aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPascal Terjan <pterjan@mageia.org>2012-01-16 22:54:25 +0000
committerPascal Terjan <pterjan@mageia.org>2012-01-16 22:54:25 +0000
commit6305655bfcc170734854fbfa2c0cb4758a2b4986 (patch)
treec0776ee08f4690139712daf65981e86e71b1a00e
parentfd29bd3e46259f76078ca5fea508a59ccb08367e (diff)
downloadpuppet-6305655bfcc170734854fbfa2c0cb4758a2b4986.tar
puppet-6305655bfcc170734854fbfa2c0cb4758a2b4986.tar.gz
puppet-6305655bfcc170734854fbfa2c0cb4758a2b4986.tar.bz2
puppet-6305655bfcc170734854fbfa2c0cb4758a2b4986.tar.xz
puppet-6305655bfcc170734854fbfa2c0cb4758a2b4986.zip
Comment all proprietary antivirus we don't have and accept all mail in primary scanners
-rw-r--r--modules/amavis/templates/amavisd.conf207
1 files changed, 104 insertions, 103 deletions
diff --git a/modules/amavis/templates/amavisd.conf b/modules/amavis/templates/amavisd.conf
index a5c85bae..0e3b3f1d 100644
--- a/modules/amavis/templates/amavisd.conf
+++ b/modules/amavis/templates/amavisd.conf
@@ -433,32 +433,32 @@ $banned_filename_re = new_RE(
# # length("$TEMPBASE/amavis-milter-xxxxxxxxxxxxxx/parts/pxxx").
### http://www.kaspersky.com/ (kav4mailservers)
- ['KasperskyLab AVP - aveclient',
- ['/usr/local/kav/bin/aveclient','/usr/local/share/kav/bin/aveclient',
- '/opt/kav/5.5/kav4mailservers/bin/aveclient','aveclient'],
- '-p /var/run/aveserver -s {}/*',
- [0,3,6,8], qr/\b(INFECTED|SUSPICION|SUSPICIOUS)\b/m,
- qr/(?:INFECTED|WARNING|SUSPICION|SUSPICIOUS) (.+)/m,
- ],
+# ['KasperskyLab AVP - aveclient',
+# ['/usr/local/kav/bin/aveclient','/usr/local/share/kav/bin/aveclient',
+# '/opt/kav/5.5/kav4mailservers/bin/aveclient','aveclient'],
+# '-p /var/run/aveserver -s {}/*',
+# [0,3,6,8], qr/\b(INFECTED|SUSPICION|SUSPICIOUS)\b/m,
+# qr/(?:INFECTED|WARNING|SUSPICION|SUSPICIOUS) (.+)/m,
+# ],
# NOTE: one may prefer [0],[2,3,4,5], depending on how suspicious,
# currupted or protected archives are to be handled
### http://www.kaspersky.com/
- ['KasperskyLab AntiViral Toolkit Pro (AVP)', ['avp'],
- '-* -P -B -Y -O- {}', [0,3,6,8], [2,4], # any use for -A -K ?
- qr/infected: (.+)/m,
- sub {chdir('/opt/AVP') or die "Can't chdir to AVP: $!"},
- sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
- ],
+# ['KasperskyLab AntiViral Toolkit Pro (AVP)', ['avp'],
+# '-* -P -B -Y -O- {}', [0,3,6,8], [2,4], # any use for -A -K ?
+# qr/infected: (.+)/m,
+# sub {chdir('/opt/AVP') or die "Can't chdir to AVP: $!"},
+# sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
+# ],
### The kavdaemon and AVPDaemonClient have been removed from Kasperky
### products and replaced by aveserver and aveclient
- ['KasperskyLab AVPDaemonClient',
- [ '/opt/AVP/kavdaemon', 'kavdaemon',
- '/opt/AVP/AvpDaemonClient', 'AvpDaemonClient',
- '/opt/AVP/AvpTeamDream', 'AvpTeamDream',
- '/opt/AVP/avpdc', 'avpdc' ],
- "-f=$TEMPBASE {}", [0,8], [3,4,5,6], qr/infected: ([^\r\n]+)/m ],
+# ['KasperskyLab AVPDaemonClient',
+# [ '/opt/AVP/kavdaemon', 'kavdaemon',
+# '/opt/AVP/AvpDaemonClient', 'AvpDaemonClient',
+# '/opt/AVP/AvpTeamDream', 'AvpTeamDream',
+# '/opt/AVP/avpdc', 'avpdc' ],
+# "-f=$TEMPBASE {}", [0,8], [3,4,5,6], qr/infected: ([^\r\n]+)/m ],
# change the startup-script in /etc/init.d/kavd to:
# DPARMS="-* -Y -dl -f=/var/lib/amavis /var/lib/amavis"
# (or perhaps: DPARMS="-I0 -Y -* /var/lib/amavis" )
@@ -472,12 +472,12 @@ $banned_filename_re = new_RE(
# su - vscan -c "${PREFIX}/kavdaemon ${DPARMS}"
### http://www.centralcommand.com/
- ['CentralCommand Vexira (new) vascan',
- ['vascan','/usr/lib/Vexira/vascan'],
- "-a s --timeout=60 --temp=$TEMPBASE -y $QUARANTINEDIR ".
