View | Details | Raw Unified | Return to bug 68946
Collapse All | Expand All

(-)/server-root/ports/mail/mailscanner-devel/Makefile (-2 / +2 lines)
Lines 2-12 Link Here
2
# Date created:				17 March 2003
2
# Date created:				17 March 2003
3
# Whom:					Jan-Peter Koopmann <j.koopmann@seceidos.de>
3
# Whom:					Jan-Peter Koopmann <j.koopmann@seceidos.de>
4
#
4
#
5
# $FreeBSD: ports/mail/mailscanner-devel/Makefile,v 1.17 2004/05/27 07:44:50 pav Exp $
5
# $FreeBSD: ports/mail/mailscanner-devel/Makefile,v 1.15 2004/03/31 15:57:12 glewis Exp $
6
#
6
#
7
7
8
PORTNAME=	MailScanner
8
PORTNAME=	MailScanner
9
PORTVERSION=	4.31.3
9
PORTVERSION=	4.32.2
10
CATEGORIES=	mail
10
CATEGORIES=	mail
11
MASTER_SITES=	http://www.sng.ecs.soton.ac.uk/mailscanner/files/4/tar/
11
MASTER_SITES=	http://www.sng.ecs.soton.ac.uk/mailscanner/files/4/tar/
12
PKGNAMESUFFIX=	-devel
12
PKGNAMESUFFIX=	-devel
(-)/server-root/ports/mail/mailscanner-devel/distinfo (-2 / +2 lines)
Lines 1-2 Link Here
1
MD5 (MailScanner-install-4.31.3-1.tar.gz) = b85e31c6bbc906f6d282274f3f04b010
1
MD5 (MailScanner-install-4.32.2-1.tar.gz) = 88d8889c6f4cf42fbdccefe0306ce2c4
2
SIZE (MailScanner-install-4.31.3-1.tar.gz) = 5789871
2
SIZE (MailScanner-install-4.32.2-1.tar.gz) = 5327186
(-)/server-root/ports/mail/mailscanner-devel/files/README.FreeBSD.port (-1 / +1 lines)
Lines 27-33 Link Here
27
process. This of course means that you will have to disable MTA startup 
27
process. This of course means that you will have to disable MTA startup 
28
in rc.conf completely. Put this in your rc.conf:
28
in rc.conf completely. Put this in your rc.conf:
29
29
30
sendmail_enable="NO"
30
sendmail_enable="NONE"
31
31
32
Then adjust sendmail.sh or exim.sh to your configuration. Have a look at the
32
Then adjust sendmail.sh or exim.sh to your configuration. Have a look at the
33
MailScanner manpage for MTA setup hints.
33
MailScanner manpage for MTA setup hints.
(-)/server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.8 (-4 / +4 lines)
Lines 1-8 Link Here
1
--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.8	Wed May 26 14:32:21 2004
1
--- ../MailScanner-install-4.32.2.orig/docs/man/MailScanner.8	Mon May 31 13:43:07 2004
2
+++ docs/man/MailScanner.8	Wed May 26 14:34:02 2004
2
+++ docs/man/MailScanner.8	Mon Jul 12 14:21:55 2004
3
@@ -1,4 +1,4 @@
3
@@ -1,4 +1,4 @@
4
-.TH "MailScanner" "8" "4.29.5" "Julian Field" "Mail"
4
-.TH "MailScanner" "8" "4.31.4" "Julian Field" "Mail"
5
+.TH "MailScanner" "8" "4.31.4" "Julian Field" "Mail"
5
+.TH "MailScanner" "8" "4.32.2" "Julian Field" "Mail"
6
 .SH "NAME"
6
 .SH "NAME"
7
 .LP 
7
 .LP 
8
 MailScanner \- Virus/Spam Scanner for Sendmail, Exim and Postfix
8
 MailScanner \- Virus/Spam Scanner for Sendmail, Exim and Postfix
(-)/server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.8.html (-4 / +4 lines)
Lines 1-9 Link Here
1
--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.8.html	Wed May 26 14:32:21 2004
1
--- ../MailScanner-install-4.32.2.orig/docs/man/MailScanner.8.html	Mon May 31 13:43:07 2004
2
+++ docs/man/MailScanner.8.html	Wed May 26 14:34:05 2004
2
+++ docs/man/MailScanner.8.html	Mon Jul 12 14:22:05 2004
3
@@ -1,5 +1,5 @@
3
@@ -1,5 +1,5 @@
4
 <!-- Creator     : groff version 1.19 -->
4
 <!-- Creator     : groff version 1.19 -->
5
-<!-- CreationDate: Tue Mar 23 14:41:26 2004 -->
5
-<!-- CreationDate: Wed May 26 14:39:52 2004 -->
6
+<!-- CreationDate: Wed May 26 14:33:45 2004 -->
6
+<!-- CreationDate: Mon Jul 12 14:19:46 2004 -->
7
 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
7
 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
8
 "http://www.w3.org/TR/html4/loose.dtd">
8
 "http://www.w3.org/TR/html4/loose.dtd">
9
 <html>
9
 <html>
(-)/server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.conf.5 (-397 / +9 lines)
Lines 1-411 Link Here
1
--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.conf.5	Wed May 26 14:39:41 2004
1
--- ../MailScanner-install-4.32.2.orig/docs/man/MailScanner.conf.5	Mon May 31 13:43:07 2004
2
+++ docs/man/MailScanner.conf.5	Wed May 26 14:40:02 2004
2
+++ docs/man/MailScanner.conf.5	Mon Jul 12 14:21:58 2004
3
@@ -1,4 +1,4 @@
3
@@ -1,4 +1,4 @@
4
-.TH "MailScanner.conf" "5" "4.30.1" "Julian Field" "Mail"
4
-.TH "MailScanner.conf" "5" "4.31.4" "Julian Field" "Mail"
5
+.TH "MailScanner.conf" "5" "4.31.4" "Julian Field" "Mail"
5
+.TH "MailScanner.conf" "5" "4.32.2" "Julian Field" "Mail"
6
 .SH "NAME"
6
 .SH "NAME"
7
 .LP 
7
 .LP 
8
 MailScanner.conf \- Main configuration for MailScanner
8
 MailScanner.conf \- Main configuration for MailScanner
9
@@ -117,16 +117,20 @@
9
@@ -1784,6 +1784,14 @@
10
 Directory in which MailScanner should find e\-mail messages for scanning. This can be any of the following:
11
 .br 
12
 
13
+.RS 7
14
+.IP  1. 4
15
+a directory name. 
16
+.br 
17
+Example: /var/spool/mqueue.in
18
+.IP  2. 4
19
+a wildcard giving directory names. 
20
+.br 
21
+Example: /var/spool/mqueue.in/*
22
+.IP  3. 4
23
+the name of a file containing a list of directory names, which can in turn contain wildcards. 
24
 .br 
25
-1. a directory name. Example: /var/spool/mqueue.in
26
-.br 
27
-
28
-.br 
29
-2. a wildcard giving directory names. Example: /var/spool/mqueue.in/*
30
-.br 
31
-
32
-.br 
33
-3. the name of a file containing a list of directory names, which can in turn contain wildcards. Example: /usr/local/etc/MailScanner/mqueue.in.list.conf
34
+Example: /usr/local/etc/MailScanner/mqueue.in.list.conf
35
+.RE
36
 
37
 .TP 
38
 \fBOutgoing Queue Dir\fR
39
@@ -481,7 +485,7 @@
40
 .br 
41
 
42
 .br 
43
-Which Virus Scanning package to use. Possible choices are sophos, sophossavi, mcafee, command, kaspersky, kaspersky\-4.5, kavdaemonclient, inoculate, inoculan, onoculan, nod32, nod32\-1.99, f\-secure, f\-prot, panda, rav, antivir, clamav, clamavmodule, css, trend, bitdefender, none (no virus scanning at all)
44
+Which Virus Scanning package to use. Possible choices are sophos, sophossavi, mcafee, command, bitdefender, kaspersky, kaspersky\-4.5, kavdaemonclient, inoculate, inoculan, nod32, nod32\-1.99, f\-secure, f\-prot, panda, rav, antivir, clamav, clamavmodule, css, trend, norman, avg, vexira, none (no virus scanning at all)
45
 .br 
46
 
47
 .br 
48
@@ -515,17 +519,18 @@
49
 .br 
50
 Messages whose virus reports contain any of the words listed here will be treated as "silent" viruses. No messages will be sent back to the senders of these viruses, and the delivery to the recipient of the message can be controlled by the next option "Still Deliver Silent Viruses". This is primarily designed for viruses such as "Klez" and "Bugbear" which put fake addresses on messages they send, so there is no point informing the sender of the message, as it won't actually be them who sent it anyway. Other words that can be put in this list are the 5 special keywords
51
 .br 
52
+.RS 7
53
+.IP  \(bu 4
54
 HTML\-IFrame: inserting this will stop senders being warned about HTML Iframe tags, when they are not allowed.
55
-.br 
56
+.IP  \(bu 4
57
 HTML\-Codebase: inserting this will stop senders being warned about HTML Object Codebase tags, when they are not allowed.
58
-.br 
59
+.IP  \(bu 4
60
 Zip\-Password: inserting this will stop senders being warned about password\-protected zip files when they are not allowd. This keyword is not needed if you include All\-Viruses.
61
-.br 
62
+.IP  \(bu 4
63
 All\-Viruses: inserting this will stop senders being warned about any virus, while still allowing you to warn senders about HTML\-based attacks. This includes Zip\-Password so you don't need to include both.
64
 .br 
65
-
66
-.br 
67
 The default of "All\-Viruses" means that no senders of viruses will be notified (as the sender address is always forged these days anyway), but anyone who sends a message that is blocked for other reasons will still be notified.
68
+.RE
69
 
