diff --git a/install/tpl/rspamd_antivirus.conf.master b/install/tpl/rspamd_antivirus.conf.master index aa3d2cc9f252970ad246a6cafdefea639438f36e..8cbf404bad2d079d289e463169c630b39d01c771 100644 --- a/install/tpl/rspamd_antivirus.conf.master +++ b/install/tpl/rspamd_antivirus.conf.master @@ -1,27 +1,36 @@ clamav { # If set force this action if any virus is found (default unset: no action is forced) #action = "reject"; + # Scan mime_parts separately - otherwise the complete mail will be transferred to AV Scanner scan_mime_parts = true; + # Scanning Text is suitable for some av scanner databases (e.g. Sanesecurity) scan_text_mime = true; scan_image_mime = true; + # If `max_size` is set, messages > n bytes in size are not scanned #max_size = 20000000; + # symbol to add (add it to metric if you want non-zero weight) symbol = "CLAM_VIRUS"; + # type of scanner: "clamav", "fprot", "sophos" or "savapi" type = "clamav"; + # For "savapi" you must also specify the following variable #product_id = 12345; + # You can enable logging for clean messages #log_clean = true; + # servers to query (if port is unspecified, scanner-specific default is used) # can be specified multiple times to pool servers # can be set to a path to a unix socket # Enable this in local.d/antivirus.conf #servers = "127.0.0.1:3310"; servers = "/var/run/clamav/clamd.ctl"; + # if `patterns` is specified virus name will be matched against provided regexes and the related # symbol will be yielded if a match is found. If no match is found, default symbol is yielded. patterns { @@ -32,6 +41,7 @@ clamav { # symbol_name = "pattern"; CLAM_PROTOCOL_ERROR = '^unhandled response'; } + # `whitelist` points to a map of IP addresses. Mail from these addresses is not scanned. whitelist = "/etc/rspamd/antivirus.wl"; }