+++ /dev/null
-use strict;
-
-##
-## AV Scanners (Debian version)
-##
-
-@av_scanners = (
-
-# ### http://www.vanja.com/tools/sophie/
-# ['Sophie',
-# \&ask_daemon, ["{}/\n", '/var/run/sophie'],
-# qr/(?x)^ 0+ ( : | [\000\r\n]* $)/, qr/(?x)^ 1 ( : | [\000\r\n]* $)/,
-# qr/(?x)^ [-+]? \d+ : (.*?) [\000\r\n]* $/ ],
-
-# ### http://www.csupomona.edu/~henson/www/projects/SAVI-Perl/
-# ['Sophos SAVI', \&sophos_savi ],
-
- ### http://www.clamav.net/
- ['ClamAV-clamd',
- \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.ctl"],
- qr/\bOK$/, qr/\bFOUND$/,
- qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
- # NOTE: remember to add the clamav user to the amavis group, and
- # to properly set clamd to init supplementary groups
- # When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd"],
-
-# ### http://www.clamav.net/ and CPAN (memory-hungry! clamd is preferred)
-# ['Mail::ClamAV', \&ask_clamav, "*", [0], [1], qr/^INFECTED: (.+)/],
-
-# ### http://www.openantivirus.org/
-# ['OpenAntiVirus ScannerDaemon (OAV)',
-# \&ask_daemon, ["SCAN {}\n", '127.0.0.1:8127'],
-# qr/^OK/, qr/^FOUND: /, qr/^FOUND: (.+)/ ],
-
-# ### http://www.vanja.com/tools/trophie/
-# ['Trophie',
-# \&ask_daemon, ["{}/\n", '/var/run/trophie'],
-# qr/(?x)^ 0+ ( : | [\000\r\n]* $)/, qr/(?x)^ 1 ( : | [\000\r\n]* $)/,
-# qr/(?x)^ [-+]? \d+ : (.*?) [\000\r\n]* $/ ],
-
-# ### http://www.grisoft.com/
-# ['AVG Anti-Virus',
-# \&ask_daemon, ["SCAN {}\n", '127.0.0.1:55555'],
-# qr/^200/, qr/^403/, qr/^403 .*?: ([^\r\n]+)/ ],
-
-# ### http://www.f-prot.com/
-# ['FRISK F-Prot Daemon',
-# \&ask_daemon,
-# ["GET {}/*?-dumb%20-archive%20-packed HTTP/1.0\r\n\r\n",
-# ['127.0.0.1:10200','127.0.0.1:10201','127.0.0.1:10202',
-# '127.0.0.1:10203','127.0.0.1:10204'] ],
-# qr/(?i)<summary[^>]*>clean<\/summary>/,
-# qr/(?i)<summary[^>]*>infected<\/summary>/,
-# qr/(?i)<name>(.+)<\/name>/ ],
-
-# ### http://www.sald.com/, http://www.dials.ru/english/, http://www.drweb.ru/
-# ['DrWebD', \&ask_daemon, # DrWebD 4.31 or later
-# [pack('N',1). # DRWEBD_SCAN_CMD
-# pack('N',0x00280001). # DONT_CHANGEMAIL, IS_MAIL, RETURN_VIRUSES
-# pack('N', # path length
-# length("$TEMPBASE/amavis-yyyymmddTHHMMSS-xxxxx/parts/pxxx")).
-# '{}/*'. # path
-# pack('N',0). # content size
-# pack('N',0),
-# '/var/drweb/run/drwebd.sock',
-# # '/var/amavis/var/run/drwebd.sock', # suitable for chroot
-# # '/usr/local/drweb/run/drwebd.sock', # FreeBSD drweb ports default
-# # '127.0.0.1:3000', # or over an inet socket
-# ],
-# qr/\A\x00[\x10\x11][\x00\x10]\x00/s, # IS_CLEAN,EVAL_KEY; SKIPPED
-# qr/\A\x00[\x00\x01][\x00\x10][\x20\x40\x80]/s, # KNOWN_V,UNKNOWN_V,V._MODIF
-# qr/\A.{12}(?:infected with )?([^\x00]+)\x00/s,
-# ],
-# # NOTE: If using amavis-milter, change length to:
-# # length("$TEMPBASE/amavis-milter-xxxxxxxxxxxxxx/parts/pxxx").
-
- ### http://www.kaspersky.com/ (kav4mailservers)
- ['KasperskyLab AVP - aveclient',
- ['/usr/local/kav/bin/aveclient','/usr/local/share/kav/bin/aveclient',
- '/opt/kav/bin/aveclient','aveclient'],
- '-p /var/run/aveserver -s {}/*', [0,3,6,8], qr/\b(INFECTED|SUSPICION)\b/,
- qr/(?:INFECTED|SUSPICION) (.+)/,
- ],
-
- ### http://www.kaspersky.com/
- ['KasperskyLab AntiViral Toolkit Pro (AVP)', ['avp'],
- '-* -P -B -Y -O- {}', [0,3,6,8], [2,4], # any use for -A -K ?
- qr/infected: (.+)/,
- sub {chdir('/opt/AVP') or die "Can't chdir to AVP: $!"},
- sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
- ],
-
- ### The kavdaemon and AVPDaemonClient have been removed from Kasperky
- ### products and replaced by aveserver and aveclient
- ['KasperskyLab AVPDaemonClient',
- [ '/opt/AVP/kavdaemon', 'kavdaemon',
- '/opt/AVP/AvpDaemonClient', 'AvpDaemonClient',
- '/opt/AVP/AvpTeamDream', 'AvpTeamDream',
- '/opt/AVP/avpdc', 'avpdc' ],
- "-f=$TEMPBASE {}", [0,8], [3,4,5,6], qr/infected: ([^\r\n]+)/ ],
- # change the startup-script in /etc/init.d/kavd to:
- # DPARMS="-* -Y -dl -f=/var/amavis /var/amavis"
- # (or perhaps: DPARMS="-I0 -Y -* /var/amavis" )
- # adjusting /var/amavis above to match your $TEMPBASE.
- # The '-f=/var/amavis' is needed if not running it as root, so it
- # can find, read, and write its pid file, etc., see 'man kavdaemon'.
- # defUnix.prf: there must be an entry "*/var/amavis" (or whatever
- # directory $TEMPBASE specifies) in the 'Names=' section.
- # cd /opt/AVP/DaemonClients; configure; cd Sample; make
- # cp AvpDaemonClient /opt/AVP/
- # su - vscan -c "${PREFIX}/kavdaemon ${DPARMS}"
-
- ### http://www.hbedv.com/ or http://www.centralcommand.com/
- ['H+BEDV AntiVir or CentralCommand Vexira Antivirus',
- ['antivir','vexira'],
- '--allfiles -noboot -nombr -rs -s -z {}', [0], qr/ALERT:|VIRUS:/,
- qr/(?x)^\s* (?: ALERT: \s* (?: \[ | [^']* ' ) |
- (?i) VIRUS:\ .*?\ virus\ '?) ( [^\]\s']+ )/ ],
- # NOTE: if you only have a demo version, remove -z and add 214, as in:
- # '--allfiles -noboot -nombr -rs -s {}', [0,214], qr/ALERT:|VIRUS:/,
- # According to the documentations, the new version of Vexira has
- # reasonable defaults, one may consider: "--timeout=60 --temp=$TEMPBASE {}"
-
- ### http://www.commandsoftware.com/
- ['Command AntiVirus for Linux', 'csav',
- '-all -archive -packed {}', [50], [51,52,53],
- qr/Infection: (.+)/ ],
-
- ### http://www.symantec.com/
- ['Symantec CarrierScan via Symantec CommandLineScanner',
- 'cscmdline', '-a scan -i 1 -v -s 127.0.0.1:7777 {}',
- qr/^Files Infected:\s+0$/, qr/^Infected\b/,
- qr/^(?:Info|Virus Name):\s+(.+)/ ],
-
- ### http://www.symantec.com/
- ['Symantec AntiVirus Scan Engine',
- 'savsecls', '-server 127.0.0.1:7777 -mode scanrepair -details -verbose {}',
- [0], qr/^Infected\b/,
- qr/^(?:Info|Virus Name):\s+(.+)/ ],
- # NOTE: check options and patterns to see which entry better applies
-
- ### http://www.f-secure.com/products/anti-virus/
- ['F-Secure Antivirus', 'fsav',
- '--dumb --mime --archive {}', [0], [3,8],
- qr/(?:infection|Infected|Suspected): (.+)/ ],
-
-# ### http://www.avast.com/
-# ['avast! Antivirus daemon',
-# \&ask_daemon, # greets with 220, terminate with QUIT
-# ["SCAN {}\015\012QUIT\015\012", '/var/run/avast4/mailscanner.sock'],
-# qr/\t\[\+\]/, qr/\t\[L\]\t/, qr/\t\[L\]\t([^[ \t\015\012]+)/ ],
-
-# ### http://www.avast.com/
-# ['avast! Antivirus - Client/Server Version', 'avastlite',
-# '-a /var/run/avast4/mailscanner.sock -n {}', [0], [1],
-# qr/\t\[L\]\t([^[ \t\015\012]+)/ ],
-
- ['CAI InoculateIT', 'inocucmd', # retired product
- '-sec -nex {}', [0], [100],
- qr/was infected by virus (.+)/ ],
- # see: http://www.flatmtn.com/computer/Linux-Antivirus_CAI.html
-
- ### http://www3.ca.com/Solutions/Product.asp?ID=156 (ex InoculateIT)
- ['CAI eTrust Antivirus', 'etrust-wrapper',
- '-arc -nex -spm h {}', [0], [101],
- qr/is infected by virus: (.+)/ ],
- # NOTE: requires suid wrapper around inocmd32; consider flag: -mod reviewer
- # see http://marc.theaimsgroup.com/?l=amavis-user&m=109229779912783
-
- ### http://mks.com.pl/english.html
- ['MkS_Vir for Linux (beta)', ['mks32','mks'],
- '-s {}/*', [0], [1,2],
- qr/--[ \t]*(.+)/ ],
-
- ### http://mks.com.pl/english.html
- ['MkS_Vir daemon', 'mksscan',
- '-s -q {}', [0], [1..7],
- qr/^... (\S+)/ ],
-
- ### http://www.nod32.com/
- ['ESET Software NOD32 Command Line Interface v 2.51', 'nod32cli',
- '--subdir {}', [0,3], [1,2], qr/virus="([^"]+)"/ ],
-
-# ### http://www.nod32.com/ old
-# ['ESET Software NOD32 - Client/Server Version', 'nod32cli',
-# '-a -r -d recurse --heur standard {}', [0], [10,11],
-# qr/^\S+\s+infected:\s+(.+)/ ],
-
-# ### http://www.nod32.com/ old
-# ['ESET Software NOD32', 'nod32',
-# '--arch --mail {}', [0], [1,10], qr/^object=.*, virus="(.*?)",/ ],
-
-# Experimental, based on posting from Rado Dibarbora (Dibo) on 2002-05-31
-# ['ESET Software NOD32 Client/Server (NOD32SS)',
-# \&ask_daemon2, # greets with 200, persistent, terminate with QUIT
-# ["SCAN {}/*\r\n", '127.0.0.1:8448' ],
-# qr/^200 File OK/, qr/^201 /, qr/^201 (.+)/ ],
-
- ### http://www.norman.com/products_nvc.shtml
- ['Norman Virus Control v5 / Linux', 'nvcc',
- '-c -l:0 -s -u -temp:$TEMPBASE {}', [0,10,11], [1,2,14],
- qr/(?i).* virus in .* -> \'(.+)\'/ ],
-
- ### http://www.pandasoftware.com/
- ['Panda Antivirus for Linux', ['pavcl'],
- '-aut -aex -heu -cmp -nbr -nor -nso -eng {}',
- qr/Number of files infected[ .]*: 0+(?!\d)/,
- qr/Number of files infected[ .]*: 0*[1-9]/,
- qr/Found virus :\s*(\S+)/ ],
-
-# ### http://www.pandasoftware.com/
-# ['Panda Antivirus for Linux', ['pavcl'],
-# '-TSR -aut -aex -heu -cmp -nbr -nor -nso -eng {}',
-# [0], [0x10, 0x30, 0x50, 0x70, 0x90, 0xB0, 0xD0, 0xF0],
-# qr/Found virus :\s*(\S+)/ ],
-
-# GeCAD AV technology is acquired by Microsoft; RAV has been discontinued.
