2004-07-18 12:05:50 +02:00
|
|
|
--- amavisd.conf.orig Thu Jul 1 22:04:36 2004
|
2004-08-12 00:45:57 +02:00
|
|
|
+++ amavisd.conf Wed Aug 11 16:23:13 2004
|
2004-07-18 12:05:50 +02:00
|
|
|
@@ -9,7 +9,7 @@
|
|
|
|
# MUST BE SET (no useful default):
|
2003-01-04 08:20:30 +01:00
|
|
|
|
2004-07-18 12:05:50 +02:00
|
|
|
$mydomain = 'example.com';
|
|
|
|
-$MYHOME = '/var/amavis';
|
|
|
|
+$MYHOME = '%%AMAVISDIR%%';
|
|
|
|
$TEMPBASE = "$MYHOME/tmp";
|
2003-01-04 08:20:30 +01:00
|
|
|
|
|
|
|
|
2004-07-18 12:05:50 +02:00
|
|
|
@@ -19,8 +19,8 @@
|
|
|
|
# @bypass_spam_checks_maps = (1); # uncomment to DISABLE anti-spam code
|
2003-05-19 14:56:33 +02:00
|
|
|
|
2004-07-18 12:05:50 +02:00
|
|
|
$max_servers = 2; # number of pre-forked children
|
|
|
|
-$daemon_user = 'vscan'; # (no default; customary: vscan or amavis)
|
|
|
|
-$daemon_group = 'vscan'; # (no default; customary: vscan or amavis)
|
|
|
|
+$daemon_user = '%%AMAVISUSER%%'; # (no default; customary: vscan or amavis)
|
|
|
|
+$daemon_group = '%%AMAVISGROUP%%'; # (no default; customary: vscan or amavis)
|
|
|
|
@local_domains_maps = ( [".$mydomain"] );
|
|
|
|
|
|
|
|
$log_level = 0;
|
|
|
|
@@ -28,7 +28,7 @@
|
|
|
|
$DO_SYSLOG = 1;
|
|
|
|
$SYSLOG_LEVEL = 'mail.info';
|
|
|
|
$ENV{TMPDIR} = $TEMPBASE;
|
2003-01-04 08:20:30 +01:00
|
|
|
-$QUARANTINEDIR = '/var/virusmails';
|
|
|
|
+$QUARANTINEDIR = '%%AMAVISQUARANTINE%%';
|
2004-07-18 12:05:50 +02:00
|
|
|
# $daemon_chroot_dir = $MYHOME; # (default is undef, meaning: do not chroot)
|
2003-01-04 08:20:30 +01:00
|
|
|
|
2004-07-18 12:05:50 +02:00
|
|
|
$inet_socket_port = 10024; # accept SMTP on this local TCP port(s) (Postfix)
|
2004-08-12 00:45:57 +02:00
|
|
|
@@ -50,10 +50,10 @@
|
|
|
|
$mailfrom_notify_admin = "virusalert\@$mydomain";
|
|
|
|
$mailfrom_notify_recip = "virusalert\@$mydomain";
|
|
|
|
$mailfrom_notify_spamadmin = "spam.police\@$mydomain";
|
|
|
|
-@addr_extension_virus_maps = ('virus');
|
|
|
|
-@addr_extension_spam_maps = ('spam');
|
|
|
|
-@addr_extension_banned_maps = ('banned');
|
|
|
|
-@addr_extension_bad_header_maps = ('badh');
|
|
|
|
+#@addr_extension_virus_maps = ('virus');
|
|
|
|
+#@addr_extension_spam_maps = ('spam');
|
|
|
|
+#@addr_extension_banned_maps = ('banned');
|
|
|
|
+#@addr_extension_bad_header_maps = ('badh');
|
|
|
|
|
|
|
|
$path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
|
|
|
|
$file = 'file'; # file(1) utility; use 3.41 or later to avoid vulnerability
|