abclinuxu.cz AbcLinuxu.cz itbiz.cz ITBiz.cz HDmag.cz HDmag.cz abcprace.cz AbcPráce.cz
AbcLinuxu hledá autory!
Inzerujte na AbcPráce.cz od 950 Kč
Rozšířené hledání
×
    dnes 03:55 | Bezpečnostní upozornění

    Příspěvek na blogu Ubuntu upozorňuje na několik zranitelností v rozšíření Linuxu o mandatorní řízení přístupu AppArmor. Společně jsou označovány jako CrackArmor. Objevila je společnost Qualys (technické detaily). Neprivilegovaný lokální uživatel se může stát rootem. Chyba existuje od roku 2017. Doporučuje se okamžitá aktualizace. Problém se týká Ubuntu, Debianu nebo SUSE. Red Hat nebo Fedora pro mandatorní řízení přístupu používají SELinux.

    Ladislav Hagara | Komentářů: 0
    včera 17:22 | Nová verze

    Byla vydána nová verze 19 integrovaného vývojového prostředí (IDE) Qt Creator. Podrobný přehled novinek v changelogu.

    Ladislav Hagara | Komentářů: 0
    včera 03:44 | Nová verze

    Bitwig Studio (Wikipedie) bylo vydáno ve verzi 6. Jedná se o proprietární multiplatformní (macOS, Windows, Linux) digitální pracovní stanici pro práci s audiem (DAW).

    Ladislav Hagara | Komentářů: 4
    včera 02:11 | Komunita

    Společnost Igalia představila novou linuxovou distribuci (framework) s názvem Moonforge. Jedná se o distribuci určenou pro vestavěné systémy. Vychází z projektů Yocto a OpenEmbedded.

    Ladislav Hagara | Komentářů: 0
    včera 00:44 | Nová verze

    Google Chrome 146 byl prohlášen za stabilní. Nejnovější stabilní verze 146.0.7680.71 přináší řadu novinek z hlediska uživatelů i vývojářů. Podrobný přehled v poznámkách k vydání. Opraveno bylo 29 bezpečnostních chyb. Vylepšeny byly také nástroje pro vývojáře.

    Ladislav Hagara | Komentářů: 0
    včera 00:22 | Nová verze

    D7VK byl vydán ve verzi 1.5. Jedná se o fork DXVK implementující překlad volání Direct3D 3 (novinka), 5, 6 a 7 na Vulkan. DXVK zvládá Direct3D 8, 9, 10 a 11.

    Ladislav Hagara | Komentářů: 0
    11.3. 23:22 | Nová verze

    Bylo vydáno Eclipse IDE 2026-03 aneb Eclipse 4.39. Představení novinek tohoto integrovaného vývojového prostředí také na YouTube.

    Ladislav Hagara | Komentářů: 4
    11.3. 10:22 | Upozornění

    Ze systému Slavia pojišťovny uniklo přibližně 150 gigabajtů citlivých dat. Jedná se například o pojistné dokumenty, lékařské záznamy nebo přímou komunikaci s klienty. Za únik může chyba dodavatelské společnosti.

    Ladislav Hagara | Komentářů: 11
    11.3. 10:11 | IT novinky

    Sněmovna propustila do dalšího kola projednávání vládní návrh zákona o digitální ekonomice, který má přinést bezpečnější on-line prostředí. Reaguje na evropské nařízení DSA o digitálních službách a upravuje třeba pravidla pro on-line tržiště nebo sociální sítě a má i víc chránit děti.

    Ladislav Hagara | Komentářů: 34
    11.3. 09:33 | IT novinky

    Meta převezme sociální síť pro umělou inteligenci (AI) Moltbook. Tvůrci Moltbooku – Matt Schlicht a Ben Parr – se díky dohodě stanou součástí Meta Superintelligence Labs (MSL). Meta MSL založila s cílem sjednotit své aktivity na poli AI a vyvinout takovou umělou inteligenci, která překoná lidské schopnosti v mnoha oblastech. Fungovat by měla ne jako centralizovaný nástroj, ale jako osobní asistent pro každého uživatele.

