On 2013.11.04 11:42:51 -0800, inteq wrote: > Nov 4 21:36:52 ns4 postfix/smtp[9383]: 338E14303B: to=<t...@example.com>, > relay=127.0.0.1[127.0.0.1]:10025, delay=0.14, delays=0.06/0/0.05/0.03, > dsn=2.0.0, status=sent (250 Virus Detected; Discarded Email) > Nov 4 21:36:52 ns4 clamsmtpd: 100013: from=r...@ns4.example.com, > to=t...@example.com, status=VIRUS:Sanesecurity.Jurlbl.3425.UNOFFICIAL > Nov 4 21:36:52 ns4 postfix/qmgr[4676]: 338E14303B: removed
[...] > Any hints how to whitelist emails sent from r...@ns4.example.com, or bypass > somehow the virus checks for some addresses? I'm not quite sure what is your scenario. I guess the mail stats are generated on a third party machine and delivered to a hub (ns4). Then it's sufficient to open a maintenance port or use submission. The other idea is to use an access table (witch has higher precedence) and override 'content_filter' with a null filter. What the others said. That shouldn't happen. It's a problem with clamav. -- Best regards, Manuel