abclinuxu.cz AbcLinuxu.cz itbiz.cz ITBiz.cz HDmag.cz HDmag.cz abcprace.cz AbcPráce.cz
AbcLinuxu hledá autory!
Inzerujte na AbcPráce.cz od 950 Kč
Rozšířené hledání
×
    včera 02:11 | Komunita

    Všem čtenářkám a čtenářům AbcLinuxu krásné Vánoce.

    Ladislav Hagara | Komentářů: 17
    včera 02:00 | Nová verze

    Byla vydána nová verze 7.0 linuxové distribuce Parrot OS (Wikipedie). S kódovým názvem Echo. Jedná se o linuxovou distribuci založenou na Debianu a zaměřenou na penetrační testování, digitální forenzní analýzu, reverzní inženýrství, hacking, anonymitu nebo kryptografii. Přehled novinek v příspěvku na blogu.

    Ladislav Hagara | Komentářů: 0
    23.12. 18:33 | Nová verze

    Vývojáři postmarketOS vydali verzi 25.12 tohoto před osmi lety představeného operačního systému pro chytré telefony vycházejícího z optimalizovaného a nakonfigurovaného Alpine Linuxu s vlastními balíčky. Přehled novinek v příspěvku na blogu. Na výběr jsou 4 uživatelská rozhraní: GNOME Shell on Mobile, KDE Plasma Mobile, Phosh a Sxmo.

    Ladislav Hagara | Komentářů: 0
    23.12. 13:55 | Nová verze

    Byla vydána nová verze 0.41.0 multimediálního přehrávače mpv (Wikipedie) vycházejícího z přehrávačů MPlayer a mplayer2. Přehled novinek, změn a oprav na GitHubu. Požadován je FFmpeg 6.1 nebo novější a také libplacebo 6.338.2 nebo novější.

    Ladislav Hagara | Komentářů: 0
    23.12. 12:44 | Nová verze

    Byla vydána nová verze 5.5 (novinky) skriptovacího jazyka Lua (Wikipedie). Po pěti a půl letech od vydání verze 5.4.

    Ladislav Hagara | Komentářů: 0
    22.12. 23:44 | Nová verze

    Byla vydána nová verze 5.4.0 programu na úpravu digitálních fotografií darktable (Wikipedie). Z novinek lze vypíchnout vylepšenou podporu Waylandu. Nejnovější darktable by měl na Waylandu fungovat stejně dobře jako na X11.

    Ladislav Hagara | Komentářů: 0
    21.12. 05:00 | Nová verze

    Byla vydána beta verze Linux Mintu 22.3 s kódovým jménem Zena. Podrobnosti v přehledu novinek a poznámkách k vydání. Vypíchnout lze, že nástroj Systémová hlášení (System Reports) získal mnoho nových funkcí a byl přejmenován na Informace o systému (System Information). Linux Mint 22.3 bude podporován do roku 2029.

    Ladislav Hagara | Komentářů: 2
    21.12. 01:55 | Nová verze

    GNU Project Debugger aneb GDB byl vydán ve verzi 17.1. Podrobný přehled novinek v souboru NEWS.

    Ladislav Hagara | Komentářů: 0
    19.12. 17:22 | IT novinky

    Josef Průša oznámil zveřejnění kompletních CAD souborů rámů tiskáren Prusa CORE One a CORE One L. Nejsou vydány pod obecnou veřejnou licenci GNU ani Creative Commons ale pod novou licencí OCL neboli Open Community License. Ta nepovoluje prodávat kompletní tiskárny či remixy založené na těchto zdrojích.

    Ladislav Hagara | Komentářů: 14
    19.12. 17:00 | Komunita

    Nový CEO Mozilla Corporation Anthony Enzor-DeMeo tento týden prohlásil, že by se Firefox měl vyvinout v moderní AI prohlížeč. Po bouřlivých diskusích na redditu ujistil, že v nastavení Firefoxu bude existovat volba pro zakázání všech AI funkcí.

