Mail Gateway
Re: Mail Gateway
Hallo...so sieht die Datei
"/etc/amavis/conf.d/15-content_filter_mode"
aus:
==========================================================================================
use strict;
# You can modify this file to re-enable SPAM checking through spamassassin
# and to re-enable antivirus checking.
#
# Default antivirus checking mode
# Uncomment the two lines below to enable it back
#
@bypass_virus_checks_maps = (
%bypass_virus_checks, @bypass_virus_checks_acl, $bypass_virus_checks_re);
#
# Default SPAM checking mode
# Uncomment the two lines below to enable it back
#
@bypass_spam_checks_maps = (
%bypass_spam_checks, @bypass_spam_checks_acl, $bypass_spam_checks_re);
1; # insure a defined return
============================================================================================
Es stellt sich für mich die Frage, warum noch eine Testmail durchkommt?
Um der Sache auf die Spur zu kommen, wisst Ihr doch bestimmt, was eingesehen werden müsste. Noch einmal...ich möchte ja kein fertiges Setup....sondern wo der Fehler liegen könnte!
Was müsstet Ihr von Infos von mir haben?
DANKE FÜR EURE HILFE
"/etc/amavis/conf.d/15-content_filter_mode"
aus:
==========================================================================================
use strict;
# You can modify this file to re-enable SPAM checking through spamassassin
# and to re-enable antivirus checking.
#
# Default antivirus checking mode
# Uncomment the two lines below to enable it back
#
@bypass_virus_checks_maps = (
%bypass_virus_checks, @bypass_virus_checks_acl, $bypass_virus_checks_re);
#
# Default SPAM checking mode
# Uncomment the two lines below to enable it back
#
@bypass_spam_checks_maps = (
%bypass_spam_checks, @bypass_spam_checks_acl, $bypass_spam_checks_re);
1; # insure a defined return
============================================================================================
Es stellt sich für mich die Frage, warum noch eine Testmail durchkommt?
Um der Sache auf die Spur zu kommen, wisst Ihr doch bestimmt, was eingesehen werden müsste. Noch einmal...ich möchte ja kein fertiges Setup....sondern wo der Fehler liegen könnte!
Was müsstet Ihr von Infos von mir haben?
DANKE FÜR EURE HILFE
Re: Mail Gateway
Läuft spamassasin überhaupt?
Re: Mail Gateway
Guten Morgen @hec_tech,
das dürfte es doch eigentlich...oder?
========================================================
> Last login: Thu Feb 4 20:35:50 2016 from 192.168.11.14
> gysbert@MAILGATE:~$ sudo service spamassassin restart
> [sudo] password for gysbert:
> Restarting SpamAssassin Mail Filter Daemon: spamd.
> gysbert@MAILGATE:~$
>
gysbert@MAILGATE:~$ Starting SpamAssassin Mail Filter Daemon: /usr/bin/perl already running.
update=================================
gysbert@MAILGATE:~$ sudo lsof -i :783
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
/usr/sbin 2464 root 5u IPv4 15896 0t0 TCP localhost:spamd (LISTEN)
/usr/sbin 2464 root 6u IPv6 15897 0t0 TCP localhost:spamd (LISTEN)
spamd 2465 root 5u IPv4 15896 0t0 TCP localhost:spamd (LISTEN)
spamd 2465 root 6u IPv6 15897 0t0 TCP localhost:spamd (LISTEN)
spamd 2466 root 5u IPv4 15896 0t0 TCP localhost:spamd (LISTEN)
spamd 2466 root 6u IPv6 15897 0t0 TCP localhost:spamd (LISTEN)
das dürfte es doch eigentlich...oder?
========================================================
> Last login: Thu Feb 4 20:35:50 2016 from 192.168.11.14
> gysbert@MAILGATE:~$ sudo service spamassassin restart
> [sudo] password for gysbert:
> Restarting SpamAssassin Mail Filter Daemon: spamd.
> gysbert@MAILGATE:~$
>
gysbert@MAILGATE:~$ Starting SpamAssassin Mail Filter Daemon: /usr/bin/perl already running.
update=================================
gysbert@MAILGATE:~$ sudo lsof -i :783
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
/usr/sbin 2464 root 5u IPv4 15896 0t0 TCP localhost:spamd (LISTEN)
/usr/sbin 2464 root 6u IPv6 15897 0t0 TCP localhost:spamd (LISTEN)
spamd 2465 root 5u IPv4 15896 0t0 TCP localhost:spamd (LISTEN)
spamd 2465 root 6u IPv6 15897 0t0 TCP localhost:spamd (LISTEN)
spamd 2466 root 5u IPv4 15896 0t0 TCP localhost:spamd (LISTEN)
spamd 2466 root 6u IPv6 15897 0t0 TCP localhost:spamd (LISTEN)
Re: Mail Gateway
Hallo.....ich habe mal den u.s. Test ausgeführt. Das Ergebnis sieht so aus...wie es aussehen soll. Kann mir das jemand mal bestätigen??
DANKE DAFÜR
========================================================
gysbert@MAILGATE:~$ echo "ENLARGE YOUR PENIS" | spamc
Received: from localhost by MAILGATE.savelkouls.net
with SpamAssassin (version 3.4.0);
Fri, 05 Feb 2016 13:12:22 +0100
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
MAILGATE."meineDomain".net
X-Spam-Flag: YES
X-Spam-Level: *******
X-Spam-Status: Yes, score=7.9 required=5.0 tests=EMPTY_MESSAGE,MISSING_DATE,
MISSING_FROM,MISSING_HEADERS,MISSING_MID,MISSING_SUBJECT,NO_HEADERS_MESSAGE,
NO_RECEIVED,NO_RELAYS autolearn=no autolearn_force=no version=3.4.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_56B491A6.77C50F7D"
This is a multi-part message in MIME format.
------------=_56B491A6.77C50F7D
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Spam detection software, running on the system "MAILGATE."meineDomain".net",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: [...]
Content analysis details: (7.9 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
-0.0 NO_RELAYS Informational: message was not relayed via SMTP
1.2 MISSING_HEADERS Missing To: header
2.3 EMPTY_MESSAGE Message appears to have no textual parts and no
Subject: text
-0.0 NO_RECEIVED Informational: message has no Received headers
0.1 MISSING_MID Missing Message-Id: header
1.8 MISSING_SUBJECT Missing Subject: header
1.0 MISSING_FROM Missing From: header
1.4 MISSING_DATE Missing Date: header
0.0 NO_HEADERS_MESSAGE Message appears to be missing most RFC-822 headers
------------=_56B491A6.77C50F7D
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
ENLARGE YOUR PENIS
------------=_56B491A6.77C50F7D--
gysbert@MAILGATE:~$
DANKE DAFÜR
========================================================
gysbert@MAILGATE:~$ echo "ENLARGE YOUR PENIS" | spamc
Received: from localhost by MAILGATE.savelkouls.net
with SpamAssassin (version 3.4.0);
Fri, 05 Feb 2016 13:12:22 +0100
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
MAILGATE."meineDomain".net
X-Spam-Flag: YES
X-Spam-Level: *******
X-Spam-Status: Yes, score=7.9 required=5.0 tests=EMPTY_MESSAGE,MISSING_DATE,
MISSING_FROM,MISSING_HEADERS,MISSING_MID,MISSING_SUBJECT,NO_HEADERS_MESSAGE,
NO_RECEIVED,NO_RELAYS autolearn=no autolearn_force=no version=3.4.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_56B491A6.77C50F7D"
This is a multi-part message in MIME format.
