View | Details | Raw Unified | Return to bug 66197
Collapse All | Expand All

(-)/server-root/ports/mail/mailscanner/Makefile (-3 / +2 lines)
Lines 6-13 Link Here
6
#
6
#
7
7
8
PORTNAME=	MailScanner
8
PORTNAME=	MailScanner
9
PORTVERSION=	4.29.7
9
PORTVERSION=	4.30.3
10
PORTREVISION=	1
11
CATEGORIES=	mail
10
CATEGORIES=	mail
12
MASTER_SITES=	http://www.sng.ecs.soton.ac.uk/mailscanner/files/4/tar/
11
MASTER_SITES=	http://www.sng.ecs.soton.ac.uk/mailscanner/files/4/tar/
13
DISTNAME=	${PORTNAME}-${PORTVERSION}-${PATCHLEVEL}
12
DISTNAME=	${PORTNAME}-${PORTVERSION}-${PATCHLEVEL}
Lines 36-42 Link Here
36
35
37
CONFLICTS=	MailScanner-devel-*
36
CONFLICTS=	MailScanner-devel-*
38
37
39
PATCHLEVEL=	1
38
PATCHLEVEL=	2
40
39
41
USE_PERL5=	yes
40
USE_PERL5=	yes
42
41
(-)/server-root/ports/mail/mailscanner/distinfo (-2 / +2 lines)
Lines 1-2 Link Here
1
MD5 (MailScanner-4.29.7-1.tar.gz) = 89e6b726026007bd9e44ccfdb1048e11
1
MD5 (MailScanner-4.30.3-2.tar.gz) = f6e069ca4c46b91b937e0aa34749b2d1
2
SIZE (MailScanner-4.29.7-1.tar.gz) = 980321
2
SIZE (MailScanner-4.30.3-2.tar.gz) = 996850
(-)/server-root/ports/mail/mailscanner/files/patch-bin:update_virus_scanners (-12 lines)
Lines 1-12 Link Here
1
--- ../MailScanner-4.29.7.orig/bin/update_virus_scanners	Wed Apr 28 13:38:29 2004
2
+++ bin/update_virus_scanners	Wed Apr 28 13:39:10 2004
3
@@ -8,7 +8,8 @@
4
 # the lockfile is not meant to be perfect, it's just in case the
5
 # two cron scripts get run close to each other to keep them from
6
 # stepping on each other's toes.
7
-[ -f $LOCKFILE ] && exit 0
8
+
9
+[ -f $LOCKFILE ] && [ "`find $LOCKFILE -type f -mmin +60 -print`" = "" ] && exit 0
10
 trap "rm -f $LOCKFILE" EXIT
11
 touch $LOCKFILE
12
 
(-)/server-root/ports/mail/mailscanner/files/patch-docs:man:MailScanner.8 (-3 / +3 lines)
Lines 1-8 Link Here
1
--- ../MailScanner-4.29.7.orig/docs/man/MailScanner.8	Thu Apr  1 15:14:21 2004
1
--- ../MailScanner-4.30.3.orig/docs/man/MailScanner.8	Mon May  3 10:48:25 2004
2
+++ docs/man/MailScanner.8	Thu Apr  1 15:16:01 2004
2
+++ docs/man/MailScanner.8	Mon May  3 10:48:48 2004
3
@@ -1,4 +1,4 @@
3
@@ -1,4 +1,4 @@
4
-.TH "MailScanner" "8" "4.29.5" "Julian Field" "Mail"
4
-.TH "MailScanner" "8" "4.29.5" "Julian Field" "Mail"
5
+.TH "MailScanner" "8" "4.29.7" "Julian Field" "Mail"
5
+.TH "MailScanner" "8" "4.30.3" "Julian Field" "Mail"
6
 .SH "NAME"
6
 .SH "NAME"
7
 .LP 
7
 .LP 
8
 MailScanner \- Virus/Spam Scanner for Sendmail, Exim and Postfix
8
 MailScanner \- Virus/Spam Scanner for Sendmail, Exim and Postfix
(-)/server-root/ports/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5 (-4 / +348 lines)
Lines 1-8 Link Here
1
--- ../MailScanner-4.29.7.orig/docs/man/MailScanner.conf.5	Thu Apr  1 15:14:21 2004
1
--- ../MailScanner-4.30.3.orig/docs/man/MailScanner.conf.5	Mon May  3 10:48:25 2004
2
+++ docs/man/MailScanner.conf.5	Thu Apr  1 15:16:09 2004
2
+++ docs/man/MailScanner.conf.5	Mon May  3 10:48:39 2004
3
@@ -1,4 +1,4 @@
3
@@ -1,4 +1,4 @@
4
-.TH "MailScanner.conf" "5" "4.29.5" "Julian Field" "Mail"
4
-.TH "MailScanner.conf" "5" "4.30.1" "Julian Field" "Mail"
5
+.TH "MailScanner.conf" "5" "4.29.7" "Julian Field" "Mail"
5
+.TH "MailScanner.conf" "5" "4.30.3" "Julian Field" "Mail"
6
 .SH "NAME"
6
 .SH "NAME"
7
 .LP 
7
 .LP 
8
 MailScanner.conf \- Main configuration for MailScanner
8
 MailScanner.conf \- Main configuration for MailScanner
9
@@ -117,16 +117,20 @@
10
 Directory in which MailScanner should find e\-mail messages for scanning. This can be any of the following:
11
 .br 
12
 
13
+.RS 7
14
+.IP  1. 4
15
+a directory name. 
16
+.br 
17
+Example: /var/spool/mqueue.in
18
+.IP  2. 4
19
+a wildcard giving directory names. 
20
+.br 
21
+Example: /var/spool/mqueue.in/*
22
+.IP  3. 4
23
+the name of a file containing a list of directory names, which can in turn contain wildcards. 
24
 .br 
25
-1. a directory name. Example: /var/spool/mqueue.in
26
-.br 
27
-
28
-.br 
29
-2. a wildcard giving directory names. Example: /var/spool/mqueue.in/*
30
-.br 
31
-
32
-.br 
33
-3. the name of a file containing a list of directory names, which can in turn contain wildcards. Example: /usr/local/etc/MailScanner/mqueue.in.list.conf
34
+Example: /usr/local/etc/MailScanner/mqueue.in.list.conf
35
+.RE
36
 
37
 .TP 
38
 \fBOutgoing Queue Dir\fR
39
@@ -515,17 +519,18 @@
40
 .br 
41
 Messages whose virus reports contain any of the words listed here will be treated as "silent" viruses. No messages will be sent back to the senders of these viruses, and the delivery to the recipient of the message can be controlled by the next option "Still Deliver Silent Viruses". This is primarily designed for viruses such as "Klez" and "Bugbear" which put fake addresses on messages they send, so there is no point informing the sender of the message, as it won't actually be them who sent it anyway. Other words that can be put in this list are the 5 special keywords
42
 .br 
43
+.RS 7
44
+.IP  \(bu 4
45
 HTML\-IFrame: inserting this will stop senders being warned about HTML Iframe tags, when they are not allowed.
46
-.br 
47
+.IP  \(bu 4
48
 HTML\-Codebase: inserting this will stop senders being warned about HTML Object Codebase tags, when they are not allowed.
49
-.br 
50
+.IP  \(bu 4
51
 Zip\-Password: inserting this will stop senders being warned about password\-protected zip files when they are not allowd. This keyword is not needed if you include All\-Viruses.
52
-.br 
53
+.IP  \(bu 4
54
 All\-Viruses: inserting this will stop senders being warned about any virus, while still allowing you to warn senders about HTML\-based attacks. This includes Zip\-Password so you don't need to include both.
55
 .br 
56
-
57
-.br 
58
 The default of "All\-Viruses" means that no senders of viruses will be notified (as the sender address is always forged these days anyway), but anyone who sends a message that is blocked for other reasons will still be notified.
59
+.RE
60
 