-# Check your RAV license terms before fiddling with the following two lines!
-# ['GeCAD RAV AntiVirus 8', 'ravav',
-# '--all --archive --mail {}', [1], [2,3,4,5], qr/Infected: (.+)/ ],
-# # NOTE: the command line switches changed with scan engine 8.5 !
-# # (btw, assigning stdin to /dev/null causes RAV to fail)
-
- ### http://www.nai.com/
- ['NAI McAfee AntiVirus (uvscan)', 'uvscan',
- '--secure -rv --mime --summary --noboot - {}', [0], [13],
- qr/(?x) Found (?:
- \ the\ (.+)\ (?:virus|trojan) |
- \ (?:virus|trojan)\ or\ variant\ (.+?)\s*! |
- :\ (.+)\ NOT\ a\ virus)/,
- # sub {$ENV{LD_PRELOAD}='/lib/libc.so.6'},
- # sub {delete $ENV{LD_PRELOAD}},
- ],
- # NOTE1: with RH9: force the dynamic linker to look at /lib/libc.so.6 before
- # anything else by setting environment variable LD_PRELOAD=/lib/libc.so.6
- # and then clear it when finished to avoid confusing anything else.
- # NOTE2: to treat encrypted files as viruses replace the [13] with:
- # qr/^\s{5,}(Found|is password-protected|.*(virus|trojan))/
-
- ### http://www.virusbuster.hu/en/
- ['VirusBuster', ['vbuster', 'vbengcl'],
- # VirusBuster Ltd. does not support the daemon version for the workstation
- # engine (vbuster-eng-1.12-linux-i386-libc6.tgz) any longer. The names of
- # binaries, some parameters AND return codes have changed (from 3 to 1).
- "{} -ss -i '*' -log=$MYHOME/vbuster.log", [0], [1],
- qr/: '(.*)' - Virus/ ],
-
-# ### http://www.virusbuster.hu/en/
-# ['VirusBuster (Client + Daemon)', 'vbengd',
-# # HINT: for an infected file it always returns 3,
-# # although the man-page tells a different story
-# '-f -log scandir {}', [0], [3],
-# qr/Virus found = (.*);/ ],
-
- ### http://www.cyber.com/
- ['CyberSoft VFind', 'vfind',
- '--vexit {}/*', [0], [23], qr/##==>>>> VIRUS ID: CVDL (.+)/,
- # sub {$ENV{VSTK_HOME}='/usr/lib/vstk'},
- ],
-
- ### http://www.avast.com/
- ['avast! Antivirus', ['/usr/bin/avastcmd','avastcmd'],
- '-a -i -n -t=A {}', [0], [1], qr/\binfected by:\s+([^ \t\n\[\]]+)/ ],
-
- ### http://www.ikarus-software.com/
- ['Ikarus AntiVirus for Linux', 'ikarus',
- '{}', [0], [40], qr/Signature (.+) found/ ],
-
- ### http://www.bitdefender.com/
- ['BitDefender', 'bdc',
- '--arc --mail {}', qr/^Infected files *:0+(?!\d)/,
- qr/^(?:Infected files|Identified viruses|Suspect files) *:0*[1-9]/,
- qr/(?:suspected|infected): (.*)(?:\033|$)/ ],
- # consider also: --all --nowarn --alev=15 --flev=15. The --all argument may
- # not apply to your version of bdc, check documentation and see 'bdc --help'
-
-# ['File::Scan', sub {Amavis::AV::ask_av(sub{
-# use File::Scan; my($fn)=@_;
-# my($f)=File::Scan->new(max_txt_size=>0, max_bin_size=>0);
-# my($vname) = $f->scan($fn);
-# $f->error ? (2,"Error: ".$f->error)
-# : ($vname ne '') ? (1,"$vname FOUND") : (0,"Clean")}, @_) },
-# ["{}/*"], [0], [1], qr/^(.*) FOUND$/ ],
-
- ### example: fully-fledged checker for JPEG marker segments of invalid length
- ['check-jpeg',
- sub { use JpegTester (); Amavis::AV::ask_av(\&JpegTester::test_jpeg, @_) },
- ["{}/*"], undef, [1], qr/^(bad jpeg: .*)$/ ],
- # NOTE: place file JpegTester.pm somewhere where Perl can find it,
- # for example in /usr/local/lib/perl5/site_perl
-
-);
-
-
-@av_scanners_backup = (
-
- ### http://www.clamav.net/ - backs up clamd or Mail::ClamAV
- ['ClamAV-clamscan', 'clamscan',
- "--stdout --no-summary -r --tempdir=$TEMPBASE {}",
- [0], qr/:.*\sFOUND$/, qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
-
- ### http://www.f-prot.com/ - backs up F-Prot Daemon
- ['FRISK F-Prot Antivirus', ['f-prot','f-prot.sh'],
- '-dumb -archive -packed {}', [0,8], [3,6],
- qr/Infection: (.+)/ ],
-
- ### http://www.trendmicro.com/ - backs up Trophie
- ['Trend Micro FileScanner', ['/etc/iscan/vscan','vscan'],
- '-za -a {}', [0], qr/Found virus/, qr/Found virus (.+) in/ ],
-
- ### http://www.sald.com/, http://drweb.imshop.de/ - backs up DrWebD
- ['drweb - DrWeb Antivirus',
- ['/usr/local/drweb/drweb', '/opt/drweb/drweb', 'drweb'],
- '-path={} -al -go -ot -cn -upn -ok-',
- [0,32], [1,9,33], qr' infected (?:with|by)(?: virus)? (.*)$'],
-
- ['KasperskyLab kavscanner', ['/opt/kav/bin/kavscanner','kavscanner'],
- '-i1 -xp {}', [0,10,15], [5,20,21,25],
- qr/(?:CURED|INFECTED|CUREFAILED|WARNING|SUSPICION) (.*)/ ,
- sub {chdir('/opt/kav/bin') or die "Can't chdir to kav: $!"},
- sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
- ],
-
-# Commented out because the name 'sweep' clashes with Debian and FreeBSD
-# package/port of an audio editor. Make sure the correct 'sweep' is found
-# in the path when enabling.
-#
-# ### http://www.sophos.com/ - backs up Sophie or SAVI-Perl
-# ['Sophos Anti Virus (sweep)', 'sweep',
-# '-nb -f -all -rec -ss -sc -archive -cab -tnef --no-reset-atime {}',
-# [0,2], qr/Virus .*? found/,
-# qr/^>>> Virus(?: fragment)? '?(.*?)'? found/,
-# ],
-# # other options to consider: -mime -oe -idedir=/usr/local/sav
-
-# always succeeds (uncomment to consider mail clean if all other scanners fail)
-# ['always-clean', sub {0}],
-
-);
-
-
-1; # ensure a defined return
+++ /dev/null
-use strict;
-
-##
-## AV Scanners (Debian version)
-##
-
-@av_scanners = (
-
-# ### http://www.vanja.com/tools/sophie/
-# ['Sophie',
-# \&ask_daemon, ["{}/\n", '/var/run/sophie'],
-# qr/(?x)^ 0+ ( : | [\000\r\n]* $)/, qr/(?x)^ 1 ( : | [\000\r\n]* $)/,
-# qr/(?x)^ [-+]? \d+ : (.*?) [\000\r\n]* $/ ],
-
-# ### http://www.csupomona.edu/~henson/www/projects/SAVI-Perl/
-# ['Sophos SAVI', \&sophos_savi ],
-
- ### http://www.clamav.net/
- ['ClamAV-clamd',
- \&ask_daemon, ["CONTSCAN {}\n", "/var/run/clamav/clamd.ctl"],
- qr/\bOK$/, qr/\bFOUND$/,
- qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
- # NOTE: remember to add the clamav user to the amavis group, and
- # to properly set clamd to init supplementary groups
- # When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd"],
-
-# ### http://www.clamav.net/ and CPAN (memory-hungry! clamd is preferred)
-# ['Mail::ClamAV', \&ask_clamav, "*", [0], [1], qr/^INFECTED: (.+)/],
-
-# ### http://www.openantivirus.org/
-# ['OpenAntiVirus ScannerDaemon (OAV)',
-# \&ask_daemon, ["SCAN {}\n", '127.0.0.1:8127'],
-# qr/^OK/, qr/^FOUND: /, qr/^FOUND: (.+)/ ],
-
-# ### http://www.vanja.com/tools/trophie/
-# ['Trophie',
-# \&ask_daemon, ["{}/\n", '/var/run/trophie'],
-# qr/(?x)^ 0+ ( : | [\000\r\n]* $)/, qr/(?x)^ 1 ( : | [\000\r\n]* $)/,
-# qr/(?x)^ [-+]? \d+ : (.*?) [\000\r\n]* $/ ],
-
-# ### http://www.grisoft.com/
-# ['AVG Anti-Virus',
-# \&ask_daemon, ["SCAN {}\n", '127.0.0.1:55555'],
-# qr/^200/, qr/^403/, qr/^403 .*?: ([^\r\n]+)/ ],
-
-# ### http://www.f-prot.com/
-# ['FRISK F-Prot Daemon',
-# \&ask_daemon,
-# ["GET {}/*?-dumb%20-archive%20-packed HTTP/1.0\r\n\r\n",
-# ['127.0.0.1:10200','127.0.0.1:10201','127.0.0.1:10202',
-# '127.0.0.1:10203','127.0.0.1:10204'] ],
-# qr/(?i)<summary[^>]*>clean<\/summary>/,
-# qr/(?i)<summary[^>]*>infected<\/summary>/,
-# qr/(?i)<name>(.+)<\/name>/ ],
-
-# ### http://www.sald.com/, http://www.dials.ru/english/, http://www.drweb.ru/
-# ['DrWebD', \&ask_daemon, # DrWebD 4.31 or later
-# [pack('N',1). # DRWEBD_SCAN_CMD
-# pack('N',0x00280001). # DONT_CHANGEMAIL, IS_MAIL, RETURN_VIRUSES
-# pack('N', # path length
-# length("$TEMPBASE/amavis-yyyymmddTHHMMSS-xxxxx/parts/pxxx")).
