OpenSDE Packages Database (without history before r20070)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

105 lines
3.0 KiB

  1. # Do not log to STDERR:
  2. feat_log_stderr = 0
  3. feat_log_inline = 0
  4. feat_log_xml = 0
  5. # Advertisement to insert in each mail header:
  6. header_info = X-Sanitizer: Anomy Mail Sanitizer
  7. header_url = 0
  8. header_rev = 0
  9. # Enable filename based policy decisions:
  10. feat_files = 1
  11. # Protect against buffer overflows and null values:
  12. feat_lengths = 1
  13. # Fix invalid and ambiguous MIME boundaries, if possible:
  14. feat_fixmime = 1
  15. # Trust signed and/or encrypted messages:
  16. feat_trust_pgp = 1
  17. msg_pgp_warning = WARNING: Unsanitized content follows.\n
  18. # Defang shell scripts:
  19. feat_scripts = 1
  20. # Defang active HTML:
  21. feat_html = 0
  22. # Defang UUEncoded files:
  23. feat_uuencoded = 1
  24. # Sanitize forwarded content too:
  25. feat_forwards = 1
  26. # Testing? Set to 1 for testing, 0 for production:
  27. feat_testing = 0
  28. # Warn user about unscanned parts, etc.
  29. feat_verbose = 1
  30. # Force all parts (except text/html parts) to
  31. # have file names.
  32. feat_force_name = 1
  33. # Disable web bug
  34. feat_webbugs = 1
  35. # Disable "score" based mail discarding:
  36. score_panic = 0
  37. score_bad = 0
  38. # Define message for dropped files
  39. msg_file_drop = \n*****\n
  40. msg_file_drop += NOTE: An attachment named %FILENAME was deleted from this message\n
  41. msg_file_drop += because it contained a windows executable or other potentially\n
  42. msg_file_drop += dangerous file type.\n\n
  43. msg_file_drop += Contact the system administrator for more information.\n
  44. ##
  45. ## File attachment name mangling rules:
  46. ##
  47. # Specify the Anomy temp file and quarantine directory
  48. file_name_tpl = /var/opt/anomy/quarantine/att-$F-$T.$$
  49. # Number of rulesets we are defining:
  50. file_list_rules = 4
  51. # Quarantine dangerous attachments:
  52. file_list_1 = (?i)(winmail.dat)|
  53. file_list_1 += (\.(exe|com|vb[se]|dll|ocx|cmd|bat|pif|lnk|hlp|ms[ip]|reg|sct|inf
  54. file_list_1 += |asd|cab|sh[sb]|scr|cpl|chm|ws[fhc]|hta|vcd|vcf|eml|nws))$
  55. file_list_1_policy = save
  56. file_list_1_scanner = 0
  57. # Allow through some safe file types
  58. file_list_2 = (?i)\.(gif|jpe?g|pn[mg]|x[pb]m|dvi|e?ps|p(df|cx)|bmp
  59. file_list_2 += |mp[32]|wav|au|ram?
  60. file_list_2 += |avi|mov|mpe?g
  61. file_list_2 += |t(xt|ex)|csv|l(og|yx)|sql|jtmpl
  62. file_list_2 += |[ch](pp|\+\+)?|s|inc|asm|pa(tch|s)|java|php\d?
  63. file_list_2 += |[ja]sp
  64. file_list_2 += |patch|diff
  65. file_list_2 += |can|pos|ux|reg|kbf|xal|\d+)(\.g?z|\.bz\d?)*$
  66. file_list_2_policy = accept
  67. file_list_2_scanner = 0
  68. # Scan potentially dangerous filetypes and quarantine if infected
  69. file_list_3 = (?i)\.(xls|d(at|oc)|p(pt|l)|rtf|html|pdf
  70. file_list_3 += |sxw|sxc
  71. file_list_3 += |class|swf|upd|wp\d?|m?db
  72. file_list_3 += |z(ip|oo)|ar[cj]|lha|[tr]ar|rpm|deb|slp|tgz
  73. file_list_3 += )(\.g?z|\.bz\d?)*$
  74. file_list_3_policy = accept:accept:save:save
  75. file_list_3_scanner = 0:2:3:/opt/anomy/bin/check_for_virus %FILENAME
  76. # Scan everyting else and mangle the file name (to prevent Outlook from
  77. # auto-executing something)
  78. file_list_4 = (?i)(.*)
  79. file_list_4_policy = defang:defang:save:save
  80. file_list_4_scanner = 0:2:3:/opt/anomy/bin/check_for_virus %FILENAME