61
 
62
 .TP 
63
@@ -580,17 +585,16 @@
64
 .br 
65
 
66
 .br 
67
-Do you want to allow HTML <IFrame> tags in email messages? This is not a good idea as it allows various Microsoft Outlook security vulnerabilities to go unprotected, but if you have a load of mailing lists sending them, then you will want to allow them to keep your users happy. Possible Values:
68
-.br 
69
-
70
+Do you want to allow HTML <IFrame> tags in email messages? This is not a good idea as it allows various Microsoft Outlook security vulnerabilities to go unprotected, but if you have a load of mailing lists sending them, then you will want to allow them to keep your users happy. This can also be the filename of a ruleset, so you can allow them from known mailing lists but ban them from everywhere else. Possible Values:
71
 .br 
72
+.RS 7
73
+.IP  \(bu 4
74
 yes    => Allow these tags to be in the message
75
+.IP  \(bu 4
76
 no     => Ban messages containing these tags
77
+.IP  \(bu 4
78
 disarm => Allow these tags, but stop these tags from working
79
-.br 
80
-
81
-.br 
82
-This can also be the filename of a ruleset, so you can allow them from known mailing lists but ban them from everywhere else.
83
+.RE
84
 
85
 .TP 
86
 \fBLog IFrame Tags\fR
87
@@ -608,11 +612,14 @@
88
 .br 
89
 Do you want to allow <Form> tags in email messages? This is a bad idea as these are used as scams to pursuade people to part with credit card information and other personal data. This can also be the filename of a ruleset. Possible values:
90
 .br 
91
-
92
-.br 
93
+.RS 7
94
+.IP  \(bu 4
95
 yes    => Allow these tags to be in the message
96
+.IP  \(bu 4
97
 no     => Ban messages containing these tags
98
+.IP  \(bu 4
99
 disarm => Allow these tags, but stop these tags from working
100
+.RE
101
 
102
 .TP 
103
 \fBAllow Object Codebase Tags\fR
104
@@ -622,11 +629,14 @@
105
 .br 
106
 Do you want to allow <Object Codebase=...> tags in email messages? This is a bad idea as it leaves you unprotected against various Microsoft\-specific security vulnerabilities. But if your users demand it, you can do it. This can also be the filename of a ruleset. Possible values:
107
 .br 
108
-
109
-.br 
110
+.RS 7
111
+.IP  \(bu 4
112
 yes    => Allow these tags to be in the message
113
+.IP  \(bu 4
114
 no     => Ban messages containing these tags
115
+.IP  \(bu 4
116
 disarm => Allow these tags, but stop these tags from working
117
+.RE
118
 
119
 .TP 
120
 \fBConvert Dangerous HTML To Text\fR
121
@@ -1348,6 +1358,14 @@
122
 If a "Spam List" lookup times out for this many consecutive checks without ever succeeding, then the particular "Spam List" entry will not be used any more, as it appears to be unreachable. When MailScanner restarts itself after a few hours, MailScanner will try to use the entry again, in case service has resumed properly. 
123
 
124
 .TP 
125
+\fBSpam List Timeouts History\fR
126
+Default: 10
127
+.br 
128
+
129
+.br 
130
+The total number of Spam List attempts during which "Max Spam List Timeouts" will cause the spam list fo be marked as "unavailable". See the previous comment for more information. The default values of 5 and 10 mean that 5 timeouts in any sequence of 10 attempts will cause the list to be marked as "unavailable" until the next periodic restart (see "Restart Every").
131
+
132
+.TP 
133
 \fBIs Definitely Not Spam\fR
134
 Default: %rules\-dir%/spam.whitelist.rules
135
 .br 
136
@@ -1371,6 +1389,14 @@
137
 .br 
138
 Setting this to yes means that spam found in the blacklist is treated as "High Scoring Spam" in the "Spam Actions" section below. Setting it to no means that it will be treated as "normal" spam. This can also be the filename of a ruleset.
139
 
140
+
141
+.TP 
142
+\fBIgnore Spam Whitelist If Recipients Exceed\fR
143
+Default: 20
144
+.br 
145
+
146
+.br 
147
+Spammers have learnt that they can get their message through by sending a message with lots of recipients, one of which chooses to whitelist everything coming to them, including the spammer. So if a message arrives with more than this number of recipients, ignore the "Is Definitely Not Spam" whitelist.
148
 .SH "SpamAssassin"
149
 .TP 
150
 \fBUse SpamAssassin\fR
151
@@ -1420,11 +1446,7 @@
152
 
153
 .TP 
154
 \fBSpamAssassin Prefs File\fR
155
-Default: /opt/MailScanner/etc/spam.assassin.prefs.conf
156
-.br 
157
-Default Linux: /etc/MailScanner/spam.assassin.prefs.conf
158
-.br 
159
-Default FreeBSD: /usr/local/etc/MailScanner/spam.assassin.prefs.conf
160
+Default: %etc\-dir%/spam.assassin.prefs.conf
161
 .br 
162
 
163
 .br 
164
@@ -1447,6 +1469,14 @@
165
 If several consecutive calls to SpamAssassin time out, then MailScanner decides that there is something stopping SpamAssassin from working properly. It will therefore be disabled for the next few hours until MailScanner restarts itself, at which point it will be tried again. 
166
 
167
 .TP 
168
+\fBSpamAssassin Timeouts History\fR
169
+Default: 30
170
+.br 
171
+
172
+.br 
173
+The total number of SpamAssassin attempts during which "Max SpamAssassin Timeouts" will cause SpamAssassin to be marked as "unavailable". See the previous comment for more information. The default values of 10 and 20 mean that 10 timeouts in any sequence of 20 attempts will trigger the behaviour described above, until the next periodic restart (see "Restart Every").
174
+
175
+.TP 
176
 \fBCheck SpamAssassin If On Spam List\fR
177
 Default: yes
178
 .br 
179
@@ -1462,7 +1492,6 @@
180
 .br 
181
 If this option is set, then the "Spam Header" will be included in the header of every message, so its presence cannot be used to filter out spam by your users' e\-mail applications. 
182
 
183
-
184
 .TP 
185
 \fBSpam Score\fR
186
 Default: yes
187
@@ -1480,7 +1509,6 @@
188
 .br 
189
 If you are using the Bayesian statistics engine on a busy server, you may well need to force a Bayesian database rebuild and expiry at regular intervals. This is measures in seconds. 24 hours = 86400 seconds. To disable this feature set this to 0.
190
 
191
-
192
 .TP 
193
 \fBWait During Bayes Rebuild\fR
194
 Default: no
195
@@ -1502,35 +1530,25 @@
196
 .br 
197
 This can be any combination of 1 or more of the following keywords, and these actions are applied to any message which is spam. 
198
 .br 
199
-
200
-.br 
201
+.RS 7
202
+.IP  \(bu 4
203
 "deliver" \- the message is delivered to the recipient as normal 
204
-.br 
205
-
206
-.br 
207
+.IP  \(bu 4
208
 "delete" \- the message is deleted 
209
-.br 
210
-
211
-.br 
212
+.IP  \(bu 4
213
 "store" \- the message is stored in the quarantine 
214
-.br 
215
 
216
-.br 
217
+.IP  \(bu 4
218
 "forward" \- an email address is supplied, to which the message is forwarded 
219
-.br 
220
-
221
-.br 
222
+.IP  \(bu 4
223
 "notify" \- Send the recipients a short notification that spam addressed to them was not delivered. They can then take action to request retrieval of the orginal message if they think it was not spam.
224
-.br 
225
-
226
-.br 
227
+.IP  \(bu 4
228
 "striphtml" \- convert all in\-line HTML content in the message to be stripped to plain text, which removes all images and scripts and so can be used to protect your users from offensive spam. Note that using this action on its own does not imply that the message will be delivered, you will need to specify "deliver" or "forward" to actually deliver the message. 
229
-
230
-.br 
231
+.IP  \(bu 4
232
 "attachment" \- Convert the original message into an attachment of the message. This means the user has to take an extra step to open the spam, and stops "web bugs" very effectively.
233
-
234
-.br 
235
+.IP  \(bu 4
236
 "bounce" \- bounce the spam message. This option should not be used and must be enabled with the "Enable Spam Bounce" option first.
237
+.RE
238
 
