summaryrefslogtreecommitdiffstats
path: root/security/antivir-milter/files
diff options
context:
space:
mode:
authornetchild <netchild@FreeBSD.org>2004-03-05 15:08:29 +0000
committernetchild <netchild@FreeBSD.org>2004-03-05 15:08:29 +0000
commit86bd4930cc53c2f4bfdee5f518eebb32497be396 (patch)
tree260c934363563a7d3b0b4d11485de53b47555fd3 /security/antivir-milter/files
parentbd011afeda4e464c4101d6067e98bf354115dd94 (diff)
downloadFreeBSD-ports-86bd4930cc53c2f4bfdee5f518eebb32497be396.zip
FreeBSD-ports-86bd4930cc53c2f4bfdee5f518eebb32497be396.tar.gz
HEADS-UP: When updating from a previous version you have to do the following
after deinstalling the old port: # rm PREFIX/AntiVir/antivir # rm PREFIX/AntiVir/antivir.vdf # chown root:wheel PREFIX/AntiVir # chown root:smmsp PREFIX/AntiVir/hbedv.key In your SENDMAIL_MC change `S=unix:PREFIX/AntiVir/avmilter.sock, F=T, T=S:10m;R:10m;E:5m' to: `S=unix:/var/spool/avmilter/avmilter.sock, F=T, T=S:10m;R:10m;E:10m' and rebuild sendmail.cf. If /var/spool/avmilter exist you have to: # chown -R smmsp:smmsp /var/spool/avmilter If you are using a customized PREFIX/etc/avmilter.conf the port won't remove it on deinstall and you have to manually change User and Group to smmsp there. Afterwards you can install the new version of this port. You then should run antivirupdater to get a current VDF. - Change ownership of the socket to user and group smmsp as expected by sendmail. This involves running the milter as smmsp:smmsp, changing the ownership of rest of the files and moving the socket to /var/spool/avmilter but fixes the "local socket unsafe" problem. [1] - Move the milter into the background when launching, this solves the problem with disappearing socket on boot. [2] - Update to 1.1-beta which fixes the "Bad file descriptor" problem. For a full list of chances see ChangeLog in the DOCSDIR. [3] Suggested by: ache@ [1], [3] Suggested by: Martin P. Hellwig <mhellwig@xs4all.nl> [2] Submitted by: maintainer
Diffstat (limited to 'security/antivir-milter/files')
-rw-r--r--security/antivir-milter/files/patch-doc::MANUAL112
-rw-r--r--security/antivir-milter/files/patch-etc::antivir.conf14
-rw-r--r--security/antivir-milter/files/patch-etc::avmilter.conf23
-rw-r--r--security/antivir-milter/files/patch-init::rc.avmilter6
4 files changed, 129 insertions, 26 deletions
diff --git a/security/antivir-milter/files/patch-doc::MANUAL b/security/antivir-milter/files/patch-doc::MANUAL
new file mode 100644
index 0000000..b1493ce
--- /dev/null
+++ b/security/antivir-milter/files/patch-doc::MANUAL
@@ -0,0 +1,112 @@
+--- doc/MANUAL.orig Wed Jan 28 11:48:04 2004
++++ doc/MANUAL Mon Mar 1 01:08:06 2004
+@@ -3,39 +3,39 @@
+
+ To start, stop, restart AntiVir Milter:
+
+- # /usr/sbin/rcavmilter [start|stop|status|restart]
++ # %%PREFIX%%/etc/rc.d/antivir-milter.sh [start|stop|status|restart]
+
+ When executed successfully, a message from AntiVir Milter with
+ the scan engine version and VDF version is present in the log file
+-/var/log/mail, /var/log/maillog or /var/log/mail.log
++/var/log/maillog
+
+
+ 2. Copying the license file
+ ---------------------------
+
+ If you have a license file for commercial or privat user,
+-copy the license file *.key to the folder /usr/lib/AntiVir and
+-set the access rights of user and group to default uucp:
+-
+- # cp hbedv.key /usr/lib/AntiVir/
+- # chown uucp:uucp /usr/lib/AntiVir/avmgate.key
++copy the license file *.key to the folder %%PREFIX%%/AntiVir and
++set the access rights of user root and group smmsp:
+
++ # cp hbedv.key %%PREFIX%%/AntiVir/
++ # chown root:smmsp %%PREFIX%%/AntiVir/hbedv.key
++ # chmod 440 %%PREFIX%%/AntiVir/hbedv.key
+
+ 3. Configuring AntiVir Milter
+ -----------------------------
+
+-AntiVir Milter provides the configuration file /etc/avmilter.conf:
++AntiVir Milter provides the configuration file %%PREFIX%%/etc/avmilter.conf:
+ The following directives are available:
+
+-# User uucp
+-# Group uucp
++# User smmsp
++# Group smmsp
+ # Postmaster postmaster
+ # MyHostName localhost
+ # SpoolDir /var/spool/avmilter
+-# AntiVirDir /usr/lib/AntiVir
++# AntiVirDir %%PREFIX%%/AntiVir
+ # TemporaryDir /var/tmp
+ # MinFreeBlocks 100
+-# ForwardTo /usr/lib/sendmail -oem -oi
++# ForwardTo /usr/sbin/sendmail -oem -oi
+ # MaxNestingLevel 20
+ # MaxAttachments 100
+ # BlockSuspiciousMime NO
+@@ -43,7 +43,7 @@
+ # VirusAlertToRcpt NO
+ # VirusAlertToSender NO
+ # VirusAlertToPostmaster YES
+-# VirusAlertsUser AntiVir
++# VirusAlertsUser MAILER-DAEMON
+ # RejectVirusMail NO
+ # ScanInArchive YES
+ # ArchiveMaxSize 0
+@@ -64,21 +64,21 @@
+ # LogFile NO
+ # MaxRecipientsPerMessage 100
+
+-For a detailed description see /etc/avmilter.conf.
++For a detailed description see %%PREFIX%%/etc/avmilter.conf.
+
+
+ 4. Configuring automatic update
+ -------------------------------
+
+ Add the following line for a daily update at e.g. 0:25 a.m.:
+-25 0 * * * root /usr/lib/AntiVir/antivir --update -q
++25 0 * * * root %%PREFIX%%/sbin/antivirupdater -q
+
+ When using a proxy server, enter name server name and connection
+ in the file antivir.conf.
+
+-The file /etc/antivir.conf contains settable parameters effecting
+-the automatic virus protection updates. The following directives
+-are provided:
++The file %%PREFIX%%/etc/antivir.conf contains settable parameters
++effecting the automatic virus protection updates. The following
++directives are provided:
+
+ # EmailTo root@localhost
+ # LogTo /var/log/antivir.log
+@@ -88,10 +88,10 @@
+ # HTTPProxyPassword password
+ # SyslogFacility user
+ # SyslogPriority notice
+-# GnuPGBinary
++# GnuPGBinary %%PREFIX%%/bin/gpg
+ # GnuPGOptions
+
+-For a detailled description see /etc/avmilter.conf.
++For a detailled description see %%PREFIX%%/etc/avmilter.conf.
+
+
+ 5. Notification Templates
+@@ -101,7 +101,7 @@
+ have the possibility to define your own text in virus and
+ pathological notification mails.
+
+-The directory /usr/lib/AntiVir/templates contains the
++The directory %%PREFIX%%/AntiVir/templates contains the
+ following files:
+
+ patho-administrator
diff --git a/security/antivir-milter/files/patch-etc::antivir.conf b/security/antivir-milter/files/patch-etc::antivir.conf
index 2da8e00..aad22f6 100644
--- a/security/antivir-milter/files/patch-etc::antivir.conf
+++ b/security/antivir-milter/files/patch-etc::antivir.conf
@@ -1,19 +1,11 @@
--- etc/antivir.conf.orig Mon Dec 8 17:09:11 2003
+++ etc/antivir.conf Mon Dec 8 17:11:16 2003
-@@ -52,7 +52,7 @@
+@@ -36,7 +36,7 @@
# advantage of GnuPG, be aware that all updates will fail
# until the AntiVir public key (antivir.gpg) has been
# added to your keyring and signed.
--#GnuPGBinary /usr/local/bin/gpg
+-#GnuPGBinary
+#GnuPGBinary %%PREFIX%%/bin/gpg
+
# If you are utilizing GnuPG, you may also specify
- # options that your particular setup might need.
-@@ -63,6 +63,7 @@
- # of software which are not viruses but might not be wanted.
- # By default all these tests are turned off. They can be enabled
- # by uncommenting the following keywords.
-+# These options are only available in commercial mode.
- #DetectDialer
- #DetectJoke
- #DetectGame
diff --git a/security/antivir-milter/files/patch-etc::avmilter.conf b/security/antivir-milter/files/patch-etc::avmilter.conf
index 34a6ed3..341c81f 100644
--- a/security/antivir-milter/files/patch-etc::avmilter.conf
+++ b/security/antivir-milter/files/patch-etc::avmilter.conf
@@ -6,8 +6,8 @@
-# User uucp
-# Group uucp
-+User daemon
-+Group daemon
++User smmsp
++Group smmsp
# ------------------------------------------------------------------------
@@ -38,25 +38,24 @@
# ------------------------------------------------------------------------
-@@ -118,7 +118,7 @@
- # ------------------------------------------------------------------------
- # User name of sender of virus alerts, if virus was found in a mail.
-
--# VirusAlertsUser AntiVir
+@@ -121,6 +121,7 @@
+ # VirusAlertsUser AvMilter
+ # or
+ # VirusAlertsUser someone@anywhere.tld
+VirusAlertsUser MAILER-DAEMON
# ------------------------------------------------------------------------
-@@ -169,7 +169,7 @@
+@@ -171,7 +172,7 @@
# If BlockSuspiciousArchive is YES, stop delivery of mails
- # containing archives if MaxRecursionDepthInArchive has been reached.
+ # containing archives if ArchiveMaxRecursion has been reached.
-# BlockSuspiciousArchive NO
+# BlockSuspiciousArchive NO
# ------------------------------------------------------------------------
-@@ -179,7 +179,7 @@
+@@ -181,7 +182,7 @@
# If BlockEncryptedArchive is YES, stop delivery of mails
# containing encrypted files in an archive.
@@ -65,7 +64,7 @@
# ------------------------------------------------------------------------
-@@ -188,7 +188,7 @@
+@@ -189,7 +190,7 @@
# to the header of checked mail. E.g.: "X-AntiVirus: Checked by ..."
# This option is only available in commercial mode.
@@ -74,7 +73,7 @@
# ------------------------------------------------------------------------
-@@ -203,7 +203,7 @@
+@@ -204,7 +205,7 @@
# ScanTimeout specifies the scan time of mail, in seconds, when to stop
# scanning of mails.
diff --git a/security/antivir-milter/files/patch-init::rc.avmilter b/security/antivir-milter/files/patch-init::rc.avmilter
index 92d27def..80d874e 100644
--- a/security/antivir-milter/files/patch-init::rc.avmilter
+++ b/security/antivir-milter/files/patch-init::rc.avmilter
@@ -8,10 +8,10 @@
- /usr/sbin/avmilter -p inet:3333@localhost
+ if [ -x %%PREFIX%%/sbin/avmilter ]; then
+ umask 0077
-+ rm -f %%PREFIX%%/AntiVir/avmilter.sock
++ rm -f /var/spool/avmilter/avmilter.sock
+ %%PREFIX%%/sbin/avmilter \
+ -C %%PREFIX%%/etc/avmilter.conf \
-+ -p local:%%PREFIX%%/AntiVir/avmilter.sock
++ -p local:/var/spool/avmilter/avmilter.sock &
+ umask 0022
+ echo -n " antivir-milter"
+ fi
@@ -21,7 +21,7 @@
- killall -TERM /usr/sbin/avmilter
- echo
+ killall -TERM avmilter
-+ rm -f %%PREFIX%%/AntiVir/avmilter.sock
++ rm -f /var/spool/avmilter/avmilter.sock
+ echo -n " antivir-milter"
;;
restart)
OpenPOWER on IntegriCloud