diff options
author | sergei <sergei@FreeBSD.org> | 2004-03-09 05:51:57 +0800 |
---|---|---|
committer | sergei <sergei@FreeBSD.org> | 2004-03-09 05:51:57 +0800 |
commit | 3fc77d57b72cb5d66ebedbf3f9518f8610133577 (patch) | |
tree | 825e203e8d0e60dcaf8da04908eb8739b7d4abfc /mail | |
parent | 9fa32a99802cd9cf6145e4979390dce3c1c567b1 (diff) | |
download | freebsd-ports-gnome-3fc77d57b72cb5d66ebedbf3f9518f8610133577.tar.gz freebsd-ports-gnome-3fc77d57b72cb5d66ebedbf3f9518f8610133577.tar.zst freebsd-ports-gnome-3fc77d57b72cb5d66ebedbf3f9518f8610133577.zip |
- Update to 4.28.5
New features include blocking of password-protected ZIPs
and filename/-type checking within ZIPs
PR: ports/63921
Submitted by: Jan-Peter Koopmann (maintainer)
Diffstat (limited to 'mail')
-rw-r--r-- | mail/mailscanner/Makefile | 10 | ||||
-rw-r--r-- | mail/mailscanner/distinfo | 4 | ||||
-rw-r--r-- | mail/mailscanner/files/patch-docs:man:MailScanner.8 | 6 | ||||
-rw-r--r-- | mail/mailscanner/files/patch-docs:man:MailScanner.8.html | 9 | ||||
-rw-r--r-- | mail/mailscanner/files/patch-docs:man:MailScanner.conf.5 | 72 | ||||
-rw-r--r-- | mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html | 117 | ||||
-rw-r--r-- | mail/mailscanner/pkg-plist | 1 |
7 files changed, 206 insertions, 13 deletions
diff --git a/mail/mailscanner/Makefile b/mail/mailscanner/Makefile index 7113ac44dd96..7806f3b3eff9 100644 --- a/mail/mailscanner/Makefile +++ b/mail/mailscanner/Makefile @@ -6,7 +6,7 @@ # PORTNAME= MailScanner -PORTVERSION= 4.27.7 +PORTVERSION= 4.28.5 CATEGORIES= mail MASTER_SITES= http://www.sng.ecs.soton.ac.uk/mailscanner/files/4/tar/ DISTNAME= MailScanner-${PORTVERSION}-${PATCHLEVEL} @@ -23,7 +23,9 @@ BUILD_DEPENDS= \ ${SITE_PERL}/MIME/Parser.pm:${PORTSDIR}/mail/p5-MIME-Tools \ ${SITE_PERL}/File/Temp.pm:${PORTSDIR}/devel/p5-File-Temp \ ${SITE_PERL}/Convert/TNEF.pm:${PORTSDIR}/converters/p5-Convert-TNEF \ - ${SITE_PERL}/Net/CIDR.pm:${PORTSDIR}/net-mgmt/p5-Net-CIDR + ${SITE_PERL}/Net/CIDR.pm:${PORTSDIR}/net-mgmt/p5-Net-CIDR \ + ${SITE_PERL}/Archive/Zip.pm:${PORTSDIR}/archivers/p5-Archive-Zip \ + ${SITE_PERL}/${PERL_ARCH}/Compress/Zlib.pm:${PORTSDIR}/archivers/p5-Compress-Zlib RUN_DEPENDS= ${BUILD_DEPENDS} \ ${LOCALBASE}/bin/bash:${PORTSDIR}/shells/bash2 \ ${LOCALBASE}/bin/tnef:${PORTSDIR}/converters/tnef \ @@ -34,7 +36,7 @@ CONFLICTS= MailScanner-devel-* USE_PERL5= yes -PATCHLEVEL= 1 +PATCHLEVEL= 2 WRKSRC= ${WRKDIR}/MailScanner-${PORTVERSION} PKGMESSAGE= ${WRKDIR}/pkg-message @@ -105,7 +107,7 @@ do-build: .endfor do-install: - # + # # Step 1: Install libexec files # ${MKDIR} ${PREFIX}/libexec/MailScanner diff --git a/mail/mailscanner/distinfo b/mail/mailscanner/distinfo index fee7a0d0a806..a9e8dc2cc2c3 100644 --- a/mail/mailscanner/distinfo +++ b/mail/mailscanner/distinfo @@ -1,2 +1,2 @@ -MD5 (MailScanner-4.27.7-1.tar.gz) = 587c0ac52b9ef2ba889c40d6fafdd05a -SIZE (MailScanner-4.27.7-1.tar.gz) = 965165 +MD5 (MailScanner-4.28.5-2.tar.gz) = 5cb83fca38392efa76d3f73280525f46 +SIZE (MailScanner-4.28.5-2.tar.gz) = 969966 diff --git a/mail/mailscanner/files/patch-docs:man:MailScanner.8 b/mail/mailscanner/files/patch-docs:man:MailScanner.8 index 84f75a783fbd..eea173ebca3b 100644 --- a/mail/mailscanner/files/patch-docs:man:MailScanner.8 +++ b/mail/mailscanner/files/patch-docs:man:MailScanner.8 @@ -1,8 +1,8 @@ ---- ../MailScanner-4.27.7.orig/docs/man/MailScanner.8 Mon Mar 1 15:25:07 2004 -+++ docs/man/MailScanner.8 Mon Mar 1 15:27:56 2004 +--- ../MailScanner-4.28.5.orig/docs/man/MailScanner.8 Mon Mar 8 10:41:05 2004 ++++ docs/man/MailScanner.8 Mon Mar 8 10:42:01 2004 @@ -1,4 +1,4 @@ -.TH "MailScanner" "8" "4.27.4" "Julian Field" "Mail" -+.TH "MailScanner" "8" "4.27.7" "Julian Field" "Mail" ++.TH "MailScanner" "8" "4.28.5" "Julian Field" "Mail" .SH "NAME" .LP MailScanner \- Virus/Spam Scanner for Sendmail, Exim and Postfix diff --git a/mail/mailscanner/files/patch-docs:man:MailScanner.8.html b/mail/mailscanner/files/patch-docs:man:MailScanner.8.html new file mode 100644 index 000000000000..92e59e97516c --- /dev/null +++ b/mail/mailscanner/files/patch-docs:man:MailScanner.8.html @@ -0,0 +1,9 @@ +--- ../MailScanner-4.28.5.orig/docs/man/MailScanner.8.html Mon Mar 8 10:41:05 2004 ++++ docs/man/MailScanner.8.html Mon Mar 8 10:42:01 2004 +@@ -1,5 +1,5 @@ + <!