239
 .TP 
240
 \fBHigh Scoring Spam Actions\fR
241
@@ -1654,10 +1672,12 @@
242
 
243
 .br 
244
 The per\-user files (bayes, auto\-whitelist, user_prefs) are looked for here and in ~/.spamassassin/. Note the files are mutable. If this is unset then no extra places are searched for. If using Postfix, you probably want to set this to /var/spool/MailScanner/spamassassin and do
245
-.br  
246
-	mkdir /var/spool/MailScanner/spamassassin
247
+
248
+.RS 10
249
+mkdir /var/spool/MailScanner/spamassassin
250
 .br 
251
-	chown postfix.postfix /var/spool/MailScanner/spamassassin
252
+chown postfix.postfix /var/spool/MailScanner/spamassassin
253
+.RE
254
 
255
 .TP 
256
 \fBSpamAssassin Install Prefix\fR
257
@@ -1673,7 +1693,21 @@
258
 .br 
259
 
260
 .br 
261
-The site\-local rules are searched for here, and in prefix /etc/spamassassin, prefix/etc/mail/spamassassin, /usr/local/etc/spamassassin, /etc/spamassassin, /etc/mail/spamassassin, and maybe others. If this is set then it adds to the list of places that are searched; otherwise it has no effect.
262
+This tells MailScanner where to look for the site\-local rules. If this is set it adds to the list of places that are searched. MailScanner will always look at the following places (even if this option is not set):
263
+.RS 7
264
+.IP  \(bu 4
265
+prefix/etc/spamassassin
266
+.IP  \(bu 4
267
+prefix/etc/mail/spamassassin
268
+.IP  \(bu 4
269
+/usr/local/etc/spamassassin
270
+.IP  \(bu 4
271
+/etc/spamassassin
272
+.IP  \(bu 4
273
+/etc/mail/spamassassin
274
+.IP  \(bu 4
275
+maybe others as well
276
+.RE
277
 
278
 .TP 
279
 \fBSpamAssassin Default Rules Dir\fR
280
@@ -1681,7 +1715,17 @@
281
 .br 
282
 
283
 .br 
284
-The default rules are searched for here, and in prefix/share/spamassassin, /usr/local/share/spamassassin, /usr/share/spamassassin, and maybe others. If this is set then it adds to the list of places that are searched; otherwise it has no effect.
285
+This tells MailScanner where to look for the default rules. If this is set it adds to the list of places that are searched. MailScanner will always look at the following places (even if this option is not set):
286
+.RS 7
287
+.IP  \(bu 4
288
+prefix/share/spamassassin
289
+.IP  \(bu 4
290
+/usr/local/share/spamassassin
291
+.IP  \(bu 4
292
+/usr/share/spamassassin
293
+.IP  \(bu 4
294
+maybe others as well
295
+.RE
296
 .SH "Advanced Settings"
297
 .TP 
298
 \fBDebug\fR
299
@@ -1768,8 +1812,20 @@
300
 .br 
301
 
302
 .br 
303
-Some of the virus scanners are not supported by the authors of MailScanner, and they may use code contributed by another user. If this option is set to the wrong value for your virus scanners, then you will get an error message in your maillog (syslog) telling you tha# Are you using Exim with split spool directories? If you don't understand # this, the answer is probably "no". Refer to the Exim documentation for # more information about split spool directories.
304
-Split Exim Spool = yes
305
+Minimum acceptable code stability status \-\- if we come across code that's not at least as stable as this, we barf. This is currently only used to check that you don't end up using untested virus scanner support code without realising it. Don't even *think* about setting this to anything other than "beta" or "supported" on a system that receives real mail until you have tested it yourself and are happy that it is all working as you expect it to. Don't set it to anything other than "supported" on a system that could ever receive important mail. Levels used are:
306
+
307
+.RS 7
308
+.IP  \(bu 4
309
+none \- there may not even be any code.
310
+.IP  \(bu 4
311
+unsupported \- code may be completely untested, a contributed dirty hack, anything, really.
312
+.IP  \(bu 4
313
+alpha \- code is pretty well untested. Don't assume it will work.
314
+.IP  \(bu 4
315
+beta \- code is tested a bit. It should work.
316
+.IP  \(bu 4
317
+supported \- code *should* be reliable.
318
+.RE
319
 
