@ -156,7 +156,7 @@ Action to be performed on error conditions (this includes failure to allocate da
Default: Defer
.TP
\fBRejectMsg STRING\fR
This option allows to set a specific rejection reason for infected messages and it\'s therefore only useful together with "OnInfected Reject". The string "%v", if present, will be replaced with the virus name.
This option allows you to set a specific rejection reason for infected messages and it\'s therefore only useful together with "OnInfected Reject". The string "%v", if present, will be replaced with the virus name.
.br
Default: MTA specific
.TP
@ -166,7 +166,7 @@ If this option is set to "Replace" (or "Yes"), an "X-Virus-Scanned" and an "X-Vi
Default: no
.TP
\fBReportHostname STRING\fr
When AddHeader is in use, this option allows to arbitrary set the reported hostname. This may be desirable in order to avoid leaking internal names. If unset the real machine name is used.
When AddHeader is in use, this option allows you to set the reported hostname. This may be desirable in order to avoid leaking internal names. If unset the real machine name is used.
.br
Default: disabled
.TP
@ -212,7 +212,7 @@ Enable verbose logging.
Default: no
.TP
\fBLogInfected STRING\fR
This option allows to tune what is logged when a message is infected. Possible values are Off (the default \- nothing is logged), Basic (minimal info logged), Full (verbose info logged)
This option allows you to tune what is logged when a message is infected. Possible values are Off (the default \- nothing is logged), Basic (minimal info logged), Full (verbose info logged)
.br
Note: For this to work properly in sendmail, make sure the msg_id, mail_addr, rcpt_addr and i macroes are available in eom. In other words add a line like: Milter.macros.eom={msg_id}, {mail_addr}, {rcpt_addr}, i to your .cf file. Alternatively use the macro: define(`confMILTER_MACROS_EOM', `{msg_id}, {mail_addr}, {rcpt_addr}, i')
.br
@ -221,7 +221,7 @@ Postfix should be working fine with the default settings.
Default: disabled
.TP
\fBLogClean STRING\fR
This option allows to tune what is logged when no threat is found in a scanned message.
This option allows you to tune what is logged when no threat is found in a scanned message.
{"OnFail",NULL,0,TYPE_STRING,"^(Accept|Reject|Defer)$",-1,"Defer",0,OPT_MILTER,"Action to be performed on error conditions (this includes failure to\nallocate data structures, no scanners available, network timeouts, unknown\nscanner replies and the like.\nThe following actions are available:\nAccept: the message is accepted for delievery;\nReject: immediately refuse delievery (a 5xx error is returned to the peer);\nDefer: return a temporary failure message (4xx) to the peer.","Defer"},
{"RejectMsg",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"This option allows to set a specific rejection reason for infected messages\nand it's therefore only useful together with \"OnInfected Reject\"\nThe string \"%v\", if present, will be replaced with the virus name.","MTA specific"},
{"RejectMsg",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"This option allows you to set a specific rejection reason for infected messages\nand it's therefore only useful together with \"OnInfected Reject\"\nThe string \"%v\", if present, will be replaced with the virus name.","MTA specific"},
{"AddHeader",NULL,0,TYPE_STRING,"^(No|Replace|Yes|Add)$",-1,"no",0,OPT_MILTER,"If this option is set to \"Replace\" (or \"Yes\"), an \"X-Virus-Scanned\" and an\n\"X-Virus-Status\" headers will be attached to each processed message, possibly\nreplacing existing headers.\nIf it is set to Add, the X-Virus headers are added possibly on top of the\nexisting ones.\nNote that while \"Replace\" can potentially break DKIM signatures, \"Add\" may\nconfuse procmail and similar filters.","Replace"},
{"ReportHostname",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"When AddHeader is in use, this option allows to arbitrary set the reported\nhostname. This may be desirable in order to avoid leaking internal names.\nIf unset the real machine name is used.","my.mail.server.name"},
{"ReportHostname",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"When AddHeader is in use, this option allows you to set the reported\nhostname. This may be desirable in order to avoid leaking internal names.\nIf unset the real machine name is used.","my.mail.server.name"},
{"VirusAction",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"Execute a command when an infected message is processed.\nThe following parameters are passed to the invoked program in this order:\nvirus name, queue id, sender, destination, subject, message id, message date.\nNote #1: this requires MTA macroes to be available (see LogInfected below)\nNote #2: the process is invoked in the context of clamav-milter\nNote #3: clamav-milter will wait for the process to exit. Be quick or fork to\navoid unnecessary delays in email delievery","/usr/local/bin/my_infected_message_handler"},
{"SkipAuthenticated",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"Messages from authenticated SMTP users matching this extended POSIX\nregular expression (egrep-like) will not be scanned.\nAs an alternative, a file containing a plain (not regex) list of names (one\nper line) can be specified using the prefix \"file:\".\ne.g. SkipAuthenticated file:/etc/good_guys\n\nNote: this is the AUTH login name!","SkipAuthenticated ^(tom|dick|henry)$"},
{"LogInfected",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"This option allows to tune what is logged when a message is infected.\nPossible values are Off (the default - nothing is logged),\nBasic (minimal info logged), Full (verbose info logged)\nNote:\nFor this to work properly in sendmail, make sure the msg_id, mail_addr,\nrcpt_addr and i macroes are available in eom. In other words add a line like:\nMilter.macros.eom={msg_id}, {mail_addr}, {rcpt_addr}, i\nto your .cf file. Alternatively use the macro:\ndefine(`confMILTER_MACROS_EOM', `{msg_id}, {mail_addr}, {rcpt_addr}, i')\nPostfix should be working fine with the default settings.","Basic"},
{"LogInfected",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"This option allows you to tune what is logged when a message is infected.\nPossible values are Off (the default - nothing is logged),\nBasic (minimal info logged), Full (verbose info logged)\nNote:\nFor this to work properly in sendmail, make sure the msg_id, mail_addr,\nrcpt_addr and i macroes are available in eom. In other words add a line like:\nMilter.macros.eom={msg_id}, {mail_addr}, {rcpt_addr}, i\nto your .cf file. Alternatively use the macro:\ndefine(`confMILTER_MACROS_EOM', `{msg_id}, {mail_addr}, {rcpt_addr}, i')\nPostfix should be working fine with the default settings.","Basic"},
{"LogClean",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"This option allows to tune what is logged when no threat is found in a scanned message.\nSee LogInfected for possible values and caveats.\nUseful in debugging but drastically increases the log size.","Basic"},
{"LogClean",NULL,0,TYPE_STRING,NULL,-1,NULL,0,OPT_MILTER,"This option allows you to tune what is logged when no threat is found in a scanned message.\nSee LogInfected for possible values and caveats.\nUseful in debugging but drastically increases the log size.","Basic"},
{"SupportMultipleRecipients",NULL,0,TYPE_BOOL,MATCH_BOOL,0,NULL,0,OPT_MILTER,"This option affects the behaviour of LogInfected, LogClean and VirusAction\nwhen a message with multiple recipients is scanned:\nIf SupportMultipleRecipients is off (the default)\nthen one single log entry is generated for the message and, in case the\nmessage is determined to be malicious, the command indicated by VirusAction\nis executed just once. In both cases only the last recipient is reported.\nIf SupportMultipleRecipients is on:\nthen one line is logged for each recipient and the command indicated\nby VirusAction is also executed once for each recipient.\n\nNote: although it's probably a good idea to enable this option, the default value\nis currently set to off for legacy reasons.","yes"},