70
 
71
 .TP 
72
@@ -580,17 +585,16 @@
73
 .br 
74
 
75
 .br 
76
-Do you want to allow HTML <IFrame> tags in email messages? This is not a good idea as it allows various Microsoft Outlook security vulnerabilities to go unprotected, but if you have a load of mailing lists sending them, then you will want to allow them to keep your users happy. Possible Values:
77
-.br 
78
-
79
+Do you want to allow HTML <IFrame> tags in email messages? This is not a good idea as it allows various Microsoft Outlook security vulnerabilities to go unprotected, but if you have a load of mailing lists sending them, then you will want to allow them to keep your users happy. This can also be the filename of a ruleset, so you can allow them from known mailing lists but ban them from everywhere else. Possible Values:
80
 .br 
81
+.RS 7
82
+.IP  \(bu 4
83
 yes    => Allow these tags to be in the message
84
+.IP  \(bu 4
85
 no     => Ban messages containing these tags
86
+.IP  \(bu 4
87
 disarm => Allow these tags, but stop these tags from working
88
-.br 
89
-
90
-.br 
91
-This can also be the filename of a ruleset, so you can allow them from known mailing lists but ban them from everywhere else.
92
+.RE
93
 
10
 
94
 .TP 
95
 \fBLog IFrame Tags\fR
96
@@ -606,13 +610,50 @@
97
 .br 
11
 .br 
98
 
12
 Do you want to debug SpamAssassin from within MailScanner?
99
 .br 
100
-Do you want to allow <Form> tags in email messages? This is a bad idea as these are used as scams to pursuade people to part with credit card information and other personal data. This can also be the filename of a ruleset. Possible values:
101
+Do you want to allow <Form> tags in email messages? This is a bad idea as these are used as scams to persuade people to part with credit card information and other personal data. This can also be the filename of a ruleset. Possible values:
102
+.br 
103
+.RS 7
104
+.IP  \(bu 4
105
+yes    => Allow these tags to be in the message
106
+.IP  \(bu 4
107
+no     => Ban messages containing these tags
108
+.IP  \(bu 4
109
+disarm => Allow these tags, but stop these tags from working
110
+.RE
111
+
13
+
112
+.TP 
14
+.TP 
113
+\fBAllow Script Tags\fR
15
+\fBRun In Foreground\fR
114
+Default: no
16
+Default: no
115
+.br 
17
+.br 
116
+
18
+
117
+.br 
19
+.br 
118
+Do you want to allow <Script> tags in email messages? This is a bad idea as these are used to exploit vulnerabilities in email applications and web browsers. This can also be the filename of a ruleset. Possible values:
20
+Set Run In Foreground to "yes" if you want MailScanner to operate normally in foreground (and not as a background daemon). Use this if you are controlling the execution of MailScanner with a tool like DJB's 'supervise' (see http://cr.yp.to/daemontools.html).
119
+.br 
120
+.RS 7
121
+.IP  \(bu 4
122
+yes    => Allow these tags to be in the message
123
+.IP  \(bu 4
124
+no     => Ban messages containing these tags
125
+.IP  \(bu 4
126
+disarm => Allow these tags, but stop these tags from working
127
+.RE
128
+
129
+.TP 
130
+\fBAllow WebBugs\fR
131
+Default: disarm
132
 .br 
133
 
134
 .br 
135
+Do you want to allow <Img> tags with very small images in email messages? This is a bad idea as these are used as 'web bugs' to find out if a message has been read. It is not dangerous, it is just used to make you give away information. This can also be the filename of a ruleset. Possible values:
136
+.br 
137
+.RS 7
138
+.IP  \(bu 4
139
 yes    => Allow these tags to be in the message
140
+.IP  \(bu 4
141
 no     => Ban messages containing these tags
142
+.IP  \(bu 4
143
 disarm => Allow these tags, but stop these tags from working
144
+.RE
145
 
146
 .TP 
147
 \fBAllow Object Codebase Tags\fR
148
@@ -622,11 +663,14 @@
149
 .br 
150
 Do you want to allow <Object Codebase=...> tags in email messages? This is a bad idea as it leaves you unprotected against various Microsoft\-specific security vulnerabilities. But if your users demand it, you can do it. This can also be the filename of a ruleset. Possible values:
151
 .br 
152
-
153
-.br 
154
+.RS 7
155
+.IP  \(bu 4
156
 yes    => Allow these tags to be in the message
157
+.IP  \(bu 4
158
 no     => Ban messages containing these tags
159
+.IP  \(bu 4
160
 disarm => Allow these tags, but stop these tags from working
161
+.RE
162
 
163
 .TP 
164
 \fBConvert Dangerous HTML To Text\fR
165
@@ -701,6 +745,14 @@
166
 Set this to store infected / dangerous attachments in directories created under the quarantine directory. Without this, they will be deleted. Due to laws on privacy and data protection in your country, you may be forced to set this to "no". 
167
 
168
 .TP 
169
+\fBQuarantine Silent Viruses\fR
170
+Default: yes
171
+.br 
172
+
173
+.br 
174
+There is no point quarantining most viruses these days, so if you set this to "no" then no infections listed in your "Silent Viruses" setting will be quarantined, even if you have chosen to quarantine infections in general. This is currently set to "yes" so the behaviour is the same as it was in in previous versions. This can also be the filename of a ruleset.
175
+
176
+.TP 
177
 \fBQuarantine Whole Message\fR
178
 Default: no
179
 .br 
180
@@ -1348,6 +1400,14 @@
181
 If a "Spam List" lookup times out for this many consecutive checks without ever succeeding, then the particular "Spam List" entry will not be used any more, as it appears to be unreachable. When MailScanner restarts itself after a few hours, MailScanner will try to use the entry again, in case service has resumed properly. 
182
 
183
 .TP 
184
+\fBSpam List Timeouts History\fR
185
+Default: 10
186
+.br 
187
+
188
+.br 
189
+The total number of Spam List attempts during which "Max Spam List Timeouts" will cause the spam list fo be marked as "unavailable". See the previous comment for more information. The default values of 5 and 10 mean that 5 timeouts in any sequence of 10 attempts will cause the list to be marked as "unavailable" until the next periodic restart (see "Restart Every").
190
+
191
+.TP 
192
 \fBIs Definitely Not Spam\fR
193
 Default: %rules\-dir%/spam.whitelist.rules
194
 .br 
195
@@ -1371,6 +1431,14 @@
196
 .br 
197
 Setting this to yes means that spam found in the blacklist is treated as "High Scoring Spam" in the "Spam Actions" section below. Setting it to no means that it will be treated as "normal" spam. This can also be the filename of a ruleset.
198
 
199
+
200
+.TP 
201
+\fBIgnore Spam Whitelist If Recipients Exceed\fR
202
+Default: 20
203
+.br 
204
+
205
+.br 
206
+Spammers have learnt that they can get their message through by sending a message with lots of recipients, one of which chooses to whitelist everything coming to them, including the spammer. So if a message arrives with more than this number of recipients, ignore the "Is Definitely Not Spam" whitelist.
207
 .SH "SpamAssassin"
208
 .TP 
209
 \fBUse SpamAssassin\fR
210
@@ -1420,11 +1488,7 @@
211
 
212
 .TP 
213
 \fBSpamAssassin Prefs File\fR
214
-Default: /opt/MailScanner/etc/spam.assassin.prefs.conf
215
-.br 
216
-Default Linux: /etc/MailScanner/spam.assassin.prefs.conf
217
-.br 
218
-Default FreeBSD: /usr/local/etc/MailScanner/spam.assassin.prefs.conf
219
+Default: %etc\-dir%/spam.assassin.prefs.conf
220
 .br 
221
 
222
 .br 
223
@@ -1447,6 +1511,14 @@
224
 If several consecutive calls to SpamAssassin time out, then MailScanner decides that there is something stopping SpamAssassin from working properly. It will therefore be disabled for the next few hours until MailScanner restarts itself, at which point it will be tried again. 
225
 
226
 .TP 
227
+\fBSpamAssassin Timeouts History\fR
228
+Default: 30
229
+.br 
230
+
231
+.br 
232
+The total number of SpamAssassin attempts during which "Max SpamAssassin Timeouts" will cause SpamAssassin to be marked as "unavailable". See the previous comment for more information. The default values of 10 and 20 mean that 10 timeouts in any sequence of 20 attempts will trigger the behaviour described above, until the next periodic restart (see "Restart Every").
233
+
234
+.TP 
235
 \fBCheck SpamAssassin If On Spam List\fR
236
 Default: yes
237
 .br 
238
@@ -1462,7 +1534,6 @@
239
 .br 
240
 If this option is set, then the "Spam Header" will be included in the header of every message, so its presence cannot be used to filter out spam by your users' e\-mail applications. 
241
 
242
-
243
 .TP 
244
 \fBSpam Score\fR
245
 Default: yes
246
@@ -1480,7 +1551,6 @@
247
 .br 
248
 If you are using the Bayesian statistics engine on a busy server, you may well need to force a Bayesian database rebuild and expiry at regular intervals. This is measures in seconds. 24 hours = 86400 seconds. To disable this feature set this to 0.
249
 
250
-
251
 .TP 
252
 \fBWait During Bayes Rebuild\fR
253
 Default: no
254
@@ -1502,35 +1572,25 @@
255
 .br 
256
 This can be any combination of 1 or more of the following keywords, and these actions are applied to any message which is spam. 
257
 .br 
258
-
259
-.br 
260
+.RS 7
261
+.IP  \(bu 4
262
 "deliver" \- the message is delivered to the recipient as normal 
263
-.br 
264
-
265
-.br 
266
+.IP  \(bu 4
267
 "delete" \- the message is deleted 
268
-.br 
269
-
270
-.br 
271
+.IP  \(bu 4
272
 "store" \- the message is stored in the quarantine 
273
-.br 
274
 