- "--log=/var/log/vascan.log {}",
- [0,3], [1,2,5],
- qr/(?x)^\s* (?:virus|iworm|macro|mutant|sequence|trojan)\ found:\ ( [^\]\s']+ )\ \.\.\.\ /m ],
+# ['CentralCommand Vexira (new) vascan',
+# ['vascan','/usr/lib/Vexira/vascan'],
+# "-a s --timeout=60 --temp=$TEMPBASE -y $QUARANTINEDIR ".
+# "--log=/var/log/vascan.log {}",
+# [0,3], [1,2,5],
+# qr/(?x)^\s* (?:virus|iworm|macro|mutant|sequence|trojan)\ found:\ ( [^\]\s']+ )\ \.\.\.\ /m ],
# Adjust the path of the binary and the virus database as needed.
# 'vascan' does not allow to have the temp directory to be the same as
# the quarantine directory, and the quarantine option can not be disabled.
@@ -487,29 +487,29 @@ $banned_filename_re = new_RE(
### http://www.avira.com/
### Avira AntiVir (formerly H+BEDV) or (old) CentralCommand Vexira Antivirus
- ['Avira AntiVir', ['antivir','vexira'],
- '--allfiles -noboot -nombr -rs -s -z {}', [0], qr/ALERT:|VIRUS:/m,
- qr/(?x)^\s* (?: ALERT: \s* (?: \[ | [^']* ' ) |
- (?i) VIRUS:\ .*?\ virus\ '?) ( [^\]\s']+ )/m ],
+# ['Avira AntiVir', ['antivir','vexira'],
+# '--allfiles -noboot -nombr -rs -s -z {}', [0], qr/ALERT:|VIRUS:/m,
+# qr/(?x)^\s* (?: ALERT: \s* (?: \[ | [^']* ' ) |
+# (?i) VIRUS:\ .*?\ virus\ '?) ( [^\]\s']+ )/m ],
# NOTE: if you only have a demo version, remove -z and add 214, as in:
# '--allfiles -noboot -nombr -rs -s {}', [0,214], qr/ALERT:|VIRUS:/,
### http://www.commandsoftware.com/
- ['Command AntiVirus for Linux', 'csav',
- '-all -archive -packed {}', [50], [51,52,53],
- qr/Infection: (.+)/m ],
+# ['Command AntiVirus for Linux', 'csav',
+# '-all -archive -packed {}', [50], [51,52,53],
+# qr/Infection: (.+)/m ],
### http://www.symantec.com/
- ['Symantec CarrierScan via Symantec CommandLineScanner',
- 'cscmdline', '-a scan -i 1 -v -s 127.0.0.1:7777 {}',
- qr/^Files Infected:\s+0$/m, qr/^Infected\b/m,
- qr/^(?:Info|Virus Name):\s+(.+)/m ],
+# ['Symantec CarrierScan via Symantec CommandLineScanner',
+# 'cscmdline', '-a scan -i 1 -v -s 127.0.0.1:7777 {}',
+# qr/^Files Infected:\s+0$/m, qr/^Infected\b/m,
+# qr/^(?:Info|Virus Name):\s+(.+)/m ],
### http://www.symantec.com/
- ['Symantec AntiVirus Scan Engine',
- 'savsecls', '-server 127.0.0.1:7777 -mode scanrepair -details -verbose {}',
- [0], qr/^Infected\b/m,
- qr/^(?:Info|Virus Name):\s+(.+)/m ],
+# ['Symantec AntiVirus Scan Engine',
+# 'savsecls', '-server 127.0.0.1:7777 -mode scanrepair -details -verbose {}',
+# [0], qr/^Infected\b/m,
+# qr/^(?:Info|Virus Name):\s+(.+)/m ],
# NOTE: check options and patterns to see which entry better applies
# ### http://www.f-secure.com/products/anti-virus/ version 4.65
@@ -520,11 +520,11 @@ $banned_filename_re = new_RE(
# qr/(?:infection|Infected|Suspected): (.+)/m ],
### http://www.f-secure.com/products/anti-virus/ version 5.52
- ['F-Secure Antivirus for Linux servers',
- ['/opt/f-secure/fsav/bin/fsav', 'fsav'],
- '--virus-action1=report --archive=yes --auto=yes '.