-# '{}/*'. # path
-# pack('N',0). # content size
-# pack('N',0),
-# '/var/drweb/run/drwebd.sock',
-# # '/var/amavis/var/run/drwebd.sock', # suitable for chroot
-# # '/usr/local/drweb/run/drwebd.sock', # FreeBSD drweb ports default
-# # '127.0.0.1:3000', # or over an inet socket
-# ],
-# qr/\A\x00[\x10\x11][\x00\x10]\x00/s, # IS_CLEAN,EVAL_KEY; SKIPPED
-# qr/\A\x00[\x00\x01][\x00\x10][\x20\x40\x80]/s, # KNOWN_V,UNKNOWN_V,V._MODIF
-# qr/\A.{12}(?:infected with )?([^\x00]+)\x00/s,
-# ],
-# # NOTE: If using amavis-milter, change length to:
-# # length("$TEMPBASE/amavis-milter-xxxxxxxxxxxxxx/parts/pxxx").
-
- ### http://www.kaspersky.com/ (kav4mailservers)
- ['KasperskyLab AVP - aveclient',
- ['/usr/local/kav/bin/aveclient','/usr/local/share/kav/bin/aveclient',
- '/opt/kav/bin/aveclient','aveclient'],
- '-p /var/run/aveserver -s {}/*', [0,3,6,8], qr/\b(INFECTED|SUSPICION)\b/,
- qr/(?:INFECTED|SUSPICION) (.+)/,
- ],
-
- ### http://www.kaspersky.com/
- ['KasperskyLab AntiViral Toolkit Pro (AVP)', ['avp'],
- '-* -P -B -Y -O- {}', [0,3,6,8], [2,4], # any use for -A -K ?
- qr/infected: (.+)/,
- sub {chdir('/opt/AVP') or die "Can't chdir to AVP: $!"},
- sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
- ],
-
- ### The kavdaemon and AVPDaemonClient have been removed from Kasperky
- ### products and replaced by aveserver and aveclient
- ['KasperskyLab AVPDaemonClient',
- [ '/opt/AVP/kavdaemon', 'kavdaemon',
- '/opt/AVP/AvpDaemonClient', 'AvpDaemonClient',
- '/opt/AVP/AvpTeamDream', 'AvpTeamDream',
- '/opt/AVP/avpdc', 'avpdc' ],
- "-f=$TEMPBASE {}", [0,8], [3,4,5,6], qr/infected: ([^\r\n]+)/ ],
- # change the startup-script in /etc/init.d/kavd to:
- # DPARMS="-* -Y -dl -f=/var/amavis /var/amavis"
- # (or perhaps: DPARMS="-I0 -Y -* /var/amavis" )
- # adjusting /var/amavis above to match your $TEMPBASE.
- # The '-f=/var/amavis' is needed if not running it as root, so it
- # can find, read, and write its pid file, etc., see 'man kavdaemon'.
- # defUnix.prf: there must be an entry "*/var/amavis" (or whatever
- # directory $TEMPBASE specifies) in the 'Names=' section.
- # cd /opt/AVP/DaemonClients; configure; cd Sample; make
- # cp AvpDaemonClient /opt/AVP/
- # su - vscan -c "${PREFIX}/kavdaemon ${DPARMS}"
-
- ### http://www.hbedv.com/ or http://www.centralcommand.com/
- ['H+BEDV AntiVir or CentralCommand Vexira Antivirus',
- ['antivir','vexira'],
- '--allfiles -noboot -nombr -rs -s -z {}', [0], qr/ALERT:|VIRUS:/,
- qr/(?x)^\s* (?: ALERT: \s* (?: \[ | [^']* ' ) |
- (?i) VIRUS:\ .*?\ virus\ '?) ( [^\]\s']+ )/ ],
- # NOTE: if you only have a demo version, remove -z and add 214, as in:
- # '--allfiles -noboot -nombr -rs -s {}', [0,214], qr/ALERT:|VIRUS:/,
- # According to the documentations, the new version of Vexira has
- # reasonable defaults, one may consider: "--timeout=60 --temp=$TEMPBASE {}"
-
- ### http://www.commandsoftware.com/
- ['Command AntiVirus for Linux', 'csav',
- '-all -archive -packed {}', [50], [51,52,53],
- qr/Infection: (.+)/ ],
-
- ### http://www.symantec.com/
- ['Symantec CarrierScan via Symantec CommandLineScanner',
- 'cscmdline', '-a scan -i 1 -v -s 127.0.0.1:7777 {}',
- qr/^Files Infected:\s+0$/, qr/^Infected\b/,
- qr/^(?:Info|Virus Name):\s+(.+)/ ],
-
- ### http://www.symantec.com/
- ['Symantec AntiVirus Scan Engine',
- 'savsecls', '-server 127.0.0.1:7777 -mode scanrepair -details -verbose {}',
- [0], qr/^Infected\b/,
- qr/^(?:Info|Virus Name):\s+(.+)/ ],
- # NOTE: check options and patterns to see which entry better applies
-
- ### http://www.f-secure.com/products/anti-virus/
- ['F-Secure Antivirus', 'fsav',
- '--dumb --mime --archive {}', [0], [3,8],
- qr/(?:infection|Infected|Suspected): (.+)/ ],
-
-# ### http://www.avast.com/
-# ['avast! Antivirus daemon',
-# \&ask_daemon, # greets with 220, terminate with QUIT
-# ["SCAN {}\015\012QUIT\015\012", '/var/run/avast4/mailscanner.sock'],
-# qr/\t\[\+\]/, qr/\t\[L\]\t/, qr/\t\[L\]\t([^[ \t\015\012]+)/ ],
-
-# ### http://www.avast.com/
-# ['avast! Antivirus - Client/Server Version', 'avastlite',
-# '-a /var/run/avast4/mailscanner.sock -n {}', [0], [1],
-# qr/\t\[L\]\t([^[ \t\015\012]+)/ ],
-
- ['CAI InoculateIT', 'inocucmd', # retired product
- '-sec -nex {}', [0], [100],
- qr/was infected by virus (.+)/ ],
- # see: http://www.flatmtn.com/computer/Linux-Antivirus_CAI.html
-
- ### http://www3.ca.com/Solutions/Product.asp?ID=156 (ex InoculateIT)
- ['CAI eTrust Antivirus', 'etrust-wrapper',
- '-arc -nex -spm h {}', [0], [101],
- qr/is infected by virus: (.+)/ ],
- # NOTE: requires suid wrapper around inocmd32; consider flag: -mod reviewer
- # see http://marc.theaimsgroup.com/?l=amavis-user&m=109229779912783
-
- ### http://mks.com.pl/english.html
- ['MkS_Vir for Linux (beta)', ['mks32','mks'],
- '-s {}/*', [0], [1,2],
- qr/--[ \t]*(.+)/ ],
-
- ### http://mks.com.pl/english.html
- ['MkS_Vir daemon', 'mksscan',
- '-s -q {}', [0], [1..7],
- qr/^... (\S+)/ ],
-
- ### http://www.nod32.com/
- ['ESET Software NOD32 Command Line Interface v 2.51', 'nod32cli',
- '--subdir {}', [0,3], [1,2], qr/virus="([^"]+)"/ ],
-
-# ### http://www.nod32.com/ old
-# ['ESET Software NOD32 - Client/Server Version', 'nod32cli',
-# '-a -r -d recurse --heur standard {}', [0], [10,11],
-# qr/^\S+\s+infected:\s+(.+)/ ],
-
-# ### http://www.nod32.com/ old
-# ['ESET Software NOD32', 'nod32',
-# '--arch --mail {}', [0], [1,10], qr/^object=.*, virus="(.*?)",/ ],
-
-# Experimental, based on posting from Rado Dibarbora (Dibo) on 2002-05-31
-# ['ESET Software NOD32 Client/Server (NOD32SS)',
-# \&ask_daemon2, # greets with 200, persistent, terminate with QUIT
-# ["SCAN {}/*\r\n", '127.0.0.1:8448' ],
-# qr/^200 File OK/, qr/^201 /, qr/^201 (.+)/ ],
-
- ### http://www.norman.com/products_nvc.shtml
- ['Norman Virus Control v5 / Linux', 'nvcc',
- '-c -l:0 -s -u -temp:$TEMPBASE {}', [0,10,11], [1,2,14],
- qr/(?i).* virus in .* -> \'(.+)\'/ ],
-
- ### http://www.pandasoftware.com/
- ['Panda Antivirus for Linux', ['pavcl'],
- '-aut -aex -heu -cmp -nbr -nor -nso -eng {}',
- qr/Number of files infected[ .]*: 0+(?!\d)/,
- qr/Number of files infected[ .]*: 0*[1-9]/,
- qr/Found virus :\s*(\S+)/ ],
-
-# ### http://www.pandasoftware.com/
-# ['Panda Antivirus for Linux', ['pavcl'],
-# '-TSR -aut -aex -heu -cmp -nbr -nor -nso -eng {}',
-# [0], [0x10, 0x30, 0x50, 0x70, 0x90, 0xB0, 0xD0, 0xF0],
-# qr/Found virus :\s*(\S+)/ ],
-
-# GeCAD AV technology is acquired by Microsoft; RAV has been discontinued.
-# Check your RAV license terms before fiddling with the following two lines!
-# ['GeCAD RAV AntiVirus 8', 'ravav',
-# '--all --archive --mail {}', [1], [2,3,4,5], qr/Infected: (.+)/ ],
-# # NOTE: the command line switches changed with scan engine 8.5 !
-# # (btw, assigning stdin to /dev/null causes RAV to fail)
-
- ### http://www.nai.com/
- ['NAI McAfee AntiVirus (uvscan)', 'uvscan',
- '--secure -rv --mime --summary --noboot - {}', [0], [13],
- qr/(?x) Found (?:
- \ the\ (.+)\ (?:virus|trojan) |
- \ (?:virus|trojan)\ or\ variant\ (.+?)\s*! |
- :\ (.+)\ NOT\ a\ virus)/,
- # sub {$ENV{LD_PRELOAD}='/lib/libc.so.6'},
- # sub {delete $ENV{LD_PRELOAD}},
- ],
- # NOTE1: with RH9: force the dynamic linker to look at /lib/libc.so.6 before
- # anything else by setting environment variable LD_PRELOAD=/lib/libc.so.6
- # and then clear it when finished to avoid confusing anything else.
- # NOTE2: to treat encrypted files as viruses replace the [13] with:
- # qr/^\s{5,}(Found|is password-protected|.*(virus|trojan))/
-
- ### http://www.virusbuster.hu/en/
- ['VirusBuster', ['vbuster', 'vbengcl'],
- # VirusBuster Ltd. does not support the daemon version for the workstation
- # engine (vbuster-eng-1.12-linux-i386-libc6.tgz) any longer. The names of
- # binaries, some parameters AND return codes have changed (from 3 to 1).