    Ladislav Hagara | Komentářů: 0
    Které desktopové prostředí na Linuxu používáte?
     (16%)
     (7%)
     (0%)
     (11%)
     (29%)
     (2%)
     (5%)
     (2%)
     (13%)
     (25%)
    Celkem 1060 hlasů
     Komentářů: 26, poslední včera 08:56
    Rozcestník

    Dotaz: Spamassassin - ne kontroluje postu

    14.6.2007 15:20 devicebusy | skóre: 2
    Spamassassin - ne kontroluje postu
    Přečteno: 1703×
    Ahojte ludia! Pls kdo by mi viedel poradit preco SA ne kontroluje maily. Situation: Mam server na Trustix 3.0.5, bezia tam: Postfix s virtualnymi uzivatelmi (MySQL) Courier Amavisd-new Spamassassin Clamav
    Clamav virse chyta ako ma, ale SA na mna kasla...
    V mailoch mam hlavicky:
    X-Virus-Scanned: amavisd-new at lion.sk
    X-Spam-Score: 0
    X-Spam-Level: 
    X-Spam-Status: No, score=0 required=4 tests=[none]
    Zhruba to vyzera takto, to je kus /var/log/amavisd.log, mode debug:
    
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ESMTP::10024 /var/spool/amavis/tmp/amavis-20070612T164547-11112: some@mail -> 
    some@mail SIZE=4213 Received: from mail ([127.0.0.1]) by localhost (mail [127.0.0.1]) (amavisd-new, port 10024) with ESMTP for some@mail
    ; Tue, 12 Jun 2007 17:14:30 +0200 (CEST)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) body hash: d38541a0426add93ae9d33c7db6c4484
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Checking: Al1Wntwnzlfn [217.118.96.202] some@mail -> some@mail
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) p001 1 Content-Type: text/plain, size: 1328 B, name:
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Checking for banned types and filenames
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) collect banned table[0]: bdf@lion.sk, tables: DEFAULT=>Amavis::Lookup::RE=ARRAY(0x8cda31c)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) p.path some@mail: "P=p001,L=1,M=text/plain,T=txt"
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Using ClamAV-clamd: (built-in interface)
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) Using (ClamAV-clamd) on dir: CONTSCAN /var/spool/amavis/tmp/amavis-20070612T164547-11112/par
    ts\n
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd: Connecting to socket  /var/run/clamav/clamd.sock
    Jun 12 17:14:30 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd: Sending CONTSCAN /var/spool/amavis/tmp/amavis-20070612T164547-11112/parts\n to
     UNIX socket /var/run/clamav/clamd.sock
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) ask_av (ClamAV-clamd): /var/spool/amavis/tmp/amavis-20070612T164547-11112/parts CLEAN
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) ClamAV-clamd result: clean
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) spam_scan: score=0 tests=[none]
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) do_notify_and_quarantine: ccat=Clean, (1,0)
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) AUTH not needed, user='', MTA offers ''
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) response to RCPT TO for some@mail: "250 Ok"
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) FWD via SMTP: some@mail -> some@mail, 250 2.6.0 Ok, id=11112-05, from MTA([
    127.0.0.1]:10025): 250 Ok: queued as 2CD78280034
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) Passed CLEAN, [217.118.96.202] [62.168.208.129] some@mail -> some@mail, Mes
    sage-ID: <20070612150922.16CCFCBA65@blablabla>, mail_id: Al1Wntwnzlfn, Hits: 0., queued_as: 2CD78280034, 397 ms
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) TIMING [total 401 ms] - SMTP EHLO: 2 (1%)1, SMTP pre-MAIL: 1 (0%)1, SMTP pre-DATA-flush: 2 (
    1%)1, SMTP DATA: 78 (19%)21, body_digest: 1 (0%)21, gen_mail_id: 0 (0%)21, mime_decode: 7 (2%)23, get-file-type1: 8 (2%)25, parts_decode: 0 (0%)25, AV-scan-1:
     9 (2%)27, spam-wb-list: 2 (0%)28, SA msg read: 1 (0%)28, SA parse: 3 (1%)29, SA check: 145 (36%)65, SA finish: 1 (0%)65, update_cache: 1 (0%)65, decide_mail_
    destiny: 1 (0%)65, fwd-connect: 22 (5%)71, fwd-mail-from: 2 (1%)71, fwd-rcpt-to: 3 (1%)72, fwd-data-cmd: 1 (0%)72, write-header: 1 (0%)72, fwd-data-contents:
    1 (0%)73, fwd-data-end: 98 (24%)97, fwd-rundown: 1 (0%)97, prepare-dsn: 0 (0%)97, main_log_entry: 8 (2%)99, update_snmp: 1 (0%)100, unlink-1-files: 1 (0%)100,
     rundown: 0 (0%)100
    Jun 12 17:14:31 mail /usr/sbin/amavisd[11112]: (11112-05) load: 0 %, total idle 1721.243 s, busy 2.197 s
    master.cf:
    # DO NOT SHARE THE POSTFIX QUEUE BETWEEN MULTIPLE POSTFIX INSTANCES.
    #
    # ==========================================================================
    # service type  private unpriv  chroot  wakeup  maxproc command + args
    #               (yes)   (yes)   (yes)   (never) (100)
    # ==========================================================================
    smtp      inet  n       -       n       -       -       smtpd
    #smtps    inet  n       -       n       -       -       smtpd
    #  -o smtpd_tls_wrappermode=yes -o smtpd_sasl_auth_enable=yes
    #submission   inet    n       -       n       -       -       smtpd
    #  -o smtpd_enforce_tls=yes -o smtpd_sasl_auth_enable=yes -o smtpd_etrn_restrictions=reject
    #628      inet  n       -       n       -       -       qmqpd
    pickup    fifo  n       -       n       60      1       pickup
    cleanup   unix  n       -       n       -       0       cleanup
    qmgr      fifo  n       -       n       300     1       qmgr
    #qmgr     fifo  n       -       n       300     1       oqmgr
    #tlsmgr   fifo  -       -       n       300     1       tlsmgr
    rewrite   unix  -       -       n       -       -       trivial-rewrite
    bounce    unix  -       -       n       -       0       bounce
    defer     unix  -       -       n       -       0       bounce
    trace     unix  -       -       n       -       0       bounce
    verify    unix  -       -       n       -       1       verify
    flush     unix  n       -       n       1000?   0       flush
    proxymap  unix  -       -       n       -       -       proxymap
    smtp      unix  -       -       n       -       -       smtp
    bigandslow unix -       -       n       -       -       smtp
            -o smtp_connect_timeout=20
    relay     unix  -       -       n       -       -       smtp
    #       -o smtp_helo_timeout=5 -o smtp_connect_timeout=5
    showq     unix  n       -       n       -       -       showq
    error     unix  -       -       n       -       -       error
    local     unix  -       n       n       -       -       local
    virtual   unix  -       n       n       -       -       virtual
    lmtp      unix  -       -       n       -       -       lmtp
    anvil     unix  -       -       n       -       1       anvil
    
    maildrop  unix  -       n       n       -       -       pipe
      flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient}
    #
    # The Cyrus deliver program has changed incompatibly, multiple times.
    #
    old-cyrus unix  -       n       n       -       -       pipe
      flags=R user=cyrus argv=/usr/bin/deliver -e -m ${extension} ${user}
    # Cyrus 2.1.5 (Amos Gouaux)
    # Also specify in main.cf: cyrus_destination_recipient_limit=1
    cyrus     unix  -       n       n       -       -       pipe
      user=cyrus argv=/usr/lib/cyrus-imapd/bin/deliver -e -r ${sender} -m ${extension} ${user}
    uucp      unix  -       n       n       -       -       pipe
      flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
    ifmail    unix  -       n       n       -       -       pipe
      flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
    bsmtp     unix  -       n       n       -       -       pipe
      flags=Fq. user=bsmtp argv=/usr/local/sbin/bsmtp -f $sender $nexthop $recipient
    scalemail-backend unix  -       n       n       -       2       pipe
       flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
    
    scache    unix  -       -       n       -       1       scache
    discard   unix  -       -       n       -       -       discard
    tlsmgr    unix  -       -       n       1000?   1       tlsmgr
    
    amavis unix - - - - 2 smtp
            -o smtp_data_done_timeout=1200
            -o smtp_send_xforward_command=yes
    
