will be considered a SpamLover message.  

-blockSpamLoversExtreme (Block SpamLover Messages with  Extreme Scoring ) 
If set, spamlover messages will be blocked when the total score from DoPenaltyMessage surpasses MessageScoringExtremeLimit or the total score from DoPenalty surpasses PenaltyExtreme.  

-strictSpamLovers (Strict SpamLover*) 
Ignore blockSpamLoversExtreme for these recipients  

-baysSpamLovers (Bayesian SpamLover*) 
  

-baysSpamLoversRe (Regular Expression to Identify Bayesian SpamLover*) 
If a message matches this regular expression it will be considered a Bayesian SpamLover message. For example: passwor|news  

-baysSpamLoversRed (Do not store Bayesian SpamLover in SpamDB) 
If set, prevents mail to Bayesian SpamLover from being stored in Spam/Notspam folder.  

-blSpamLovers (SpamLover Blacklisted Domains Check*) 
  

-blackSpamLovers (SpamLover Black Regex Check*) 
  

-bombSpamLovers (SpamLover Bomb Check*) 
  

-hlSpamLovers (SpamLover Blacklisted HELO Check*) 
  

-hiSpamLovers (SpamLover Valid/Invalid Helo Check*) 
  

-atSpamLovers (SpamLover Bad Attachment &amp; Virusscan  Check*) 
  

-spfSpamLovers (SpamLover SPF Check*) 
  

-rblSpamLovers (SpamLover DNSBL Check*) 
  

-uriblSpamLovers (SpamLover URIBL Check*) 
  

-srsSpamLovers (SpamLover SRS Signed Bounces Check*) 
  

-delaySpamLovers (SpamLover Greylisting/Delaying*) 
These Recipients will not be delayed/greylisted.  

-isSpamLovers (SpamLover Invalid Sender Check*) 
  

-mxaSpamLovers (SpamLover Missing MX Check*) 
  

-ptrSpamLovers (SpamLover Invalid/Missing PTR Check*) 
  

-pbSpamLovers (SpamLover PenaltyBox Check*) 
  

-sbSpamLovers (SpamLover Country Check*) 
  

-spamHaters (All SpamHaters*) 
SpamHaters are used to override SpamLovers / Testmodes / Tagmodes.
 If a recipient is set as as SpamHater, all spam-messages are blocked, no tagging only will work.
 Example: If you have set your entire domain as a SpamLover(s), but there are some addresses you still wish to block spam for. The message will only be blocked if all recipients are SpamHaters. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  Wildcards are supported (fribo*@example.com).For example: *fribo@example.com|jhanna|@example.org   

-baysSpamHaters (Bayesian SpamHater*) 
SpamHaters are used to override baysSpamLovers / baysTestMode. It may also be used to increase scoring for DoBayesian with Addhater.  

-rblSpamHaters (DNSBL Failures SpamHater*) 
  

-hlSpamHaters (HELO Blacklisted SpamHater*) 
  

-pbSpamHaters (PenaltyBox Blocking SpamHater*) 
  

-switchSpamLoverToScoring (Switch Spam-Lover to Message Scoring) 
Put the filter automatically in "Message Scoring Mode" when DoPenaltyMessage is set (instead of stopping spam processing altogether). Notes On Spam-Lover  

------   NoProcessing   -----------------------------------------------

-npSizeIncoming (Incoming Messages NoProcessing Size) 
This limit ensures that only incoming messages smaller than this limit are processed by ASSP. Most spam
isn't bigger than a few k. ASSP will treat incoming messages larger than this SIZE (in bytes) as 'NoProcessing' mail. Empty or 0 disables the feature. 
Default: 256000 

-npSizeOut (Message Size Limit Outgoing) 
ASSP will treat outgoing messages larger than this SIZE (in bytes) as 'No Processing' mail. Empty or 0 disables the feature.  
Default: 500000 

-noProcessingIPs (NoProcessing IPs*) 
Mail from any of these IP numbers will pass through without processing. 
 For example: 145.145.145.145|146.145.  All fields marked by '*' accept  a filepath/filename : 'file:files/ipnp.txt'. 
Default: file:files/ipnp.txt 

-noProcessing (NoProcessing Addresses*) 
Mail solely to or from any of these addresses are proxied without processing. Like a more efficient version of SpamLovers and redlist combined. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  Wildcards are supported (fribo*@example.com).  

-noProcessingFrom (NoProcessing Sender*) 
Mail solely from any of these addresses are proxied without processing. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  Wildcards are supported (fribo*@example.com).  

-noProcessingDomains (NoProcessing Domains*) 
Domains from which you want to receive all mail and  proxy without processing. Your ISP, domain registration, mail list servers, stock broker, or other key business partners might be good candidates. Note this matches the end of the address, so if you don't want to match subdomains then include the @. Note that buy.com would also match spambuy.com but .buy.com won't match buy.com. For example: sourceforge.net|@google.com|.buy.com 
Default: sourceforge.net 

-noNoProcessing (Do not mark these Addresses as Noprocessing*) 
Enter senders email addresses that you want to be processed, even if they are in noprocessing lists. You can list specific addresses (user@anydomain.com), addresses at any domain (user), or entire domains (@anydomain.com).  Wildcards are supported (fribo*@domain.com).For example: fribo@anydomain.com|jhanna|@sillyguys.org or place them in a plain ASCII file one address per line: 'file:files/nodelayuser.txt'.  

-npRe (Regular Expression to Identify NoProcessing Incoming Mails*) 
If a message matches this Perl regular expression ASSP will treat the message as a 'NoProcessing' mail. For example: X-Assp-VersionNotes On NoProcessing 
Default: X-Assp-Version 

------   White/Red/Ok   -----------------------------------------------

-redRe (Regular Expression to Identify Redlisted Mail*) 
If an email matches this Perl regular expression it will be 
considered redlisted.
The Redlist serves several purposes:
1) the Redlist is a list of addresses that cannot contribute to the 
whitelist and which are not considered local even if their mail is 
from a local computer. For example, if someone goes on a vacation and 
turns on their autoresponder, put them on the redlist until 
they return. Then as they reply to every spam they receive they won't 
corrupt your non-spam collection or whitelist: \[autoreply\]
2) Redlisted addresses will not be added to the Whitelist.
3) Redlisted messages will not be stored in the 
SPAM/NOTSPAM-collection if DoNotCollectRedList and/or DoNotCollectRedRe is set. 
As all fields marked by * this field accepts 
a list separated by | or a plain ASCII file one address per line: 'file:files/redre.txt'.  
Default: file:files/redre.txt 

-whiteListedIPs (Whitelisted IPs*) 
They  contribute to the Whitelist and to Notspam. For example: 145.145.145.145|146.145.  All fields marked by '*' accept  a filepath/filename : 'file:files/ipwl.txt'.  

-whiteRe (Regular Expression to Identify Non-Spam ) 
If an incoming email matches this Perl regular expression it will be considered non-spam.For example: Secret Ham Password|307\D{0,3}730\D{0,3}4[12]\d\d  

-whiteListedDomains (Whitelisted Domains and Addresses*) 
Domains and addresses from which you want to receive all mail. Your ISP, domain registration, mail list servers, stock broker, or other key business partners might be good candidates. Be careful not to put widely used domains here like google.com or hotmail.com. Our recommended approach is to put whitelisted domains into whiteSenderBase. Note this matches the end of the address, so if you don't want to match subdomains then include the @. Note that example.com would also match spamexample.com but .example.com won't match example.com. Wildcards are supported. For example: sourceforge.net|group*@google.com|.example.com. *You may place them in a plain ASCII file one address per line:'file:files/whitedomains.txt' 
Default: sourceforge.net 

-whiteListedDomainsPassSPF (Use SPF to validate whiteListedDomains) 
Check this if you don't want ASSP to use whiteListedDomains without a corresponding SPF record.  

-wildcardUser (Wildcard User to Whitelist a Domain ) 
If you add this user (eg: *@example.com) via email-interface ( EmailWhitelistAdd ), the whole domain will be whitelisted. 
Default: * 

-WhitelistOnly (Reject All But Whitelisted Mail) 
Check this if you want to reject all mail from anyone not on the whitelist. Collecting will use baysSpamLog.  

-NoAutoWhite (Only Email-Interface Addition to Whitelist.) 
Check this box to  allow additions to the whitelist by EmailWhitelistAdd only.  

-NotGreedyWhitelist (Only the envelope-sender is added/compared to the whitelist) 
Normal operation includes addresses in the FROM, SENDER, REPLY-TO, ERRORS-TO, or LIST-* header fields.This allows nearly all list email to be whitelisted. Check this option to disable this. Will not apply if you add/remove whitelist entries via email-interface.  

-WhitelistLocalOnly (Only local or authenticated users contribute to the whitelist.) 
Normal operation allows all local, authenticated, or whitelisted users to contribute to the whitelist.Check this box to not allow whitelisted (but not local) users to add to the whitelist.  

-WhitelistLocalFromOnly (Only local users with a local domain in envelope contribute to the whitelist.) 
Check this box to prevent a local sender with non-local domain from contributing to the whitelist. (for example: redirected messages). 
Default: On 

-WhitelistAuth (Whitelist authenticated users.) 
  

-UpdateWhitelist (Save Whitelist) 
Save a copy of the white list every this many seconds. Empty or Zero will prevent any saving.Notes On Whitelist 
Default: 3600 

-MaxWhitelistDays (Max Whitelist Days) 
This is the number of days an address will be kept on the whitelist without any email to/from this address. 
Default: 999 

-DoOKCaching (Enable OKAddress Cache) 
OKAddress: If a message is marked 'Message OK' the sender addresses are called 'OK Addresses'. These are addresses which are not whitelisted but the sender did not send spam and did send notspam several times . Whitelisting and/or Exporting is done according to OKminhits and OKtoWhitelistAge. Scoring is done  with okaValencePB.   

-NoOKCachingRe (Regular Expression to Identify NoCaching Addresses*) 
If an address matches this Perl regular expression ASSP will not cache them in OKAddress Cache. 
Default: file:files/nookcaching.txt 

-OKCacheExp (OK Cache Refresh Interval) 
OK Addresses in cache will be removed after this interval in days. 0 will disable the cache.   
Default: 90 

-OKminhits (Minimum Hits in OK Cache) 
If a message is marked 'Message OK' the sender addresses are stored in the OK cache. The address will be exported / added to the whitelist if the number of hits in the cache reaches OKminhits. 
Default: 5 

-OKexportFile (Exported OKAddresses ) 
OKAddresses in cache reaching OKminhits will be regularly stored into this file.  
Default: file:files/okexport.txt 

-OKtoWhitelistAge (OK Cache Age for Exporting/Whitelisting) 
OKAddresses in cache can be exported and/or whitelisted after reaching this age in hours. 0 will allow export regardless of age. An OKAddress is removed from cache if Spam is coming from it.  
Default: 72 

-ValidateRWL (Enable Realtime Whitelist Validation) 
RWL: Real-time white list. These are lists of IP addresses that have
 somehow been verified to be from a known good host. Senders that pass RWL validation will pass IP-based filters. This requires an installed  module in PERL.   

-RWLwhitelisting (Whitelist all RWL Validated Addresses) 
If set, the message will also pass Bayesian Filter and URIBL.  

-RWLServiceProvider (RWL Service Providers*) 
Hostnames of RWLs to use separated by "|".Examples are: list.dnswl.org|query.bondedsender.org 
Default: list.dnswl.org|query.bondedsender.org 

-RWLmaxreplies (Maximum Replies) 
A reply is affirmative or negative reply from a RWL. The RWL module will wait for this number of replies (negative or positive) from the RWLs listed under Service Provider for up to the Maximum Time below. This number should be equal to or less than the number of RWL Service Providers listed to allow for randomly unavailable RWLs.  
Default: 1 

-RWLminhits (Minimum Hits) 
A hit is an affirmative response from a RWL. The RWL module will check all of the RWLs listed under Service Provider, and flag the email with a RWL 'pass' flag if equal to or more than this number of RWLs return a postive whitelisted response. If the number is less but not zero the email is marked 'neutral' 
Default: 1 

-RWLmaxtime (Maximum Time) 
This sets the maximum time to spend on each message performing RWL checks 
Default: 5 

-noRWL (Dont Validate RWL for these IPs*) 
Enter IP addresses that you don't want to be RWL validated, separated by pipes (|). For example: 145.145.145.145|146.145.  

-AddRWLHeader (Add X-Assp-Received-RWL Header) 
Add X-Assp-Received-RWL header to header of all emails processed by RWL. 
Default: On 

-RWLCacheExp (RWL Cache Expiration Time) 
IPs in cache will be removed after this interval in hours. 0 will disable the cache.   
Default: 72 

-RWLLog (Enable RWL logging) 
Notes On RWL 
Default: standard 

------   Relaying    -----------------------------------------------

-RelayLog (Enable Relay logging) 
 
Default: standard 

-acceptAllMail (Accept All Mail*) 
Relaying is allowed for these IPs. They  contribute also to the whitelist. This can take either a directly entered list of IP numbers separated by pipes or place them in a plain ASCII file one address per line: 'file:files/acceptall.txt'.An IP range is defined e.g. '182.82.10.'. CIDR notation is accepted (182.82.10.0/24). Hyphenated ranges can be used (182.82.10.0-182.82.10.255)  

-relayHostFile (Relay Host File ) 
Similar to  acceptAllMail, but this is a file with an ABSOLUTE path, not relative to base. No IP-blocks supported. For example: /usr/local/assp/relayhosts  

-localDomains (Local Domains*) 
Put here are the domain names that your mail system considers local. Separate entries with |  or place them in a plain ASCII file one address per line: 'file:files/localdomains.txt'. Wildcards are supported. For example: example.org|*example.com
If ASSP finds no other hint that the domain is local, it  will reject messages to domains not listed here with 'RelayAttempt'. A successfull DoLDAP, DoVRFY or hit in LocalAddresses_Flat  will put the domain part of the queried address into ldaplistdb and will mark the domain as local.
You can set nolocalDomains to disable this check during setup and testing.
  
Default: file:files/localdomains.txt 

-localDomainsFile (Local Domains File) 
Similar to localDomains, but with absolute path to the file. Wildcards are not supported. For access to MTA generated files.   

-DoLocalIMailDomains (Local IMail domains) 
Consider domains in the IMail registry to be local  

-nolocalDomains (Skip Local Domain Check) 
Do not check relaying for invalid domains - let the MTA do it. This can be set to prevent 'RelayAttempt' errors during setup and testing. Attention: this will make ASSP an open relay, if the MTA behind it does not reject invalid domains. 
Default: On 

-relayHost (Relay Host) 
Your mail relayhost (smarthost). For example: mail.relayhost.com:25if you run Exchange/Notes and you want assp to update the nonspam database and the whitelist, then enter your smtp relay host here. Blank means no relayhost.   

-relayAuthUser (Username for  Authentication to Relay Host) 
The username used for SMTP AUTH authentication to the relayHost  -  if your ISP need authentication on the SMTP port. Supported authentication methodes are PLAIN, LOGIN, CRAM-MD5 and DIGEST-MD5 . If the relayhost offers multiple methodes, the one with highest security option will be used. The Perl module  must be installed to use this feature! The usage of this feature will be skipped, if the sending MTA uses the AUTH command. Leave this blank, if you do not want use this feature.  

-relayAuthPass (Password for  Authentication to Relay Host) 
The password used for SMTP AUTH authentication to the relayHost. Leave this blank, if you do not want use this feature.  

-relayPort (Relay Port) 
Tell your mail server to connect to this port as its smarthost/relayhost. For example: 225 Note that you'll want to keep the relayPort protected from external access by your firewall.You can supply an interface:port to limit connections.  

-allowRelayCon (Allow Relay Connection from these IPs*) 
Enter any addresses that are allowed to use the relayPort , separated by pipes (|). If empty, any ip address is allowed to connect to the relayPort. If this option is defined, keep in mind : Addresses defined in acceptAllMail are NOT automaticly included and have to be also defined here, if they should be allowed to use the relayPort. For example: 127.0.0.1|172.16..  

-ldLDAP (Do LDAP lookup for local domains) 
Check local domains against an LDAP database.Note: Checking this requires filling in LDAP DomainFilter ( ldLDAPFilter ).This requires an installed  module in Perl.  

-ispip (ISP/Secondary MX Servers*) 
Enter any addresses that are your ISP or backup MX servers, separated by pipes (|). These addresses will (necessarily) bypass Griplist, IP Limiting, Delaying, PenaltyBox, SPF, DNSBL and SRS checks unless the IP can be determined by ispHostnames (ISP Connecting IP). For example: 145.145.145.145|145.145.145.146.  

-contentOnlyRe (Regular Expression to Identify Forwarded Messages*) 
Put anything here to identify messages which should bypass all IP based filter like PB, Sender Validation, Griplist, IP Limiting, Delaying, SPF, DNSBL and SRS. For example:  email addresses of people who are forwarding from other accounts to their mailbox on your server.  

-ispHostnames (Hostnames (Regular Expression) to Identify Originating IPs*) 
If ASSP runs behind another server(s), no IP/HELO based filter will work. ASSPwill lookup the IP that connected to the ISP/Secondary. If found, this address is used to perform IP-based checks . For example: mx1\.yourisp\.com or mx1\.yourisp\.net|mx2\.yoursecondary\.com . This hostnames are found in the 'Received:' header, like  'Received: from ...123.123.123.123... by mx1.yourisp.com'. Leave this blank to disable the feature.   

-OriginatingIP (Text to Identify Originating IP Header*) 
If ASSP runs behind another server(s), no IP/HELO based filter will work. If a special header with the originating IP is inserted from the frontend server ASSP will use the originating IP to perform IP and HELO checks. The frontend server must be listed in ispip.For example: X-Forwarded-For|X-Originating-IP  
Default: X-Forwarded-For|X-Originating-IP 

-send250OKISP (Send 250 OK To ISP/Secondary MX Servers) 
Set this checkbox if you want ASSP to reply to IP numbers in ispip with '250 OK' instead of SMTP error code '554 5.7.1'.  
Default: On 

-ispgripvalue (ISP/Secondary MX Grip Value) 
It is recommended  to set it to 0.5 (Completely GReyIP) for ISP and Secondary MX servers. If left blank the Griplist X value is used (percentage of spam messages in relation to total). Note: value should be greater than 0 and less than 1, where 0 = never spam and 1 = always spam 
Default: 0.5 

-BounceSenders (Bounce Senders*) 
Envelope sender addresses treated as bounce origins. Null sender (\) is always included.
 Accepts specific addresses (postmaster@example.com), usernames (mailer-daemon), or entire domains (@bounces.domain.com)Separate entries with pipes: |. For example: postmaster|mailer-daemon 
Default: postmaster|mailer-daemon 

-PopB4SMTPFile (Pop Before SMTP DB File) 
Enter the DB database filename of your POP before SMTP implementation with records stored for dotted-quad IP addresses.For example: /etc/mail/popip.db  

-PopB4SMTPMerak (Pop Before SMTP Merak Style) 
If set Merak 7.5.2 is supported.  

-NoRelaying (Relaying Error ) 
SMTP error message to deny relaying. 
Default: 530 Relaying not allowed 

-NoRelayingStrict (Drop Connection if Relaying Error) 
Set this checkbox if you want ASSP to drop the connection immediately after an Relaying Error is encountered.  

-defaultLocalHost (Default Local Domain) 
If you want to be able to send mail to local users without a domain name then put the default local domain here.  Blank disables this feature. For example: assp-notspam.orgNotes On Relaying 
Default: assp-notspam.org 

------   Control Outgoing    -----------------------------------------------

-NoExternalSpamProb (No Outgoing Spam Header) 
Check this box if you don't want your X-Assp- headers on outgoing mail. 
Default: On 

-npLocalRe (Regular Expression to Identify NoProcessing Local Mails*) 
If an outging message matches this Perl regular expression ASSP will treat the message as a 'NoProcessing' mail. For example: autoreply  

-blockLocalRe (Regular Expression to Identify Blocked Local Mails*) 
If an outging message matches this Perl regular expression ASSP will block the message.  

-LocalFrequencyInt (Local Frequency Interval) 
The time interval in seconds in which the number of envelope recipients per sending address should not exceed a specific number ( LocalFrequencyNumRcpt ).
  Use this in combination with LocalFrequencyNumRcpt to limit the number of recipients in a given interval, to prevent local abuse - for example from highjacked local accounts. A value of 0 (default) will disable this feature and clean the cache within five minutes. It is recommended to enable DoLocalSenderAddress and/or DoLocalSenderDomain, if you want to use this feature. To give users the chance to inform an admin about such blocked mails, local mails to EmailAdmins are never blocked because of that feature.
    

-LocalFrequencyNumRcpt (Local Frequency Recipient Number) 
The number of envelope recipients per sending address that should not be exceeded in a specific time interval ( LocalFrequencyInt ).
  Use this in combination with LocalFrequencyInt to limit the number of recipients in a given interval, to prevent local abuse - for example from highjacked local accounts. A value of 0 (default) will disable this feature and clean the cache within five minutes. It is recommended to enable DoLocalSenderAddress and/or DoLocalSenderDomain, if you want to use this feature. To give users the chance to inform an admin about such blocked mails, local mails to EmailAdmins are never blocked because of that feature. 
    

-LocalFrequencyOnly (Check local Frequency for this Users only*) 
A list of local addresses, for which the 'local frequency check' should be done. Leave this field blank (default), to do the check for every address.
  Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com).  Wildcards are supported (fribo*@domain.com).
  For example: fribo*@thisdomain.com|jhanna|@sillyguys.org   

-NoLocalFrequency (Check local Frequency NOT for this Users*) 
A list of local addresses, for which the 'local frequency check' should not be done. Noprocessing messages will skip this check.
  Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com).  Wildcards are supported (fribo*@domain.com).
  For example: fribo*@thisdomain.com|jhanna|@sillyguys.org   

-DoLocalSenderDomain (Do Local Domain Check for Local Sender) 
If activated, each local sender address must have a valid Local Domain - needs localDomains or localDomainsFile or ldLDAP or DoLocalIMailDomains.  

-DoLocalSenderAddress (Do Local Address Check for Local Sender) 
If activated, each local sender must have a valid Local Address - needs DoVRFY or DoLDAP or LocalAddresses_Flat.  

-LocalSender2NULL (Move Local Connection with wrong Sender Address to NULL) 
If set, ASSP will move all Local connections where the sender failed DoLocalSenderDomain or DoLocalSenderAddress to a NULL-connection. The sender will receive "250 OK".Notes On Control Outgoing  

------   Validate Recipients   -----------------------------------------------

-ValidateUserLog (Enable User Validation logging) 
 
Default: standard 

-LocalAddresses_Flat (Lookup Local Addresses from Here*) 
This is an optional list of local addresses for all MTAs behind ASSP. If the address is not found here ASSP will look for other methods of verification (DoLDAP, DoVRFY). If no ASSP-verification is used, the MTA behind ASSP will do it. You can list specific addresses (user@example.com), addresses at any local domain (user), or entire domains (@example.com).  Wildcards are supported (fribo*@example.com). Separate entries with a pipe (|).For example: fribo@example.com|jhanna|@example.org . You may use a plain ASCII file 'file:files/localuser.txt'.  

-LocalAddresses_Flat_Strict (Reject unknown domains) 
If set and LocalAddresses_Flat is used all domains must be configured here. If not set, only domains existing in LocalAddresses_Flat will be checked. 
Default: On 

-LocalAddresses_Flat_Domains (Use Entries without leading @ as Domains) 
If set entries in LocalAddresses_Flat without leading '@' are handled as domains,for example 'example.com' means an entire domain.  

-LocalAddressesNP (Do Not Validate Local Addresses if in NoProcessing List) 
If a recipient is found in NoProcessing, the user validation is skipped.   

