Re: [exim] bypassing clamav/malware/demime checks for a spec…

Top Page
Delete this message
Reply to this message
Author: Peter Bowyer
Date:  
To: exim users
Subject: Re: [exim] bypassing clamav/malware/demime checks for a specific domain
On 12/08/05, Jaye Mathisen <mrcpu@???> wrote:
>
>
> OK, I'm using exim 4.51 under FreeBSD (a cpanel install). Figured out a few additions,
> seem to be working OK.
>
> For various reasons, one customer wants to bypass the virus checking completely. Which
> is fine with me, their choice their problem.
>
> I have av_scanner set to clamd:/var/clamd socket, works fine.
>
> My current check_message ACL is:
>
> check_message:
> require verify = header_sender
>
>
>  deny message = This message contains a virus or other harmful content ($malware_name)
>       malware = *
>       demime = *

>
> accept
>
>
>
>
> I want to add the ability to bypass it for certain domains, so can I just do:
>
>
>
> check_message:
>
> require verify = header_sender
>
> accept domains = abc.com : xyz.com
>
>  deny message = This message contains a virus or other harmful content ($malware_name)
>       malware = *
>       demime = *

>
> accept
>
>
>
> So this will accept anything for abc.com and xyz.com w/o runnign through the av_scanner,
> everythign else is run through the av_scanner and either denied or accepted...
>
>
> Since it's only come up like 1 time in a year so far, I don't envision having to maintain
> a file of names, although I could.
>
> Thanks for your help.


What was the question?

Peter


--
Peter Bowyer
Email: peter@???
Tel: +44 1296 768003
VoIP: sip:peter@???