------------=_56B491A6.77C50F7D
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Spam detection software, running on the system "MAILGATE."meineDomain".net",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: [...]
Content analysis details: (7.9 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
-0.0 NO_RELAYS Informational: message was not relayed via SMTP
1.2 MISSING_HEADERS Missing To: header
2.3 EMPTY_MESSAGE Message appears to have no textual parts and no
Subject: text
-0.0 NO_RECEIVED Informational: message has no Received headers
0.1 MISSING_MID Missing Message-Id: header
1.8 MISSING_SUBJECT Missing Subject: header
1.0 MISSING_FROM Missing From: header
1.4 MISSING_DATE Missing Date: header
0.0 NO_HEADERS_MESSAGE Message appears to be missing most RFC-822 headers
------------=_56B491A6.77C50F7D
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
ENLARGE YOUR PENIS
------------=_56B491A6.77C50F7D--
gysbert@MAILGATE:~$
Re: Mail Gateway
jap schaut gut aus
Re: Mail Gateway
so weit...so gut....
Aber das habe ich ja letzten Endes "im System" erstellt. Sende ich mir von einem T-online-Mailaccount eine Eicar-Mail an meine eigene Mailadresse (gysbert@meineDomain.net), so geht sie anstandslos durch. Auch verschiedene Testmails (z.B. Heise) erzeugen nicht nur KEINE Info, dass es sich um Spam/Virus handelt...sondern sind ganz normal im Eingangspostfach von Outlook.
Darf das sein? Oder verstehe ich es falsch?
DANKE FÜR EURE HILFE UND ANTWORT.......
Gysbert
Aber das habe ich ja letzten Endes "im System" erstellt. Sende ich mir von einem T-online-Mailaccount eine Eicar-Mail an meine eigene Mailadresse (gysbert@meineDomain.net), so geht sie anstandslos durch. Auch verschiedene Testmails (z.B. Heise) erzeugen nicht nur KEINE Info, dass es sich um Spam/Virus handelt...sondern sind ganz normal im Eingangspostfach von Outlook.
Darf das sein? Oder verstehe ich es falsch?
DANKE FÜR EURE HILFE UND ANTWORT.......
Gysbert
Re: Mail Gateway
Ich tippe auf eine fehlerhafte Amavis Konfiguration.
Man müsste einfach alle Dateien durchgehen und kontrollieren.
Mein Tip wäre die /etc/amavis/conf.d/20-debian_defaults poste die mal.
In der /etc/clamav/clamd.conf sollte bei Debian Jessie AllowSupplementaryGroups auf true sein ist das auch so?
Man müsste einfach alle Dateien durchgehen und kontrollieren.
Mein Tip wäre die /etc/amavis/conf.d/20-debian_defaults poste die mal.
In der /etc/clamav/clamd.conf sollte bei Debian Jessie AllowSupplementaryGroups auf true sein ist das auch so?
Re: Mail Gateway
Hallo @hec_tech,
nachstehend die Einstellungen von der "clamd.conf" sowie /etc/amavis/conf.d/20-debian_defaults
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
ArchiveBlockEncrypted false
MaxDirectoryRecursion 15
FollowDirectorySymlinks false
FollowFileSymlinks false
ReadTimeout 180
MaxThreads 12
MaxConnectionQueueLength 15
LogSyslog false
LogRotate true
LogFacility LOG_LOCAL6
LogClean false
LogVerbose false
PidFile /var/run/clamav/clamd.pid
DatabaseDirectory /var/lib/clamav
SelfCheck 3600
Foreground false
Debug false
ScanPE true
MaxEmbeddedPE 10M
ScanOLE2 true
ScanPDF true
ScanHTML true
MaxHTMLNormalize 10M
MaxHTMLNoTags 2M
MaxScriptNormalize 5M
MaxZipTypeRcg 1M
ScanSWF true
DetectBrokenExecutables false
ExitOnOOM false
LeaveTemporaryFiles false
User clamav
AllowSupplementaryGroups true
ScanMail true
ScanArchive true
ArchiveBlockEncrypted false
MaxDirectoryRecursion 15
FollowDirectorySymlinks false
FollowFileSymlinks false
ReadTimeout 180
MaxThreads 12
MaxConnectionQueueLength 15
LogSyslog false
LogRotate true
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
use strict;
# ADMINISTRATORS:
# Debian suggests that any changes you need to do that should never
# be "updated" by the Debian package should be made in another file,
# overriding the settings in this file.
#
# The package will *not* overwrite your settings, but by keeping
# them separate, you will make the task of merging changes on these
# configuration files much simpler...
# see /usr/share/doc/amavisd-new/examples/amavisd.conf-default for
# a list of all variables with their defaults;
# see /usr/share/doc/amavisd-new/examples/amavisd.conf-sample for
# a traditional-style commented file
# [note: the above files were not converted to Debian settings!]
#
# for more details see documentation in /usr/share/doc/amavisd-new
# and at http://www.ijs.si/software/amavisd/amav ... -docs.html
$QUARANTINEDIR = "$MYHOME/virusmails";
$quarantine_subdir_levels = 1; # enable quarantine dir hashing
$log_recip_templ = undef; # disable by-recipient level-0 log entries
$DO_SYSLOG = 1; # log via syslogd (preferred)
$syslog_ident = 'amavis'; # syslog ident tag, prepended to all messages
$syslog_facility = 'mail';
$syslog_priority = 'debug'; # switch to info to drop debug output, etc
$enable_db = 1; # enable use of BerkeleyDB/libdb (SNMP and nanny)
$enable_global_cache = 1; # enable use of libdb-based cache if $enable_db=1
$inet_socket_port = 10024; # default listening socket
$sa_spam_subject_tag = '***SPAM*** ';
$sa_tag_level_deflt = undef; # add spam info headers if at, or above that lev$
$sa_tag2_level_deflt = 5; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 20; # triggers spam evasive actions
$sa_dsn_cutoff_level = 10; # spam level beyond which a DSN is not sent
$sa_mail_body_size_limit = 200*1024; # don't waste time on SA if mail is larger
$sa_local_tests_only = 0; # only tests which do not require internet access?
# Quota limits to avoid bombs (like 42.zip)
$MAXLEVELS = 14;
$MAXFILES = 1500;
$MIN_EXPANSION_QUOTA = 100*1024; # bytes
$MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes
# You should:
# Use D_DISCARD to discard data (viruses)
# Use D_BOUNCE to generate local bounces by amavisd-new
# Use D_REJECT to generate local or remote bounces by the calling MTA
# Use D_PASS to deliver the message
#
# Whatever you do, *NEVER* use D_REJECT if you have other MTAs *forwarding*
$enable_db = 1; # enable use of BerkeleyDB/libdb (SNMP and nanny)
$enable_global_cache = 1; # enable use of libdb-based cache if $enable_db=1
$inet_socket_port = 10024; # default listening socket
$sa_spam_subject_tag = '***SPAM*** ';
$sa_tag_level_deflt = undef; # add spam info headers if at, or above that lev$
$sa_tag2_level_deflt = 5; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 20; # triggers spam evasive actions
$sa_dsn_cutoff_level = 10; # spam level beyond which a DSN is not sent
$sa_mail_body_size_limit = 200*1024; # don't waste time on SA if mail is larger
$sa_local_tests_only = 0; # only tests which do not require internet access?
