Репозиторий ALT Linux backports/2.4
Последнее обновление: 9 июля 2008 | Пакетов: 497 | Посещений: 1584546
 поиск   регистрация   авторизация 
 
Группа :: Сети/Почта
Пакет: amavisd-new

 Главная   Изменения   Спек   Патчи   Загрузить   Bugs and FR 

Патч: amavisd-new-alt-conf.patch


--- amavisd-new-2.1.2/amavisd.conf	2004-09-06 22:30:50 +0400
+++ amavisd-new-2.1.2-my/amavisd.conf	2004-09-07 17:07:22 +0400
@@ -12,21 +12,21 @@
 # @bypass_spam_checks_maps  = (1);  # uncomment to DISABLE anti-spam code
 
 $max_servers = 2;            # number of pre-forked children (2..15 is common)
-$daemon_user  = 'vscan';     # (no default;  customary: vscan or amavis)
-$daemon_group = 'vscan';     # (no default;  customary: vscan or amavis)
+$daemon_user  = 'mail';     # (no default;  customary: vscan or amavis)
+$daemon_group = 'mail';     # (no default;  customary: vscan or amavis)
 
-$mydomain = 'example.com';   # a convenient default for other settings
+$mydomain = 'localhost';   # a convenient default for other settings
 
-$MYHOME   = '/var/amavis';   # a convenient default for other settings
+$MYHOME   = '/var/spool/amavis';   # a convenient default for other settings
 $TEMPBASE = "$MYHOME/tmp";   # working directory, needs to be created manually
 $ENV{TMPDIR} = $TEMPBASE;    # environment variable TMPDIR
-$QUARANTINEDIR = '/var/virusmails';
+$QUARANTINEDIR = '$MYHOME/quarantine';
 
 # $daemon_chroot_dir = $MYHOME;   # chroot directory or undef
 
-# $db_home   = "$MYHOME/db";
+$db_home   = "$MYHOME/db";
 # $helpers_home = "$MYHOME/var";  # prefer $MYHOME clean and owned by root?
-# $pid_file  = "$MYHOME/var/amavisd.pid";
+$pid_file  = "/var/run/amavis/amavisd.pid";
 # $lock_file = "$MYHOME/var/amavisd.lock";
 #NOTE: create directories $MYHOME/tmp, $MYHOME/var, $MYHOME/db manually
 
@@ -58,10 +58,10 @@
 #   ( ['DBI:mysql:database=mail;host=127.0.0.1;port=3306', 'user1', 'passwd1'],
 #     ['DBI:mysql:database=mail;host=host2', 'username2', 'password2'] );
 
-$virus_admin               = "virusalert\@$mydomain";  # notifications recip.
+$virus_admin               = "postmaster\@$mydomain";  # notifications recip.
 
-$mailfrom_notify_admin     = "virusalert\@$mydomain";  # notifications sender
-$mailfrom_notify_recip     = "virusalert\@$mydomain";  # notifications sender
+$mailfrom_notify_admin     = "postmaster\@$mydomain";  # notifications sender
+$mailfrom_notify_recip     = "postmaster\@$mydomain";  # notifications sender
 $mailfrom_notify_spamadmin = "spam.police\@$mydomain"; # notifications sender
 $mailfrom_to_quarantine = ''; # null return path; uses original sender if undef
 
@@ -93,6 +93,7 @@
 $MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not enforced)
 
 $sa_spam_subject_tag = '***SPAM*** ';
+$sa_spam_modifies_subj = 0; # in @sa_spam_modifies_subj_maps, default is true
 $defang_virus  = 1;  # MIME-wrap passed infected mail
 $defang_banned = 1;  # MIME-wrap passed mail containing banned name
 
@@ -101,13 +102,13 @@
 
 # $myhostname = 'host.example.com';  # must be a fully-qualified domain name!
 
-# $notify_method  = 'smtp:[127.0.0.1]:10025';
-# $forward_method = 'smtp:[127.0.0.1]:10025';  # set to undef with milter!
+$notify_method  = 'smtp:[127.0.0.1]:10025';
+$forward_method = 'smtp:[127.0.0.1]:10025';  # set to undef with milter!
 