-RejectTheseLocalAddresses (Bounce These Local Addresses*) 
If ANY recipient is on reject list, the message will not be delivered. Used for disabled legitimate accounts, where a user may have left the company. This stops wildcard mailboxes from getting these messages. You can list specific addresses (user@example.com), addresses at any local domain (user), or entire domains (@example.com).  Wildcards are supported (fribo*@example.com). The field (indicated by the '*') accepts a list separated by '|' (for example: fribo*@example.com|@example.com|user) or a file designated as follows (path relative to the ASSP directory): 'file:files/filename.txt'. Putting in the file: will prompt ASSP to put up a button to edit that file. files is the subdirectory for files. The file does not need to exist, you can create it from the editor by saving it. The file must have one entry per line; anything on a line following a numbersign or a semicolon ( #  is ignored (a comment)  

-BlockLocalAddressesRe (Block Local Addresses Regular Expression*) 
Block all addresses which match this RegEx. Note: if you want to block the pipe char '|' it must be masked with the mask character '\' . You may also use metacharacter brackets ([]) for this purpose. 
Default: [|] 

-AllowLocalAddressesRe (Allow Local Addresses Regular Expression*) 
Allow only addresses which match this RegEx.  

-TrapLog (Enable Trap logging) 
  

-spamtrapaddresses (Trap Addresses* ) 
Mail to any of these addresses will be blocked and the scoring value is added. These addresses are not checked for validity. Entries are separated by '|' where '*' can be used as a match anything wildcard. Entries that start with '@' indicate that all addresses with that domain should match. Entries without '@' indicate the user part of email addresses with any domain.
Valid entries are:
john.doe@example.tld|jane.doe|@example.tld|*.department@example.tld  

-SpamTrap2NULL (Move Connection with Trap Addresses to NULL) 
If set, ASSP will move connections with spamtrapaddresses to a NULL-connection. The sender will receive "250 OK". 
Default: On 

-TrapReply (Trap Reply) 
SMTP reply for trapaddresses. Default: '550 5.1.1 User unknown: EMAILADDRESS'  The literal EMAILADDRESS (case sensitive) is replaced by the fully qualified SMTP recipient (e.g., thisuser@example.com). Make this empty if you do not want to be polite. 
Default: 550 5.1.1 User unknown: EMAILADDRESS 

-DoPenaltyMakeTraps (Cache Unknown Addresses) 
If enabled, unknown addresses are cached. If set to 'use for spamtrapaddresses' very activ addresses will be used like spamtrapaddresses. If set to 'use for spamaddresses'  they will work like spamaddresses. If set to 'use for validation' all entries regardless of their frequency will be used to validate incoming addresses. Note: LocalAddresses_Flat or DoLDAP or DoVRFY must be enabled. 
Default: use for spamaddresses 

-PenaltyMakeTraps (Unknown Address Frequency  Limit) 
Minimum number of times an address must appear during PBTrapCacheExp before it will be used as spamaddress/spamtrapaddress. For example: 10. 
Default: 10 

-noPenaltyMakeTraps (Exceptionlist for Address Cache*) 
Addresses which should not be cached. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  Wildcards are supported (fribo*@example.com).  

-PBTrapCacheExp (Address Cache Expiration) 
Addresses will be removed after this interval in hours if the 'Invalid Addresses Frequency Limit' is not reached. For example 3.  
Default: 3 

-DoVRFY (Verify Recipients with SMTP-VRFY) 
If activated and the format 'Domain=>MTA' is encountered in
 vrfyDomains recipient addresses will be verified with SMTP-VRFY (if  VRFY is not supported 'MAIL FROM:' and 'RCPT TO:' will be used).
 If you know that VRFY is not supported with a MTA, you may put the MTA into VRFYforceRCPTTO. 
Default: On 

-vrfyDomains (VRFY Domains*) 
Put here the domain names that should be verified with SMTP-VRFY. Separate entries with |  or place them in a plain ASCII file one address per line: 'file:files/vrfydomains.txt'. 
 Use the syntax: mydomain.com=>smtp.mydomain.com:port|other.com=>mx.other.com:port to verify the recipient addresses with the SMTP-VRFY (if VRFY is not supported 'MAIL FROM:' and 'RCPT TO:' will be used)  command on other SMTP servers. The entry behind => must be the hostname:port or ip-address:port of the MTA which is used to verify 'RCPT TO' addresses with a VRFY command! If :port is not defined, port :25 will be used. You have to enable the SMTP 'VRFY' command on your MTA - the 'EXPN' command should be enabled! This requires an installed  module in PERL. 
 If you have  enabled DoLDAP or LocalAddresses_Flat and ASSP finds a VRFY entry for a domain, LDAP/LocalAddresses_Flat search will be done first and if this fails, the VRFY will be used.Wildcards are supported. If you have only one MTA you may use '*=>smtp.mydomain.com'.

 It is mandatory to configure ldaplistdb in the 'File Paths and Database' section when using this verify extension - so ASSP can store all verified recipient addresses to minimize the querys on MTA's. Both VRFY and LDAP are using ldaplistdb. 
Default: file:files/vrfydomains.txt 

-VRFYQueryTimeOut (SMTP VRFY-Query Timeout) 
The number of seconds ASSP will wait for an answer of the MTA that is queryed with the VRFY command to verify a recipient address. See description of localDomains for the necessary modification to localDomains to run this feature 
Default: 5 

-VRFYforceRCPTTO (Force the usage of RCPT TO*) 
Define local MTAs here for which you want ASSP to force the usage of 'MAIL FROM:' and 'RCPT TO:' instead of the VRFY command. The definition of the MTA(s) has to be exactly the same as already defined in localDomains (after the '=>') for example: smtp.mydomain.com|mx.other.com:port|10.1.1.1|10.1.1.2:125 .  

-DisableVRFY (Disable VRFY for External Clients) 
If you have enabled VRFY on your MTA to allow ASSP to verify addresses and you do not want external clients to use VRFY/EXPN - select this option.  

-MaxVRFYErrors (Maximum recipient verification Errors) 
The maximum number of failed 'RCPT TO' or 'VRFY' commands encountered before the connection is dropped. ASSP will drop the connection, if the count of '550 unknown user' errors, received from your 'smtpDestination'(MTA), reached this value! 
Default: 5 

-VRFYFail (VRFY failures return false) 
VRFY failures return false when an error occurs in VRFY lookups.  

-VRFYLog (Enable VRFY logging) 
 
Default: standard 

-DoMaxDupRcpt (Block Max Duplicate Recipients) 
Block remote servers that uses the same recipient address more times, than the number defined in MaxDupRcpt in the RCPT TO: command. Scoring is done with mdrValencePB . This check is skipped for outgoing, noprocessing, whitelisted and spamlovers mails. If a message has to be delayed, this check will score before the delay if set to block or score - and score and/or block on the next server request. 
Default: score 

-MaxDupRcpt (Maximum Allowed Duplicate Recipient Addresses) 
The maximum number of duplicate recipient addresses that are allowed in the sequence of the RCPT TO: commands!
  The number per mail is calculated by 'number of RCPT TO: commands  -  number of unique recipient addresses'.
  For example: if one address is used three times or two addresses are used each two times, will result in the same count - 2. Or if both is the case in one mail, the count will be 4.  

-ReplaceRecpt (Enable recipient replacement*) 
recommented if used: file:files/rcptreplrules.txt - default empty ! This enables recipient replacement. If you do not use file:, separate the rules with |. The replacement will be done before any ASSP check. Use this option carefully - for example: if you have enabled DKIM check, the DKIM check will fail, if the recipient of the mail was modified. For a more detailed description of the rules and options, read the file: files/rcptreplrules.txt!     

-sendAllPostmaster (Catchall Address for Messages to Postmaster) 
ASSP will deliver messages addressed to all postmasters of your local domains to this address. For example: postmaster@example.com  

-sendAllPostmasterNP (Skip Spam Checks for Postmaster Catchall) 
  

-sendAllAbuse (Catchall Address for Messages to Abuse) 
ASSP will deliver messages to all abuse addresses of your local domains to this address. For example: abuse@example.com  

-sendAllAbuseNP (Skip Spam Checks for Abuse Catchall) 
  

-DoRFC822 (Validate Recipient Address to Conform with RFC5322 ) 
If activated, each local address is checked to conform with the email format defined in RFC5322 .This requires an installed  module in PERL. 
Default: On 

-CatchAll (Catchall per Domain*) 
ASSP will send to these addresses if no valid user is found in LocalAddresses_Flat or LDAP. For example: catchall@domain1.com|catchall@domain2.com  

-CatchallallISP2NULL (Move ISP Connection with wrong Recipient Address to NULL) 
If set, ASSP will move all ISP connections with wrong recipient addresses to a NULL-connection. The ISP will receive "250 OK" until the mail has passed, but the mail will not be sent to your MTA. This is done after CatchAll but before CatchAllAll is checked.  

-CatchAllAll (Catchall for All Domains) 
ASSP will send to this address if no valid user is found  in LocalAddresses_Flat or LDAP and no match is found in Catchall per Domain. For example: catchall@example.com  

-NullAddresses (NULL Connection Addresses*) 
ASSP will discard a message silently when encountering such an address in "MAIL FROM:" or "RCPT TO:". Accepts specific addresses (null@example.com), user parts (nobody) or entire domains (@example.com).  

-InternalAddresses (Accept Mail from Local Domains only*) 
These local addresses do not accept mail externally. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com).  

-SepChar (Separation Character for Subaddressing) 
RFC 3598 describes subaddressing with a Separation Character. A star ('*') is not allowed as Separation Character. Everything between Separation Character and @ is ignored (including Separation Character). For Example = '+' will allow user+subaddress@example.com. 
Default: + 

-EnableBangPath (Support Bang Path) 
If set, ASSP will support addresses like domainx!user@domainy and will convert them to user@domainx .  

-NoValidRecipient (No-Valid-Local-User Reply) 
SMTP reply for invalid Users. Default: '550 5.1.1 User unknown: EMAILADDRESS'  The literal EMAILADDRESS (case sensitive) is replaced by the fully qualified SMTP recipient (e.g., thisuser@example.com).Notes On Local Addresses 
Default: 550 5.1.1 User unknown: EMAILADDRESS 

------   Validate Helo   -----------------------------------------------

-useHeloBlacklist (Use the Helo Blacklist) 
Use the list of blacklisted-helo hosts built by rebuildspamdb. Scoring is done  with hlValencePB, testmode with hlTestMode. 
Default: score 

-ValidateHeloLog (Enable Validate Helo Logging) 
 
Default: standard 

-DoSucpiciousHelo (Score Suspicious HELOs) 
Score servers with SuspiciousHeloRe in Helo. Scoring is done  with shValencePB 
Default: score 

-SuspiciousHeloRe (Regular Expression to Score Suspicious HELO**) 
Score Suspicious HELOs will check incoming HELOs for this. 
For example: 'dsl|br(e|oa)dband|ppp|pppoe|dynamic|dynip|ADSL|dial(up|in)|pool|dhcp|leased'   
Default: dsl|br(e|oa)dband|ppp|pppoe|dynamic|dynip|ADSL|dial(up|in)|pool|dhcp|leased 

-DoFakedLocalHelo (Block Forged Helos) 
Block remote servers that claim to come from our Local Domain/Local IPs/Local Host. Scoring with fhValencePB, testmode with fhTestMode. 
Default: block 

-ForceFakedLocalHelo (Enforce Check of Forged Helos Before User Validation) 
If set and DoFakedLocalHelo is enabled, ASSP will  check faked Helos before Delaying. Note: fhTestMode or allTestMode will disable the early execution.  

-DoFakedUseLocalDomain (Use Local Domain List for Blocking Forged Helos) 
If set, DoFakedLocalHelo will  use localDomains. 
Default: On 

-DoFakedWL (Do Not Block Whitelisted Forged Helos) 
Disable "Block Forged Helo's" for whitelisted addresses (not recommended).  

-DoFakedNP (Do Not Block Noprocessing Forged Helos) 
Disable "Block Forged Helo's" for addresses identified as noprocessing (not recommended).  

-myServerRe (Local Domains,IPs and Hostnames*) 
Local Domains, IP numbers and Hostnames are often use to fake (forge) the Helo. Include all IP addresses and hostnames for your server  here, localhost is already included. Include Local Domains of your choice here, if you deactivated the automatic use of the localDomains list.  For example: 11.22.33.44|mx.example.com|example.org  

-noHelo (Dont Validate HELO for these IPs*) 
Enter IP addresses that you don't want to be HELO validated.
   For example: 145.145.145.145|146.145  

-heloBlacklistIgnore (Dont block these HELOs*) 
HELO / EHLO greetings on this list will be excluded from the HELO checks. For example: host123.isp.com|host456.*.com  

-ForceValidateHelo (Enforce Early Helo Checks) 
If set and DoInvalidFormatHelo is enabled, ASSP will do DoInvalidFormatHelo before Delaying. Note: ihTestMode or allTestMode will disable the early execution.  

-DoInvalidFormatHelo (Validate Format of HELO) 
If activated, the HELO is checked against the expression below. If the Regular Expression matches, the HELO is not ok. Scoring is done  with ihValencePB, set testmode with ihTestMode. 
Default: block 

-invalidFormatHeloRe (Regular Expression to Validate Format of HELO**) 
Invalidate Format HELO will check incoming HELOs for this. Each regex can be assigned a weight. If the score which results from weight is less than ihValencePB, the message will not be blocked (even if 'block' is set) but scored. 
 For example: \.user=>0.5|^\d+\.\d+\.\d+\.\d+$|^[^\.]+\.?$  or place them in a plain ASCII file one address per line: file:files/invalidhelo.txt 
Default: file:files/invalidhelo.txt 

-validFormatHeloRe (Regular Expression to Validate Format of HELO*) 
Validate Format HELO will check incoming HELOs according to rfc1123. For example: ^(([a-z\d][a-z\d-]*)?[a-z\d]\.)+[a-z]{2,6}$   
Default: ^(([a-z\\d][a-z\\d-]*)?[a-z\\d]\\.)+[a-z]{2,6}$ 

-DoHeloWL (Do Validate Helo for Whitelisted) 
Do validate Helo for whitelisted addresses. 
Default: On 

-DoHeloNP (Do Validate Helo for Noprocessing) 
Do validate Helo for messages marked 'noprocessing'.
  Notes On Validate Helo
   
Default: On 

------   Validate Sender   -----------------------------------------------

-ValidateSenderLog (Enable Validate Sender Logging) 
 
Default: standard 

-DoBlackDomain (Do Blacklisted Addresses and Domains) 
 DoBlackDomain uses blackListedDomains and blackAddresses. Scoring is done  with blValencePB, testmode with blTestMode. 
Default: block 

-DoBlackDomainWL (Blacklisting Addresses/Domains will overwrite WhiteListing) 
Do blacklisting addresses & domains in messages which are marked whitelisted by whiteRe, whiteListedDomains, whiteListedIPs or whitelistdb. 
Default: On 

-DoBlackDomainNP (Blacklisting Addresses/Domains will overwrite NoProcessing) 
Do blacklisting addresses & domains in messages marked 'noprocessing' by npRe, npSize, noProcessingDomains, noProcessingIPs or noProcessing.  

-blackListedDomains (Blacklisted Domains*) 
Addresses  and Domains from which you always want to reject mail, they only send you spam. Note this matches the end of the address, so if you don't want to match subdomains then include the @. Note that example.com would also match spamexample.com but .example.com won't match example.com. abc@example.com will match abc@example.com but won't match bbc@example.com. Wildcards are supported. For example: 'seller*' will match anything with seller in it.  
Default: file:files/blackdomains.txt 

-NotGreedyBlackDomain (Only the envelope-sender is added/compared to the BlackDomainlist) 
If not enabled all addresses in the FROM, SENDER, REPLY-TO, ERRORS-TO, or LIST-* header fields are checked.  

-noBlackDomain (Dont do Blacklisted for these Addresses and Domains* ) 
 Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com).  

-blackAddresses (Blackish &amp; Whitish Addresses** ) 
 Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported.  A positive weight will make the address 'blackish'. A negative weight will make the address into 'whitish'. For example: fribo*@example.com|@*.gov=>-0.5|@*.biz=>0.5 . 
Default: file:files/blackaddresses.txt 

-DoMsgID (Check Message IDs) 
Score messages with missing/invalid Message-ID (midmValencePB, midiValencePB). 
Default: score 

-noMsgID (Dont Validate Message-IDs for these IPs*) 
Enter IP addresses that you don't want to be Message-ID validated, separated by pipes (|). For example: 127.0.0.1|192.168. 
Default:  127.0.0.|192.168.|10. 

-invalidMsgIDRe (Regular Expression to Invalidate Format of Message-ID**) 
Check Message IDs will check incoming messages for invalid Message-IDs.  

-DoNoValidLocalSender (Check External Sender for Local Address  ) 
If activated, each external sender from a domain listed in localDomains is checked against LocalAddresses_Flat, LDAP or is verified using VRFY. An external sender is a sender from an IP not in acceptAllMail, not authenticated and not coming through the relayPort.Scoring is done  with flValencePB, testmode with flsTestMode. 
Default: block 

-ForceNoValidLocalSender (Enforce Early Checking of External Sender for Local Address ) 
If set and DoNoValidLocalSender is enabled, ASSP will do DoNoValidLocalSender before Delaying. Note: flsTestMode or allTestMode will disable the early execution.  

-DoNoSpoofing (Block Local Addresses from External Sender Alltogether) 
If activated, each external sender address from a domain listed in localDomains is regarded a spoofed address. An external sender is a sender from an IP not in acceptAllMail, not authenticated and not coming through the relayPort. flValencePB is used for scoring, testmode is set with flsTestMode. 
Default: score 

-noSpoofingCheckIP (Dont do Spoofing Check for these IPs* ) 
Enter IP numbers that you don't want to be checked for spoofing. For example:145.145.145.145|145.146.  

-noSpoofingCheckDomain (Dont do Spoofing Check for these Addresses/Domains* ) 
 Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com).  

-DoRFC822Sender (Validate Sender Address to conform with RFC5322) 
Sender must be a valid address to conform with RFC5322.  

-DoPTRCheck (Reversed Lookup) 
If activated, each sender IP is checked for a PTR record. This requires an installed  module in PERL. Scoring is done  with ptmValencePB, testmode is set with ptrTestMode.  

-DoPTRCheckWL (Do Reversed Lookup for Whitelisted) 
Do reversed lookup for whitelisted addresses.  

-DoPTRCheckNP (Do Reversed Lookup for Noprocessing) 
Do reversed lookup for noprocessing addresses.  

-DoPTRCheckInvalid (Reversed Lookup FQDN Validation) 
If activated - and Reversed Lookup is activated -, the PTR-FQDN record is checked against the Regex. Scoring is done  with ptiValencePB  
Default: On 

-invalidPTRRe (Regular Expression to Invalidate Format of PTR**) 
Validate Format PTR will check PTR records for this. 
  For example:  ^\d+\.\d+\.\d+\.\d+$|^[^\.]+\.?$  or place them in a plain ASCII file one address per line: file:files/invalidptr.txt 
Default: file:files/invalidptr.txt 

-validPTRRe (Regular Expression to Validate Format of PTR*) 
Validate Format PTR will check PTR records for this. If found, the PTR will be considered valid
  For example:  'static' or place them in a plain ASCII file one address per line: file:files/validptr.txt 
Default: file:files/validptr.txt 

-PTRCacheExp (Reversed Lookup Cache Refresh Interval) 
IPs in cache will be removed after this interval in hours. 0 will disable the cache.   
Default: 72 

-DoMXACheck (Validate MX or A Record) 
If activated, each sender address is checked for a valid MX or A record. Scoring is done  with mxValencePB for missing MX-record, mxaValencePB for missing A & MX records. Testmode is set with mxaTestMode.  

-MXACacheExp (Validate Domain MX Cache Refresh Interval) 
IPs in cache will be removed after this interval in hours. 0 will disable the cache.   
Default: 72 

-DoNoFrom (Check For Existing From Header ) 
Scoring is done  with fromValencePB, testmode is set with fromTestMode. 
Default: score 

-removeDispositionNotification (Remove Disposition Notification Headers) 
If set, all headers : "ReturnReceipt: , Return-Receipt-To: and Disposition-Notification-To:" will be removed from not whitelisted and not noprocessing incomming mails. Select this to prevent unwanted whitelisting of spammers that request a Disposition Notification. An other way to prevent autowhitelisting because of an autorespond is to use redRe .  

-SenderInvalidError (Sender Validation Error) 
SMTP error message to reject invalid senders. The literal REASON is replaced by (missing MX, missing PTR, invalid Helo, invalid user) depending on the check. If this is empty SpamError will be used. The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. SESSIONID will be replaced by the unique ASSP identifier. REASON will be replaced by the actual reason.
  Notes On Validate Sender
   
Default: 554 5.7.1 Mail (SESSIONID) appears to be unsolicited - REASON - contact postmaster@LOCALDOMAIN for resolution 

------   IP Blocking   -----------------------------------------------

-DelayIP (Simple IP Greylisting) 
Enable simple delaying for IP's in black penaltybox with totalscore above this value. An value of zero or empty disables this feature.  

-DelayIPTime (Simple IP Greylisting Embargo Time) 
Enter the number of minutes for which delivery, related with IP address of the sending host, is refused with a temporary failure. 
Default: 5 

-noBlockingIPs (Do not block Connections from these IPs*) 
Manually maintained list of IP numbers which should not be blocked.  An IP range is defined e.g. '182.82.10.'. CIDR notation is accepted (182.82.10.0/24). Hyphenated ranges can be used (182.82.10.0-182.82.10.255)  

-DoDropList (Do Deny Connections from these IPs) 
If activated, the IP is checked against the Droplist . The droplist is downloaded if a new one is available and contains the Spamhaus DROP List. See "http://www.spamhaus.org/drop/drop.lasso". 
Default: block 

-DropList (Drop Connections from these IPs*) 
Automatically downloaded (http://www.spamhaus.org/drop/drop.lasso) list of IP numbers which should be blocked right away. 
Default: file:files/droplist.txt 

-DoDenySMTP (Do Deny Connections from these IPs) 
If activated, the IP is checked against denySMTPConnectionsFrom. Testmode is set with pbTestMode. 
Default: block 

-denySMTPConnectionsFrom (Deny Connections from these IPs*) 
Manually maintained list of IP numbers which should be blocked. IP numbers in noPB, noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs, penalty-whitebox will pass. For example: 145.145.145.145|145.146.  

-DoDenySMTPstrict (Do Deny Connections from these IP numbers Early) 
If activated, the IP is checked against denySMTPConnectionsFromAlways. It is possible to use an automated approach to fill denySMTPConnectionsFromAlways. Use exportExtremeBlack for this, make sure DoExtremeExport and DoExtremeExportAppend are enabled. You can then export into the denySMTPConnectionsFromAlways file. However it may be easier to enable DoPenaltyExtremeSMTP, which will block automatically right after the connection based on the (extreme) value of the PenaltyBox entry. This is switched automatically to 'monitoring' if allTestMode is set 
Default: block 

-denySMTPConnectionsFromAlways (Deny Connections from these IP numbers Early*) 
Manually maintained list of IP numbers which should  be blocked imediately after connection. IP numbers in noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs will  pass.  Place them in a plain ASCII file one address per line: file:files/denyalways.txt  

-denySMTPLog (Enables Logging for Deny SMTP Connections From) 
 
Default: standard 

-DenyError (Deny Error) 
SMTP error message to reject connections. Will be used from  and denySMTPConnectionsFromAlways and DoPenaltyExtreme. For example: 554 5.7.2 Service denied, closing transmission channel.  
Default: 554 5.7.2 Service denied, closing transmission channel 

-DoCheckFrequencyIP (Check Frequency - Maximum Connections Per IP) 
Scoring is done  with ifreqValencePB.  

