Subversion Repositories configs

Rev

Rev 193 | Rev 195 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 193 Rev 194
Line 52... Line 52...
52
$enable_dkim_signing = 1;    # load DKIM signing code, keys defined by dkim_key
52
$enable_dkim_signing = 1;    # load DKIM signing code, keys defined by dkim_key
53
 
53
 
54
@local_domains_maps = ( [".$mydomain"] );  # list of all local domains
54
@local_domains_maps = ( [".$mydomain"] );  # list of all local domains
55
 
55
 
56
@mynetworks = qw( 127.0.0.0/8 [::1] [FE80::]/10 [FEC0::]/10
56
@mynetworks = qw( 127.0.0.0/8 [::1] [FE80::]/10 [FEC0::]/10
57
                  10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 );
57
                  10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 10.192.25.0/24 );
58
 
58
 
59
$unix_socketname = "/var/run/amavisd/amavisd.sock";  # amavisd-release or amavis-milter
59
$unix_socketname = "/var/run/amavisd/amavisd.sock";  # amavisd-release or amavis-milter
60
               # option(s) -p overrides $inet_socket_port and $unix_socketname
60
               # option(s) -p overrides $inet_socket_port and $unix_socketname
61
 
61
 
62
# The default receiving port in the Fedora and RHEL SELinux policy is 10024.
62
# The default receiving port in the Fedora and RHEL SELinux policy is 10024.
Line 78... Line 78...
78
  originating => 1,  # declare that mail was submitted by our smtp client
78
  originating => 1,  # declare that mail was submitted by our smtp client
79
  allow_disclaimers => 1,  # enables disclaimer insertion if available
79
  allow_disclaimers => 1,  # enables disclaimer insertion if available
80
  # notify administrator of locally originating malware
80
  # notify administrator of locally originating malware
81
  virus_admin_maps => ["virusalert\@$mydomain"],
81
  virus_admin_maps => ["virusalert\@$mydomain"],
82
  spam_admin_maps  => ["virusalert\@$mydomain"],
82
  spam_admin_maps  => ["virusalert\@$mydomain"],
83
  warnbadhsender   => 1,
83
  warnbadhsender   => 0,
84
  # forward to a smtpd service providing DKIM signing service
84
  # forward to a smtpd service providing DKIM signing service
85
  #forward_method => 'smtp:[127.0.0.1]:10023',
85
  #forward_method => 'smtp:[127.0.0.1]:10023',
86
  # force MTA conversion to 7-bit (e.g. before DKIM signing)
86
  # force MTA conversion to 7-bit (e.g. before DKIM signing)
87
  smtpd_discard_ehlo_keywords => ['8BITMIME'],
87
  smtpd_discard_ehlo_keywords => ['8BITMIME'],
88
  bypass_banned_checks_maps => [1],  # allow sending any file names and types
88
  bypass_banned_checks_maps => [1],  # allow sending any file names and types
Line 161... Line 161...
161
# The default forwarding port in the Fedora and RHEL SELinux policy is 10025.
161
# The default forwarding port in the Fedora and RHEL SELinux policy is 10025.
162
# To allow additional ports you need to label them as 'amavisd_send_port_t'.
162
# To allow additional ports you need to label them as 'amavisd_send_port_t'.
163
# For example: semanage port -a -t amavisd_send_port_t -p tcp 10023
163
# For example: semanage port -a -t amavisd_send_port_t -p tcp 10023
164
# $notify_method  = 'smtp:[127.0.0.1]:10023';
164
# $notify_method  = 'smtp:[127.0.0.1]:10023';
165
$forward_method = 'smtp:[127.0.0.1]:10025';  # set to undef with milter!
165
$forward_method = 'smtp:[127.0.0.1]:10025';  # set to undef with milter!
-
 
166
$notify_method  = 'smtp:[127.0.0.1]:10025';
166
 
167
 
167
$final_virus_destiny      = D_DISCARD;
168
$final_virus_destiny      = D_DISCARD;
168
$final_banned_destiny     = D_BOUNCE;
169
$final_banned_destiny     = D_BOUNCE;
169
$final_spam_destiny       = D_DISCARD;  #!!!  D_DISCARD / D_REJECT
170
$final_spam_destiny       = D_DISCARD;  #!!!  D_DISCARD / D_REJECT
170
$final_bad_header_destiny = D_BOUNCE;
171
$final_bad_header_destiny = D_PASS;
171
# $bad_header_quarantine_method = undef;
172
# $bad_header_quarantine_method = undef;
172
#$virus_quarantine_method        = 'local:virus/virus-%i-%n.txt';
173
$virus_quarantine_method        = 'local:virus/virus-%i-%n.txt';
173
#$spam_quarantine_method         = 'local:spam/spam-%b-%i-%n.txt';
174
$spam_quarantine_method         = 'local:spam/spam-%b-%i-%n.txt';
174
#$banned_files_quarantine_method = 'local:banned/banned-%i-%n.txt';
175
$banned_files_quarantine_method = 'local:banned/banned-%i-%n.txt';
175
#$bad_header_quarantine_method   = 'local:badh/badh-%i-%n.txt';
176
$bad_header_quarantine_method   = 'local:badh/badh-%i-%n.txt';
176
 
177
 
177
# $os_fingerprint_method = 'p0f:*:2345';  # to query p0f-analyzer.pl
178
# $os_fingerprint_method = 'p0f:*:2345';  # to query p0f-analyzer.pl
178
 
179
 
179
## hierarchy by which a final setting is chosen:
180
## hierarchy by which a final setting is chosen:
180
##   policy bank (based on port or IP address) -> *_by_ccat
181
##   policy bank (based on port or IP address) -> *_by_ccat