On 26/07/2020 11:20, Damian wrote:

in the $banned_filename_re parameter rather than allow zip files. I've tried 
searching and have not been able to work out the
different options for the "=>0" bit of the parameter.

Unless you use D_BOUNCE for final banned destiny, only trueness and 
defined-falseness of the parameter is relevant.

Does it just mean these files will not be blocked but the rest of the message 
will be
checked and these files will still be checked for viruses or does it have wider 
reaching consequences?

These files will still be checked for viruses.

Does this approach have any disadvantages?

That depends on your perspective.

A banned rule does not only refer to a specific file but indirectly all files 
that are beneath its path. The following is a log
line that shows an executable file, which by itself would be blacklisted but is 
effectively permitted because it is inside a
zip-archive using a whitelisted .docx file suffix.

lookup_re(["multipart/mixed","application/octet-stream",".zip","stuff.docx",".exe",".exe-ms","x.com"])
 matches key "(?^:\\.docx$)", result="0"

This is because an outer loop loops over banned rules and in each iteration an 
inner loop loops over the above list. So if .docx
is whitelisted before .exe is blacklisted, the .exe is still whitelisted in the 
above scenario.

Thanks for the response.
What, then, is your recommended solution which generally blocks .zip files but allows the xlsx, docx and pptx file suffixes?

Reply via email to