52 lines
1.7 KiB
Plaintext
52 lines
1.7 KiB
Plaintext
$OpenBSD: patch-etc_smtp-vilter_smtp-vilter_conf,v 1.2 2010/10/29 11:59:22 ajacoutot Exp $
|
|
--- etc/smtp-vilter/smtp-vilter.conf.orig Sun Jan 21 14:09:38 2007
|
|
+++ etc/smtp-vilter/smtp-vilter.conf Fri Oct 29 13:57:44 2010
|
|
@@ -29,7 +29,7 @@ tmpfiles=setgrp
|
|
|
|
# Define the path to load backends from
|
|
|
|
-backend-path=/usr/local/lib/smtp-vilter
|
|
+backend-path=${TRUEPREFIX}/lib/smtp-vilter
|
|
|
|
# Scanning Options
|
|
#
|
|
@@ -126,9 +126,25 @@ unwanted-strategy=mark
|
|
|
|
error-strategy=tempfail
|
|
|
|
+# Enable extended options for internally-generated headers passed to backends
|
|
+#
|
|
+# At present only one option is available:
|
|
+#
|
|
+# 0: use plain headers as per previous versions
|
|
+#
|
|
+# 1: include a tag of the form "(Authenticated sender: user@domain)" in the
|
|
+# Received header, if the MTA indicates that the sender successfully
|
|
+# signed in with SASL
|
|
+#
|
|
+# The latter setting emulates Postfix's smtpd_sasl_authenticated_header option,
|
|
+# which is useful if the spam-filter needs rules that depend on whether a user
|
|
+# is authenticated (e.g. you permit relaying by trusted remote senders)
|
|
+
|
|
+header-options=0
|
|
+
|
|
# Define the socket over which smtp-vilter communicates with sendmail
|
|
|
|
-port=unix:/var/run/smtp-vilter.sock
|
|
+port=unix:/tmp/smtp-vilter.sock
|
|
|
|
# Define the path to a directory for temporary files
|
|
|
|
@@ -165,7 +181,7 @@ option=logall
|
|
|
|
option=markall
|
|
|
|
-react on virus add to table blacklist
|
|
-react on spam delete from table whitelist
|
|
-react on unwanted-content add to table blacklist
|
|
-react on clean add to table cleanlist
|
|
+#react on virus add to table blacklist
|
|
+#react on spam delete from table whitelist
|
|
+#react on unwanted-content add to table blacklist
|
|
+#react on clean add to table cleanlist
|