Amavis + ClamAV

Dieses Thema im Forum "Webserver (Software): Linux, Unix, etc." wurde erstellt von InetCompany, 12. Oktober 2010.

Status des Themas:
Es sind keine weiteren Antworten möglich.
  1. InetCompany

    InetCompany New Member

    Registriert seit:
    19. Juli 2010
    Beiträge:
    34
    Ort:
    Altreichenau
    Firmenname:
    InetCompany Hosting ...
    Anbieterprofil:
    Klick
    Hallo ich hoffe ich bin hier richtig :) wenn nicht dann bitte verschieben.

    Also zu meinem Problem, ich nutze ispcp 1.0.6 und will Amavis + ClamAV mit dem MTA postfix verwenden. Virenfilterung etc. funzt einwandfrei. Dabei will ich gerne dass der Absender der Mail benachrichtigt wird, der Empfänger und der Admin des Servers,

    So, das letzte also Benachrichtigung vom Server admin funktioniert. Nur die Anderen beiden Funktionionen nicht obwohl die richtigen Werte in der amavis.conf eingestellt sind.

    Hier mal eine .conf von Amavis.


    Code:
    # Sample amavisd.conf file for Maia Mailguard 1.0.1
    # Modified for use with Debian by Gary V, mr88talent at yahoo dot com
    
    use strict;
    
    $mydomain = "meinedomain.de"; # a convenient default for other settings
    $myhostname = "kundencenter.meinedomain.de";  # must be a fully-qualified domain name!
    
    
    
    $max_servers = 2;             # number of pre-forked children (2..15 is common)
    $daemon_user  = "amavis";     # (no default;  customary: vscan or amavis)
    $daemon_group = "amavis";     # (no default;  customary: vscan or amavis)
    
    $MYHOME   = "/var/lib/amavis";   # a convenient default for other settings
    $TEMPBASE = $MYHOME;    # working directory
    $ENV{TMPDIR} = $TEMPBASE;     # environment variable TMPDIR
    $pid_file  = "/var/run/amavis/amavisd.pid";  
    $lock_file = "/var/run/amavis/amavisd.lock"; 
    $QUARANTINEDIR = "/var/lib/amavis/virusmails";
    
    
    # $db_home   = "$MYHOME/db";
    # $helpers_home = "$MYHOME/var";  # prefer $MYHOME clean and owned by root?
    #NOTE: create directories $MYHOME/tmp, $MYHOME/var, $MYHOME/db manually
    
    # Use external notification templates (Debian specific)
    #read_l10n_templates("en_US", "/etc/amavis");
    
    @local_domains_maps = ( [".$mydomain"] );
    # @mynetworks = qw( 127.0.0.0/8 );
    
    $log_level = 1;              # verbosity 0..5
    $log_recip_templ = undef;    # disable by-recipient level-0 log entries
    $LOGFILE = "/var/log/amavis.log";
    $DO_SYSLOG = 1;              # log via syslogd (preferred)
    $SYSLOG_LEVEL = "mail.debug";
    
    $enable_db = 1;              # enable use of BerkeleyDB/libdb (SNMP and nanny)
    $enable_global_cache = 1;    # enable use of libdb-based cache if $enable_db=1
    
    $inet_socket_port = 10024;   # listen on this local TCP port(s) (see $protocol)
    
    $sa_tag_level_deflt  = -999; # add spam info headers if at, or above that level
    $sa_tag2_level_deflt = 5.0;  # add "spam detected" headers at that level
    $sa_kill_level_deflt = 5.0;  # triggers spam evasive actions
    $sa_dsn_cutoff_level = 10;   # spam level beyond which a DSN is not sent
    
    $sa_mail_body_size_limit = 500*1024; # don"t waste time on SA if mail is larger
    $sa_local_tests_only = 0;    # only tests which do not require internet access?
    $sa_auto_whitelist = 0;      # turn on AWL in SA 2.63 or older (irrelevant
                                 # for SA 3.0, cf option is "use_auto_whitelist")
    
    $virus_admin               = "postmaster\@$mydomain";  # notifications recip.
    $banned_admin              = "postmaster\@$mydomain";  			
    $mailfrom_notify_admin     = "virusalert\@$mydomain";  # notifications sender
    $mailfrom_notify_recip     = "virusalert\@$mydomain";  # notifications sender
    $mailfrom_notify_spamadmin = "spam.police\@$mydomain"; # notifications sender
    $mailfrom_to_quarantine = ""; # null return path; uses original sender if undef
    