# Quota limits to avoid bombs (like 42.zip)
$MAXLEVELS = 14;
$MAXFILES = 1500;
$MIN_EXPANSION_QUOTA = 100*1024; # bytes
$MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes
# You should:
# Use D_DISCARD to discard data (viruses)
# Use D_BOUNCE to generate local bounces by amavisd-new
# Use D_REJECT to generate local or remote bounces by the calling MTA
# Use D_PASS to deliver the message
#
# Whatever you do, *NEVER* use D_REJECT if you have other MTAs *forwarding*
# mail to your account. Use D_BOUNCE instead, otherwise you are delegating
# the bounce work to your friendly forwarders, which might not like it at all.
#
# On dual-MTA setups, one can often D_REJECT, as this just makes your own
# MTA generate the bounce message. Test it first.
#
# Bouncing viruses is stupid, always discard them after you are sure the AV
# is working correctly. Bouncing real SPAM is also useless, if you cannot
# D_REJECT it (and don't D_REJECT mail coming from your forwarders!).
$final_virus_destiny = D_DISCARD; # (data not lost, see virus quarantine)
$final_banned_destiny = D_BOUNCE; # D_REJECT when front-end MTA
$final_spam_destiny = D_BOUNCE;
$final_bad_header_destiny = D_PASS; # False-positive prone (for spam)
$enable_dkim_verification = 0; #disabled to prevent warning
$virus_admin = "postmaster\@$mydomain"; # due to D_DISCARD default
# Set to empty ("") to add no header
$X_HEADER_LINE = "Debian $myproduct_name at $mydomain";
# REMAINING IMPORTANT VARIABLES ARE LISTED HERE BECAUSE OF LONGER ASSIGNMENTS
#
# DO NOT SEND VIRUS NOTIFICATIONS TO OUTSIDE OF YOUR DOMAIN. EVER.
#
# These days, almost all viruses fake the envelope sender and mail headers.
# Therefore, "virus notifications" became nothing but undesired, aggravating
# the bounce work to your friendly forwarders, which might not like it at all.
#
# On dual-MTA setups, one can often D_REJECT, as this just makes your own
# MTA generate the bounce message. Test it first.
#
# Bouncing viruses is stupid, always discard them after you are sure the AV
# is working correctly. Bouncing real SPAM is also useless, if you cannot
# D_REJECT it (and don't D_REJECT mail coming from your forwarders!).
$final_virus_destiny = D_DISCARD; # (data not lost, see virus quarantine)
$final_banned_destiny = D_BOUNCE; # D_REJECT when front-end MTA
$final_spam_destiny = D_BOUNCE;
$final_bad_header_destiny = D_PASS; # False-positive prone (for spam)
$enable_dkim_verification = 0; #disabled to prevent warning
$virus_admin = "postmaster\@$mydomain"; # due to D_DISCARD default
# Set to empty ("") to add no header
$X_HEADER_LINE = "Debian $myproduct_name at $mydomain";
# REMAINING IMPORTANT VARIABLES ARE LISTED HERE BECAUSE OF LONGER ASSIGNMENTS
#
# DO NOT SEND VIRUS NOTIFICATIONS TO OUTSIDE OF YOUR DOMAIN. EVER.
#
# These days, almost all viruses fake the envelope sender and mail headers.
# Therefore, "virus notifications" became nothing but undesired, aggravating
# SPAM. This holds true even inside one's domain. We disable them all by
# default, except for the EICAR test pattern.
#
@viruses_that_fake_sender_maps = (new_RE(
[qr'\bEICAR\b'i => 0], # av test pattern name
[qr/.*/ => 1], # true for everything else
));
@keep_decoded_original_maps = (new_RE(
# qr'^MAIL$', # retain full original message for virus checking (can be slow)
qr'^MAIL-UNDECIPHERABLE$', # recheck full mail if it contains undecipherables
qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
# qr'^Zip archive data', # don't trust Archive::Zip
));
# for $banned_namepath_re, a new-style of banned table, see amavisd.conf-sample
$banned_filename_re = new_RE(
# qr'^UNDECIPHERABLE$', # is or contains any undecipherable components
# block certain double extensions anywhere in the base name
qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
qr'\{[0-9a-f]{8}(-[0-9a-f]{4}){3}-[0-9a-f]{12}\}?$'i, # Windows Class ID CLSI$
qr'^application/x-msdownload$'i, # block these MIME types
qr'^application/x-msdos-program$'i,
# default, except for the EICAR test pattern.
#
@viruses_that_fake_sender_maps = (new_RE(
[qr'\bEICAR\b'i => 0], # av test pattern name
[qr/.*/ => 1], # true for everything else
));
@keep_decoded_original_maps = (new_RE(
# qr'^MAIL$', # retain full original message for virus checking (can be slow)
qr'^MAIL-UNDECIPHERABLE$', # recheck full mail if it contains undecipherables
qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
# qr'^Zip archive data', # don't trust Archive::Zip
));
