abclinuxu.cz AbcLinuxu.cz itbiz.cz ITBiz.cz HDmag.cz HDmag.cz abcprace.cz AbcPráce.cz
AbcLinuxu hledá autory!
Inzerujte na AbcPráce.cz od 950 Kč
Rozšířené hledání
×

včera 18:55 | Nová verze

Byla vydána nová stabilní verze 1.9 (1.9.818.44) webového prohlížeče Vivaldi (Wikipedie). Z novinek vývojáři zdůrazňují podporu nového vyhledávače Ecosia. Ten z příjmů z reklam podporuje výsadbu stromů po celém světě (YouTube). Nově lze přeskupovat ikonky rozšíření nebo řadit poznámky. Nejnovější Vivaldi je postaveno na Chromiu 58.0.3029.82.

Ladislav Hagara | Komentářů: 3
včera 17:00 | Nová verze

Byla vydána verze 3.7.0 svobodného systému pro správu obsahu (CMS) Joomla!. V oznámení o vydání (YouTube) se píše o 700 vylepšeních. Opraveno bylo také 8 bezpečnostních chyb.

Ladislav Hagara | Komentářů: 0
včera 08:22 | Komunita

Grsecurity (Wikipedie) je sada bezpečnostních patchů pro linuxové jádro (porovnání se SELinuxem, AppArmorem a KSPP). Od září 2015 nejsou stabilní verze těchto patchů volně k dispozici. Dle včerejšího oznámení (FAQ) nejsou s okamžitou platností volně k dispozici už ani jejich testovací verze.

Ladislav Hagara | Komentářů: 32
26.4. 23:33 | Komunita

OpenBSD 6.1 vyšlo již 11. dubna. Po dvou týdnech byla vydána i oficiální píseň. Její název je Winter of 95 a k dispozici je ve formátech MP3 a OGG.

Ladislav Hagara | Komentářů: 0
26.4. 18:55 | Nová verze

Byla vydána verze 2017.1 linuxové distribuce navržené pro digitální forenzní analýzu a penetrační testování Kali Linux. S vydáním verze 2016.1 se Kali Linux stal průběžně aktualizovanou distribucí. Aktualizovat jej lze pomocí příkazů "apt update; apt dist-upgrade; reboot".

Ladislav Hagara | Komentářů: 0
26.4. 18:22 | Nová verze

Po téměř pěti letech od vydání verze 2.00 byla vydána nová stabilní verze 2.02 systémového zavaděče GNU GRUB (GRand Unified Bootloader). Přehled novinek v souboru NEWS.

Ladislav Hagara | Komentářů: 15
26.4. 17:55 | Komunita

Vývojáři Debianu oznámili, že od 1. listopadu letošního roku nebudou jejich archivy dostupné pomocí protokolu FTP. Již v lednu oznámil ukončení podpory FTP kernel.org (The Linux Kernel Archives).

Ladislav Hagara | Komentářů: 23
26.4. 17:00 | Bezpečnostní upozornění

V oblíbeném webmailu postaveném na PHP SquirrelMail (Wikipedie) byla nalezena bezpečnostní chyba CVE-2017-7692, jež může být útočníkem zneužita ke spuštění libovolných příkazů a kompletnímu ovládnutí dotčeného serveru. Zranitelnost se týká pouze instancí, kde je pro transport používán Sendmail.

Ladislav Hagara | Komentářů: 3
26.4. 13:11 | Zajímavý článek

Soudní dvůr Evropské unie rozhodl (tisková zpráva) ve věci C-527/15: Prodej multimediálního přehrávače, který umožňuje zdarma a jednoduše zhlédnout na televizní obrazovce filmy protiprávně zpřístupněné na internetu, může představovat porušení autorského práva.

Ladislav Hagara | Komentářů: 32
25.4. 13:33 | Pozvánky

Byly stanoveny termíny konferencí LinuxDays 2017 a OpenAlt 2017. Letošní LinuxDays proběhne o víkendu 7. a 8. října v Praze v Dejvicích v prostorách FIT ČVUT. Letošní OpenAlt proběhne o víkendu 4. a 5. listopadu na FIT VUT v Brně.