275
-.br 
276
+.IP  \(bu 4
277
 "forward" \- an email address is supplied, to which the message is forwarded 
278
-.br 
279
-
280
-.br 
281
+.IP  \(bu 4
282
 "notify" \- Send the recipients a short notification that spam addressed to them was not delivered. They can then take action to request retrieval of the orginal message if they think it was not spam.
283
-.br 
284
-
285
-.br 
286
+.IP  \(bu 4
287
 "striphtml" \- convert all in\-line HTML content in the message to be stripped to plain text, which removes all images and scripts and so can be used to protect your users from offensive spam. Note that using this action on its own does not imply that the message will be delivered, you will need to specify "deliver" or "forward" to actually deliver the message. 
288
-
289
-.br 
290
+.IP  \(bu 4
291
 "attachment" \- Convert the original message into an attachment of the message. This means the user has to take an extra step to open the spam, and stops "web bugs" very effectively.
292
-
293
-.br 
294
+.IP  \(bu 4
295
 "bounce" \- bounce the spam message. This option should not be used and must be enabled with the "Enable Spam Bounce" option first.
296
+.RE
297
 
298
 .TP 
299
 \fBHigh Scoring Spam Actions\fR
300
@@ -1654,10 +1714,12 @@
301
 
302
 .br 
303
 The per\-user files (bayes, auto\-whitelist, user_prefs) are looked for here and in ~/.spamassassin/. Note the files are mutable. If this is unset then no extra places are searched for. If using Postfix, you probably want to set this to /var/spool/MailScanner/spamassassin and do
304
-.br  
305
-	mkdir /var/spool/MailScanner/spamassassin
306
+
307
+.RS 10
308
+mkdir /var/spool/MailScanner/spamassassin
309
 .br 
310
-	chown postfix.postfix /var/spool/MailScanner/spamassassin
311
+chown postfix.postfix /var/spool/MailScanner/spamassassin
312
+.RE
313
 
314
 .TP 
315
 \fBSpamAssassin Install Prefix\fR
316
@@ -1673,7 +1735,21 @@
317
 .br 
318
 
319
 .br 
320
-The site\-local rules are searched for here, and in prefix /etc/spamassassin, prefix/etc/mail/spamassassin, /usr/local/etc/spamassassin, /etc/spamassassin, /etc/mail/spamassassin, and maybe others. If this is set then it adds to the list of places that are searched; otherwise it has no effect.
321
+This tells MailScanner where to look for the site\-local rules. If this is set it adds to the list of places that are searched. MailScanner will always look at the following places (even if this option is not set):
322
+.RS 7
323
+.IP  \(bu 4
324
+prefix/etc/spamassassin
325
+.IP  \(bu 4
326
+prefix/etc/mail/spamassassin
327
+.IP  \(bu 4
328
+/usr/local/etc/spamassassin
329
+.IP  \(bu 4
330
+/etc/spamassassin
331
+.IP  \(bu 4
332
+/etc/mail/spamassassin
333
+.IP  \(bu 4
334
+maybe others as well
335
+.RE
336
 
337
 .TP 
338
 \fBSpamAssassin Default Rules Dir\fR
339
@@ -1681,7 +1757,17 @@
340
 .br 
341
 
342
 .br 
343
-The default rules are searched for here, and in prefix/share/spamassassin, /usr/local/share/spamassassin, /usr/share/spamassassin, and maybe others. If this is set then it adds to the list of places that are searched; otherwise it has no effect.
344
+This tells MailScanner where to look for the default rules. If this is set it adds to the list of places that are searched. MailScanner will always look at the following places (even if this option is not set):
345
+.RS 7
346
+.IP  \(bu 4
347
+prefix/share/spamassassin
348
+.IP  \(bu 4
349
+/usr/local/share/spamassassin
350
+.IP  \(bu 4
351
+/usr/share/spamassassin
352
+.IP  \(bu 4
353
+maybe others as well
354
+.RE
355
 .SH "Advanced Settings"
356
 .TP 
357
 \fBDebug\fR
358
@@ -1768,8 +1854,20 @@
359
 .br 
360
 
361
 .br 
362
-Some of the virus scanners are not supported by the authors of MailScanner, and they may use code contributed by another user. If this option is set to the wrong value for your virus scanners, then you will get an error message in your maillog (syslog) telling you tha# Are you using Exim with split spool directories? If you don't understand # this, the answer is probably "no". Refer to the Exim documentation for # more information about split spool directories.
363
-Split Exim Spool = yes
364
+Minimum acceptable code stability status \-\- if we come across code that's not at least as stable as this, we barf. This is currently only used to check that you don't end up using untested virus scanner support code without realising it. Don't even *think* about setting this to anything other than "beta" or "supported" on a system that receives real mail until you have tested it yourself and are happy that it is all working as you expect it to. Don't set it to anything other than "supported" on a system that could ever receive important mail. Levels used are:
365
+
366
+.RS 7
367
+.IP  \(bu 4
368
+none \- there may not even be any code.
369
+.IP  \(bu 4
370
+unsupported \- code may be completely untested, a contributed dirty hack, anything, really.
371
+.IP  \(bu 4
372
+alpha \- code is pretty well untested. Don't assume it will work.
373
+.IP  \(bu 4
374
+beta \- code is tested a bit. It should work.
375
+.IP  \(bu 4
376
+supported \- code *should* be reliable.
377
+.RE
378
 
21
 
379
 .TP 
22
 .TP 
380
 \fBSplit Exim Spool\fR
23
 \fBLDAP Server\fR
381
@@ -1785,20 +1883,17 @@
382
 .br 
383
 
