--- ../MailScanner-install-4.40.10.old/docs/man/MailScanner.conf.5.html Fri Apr 1 16:10:19 2005 +++ docs/man/MailScanner.conf.5.html Fri Apr 1 16:10:40 2005 @@ -1,5 +1,5 @@ - + @@ -120,13 +120,15 @@ directories within the MailScanner installation and in the section "RULESETS" later in this manpage.

-

The options are best listed in a few categories. This is -also the order in which you will find them in the -MailScanner.conf file. If this list looks very large then -don’t worry, the supplied MailScanner.conf file (or -MailScanner.conf.sample) contains sensible defaults for all -the values. You will probably only need to change a very few -of them to start with.

+

The options are best listed in a few categories. If this +list looks very large then don’t worry, the supplied +MailScanner.conf file (or MailScanner.conf.sample) contains +sensible defaults for all the values. You will probably only +need to change a very few of them to start with.

+ +

Starting with version 4.40.10 of MailScanner you can use +shell environment variables such as $HOSTNAME or ${HOSTNAME} +in MailScanner.conf and its relatives.

You should define the following variables:

@@ -220,6 +222,54 @@ headers.

+ + + + + +
+

%org−long−name%

+ + + + + +
+

Default: Your Organisation Name Here

+ +

Enter the full name of your organisation below, this is +used in the signature placed at the bottom of report +messages sent by MailScanner. It can include pretty much any +text you like. You can make the result span several lines by +including "0 sequences in the text. These will be +replaced by line−breaks.

+
+ + + + + +
+

%web−site%

+ + + + + +
+

Default: www.your−organisation.com

+ +

Enter the location of your organisation’s web site +below. This is used in the signature placed at the bottom of +report messages sent by MailScanner. It should preferably be +the location of a page that you have written explaining why +you might have rejected the mail and what the recipient +and/or sender should do about it.

+

System Settings

@@ -1071,6 +1121,54 @@ +

Unrar Command

+ + + + + + +
+

Default: /usr/bin/unrar

+ +

Where the "unrar" command is installed. If you +haven’t got this command, look at www.rarlab.com. This +is used for unpacking rar archives so that the contents can +be checked for banned filenames and filetypes, and also that +the archive can be tested to see if it is +password−protected. Virus scanning the contents of rar +archives is still left to the virus scanner, with one +exception: If using the clavavmodule virus scanner, this +adds external RAR checking to that scanner which is needed +for archives which are RAR version 3.

+
+ + + + + +
+

Unrar Timeout

+ + + + + +
+

Default: 50

+ +

The maximum length of time the "unrar" command +is allowed to run for 1 RAR archive (in seconds)

+
+ + + + +

Block Encrypted Messages

@@ -1638,6 +1736,90 @@ scanner, not the "clamav" scanner setting.

+ + + + + +
+

ClamAVmodule Maximum Recursion Level

+ + + + + +
+

Default: 5

+ +

ClamAVModule only: The maximum recursion level of +archives. This setting *cannot* be the filename of a +ruleset, only a simple number.

+
+ + + + + +
+

ClamAVmodule Maximum Files

+ + + + + +
+

Default: 100

+ +

ClamAVModule only: The maximum number of files per batch. +This setting *cannot* be the filename of a ruleset, only a +simple number.

+
+ + + + + +
+

ClamAVmodule Maximum File Size

+ + + + + +
+

Default: 10000000

+ +

ClamAVModule only: The maximum file of each file (Default += 10MB). This setting *cannot* be the filename of a ruleset, +only a simple number.

+
+ + + + + +
+

ClamAVmodule Maximum Compression Ratio

+ + + + + +
+

Default: 250

+ +

ClamAVModule only: The maximum compression ration of +archives. This setting *cannot* be the filename of a +ruleset, only a simple number.

+

Removing/Logging dangerous or potentially offensive content

@@ -1761,6 +1943,33 @@ +

Phishing Safe Sites File

+ + + + + + +
+

Default: %etc−dir%/phishing.safe.sites.conf

+ +

There are some companies, such as banks, that insist on +sending out email messages with links in them that are +caught by the "Find Phishing Fraud" test described +above. This is the name of a file which contains a list of +link destinations which should be ignored in the test. This +may, for example, contain the known websites of some banks. +See the file itself for more information. This can only be +the name of the file containing the list, it *cannot* be the +filename of a ruleset.

+
+ + + + +

Allow IFrame Tags

@@ -5122,6 +5331,28 @@

Log all occurrences of "Silent Viruses" as defined above? This can only be a simple yes/no value, not a ruleset.

+ + + + + + + +
+

Log Dangerous HTML Tags

+ + + + +
+

Default: no
+Log all occurrences of HTML tags found in messages, that can +be blocked. This will help you build up your whitelist of +message sources for which particular HTML tags should be +allowed, such as mail from newsletters and daily cartoon +strips. This can also be the filename of a ruleset.