320
 .TP 
321
 \fBSplit Exim Spool\fR
322
@@ -1785,20 +1841,17 @@
323
 .br 
324
 
325
 .br 
326
-When trying to work out the value of configuration parameters which are using a ruleset, this controls the behaviour when a rule is checking the  "To:" addresses.  If this option is set to "yes", then the following happens when checking the ruleset:
327
-.br 
328
-
329
-.br 
330
-a) 1 recipient. Same behaviour as normal.
331
-.br 
332
-b) Several recipients, but all in the same domain (domain.com for example). The rules are checked for one that matches the string "*@domain.com".
333
+When trying to work out the value of configuration parameters which are using a ruleset, this controls the behaviour when a rule is checking the  "To:" addresses.  If this option is set to "no", then some rules will use the result they get from the first matching rule for any of the recipients of a message, so the exact value cannot be predicted for messages with more than 1 recipient. This value *cannot* be the filename of a ruleset. 
334
 .br 
335
-c) Several recipients, not all in the same domain. The rules are checked for one that matches the string "*@*".
336
-.br 
337
-
338
-.br 
339
-If this option is set to "no", then some rules will use the result they get from the first matching rule for any of the recipients of a message, so the exact value cannot be predicted for messages with more than 1 recipient. This value *cannot* be the filename of a ruleset.
340
-
341
+If this option is set to "yes", then the following happens when checking the ruleset:
342
+.RS 7
343
+.IP  a) 4
344
+1 recipient. Same behaviour as normal.
345
+.IP  b) 4
346
+Several recipients, but all in the same domain (domain.com for example). The rules are checked for one that matches the string "*@domain.com".
347
+.IP  c) 4
348
+Several recipients, not all in the same domain. The rules are checked for one that matches the string "*@*".
349
+.RE
350
 .SH "RULESETS"
351
 .LP 
352
 Ruleset files should all be put in /opt/MailScanner/etc/rules (FreeBSD: /usr/local/etc/MailScanner/rules) and their filename should end in ".rules" wherever possible.
(-)/server-root/ports/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html (+1036 lines)
Line 0 Link Here
1
--- ../MailScanner-4.30.3.orig/docs/man/MailScanner.conf.5.html	Mon May  3 10:48:25 2004
2
+++ docs/man/MailScanner.conf.5.html	Mon May  3 10:48:42 2004
3
@@ -1,5 +1,5 @@
4
 <!-- Creator     : groff version 1.19 -->
5
-<!-- CreationDate: Fri Apr  2 12:23:58 2004 -->
6
+<!-- CreationDate: Mon May  3 10:47:48 2004 -->
7
 <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
8
 "http://www.w3.org/TR/html4/loose.dtd">
9
 <html>
10
@@ -331,17 +331,85 @@
11
 <!-- INDENTATION -->
12
 <p>Directory in which MailScanner should find e&minus;mail
13
 messages for scanning. This can be any of the following:</p>
14
+</td>
15
+</table>
16
+<!-- TABS -->
17
+<table width="100%" border=0 rules="none" frame="void"
18
+       cols="5" cellspacing="0" cellpadding="0">
19
+<tr valign="top" align="left">
20
+<td width="22%"></td>
21
+<td width="3%">
22
+
23
+<p>1.</p>
24
+</td>
25
+<td width="3%"></td>
26
+<td width="26%">
27
+
28
+<p>a directory name.</p>
29
+</td>
30
+<td width="46%">
31
+</td>
32
+</table>
33
 <!-- INDENTATION -->
34
-<p>1. a directory name. Example: /var/spool/mqueue.in</p>
35
-<!-- INDENTATION -->
36
-<p>2. a wildcard giving directory names. Example:
37
-/var/spool/mqueue.in/*</p>
38
+<table width="100%" border=0 rules="none" frame="void"
39
+       cols="2" cellspacing="0" cellpadding="0">
40
+<tr valign="top" align="left">
41
+<td width="28%"></td>
42
+<td width="72%">
43
+<p>Example: /var/spool/mqueue.in</p>
44
+</td>
45
+</table>
46
+<!-- TABS -->
47
+<table width="100%" border=0 rules="none" frame="void"
48
+       cols="5" cellspacing="0" cellpadding="0">
49
+<tr valign="top" align="left">
50
+<td width="22%"></td>
51
+<td width="3%">
52
+
53
+<p>2.</p>
54
+</td>
55
+<td width="3%"></td>
56
+<td width="52%">
57
+
58
+<p>a wildcard giving directory names.</p>
59
+</td>
60
+<td width="20%">
61
+</td>
62
+</table>
63
 <!-- INDENTATION -->
64
-<p>3. the name of a file containing a list of directory
65
-names, which can in turn contain wildcards. Example:
66
-/usr/local/etc/MailScanner/mqueue.in.list.conf</p>
67
+<table width="100%" border=0 rules="none" frame="void"
68
+       cols="2" cellspacing="0" cellpadding="0">
69
+<tr valign="top" align="left">
70
+<td width="28%"></td>
71
+<td width="72%">
72
+<p>Example: /var/spool/mqueue.in/*</p>
73
 </td>
74
 </table>
75
+<!-- TABS -->
76
+<table width="100%" border=0 rules="none" frame="void"
77
+       cols="4" cellspacing="0" cellpadding="0">
78
+<tr valign="top" align="left">
79
+<td width="22%"></td>
80
+<td width="3%">
81
+
82
+<p>3.</p>
83
+</td>
84
+<td width="3%"></td>
85
+<td width="72%">
86
+
87
+<p>the name of a file containing a list of directory names,
88
+which can in turn contain wildcards.</p>
89
+</td>
90
+</table>
91
+<!-- INDENTATION -->
92
+<table width="100%" border=0 rules="none" frame="void"
93
+       cols="2" cellspacing="0" cellpadding="0">
94
+<tr valign="top" align="left">
95
+<td width="28%"></td>
96
+<td width="72%">
97
+<p>Example:
98
+/usr/local/etc/MailScanner/mqueue.in.list.conf</p></td>
99
+</table>
100
 <!-- INDENTATION -->
101
 <table width="100%" border=0 rules="none" frame="void"
102
        cols="2" cellspacing="0" cellpadding="0">
103
@@ -1403,29 +1471,79 @@
104
 fake addresses on messages they send, so there is no point
105
 informing the sender of the message, as it won&rsquo;t
106
 actually be them who sent it anyway. Other words that can be
107
-put in this list are the 5 special keywords<br>
108
-HTML&minus;IFrame: inserting this will stop senders being
109
-warned about HTML Iframe tags, when they are not
110
-allowed.<br>
111
-HTML&minus;Codebase: inserting this will stop senders being
112
-warned about HTML Object Codebase tags, when they are not
113
-allowed.<br>
114
-Zip&minus;Password: inserting this will stop senders being
115
-warned about password&minus;protected zip files when they
116
-are not allowd. This keyword is not needed if you include
117
-All&minus;Viruses.<br>
118
-All&minus;Viruses: inserting this will stop senders being
119
-warned about any virus, while still allowing you to warn
120
-senders about HTML&minus;based attacks. This includes
121
+put in this list are the 5 special keywords</p>
122
+</td>
123
+</table>
124
+<!-- TABS -->
125
+<table width="100%" border=0 rules="none" frame="void"
126
+       cols="4" cellspacing="0" cellpadding="0">
127
+<tr valign="top" align="left">
128
+<td width="22%"></td>
129
+<td width="1%">
130
+
131
+<p>&bull;</p>
132
+</td>
133
+<td width="5%"></td>
134
+<td width="72%">
135
+
136
+<p>HTML&minus;IFrame: inserting this will stop senders
137
+being warned about HTML Iframe tags, when they are not
138
+allowed.</p>
139
+</td>
140
+<tr valign="top" align="left">
141
+<td width="22%"></td>
142
+<td width="1%">
143
+
144
+<p>&bull;</p>
145
+</td>
146
+<td width="5%"></td>
147
+<td width="72%">
148
+
149
+<p>HTML&minus;Codebase: inserting this will stop senders
150
+being warned about HTML Object Codebase tags, when they are
151
+not allowed.</p>
152
+</td>
153
+<tr valign="top" align="left">
154
+<td width="22%"></td>
155
+<td width="1%">
156
+
157
+<p>&bull;</p>
158
+</td>
159
+<td width="5%"></td>
160