    @addr_extension_virus_maps      = ("virus");
    @addr_extension_spam_maps       = ("spam");
    @addr_extension_banned_maps     = ("banned");
    @addr_extension_bad_header_maps = ("badh");
    # $recipient_delimiter = "+";  # undef disables address extensions altogether
    # when enabling addr extensions do also Postfix/main.cf: recipient_delimiter=+
    $recipient_delimiter = undef;
    
    $path = "/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin";
    $file        = "/usr/bin/file";   # file(1) utility; use recent versions
    $gzip        = "gzip";
    $bzip2       = "bzip2";
    $lzop        = "lzop";
    $rpm2cpio    = ["rpm2cpio.pl","rpm2cpio"];
    $cabextract  = "cabextract";
    $uncompress  = ["uncompress", "gzip -d", "zcat"];
    $unfreeze    = ["unfreeze", "freeze -d", "melt", "fcat"];
    $arc         = ["nomarch", "arc"];
    $unarj       = ["arj", "unarj"];
    $unrar       = ["rar", "unrar"];
    $zoo         = "zoo";
    $lha         = "lha";
    $cpio        = ["gcpio","cpio"];
    $ar          = "ar";
    $dspam       = "dspam";
    
    $MAXLEVELS = 14;
    $MAXFILES = 1500;
    $MIN_EXPANSION_QUOTA =      100*1024;  # bytes  (default undef, not enforced)
    $MAX_EXPANSION_QUOTA = 300*1024*1024;  # bytes  (default undef, not enforced)
    
    $sa_spam_subject_tag = "***SPAM*** ";
    $defang_virus  = 1;  # MIME-wrap passed infected mail
    $defang_banned = 1;  # MIME-wrap passed mail containing banned name
    
    $notify_method  = "smtp:[127.0.0.1]:10025";
    $forward_method = "smtp:[127.0.0.1]:10025";  # set to undef with milter!
    
    $final_virus_destiny      = D_DISCARD;
    $final_banned_destiny     = D_DISCARD;
    
    
    $warnvirussender = 1;
    $warnvirusrecip = 1;
    
    
    $X_HEADER_TAG = "X-Virus-Scanned";
    $X_HEADER_LINE = "Mail - Virus Scanner @  $mydomain";
    use DBI;
    my $db = "ispcp";
    my $user="root";           # Type here your ispCP MySQL User 
    			   # (is the same you typed during the setup)
    my $host="localhost";
    my $password="meinpasswdxxxx"; # Type here your ispCP MySQL Password 
    			   #(is the same you typed during the setup)
    
    my $dbh = DBI->connect("DBI:mysql:database=$db;host=$host", $user, $password, {RaiseError => 1});
    my $arr = $dbh->selectcol_arrayref("SELECT domain_name, 1 FROM domain", {Columns=>[1,2]});
    my $arre = $dbh->selectcol_arrayref("SELECT alias_name, 1 FROM domain_aliasses", {Columns=>[1,2]});
    
    my $lis = ($arre,$arr);
    %local_domains = (@$arr,@$arre);
    
    @viruses_that_fake_sender_maps = (new_RE(
      [qr"\bEICAR\b"i => 0],            # av test pattern name
      [qr"^(WM97|OF97|Joke\.)"i => 0],  # adjust names to match your AV scanner
      [qr/.*/ => 1],  # true for everything else
    ));
    
    @keep_decoded_original_maps = (new_RE(
    # qr"^MAIL$",   # retain full original message for virus checking (can be slow)
      qr"^MAIL-UNDECIPHERABLE$", # recheck full mail if it contains undecipherables
      qr"^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)"i,
    # qr"^Zip archive data",     # don"t trust Archive::Zip
    ));
    
    $banned_filename_re = new_RE(
    # qr"^UNDECIPHERABLE$",  # is or contains any undecipherable components
    
      # block certain double extensions anywhere in the base name
      qr"\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$"i,
    
    # qr"[{}]",      # curly braces in names (serve as Class ID extensions - CLSID)
    
      qr"^application/x-msdownload$"i,                  # block these MIME types
      qr"^application/x-msdos-program$"i,
      qr"^application/hta$"i,
      qr"^message/partial$"i, qr"^message/external-body$"i, # rfc2046 MIME types
    
