~ubuntu-branches/ubuntu/maverick/postfix/maverick-security

« back to all changes in this revision

Viewing changes to conf/header_checks

  • Committer: Bazaar Package Importer
  • Author(s): LaMont Jones, Wietse Venema, LaMont Jones
  • Date: 2009-06-03 14:17:08 UTC
  • mfrom: (1.1.22 upstream)
  • Revision ID: james.westby@ubuntu.com-20090603141708-o9u59xlor7nmd2x1
[Wietse Venema]

* New upstream release: 2.6.2~rc1

[LaMont Jones]

* move postfix-add-{filter,policy} manpages to section 8, and deliver
* provide: default-mta on ubuntu

Show diffs side-by-side

added added

removed removed

Lines of Context:
358
358
359
359
# EXAMPLES
360
360
#        Header pattern to block attachments  with  bad  file  name
361
 
#        extensions.
 
361
#        extensions.   For  convenience, the PCRE /x flag is speci-
 
362
#        fied, so that there is no need  to  collapse  the  pattern
 
363
#        into   a   single  line  of  text.   The  purpose  of  the
 
364
#        [[:xdigit:]] sub-expressions is to recognize Windows CLSID
 
365
#        strings.
362
366
363
367
#        /etc/postfix/main.cf:
364
 
#            header_checks = regexp:/etc/postfix/header_checks
 
368
#            header_checks = pcre:/etc/postfix/header_checks.pcre
365
369
366
 
#        /etc/postfix/header_checks:
367
 
#            /^content-(type|disposition):.*name[[:space:]]*=.*\.(exe|vbs)/
368
 
#                REJECT Bad attachment file name extension: $2
 
370
#        /etc/postfix/header_checks.pcre:
 
371
#            /^Content-(Disposition|Type).*name\s*=\s*"?(.*(\.|=2E)(
 
372
#              ade|adp|asp|bas|bat|chm|cmd|com|cpl|crt|dll|exe|
 
373
#              hlp|ht[at]|
 
374
#              inf|ins|isp|jse?|lnk|md[betw]|ms[cipt]|nws|
 
375
#              \{[[:xdigit:]]{8}(?:-[[:xdigit:]]{4}){3}-[[:xdigit:]]{12}\}|
 
376
#              ops|pcd|pif|prf|reg|sc[frt]|sh[bsm]|swf|
 
377
#              vb[esx]?|vxd|ws[cfh]))(\?=)?"?\s*(;|$)/x
 
378
#                REJECT Attachment name "$2" may not end with ".$4"
369
379
370
380
#        Body pattern to stop a specific HTML browser vulnerability
371
381
#        exploit.