Ladislav Hagara | Komentářů: 0
Chystáte se pořídit CPU AMD Ryzen?
 (4%)
 (35%)
 (1%)
 (6%)
 (45%)
 (9%)
Celkem 327 hlasů
 Komentářů: 50, poslední včera 04:06
    Rozcestník

    Dotaz: Spamassassin - ne kontroluje postu

    14.6.2007 15:20 devicebusy | skóre: 2
    Spamassassin - ne kontroluje postu
    Přečteno: 1526×
    Ahojte ludia! Pls kdo by mi viedel poradit preco SA ne kontroluje maily. Situation: Mam server na Trustix 3.0.5, bezia tam: Postfix s virtualnymi uzivatelmi (MySQL) Courier Amavisd-new Spamassassin Clamav
    Clamav virse chyta ako ma, ale SA na mna kasla...
    V mailoch mam hlavicky:
    X-Virus-Scanned: amavisd-new at lion.sk
    X-Spam-Score: 0
    X-Spam-Level: 
    X-Spam-Status: No, score=0 required=4 tests=[none]
    Zhruba to vyzera takto, to je kus /var/log/amavisd.log, mode debug:
    
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ESMTP::10024 /var/spool/amavis/tmp/amavis-20070612T164547-11112: some@mail -> 
    some@mail SIZE=4213 Received: from mail ([127.0.0.1]) by localhost (mail [127.0.0.1]) (amavisd-new, port 10024) with ESMTP for some@mail
    ; Tue, 12 Jun 2007 17:14:30 +0200 (CEST)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) body hash: d38541a0426add93ae9d33c7db6c4484
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Checking: Al1Wntwnzlfn [217.118.96.202] some@mail -> some@mail
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) p001 1 Content-Type: text/plain, size: 1328 B, name:
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Checking for banned types and filenames
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) collect banned table[0]: bdf@lion.sk, tables: DEFAULT=>Amavis::Lookup::RE=ARRAY(0x8cda31c)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) p.path some@mail: "P=p001,L=1,M=text/plain,T=txt"
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Using ClamAV-clamd: (built-in interface)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Using (ClamAV-clamd) on dir: CONTSCAN /var/spool/amavis/tmp/amavis-20070612T164547-11112/par
    ts\n
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd: Connecting to socket  /var/run/clamav/clamd.sock
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd: Sending CONTSCAN /var/spool/amavis/tmp/amavis-20070612T164547-11112/parts\n to
     UNIX socket /var/run/clamav/clamd.sock
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) ask_av (ClamAV-clamd): /var/spool/amavis/tmp/amavis-20070612T164547-11112/parts CLEAN
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd result: clean
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) spam_scan: score=0 tests=[none]
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) do_notify_and_quarantine: ccat=Clean, (1,0)
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) AUTH not needed, user='', MTA offers ''
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) response to RCPT TO for some@mail: "250 Ok"
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) FWD via SMTP: some@mail -> some@mail, 250 2.6.0 Ok, id=11112-05, from MTA([
    127.0.0.1]:10025): 250 Ok: queued as 2CD78280034
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) Passed CLEAN, [217.118.96.202] [62.168.208.129] some@mail -> some@mail, Mes
    sage-ID: <20070612150922.16CCFCBA65@blablabla>, mail_id: Al1Wntwnzlfn, Hits: 0., queued_as: 2CD78280034, 397 ms
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) TIMING [total 401 ms] - SMTP EHLO: 2 (1%)1, SMTP pre-MAIL: 1 (0%)1, SMTP pre-DATA-flush: 2 (
    1%)1, SMTP DATA: 78 (19%)21, body_digest: 1 (0%)21, gen_mail_id: 0 (0%)21, mime_decode: 7 (2%)23, get-file-type1: 8 (2%)25, parts_decode: 0 (0%)25, AV-scan-1:
     9 (2%)27, spam-wb-list: 2 (0%)28, SA msg read: 1 (0%)28, SA parse: 3 (1%)29, SA check: 145 (36%)65, SA finish: 1 (0%)65, update_cache: 1 (0%)65, decide_mail_
    destiny: 1 (0%)65, fwd-connect: 22 (5%)71, fwd-mail-from: 2 (1%)71, fwd-rcpt-to: 3 (1%)72, fwd-data-cmd: 1 (0%)72, write-header: 1 (0%)72, fwd-data-contents:
