1 --- amavisd-new-2.2.1/amavisd.conf-sample 2004-12-23 01:38:23.000000000 +0000
2 +++ amavisd-new-2.2.1.new/amavisd.conf-sample 2004-12-23 20:18:27.372867424 +0000
4 # $MYHOME serves as a quick default for some other configuration settings.
5 # More refined control is available with each individual setting further down.
6 # $MYHOME is not used directly by the program. No trailing slash!
7 -#$MYHOME = '/var/lib/amavis'; # (default is '/var/amavis')
8 +$MYHOME = '/var/spool/amavis'; # (default is '/var/amavis')
10 # $mydomain serves as a quick default for some other configuration settings.
11 # More refined control is available with each individual setting further down.
12 # $mydomain is never used directly by the program.
13 -$mydomain = 'example.com'; # (no useful default)
14 +#$mydomain = 'example.com'; # (no useful default)
16 +# This seems to be prefixed to host's domain name.
17 +# You may get mail rejects of virus information as send from not
18 +# existing host ( virusalert@localhost.whatever.your.domain.is )
19 +$mydomain = 'mail.whatever.your.domain.is'; # (no useful default)
21 # $myhostname = 'host.example.com'; # fqdn of this host, default by uname(3)
23 # Set the user and group to which the daemon will change if started as root
24 # (otherwise just keeps the UID unchanged, and these settings have no effect):
25 -$daemon_user = 'vscan'; # (no default; customary: vscan or amavis)
26 -$daemon_group = 'vscan'; # (no default; customary: vscan or amavis or sweep)
27 +$daemon_user = 'amavis'; # (no default; customary: vscan or amavis)
28 +$daemon_group = 'amavis'; # (no default; customary: vscan or amavis or sweep)
30 # Runtime working directory (cwd), and a place where
31 # temporary directories for unpacking mail are created.
32 # (no trailing slash, may be a scratch file system)
33 -$TEMPBASE = $MYHOME; # (must be set if other config vars use is)
34 -#$TEMPBASE = "$MYHOME/tmp"; # prefer to keep home dir /var/amavis clean?
35 +$TEMPBASE = "$MYHOME/runtime"; # (must be set if other config vars use is)
37 -#$db_home = "$MYHOME/db"; # DB databases directory, default "$MYHOME/db"
38 +$db_home = "$MYHOME/db"; # DB databases directory, default "$MYHOME/db"
40 # $helpers_home sets environment variable HOME, and is passed as option
41 # 'home_dir_for_helpers' to Mail::SpamAssassin::new. It should be a directory
43 # Run the daemon in the specified chroot jail if nonempty:
44 #$daemon_chroot_dir = $MYHOME; # (default is undef, meaning: do not chroot)
46 -#$pid_file = "$MYHOME/amavisd.pid"; # (default is "$MYHOME/amavisd.pid")
47 -#$lock_file = "$MYHOME/amavisd.lock"; # (default is "$MYHOME/amavisd.lock")
48 +$pid_file = "/var/run/amavisd/amavisd.pid"; # (default is "$MYHOME/amavisd.pid")
49 +$lock_file = "/var/run/amavisd/amavisd.lock"; # (default is "$MYHOME/amavisd.lock")
51 # set environment variables if you want (no defaults):
52 $ENV{TMPDIR} = $TEMPBASE; # wise to set TMPDIR, but not obligatory
54 #$forward_method = 'smtp:[127.0.0.1]:10025'; # where to forward checked mail
55 #$notify_method = $forward_method; # where to submit notifications
57 +# @auth_mech_avail = ('PLAIN','LOGIN'); # empty list disables incoming AUTH
60 # To make it possible for several hosts to share one content checking daemon,
61 # the IP address and/or the port number in $forward_method and $notify_method
62 # may be spacified as an asterisk. An asterisk in the colon-separated
64 # and see further down what these two lookup lists really mean.
66 # @bypass_virus_checks_maps = (1); # uncomment to DISABLE anti-virus code
67 -# @bypass_spam_checks_maps = (1); # uncomment to DISABLE anti-spam code
68 +@bypass_spam_checks_maps = (1); # uncomment to DISABLE anti-spam code
70 # Any setting can be changed with a new assignment, so make sure
71 # you do not unintentionally override these settings further down!
73 # AMAVIS-CLIENT PROTOCOL INPUT SETTINGS (e.g. with sendmail milter)
74 # (used with amavis helper clients like amavis-milter.c and amavis.c,
75 # NOT needed for Postfix or Exim or dual-sendmail - keep it undefined.
