aboutsummaryrefslogtreecommitdiff
path: root/security/amavisd-new/files/patch-amavisd.conf
diff options
context:
space:
mode:
Diffstat (limited to 'security/amavisd-new/files/patch-amavisd.conf')
-rw-r--r--security/amavisd-new/files/patch-amavisd.conf17
1 files changed, 16 insertions, 1 deletions
diff --git a/security/amavisd-new/files/patch-amavisd.conf b/security/amavisd-new/files/patch-amavisd.conf
index d904f5d2c4c2..bf2ceca41384 100644
--- a/security/amavisd-new/files/patch-amavisd.conf
+++ b/security/amavisd-new/files/patch-amavisd.conf
@@ -1,5 +1,5 @@
--- amavisd.conf.orig Thu Jul 1 22:04:36 2004
-+++ amavisd.conf Sun Jul 4 11:32:17 2004
++++ amavisd.conf Wed Aug 11 16:23:13 2004
@@ -9,7 +9,7 @@
# MUST BE SET (no useful default):
@@ -29,3 +29,18 @@
# $daemon_chroot_dir = $MYHOME; # (default is undef, meaning: do not chroot)
$inet_socket_port = 10024; # accept SMTP on this local TCP port(s) (Postfix)
+@@ -50,10 +50,10 @@
+ $mailfrom_notify_admin = "virusalert\@$mydomain";
+ $mailfrom_notify_recip = "virusalert\@$mydomain";
+ $mailfrom_notify_spamadmin = "spam.police\@$mydomain";
+-@addr_extension_virus_maps = ('virus');
+-@addr_extension_spam_maps = ('spam');
+-@addr_extension_banned_maps = ('banned');
+-@addr_extension_bad_header_maps = ('badh');
++#@addr_extension_virus_maps = ('virus');
++#@addr_extension_spam_maps = ('spam');
++#@addr_extension_banned_maps = ('banned');
++#@addr_extension_bad_header_maps = ('badh');
+
+ $path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
+ $file = 'file'; # file(1) utility; use 3.41 or later to avoid vulnerability