-== Exim Konfiguration: ==
-=== Main ===
+
+## Exim Konfiguration:
+
+
+### Main
zuerst:
-{{{
+[[!format txt """
sudo aptitude install clamav spamassassin spamc greylistd
adduser clamav Debian-exim
adduser Debian-exim clamav
-}}}
-
+"""]]
/etc/clamav/clamd.conf
-{{{
+[[!format txt """
#Automatically Generated by clamav-base postinst
#To reconfigure clamd run #dpkg-reconfigure clamav-base
#Please read /usr/share/doc/clamav-base/README.Debian.gz for details
DetectBrokenExecutables
ScanHTML
ArchiveBlockMax
-}}}
-
-
+"""]]
/etc/exim4/conf.d/main/02_exim4-config_options
-{{{
+[[!format txt """
### main/02_exim4-config_options
#################################
spamd_address = 127.0.0.1 783
...
-}}}
-
+"""]]
/etc/exim4/conf.d/acl/30_exim4-config_check_rcpt
-{{{
+[[!format txt """
# This access control list is used for every RCPT command in an incoming
# SMTP message. The tests are run in order until the address is either
# accepted or denied.
# !verify = sender
# Warn if the sender host does not have valid reverse DNS.
- #
+ #
# This is disabled by default so that DNSless systems don't break. If
# your system can do DNS lookups without delay or cost, you might want
# to enable the following lines.
# this instead of !verify = reverse_host_lookup to catch deferrals
# as well as outright failures.
warn message = X-Host-Lookup-Failed: Reverse DNS lookup failed for $sender_host_address (${if eq{$host_lookup_failed}{1}{failed}{deferred}})
- condition = ${if and{{def:sender_host_address}{!def:sender_host_name}}\
+ condition = ${if and{{def:sender_host_address}{!def:sender_host_name}}\
{yes}{no}}
#############################################################################
deny message = relay not permitted
-}}}
-
+"""]]
/etc/exim4/conf.d/acl/40_exim4-config_check_data
-{{{
+[[!format txt """
# 40_exim4-config_check_data
acl_check_data:
# This statement has been added by "greylistd-setup-exim4",
# and can be removed by running "greylistd-setup-exim4 remove".
# Any changes you make here will then be lost.
- #
+ #
# Perform greylisting on incoming messages with no envelope sender here.
# We did not subject these to greylisting after RCPT TO:, because that
# would interfere with remote hosts doing sender callout verifications.
# If you want your system to insist on syntactically valid address
# headers, you might want to enable the following lines.
# deny message = Message headers fail syntax check
- # !acl = acl_whitelist_local_deny
+ # !acl = acl_whitelist_local_deny
# !verify = header_syntax
# require that there is a verifiable sender address in at least
# one of the "Sender:", "Reply-To:", or "From:" header lines.
# deny message = No verifiable sender address in message headers
- # !acl = acl_whitelist_local_deny
- # !verify = header_sender
+ # !acl = acl_whitelist_local_deny
+ # !verify = header_sender
deny message = Serious MIME defect detected ($demime_reason)
deny message = This message contains malware ($malware_name)
malware = *
-
+
# Always put X-Spam-Score header in the message.
# It looks like this:
# accept otherwise
accept
-}}}
-----
-CategoryCodeSnippets CategoryTipsAndTricks
\ No newline at end of file
+"""]]
+
+
+---
+
+ [[CategoryCodeSnippets|CategoryCodeSnippets]] [[CategoryTipsAndTricks|CategoryTipsAndTricks]]