- '--dumb=yes --list=no --mime=yes {}', [0], [3,4,6,8],
- qr/(?:infection|Infected|Suspected|Riskware): (.+)/m ],
+# ['F-Secure Antivirus for Linux servers',
+# ['/opt/f-secure/fsav/bin/fsav', 'fsav'],
+# '--virus-action1=report --archive=yes --auto=yes '.
+# '--dumb=yes --list=no --mime=yes {}', [0], [3,4,6,8],
+# qr/(?:infection|Infected|Suspected|Riskware): (.+)/m ],
# NOTE: internal archive handling may be switched off by '--archive=no'
# to prevent fsav from exiting with status 9 on broken archives
@@ -539,27 +539,27 @@ $banned_filename_re = new_RE(
# '-a /var/run/avast4/mailscanner.sock -n {}', [0], [1],
# qr/\t\[L\]\t([^[ \t\015\012]+)/m ],
- ['CAI InoculateIT', 'inocucmd', # retired product
- '-sec -nex {}', [0], [100],
- qr/was infected by virus (.+)/m ],
+# ['CAI InoculateIT', 'inocucmd', # retired product
+# '-sec -nex {}', [0], [100],
+# qr/was infected by virus (.+)/m ],
# see: http://www.flatmtn.com/computer/Linux-Antivirus_CAI.html
### http://www3.ca.com/Solutions/Product.asp?ID=156 (ex InoculateIT)
- ['CAI eTrust Antivirus', 'etrust-wrapper',
- '-arc -nex -spm h {}', [0], [101],
- qr/is infected by virus: (.+)/m ],
+# ['CAI eTrust Antivirus', 'etrust-wrapper',
+# '-arc -nex -spm h {}', [0], [101],
+# qr/is infected by virus: (.+)/m ],
# NOTE: requires suid wrapper around inocmd32; consider flag: -mod reviewer
# see http://marc.theaimsgroup.com/?l=amavis-user&m=109229779912783
### http://mks.com.pl/english.html
- ['MkS_Vir for Linux (beta)', ['mks32','mks'],
- '-s {}/*', [0], [1,2],
- qr/--[ \t]*(.+)/m ],
+# ['MkS_Vir for Linux (beta)', ['mks32','mks'],
+# '-s {}/*', [0], [1,2],
+# qr/--[ \t]*(.+)/m ],
### http://mks.com.pl/english.html
- ['MkS_Vir daemon', 'mksscan',
- '-s -q {}', [0], [1..7],
- qr/^... (\S+)/m ],
+# ['MkS_Vir daemon', 'mksscan',
+# '-s -q {}', [0], [1..7],
+# qr/^... (\S+)/m ],
# ### http://www.nod32.com/, version v2.52 (old)
# ['ESET NOD32 for Linux Mail servers',
@@ -580,17 +580,17 @@ $banned_filename_re = new_RE(
# '--subdir {}', [0], [1,2,3], qr/virus="([^"]+)"/m ],
### http://www.eset.com/, version 3.0
- ['ESET Software ESETS Command Line Interface',
- ['/usr/bin/esets_cli', 'esets_cli'],
- '--subdir {}', [0], [1,2,3],
- qr/:\s*action="(?!accepted)[^"]*"\n.*:\s*virus="([^"]*)"/m ],
+# ['ESET Software ESETS Command Line Interface',
+# ['/usr/bin/esets_cli', 'esets_cli'],
+# '--subdir {}', [0], [1,2,3],
+# qr/:\s*action="(?!accepted)[^"]*"\n.*:\s*virus="([^"]*)"/m ],
## http://www.nod32.com/, NOD32LFS version 2.5 and above
- ['ESET NOD32 for Linux File servers',
- ['/opt/eset/nod32/sbin/nod32','nod32'],
- '--files -z --mail --sfx --rtp --adware --unsafe --pattern --heur '.
