1 --- ./amavisd.conf-sample.org 2006-08-03 09:46:31.000000000 +0000
2 +++ ./amavisd.conf-sample 2006-08-03 09:52:09.000000000 +0000
4 # (no trailing slash, may be a scratch file system)
5 $TEMPBASE = "$MYHOME/runtime"; # prefer to keep home dir /var/amavis clean?
7 -#$db_home = "$MYHOME/db"; # DB databases directory, default "$MYHOME/db", -D
8 +$db_home = "$MYHOME/db"; # DB databases directory, default "$MYHOME/db", -D
10 # $helpers_home sets environment variable HOME, and is passed as option
11 # 'home_dir_for_helpers' to Mail::SpamAssassin::new. It should be a directory
13 # Run the daemon in the specified chroot jail if nonempty:
14 #$daemon_chroot_dir = $MYHOME; # (default is undef, meaning: do not chroot), -R
16 -#$pid_file = "$MYHOME/amavisd.pid"; # (default is "$MYHOME/amavisd.pid"), -P
17 -#$lock_file = "$MYHOME/amavisd.lock"; # (default is "$MYHOME/amavisd.lock"), -L
18 +$pid_file = "/var/run/amavisd/amavisd.pid"; # (default is "$MYHOME/amavisd.pid"), -P
19 +$lock_file = "/var/run/amavisd/amavisd.lock"; # (default is "$MYHOME/amavisd.lock"), -L
21 # set environment variables if you want (no defaults):
22 $ENV{TMPDIR} = $TEMPBASE; # wise to set TMPDIR, but not obligatory
24 #$forward_method = 'smtp:[127.0.0.1]:10025'; # where to forward checked mail
25 #$notify_method = $forward_method; # where to submit notifications
27 +#@auth_mech_avail = ('PLAIN','LOGIN'); # empty list disables incoming AUTH
29 #$os_fingerprint_method = 'p0f:127.0.0.1:2345'; # query p0f-analyzer.pl
31 # To make it possible for several hosts to share one content checking daemon,
33 # and see further down what these two lookup lists really mean.
35 # @bypass_virus_checks_maps = (1); # uncomment to DISABLE anti-virus code
36 -# @bypass_spam_checks_maps = (1); # uncomment to DISABLE anti-spam code
37 +@bypass_spam_checks_maps = (1); # uncomment to DISABLE anti-spam code
39 # Any setting can be changed with a new assignment, so make sure
40 # you do not unintentionally override these settings further down!
42 # AMAVIS-CLIENT PROTOCOL INPUT SETTINGS (e.g. with amavisd-release, or
43 # sendmail milter through helper clients like amavis-milter.c and amavis.c)
44 # option(s) -p overrides $inet_socket_port and $unix_socketname
45 -$unix_socketname = "$MYHOME/amavisd.sock"; # amavis helper protocol socket
46 -#$unix_socketname = undef; # disable listening on a unix socket
47 +#$unix_socketname = "/var/run/amavisd/amavisd.sock"; # amavis helper protocol socket
48 +$unix_socketname = undef; # disable listening on a unix socket
49 # (default is undef, i.e. disabled)
50 # (usual setting is $MYHOME/amavisd.sock)
53 # choose from: emerg, alert, crit, err, warning, notice, info, debug
55 # Log file (if not using syslog)
56 -$LOGFILE = "$MYHOME/amavis.log"; # (defaults to empty, no log)
57 +#$LOGFILE = "$MYHOME/amavis.log"; # (defaults to empty, no log)
59 #NOTE: levels are not strictly observed and are somewhat arbitrary
60 # 0: startup/exit/failure messages, viruses detected
64 # 5: more debug details
65 -$log_level = 2; # (defaults to 0), -d
66 +#$log_level = 2; # (defaults to 0), -d
68 # Customizable template for the most interesting log file entry (e.g. with
69 # $log_level=0) (take care to properly quote Perl special characters like '\')
71 # or a directory (no trailing slash)
72 # (the default value is undef, meaning no quarantine)
74 -$QUARANTINEDIR = '/var/virusmails'; # -Q
75 +#$QUARANTINEDIR = '/var/virusmails'; # -Q
76 +$QUARANTINEDIR = '/var/spool/amavis/virusmails'; # -Q
78 #$quarantine_subdir_levels = 1; # add level of subdirs to disperse quarantine
80 @@ -1805,13 +1808,13 @@
81 # ['Sophos SAVI', \&sophos_savi ],
83 # ### http://www.clamav.net/
85 -# \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd"],
86 -# qr/\bOK$/, qr/\bFOUND$/,
87 -# qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
88 -# # NOTE: the easiest is to run clamd under the same user as amavisd; match the
89 -# # socket name (LocalSocket) in clamav.conf to the socket name in this entry
90 -# # When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd"],
92 + \&ask_daemon, ["CONTSCAN {}\n", "/var/lib/clamav/clamd.socket"],
93 + qr/\bOK$/, qr/\bFOUND$/,
94 + qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
95 +# NOTE: the easiest is to run clamd under the same user as amavisd; match the
96 +# socket name (LocalSocket) in clamav.conf to the socket name in this entry
97 +# When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd"],
99 # ### http://www.clamav.net/ and CPAN (memory-hungry! clamd is preferred)
100 # ['Mail::ClamAV', \&ask_clamav, "*", [0], [1], qr/^INFECTED: (.+)/],
101 @@ -1968,10 +1971,11 @@
102 # NOTE: requires suid wrapper around inocmd32; consider flag: -mod reviewer
103 # see http://marc.theaimsgroup.com/?l=amavis-user&m=109229779912783
105 - ### http://mks.com.pl/english.html
106 - ['MkS_Vir for Linux (beta)', ['mks32','mks'],
107 - '-s {}/*', [0], [1,2],
108 - qr/--[ \t]*(.+)/ ],
109 +# Moved to secondary scanner
110 +# ### http://mks.com.pl/english.html
111 +# ['MkS_Vir for Linux (beta)', ['mks32','mks'],
112 +# '-s {}/*', [0], [1,2],
113 +# qr/--[ \t]*(.+)/ ],
115 ### http://mks.com.pl/english.html
116 ['MkS_Vir daemon', 'mksscan',
117 @@ -2174,6 +2178,10 @@
119 # # other options to consider: -mime -oe -idedir=/usr/local/sav
121 + ['MkS_Vir for Linux (beta)', ['mks32','mks'],
122 + '-s {}/*', [0], [1,2],
123 + qr/--[ \t]*(.+)/ ],
125 # always succeeds (uncomment to consider mail clean if all other scanners fail)
126 # ['always-clean', sub {0}],