openbsd-ports/mail/smtp-vilter/patches/patch-etc_smtp-vilter_smtp-vilter_conf
ajacoutot 0729022420 Move to REVISION and new DEPENDS.
Add some saner defaults so that it works out of the box.
Add an rc script.
2010-10-29 11:59:22 +00:00

52 lines
1.7 KiB
Plaintext

$OpenBSD: patch-etc_smtp-vilter_smtp-vilter_conf,v 1.2 2010/10/29 11:59:22 ajacoutot Exp $
--- etc/smtp-vilter/smtp-vilter.conf.orig Sun Jan 21 14:09:38 2007
+++ etc/smtp-vilter/smtp-vilter.conf Fri Oct 29 13:57:44 2010
@@ -29,7 +29,7 @@ tmpfiles=setgrp
# Define the path to load backends from
-backend-path=/usr/local/lib/smtp-vilter
+backend-path=${TRUEPREFIX}/lib/smtp-vilter
# Scanning Options
#
@@ -126,9 +126,25 @@ unwanted-strategy=mark
error-strategy=tempfail
+# Enable extended options for internally-generated headers passed to backends
+#
+# At present only one option is available:
+#
+# 0: use plain headers as per previous versions
+#
+# 1: include a tag of the form "(Authenticated sender: user@domain)" in the
+# Received header, if the MTA indicates that the sender successfully
+# signed in with SASL
+#
+# The latter setting emulates Postfix's smtpd_sasl_authenticated_header option,
+# which is useful if the spam-filter needs rules that depend on whether a user
+# is authenticated (e.g. you permit relaying by trusted remote senders)
+
+header-options=0
+
# Define the socket over which smtp-vilter communicates with sendmail
-port=unix:/var/run/smtp-vilter.sock
+port=unix:/tmp/smtp-vilter.sock
# Define the path to a directory for temporary files
@@ -165,7 +181,7 @@ option=logall
option=markall
-react on virus add to table blacklist
-react on spam delete from table whitelist
-react on unwanted-content add to table blacklist
-react on clean add to table cleanlist
+#react on virus add to table blacklist
+#react on spam delete from table whitelist
+#react on unwanted-content add to table blacklist
+#react on clean add to table cleanlist