    Ladislav Hagara | Komentářů: 1
    Kdo vám letos nadělí dárek?
     (33%)
     (2%)
     (10%)
     (2%)
     (1%)
     (2%)
     (16%)
     (19%)
     (14%)
    Celkem 83 hlasů
     Komentářů: 18, poslední včera 15:30
    Rozcestník

    Dotaz: Spamassassin - ne kontroluje postu

    14.6.2007 15:20 devicebusy | skóre: 2
    Spamassassin - ne kontroluje postu
    Přečteno: 1689×
    Ahojte ludia! Pls kdo by mi viedel poradit preco SA ne kontroluje maily. Situation: Mam server na Trustix 3.0.5, bezia tam: Postfix s virtualnymi uzivatelmi (MySQL) Courier Amavisd-new Spamassassin Clamav
    Clamav virse chyta ako ma, ale SA na mna kasla...
    V mailoch mam hlavicky:
    X-Virus-Scanned: amavisd-new at lion.sk
    X-Spam-Score: 0
    X-Spam-Level: 
    X-Spam-Status: No, score=0 required=4 tests=[none]
    Zhruba to vyzera takto, to je kus /var/log/amavisd.log, mode debug:
    
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ESMTP::10024 /var/spool/amavis/tmp/amavis-20070612T164547-11112: some@mail -> 
    some@mail SIZE=4213 Received: from mail ([127.0.0.1]) by localhost (mail [127.0.0.1]) (amavisd-new, port 10024) with ESMTP for some@mail
    ; Tue, 12 Jun 2007 17:14:30 +0200 (CEST)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) body hash: d38541a0426add93ae9d33c7db6c4484
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Checking: Al1Wntwnzlfn [217.118.96.202] some@mail -> some@mail
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) p001 1 Content-Type: text/plain, size: 1328 B, name:
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Checking for banned types and filenames
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) collect banned table[0]: bdf@lion.sk, tables: DEFAULT=>Amavis::Lookup::RE=ARRAY(0x8cda31c)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) p.path some@mail: "P=p001,L=1,M=text/plain,T=txt"
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Using ClamAV-clamd: (built-in interface)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Using (ClamAV-clamd) on dir: CONTSCAN /var/spool/amavis/tmp/amavis-20070612T164547-11112/par
    ts\n
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd: Connecting to socket  /var/run/clamav/clamd.sock
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd: Sending CONTSCAN /var/spool/amavis/tmp/amavis-20070612T164547-11112/parts\n to
     UNIX socket /var/run/clamav/clamd.sock
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) ask_av (ClamAV-clamd): /var/spool/amavis/tmp/amavis-20070612T164547-11112/parts CLEAN
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd result: clean
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) spam_scan: score=0 tests=[none]
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) do_notify_and_quarantine: ccat=Clean, (1,0)
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) AUTH not needed, user='', MTA offers ''
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) response to RCPT TO for some@mail: "250 Ok"
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) FWD via SMTP: some@mail -> some@mail, 250 2.6.0 Ok, id=11112-05, from MTA([
    127.0.0.1]:10025): 250 Ok: queued as 2CD78280034
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) Passed CLEAN, [217.118.96.202] [62.168.208.129] some@mail -> some@mail, Mes
    sage-ID: <20070612150922.16CCFCBA65@blablabla>, mail_id: Al1Wntwnzlfn, Hits: 0., queued_as: 2CD78280034, 397 ms
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) TIMING [total 401 ms] - SMTP EHLO: 2 (1%)1, SMTP pre-MAIL: 1 (0%)1, SMTP pre-DATA-flush: 2 (
    1%)1, SMTP DATA: 78 (19%)21, body_digest: 1 (0%)21, gen_mail_id: 0 (0%)21, mime_decode: 7 (2%)23, get-file-type1: 8 (2%)25, parts_decode: 0 (0%)25, AV-scan-1:
     9 (2%)27, spam-wb-list: 2 (0%)28, SA msg read: 1 (0%)28, SA parse: 3 (1%)29, SA check: 145 (36%)65, SA finish: 1 (0%)65, update_cache: 1 (0%)65, decide_mail_
    destiny: 1 (0%)65, fwd-connect: 22 (5%)71, fwd-mail-from: 2 (1%)71, fwd-rcpt-to: 3 (1%)72, fwd-data-cmd: 1 (0%)72, write-header: 1 (0%)72, fwd-data-contents:
    1 (0%)73, fwd-data-end: 98 (24%)97, fwd-rundown: 1 (0%)97, prepare-dsn: 0 (0%)97, main_log_entry: 8 (2%)99, update_snmp: 1 (0%)100, unlink-1-files: 1 (0%)100,
     rundown: 0 (0%)100
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) load: 0 %, total idle 1721.243 s, busy 2.197 s
    master.cf:
    # DO NOT SHARE THE POSTFIX QUEUE BETWEEN MULTIPLE POSTFIX INSTANCES.
    #
    # ==========================================================================
    # service type  private unpriv  chroot  wakeup  maxproc command + args
    #               (yes)   (yes)   (yes)   (never) (100)
    # ==========================================================================
    smtp      inet  n       -       n       -       -       smtpd
    #smtps    inet  n       -       n       -       -       smtpd
    #  -o smtpd_tls_wrappermode=yes -o smtpd_sasl_auth_enable=yes
    #submission   inet    n       -       n       -       -       smtpd
    #  -o smtpd_enforce_tls=yes -o smtpd_sasl_auth_enable=yes -o smtpd_etrn_restrictions=reject
    #628      inet  n       -       n       -       -       qmqpd
    pickup    fifo  n       -       n       60      1       pickup
    cleanup   unix  n       -       n       -       0       cleanup
    qmgr      fifo  n       -       n       300     1       qmgr
    #qmgr     fifo  n       -       n       300     1       oqmgr
    #tlsmgr   fifo  -       -       n       300     1       tlsmgr
    rewrite   unix  -       -       n       -       -       trivial-rewrite
    bounce    unix  -       -       n       -       0       bounce
    defer     unix  -       -       n       -       0       bounce
    trace     unix  -       -       n       -       0       bounce
    verify    unix  -       -       n       -       1       verify
    flush     unix  n       -       n       1000?   0       flush
    proxymap  unix  -       -       n       -       -       proxymap
    smtp      unix  -       -       n       -       -       smtp
    bigandslow unix -       -       n       -       -       smtp
            -o smtp_connect_timeout=20
    relay     unix  -       -       n       -       -       smtp
    #       -o smtp_helo_timeout=5 -o smtp_connect_timeout=5
    showq     unix  n       -       n       -       -       showq
    error     unix  -       -       n       -       -       error
    local     unix  -       n       n       -       -       local
    virtual   unix  -       n       n       -       -       virtual
    lmtp      unix  -       -       n       -       -       lmtp
    anvil     unix  -       -       n       -       1       anvil
    
    maildrop  unix  -       n       n       -       -       pipe
      flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient}
    #
    # The Cyrus deliver program has changed incompatibly, multiple times.
    #
    old-cyrus unix  -       n       n       -       -       pipe
      flags=R user=cyrus argv=/usr/bin/deliver -e -m ${extension} ${user}
    # Cyrus 2.1.5 (Amos Gouaux)
    # Also specify in main.cf: cyrus_destination_recipient_limit=1
    cyrus     unix  -       n       n       -       -       pipe
      user=cyrus argv=/usr/lib/cyrus-imapd/bin/deliver -e -r ${sender} -m ${extension} ${user}
    uucp      unix  -       n       n       -       -       pipe
      flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
    ifmail    unix  -       n       n       -       -       pipe
      flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
    bsmtp     unix  -       n       n       -       -       pipe
      flags=Fq. user=bsmtp argv=/usr/local/sbin/bsmtp -f $sender $nexthop $recipient
    scalemail-backend unix  -       n       n       -       2       pipe
       flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
    
    scache    unix  -       -       n       -       1       scache
    discard   unix  -       -       n       -       -       discard
    tlsmgr    unix  -       -       n       1000?   1       tlsmgr
    
    amavis unix - - - - 2 smtp
            -o smtp_data_done_timeout=1200
            -o smtp_send_xforward_command=yes
    