    1 (0%)73, fwd-data-end: 98 (24%)97, fwd-rundown: 1 (0%)97, prepare-dsn: 0 (0%)97, main_log_entry: 8 (2%)99, update_snmp: 1 (0%)100, unlink-1-files: 1 (0%)100,
     rundown: 0 (0%)100
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) load: 0 %, total idle 1721.243 s, busy 2.197 s
    master.cf:
    # DO NOT SHARE THE POSTFIX QUEUE BETWEEN MULTIPLE POSTFIX INSTANCES.
    #
    # ==========================================================================
    # service type  private unpriv  chroot  wakeup  maxproc command + args
    #               (yes)   (yes)   (yes)   (never) (100)
    # ==========================================================================
    smtp      inet  n       -       n       -       -       smtpd
    #smtps    inet  n       -       n       -       -       smtpd
    #  -o smtpd_tls_wrappermode=yes -o smtpd_sasl_auth_enable=yes
    #submission   inet    n       -       n       -       -       smtpd
    #  -o smtpd_enforce_tls=yes -o smtpd_sasl_auth_enable=yes -o smtpd_etrn_restrictions=reject
    #628      inet  n       -       n       -       -       qmqpd
    pickup    fifo  n       -       n       60      1       pickup
    cleanup   unix  n       -       n       -       0       cleanup
    qmgr      fifo  n       -       n       300     1       qmgr
    #qmgr     fifo  n       -       n       300     1       oqmgr
    #tlsmgr   fifo  -       -       n       300     1       tlsmgr
    rewrite   unix  -       -       n       -       -       trivial-rewrite
    bounce    unix  -       -       n       -       0       bounce
    defer     unix  -       -       n       -       0       bounce
    trace     unix  -       -       n       -       0       bounce
    verify    unix  -       -       n       -       1       verify
    flush     unix  n       -       n       1000?   0       flush
    proxymap  unix  -       -       n       -       -       proxymap
    smtp      unix  -       -       n       -       -       smtp
    bigandslow unix -       -       n       -       -       smtp
            -o smtp_connect_timeout=20
    relay     unix  -       -       n       -       -       smtp
    #       -o smtp_helo_timeout=5 -o smtp_connect_timeout=5
    showq     unix  n       -       n       -       -       showq
    error     unix  -       -       n       -       -       error
    local     unix  -       n       n       -       -       local
    virtual   unix  -       n       n       -       -       virtual
    lmtp      unix  -       -       n       -       -       lmtp
    anvil     unix  -       -       n       -       1       anvil
    
    maildrop  unix  -       n       n       -       -       pipe
      flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient}
    #
    # The Cyrus deliver program has changed incompatibly, multiple times.
    #
    old-cyrus unix  -       n       n       -       -       pipe
      flags=R user=cyrus argv=/usr/bin/deliver -e -m ${extension} ${user}
    # Cyrus 2.1.5 (Amos Gouaux)
    # Also specify in main.cf: cyrus_destination_recipient_limit=1
    cyrus     unix  -       n       n       -       -       pipe
      user=cyrus argv=/usr/lib/cyrus-imapd/bin/deliver -e -r ${sender} -m ${extension} ${user}
    uucp      unix  -       n       n       -       -       pipe
      flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
    ifmail    unix  -       n       n       -       -       pipe
      flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
    bsmtp     unix  -       n       n       -       -       pipe
      flags=Fq. user=bsmtp argv=/usr/local/sbin/bsmtp -f $sender $nexthop $recipient
    scalemail-backend unix  -       n       n       -       2       pipe
       flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
    
    scache    unix  -       -       n       -       1       scache
    discard   unix  -       -       n       -       -       discard
    tlsmgr    unix  -       -       n       1000?   1       tlsmgr
    
    amavis unix - - - - 2 smtp
            -o smtp_data_done_timeout=1200
            -o smtp_send_xforward_command=yes
    