    # [ qr"^\.(Z|gz|bz2)$"           => 0 ],  # allow any type in Unix-compressed
    # [ qr"^\.(rpm|cpio|tar)$"       => 0 ],  # allow any type in Unix archives
    # [ qr"^\.(zip|rar|arc|arj|zoo)$"=> 0 ],  # allow any type within such archives
    
    # qr".\.(exe|vbs|pif|scr|bat|cmd|com|cpl)$"i, # banned extension - basic
      qr".\.(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|exe|fxp|hlp|hta|inf|ins|isp|
             js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|ops|pcd|pif|prg|
             reg|scr|sct|shb|shs|vb|vbe|vbs|wsc|wsf|wsh)$"ix,  # banned ext - long
    
    # qr".\.(mim|b64|bhx|hqx|xxe|uu|uue)$"i,  # banned extension - WinZip vulnerab.
    
      qr"^\.(exe-ms)$",                       # banned file(1) types
      qr"^\.(exe|lha|cab|dll)$",         # banned file(1) types
    );
    
    @score_sender_maps = ({});  # should be empty if using Maia Mailguard
    
    # See https://secure.renaissoft.com/maia/wiki/VirusScannerConfig
    # for more virus scanner definitions.
    @av_scanners = (
    
    ### http://www.clamav.net/
    ["ClamAV-clamd",
       \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.ctl"],
       qr/\bOK$/, qr/\bFOUND$/,
       qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
      # NOTE: run clamd under the same user as amavisd, or run it under its own
      #   uid such as clamav, add user clamav to the amavis group, and then add
      #   AllowSupplementaryGroups to clamd.conf;
      # NOTE: match socket name (LocalSocket) in clamav.conf to the socket name in
      #   this entry; when running chrooted one may prefer socket "$MYHOME/clamd".
    
    #  ### http://www.bitdefender.com/
    #  ["BitDefender", "bdc",
    #    "--arc --mail {}", qr/^Infected files *:0+(?!\d)/,
    #    qr/^(?:Infected files|Identified viruses|Suspect files) *:0*[1-9]/,
    #    qr/(?:suspected|infected): (.*)(?:\033|$)/ ],
    #  # consider also: --all --nowarn --alev=15 --flev=15.  The --all argument may
    #  # not apply to your version of bdc, check documentation and see "bdc --help"
    
    #  ### http://www.kaspersky.com/  (kav4mailservers)
    #  ["KasperskyLab AVP - aveclient",
    #    ["/usr/local/kav/bin/aveclient","/usr/local/share/kav/bin/aveclient",
    #     "/opt/kav/5.5/kav4mailservers/bin/aveclient","aveclient"],
    #    "-p /var/run/aveserver -s {}/*",
    #    [0,3,6,8], qr/\b(INFECTED|SUSPICION|SUSPICIOUS)\b/,
    #    qr/(?:INFECTED|WARNING|SUSPICION|SUSPICIOUS) (.+)/,
    #  ],
    #  # NOTE: one may prefer [0],[2,3,4,5], depending on how suspicious,
    #  # currupted or protected archives are to be handled
    
    #   ### http://www.kaspersky.com/
    #   ["Kaspersky Antivirus v5.5",
    #     ["/opt/kav/5.5/kav4unix/bin/kavscanner",
    #      "/opt/kav/5.5/kav4mailservers/bin/kavscanner","kavscanner"],
    #     "-i0 -xn -xp -mn -R -ePASBME {}/*", [0,10,15], [5,20,21,25],
    #     qr/(?:INFECTED|WARNING|SUSPICION|SUSPICIOUS) (.*)/ ,
    #   ],
    
    );
    
    # See https://secure.renaissoft.com/maia/wiki/VirusScannerConfig
    # for more virus scanner definitions.
    @av_scanners_backup = (
    
    ### http://www.clamav.net/   - backs up clamd or Mail::ClamAV
    ["ClamAV-clamscan", "clamscan",
        "--stdout --disable-summary -r --tempdir=$TEMPBASE {}", [0], [1],
        qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    
    );
    