- "{} -ss -i '*' -log=$MYHOME/vbuster.log", [0], [1],
- qr/: '(.*)' - Virus/ ],
-
-# ### http://www.virusbuster.hu/en/
-# ['VirusBuster (Client + Daemon)', 'vbengd',
-# # HINT: for an infected file it always returns 3,
-# # although the man-page tells a different story
-# '-f -log scandir {}', [0], [3],
-# qr/Virus found = (.*);/ ],
-
- ### http://www.cyber.com/
- ['CyberSoft VFind', 'vfind',
- '--vexit {}/*', [0], [23], qr/##==>>>> VIRUS ID: CVDL (.+)/,
- # sub {$ENV{VSTK_HOME}='/usr/lib/vstk'},
- ],
-
- ### http://www.avast.com/
- ['avast! Antivirus', ['/usr/bin/avastcmd','avastcmd'],
- '-a -i -n -t=A {}', [0], [1], qr/\binfected by:\s+([^ \t\n\[\]]+)/ ],
-
- ### http://www.ikarus-software.com/
- ['Ikarus AntiVirus for Linux', 'ikarus',
- '{}', [0], [40], qr/Signature (.+) found/ ],
-
- ### http://www.bitdefender.com/
- ['BitDefender', 'bdc',
- '--arc --mail {}', qr/^Infected files *:0+(?!\d)/,
- qr/^(?:Infected files|Identified viruses|Suspect files) *:0*[1-9]/,
- qr/(?:suspected|infected): (.*)(?:\033|$)/ ],
- # consider also: --all --nowarn --alev=15 --flev=15. The --all argument may
- # not apply to your version of bdc, check documentation and see 'bdc --help'
-
-# ['File::Scan', sub {Amavis::AV::ask_av(sub{
-# use File::Scan; my($fn)=@_;
-# my($f)=File::Scan->new(max_txt_size=>0, max_bin_size=>0);
-# my($vname) = $f->scan($fn);
-# $f->error ? (2,"Error: ".$f->error)
-# : ($vname ne '') ? (1,"$vname FOUND") : (0,"Clean")}, @_) },
-# ["{}/*"], [0], [1], qr/^(.*) FOUND$/ ],
-
- ### example: fully-fledged checker for JPEG marker segments of invalid length
- ['check-jpeg',
- sub { use JpegTester (); Amavis::AV::ask_av(\&JpegTester::test_jpeg, @_) },
- ["{}/*"], undef, [1], qr/^(bad jpeg: .*)$/ ],
- # NOTE: place file JpegTester.pm somewhere where Perl can find it,
- # for example in /usr/local/lib/perl5/site_perl
-
-);
-
-
-@av_scanners_backup = (
-
- ### http://www.clamav.net/ - backs up clamd or Mail::ClamAV
- ['ClamAV-clamscan', 'clamscan',
- "--stdout --disable-summary -r --tempdir=$TEMPBASE {}",
- [0], qr/:.*\sFOUND$/, qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
-
- ### http://www.f-prot.com/ - backs up F-Prot Daemon
- ['FRISK F-Prot Antivirus', ['f-prot','f-prot.sh'],
- '-dumb -archive -packed {}', [0,8], [3,6],
- qr/Infection: (.+)/ ],
-
- ### http://www.trendmicro.com/ - backs up Trophie
- ['Trend Micro FileScanner', ['/etc/iscan/vscan','vscan'],
- '-za -a {}', [0], qr/Found virus/, qr/Found virus (.+) in/ ],
-
- ### http://www.sald.com/, http://drweb.imshop.de/ - backs up DrWebD
- ['drweb - DrWeb Antivirus',
- ['/usr/local/drweb/drweb', '/opt/drweb/drweb', 'drweb'],
- '-path={} -al -go -ot -cn -upn -ok-',
- [0,32], [1,9,33], qr' infected (?:with|by)(?: virus)? (.*)$'],
-
- ['KasperskyLab kavscanner', ['/opt/kav/bin/kavscanner','kavscanner'],
- '-i1 -xp {}', [0,10,15], [5,20,21,25],
- qr/(?:CURED|INFECTED|CUREFAILED|WARNING|SUSPICION) (.*)/ ,
- sub {chdir('/opt/kav/bin') or die "Can't chdir to kav: $!"},
- sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
- ],
-
-# Commented out because the name 'sweep' clashes with Debian and FreeBSD
-# package/port of an audio editor. Make sure the correct 'sweep' is found
-# in the path when enabling.
-#
-# ### http://www.sophos.com/ - backs up Sophie or SAVI-Perl
-# ['Sophos Anti Virus (sweep)', 'sweep',
-# '-nb -f -all -rec -ss -sc -archive -cab -tnef --no-reset-atime {}',
-# [0,2], qr/Virus .*? found/,
-# qr/^>>> Virus(?: fragment)? '?(.*?)'? found/,
-# ],
-# # other options to consider: -mime -oe -idedir=/usr/local/sav
-
-# always succeeds (uncomment to consider mail clean if all other scanners fail)
-# ['always-clean', sub {0}],
-
-);
-
-
-1; # ensure a defined return
+++ /dev/null
-#
-# This files tells the console-tools package:
-#
-# - whether to load a specific font and boot (and maybe a screen-font map,
-# but you should avoid that if possible).
-# - whether to setup an Application-Charset Map other than the default CP437.
-# - whether to start "vcstime" to have time on all text VC'S.
-#
-# You can also specify per-VC settings by suffixing variable names as in
-# the examples below. This only works on framebuffer devices.
-#
-# CAVEATS:
-#
-# - When using the new framebuffer devices, the "global setting" for a font
-# only affects the current console (ie., at boot-time, the first one)
-# - ACM setting involves 2 steps (maybe loading a user ACM, and activating
-# it on a given charset slot - see charset(1) for details), the 1st of which
-# affects the entire system, but the 2nd of which only affects the current
-# VC (ie., at boot-time, the first one). So that if you want to use the same
-# ACM on all VCs, you have to specify "APP_CHARSET_MAP_vc<N>=user" for all
-# relevant values of <N>.
-#
-# Example:
-#
-#SCREEN_FONT=iso01.f16
-#SCREEN_FONT_vc2=LatArCyrHeb-16
-#
-#APP_CHARSET_MAP=iso05
-#APP_CHARSET_MAP_vc2=user
-#
-# Set the following - more euro-friendly default than kernel font.
-# SCREEN_FONT=latcyrheb-sun16.psf
-
-#DO_VCSTIME=yes
-#
-# Forget this one unless you _know_ it is necessary for your font:
-#SCREEN_FONT_MAP=iso01
-
-# **** screen saver/DPMS settings: all VCs ****
-# These settings are commented by default to avoid the chance of damage to
-# very old monitors that don't support DPMS signalling.
-
-# screen blanking timeout. monitor remains on, but the screen is cleared to
-# range: 0-60 min (0==never) kernels I've looked at default to 10 minutes.
-# (see linux/drivers/char/console.c)
-BLANK_TIME=30
-
-# blanking method (VESA DPMS mode to use after BLANK_TIME, before powerdown):
-# on: the default, no DPMS signalling. near instant powerup, no power saving
-# vsync: DPMS Standby mode. nearly instant recovery, uses 110/120W (17" screen)
-# hsync: DPMS Suspend mode. typically 3s recovery, uses 15/120W (17" screen)
-# powerdown,off: DPMS Off mode, typ. 10s recovery, uses 5/120W (17" screen)
-
-# Those values are for my 17" Mag, but some monitors do suspend the same as
-# standby. xset dpms force {off|standby|suspend|on} is useful for this, if X
-# supports DPMS on your video card. Set X's DPMS screensaver with xset dpms
-# or use option power_saver in XF86Config
-#
-# DPMS set by default to on, because hsync can cause problems on certain
-# hardware, such as Armada E500 laptops
-BLANK_DPMS=off
-
-# Powerdown time. The console will go to DPMS Off mode POWERDOWN_TIME
-# minutes _after_ blanking. (POWERDOWN_TIME + BLANK_TIME after the last input)
-POWERDOWN_TIME=30
-
-# rate and delay can get only specific values, consult kbdrate(1) for help
-#KEYBOARD_RATE="30"
-#KEYBOARD_DELAY="250"
-
-# Turn on numlock by default
-#LEDS=+num
-SCREEN_FONT=lat0-sun16
-SCREEN_FONT_vc2=lat0-sun16
-SCREEN_FONT_vc3=lat0-sun16
-SCREEN_FONT_vc4=lat0-sun16
-SCREEN_FONT_vc5=lat0-sun16
-SCREEN_FONT_vc6=lat0-sun16
+++ /dev/null
-#
-# This files tells the console-tools package:
-#
-# - whether to load a specific font and boot (and maybe a screen-font map,
-# but you should avoid that if possible).
-# - whether to setup an Application-Charset Map other than the default CP437.
-# - whether to start "vcstime" to have time on all text VC'S.
-#
-# You can also specify per-VC settings by suffixing variable names as in
-# the examples below. This only works on framebuffer devices.
-#
-# CAVEATS:
-#
-# - When using the new framebuffer devices, the "global setting" for a font
-# only affects the current console (ie., at boot-time, the first one)
-# - ACM setting involves 2 steps (maybe loading a user ACM, and activating
-# it on a given charset slot - see charset(1) for details), the 1st of which
-# affects the entire system, but the 2nd of which only affects the current
-# VC (ie., at boot-time, the first one). So that if you want to use the same
-# ACM on all VCs, you have to specify "APP_CHARSET_MAP_vc<N>=user" for all
-# relevant values of <N>.
-#
-# Example:
-#
-#SCREEN_FONT=iso01.f16
-#SCREEN_FONT_vc2=LatArCyrHeb-16
-#
-#APP_CHARSET_MAP=iso05
-#APP_CHARSET_MAP_vc2=user
-#
-# Set the following - more euro-friendly default than kernel font.
-# SCREEN_FONT=latcyrheb-sun16.psf
-
-#DO_VCSTIME=yes
-#
-# Forget this one unless you _know_ it is necessary for your font:
-#SCREEN_FONT_MAP=iso01
-
-# **** screen saver/DPMS settings: all VCs ****
-# These settings are commented by default to avoid the chance of damage to
-# very old monitors that don't support DPMS signalling.
-
-# screen blanking timeout. monitor remains on, but the screen is cleared to
-# range: 0-60 min (0==never) kernels I've looked at default to 10 minutes.