    127.0.0.1:10025 inet n - - - - smtpd
            -o content_filter=
            -o local_recipient_maps=
            -o relay_recipient_maps=
            -o smtpd_restriction_classes=
            -o smtpd_client_restrictions=
            -o smtpd_helo_restrictions=
            -o smtpd_sender_restrictions=
            -o smtpd_recipient_restrictions=permit_mynetworks,reject
            -o mynetworks=127.0.0.0/8
            -o strict_rfc821_envelopes=yes
            -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
            -o smtpd_bind_address=127.0.0.1
    kusok main.cf:
    ....
    content_filter = amavis:[127.0.0.1]:10024
    ...
    local.cf:
    
    #   Add *****SPAM***** to the Subject header of spam e-mails
    #
     rewrite_header Subject *****SPAM*****
    
    #   Save spam messages as a message/rfc822 MIME attachment instead of
    #   modifying the original message (0: off, 2: use text/plain instead)
    #
     report_safe 1
    
    #   Set which networks or hosts are considered 'trusted' by your mail
    #   server (i.e. not spammers)
    #
    # trusted_networks 10. 127.
    
    #   Set file-locking method (flock is not safe over NFS, but is faster)
    #
     lock_method flock
    
    #   Set the threshold at which a message is considered spam (default: 5.0)
    #
     required_score 4.0
    
    #   Use Bayesian classifier (default: 1)
    #
     use_bayes 1
    
    #   Bayesian classifier auto-learning (default: 1)
    #
     bayes_auto_learn 1
    
    Vopred vsetkym dakujem za pomoc.

    Odpovědi

    14.6.2007 16:06 pasmen | skóre: 45 | blog: glob | Praha
    Rozbalit Rozbalit vše Re: Spamassassin - ne kontroluje postu
    Zapomnel jsi to nejdulezitejsi: amavisd.conf. Chyba bude v tom.
    14.6.2007 16:16 devicebusy | skóre: 2
    Rozbalit Rozbalit vše Re: Spamassassin - ne kontroluje postu
    Aha sorac,