    1;  # insure a defined return
    




    der mail.log



    [CODEOct 12 17:32:10 vadmin20 amavis[12022]: starting. /usr/sbin/amavisd-new at kundencenter.inetcompany.de amavisd-new-2.6.1 (20080629), Unicode aware, LANG="de_DE@euro"
    Oct 12 17:32:10 vserver259 amavis[12022]: Perl version 5.010000
    Oct 12 17:32:10 vserver259 amavis[12027]: Net::Server: Group Not Defined. Defaulting to EGID '114 114'
    Oct 12 17:32:10 vserver259 amavis[12027]: Net::Server: User Not Defined. Defaulting to EUID '112'
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Amavis::Conf 2.103
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Archive::Zip 1.18
    Oct 12 17:32:10 vserver259 amavis[12027]: Module BerkeleyDB 0.34
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Compress::Zlib 2.012
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Convert::TNEF 0.17
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Convert::UUlib 1.11
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Digest::MD5 2.36_01
    Oct 12 17:32:10 vserver259 amavis[12027]: Module IO::Socket::INET6 2.54
    Oct 12 17:32:10 vserver259 amavis[12027]: Module MIME::Entity 5.427
    Oct 12 17:32:10 vserver259 amavis[12027]: Module MIME::parser 5.427
    Oct 12 17:32:10 vserver259 amavis[12027]: Module MIME::Tools 5.427
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Mail::Header 2.03
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Mail::Internet 2.03
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Net::Server 0.97
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Socket6 0.20
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Time::HiRes 1.9711
    Oct 12 17:32:10 vserver259 amavis[12027]: Module Unix::Syslog 1.1
    Oct 12 17:32:10 vserver259 amavis[12027]: Amavis::DB code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Amavis::Cache code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: SQL base code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: SQL::Log code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: SQL::Quarantine NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Lookup::SQL code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Lookup::LDAP code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: AM.PDP-in proto code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: SMTP-in proto code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Courier proto code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: SMTP-out proto code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Pipe-out proto code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: BSMTP-out proto code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Local-out proto code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: OS_Fingerprint code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: ANTI-VIRUS code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: ANTI-SPAM code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: ANTI-SPAM-SA code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Unpackers code loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: DKIM code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Tools code NOT loaded
    Oct 12 17:32:10 vserver259 amavis[12027]: Found $file at /usr/bin/file
    Oct 12 17:32:10 vserver259 amavis[12027]: No $dspam, not using it
    Oct 12 17:32:10 vserver259 amavis[12027]: No $altermime, not using it
    Oct 12 17:32:10 vserver259 amavis[12027]: Internal decoder for .mail
    Oct 12 17:32:10 vserver259 amavis[12027]: No decoder for .F
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .Z at /bin/uncompress
    Oct 12 17:32:10 vserver259 amavis[12027]: Internal decoder for .gz
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .bz2 at /bin/bzip2 -d
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .lzo at /usr/bin/lzop -d
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .rpm at /usr/bin/rpm2cpio
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .cpio at /usr/bin/pax
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .tar at /usr/bin/pax
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .deb at /usr/bin/ar
    Oct 12 17:32:10 vserver259 amavis[12027]: Internal decoder for .zip
    Oct 12 17:32:10 vserver259 amavis[12027]: No decoder for .7z tried: 7zr, 7za, 7z
    Oct 12 17:32:10 vserver259 amavis[12027]: No decoder for .rar