-maxSMTPipConnects (Maximum Frequency of Connections Per IP ) 
The maximum number of SMTP connections an IP Address can make during the maxSMTPipDuration (IP Address Frequency Duration). If a server makes more than this many connections to ASSP within the maxSMTPipDuration (IP Address Frequency Duration) it will be banned from future connections until the maxSMTPipExpiration (IP Address Frequency Expiration) is reached. This can be used to prevent server overloading and DoS attacks. 10 connections are typically enough. If left blank or 0, there is no limit imposed by ASSP. IP numbers in noPB, noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs, PB-whitebox are excluded from SMTP session limiting, whitelisted and noprocessing addresses are honored.  
Default: 10 

-maxSMTPipDuration (Maximum Frequency of Connections Per IP Duration) 
The window (in seconds) during which the maxSMTPipConnects (IP Frequency) (see above for more details) will be scrutinized for each IP. 
Default: 90 

-maxSMTPipExpiration (Expiration of Maximum Frequency) 
The number of seconds that must pass before an IP address blocked by the maxSMTPipConnects (IP Address Frequency) setting is allowed to connect again. 
Default: 3600 

-DoNumberDomainIP (Check Number of IP numbers Per Domain) 
Scoring is done  with idomValencePB.  

-maxSMTPdomainIP (Limit Number of IP numbers  Per Domain) 
The number of IP(subnet) switches a domain may have during the maxSMTPdomainIPExpiration (Limit Different IP numbers Per Domain Expiration). If a domain switches more often than this it will be banned from future connections until the Expiration is reached. This is NOT a spam blocking filter, it is a tool to fight dictionary attacks, server overloading and DoS attacks. 10 connections are typically enough. If left blank or 0, there is no limit imposed by ASSP. IP numbers in noPB, noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs, PB-whitebox are excluded, whitelisted and noprocessing addresses are honored. 
Default: 10 

-maxSMTPdomainIPExpiration (Expiration of Limit Number) 
The number of seconds that must pass before a domain blocked by the maxSMTPdomainIP (Limit Subnet IP numbers Per Domain) setting (see above for more details) is allowed to connect again. 
Default: 1800 

-maxSMTPdomainIPWL (Do Not Limit Different IP numbers For These Domains*) 
This prevents specific domains from limiting. For example: yahoo.com|hotmail.*.com|gmail.com
  Notes On IP Blocking
   
Default: gmx.de|t-online.de|yahoo.com|hotmail.com|gmail.com 

------   SenderBase    -----------------------------------------------

-SenderBaseLog (Enable SenderBase Logging) 
 
Default: standard 

-SBtimeout (Net::SenderBase Timeout) 
Net::SenderBase will timeout after this many seconds. 
Default: 10 

-DoOrgWhiting (Do Organization Whiting ) 
If activated, each sending IP address has its assigned organization
looked up. This requires an installed  module in PERL. Scoring is done  with sworgValencePB. 
Default: whiting 

-whiteSenderBase (White Organizations and Domains in SenderBase**  ) 
If the organization or domain  in the  IP description matches this Perl regular expression the message will be considered non-spam, the total messagescore will be decreased by sworgValencePB. Place them in a plain ASCII file one address per line: file:files/whiteorg.txt 
Default: file:files/whiteorg.txt 

-DoOrgBlocking (Do Organization Blocking) 
If activated, each sending IP address has its assigned organization
looked up . This requires an installed  module in PERL. Scoring is done  with sborgValencePB, Testmode is set with sbTestMode. 
Default: monitor 

-blackSenderBase (Blacklisted Organizations and Domains in SenderBase** ) 
If the organization or domain in the  IP description matches this Perl regular expression the message will be considered spam.  

-DoCountryBlocking (Do Country Blocking) 
If activated, each sending IP address has it's assigned country
looked up and compared to CountryCodeBlockedRe. This requires an installed  module in PERL. Testmode is set with sbTestMode, Messages from these countries will increase the total MessageScore using bccValencePB. 
Default: monitor 

-CountryCodeBlockedRe (Blocked Countries**) 
Messages from IP numbers based in these countries will be blocked if DoCountryBlocking is set accordingly. For example: CN|KR|RU|JP|TR|TH|PL|LT|CL|RO. "all" will block all foreign countrycodes which are not in 'Suspicious Country Codes' or 'Ignore Country Codes'. See: .   

-DoCountryBlockingWL (Do Country Blocking for Whitelisted ) 
Enable Country Blocking for whitelisted messages.  

-DoCountryBlockingNP (Do Country Blocking for NoProcessing) 
Enable Country Blocking for noprocessing messages.  

-DoSenderBase (Do Suspicious Country Scoring) 
If activated, each sending IP address has it's assigned country
looked up and compared to CountryCodeRe. This requires an installed  module in PERL. Testmode is set with sbTestMode. 
Default: score 

-CountryCodeRe (Suspicious Countries**) 
Messages from IP numbers based in these countries will increase the MessageScore. For example: CN|NG|UA|GR|HU|SA|IN|IE|PT|MD|PE|CZ|TW|BR|CL|ID|PH. Messages from these countries will increase the total MessageScore using sbsccValencePB. 
Default: CN|NG|UA|GR|HU|SA|IN|IE|PT|MD|PE|CZ|TW|BR|CL|ID|PH|CN|KR|RU|JP|TR|TH|PL|LT|CL|RO 

-NoCountryCodeRe (Ignore Country Codes from these Countries*) 
Messages from IP numbers based in these countries will will be ignored in this check.  

-MyCountryCodeRe (Home Countries**) 
Put here your own country code(s) (for example: US). Messages from IP numbers based in these countries will decrease the total MessageScore using sbhccValencePB, messages from other countries will increase the total MessageScore using sbfccValencePB if ScoreForeignCountries is set.   

-ScoreForeignCountries (Score Foreign Countries) 
Messages from countries not in MyCountryCodeRe will increase the total messageScore using sbfccValencePB. 
Default: On 

-SBCacheExp (Country Cache Refresh Interval) 
IPs in cache will be removed after this interval in hours. 0 will disable the cache.  
  Country Codes
   
Default: 240 

------   Message Scoring    -----------------------------------------------

-DoPenaltyMessage (Message Scoring) 
If this feature is selected, the total score for all checks during a message is used to determine if the email should be considered Spam. If the combined score is greater than MessageScoringLowerLimit (MessageLimit for WarningTag) and less than or equal MessageScoringUpperLimit (MessageLimit for Blocking) the message will not be blocked but get the MessageScoringWarningTag. If the combined score is greater than the MessageScoringUpperLimit and blocking is selected the message will be blocked. If tagging is selected the message will not be blocked but tagged with spamSubject. Testmode is set with msTestMode.  
Default: block 

-MessageLog (Enable Message Scoring logging) 
 
Default: standard 

-MessageScoringWL (MessageScoring on Whitelisted Senders) 
MessageScoring will overwrite Whitelisting  

-MessageScoringNP (MessageScoring on NoProcessing Messages) 
MessageScoring will overwrite NoProcessing  

-MessageScoringLocal (MessageScoring on Local Senders) 
MessageScoring will overwrite Local  

-MessageScoringLowerLimit (MessageScoring Lower Limit ) 
MessageScoring will tag messages with totalscore higher than this limit and not higher than MessageScoringUpperLimit.  For example: 47 
Default: 47 

-MessageScoringWarningTag (Warning Tag) 
Used instead of spamSubject if totalscore is  higher than MessageScoringLowerLimit and not higher than MessageScoringUpperLimit.  
Default: [Spam??] 

-MessageScoringUpperLimit (MessageScoring Upper Limit) 
If MessageScoring is done  to block, it will block messages whose totalscore is  higher than this threshold. For example: 50 
Default: 50 

-MessageScoringExtremeLimit (MessageScoring Extreme Limit) 
Spamlover messages whose totalscore is  higher than this threshold will not pass but will be blocked. A value of 0 here or the recipient listed in strictSpamLovers will disable this option. For example: 75 
Default: 75 

-ConnectionScoringLimit (ConnectionScoring Limit) 
If this feature is selected, the total score for all checks of all messages during a connection is used to determine if the email should be considered Spam.  A value of 0 here will disable this option. Scoring value is conValencePB. For example: 150  

------   PenaltyBox    -----------------------------------------------

-DoPenalty (IP Scoring) 
The PenaltyBox is a temporary position of low esteem awarded for a perceived misdeed. It scores IP numbers based on some events ( ) and writes them into a BlackBox. If the score per specified time interval (PenaltyDuration) surpasses the warning threshold (PenaltyWarning) the message is marked with PenaltyWarningTag but not blocked. The next level is the PenaltyLimit Threshold. It can be used to block the message. There is also an extreme level, those 'top performers' can get a special treatment: PenaltyExtreme when DoPenaltyExtreme is enabled. The WhiteBox stores IP numbers  which should not be put into the BlackBox. The WhiteBox is always enabled. If an address is in the whitelist or whitedomain, the IP goes into the WhiteBox too. The WhiteBox is one of the sources  Delaying/Greylisting uses to determine when delaying should not be done. Entries in noPB (Don't do penalties for these IP numbers ) or ispip (ISP/Secondary MX Servers) will prevent from penalties. Select 'monitor' to fill WhiteBox and BlackBox. 'monitor' is also the right choice if you do not want to block IP numbers  but rather score messages with DoPenaltyMessage (Message Scoring Mode). Testmode is set with pbTestMode. 
Default: monitor 

-PenaltyDuration (Penalty Interval) 
IP numbers will be kept in the BlackBox if their score exceeds the Penalty Limit during this interval in minutes. 
Default: 60 

-PenaltyWarning (Penalty Warning) 
PB will tag messages from IP numbers whose totalscore exceeds this threshold during PenaltyDuration.  For example: 45 
Default: 45 

-PenaltyWarningTag (Penalty Warning Tag) 
For example: [??] 
Default: [Possibly Spam] 

-PenaltyLimit (Penalty Limit) 
PB will block messages from IP numbers whose totalscore exceeds this threshold during PenaltyDuration. For example: 50 
Default: 50 

-PenaltyExpiration (Expiration Time) 
Penalties with a score lower than PenaltyExtreme will expire after this number of minutes. If set to Zero the Penalty BlackBox will be deleted and started from scratch. 
Default: 360 

-PenaltyLog (Enable PenaltyBox logging) 
 
Default: standard 

-AddScoringHeader (Add IP/Message Scoring Header) 
Adds a line to the email header "X-Assp-XXX-Score: ", where XXX may be IP, Message or both. 
Default: On 

-pbdb (PenaltyBox Database) 
The directory/file with the penaltybox database files. For removal of entries from PenaltyBlackBox use .
 For removal of entries from WhiteBox  use . For  whitelisting IP numbers use whiteListedIPs or noProcessingIPs. For blacklisting IP numbers use denySMTPConnectionsFrom and denySMTPConnectionsFromAlways.  
Default: pb/pbdb 

-noPB (Dont do BlackBox for these IPs* ) 
Enter IP numbers that you don't want to be in BlackBox. These IP numbers will also be automatically removed from PB-BlackBox. For example:145.145.145.145|145.146.  

-noPBwhite (Dont do WhiteBox for these IPs*) 
Enter IP numbers that you don't want to be in WhiteBox. These IP numbers will also be automatically removed from PB-WhiteBox. 
Default: nopbwhite.txt 

-WhiteExpiration (Expiration Time for WhiteBox Entries) 
The WhiteBox is always activated. The WhiteBox is similar to the  Whitelist  - but it is not a whitelist: content-related checks like Bayesian, URIBL, Bomb  will be done, IP-related checks will be skipped. WhiteBox entries will expire after this specified number of days. For example: 30 
Default: 30 

-PenaltyUseNetblocks (Use IP Netblocks) 
Perform the IP address checks of the sending host based on the /24 subnet rather than on the specific IP. Part of DoPenalty  
Default: On 

-PenaltyError (Penalty Reply) 
If set SMTP reply for Penalty Denial. The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. SESSIONID will be replaced by the unique ASSP identifier. REASON will be replaced by the actual reason. 
Default: 554 5.7.1 Mail (SESSIONID) appears to be unsolicited - REASON - contact postmaster@LOCALDOMAIN for resolution 

-CleanPBInterval (Clean Up PB Databases) 
Delete outdated entries from blackbox and whitebox databases every this many hours.
  Note: the current timeout must expire before the new setting is loaded, or you can restart.
  Defaults to 6 hours. 
Default: 6 

-DoPenaltyExtremeSMTP (Early PenaltyBox Extreme IP Profiling) 
DoPenaltyExtremeSMTP will block IP's whose score meet or exceed Extreme Scoring Threshold before DELAYING, based on the IP's score from previous SMTP sessions. This can be set independently from DoPenaltyExtreme and DoPenaltyExtremeData. Whitelist, Collecting, Testmode, CopySpam, Spam-Lover is ignored.  

-DoPenaltyExtreme (PenaltyBox Extreme IP Profiling) 
Threshold. Same as DoPenaltyExtremeSMTP but checks after the HEADER is done, based on the IP numbers score from previous and current SMTP session. Testmode is set with pbTestMode.  

-DoPenaltyExtremeData (Late PenaltyBox Extreme IP Profiling) 
Same as DoPenaltyExtremeSMTP but checks after all other checks are done. Testmode is set with pbTestMode. This can be set independently from DoPenaltyExtreme and DoPenaltyExtremeSMTP. 
Default: block 

-noExtremePB (Dont do Extreme Profiling for these IPs*) 
Enter IP's that you don't want to be extreme penalized. IP's in noPB are already included. For example: 127.0.0.1|172.16.  

-noExtremePBAddresses (Dont do Extreme Profiling for Mails from any of these Addresses*) 
Mails from any of these addresses will not be extreme profiled if DoPenaltyExtremeSMTP is not set. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com).  Wildcards are supported (fribo*@domain.com).  

-PenaltyExtreme (Extreme Scoring Threshold) 
PBextreme will use this to determine candidates for special treatment. For example: 500. 
Default: 500 

-ExtremeExpiration (Expiration Time for Extreme Penalties) 
Penalties with score higher than PenaltyExtreme will expire after this number of days. If set to Zero nothing will be deleted. For example: 7 
Default: 7 

-ExtremeWL (Penalize Whitelisted) 
Enable extreme penalties for whitelisted addresses.  

-ExtremeNP (Penalize NoProcessing) 
Enable extreme penalties for noprocessing addresses.  

-DoExtremeExport (Do Export Penalty BlackBox Extreme) 
  

-DoExtremeExportAppend (Append Export File) 
Do not overwrite the export file but append to it.  

-ExportUseNetblocks (Use IP Netblocks) 
Export the IP address  based on the /24 subnet  rather than on the specific IP.   

-exportInterval (Export BlackBox Extreme File Interval) 
 Exported Penalty Black Box Extreme File every this hours.
  Defaults to 6 hours. 
Default: 6 

-exportExtremeBlack (Exported BlackBox Extreme File ) 
IPs in Penalty BlackBox which surpassed the extreme level will be regularly stored into this file. 
Default: file:files/exportedextreme.txt 

-PenaltyExtremeLog (Enable PenaltyBox Extreme logging) 
 
Default: standard 

------   Scoring Settings    -----------------------------------------------

-DoNotPenalizeRed (Do Not Score IP numbers in Redlisted Messages) 
IPs matching Red Regex or Redlist will not collect scoring values from PenaltyBox.  

-DoNotPenalizeNull (Do Not Score IP numbers From Bounce/Null-Senders) 
IPs matching BounceSenders (Bounce Senders) will not be profiled.  

-autValencePB (Bad SMTP Authentication) 
IP scoring 
Default: 60 

-baValencePB (Bad Attachment) 
For Message & IP scoring in DoBlockExes. 
Default: 20 

-backsctrValencePB (Backscatter detection) 
Message scoring 
Default: 10 

-baysValencePB (Bayesian) 
For Message scoring in DoBayesian. 
Default: 50 

-bccValencePB (Blocked Country Code) 
For Message & IP scoring in DoCountryBlocking. 
Default: 40 

-blValencePB (Blacklisted Domain) 
For Message & IP scoring in DoBlackDomain 
Default: 40 

-bombSuspiciousValencePB (Matching Suspicious Expression) 
message scoring in bombSuspiciousRe 
Default: 20 

-blackValencePB (Black Expression Matching) 
For Message & IP scoring in DoBlackRe 
Default: 50 

-bombValencePB (Bomb Expression Matching) 
For Message & IP scoring in DoBombRe, DoBombHeaderRe, DoBombSenderRe 
Default: 26 

-scriptValencePB (Script Expression Matching) 
For Message & IP scoring in DoScriptRe 
Default: 10 

-etValencePB (Early Talker Scoring) 
IP scoring for  clients who talk before server's greeting is sent. 
Default: 25 

-fhValencePB (Forged HELO Scoring) 
For Message & IP scoring in DoFakedLocalHelo. 
Default: 150 

-flValencePB (Invalid Local Sender Score) 
For Message & IP scoring in DoNoValidLocalSender. 
Default: 40 

-friendsValencePB (&lt;span class=&quot;positive&quot;&gt;Spam Friends Score&lt;/span&gt;) 
 Bonus for message scoring if the recipient is in spamFriends. 
Default: -10 

-foesValencePB (Spam Foes Score) 
For message scoring if the recipient is in spamFoes. 
Default: 5 

-fromValencePB (No From Score) 
For Message & IP scoring  in DoNoFrom 
Default: 20 

-gripValencePB (Score for GRIPvalues) 
For Message scoring with griplist values. The final score for an IP is basically the gripvalue * gripValencePB. If the gripvalue is less 0.5 it will be negative. 
Default: 20 

-hlValencePB (Blacklisted HELO Score) 
For Message & IP scoring in useHeloBlacklist. 
Default: 30 

-idomValencePB (Number of IP numbers Per Domain Violation Score) 
For IP scoring in DoNumberDomainIP. 
Default: 40 

-ifreqValencePB (IP Frequency Violation Score) 
For IP scoring  in DoCheckFrequencyIP. 
Default: 40 

-iaValencePB (Internal Only Address) 
Message/IP scoring 
Default: 25 

-ihValencePB (Invalid HELO Score) 
For Message & IP scoring in DoInvalidFormatHelo. 
Default: 40 

-shValencePB (Suspicious HELO Score) 
For Message & IP scoring with SuspiciousHeloRe. 
Default: 10 

-iplValencePB (IP Maximum Parallel Sessions Violation Score) 
For IP scoring in maxSMTPipSessions. 
Default: 5 

-meValencePB (Max Errors Exceeded Score) 
IP scoring in MaxErrors. 
Default: 10 

-conValencePB (ConnectionScoring Limit Exceeded ) 
Message scoring in ConnectionScoringLimit. 
Default: 10 

-mdrValencePB (Duplicate Recipient) 
Message/IP scoring in DoMaxDupRcpt 
Default: 10 

-midmValencePB (Missing Message-ID Score) 
For Message & IP scoring in DoMsgID.  

-midiValencePB (Invalid Message-ID) 
For Message & IP scoring in DoMsgID. 
Default: 5 

-msigValencePB (Invalid MSGID-signature) 
For Message scoring 
Default: 15 

-msValencePB (Message Scoring Limit Exceeded) 
For IP scoring  with DoPenaltyMessage 
Default: 10 

-mxValencePB (Missing MX Record) 
For Message & IP scoring in DoMXACheck. 
Default: 10 

-mxaValencePB (Missing MX and A Record) 
For Message & IP scoring in DoMXACheck. 
Default: 15 

-nopbwValencePB (noPBwhite) 
For Message scoring if mail comes from noPBwhite IP numbers.  

-pbwValencePB (&lt;span class=&quot;positive&quot;&gt; PBwhite&lt;/span&gt;) 
 Bonus  for Message scoring if mail comes from an IP in PBwhite.  

-okValencePB (&lt;span class=&quot;positive&quot;&gt;Message OK&lt;/span&gt;) 
IP Bonus for passing message 
Default: -25 

-okaValencePB (&lt;span class=&quot;positive&quot;&gt; OK Address found&lt;/span&gt;) 
Bonus for finding sender address in DoOKCaching 
Default: -25 

-pbwaValencePB (IP History in Warning Range) 
message scoring  in PenaltyBox ( DoPenaltyMessage ) 
Default: 5 

-pbValencePB (Bad IP History, TotalScore larger than PenaltyLimit) 
message scoring  in PenaltyBox ( DoPenaltyMessage ) 
Default: 10 

-pbeValencePB (Extreme Bad IP History, TotalScore larger than PenaltyExtreme) 
message scoring  in PenaltyBox ( DoPenaltyMessage ) 
Default: 15 

-ptiValencePB (Invalid PTR Record) 
For Message & IP scoring in DoPTRCheckInvalid 
Default: 10 

-ptmValencePB (Missing PTR Record) 
For Message & IP scoring in DoPTRCheck 
Default: 5 

-rblValencePB (DNSBL Failed) 
For Message & IP scoring in ValidateRBL 
Default: 50 

-rblnValencePB (DNSBL Neutral) 
For Message & IP scoring in ValidateRBL 
Default: 25 

-reValencePB (Recipients Empty Score) 
For IP scoring  in Recipient Section. 
Default: 5 

-irValencePB (Recipient Invalid) 
For Message & IP scoring in Recipient Section. 
Default: 5 

-rwlValencePB (&lt;span class=&quot;positive&quot;&gt;RWL Pass) 
Bonus for Message & IP scoring in ValidateRWL 
Default: -25 

-rwlnValencePB (RWL Neutral) 
Bonus for Message & IP scoring in ValidateRWL    
Default: -15 

-rlValencePB (Failed Relay Attempt) 
For Message & IP scoring  in Relaying Section. 
Default: 25 

-saValencePB (Spam Collect Address) 
For IP scoring with spamaddresses 
Default: 25 

-sbfccValencePB (Foreign Country Code) 
message scoring in MyCountryCodeRe 
Default: 10 

-sbhccValencePB (&lt;span class=&quot;positive&quot;&gt;Home Country Code&lt;/span&gt;) 
 Bonus for Message & IP Scoring with MyCountryCodeRe 
Default: -10 

-sborgValencePB (Blocked Organizations) 
For Message & IP scoring in DoOrgBlocking 
Default: 25 

-sbnValencePB (No Organization and No CountryCode) 
For Message & IP scoring in DoOrgBlocking and DoCountryBlocking 
Default: 10 

-sworgValencePB (&lt;span class=&quot;positive&quot;&gt;White Organizations) 
 Bonus for Message & IP scoring in DoOrgWhiting 
Default: -25 

-sbsccValencePB (Suspicious Country Code) 
message scoring in CountryCodeRe 
Default: 15 

-spfValencePB (SPF Failed) 
For Message & IP scoring in ValidateSPF 
Default: 20 

-spfnValencePB (SPF Neutral) 
For Message & IP scoring with SPFneutral 
Default: 5 

-spfsValencePB (SPF Softfailed) 
For Message & IP scoring with SPFsoftfail 
Default: 5 

-spfnonValencePB (SPF None) 
For Message & IP scoring with SPFnone  

-spfuValencePB (SPF Unknown) 
For Message & IP scoring  in SPFunknown  

-spfeValencePB (SPF Error) 
For Message & IP scoring in ValidateSPF 
Default: 10 

-srsValencePB (SRS Validate Bounce Failed) 
For Message & IP scoring in SRSValidateBounce 
Default: 10 

-srsbValencePB (&lt;span class=&quot;positive&quot;&gt;SRS Bonus/span&gt;) 
 Bonus for message scoring if the sender is a SRS address. 
Default: -10 

-stValencePB (Penalty Trap Address) 
For IP scoring  in with spamtrapaddresses 
Default: 50 

-teValencePB (TestRe Valence) 
For testmode with testRe 
Default: 20 

-vsValencePB (Virus Suspicious) 
message scoring in SuspiciousVirus 
Default: 25 

-tlsValencePB (OK, Is a SSL/TLS connection,) 
Message Scoring & IP scoring Bonus for SSL/TLS connections 
Default: -10 

-vdValencePB (Virus Detected) 
Message & IP scoring in UseAvClamd 
Default: 50 

-uriblnValencePB (URIBL Neutral) 
Message & IP scoring in ValidateURIBL 
Default: 25 

-uriblValencePB (URIBL Failed) 
For Message & IP scoring in ValidateURIBL  
Default: 50 

-uribleValencePB (URIBL Extras) 
For Message & IP scoring with URIBLNoObfuscated, URIBLmaxdomains and URIBLmaxuris,   
Default: 5 

-whiteValencePB (&lt;span class=&quot;positive&quot;&gt;White Expression Matching&lt;/span&gt;) 
For Message & IP scoring with whiteReNotes On PenaltyBox
   
Default: -50 

------   Global PenaltyBox   -----------------------------------------------

-globalClientName (client registration name) 
The Name of this global-client for registation on the global-server. This entry has to be the full qualified DNS-Name of the IP-address over which ASSP is doing HTTP-requests! If you are using a HTTP-Proxy, this should be the public IP-address of the last Proxy in chain! This DNS-Name has to be resolveable worldwide and the resolved IP-address has to match the ASSP-HTTP-connection-IP-address. It is not possible to use an IP-address in this field! Dynamic DNS-Names like "yourdomain.dyndns.org" are supported!
 To use the global penalty box, you will need a paid subscription. To get registered and/or to get more information, please send an email with your personal/company details and the globalClientName to "assp.globalpb@thockar.com".
 The name of this client has to be known by the global server before it could be registered from here. Please wait until you've got an information, that your client name is known by the global server.
 In addition to  module in PERL.  