-# $final_virus_destiny      = D_DISCARD;
-# $final_banned_destiny     = D_BOUNCE;
-# $final_spam_destiny       = D_BOUNCE;
-# $final_bad_header_destiny = D_PASS;
+$final_virus_destiny      = D_DISCARD;
+$final_banned_destiny     = D_BOUNCE;
+$final_spam_destiny       = D_BOUNCE;
+$final_bad_header_destiny = D_PASS;
 
 
 # SOME OTHER VARIABLES WORTH CONSIDERING (see amavisd.conf-default for all)
@@ -129,12 +130,31 @@
 # $defang_bad_header, $defang_undecipherable, $defang_spam
 
 
+# $hdr_encoding = 'koi8-r';  # header field bodies charset
+# $bdy_encoding = 'koi8-r';  # notification body text charset
+# $hdr_encoding_qb = 'Q';        # quoted-printable (Q or B)
+
+# $notify_sender_templ      = read_text('/etc/amavis/notify_sender.txt');
+# $notify_virus_sender_templ= read_text('/etc/amavis/notify_virus_sender.txt');
+# $notify_virus_admin_templ = read_text('/etc/amavis/notify_virus_admin.txt');
+# $notify_virus_recips_templ= read_text('/etc/amavis/notify_virus_recips.txt');
+# $notify_spam_sender_templ = read_text('/etc/amavis/notify_spam_sender.txt');
+# $notify_spam_admin_templ  = read_text('/etc/amavis/notify_spam_admin.txt');
+# $notify_spam_recips_templ= read_text('/etc/amavis/notify_spam_recips.txt');
+
+
 # REMAINING IMPORTANT VARIABLES ARE LISTED HERE BECAUSE OF LONGER ASSIGNMENTS
 
 @viruses_that_fake_sender_maps = (new_RE(
-  [qr'\bEICAR\b'i => 0],            # av test pattern name
-  [qr'^(WM97|OF97|Joke\.)'i => 0],  # adjust names to match your AV scanner
-  [qr/.*/ => 1],  # true for everything else
+  qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,
+  qr'tanatos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,
+  qr'dloader|galil|gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,
+  qr'frethem|sircam|be?agle|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,
+  qr'@mm|@MM',    # mass mailing viruses as labeled by f-prot and uvscan
+  qr'Worm'i,      # worms as labeled by ClamAV, Kaspersky, etc
+  [qr'^(EICAR|Joke\.|Junk\.)'i         => 0],
+  [qr'^(WM97|OF97|W95/CIH-|JS/Fort)'i  => 0],
+  [qr/.*/ => 1],  # true by default  (remove or comment-out if undesired)
 ));
 
 @keep_decoded_original_maps = (new_RE(
@@ -233,6 +253,22 @@
      'clusternews@linuxnetworx.com'           => -3.0,
      lc('lvs-users-admin@LinuxVirtualServer.org')    => -3.0,
      lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
+     'community@altlinux.ru'                  => -3.0,
+     'community-en@altlinux.org'              => -3.0,
+     'sisyphus@altlinux.ru'                   => -3.0,
+     'security-announce@altlinux.ru'          => -3.0,
+     'castle@altlinux.ru'                     => -3.0,
+     'talk-room@altlinux.ru'                  => -3.0,
+     'fonts-devel@altlinux.ru'                => -3.0,
+     'freepublish@altlinux.ru'                => -3.0,
+     'freeschool@linux.ru.net'                => -3.0,
+     'legal@altlinux.ru'                      => -3.0,
+     'music@altlinux.ru'                      => -3.0,
+     'samba@altlinux.ru'                      => -3.0,
+     'seminar@altlinux.ru'                    => -3.0,
+     'devel@altlinux.ru'                      => -3.0,
+     'hardware@altlinux.ru'                   => -3.0,
+
 
      # soft-blacklisting (positive score)
      'sender@example.net'                     =>  3.0,
@@ -255,10 +291,10 @@
 # ['Sophos SAVI', \&sophos_savi ],
 
 # ### http://www.clamav.net/
-# ['ClamAV-clamd',
-#   \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd"],
-#   qr/\bOK$/, qr/\bFOUND$/,
-#   qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
+ ['ClamAV-clamd',
+   \&ask_daemon, ["CONTSCAN {}\n", "/var/lib/clamav/clamd.socket"],
+   qr/\bOK$/, qr/\bFOUND$/,
+   qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
 # # NOTE: run clamd under the same user as amavisd;  match the socket
 # # name (LocalSocket) in clamav.conf to the socket name in this entry
 # # When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd"],
 
design & coding: Vladimir Lettiev aka crux © 2004-2005