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .arj at /usr/bin/arj
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .arc at /usr/bin/nomarch
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .zoo at /usr/bin/zoo
    Oct 12 17:32:10 vserver259 amavis[12027]: No decoder for .lha
    Oct 12 17:32:10 vserver259 amavis[12027]: No decoder for .doc tried: ripole
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .cab at /usr/bin/cabextract
    Oct 12 17:32:10 vserver259 amavis[12027]: No decoder for .tnef
    Oct 12 17:32:10 vserver259 amavis[12027]: Internal decoder for .tnef
    Oct 12 17:32:10 vserver259 amavis[12027]: Found decoder for .exe at /usr/bin/arj
    Oct 12 17:32:10 vserver259 amavis[12027]: Using primary internal av scanner code for ClamAV-clamd
    Oct 12 17:32:10 vserver259 amavis[12027]: Using primary internal av scanner code for check-jpeg
    Oct 12 17:32:10 vserver259 amavis[12027]: Found secondary av scanner ClamAV-clamscan at /usr/bin/clamscan
    Oct 12 17:32:10 vserver259 amavis[12027]: Creating db in /var/lib/amavis/db/; BerkeleyDB 0.34, libdb 4.6
    Oct 12 17:32:45 vserver259 postfix/smtpd[12030]: connect from kdsrv.meinedomain.de[178.63.161.34]
    Oct 12 17:32:46 vserver259 postfix/policyd-weight[22454]: decided action=PREPEND X-policyd-weight: using cached result; rate: -8.5; <client=178.63.161.34> <helo=kdsrv.meinedomain.de> <from=kundenservice@meinedomain.de> <to=manemm@example.de>; delay: 1s
    Oct 12 17:32:46 vserver259 postgrey[12203]: action=pass, reason=triplet found, client_name=kdsrv.meinedomain.de, client_address=178.63.161.34, sender=kundenservice@meinedomain.de, recipient=manemm@example.de
    Oct 12 17:32:46 vserver259 postgrey[12203]: cleaning up old logs...
    Oct 12 17:32:46 vserver259 postfix/smtpd[12030]: 60956A048F: client=kdsrv.meinedomain.de[178.63.161.34]
    Oct 12 17:32:46 vserver259 postfix/cleanup[12033]: 60956A048F: message-id=<C76C57DF15AC4625A7D8C38F12FC0A58@ManePC>
    Oct 12 17:32:46 vserver259 postfix/qmgr[2916]: 60956A048F: from=<kundenservice@meinedomain.de>, size=22004, nrcpt=1 (queue active)
    Oct 12 17:32:46 vserver259 postfix/smtpd[12030]: disconnect from kdsrv.meinedomain.de[178.63.161.34]
    Oct 12 17:32:46 vserver259 postfix/smtpd[12039]: connect from kundencenter.meinedomain.de.local[127.0.0.1]
    Oct 12 17:32:46 vserver259 postfix/smtpd[12039]: 7FD52A0490: client=kundencenter.meinedomain.de.local[127.0.0.1]
    Oct 12 17:32:46 vserver259 postfix/cleanup[12033]: 7FD52A0490: message-id=<VAMDByz+2ijd8g@kundencenter.meinedomain.de>
    Oct 12 17:32:46 vserver259 postfix/qmgr[2916]: 7FD52A0490: from=<postmaster@kundencenter.meinedomain.de>, size=3227, nrcpt=1 (queue active)
    Oct 12 17:32:46 vserver259 amavis[12028]: (12028-01) Blocked INFECTED (Eicar-Test-Signature(44d88612fea8a8f36de82e1278abb02f:68)), [178.63.161.34] [84.145.243.53] <kundenservice@meinedomain.de> -> <manemm@example.de>, quarantine: M/virus-MDByz+2ijd8g, Message-ID: <C76C57DF15AC4625A7D8C38F12FC0A58@ManePC>, mail_id: MDByz+2ijd8g, Hits: -, size: 22004, 132 ms
    Oct 12 17:32:46 vserver259 postfix/smtp[12034]: 60956A048F: to=<manemm@example.de>, relay=127.0.0.1[127.0.0.1]:10024, delay=0.59, delays=0.45/0/0/0.13, dsn=2.7.0, status=sent (250 2.7.0 Ok, discarded, id=12028-01 - VIRUS: Eicar-Test-Signature(44d88612fea8a8f36de82e1278abb02f:68))
    Oct 12 17:32:46 vserver259 postfix/qmgr[2916]: 60956A048F: removed
    Oct 12 17:32:46 vserver259 postfix/cleanup[12033]: 85B12A048F: message-id=<VAMDByz+2ijd8g@kundencenter.meinedomain.de>
    Oct 12 17:32:46 vserver259 postfix/qmgr[2916]: 85B12A048F: from=<postmaster@kundencenter.meinedomain.de>, size=3389, nrcpt=1 (queue active)
    Oct 12 17:32:46 vserver259 postfix/local[12040]: 7FD52A0490: to=<postmaster@kundencenter.meinedomain.de>, relay=local, delay=0.03, delays=0.01/0.02/0/0, dsn=2.0.0, status=sent (forwarded as 85B12A048F)
    Oct 12 17:32:46 vserver259 postfix/qmgr[2916]: 7FD52A0490: removed
    Oct 12 17:32:46 vserver259 postfix/smtp[12041]: 85B12A048F: to=<srvadm@meinedomain.de>, orig_to=<postmaster@kundencenter.meinedomain.de>, relay=meinedomain.de[178.63.161.34]:25, delay=0.08, delays=0/0/0.04/0.03, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 95A16A243F)
    Oct 12 17:32:46 vserver259 postfix/qmgr[2916]: 85B12A048F: removed][/CODE]




    Ich hoffe ihr könnt mir helfen.. .
     