-globalClientPass (client registration password) 
If the global client is registered on the global-server, you will see a number of "*" in this field. This field is readonly.  

-globalClientLicDate (client subscription expiration date) 
The date of license/subscription expiration for this global client. If this date is exceeded, no upload and download of global PB will be done! This field is readonly.  

-DoGlobalBlack (Enable the Global-Black-Penalty) 
Enables the upload and download of Black-Penalty-Box-Entries, if the client is registered on the global-PB-server.  

-globalValencePB (Value for Global-Black-PB Entries) 
This penalty-value will be given to downloaded Black-Penalty-Box-Entries. As long as entries have the "GLOBALPB" state, they will never become extreme-Black. It is recommended to set this value above PenaltyLimit! 
Default: 20 

-globalBlackExpiration (Expiration for Global-PB-Black Records) 
Global-Black-Penalties will expire after this number of hours. 
Default: 48 

-DoGlobalWhite (Enable the Global-White-Penalty) 
Enables the upload and download of White-Penalty-Box-Entries, if the client is registered on the global-PB-server.  

-globalWhiteExpiration (Expiration for Global-PB-White Records(days)) 
Global-White-Penalties will expire after this number of days. 
Default: 7 

-GPBDownloadLists (Download List and Regex Updates from GPB-Server) 
Select, if assp should download updates for lists and regular expressions from the global penaltybox server. Downloads will be done to the 'download' folder. If install is selected, the downloaded lines will merged in to the defined files (file:...). If you want to disable a specific line in any of your files, do not delete the line, instead commed it out - putting an '#' or ';' in front of the line. If any list is not configured using the 'file:...' option, only the download will be done, even if install is selected. 
Default: download 

-GPBautoLibUpdate (Download Plugin and Library Updates from GPB-Server) 
Select, if assp should download updates for Plugins or Library-Files (../lib) from the global penaltybox server. Downloads will be done to the 'download' folder. If install is selected, the downloaded Plugins and/or modules will be installed in to there original location, if an older version of the file still exists. If an older version is not found, only the download will be done. To activate updated Plugins or modules a restart of assp is required. This feature will not force an automatic restart of assp!.
Notes On Global Penalty Box 
Default: download and install 

------   Delaying/Greylisting    -----------------------------------------------

-EnableDelaying (Enable Delaying/Greylisting) 
Enable Greylisting as described at .
   ASSP will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate the originating server will, after a delay, try again and, if sufficient time has elapsed, the email will be accepted. If the mail is from a spam sender, sending to many thousands of email addresses, it will probably not be retried.
   Greylisting involves sending a temporary 451 SMTP error code to the sending server when a message is received, along with sending this error code ASSP creates a Triplet and stores this. On the second delivery attempt if the Embargo Time set by the ASSP admin for the Triplet has been surpassed the message will be accepted and a Tuplet will be created and not delayed again for an Expiry Time set by the ASSP admin. 
Default: On 

-DelayLog (Enable Greylisting/Delaying logging) 
  

-DelayGV (Do Greylisting/Delaying above this Gripvalue) 
This will restrict Delaying/Greylisting to IP numbers with a a Gripvalue above this value. For example 0.2. You may set it higher to 0.3 if you want to delay less IP numbers. The local griplist is build during rebuildspamdb and uploaded to a global database. In return the global griplist is downloaded.  The Gripvalue is calculated from the "spamminess" , where 0 means the IP-Block never sends spam and 1 it always send spam.  

-DelayWL (Whitelisted Greylisting) 
Enable Greylisting for whitelisted users.  

-DelayNP (NoProcessing Greylisting) 
Enable Greylisting for noprocessing users.  

-DelaySL (SpamLovers Greylisting) 
Enable Greylisting for SpamLovers.  

-DelaySPF (SPF Pass Greylisting) 
Enable Greylisting for SPF=pass results. 
Default: On 

-DelayHC (HomeCountry Pass Greylisting) 
Enable Greylisting for HomeCountry based IPs. 
Default: On 

-DelayAddHeader (Add X-Assp-Delay Header) 
Add X-Assp-Delay header to all emails. 
Default: On 

-DelayEmbargoTime (Embargo Time) 
Enter the number of minutes for which delivery, related with new 'triplet' (IP address of the sending
  host + mail from + rcpt to), is refused with a temporary failure. 
Default: 5 

-DelayWaitTime (Wait Time) 
Enter the number of hours to wait for delivery attempts related with recognised 'triplet'; delivery is accepted 
  immediately and the 'tuplet' (IP address of the sending host + sender's domain) is safelisted. 
Default: 28 

-DelayExpiryTime (Expiry Time) 
Enter the number of days for which whitelisted 'tuplet' is considered valid. 
Default: 36 

-DelayUseNetblocks (Use IP Netblocks) 
Perform the IP address checks of the sending host based on the /24 subnet it is at rather than the specific IP. 
  This feature may be useful for legitimate mail systems that shuffle messages among SMTP clients between retransmissions. 
Default: On 

-DelayNormalizeVERPs (Normalize VERP Addresses) 
Some mailing lists (such as Ezmlm) try to track bounces to individual mails, rather than just individual recipients, which creates a variation on the VERP method where each email has its own unique envelope sender. Since the automatic whitelisting (called savelisting to make a difference to the standard whitelisting) that is built into Greylisting depends on the envelope addresses for subsequent emails being the same, the greylisting filter will attempt to normalize the unique sender addresses, when this option is checked. 
Default: On 

-DelayMD5 (Use MD5 for DelayDB) 
Message-Digest algorithm 5 is a cryptographic hash function and adds some level of security to the delay database. Must be set to off if you want to list the database with DelayShowDB/DelayShowDBwhite. 
Default: On 

-DelayShowDB (Show Delay/Greylisting Database) 
The directory/file with the delay local file. Obsolete if you use 'mysql' in delaydb. 
Default: file:delaydb 

-DelayShowDBwhite (Show Delay/Greylisting Save Database) 
The directory/file with the white-delay local file. Obsolete if you use 'mysql' in delaydb. 
Default: file:delaydb.white 

-DelayExpireOnSpam (Expire Spamming Safelisted Tuplets) 
If a safelisted 'tuplet' is ever associated with spam, viri, failed rbl, spf etc, it is deleted from the safelist. 
  This renews the temporary embargo for subsequent mail involving the tuplet. 
Default: On 

-CleanDelayDBInterval (Clean Up Delaying Database) 
Delete outdated entries from triplets and safelisted tuplets databases every this many seconds.
  Note: the current timeout must expire before the new setting is loaded, or you can restart.
  Defaults to 3 hours. 
Default: 10800 

-noDelay (Dont Delay these IPs*) 
Enter IP addresses that you don't want to be delayed, separated by pipes (|). There are misbehaving MTAs that will not be able to get a legitimate email through a Greylisting server because they do not try again later.
  For example:  145.145.145.145|145.146. or place them in a plain ASCII file one address per line: 'file:files/nodelay.txt' 
Default: file:files/nodelay.txt 

-noDelayAddresses (Do not Delay these Addresses*) 
Enter senders email addresses that you don't want to be delayed, separated by pipes (|). You can list specific addresses (user@anydomain.com), addresses at any domain (user), or entire domains (@anydomain.com).  Wildcards are supported (fribo*@domain.com).For example: fribo@anydomain.com|jhanna|@sillyguys.org or place them in a plain ASCII file one address per line: 'file:files/nodelayuser.txt'.  

-noDelayHelosRe (Regular Expression to Identify noDelay Helos *) 
Put anything here to identify Helos which should be not delayed. 
Default: file:files/nodelayhelosre.txt 

-DelayError (Reply Code to Refuse Delayed Messages) 
SMTP reply code to refuse delayed messages. Default: 451 4.7.1 Please try again later
  
  Notes On Delaying
   
Default: 451 4.7.1 Please try again later 

------   SPF/SRS    -----------------------------------------------

-ValidateSPF (Enable SPF Validation ) 
Enable Sender Policy Framework Validation as described at .
  This requires an installed  module in PERL. Testmode is set with spfTestMode, Scoring is done  with spfValencePB. 
Default: score 

-SPFLog (Enable SPF logging) 
 
Default: standard 

-SPFWL (Whitelisted SPF Validation) 
Enable Sender Policy Framework Validation for whitelisted users also.  

-SPFNP (noProcessing SPF Validation) 
Enable Sender Policy Framework Validation for nonprocessed messages also.  

-AddSPFHeader (Add Received-SPF Header) 
Add Received-SPF header to header of all emails processed by SPF. 
Default: On 

-SPFError (SPF Failed Reply) 
SMTP reply for SPF failed messages. Default: '554 5.7.1 failed SPF: SPFRESULT'
  The literal SPFRESULT is replaced by the actual result. 
Default: 554 5.7.1 failed SPF: SPFRESULT 

-noSPFRe (Regular Expression to Skip SPF Processing*) 
Put anything here to identify these messages in mailfrom or header  

-strictSPFRe (Strict SPF Processing Regex*) 
Softfail/Neutral/None will be failed for these sending addresses. Put anything here to identify the addresses. For example: '@gmail.com|@msn.com|@live.com|@ebay.com|@ebay.nl|@bbt.com|@paypal.com|@einsundeins.de|@microsoft.com' 
Default: @gmail.com|@msn.com|@live.com|@ebay.com|@ebay.nl|@bbt.com|@paypal.com|@einsundeins.de|@microsoft.com 

-blockstrictSPFRe (Strict SPF Blocking Regex*) 
All failed messages will be blocked for these sending addresses. Put anything here to identify the addresses. 
Default: @ebay.com|@paypal.com 

-SPFsoftfail (Fail SPF Softfail Validations) 
Intentionally fail SPF softfail status responses. The possible results of a query are:
pass:The client IP address is an authorized mailer for the sender. The mail should be accepted subject to local policy regarding the sender.
fail:The client IP address is not an authorized mailer, and the sender wants you to reject the transaction for fear of forgery.
softfail:The client IP address is not an authorized mailer, but the sender prefers that you accept the transaction because it isn't absolutely sure all its users are mailing through approved servers. The softfail status is often used during initial deployment of SPF records by a domain.
neutral:The sender makes no assertion about the status of the client IP.
none:There is no SPF record for this domain.
permerror&temperror:The DNS lookup encountered an error during processing.
unknown:The domain has a configuration error in the published data or defines a mechanism that this library does not understand.  

-SPFneutral (Fail SPF Neutral Validations) 
Intentionally fail SPF neutral status responses  

-SPFqueryerror (Fail SPF Error Responses) 
Intentionally fail SPF 'error' status responses  

-SPFnone (Fail SPF None  Responses) 
Intentionally fail SPF 'none'  status responses  

-SPFunknown (Fail SPF Unknown  Responses) 
Intentionally fail SPF 'unknown'  status responses  

-SPFCacheExp (SPF Cache Refresh Interval) 
SPF records in cache will be removed after this interval in hours. 0 will disable the cache.   
Default: 72 

-DebugSPF (Enable SPF Debug output to ASSP Logfile) 
Enables verbose debugging of SPF queries within the Mail::SPF::Query module.
 
 Notes On SPF
    

-EnableSRS (Enable Sender Rewriting Scheme) 
Enable Sender Rewriting Scheme as described at .
  This requires an installed  module in PERL.
  You should use SRS if your message handling system forwards email for domains with published spf records.
  Note that you have to setup the outgoing path (Relay Host and Port) to let ASSP see and rewrite your outgoing traffic.  

-SRSAliasDomain (Alias Domain) 
SPF requires the SMTP client IP to match the envelope sender (return-path). When a message is forwarded through
  an intermediate server, that intermediate server may need to rewrite the return-path to remain SPF compliant.
  For example: example.com 
Default: example.com 

-SRSSecretKey (Secret Key) 
A key for the cryptographic algorithms -- Must be at least 5 characters long.  

-SRSTimestampMaxAge (Maximum Timestamp Age) 
Enter the maximum number of days for which a timestamp is considered valid. 
Default: 21 

-SRSHashLength (Hash Length) 
The number of bytes of base64 encoded data to use for the cryptographic hash.
  More is better, but makes for longer addresses which might exceed the 64 character length suggested by RFC5321.
  This defaults to 4, which gives 4 x 6 = 24 bits of cryptographic information, which means that a spammer will have 
  to make 2^24 attempts to guarantee forging an SRS address. 
Default: 4 

-SRSValidateBounce (Enable Bounce Recipient Validation) 
Bounce messages that fail reverse SRS validation (but not a valid SMTP probe)
  will receive a 554 5.7.5 [Bounce address not SRS signed] SMTP error code. Testmode is set with srsTestMode, Scoring is done  with srsValencePB.  

-SRSno (Dont Rewrite These Addresses*) 
Don't rewrite addresses when messages come from/to these addresses. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). For example: fribo@example.com|jhanna|@example.org  

-noSRS (Dont Validate Bounces From these IPs*) 
Enter IP addresses that you don't want to validate bounces from, separated by pipes (|).
  For example:  145.145.145.145|145.146.
  Notes On SRS
    

------   DNSBL    -----------------------------------------------

-ValidateRBL (Enable DNS Blacklist Validation) 
This requires an installed  module in PERL. Scoring is done  with rblValencePB for 'fail' and rblnValencePB for 'neutral' results. Testmode is set with rblTestMode. 
Default: block 

-RBLLog (Enable DNSBL logging) 
 
Default: standard 

-noRBL (Dont do DNSBL for these IPs*) 
Enter IP addresses that you don't want to be DNSBL validated, separated by pipes (|). For example:  145.145.145.145|145.146.  

-RBLWL (Whitelisted DNSBL Validation) 
Enable DNSBL for whitelisted messages   

-RBLNP (NoProcessing DNSBL Validation) 
Enable DNSBL for noprocessing messages   

-AddRBLHeader (Add X-Assp-DNSBL Header) 
Add X-Assp-DNSBL header to messages with positive reply from DNSBL. 
Default: On 

-RBLError (DNSBL Failed Reply) 
SMTP reply for messages failed by DNSBL.
  The literal RBLLISTED (case sensitive) is replaced by the matching serviceprovider(s). 
Default: 554 5.7.1 DNS Blacklisted in RBLLISTED - contact postmaster@LOCALDOMAIN for resolution 

-RBLServiceProvider (RBL Service Providers*) 
Names of DNSBLs to use separated by "|" or name of list 'file:files/dnsbls.txt'. Defaults are: zen.spamhaus.org=>1|bl.spamcop.net=>1|bb.barracudacentral.org=>1|combined.njabl.org=>1|safe.dnsbl.sorbs.net=>1|psbl.surriel.com=>2|ix.dnsbl.manitu.net=>2|dnsbl-1.uceprotect.net=>2|dnsbl-2.uceprotect.net=>4.
DNSBL providers can be classified like bl.spamcop.net=>1. '1' is the most trustworthy class. '6' is the least trustworthy class. Numbers above 6 will be used as score directly. The value of the class acts as a divisor of RBLmaxweight. So if RBLmaxweight = 50 bl.spamcop.net=>1 would be the same as bl.spamcop.net=>50, bl.spamcop.net=>2 would be the same as bl.spamcop.net=>25. 
If the sum of scores surpasses RBLmaxweight, the DNSBL check fails. If not, the DNSBL check is scored as "neutral" even with RBLmaxhits reached. Setting Showmaxreplies will allow ALL replies to contribute to the total weight regardless of RBLmaxhits. 
Some RBL Service Providers, like blackholes.five-ten-sg.com, provides 
different return codes in a single DNS-zone: like 127.a.b.c - where a,b,c 
are used to identify a weight or type (or what ever) of the returned 
entry. If you want to care about special return codes, or if you want to 
use different weights for different return codes, you should use the 
following enhanced entry syntax:

 RBL-Service-Provider=>result-to-watch=>weight (like:)
 blackholes.five-ten-sg.com=>127.0.0.2=>3
 blackholes.five-ten-sg.com=>127.0.0.5=>4
 blackholes.five-ten-sg.com=>127.0.?.*=>5

 You can see, the wildcards * (multiple character) and ? (single 
character) are possible to use in the second parameter. Never mix the 
three possible syntax types for the same RBL Service Provider. An search 
for a match inside such a definition is done in reverse ASCII order, so 
the wildcards are used as last. 
Default: file:files/dnsbls.txt 

-RBLmaxreplies (Maximum Replies) 
A reply is affirmative or negative reply from a DNSBL.
  The DNSBL module will wait for this number of replies (negative or positive) from the DNSBLs listed under Service Provider for up to the Maximum Time(RBLmaxtime).
  This number should be equal to or less than the number of DNSBL Service Providers listed to allow for randomly unavailable DNSBLs.

 
Default: 13 

-Showmaxreplies (Show All Possible Hits ) 
Show all hits instead of stopping at RBLmaxhits.  

-RBLmaxhits (Maximum Hits) 
A hit is an affirmative response from a DNSBL.
  The DNSBL module will check all of the DNSBLs listed under Service Provider. If the number of hits is greater or equal Maximum Hits, the email is flagged failed. If the number of hits is greater 0 and less Maximum Hits, the email is flagged neutral.  
RBLmaxhits is ignored if the RBLServiceProvider are classified (weighted), the email is flagged failed if weights for all URIs is greater or equal RBLvalencPB. 
Default: 2 

-RBLmaxtime (Maximum Time) 
This sets the maximum time in seconds to spend on each message performing DNSBL checks. 
Default: 10 

-RBLsocktime (Socket Timeout) 
This sets the DNSBL socket read timeout in seconds. 
Default: 1 

-ForceRBLCache (Early DNSBL Cache Blocking) 
If set and ValidateRBL is enabled, ASSP will use cached DNSBL hits to block messages before  Delaying. Note: rblTestMode or allTestMode will disable the early execution.  

-RBLCacheExp (DNSBL Expiration Time) 
IPs in cache will be removed after this interval in hours. 0 will disable the cache.  
Default: 24 

-RBLCacheExpMiss (DNSBL Cache Refresh Interval for Misses) 
Domains in cache with status=2 (miss) will be removed after this interval in hours. Empty or 0 will prevent caching of non-hits. 
  Notes On DNSBL
   
Default: 12 

------   URIBL   -----------------------------------------------

-ValidateURIBL (Enable URI Blocklist Validation ) 
Enable URI Blocklist. Messages that fail URIBL validation will receive URIBLError SMTP error code. This requires an installed  module in PERL. 
   Scoring is done  with uriblValencePB, testmode is set with uriblTestMode. 
Default: block 

-URIBLLog (Enable URIBL logging) 
 
Default: standard 

-URIBLWL (Do URI Blocklist Validation for Whitelisted) 
URIBL check is done ignoring all spamlovers and testmodes!  

-URIBLNP (Do URI Blocklist Validation for NoProcessing) 
URIBL check is done ignoring all spamlovers and testmodes!  

-URIBLLocal (Do URI Blocklist Validation for Local Mails) 
  

-URIBLISP (Do URI Blocklist Validation for ISP/Secondary) 
 
Default: On 

-URIBLServiceProvider (URIBL Service Providers*) 
Domain Names of URIBLs to use separated by "|". You may set for every provider a weight like multi.surbl.org=>50|black.uribl.com=>25.
 The value of the weight can be set directly like=>45 or as a divisor of URIBLmaxweight . Low numbers 50  would be the same as multi.surbl.org=>1, multi.surbl.org=>2 would be the same as multi.surbl.org=>25.
 If the sum of weights of all found uris surpasses URIBLmaxweight, the URIBL check fails.  If not, the URIBL check is scored as "neutral" . URIBLmaxhits is ignored when weights are used. 
 Some URIBL Service Providers, like multi.surbl.org and black.uribl.com , provides different return codes in a single DNS-zone: like 127.a.b.c - where a,b,c are used to identify a weight or type (or what ever) of the returned entry. If you want to care about special return codes, or if you want to use different weights for different return codes, you should use the following enhanced entry syntax:
 URIBL-Service-Provider=>result-to-watch=>weight (like:)
 multi.surbl.org=>127.0.0.2=>2
 multi.surbl.org=>127.0.0.4=>3
 multi.surbl.org=>127.0.0.?=>4
 multi.surbl.org=>127.0.0.*=>5
 You can see, the wildcards * (multiple character) and ? (single character) are possible to use in the second parameter. Never mix the three possible syntax types for the same URIBL Service Provider. An search for a match inside such a definition is done in reverse ASCII order, so the wildcards are used as last. 
Default: multi.surbl.org=&gt;1|black.uribl.com=&gt;1 

-URIBLCCTLDS (URIBL Country Code TLDs*) 
List of  used to determine the base domain of the uri. Two level TLDs will be checked on third level, third level TLDs will be checked on fourth level. Any not listed domain will be checked in level two. 
Default: file:files/URIBLCCTLDS.txt 

-URIBLmaxuris (Maximum URIs) 
More than this number of URIs in the body will increase scoring with uribleValencePB. Enter 0 to disable feature.  

-URIBLmaxdomains (Maximum Unique Domain URIs) 
More than this number of unique domain URIs in the body will increase scoring with uribleValencePB. Enter 0 to disable feature.  

-URIBLNoObfuscated (Disallow Obfuscated URIs ) 
When enabled, messages with obfuscated URIs of types [integer/octal/hex IP, other things!] in the body will will increase scoring with uribleValencePB and if weights are used, the double weight will be used.  

-URIBLcheckDOTinURI (Check for DOT in URI) 
When enabled, assp will also check for the used word 'DOT' instead of a '.' in URI's like 'exampledotcom or example!d o-t_com' .
   Enable this feature only, if you don't expect any problems in your national language (using 'dot' + a toplevel domain in any words).  

-URIBLmaxreplies (Maximum Replies) 
A reply is affirmative or negative reply from a URIBL.
   The URIBL module will wait for this number of replies (negative or positive) from the URIBLs listed under Service Provider
   for up to URIBLmaxtime. This number should be equal to or less than the number of URIBL Service Providers
   listed to allow for randomly unavailable URIBLs. 
Default: 3 

-URIBLmaxhits (Maximum Hits) 
A hit is an affirmative response from a URIBL.
   The URIBL module will check all of the URIBLs listed under Service Provider,
   and flag the email with a URIBL failure flag if more than this number of URIBLs return a postive blacklisted response.
   This number should be less than or equal to URIBLmaxreplies and greater than 0.
   If the number of hits is greater or equal URIBLmaxhits, the email is flagged failed.
    If the number of hits is greater 0 and less URIBLmaxhits, the email is flagged neutral 
    URIBLmaxhits is ignored if the URIBLServiceProvider are classified (weighted), the email is flagged failed if weights for all URIs is greater or equal URIBLvalencPB.
    