+<td width="72%">
161
+
162
+<p>Zip&minus;Password: inserting this will stop senders
163
+being warned about password&minus;protected zip files when
164
+they are not allowd. This keyword is not needed if you
165
+include All&minus;Viruses.</p>
166
+</td>
167
+<tr valign="top" align="left">
168
+<td width="22%"></td>
169
+<td width="1%">
170
+
171
+<p>&bull;</p>
172
+</td>
173
+<td width="5%"></td>
174
+<td width="72%">
175
+
176
+<p>All&minus;Viruses: inserting this will stop senders
177
+being warned about any virus, while still allowing you to
178
+warn senders about HTML&minus;based attacks. This includes
179
 Zip&minus;Password so you don&rsquo;t need to include
180
 both.</p>
181
+</td>
182
+</table>
183
 <!-- INDENTATION -->
184
+<table width="100%" border=0 rules="none" frame="void"
185
+       cols="2" cellspacing="0" cellpadding="0">
186
+<tr valign="top" align="left">
187
+<td width="28%"></td>
188
+<td width="72%">
189
 <p>The default of &quot;All&minus;Viruses&quot; means that
190
 no senders of viruses will be notified (as the sender
191
 address is always forged these days anyway), but anyone who
192
 sends a message that is blocked for other reasons will still
193
-be notified.</p>
194
-</td>
195
+be notified.</p></td>
196
 </table>
197
 <!-- INDENTATION -->
198
 <table width="100%" border=0 rules="none" frame="void"
199
@@ -1590,15 +1708,47 @@
200
 Microsoft Outlook security vulnerabilities to go
201
 unprotected, but if you have a load of mailing lists sending
202
 them, then you will want to allow them to keep your users
203
-happy. Possible Values:</p>
204
-<!-- INDENTATION -->
205
-<p>yes =&gt; Allow these tags to be in the message no =&gt;
206
-Ban messages containing these tags disarm =&gt; Allow these
207
-tags, but stop these tags from working</p>
208
-<!-- INDENTATION -->
209
-<p>This can also be the filename of a ruleset, so you can
210
-allow them from known mailing lists but ban them from
211
-everywhere else.</p>
212
+happy. This can also be the filename of a ruleset, so you
213
+can allow them from known mailing lists but ban them from
214
+everywhere else. Possible Values:</p>
215
+</td>
216
+</table>
217
+<!-- TABS -->
218
+<table width="100%" border=0 rules="none" frame="void"
219
+       cols="4" cellspacing="0" cellpadding="0">
220
+<tr valign="top" align="left">
221
+<td width="22%"></td>
222
+<td width="1%">
223
+
224
+<p>&bull;</p>
225
+</td>
226
+<td width="5%"></td>
227
+<td width="72%">
228
+
229
+<p>yes =&gt; Allow these tags to be in the message</p>
230
+</td>
231
+<tr valign="top" align="left">
232
+<td width="22%"></td>
233
+<td width="1%">
234
+
235
+<p>&bull;</p>
236
+</td>
237
+<td width="5%"></td>
238
+<td width="72%">
239
+
240
+<p>no =&gt; Ban messages containing these tags</p>
241
+</td>
242
+<tr valign="top" align="left">
243
+<td width="22%"></td>
244
+<td width="1%">
245
+
246
+<p>&bull;</p>
247
+</td>
248
+<td width="5%"></td>
249
+<td width="72%">
250
+
251
+<p>disarm =&gt; Allow these tags, but stop these tags from
252
+working</p>
253
 </td>
254
 </table>
255
 <!-- INDENTATION -->
256
@@ -1615,8 +1765,14 @@
257
 <tr valign="top" align="left">
258
 <td width="22%"></td>
259
 <td width="78%">
260
-<p>Default: no</p>
261
+<p>Default: no</p></td>
262
+</table>
263
 <!-- INDENTATION -->
264
+<table width="100%" border=0 rules="none" frame="void"
265
+       cols="2" cellspacing="0" cellpadding="0">
266
+<tr valign="top" align="left">
267
+<td width="28%"></td>
268
+<td width="72%">
269
 <p>You may receive complaints from your users that HTML
270
 mailing lists they subscribe to have been stopped by the
271
 &quot;Allow IFrame Tags&quot; option above. So before you
272
@@ -1649,10 +1805,44 @@
273
 people to part with credit card information and other
274
 personal data. This can also be the filename of a ruleset.
275
 Possible values:</p>
276
-<!-- INDENTATION -->
277
-<p>yes =&gt; Allow these tags to be in the message no =&gt;
278
-Ban messages containing these tags disarm =&gt; Allow these
279
-tags, but stop these tags from working</p>
280
+</td>
281
+</table>
282
+<!-- TABS -->
283
+<table width="100%" border=0 rules="none" frame="void"
284
+       cols="4" cellspacing="0" cellpadding="0">
285
+<tr valign="top" align="left">
286
+<td width="22%"></td>
287
+<td width="1%">
288
+
289
+<p>&bull;</p>
290
+</td>
291
+<td width="5%"></td>
292
+<td width="72%">
293
+
294
+<p>yes =&gt; Allow these tags to be in the message</p>
295
+</td>
296
+<tr valign="top" align="left">
297
+<td width="22%"></td>
298
+<td width="1%">
299
+
300
+<p>&bull;</p>
301
+</td>
302
+<td width="5%"></td>
303
+<td width="72%">
304
+
305
+<p>no =&gt; Ban messages containing these tags</p>
306
+</td>
307
+<tr valign="top" align="left">
308
+<td width="22%"></td>
309
+<td width="1%">
310
+
311
+<p>&bull;</p>
312
+</td>
313
+<td width="5%"></td>
314
+<td width="72%">
315
+
316
+<p>disarm =&gt; Allow these tags, but stop these tags from
317
+working</p>
318
 </td>
319
 </table>
320
 <!-- INDENTATION -->
321
@@ -1669,18 +1859,57 @@
322
 <tr valign="top" align="left">
323
 <td width="22%"></td>
324
 <td width="78%">
325
-<p>Default: no</p>
326
+<p>Default: no</p></td>
327
+</table>
328
 <!-- INDENTATION -->
329
+<table width="100%" border=0 rules="none" frame="void"
330
+       cols="2" cellspacing="0" cellpadding="0">
331
+<tr valign="top" align="left">
332
+<td width="28%"></td>
333
+<td width="72%">
334
 <p>Do you want to allow &lt;Object Codebase=...&gt; tags in
335
 email messages? This is a bad idea as it leaves you
336
 unprotected against various Microsoft&minus;specific
337
 security vulnerabilities. But if your users demand it, you
338
 can do it. This can also be the filename of a ruleset.
339
-Possible values:</p>
340
-<!-- INDENTATION -->
341
-<p>yes =&gt; Allow these tags to be in the message no =&gt;
342
-Ban messages containing these tags disarm =&gt; Allow these
343
-tags, but stop these tags from working</p>
344
+Possible values:</p></td>
345
+</table>
346
+<!-- TABS -->
347
+<table width="100%" border=0 rules="none" frame="void"
348
+       cols="4" cellspacing="0" cellpadding="0">
349
+<tr valign="top" align="left">
350
+<td width="22%"></td>
351
+<td width="1%">
352
+
353
+<p>&bull;</p>
354
+</td>
355
+<td width="5%"></td>
356
+<td width="72%">
357
+
358
+<p>yes =&gt; Allow these tags to be in the message</p>
359
+</td>
360
+<tr valign="top" align="left">
361
+<td width="22%"></td>
362
+<td width="1%">
363
+
364
+<p>&bull;</p>
365
+</td>
366
+<td width="5%"></td>
367
+<td width="72%">
368
+
369
+<p>no =&gt; Ban messages containing these tags</p>
370
+</td>
371
+<tr valign="top" align="left">
372
+<td width="22%"></td>
373
+<td width="1%">
374
+
375
+<p>&bull;</p>
376
+</td>
377
+<td width="5%"></td>
378
+<td width="72%">
379
+
380
+<p>disarm =&gt; Allow these tags, but stop these tags from
381
+working</p>
382
 </td>
383
 </table>
384
 <!-- INDENTATION -->
385
@@ -1697,8 +1926,14 @@
386
 <tr valign="top" align="left">
387
 <td width="22%"></td>
388
 <td width="78%">
389
-<p>Default: no</p>
390
+<p>Default: no</p></td>
391
+</table>
392
 <!-- INDENTATION -->
393
+<table width="100%" border=0 rules="none" frame="void"
394
+       cols="2" cellspacing="0" cellpadding="0">
395
+<tr valign="top" align="left">
396
+<td width="28%"></td>
397
+<td width="72%">
398
 <p>This option interacts with the &quot;Allow ... Tags&quot;
399