384
 .br 
385
-When trying to work out the value of configuration parameters which are using a ruleset, this controls the behaviour when a rule is checking the  "To:" addresses.  If this option is set to "yes", then the following happens when checking the ruleset:
386
-.br 
387
-
388
-.br 
389
-a) 1 recipient. Same behaviour as normal.
390
+When trying to work out the value of configuration parameters which are using a ruleset, this controls the behaviour when a rule is checking the  "To:" addresses.  If this option is set to "no", then some rules will use the result they get from the first matching rule for any of the recipients of a message, so the exact value cannot be predicted for messages with more than 1 recipient. This value *cannot* be the filename of a ruleset. 
391
 .br 
392
-b) Several recipients, but all in the same domain (domain.com for example). The rules are checked for one that matches the string "*@domain.com".
393
-.br 
394
-c) Several recipients, not all in the same domain. The rules are checked for one that matches the string "*@*".
395
-.br 
396
-
397
-.br 
398
-If this option is set to "no", then some rules will use the result they get from the first matching rule for any of the recipients of a message, so the exact value cannot be predicted for messages with more than 1 recipient. This value *cannot* be the filename of a ruleset.
399
-
400
+If this option is set to "yes", then the following happens when checking the ruleset:
401
+.RS 7
402
+.IP  a) 4
403
+1 recipient. Same behaviour as normal.
404
+.IP  b) 4
405
+Several recipients, but all in the same domain (domain.com for example). The rules are checked for one that matches the string "*@domain.com".
406
+.IP  c) 4
407
+Several recipients, not all in the same domain. The rules are checked for one that matches the string "*@*".
408
+.RE
409
 .SH "RULESETS"
410
 .LP 
411
 Ruleset files should all be put in /opt/MailScanner/etc/rules (FreeBSD: /usr/local/etc/MailScanner/rules) and their filename should end in ".rules" wherever possible.
(-)/server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.conf.5.html (-1240 / +14 lines)
Lines 1-609 Link Here
1
--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.conf.5.html	Wed May 26 14:39:42 2004
1
--- ../MailScanner-install-4.32.2.orig/docs/man/MailScanner.conf.5.html	Mon May 31 13:43:08 2004
2
+++ docs/man/MailScanner.conf.5.html	Wed May 26 14:40:05 2004
2
+++ docs/man/MailScanner.conf.5.html	Mon Jul 12 14:22:01 2004
3
@@ -1,5 +1,5 @@
3
@@ -1,5 +1,5 @@
4
 <!-- Creator     : groff version 1.19 -->
4
 <!-- Creator     : groff version 1.19 -->
5
-<!-- CreationDate: Fri Apr  2 12:23:58 2004 -->
5
-<!-- CreationDate: Wed May 26 14:39:52 2004 -->
6
+<!-- CreationDate: Wed May 26 14:39:52 2004 -->
6
+<!-- CreationDate: Mon Jul 12 14:19:46 2004 -->
7
 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
7
 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
8
 "http://www.w3.org/TR/html4/loose.dtd">
8
 "http://www.w3.org/TR/html4/loose.dtd">
9
 <html>
9
 <html>
10
@@ -331,21 +331,89 @@
10
@@ -5274,6 +5274,30 @@
11
 <!-- INDENTATION -->
11
 <!-- INDENTATION -->
12
 <p>Directory in which MailScanner should find e&minus;mail
12
 <p>Do you want to debug SpamAssassin from within
13
 messages for scanning. This can be any of the following:</p>
13
 MailScanner?</p>
14
+</td>
15
+</table>
16
+<!-- TABS -->
17
+<table width="100%" border=0 rules="none" frame="void"
18
+       cols="5" cellspacing="0" cellpadding="0">
19
+<tr valign="top" align="left">
20
+<td width="22%"></td>
21
+<td width="3%">
22
+
23
+<p>1.</p>
24
+</td>
25
+<td width="3%"></td>
26
+<td width="26%">
27
+
28
+<p>a directory name.</p>
29
+</td>
30
+<td width="46%">
31
+</td>
32
+</table>
33
 <!-- INDENTATION -->
34
-<p>1. a directory name. Example: /var/spool/mqueue.in</p>
35
-<!-- INDENTATION -->
36
-<p>2. a wildcard giving directory names. Example:
37
-/var/spool/mqueue.in/*</p>
38
+<table width="100%" border=0 rules="none" frame="void"
39
+       cols="2" cellspacing="0" cellpadding="0">
40
+<tr valign="top" align="left">
41
+<td width="28%"></td>
42
+<td width="72%">
43
+<p>Example: /var/spool/mqueue.in</p>
44
+</td>
45
+</table>
46
+<!-- TABS -->
47
+<table width="100%" border=0 rules="none" frame="void"
48
+       cols="5" cellspacing="0" cellpadding="0">
49
+<tr valign="top" align="left">
50
+<td width="22%"></td>
51
+<td width="3%">
52
+
53
+<p>2.</p>
54
+</td>
55
+<td width="3%"></td>
56
+<td width="52%">
57
+
58
+<p>a wildcard giving directory names.</p>
59
+</td>
60
+<td width="20%">
61
+</td>
62
+</table>
63
 <!-- INDENTATION -->
64
-<p>3. the name of a file containing a list of directory
65
-names, which can in turn contain wildcards. Example:
66
-/usr/local/etc/MailScanner/mqueue.in.list.conf</p>
67
+<table width="100%" border=0 rules="none" frame="void"
68
+       cols="2" cellspacing="0" cellpadding="0">
69
+<tr valign="top" align="left">
70
+<td width="28%"></td>
71
+<td width="72%">
72
+<p>Example: /var/spool/mqueue.in/*</p>
73
+</td>
74
+</table>
75
+<!-- TABS -->
76
+<table width="100%" border=0 rules="none" frame="void"
77
+       cols="4" cellspacing="0" cellpadding="0">
78
+<tr valign="top" align="left">
79
+<td width="22%"></td>
80
+<td width="3%">
81
+
82
+<p>3.</p>
83
+</td>
84
+<td width="3%"></td>
85
+<td width="72%">
86
+
87
+<p>the name of a file containing a list of directory names,
88
+which can in turn contain wildcards.</p>
89
 </td>
90
 </table>
91
 <!-- INDENTATION -->
92
 <table width="100%" border=0 rules="none" frame="void"
93
        cols="2" cellspacing="0" cellpadding="0">
94
 <tr valign="top" align="left">
95
+<td width="28%"></td>
96
+<td width="72%">
97
+<p>Example:
98
+/usr/local/etc/MailScanner/mqueue.in.list.conf</p></td>
99
+</table>
100
+<!-- INDENTATION -->
101
+<table width="100%" border=0 rules="none" frame="void"
102
+       cols="2" cellspacing="0" cellpadding="0">
103
+<tr valign="top" align="left">
104
 <td width="11%"></td>
105
 <td width="89%">
106
 <p><b>Outgoing Queue Dir</b></p></td>
107
@@ -1317,11 +1385,11 @@
108
 <p>Default: none</p>
109
 <!-- INDENTATION -->
110
 <p>Which Virus Scanning package to use. Possible choices are
111
-sophos, sophossavi, mcafee, command, kaspersky,
112
+sophos, sophossavi, mcafee, command, bitdefender, kaspersky,
113
 kaspersky&minus;4.5, kavdaemonclient, inoculate, inoculan,
114
-onoculan, nod32, nod32&minus;1.99, f&minus;secure,
115
-f&minus;prot, panda, rav, antivir, clamav, clamavmodule,
116
-css, trend, bitdefender, none (no virus scanning at all)</p>
117
+nod32, nod32&minus;1.99, f&minus;secure, f&minus;prot,
118
+panda, rav, antivir, clamav, clamavmodule, css, trend,
119
+norman, avg, vexira, none (no virus scanning at all)</p>
120
 <!-- INDENTATION -->
121
 <p>Note for McAfee users: Do NOT use any symlinks with
122
 McAfee at all. It is very strange but McAfee may not detect
123
@@ -1403,29 +1471,79 @@
124
 fake addresses on messages they send, so there is no point
125
 informing the sender of the message, as it won&rsquo;t
126
 actually be them who sent it anyway. Other words that can be
127
-put in this list are the 5 special keywords<br>
128
-HTML&minus;IFrame: inserting this will stop senders being
129
-warned about HTML Iframe tags, when they are not
130
-allowed.<br>
131
-HTML&minus;Codebase: inserting this will stop senders being
132
-warned about HTML Object Codebase tags, when they are not
133
-allowed.<br>
134
-Zip&minus;Password: inserting this will stop senders being
135
-warned about password&minus;protected zip files when they
136
-are not allowd. This keyword is not needed if you include
137
-All&minus;Viruses.<br>
138
-All&minus;Viruses: inserting this will stop senders being
139
-warned about any virus, while still allowing you to warn
140
-senders about HTML&minus;based attacks. This includes
141
+put in this list are the 5 special keywords</p>
142
+</td>
143
+</table>
144
+<!-- TABS -->
145
+<table width="100%" border=0 rules="none" frame="void"
146
+       cols="4" cellspacing="0" cellpadding="0">
147
+<tr valign="top" align="left">
148
+<td width="22%"></td>
149
+<td width="1%">
150
+
151
+<p>&bull;</p>
152
+</td>
153
+<td width="5%"></td>
154
+<td width="72%">
155
+
156
+<p>HTML&minus;IFrame: inserting this will stop senders
157
+being warned about HTML Iframe tags, when they are not
158
+allowed.</p>
159
+</td>
160
+<tr valign="top" align="left">
161
+<td width="22%"></td>
162
+<td width="1%">
163
+
164
+<p>&bull;</p>
165
+</td>
166
+<td width="5%"></td>
167
+<td width="72%">
168
+
169
+<p>HTML&minus;Codebase: inserting this will stop senders
170
+being warned about HTML Object Codebase tags, when they are
171
+not allowed.</p>
172
+</td>
173
+<tr valign="top" align="left">
174
+<td width="22%"></td>
175
+<td width="1%">
176
+
177
+<p>&bull;</p>
178
+</td>
179