# for $banned_namepath_re, a new-style of banned table, see amavisd.conf-sample
$banned_filename_re = new_RE(
# qr'^UNDECIPHERABLE$', # is or contains any undecipherable components
# block certain double extensions anywhere in the base name
qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
qr'\{[0-9a-f]{8}(-[0-9a-f]{4}){3}-[0-9a-f]{12}\}?$'i, # Windows Class ID CLS$
qr'^application/x-msdownload$'i, # block these MIME types
qr'^application/x-msdos-program$'i,
qr'^application/hta$'i,
# qr'^application/x-msmetafile$'i, # Windows Metafile MIME type
# qr'^\.wmf$', # Windows Metafile file(1) type
# qr'^message/partial$'i, qr'^message/external-body$'i, # rfc2046 MIME types
# [ qr'^\.(Z|gz|bz2)$' => 0 ], # allow any in Unix-compressed
# [ qr'^\.(rpm|cpio|tar)$' => 0 ], # allow any in Unix-type archives
# [ qr'^\.(zip|rar|arc|arj|zoo)$'=> 0 ], # allow any within such archives
# [ qr'^application/x-zip-compressed$'i => 0], # allow any within such archiv$
qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
# qr'.\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|emf|exe|fxp|grp|hlp|hta|
# inf|ins|isp|js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|
# ops|pcd|pif|prg|reg|scr|sct|shb|shs|vb|vbe|vbs|
# wmf|wsc|wsf|wsh)$'ix, # banned ext - long
# qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i, # banned extension - WinZip vulnerab.
qr'^\.(exe-ms)$', # banned file(1) types
# qr'^\.(exe|lha|tnef|cab|dll)$', # banned file(1) types
);
# See http://support.microsoft.com/default.as ... US;q262631
# and http://www.cknow.com/vtutor/vtextensions.htm
# ENVELOPE SENDER SOFT-WHITELISTING / SOFT-BLACKLISTING
@score_sender_maps = ({ # a by-recipient hash lookup table,
# qr'^application/x-msmetafile$'i, # Windows Metafile MIME type
# qr'^\.wmf$', # Windows Metafile file(1) type
# qr'^message/partial$'i, qr'^message/external-body$'i, # rfc2046 MIME types
# [ qr'^\.(Z|gz|bz2)$' => 0 ], # allow any in Unix-compressed
# [ qr'^\.(rpm|cpio|tar)$' => 0 ], # allow any in Unix-type archives
# [ qr'^\.(zip|rar|arc|arj|zoo)$'=> 0 ], # allow any within such archives
# [ qr'^application/x-zip-compressed$'i => 0], # allow any within such archiv$
qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
# qr'.\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|emf|exe|fxp|grp|hlp|hta|
# inf|ins|isp|js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|
# ops|pcd|pif|prg|reg|scr|sct|shb|shs|vb|vbe|vbs|
# wmf|wsc|wsf|wsh)$'ix, # banned ext - long
# qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i, # banned extension - WinZip vulnerab.
qr'^\.(exe-ms)$', # banned file(1) types
# qr'^\.(exe|lha|tnef|cab|dll)$', # banned file(1) types
);
# See http://support.microsoft.com/default.as ... US;q262631
# and http://www.cknow.com/vtutor/vtextensions.htm
# ENVELOPE SENDER SOFT-WHITELISTING / SOFT-BLACKLISTING
@score_sender_maps = ({ # a by-recipient hash lookup table,
# results from all matching recipient tables are summed
# ## per-recipient personal tables (NOTE: positive: black, negative: white)
# 'user1@example.com' => [{'bla-mobile.press@example.com' => 10.0}],
# 'user3@example.com' => [{'.ebay.com' => -3.0}],
# 'user4@example.com' => [{'cleargreen@cleargreen.com' => -7.0,
# '.cleargreen.com' => -5.0}],
## site-wide opinions about senders (the '.' matches any recipient)
'.' => [ # the _first_ matching sender determines the score boost
new_RE( # regexp-type lookup table, just happens to be all soft-blacklist
[qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i => 5.0],
[qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
[qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
[qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i => 5.0],
[qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i => 5.0],
[qr'^(your_friend|greatoffers)@'i => 5.0],
[qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i => 5.0],
),
# read_hash("/var/amavis/sender_scores_sitewide"),
# This are some examples for whitelists, since envelope senders can be forged
# they are not enabled by default.
{ # a hash-type lookup table (associative array)
#'nobody@cert.org' => -3.0,
#'cert-advisory@us-cert.gov' => -3.0,
#'owner-alert@iss.net' => -3.0,
#'slashdot@slashdot.org' => -3.0,
# ## per-recipient personal tables (NOTE: positive: black, negative: white)
# 'user1@example.com' => [{'bla-mobile.press@example.com' => 10.0}],
# 'user3@example.com' => [{'.ebay.com' => -3.0}],
# 'user4@example.com' => [{'cleargreen@cleargreen.com' => -7.0,
# '.cleargreen.com' => -5.0}],
## site-wide opinions about senders (the '.' matches any recipient)
'.' => [ # the _first_ matching sender determines the score boost
new_RE( # regexp-type lookup table, just happens to be all soft-blacklist
[qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i => 5.0],
[qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
[qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
[qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i => 5.0],
[qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i => 5.0],
[qr'^(your_friend|greatoffers)@'i => 5.0],
[qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i => 5.0],
),
# read_hash("/var/amavis/sender_scores_sitewide"),
# This are some examples for whitelists, since envelope senders can be forged
# they are not enabled by default.
{ # a hash-type lookup table (associative array)
#'nobody@cert.org' => -3.0,
#'cert-advisory@us-cert.gov' => -3.0,
#'owner-alert@iss.net' => -3.0,
#'slashdot@slashdot.org' => -3.0,
#'securityfocus.com' => -3.0,
#'ntbugtraq@listserv.ntbugtraq.com' => -3.0,
#'security-alerts@linuxsecurity.com' => -3.0,
#'mailman-announce-admin@python.org' => -3.0,
#'amavis-user-admin@lists.sourceforge.net'=> -3.0,
#'amavis-user-bounces@lists.sourceforge.net' => -3.0,
#'spamassassin.apache.org' => -3.0,
#'notification-return@lists.sophos.com' => -3.0,
#'owner-postfix-users@postfix.org' => -3.0,
#'owner-postfix-announce@postfix.org' => -3.0,
#'owner-sendmail-announce@lists.sendmail.org' => -3.0,
#'sendmail-announce-request@lists.sendmail.org' => -3.0,
#'donotreply@sendmail.org' => -3.0,
#'ca+envelope@sendmail.org' => -3.0,
#'noreply@freshmeat.net' => -3.0,
#'owner-technews@postel.acm.org' => -3.0,
#'ietf-123-owner@loki.ietf.org' => -3.0,
#'cvs-commits-list-admin@gnome.org' => -3.0,
#'rt-users-admin@lists.fsck.com' => -3.0,
#'clp-request@comp.nus.edu.sg' => -3.0,
#'surveys-errors@lists.nua.ie' => -3.0,
#'emailnews@genomeweb.com' => -5.0,
#'yahoo-dev-null@yahoo-inc.com' => -3.0,
#'returns.groups.yahoo.com' => -3.0,
#'clusternews@linuxnetworx.com' => -3.0,
#lc('lvs-users-admin@LinuxVirtualServer.org') => -3.0,
#lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
# soft-blacklisting (positive score)
#'sender@example.net' => 3.0,
#'.example.net' => 1.0,
},
], # end of site-wide tables
});
1; # ensure a defined return
nachstehend die Einstellungen von der "clamd.conf" sowie /etc/amavis/conf.d/20-debian_defaults
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
ArchiveBlockEncrypted false
MaxDirectoryRecursion 15
FollowDirectorySymlinks false
FollowFileSymlinks false
ReadTimeout 180
MaxThreads 12
MaxConnectionQueueLength 15
LogSyslog false
LogRotate true
LogFacility LOG_LOCAL6
LogClean false
LogVerbose false
PidFile /var/run/clamav/clamd.pid
DatabaseDirectory /var/lib/clamav
SelfCheck 3600
Foreground false
Debug false
ScanPE true
MaxEmbeddedPE 10M
ScanOLE2 true
ScanPDF true
ScanHTML true
MaxHTMLNormalize 10M
MaxHTMLNoTags 2M
MaxScriptNormalize 5M
MaxZipTypeRcg 1M
ScanSWF true
DetectBrokenExecutables false
ExitOnOOM false
LeaveTemporaryFiles false
User clamav
AllowSupplementaryGroups true
ScanMail true
ScanArchive true
ArchiveBlockEncrypted false
MaxDirectoryRecursion 15
FollowDirectorySymlinks false
FollowFileSymlinks false
ReadTimeout 180
MaxThreads 12
MaxConnectionQueueLength 15
LogSyslog false
LogRotate true
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
use strict;