Default: 1 

-URIBLmaxtime (Maximum Time) 
This sets the maximum time in seconds to spend on each message performing URIBL checks. 
Default: 10 

-URIBLsocktime (Socket Timeout) 
This sets the URIBL socket read timeout in seconds. 
Default: 1 

-URIBLwhitelist (Whitelisted URIBL Domains*) 
This prevents specific domains from being checked by URIBL module. For example:files/uriblwhite.txt. 
Default: file:files/uriblwhite.txt 

-noURIBL (Dont Check Messages from these Addresses*) 
Don't validate URIBL when messages come from these addresses. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com). For example: fribo@thisdomain.com|jhanna|@sillyguys.org  

-AddURIBLHeader (Add X-Assp-Received-URIBL Header) 
Add X-Assp-Received-URIBL header to messages with positive reply from URIBL. 
Default: On 

-URIBLCacheInterval (URIBL Cache Refresh Interval for Hits) 
Domains in cache will be removed after this interval in days. Empty or 0 will disable the cache.  
Default: 1 

-URIBLCacheIntervalMiss (URIBL Cache Refresh Interval for Misses) 
Domains in cache with status=2 (miss) will be removed after this interval in days. Empty or 0 will prevent caching of non-hits.  
Default: 0.1 

-URIBLError (Reply Code to Refuse Messages Failed by URIBL ) 
SMTP reply code to refuse failed URIBL message. The literal URIBLNAME (case sensitive) is replaced by the names of URIBLs with negative response.Notes On URIBL
 
Default: 554 5.7.1 Blacklisted by URIBLNAME - contact postmaster@LOCALDOMAIN for resolution. 

------   Attachment Checking   -----------------------------------------------

-DoBlockExes (Checking ) 
Note:Attachment checking will only be done if Email::MIME::Modifier is installed. Scoring is done  with baValencePB, testmode is set with attachTestMode.  

-AttachmentLog (Enable Attachment logging) 
 
Default: standard 

-BlockExes (External Attachment Checking Level ) 
Set the level of Attachment Blocking to 1-3 for attachments that should be blocked, set level to 4  for attachments that should be allowed only. Choose 0 for no attachment blocking.  

-BlockWLExes (Whitelisted Attachment Checking) 
Set the level of Attachment Checking to 0-4 for whitelisted senders. Choose 0 for no attachment blocking.  

-BlockLCExes (Local Attachment Checking) 
Set the level of Attachment Blocking to 0-4 for local senders. Choose 0 for no attachment blocking.  

-BlockNPExes (NoProcessing Attachment Checking) 
Set the level of Attachment Checking to 0-4 for noprocessing messages. Choose 0 for no attachment checking.   

-BadAttachL1 (Level 1 rejected File Extensions) 
This regular expression is used to identify Level 1 attachments that should be blocked.
  Separate entries with a pipe |. The dot . is assumed to precede these, so don't include it. For example: ad[ep]|asx|ba[st]|chm|cmd|com|cpl|crt|dbx|exe|hlp|ht[ab]|in[fs]|isp|js|jse|lnk
  |md[abez]|mht|ms[cipt]|nch|pcd|pif|prf|reg|sc[frt]|sh[bs]|vb|vb[es]|wms|ws[cfh] 
Default: exe|scr|pif|vb[es]|js|jse|ws[fh]|sh[sb]|lnk|bat|cmd|com|ht[ab] 

-BadAttachL2 (Level 2 rejected File Extensions) 
This regular expression is used to identify Level 2 attachments that should be checked.
  Level 2 already includes all rejected extensions from Level 1.  For example: (ad[ep]|asx|ba[st]|chm|cmd|com|cpl|crt|dbx|exe|hlp|ht[ab]|in[fs]|isp|js|jse|
  lnk|md[abez]|mht|ms[cipt]|nch|pcd|pif|prf|reg|sc[frt]|sh[bs]|vb|vb[es]|wms|ws[cfh]).zip  

-BadAttachL3 (Level 3 rejected File Extensions) 
This regular expression is used to identify Level 3 attachments that should be checked.
  Level 3 includes Level 2 and Level 1. For example: zip|url  

-GoodAttach (Level 4 Allowed File Extensions) 
This regular expression is used to identify  attachments that should be allowed. All others are blocked. Separate entries with a pipe |. The dot . is assumed to precede these, so don't include it. For example: ai|asc|bhx|dat|doc|docx|eps|gif|htm|html|ics|jpg|jpeg|hqx|od[tsp]|pdf|ppt|rar|
  
  rpt|rtf|snp|txt|xls|zip  

-PassAttach (Passing File Names  ) 
This regular expression is used to identify  attachments that should mark the message as noprocessing. If you enter extensions do not precede it with a dot. This will take precedence over any bad attachment.  

-AttachmentError (Reply Code to Refuse Rejected Attachments) 
The literal FILENAME (case sensitive) will be replaced with the name of the blocked attachment! 
Default: 550 5.7.1 These attachments are not allowed -- Compress before mailing. 

-BlockUuencoded (Refuse Uuencoded Mails) 
 
Default: On 

-UuencodedError (Reply to Refuse Uuencoded Mails) 
For example: 554 5.7.1 This mail is uuencoded and will be blocked
 Notes On Attachment Blocking 
Default: 554 5.7.1 This message is uuencoded and will be blocked.  

------   ClamAV and FileScan    -----------------------------------------------

-ScanLog (Enable Virus Check logging) 
 
Default: standard 

-noScan (Do Not Scan Messages from/to these Addresses*) 
Accepts 
specific addresses (user@example.com), user parts (user) or entire 
domains (@example.com).  

-noScanIP (Do Not Scan Messages from these IPs*) 
Enter IP addresses that you don't want to be scanned for virus , separated by pipes (|). For example: 145.145.145.145|145.146.  

-ScanWL (Scan Whitelisted Senders) 
 
Default: On 

-ScanNP (Scan NoProcessing Messages) 
  

-ScanLocal (Scan Local Senders) 
  

-ScanCC (Scan Copied Spam Mails) 
  

-AvError (Reply Code to Refuse Infected Messages) 
Reply
code to refuse infected messages. The string INFECTION is replaced with
the name of the detected virus.  For example: 554 5.7.1 Mail appears
infected with INFECTION -- disinfect and resend. 
Default: 554 5.7.1 Mail appears infected with INFECTION. 

-EmailVirusReportsTo (Send Virus Report To This Address) 
If set an email containing the Message ID, Remote IP, Message 
Subject, Sender email address, Recipient email address, and the virus 
detected will be sent to this address. For example: 
admin@example.com  

-EmailVirusReportsHeader (Add Full Header To Virus Report To Mail Address Above) 
If set the full message 
headers will also be added to Virus Reports.  

-EmailVirusReportsToRCPT (Send Virus Report To Recipient) 
If set the intended 
recipient of the message will be sent a copy of the Virus Report. 
<input type="button" value=" Edit virusreport.txt file" 
onclick="javascript:popFileEditor('reports/virusreport.txt',2);" 
/>  

-UseAvClamd (Use ClamAV) 
If activated, the message is checked by ClamAV, this requires an installed
  File::Scan::ClamAV Perl module and a running Clamd . The viruses will
  be stored in a special folder if the SpamVirusLog is set to 
'quarantine' and the
  filepath to the viruslog is set. Scoring is done  using vdValencePB.  

-modifyClamAV (Modify ClamAV Module) 
If set ClamAV modules ping and streamscan are modified. This may be disabled to use the original modules. NOTE: Changing this  requires ASSP restart 
Default: On 

-AvClamdPort (Port or file socket for ClamAV) 
 If the socket has been setup as a TCP/IP socket (see the TCPSocket option in the clamav.conf file - located for example in /etc/clamav/clamd.conf), then specify the TCPSocket (port). For example: 3310.
 If LocalSocket is specified in the clamav.conf file  then specify here the LocalSocket. For example /var/run/clamav/clamd.ctl. 
Default: /private/tmp/clamd 

-ClamAVBytes (Scan Bytes) 
The number of bytes per message that will be scanned for virus and 
attachment blocking. Normally ASSP looks only at MaxBytes of a message. Values of 100000 or larger are not recommended. 
Default: 50000 

-ClamAVtimeout (ClamAV Timeout) 
ClamAV will timeout after this many seconds. default: 10 
seconds. 
Default: 10 

-NoScanRe (Skip ClamAV Regular Expression*) 
Put anything here to identify messages which should not be checked 
for viruses.  

-SuspiciousVirus (No-Blocking Virus Scan Scoring Regex**) 
If a ClamAV or FileScan result matches this expression it will be scored with the suspicious virus score (vsValencePB) and the message will not be blocked. For example: UNOFFICIAL
 It is possible to weight such results. Every weighted regex that contains at least one '|' has to begin and end with a '~' - inside such regexes it is not allowed to use a '~', even it is escaped - for example:  ~abc\~|def~=>23 or ~abc~|def~=>23. Every weighted regex has to be followed by '=>' and the weight value. For example: Phishing\.=>1.45The multiplication result of the weight and vsValencePB  will be used for scoring, if the absolute value of weight is less or equal 6. Otherwise the value of weight is used for scoring.  

-DoFileScan (Use File System Virus Scanner) 
If activated, the message is written to a file inside the 
'FileScanDir' with an extension of 'maillogExt'. After that ASSP 
will call 'FileScanCMD' to detect if the temporary file is infected 
or not. The temporary created file(s) will be removed.
  The viruses will be stored in a special folder if the SpamVirusLog 
is set to 'quarantine' and the filepath to the viruslog is set.  

-FileScanWL (Scan Whitelisted Senders) 
 
Default: On 

-FileScanNP (Scan NoProcessing Messages) 
 
Default: On 

-FileScanLocal (Scan Local Senders) 
  

-FileScanDir (File Scan Directory) 
Define the full path to the directory where the messages are 
temporary stored for the file system virus scanner. This could be any 
directory inside your file system. The running ASSP process must have 
full permission to this directory and the files inside! For defining any full filepathes, always use slashes ("/") not backslashes.  
Default: /Applications/assp/virusscan 

-FileScanCMD (File Scan Command) 
ASSP will call this system command and expects a returned string 
from this command. This returned string is checked against 
'FileScanBad' and/or 'FileScanGood' to detect if the message is 
OK or not! If the file does not exists after the command call, the 
message is consider infected. ASSP expects, that the file scan is 
finished when the command returns!
   The literal 'FILENAME' will be replaced by the full qualified 
file name of the temporary file.

   The literal 'FILESCANDIR' will be replaced with the value of 
FileScanDir.
   All outputs of this command to STDERR are automatic redirected to 
STDOUT.
   FileScan will not run, if FileScanCMD is not specified.
   If you have your online/autoprotect file scanner configured to 
delete infected files inside the 'FileScanDir', define 'NORUN' in 
this field! In this case FileScanGood and FileScanBad are ignored. If 
there is a need to wait some time for the autoprotect scanner, write 
'NORUN-dddd', where dddd are the milliseconds to wait!
   Depending on your operating system it may possible that you have to 
quote (' or ") the command, if it contains whitespaces. The replaced 
file name will be quoted by ASSP if needed. For example: 'd:\utility\touch.exe FILENAME' 
Default: NORUN 

-FileScanBad (RegEx to Detect BAD in Returned String*) 
Put anything here to identify bad messages by the string returned 
from the FileScanCMD. If this regular expression matches, the message 
is considered infected.  

-FileScanGood (RegEx to Detect GOOD in Returned String*) 
Put anything here to identify good messages by the string returned 
from the FileScanCMD. If this regular expression matches and 
'FileScanBad' does not, the message is considered not infected.  

-FileScanRespRe (FileScan Reponds Regex*) 
A regular expression that will be used over the text returned from 
the FileScanCMD. The result of this regex is used as virus name 
(INFECTION) in AvError. For example: infected by (.+)
  Notes On Virus Checks<input 
type="button" value="Notes" 
onclick="javascript:popFileEditor('notes/viruscheck.txt',3);" 
/>  

------   Regex / Bombs   -----------------------------------------------

-BombLog (Enable Bomb logging) 
 
Default: standard 

-preHeaderRe (Regular Expression to early Identify Spam in Handshake and Header Part*) 
Until the complete mail header is received, assp is processing the handshake and header content line per line, but the first mail content check is done after the complete mail header is received.
 It is possible, that some content (malformed headers, forbidden characters or character combinations) could cause assp to die or to run into a unrecoverable exception (eg. segment fault).
 Use this regular expression to identify such incoming mails based on a line per line check, at the moment where a single line is received.
 This setting does not affect any other and is not affected by any other configuration setting, except that this check is only done for incoming mails.
 If a match is found, assp will immediately send a '421 terminate connection' reply to the client and will immediately terminate the connection. 
Default: file:files/preheaderre.txt 

-maxBombValence (Maximum Penalty on Regex Match per Mail per Check) 
This option is valid for all regex searches which allow weights (marked with **) and limits the maximum penalty per check. maxBombHits is overwritten. If not set the search will stop if MessageScoringUpperLimit or maxBombHits is reached. For example: 70  

-maxBombHits (Maximum Number Of Hits in Regex Search) 
This option is valid for all regex searches which allow weights (marked with **). Use the syntax: regextype=>3|other.regextype=>3 to set the maximum number of hits a regexsearch should perform. Maximum for regex searches not set here is 1. The search will stop if MessageScoringUpperLimit or maxBombHits is reached. This can be overwritten by maxBombValence. 
Default: blackRe=&gt;2|bombHeaderRe=&gt;1|bombSubjectRe=&gt;3|bombCharSets=&gt;1|bombSuspiciousRe=&gt;3|bombRe=&gt;1|scriptRe=&gt;1|whiteRe=&gt;1 

-DoBlackRe (Use Black Regular Expression to Identify Spam) 
This works similar to DoBombRe but has more strict defaults in processing whitelisted  and noprocessing. Both will will be checked if the defaults are used. Envelope, Header and Data Part are checked  against the BlackRe. Scoring is done  with blackValencePB - the scoring value is the sum of all valences(weights) of all found blackRe(s). Blocking will only be done if 'block' is set and and the total score is equal or exceeds blackValencePB. Testmode is set with blackTestMode.  
Default: score 

-blackRe (BlackRe - Regular Expression to Identify Spam ** ) 
This is a stricter version of bombRe (blackReWL, blackReNP, blackReISPIP are enabled by default). If an incoming email matches this expression it will be considered spam. As all fields marked with two asterisk (**) do - this  regular expressions (regex) can accept a weight value. Every weighted regex has to be followed by '=>' and the weigth value. The search will continue until maxBombHits is reached or maxBombValence is exceeded (if set). 
Default: file:files/blackre.txt 

-blackReWL (Do Black Regular Expressions Checks for Whitelisted) 
 
Default: On 

-blackReNP (Do Black Regular Expressions Checks for NoProcessing) 
 
Default: On 

-blackReLocal (Do Black Regular Expressions Checks for Local Messages) 
  

-blackReISPIP (Do Black Regular Expressions Checks for ISPIP) 
 
Default: On 

-DoBombSenderRe (Use BombSender Regular Expressions on Envelope) 
If activated, each message-envelope (IP,Helo,Mail From) is checked  against bombSenderRe. Scoring is done  with bombValencePB, testmode is set with bombheaderTestMode. 
Default: block 

-bombSenderRe (Regular Expression to Identify Spam in Envelope**) 
Expression to identify mailfrom,ip and helo. 
Default: file:files/bombsenderre.txt 

-DoBombHeaderRe (Use Header Regular Expressions ) 
If activated, each message-header is checked  against bombHeaderRe. Scoring is done  with bombValencePB, testmode is set with bombheaderTestMode. 
Default: score 

-bombHeaderRe (Regular Expression to Identify Spam in Header Part **) 
Header will be checked against this Regex if DoBombHeaderRe is enabled.  
Default: file:files/bombheaderre.txt 

-DoBombSubjectRe (Use Subject Regular Expression on Subject) 
If activated, each message subject is checked  against bombSubjectRe. Scoring is done  with bombValencePB, testmode is set with bombheaderTestMode. 
Default: score 

-bombSubjectRe (Regular Expression to Identify Spam in Subject **) 
Subject will be checked against this Regex if DoBombSubjectRe is enabled. 
Default: file:files/subjectre.txt 

-maxSubjectLength (Maximum allowed Subject Length) 
If set to a value greater than 0, assp will check the length of the Subject of the mail. If the Subject length exceeds this value, the message score will be increased by 'bombValencePB' and the string that is checked in 'bombSubjectRe' will be trunked to this length. It is possible to define a special weight using the syntax 'length=>value', in this case the defined absolute value will be used instead of 'bombValencePB' to increase the message score. If the subject is too long and this weight is equal or higher than 'bombValencePB' no further bomb checks will be done on the subject. 
Default: 150=&gt;40 

-DoBombCharSets (Check Header with Foreign Charsets RegEx) 
If activated, each message header is checked  against bombCharSets.  
Default: score 

-bombCharSets (Regular Expression to Identify Foreign Charsets ** ) 
Header will be checked against this Regex if DoBombCharSets is enabled. A weight can be assigned. For example: charset=.?BIG5|charset=.?CHINESEBIG|charset=.?GB2312|charset=.?KS_C_5601|charset=.?KOI8=>0.5|charset=.?EUC-KR|charset=.?ISO-2022|charset=.?CP1251.  
Default: file:files/charsets.txt 

-bombSuspiciousRe (Regular Expression to Score Blackish and/or Whitish Expressions **) 
Put here anything which might be suspicious (blackish) or trustworthy (whitish). bombSuspiciousValencePB will be multiplied by the weight and increases/decreases the total score.  Trustworthiness (whitishness) will be assigned by using a negative weight.  For example:news=>-0.4|no-?reply=>-0.5|passwor=>-0.7 
Default: file:files/suspiciousre.txt 

-DoBombRe (Use Bomb Regular Expressions) 
If activated, each message is checked  against bombRe Regular Expressions. Scoring is done  with bombValencePB - the scoring value is the sum of all valences(weights) of all found bombRe(s), testmode is set with bombTestMode.
   
Default: score 

-bombRe (Regular Expression for Header and Data Part **) 
Header and Data will be checked against this Regular Expression if DoBombRe is enabled.  For example: If you want to search for attachment names, define a line with 'attachment:the_attachment_name'. 
Default: file:files/bombre.txt 

-DoBombDataRe (Use BombData Regular Expression for Data Part) 
If activated, Data part will be checked against bombDataRe Regular Expressions. Scoring is done  with bombValencePB - the scoring value is the sum of all valences(weights) of all found bombdataRe(s), testmode is set with bombTestMode.
   
Default: score 

-bombDataRe (BombData Regular Expression for Data Part **) 
Data part will be checked against this Regular Expression if DoBombDataRe is enabled. 
  If you want to search for attachment names, define a line with 'attachment:the_attachment_name'. 
Default: file:files/bombdatare.txt 

-bombReWL (Do Bomb/Script Regular Expressions Checks for Whitelisted) 
  

-bombReNP (Do Bomb/Script Regular Expressions Checks for NoProcessing) 
  

-bombReLocal (Do Bomb/Script Regular Expressions Checks for Local Messages) 
  

-bombReISPIP (Do Bomb/Script Regular Expressions Checks for ISPIP) 
 
Default: On 

-maxBombSearchTime (Maximum time spend on Regex Search) 
Maximum time in seconds that is spend on  regex check. This time check is done, after every found regex. So it is possible that the regex search takes longer as the defined value, if no match is found or a single search takes more time. 
Default: 5 

-noBombScript (Dont Check Messages from these Addresses*) 
Don't detect spam bombs or scripts in messages from these addresses. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  

-DoTestRe (Do Test Regular Expression) 
If activated, each message is checked  against the Test Regular
  Expression below. This provides a way to test regex strings on live mail.  

-testRe (Test Regular Expression **) 
  

-DoScriptRe (Use Regular Expression to Identify Mobile Scripts) 
Each message is checked  against the Expression to Identify Mobile Scripts. Scoring is done  with scriptValencePB, testmode is set with scriptTestMode.  

-scriptRe (Regular Expression to Identify Mobile Scripts **) 
Spam emails may contain mobile scripting code, eg activex and java. You can use this feature to block those messages.For example: \<applet|\<embed|\<iframe|\<object|\<script|onmouseover|javascript:  

-bombError (Spam Bomb Error) 
SMTP error message to reject spam bombs. If empty SpamError will be used. The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. SESSIONID will be replaced by the unique ASSP identifier. REASON will be replaced by the actual reason.Notes On Bomb Regex 
Default: 554 5.7.1 Mail (SESSIONID) appears to be unsolicited - REASON - contact postmaster@LOCALDOMAIN for resolution 

------   Bayesian Options    -----------------------------------------------

-BayesianLog (Enable Bayesian Logging) 
Enables verbose logging of  Bayesian checks in the maillog. 
Default: standard 

-DoBayesian (Bayesian Check ) 
If activated, the message is checked  based on Bayesian factors in Spamdb. This needs a fully functional spamdb built by rebuildspamdb.pl. For starters it is best practice  to put this inactiv and built the spamdb collection with the help of DSNBL ,URIBL and spamaddresses.
disabled - do nothing
block - reject the message (if not addressed to spamlover)
monitor - pretend its running (with logging), but don't actually score and block messages
score - don't block outright, add score value with baysValencePB 
Testmode is set with baysTestMode  
 
Default: score 

-Addispip (Increase baysValencePB for mails from ispip) 
Additional scoring of mails from IP numbers in ispip. 
Default: 2 

-Addbounce (Increase baysValencePB for bounced mails) 
Additional scoring for senders in BounceSenders.  
Default: 2 

-Addhater (Increase baysValencePB for spamhaters) 
Additional scoring for mails from senders in baysSpamHaters. 
Default: 10 

-BayesWL (Bayesian Check on Whitelisted Senders) 
  

-BayesNP (Bayesian Check on NoProcessing Messages) 
  

-BayesLocal (Bayesian Check on Local Senders) 
  

-BayesMaxProcessTime (Bayesian Check Timeout ) 
The Bayesian Checks are the most memory and CPU consuming tasks that ASSP is doing on a message. If such tasks running to long on one message, other messages could run in to SMTPIdleTimeout. Define here the maximum time in seconds that ASSP should spend on Bayesian Checks for one message. 
Default: 60 

-noBayesian (Skip Bayesian Check*) 
Mail from/to any of these addresses are ignored by Bayesian check, mails will not be stored in spam/notspam collection. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (user*@example.com)  

-baysTestModeUserAddresses (Bayesian Testmode User Addresses*) 
These users are in testmode ( mark subject only ) for bayesian spam, even with testmode off  

-AddSpamProbHeader (Add Bayes Probability Header) 
Adds a line to the email header "X-Assp-Spam-Prob: 0.0123" Probability ranges from 0 to +1 where > 0.6 = spam.
  Notes On Bayesian
    

------   Block Reporting   -----------------------------------------------

-ReportLog (Enable Report logging) 
 
Default: verbose 

-EmailBlockReport (Request Block Report) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to get a report about blocked emails. Do not put the full address here, just the user part. For example: asspblock
 Leading digits/numbers in the mail subject will be interpreted as "report request for the last number of days". If the number of days is not specified in the mail subject, a default of 5 days will be used to build the report. 
 All characters behind the "number of days" will be interpreted as a regular expression to overwrite the BlockReportFilter - leading and trailing white spaces will be ignored.
 Users defined in EmailBlockTo, EmailAdmins and EmailAdminReportsTo are 'Admins' and can request a report for multiple users. They have to use a special syntax with '=>' in the body of the report request. The syntax is: 
 QueryAddress=>ReportRecipient=>ReportDays  -  there are many possible combinations of this three parameters. For example:
 user@domain and user@domain=>user@domain - will send a report for this user to this user
 *@domain (better use) *@domain=>* - will send a report for every blocked user in this domain to this user
 user@domain=>recipient@any-domain - will send a report for user@domain to recipient@any-domain
 *@domain=>recipient@any-domain - will send a report for every blocked user in this domain to recipient@any-domain
 A third parameter is possible to set, which defines the number of days for which the report should be created. The default (if empty or not defined) is one day. This value is used to calculate the 'next run date'. For example:
 *@domain=>recipient@any-domain=>2 - creates a report for two days.
 *@domain=>*=>14 - creates a report for 14 days.
 user@domain=>=>3 or user@domain=>*=>3 - creates a report for three days. The second parameter is here empty or *.
 To overwrite the defined BlockReportFilter, you can define a fourth parameter, which contains the regular expression to use.
 *@domain=>*=>14=>virus|newsletter - creates a report for 14 days and skips all lines that contains the words 'virus' or 'newsletter'.
 If an admin emails a block report request and specifies a filter in the subject of the email and a fourth parameter in the body, both regular expressions will be merged in to a single regex for each line.
 If you or a user want the default BlockReportFilter to become part of the overwrite regex, the literal '$BRF' should be inluded in the regex like:
 *@domain=>*=>14=>virus|$BRF|newsletter - or even in the subject of the email
 In this case the literal '$BRF' will be replaced by the BlockReportFilter.
 Only Admins are able to request blockreports for non local email addresses. For example:
 user@non_local_domain=>recipient@any-domain=>4
 *@non_local_domain=>recipient@any-domain=>4
 This will result in an extended blockreport for the non local address(es). Replace 'non_local_domain' with the domain name you want to query for.
 It is possible to change the complete design of the BlockReports to your needs,  using a html-css file. An default css-file 'blockreport.css' is in the image folder.
 There you can also find a default icon file 'blockreporticon.gif' and a default header-image-file 'blockreport.gif' - which is the same like 'logo.gif'.  There is no need to install that fles. If assp can not find this files in its
 image folder, it will use default hardcoded css and icon. If the file 'blockreport.gif' is not found 'logo.gif' will be used.
 To change any contents, use the Blockreport::modify module in the lib folder. You'll need some Perl skills to do that.
  
