On Tue, Aug 15, 2006 at 08:50:25AM -0500, Jack Stone wrote:
[Dallman wrote:]
IOW, run vsnag if you want, and then afterward write a recipe
of your own to do whatever you want with what you find in
$H_BTM_HOST.
Hello Dallman & glad to hear from you again & I enjoyed your
Vsnag work.
I have since for many months now been using Clamav and found it
to be very thorough in catching viruses. It updates the virus
list every 15 mins -- when I started using it, the list was abour
40k+ and note now it exceeds 60k in just a few months.
You Vsnag is very good indeed, but the only "snag" problem I kept
getting was some FP attachments which I get from a lot of my Tech
writers. I just couldn't solve that issue -- probebly my fault as
one can see I am script-challenged.
That would, indeed, be easy to fix. I have nothing against clamscan.
I'm getting almost all of the stuff out of the way first, though, without
needing to call it, in a procmail-only solution.
I will look at your suggestions and see what I can do futher with this idea
of using Procmail to check against a target zone at dnsbl.sorbs.net.
Even if you didn't want to quarantine messages based on vsnag, you
could *still* use it and set VS_NONDELIVER = ON in the profile
file, and still have use of the variables it sets. Not that that
is what I'm recommending. But it's a lot less "work" than that
b0rken perl script.
Dallman
____________________________________________________________
procmail mailing list Procmail homepage: http://www.procmail.org/
procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail