|
|
.\" Automatically generated by Pandoc 2.2.2.1.\".TH "RSPAMC" "1" "" "Rspamd User Manual" "".hy.SH NAME.PP\f[C]rspamc\f[] \- rspamd command line client.SH SYNOPSIS.PPrspamc [\f[I]options\f[]] [\f[I]command\f[]] [\f[I]input\-file\f[]]\&....PPrspamc \[en]help.SH DESCRIPTION.PP\f[C]rspamc\f[] is a simple rspamd client, primarily for classifying orlearning messages.\f[C]rspamc\f[] supports the following commands:.IP \[bu] 2Scan commands:.RS 2.IP \[bu] 2\f[C]symbols\f[]: scan message and show symbols (default command).RE.IP \[bu] 2Control commands.RS 2.IP \[bu] 2\f[C]learn_spam\f[]: learn message as spam.IP \[bu] 2\f[C]learn_ham\f[]: learn message as ham.IP \[bu] 2\f[C]fuzzy_add\f[]: add message to fuzzy storage (check \f[C]\-f\f[] and\f[C]\-w\f[] options for this command).IP \[bu] 2\f[C]fuzzy_del\f[]: delete message from fuzzy storage (check\f[C]\-f\f[] option for this command).IP \[bu] 2\f[C]stat\f[]: show rspamd statistics.IP \[bu] 2\f[C]stat_reset\f[]: show and reset rspamd statistics (useful forgraphs).IP \[bu] 2\f[C]counters\f[]: display rspamd symbols statistics.IP \[bu] 2\f[C]uptime\f[]: show rspamd uptime.IP \[bu] 2\f[C]add_symbol\f[]: add or modify symbol settings in rspamd.IP \[bu] 2\f[C]add_action\f[]: add or modify action settings.RE.PPControl commands that modify rspamd state are considered privileged andrequire a password to be specified with the \f[C]\-P\f[] option (see\f[B]OPTIONS\f[], below, for details)..PD 0.P.PDThis depends on a controller's settings and is discussed in the\f[C]rspamd\-workers\f[] page (see \f[B]SEE ALSO\f[], below, fordetails)..PP\f[C]Input\ files\f[] may be either regular file(s) or a directory toscan.If no files are specified \f[C]rspamc\f[] reads from the standard input.Controller commands usually do not accept any input, however learn* andfuzzy* commands requires input..SH OPTIONS.TP.B \-h \f[I]host[:port]\f[], \-\-connect=\f[I]host[:port]\f[]Specify host and port.RS.RE.TP.B \-P \f[I]password\f[], \-\-password=\f[I]password\f[]Specify control password.RS.RE.TP.B \-c \f[I]name\f[], \-\-classifier=\f[I]name\f[]Classifier to learn spam or ham (bayes is used by default).RS.RE.TP.B \-w \f[I]weight\f[], \-\-weight=\f[I]weight\f[]Weight for fuzzy operations.RS.RE.TP.B \-f \f[I]number\f[], \-\-flag=\f[I]number\f[]Flag for fuzzy operations.RS.RE.TP.B \-p, \-\-passPass all filters.RS.RE.TP.B \-v, \-\-verboseMore verbose output.RS.RE.TP.B \-i \f[I]ip address\f[], \-\-ip=\f[I]ip address\f[]Emulate that message was received from specified ip address.RS.RE.TP.B \-u \f[I]username\f[], \-\-user=\f[I]username\f[]Emulate that message was received from specified authenticated user.RS.RE.TP.B \-d \f[I]user\@domain\f[], \-\-deliver=\f[I]user\@domain\f[]Emulate that message was delivered to specified user (forLDA/statistics).RS.RE.TP.B \-F \f[I]user\@domain\f[], \-\-from=\f[I]user\@domain\f[]Emulate that message has specified SMTP FROM address.RS.RE.TP.B \-r \f[I]user\@domain\f[], \-\-rcpt=\f[I]user\@domain\f[]Emulate that message has specified SMTP RCPT address.RS.RE.TP.B \-\-helo=\f[I]helo_string\f[]Imitate SMTP HELO passing from MTA.RS.RE.TP.B \-\-hostname=\f[I]hostname\f[]Imitate hostname passing from MTA (rspamd assumes that it is verified byMTA).RS.RE.TP.B \-t \f[I]seconds\f[], \-\-timeout=\f[I]seconds\f[]Timeout for waiting for a reply (can be floating point number,e.g.\ 0.1).RS.RE.TP.B \-b \f[I]host:port\f[], \-\-bind=\f[I]host:port\f[]Bind to specified ip address.RS.RE.TP.B \-j, \-\-jsonOutput formatted JSON.RS.RE.TP.B \-\-uclOutput UCL.RS.RE.TP.B \-\-rawOutput raw data received from rspamd (compacted JSON).RS.RE.TP.B \-\-headersOutput HTTP headers from a reply.RS.RE.TP.B \-\-extended\-urlsOutput URLs in an extended format, showing full URL, host and the partof host that was used by surbl module (if enabled)..RS.RE.TP.B \-n \f[I]parallel_count\f[], \-\-max\-requests=\f[I]parallel_count\f[]Maximum number of requests to rspamd executed in parallel (8 by default).RS.RE.TP.B \-e \f[I]command\f[], \-\-execute=\f[I]command\f[]Execute the specified command with either mime output (if \f[C]mime\f[]option is also specified) or formatted rspamd output.RS.RE.TP.B \-\-mimeOutput the full mime message instead of scanning results only.RS.RE.TP.B \-\-header=\f[I]header\f[]Add custom HTTP header for a request.You may specify header in format \f[C]name=value\f[] or just\f[C]name\f[] for an empty header.This option can be repeated multiple times..RS.RE.TP.B \-\-sort=\f[I]type\f[]Sort output according to a specific field.For \f[C]counters\f[] command the allowed values for this key are\f[C]name\f[], \f[C]weight\f[], \f[C]frequency\f[] and \f[C]hits\f[].Appending \f[C]:desc\f[] to any of these types inverts sorting order..RS.RE.TP.B \-\-commandsList available commands.RS.RE.SH RETURN VALUE.PPOn exit \f[C]rspamc\f[] returns \f[C]0\f[] if operation was successfuland an error code otherwise..SH EXAMPLES.PPCheck stdin:.IP.nf\f[C]rspamc\ <\ some_file\f[].fi.PPCheck files:.IP.nf\f[C]rspamc\ symbols\ file1\ file2\ file3\f[].fi.PPLearn files:.IP.nf\f[C]rspamc\ \-P\ pass\ learn_spam\ file1\ file2\ file3\f[].fi.PPAdd fuzzy hash to set 2:.IP.nf\f[C]rspamc\ \-P\ pass\ \-f\ 2\ \-w\ 10\ fuzzy_add\ file1\ file2\f[].fi.PPDelete fuzzy hash from other server:.IP.nf\f[C]rspamc\ \-P\ pass\ \-h\ hostname:11334\ \-f\ 2\ fuzzy_del\ file1\ file2\f[].fi.PPGet statistics:.IP.nf\f[C]rspamc\ stat\f[].fi.PPGet uptime:.IP.nf\f[C]rspamc\ uptime\f[].fi.PPAdd custom rule's weight:.IP.nf\f[C]rspamc\ add_symbol\ test\ 1.5\f[].fi.PPAdd custom action's weight:.IP.nf\f[C]rspamc\ add_action\ reject\ 7.1\f[].fi.SH SEE ALSO.PPRspamd documentation and source code may be downloaded from<https://rspamd.com/>.
|