  2. sysprovide

    sysprovide New Member

    Registriert seit:
    23. August 2006
    Beiträge:
    788
    Ort:
    Berlin
    Firmenname:
    sysprovide
    Anbieterprofil:
    Klick
    AW: Amavis + ClamAV

    Den Absender würde ich generell nicht informieren, da die meisten Absendeadressen (Spam+Virussender) gefälscht sind.
     
  3. smartTERRA GmbH Falk

    smartTERRA GmbH Falk Eingetragener Provider

    Registriert seit:
    23. Dezember 2000
    Beiträge:
    4.240
    Ort:
    Düsseldorf
    Firmenname:
    smartTERRA GmbH
    Anbieterprofil:
    Klick
  4. InetCompany

    InetCompany New Member

    Registriert seit:
    19. Juli 2010
    Beiträge:
    34
    Ort:
    Altreichenau
    Firmenname:
    InetCompany Hosting ...
    Anbieterprofil:
    Klick
    AW: Amavis + ClamAV


    Danke sysprovide,


    daran hab ich gar nicht gedacht, soo hab alles schön konfiguriert und es läuft echt prima. Mal sehen wenn ich die ersten Kunden umziehe wie es sie verhält.

    Hab es jetzt so gemacht ---> Admin erhält eine Email wenn Virus Mail eingegangen ist.
    Der Empfänger bekommt auch eine Nachricht mit einem Key / (Quarantäne Ort der Mail).

    Anhand einen Kleinen Script was per Cron ausgeführt wird hat der Empfänger die Option die Viren Mail zuzusenden.
    Dieses Script habe ich im Netz gefunden und fand es einfach toll, denn somit kann der Kunde dann selbst wählen ob er die Mail haben will oder nicht.. Wie das Funktioniert???
    Der Kunde sendet einfach den Key per Betreff zurück... Ist eigentlich ganz Simpel.. Man muss nur darauf erst kommen.

    Danke für eure Posts.... Schönen Abend noch :)
     
  5. DasIch

    DasIch New Member

    Registriert seit:
    26. April 2007
    Beiträge:
    332
    AW: Amavis + ClamAV

    Hört sich für mich ganz gut an, allerdings wird es vermutlich sehr schnell passieren, dass technisch nicht so begabte damit nicht klarkommen und diesen key in einer nicht für das Script brauchbaren Form versenden (wenn überhaupt). Vielleicht kann da als zusätzliche Alternative noch ein Link mit in die Benachrichtigung, der direkt den Freigabe der Originalmail durchführt?
     
  6. InetCompany

    InetCompany New Member

    Registriert seit:
    19. Juli 2010
    Beiträge:
    34
    Ort:
    Altreichenau
    Firmenname:
    InetCompany Hosting ...
    Anbieterprofil:
    Klick
    AW: Amavis + ClamAV

    Hi,


    ja da hast du natürlich Recht. Aber 1. muss ich sagen dass ja sowieso alles in der Benachrichtigung der Virenmail steht.. also den Key bitte als Betreff zurückschicken..

    2. Das könnte ich evtl umsetzen mit dem Link.. muss ich mal austesten. das wäre natürlich schon die schönere und (bequemere Variante) :)


    Ich werd´s mal basteln und testen obs läuft, dann melde ich mich wieder.
    Kann aber ein bisschen dauern denn ich werde mit Frau 2 Wochen in Urlaub fliegen, werd per Iphone ab und zu im WHL Forum nach dem Rechten kucken.

    Gruß an alle
     
  7. MFriedemann

    MFriedemann New Member

    Registriert seit:
    23. Januar 2006
    Beiträge:
    32
    AW: Amavis + ClamAV

    das mit dem link ist recht simpel - link mit mailID und/oder SecretID und 'to'.
    Das verlinkte script ruft nur noch amavis release auf - und raus ist die mail.
     
Status des Themas:
Es sind keine weiteren Antworten möglich.

Diese Seite empfehlen