The latest version of spamdyke is 5.0.1, released on 5/1/2015. It contains many, many bug fixes, including a large number of bugs that can cause crashes. spamdyke-qrv has also received a great deal of attention and now handles every strange configuration qmail can support.
Version 5.0.0 of spamdyke was released on 1/28/2014. It adds full recipient validation and some new sender filters. It also changes the whitelisting feature to not automatically allow relaying for whitelisted connections and fixes a number of bugs.
Version 4.3.1 of spamdyke was released on 1/20/2012. It corrects a bug in the new header blacklist filter that could cause erroneous errors and incorrect message rejections.
Version 4.3.0 of spamdyke was released on 1/15/2012. It adds the ability to filter messages based on the content of their headers. It fixes some small bugs, a compile error on Debian 7 and a major series of bugs that could result in buffer overflows (possibly remotely exploitable, depending on the configuration options). Please upgrade immediately!
Version 4.2.1 of spamdyke was released on 1/4/2012. It fixes a few bugs and extends the log messages to include more information when a blacklist is matched.
Version 4.2.0 of spamdyke was released on 2/5/2011. It fixes a number of bugs, including an address parser problem that could allow open relaying and a filter problem that caused timeouts instead of clean disconnects. A few new features were added, including selecting TLS/SSL ciphers and controlling how DNS queries are performed.
Version 4.2.0 of spamdyke was released on 7/3/2010. It fixes a number of bugs, including an TLS/SSL issue that can cause spamdyke to hang forever. A few new features were added, including rejecting messages when the sender and recipient addresses are the same.
Version 4.0.10 of spamdyke was released on 12/17/2008. It works around a bug in Plesk 9 that sets the remote IP address to a name instead of an IP address.
Version 4.0.9 of spamdyke was released on 12/1/2008. It fixes a bug in the address parser that was preventing some sender/recipient blacklist/whitelist entries from matching. Also fixed a bug in the configuration testing feature that was unable to locate the spamdyke binary if it was outside the current directory.
Version 4.0.8 of spamdyke was released on 11/5/2008. It works around a design flaw in multilog that can cause some log messages to be corrupted when the server is under high load.
Version 4.0.7 of spamdyke was released on 10/17/2008. It implements a workaround for a gcc bug on FreeBSD 6.0.
Version 4.0.6 of spamdyke was released on 10/16/2008. It only fixes bugs: correctly terminate IP-in-rDNS keywords so they can be matched, correctly advertise authentication protocols at all times, correctly print the matching RHSBL in log messages when multiple RHSBLs are used, wait patiently for slow remote servers without consuming 100% CPU, stopped spamdyke from printing log messages to the remote server on Plesk servers.
Version 4.0.5 of spamdyke was released on 10/13/2008. It only fixes bugs: imitate qmail's 20 minute idle timeout if no timeout is configured to prevent never-ending spamdyke processes, correctly advertise authentication protocols at all times, correctly accept a mixture of good and rejected recipients without prematurely causing qmail to exit, process message content without stopping on unencoded null characters (not legal in email but sometimes sent anyway), fixed a source of segmentation faults in the DNS query code, fixed corrupted log messages when RHSBL matches were made, rewrote the address parser to correctly handle invalid envelope addresses, fixed a source of segmentation faults when reading arrays of values from files and fixed a source of segmentation faults when the remote server disconnects unexpectedly.
Version 4.0.4 of spamdyke was released on 9/5/2008. It only fixes bugs: a compiler warning on 64-bit Linux systems and an error in the order of processing the command line and configuration files that was sending log messages to both the standard error and the system logs.
Version 4.0.3 of spamdyke was released on 8/15/2008. It only fixes bugs: an error in argument parsing on FreeBSD prevented integer arguments from being used and
invalid nameserver entries in
/etc/resolv.conf prevented spamdyke from using
127.0.0.1 as the default nameserver.
Version 4.0.2 of spamdyke was released on 8/6/2008. It only fixes one bug: an error in version 4.0.1's graylist conversion code that causes very deep graylist directory structures for empty senders.
Version 4.0.1 of spamdyke was released on 7/17/2008. It only fixes bugs: an error in the graylist conversion code that changes a 3.x directory structure to the new structure, a double-free() bug that can cause crashes under specific circumstances and a compiler warning on Solaris.
Version 4.0.0 of spamdyke was released on 7/14/2008. It is a major update that adds 56 new options, changes the behavior of 5 options, renames 11 options and removes 2 options. The biggest new features are:
- Configuration directories allow spamdyke's configuration to change for specific senders or recipients
- DNS behavior is now completely configurable
- Relay protection is much easier to configure
- All remotely-visible text is now configurable
- SMTPS (SMTP-over-SSL) is now supported
NOTE: Version 4.0.0 is not backwards compatible with previous versions! Be sure to read the documentation before upgrading!
All previous versions of spamdyke are available from this site.
Source language: C
Compilation requirements: gcc, make, OpenSSL (optional, for TLS support)
Supported operating systems: Linux, OpenBSD, FreeBSD, NetBSD, Solaris, Mac OS X and maybe more
Runtime dependencies: qmail 1.01 or better, daemontools (tcpserver) or xinetd
Patching and/or recompiling qmail is not required.