-# (see linux/drivers/char/console.c)
-BLANK_TIME=30
-
-# blanking method (VESA DPMS mode to use after BLANK_TIME, before powerdown):
-# on: the default, no DPMS signalling. near instant powerup, no power saving
-# vsync: DPMS Standby mode. nearly instant recovery, uses 110/120W (17" screen)
-# hsync: DPMS Suspend mode. typically 3s recovery, uses 15/120W (17" screen)
-# powerdown,off: DPMS Off mode, typ. 10s recovery, uses 5/120W (17" screen)
-
-# Those values are for my 17" Mag, but some monitors do suspend the same as
-# standby. xset dpms force {off|standby|suspend|on} is useful for this, if X
-# supports DPMS on your video card. Set X's DPMS screensaver with xset dpms
-# or use option power_saver in XF86Config
-#
-# DPMS set by default to on, because hsync can cause problems on certain
-# hardware, such as Armada E500 laptops
-BLANK_DPMS=off
-
-# Powerdown time. The console will go to DPMS Off mode POWERDOWN_TIME
-# minutes _after_ blanking. (POWERDOWN_TIME + BLANK_TIME after the last input)
-POWERDOWN_TIME=30
-
-# rate and delay can get only specific values, consult kbdrate(1) for help
-#KEYBOARD_RATE="30"
-#KEYBOARD_DELAY="250"
-
-# Turn on numlock by default
-#LEDS=+num
--- /dev/null
+#
+# SpamAssassin maintenance for amavisd-new
+#
+# m h dom mon dow user command
+18 */3 * * * amavis test -e /usr/sbin/amavisd-new-cronjob && /usr/sbin/amavisd-new-cronjob sa-sync 1>/dev/null 2>&1
--- /dev/null
+#
+# SpamAssassin maintenance for amavisd-new
+#
+# m h dom mon dow user command
+18 */3 * * * amavis test -e /usr/sbin/amavisd-new-cronjob && /usr/sbin/amavisd-new-cronjob sa-sync
+++ /dev/null
-#!/bin/sh
-#
-# Daily maintenance for amavisd-new
-# $Id: amavisd-new.cron.daily 930 2006-08-10 13:38:45Z hmh $
-#
-test -e /usr/sbin/amavisd-new-cronjob && exec /usr/sbin/amavisd-new-cronjob sa-clean 1>/dev/null 2>&1
+++ /dev/null
-#!/bin/sh
-#
-# Daily maintenance for amavisd-new
-# $Id: amavisd-new.cron.daily 930 2006-08-10 13:38:45Z hmh $
-#
-test -e /usr/sbin/amavisd-new-cronjob && exec /usr/sbin/amavisd-new-cronjob sa-clean
--- /dev/null
+#
+# Settings for saslauthd daemon
+# Please read /usr/share/doc/sasl2-bin/README.Debian for details.
+#
+
+# Should saslauthd run automatically on startup? (default: no)
+START=yes
+
+# Description of this saslauthd instance. Recommended.
+# (suggestion: SASL Authentication Daemon)
+DESC="SASL Authentication Daemon"
+
+# Short name of this saslauthd instance. Strongly recommended.
+# (suggestion: saslauthd)
+NAME="saslauthd"
+
+# Which authentication mechanisms should saslauthd use? (default: pam)
+#
+# Available options in this Debian package:
+# getpwent -- use the getpwent() library function
+# kerberos5 -- use Kerberos 5
+# pam -- use PAM
+# rimap -- use a remote IMAP server
+# shadow -- use the local shadow password file
+# sasldb -- use the local sasldb database file
+# ldap -- use LDAP (configuration is in /etc/saslauthd.conf)
+#
+# Only one option may be used at a time. See the saslauthd man page
+# for more information.
+#
+# Example: MECHANISMS="pam"
+MECHANISMS="pam"
+
+# Additional options for this mechanism. (default: none)
+# See the saslauthd man page for information about mech-specific options.
+MECH_OPTIONS=""
+
+# How many saslauthd processes should we run? (default: 5)
+# A value of 0 will fork a new process for each connection.
+THREADS=5
+
+# Other options (default: -c -m /var/run/saslauthd)
+# Note: You MUST specify the -m option or saslauthd won't run!
+#
+# WARNING: DO NOT SPECIFY THE -d OPTION.
+# The -d option will cause saslauthd to run in the foreground instead of as
+# a daemon. This will PREVENT YOUR SYSTEM FROM BOOTING PROPERLY. If you wish
+# to run saslauthd in debug mode, please run it by hand to be safe.
+#
+# See /usr/share/doc/sasl2-bin/README.Debian for Debian-specific information.
+# See the saslauthd man page and the output of 'saslauthd -h' for general
+# information about these options.
+#
+# Example for postfix users: "-c -m /var/spool/postfix/var/run/saslauthd"
+OPTIONS="-c -m /var/run/saslauthd"
+OPTIONS="-c -m /var/spool/postfix/var/run/saslauthd"
+[ ! -L /var/run/saslauthd -a -d /var/spool/postfix/var/run/saslauthd -a ! -d /var/run/saslauthd ] && ln -s /var/spool/postfix/var/run/saslauthd /var/run/saslauthd || true
--- /dev/null
+#
+# Settings for saslauthd daemon
+# Please read /usr/share/doc/sasl2-bin/README.Debian for details.
+#
+
+# Should saslauthd run automatically on startup? (default: no)
+START=no
+
+# Description of this saslauthd instance. Recommended.
+# (suggestion: SASL Authentication Daemon)
+DESC="SASL Authentication Daemon"
+
+# Short name of this saslauthd instance. Strongly recommended.
+# (suggestion: saslauthd)
+NAME="saslauthd"
+
+# Which authentication mechanisms should saslauthd use? (default: pam)
+#
+# Available options in this Debian package:
+# getpwent -- use the getpwent() library function
+# kerberos5 -- use Kerberos 5
+# pam -- use PAM
+# rimap -- use a remote IMAP server
+# shadow -- use the local shadow password file
+# sasldb -- use the local sasldb database file
+# ldap -- use LDAP (configuration is in /etc/saslauthd.conf)
+#
+# Only one option may be used at a time. See the saslauthd man page
+# for more information.
+#
+# Example: MECHANISMS="pam"
+MECHANISMS="pam"
+
+# Additional options for this mechanism. (default: none)
+# See the saslauthd man page for information about mech-specific options.
+MECH_OPTIONS=""
+
+# How many saslauthd processes should we run? (default: 5)
+# A value of 0 will fork a new process for each connection.
+THREADS=5
+
+# Other options (default: -c -m /var/run/saslauthd)
+# Note: You MUST specify the -m option or saslauthd won't run!
+#
+# WARNING: DO NOT SPECIFY THE -d OPTION.
+# The -d option will cause saslauthd to run in the foreground instead of as
+# a daemon. This will PREVENT YOUR SYSTEM FROM BOOTING PROPERLY. If you wish
+# to run saslauthd in debug mode, please run it by hand to be safe.
+#
+# See /usr/share/doc/sasl2-bin/README.Debian for Debian-specific information.
+# See the saslauthd man page and the output of 'saslauthd -h' for general
+# information about these options.
+#
+# Example for postfix users: "-c -m /var/spool/postfix/var/run/saslauthd"
+OPTIONS="-c -m /var/run/saslauthd"
+++ /dev/null
-# Default location of the slapd.conf file. If empty, use the compiled-in
-# default (/etc/ldap/slapd.conf). If using the cn=config backend to store
-# configuration in LDIF, set this variable to the directory containing the
-# cn=config data.
-SLAPD_CONF=
-
-# System account to run the slapd server under. If empty the server
-# will run as root.
-SLAPD_USER="openldap"
-
-# System group to run the slapd server under. If empty the server will
-# run in the primary group of its user.
-SLAPD_GROUP="openldap"
-
-# Path to the pid file of the slapd server. If not set the init.d script
-# will try to figure it out from $SLAPD_CONF (/etc/ldap/slapd.conf by
-# default)
-SLAPD_PIDFILE=
-
-# slapd normally serves ldap only on all TCP-ports 389. slapd can also
-# service requests on TCP-port 636 (ldaps) and requests via unix
-# sockets.
-# Example usage:
-# SLAPD_SERVICES="ldap://127.0.0.1:389/ ldaps:/// ldapi:///"
-
-# If SLAPD_NO_START is set, the init script will not start or restart
-# slapd (but stop will still work). Uncomment this if you are
-# starting slapd via some other means or if you don't want slapd normally
-# started at boot.
-#SLAPD_NO_START=1
-
-# If SLAPD_SENTINEL_FILE is set to path to a file and that file exists,
-# the init script will not start or restart slapd (but stop will still
-# work). Use this for temporarily disabling startup of slapd (when doing
-# maintenance, for example, or through a configuration management system)
-# when you don't want to edit a configuration file.
-SLAPD_SENTINEL_FILE=/etc/ldap/noslapd
-
-# For Kerberos authentication (via SASL), slapd by default uses the system
-# keytab file (/etc/krb5.keytab). To use a different keytab file,
-# uncomment this line and change the path.
-#export KRB5_KTNAME=/etc/krb5.keytab
-
-# Additional options to pass to slapd
-SLAPD_OPTIONS=""
-SLURPD_START=auto
+++ /dev/null
-# Default location of the slapd.conf file. If empty, use the compiled-in
-# default (/etc/ldap/slapd.conf). If using the cn=config backend to store
-# configuration in LDIF, set this variable to the directory containing the
-# cn=config data.
-SLAPD_CONF=
-
-# System account to run the slapd server under. If empty the server
-# will run as root.
-SLAPD_USER="openldap"
-
-# System group to run the slapd server under. If empty the server will
-# run in the primary group of its user.
-SLAPD_GROUP="openldap"
-
-# Path to the pid file of the slapd server. If not set the init.d script
-# will try to figure it out from $SLAPD_CONF (/etc/ldap/slapd.conf by
-# default)
-SLAPD_PIDFILE=
-
-# slapd normally serves ldap only on all TCP-ports 389. slapd can also
-# service requests on TCP-port 636 (ldaps) and requests via unix
-# sockets.
-# Example usage:
-# SLAPD_SERVICES="ldap://127.0.0.1:389/ ldaps:/// ldapi:///"
-
-# If SLAPD_NO_START is set, the init script will not start or restart
-# slapd (but stop will still work). Uncomment this if you are
-# starting slapd via some other means or if you don't want slapd normally
-# started at boot.
-#SLAPD_NO_START=1
-
-# If SLAPD_SENTINEL_FILE is set to path to a file and that file exists,
-# the init script will not start or restart slapd (but stop will still
-# work). Use this for temporarily disabling startup of slapd (when doing
-# maintenance, for example, or through a configuration management system)
-# when you don't want to edit a configuration file.
-SLAPD_SENTINEL_FILE=/etc/ldap/noslapd
-
-# For Kerberos authentication (via SASL), slapd by default uses the system
-# keytab file (/etc/krb5.keytab). To use a different keytab file,
-# uncomment this line and change the path.