    127.0.0.1:10025 inet n - - - - smtpd
            -o content_filter=
            -o local_recipient_maps=
            -o relay_recipient_maps=
            -o smtpd_restriction_classes=
            -o smtpd_client_restrictions=
            -o smtpd_helo_restrictions=
            -o smtpd_sender_restrictions=
            -o smtpd_recipient_restrictions=permit_mynetworks,reject
            -o mynetworks=127.0.0.0/8
            -o strict_rfc821_envelopes=yes
            -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
            -o smtpd_bind_address=127.0.0.1
    kusok main.cf:
    ....
    content_filter = amavis:[127.0.0.1]:10024
    ...
    local.cf:
    
    #   Add *****SPAM***** to the Subject header of spam e-mails
    #
     rewrite_header Subject *****SPAM*****
    
    #   Save spam messages as a message/rfc822 MIME attachment instead of
    #   modifying the original message (0: off, 2: use text/plain instead)
    #
     report_safe 1
    
    #   Set which networks or hosts are considered 'trusted' by your mail
    #   server (i.e. not spammers)
    #
    # trusted_networks 10. 127.
    
    #   Set file-locking method (flock is not safe over NFS, but is faster)
    #
     lock_method flock
    
    #   Set the threshold at which a message is considered spam (default: 5.0)
    #
     required_score 4.0
    
    #   Use Bayesian classifier (default: 1)
    #
     use_bayes 1
    
    #   Bayesian classifier auto-learning (default: 1)
    #
     bayes_auto_learn 1
    
    Vopred vsetkym dakujem za pomoc.

    Odpovědi

    14.6.2007 16:06 pasmen | skóre: 45 | blog: glob | Praha
    Rozbalit Rozbalit vše Re: Spamassassin - ne kontroluje postu
    Zapomnel jsi to nejdulezitejsi: amavisd.conf. Chyba bude v tom.
    14.6.2007 16:16 devicebusy | skóre: 2
    Rozbalit Rozbalit vše Re: Spamassassin - ne kontroluje postu
    Aha sorac,