# ADMINISTRATORS:
# Debian suggests that any changes you need to do that should never
# be "updated" by the Debian package should be made in another file,
# overriding the settings in this file.
#
# The package will *not* overwrite your settings, but by keeping
# them separate, you will make the task of merging changes on these
# configuration files much simpler...
# see /usr/share/doc/amavisd-new/examples/amavisd.conf-default for
# a list of all variables with their defaults;
# see /usr/share/doc/amavisd-new/examples/amavisd.conf-sample for
# a traditional-style commented file
# [note: the above files were not converted to Debian settings!]
#
# for more details see documentation in /usr/share/doc/amavisd-new
# and at http://www.ijs.si/software/amavisd/amav ... -docs.html
$QUARANTINEDIR = "$MYHOME/virusmails";
$quarantine_subdir_levels = 1; # enable quarantine dir hashing
$log_recip_templ = undef; # disable by-recipient level-0 log entries
$DO_SYSLOG = 1; # log via syslogd (preferred)
$syslog_ident = 'amavis'; # syslog ident tag, prepended to all messages
$syslog_facility = 'mail';
$syslog_priority = 'debug'; # switch to info to drop debug output, etc
$enable_db = 1; # enable use of BerkeleyDB/libdb (SNMP and nanny)
$enable_global_cache = 1; # enable use of libdb-based cache if $enable_db=1
$inet_socket_port = 10024; # default listening socket
$sa_spam_subject_tag = '***SPAM*** ';
$sa_tag_level_deflt = undef; # add spam info headers if at, or above that lev$
$sa_tag2_level_deflt = 5; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 20; # triggers spam evasive actions
$sa_dsn_cutoff_level = 10; # spam level beyond which a DSN is not sent
$sa_mail_body_size_limit = 200*1024; # don't waste time on SA if mail is larger
$sa_local_tests_only = 0; # only tests which do not require internet access?
# Quota limits to avoid bombs (like 42.zip)
$MAXLEVELS = 14;
$MAXFILES = 1500;
$MIN_EXPANSION_QUOTA = 100*1024; # bytes
$MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes
# You should:
# Use D_DISCARD to discard data (viruses)
# Use D_BOUNCE to generate local bounces by amavisd-new
# Use D_REJECT to generate local or remote bounces by the calling MTA
# Use D_PASS to deliver the message
#
# Whatever you do, *NEVER* use D_REJECT if you have other MTAs *forwarding*
$enable_db = 1; # enable use of BerkeleyDB/libdb (SNMP and nanny)
$enable_global_cache = 1; # enable use of libdb-based cache if $enable_db=1
$inet_socket_port = 10024; # default listening socket
$sa_spam_subject_tag = '***SPAM*** ';
$sa_tag_level_deflt = undef; # add spam info headers if at, or above that lev$
$sa_tag2_level_deflt = 5; # add 'spam detected' headers at that level
$sa_kill_level_deflt = 20; # triggers spam evasive actions
$sa_dsn_cutoff_level = 10; # spam level beyond which a DSN is not sent
$sa_mail_body_size_limit = 200*1024; # don't waste time on SA if mail is larger
$sa_local_tests_only = 0; # only tests which do not require internet access?
# Quota limits to avoid bombs (like 42.zip)
$MAXLEVELS = 14;
$MAXFILES = 1500;
$MIN_EXPANSION_QUOTA = 100*1024; # bytes
$MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes
# You should:
# Use D_DISCARD to discard data (viruses)
# Use D_BOUNCE to generate local bounces by amavisd-new
# Use D_REJECT to generate local or remote bounces by the calling MTA
# Use D_PASS to deliver the message
#
# Whatever you do, *NEVER* use D_REJECT if you have other MTAs *forwarding*
# mail to your account. Use D_BOUNCE instead, otherwise you are delegating
# the bounce work to your friendly forwarders, which might not like it at all.
#
# On dual-MTA setups, one can often D_REJECT, as this just makes your own
# MTA generate the bounce message. Test it first.
#
# Bouncing viruses is stupid, always discard them after you are sure the AV
# is working correctly. Bouncing real SPAM is also useless, if you cannot
# D_REJECT it (and don't D_REJECT mail coming from your forwarders!).
$final_virus_destiny = D_DISCARD; # (data not lost, see virus quarantine)
$final_banned_destiny = D_BOUNCE; # D_REJECT when front-end MTA
$final_spam_destiny = D_BOUNCE;
$final_bad_header_destiny = D_PASS; # False-positive prone (for spam)
$enable_dkim_verification = 0; #disabled to prevent warning
$virus_admin = "postmaster\@$mydomain"; # due to D_DISCARD default
# Set to empty ("") to add no header
$X_HEADER_LINE = "Debian $myproduct_name at $mydomain";
# REMAINING IMPORTANT VARIABLES ARE LISTED HERE BECAUSE OF LONGER ASSIGNMENTS
#
# DO NOT SEND VIRUS NOTIFICATIONS TO OUTSIDE OF YOUR DOMAIN. EVER.
#
# These days, almost all viruses fake the envelope sender and mail headers.
# Therefore, "virus notifications" became nothing but undesired, aggravating
# the bounce work to your friendly forwarders, which might not like it at all.
#
# On dual-MTA setups, one can often D_REJECT, as this just makes your own
# MTA generate the bounce message. Test it first.
#
# Bouncing viruses is stupid, always discard them after you are sure the AV
# is working correctly. Bouncing real SPAM is also useless, if you cannot
# D_REJECT it (and don't D_REJECT mail coming from your forwarders!).
$final_virus_destiny = D_DISCARD; # (data not lost, see virus quarantine)
$final_banned_destiny = D_BOUNCE; # D_REJECT when front-end MTA
$final_spam_destiny = D_BOUNCE;
$final_bad_header_destiny = D_PASS; # False-positive prone (for spam)
$enable_dkim_verification = 0; #disabled to prevent warning
$virus_admin = "postmaster\@$mydomain"; # due to D_DISCARD default
# Set to empty ("") to add no header
$X_HEADER_LINE = "Debian $myproduct_name at $mydomain";
# REMAINING IMPORTANT VARIABLES ARE LISTED HERE BECAUSE OF LONGER ASSIGNMENTS
#
# DO NOT SEND VIRUS NOTIFICATIONS TO OUTSIDE OF YOUR DOMAIN. EVER.
#
# These days, almost all viruses fake the envelope sender and mail headers.
# Therefore, "virus notifications" became nothing but undesired, aggravating
# SPAM. This holds true even inside one's domain. We disable them all by
# default, except for the EICAR test pattern.
#
@viruses_that_fake_sender_maps = (new_RE(
[qr'\bEICAR\b'i => 0], # av test pattern name
[qr/.*/ => 1], # true for everything else
));
@keep_decoded_original_maps = (new_RE(
# qr'^MAIL$', # retain full original message for virus checking (can be slow)
qr'^MAIL-UNDECIPHERABLE$', # recheck full mail if it contains undecipherables
qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
# qr'^Zip archive data', # don't trust Archive::Zip
));