- '-w -a --action=1 -b {}',
- [0], [1,10], qr/^object=.*, virus="(.*?)",/m ],
+# ['ESET NOD32 for Linux File servers',
+# ['/opt/eset/nod32/sbin/nod32','nod32'],
+# '--files -z --mail --sfx --rtp --adware --unsafe --pattern --heur '.
+# '-w -a --action=1 -b {}',
+# [0], [1,10], qr/^object=.*, virus="(.*?)",/m ],
# Experimental, based on posting from Rado Dibarbora (Dibo) on 2002-05-31
# ['ESET Software NOD32 Client/Server (NOD32SS)',
@@ -599,17 +599,17 @@ $banned_filename_re = new_RE(
# qr/^200 File OK/m, qr/^201 /m, qr/^201 (.+)/m ],
### http://www.norman.com/products_nvc.shtml
- ['Norman Virus Control v5 / Linux', 'nvcc',
- '-c -l:0 -s -u -temp:$TEMPBASE {}', [0,10,11], [1,2,14],
- qr/(?i).* virus in .* -> \'(.+)\'/m ],
+# ['Norman Virus Control v5 / Linux', 'nvcc',
+# '-c -l:0 -s -u -temp:$TEMPBASE {}', [0,10,11], [1,2,14],
+# qr/(?i).* virus in .* -> \'(.+)\'/m ],
### http://www.pandasoftware.com/
- ['Panda CommandLineSecure 9 for Linux',
- ['/opt/pavcl/usr/bin/pavcl','pavcl'],
- '-auto -aex -heu -cmp -nbr -nor -nos -eng -nob {}',
- qr/Number of files infected[ .]*: 0+(?!\d)/m,
- qr/Number of files infected[ .]*: 0*[1-9]/m,
- qr/Found virus :\s*(\S+)/m ],
+# ['Panda CommandLineSecure 9 for Linux',
+# ['/opt/pavcl/usr/bin/pavcl','pavcl'],
+# '-auto -aex -heu -cmp -nbr -nor -nos -eng -nob {}',
+# qr/Number of files infected[ .]*: 0+(?!\d)/m,
+# qr/Number of files infected[ .]*: 0*[1-9]/m,
+# qr/Found virus :\s*(\S+)/m ],
# NOTE: for efficiency, start the Panda in resident mode with 'pavcl -tsr'
# before starting amavisd - the bases are then loaded only once at startup.
# To reload bases in a signature update script:
@@ -631,15 +631,15 @@ $banned_filename_re = new_RE(
# # (btw, assigning stdin to /dev/null causes RAV to fail)
### http://www.nai.com/
- ['NAI McAfee AntiVirus (uvscan)', 'uvscan',
- '--secure -rv --mime --summary --noboot - {}', [0], [13],
- qr/(?x) Found (?:
- \ the\ (.+)\ (?:virus|trojan) |
- \ (?:virus|trojan)\ or\ variant\ ([^ ]+) |
- :\ (.+)\ NOT\ a\ virus)/m,
+# ['NAI McAfee AntiVirus (uvscan)', 'uvscan',
+# '--secure -rv --mime --summary --noboot - {}', [0], [13],
+# qr/(?x) Found (?:
