> On 2008-09-17 16:44, Dan_Mitton wrote:
> You could try something like:
> 
>   deny    set acl_m_ext = ${if match \
>                            {${lc:$mime_filename}} \
>                            {\N\.(exe|src|zip)$\N} \
>                          {.$1}{}}
>           condition   = ${if !eq{$acl_m_ext}{}{1}{0}}
>           message     = Bad attachment filename ($acl_m_ext)
>           log_message = Bad attachment filename ($acl_m_ext)
> 
> 
> 
> 

Actually I got it to work finally if and only if the file contains say,
.exe, or .pif.  Usually what happens is these files are inside a zip
file - so after unpacking we can see two or more unwanted file types.
How do I ensure that the message is unzipped and then inspected?

Regards

Sujit


-- 
The University of Westminster is a charity and a company limited by
guarantee.  Registration number: 977818 England.  Registered Office:
309 Regent Street, London W1B 2UW, UK.
-- 
## List details at http://lists.exim.org/mailman/listinfo/exim-users 
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to