On 2013.11.04 11:42:51 -0800, inteq wrote:
> Nov  4 21:36:52 ns4 postfix/smtp[9383]: 338E14303B: to=<t...@example.com>,
> relay=127.0.0.1[127.0.0.1]:10025, delay=0.14, delays=0.06/0/0.05/0.03,
> dsn=2.0.0, status=sent (250 Virus Detected; Discarded Email)
> Nov  4 21:36:52 ns4 clamsmtpd: 100013: from=r...@ns4.example.com,
> to=t...@example.com, status=VIRUS:Sanesecurity.Jurlbl.3425.UNOFFICIAL
> Nov  4 21:36:52 ns4 postfix/qmgr[4676]: 338E14303B: removed

[...]

> Any hints how to whitelist emails sent from r...@ns4.example.com, or bypass
> somehow the virus checks for some addresses?

I'm not quite sure what is your scenario. I guess the mail stats are
generated on a third party machine and delivered to a hub (ns4). Then it's
sufficient to open a maintenance port or use submission.

The other idea is to use an access table (witch has higher precedence) and
override 'content_filter' with a null filter.

What the others said. That shouldn't happen. It's a problem with clamav.

-- 
Best regards,
Manuel

Reply via email to