+<td width="5%"></td>
180
+<td width="72%">
181
+
182
+<p>Zip&minus;Password: inserting this will stop senders
183
+being warned about password&minus;protected zip files when
184
+they are not allowd. This keyword is not needed if you
185
+include All&minus;Viruses.</p>
186
+</td>
187
+<tr valign="top" align="left">
188
+<td width="22%"></td>
189
+<td width="1%">
190
+
191
+<p>&bull;</p>
192
+</td>
193
+<td width="5%"></td>
194
+<td width="72%">
195
+
196
+<p>All&minus;Viruses: inserting this will stop senders
197
+being warned about any virus, while still allowing you to
198
+warn senders about HTML&minus;based attacks. This includes
199
 Zip&minus;Password so you don&rsquo;t need to include
200
 both.</p>
201
+</td>
202
+</table>
203
 <!-- INDENTATION -->
204
+<table width="100%" border=0 rules="none" frame="void"
205
+       cols="2" cellspacing="0" cellpadding="0">
206
+<tr valign="top" align="left">
207
+<td width="28%"></td>
208
+<td width="72%">
209
 <p>The default of &quot;All&minus;Viruses&quot; means that
210
 no senders of viruses will be notified (as the sender
211
 address is always forged these days anyway), but anyone who
212
 sends a message that is blocked for other reasons will still
213
-be notified.</p>
214
-</td>
215
+be notified.</p></td>
216
 </table>
217
 <!-- INDENTATION -->
218
 <table width="100%" border=0 rules="none" frame="void"
219
@@ -1590,15 +1708,47 @@
220
 Microsoft Outlook security vulnerabilities to go
221
 unprotected, but if you have a load of mailing lists sending
222
 them, then you will want to allow them to keep your users
223
-happy. Possible Values:</p>
224
-<!-- INDENTATION -->
225
-<p>yes =&gt; Allow these tags to be in the message no =&gt;
226
-Ban messages containing these tags disarm =&gt; Allow these
227
-tags, but stop these tags from working</p>
228
-<!-- INDENTATION -->
229
-<p>This can also be the filename of a ruleset, so you can
230
-allow them from known mailing lists but ban them from
231
-everywhere else.</p>
232
+happy. This can also be the filename of a ruleset, so you
233
+can allow them from known mailing lists but ban them from
234
+everywhere else. Possible Values:</p>
235
+</td>
236
+</table>
237
+<!-- TABS -->
238
+<table width="100%" border=0 rules="none" frame="void"
239
+       cols="4" cellspacing="0" cellpadding="0">
240
+<tr valign="top" align="left">
241
+<td width="22%"></td>
242
+<td width="1%">
243
+
244
+<p>&bull;</p>
245
+</td>
246
+<td width="5%"></td>
247
+<td width="72%">
248
+
249
+<p>yes =&gt; Allow these tags to be in the message</p>
250
+</td>
251
+<tr valign="top" align="left">
252
+<td width="22%"></td>
253
+<td width="1%">
254
+
255
+<p>&bull;</p>
256
+</td>
257
+<td width="5%"></td>
258
+<td width="72%">
259
+
260
+<p>no =&gt; Ban messages containing these tags</p>
261
+</td>
262
+<tr valign="top" align="left">
263
+<td width="22%"></td>
264
+<td width="1%">
265
+
266
+<p>&bull;</p>
267
+</td>
268
+<td width="5%"></td>
269
+<td width="72%">
270
+
271
+<p>disarm =&gt; Allow these tags, but stop these tags from
272
+working</p>
273
 </td>
274
 </table>
275
 <!-- INDENTATION -->
276
@@ -1615,8 +1765,14 @@
277
 <tr valign="top" align="left">
278
 <td width="22%"></td>
279
 <td width="78%">
280
-<p>Default: no</p>
281
+<p>Default: no</p></td>
282
+</table>
283
 <!-- INDENTATION -->
284
+<table width="100%" border=0 rules="none" frame="void"
285
+       cols="2" cellspacing="0" cellpadding="0">
286
+<tr valign="top" align="left">
287
+<td width="28%"></td>
288
+<td width="72%">
289
 <p>You may receive complaints from your users that HTML
290
 mailing lists they subscribe to have been stopped by the
291
 &quot;Allow IFrame Tags&quot; option above. So before you
292
@@ -1645,14 +1801,181 @@
293
 <p>Default: disarm</p>
294
 <!-- INDENTATION -->
295
 <p>Do you want to allow &lt;Form&gt; tags in email messages?
296
-This is a bad idea as these are used as scams to pursuade
297
+This is a bad idea as these are used as scams to persuade
298
 people to part with credit card information and other
299
 personal data. This can also be the filename of a ruleset.
300
 Possible values:</p>
301
+</td>
302
+</table>
303
+<!-- TABS -->
304
+<table width="100%" border=0 rules="none" frame="void"
305
+       cols="4" cellspacing="0" cellpadding="0">
306
+<tr valign="top" align="left">
307
+<td width="22%"></td>
308
+<td width="1%">
309
+
310
+<p>&bull;</p>
311
+</td>
312
+<td width="5%"></td>
313
+<td width="72%">
314
+
315
+<p>yes =&gt; Allow these tags to be in the message</p>
316
+</td>
317
+<tr valign="top" align="left">
318
+<td width="22%"></td>
319
+<td width="1%">
320
+
321
+<p>&bull;</p>
322
+</td>
323
+<td width="5%"></td>
324
+<td width="72%">
325
+
326
+<p>no =&gt; Ban messages containing these tags</p>
327
+</td>
328
+<tr valign="top" align="left">
329
+<td width="22%"></td>
330
+<td width="1%">
331
+
332
+<p>&bull;</p>
333
+</td>
334
+<td width="5%"></td>
335
+<td width="72%">
336
+
337
+<p>disarm =&gt; Allow these tags, but stop these tags from
338
+working</p>
339
+</td>
340
+</table>
341
+<!-- INDENTATION -->
342
+<table width="100%" border=0 rules="none" frame="void"
343
+       cols="2" cellspacing="0" cellpadding="0">
344
+<tr valign="top" align="left">
345
+<td width="11%"></td>
346
+<td width="89%">
347
+<p><b>Allow Script Tags</b></p></td>
348
+</table>
349
+<!-- INDENTATION -->
350
+<table width="100%" border=0 rules="none" frame="void"
351
+       cols="2" cellspacing="0" cellpadding="0">
352
+<tr valign="top" align="left">
353
+<td width="22%"></td>
354
+<td width="78%">
355
+<p>Default: no</p></td>
356
+</table>
357
+<!-- INDENTATION -->
358
+<table width="100%" border=0 rules="none" frame="void"
359
+       cols="2" cellspacing="0" cellpadding="0">
360
+<tr valign="top" align="left">
361
+<td width="28%"></td>
362
+<td width="72%">
363
+<p>Do you want to allow &lt;Script&gt; tags in email
364
+messages? This is a bad idea as these are used to exploit
365
+vulnerabilities in email applications and web browsers. This
366
+can also be the filename of a ruleset. Possible
367
+values:</p></td>
368
+</table>
369
+<!-- TABS -->
370
+<table width="100%" border=0 rules="none" frame="void"
371
+       cols="4" cellspacing="0" cellpadding="0">
372
+<tr valign="top" align="left">
373
+<td width="22%"></td>
374
+<td width="1%">
375
+
376
+<p>&bull;</p>
377
+</td>
378
+<td width="5%"></td>
379
+<td width="72%">
380
+
381
+<p>yes =&gt; Allow these tags to be in the message</p>
382
+</td>
383
+<tr valign="top" align="left">
384
+<td width="22%"></td>
385
+<td width="1%">
386
+
387
+<p>&bull;</p>
388
+</td>
389
+<td width="5%"></td>
390
+<td width="72%">
391
+
392
+<p>no =&gt; Ban messages containing these tags</p>
393
+</td>
394
+<tr valign="top" align="left">
395
+<td width="22%"></td>
396
+<td width="1%">
397
+
398
+<p>&bull;</p>
399
+</td>
400
+<td width="5%"></td>
401
+<td width="72%">
402
+
403
+<p>disarm =&gt; Allow these tags, but stop these tags from
404
+working</p>
405
+</td>
406
+</table>
407
+<!-- INDENTATION -->
408
+<table width="100%" border=0 rules="none" frame="void"
409
+       cols="2" cellspacing="0" cellpadding="0">
410
+<tr valign="top" align="left">
411
+<td width="11%"></td>
412
+<td width="89%">
413
+<p><b>Allow WebBugs</b></p></td>
414
+</table>
415
+<!-- INDENTATION -->
416
+<table width="100%" border=0 rules="none" frame="void"
417
+       cols="2" cellspacing="0" cellpadding="0">
418
+<tr valign="top" align="left">
419
+<td width="22%"></td>
420
+<td width="78%">
421
+<p>Default: disarm</p></td>
422
+</table>
423
 <!-- INDENTATION -->
424
-<p>yes =&gt; Allow these tags to be in the message no =&gt;
425
-Ban messages containing these tags disarm =&gt; Allow these
426
-tags, but stop these tags from working</p>
427
+<table width="100%" border=0 rules="none" frame="void"
428
+       cols="2" cellspacing="0" cellpadding="0">
429
+<tr valign="top" align="left">
430
+<td width="28%"></td>
431
+<td width="72%">
432
+<p>Do you want to allow &lt;Img&gt; tags with very small
433
+images in email messages? This is a bad idea as these are
434
+used as &rsquo;web bugs&rsquo; to find out if a message has
435
+been read. It is not dangerous, it is just used to make you
436
+give away information. This can also be the filename of a
437
+ruleset. Possible values:</p></td>
438
+</table>
439
+<!-- TABS -->
440
+<table width="100%" border=0 rules="none" frame="void"
441
+       cols="4" cellspacing="0" cellpadding="0">
442
+<tr valign="top" align="left">
443
+<td width="22%"></td>
444
+<td width="1%">
445
+
446
+<p>&bull;</p>
447
+</td>
448
+<td width="5%"></td>
449
+<td width="72%">
450
+
451
+<p>yes =&gt; Allow these tags to be in the message</p>
452
+</td>
453
+<tr valign="top" align="left">
454
+<td width="22%"></td>
455
+<td width="1%">
456
+
457
+<p>&bull;</p>
458
+</td>