    use strict;
    $MYHOME = '/var/spool/amavis';   # (default is '/var/spool/amavis')
    $mydomain = 'lion.sk';      # (no useful default)
    $myhostname = 'mail.lion.sk';  # fqdn of this host, default by uname(3)
    $daemon_user  = 'amavis';   # (no default;  customary: vscan or amavis)
    $daemon_group = 'amavis';   # (no default;  customary: vscan or amavis or sweep)
    $TEMPBASE = "$MYHOME/tmp";     # prefer to keep home dir /var/spool/amavis clean?
    $db_home = "$MYHOME/db";	# DB databases directory, default "$MYHOME/db"
    $ENV{TMPDIR} = $TEMPBASE;       # wise to set TMPDIR, but not obligatory
    $enable_db = 1;              # enable use of BerkeleyDB/libdb (SNMP and nanny)
    $enable_global_cache = 1;    # enable use of libdb-based cache if $enable_db=1
    $forward_method = 'smtp:[127.0.0.1]:10025';  # where to forward checked mail
    $notify_method = $forward_method;            # where to submit notifications
    $max_servers  =  2;   # number of pre-forked children          (default 2)
    $max_requests = 20;   # retire a child after that many accepts (default 10)
    $child_timeout=5*60;  # abort child if it does not complete each task in
    @local_domains_maps = ( [".$mydomain", "teleperformance.sk", "lion.sk"] );  # $mydomain and its subdomains
    $unix_socketname = "$MYHOME/amavisd.sock"; # amavis helper protocol socket
    $inet_socket_port = 10024;        # accept SMTP on this local TCP port
    @inet_acl = qw( 127.0.0.1 ::1 );  # allow SMTP access only from localhost IP
    $DO_SYSLOG = 0;                   # (defaults to false)
    $SYSLOG_LEVEL = 'daemon.debug';     # (facility.priority, default 'mail.info')
    $LOGFILE = "/var/log/amavis.log";  # (defaults to empty, no log)
    $log_level = 5;		  # (defaults to 0)
    $log_recip_templ = undef;  # undef disables by-recipient level-0 log entries
    $final_virus_destiny      = D_DISCARD;  # (defaults to D_DISCARD)
    $final_banned_destiny     = D_DISCARD;  # (defaults to D_BOUNCE)
    $final_spam_destiny       = D_DISCARD;  # (defaults to D_BOUNCE)
    $final_bad_header_destiny = D_PASS;  # (defaults to D_PASS), D_BOUNCE suggested
    @viruses_that_fake_sender_maps = (new_RE(
      qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,
      qr'tanatos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,
      qr'dloader|galil|gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,
      qr'frethem|sircam|be?agle|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,
      qr'@mm|@MM',    # mass mailing viruses as labeled by f-prot and uvscan
      qr'Worm'i,      # worms as labeled by ClamAV, Kaspersky, etc
      [qr'^(EICAR|Joke\.|Junk\.)'i         => 0],
      [qr'^(WM97|OF97|W95/CIH-|JS/Fort)'i  => 0],
      [qr/.*/ => 1],  # true by default  (remove or comment-out if undesired)
    ));
    $virus_admin = 'suvakin@teleperformance.sk';
    $spam_admin = "suvakin\@teleperformance.sk";
    $mailfrom_notify_admin     = "virusalert\@$mydomain";
    $mailfrom_notify_recip     = "virusalert\@$mydomain";
    $mailfrom_notify_spamadmin = "spam.police\@$mydomain";
    $mailfrom_to_quarantine = '';   # override sender address with null return path
    $QUARANTINEDIR = '/var/spool/amavis/virusmails';
    $virus_quarantine_method        = 'local:virus/virus-%i-%n';
    $spam_quarantine_method         = 'local:spam/spam-%b-%i-%n';
    $banned_files_quarantine_method = 'local:banned/banned-%i-%n';
    $bad_header_quarantine_method   = 'local:badh/badh-%i-%n';
    $X_HEADER_TAG = 'X-Virus-Scanned';	# (default: 'X-Virus-Scanned')
    $X_HEADER_LINE = "$myproduct_name at $mydomain";
    $undecipherable_subject_tag = '***UNCHECKED*** ';  # undef disables it
    $remove_existing_x_scanned_headers = 0; # leave existing X-Virus-Scanned alone
    $remove_existing_spam_headers  = 1;     # remove existing spam headers if
    @keep_decoded_original_maps = (new_RE(
      qr'^MAIL-UNDECIPHERABLE$',  # retain full mail if it contains undecipherables
      qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
    ));
    $banned_filename_re = new_RE(
      qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
      qr'^application/x-msdownload$'i,                  # block these MIME types
      qr'^application/x-msdos-program$'i,
      qr'^application/hta$'i,
      [ qr'^\.(rpm|cpio|tar)$'       => 0 ],  # allow any type in Unix archives
      qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
      qr'.\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|exe|fxp|hlp|hta|inf|ins|isp|
            js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|ops|pcd|pif|prg|
            reg|scr|sct|shb|shs|vb|vbe|vbs|wsc|wsf|wsh)$'ix,  # banned ext - long
      qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i,  # banned extension - WinZip vulnerab.
      qr'^\.(exe-ms)$',                       # banned file(1) types
    );
    $banned_namepath_re = new_RE(
      qr'(?#NO X-MSDOWNLOAD)   ^(.*\t)? M=application/x-msdownload   (\t.*)? $'xmi,
      qr'(?#NO X-MSDOS-PROGRAM)^(.*\t)? M=application/x-msdos-program(\t.*)? $'xmi,
      qr'(?#NO HTA)            ^(.*\t)? M=application/hta            (\t.*)? $'xmi,
      [ qr'(?#rule-4) ^ (.*\t)? T=(tar|rpm|cpio) (\t.*)? $'xmi => 0 ],  # allow
      qr'(?# BLOCK DOUBLE-EXTENSIONS )
         ^ (.*\t)? N= [^\t\n]* \. [^./\t\n]* \.
                      (exe|vbs|pif|scr|bat|cmd|com|cpl|dll) \.? (\t.*)? $'xmi,
      qr'(?# BLOCK COMMON NAME EXENSIONS )
         ^ (.*\t)? N= [^\t\n]* \. (exe|vbs|pif|scr|bat|com|cpl) (\t.*)? $'xmi,
      [ qr'(?# BLOCK EMPTY MIME PART APPLICATION/OCTET-STREAM )
           ^ (.*\t)? M=application/octet-stream \t(.*\t)* T=empty (\t.*)? $'xmi
        => 'DISCARD' ],
      qr'(?# BLOCK Microsoft EXECUTABLES )
         ^ (.*\t)? T=exe-ms (\t.*)? $'xm,              # banned file(1) type
    );
      $banned_namepath_re = undef;  # to disable new-style
    $sql_select_white_black_list = undef;  # undef disables SQL white/blacklisting
    $localpart_is_case_sensitive = 0;	# (default is false)
    @score_sender_maps = ({  # a by-recipient hash lookup table
      '.' => [  # the _first_ matching sender determines the score boost
       new_RE(  # regexp-type lookup table, just happens to be all soft-blacklist
        [qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i         => 5.0],
        [qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
        [qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
        [qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i   => 5.0],
        [qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i  => 5.0],
        [qr'^(your_friend|greatoffers)@'i                                => 5.0],
        [qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i                    => 5.0],
       ),
       { # a hash-type lookup table (associative array)
         'nobody@cert.org'                        => -3.0,
         'cert-advisory@us-cert.gov'              => -3.0,
         'owner-alert@iss.net'                    => -3.0,
         'slashdot@slashdot.org'                  => -3.0,
         'bugtraq@securityfocus.com'              => -3.0,
         'ntbugtraq@listserv.ntbugtraq.com'       => -3.0,
         'security-alerts@linuxsecurity.com'      => -3.0,
         'mailman-announce-admin@python.org'      => -3.0,
         'amavis-user-admin@lists.sourceforge.net'=> -3.0,
         'notification-return@lists.sophos.com'   => -3.0,
         'owner-postfix-users@postfix.org'        => -3.0,
         'owner-postfix-announce@postfix.org'     => -3.0,
         'owner-sendmail-announce@lists.sendmail.org'   => -3.0,
         'sendmail-announce-request@lists.sendmail.org' => -3.0,
         'donotreply@sendmail.org'                => -3.0,
         'ca+envelope@sendmail.org'               => -3.0,
         'noreply@freshmeat.net'                  => -3.0,
         'owner-technews@postel.acm.org'          => -3.0,
         'ietf-123-owner@loki.ietf.org'           => -3.0,
         'cvs-commits-list-admin@gnome.org'       => -3.0,
         'rt-users-admin@lists.fsck.com'          => -3.0,
         'clp-request@comp.nus.edu.sg'            => -3.0,
