FraggDieb
Member
Posts: 252
Joined: Feb 2008
Reputation: 0
|
RE: Maia install rennt nicht
ich kopier dir einfach ma deine config
Quote:###################################################################
# Maia Mailguard Script Configuration File #
# #
# This file (/etc/maia.conf) contains configuration information #
# used by Maia Mailguard's Perl maintenance scripts. #
###################################################################
# Configure your Maia database DSN here
$dsn = "DBI:mysql:maia:localhost:3306";
# Your Maia database user's login name
$username = "amavis";
# Your Maia database user's password
$password = "xxxxx";
# The directory where Maia's Perl scripts can be found.
$script_dir = "/var/lib/amavis/maia/scripts";
### load-sa-rules.pl
# The load-sa-rules script tries to find certain important rules
# directories on its own, and usually it does a pretty good job,
# but if it fails to find your rules directories, you can tell it
# explicitly where to look by overriding the search here. Setting
# these to "undef" tells load-sa-rules to find the directories
# on its own (recommended).
# The directory where SpamAssassin's local.cf file can be found.
#$local_cf_dir = "/etc/mail/spamassassin";
$local_cf_dir = undef; # default: let the script find it
# The directory where SpamAssassin's core rules can be found.
# If you wish to specify the directory yourself, you can use the
# %%VERSION%% macro to replace the actual SpamAssassin version number.
#$system_rules_dir = "/usr/share/spamassassin";
#$system_rules_dir = "/var/lib/spamassassin/%%VERSION%%"; # sa-update
$system_rules_dir = undef; # default: let the script find it
# The directory where your amavis user's user_prefs file can be found.
#$user_rules_dir = "/var/amavisd/.spamassassin";
#$user_rules_dur = "~/.spamassassin";
$user_rules_dir = undef; # default: let the script find it
### process-quarantine.pl
[b]# Location to write the lock/PID file (must be writeable by your
# amavis user) <<<--- Ist
pid_file = "/var/run/amavis/.process-quarantine.pid";[b]
# Maximum number of spam/non-spam items to process at a time (1-127).
$default_limit = 20;
# Location of your encryption key file, or undef to disable
#$key_file = "/var/amavisd/blowfish.key";
$key_file = undef;
# Items larger than this size (in bytes) will not be learned/reported.
$default_max_size = 256*1024;
# Train the Bayes database?
# 0 = no
# 1 = yes (same as --learn)
$learning_options = 1;
# Reporting options (add values together as desired):
# 0 = none (don't report spam)
# 1 = report to Razor
# 2 = report to Pyzor
# 4 = report to DCC
# 8 = report to SpamCop
#$report_options = 0;
$report_options = 1 + 2 + 4 + 8;
### expire-quarantine-cache.pl
# Mail types to expire (add values together as desired):
# 0 = none (don't expire anything)
# 1 = expire Suspected Non-Spam
# 2 = expire Suspected Spam
# 4 = expire Viruses/Malware
# 8 = expire items with Invalid Mail Headers
# 16 = expire items with Banned File Attachments
# 32 = expire Confirmed Non-Spam
# 64 = expire Confirmed Spam
$mail_types = 1 + 2 + 4 + 8 + 16;
### send-quarantine-digests.pl
# Base URL to Maia's PHP scripts
$base_url = "http://xxxxx/tools/antispam";
# Template directory
$template_dir = "/var/lib/amavis/maia/templates";
# How you want the sorted (choose one per cache type)
# (note: non spam/ham caches don't have score to sort by)
# options are:
# %sort = "score DIRECTION"
# = "received_date DIRECTION"
# = "recipient_id DIRECTION"
# Where DIRECTION is ASC or DESC
%sort = (
'ham' => "score DESC", # puts the high scores at the top
'spam' => "score ASC", # puts the low scroes at the top
'virus' => "received_date DESC",
'banned_file' => "received_date DESC",
'bad_header' => "received_date DESC",
);
# Heading titles for each section of the digest report
$titles = { 'spam' => "Spam Quarantine",
'virus' => "Virus Quarantine",
'banned_file' => "Banned File Attachments",
'bad_header' => "Invalid Email Headers",
'ham' => "Delivered Email"
};
# The order of the sections of the digest report
# Valid elements are 'spam', 'ham', 'virus', banned_file', and 'bad_header'
# Omit any of these elements to leave them out of the report
@report_order = ('spam','ham','virus','banned_file','bad_header');
|
|
05-30-2008 04:58 AM |
|