459
+<td width="5%"></td>
460
+<td width="72%">
461
+
462
+<p>no =&gt; Ban messages containing these tags</p>
463
+</td>
464
+<tr valign="top" align="left">
465
+<td width="22%"></td>
466
+<td width="1%">
467
+
468
+<p>&bull;</p>
469
+</td>
470
+<td width="5%"></td>
471
+<td width="72%">
472
+
473
+<p>disarm =&gt; Allow these tags, but stop these tags from
474
+working</p>
475
 </td>
476
 </table>
477
 <!-- INDENTATION -->
478
@@ -1669,18 +1992,57 @@
479
 <tr valign="top" align="left">
480
 <td width="22%"></td>
481
 <td width="78%">
482
-<p>Default: no</p>
483
+<p>Default: no</p></td>
484
+</table>
485
 <!-- INDENTATION -->
486
+<table width="100%" border=0 rules="none" frame="void"
487
+       cols="2" cellspacing="0" cellpadding="0">
488
+<tr valign="top" align="left">
489
+<td width="28%"></td>
490
+<td width="72%">
491
 <p>Do you want to allow &lt;Object Codebase=...&gt; tags in
492
 email messages? This is a bad idea as it leaves you
493
 unprotected against various Microsoft&minus;specific
494
 security vulnerabilities. But if your users demand it, you
495
 can do it. This can also be the filename of a ruleset.
496
-Possible values:</p>
497
-<!-- INDENTATION -->
498
-<p>yes =&gt; Allow these tags to be in the message no =&gt;
499
-Ban messages containing these tags disarm =&gt; Allow these
500
-tags, but stop these tags from working</p>
501
+Possible values:</p></td>
502
+</table>
503
+<!-- TABS -->
504
+<table width="100%" border=0 rules="none" frame="void"
505
+       cols="4" cellspacing="0" cellpadding="0">
506
+<tr valign="top" align="left">
507
+<td width="22%"></td>
508
+<td width="1%">
509
+
510
+<p>&bull;</p>
511
+</td>
512
+<td width="5%"></td>
513
+<td width="72%">
514
+
515
+<p>yes =&gt; Allow these tags to be in the message</p>
516
+</td>
517
+<tr valign="top" align="left">
518
+<td width="22%"></td>
519
+<td width="1%">
520
+
521
+<p>&bull;</p>
522
+</td>
523
+<td width="5%"></td>
524
+<td width="72%">
525
+
526
+<p>no =&gt; Ban messages containing these tags</p>
527
+</td>
528
+<tr valign="top" align="left">
529
+<td width="22%"></td>
530
+<td width="1%">
531
+
532
+<p>&bull;</p>
533
+</td>
534
+<td width="5%"></td>
535
+<td width="72%">
536
+
537
+<p>disarm =&gt; Allow these tags, but stop these tags from
538
+working</p>
539
 </td>
540
 </table>
541
 <!-- INDENTATION -->
542
@@ -1697,8 +2059,14 @@
543
 <tr valign="top" align="left">
544
 <td width="22%"></td>
545
 <td width="78%">
546
-<p>Default: no</p>
547
+<p>Default: no</p></td>
548
+</table>
549
 <!-- INDENTATION -->
550
+<table width="100%" border=0 rules="none" frame="void"
551
+       cols="2" cellspacing="0" cellpadding="0">
552
+<tr valign="top" align="left">
553
+<td width="28%"></td>
554
+<td width="72%">
555
 <p>This option interacts with the &quot;Allow ... Tags&quot;
556
 options above like this:</p>
557
 <!-- INDENTATION -->
558
@@ -1852,7 +2220,7 @@
559
 <tr valign="top" align="left">
560
 <td width="11%"></td>
561
 <td width="89%">
562
-<p><b>Quarantine Whole Message</b></p></td>
563
+<p><b>Quarantine Silent Viruses</b></p></td>
564
 </table>
565
 <!-- INDENTATION -->
566
 <table width="100%" border=0 rules="none" frame="void"
567
@@ -1860,11 +2228,16 @@
568
 <tr valign="top" align="left">
569
 <td width="22%"></td>
570
 <td width="78%">
571
-<p>Default: no</p>
572
+<p>Default: yes</p>
573
 <!-- INDENTATION -->
574
-<p>When an infected message is stored in the quarantine, a
575
-copy of the entire message will be saved, in addition to
576
-copies of the infected attachments.</p>
577
+<p>There is no point quarantining most viruses these days,
578
+so if you set this to &quot;no&quot; then no infections
579
+listed in your &quot;Silent Viruses&quot; setting will be
580
+quarantined, even if you have chosen to quarantine
581
+infections in general. This is currently set to
582
+&quot;yes&quot; so the behaviour is the same as it was in in
583
+previous versions. This can also be the filename of a
584
+ruleset.</p>
585
 </td>
586
 </table>
587
 <!-- INDENTATION -->
588
@@ -1873,7 +2246,7 @@
589
 <tr valign="top" align="left">
590
 <td width="11%"></td>
591
 <td width="89%">
592
-<p><b>Quarantine Whole Messages As Queue Files</b></p></td>
593
+<p><b>Quarantine Whole Message</b></p></td>
594
 </table>
595
 <!-- INDENTATION -->
596
 <table width="100%" border=0 rules="none" frame="void"
597
@@ -1883,9 +2256,30 @@
598
 <td width="78%">
599
 <p>Default: no</p>
600
 <!-- INDENTATION -->
601
-<p>When an entire message is saved in the quarantine for any
602
-reason, do you want to save it as the raw data files out of
603
-the mail queue (which can be processed with the df2mbox
604
+<p>When an infected message is stored in the quarantine, a
605
+copy of the entire message will be saved, in addition to
606
+copies of the infected attachments.</p>
607
+</td>
14
+</td>
608
+</table>
15
+</table>
609
+<!-- INDENTATION -->
16
+<!-- INDENTATION -->
Lines 612-618 Link Here
612
+<tr valign="top" align="left">
19
+<tr valign="top" align="left">
613
+<td width="11%"></td>
20
+<td width="11%"></td>
614
+<td width="89%">
21
+<td width="89%">
615
+<p><b>Quarantine Whole Messages As Queue Files</b></p></td>
22
+<p><b>Run In Foreground</b></p></td>
616
+</table>
23
+</table>
617
+<!-- INDENTATION -->
24
+<!-- INDENTATION -->
618
+<table width="100%" border=0 rules="none" frame="void"
25
+<table width="100%" border=0 rules="none" frame="void"
Lines 622-1266 Link Here
622
+<td width="78%">
29
+<td width="78%">
623
+<p>Default: no</p>
30
+<p>Default: no</p>
624
+<!-- INDENTATION -->
31
+<!-- INDENTATION -->
625
+<p>When an entire message is saved in the quarantine for any
32
+<p>Set Run In Foreground to &quot;yes&quot; if you want
626
+reason, do you want to save it as the raw data files out of
33
+MailScanner to operate normally in foreground (and not as a
627
+the mail queue (which can be processed with the df2mbox
34
+background daemon). Use this if you are controlling the
628
 script, and which is easier to send to its original
35
+execution of MailScanner with a tool like DJB&rsquo;s
629
 recipients), or do you want a conventional message file
36
+&rsquo;supervise&rsquo; (see
630
 consisting of the header followed by the body of the
37
+http://cr.yp.to/daemontools.html).</p>
631
@@ -3670,6 +4064,32 @@
632
 <tr valign="top" align="left">
633
 <td width="11%"></td>
634
 <td width="89%">
635
+<p><b>Spam List Timeouts History</b></p></td>
636
+</table>
637
+<!-- INDENTATION -->
638
+<table width="100%" border=0 rules="none" frame="void"
639
+       cols="2" cellspacing="0" cellpadding="0">
640
+<tr valign="top" align="left">
641
+<td width="22%"></td>
642
+<td width="78%">
643
+<p>Default: 10</p>
644
+<!-- INDENTATION -->
645
+<p>The total number of Spam List attempts during which
646
+&quot;Max Spam List Timeouts&quot; will cause the spam list
647
+fo be marked as &quot;unavailable&quot;. See the previous
648
+comment for more information. The default values of 5 and 10
649
+mean that 5 timeouts in any sequence of 10 attempts will
650
+cause the list to be marked as &quot;unavailable&quot; until
651
+the next periodic restart (see &quot;Restart
652
+Every&quot;).</p>
653
+</td>
654
+</table>
655
+<!-- INDENTATION -->
656
+<table width="100%" border=0 rules="none" frame="void"
657
+       cols="2" cellspacing="0" cellpadding="0">
658
+<tr valign="top" align="left">
659
+<td width="11%"></td>
660
+<td width="89%">
661
 <p><b>Is Definitely Not Spam</b></p></td>
662
 </table>
663
 <!-- INDENTATION -->
664
@@ -3733,6 +4153,31 @@
665
 This can also be the filename of a ruleset.</p>
666
 </td>
38
 </td>
667
 </table>
39
 </table>
668
+<!-- INDENTATION -->
669
+<table width="100%" border=0 rules="none" frame="void"
670
+       cols="2" cellspacing="0" cellpadding="0">
671
+<tr valign="top" align="left">
672
+<td width="11%"></td>
673
+<td width="89%">
674
+<p><b>Ignore Spam Whitelist If Recipients
675
+Exceed</b></p></td>
676
+</table>
677
+<!-- INDENTATION -->
678
+<table width="100%" border=0 rules="none" frame="void"
679
+       cols="2" cellspacing="0" cellpadding="0">
680
+<tr valign="top" align="left">
681
+<td width="22%"></td>
682
+<td width="78%">
683
+<p>Default: 20</p>
684
+<!-- INDENTATION -->
685
+<p>Spammers have learnt that they can get their message
686
+through by sending a message with lots of recipients, one of
687
+which chooses to whitelist everything coming to them,
688
+including the spammer. So if a message arrives with more
689
+than this number of recipients, ignore the &quot;Is
690
+Definitely Not Spam&quot; whitelist.</p>
691
+</td>
692
+</table>
693
 <a name="SpamAssassin"></a>
694
 <h2>SpamAssassin</h2>
695
 <!-- INDENTATION -->
696
@@ -3868,11 +4313,7 @@
697
 <tr valign="top" align="left">
698
 <td width="22%"></td>
699
 <td width="78%">
700
-<p>Default:
701