 options above like this:</p>
400
 <!-- INDENTATION -->
401
@@ -3670,6 +3905,32 @@
402
 <tr valign="top" align="left">
403
 <td width="11%"></td>
404
 <td width="89%">
405
+<p><b>Spam List Timeouts History</b></p></td>
406
+</table>
407
+<!-- INDENTATION -->
408
+<table width="100%" border=0 rules="none" frame="void"
409
+       cols="2" cellspacing="0" cellpadding="0">
410
+<tr valign="top" align="left">
411
+<td width="22%"></td>
412
+<td width="78%">
413
+<p>Default: 10</p>
414
+<!-- INDENTATION -->
415
+<p>The total number of Spam List attempts during which
416
+&quot;Max Spam List Timeouts&quot; will cause the spam list
417
+fo be marked as &quot;unavailable&quot;. See the previous
418
+comment for more information. The default values of 5 and 10
419
+mean that 5 timeouts in any sequence of 10 attempts will
420
+cause the list to be marked as &quot;unavailable&quot; until
421
+the next periodic restart (see &quot;Restart
422
+Every&quot;).</p>
423
+</td>
424
+</table>
425
+<!-- INDENTATION -->
426
+<table width="100%" border=0 rules="none" frame="void"
427
+       cols="2" cellspacing="0" cellpadding="0">
428
+<tr valign="top" align="left">
429
+<td width="11%"></td>
430
+<td width="89%">
431
 <p><b>Is Definitely Not Spam</b></p></td>
432
 </table>
433
 <!-- INDENTATION -->
434
@@ -3733,6 +3994,31 @@
435
 This can also be the filename of a ruleset.</p>
436
 </td>
437
 </table>
438
+<!-- INDENTATION -->
439
+<table width="100%" border=0 rules="none" frame="void"
440
+       cols="2" cellspacing="0" cellpadding="0">
441
+<tr valign="top" align="left">
442
+<td width="11%"></td>
443
+<td width="89%">
444
+<p><b>Ignore Spam Whitelist If Recipients
445
+Exceed</b></p></td>
446
+</table>
447
+<!-- INDENTATION -->
448
+<table width="100%" border=0 rules="none" frame="void"
449
+       cols="2" cellspacing="0" cellpadding="0">
450
+<tr valign="top" align="left">
451
+<td width="22%"></td>
452
+<td width="78%">
453
+<p>Default: 20</p>
454
+<!-- INDENTATION -->
455
+<p>Spammers have learnt that they can get their message
456
+through by sending a message with lots of recipients, one of
457
+which chooses to whitelist everything coming to them,
458
+including the spammer. So if a message arrives with more
459
+than this number of recipients, ignore the &quot;Is
460
+Definitely Not Spam&quot; whitelist.</p>
461
+</td>
462
+</table>
463
 <a name="SpamAssassin"></a>
464
 <h2>SpamAssassin</h2>
465
 <!-- INDENTATION -->
466
@@ -3868,11 +4154,7 @@
467
 <tr valign="top" align="left">
468
 <td width="22%"></td>
469
 <td width="78%">
470
-<p>Default:
471
-/opt/MailScanner/etc/spam.assassin.prefs.conf<br>
472
-Default Linux: /etc/MailScanner/spam.assassin.prefs.conf<br>
473
-Default FreeBSD:
474
-/usr/local/etc/MailScanner/spam.assassin.prefs.conf</p>
475
+<p>Default: %etc&minus;dir%/spam.assassin.prefs.conf</p>
476
 <!-- INDENTATION -->
477
 <p>SpamAssassin uses a &quot;user preferences&quot; file
478
 which can be used to set the values of various SpamAssassin
479
@@ -3934,6 +4216,32 @@
480
 <tr valign="top" align="left">
481
 <td width="11%"></td>
482
 <td width="89%">
483
+<p><b>SpamAssassin Timeouts History</b></p></td>
484
+</table>
485
+<!-- INDENTATION -->
486
+<table width="100%" border=0 rules="none" frame="void"
487
+       cols="2" cellspacing="0" cellpadding="0">
488
+<tr valign="top" align="left">
489
+<td width="22%"></td>
490
+<td width="78%">
491
+<p>Default: 30</p>
492
+<!-- INDENTATION -->
493
+<p>The total number of SpamAssassin attempts during which
494
+&quot;Max SpamAssassin Timeouts&quot; will cause
495
+SpamAssassin to be marked as &quot;unavailable&quot;. See
496
+the previous comment for more information. The default
497
+values of 10 and 20 mean that 10 timeouts in any sequence of
498
+20 attempts will trigger the behaviour described above,
499
+until the next periodic restart (see &quot;Restart
500
+Every&quot;).</p>
501
+</td>
502
+</table>
503
+<!-- INDENTATION -->
504
+<table width="100%" border=0 rules="none" frame="void"
505
+       cols="2" cellspacing="0" cellpadding="0">
506
+<tr valign="top" align="left">
507
+<td width="11%"></td>
508
+<td width="89%">
509
 <p><b>Check SpamAssassin If On Spam List</b></p></td>
510
 </table>
511
 <!-- INDENTATION -->
512
@@ -4063,23 +4371,81 @@
513
 <p>This can be any combination of 1 or more of the following
514
 keywords, and these actions are applied to any message which
515
 is spam.</p>
516
-<!-- INDENTATION -->
517
+</td>
518
+</table>
519
+<!-- TABS -->
520
+<table width="100%" border=0 rules="none" frame="void"
521
+       cols="4" cellspacing="0" cellpadding="0">
522
+<tr valign="top" align="left">
523
+<td width="22%"></td>
524
+<td width="1%">
525
+
526
+<p>&bull;</p>
527
+</td>
528
+<td width="5%"></td>
529
+<td width="72%">
530
+
531
 <p>&quot;deliver&quot; &minus; the message is delivered to
532
 the recipient as normal</p>
533
-<!-- INDENTATION -->
534
+</td>
535
+<tr valign="top" align="left">
536
+<td width="22%"></td>
537
+<td width="1%">
538
+
539
+<p>&bull;</p>
540
+</td>
541
+<td width="5%"></td>
542
+<td width="72%">
543
+
544
 <p>&quot;delete&quot; &minus; the message is deleted</p>
545
-<!-- INDENTATION -->
546
+</td>
547
+<tr valign="top" align="left">
548
+<td width="22%"></td>
549
+<td width="1%">
550
+
551
+<p>&bull;</p>
552
+</td>
553
+<td width="5%"></td>
554
+<td width="72%">
555
+
556
 <p>&quot;store&quot; &minus; the message is stored in the
557
 quarantine</p>
558
-<!-- INDENTATION -->
559
-<p>&quot;forward&quot; &minus; an email address is supplied,
560
-to which the message is forwarded</p>
561
-<!-- INDENTATION -->
562
+</td>
563
+<tr valign="top" align="left">
564
+<td width="22%"></td>
565
+<td width="1%">
566
+
567
+<p>&bull;</p>
568
+</td>
569
+<td width="5%"></td>
570
+<td width="72%">
571
+
572
+<p>&quot;forward&quot; &minus; an email address is
573
+supplied, to which the message is forwarded</p>
574
+</td>
575
+<tr valign="top" align="left">
576
+<td width="22%"></td>
577
+<td width="1%">
578
+
579
+<p>&bull;</p>
580
+</td>
581
+<td width="5%"></td>
582
+<td width="72%">
583
+
584
 <p>&quot;notify&quot; &minus; Send the recipients a short
585
 notification that spam addressed to them was not delivered.
586
 They can then take action to request retrieval of the
587
 orginal message if they think it was not spam.</p>
588
-<!-- INDENTATION -->
589
+</td>
590
+<tr valign="top" align="left">
591
+<td width="22%"></td>
592
+<td width="1%">
593
+
594
+<p>&bull;</p>
595
+</td>
596
+<td width="5%"></td>
597
+<td width="72%">
598
+
599
 <p>&quot;striphtml&quot; &minus; convert all in&minus;line
600
 HTML content in the message to be stripped to plain text,
601
 which removes all images and scripts and so can be used to
602
@@ -4087,12 +4453,30 @@
603
 action on its own does not imply that the message will be
604
 delivered, you will need to specify &quot;deliver&quot; or
605
 &quot;forward&quot; to actually deliver the message.</p>
606
-<!-- INDENTATION -->
607
+</td>
608
+<tr valign="top" align="left">
609
+<td width="22%"></td>
610
+<td width="1%">
611
+
612
+<p>&bull;</p>
613
+</td>
614
+<td width="5%"></td>
615
+<td width="72%">
616
+
617
 <p>&quot;attachment&quot; &minus; Convert the original
618
 message into an attachment of the message. This means the
619
 user has to take an extra step to open the spam, and stops
620
 &quot;web bugs&quot; very effectively.</p>
621
-<!-- INDENTATION -->
622
+</td>
623
+<tr valign="top" align="left">
624
+<td width="22%"></td>
625
+<td width="1%">
626
+
627
+<p>&bull;</p>
628
+</td>
629
+<td width="5%"></td>
630
+<td width="72%">
631
+
632
 <p>&quot;bounce&quot; &minus; bounce the spam message. This
633
 option should not be used and must be enabled with the
634
 &quot;Enable Spam Bounce&quot; option first.</p>
635
@@ -4112,8 +4496,14 @@
636
 <tr valign="top" align="left">
637
 <td width="22%"></td>
638
 <td width="78%">
639
-<p>Default: deliver</p>
640
+<p>Default: deliver</p></td>
641
+</table>
642
 <!-- INDENTATION -->
643
+<table width="100%" border=0 rules="none" frame="void"
644
+       cols="2" cellspacing="0" cellpadding="0">
645
+<tr valign="top" align="left">
646
+<td width="28%"></td>
647
+<td width="72%">
648
 <p>This is the same as the &quot;Spam Actions&quot; option
649
 above, but it gives the actions to apply to any message
650
 whose SpamAssassin score is above the &quot;High
651
@@ -4452,24 +4842,18 @@
652
 Note the files are mutable. If this is unset then no extra
653
 places are searched for. If using Postfix, you probably want
654
 to set this to /var/spool/MailScanner/spamassassin and
655
-do</p></td>
656
+do</p>
657
+</td>
658
 </table>
659
-<!-- TABS -->
660
+<!-- INDENTATION -->
661
 <table width="100%" border=0 rules="none" frame="void"
662
        cols="2" cellspacing="0" cellpadding="0">
663
 <tr valign="top" align="left">
664
-<td width="29%"></td>
665
-<td width="71%">
666
-
667
-<p>mkdir /var/spool/MailScanner/spamassassin</p>
668
-</td>
669
-<tr valign="top" align="left">
670
-<td width="29%"></td>
671
-<td width="71%">
672
-
673
-<p>chown postfix.postfix
674
-/var/spool/MailScanner/spamassassin</p>
675
-</td>
676
+<td width="26%"></td>
677
+<td width="74%">
678
+<p>mkdir /var/spool/MailScanner/spamassassin<br>
679
+chown postfix.postfix
680
+/var/spool/MailScanner/spamassassin</p></td>
681
 </table>
682
 <!-- INDENTATION -->
683
 <table width="100%" border=0 rules="none" frame="void"
684
@@ -4511,12 +4895,92 @@
685
 <td width="78%">
686
 <p>Default:</p>
687
 <!-- INDENTATION -->
688
-<p>The site&minus;local rules are searched for here, and in
689
-prefix /etc/spamassassin, prefix/etc/mail/spamassassin,
690
-/usr/local/etc/spamassassin, /etc/spamassassin,
691
-/etc/mail/spamassassin, and maybe others. If this is set
692
-then it adds to the list of places that are searched;
693
-otherwise it has no effect.</p>
694
+<p>This tells MailScanner where to look for the
695
+site&minus;local rules. If this is set it adds to the list
696
+of places that are searched. MailScanner will always look at
697
+the following places (even if this option is not set):</p>
698
+</td>
699
+</table>
700
+<!-- TABS -->
701
+<table width="100%" border=0 rules="none" frame="void"
702
+       cols="5" cellspacing="0" cellpadding="0">
703
+<tr valign="top" align="left">
704
+<td width="22%"></td>
705
+<td width="1%">
706
+
707
+<p>&bull;</p>
708
+</td>
709
+<td width="5%"></td>
710
+<td width="43%">
711
+
712
+<p>prefix/etc/spamassassin</p>
713
+</td>
714
+<td width="29%">
715
+</td>
716
+<tr valign="top" align="left">
717
+<td width="22%"></td>
718
+<td width="1%">
719
+
720
+<p>&bull;</p>
721
+</td>
722
+<td width="5%"></td>
723
+<td width="43%">
724
+
725
+<p>prefix/etc/mail/spamassassin</p>
726
+</td>
727
+<td width="29%">
728
+</td>
729
+<tr valign="top" align="left">
730
+<td width="22%"></td>
731
+<td width="1%">
732
+
733
+<p>&bull;</p>
734
+</td>
735
+<td width="5%"></td>
736
+<td width="43%">
737
+
738
+<p>/usr/local/etc/spamassassin</p>
739
+</td>
740
+<td width="29%">
741
+</td>
742
+<tr valign="top" align="left">
743
+<td width="22%"></td>
744
+<td width="1%">
745
+
746
+<p>&bull;</p>
747
+</td>
748
+<td width="5%"></td>
749
+<td width="43%">
750
+
751
+<p>/etc/spamassassin</p>
752
+</td>
753
+<td width="29%">
754
+</td>
755
+<tr valign="top" align="left">
756
+<td width="22%"></td>
757
+<td width="1%">
758
+
759
+<p>&bull;</p>
760
+</td>
761
+<td width="5%"></td>
762
+<td width="43%">
763
+
764
+<p>/etc/mail/spamassassin</p>
765
+</td>
766
+<td width="29%">
767
+</td>
768
+<tr valign="top" align="left">
769
+<td width="22%"></td>
770
+<td width="1%">
771
+
772
+<p>&bull;</p>
773
+</td>
774
+<td width="5%"></td>
775
+<td width="43%">
776
+
777
+<p>maybe others as well</p>
778
+</td>
779
+<td width="29%">
780
 </td>
781
 </table>
782
 <!-- INDENTATION -->
783
@@ -4533,13 +4997,73 @@
784
 <tr valign="top" align="left">
785
 <td width="22%"></td>
786
 <td width="78%">
787
-<p>Default:</p>
788
+<p>Default:</p></td>
789
+</table>
790
 <!-- INDENTATION -->
791
-<p>The default rules are searched for here, and in
792
-prefix/share/spamassassin, /usr/local/share/spamassassin,
793
-/usr/share/spamassassin, and maybe others. If this is set
794
-then it adds to the list of places that are searched;
795
-otherwise it has no effect.</p>
796
+<table width="100%" border=0 rules="none" frame="void"
797
+       cols="2" cellspacing="0" cellpadding="0">
798
+<tr valign="top" align="left">
799
+<td width="28%"></td>
800
+<td width="72%">
801
+<p>This tells MailScanner where to look for the default
802
+rules. If this is set it adds to the list of places that are
803
+searched. MailScanner will always look at the following
804
+places (even if this option is not set):</p></td>
805
+</table>
806
+<!-- TABS -->
807
+<table width="100%" border=0 rules="none" frame="void"
808
+       cols="5" cellspacing="0" cellpadding="0">
809
+<tr valign="top" align="left">
810
+<td width="22%"></td>
811
+<td width="1%">
812
+
813
+<p>&bull;</p>
814
+</td>
815
+<td width="5%"></td>
816
+<td width="44%">
817
+
818
+<p>prefix/share/spamassassin</p>
819
+</td>
820
+<td width="28%">
821
+</td>
822
+<tr valign="top" align="left">
823
+<td width="22%"></td>
824
+<td width="1%">
825
+
826
+<p>&bull;</p>
827
+</td>
828
+<td width="5%"></td>
829
+<td width="44%">
830
+
831
+<p>/usr/local/share/spamassassin</p>
832
+</td>
833
+<td width="28%">
834
+</td>
835
+<tr valign="top" align="left">
836
+<td width="22%"></td>
837
+<td width="1%">
838
+
839
+<p>&bull;</p>
840
+</td>
841
+<td width="5%"></td>
842
+<td width="44%">
843
+
844
+<p>/usr/share/spamassassin</p>
845
+</td>
846
+<td width="28%">
847
+</td>
848
+<tr valign="top" align="left">
849
+<td width="22%"></td>
850
+<td width="1%">
851
+
852
+<p>&bull;</p>
853
+</td>
854
+<td width="5%"></td>
855
+<td width="44%">
856
+
857
+<p>maybe others as well</p>
858
+</td>
859
+<td width="28%">
860
 </td>
861
 </table>
862
 <a name="Advanced Settings"></a>
863
@@ -4797,15 +5321,78 @@
864
 <td width="78%">
865
 <p>Default: supported</p>
866
 <!-- INDENTATION -->
867
-<p>Some of the virus scanners are not supported by the
868
-authors of MailScanner, and they may use code contributed by
869
-another user. If this option is set to the wrong value for
870
-your virus scanners, then you will get an error message in
871
-your maillog (syslog) telling you tha# Are you using Exim
872
-with split spool directories? If you don&rsquo;t understand
873
-# this, the answer is probably &quot;no&quot;. Refer to the
874
-Exim documentation for # more information about split spool
875
-directories. Split Exim Spool = yes</p>
876
+<p>Minimum acceptable code stability status &minus;&minus;
877
+if we come across code that&rsquo;s not at least as stable
878
+as this, we barf. This is currently only used to check that