  
   
Default: asspblock 

-EmailBlockReportDomain (Request Blocked Email Domain) 
Set this to the domain to which the users can send a request to receive blocked messages. For example: @assp.local. 
Default: @assp-notspam.org 

-EmailBlockReply (Reply to Block-Report Request) 
 
Default: REPLY TO SENDER 

-EmailBlockReportDomain (Request Blocked Email Domain) 
This is used to generate the addresses in blockreports to which the users can send a request to receive blocked messages. For example: @assp-notspam.org. 
Default: @assp-notspam.org 

-EmailBlockReply (Reply to Block-Report Request) 
 
Default: REPLY TO SENDER 

-QueueUserBlockReports (Queue User Block Report Requests) 
How to process block report requests for users (not EmailBlockTo, EmailAdmins, EmailAdminReportsTo).
  'run instantly' - the request will be processed instantly (not stored).
  'store and run once at midnight' - the request will be stored/queued, runs at QueueSchedule, and will be removed from queue after that

 'store and run scheduled' - the request will be stored/queued, runs permanently scheduled at BlockReportSchedule until it will be removed from queue - a '+' in the subject is not needed
  'run delayed' - the request will be stored and  processed during the next minutes
  To add a request to queue the user has to send an email to EmailBlockReport. Leading digits/numbers in the mail subject will be interpreted as "report request for the last number of days". If the number of days is not specified in the mail subject, a default of 5 days will be used to build the report.
  If 'run instantly','run delayed' or 'store and run once at midnight' is selected, but a user wants to schedule a permanent request, a leading '+' before the digits in subject is required.
  To remove a request from queue the user has to send an email to EmailBlockReport with a leading '-' in the subject.
    

-QueueSchedule (Runtime for Queued Requests) 
Runtime hour for reports in QueueUserBlockReports. Set a number between 0 and 23. 0 means midnight and is default  

-BlockRepForwHost (Forward The Blockreportrequest to other ASSP) 
If you are using more than one ASSP (backup MX), define the IP:relayPort of the other ASSP here (separate multiple entries by "|"). The Blockreportrequest will be forwarded to this ASSP and the user will get a blockreport from every ASSP. The perl module  is required to use this feature.  

-EmailBlockTo (Send Copy of Block-Reports TO) 
Email sent from ASSP acknowledging your submissions will be sent to this address. For example: admin@domain.com  

-BlockReportFile (File for Blockreportrequest) 
A file with BlockReport requests. ASSP will generate a block report for every line in this file (file:files/blockreportlist.txt - file: is required if defined!) every day at midnight for the last day. The perl modules  are required to use this feature. A report will be only created, if there is at least one blocked email found! The syntax is: 
 QueryAddress=>ReportRecipient=>ReportDays  -  there are many possible combinations of this three parameters. For example:
 user@domain and user@domain=>user@domain - will send a report for this user to this user
 *@domain (better use) *@domain=>* - will send a report for every blocked user in this domain to this user
 *@* - creates a report for all local users in all local domains
 user@domain=>recipient@any-domain - will send a report for user@domain to recipient@any-domain
 *@domain=>recipient@any-domain - will send a report for every blocked user in this domain to recipient@any-domain
 A third parameter is possible to set, which defines the number of days for which the report should be created. The default (if empty or not defined) is one day. This value is used to calculate the 'next run date'. For example:
 *@domain=>recipient@any-domain=>2 - creates a report for two days.
 *@domain=>*=>14 - creates a report for 14 days.
 user@domain=>=>3 or user@domain=>*=>3 - creates a report for three days. The second parameter is here empty or *!
 To overwrite the defined BlockReportFilter, you can define a fourth parameter, which contains the regular expression to use.
 *@domain=>*=>14=>virus|newsletter - creates a report for 14 days and skips all lines that contain the words 'virus' or 'newsletter'.
 Only Admins are able to request blockreports for non local email addresses. For example:
 user@non_local_domain=>recipient@any-domain=>4
 *@non_local_domain=>recipient@any-domain=>4
 This will result in an extended blockreport for the non local address(es). Replace 'non_local_domain' with the domain name you want to query for.  

-BlockReportSchedule (Runtime BlockReportFile) 
Runtime hour for reports in BlockReportFile. Set a number between 0 and 23. 0 means midnight and is default.  

-BlockReportNow (Generate a BlockReport from BlockReportFile Now) 
If selected, ASSP will generate a block report from BlockReportFile now. &nbsp;  

-BlockMaxSearchTime (Max Search time per log File) 
The maximum time in seconds, the Blockreport feature spends on searching in one log file. If this value is reached, the next log file will be processed. A value of 0 disables this feature and all needed log files will be fully processed.  

-BlockReportFormat (The format of the Report Email) 
Block reports will be sent as multipart/alternative MIME messages. They normaly contains two parts, a plain text part and a html part. Select "text only" or "html only" if you want to skip any of this parts.
  To make it possible to detect a resent email, ASSP will add a header line "X-Assp-Resend-Blocked: myName" to each email! 
Default: text only 

-BlockReportHTTPName (My HTTP Name) 
The hostname for HTTP(S) links in AdminUsers Blockreports. If not defined the local hostname will be used.  

-BlockReportFilter (Regular Expression to Skip Log Records*) 
Put anything here to identify messages which should not be reported. For example:  \[Virus\]|\[BlackDomain\]  

-inclResendLink (Include a Resend-Link for every resendable email) 
Block reports will be sent as multipart/alternative MIME messages. They contains two parts, a plain text part and a html part. If a blocked email is stored in any folder, it is possible to include a link for each email in to the report. Define here what you want ASSP to do. Note: File name logging (fileLogging) must be on! The perl module  is required to use this feature. 
Default: in both 

-BlockResendLink (Which Link Should be included) 
If HTML is enabled in inclResendLink, two links (one on the left and one on the right site) will be included in the report email by default. Depending on the used email clients it could be possible, that one of the two links will not work for you. Try out what link is working and disable the other one, if you want.  

-BlockResendLinkLeft (User which get the Left link only* ) 
List of users and domains that will get the left link only. The setting for BlockResendLink will be ignored for this entries!  

-BlockResendLinkRight (User which get the right link only* ) 
List of users and domains that will get the right link only. The setting for BlockResendLink will be ignored for this entries!  

-DelResendSpam (Delete Mails in Spam Folder) 
If selected, an user request to resend a blocked email will delete the file in the spamlog folder - an admin request will move the file to the correctednotspam folder. 
Default: On 

-autoAddResendToWhite (Automatic add Resend Senders to Whitelist) 
If a resend request is made by any of the selected users, the original sender of the resent mail will be added to whitelist.
  Notes On Block Reporting
    

------   Email Interface    -----------------------------------------------

-EmailInterfaceOk (Enable Email Interface ) 
Checked means that you want ASSP to intercept and parse mail to the following usernames at any domain which is listed in localDomains. You can use 'assp.local' because it is automatically a local domain. This requires an installed  module in PERL. 
Default: On 

-EmailAdminReportsTo (Admin Mail Address) 
If set internal warnings/infos  will be sent to this address. For example: admin@domain.com  

-EmailFrom (From Address for Reports) 
Email sent from ASSP acknowledging your submissions will be sent from this address. For example:  
Default: &lt;postmaster@assp-notspam.org&gt; 

-EmailHelp (Help Address) 
Any mail sent by local/authenticated users to this username will be interpreted as a request for help. Do not put the full address here, just the user part. For example: assphelp. The user would then send to assphelp@assp-notspam.org.
   
Default: assphelp 

-EmailAdmins (Authorized Addresses* ) 
Mail from any of these addresses can add/remove to/from redlist, spamlovers, noprocessing. May request an EmailBlockReport for a list of users. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com)  

-EmailSenderOK (Accept Emails (Reports) from these external addresses*) 
Allow these external domains/addresses to report to the email
interface (NOT RECOMMENDED). The reply address for the reports must be set to a local one.  By default, ASSP only accepts reports from local or authenticated users. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com)  

-EmailSenderNotOK (Not Authorized Addresses*) 
Mail from any of these addresses are not accepted from Email Interface. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  

-EmailSenderIgnore (Ignore Not Authorized Addresses*) 
Mail from any of these addresses are not accepted from Email Interface, except "Help Report", "Analyze Report" and "Block Report/Resend". Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). The user will get not informed about the denied request.  

-EmailSpam (Report Spam Address) 
Any mail sent or forwarded by local/authenticated users to this username will be interpreted as a spam report. Do not put the full address here, just the user part.
  You can sent multiple emails as attachments. Each attached email-file must have the extension defined in "maillogExt". In this case only the attachments will be processed. Multiple attachments get truncated to MaxBytesReports. To use this multi-attachment-feature an installed  module in PERL is needed.
   
Default: assp-spam 

-EmailHam (Report Ham (Not-Spam) Address) 
Any mail sent or forwarded by local/authenticated users to this username will be interpreted as a false-positive report. Do not put the full address here, just the user part.
You can sent multiple emails as attachments. Each attached email-file must have the extension defined in "maillogExt". In this case only the attachments will be processed. Multiple attachments get truncated to MaxBytesReports. To use this multi-attachment-feature an installed  module in PERL is needed.
   
Default: assp-notspam 

-MaxBytesReports (Error Max Bytes) 
How many bytes of an error report (EmailHam, EmailSpam) will ASSP look at. For example: 20000. 
Default: 20000 

-EmailErrorsReply (Reply to Spam/Not-Spam Reports) 
 
Default: REPLY TO SENDER 

-EmailErrorsTo (Send Copy of Spam/Ham-Reports TO) 
Email sent from ASSP acknowledging your submissions will be sent to this address. For example: admin@domain.com  

-EmailErrorsModifyWhite (Combined Spam/Ham Report &amp;amp; Whitelist Check) 
If set to 'modify whitelist' Ham Reports will add email addresses to the Whitelist, Spam Reports will remove addresses from the Whitelist, also a copy of a file in the GUI to correctedspam (remove) and correctednotspam (add) will modify the Whitelist for the found addresses. If set to 'show whitelist' Spam Reports will show if addresses are whitelisted. 
Default: modify whitelist 

-EmailErrorsModifyNoP (Combined Spam Report and NoProcessing Deletion) 
If set to 'modify noProcessing' Spam Reports will remove email addresses from noProcessing list. If set to 'show noProcessing' Spam Reports will show if addresses are on noProcessing list, also a copy of a file in the GUI to correctedspam (remove) and correctednotspam (add) will modify the noProcessing list for the found addresses. 
Default: modify noprocessing 

-EmailWhitelistAdd (Add to Whitelist Address) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to add addresses to the whitelist. Do not put the full address here, just the user part. For example: assp-white
   
Default: assp-white 

-EmailWhitelistRemove (Remove from Whitelist Address) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to remove addresses from the whitelist. Do not put the full address here, just the user part. For example: assp-notwhite
   
Default: assp-notwhite 

-EmailWhiteRemovalAdminOnly (Allow  Whitelist Removals for Admins only ) 
Only the users defined in EmailWhitelistTo, EmailAdmins and EmailAdminReportsTo are able to remove addresses from the whitelist.  

-EmailWhitelistReply (Reply to Add to/Remove from Whitelist) 
 
Default: REPLY TO SENDER 

-EmailWhiteRemovalToRed (Add  Whitelist Removals To Redlist ) 
Addresses which are removed from Whitelist via EmailWhitelistRemove will automatically be added to the Redlist. The address can only be added again to the Whitelist after it is removed from the Redlist.  

-EmailWhitelistTo (Send Copy of Whitelist-Reports TO) 
Email sent from ASSP acknowledging your submissions will be sent to this address. For example: admin@domain.com  

-EmailRedlistAdd (Add to Redlist Address) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to add the sender address to the redlist. Only the users defined in EmailRedlistTo, EmailAdmins and EmailAdminReportsTo are able to define a list of email addresses in the mail body.  Do not put the full address here, just the user part. For example: assp-red.
   
Default: assp-red 

-EmailRedlistRemove (Remove from Redlist Addresses) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to remove the sender address from the redlist. Only the users defined in EmailRedlistTo, EmailAdmins and EmailAdminReportsTo are able to define a list of email addresses in the mail body. 
  Do not put the full address here, just the user part. For example: assp-notred
   
Default: assp-notred 

-EmailRedlistReply (Reply to Add to/Remove from Redlist) 
 
Default: REPLY TO SENDER 

-EmailRedlistTo (Send Copy of Redlist-Reports TO) 
Email sent from ASSP acknowledging your submissions will be sent to this address. For example: admin@domain.com  

-EmailSpamLoverAdd (Add to SpamLover Addresses) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to add the sender address to spamLovers. Only the users defined in EmailSpamLoverTo, EmailAdmins and EmailAdminReportsTo are able to define a list of email addresses in the mail body. Do not put the full address here, just the user part. For example: assp-spamlover. To use this option, you have to configure spamLovers in a plain ASCII file one address per line: file:files/bombre.txt" !
   
Default: assp-spamlover 

-EmailSpamLoverRemove (Remove from SpamLover Addresses) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to remove the sender address from spamLovers. Only the users defined in EmailSpamLoverTo, EmailAdmins and EmailAdminReportsTo are able to define a list of email addresses in the mail body. 
  Do not put the full address here, just the user part. For example: assp-notspamlover
   
Default: assp-notspamlover 

-EmailSpamLoverReply (Reply to Add to/Remove from SpamLovers) 
 
Default: REPLY TO SENDER 

-EmailSpamLoverTo (Send Copy of Spamlover-Change-Reports TO) 
Email sent from ASSP acknowledging your submissions will be sent to this address. For example: admin@domain.com  

-EmailNoProcessingAdd (Add to NoProcessing Addresses) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to add the sender address to the noProcessing addresses. Only the users defined in EmailNoProcessingTo, EmailAdmins and EmailAdminReportsTo are able to define a list of email addresses in the mail body. Do not put the full address here, just the user part. For example: assp-nop. To use this option, you have to configure noProcessing in a plain ASCII file one address per line: "file:files/noprocessing.txt" !
   
Default: assp-nop 

-EmailNoProcessingRemove (Remove from noProcessing Addresses) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to remove the sender address from noProcessing .
  Do not put the full address here, just the user part. Only the users defined in EmailNoProcessingTo, EmailAdmins and EmailAdminReportsTo are able to define a list of email addresses in the mail body. For example: assp-notnop. To use this option, you have to configure noProcessing in a plain ASCII file one address per line: "file:files/noprocessing.txt" !
   
Default: assp-notnop 

-EmailNoProcessingReply (Reply to Add to/Remove from noProcessing) 
 
Default: REPLY TO SENDER 

-EmailNoProcessingTo (Send Copy of NoProcessing-Change-Reports TO) 
Email sent from ASSP acknowledging your submissions will be sent to this address. For example: admin@domain.com  

-EmailBlackAdd (Add to BlackListed  Addresses) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to add to blackListedDomains. Only the users defined in EmailAdmins and EmailAdminReportsTo are able to request an addition. Do not put the full address here, just the user part. For example: assp-black. To use this option, you have to configure blackListedDomains in a plain ASCII file one address per line: "file:files/blackdomains.txt" !
   
Default: assp-black 

-EmailBlackRemove (Remove from BlackListed Addresses) 
Any mail sent by local/authenticated users to this username will be interpreted as a request to remove from blackAddresses .
  Do not put the full address here, just the user part. Only the users defined in EmailAdmins and EmailAdminReportsTo are able to request an addition. For example: assp-notblack. To use this option, you have to configure blackAddresses in a plain ASCII file one address per line: "file:files/blackAddresses.txt" !
   
Default: assp-notblack 

-EmailBlackReply (Reply to Add to/Remove from BlackListed) 
 
Default: REPLY TO SENDER 

-EmailBlackTo (Send Copy of Black-Change-Reports TO) 
Email sent from ASSP acknowledging your submissions will be sent to this address. For example: admin@domain.com  

-EmailAnalyze (Request Analyze Report) 
Any mail sent or forwarded by local/authenticated users to this username will be interpreted as a request for analyzing the mail. Do not put the full address here, just the user part. For example: assp-analyze  
Default: assp-analyze 

-EmailAnalyzeReply (Reply to Analyze Request) 
 
Default: SEND TO SENDER 

-EmailAnalyzeTo (Send Copy of Analyze-Reports) 
A copy of the Analyze-Report will be sent to this address. For example: admin@domain.com  

-DoAdditionalAnalyze (Spam and Ham Reports will trigger an additional Analyze Report ) 
Additional Analyze Report will be generated for Spam and Ham Reports. Setting the TO Address accordingly and choosing EmailAnalyzeTo will send the Analyze Report to the admin only.  

-EmailAllowEqualSign (Allow = in Addresses) 
Allow '=' in addresses to be whitelisted or redlisted.  

-NoHaiku (Legacy: Dont reply to messages to the Email Interface) 
Check this option to suppress all email reports
  Notes On Email Interface
    

------   File Paths   -----------------------------------------------

-base (Directory Base) 
All paths are relative to this folder.
  Note: Display only. 
Default: . 

-spamlog (Spam Collection) 
The folder to save the collection of spam emails. This directory will be used in building the spamdb. For example: spam 
Default: spam 

-notspamlog (Not-spam Collection) 
The folder to save the collection of not-spam emails. This directory will be used in building the spamdb. For example: notspam 
Default: notspam 

-incomingOkMail (OK Mail) 
The folder to save non-spam (message ok). These are messages which are considered as HAM, but are not stored in the standard HAM folder because of our policy to use only confirmed HAM messages (whitelisted or local) for SpamDB. If you want to keep copies of ok mail then put in a directory name. This directory will not be used in building the spamdb. 
Default: okmail 

-discarded (Discarded Spam) 
The folder to save discarded spam-messages. These are Spam messages which are not stored for building the spamdb but for resending with an EmailBlockReport. If you want to keep copies of discarded Spam then put in a directory name. 
Default: discarded 

-viruslog (Attachment/Virus Collection) 
The folder to save rejected attachments and virii. Leave this blank to not save these files (default). If you want to keep copies of rejected content then put in a directory name. Note: you must create the directory. This directory will not be used in building the spamdb. For example: quarantine 
Default: quarantine 

-correctedspam (False-negative Collection) 
Spam that got through -- counts double. This directory will be used in building the spamdb. For example: errors/spam 
Default: errors/spam 

-correctednotspam (False-positive Collection) 
Good mail that was listed as spam, count 4x. This directory will be used in building the spamdb. For example: errors/notspam 
Default: errors/notspam 

-resendmail (try to resend this files) 
ASSP will try to resend the files in this directory to the original recipient. The files must have the "maillogExt" extension and must have the SMTP-format. ASSP will try to send every  file up to ten times (with 5 minutes delay). If the resend fails ten times, the file will be renamed to *.err, on success the file will be deleted!
For example: resendmail. This requires an installed  module in PERL. 
Default: resendmail 

-maillogExt (Extension for Mail Files) 
Enter the file extension (include the period) you want appended to the mail files in the mail collections. For Example: .eml 
Default: .eml 

-spamdb (Spam Bayesian Database File) 
The output file from rebuildspamdb.pl. Last Run Rebuildspamdb 
Default: spamdb 

-whitelistdb (E&lt;!--get rid of google autofill--&gt;mail Whitelist Database File) 
The file with the whitelist.
  Write "mysql" to use a MySQL table instead of a local file, in this case you need to edit the MySQL parameters starting with myhost. 
Default: whitelist 

-redlistdb (E&lt;!--get rid of google autofill--&gt;mail Redlist Database File) 
The file with the redlist.

  Write "mysql" to use a MySQL table instead of a local file, in this case you need to edit MySQL parameters starting with myhost.The Redlist serves several purposes:
- the Redlist is a list of addresses that cannot contribute to the 
whitelist and which are not considered local even if their mail is 
from a local computer. For example, if someone goes on a vacation and 
turns on their autoresponder, put them on the redlist until 
they return. Then as they reply to every spam they receive they won't 
corrupt your non-spam collection or whitelist. There is also a redRe available where you can put some text from standard out of office messages, to automatically add a local user to the redlist when they send the out of office message, for example: \[autoreply\]
- Redlisted addresses will not be added to the Whitelist.
This is used by EmailWhiteRemovalToRed to prevent repeated adding to the whitelist.
So if somebody whitelisted ebay@ebay.com you will surely remove that from the whitelist, but you can also be sure, that somebody will add that address again. Putting ebay@ebay.com into the redlist will give that pause.
- Redlisted messages will not be stored in the 
SPAM/NOTSPAM-collection if DoNotCollectRedList and/or DoNotCollectRedRe is set.  
Default: redlist 

-ldaplistdb (LDAP/VRFY Cache) 
The file with the LDAP/VRFY-cache, see also LDAPShowDB and LDAPcrossCheckInterval. 
Default: ldaplist 

-ldapnotfounddb (LDAP/VRFY Not Found Cache) 
The file with the LDAP/VRFY-NotFound-Cache, see also LDAPShowNotFound. 
Default: ldapnotfound 

-delaydb (Delaying Database) 
The file with the delay database.Write "mysql" to use a MySQL table instead of a local file, in this case you need to edit the MySQL parameters starting with myhost. 
Default: delaydb 

-myhost (MySQL hostname or IP) 
You need <a
  href="http://search.cpan.org/~lds/Tie-DBI-1.02/lib/Tie/RDBM.pm"
  rel="external">Tie::RDBM to use MySQL instead of local files.
  This way you can share whitelistdb, delaydb and redlistdb between servers if "mysql" is written into their file-path.  

-mydb (MySQL database name) 
This database must exist before starting ASSP,
  necessary tables will be created automatically into this database  

-myuser (MySQL username) 
This user must have CREATE privilege on the configured database in order for tables to be created automatically  

-mypassword (MySQL password) 
  

-logfile (ASSP Logfile) 
Blank if you don't want a log file. Change it to maillog.log if you don't want auto rollover.
  NOTE: Changing this field requires restarting ASSP before changes take effect. 
Default: logs/maillog.txt 

-pidfile (PID File) 
Blank to skip writing a pid file. *nix users need pid files.
  Leave it blank in Windows. You have to restart the service before you get a pid file in the new location.Notes On File Path 
Default: pid 

------   Copy Spam/Ham   -----------------------------------------------

-sendAllSpam (Copy Spam and Send to this Address) 
ASSP will deliver a copy of spam emails to this address if the collection mode in the collection section is set to do so (eg. baysSpamLog ). For example: spammonitor@example.com. The address can be different depending on the recipient. The literal USERNAME (case sensitive) is replaced by the user part of the recipient, the literal DOMAIN (case sensitive) is replaced by the domain part of the recipient. For example: USERNAME@Spam.DOMAIN, USERNAME+Spam@DOMAIN, spammonitor@DOMAIN  

-ccSpamInDomain (Copy Spam and Send to this Address per Domain*) 
ASSP will deliver an additional copy of spam emails of a domain to this address - if the domain of the recipient-address is matched. For example: monitorspam@example1.com|monitor@example2.com.  