76 -$unix_socketname = "$MYHOME/amavisd.sock"; # amavis helper protocol socket
77 +#$unix_socketname = "/var/run/amavisd/amavisd.sock"; # amavis helper protocol socket
78 #$unix_socketname = undef; # disable listening on a unix socket
79 # (default is undef, i.e. disabled)
80 # (usual setting is $MYHOME/amavisd.sock)
82 #$SYSLOG_LEVEL = 'user.info'; # (facility.priority, default 'mail.info')
84 # Log file (if not using syslog)
85 -$LOGFILE = "$MYHOME/amavis.log"; # (defaults to empty, no log)
86 +# $LOGFILE = "$MYHOME/amavis.log"; # (defaults to empty, no log)
88 #NOTE: levels are not strictly observed and are somewhat arbitrary
89 # 0: startup/exit/failure messages, viruses detected
93 # 5: more debug details
94 -$log_level = 2; # (defaults to 0)
95 +# $log_level = 2; # (defaults to 0)
98 # Customizable template for the most interesting log file entry (e.g. with
99 # $log_level=0) (take care to properly quote Perl special characters like '\')
100 @@ -471,22 +479,22 @@
101 # Bounces or rejects produce non-delivery status notification regardless.
103 # Notify virus sender?
104 -#$warnvirussender = 1; # (defaults to false (undef))
105 +$warnvirussender = 1; # (defaults to false (undef))
107 # Notify spam sender?
108 -#$warnspamsender = 1; # (defaults to false (undef))
109 +$warnspamsender = 1; # (defaults to false (undef))
111 # Notify sender of banned files?
112 -#$warnbannedsender = 1; # (defaults to false (undef))
113 +$warnbannedsender = 1; # (defaults to false (undef))
115 # Notify sender of syntactically invalid header containing non-ASCII characters?
116 -#$warnbadhsender = 1; # (defaults to false (undef))
117 +# $warnbadhsender = 1; # (defaults to false (undef))
119 # Notify virus (or banned files or bad headers) RECIPIENT?
120 # (not very useful, but some policies demand it)
121 -#$warnvirusrecip = 1; # (defaults to false (undef))
122 -#$warnbannedrecip = 1; # (defaults to false (undef))
123 -#$warnbadhrecip = 1; # (defaults to false (undef))
124 +$warnvirusrecip = 1; # (defaults to false (undef))
125 +$warnbannedrecip = 1; # (defaults to false (undef))
126 +$warnbadhrecip = 1; # (defaults to false (undef))
128 # Notify also non-local virus/banned recipients if $warn*recip is true?
129 # (including those not matching local_domains*)
131 # or a directory (no trailing slash)
132 # (the default value is undef, meaning no quarantine)
134 -$QUARANTINEDIR = '/var/virusmails';
135 +# $QUARANTINEDIR = '/var/virusmails';
136 +$QUARANTINEDIR = '/var/spool/amavis/virusmails';
138 #$virus_quarantine_method = 'local:virus-%i-%n'; # default
139 #$spam_quarantine_method = 'local:spam-%b-%i-%n'; # default
140 @@ -1600,13 +1609,12 @@
141 # ['Sophos SAVI', \&sophos_savi ],
143 # ### http://www.clamav.net/
145 -# \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd"],
146 -# qr/\bOK$/, qr/\bFOUND$/,
147 -# qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
148 -# # NOTE: the easiest is to run clamd under the same user as amavisd; match the
149 -# # socket name (LocalSocket) in clamav.conf to the socket name in this entry
150 -# # When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd"],
151 + ['Clam Antivirus-clamd',
152 + \&ask_daemon, ["CONTSCAN {}\n", '/var/lib/clamav/clamd.socket'],
153 + qr/\bOK$/, qr/\bFOUND$/,
154 + qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
156 +# NOTE: match the socket name in clamav.conf to the socket name in this entry
158 # ### http://www.clamav.net/ and CPAN (memory-hungry! clamd is preferred)
159 # ['Mail::ClamAV', \&ask_clamav, "*", [0], [1], qr/^INFECTED: (.+)/],
160 @@ -1740,10 +1748,11 @@
161 # NOTE: requires suid wrapper around inocmd32; consider flag: -mod reviewer
162 # see http://marc.theaimsgroup.com/?l=amavis-user&m=109229779912783
164 - ### http://mks.com.pl/english.html
165 - ['MkS_Vir for Linux (beta)', ['mks32','mks'],
166 - '-s {}/*', [0], [1,2],
167 - qr/--[ \t]*(.+)/ ],
168 +# Moved to secondary scanner
169 +# ### http://mks.com.pl/english.html
170 +# ['MkS_Vir for Linux (beta)', ['mks32','mks'],
171 +# '-s {}/*', [0], [1,2],
172 +# qr/--[ \t]*(.+)/ ],
174 ### http://mks.com.pl/english.html
175 ['MkS_Vir daemon', 'mksscan',
176 @@ -1938,6 +1947,11 @@
178 # # other options to consider: -mime -oe -idedir=/usr/local/sav
180 + ['MkS_Vir for Linux (beta)', ['mks32','mks'],
181 + '-s {}/*', [0], [1,2],
182 + qr/--[ \t]*(.+)/ ],
185 # always succeeds (uncomment to consider mail clean if all other scanners fail)
186 # ['always-clean', sub {0}],