# for $banned_namepath_re, a new-style of banned table, see amavisd.conf-sample
$banned_filename_re = new_RE(
# qr'^UNDECIPHERABLE$', # is or contains any undecipherable components
# block certain double extensions anywhere in the base name
qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
qr'\{[0-9a-f]{8}(-[0-9a-f]{4}){3}-[0-9a-f]{12}\}?$'i, # Windows Class ID CLSI$
qr'^application/x-msdownload$'i, # block these MIME types
qr'^application/x-msdos-program$'i,
# default, except for the EICAR test pattern.
#
@viruses_that_fake_sender_maps = (new_RE(
[qr'\bEICAR\b'i => 0], # av test pattern name
[qr/.*/ => 1], # true for everything else
));
@keep_decoded_original_maps = (new_RE(
# qr'^MAIL$', # retain full original message for virus checking (can be slow)
qr'^MAIL-UNDECIPHERABLE$', # recheck full mail if it contains undecipherables
qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
# qr'^Zip archive data', # don't trust Archive::Zip
));
# for $banned_namepath_re, a new-style of banned table, see amavisd.conf-sample
$banned_filename_re = new_RE(
# qr'^UNDECIPHERABLE$', # is or contains any undecipherable components
# block certain double extensions anywhere in the base name
qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
qr'\{[0-9a-f]{8}(-[0-9a-f]{4}){3}-[0-9a-f]{12}\}?$'i, # Windows Class ID CLS$
qr'^application/x-msdownload$'i, # block these MIME types
qr'^application/x-msdos-program$'i,
qr'^application/hta$'i,
# qr'^application/x-msmetafile$'i, # Windows Metafile MIME type
# qr'^\.wmf$', # Windows Metafile file(1) type
# qr'^message/partial$'i, qr'^message/external-body$'i, # rfc2046 MIME types
# [ qr'^\.(Z|gz|bz2)$' => 0 ], # allow any in Unix-compressed
# [ qr'^\.(rpm|cpio|tar)$' => 0 ], # allow any in Unix-type archives
# [ qr'^\.(zip|rar|arc|arj|zoo)$'=> 0 ], # allow any within such archives
# [ qr'^application/x-zip-compressed$'i => 0], # allow any within such archiv$
qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
# qr'.\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|emf|exe|fxp|grp|hlp|hta|
# inf|ins|isp|js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|
# ops|pcd|pif|prg|reg|scr|sct|shb|shs|vb|vbe|vbs|
# wmf|wsc|wsf|wsh)$'ix, # banned ext - long
# qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i, # banned extension - WinZip vulnerab.
qr'^\.(exe-ms)$', # banned file(1) types
# qr'^\.(exe|lha|tnef|cab|dll)$', # banned file(1) types
);
# See http://support.microsoft.com/default.as ... US;q262631
# and http://www.cknow.com/vtutor/vtextensions.htm
# ENVELOPE SENDER SOFT-WHITELISTING / SOFT-BLACKLISTING
@score_sender_maps = ({ # a by-recipient hash lookup table,
# qr'^application/x-msmetafile$'i, # Windows Metafile MIME type
# qr'^\.wmf$', # Windows Metafile file(1) type
# qr'^message/partial$'i, qr'^message/external-body$'i, # rfc2046 MIME types
# [ qr'^\.(Z|gz|bz2)$' => 0 ], # allow any in Unix-compressed
# [ qr'^\.(rpm|cpio|tar)$' => 0 ], # allow any in Unix-type archives
# [ qr'^\.(zip|rar|arc|arj|zoo)$'=> 0 ], # allow any within such archives
# [ qr'^application/x-zip-compressed$'i => 0], # allow any within such archiv$
qr'.\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$'i, # banned extension - basic
# qr'.\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|emf|exe|fxp|grp|hlp|hta|
# inf|ins|isp|js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|
# ops|pcd|pif|prg|reg|scr|sct|shb|shs|vb|vbe|vbs|
# wmf|wsc|wsf|wsh)$'ix, # banned ext - long
# qr'.\.(mim|b64|bhx|hqx|xxe|uu|uue)$'i, # banned extension - WinZip vulnerab.
qr'^\.(exe-ms)$', # banned file(1) types
# qr'^\.(exe|lha|tnef|cab|dll)$', # banned file(1) types
);
# See http://support.microsoft.com/default.as ... US;q262631
# and http://www.cknow.com/vtutor/vtextensions.htm
# ENVELOPE SENDER SOFT-WHITELISTING / SOFT-BLACKLISTING
@score_sender_maps = ({ # a by-recipient hash lookup table,
# results from all matching recipient tables are summed
# ## per-recipient personal tables (NOTE: positive: black, negative: white)
# 'user1@example.com' => [{'bla-mobile.press@example.com' => 10.0}],
# 'user3@example.com' => [{'.ebay.com' => -3.0}],
# 'user4@example.com' => [{'cleargreen@cleargreen.com' => -7.0,
# '.cleargreen.com' => -5.0}],
## site-wide opinions about senders (the '.' matches any recipient)
'.' => [ # the _first_ matching sender determines the score boost
new_RE( # regexp-type lookup table, just happens to be all soft-blacklist
[qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i => 5.0],
[qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
[qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
[qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i => 5.0],
[qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i => 5.0],
[qr'^(your_friend|greatoffers)@'i => 5.0],
[qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i => 5.0],
),
# read_hash("/var/amavis/sender_scores_sitewide"),
# This are some examples for whitelists, since envelope senders can be forged
# they are not enabled by default.
{ # a hash-type lookup table (associative array)
#'nobody@cert.org' => -3.0,
#'cert-advisory@us-cert.gov' => -3.0,
#'owner-alert@iss.net' => -3.0,
#'slashdot@slashdot.org' => -3.0,
# ## per-recipient personal tables (NOTE: positive: black, negative: white)
# 'user1@example.com' => [{'bla-mobile.press@example.com' => 10.0}],
# 'user3@example.com' => [{'.ebay.com' => -3.0}],
# 'user4@example.com' => [{'cleargreen@cleargreen.com' => -7.0,
# '.cleargreen.com' => -5.0}],
## site-wide opinions about senders (the '.' matches any recipient)
'.' => [ # the _first_ matching sender determines the score boost
new_RE( # regexp-type lookup table, just happens to be all soft-blacklist
[qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i => 5.0],
[qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
[qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
[qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i => 5.0],
[qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i => 5.0],
[qr'^(your_friend|greatoffers)@'i => 5.0],
[qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i => 5.0],
),
# read_hash("/var/amavis/sender_scores_sitewide"),
# This are some examples for whitelists, since envelope senders can be forged
# they are not enabled by default.
{ # a hash-type lookup table (associative array)
#'nobody@cert.org' => -3.0,
#'cert-advisory@us-cert.gov' => -3.0,
#'owner-alert@iss.net' => -3.0,
#'slashdot@slashdot.org' => -3.0,
#'securityfocus.com' => -3.0,
#'ntbugtraq@listserv.ntbugtraq.com' => -3.0,
#'security-alerts@linuxsecurity.com' => -3.0,
#'mailman-announce-admin@python.org' => -3.0,
#'amavis-user-admin@lists.sourceforge.net'=> -3.0,
#'amavis-user-bounces@lists.sourceforge.net' => -3.0,
#'spamassassin.apache.org' => -3.0,
#'notification-return@lists.sophos.com' => -3.0,
#'owner-postfix-users@postfix.org' => -3.0,
#'owner-postfix-announce@postfix.org' => -3.0,
#'owner-sendmail-announce@lists.sendmail.org' => -3.0,
#'sendmail-announce-request@lists.sendmail.org' => -3.0,
#'donotreply@sendmail.org' => -3.0,
#'ca+envelope@sendmail.org' => -3.0,
#'noreply@freshmeat.net' => -3.0,
#'owner-technews@postel.acm.org' => -3.0,
#'ietf-123-owner@loki.ietf.org' => -3.0,
#'cvs-commits-list-admin@gnome.org' => -3.0,
#'rt-users-admin@lists.fsck.com' => -3.0,
#'clp-request@comp.nus.edu.sg' => -3.0,
#'surveys-errors@lists.nua.ie' => -3.0,
#'emailnews@genomeweb.com' => -5.0,
#'yahoo-dev-null@yahoo-inc.com' => -3.0,
#'returns.groups.yahoo.com' => -3.0,
#'clusternews@linuxnetworx.com' => -3.0,
#lc('lvs-users-admin@LinuxVirtualServer.org') => -3.0,
#lc('owner-textbreakingnews@CNNIMAIL12.CNN.COM') => -5.0,
# soft-blacklisting (positive score)
#'sender@example.net' => 3.0,
#'.example.net' => 1.0,
},
], # end of site-wide tables
});
1; # ensure a defined return
Re: Mail Gateway
Hallo und guten Abend @hec_tech,
schaust Du dir das in den nächsten Tagen einmal an?