+# \ the\ (.+)\ (?:virus|trojan) |
+# \ (?:virus|trojan)\ or\ variant\ ([^ ]+) |
+# :\ (.+)\ NOT\ a\ virus)/m,
# sub {$ENV{LD_PRELOAD}='/lib/libc.so.6'},
# sub {delete $ENV{LD_PRELOAD}},
- ],
+# ],
# NOTE1: with RH9: force the dynamic linker to look at /lib/libc.so.6 before
# anything else by setting environment variable LD_PRELOAD=/lib/libc.so.6
# and then clear it when finished to avoid confusing anything else.
@@ -647,9 +647,9 @@ $banned_filename_re = new_RE(
# qr/^\s{5,}(Found|is password-protected|.*(virus|trojan))/
### http://www.virusbuster.hu/en/
- ['VirusBuster', ['vbuster', 'vbengcl'],
- "{} -ss -i '*' -log=$MYHOME/vbuster.log", [0], [1],
- qr/: '(.*)' - Virus/m ],
+# ['VirusBuster', ['vbuster', 'vbengcl'],
+# "{} -ss -i '*' -log=$MYHOME/vbuster.log", [0], [1],
+# qr/: '(.*)' - Virus/m ],
# VirusBuster Ltd. does not support the daemon version for the workstation
# engine (vbuster-eng-1.12-linux-i386-libc6.tgz) any longer. The names of
# binaries, some parameters AND return codes have changed (from 3 to 1).
@@ -663,37 +663,37 @@ $banned_filename_re = new_RE(
# # although the man-page tells a different story
### http://www.cyber.com/
- ['CyberSoft VFind', 'vfind',
- '--vexit {}/*', [0], [23], qr/##==>>>> VIRUS ID: CVDL (.+)/m,
+# ['CyberSoft VFind', 'vfind',
+# '--vexit {}/*', [0], [23], qr/##==>>>> VIRUS ID: CVDL (.+)/m,
# sub {$ENV{VSTK_HOME}='/usr/lib/vstk'},
- ],
+# ],
### http://www.avast.com/
- ['avast! Antivirus', ['/usr/bin/avastcmd','avastcmd'],
- '-a -i -n -t=A {}', [0], [1], qr/\binfected by:\s+([^ \t\n\[\]]+)/m ],
+# ['avast! Antivirus', ['/usr/bin/avastcmd','avastcmd'],
+# '-a -i -n -t=A {}', [0], [1], qr/\binfected by:\s+([^ \t\n\[\]]+)/m ],
### http://www.ikarus-software.com/
- ['Ikarus AntiVirus for Linux', 'ikarus',
- '{}', [0], [40], qr/Signature (.+) found/m ],
+# ['Ikarus AntiVirus for Linux', 'ikarus',
+# '{}', [0], [40], qr/Signature (.+) found/m ],
### http://www.bitdefender.com/
- ['BitDefender', 'bdscan', # new version
- '--action=ignore --no-list {}', qr/^Infected files\s*:\s*0+(?!\d)/m,
- qr/^(?:Infected files|Identified viruses|Suspect files)\s*:\s*0*[1-9]/m,
- qr/(?:suspected|infected)\s*:\s*(.*)(?:\033|$)/m ],
+# ['BitDefender', 'bdscan', # new version
+# '--action=ignore --no-list {}', qr/^Infected files\s*:\s*0+(?!\d)/m,
+# qr/^(?:Infected files|Identified viruses|Suspect files)\s*:\s*0*[1-9]/m,
+# qr/(?:suspected|infected)\s*:\s*(.*)(?:\033|$)/m ],
### http://www.bitdefender.com/
- ['BitDefender', 'bdc', # old version
- '--arc --mail {}', qr/^Infected files *:0+(?!\d)/m,
- qr/^(?:Infected files|Identified viruses|Suspect files) *:0*[1-9]/m,
- qr/(?:suspected|infected): (.*)(?:\033|$)/m ],
+# ['BitDefender', 'bdc', # old version
+# '--arc --mail {}', qr/^Infected files *:0+(?!\d)/m,
+# qr/^(?:Infected files|Identified viruses|Suspect files) *:0*[1-9]/m,
+# qr/(?:suspected|infected): (.*)(?:\033|$)/m ],
# consider also: --all --nowarn --alev=15 --flev=15. The --all argument may
# not apply to your version of bdc, check documentation and see 'bdc --help'
### ArcaVir for Linux and Unix http://www.arcabit.pl/
- ['ArcaVir for Linux', ['arcacmd','arcacmd.static'],
- '-v 1 -summary 0 -s {}', [0], [1,2],
- qr/(?:VIR|WIR):[ \t]*(.+)/m ],
+# ['ArcaVir for Linux', ['arcacmd','arcacmd.static'],
+# '-v 1 -summary 0 -s {}', [0], [1,2],
+# qr/(?:VIR|WIR):[ \t]*(.+)/m ],
# ### a generic SMTP-client interface to a SMTP-based virus scanner
# ['av_smtp', \&ask_av_smtp,
@@ -715,6 +715,7 @@ $banned_filename_re = new_RE(
# # NOTE: place file JpegTester.pm somewhere where Perl can find it,
# # for example in /usr/local/lib/perl5/site_perl
+ ['always-clean', sub {0}],
);