This section discusses imposing limits on the size or sensitivity of messages allowed through, and the related issue of setting message priority based on size, and general checking or filtering of message content.
184.108.40.206 Imposing Message Size Limits
The PMDF options BLOCK_LIMIT and LINE_LIMIT can be used to impose
global size limits on all PMDF channels. The channel keywords
linelimit can be used to
impose size limits on specific destination channels; the channel
sourceblocklimit can be used to impose size limits
on specific source channels.
The PMDF option
CONTENT_RETURN_BLOCK_LIMIT can be used to
NOTARY non-return of content flag for messages
over the specified size; if such a message is subsequently bounced by a
system that supports
NOTARY, then the original message
contents will not be included in the bounce message. The PMDF option
BOUNCE_BLOCK_LIMIT can be used to cause PMDF, when
generating a bounce message itself, to return only message headers for
messages over the specified size.
220.127.116.11 Message Priority and Size Limits
On OpenVMS, PMDF jobs pay attention to message priority, i.e.,
to the presence of a
Priority: header in the message. The
priority of message that PMDF immediate jobs (those jobs created when a
message is first submitted) will handle can be controlled with the
immurgent channel keywords. The priority of message that
PMDF periodic jobs (those jobs run periodically by PMDF to retry
delivery of previously undelivered messages) will handle can be
controlled with the
maxperiodicpriority keywords. Or the
nonurgentqueue keywords can be used to cause messages of
different priorities to be processed in different queues.
Some sites can want to control the time of day, for instance, at which
low priority messages are sent. And note that the
urgentblocklimit keywords can be used to forcibly
downgrade the priority of "large" messages.
18.104.22.168 Imposing Message Sensitivity Limits
The channel keywords
sensitivitycompanyconfidential can be used to impose an
upper limit on the sensitivity of messages that can be enqueued to a
channel. For instance, a site wanting not to emit messages of
Company-confidential sensitivity might choose to set
sensitivityprivate on their channel that sends out to the
Internet, generally a
tcp_local channel. See
Section 22.214.171.124 for more details.
126.96.36.199 Filtering Based on Message Headers
PMDF's channel level mailbox filter facility can be used to check the
headers of incoming messages and make decisions to reject messages
based on, for instance, the
Subject: header. See
Section 16.2 for details.
188.8.131.52 Checking or Filtering Message Content
The best protection against problematic message content coming into
your site is educated users who are committed to implementing your site
security policies. The best protection against problematic message
content leaving your site is educated users who are committed to
conforming to your site security policies. If the users want to evade
your policies, they can generally work around any imposed restrictions,
for instance, by encrypting their messages.
If you do want to check the actual content of message parts, the PMDF
conversion channel can be useful. You can use a
CONVERSION mapping table to direct that certain message
traffic, that is messages coming in certain channels and going out
certain channels, pass through the PMDF
channel. The PMDF
conversion channel can then run whatever
content checking or filtering procedure or utility you want.
For instance, some sites like to have binary message attachments
checked by virus sniffing software. A
table along the lines of
CONVERSION IN-CHAN=*;OUT-CHAN=tcp_internal;CONVERT Yes
out-chan=tcp_internal; in-type=application; in-subtype=*; parameter-copy-0=*; command="yourviruscheckcommand 'INPUT_FILE' 'OUTPUT_FILE'" out-chan=tcp_internal; in-type=audio; in-subtype=*; parameter-copy-0=*; command="yourviruscheckcommand 'INPUT_FILE' 'OUTPUT_FILE'" out-chan=tcp_internal; in-type=image; in-subtype=*; parameter-copy-0=*; command="yourviruscheckcommand 'INPUT_FILE' 'OUTPUT_FILE'" out-chan=tcp_internal; in-type=video; in-subtype=*; parameter-copy-0=*; command="yourviruscheckcommand 'INPUT_FILE' 'OUTPUT_FILE'"
yourviruscheckcommandis a site-supplied command to do virus checking, will run any MIME message parts of type
VIDEO MIMEthrough your procedure.
Note that when you are using the conversion channel to check message
parts on the PMDF firewall system, you are likely to want the
defragment channel keyword on outgoing channels,
particularly channels that send to internal systems. The MIME format
allows for messages to be split into multiple pieces, which are
normally not reassembled until arrival at the final destination system.
However, if you want the intermediate PMDF firewall system to check the
message content, you will want to reassemble the message parts on the
PMDF firewall system, so that the message content (rather than message
content fragments) can be checked. See Section 184.108.40.206 for details.
220.127.116.11 Verifying Message Integrity
conversion channel or service conversions can be used
to perform site supplied message authentication (integrity) check
procedures. See Chapter 6 for an overview of service conversions
conversion channel. See also Chapter 25,
discussing using BSMTP channels to "tunnel" messages between
cooperating PMDF systems.