    use strict;
    $MYHOME = '/var/spool/amavis';   # (default is '/var/spool/amavis')
    $mydomain = 'lion.sk';      # (no useful default)
    $myhostname = 'mail.lion.sk';  # fqdn of this host, default by uname(3)
    $daemon_user  = 'amavis';   # (no default;  customary: vscan or amavis)
    $daemon_group = 'amavis';   # (no default;  customary: vscan or amavis or sweep)
    $TEMPBASE = "$MYHOME/tmp";     # prefer to keep home dir /var/spool/amavis clean?
    $db_home = "$MYHOME/db";	# DB databases directory, default "$MYHOME/db"
    $ENV{TMPDIR} = $TEMPBASE;       # wise to set TMPDIR, but not obligatory
    $enable_db = 1;              # enable use of BerkeleyDB/libdb (SNMP and nanny)
    $enable_global_cache = 1;    # enable use of libdb-based cache if $enable_db=1
    $forward_method = 'smtp:[127.0.0.1]:10025';  # where to forward checked mail
    $notify_method = $forward_method;            # where to submit notifications
    $max_servers  =  2;   # number of pre-forked children          (default 2)
    $max_requests = 20;   # retire a child after that many accepts (default 10)
    $child_timeout=5*60;  # abort child if it does not complete each task in
    @local_domains_maps = ( [".$mydomain", "teleperformance.sk", "lion.sk"] );  # $mydomain and its subdomains
    $unix_socketname = "$MYHOME/amavisd.sock"; # amavis helper protocol socket
    $inet_socket_port = 10024;        # accept SMTP on this local TCP port
    @inet_acl = qw( 127.0.0.1 ::1 );  # allow SMTP access only from localhost IP
    $DO_SYSLOG = 0;                   # (defaults to false)
    $SYSLOG_LEVEL = 'daemon.debug';     # (facility.priority, default 'mail.info')
    $LOGFILE = "/var/log/amavis.log";  # (defaults to empty, no log)
    $log_level = 5;		  # (defaults to 0)
    $log_recip_templ = undef;  # undef disables by-recipient level-0 log entries
    $final_virus_destiny      = D_DISCARD;  # (defaults to D_DISCARD)
    $final_banned_destiny     = D_DISCARD;  # (defaults to D_BOUNCE)
    $final_spam_destiny       = D_DISCARD;  # (defaults to D_BOUNCE)
    $final_bad_header_destiny = D_PASS;  # (defaults to D_PASS), D_BOUNCE suggested
    @viruses_that_fake_sender_maps = (new_RE(
      qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,
      qr'tanatos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,
      qr'dloader|galil|gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,
      qr'frethem|sircam|be?agle|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,
      qr'@mm|@MM',    # mass mailing viruses as labeled by f-prot and uvscan
      qr'Worm'i,      # worms as labeled by ClamAV, Kaspersky, etc
      [qr'^(EICAR|Joke\.|Junk\.)'i         => 0],
      [qr'^(WM97|OF97|W95/CIH-|JS/Fort)'i  => 0],
      [qr/.*/ => 1],  # true by default  (remove or comment-out if undesired)
    ));
    $virus_admin = 'suvakin@teleperformance.sk';
    $spam_admin = "suvakin\@teleperformance.sk";
    $mailfrom_notify_admin     = "virusalert\@$mydomain";
    $mailfrom_notify_recip     = "virusalert\@$mydomain";
    $mailfrom_notify_spamadmin = "spam.police\@$mydomain";
    $mailfrom_to_quarantine = '';   # override sender address with null return path
    $QUARANTINEDIR = '/var/spool/amavis/virusmails';
    $virus_quarantine_method        = 'local:virus/virus-%i-%n';
    $spam_quarantine_method         = 'local:spam/spam-%b-%i-%n';
    $banned_files_quarantine_method = 'local:banned/banned-%i-%n';
    $bad_header_quarantine_method   = 'local:badh/badh-%i-%n';
    $X_HEADER_TAG = 'X-Virus-Scanned';	# (default: 'X-Virus-Scanned')
    $X_HEADER_LINE = "$myproduct_name at $mydomain";
    $undecipherable_subject_tag = '***UNCHECKED*** ';  # undef disables it
    $remove_existing_x_scanned_headers = 0; # leave existing X-Virus-Scanned alone
    $remove_existing_spam_headers  = 1;     # remove existing spam headers if
    @keep_decoded_original_maps = (new_RE(
      qr'^MAIL-UNDECIPHERABLE$',  # retain full mail if it contains undecipherables
      qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
    ));
    $banned_filename_re = new_RE(
      qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
      qr'^application/x-msdownload$'i,                  # block these MIME types
      qr'^application/x-msdos-program$'i,
      qr'^application/hta$'i,
      [ qr'^\.(rpm|cpio|tar)$'       => 0 ],  # allow any type in Unix archives
      qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
      qr'.\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|exe|fxp|hlp|hta|inf|ins|isp|
            js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|ops|pcd|pif|prg|
            reg|scr|sct|shb|shs|vb|vbe|vbs|wsc|wsf|wsh)$'ix,  # banned ext - long
      qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i,  # banned extension - WinZip vulnerab.
      qr'^\.(exe-ms)$',                       # banned file(1) types
    );
    $banned_namepath_re = new_RE(
      qr'(?#NO X-MSDOWNLOAD)   ^(.*\t)? M=application/x-msdownload   (\t.*)? $'xmi,
      qr'(?#NO X-MSDOS-PROGRAM)^(.*\t)? M=application/x-msdos-program(\t.*)? $'xmi,
      qr'(?#NO HTA)            ^(.*\t)? M=application/hta            (\t.*)? $'xmi,
      [ qr'(?#rule-4) ^ (.*\t)? T=(tar|rpm|cpio) (\t.*)? $'xmi => 0 ],  # allow
      qr'(?# BLOCK DOUBLE-EXTENSIONS )
         ^ (.*\t)? N= [^\t\n]* \. [^./\t\n]* \.
                      (exe|vbs|pif|scr|bat|cmd|com|cpl|dll) \.? (\t.*)? $'xmi,
      qr'(?# BLOCK COMMON NAME EXENSIONS )
         ^ (.*\t)? N= [^\t\n]* \. (exe|vbs|pif|scr|bat|com|cpl) (\t.*)? $'xmi,
      [ qr'(?# BLOCK EMPTY MIME PART APPLICATION/OCTET-STREAM )
           ^ (.*\t)? M=application/octet-stream \t(.*\t)* T=empty (\t.*)? $'xmi
        => 'DISCARD' ],
      qr'(?# BLOCK Microsoft EXECUTABLES )
         ^ (.*\t)? T=exe-ms (\t.*)? $'xm,              # banned file(1) type
    );
      $banned_namepath_re = undef;  # to disable new-style
    $sql_select_white_black_list = undef;  # undef disables SQL white/blacklisting
    $localpart_is_case_sensitive = 0;	# (default is false)
    @score_sender_maps = ({  # a by-recipient hash lookup table
      '.' => [  # the _first_ matching sender determines the score boost
       new_RE(  # regexp-type lookup table, just happens to be all soft-blacklist
        [qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i         => 5.0],
        [qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
        [qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
        [qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i   => 5.0],
        [qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i  => 5.0],
        [qr'^(your_friend|greatoffers)@'i                                => 5.0],
        [qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i                    => 5.0],
       ),
       { # a hash-type lookup table (associative array)
         'nobody@cert.org'                        => -3.0,
         'cert-advisory@us-cert.gov'              => -3.0,
         'owner-alert@iss.net'                    => -3.0,
         'slashdot@slashdot.org'                  => -3.0,
         'bugtraq@securityfocus.com'              => -3.0,
         'ntbugtraq@listserv.ntbugtraq.com'       => -3.0,
         'security-alerts@linuxsecurity.com'      => -3.0,
         'mailman-announce-admin@python.org'      => -3.0,
         'amavis-user-admin@lists.sourceforge.net'=> -3.0,
         'notification-return@lists.sophos.com'   => -3.0,
         'owner-postfix-users@postfix.org'        => -3.0,
         'owner-postfix-announce@postfix.org'     => -3.0,
         'owner-sendmail-announce@lists.sendmail.org'   => -3.0,
         'sendmail-announce-request@lists.sendmail.org' => -3.0,
         'donotreply@sendmail.org'                => -3.0,
         'ca+envelope@sendmail.org'               => -3.0,
         'noreply@freshmeat.net'                  => -3.0,
         'owner-technews@postel.acm.org'          => -3.0,
         'ietf-123-owner@loki.ietf.org'           => -3.0,
         'cvs-commits-list-admin@gnome.org'       => -3.0,
         'rt-users-admin@lists.fsck.com'          => -3.0,
         'clp-request@comp.nus.edu.sg'            => -3.0,