879
+you don&rsquo;t end up using untested virus scanner support
880
+code without realising it. Don&rsquo;t even *think* about
881
+setting this to anything other than &quot;beta&quot; or
882
+&quot;supported&quot; on a system that receives real mail
883
+until you have tested it yourself and are happy that it is
884
+all working as you expect it to. Don&rsquo;t set it to
885
+anything other than &quot;supported&quot; on a system that
886
+could ever receive important mail. Levels used are:</p>
887
+</td>
888
+</table>
889
+<!-- TABS -->
890
+<table width="100%" border=0 rules="none" frame="void"
891
+       cols="4" cellspacing="0" cellpadding="0">
892
+<tr valign="top" align="left">
893
+<td width="22%"></td>
894
+<td width="1%">
895
+
896
+<p>&bull;</p>
897
+</td>
898
+<td width="5%"></td>
899
+<td width="72%">
900
+
901
+<p>none &minus; there may not even be any code.</p>
902
+</td>
903
+<tr valign="top" align="left">
904
+<td width="22%"></td>
905
+<td width="1%">
906
+
907
+<p>&bull;</p>
908
+</td>
909
+<td width="5%"></td>
910
+<td width="72%">
911
+
912
+<p>unsupported &minus; code may be completely untested, a
913
+contributed dirty hack, anything, really.</p>
914
+</td>
915
+<tr valign="top" align="left">
916
+<td width="22%"></td>
917
+<td width="1%">
918
+
919
+<p>&bull;</p>
920
+</td>
921
+<td width="5%"></td>
922
+<td width="72%">
923
+
924
+<p>alpha &minus; code is pretty well untested. Don&rsquo;t
925
+assume it will work.</p>
926
+</td>
927
+<tr valign="top" align="left">
928
+<td width="22%"></td>
929
+<td width="1%">
930
+
931
+<p>&bull;</p>
932
+</td>
933
+<td width="5%"></td>
934
+<td width="72%">
935
+
936
+<p>beta &minus; code is tested a bit. It should work.</p>
937
+</td>
938
+<tr valign="top" align="left">
939
+<td width="22%"></td>
940
+<td width="1%">
941
+
942
+<p>&bull;</p>
943
+</td>
944
+<td width="5%"></td>
945
+<td width="72%">
946
+
947
+<p>supported &minus; code *should* be reliable.</p>
948
 </td>
949
 </table>
950
 <!-- INDENTATION -->
951
@@ -4822,8 +5409,14 @@
952
 <tr valign="top" align="left">
953
 <td width="22%"></td>
954
 <td width="78%">
955
-<p>Default: yes</p>
956
+<p>Default: yes</p></td>
957
+</table>
958
 <!-- INDENTATION -->
959
+<table width="100%" border=0 rules="none" frame="void"
960
+       cols="2" cellspacing="0" cellpadding="0">
961
+<tr valign="top" align="left">
962
+<td width="28%"></td>
963
+<td width="72%">
964
 <p>Are you using Exim with split spool directories? If you
965
 don&rsquo;t understand this, the answer is probably
966
 &quot;no&quot;. Refer to the Exim documentation for more
967
@@ -4850,22 +5443,55 @@
968
 <p>When trying to work out the value of configuration
969
 parameters which are using a ruleset, this controls the
970
 behaviour when a rule is checking the &quot;To:&quot;
971
-addresses. If this option is set to &quot;yes&quot;, then
972
-the following happens when checking the ruleset:</p>
973
-<!-- INDENTATION -->
974
-<p>a) 1 recipient. Same behaviour as normal.<br>
975
-b) Several recipients, but all in the same domain
976
+addresses. If this option is set to &quot;no&quot;, then
977
+some rules will use the result they get from the first
978
+matching rule for any of the recipients of a message, so the
979
+exact value cannot be predicted for messages with more than
980
+1 recipient. This value *cannot* be the filename of a
981
+ruleset.<br>
982
+If this option is set to &quot;yes&quot;, then the following
983
+happens when checking the ruleset:</p>
984
+</td>
985
+</table>
986
+<!-- TABS -->
987
+<table width="100%" border=0 rules="none" frame="void"
988
+       cols="4" cellspacing="0" cellpadding="0">
989
+<tr valign="top" align="left">
990
+<td width="22%"></td>
991
+<td width="3%">
992
+
993
+<p>a)</p>
994
+</td>
995
+<td width="3%"></td>
996
+<td width="72%">
997
+
998
+<p>1 recipient. Same behaviour as normal.</p>
999
+</td>
1000
+<tr valign="top" align="left">
1001
+<td width="22%"></td>
1002
+<td width="3%">
1003
+
1004
+<p>b)</p>
1005
+</td>
1006
+<td width="3%"></td>
1007
+<td width="72%">
1008
+
1009
+<p>Several recipients, but all in the same domain
1010
 (domain.com for example). The rules are checked for one that
1011
-matches the string &quot;*@domain.com&quot;.<br>
1012
-c) Several recipients, not all in the same domain. The rules
1013
-are checked for one that matches the string
1014
+matches the string &quot;*@domain.com&quot;.</p>
1015
+</td>
1016
+<tr valign="top" align="left">
1017
+<td width="22%"></td>
1018
+<td width="3%">
1019
+
1020
+<p>c)</p>
1021
+</td>
1022
+<td width="3%"></td>
1023
+<td width="72%">
1024
+
1025
+<p>Several recipients, not all in the same domain. The
1026
+rules are checked for one that matches the string
1027
 &quot;*@*&quot;.</p>
1028
-<!-- INDENTATION -->
1029
-<p>If this option is set to &quot;no&quot;, then some rules
1030
-will use the result they get from the first matching rule
1031
-for any of the recipients of a message, so the exact value
1032
-cannot be predicted for messages with more than 1 recipient.
1033
-This value *cannot* be the filename of a ruleset.</p>
1034
 </td>
1035
 </table>
1036
 <a name="RULESETS"></a>
(-)/server-root/ports/mail/mailscanner/files/patch-lib:MailScanner:MessageBatch.pm (-14 lines)
Lines 1-14 Link Here
1
--- ../MailScanner-4.29.7.orig/lib/MailScanner/MessageBatch.pm	Wed Apr 28 13:38:25 2004
2
+++ lib/MailScanner/MessageBatch.pm	Wed Apr 28 13:39:29 2004
3
@@ -472,6 +472,11 @@
4
         MailScanner::Config::LanguageValue($message, 'cantanalyze') . "\n";
5
       $message->{othertypes}{""}   .= 'e';
6
     }
7
+	 if ($message->{toomanyattach}) {
8
+      $message->{otherreports}{""} .=
9
+        MailScanner::Config::LanguageValue($message, 'toomanyattachments') . "\n";
10
+      $message->{othertypes}{""}   .= 'e';
11
+    }
12
     if ($message->{badtnef}) {
13
       $message->{entityreports}{$this->{tnefentity}} .=
14
         MailScanner::Config::LanguageValue($message, 'badtnef') . "\n";
(-)/server-root/ports/mail/mailscanner/pkg-plist (+3 lines)
Lines 47-52 Link Here
47
libexec/MailScanner/MailScanner
47
libexec/MailScanner/MailScanner
48
libexec/MailScanner/antivir-autoupdate.sample
48
libexec/MailScanner/antivir-autoupdate.sample
49
libexec/MailScanner/antivir-wrapper.sample
49
libexec/MailScanner/antivir-wrapper.sample
50
libexec/MailScanner/avg-wrapper.sample
51
libexec/MailScanner/avg-autoupdate.sample
50
libexec/MailScanner/bitdefender-autoupdate.sample
52
libexec/MailScanner/bitdefender-autoupdate.sample
51
libexec/MailScanner/bitdefender-wrapper.sample
53
libexec/MailScanner/bitdefender-wrapper.sample
52
libexec/MailScanner/clamav-autoupdate.sample
54
libexec/MailScanner/clamav-autoupdate.sample
Lines 445-450 Link Here
445
%%PORTDOCS%%%%DOCSDIR%%/downloads.shtml
447
%%PORTDOCS%%%%DOCSDIR%%/downloads.shtml
446
%%PORTDOCS%%%%DOCSDIR%%/ecs.css
448
%%PORTDOCS%%%%DOCSDIR%%/ecs.css
447
%%PORTDOCS%%%%DOCSDIR%%/faq.shtml
449
%%PORTDOCS%%%%DOCSDIR%%/faq.shtml
450
%%PORTDOCS%%%%DOCSDIR%%/ellen2.jpg
448
%%PORTDOCS%%%%DOCSDIR%%/images/JulianField1_small.jpg
451
%%PORTDOCS%%%%DOCSDIR%%/images/JulianField1_small.jpg
449
%%PORTDOCS%%%%DOCSDIR%%/images/bigmailscannerlogo.gif
452
%%PORTDOCS%%%%DOCSDIR%%/images/bigmailscannerlogo.gif
450
%%PORTDOCS%%%%DOCSDIR%%/images/smallmailscannerlogo.gif
453
%%PORTDOCS%%%%DOCSDIR%%/images/smallmailscannerlogo.gif

Return to bug 66197