1 --- amavisd-new-2.2.1/amavisd.conf-sample 2004-12-23 01:38:23.000000000 +0000
2 +++ amavisd-new-2.2.1.new/amavisd.conf-sample 2004-12-23 20:18:27.372867424 +0000
4 # $MYHOME serves as a quick default for some other configuration settings.
5 # More refined control is available with each individual setting further down.
6 # $MYHOME is not used directly by the program. No trailing slash!
7 -#$MYHOME = '/var/lib/amavis'; # (default is '/var/amavis')
8 +$MYHOME = '/var/spool/amavis'; # (default is '/var/amavis')
10 # $mydomain serves as a quick default for some other configuration settings.
11 # More refined control is available with each individual setting further down.
12 # $mydomain is never used directly by the program.
13 -$mydomain = 'example.com'; # (no useful default)
14 +#$mydomain = 'example.com'; # (no useful default)
16 +# This seems to be prefixed to host's domain name.
17 +# You may get mail rejects of virus information as send from not
18 +# existing host ( virusalert@localhost.whatever.your.domain.is )
19 +$mydomain = 'mail.whatever.your.domain.is'; # (no useful default)
21 # $myhostname = 'host.example.com'; # fqdn of this host, default by uname(3)
23 # Set the user and group to which the daemon will change if started as root
24 # (otherwise just keeps the UID unchanged, and these settings have no effect):
25 -$daemon_user = 'vscan'; # (no default; customary: vscan or amavis)
26 -$daemon_group = 'vscan'; # (no default; customary: vscan or amavis or sweep)
27 +$daemon_user = 'amavis'; # (no default; customary: vscan or amavis)
28 +$daemon_group = 'amavis'; # (no default; customary: vscan or amavis or sweep)
30 # Runtime working directory (cwd), and a place where
31 # temporary directories for unpacking mail are created.
32 # (no trailing slash, may be a scratch file system)
33 -$TEMPBASE = $MYHOME; # (must be set if other config vars use is)
34 -#$TEMPBASE = "$MYHOME/tmp"; # prefer to keep home dir /var/amavis clean?
35 +$TEMPBASE = "$MYHOME/runtime"; # (must be set if other config vars use is)
37 -#$db_home = "$MYHOME/db"; # DB databases directory, default "$MYHOME/db"
38 +$db_home = "$MYHOME/db"; # DB databases directory, default "$MYHOME/db"
40 # $helpers_home sets environment variable HOME, and is passed as option
41 # 'home_dir_for_helpers' to Mail::SpamAssassin::new. It should be a directory
43 #$forward_method = 'smtp:[127.0.0.1]:10025'; # where to forward checked mail
44 #$notify_method = $forward_method; # where to submit notifications
46 +# @auth_mech_avail = ('PLAIN','LOGIN'); # empty list disables incoming AUTH
49 # To make it possible for several hosts to share one content checking daemon,
50 # the IP address and/or the port number in $forward_method and $notify_method
51 # may be spacified as an asterisk. An asterisk in the colon-separated
53 # and see further down what these two lookup lists really mean.
55 # @bypass_virus_checks_maps = (1); # uncomment to DISABLE anti-virus code
56 -# @bypass_spam_checks_maps = (1); # uncomment to DISABLE anti-spam code
57 +@bypass_spam_checks_maps = (1); # uncomment to DISABLE anti-spam code
59 # Any setting can be changed with a new assignment, so make sure
60 # you do not unintentionally override these settings further down!
62 #$SYSLOG_LEVEL = 'user.info'; # (facility.priority, default 'mail.info')
64 # Log file (if not using syslog)
65 -$LOGFILE = "$MYHOME/amavis.log"; # (defaults to empty, no log)
66 +# $LOGFILE = "$MYHOME/amavis.log"; # (defaults to empty, no log)
68 #NOTE: levels are not strictly observed and are somewhat arbitrary
69 # 0: startup/exit/failure messages, viruses detected
73 # 5: more debug details
74 -$log_level = 2; # (defaults to 0)
75 +# $log_level = 2; # (defaults to 0)
78 # Customizable template for the most interesting log file entry (e.g. with
79 # $log_level=0) (take care to properly quote Perl special characters like '\')
81 # Bounces or rejects produce non-delivery status notification regardless.