         'surveys-errors@lists.nua.ie'            => -3.0,
         'emailnews@genomeweb.com'                => -5.0,
         'yahoo-dev-null@yahoo-inc.com'           => -3.0,
         'returns.groups.yahoo.com'               => -3.0,
         'clusternews@linuxnetworx.com'           => -3.0,
         lc('lvs-users-admin@LinuxVirtualServer.org')    => -3.0,
         lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
         'sender@example.net'                     =>  3.0,
         '.example.net'                           =>  1.0,
       },
      ],  # end of site-wide tables
    });
    @blacklist_sender_maps = ( new_RE(
        qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou|greatcasino)@'i,
        qr'^(investments|lose_weight_today|market\.alert|money2you|MyGreenCard)@'i,
        qr'^(new\.tld\.registry|opt-out|opt-in|optin|saveonlsmoking2002k)@'i,
        qr'^(specialoffer|specialoffers|stockalert|stopsnoring|wantsome)@'i,
        qr'^(workathome|yesitsfree|your_friend|greatoffers)@'i,
        qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i,
    ));
    $MAXLEVELS = 14;		# (default is undef, no limit)
    $MAXFILES = 1500;		# (default is undef, no limit)
    $MIN_EXPANSION_QUOTA =      100*1024;  # bytes  (default undef, not enforced)
    $MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not enforced)
    $MIN_EXPANSION_FACTOR =   5;  # times original mail size  (default is 5)
    $MAX_EXPANSION_FACTOR = 500;  # times original mail size  (default is 500)
    $virus_check_negative_ttl=  3*60; # time to remember that mail was not infected
    $virus_check_positive_ttl= 30*60; # time to remember that mail was infected
    $spam_check_negative_ttl = 30*60; # time to remember that mail was not spam
    $spam_check_positive_ttl = 30*60; # time to remember that mail was spam
    $path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
    $file   = 'file';   # file(1) utility; use 3.41 or later to avoid vulnerability
    $gzip   = 'gzip';
    $bzip2  = 'bzip2';
    $lzop   = 'lzop';
    $rpm2cpio   = ['rpm2cpio.pl','rpm2cpio'];
    $cabextract = 'cabextract';
    $uncompress = ['uncompress', 'gzip -d', 'zcat'];
    $unfreeze   = ['unfreeze', 'freeze -d', 'melt', 'fcat'];
    $arc        = ['nomarch', 'arc'];
    $unarj      = ['arj', 'unarj'];  # both can extract, arj is recommended
    $unrar      = ['rar', 'unrar'];  # both can extract, same options
    $zoo    = 'zoo';
    $lha    = 'lha';
    $cpio   = ['gcpio','cpio']; # gcpio is a GNU cpio on OpenBSD, which supports
    $ar     = 'ar';  # Unix binary archives and Debian binary packages
    $dspam  = 'dspam';
    $sa_local_tests_only = 0;   # (default: false)
    $sa_mail_body_size_limit = 2000*1024; # don't waste time on SA if mail is larger
    $sa_tag_level_deflt  = undef; # add spam info headers if at, or above that level;
    $sa_tag2_level_deflt = 4.0; # add 'spam detected' headers at that level to
    $sa_kill_level_deflt = $sa_tag2_level_deflt; # triggers spam evasive actions
    $sa_dsn_cutoff_level = 10;  # spam level beyond which a DSN is not sent,
    $sa_spam_subject_tag = '***SPAM*** ';	# (defaults to undef, disabled)
    $sa_spam_modifies_subj = 1; # in @sa_spam_modifies_subj_maps, default is true
    $sa_spam_level_char = '*';  # char for X-Spam-Level bar, defaults to '*';
    $sa_spam_report_header = 1; # insert X-Spam-Report header field? default false
    @av_scanners = (
    ['ClamAV-clamd',
      \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.sock"],
      qr/\bOK$/, qr/\bFOUND$/,
      qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    );
    @av_scanners_backup = (
      ['ClamAV-clamscan', 'clamscan',
        "--stdout --disable-summary -r --tempdir=$TEMPBASE {}", [0], [1],
        qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    );
    1;  # insure a defined return

    Založit nové vláknoNahoru

    Tiskni Sdílej: Linkuj Jaggni to Vybrali.sme.sk Google Del.icio.us Facebook

    ISSN 1214-1267   www.czech-server.cz
    © 1999-2015 Nitemedia s. r. o. Všechna práva vyhrazena.