-#export KRB5_KTNAME=/etc/krb5.keytab
-
-# Additional options to pass to slapd
-SLAPD_OPTIONS=""
+++ /dev/null
-#!/bin/sh
-
-set -e
-
-# options for daemons:
-# name init.d/script user ps name for pgrep -f pidfile, relative to /var/run num-fds last-fd-name
-options='
-clamd clamav-daemon clamav /usr/sbin/clamd clamav/clamd.pid 5 clamav.log
-amavis amavis.amavisd-new amavis amavisd \\(master\\) amavis/amavisd.pid 5 socket
-'
-# note: pgrep -f takes a regexp, and this is shell expanded once, hence \\
-
-start () {
- local daemon IFSOLD name script user psname pidfile num fdname
- daemon="$1"
- IFSOLD="$IFS"
- IFS=" " # tab
- read name script user psname pidfile num fdname <<-EOPTS
- $(echo "$options" | sed 's/ */ /g' | grep ^$daemon)
- EOPTS
- IFS="$IFSOLD"
- /etc/init.d/$script start
- wait_for_fds "$daemon"
-}
-
-stop () {
- local daemon IFSOLD name script user psname pidfile num fdname
- daemon="$1"
- n=10
- IFSOLD="$IFS"
- IFS=" " # tab
- read name script user psname pidfile num fdname <<-EOPTS
- $(echo "$options" | sed 's/ */ /g' | grep ^$daemon)
- EOPTS
- IFS="$IFSOLD"
- /etc/init.d/$script stop
- pkill -u $user -f "$psname" > /dev/null || true
- while pgrep -u $user -f "$psname" > /dev/null && [ "$n" -gt 0 ]
- do
- sleep 1
- n=$(($n-1))
- done
- pkill -9 -u $user -f "$psname" > /dev/null || true
- #pkill -9 -u $user -x "$daemon"
- if pgrep -u $user -f "$psname" > /dev/null; then # still there?
- return 1
- fi
-}
-
-wait_for_fds () {
- # wait until process shows some I/O readiness :)
- local name IFSOLD num sleep maxtry script user psname pidfile fdname
- name="$1"
- [ -z "$name" ] && return 1
- IFSOLD="$IFS"
- IFS=" " # tab
- read name script user psname pidfile num fdname <<-EOPTS
- $(echo "$options" | sed 's/ */ /g' | grep ^$name)
- EOPTS
- IFS="$IFSOLD"
- num=${num:-4}
- sleep=${sleep:-1}
- maxtry=${maxtry:-90}
- if [ -n "$pidfile" ]; then
- pidfile=/var/run/$pidfile
- findpid="[ -f $pidfile ] && cat $pidfile || true"
- else
- findpid="pgrep -u $user -f \"$psname\" -P 1 | head -1"
- fi
-
- # loop the loop the loop
- try=1
- while /bin/true
- do
- sleep $sleep # 1st, give it a chance to run
- pid=`eval $findpid` # 2nd: find it
- if [ ! -z "$pid" ]; then
- count=`ls -1 /proc/$pid/fd 2>/dev/null| wc -l` # 3rd: count all it's worth
- [ "$count" -ge "$num" ] && ls -l /proc/$pid/fd | grep -q $fdname \
- && return # success -- release
- fi
- try=$(($try+1))
- [ "0$try" -ge "0$maxtry" ] && return 1 # no luck this time
- done
-}
-
-# if we're called as amavisd-cn or amavis with start argument,
-# act like one; otherwise, pass the call down
-case "$(basename $0)" in
- amavisd-cn)
- arg="i$1"
- ;;
- amavis)
- if [ "$1" = start ]; then
- arg="i$1"
- else
- arg="$1"
- fi
- ;;
- *)
- arg="$1"
- ;;
-esac
-
-# If there's no diversion, play possum
-[ -x /etc/init.d/amavis.amavisd-new ] || exit 0
-
-mta=postfix
-
-case "$arg" in
- start|stop|restart|reload|force-reload|debug)
- /etc/init.d/amavis.amavisd-new "$arg"
- ;;
-
- istart)
- start clamd
- start amavis
- /etc/init.d/$mta start
- ;;
-
- istop)
- /etc/init.d/$mta stop
- stop amavis
- stop clamd
- ;;
-
- irestart|ireload|iforce-reload)
- $0 stop
- sleep 2
- $0 start
- ;;
-
- *)
- echo "Usage: $0 {start|stop|restart|reload|force-reload}" >&2
- exit 1
- ;;
-esac
-
-exit 0
+++ /dev/null
-#!/bin/sh
-
-# amavisd-cn /etc/init.d/ initscript wrapper for CARNetized amavisd-new
-#
-# Start and stop Amavis, ClamAV and Postfix/Sendmail
-
-### BEGIN INIT INFO
-# Provides: amavisd-cn
-# Required-Start: $local_fs $remote_fs $syslog $named $network $time
-# Required-Stop: $local_fs $remote_fs $syslog $named $network
-# Should-Start:
-# Should-Stop:
-# Default-Start: 2 3 4 5
-# Default-Stop: 0 1 6
-# Short-Description: start and stop Amavis, ClamAV and Postfix/Sendmail
-# Description: wrapper for starting/stopping MTA and related services
-### END INIT INFO
-
-set -e
-
-# options for daemons:
-# name init.d/script user ps name for pgrep -f pidfile, relative to /var/run num-fds last-fd-name
-options='
-clamd clamav-daemon clamav /usr/sbin/clamd clamav/clamd.pid 5 clamav.log
-amavis amavis.amavisd-new amavis amavisd \\(master\\) amavis/amavisd.pid 5 socket
-'
-# note: pgrep -f takes a regexp, and this is shell expanded once, hence \\
-
-start () {
- local daemon IFSOLD name script user psname pidfile num fdname
- daemon="$1"
- IFSOLD="$IFS"
- IFS=" " # tab
- read name script user psname pidfile num fdname <<-EOPTS
- $(echo "$options" | sed 's/ */ /g' | grep ^$daemon)
- EOPTS
- IFS="$IFSOLD"
- /etc/init.d/$script start
- wait_for_fds "$daemon"
-}
-
-stop () {
- local daemon IFSOLD name script user psname pidfile num fdname
- daemon="$1"
- n=10
- IFSOLD="$IFS"
- IFS=" " # tab
- read name script user psname pidfile num fdname <<-EOPTS
- $(echo "$options" | sed 's/ */ /g' | grep ^$daemon)
- EOPTS
- IFS="$IFSOLD"
- /etc/init.d/$script stop
- pkill -u $user -f "$psname" > /dev/null || true
- while pgrep -u $user -f "$psname" > /dev/null && [ "$n" -gt 0 ]
- do
- sleep 1
- n=$(($n-1))
- done
- pkill -9 -u $user -f "$psname" > /dev/null || true
- #pkill -9 -u $user -x "$daemon"
- if pgrep -u $user -f "$psname" > /dev/null; then # still there?
- return 1
- fi
-}
-
-wait_for_fds () {
- # wait until process shows some I/O readiness :)
- local name IFSOLD num sleep maxtry script user psname pidfile fdname
- name="$1"
- [ -z "$name" ] && return 1
- IFSOLD="$IFS"
- IFS=" " # tab
- read name script user psname pidfile num fdname <<-EOPTS
- $(echo "$options" | sed 's/ */ /g' | grep ^$name)
- EOPTS
- IFS="$IFSOLD"
- num=${num:-4}
- sleep=${sleep:-1}
- maxtry=${maxtry:-90}
- if [ -n "$pidfile" ]; then
- pidfile=/var/run/$pidfile
- findpid="[ -f $pidfile ] && cat $pidfile || true"
- else
- findpid="pgrep -u $user -f \"$psname\" -P 1 | head -1"
- fi
-
- # loop the loop the loop
- try=1
- while /bin/true
- do
- sleep $sleep # 1st, give it a chance to run
- pid=`eval $findpid` # 2nd: find it
- if [ ! -z "$pid" ]; then
- count=`ls -1 /proc/$pid/fd 2>/dev/null| wc -l` # 3rd: count all it's worth
- [ "$count" -ge "$num" ] && ls -l /proc/$pid/fd | grep -q $fdname \
- && return # success -- release
- fi
- try=$(($try+1))
- [ "0$try" -ge "0$maxtry" ] && return 1 # no luck this time
- done
-}
-
-# if we're called as amavisd-cn or amavis with start argument,
-# act like one; otherwise, pass the call down
-case "$(basename $0)" in
- amavisd-cn)
- arg="i$1"
- ;;
- amavis)
- if [ "$1" = start ]; then
- arg="i$1"
- else
- arg="$1"
- fi
- ;;
- *)
- arg="$1"
- ;;
-esac
-
-# If there's no diversion, play possum
-[ -x /etc/init.d/amavis.amavisd-new ] || exit 0
-
-mta=postfix
-
-case "$arg" in
- start|stop|restart|reload|force-reload|debug)
- /etc/init.d/amavis.amavisd-new "$arg"
- ;;
-
- istart)
- start clamd
- start amavis
- if [ -x "/etc/init.d/$mta" ]; then
- if [ -x "`which invoke-rc.d 2>/dev/null`" ]; then
- invoke-rc.d $mta start
- else
- /etc/init.d/$mta start
- fi
- fi
- ;;
-
- istop)
- if [ -x "/etc/init.d/$mta" ]; then
- if [ -x "`which invoke-rc.d 2>/dev/null`" ]; then
- invoke-rc.d $mta stop
- else
- /etc/init.d/$mta stop
- fi
- fi
- stop amavis
- stop clamd
- ;;
-
- irestart|ireload|iforce-reload)
- $0 stop
- sleep 2
- $0 start
- ;;
-
- *)
- echo "Usage: $0 {start|stop|restart|reload|force-reload}" >&2
- exit 1
- ;;
-esac
-
-exit 0
-Debian GNU/Linux 5.0 (CARNet Debian 5.0) \n \l
+Debian GNU/Linux 6.0 (CARNet Debian 6.0) \n \l
-Debian GNU/Linux 6.0 \n \l
+Debian GNU/Linux 7 \n \l
-Debian GNU/Linux 5.0 (CARNet Debian 5.0) %h
+Debian GNU/Linux 6 (CARNet Debian 6) %h
-Debian GNU/Linux 6.0
+Debian GNU/Linux 7
-Debian GNU/Linux 5.0
+Debian GNU/Linux 6
-Debian GNU/Linux 5.0 \n \l
+Debian GNU/Linux 6 \n \l
## are case insensitive. All path's MUST BE FULLY QUALIFIED, starting with '/'.
##
## Below you will find examples of some frequently used statements. For
-## information about the control file, a complete list of statements and
-## options please have a look in the monit manual.
+## information about the control file and a complete list of statements and
+## options, please have a look in the Monit manual.
##
##
###############################################################################
## Global section
###############################################################################
##
-## Start monit in the background (run as a daemon) and check services at
-## 2-minute intervals.
+## Start Monit in the background (run as a daemon):
#
-# set daemon 120
+# set daemon 120 # check services at 2-minute intervals
+# with start delay 240 # optional: delay the first check by 4-minutes (by
+# # default Monit check immediately after Monit start)
#
#
## Set syslog logging with the 'daemon' facility. If the FACILITY option is
-## omitted, monit will use 'user' facility by default. If you want to log to
-## a stand alone log file instead, specify the path to a log file
+## omitted, Monit will use 'user' facility by default. If you want to log to
+## a standalone log file instead, specify the full path to the log file
#
# set logfile syslog facility log_daemon
#
#
+### Set the location of the Monit id file which stores the unique id for the
+### Monit instance. The id is generated and stored on first Monit start. By
+### default the file is placed in $HOME/.monit.id.
+#
+# set idfile /var/.monit.id
+#
+### Set the location of the Monit state file which saves monitoring states
+### on each cycle. By default the file is placed in $HOME/.monit.state. If
+### the state file is stored on a persistent filesystem, Monit will recover
+### the monitoring state across reboots. If it is on temporary filesystem, the
+### state will be lost on reboot which may be convenient in some situations.