    127.0.0.1:10025 inet n - - - - smtpd
            -o content_filter=
            -o local_recipient_maps=
            -o relay_recipient_maps=
            -o smtpd_restriction_classes=
            -o smtpd_client_restrictions=
            -o smtpd_helo_restrictions=
            -o smtpd_sender_restrictions=
            -o smtpd_recipient_restrictions=permit_mynetworks,reject
            -o mynetworks=127.0.0.0/8
            -o strict_rfc821_envelopes=yes
            -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
            -o smtpd_bind_address=127.0.0.1
    kusok main.cf:
    ....
    content_filter = amavis:[127.0.0.1]:10024
    ...
    local.cf:
    
    #   Add *****SPAM***** to the Subject header of spam e-mails
    #
     rewrite_header Subject *****SPAM*****
    
    #   Save spam messages as a message/rfc822 MIME attachment instead of
    #   modifying the original message (0: off, 2: use text/plain instead)
    #
     report_safe 1
    
    #   Set which networks or hosts are considered 'trusted' by your mail
    #   server (i.e. not spammers)
    #
    # trusted_networks 10. 127.
    
    #   Set file-locking method (flock is not safe over NFS, but is faster)
    #
     lock_method flock
    
    #   Set the threshold at which a message is considered spam (default: 5.0)
    #
     required_score 4.0
    
    #   Use Bayesian classifier (default: 1)
    #
     use_bayes 1
    
    #   Bayesian classifier auto-learning (default: 1)
    #
     bayes_auto_learn 1
    
    Vopred vsetkym dakujem za pomoc.

    Odpovědi

    14.6.2007 16:06 pasmen | skóre: 45 | blog: glob | Praha
    Rozbalit Rozbalit vše Re: Spamassassin - ne kontroluje postu
    Zapomnel jsi to nejdulezitejsi: amavisd.conf. Chyba bude v tom.
    14.6.2007 16:16 devicebusy | skóre: 2
    Rozbalit Rozbalit vše Re: Spamassassin - ne kontroluje postu
    Aha sorac,