83 # Notify virus sender?
84 -#$warnvirussender = 1; # (defaults to false (undef))
85 +$warnvirussender = 1; # (defaults to false (undef))
88 -#$warnspamsender = 1; # (defaults to false (undef))
89 +$warnspamsender = 1; # (defaults to false (undef))
91 # Notify sender of banned files?
92 -#$warnbannedsender = 1; # (defaults to false (undef))
93 +$warnbannedsender = 1; # (defaults to false (undef))
95 # Notify sender of syntactically invalid header containing non-ASCII characters?
96 -#$warnbadhsender = 1; # (defaults to false (undef))
97 +# $warnbadhsender = 1; # (defaults to false (undef))
99 # Notify virus (or banned files or bad headers) RECIPIENT?
100 # (not very useful, but some policies demand it)
101 -#$warnvirusrecip = 1; # (defaults to false (undef))
102 -#$warnbannedrecip = 1; # (defaults to false (undef))
103 -#$warnbadhrecip = 1; # (defaults to false (undef))
104 +$warnvirusrecip = 1; # (defaults to false (undef))
105 +$warnbannedrecip = 1; # (defaults to false (undef))
106 +$warnbadhrecip = 1; # (defaults to false (undef))
108 # Notify also non-local virus/banned recipients if $warn*recip is true?
109 # (including those not matching local_domains*)
111 # or a directory (no trailing slash)
112 # (the default value is undef, meaning no quarantine)
114 -$QUARANTINEDIR = '/var/virusmails';
115 +# $QUARANTINEDIR = '/var/virusmails';
116 +$QUARANTINEDIR = '/var/spool/amavis/virusmails';
118 #$virus_quarantine_method = 'local:virus-%i-%n'; # default
119 #$spam_quarantine_method = 'local:spam-%b-%i-%n'; # default
120 @@ -1600,13 +1609,12 @@
121 # ['Sophos SAVI', \&sophos_savi ],
123 # ### http://www.clamav.net/
125 -# \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd"],
126 -# qr/\bOK$/, qr/\bFOUND$/,
127 -# qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
128 -# # NOTE: the easiest is to run clamd under the same user as amavisd; match the
129 -# # socket name (LocalSocket) in clamav.conf to the socket name in this entry
130 -# # When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd"],
131 + ['Clam Antivirus-clamd',
132 + \&ask_daemon, ["CONTSCAN {}\n", '/var/lib/clamav/clamd.socket'],
133 + qr/\bOK$/, qr/\bFOUND$/,
134 + qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
136 +# NOTE: match the socket name in clamav.conf to the socket name in this entry
138 # ### http://www.clamav.net/ and CPAN (memory-hungry! clamd is preferred)
139 # ['Mail::ClamAV', \&ask_clamav, "*", [0], [1], qr/^INFECTED: (.+)/],
140 @@ -1740,10 +1748,11 @@
141 # NOTE: requires suid wrapper around inocmd32; consider flag: -mod reviewer
142 # see http://marc.theaimsgroup.com/?l=amavis-user&m=109229779912783
144 - ### http://mks.com.pl/english.html
145 - ['MkS_Vir for Linux (beta)', ['mks32','mks'],
146 - '-s {}/*', [0], [1,2],
147 - qr/--[ \t]*(.+)/ ],
148 +# Moved to secondary scanner
149 +# ### http://mks.com.pl/english.html
150 +# ['MkS_Vir for Linux (beta)', ['mks32','mks'],
151 +# '-s {}/*', [0], [1,2],
152 +# qr/--[ \t]*(.+)/ ],
154 ### http://mks.com.pl/english.html
155 ['MkS_Vir daemon', 'mksscan',
156 @@ -1938,6 +1947,11 @@
158 # # other options to consider: -mime -oe -idedir=/usr/local/sav
160 + ['MkS_Vir for Linux (beta)', ['mks32','mks'],
161 + '-s {}/*', [0], [1,2],
162 + qr/--[ \t]*(.+)/ ],
165 # always succeeds (uncomment to consider mail clean if all other scanners fail)
166 # ['always-clean', sub {0}],