~ubuntu-branches/ubuntu/maverick/postfix/maverick-security

« back to all changes in this revision

Viewing changes to html/header_checks.5.html

  • Committer: Bazaar Package Importer
  • Author(s): LaMont Jones, Wietse Venema, LaMont Jones
  • Date: 2009-06-03 14:17:08 UTC
  • mfrom: (1.1.22 upstream)
  • Revision ID: james.westby@ubuntu.com-20090603141708-o9u59xlor7nmd2x1
[Wietse Venema]

* New upstream release: 2.6.2~rc1

[LaMont Jones]

* move postfix-add-{filter,policy} manpages to section 8, and deliver
* provide: default-mta on ubuntu

Show diffs side-by-side

added added

removed removed

Lines of Context:
364
364
 
365
365
<b>EXAMPLES</b>
366
366
       Header pattern to block attachments  with  bad  file  name
367
 
       extensions.
 
367
       extensions.   For  convenience, the PCRE /x flag is speci-
 
368
       fied, so that there is no need  to  collapse  the  pattern
 
369
       into   a   single  line  of  text.   The  purpose  of  the
 
370
       [[:xdigit:]] sub-expressions is to recognize Windows CLSID
 
371
       strings.
368
372
 
369
373
       /etc/postfix/<a href="postconf.5.html">main.cf</a>:
370
 
           <a href="postconf.5.html#header_checks">header_checks</a> = <a href="regexp_table.5.html">regexp</a>:/etc/postfix/header_checks
 
374
           <a href="postconf.5.html#header_checks">header_checks</a> = <a href="pcre_table.5.html">pcre</a>:/etc/postfix/header_checks.pcre
371
375
 
372
 
       /etc/postfix/header_checks:
373
 
           /^content-(type|disposition):.*name[[:space:]]*=.*\.(exe|vbs)/
374
 
               REJECT Bad attachment file name extension: $2
 
376
       /etc/postfix/header_checks.<a href="pcre_table.5.html">pcre</a>:
 
377
           /^Content-(Disposition|Type).*name\s*=\s*"?(.*(\.|=2E)(
 
378
             ade|adp|asp|bas|bat|chm|cmd|com|cpl|crt|dll|exe|
 
379
             hlp|ht[at]|
 
380
             inf|ins|isp|jse?|lnk|md[betw]|ms[cipt]|nws|
 
381
             \{[[:xdigit:]]{8}(?:-[[:xdigit:]]{4}){3}-[[:xdigit:]]{12}\}|
 
382
             ops|pcd|pif|prf|reg|sc[frt]|sh[bsm]|swf|
 
383
             vb[esx]?|vxd|ws[cfh]))(\?=)?"?\s*(;|$)/x
 
384
               REJECT Attachment name "$2" may not end with ".$4"
375
385
 
376
386
       Body pattern to stop a specific HTML browser vulnerability
377
387
       exploit.