    use strict;
    $MYHOME = '/var/spool/amavis';   # (default is '/var/spool/amavis')
    $mydomain = 'lion.sk';      # (no useful default)
    $myhostname = 'mail.lion.sk';  # fqdn of this host, default by uname(3)
    $daemon_user  = 'amavis';   # (no default;  customary: vscan or amavis)
    $daemon_group = 'amavis';   # (no default;  customary: vscan or amavis or sweep)
    $TEMPBASE = "$MYHOME/tmp";     # prefer to keep home dir /var/spool/amavis clean?
    $db_home = "$MYHOME/db";	# DB databases directory, default "$MYHOME/db"
    $ENV{TMPDIR} = $TEMPBASE;       # wise to set TMPDIR, but not obligatory
    $enable_db = 1;              # enable use of BerkeleyDB/libdb (SNMP and nanny)
    $enable_global_cache = 1;    # enable use of libdb-based cache if $enable_db=1
    $forward_method = 'smtp:[127.0.0.1]:10025';  # where to forward checked mail
    $notify_method = $forward_method;            # where to submit notifications
    $max_servers  =  2;   # number of pre-forked children          (default 2)
    $max_requests = 20;   # retire a child after that many accepts (default 10)
    $child_timeout=5*60;  # abort child if it does not complete each task in
    @local_domains_maps = ( [".$mydomain", "teleperformance.sk", "lion.sk"] );  # $mydomain and its subdomains
    $unix_socketname = "$MYHOME/amavisd.sock"; # amavis helper protocol socket
    $inet_socket_port = 10024;        # accept SMTP on this local TCP port
    @inet_acl = qw( 127.0.0.1 ::1 );  # allow SMTP access only from localhost IP
    $DO_SYSLOG = 0;                   # (defaults to false)
    $SYSLOG_LEVEL = 'daemon.debug';     # (facility.priority, default 'mail.info')
    $LOGFILE = "/var/log/amavis.log";  # (defaults to empty, no log)
    $log_level = 5;		  # (defaults to 0)
    $log_recip_templ = undef;  # undef disables by-recipient level-0 log entries
    $final_virus_destiny      = D_DISCARD;  # (defaults to D_DISCARD)
    $final_banned_destiny     = D_DISCARD;  # (defaults to D_BOUNCE)
    $final_spam_destiny       = D_DISCARD;  # (defaults to D_BOUNCE)
    $final_bad_header_destiny = D_PASS;  # (defaults to D_PASS), D_BOUNCE suggested
    @viruses_that_fake_sender_maps = (new_RE(
      qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,
      qr'tanatos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,
      qr'dloader|galil|gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,
      qr'frethem|sircam|be?agle|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,
      qr'@mm|@MM',    # mass mailing viruses as labeled by f-prot and uvscan
      qr'Worm'i,      # worms as labeled by ClamAV, Kaspersky, etc
      [qr'^(EICAR|Joke\.|Junk\.)'i         => 0],
      [qr'^(WM97|OF97|W95/CIH-|JS/Fort)'i  => 0],
      [qr/.*/ => 1],  # true by default  (remove or comment-out if undesired)
    ));
    $virus_admin = 'suvakin@teleperformance.sk';
    $spam_admin = "suvakin\@teleperformance.sk";
    $mailfrom_notify_admin     = "virusalert\@$mydomain";
    $mailfrom_notify_recip     = "virusalert\@$mydomain";
    $mailfrom_notify_spamadmin = "spam.police\@$mydomain";
    $mailfrom_to_quarantine = '';   # override sender address with null return path
    $QUARANTINEDIR = '/var/spool/amavis/virusmails';
    $virus_quarantine_method        = 'local:virus/virus-%i-%n';
    $spam_quarantine_method         = 'local:spam/spam-%b-%i-%n';
    $banned_files_quarantine_method = 'local:banned/banned-%i-%n';
    $bad_header_quarantine_method   = 'local:badh/badh-%i-%n';
    $X_HEADER_TAG = 'X-Virus-Scanned';	# (default: 'X-Virus-Scanned')
    $X_HEADER_LINE = "$myproduct_name at $mydomain";
    $undecipherable_subject_tag = '***UNCHECKED*** ';  # undef disables it
    $remove_existing_x_scanned_headers = 0; # leave existing X-Virus-Scanned alone
    $remove_existing_spam_headers  = 1;     # remove existing spam headers if
    @keep_decoded_original_maps = (new_RE(
      qr'^MAIL-UNDECIPHERABLE$',  # retain full mail if it contains undecipherables
      qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
    ));
    $banned_filename_re = new_RE(
      qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
      qr'^application/x-msdownload$'i,                  # block these MIME types
      qr'^application/x-msdos-program$'i,
      qr'^application/hta$'i,
      [ qr'^\.(rpm|cpio|tar)$'       => 0 ],  # allow any type in Unix archives
      qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
      qr'.\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|exe|fxp|hlp|hta|inf|ins|isp|
            js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|ops|pcd|pif|prg|
            reg|scr|sct|shb|shs|vb|vbe|vbs|wsc|wsf|wsh)$'ix,  # banned ext - long
      qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i,  # banned extension - WinZip vulnerab.
      qr'^\.(exe-ms)$',                       # banned file(1) types
    );
    $banned_namepath_re = new_RE(
      qr'(?#NO X-MSDOWNLOAD)   ^(.*\t)? M=application/x-msdownload   (\t.*)? $'xmi,
      qr'(?#NO X-MSDOS-PROGRAM)^(.*\t)? M=application/x-msdos-program(\t.*)? $'xmi,
      qr'(?#NO HTA)            ^(.*\t)? M=application/hta            (\t.*)? $'xmi,
      [ qr'(?#rule-4) ^ (.*\t)? T=(tar|rpm|cpio) (\t.*)? $'xmi => 0 ],  # allow
      qr'(?# BLOCK DOUBLE-EXTENSIONS )
         ^ (.*\t)? N= [^\t\n]* \. [^./\t\n]* \.
                      (exe|vbs|pif|scr|bat|cmd|com|cpl|dll) \.? (\t.*)? $'xmi,
      qr'(?# BLOCK COMMON NAME EXENSIONS )
         ^ (.*\t)? N= [^\t\n]* \. (exe|vbs|pif|scr|bat|com|cpl) (\t.*)? $'xmi,
      [ qr'(?# BLOCK EMPTY MIME PART APPLICATION/OCTET-STREAM )
           ^ (.*\t)? M=application/octet-stream \t(.*\t)* T=empty (\t.*)? $'xmi
        => 'DISCARD' ],
      qr'(?# BLOCK Microsoft EXECUTABLES )
         ^ (.*\t)? T=exe-ms (\t.*)? $'xm,              # banned file(1) type
    );
      $banned_namepath_re = undef;  # to disable new-style
    $sql_select_white_black_list = undef;  # undef disables SQL white/blacklisting
    $localpart_is_case_sensitive = 0;	# (default is false)
    @score_sender_maps = ({  # a by-recipient hash lookup table
      '.' => [  # the _first_ matching sender determines the score boost
       new_RE(  # regexp-type lookup table, just happens to be all soft-blacklist
        [qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i         => 5.0],
        [qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
        [qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
        [qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i   => 5.0],
        [qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i  => 5.0],
        [qr'^(your_friend|greatoffers)@'i                                => 5.0],
        [qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i                    => 5.0],
       ),
       { # a hash-type lookup table (associative array)
         'nobody@cert.org'                        => -3.0,
         'cert-advisory@us-cert.gov'              => -3.0,
         'owner-alert@iss.net'                    => -3.0,
         'slashdot@slashdot.org'                  => -3.0,
         'bugtraq@securityfocus.com'              => -3.0,
         'ntbugtraq@listserv.ntbugtraq.com'       => -3.0,
         'security-alerts@linuxsecurity.com'      => -3.0,
         'mailman-announce-admin@python.org'      => -3.0,
         'amavis-user-admin@lists.sourceforge.net'=> -3.0,
         'notification-return@lists.sophos.com'   => -3.0,
         'owner-postfix-users@postfix.org'        => -3.0,
         'owner-postfix-announce@postfix.org'     => -3.0,
         'owner-sendmail-announce@lists.sendmail.org'   => -3.0,
         'sendmail-announce-request@lists.sendmail.org' => -3.0,
         'donotreply@sendmail.org'                => -3.0,
         'ca+envelope@sendmail.org'               => -3.0,
         'noreply@freshmeat.net'                  => -3.0,
         'owner-technews@postel.acm.org'          => -3.0,
         'ietf-123-owner@loki.ietf.org'           => -3.0,
         'cvs-commits-list-admin@gnome.org'       => -3.0,
         'rt-users-admin@lists.fsck.com'          => -3.0,
         'clp-request@comp.nus.edu.sg'            => -3.0,