Bin schon gespann....
schaust Du dir das in den nächsten Tagen einmal an?
Bin schon gespann....

Re: Mail Gateway
Ich bezweifel nicht, dass dir hec_tech oder ein anderer deine Conifg hinbiegen kann. Genauso wenig, dass es nach noch zig weiteren Frage rund läuft.
Ich bezweifel aber stark, dass du anhand der vielen Parameter auch nur ansatzweise irgend etwas verstanden hast. Ich frage mich immer noch, was gegen das modulweise Einbinden von Spamd und Clamsmtp spricht. So lernst du beide Programme erstmal viel besser kennen, anstatt dich für den Anfang mit einem "Überprogramm" und seinen unzähligen Parametern zu beschäftigen.
Ich bezweifel aber stark, dass du anhand der vielen Parameter auch nur ansatzweise irgend etwas verstanden hast. Ich frage mich immer noch, was gegen das modulweise Einbinden von Spamd und Clamsmtp spricht. So lernst du beide Programme erstmal viel besser kennen, anstatt dich für den Anfang mit einem "Überprogramm" und seinen unzähligen Parametern zu beschäftigen.
Re: Mail Gateway
Guten Abend @weshalb,
Dein Argument verstehe ich!
Also...wenn ich Deinem Vorschlag folge...dann erzeuge ich eine neuen Server...und installiere nach "Jessi" anschließend postfix! Dann lade ich "Spamassassin" herunter und installiere es. So weit richtig?
Aber "Clamsmtp"....?
Danke für Eure Hilfe
Dein Argument verstehe ich!
Also...wenn ich Deinem Vorschlag folge...dann erzeuge ich eine neuen Server...und installiere nach "Jessi" anschließend postfix! Dann lade ich "Spamassassin" herunter und installiere es. So weit richtig?
Aber "Clamsmtp"....?
Danke für Eure Hilfe
Re: Mail Gateway
Nein, das brauchst du nicht. Ich würde lediglich Amavis und max. das, was da mitkam, deinstallieren und die Postfixparameter löschen.
Um es dir eventuell für die Zukunft zu vereinfachen: Mache dir von jeder Konfigurationsdatei, bevor du sie anfängst das erste Mal zu ändern, eine Kopie und benenne sie dementsprechend. Oder gerade bei Vm's:Mache Snapshots und benenne diese aussagekräftig.
Dann musst du nicht, falls du den Überblick verlierst, jedes Mal neu installieren. Das ist schon fast eine Beleidigung und ziemlich Microsoftlike.
Beachte auch, dass du nach jeglichen Änderungen den Dienst/Programm reloaden bzw. neustarten musst.
Und nun zu SA und ClamAv:
https://www.timoschindler.de/spamassass ... -7-wheezy/
http://www.debianhelp.co.uk/postfixandcalmav.htm (Erst bei #apt-get update Anfangen!!!, die Sourcelist dort ist veraltet)
Und ja, es heißt ClamSmtp, nicht verwirren lassen.
Um es dir eventuell für die Zukunft zu vereinfachen: Mache dir von jeder Konfigurationsdatei, bevor du sie anfängst das erste Mal zu ändern, eine Kopie und benenne sie dementsprechend. Oder gerade bei Vm's:Mache Snapshots und benenne diese aussagekräftig.
Dann musst du nicht, falls du den Überblick verlierst, jedes Mal neu installieren. Das ist schon fast eine Beleidigung und ziemlich Microsoftlike.
Beachte auch, dass du nach jeglichen Änderungen den Dienst/Programm reloaden bzw. neustarten musst.
Und nun zu SA und ClamAv:
https://www.timoschindler.de/spamassass ... -7-wheezy/
http://www.debianhelp.co.uk/postfixandcalmav.htm (Erst bei #apt-get update Anfangen!!!, die Sourcelist dort ist veraltet)
Und ja, es heißt ClamSmtp, nicht verwirren lassen.
Re: Mail Gateway
Moin Moin....ich habe ein Snapshot (via VEEAM). Die kann ich umbenannt auch wiederherstellen...
DANKE FÜR DEINE HILFE!
DANKE FÜR DEINE HILFE!
Re: Mail Gateway
Ich bekomme mit dem How-To immer eine Fehlermeldung nach dem Eintrag in der "main.cf". Hinein soll:
mydestination = somedomain.de, localhost.localdomain, localhost, /etc/postfix/virtual/domains
virtual_maps = hash:/etc/postfix/virtual/addresses
Danach soll folgendes eingegeben werden:
postmap /etc/postfix/virtual/addresses
/etc/init.d/postfix reload
Nach Eingabe des 1. Befehls erschreint:
postmap: fatal: /etc/postfix/main.cf, line 36: missing '=' after attribute name: "/etc/postfix/virtual/domains"
Den 2. Befehl habe ich erst gar nicht probiert....
Was kommt hinter dem Eintrag /etc/postfix/domains? Das "="...aber gefolgt von was?
mydestination = somedomain.de, localhost.localdomain, localhost, /etc/postfix/virtual/domains
virtual_maps = hash:/etc/postfix/virtual/addresses
Danach soll folgendes eingegeben werden:
postmap /etc/postfix/virtual/addresses
/etc/init.d/postfix reload
Nach Eingabe des 1. Befehls erschreint:
postmap: fatal: /etc/postfix/main.cf, line 36: missing '=' after attribute name: "/etc/postfix/virtual/domains"
Den 2. Befehl habe ich erst gar nicht probiert....
Was kommt hinter dem Eintrag /etc/postfix/domains? Das "="...aber gefolgt von was?
Re: Mail Gateway
Hallo @seep,
danke für Deinen Link, den ich auch von oben nach unten durchgelesen habe.
Der bezieht sich ja auf "mydestination" und "mydomain".
Jetzt steht ja in der Fehlermeldung, dass in der Zeile 36 der Eintrag "=" fehlen würde. Die Zeile 36 wäre die hinzugefügte Zeile:
/etc/postfix/virtual/domains
Jetzt steht ja bei allen anderen Einträgen hinter dem "=" etwas z.B. "gateway2.meineDomain.net (gateway2 ist der Name des Hosts)
oder: = hash:/etc/aliases
= /etc/mailname
= all
Ich weiß in der Zeile 36 einfach nichts zu ergänzen, weil ich den Zusammenhang zu dem Link nicht herstellen kann
danke für Deinen Link, den ich auch von oben nach unten durchgelesen habe.
Der bezieht sich ja auf "mydestination" und "mydomain".