-/opt/MailScanner/etc/spam.assassin.prefs.conf<br>
702
-Default Linux: /etc/MailScanner/spam.assassin.prefs.conf<br>
703
-Default FreeBSD:
704
-/usr/local/etc/MailScanner/spam.assassin.prefs.conf</p>
705
+<p>Default: %etc&minus;dir%/spam.assassin.prefs.conf</p>
706
 <!-- INDENTATION -->
40
 <!-- INDENTATION -->
707
 <p>SpamAssassin uses a &quot;user preferences&quot; file
708
 which can be used to set the values of various SpamAssassin
709
@@ -3934,6 +4375,32 @@
710
 <tr valign="top" align="left">
711
 <td width="11%"></td>
712
 <td width="89%">
713
+<p><b>SpamAssassin Timeouts History</b></p></td>
714
+</table>
715
+<!-- INDENTATION -->
716
+<table width="100%" border=0 rules="none" frame="void"
717
+       cols="2" cellspacing="0" cellpadding="0">
718
+<tr valign="top" align="left">
719
+<td width="22%"></td>
720
+<td width="78%">
721
+<p>Default: 30</p>
722
+<!-- INDENTATION -->
723
+<p>The total number of SpamAssassin attempts during which
724
+&quot;Max SpamAssassin Timeouts&quot; will cause
725
+SpamAssassin to be marked as &quot;unavailable&quot;. See
726
+the previous comment for more information. The default
727
+values of 10 and 20 mean that 10 timeouts in any sequence of
728
+20 attempts will trigger the behaviour described above,
729
+until the next periodic restart (see &quot;Restart
730
+Every&quot;).</p>
731
+</td>
732
+</table>
733
+<!-- INDENTATION -->
734
+<table width="100%" border=0 rules="none" frame="void"
735
+       cols="2" cellspacing="0" cellpadding="0">
736
+<tr valign="top" align="left">
737
+<td width="11%"></td>
738
+<td width="89%">
739
 <p><b>Check SpamAssassin If On Spam List</b></p></td>
740
 </table>
741
 <!-- INDENTATION -->
742
@@ -4063,23 +4530,81 @@
743
 <p>This can be any combination of 1 or more of the following
744
 keywords, and these actions are applied to any message which
745
 is spam.</p>
746
-<!-- INDENTATION -->
747
+</td>
748
+</table>
749
+<!-- TABS -->
750
+<table width="100%" border=0 rules="none" frame="void"
751
+       cols="4" cellspacing="0" cellpadding="0">
752
+<tr valign="top" align="left">
753
+<td width="22%"></td>
754
+<td width="1%">
755
+
756
+<p>&bull;</p>
757
+</td>
758
+<td width="5%"></td>
759
+<td width="72%">
760
+
761
 <p>&quot;deliver&quot; &minus; the message is delivered to
762
 the recipient as normal</p>
763
-<!-- INDENTATION -->
764
+</td>
765
+<tr valign="top" align="left">
766
+<td width="22%"></td>
767
+<td width="1%">
768
+
769
+<p>&bull;</p>
770
+</td>
771
+<td width="5%"></td>
772
+<td width="72%">
773
+
774
 <p>&quot;delete&quot; &minus; the message is deleted</p>
775
-<!-- INDENTATION -->
776
+</td>
777
+<tr valign="top" align="left">
778
+<td width="22%"></td>
779
+<td width="1%">
780
+
781
+<p>&bull;</p>
782
+</td>
783
+<td width="5%"></td>
784
+<td width="72%">
785
+
786
 <p>&quot;store&quot; &minus; the message is stored in the
787
 quarantine</p>
788
-<!-- INDENTATION -->
789
-<p>&quot;forward&quot; &minus; an email address is supplied,
790
-to which the message is forwarded</p>
791
-<!-- INDENTATION -->
792
+</td>
793
+<tr valign="top" align="left">
794
+<td width="22%"></td>
795
+<td width="1%">
796
+
797
+<p>&bull;</p>
798
+</td>
799
+<td width="5%"></td>
800
+<td width="72%">
801
+
802
+<p>&quot;forward&quot; &minus; an email address is
803
+supplied, to which the message is forwarded</p>
804
+</td>
805
+<tr valign="top" align="left">
806
+<td width="22%"></td>
807
+<td width="1%">
808
+
809
+<p>&bull;</p>
810
+</td>
811
+<td width="5%"></td>
812
+<td width="72%">
813
+
814
 <p>&quot;notify&quot; &minus; Send the recipients a short
815
 notification that spam addressed to them was not delivered.
816
 They can then take action to request retrieval of the
817
 orginal message if they think it was not spam.</p>
818
-<!-- INDENTATION -->
819
+</td>
820
+<tr valign="top" align="left">
821
+<td width="22%"></td>
822
+<td width="1%">
823
+
824
+<p>&bull;</p>
825
+</td>
826
+<td width="5%"></td>
827
+<td width="72%">
828
+
829
 <p>&quot;striphtml&quot; &minus; convert all in&minus;line
830
 HTML content in the message to be stripped to plain text,
831
 which removes all images and scripts and so can be used to
832
@@ -4087,12 +4612,30 @@
833
 action on its own does not imply that the message will be
834
 delivered, you will need to specify &quot;deliver&quot; or
835
 &quot;forward&quot; to actually deliver the message.</p>
836
-<!-- INDENTATION -->
837
+</td>
838
+<tr valign="top" align="left">
839
+<td width="22%"></td>
840
+<td width="1%">
841
+
842
+<p>&bull;</p>
843
+</td>
844
+<td width="5%"></td>
845
+<td width="72%">
846
+
847
 <p>&quot;attachment&quot; &minus; Convert the original
848
 message into an attachment of the message. This means the
849
 user has to take an extra step to open the spam, and stops
850
 &quot;web bugs&quot; very effectively.</p>
851
-<!-- INDENTATION -->
852
+</td>
853
+<tr valign="top" align="left">
854
+<td width="22%"></td>
855
+<td width="1%">
856
+
857
+<p>&bull;</p>
858
+</td>
859
+<td width="5%"></td>
860
+<td width="72%">
861
+
862
 <p>&quot;bounce&quot; &minus; bounce the spam message. This
863
 option should not be used and must be enabled with the
864
 &quot;Enable Spam Bounce&quot; option first.</p>
865
@@ -4112,8 +4655,14 @@
866
 <tr valign="top" align="left">
867
 <td width="22%"></td>
868
 <td width="78%">
869
-<p>Default: deliver</p>
870
+<p>Default: deliver</p></td>
871
+</table>
872
 <!-- INDENTATION -->
873
+<table width="100%" border=0 rules="none" frame="void"
874
+       cols="2" cellspacing="0" cellpadding="0">
875
+<tr valign="top" align="left">
876
+<td width="28%"></td>
877
+<td width="72%">
878
 <p>This is the same as the &quot;Spam Actions&quot; option
879
 above, but it gives the actions to apply to any message
880
 whose SpamAssassin score is above the &quot;High
881
@@ -4452,24 +5001,18 @@
882
 Note the files are mutable. If this is unset then no extra
883
 places are searched for. If using Postfix, you probably want
884
 to set this to /var/spool/MailScanner/spamassassin and
885
-do</p></td>
886
+do</p>
887
+</td>
888
 </table>
889
-<!-- TABS -->
890
+<!-- INDENTATION -->
891
 <table width="100%" border=0 rules="none" frame="void"
892
        cols="2" cellspacing="0" cellpadding="0">
893
 <tr valign="top" align="left">
894
-<td width="29%"></td>
895
-<td width="71%">
896
-
897
-<p>mkdir /var/spool/MailScanner/spamassassin</p>
898
-</td>
899
-<tr valign="top" align="left">
900
-<td width="29%"></td>
901
-<td width="71%">
902
-
903
-<p>chown postfix.postfix
904
-/var/spool/MailScanner/spamassassin</p>
905
-</td>
906
+<td width="26%"></td>
907
+<td width="74%">
908
+<p>mkdir /var/spool/MailScanner/spamassassin<br>
909
+chown postfix.postfix
910
+/var/spool/MailScanner/spamassassin</p></td>
911
 </table>
912
 <!-- INDENTATION -->
913
 <table width="100%" border=0 rules="none" frame="void"
914
@@ -4511,12 +5054,92 @@
915
 <td width="78%">
916
 <p>Default:</p>
917
 <!-- INDENTATION -->
918
-<p>The site&minus;local rules are searched for here, and in
919
-prefix /etc/spamassassin, prefix/etc/mail/spamassassin,
920
-/usr/local/etc/spamassassin, /etc/spamassassin,
921
-/etc/mail/spamassassin, and maybe others. If this is set
922
-then it adds to the list of places that are searched;
923
-otherwise it has no effect.</p>
924
+<p>This tells MailScanner where to look for the
925
+site&minus;local rules. If this is set it adds to the list
926
+of places that are searched. MailScanner will always look at
927
+the following places (even if this option is not set):</p>
928
+</td>
929
+</table>
930
+<!-- TABS -->
931
+<table width="100%" border=0 rules="none" frame="void"
932
+       cols="5" cellspacing="0" cellpadding="0">
933
+<tr valign="top" align="left">
934
+<td width="22%"></td>
935
+<td width="1%">
936
+
937
+<p>&bull;</p>
938
+</td>
939
+<td width="5%"></td>
940
+<td width="43%">
941
+
942
+<p>prefix/etc/spamassassin</p>
943
+</td>
944
+<td width="29%">
945
+</td>
946
+<tr valign="top" align="left">
947
+<td width="22%"></td>
948
+<td width="1%">
949
+
950
+<p>&bull;</p>
951
+</td>
952
+<td width="5%"></td>
953
+<td width="43%">
954
+
955
+<p>prefix/etc/mail/spamassassin</p>
956
+</td>
957
+<td width="29%">
958
+</td>
959
+<tr valign="top" align="left">
960
+<td width="22%"></td>
961
+<td width="1%">
962
+
963
+<p>&bull;</p>
964
+</td>
965
+<td width="5%"></td>
966
+<td width="43%">
967
+
968
+<p>/usr/local/etc/spamassassin</p>
969
+</td>
970
+<td width="29%">
971
+</td>
972
+<tr valign="top" align="left">
973
+<td width="22%"></td>
974
+<td width="1%">
975
+
976
+<p>&bull;</p>
977
+</td>
978
+<td width="5%"></td>
979
+<td width="43%">
980
+
981
+<p>/etc/spamassassin</p>
982
+</td>
983
+<td width="29%">
984
+</td>
985
+<tr valign="top" align="left">
986
+<td width="22%"></td>
987
+<td width="1%">
988
+
989
+<p>&bull;</p>
990
+</td>
991