         'surveys-errors@lists.nua.ie'            => -3.0,
         'emailnews@genomeweb.com'                => -5.0,
         'yahoo-dev-null@yahoo-inc.com'           => -3.0,
         'returns.groups.yahoo.com'               => -3.0,
         'clusternews@linuxnetworx.com'           => -3.0,
         lc('lvs-users-admin@LinuxVirtualServer.org')    => -3.0,
         lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
         'sender@example.net'                     =>  3.0,
         '.example.net'                           =>  1.0,
       },
      ],  # end of site-wide tables
    });
    @blacklist_sender_maps = ( new_RE(
        qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou|greatcasino)@'i,
        qr'^(investments|lose_weight_today|market\.alert|money2you|MyGreenCard)@'i,
        qr'^(new\.tld\.registry|opt-out|opt-in|optin|saveonlsmoking2002k)@'i,
        qr'^(specialoffer|specialoffers|stockalert|stopsnoring|wantsome)@'i,
        qr'^(workathome|yesitsfree|your_friend|greatoffers)@'i,
        qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i,
    ));
    $MAXLEVELS = 14;		# (default is undef, no limit)
    $MAXFILES = 1500;		# (default is undef, no limit)
    $MIN_EXPANSION_QUOTA =      100*1024;  # bytes  (default undef, not enforced)
    $MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not enforced)
    $MIN_EXPANSION_FACTOR =   5;  # times original mail size  (default is 5)
    $MAX_EXPANSION_FACTOR = 500;  # times original mail size  (default is 500)
    $virus_check_negative_ttl=  3*60; # time to remember that mail was not infected
    $virus_check_positive_ttl= 30*60; # time to remember that mail was infected
    $spam_check_negative_ttl = 30*60; # time to remember that mail was not spam
    $spam_check_positive_ttl = 30*60; # time to remember that mail was spam
    $path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
    $file   = 'file';   # file(1) utility; use 3.41 or later to avoid vulnerability
    $gzip   = 'gzip';
    $bzip2  = 'bzip2';
    $lzop   = 'lzop';
    $rpm2cpio   = ['rpm2cpio.pl','rpm2cpio'];
    $cabextract = 'cabextract';
    $uncompress = ['uncompress', 'gzip -d', 'zcat'];
    $unfreeze   = ['unfreeze', 'freeze -d', 'melt', 'fcat'];
    $arc        = ['nomarch', 'arc'];
    $unarj      = ['arj', 'unarj'];  # both can extract, arj is recommended
    $unrar      = ['rar', 'unrar'];  # both can extract, same options
    $zoo    = 'zoo';
    $lha    = 'lha';
    $cpio   = ['gcpio','cpio']; # gcpio is a GNU cpio on OpenBSD, which supports
    $ar     = 'ar';  # Unix binary archives and Debian binary packages
    $dspam  = 'dspam';
    $sa_local_tests_only = 0;   # (default: false)
    $sa_mail_body_size_limit = 2000*1024; # don't waste time on SA if mail is larger
    $sa_tag_level_deflt  = undef; # add spam info headers if at, or above that level;
    $sa_tag2_level_deflt = 4.0; # add 'spam detected' headers at that level to
    $sa_kill_level_deflt = $sa_tag2_level_deflt; # triggers spam evasive actions
    $sa_dsn_cutoff_level = 10;  # spam level beyond which a DSN is not sent,
    $sa_spam_subject_tag = '***SPAM*** ';	# (defaults to undef, disabled)
    $sa_spam_modifies_subj = 1; # in @sa_spam_modifies_subj_maps, default is true
    $sa_spam_level_char = '*';  # char for X-Spam-Level bar, defaults to '*';
    $sa_spam_report_header = 1; # insert X-Spam-Report header field? default false
    @av_scanners = (
    ['ClamAV-clamd',
      \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.sock"],
      qr/\bOK$/, qr/\bFOUND$/,
      qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    );
    @av_scanners_backup = (
      ['ClamAV-clamscan', 'clamscan',
        "--stdout --disable-summary -r --tempdir=$TEMPBASE {}", [0], [1],
        qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    );
    1;  # insure a defined return

    Založit nové vláknoNahoru

    Tiskni Sdílej: Linkuj Jaggni to Vybrali.sme.sk Google Del.icio.us Facebook

    ISSN 1214-1267   www.czech-server.cz
    © 1999-2015 Nitemedia s. r. o. Všechna práva vyhrazena.