Jetzt steht ja in der Fehlermeldung, dass in der Zeile 36 der Eintrag "=" fehlen würde. Die Zeile 36 wäre die hinzugefügte Zeile:
/etc/postfix/virtual/domains
Jetzt steht ja bei allen anderen Einträgen hinter dem "=" etwas z.B. "gateway2.meineDomain.net (gateway2 ist der Name des Hosts)
oder: = hash:/etc/aliases
= /etc/mailname
= all
Ich weiß in der Zeile 36 einfach nichts zu ergänzen, weil ich den Zusammenhang zu dem Link nicht herstellen kann

- seep
- Beiträge: 544
- Registriert: 31.10.2004 14:21:08
- Lizenz eigener Beiträge: GNU Free Documentation License
- Wohnort: HSK
Re: Mail Gateway
vi +36 /etc/postfix/main.cf
Wetten, da ist vor dem "/etc/postfix/virtual/domains" ein Zeilenumbruch?
Tipp: Cursor hoch, Shift-J, :wq
Das muss alles in dieselbe Zeile wie mydestination.
Weitermachen.
Wetten, da ist vor dem "/etc/postfix/virtual/domains" ein Zeilenumbruch?
Tipp: Cursor hoch, Shift-J, :wq
Das muss alles in dieselbe Zeile wie mydestination.
Weitermachen.
Re: Mail Gateway
Das stimmt nicht, sondern es bezieht sich auf eine Baustelle, die mit deinem ursprünglichen Problem (Spamassassin und ClamAV) nichts zu tun hat. In meinen verlinkten HoTow's gibt es dazu keine Parameter einzustellen. Langsam machst du mich wahnsinnig. Weiß du überhaupt noch, was du tust und bist du der Meinung, gleich mit einem Mailserver anfangen zu müssen?variousos hat geschrieben:Ich bekomme mit dem How-To immer eine Fehlermeldung nach dem Eintrag in der "main.cf".
Re: Mail Gateway
@weshalb,
ich habe meinen Fehler entdeckt und nach dem ich den beseitigt habe, kam auch keine Meldung mehr!!
Glaube mir, dass ich Deinen Frust verstehe! Aber warum soll ich mir sicher sein, gleich mit einem Mailserver anfangen zu müssen
Ich habe ja einen...allerdings als Exchange. Den will ich ja auch nicht verändern...sondern "davor" eben die Viren- und Spamfunktion haben. Und Postfix soll ja in der DMZ liegen....
Nun zum Ergebnis:
Nachdem ich nach einem Neustart des Servers keine Fehlermeldungen mehr hatte und eine Testmail mit dem "bekannten" Inhalt verschickte, landete die Mail aber wieder in meinen Outlook-Posteingang. Jetzt habe ich nach dem How-To neben Postfix nur Spamassassin installiert...und es klappt auch nicht. Muss ein Eintrag geändert werden?
==========================================================================
update...es war zu voreilig:
gysbert@Gateway2:~$ sudo /etc/init.d/spamassassin restart
Restarting SpamAssassin Mail Filter Daemon: No /usr/bin/perl found running; none killed.
server socket setup failed, retry 1: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 2: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 3: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 4: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 5: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 6: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 7: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 8: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 9: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
gysbert@Gateway2:~$ sudo /etc/init.d/postfix restart
* Stopping Postfix Mail Transport Agent postfix
postmulti: fatal: /etc/postfix/main.cf, line 36: missing '=' after attribute name: "/etc/postfix/virtual/domains"
[ OK ]
* Starting Postfix Mail Transport Agent postfix
postmulti: fatal: /etc/postfix/main.cf, line 36: missing '=' after attribute name: "/etc/postfix/virtual/domains"
ich habe meinen Fehler entdeckt und nach dem ich den beseitigt habe, kam auch keine Meldung mehr!!
Glaube mir, dass ich Deinen Frust verstehe! Aber warum soll ich mir sicher sein, gleich mit einem Mailserver anfangen zu müssen

Ich habe ja einen...allerdings als Exchange. Den will ich ja auch nicht verändern...sondern "davor" eben die Viren- und Spamfunktion haben. Und Postfix soll ja in der DMZ liegen....
Nun zum Ergebnis:
Nachdem ich nach einem Neustart des Servers keine Fehlermeldungen mehr hatte und eine Testmail mit dem "bekannten" Inhalt verschickte, landete die Mail aber wieder in meinen Outlook-Posteingang. Jetzt habe ich nach dem How-To neben Postfix nur Spamassassin installiert...und es klappt auch nicht. Muss ein Eintrag geändert werden?
==========================================================================
update...es war zu voreilig:
gysbert@Gateway2:~$ sudo /etc/init.d/spamassassin restart
Restarting SpamAssassin Mail Filter Daemon: No /usr/bin/perl found running; none killed.
server socket setup failed, retry 1: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 2: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 3: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 4: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 5: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 6: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 7: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 8: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
server socket setup failed, retry 9: spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
spamd: could not create IO::Socket::INET6 socket on [127.0.0.1]:783: Die Adresse wird bereits verwendet
gysbert@Gateway2:~$ sudo /etc/init.d/postfix restart
* Stopping Postfix Mail Transport Agent postfix
postmulti: fatal: /etc/postfix/main.cf, line 36: missing '=' after attribute name: "/etc/postfix/virtual/domains"
[ OK ]
* Starting Postfix Mail Transport Agent postfix
postmulti: fatal: /etc/postfix/main.cf, line 36: missing '=' after attribute name: "/etc/postfix/virtual/domains"
Re: Mail Gateway
Amavis Altlasten?
Ich bin hier mal raus.
Ich bin hier mal raus.
- seep
- Beiträge: 544
- Registriert: 31.10.2004 14:21:08
- Lizenz eigener Beiträge: GNU Free Documentation License
- Wohnort: HSK
Re: Mail Gateway
Warum liest er nicht, was ich schrieb? Warum antworte ich überhaupt noch? Endgültig raus, hoffnungsloser beratungsresistenter Fall.
Re: Mail Gateway
Amavis Altlasten?
...ICH HABE EINZIG SPAMASSASSIN INSTALLIERT.....SO WIE ES IM HOT-TO VOM "TIMOS-BLOG" BESCHRIEBEN STEHT, WORAN ICH MICH HALTEN SOLLTE! AMAVIS ALTLASTEN KÖNNEN DEMNACH NICH AUF DER MASCHINE GEWESEN SEIN...ZUMAL ICH SIE NEU ERSTELLT HABE!
OK...Beenden wir das hier. Kann jemand von den Admins hier den Thread schließen? Ich werde es weiter versuchen und möchte Euch wirklich nicht mehr mit meinen Fragen nerven.
Sorry...und ich möchte mich wirklich für Eure Geduld bedanken.
Gysbert
...ICH HABE EINZIG SPAMASSASSIN INSTALLIERT.....SO WIE ES IM HOT-TO VOM "TIMOS-BLOG" BESCHRIEBEN STEHT, WORAN ICH MICH HALTEN SOLLTE! AMAVIS ALTLASTEN KÖNNEN DEMNACH NICH AUF DER MASCHINE GEWESEN SEIN...ZUMAL ICH SIE NEU ERSTELLT HABE!
OK...Beenden wir das hier. Kann jemand von den Admins hier den Thread schließen? Ich werde es weiter versuchen und möchte Euch wirklich nicht mehr mit meinen Fragen nerven.
Sorry...und ich möchte mich wirklich für Eure Geduld bedanken.
Gysbert