From 27a28509faca3d6c79d5d5f2808c506454e4c97d Mon Sep 17 00:00:00 2001 From: Tilman Keskinoz Date: Fri, 19 Mar 2004 16:26:08 +0000 Subject: Update to 4.28.6 PR: 64416 Submitted by: Jan-Peter Koopmann --- .../files/patch-docs:man:MailScanner.conf.5.html | 117 --------------------- 1 file changed, 117 deletions(-) delete mode 100644 mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html (limited to 'mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html') diff --git a/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html b/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html deleted file mode 100644 index 9b022b925644..000000000000 --- a/mail/mailscanner/files/patch-docs:man:MailScanner.conf.5.html +++ /dev/null @@ -1,117 +0,0 @@ ---- ../MailScanner-4.28.5.orig/docs/man/MailScanner.conf.5.html Mon Mar 8 10:41:05 2004 -+++ docs/man/MailScanner.conf.5.html Mon Mar 8 10:42:01 2004 -@@ -1,5 +1,5 @@ - -- -+ - - -@@ -1048,6 +1048,29 @@ - - - -+

Allow Password−Protected Archives

-+ -+ -+ -+ -+ -+ -+
-+

Default: no

-+ -+

Should archives which contain any -+password−protected files be allowed? Leaving this set -+to "no" is a good way of protecting against all -+the protected zip files used by viruses at the moment. This -+can also be the filename of a ruleset.

-+
-+ -+ -+ -+ -+ -
-

Maximum Message Size

- -@@ -1093,6 +1116,29 @@ - attachments.

- - -+ -+ -+ -+ -+ -+
-+

Maximum Archive Depth

-+ -+ -+ -+ -+ -+
-+

Default: 3

-+ -+

The maximum depth to which zip archives will be unpacked -+to allow for checking filenames and filetypes within zip -+archives. Setting this to 0 will disable -+filename/−type checks within zip files while still -+allowing to block password protected zip files.

-+
- -

Options specific to Sophos Anti-Virus

- -@@ -1247,7 +1293,7 @@ - kaspersky−4.5, kavdaemonclient, inoculate, inoculan, - onoculan, nod32, nod32−1.99, f−secure, - f−prot, panda, rav, antivir, clamav, clamavmodule, --trend, bitdefender, none (no virus scanning at all)

-+css, trend, bitdefender, none (no virus scanning at all)

- -

Note for McAfee users: Do NOT use any symlinks with - McAfee at all. It is very strange but McAfee may not detect -@@ -1329,16 +1375,22 @@ - fake addresses on messages they send, so there is no point - informing the sender of the message, as it won’t - actually be them who sent it anyway. Other words that can be --put in this list are the 3 special keywords
-+put in this list are the 5 special keywords
- HTML−IFrame: inserting this will stop senders being - warned about HTML Iframe tags, when they are not - allowed.
- HTML−Codebase: inserting this will stop senders being - warned about HTML Object Codebase tags, when they are not - allowed.
-+Zip−Password: inserting this will stop senders being -+warned about password−protected zip files when they -+are not allowd. This keyword is not needed if you include -+All−Viruses.
- All−Viruses: inserting this will stop senders being - warned about any virus, while still allowing you to warn --senders about HTML−based attacks.

-+senders about HTML−based attacks. This includes -+Zip−Password so you don’t need to include -+both.

- -

The default of "All−Viruses" means that - no senders of viruses will be notified (as the sender -@@ -1400,8 +1452,11 @@ - non−forging status will override the silent status. In - simple terms, you should list virus names (or parts of them) - that you know do *not* forge the From address. A good --example of this is a document macro virus or a Joke --program.

-+example of this is a document macro virus or a Joke program. -+Another word that can be put in this list is the special -+keyword "Zip−.Password". Inserting this will -+cause senders to be warned about password−protected -+zip files, whey they are not allowed.

- - - -- cgit v1.2.3