Line 52... |
Line 52... |
52 |
$enable_dkim_signing = 1; # load DKIM signing code, keys defined by dkim_key
|
52 |
$enable_dkim_signing = 1; # load DKIM signing code, keys defined by dkim_key
|
53 |
|
53 |
|
54 |
@local_domains_maps = ( [".$mydomain"] ); # list of all local domains
|
54 |
@local_domains_maps = ( [".$mydomain"] ); # list of all local domains
|
55 |
|
55 |
|
56 |
@mynetworks = qw( 127.0.0.0/8 [::1] [FE80::]/10 [FEC0::]/10
|
56 |
@mynetworks = qw( 127.0.0.0/8 [::1] [FE80::]/10 [FEC0::]/10
|
57 |
10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 );
|
57 |
10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 10.192.25.0/24 );
|
58 |
|
58 |
|
59 |
$unix_socketname = "/var/run/amavisd/amavisd.sock"; # amavisd-release or amavis-milter
|
59 |
$unix_socketname = "/var/run/amavisd/amavisd.sock"; # amavisd-release or amavis-milter
|
60 |
# option(s) -p overrides $inet_socket_port and $unix_socketname
|
60 |
# option(s) -p overrides $inet_socket_port and $unix_socketname
|
61 |
|
61 |
|
62 |
# The default receiving port in the Fedora and RHEL SELinux policy is 10024.
|
62 |
# The default receiving port in the Fedora and RHEL SELinux policy is 10024.
|
Line 78... |
Line 78... |
78 |
originating => 1, # declare that mail was submitted by our smtp client
|
78 |
originating => 1, # declare that mail was submitted by our smtp client
|
79 |
allow_disclaimers => 1, # enables disclaimer insertion if available
|
79 |
allow_disclaimers => 1, # enables disclaimer insertion if available
|
80 |
# notify administrator of locally originating malware
|
80 |
# notify administrator of locally originating malware
|
81 |
virus_admin_maps => ["virusalert\@$mydomain"],
|
81 |
virus_admin_maps => ["virusalert\@$mydomain"],
|
82 |
spam_admin_maps => ["virusalert\@$mydomain"],
|
82 |
spam_admin_maps => ["virusalert\@$mydomain"],
|
83 |
warnbadhsender => 1,
|
83 |
warnbadhsender => 0,
|
84 |
# forward to a smtpd service providing DKIM signing service
|
84 |
# forward to a smtpd service providing DKIM signing service
|
85 |
#forward_method => 'smtp:[127.0.0.1]:10023',
|
85 |
#forward_method => 'smtp:[127.0.0.1]:10023',
|
86 |
# force MTA conversion to 7-bit (e.g. before DKIM signing)
|
86 |
# force MTA conversion to 7-bit (e.g. before DKIM signing)
|
87 |
smtpd_discard_ehlo_keywords => ['8BITMIME'],
|
87 |
smtpd_discard_ehlo_keywords => ['8BITMIME'],
|
88 |
bypass_banned_checks_maps => [1], # allow sending any file names and types
|
88 |
bypass_banned_checks_maps => [1], # allow sending any file names and types
|
Line 161... |
Line 161... |
161 |
# The default forwarding port in the Fedora and RHEL SELinux policy is 10025.
|
161 |
# The default forwarding port in the Fedora and RHEL SELinux policy is 10025.
|
162 |
# To allow additional ports you need to label them as 'amavisd_send_port_t'.
|
162 |
# To allow additional ports you need to label them as 'amavisd_send_port_t'.
|
163 |
# For example: semanage port -a -t amavisd_send_port_t -p tcp 10023
|
163 |
# For example: semanage port -a -t amavisd_send_port_t -p tcp 10023
|
164 |
# $notify_method = 'smtp:[127.0.0.1]:10023';
|
164 |
# $notify_method = 'smtp:[127.0.0.1]:10023';
|
165 |
$forward_method = 'smtp:[127.0.0.1]:10025'; # set to undef with milter!
|
165 |
$forward_method = 'smtp:[127.0.0.1]:10025'; # set to undef with milter!
|
- |
|
166 |
$notify_method = 'smtp:[127.0.0.1]:10025';
|
166 |
|
167 |
|
167 |
$final_virus_destiny = D_DISCARD;
|
168 |
$final_virus_destiny = D_DISCARD;
|
168 |
$final_banned_destiny = D_BOUNCE;
|
169 |
$final_banned_destiny = D_BOUNCE;
|
169 |
$final_spam_destiny = D_DISCARD; #!!! D_DISCARD / D_REJECT
|
170 |
$final_spam_destiny = D_DISCARD; #!!! D_DISCARD / D_REJECT
|
170 |
$final_bad_header_destiny = D_BOUNCE;
|
171 |
$final_bad_header_destiny = D_PASS;
|
171 |
# $bad_header_quarantine_method = undef;
|
172 |
# $bad_header_quarantine_method = undef;
|
172 |
#$virus_quarantine_method = 'local:virus/virus-%i-%n.txt';
|
173 |
$virus_quarantine_method = 'local:virus/virus-%i-%n.txt';
|
173 |
#$spam_quarantine_method = 'local:spam/spam-%b-%i-%n.txt';
|
174 |
$spam_quarantine_method = 'local:spam/spam-%b-%i-%n.txt';
|
174 |
#$banned_files_quarantine_method = 'local:banned/banned-%i-%n.txt';
|
175 |
$banned_files_quarantine_method = 'local:banned/banned-%i-%n.txt';
|
175 |
#$bad_header_quarantine_method = 'local:badh/badh-%i-%n.txt';
|
176 |
$bad_header_quarantine_method = 'local:badh/badh-%i-%n.txt';
|
176 |
|
177 |
|
177 |
# $os_fingerprint_method = 'p0f:*:2345'; # to query p0f-analyzer.pl
|
178 |
# $os_fingerprint_method = 'p0f:*:2345'; # to query p0f-analyzer.pl
|
178 |
|
179 |
|
179 |
## hierarchy by which a final setting is chosen:
|
180 |
## hierarchy by which a final setting is chosen:
|
180 |
## policy bank (based on port or IP address) -> *_by_ccat
|
181 |
## policy bank (based on port or IP address) -> *_by_ccat
|