-- Creator : groff version 1.19 --> +-<!-- CreationDate: Mon Feb 23 12:00:39 2004 --> ++<!-- CreationDate: Mon Mar 8 10:33:07 2004 --> + <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" + "http://www.w3.org/TR/html4/loose.dtd"> + <html> diff --git a/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5 b/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5 index ca5213888609..67fe862a8056 100644 --- a/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5 +++ b/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5 @@ -1,8 +1,74 @@ ---- ../MailScanner-4.27.7.orig/docs/man/MailScanner.conf.5 Mon Mar 1 15:25:07 2004 -+++ docs/man/MailScanner.conf.5 Mon Mar 1 15:28:04 2004 +--- ../MailScanner-4.28.5.orig/docs/man/MailScanner.conf.5 Mon Mar 8 10:41:05 2004 ++++ docs/man/MailScanner.conf.5 Mon Mar 8 10:42:01 2004 @@ -1,4 +1,4 @@ -.TH "MailScanner.conf" "5" "4.27.4" "Julian Field" "Mail" -+.TH "MailScanner.conf" "5" "4.27.7" "Julian Field" "Mail" ++.TH "MailScanner.conf" "5" "4.28.5" "Julian Field" "Mail" .SH "NAME" .LP MailScanner.conf \- Main configuration for MailScanner +@@ -383,6 +383,14 @@ + This is intended for use with a ruleset to ensure that mail is always encrypted before being sent. This could be used to ensure that mail to your business partners is sent securely. + + .TP ++\fBAllow Password\-Protected Archives\fR ++Default: no ++.br ++ ++.br ++Should archives which contain any password\-protected files be allowed? Leaving this set to "no" is a good way of protecting against all the protected zip files used by viruses at the moment. This can also be the filename of a ruleset. ++ ++.TP + \fBMaximum Message Size\fR + Default: 0 + .br +@@ -397,6 +405,14 @@ + + .br + The maximum size, in bytes, of any attachment in a message. If this is set to zero, effectively no attachments are allowed. If this is set less than zero, then no size checking is done. This can also be the filename of a ruleset, so you can have different settings for different users. You might want to set this quite small for large mailing lists so they don't get deluged by large attachments. ++ ++.TP ++\fBMaximum Archive Depth\fR ++Default: 3 ++.br ++ ++.br ++The maximum depth to which zip archives will be unpacked to allow for checking filenames and filetypes within zip archives. Setting this to 0 will disable filename/\-type checks within zip files while still allowing to block password protected zip files. + .SH "Options specific to Sophos Anti-Virus" + .TP + \fBAllowed Sophos Error Messages\fR +@@ -457,7 +473,7 @@ + .br + + .br +-Which Virus Scanning package to use. Possible choices are sophos, sophossavi, mcafee, command, kaspersky, kaspersky\-4.5, kavdaemonclient, inoculate, inoculan, onoculan, nod32, nod32\-1.99, f\-secure, f\-prot, panda, rav, antivir, clamav, clamavmodule, trend, bitdefender, none (no virus scanning at all) ++Which Virus Scanning package to use. Possible choices are sophos, sophossavi, mcafee, command, kaspersky, kaspersky\-4.5, kavdaemonclient, inoculate, inoculan, onoculan, nod32, nod32\-1.99, f\-secure, f\-prot, panda, rav, antivir, clamav, clamavmodule, css, trend, bitdefender, none (no virus scanning at all) + .br + + .br +@@ -489,13 +505,15 @@ + .br + + .br +-Messages whose virus reports contain any of the words listed here will be treated as "silent" viruses. No messages will be sent back to the senders of these viruses, and the delivery to the recipient of the message can be controlled by the next option "Still Deliver Silent Viruses". This is primarily designed for viruses such as "Klez" and "Bugbear" which put fake addresses on messages they send, so there is no point informing the sender of the message, as it won't actually be them who sent it anyway. Other words that can be put in this list are the 3 special keywords ++Messages whose virus reports contain