+<td width="5%"></td>
992
+<td width="43%">
993
+
994
+<p>/etc/mail/spamassassin</p>
995
+</td>
996
+<td width="29%">
997
+</td>
998
+<tr valign="top" align="left">
999
+<td width="22%"></td>
1000
+<td width="1%">
1001
+
1002
+<p>&bull;</p>
1003
+</td>
1004
+<td width="5%"></td>
1005
+<td width="43%">
1006
+
1007
+<p>maybe others as well</p>
1008
+</td>
1009
+<td width="29%">
1010
 </td>
1011
 </table>
1012
 <!-- INDENTATION -->
1013
@@ -4533,13 +5156,73 @@
1014
 <tr valign="top" align="left">
1015
 <td width="22%"></td>
1016
 <td width="78%">
1017
-<p>Default:</p>
1018
+<p>Default:</p></td>
1019
+</table>
1020
 <!-- INDENTATION -->
1021
-<p>The default rules are searched for here, and in
1022
-prefix/share/spamassassin, /usr/local/share/spamassassin,
1023
-/usr/share/spamassassin, and maybe others. If this is set
1024
-then it adds to the list of places that are searched;
1025
-otherwise it has no effect.</p>
1026
+<table width="100%" border=0 rules="none" frame="void"
1027
+       cols="2" cellspacing="0" cellpadding="0">
1028
+<tr valign="top" align="left">
1029
+<td width="28%"></td>
1030
+<td width="72%">
1031
+<p>This tells MailScanner where to look for the default
1032
+rules. If this is set it adds to the list of places that are
1033
+searched. MailScanner will always look at the following
1034
+places (even if this option is not set):</p></td>
1035
+</table>
1036
+<!-- TABS -->
1037
+<table width="100%" border=0 rules="none" frame="void"
1038
+       cols="5" cellspacing="0" cellpadding="0">
1039
+<tr valign="top" align="left">
1040
+<td width="22%"></td>
1041
+<td width="1%">
1042
+
1043
+<p>&bull;</p>
1044
+</td>
1045
+<td width="5%"></td>
1046
+<td width="44%">
1047
+
1048
+<p>prefix/share/spamassassin</p>
1049
+</td>
1050
+<td width="28%">
1051
+</td>
1052
+<tr valign="top" align="left">
1053
+<td width="22%"></td>
1054
+<td width="1%">
1055
+
1056
+<p>&bull;</p>
1057
+</td>
1058
+<td width="5%"></td>
1059
+<td width="44%">
1060
+
1061
+<p>/usr/local/share/spamassassin</p>
1062
+</td>
1063
+<td width="28%">
1064
+</td>
1065
+<tr valign="top" align="left">
1066
+<td width="22%"></td>
1067
+<td width="1%">
1068
+
1069
+<p>&bull;</p>
1070
+</td>
1071
+<td width="5%"></td>
1072
+<td width="44%">
1073
+
1074
+<p>/usr/share/spamassassin</p>
1075
+</td>
1076
+<td width="28%">
1077
+</td>
1078
+<tr valign="top" align="left">
1079
+<td width="22%"></td>
1080
+<td width="1%">
1081
+
1082
+<p>&bull;</p>
1083
+</td>
1084
+<td width="5%"></td>
1085
+<td width="44%">
1086
+
1087
+<p>maybe others as well</p>
1088
+</td>
1089
+<td width="28%">
1090
 </td>
1091
 </table>
1092
 <a name="Advanced Settings"></a>
1093
@@ -4797,15 +5480,78 @@
1094
 <td width="78%">
1095
 <p>Default: supported</p>
1096
 <!-- INDENTATION -->
1097
-<p>Some of the virus scanners are not supported by the
1098
-authors of MailScanner, and they may use code contributed by
1099
-another user. If this option is set to the wrong value for
1100
-your virus scanners, then you will get an error message in
1101
-your maillog (syslog) telling you tha# Are you using Exim
1102
-with split spool directories? If you don&rsquo;t understand
1103
-# this, the answer is probably &quot;no&quot;. Refer to the
1104
-Exim documentation for # more information about split spool
1105
-directories. Split Exim Spool = yes</p>
1106
+<p>Minimum acceptable code stability status &minus;&minus;
1107
+if we come across code that&rsquo;s not at least as stable
1108
+as this, we barf. This is currently only used to check that
1109
+you don&rsquo;t end up using untested virus scanner support
1110
+code without realising it. Don&rsquo;t even *think* about
1111
+setting this to anything other than &quot;beta&quot; or
1112
+&quot;supported&quot; on a system that receives real mail
1113
+until you have tested it yourself and are happy that it is
1114
+all working as you expect it to. Don&rsquo;t set it to
1115
+anything other than &quot;supported&quot; on a system that
1116
+could ever receive important mail. Levels used are:</p>
1117
+</td>
1118
+</table>
1119
+<!-- TABS -->
1120
+<table width="100%" border=0 rules="none" frame="void"
1121
+       cols="4" cellspacing="0" cellpadding="0">
1122
+<tr valign="top" align="left">
1123
+<td width="22%"></td>
1124
+<td width="1%">
1125
+
1126
+<p>&bull;</p>
1127
+</td>
1128
+<td width="5%"></td>
1129
+<td width="72%">
1130
+
1131
+<p>none &minus; there may not even be any code.</p>
1132
+</td>
1133
+<tr valign="top" align="left">
1134
+<td width="22%"></td>
1135
+<td width="1%">
1136
+
1137
+<p>&bull;</p>
1138
+</td>
1139
+<td width="5%"></td>
1140
+<td width="72%">
1141
+
1142
+<p>unsupported &minus; code may be completely untested, a
1143
+contributed dirty hack, anything, really.</p>
1144
+</td>
1145
+<tr valign="top" align="left">
1146
+<td width="22%"></td>
1147
+<td width="1%">
1148
+
1149
+<p>&bull;</p>
1150
+</td>
1151
+<td width="5%"></td>
1152
+<td width="72%">
1153
+
1154
+<p>alpha &minus; code is pretty well untested. Don&rsquo;t
1155
+assume it will work.</p>
1156
+</td>
1157
+<tr valign="top" align="left">
1158
+<td width="22%"></td>
1159
+<td width="1%">
1160
+
1161
+<p>&bull;</p>
1162
+</td>
1163
+<td width="5%"></td>
1164
+<td width="72%">
1165
+
1166
+<p>beta &minus; code is tested a bit. It should work.</p>
1167
+</td>
1168
+<tr valign="top" align="left">
1169
+<td width="22%"></td>
1170
+<td width="1%">
1171
+
1172
+<p>&bull;</p>
1173
+</td>
1174
+<td width="5%"></td>
1175
+<td width="72%">
1176
+
1177
+<p>supported &minus; code *should* be reliable.</p>
1178
 </td>
1179
 </table>
1180
 <!-- INDENTATION -->
1181
@@ -4822,8 +5568,14 @@
1182
 <tr valign="top" align="left">
1183
 <td width="22%"></td>
1184
 <td width="78%">
1185
-<p>Default: yes</p>
1186
+<p>Default: yes</p></td>
1187
+</table>
1188
 <!-- INDENTATION -->
1189
+<table width="100%" border=0 rules="none" frame="void"
1190
+       cols="2" cellspacing="0" cellpadding="0">
1191
+<tr valign="top" align="left">
1192
+<td width="28%"></td>
1193
+<td width="72%">
1194
 <p>Are you using Exim with split spool directories? If you
1195
 don&rsquo;t understand this, the answer is probably
1196
 &quot;no&quot;. Refer to the Exim documentation for more
1197
@@ -4850,22 +5602,55 @@
1198
 <p>When trying to work out the value of configuration
1199
 parameters which are using a ruleset, this controls the
1200
 behaviour when a rule is checking the &quot;To:&quot;
1201
-addresses. If this option is set to &quot;yes&quot;, then
1202
-the following happens when checking the ruleset:</p>
1203
-<!-- INDENTATION -->
1204
-<p>a) 1 recipient. Same behaviour as normal.<br>
1205
-b) Several recipients, but all in the same domain
1206
+addresses. If this option is set to &quot;no&quot;, then
1207
+some rules will use the result they get from the first
1208
+matching rule for any of the recipients of a message, so the
1209
+exact value cannot be predicted for messages with more than
1210
+1 recipient. This value *cannot* be the filename of a
1211
+ruleset.<br>
1212
+If this option is set to &quot;yes&quot;, then the following
1213
+happens when checking the ruleset:</p>
1214
+</td>
1215
+</table>
1216
+<!-- TABS -->
1217
+<table width="100%" border=0 rules="none" frame="void"
1218
+       cols="4" cellspacing="0" cellpadding="0">
1219
+<tr valign="top" align="left">
1220
+<td width="22%"></td>
1221
+<td width="3%">
1222
+
1223
+<p>a)</p>
1224
+</td>
1225
+<td width="3%"></td>
1226
+<td width="72%">
1227
+
1228
+<p>1 recipient. Same behaviour as normal.</p>
1229
+</td>
1230
+<tr valign="top" align="left">
1231
+<td width="22%"></td>
1232
+<td width="3%">
1233
+
1234
+<p>b)</p>
1235
+</td>
1236
+<td width="3%"></td>
1237
+<td width="72%">
1238
+
1239
+<p>Several recipients, but all in the same domain
1240
 (domain.com for example). The rules are checked for one that
1241
-matches the string &quot;*@domain.com&quot;.<br>
1242
-c) Several recipients, not all in the same domain. The rules
1243
-are checked for one that matches the string
1244
+matches the string &quot;*@domain.com&quot;.</p>
1245
+</td>
1246
+<tr valign="top" align="left">
1247
+<td width="22%"></td>
1248
+<td width="3%">
1249
+
1250
+<p>c)</p>
1251
+</td>
1252
+<td width="3%"></td>
1253
+<td width="72%">
1254
+
1255
+<p>Several recipients, not all in the same domain. The
1256
+rules are checked for one that matches the string
1257
 &quot;*@*&quot;.</p>
1258
-<!-- INDENTATION -->
1259
-<p>If this option is set to &quot;no&quot;, then some rules
1260
-will use the result they get from the first matching rule
1261
-for any of the recipients of a message, so the exact value
1262
-cannot be predicted for messages with more than 1 recipient.
1263
-This value *cannot* be the filename of a ruleset.</p>
1264
 </td>
1265
 </table>
1266
 <a name="RULESETS"></a>

Return to bug 68946