         'surveys-errors@lists.nua.ie'            => -3.0,
         'emailnews@genomeweb.com'                => -5.0,
         'yahoo-dev-null@yahoo-inc.com'           => -3.0,
         'returns.groups.yahoo.com'               => -3.0,
         'clusternews@linuxnetworx.com'           => -3.0,
         lc('lvs-users-admin@LinuxVirtualServer.org')    => -3.0,
         lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
         'sender@example.net'                     =>  3.0,
         '.example.net'                           =>  1.0,
       },
      ],  # end of site-wide tables
    });
    @blacklist_sender_maps = ( new_RE(
        qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou|greatcasino)@'i,
        qr'^(investments|lose_weight_today|market\.alert|money2you|MyGreenCard)@'i,
        qr'^(new\.tld\.registry|opt-out|opt-in|optin|saveonlsmoking2002k)@'i,
        qr'^(specialoffer|specialoffers|stockalert|stopsnoring|wantsome)@'i,
        qr'^(workathome|yesitsfree|your_friend|greatoffers)@'i,
        qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i,
    ));
    $MAXLEVELS = 14;		# (default is undef, no limit)
    $MAXFILES = 1500;		# (default is undef, no limit)
    $MIN_EXPANSION_QUOTA =      100*1024;  # bytes  (default undef, not enforced)
    $MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not enforced)
    $MIN_EXPANSION_FACTOR =   5;  # times original mail size  (default is 5)
    $MAX_EXPANSION_FACTOR = 500;  # times original mail size  (default is 500)
    $virus_check_negative_ttl=  3*60; # time to remember that mail was not infected
    $virus_check_positive_ttl= 30*60; # time to remember that mail was infected
    $spam_check_negative_ttl = 30*60; # time to remember that mail was not spam
    $spam_check_positive_ttl = 30*60; # time to remember that mail was spam
    $path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
    $file   = 'file';   # file(1) utility; use 3.41 or later to avoid vulnerability
    $gzip   = 'gzip';
    $bzip2  = 'bzip2';
    $lzop   = 'lzop';
    $rpm2cpio   = ['rpm2cpio.pl','rpm2cpio'];
    $cabextract = 'cabextract';
    $uncompress = ['uncompress', 'gzip -d', 'zcat'];
    $unfreeze   = ['unfreeze', 'freeze -d', 'melt', 'fcat'];
    $arc        = ['nomarch', 'arc'];
    $unarj      = ['arj', 'unarj'];  # both can extract, arj is recommended
    $unrar      = ['rar', 'unrar'];  # both can extract, same options
    $zoo    = 'zoo';
    $lha    = 'lha';
    $cpio   = ['gcpio','cpio']; # gcpio is a GNU cpio on OpenBSD, which supports
    $ar     = 'ar';  # Unix binary archives and Debian binary packages
    $dspam  = 'dspam';
    $sa_local_tests_only = 0;   # (default: false)
    $sa_mail_body_size_limit = 2000*1024; # don't waste time on SA if mail is larger
    $sa_tag_level_deflt  = undef; # add spam info headers if at, or above that level;
    $sa_tag2_level_deflt = 4.0; # add 'spam detected' headers at that level to
    $sa_kill_level_deflt = $sa_tag2_level_deflt; # triggers spam evasive actions
    $sa_dsn_cutoff_level = 10;  # spam level beyond which a DSN is not sent,
    $sa_spam_subject_tag = '***SPAM*** ';	# (defaults to undef, disabled)
    $sa_spam_modifies_subj = 1; # in @sa_spam_modifies_subj_maps, default is true
    $sa_spam_level_char = '*';  # char for X-Spam-Level bar, defaults to '*';
    $sa_spam_report_header = 1; # insert X-Spam-Report header field? default false
    @av_scanners = (
    ['ClamAV-clamd',
      \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.sock"],
      qr/\bOK$/, qr/\bFOUND$/,
      qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    );
    @av_scanners_backup = (
      ['ClamAV-clamscan', 'clamscan',
        "--stdout --disable-summary -r --tempdir=$TEMPBASE {}", [0], [1],
        qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    );
    1;  # insure a defined return

    Založit nové vláknoNahoru

    Tiskni Sdílej: Linkuj Jaggni to Vybrali.sme.sk Google Del.icio.us Facebook

    ISSN 1214-1267   www.czech-server.cz
    © 1999-2015 Nitemedia s. r. o. Všechna práva vyhrazena.