any of the words listed here will be treated as "silent" viruses. No messages will be sent back to the senders of these viruses, and the delivery to the recipient of the message can be controlled by the next option "Still Deliver Silent Viruses". This is primarily designed for viruses such as "Klez" and "Bugbear" which put fake addresses on messages they send, so there is no point informing the sender of the message, as it won't actually be them who sent it anyway. Other words that can be put in this list are the 5 special keywords + .br + HTML\-IFrame: inserting this will stop senders being warned about HTML Iframe tags, when they are not allowed. + .br + HTML\-Codebase: inserting this will stop senders being warned about HTML Object Codebase tags, when they are not allowed. + .br +-All\-Viruses: inserting this will stop senders being warned about any virus, while still allowing you to warn senders about HTML\-based attacks. ++Zip\-Password: inserting this will stop senders being warned about password\-protected zip files when they are not allowd. This keyword is not needed if you include All\-Viruses. ++.br ++All\-Viruses: inserting this will stop senders being warned about any virus, while still allowing you to warn senders about HTML\-based attacks. This includes Zip\-Password so you don't need to include both. + .br + + .br +@@ -517,7 +535,7 @@ + .br + + .br +-Strings listed here will be searched for in the output of the virus scanners. It works to achieve the opposite effect of the "Silent Viruses" listed above. If a string here is found in the output of the virus scanners, then the message will be treated as if it were not infected with a "Silent Virus". If a message is detected as both a silent virus and a non\-forging virus, then the non\-forging status will override the silent status. In simple terms, you should list virus names (or parts of them) that you know do *not* forge the From address. A good example of this is a document macro virus or a Joke program. ++Strings listed here will be searched for in the output of the virus scanners. It works to achieve the opposite effect of the "Silent Viruses" listed above. If a string here is found in the output of the virus scanners, then the message will be treated as if it were not infected with a "Silent Virus". If a message is detected as both a silent virus and a non\-forging virus, then the non\-forging status will override the silent status. In simple terms, you should list virus names (or parts of them) that you know do *not* forge the From address. A good example of this is a document macro virus or a Joke program. Another word that can be put in this list is the special keyword "Zip\-.Password". Inserting this will cause senders to be warned about password\-protected zip files, whey they are not allowed. + + .SH "Options specific to ClamAV Anti-Virus" + .TP diff --git a/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html b/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html new file mode 100644 index 000000000000..9b022b925644 --- /dev/null +++ b/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html @@ -0,0 +1,117 @@ +--- ../MailScanner-4.28.5.orig/docs/man/MailScanner.conf.5.html Mon Mar 8 10:41:05 2004 ++++ docs/man/MailScanner.conf.5.html Mon Mar 8 10:42:01 2004 +@@ -1,5 +1,5 @@ + <!-- Creator : groff version 1.19 --> +-<!-- CreationDate: Mon Feb 23 12:00:39 2004 --> ++<!-- CreationDate: Mon Mar 8 10:33:06 2004 --> + <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" + "http://www.w3.org/TR/html4/loose.dtd"> + <html> +@@ -1048,6 +1048,29 @@ + <tr valign="top" align="left"> + <td width="11%"></td> + <td width="89%"> ++<p><b>Allow Password−Protected Archives</b></p></td> ++</table> ++<!-- INDENTATION --> ++<table width="100%" border=0 rules="none" frame="void" ++ cols="2" cellspacing="0" cellpadding="0"> ++<tr valign="top" align="left"> ++<td width="22%"></td> ++<td width="78%"> ++<p>Default: no</p> ++<!