~ubuntu-branches/ubuntu/maverick/postfix/maverick-security

« back to all changes in this revision

Viewing changes to proto/header_checks

  • Committer: Bazaar Package Importer
  • Author(s): LaMont Jones, Wietse Venema, LaMont Jones
  • Date: 2009-06-03 14:17:08 UTC
  • mfrom: (1.1.22 upstream)
  • Revision ID: james.westby@ubuntu.com-20090603141708-o9u59xlor7nmd2x1
[Wietse Venema]

* New upstream release: 2.6.2~rc1

[LaMont Jones]

* move postfix-add-{filter,policy} manpages to section 8, and deliver
* provide: default-mta on ubuntu

Show diffs side-by-side

added added

removed removed

Lines of Context:
341
341
# EXAMPLES
342
342
# .ad
343
343
# .fi
344
 
#       Header pattern to block attachments with bad file name extensions.
 
344
#       Header pattern to block attachments with bad file name
 
345
#       extensions.  For convenience, the PCRE /x flag is specified,
 
346
#       so that there is no need to collapse the pattern into a
 
347
#       single line of text.  The purpose of the [[:xdigit:]]
 
348
#       sub-expressions is to recognize Windows CLSID strings.
345
349
#
346
350
# .na
347
351
# .nf
348
352
#       /etc/postfix/main.cf:
349
 
#           header_checks = regexp:/etc/postfix/header_checks
350
 
#
351
 
#       /etc/postfix/header_checks:
352
 
#           /^content-(type|disposition):.*name[[:space:]]*=.*\\.(exe|vbs)/
353
 
#               REJECT Bad attachment file name extension: $2
354
 
#
 
353
#           header_checks = pcre:/etc/postfix/header_checks.pcre
 
354
#
 
355
#       /etc/postfix/header_checks.pcre:
 
356
#           /^Content-(Disposition|Type).*name\es*=\es*"?(.*(\e.|=2E)(
 
357
#             ade|adp|asp|bas|bat|chm|cmd|com|cpl|crt|dll|exe|
 
358
#             hlp|ht[at]|
 
359
#             inf|ins|isp|jse?|lnk|md[betw]|ms[cipt]|nws|
 
360
#             \e{[[:xdigit:]]{8}(?:-[[:xdigit:]]{4}){3}-[[:xdigit:]]{12}\e}|
 
361
#             ops|pcd|pif|prf|reg|sc[frt]|sh[bsm]|swf|
 
362
#             vb[esx]?|vxd|ws[cfh]))(\e?=)?"?\es*(;|$)/x
 
363
#               REJECT Attachment name "$2" may not end with ".$4"
355
364
# .ad
356
365
# .fi
 
366
#
357
367
#       Body pattern to stop a specific HTML browser vulnerability exploit.
358
368
#
359
369
# .na