Hi list

environnment:
debian lenny 5.0
amavisd-new            2.6.3-3
postfix                2.5.5-1.1 
clamav-base            0.95.2
spamassassin           3.2.5-2 
mysql                   5.0.51a-24+lenny1
mailzu                  0.83

Well amavis+mailzu+postfix are working ( not 100% but working 8)
Spam/bad_headers and virus are already into mysql and do not go to final
user unless postmaster releases.

I would like to maintain a copy of clean email in mysql to.

I've been reading from:
http://www.engardelinux.org/modules/index/list_archives.cgi?list=amavis&page=0074.html&month=2007-10
http://groups.google.com/group/mailing.unix.amavis-user/msg/d5ff7d657a1209ff?pli=1
amavisd-new/amavisd-new-docs.html#checks 

----cut-----
It is also possible to enable
quarantining of clean messages for archiving or troubleshooting
purposes."
________________

but as I'm not native ,I'm not sure what I have to do to have a copy of
all clean messages at amavis+mysql.

Any clues???

part of my amavis:

use strict;
$log_level = 1;
$sql_allow_8bit_address = 1;
$mydomain = 'xxx.com.br';
$myhostname = 'xxx.xxx.com.br';
$mailfrom_notify_admin     = "postmast...@$mydomain";
$mailfrom_notify_recip     = "postmast...@$mydomain";
$mailfrom_notify_spamadmin = "postmast...@$mydomain";
$hdrfrom_notify_sender = "amavisd-new <postmast...@$mydomain>";
$notify_method = 'smtp:[127.0.0.1]:10035'; # where to submit
notifications
$max_servers = 2;
$final_virus_destiny      = D_DISCARD;
$final_banned_destiny     = D_BOUNCE;
$final_spam_destiny       = D_DISCARD;
$final_bad_header_destiny = D_PASS;
$enable_dkim_verification = 0;  # enable DKIM signatures verification
$enable_dkim_signing = 0;    # load DKIM signing code, keys defined by
dkim_key
$bad_header_quarantine_to = undef;
$sa_spam_subject_tag = 'Spam> ';
$sa_tag_level_deflt = undef;
$sa_tag2_level_deflt = 6.31;@virus_admin_maps = ({
    '.xxx.com.br' => 'postmas...@xxx.com.br',
    '.example.net' => 'postmas...@example.net',
    '.' => 'postmas...@xxx.com.br',
    });
@banned_admin_maps = ({
    '.xxx.com.br' => 'postmas...@xxx.com.br',
    '.example.net' => 'postmas...@example.net',
    '.' => 'postmas...@xxx.com.br',
    });
$warnbannedrecip = 1;
$defang_banned = 1;
$defang_virus  = 1;
$penpals_bonus_score = 5;
$penpals_threshold_low = 1;
$penpals_threshold_high = 18;
@mynetworks = qw( 127.0.0.0/8 [::1] [FE80::]/10 [FEC0::]/10
                   172.16.0.0/24 192.168.1.0/24 );
$inet_socket_port = [10024, 10026, 9998];
$inet_socket_bind = undef;
$interface_policy{'9998'} = 'MAILZU';
$policy_bank{'MAILZU'} = {
    protocol => 'AM.PDP',
    inet_acl => [qw( 127.0.0.1 [::1] 192.168.1.1  xxx.207.xxx.76)],
};

$sa_kill_level_deflt = 5;


$banned_files_quarantine_method = 'sql:';
$spam_quarantine_method         = 'sql:';
%banned_rules = (
 'BLOCK_EXE' =>  new_RE(
    # block double extensions in names:
      qr'\.[^./]*\.(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)\.?$'i,
    # allow any name or type (except viruses) within an archive:
      [ qr'^\.(Z|gz|bz2|rpm|cpio|tar|zip|rar|arc|arj|zoo)$' => 0],
    # blocks MS executable file(1) types, unless allowed above:
      qr'^\.(exe|exe-ms)$',
    ),
 'DEFAULT' => $banned_filename_re,
);
$policy_bank{'MYNETS'} = {  # mail originating from @mynetworks
  originating => 1,
  os_fingerprint_method => undef,
  spam_admin_maps  => ["postmast...@$mydomain"], # alert of internal
spam
  final_spam_destiny => D_BOUNCE, # so the sender knows they are a
spammer
  spam_kill_level_maps => [9.0],
  spam_dsn_cutoff_level_maps => [9999],
  spam_dsn_cutoff_level_bysender_maps => [9999],
  banned_filename_maps => ['BLOCK_EXE'],
};$interface_policy{'10026'} = 'TRUSTED';
$policy_bank{'TRUSTED'} = {  # mail originating from trusted senders
  originating => 1,
  os_fingerprint_method => undef,
  spam_admin_maps  => ["postmast...@$mydomain"], # alert of internal
spam
  final_spam_destiny => D_BOUNCE, # so the sender knows they are a
spammer
  spam_kill_level_maps => [9.0],
  spam_dsn_cutoff_level_maps => [9999],
  spam_dsn_cutoff_level_bysender_maps => [9999],
  banned_filename_maps => ['BLOCK_EXE'],
};
@lookup_sql_dsn = ( ['DBI:mysql:amavis:localhost', 'amavis',
'amavis'] );
@storage_sql_dsn = @lookup_sql_dsn;
$quarantine_subdir_levels = undef;
$timestamp_fmt_mysql = 1;
1;  # ensure a defined return


rest of it is debian default files



------------------------------------------------------------------------------
_______________________________________________
AMaViS-user mailing list
AMaViS-user@lists.sourceforge.net 
https://lists.sourceforge.net/lists/listinfo/amavis-user 
 AMaViS-FAQ:http://www.amavis.org/amavis-faq.php3 
 AMaViS-HowTos:http://www.amavis.org/howto/ 

Reply via email to