-- INDENTATION --> ++<p>Should archives which contain any ++password−protected files be allowed? Leaving this set ++to "no" is a good way of protecting against all ++the protected zip files used by viruses at the moment. This ++can also be the filename of a ruleset.</p> ++</td> ++</table> ++<!-- INDENTATION --> ++<table width="100%" border=0 rules="none" frame="void" ++ cols="2" cellspacing="0" cellpadding="0"> ++<tr valign="top" align="left"> ++<td width="11%"></td> ++<td width="89%"> + <p><b>Maximum Message Size</b></p></td> + </table> + <!-- INDENTATION --> +@@ -1093,6 +1116,29 @@ + attachments.</p> + </td> + </table> ++<!-- INDENTATION --> ++<table width="100%" border=0 rules="none" frame="void" ++ cols="2" cellspacing="0" cellpadding="0"> ++<tr valign="top" align="left"> ++<td width="11%"></td> ++<td width="89%"> ++<p><b>Maximum Archive Depth</b></p></td> ++</table> ++<!-- INDENTATION --> ++<table width="100%" border=0 rules="none" frame="void" ++ cols="2" cellspacing="0" cellpadding="0"> ++<tr valign="top" align="left"> ++<td width="22%"></td> ++<td width="78%"> ++<p>Default: 3</p> ++<!-- INDENTATION --> ++<p>The maximum depth to which zip archives will be unpacked ++to allow for checking filenames and filetypes within zip ++archives. Setting this to 0 will disable ++filename/−type checks within zip files while still ++allowing to block password protected zip files.</p> ++</td> ++</table> + <a name="Options specific to Sophos Anti-Virus"></a> + <h2>Options specific to Sophos Anti-Virus</h2> + <!-- INDENTATION --> +@@ -1247,7 +1293,7 @@ + kaspersky−4.5, kavdaemonclient, inoculate, inoculan, + onoculan, nod32, nod32−1.99, f−secure, + f−prot, panda, rav, antivir, clamav, clamavmodule, +-trend, bitdefender, none (no virus scanning at all)</p> ++css, trend, bitdefender, none (no virus scanning at all)</p> + <!-- INDENTATION --> + <p>Note for McAfee users: Do NOT use any symlinks with + McAfee at all. It is very strange but McAfee may not detect +@@ -1329,16 +1375,22 @@ + fake addresses on messages they send, so there is no point + informing the sender of the message, as it won’t + actually be them who sent it anyway. Other words that can be +-put in this list are the 3 special keywords<br> ++put in this list are the 5 special keywords<br> + HTML−IFrame: inserting this will stop senders being + warned about HTML Iframe tags, when they are not + allowed.<br> + HTML−Codebase: inserting this will stop senders being + warned about HTML Object Codebase tags, when they are not + allowed.<br> ++Zip−Password: inserting this will stop senders being ++warned about password−protected zip files when they ++are not allowd. This keyword is not needed if you include ++All−Viruses.<br> + All−Viruses: inserting this will stop senders being + warned about any virus, while still allowing you to warn +-senders about HTML−based attacks.</p> ++senders about HTML−based attacks. This includes ++Zip−Password so you don’t need to include ++both.</p> + <!-- INDENTATION --> + <p>The default of "All−Viruses" means that + no senders of viruses will be notified (as the sender +@@ -1400,8 +1452,11 @@ + non−forging status will override the silent status. In + simple terms, you should list virus names (or parts of them) + that you know do *not* forge the From address. A good +-example of this is a document macro virus or a Joke +-program.</p> ++example of this is a document macro virus or a Joke program. ++Another word that can be put in this list is the special ++keyword "Zip−.Password". Inserting this will ++cause senders to be warned about password−protected ++zip files, whey they are not allowed.</p> + </td> + </table> + <a name="Options specific to ClamAV Anti-Virus"></a> diff --git a/mail/mailscanner/pkg-plist b/mail/mailscanner/pkg-plist index aae53fdbde98..0b93f16e7bc1 100644 --- a/mail/mailscanner/pkg-plist +++ b/mail/mailscanner/pkg-plist @@ -534,7 +534,6 @@ libexec/MailScanner/update_virus_scanners @dirrm %%DATADIR%%/reports/de @dirrm %%DATADIR%%/reports/cz @dirrm %%DATADIR%%/reports/cy+en -@dirrm %%DATADIR%%/reports/cat @dirrm %%DATADIR%%/reports/ca @dirrm %%DATADIR%%/reports @dirrm %%DATADIR%% |