> in the $banned_filename_re parameter rather than allow zip files. I've tried 
> searching and have not been able to work out the
> different options for the "=>0" bit of the parameter.

Unless you use D_BOUNCE for final banned destiny, only trueness and 
defined-falseness of the parameter is relevant.

> Does it just mean these files will not be blocked but the rest of the message 
> will be
> checked and these files will still be checked for viruses or does it have 
> wider reaching consequences?

These files will still be checked for viruses.

> Does this approach have any disadvantages? 

That depends on your perspective.

A banned rule does not only refer to a specific file but indirectly all files 
that are beneath its path. The following is a log
line that shows an executable file, which by itself would be blacklisted but is 
effectively permitted because it is inside a
zip-archive using a whitelisted .docx file suffix.

> lookup_re(["multipart/mixed","application/octet-stream",".zip","stuff.docx",".exe",".exe-ms","x.com"])
>  matches key "(?^:\\.docx$)", result="0"

This is because an outer loop loops over banned rules and in each iteration an 
inner loop loops over the above list. So if .docx
is whitelisted before .exe is blacklisted, the .exe is still whitelisted in the 
above scenario.

Reply via email to