+#
+# set statefile /var/.monit.state
+#
## Set the list of mail servers for alert delivery. Multiple servers may be
-## specified using comma separator. By default monit uses port 25 - this
-## is possible to override with the PORT option.
+## specified using a comma separator. By default Monit uses port 25 - it is
+## possible to override this with the PORT option.
#
# set mailserver mail.bar.baz, # primary mailserver
# backup.bar.baz port 10025, # backup mailserver on port 10025
# localhost # fallback relay
#
#
-## By default monit will drop alert events if no mail servers are available.
-## If you want to keep the alerts for a later delivery retry, you can use the
+## By default Monit will drop alert events if no mail servers are available.
+## If you want to keep the alerts for later delivery retry, you can use the
## EVENTQUEUE statement. The base directory where undelivered alerts will be
## stored is specified by the BASEDIR option. You can limit the maximal queue
## size using the SLOTS option (if omitted, the queue is limited by space
#
# set eventqueue
# basedir /var/monit # set the base directory where events will be stored
-# slots 100 # optionaly limit the queue size
+# slots 100 # optionally limit the queue size
+#
+#
+## Send status and events to M/Monit (for more informations about M/Monit
+## see http://mmonit.com/).
+#
+# set mmonit http://monit:monit@192.168.1.10:8080/collector
#
#
## Monit by default uses the following alert mail format:
## Description: $DESCRIPTION #
## #
## Your faithful employee, #
-## monit #
+## Monit #
## --8<--
##
## You can override this message format or parts of it, such as subject
## or sender using the MAIL-FORMAT statement. Macros such as $DATE, etc.
-## are expanded at runtime. For example, to override the sender:
+## are expanded at runtime. For example, to override the sender, use:
#
# set mail-format { from: monit@foo.bar }
#
#
-## You can set alert recipients here whom will receive alerts if/when a
+## You can set alert recipients whom will receive alerts if/when a
## service defined in this file has errors. Alerts may be restricted on
## events by using a filter as in the second example below.
#
#
#
## Monit has an embedded web server which can be used to view status of
-## services monitored, the current configuration, actual services parameters
-## and manage services from a web interface.
+## services monitored and manage services from a web interface. See the
+## Monit Wiki if you want to enable SSL for the web server.
#
# set httpd port 2812 and
# use address localhost # only accept connection from localhost
# allow localhost # allow localhost to connect to the server and
# allow admin:monit # require user 'admin' with password 'monit'
+# allow @monit # allow users of group 'monit' to connect (rw)
+# allow @users readonly # allow users of group 'users' to connect readonly
#
#
###############################################################################
#
#
## Check a file for existence, checksum, permissions, uid and gid. In addition
-## to alert recipients in the global section, customized alert will be sent to
+## to alert recipients in the global section, customized alert can be sent to
## additional recipients by specifying a local alert handler. The service may
-## be grouped using the GROUP option.
+## be grouped using the GROUP option. More than one group can be specified by
+## repeating the 'group name' statement.
#
# check file apache_bin with path /usr/local/apache/bin/httpd
# if failed checksum and
#
## Check that a process is running, in this case Apache, and that it respond
## to HTTP and HTTPS requests. Check its resource usage such as cpu and memory,
-## and number of children. If the process is not running, monit will restart
-## it by default. In case the service was restarted very often and the
+## and number of children. If the process is not running, Monit will restart
+## it by default. In case the service is restarted very often and the
## problem remains, it is possible to disable monitoring using the TIMEOUT
## statement. This service depends on another service (apache_bin) which
## is defined above.
#
# check process apache with pidfile /usr/local/apache/logs/httpd.pid
-# start program = "/etc/init.d/httpd start"
+# start program = "/etc/init.d/httpd start" with timeout 60 seconds
# stop program = "/etc/init.d/httpd stop"
# if cpu > 60% for 2 cycles then alert
# if cpu > 80% for 5 cycles then restart
# if children > 250 then restart
# if loadavg(5min) greater than 10 for 8 cycles then stop
# if failed host www.tildeslash.com port 80 protocol http
-# and request "/monit/doc/next.php"
+# and request "/somefile.html"
# then restart
# if failed port 443 type tcpssl protocol http
# with timeout 15 seconds
# group server
#
#
-## Check device permissions, uid, gid, space and inode usage. Other services,
+## Check filesystem permissions, uid, gid, space and inode usage. Other services,
## such as databases, may depend on this resource and an automatically graceful
## stop may be cascaded to them before the filesystem will become full and data
## lost.
#
-# check device datafs with path /dev/sdb1
+# check filesystem datafs with path /dev/sdb1
# start program = "/bin/mount /data"
# stop program = "/bin/umount /data"
# if failed permission 660 then unmonitor
# if failed uid data then alert
# if failed gid data then alert
# if timestamp > 15 minutes then alert
-# if size > 100 MB then exec "/my/cleanup/script"
+# if size > 100 MB then exec "/my/cleanup/script" as uid dba and gid dba
#
#
## Check directory permission, uid and gid. An event is triggered if the
# if failed gid 0 then unmonitor
#
#
-## Check a remote host network services availability using a ping test and
-## check response content from a web server. Up to three pings are sent and
-## connection to a port and a application level network check is performed.
+## Check a remote host availability by issuing a ping test and check the
+## content of a response from a web server. Up to three pings are sent and
+## connection to a port and an application level network check is performed.
#
# check host myserver with address 192.168.1.1
# if failed icmp type echo count 3 with timeout 3 seconds then alert
# if failed port 3306 protocol mysql with timeout 15 seconds then alert
-# if failed url
-# http://user:password@www.foo.bar:8080/?querystring
+# if failed url http://user:password@192.168.1.1:8080/?querystring
# and content == 'action="j_security_check"'
# then alert
#
## It is possible to include additional configuration parts from other files or
## directories.
#
-# include /etc/monit.d/*
-#
-#
+
+include /etc/monit/conf.d/*
+
set logfile syslog facility log_daemon
set mail-format {
- from: monit@localhost
+ from: monit@squeeze-amd64.local
subject: $SERVICE $EVENT at $DATE
message: monit $ACTION $SERVICE at $DATE on $HOST
}
set mailserver 127.0.0.1
-set alert root@localhost only on { uid, gid, size, nonexist, data, icmp, instance, invalid, exec, timeout, resource, checksum, match, timestamp, connection, permission }
+set alert root@localhost but not on { instance }
#set httpd port 2812 and use address 127.0.0.1
#allow localhost
+++ /dev/null
-# /etc/security/limits.conf
-#
-#Each line describes a limit for a user in the form:
-#
-#<domain> <type> <item> <value>
-#
-#Where:
-#<domain> can be:
-# - an user name
-# - a group name, with @group syntax
-# - the wildcard *, for default entry
-# - the wildcard %, can be also used with %group syntax,
-# for maxlogin limit
-#
-#<type> can have the two values:
-# - "soft" for enforcing the soft limits
-# - "hard" for enforcing hard limits
-#
-#<item> can be one of the following:
-# - core - limits the core file size (KB)
-# - data - max data size (KB)
-# - fsize - maximum filesize (KB)
-# - memlock - max locked-in-memory address space (KB)
-# - nofile - max number of open files
-# - rss - max resident set size (KB)
-# - stack - max stack size (KB)
-# - cpu - max CPU time (MIN)
-# - nproc - max number of processes
-# - as - address space limit (KB)
-# - maxlogins - max number of logins for this user
-# - maxsyslogins - max number of logins on the system
-# - priority - the priority to run user process with
-# - locks - max number of file locks the user can hold
-# - sigpending - max number of pending signals
-# - msgqueue - max memory used by POSIX message queues (bytes)
-# - nice - max nice priority allowed to raise to values: [-20, 19]
-# - rtprio - max realtime priority
-# - chroot - change root to directory (Debian-specific)
-#
-#<domain> <type> <item> <value>
-#
-
-#* soft core 0
-#* hard rss 10000
-#@student hard nproc 20
-#@faculty soft nproc 20
-#@faculty hard nproc 50
-#ftp hard nproc 0
-#ftp - chroot /ftp
-#@student - maxlogins 4
-
-# End of file
-# Begin update by CARNet package kernel-2.6-cn -- DO NOT DELETE THIS LINE!
-* soft core 0
-* hard nofile 4096
-* soft nofile 4096
-# End update by CARNet package kernel-2.6-cn -- DO NOT DELETE THIS LINE!
+++ /dev/null
-# /etc/security/limits.conf
-#
-#Each line describes a limit for a user in the form:
-#
-#<domain> <type> <item> <value>
-#
-#Where:
-#<domain> can be:
-# - an user name
-# - a group name, with @group syntax
-# - the wildcard *, for default entry
-# - the wildcard %, can be also used with %group syntax,
-# for maxlogin limit
-#
-#<type> can have the two values:
-# - "soft" for enforcing the soft limits
-# - "hard" for enforcing hard limits
-#
-#<item> can be one of the following:
-# - core - limits the core file size (KB)
-# - data - max data size (KB)
-# - fsize - maximum filesize (KB)
-# - memlock - max locked-in-memory address space (KB)
-# - nofile - max number of open files
-# - rss - max resident set size (KB)
-# - stack - max stack size (KB)
-# - cpu - max CPU time (MIN)
-# - nproc - max number of processes
-# - as - address space limit (KB)
-# - maxlogins - max number of logins for this user
-# - maxsyslogins - max number of logins on the system
-# - priority - the priority to run user process with
-# - locks - max number of file locks the user can hold
-# - sigpending - max number of pending signals
-# - msgqueue - max memory used by POSIX message queues (bytes)
-# - nice - max nice priority allowed to raise to values: [-20, 19]
-# - rtprio - max realtime priority
-# - chroot - change root to directory (Debian-specific)
-#
-#<domain> <type> <item> <value>
-#
-
-#* soft core 0
-#* hard rss 10000
-#@student hard nproc 20
-#@faculty soft nproc 20
-#@faculty hard nproc 50
-#ftp hard nproc 0
-#ftp - chroot /ftp
-#@student - maxlogins 4
-
-# End of file
+++ /dev/null
-# This is the right place to customize your installation of SpamAssassin.
-#
-# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be
-# tweaked.
-#
-# This file was installed during the installation of SpamAssassin 3.1.0,
-# and contains plugin loading commands for the new plugins added in that
-# release. It will not be overwritten during future SpamAssassin installs,
-# so you can modify it to enable some disabled-by-default plugins below,
-# if you so wish.
-#
-# There are now multiple files read to enable plugins in the
-# /etc/mail/spamassassin directory; previously only one, "init.pre" was
-# read. Now both "init.pre", "v310.pre", and any other files ending in
-# ".pre" will be read. As future releases are made, new plugins will be
-# added to new files, named according to the release they're added in.
-###########################################################################
-
-# DCC - perform DCC message checks.
-#
-# DCC is disabled here because it is not open source. See the DCC
-# license for more details.
-#
-#loadplugin Mail::SpamAssassin::Plugin::DCC
-
-# Pyzor - perform Pyzor message checks.