-sendAllDestination (Copy Spam SMTP Destination) 
Port to connect to when  Spam messages are copied. If blank they go to the main smtpDestination. eg "10.0.1.3:1025".  

-ccSpamFilter (Copy Spam to these Recipients Only*) 
Restricts Copy Spam to these recipients. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com).  

-ccSpamAlways (Copy Spam to these Recipients always*) 
Copy Spam to these recipients regardless of collection mode. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  Wildcards are supported (fribo*@example.com).  

-ccSpamNeverRe (Do Not Copy Spam Regular Expression*) 
Never Copy Spam regardless of collection mode. Put anything here to identify messages which should not be copied.  

-ccMaxScore (Do Not Copy Messages Above This MessageTotal score) 
Messages whose score exceeds this threshold will not be copied.  For example: 75  

-ccMaxBytes (Restrict Copy Spam to MaxBytes ) 
CCMail will cut off Spam mails, thereby reducing the load considerably (recommended). 
Default: On 

-spamSubjectCC (Prepend Spam Subject to Copied Spam) 
If set spamSubject gets prepended to the subject of the copied message.  

-spamTagCC (Prepend Spam Tag to Copied Spam) 
The check which caused the spam detection will be prepended to the subject of the message. For example: [DNSBL] 
Default: On 

-sendAllHamDestination (Copy HAM SMTP Destination) 
Port to connect to when  Ham messages are copied. If blank they go to sendAllDestination. eg "10.0.1.3:1025"  

-sendHamInbound (Copy Incoming Ham and Send to this Address) 
If you put an address in this box  ASSP will forward a copy of notspam messages from outside to this address. The literal USERNAME is replaced by the user part of the recipient, the literal DOMAIN is replaced by the domain part of the recipient. For example: archiv@example.com, USERNAME@mybackup.domain, catchallforthis@DOMAIN  

-sendHamOutbound (Copy Outgoing Ham and Send to this Address) 
If you put an address in this box ASSP will forward a copy of outgoing notspam messages to this address.  

-ccHamFilter (Copy Ham Filter*) 
Copy Not-Spam to these addresses only. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com).  

-ccnHamFilter (Do Not Copy Ham Filter*) 
Do Not Copy Ham to these addresses. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com).  

-ccMailReplaceRecpt (ccMail Recipient Replacement) 
The recipient replacement (ReplaceRecpt) rules from the "Recipients/Local Domains" section, will be used to replace ccMail recipients. For example: sendHamInbound = USERNAME@yourspamdomain.lan - in this case you are able to detect the target domain "yourspamdomain.lan" in a rule and you can replace the recipient/domain depending on its values and/or on the senders address.
Notes On CC Messages  

------   Collecting   -----------------------------------------------

-spamaddresses (Spam Collect Addresses* ) 
Mail to any of these addresses are always spam and will contribute to the spam-collection unless from someone on the whitelist. If you want to use invalid addresses readdress them using sendAllCollect. If sendAllCollect is empty sendAllSpam will be used. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Scoring is done  using saValencePB.  

-sendAllCollect (Catchall Address for Spam Collect Addresses) 
ASSP will readdress messages addressed to spamaddresses to this address.
  For example: collect@example.com  

-noCollecting (Do Not Collect Messages from/to these Addresses*) 
Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com).  

-UseSubjectsAsMaillogNames (Use Subject as Maillog Names) 
You can turn this on to help you manually identify mail in your spam and non-spam collections. Make sure that MaintBayesCollection is enabled. 
Default: On 

-MaxAllowedDups (Max Number of Duplicate File Names) 
The maximum number of logged files with the same filename (subject) that are stored in the spam folder (spamlog), if UseSubjectsAsMaillogNames is selected. A low value reduces the number of possibly duplicate mails, assuming that mails with the same subject will have the same content. A value of 0 disables this feature. If this number of files with the same filename is reached, new files will be stored in the discarded folder, which has to be defined ( in addition to spamlog ) for this feature to work. 
Default: 5 

-AllowedDupSubjectRe (Regular Expression to Allow Unlimited Duplicates *) 
Messages with subject matching this regular expression will be collected regardless of the setting in MaxAllowedDups .  

-MaxFileNameLength (Max Length of File Names) 
The maximum character count that is used from the mail subject to build the file name of the logged file, if UseSubjectsAsMaillogNames is selected. This could be usefull, if your mail clients having trouble to build the resend file name (right button - URL) correctly in block reports. Every non printable character will be replaced by a 4 byte string in this link. 
Default: 30 

-DoNotCollectRedRe (Do Not Collect RedRe Matching Mails) 
Mails matching redRe will not be stored in the collection folders. 
Default: On 

-DoNotCollectRedList (Do Not Collect Redlisted Mails) 
Mails matching  Redlist will not be stored in the collection folders.  

-KeepWhitelistedSpam (Do Not Delete Whitelisted Spams) 
Mails matching  Whitelist will not be deleted from the Spam folder.  

-DoNotCollectBounces (Do Not Collect Bounced Mails) 
Mails matching BounceSenders will not be collected. 
Default: On 

-NoMaillog (Dont Collect Mail) 
Check this if you're using Whitelist-Only and don't care to save mail to build the Bayesian database.  

-MaxFiles (Max Files) 
If you're not using subjects as file names (UseSubjectsAsMaillogNames), this is the maximum number of files to keep in each collection (spam and nonspam)
Files get a random number between 1 and MaxFiles. If you use  UseSubjectsAsMaillogNames rebuildspamdb will maintain the maximum number if MaintBayesCollection is on 
Default: 14000 

-MaxBytes (Max Bytes) 
How many bytes of the message will ASSP look at? Mails stored in the collecting folders will be truncated to this size. The average of Ham messages is 8K, the average of Spam messages is 4K. Usually the spam folder ( spamlog ) will be filled quicker than the notspam folder ( notspamlog ), so setting this value to 8000 will  produce more wordpairs per Ham Message. When both folders are close to the maxfiles limit, reduce it to 4000. 
Default: 8000 

-StoreCompleteMail (Store the Complete Mail) 
This feature is depreciated in ASSP V1. Use ASSP V2 for support of archival features. If set, ASSP will look at MaxBytes, but if possible it will store the complete mail. This could be usefull for example, if you want to resend blocked messages. Be carefull using this option, your disk could be filled up very fast!  

-baysNonSpamLog (OK Mail) 
Where to store non spam (message ok) messages. These are messages which are considered as HAM, but should not stored in the standard HAM folder because of our policy to use only confirmed HAM messages (whitelisted or local) for SpamDB. Set incomingOkMail accordingly if you choose 'okmail folder'. 
Default: okmail folder 

-NonSpamLog (Non Spam) 
Where to store whitelisted/local  non spam messages. 
Default: notspam folder 

-SpamLog (Store Spam) 
Set this to 'disabled' if you do not want to store any Spam regardless of settings in. Default: enabled (store in folder spamlog ). 
Default: enabled 

-noProcessingLog (NoProcessing OK Mails) 
Where to store noprocessing OK mails.  

-npAttachLog (NoProcessing rejected Attachments) 
Where to store noprocessing rejected mail+attachments.  

-wlAttachLog (Whitelisted rejected Attachments) 
Where to store whitelisted rejected mail+attachments.  

-extAttachLog (External rejected Attachments) 
Where to store external rejected mail+attachments.  

-SpamVirusLog (Virus Infected) 
Where to store virus infected messages.   

-spamBombLog (SpamBombs) 
Where to store spam bombs -> DoBombSenderRe, DoBombHeaderRe, DoBombRe. 
Default: discard folder and sendAllSpam 

-BlackReLog (Black Regular Expressions) 
Where to store Black Regular Expressions -> DoBlackRe. 
Default: spam folder and sendAllSpam 

-DoNotCollectBombs (Do not collect Spam Bombs detected during scoring modus) 
  

-scriptLog (Scripts - DoScriptRe) 
Where to store scripted messages. Default: spam folder ( spamlog ) and sendAllSpam 
Default: spam folder and sendAllSpam 

-blDomainLog (Blacklisted Domains - DoBlackDomain) 
Where to store blacklisted domain messages. 
Default: spam folder and sendAllSpam 

-spamHeloLog (Blacklisted Helos - useHeloBlacklist) 
Where to store spam helo messages. 
Default: discard folder and sendAllSpam 

-forgedHeloLog (Forged Helos - DoFakedLocalHelo) 
Where to store forged helo messages.  

-invalidHeloLog (Invalid Helos - DoInvalidFormatHelo) 
Where to store invalid helo messages. 
Default: discard folder and sendAllSpam 

-spamBucketLog (Spam Collect Addresses) 
Where to store emails addressed to Spam Collect Addresses. 
Default: spam folder 

-baysSpamLog (Bayesian Spams - DoBayesian) 
Where to store Bayesian spam messages. 
Default: discard folder and sendAllSpam 

-SPFFailLog (SPF Failures - ValidateSPF) 
Where to store SPF Failure spam messages. 
Default: spam folder and sendAllSpam 

-RBLFailLog (DNSBL Failures - ValidateRBL) 
Where to store DNSBL Failure spam messages. 
Default: spam folder and sendAllSpam 

-URIBLFailLog (URIBL Failures - ValidateURIBL) 
Where to store URIBL Failure spam messages. 
Default: spam folder and sendAllSpam 

-SRSFailLog (SRS Failures - EnableSRS) 
Where to store SRS Failure (not signed bounces) spam messages. 
Default: spam folder and sendAllSpam 

-spamPTRLog (Missing/Invalid Pointer - DoPTRCheck) 
Where to store Missing/Invalid Pointer rejected messages. 
Default: spam folder and sendAllSpam 

-spamMXALog (Missing MX/A Record - DoMXACheck) 
Where to store Missing MX record rejected messages. 
Default: spam folder and sendAllSpam 

-spamISLog (Invalid Local Sender - DoNoValidLocalSender) 
Where to store messages from a local domain with an unknown userpart.  

-spamSBLog (Blocked Country - DoCountryBlocking, DoOrgBlocking) 
Where to store messages from a blocked country. 
Default: spam folder and sendAllSpam 

-spamMSLog (Message Limit Blocks - DoPenaltyMessage) 
Where to store Message Scoring Limit rejected messages.  
Default: spam folder and sendAllSpam 

-spamPBLog (PenaltyBox Blocks - DoPenalty) 
Where to store PB rejected messages. 
Default: spam folder and sendAllSpam 

-spamDenyLog (Denied IP numbers - DoDenySMTP) 
Where to store IP denied  messages.  
Default: discard folder and sendAllSpam 

-BackLog (Backscatter check failed) 
Where to store FBMTV rejected messages.  
Default: discard folder 

-freqNonSpam (Non Spam Collection Frequency) 
Store every n'th non spam message. If you set the value to 10 then every 10th message is logged. These frequency settings are for ASSP users with a mature installation who experience heavy mail or spam volumes. Enter a larger value if the non spam corpus is being refreshed too quickly. 
Default: 1 

-freqSpam (Spam Collection Frequency) 
Store every n'th spam message. The same as for non spam but helps prevent spam corpuses being skewed by flooding. It is recommended that this be set depending on spam volume. Notes On Collecting 
Default: 1 

------   Logging   -----------------------------------------------

-FilterLogging (Logging for filters are located in their section) 
Attachment ( AttachmentLog )
Bayesian ( BayesianLog )
Bomb ( BombLog )
Connections ( ConnectionLog )
Deny SMTP Connections ( denySMTPLog )
DNSBL ( RBLLog )
Greylisting/Delaying ( DelayLog )
LDAP ( LDAPLog )
Maintenance ( MaintenanceLog )
Message Scoring ( MessageLog )
Message-ID signing ( MSGIDsigLog )
PenaltyBox Extreme ( PenaltyExtremeLog )
PenaltyBox ( PenaltyLog )
Relay ( RelayLog ) 
Report ( ReportLog )
RWL ( RWLLog )
SenderBase ( SenderBaseLog )
Session Limit (SessionLog )
SPF ( SPFLog )
SSL ( SSLLog )
Trap ( TrapLog )
URIBL ( URIBLLog )
User Validation ( ValidateUserLog )
Validate Helo ( ValidateHeloLog )
Validate Sender ( ValidateSenderLog )
Virus Check ( ScanLog )
VRFY ( VRFYLog )  
Default: On 

-Notify (Notification Email To) 
Email address(es) to which you want ASSP to send a notification email, if a matching log entry ( NotifyRe , NoNotifyRe ) is found. Separate multiple entries by "|". This requires an installed  module in PERL.  

-NotifyRe (Do Notify, if log entry matches*) 
Regular Expression to identify loglines for which a notification message should be send.
  usefull entries are:

  autoupdate: - to get informed about an autoupdate of the running script
  adminupdate: - for config changes
  admininfo: - for admin information
  option list file: - for option file reload
  error: - for any error
  restart - to detect a ASSP restart
  Admin connection - for GUI logon
  You may define a comma separated list (after '=>') of recipients in every line, this will override the default recipient defined in 'Notify'. For example: adminupdate=>user1@yourdomain.com,user2@yourdomain.com.
  As third parameter after a second ('=>') you can define the subject line for the notification message.
  for example: adminupdate:=>user1@yourdomain.com,user2@yourdomain.com=>configuration was changed
  or: adminupdate:=>=>configuration was changed.  

-NoNotifyRe (Do NOT Notify, if log entry matches*) 
Regular Expression to identify loglines for which no notification message should be send.  

-noLog (Dont Log these IPs*) 
Enter IP addresses that you don't want to be logged, separated by pipes (|).
  This can be IP address of the SMTP service monitoring agent. For example: 145.145.145.145|145.146.  

-noLogRe (Regular Expression to Identify NoLog-Mails*) 
Put anything here to identify mails that you don't want to be logged.  

-noLogLineRe (Regular Expression to Suppress Log-Messages*) 
Put anything here to identify log messages that you want to be suppressed. For example: max errors|collect 
Default: max errors|collect 

-allLogRe (Regular Expression to Identify Messages from/to Problematic Addresses *) 
Put anything here to identify mails from/to addresses you want to look at for problem solving. Mails identified will also be set to StoreCompleteMail.  

-subjectStart (Subject Start Delimiter) 
Start delimiter of subject in log  
Default: [ 

-subjectEnd (Subject End Delimiter) 
End delimiter of subject in log 
Default: ] 

-regexLogging (Regex Match logging) 
Show matching regex in log.   

-ipmatchLogging (IP Matches Logging) 
Enables logging of IP addresses matches in the maillog. Will show a comment instead of the range if there is text after the IP ranges (and before any numbersign)  eg. 182.82.10.0/24 AOL  

-slmatchLogging (Logging Address Matches) 
Enables logging of address matches in the maillog.  

-uniqueIDPrefix (Prepend Unique ID logging) 
Prepend ID. For example: m1- 
Default: m- 

-tagLogging (Spam Tag Logging) 
Add spam tag to log. 
Default: On 

-ExceptionLogging (Timeout Exception Logging) 
  

-replyLogging (SMTP Status Code Reply Logging) 
  

-expandedLogging (Logging Records include IP &amp; MailFrom) 
 
Default: On 

-sysLog (SYSLOG Centralized Logging) 
Enables logging to UNIX Syslog. Needs Sys::Syslog for local (UNIX/LINUX) logging or Net::Syslog for Windows or Network logging.  

-sysLogPort (Syslog Port (UDP)) 
Port for Syslog logging with Net::Syslog. 
Default: 514 

-SysLogFac (Syslog Facility) 
Syslog Facility. Valid are kern, user, mail, daemon, auth, syslog, lpr, news, uucp, cron, authpriv, ftp, local0, local1, local2, local3, local4, local5, local6 
Default: mail 

-sysLogIp (Syslog IP) 
IP Address of your Syslog Daemon for Syslog logging with Net::Syslog. 
Default: 127.0.0.1 

-asspLog (ASSP local logging) 
ASSP manages local logging. The logs  inside the directory where ASSP is installed. This is needed if you want to use any of the "Block Reporting" and "View Maillog Tail" features like searching, deleting, moving, resending of messages. 
Default: On 

-LogRollDays (Roll the Logfile How Often?) 
ASSP closes and renames the log file after this number of days. 
Default: 1 

-MaxLogAge (Max Age of Logfiles) 
The maximum file age in days of logfiles. If a logfile is older than this number in days, the file will be deleted. A value of 0 disables this feature and no logfile will be deleted because of its age. 
Default: 60 

-LogNameMMDD (No Year in LogName) 
The standard name for the logfile is YY-MM-DD.maillog.txt, use this option to set it to MM-DD.maillog.txt  

-LogDateFormat (Date/Time Format in LogDate) 
Use this option to set the logdate. The default value is 'MMM-DD-YY hh:mm:ss'. The following (case sensitive !) replacements will be done:
 YYYY - year four digits
 YY - year two digits
 MMM - month three characters - like Oct Nov Dec
 MM - month numeric two digits
 DDD - day three characters - like Mon Tue Fri
 DD - day numeric two digits
 hh - hour two digits
 mm - minute two digits
 ss - second two digits
 A value has to be defined for every part of the date/time. Allowed separators in date part are '_ -.' - in time part '-_.:' . 
Default: MMM-DD-YY hh:mm:ss 

-LogDateLang (Date/Time Language) 
Select the language for the day and month if LogDateFormat contains DDD and/or MMM.  

-enableWORS (Windows Output Record Separator) 
Checked means write CRLF to the end of the logfile instead of the standard LF. This can only be used if LogCharset is set to 'System Default'.  

-silentmode (Silent Mode) 
Checked means don't print log messages to the console.   

-debug (General Debug Mode) 
Checked sends debugging info to a .dbg file.
  Leave this unchecked unless there is a program error you are trying to track down.  

-DebugRollTime (Roll the Debugfile How Often?) 
ASSP closes and opens a new debug file after this number of seconds. 
Default: 1800 

-Win32Debug (Win32 OutputDebugString) 
Make Win32 OutputDebugString available. Needs Win32::API::OutputDebugString  

-IgnoreMIMEErrors (Ignore MIME Errors) 
Errors, based on wrong email MIME contents, will not be written to log! 
Default: On 

-ConTimeOutDebug (Connection Timeout Debug Mode) 
Select to debug SMTP connections that are running into timeout!  

-RegExLength (RegEx Length in Log) 
Defines how many bytes of a matching Regular Expression will be shown in the log
  Some matching Regular Expressions are too long for one line. Default: 32 
Default: 32 

-sendNoopInfo (Send NOOP Info) 
Checked means you want ASSP to send a "NOOP Connection from $ip" message to your SMTP server.
  
  Notes On Logging
    

------   LDAP Setup    -----------------------------------------------

-LDAPLog (Enable LDAP logging) 
 
Default: standard 

-DoLDAP (Do LDAP lookup for valid local addresses ) 
Check local addresses against an LDAP database before accepting the message.Note: Checking this requires filling in the other LDAP parameters like LDAPHost.This requires an installed  module in PERL.  

-LDAPHost (LDAP Host(s) ) 
Enter the DNS-name(s) or IP address(es) of the server(s) that run(s) the  database. Second entry is backup. For example: localhost. Separate entries with pipes: LDAP-1.domain.com|LDAP-2.domain.com 
Default: localhost 

-LDAPtimeout (LDAP Query Timeout) 
Timeout when connecting to the remote server. 
Default: 15 

-LDAPLogin (LDAP Login) 
Most LDAP servers require a login and password before they allow queries.Enter the DN specification for a user with sufficient permissions here.For example: cn=Administrator,cn=Users,DC=yourcompany,DC=com  

-LDAPPassword (LDAP Password) 
Enter the password for the specified LDAP login here.  

-LDAPVersion (LDAP Version) 
Enter the version for the specified LDAP here. 
Default: 3 

-ldLDAPRoot (LDAP Root container for Local Domains) 
The LDAP lookup will use this container and all sub-containers to match the local domain query.The literal DOMAIN is replaced by the domain part of SMTP recipient (eg. domain.com) during the search.For example: DC=yourcompany,DC=com.If you use DOMAIN here, you must check "LDAP failures return false" below or non local domains will be treated as local. If not defined, LDAPRoot will be used.  

-ldLDAPFilter (LDAP Filter for Local Domains) 
This filter is used to query the LDAP database. This strongly depends on the LDAP structure.The filter must return an entry if the domain must be relayed.The literal DOMAIN (case sensitive) will be replaced by the domain name during the search.  

-LDAPRoot (LDAP Root container for Local Addresses) 
The LDAP lookup will use this container and all sub-containers to match the local email address query.The literal DOMAIN is replaced by the domain part of SMTP recipient (eg. domain.com) during the search.For example: DC=yourcompany,DC=com.If you use DOMAIN here, you must check "LDAP failures return false" below or non local domains will be treated as local.  

-LDAPFilter (LDAP Filter for Local Addresses) 
This filter is used to query the LDAP database. This strongly depends on the LDAP structure.The filter must return an entry if the recipient address matches with that of any user.The literal EMAILADDRESS is replaced by the fully qualified SMTP recipient (eg. user@example.com) during the search.The literal USERNAME (case sensitive) is replaced by the user part of SMTP recipient (eg. user) during the search.The literal DOMAIN (case sensitive) is replaced by the domain part of SMTP recipient (eg. domain.com) during the search.For example: (proxyaddresses=smtp:EMAILADDRESS) or (|(mail=EMAILADDRESS)(mailaddress=EMAILADDRESS))  

-LDAPcrossCheckInterval (Clean Up local LDAP Database) 
Delete outdated entries from the LDAP cache. Crosscheck LDAP cache to LDAP server and delete not existing entries.
  Note: the current timeout must expire before the new setting is loaded, or you can restart.
  Defaults to 24 hours. Is only used, if ldaplistdb is defined in the filepath section. 
Default: 24 

-forceLDAPcrossCheck (force to run LDAP/VRFY-CrossCheck - now.) 
ASSP will force to run a LDAP/VRFY-CrossCheck now!&nbsp;  

-LDAPShowDB (Show local LDAP/VRFY Database) 
The directory/file with the LDAP/VRFY 'found' file. If you change ldaplistdb in section Filepath you must change it here too. 
Default: file:ldaplist 

-LDAPShowNotFound (Show LDAP/VRFY Not Found Cache) 
The directory/file with the LDAP/VRFY 'not found' file. If you change ldapnotfounddb in section Filepath you must change it here too. 
Default: file:ldapnotfound 

-MaxLDAPlistDays (Max LDAP/VRFY cache Days) 
This is the number of days an address will be kept on the local LDAP cache without any email to this address. 0 disables the cache. 
Default: 90 

-LDAPFail (LDAP failures return false) 
LDAP failures return false when an error occurs in LDAP lookups.Notes On LDAP   

------   Backscatter Detection   -----------------------------------------------

-DoMSGIDsig (Do Message-ID Signing) 
If activated, the message-ID of each outgoing message will be signed with an unique Tag and every incoming mail from BounceSenders will be checked against this. This tagging is called FBMTV for "FBs Message-ID Tag Validation" and is worldwide unique to ASSP. This tag will be removed from any incoming email, to recover the original references in the mail header. Scoring is done  with msigValencePB, testmode is set with sigTestMode. 
  This check requires an installed  module in Perl. 
Default: score 

-MSGIDsigLog (Enable Message-ID signing logging) 
 
Default: standard 

-MSGIDpreTag (Message-ID pre-Tag for MSGID-TAG-generation) 
To use Message-ID signing and to create the MSGID-Tags, a pre-Tag is needed. This Tag must be 2-5 characters [a-z,A-Z,0-9] long. 
Default: assp 

-MSGIDSec (Message-ID Secrets for MSGID-TAG-generation*) 
To use Message-ID signing and to generate the MSGID-Tags, at least one secret key is needed, up to ten are possible.
  The notation is : generationnumber[0-9]=secretKey. Multiple paires are separated by pipes (|). Do not define spaces, tabs and '=' as part of the keys(secrets)! 
Default: 0=fbmtv 

-MSGIDsigAddresses (Do MSGID-Signing For These Addresses Only* ) 
Only messages from any of these addresses will be tagged and checked by FBMTV. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com). If empty FBMTV is done for all addresses.  

-noMSGIDsigRe (Skip Message-ID signing, mail content dependend*) 
Use this to skip the Message-ID tagging depending on the content of the email. If the content of the email matches this regular expression (checking MaxBytes only), FBMTV will not be done. For example: 'I am out of office' . 
Default: out of officeI|on leave 

-noRedMSGIDsig (Skip Message-ID signing for Redlisted mails) 
If selected, FBMTV will not be done for redlisted emails!  

-DoBackSctr (Do DNS-Backscatter Detection) 
If activated, the IP-address of each message received for null sender,bounced or postmaster will be checked against the list below.
   DNS base checks requires an installed  module in Perl.
   For more information about backscatter detection please read .  

-BacksctrLog (Enable DNS-Backscatter detection logging) 
 
Default: standard 

-BackDNSInterval (Backscatter-DNS Cache Refresh Interval) 
IP's in cache will be removed after this interval in days. 0 will disable the cache.  
Default: 7 

-BackSctrServiceProvider (ServiceProvider for Backscatterer Detection*) 
ServiceProvider for DNS check on Backscatterer. Possible value is ips.backscatterer.org for DNS check.The following configurations are valid for all Backscatter Detection Options! 
Default: ips.backscatterer.org 

-Back250OKISP (Send 250 OK if Backscatter Detection fails) 
If Backscatter check fails for a bounced mail , ASSP will send "250 OK" , but will discard the mail, if the check is configured to block! 'To ISP' means sender in ispip.  
Default: To ISP 

-BackWL (Backscatter Detection checks Whitelisted mail) 
Tagging will be always done, if not excluded by address or domain!  

-BackNP (Backscatter Detection checks NoProcessing mail) 
Tagging will be always done, if not excluded by address or domain!  

-noBackSctrRe (Regular Expression to Skip all BackScatter Checks*) 
If the content of a mail matches these regular expressions, all BackScatter checks will be skipped.  

-noBackSctrAddresses (Do not Backscatter detection for these Addresses * ) 
Mail to and from any of these addresses will not be tagged and checked by the backscatter option. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com).  

-noBackSctrIP (Exclude these IP numbers from any Backscatter detection*) 
Enter IP numbers that you want to exclude from FBMTV, separated by pipes (|). 
  Notes On Backscatter Detection  

------   DNS Setup   -----------------------------------------------

-UseLocalDNS (Use System Default DNS) 
Use system default DNS Name Servers. 
Default: On 

-DNSResponseLog (Show DNS Name Servers Response Time in Log) 
You can use this to arrange DNSServers for better performance. Put the fastest first.  

-DNSServers (Overwrite Domain Name Servers*) 
 Note: UseLocalDNS must be disabled.  

-DNStimeout (DNS Query Timeout) 
Global DNS Query Timeout for DNSBL, RWL, URIBL, PTR, SPF, MX and A record lookups. 
Default: 5 

-DNSretry (DNS Query Retry) 
Global DNS Query Retry. Set the number of times to try the query. 
Default: 1 

-DNSretrans (DNS Query Retrans) 
Global DNS Query Retransmission Interval. Set the retransmission interval. 
  Notes On DNS Setup 
Default: 3 

------   SSL/TLS    -----------------------------------------------

-enableSSL (Enable SSL/TLS support) 
For SSL to be enabled, check this box and enter the paths to your SSL Certificate and SSL Key files, below. If you do not have valid certificates, you may generate both files online with !.
NOTE: Changing this  requires ASSP restartf  

-SSLLog (Enable SSL logging) 
 
Default: standard 

-noTLSIP (Exclude these IP numbers from SSL/TLS*) 
Enter IP numbers that you want to exclude from starting SSL/TLS. For example, put all IP numbers here, which have trouble to switch to TLS every time (effectively preventing ASSP from getting mails from these hosts). 
Default: file:files/notls.txt 

-disableSSL25 (Disable SSL/TLS support on port 25) 
  

-SSLRetryOnError (Retry TLS on &quot;SSL want a read first&quot; error) 
If selected, ASSP retries 3 times to establish a TLS connection, if the peer was not ready after STARTTLS because of a "SSL want a read/write first" error. 
Default: On 

-SSLtimeout (SSL Timeout (0-999)) 
SSL/TLS negotiation will timeout after this many seconds. 
Default: 10 

-SSLCacheExp (TLS Error Cache Refresh Interval) 
If a connection fails with 'TSL negotiation with client failed' or 'Connection idle .. timeout' the connecting IP will be stored into this cache. ASSP will not offer STARTTLS to IP numbers in the error cache. The entry will be removed after this interval in hours. 0 will disable the error cache.   
Default: 24 

-SSLCertFile (SSL Certificate File (PEM format)) 
Full path to the file containing the server's SSL certificate, for example : /usr/local/etc/ssl/certs/assp-cert.pem.  A general cert.pem file is already provided in './certs/server-cert.pem'. For defining any full filepathes, always use slashes ('/') not backslashes. 
Default: ./certs/server-cert.pem 

-SSLKeyFile (SSL Key File (PEM format)) 
Full path to the file containing the server's SSL key, for example: /usr/local/etc/ssl/certs/assp-key.pem. A general key.pem file is already provided in './certs/server-key.pem'.Notes On SSL Setup 
Default: ./certs/server-key.pem 

------   Automatic Update / Restart   -----------------------------------------------

-NoMultipleASSPs (Prevent Multiple ASSP Processes) 
If set, ASSP will try to find out, if it is already running. 
Default: On 

-AutoUpdateASSP (Auto Update the Running Script (assp.pl)) 
No action will be done if 'no auto update' is selected. You'll get a hint in the GUI (top) and a log line will be written, if a new version is availabe at the dolwnload location.
  If 'download only' is selected and a new assp version is available, this new version will be downloaded to the directory /Applications/assp/download (assp.pl) and the syntax will be checked. The still running script will be saved version numbered to the download directory.
  If 'download and install' is selected, in addition the still running script will be replaced by the new version.
  Configure ( AutoRestartAfterCodeChange ), if you want the new version to become the active running script.
  The perl module  is required to use this feature.   

-AutoUpdateASSPDev (AutoUpdate with Developer Version) 
  

-AutoUpdateNow (Run Auto Update Now) 
If selected, ASSP will run Auto Update. &nbsp;  

-ForceRestartAfterCodeChange (Enforce Termination on new or changed assp.pl Script) 
ASSP will terminate even if AutoRestartCmd is not configured. This is only useful if you run ASSP inside an external loop.  

-AutoRestartAfterCodeChange (Automatic Restart ASSP on new or changed assp.pl Script) 
If selected, ASSP will restart it self, if it detects a new or changed running script. An automatic restart will be done only, if ASSP as daemon on linux/MAC ( AsADaemon ) or as a service on windows or AutoRestartCmd is configured. Leave this field empty to disable the feature. Possible values are 'immed and 1...23' . If set to 'immed', assp will restart within some seconds after a detected code change. If set to '1...23' the restart will be scheduled to that hour. A restart at 00:00 is not supported.  

-AutoRestart (Automatic Restart after Exception) 
If ASSP detects a main exception and a AutoRestartCmd, it will try to restart itself.  
Default: On 

-MainloopTimeout (Mainloop Timeout) 
Mainloop will timeout after this many seconds. 
Default: 180 

-AutoRestartAfterTimeOut (Automatic Restart after Timeout) 
If ASSP detects a mainloop timeout and a AutoRestartCmd is configured, it will try to restart itself.   

-AutoRestartCmd (OS-shell command for AutoRestart) 
The OS level shell-command that is used to autorestart ASSP, if it runs not as a service. A possible value for your system is:"perl" "/Applications/assp\assp.pl" "/Applications/assp" &If you run ASSP as a daemon you may use something like '/etc/init.d/assp restart'. Put a dummy command here 'cd .', if ASSP runs inside an external loop. If you use runAsUser make sure to start ASSP with Root Privileges.  

-AutoRestartInterval (Restart Interval) 
ASSP will automatically terminate and restart after this many hours. Use this setting to periodically reload configuration data, combat potential memory leaks, or perform shutdown/startup processes. This will only work properly if ASSP runs as a Windows service or AutoRestartCmd is configured..  

------   Server Setup   -----------------------------------------------

-MaintenanceLog (Enable Maintenance logging) 
 
Default: standard 

-ConsoleCharset (Charset for STDOUT and STDERR) 
Set the characterset for the console output to your local needs. Default is "System Default" - no conversion. Restart is required!  

-LogCharset (Charset for Maillog) 
Set the characterset/codepage for the maillog output to your local needs. Default (and best) on non Windows systems is "UTF-8" if available or "System Default" - no conversion. On Windows systems set it to your local codepage or UTF-8 (chcp 65001). To display nonASCII characters in the subject line and maillog files names setup decodeMIME2UTF8 . Restart is required! 
Default: utf-8-strict 

-decodeMIME2UTF8 (Decode MIME Words To UTF-8) 
If selected, ASSP decodes MIME encoded words to UTF8. This enables support for national languages to be used in Bombs , Scripts , Spamdb , Logging. If not selected, only US-ASCII characters will be used for this functions. This requires an installed  module in PERL. 
Default: On 

-AsAService (Run ASSP as a Windows Service) 
In Windows NT/2000/XP/2003 ASSP can be installed as a service. This setting tells ASSP that this has been done -- it does not install the Windows service for you. Installing ASSP as a service requires several steps which are detailed in the  requires ASSP restart  

-AsADaemon (Run ASSP as a Daemon) 
In Linux/BSD/Unix/OSX fork and close file handles. Similar to the command "perl assp.pl &amp;", but better.
   requires ASSP restart  

-runAsUser (Run as UID) 
The *nix user name to assume after startup (*nix only).Examples: assp, nobody
   requires ASSP restart  

-runAsGroup (Run as GID) 
The *nix group to assume after startup (*nix only).Examples: assp, nobody
   requires ASSP restart  

-ChangeRoot (Change Root) 
The new root directory to which ASSP should chroot (*nix only). If blank, no chroot jail will be used. Note: if you use this feature, be sure to copy or link the etc/protocols file in your chroot jail.
   requires ASSP restart  

-setFilePermOnStart (Set ASSP File Permission on Startup) 
If set, ASSP sets the permission of all ASSP- files and directories at startup to full (0777)!  

-myName (My Name) 
ASSP will identify itself by this name in the email "Received:" header and in the helo when sending report-replies. Usually the fully qualified domain name of the host.Examples: assp.example.com 
Default: ASSP.nospam 

-myHelo (My Helo) 
How ASSP will identify itself when connecting to the target MTA. 
transparent - the Helo of the sender will be used
use myName - myName will be used
use Hostname - name of host assp is running on, should be a fully qualified FQDN 
Default: use myName 

-asspCfg (assp.cfg) 
For internal use only : assp.cfg file. 
Default: file:assp.cfg 

-AutoReloadCfg (Automatic Reload ConfigFile) 
If selected and the assp.cfg file is changed externaly, ASSP will reload the configuration from the file.  

-asspCfgVersion (assp.cfg version) 
This is the current assp.cfg version.  

-proxyserver (Proxy Server) 
The Proxy Server to use when uploading global statistics and downloading the greylist.Examples: 192.168.0.1:8080, 192.168.0.1  

-proxyuser (Proxy User) 
The Proxy-UserName that is used to authenticate to the proxy.  

-proxypass (Proxy Password) 
The password for Proxy-UserName that is used to authenticate to the proxy.  

-OutgoingBufSizeNew (Size of TCP/IP Buffer) 
If ASSP talks to the internet over a modem change this to 4096. 
Default: 10240000 

-webAdminPort (Web Admin Port) 
The port on which ASSP will listen for http connections to the web administration interface. If you change this, after you click Apply you must change the URL on your browser to reconnect. You may also supply an IP address to limit connections to a specific interface.Examples: 55555, 192.168.0.5:12345 
Default: 55555 

-webAdminPassword (Web Admin Password) 
The password for the web administration interface (minimum of 5 characters, max 8 characters will be used). 
Default: nospam4me 

-allowAdminConnectionsFrom (Allow Admin Connections From These IPs*) 
An optional list of IP addresses from which you will accept web admin connections. Blank means accept connections from any IP address. Note: if you make a mistake here, you may disable your web administration interface and be forced to manually edit your configuration file to fix it.Examples:
  127.0.0.1|172.16.  

-allowAdminConnectionsFromName (Allow Admin Connections From These Hostnames) 
An optional additional list of Hostnames from which you will accept web admin connections. Blank means accept connections from any IP address in allowAdminConnectionsFrom or any connection if nothing is set there. Note: if you make a mistake here, you may disable your web administration interface and be forced to manually edit your configuration file to fix it.Examples:
 localhost  

-webStatPort (Raw Statistics Port) 
The port on which ASSP will listen for http connections to the statistics interface. You may also supply an IP address to limit connections to a specific interface.Examples: 55553, 192.168.0.5:12345 
Default: 55553 

-allowStatConnectionsFrom (Only Allow Raw Statistics Connections From*) 
An optional list of IP addresses from which you will accept raw statistical connections. Blank means accept connections from any IP address. Examples:
127.0.0.1|172.16. 
Default: 127.0.0.1 

-CleanCacheEvery (Cache Cleaning Interval) 
This period (in hours) determines how frequently ASSP does cache-housekeeping. 
Default: 3 

-SaveStatsEvery (Statistics Save Interval) 
This period (in minutes) determines how frequently ASSP statistics are written to a local file.  

-totalizeSpamStats (Upload Consolidated Spam Statistics) 
ASSP will upload its statistics to be consolidated with the global ASSP totals. Please do not disable it unless you have a good reason to do so. No private information is being disclosed by this upload. 
Default: On 

-ReloadOptionFiles (Reload Option Files Interval) 
If set not to zero, ASSP reloads configuration option files (file:.....) every this many seconds if they have changed externally. 
Default: 60 

-OrderedTieHashTableSize (Ordered-Tie Hash Table Size) 
The number of entries allowed in the hash tables used by ASSP and rebuildspamdb.pl. Larger numbers require more more RAM but result in fewer disk hits. The default value is 10000. Adjust down to use less RAM. 
Default: 5000 

-EnableHTTPCompression (Enable HTTP Compression in GUI) 
Enable HTTP Compression for faster web administration interface loading. The perl module  is required to use this feature.  

-hideAlphaIndex (Hide the Alpha Index Menu Panel in GUI) 
Removes the alphanumeric index panel on the left side in the GUI, but the index is accessable by clicking on "Index".  

-IndexSlideSpeed (Sliding Speed of the Alpha Index Menu Panel in GUI) 
Adjust the sliding speed of the Alpha Index Menu Panel in GUI to your needs. 
Default: normal 

-EnableFloatingMenu (Enable Floating Menu Panel in GUI) 
Allow the menu panel on the web administration interface to float (floating Div code taken from ).  

-RememberGUIPos (Remember the last GUI position) 
If selected, the GUI will remember the last topic of the main menu, that had the focus, was changed, that where jumped to or that where clicked on. 
Default: On 

-EnableInternalNamesInDesc (Show Internal Names in the GUI) 
Show the internal names in the web interface. The internal names are used in the configuration file (assp.cfg), in the application code, and in the menu bar on the left side of the GUI. 
Default: On 

-MaillogTailJump (Jump to the End of the Maillog) 
Causes the browser window to jump to the bottom of the maillog instead of sitting at the top of the display.  

-MaillogTailBytes (Maillog Tail Bytes) 
The number of bytes that will be shown when the end of the maillog is viewed. The default value is 10000. 
Default: 10000 

-MaillogTailWrap (Maillog Tail Wrap) 
Force maillog lines to wrap if there are too many characters in a line to fit into the window-width.  
Default: On 

-MaillogTailOrder (Maillog Tail Order) 
Reverse the time order of line   

-MaillogTailColorLine (Maillog Tail Color Line) 
Color alternate lines .  
Default: On 

-ALARMtimeout (Module Call Timeout) 
Global Timeout for calling other modules. 
Default: 10 

-UseLocalTime (Use Local Time) 
Use local time and timezone offset rather than UTC time in the mail headers.
  Notes On Server Setup 
Default: On 

------   Rebuild SpamDB / GrIP   -----------------------------------------------

-AutoUpdateREBUILD (Auto Update rebuildspamdb.pl) 
No action will be done if 'no auto update' is selected or AutoUpdateASSP is disabled.
  If 'download only' is selected and a new assp version is available, the newest rebuildspamdb.pl will be downloaded to the directory /Applications/assp/download .
  If 'download and install' is selected, the old rebuildspamdb.pl will be saved to download directory (rebuildspamdb.pl_old) and replaced by the new version.

  The perl module  is required to use this feature. 
Default: download and install 

-RebuildSchedule (Schedule time for RebuildSpamdb) 
If not set to 0 ASSP uses scheduled hours to run RebuildSpamdb.pl. For example '6|18' will run rebuildspamdb.pl at 6.00 and 18.00. Use 24 to run it at midnight. '*' will run it every hour.   
Default: 4 

-RebuildCmd (OS-shell command for AutoRestart) 
The OS level shell-command that is used to start rebuildspamdb.pl, if it runs not as a separate task. The default value for your system is:"perl" "/Applications/assp/rebuildspamdb.pl" "/Applications/assp" silent &You may overwrite it with your own script. Note that the parm 'silent' must be used.  

-RebuildNow (Run RebuildSpamdb Now) 
If selected, ASSP will run RebuildSpamdb.pl now. &nbsp;  

-RebuildNotify (Notification Email To) 
Email address(es) to which you want ASSP to send a notification email after the rebuild task is finished. Separate multiple entries by "|". If empty no notify will take place. This requires an installed  module in PERL.  

-autoCorrectCorpus (Automatic Corpus Correction) 
(Syntax: a.a[a]-b.b[b]-cccc-dd or empty - default is "0.5-1.5-10000-14") If the 
corpus norm (the weight between spamwords/hamwords) is less than "a" (0.5 
- too much ham) or greater than "b" (1.5 - too much spam), assp will 
delete the excess (oldest) files from the corresponding folder ( spamlog , 
notspamlog ). ASSP will keep a minimum of "c" (10000) files in the folder 
and will never delete files that are younger than "d" days. This cleanup 
will run at the end of the rebuildspamdb task. So the corrected file 
corpus will take effect at the next rebuildspamdb! 
Default: 0.5-1.5-10000-14 

-griplist (GReyIPlist Database) 
The file with the current GRey-IP-List  database -- make this blank if you don't use it. 
Default: griplist 

-noGriplist (Dont Upload/Download Griplist) 
Check this to disable the Griplist upload/down when rebuildspamdb runs. The Griplist contains IP numbers and their value between 0 and 1, lower is less spammy, higher is more spammy. This value is called the grip value.   

-noGRIP (Dont do Griplist for these IPs* ) 
Enter IP numbers that you don't want to get gripvalues from. For example:145.145.145.145|145.146. 
Default: nogrip.txt 

-DoFullGripDownload (Full Griplist Download Period) 
The Global Griplist is downloaded once in full, then only deltas are downloaded each day subsequently.  This option forces a new full download after this many days.  Leave it blank to not force new full downloads. Recommended: 30 days. 
Default: 30 

-MaintBayesCollection (Maintenance for Bayesian Collection) 
Set this to on if you want ASSP to run maintenance tasks on the bayesian
collection folders ( spamlog , notspamlog ). ASSP will delete the oldest
files until the number of files per folder reaches MaxFiles. 
This option will keep
the files in the collection folders from growing indefinitely.  
Default: On 

-MaxNoBayesFileAge (Max Age of non Bayes Files) 
The maximum file age in days of every file in every non bayesian collection folder ( incomingOkMail , discarded , viruslog ). If defined and a file is older than this number in days, the file will be deleted.  
Default: 31 

-MaxKeepDeleted (Max Days of Keep Deleted) 
The maximum number in days deleted files in the bayesian collection folders ( spamlog , notspamlog ) will be kept. This is necessary when EmailBlockReport is used to handle the file and the file is meanwhile deleted. The list of files that are maked for deletion is stored in trashlist.db . 
Default: 7 

-MaxCorrectedDays (Max Corrected File Age) 
This is the number of days a error report will be kept in the correctednotspam and correctedspam folders.
  Notes On Rebuild  
Default: 1000 

------   POP3 Collecting   -----------------------------------------------

-POP3ConfigFile (POP3 Configuration File*) 
The file with a valid POP3 configuration. Only the file: option is allowed to use. 
  If the file exists and contains at least one valid POP3 configuration line and POP3Interval is configured, assp will collect the messages from the configured POP3-servers. 
  Each line in the config file contains one configuration for one user.
  All spaces will be removed from each line.
  Anything behind a # or ; is consider a comment.
  If the same POP3-user-name is used mutiple times, put two angles with a unique number behind the user name. The angles and the number will be removed while processing the configuration.
  e.g: pop3user<1> will result in pop3user  -  or  - myName@pop3.domain<12> will result in myName@pop3.domain
  It is possible to define commonly used parameters in a separate line, which begins with the case sensitive POP3-username "COMMON:=" - followed by the parameters that should be used for every configured user.
  A commonly set parameter could be overwritten in every user definition.
  Each configuration line begins with the POP3-username followed by ":=" : e.g myPOP3userName:=
  This statement has to followed by pairs of parameter names and values which are separated by commas - the pairs inside are separated by "=". 
  e.g.: POP3username:=POP3password=pop3_pass,POP3server=mail.gmail.com,SMTPsendto=demo@demo_smtp.local,......
  The following case sensitive keywords are supported in the config file:
  POP3password=pop3_password
  POP3server=POP3-server or IP[:Port]
  SMTPsender=email_address
  SMTPsendto=email_address or <TO:> or <TO:email_address>
  SMTPserver=SMTP-server[:Port]
  SMTPHelo=myhelo
  SMTPAUTHuser=smtpuser
  SMTPAUTHpassword=smtppass
  SMTPHelo, SMTPsender, SMTPAUTHuser and SMTPAUTHpassword are optional.
  If SMTPsender is not defined, the FROM: address from the header line will be used - if this is not found the POP3username will be used.
  If the <TO:> syntax is used for SMTPsendto, the mail will be sent to any recipient that is found in the "to: cc: bcc:" header lines if it is a local one.
  If the <TO:email_address> syntax is used for SMTPsendto, the literals NAME and/or DOMAIN will be replaced by the name part and/or domain part of the addresses found in the "to: cc: bcc:" header lines. This makes it possible to collect POP3 mails from a POP3 account, which holds mails for multiple recipients.
  For example: <TO:NAME@mydomain.com>  or  <TO:NAME@subdomain.DOMAIN>  or  <TO:central-account@DOMAIN>
  If the <TO:> or <TO:email_address> syntax is used for SMTPsendto, "localDomains" and/or "localAddresses_Flat" must be configured to prevent too much error for wrong recipients defined in the "to: cc: bcc:" header lines. The POP3collector will not do any LDAP or VRFY query!
  If you want assp to detect SPAM, use the listenPort or listenPort2 as SMTP-server.
  To use this feature, you have to install the perl script "assp_pop3.pl" in the assp- base directory. 
Default: file:files/pop3cfg.txt 

-POP3Interval (POP3 Collecting Interval) 
The interval in minutes, assp should collect messages from the configured POP3-servers. A value of zero disables this feature.  

-POP3KeepRejected (POP3 Keep Rejected Mails on POP3 Server) 
If selected, any collected POP3 mail that fails to be sent via SMTP will be kept on the POP3 server.  

-POP3debug (POP3 debug) 
If selected, the POP3 collection will write debug output to the log file. Do not use it, unless you have problems with the POP3 collection!
  Notes On POP3 collecting
    
