Subject: amavisd-new: Owner and group of /var/lib/amavis/.spamassassin/bayes_toks changes
Date: Sat, 06 Jan 2024 16:51:54 +0100
Package: amavisd-new
Version: 1:2.11.1-5
Severity: important
X-Debbugs-Cc: [email protected]
Sometimes the owner and group of /var/lib/amavis/.spamassassin/bayes_toks change to root:root. This makes the cronjob fail:
Date: Sat, 6 Jan 2024 15:18:04 +0100 (CET)
From: Cron Daemon <[email protected]>
To: [email protected]
Subject: Cron <amavis@octomain> test -e /usr/sbin/amavisd-new-cronjob && /usr/sbin/amavisd-new-cronjob sa-sync
bayes: cannot open bayes databases /var/lib/amavis/.spamassassin/bayes_* R/O: tie failed: Permission denied
bayes: cannot open bayes databases /var/lib/amavis/.spamassassin/bayes_* R/O: tie failed: Permission denied
Manually restting to amavis:amavis allows the cronjob to run.
I have no idea what is changing owner and group, especially since the other files in /var/lib/amavis/.spamassassin/ are unchanged:
# ls -l /var/lib/amavis/.spamassassin/
total 19712
-rw-rw-rw- 1 amavis amavis 20406272 Jan 6 14:58 bayes_seen
-rw------- 1 root root 5484544 Jan 6 14:58 bayes_toks
-rw------- 1 amavis amavis 2539520 Jan 25 2019 bayes_toks.expire4427
-rw-r--r-- 1 amavis amavis 1869 Jul 13 2014 user_prefs
The change happened at the same time as the last access:
# ls -l --full-time /var/lib/amavis/.spamassassin/bayes_toks
-rw------- 1 root root 5484544 2024-01-06 14:58:43.988842231 +0100 /var/lib/amavis/.spamassassin/bayes_toks
# ls -lc --full-time /var/lib/amavis/.spamassassin/bayes_toks
-rw------- 1 root root 5484544 2024-01-06 14:58:43.988842231 +0100 /var/lib/amavis/.spamassassin/bayes_toks
-- System Information:
Debian Release: 11.8
APT prefers oldstable-updates
APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Kernel: Linux 5.10.0-27-amd64 (SMP w/1 CPU thread)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages amavisd-new depends on:
ii adduser 3.118+deb11u1
ii debconf [debconf-2.0] 1.5.77
ii file 1:5.39-3+deb11u1
ii init-system-helpers 1.60
pn libarchive-tar-perl <none>
ii libarchive-zip-perl 1.68-1
ii libberkeleydb-perl 0.64-1+b1
ii libconvert-tnef-perl 0.18-1.1
ii libconvert-uulib-perl 1:1.5~dfsg-1+b3
pn libdigest-md5-perl <none>
ii libio-stringy-perl 2.111-3
ii libmail-dkim-perl 1.20200907-1
ii libmailtools-perl 2.21-1
pn libmime-base64-perl <none>
ii libmime-tools-perl 5.509-1
ii libnet-libidn-perl 0.12.ds-3+b3
ii libnet-server-perl 2.009-2
ii libnet-snmp-perl 6.0.1-6
ii libunix-syslog-perl 1.1-3+b3
ii lsb-base 11.1.0
ii pax 1:20201030-1
ii perl [libtime-hires-perl] 5.32.1-4+deb11u2
Versions of packages amavisd-new recommends:
ii altermime 0.3.10-12
ii libnet-patricia-perl 1.22-1+b7
pn ripole <none>
Versions of packages amavisd-new suggests:
ii apt-listchanges 3.24
pn arj <none>
pn cabextract <none>
ii clamav 0.103.10+dfsg-0+deb11u1
ii clamav-daemon 0.103.10+dfsg-0+deb11u1
ii cpio 2.13+dfsg-7.1~deb11u1
pn dspam <none>
pn lhasa <none>
ii libauthen-sasl-perl 2.1600-1.1
ii libdbi-perl 1.643-3+b1
ii libmail-dkim-perl 1.20200907-1
pn libnet-ldap-perl <none>
pn libsnmp-perl <none>
pn libzeromq-perl <none>
pn lzop <none>
pn nomarch <none>
ii p7zip 16.02+dfsg-8
pn rpm <none>
ii spamassassin 3.4.6-1
pn unrar <none>
-- Configuration Files:
/etc/amavis/conf.d/15-content_filter_mode changed:
use strict;
@bypass_virus_checks_maps = (
\%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re);
@bypass_spam_checks_maps = (
\%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re);
1; # ensure a defined return
/etc/amavis/conf.d/50-user changed:
use strict;
$max_servers = 4; # number of pre-forked children
$final_virus_destiny = D_PASS;
undef $virus_quarantine_to;
undef $virus_admin;
$final_banned_destiny = D_PASS;
undef $banned_quarantine_to;
undef $banned_admin;
$final_bad_header_destiny = D_PASS;
undef $bad_header_quarantine_to;
undef $bad_header_admin;
$final_spam_destiny = D_PASS;
undef $spam_quarantine_to;
undef $spam_admin;
$sa_tag2_level_deflt = 5.0; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 99999; # triggers spam evasive actions
$sa_dsn_cutoff_level = 0; # spam level beyond which a DSN is not sent
undef $sa_spam_subject_tag;
@local_domains_acl = qw(octogon.de octogon-gmbh.de med-data.de toscanatradizionale.de);
$recipient_delimiter = '+';
@addr_extension_spam_maps = ('spam');
@bypass_virus_checks_maps = (
\%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re);
@bypass_spam_checks_maps = (
\%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re);
$log_level = 10;
1; # ensure a defined return
-- no debconf information
Debbugs is free software and licensed under the terms of the GNU General
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.