-#
-#loadplugin Mail::SpamAssassin::Plugin::Pyzor
-
-# Razor2 - perform Razor2 message checks.
-#
-loadplugin Mail::SpamAssassin::Plugin::Razor2
-
-# SpamCop - perform SpamCop message reporting
-#
-loadplugin Mail::SpamAssassin::Plugin::SpamCop
-
-# AntiVirus - some simple anti-virus checks, this is not a replacement
-# for an anti-virus filter like Clam AntiVirus
-#
-#loadplugin Mail::SpamAssassin::Plugin::AntiVirus
-
-# AWL - do auto-whitelist checks
-#
-loadplugin Mail::SpamAssassin::Plugin::AWL
-
-# AutoLearnThreshold - threshold-based discriminator for Bayes auto-learning
-#
-loadplugin Mail::SpamAssassin::Plugin::AutoLearnThreshold
-
-# TextCat - language guesser
-#
-#loadplugin Mail::SpamAssassin::Plugin::TextCat
-
-# AccessDB - lookup from-addresses in access database
-#
-#loadplugin Mail::SpamAssassin::Plugin::AccessDB
-
-# WhitelistSubject - Whitelist/Blacklist certain subject regular expressions
-#
-loadplugin Mail::SpamAssassin::Plugin::WhiteListSubject
-
-###########################################################################
-# experimental plugins
-
-# DomainKeys - perform DomainKeys verification
-#
-# External modules required for use, see INSTALL for more information.
-# Note that this may be redundant if you also plan to use the DKIM plugin.
-#
-#loadplugin Mail::SpamAssassin::Plugin::DomainKeys
-
-# MIMEHeader - apply regexp rules against MIME headers in the message
-#
-loadplugin Mail::SpamAssassin::Plugin::MIMEHeader
-
-# ReplaceTags
-#
-loadplugin Mail::SpamAssassin::Plugin::ReplaceTags
-
+++ /dev/null
-# This is the right place to customize your installation of SpamAssassin.
-#
-# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be
-# tweaked.
-#
-# This file was installed during the installation of SpamAssassin 3.1.0,
-# and contains plugin loading commands for the new plugins added in that
-# release. It will not be overwritten during future SpamAssassin installs,
-# so you can modify it to enable some disabled-by-default plugins below,
-# if you so wish.
-#
-# There are now multiple files read to enable plugins in the
-# /etc/mail/spamassassin directory; previously only one, "init.pre" was
-# read. Now both "init.pre", "v310.pre", and any other files ending in
-# ".pre" will be read. As future releases are made, new plugins will be
-# added to new files, named according to the release they're added in.
-###########################################################################
-
-# DCC - perform DCC message checks.
-#
-# DCC is disabled here because it is not open source. See the DCC
-# license for more details.
-#
-#loadplugin Mail::SpamAssassin::Plugin::DCC
-
-# Pyzor - perform Pyzor message checks.
-#
-loadplugin Mail::SpamAssassin::Plugin::Pyzor
-
-# Razor2 - perform Razor2 message checks.
-#
-loadplugin Mail::SpamAssassin::Plugin::Razor2
-
-# SpamCop - perform SpamCop message reporting
-#
-loadplugin Mail::SpamAssassin::Plugin::SpamCop
-
-# AntiVirus - some simple anti-virus checks, this is not a replacement
-# for an anti-virus filter like Clam AntiVirus
-#
-#loadplugin Mail::SpamAssassin::Plugin::AntiVirus
-
-# AWL - do auto-whitelist checks
-#
-loadplugin Mail::SpamAssassin::Plugin::AWL
-
-# AutoLearnThreshold - threshold-based discriminator for Bayes auto-learning
-#
-loadplugin Mail::SpamAssassin::Plugin::AutoLearnThreshold
-
-# TextCat - language guesser
-#
-#loadplugin Mail::SpamAssassin::Plugin::TextCat
-
-# AccessDB - lookup from-addresses in access database
-#
-#loadplugin Mail::SpamAssassin::Plugin::AccessDB
-
-# WhitelistSubject - Whitelist/Blacklist certain subject regular expressions
-#
-loadplugin Mail::SpamAssassin::Plugin::WhiteListSubject
-
-###########################################################################
-# experimental plugins
-
-# DomainKeys - perform DomainKeys verification
-#
-# External modules required for use, see INSTALL for more information.
-# Note that this may be redundant if you also plan to use the DKIM plugin.
-#
-#loadplugin Mail::SpamAssassin::Plugin::DomainKeys
-
-# MIMEHeader - apply regexp rules against MIME headers in the message
-#
-loadplugin Mail::SpamAssassin::Plugin::MIMEHeader
-
-# ReplaceTags
-#
-loadplugin Mail::SpamAssassin::Plugin::ReplaceTags
-
+++ /dev/null
-# Begin update by CARNet package squirrelmail-cn -- DO NOT DELETE THIS LINE!
-# Force SSL for /webmail -> you can still use /squirrelmail
-Alias /webmail /usr/share/squirrelmail
-
-<IfModule mod_rewrite.c>
- <IfModule mod_ssl.c>
- <Location /webmail>
- RewriteEngine on
- RewriteCond %{HTTPS} !=on
- RewriteRule . https://%{HTTP_HOST}%{REQUEST_URI} [L]
- </Location>
- </IfModule>
-</IfModule>
-
-#
-# WARNING: This file is automatically included in each VirtualHost
-# entry you might have. Do not enable the VirtualHost example provided
-# in this file, it WILL break your Apache configuration. Copy the
-# VirtualHost section to the standard webserver configuration file
-# instead.
-#
-# End update by CARNet package squirrelmail-cn -- DO NOT DELETE THIS LINE!
-Alias /squirrelmail /usr/share/squirrelmail
-
-<Directory /usr/share/squirrelmail>
- Options Indexes FollowSymLinks
- <IfModule mod_php4.c>
- php_flag register_globals off
- </IfModule>
- <IfModule mod_php5.c>
- php_flag register_globals off
- </IfModule>
- <IfModule mod_dir.c>
- DirectoryIndex index.php
- </IfModule>
-
- # access to configtest is limited by default to prevent information leak
- <Files configtest.php>
- order deny,allow
- deny from all
- allow from 127.0.0.1
- </Files>
-</Directory>
-
-# users will prefer a simple URL like http://webmail.example.com
-#<VirtualHost 1.2.3.4>
-# DocumentRoot /usr/share/squirrelmail
-# ServerName webmail.example.com
-#</VirtualHost>
-
-# redirect to https when available (thanks omen@descolada.dartmouth.edu)
-#
-# Note: There are multiple ways to do this, and which one is suitable for
-# your site's configuration depends. Consult the apache documentation if
-# you're unsure, as this example might not work everywhere.
-#
-#<IfModule mod_rewrite.c>
-# <IfModule mod_ssl.c>
-# <Location /squirrelmail>
-# RewriteEngine on
-# RewriteCond %{HTTPS} !^on$ [NC]
-# RewriteRule . https://%{HTTP_HOST}%{REQUEST_URI} [L]
-# </Location>
-# </IfModule>
-#</IfModule>
-
+++ /dev/null
-Alias /squirrelmail /usr/share/squirrelmail
-
-<Directory /usr/share/squirrelmail>
- Options Indexes FollowSymLinks
- <IfModule mod_php4.c>
- php_flag register_globals off
- </IfModule>
- <IfModule mod_php5.c>
- php_flag register_globals off
- </IfModule>
- <IfModule mod_dir.c>
- DirectoryIndex index.php
- </IfModule>
-
- # access to configtest is limited by default to prevent information leak
- <Files configtest.php>
- order deny,allow
- deny from all
- allow from 127.0.0.1
- </Files>
-</Directory>
-
-# users will prefer a simple URL like http://webmail.example.com
-#<VirtualHost 1.2.3.4>
-# DocumentRoot /usr/share/squirrelmail
-# ServerName webmail.example.com
-#</VirtualHost>
-
-# redirect to https when available (thanks omen@descolada.dartmouth.edu)
-#
-# Note: There are multiple ways to do this, and which one is suitable for
-# your site's configuration depends. Consult the apache documentation if
-# you're unsure, as this example might not work everywhere.
-#
-#<IfModule mod_rewrite.c>
-# <IfModule mod_ssl.c>
-# <Location /squirrelmail>
-# RewriteEngine on
-# RewriteCond %{HTTPS} !^on$ [NC]
-# RewriteRule . https://%{HTTP_HOST}%{REQUEST_URI} [L]
-# </Location>
-# </IfModule>
-#</IfModule>
-
+++ /dev/null
-#
-# /etc/sysctl.conf - Configuration file for setting system variables
-# See sysctl.conf (5) for information.
-#
-#kernel.domainname=example.com
-#kernel.printk=4 4 1 7
-#net.ipv4.conf.all.accept_redirects=0
-#net.ipv4.conf.all.accept_source_route=0
-#net.ipv4.conf.all.log_martians=1
-#net.ipv4.conf.all.rp_filter=1
-#net.ipv4.conf.all.send_redirects=0
-#net.ipv4.conf.default.rp_filter=1
-#net.ipv4.icmp_echo_ignore_broadcasts=1
-#net.ipv4.icmp_ignore_bogus_error_responses=1
-#net.ipv4.ip_forward=1
-#net.ipv6.conf.all.accept_redirects=0
-#net.ipv6.conf.all.accept_source_route=0
-#net.ipv6.conf.all.forwarding=1
-kernel.maps_protect=1
-net.core.rmem_default=1048576
-net.core.wmem_default=1048576
-net.ipv4.conf.all.accept_redirects=0
-net.ipv4.conf.all.accept_source_route=0
-net.ipv4.conf.all.log_martians=1
-net.ipv4.conf.all.rp_filter=1
-net.ipv4.conf.all.secure_redirects=1
-net.ipv4.conf.all.send_redirects=0
-net.ipv4.icmp_echo_ignore_broadcasts=1
-net.ipv4.icmp_ignore_bogus_error_responses=1
-net.ipv4.ip_forward=0
-net.ipv4.ip_local_port_range=10000 65000
-net.ipv4.tcp_ecn=0
-net.ipv4.tcp_max_syn_backlog=1024
-net.ipv4.tcp_retries1=2
-net.ipv4.tcp_rfc1337=1
-net.ipv4.tcp_syncookies=1
-vm.mmap_min_addr=65536
+++ /dev/null
-#
-# /etc/sysctl.conf - Configuration file for setting system variables
-# See /etc/sysctl.d/ for additonal system variables
-# See sysctl.conf (5) for information.
-#
-
-#kernel.domainname = example.com
-
-# Uncomment the following to stop low-level messages on console
-#kernel.printk = 4 4 1 7
-
-##############################################################3
-# Functions previously found in netbase
-#
-
-# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
-# Turn on Source Address Verification in all interfaces to
-# prevent some spoofing attacks
-#net.ipv4.conf.default.rp_filter=1
-#net.ipv4.conf.all.rp_filter=1
-
-# Uncomment the next line to enable TCP/IP SYN cookies
-# This disables TCP Window Scaling (http://lkml.org/lkml/2008/2/5/167),
-# and is not recommended.
-#net.ipv4.tcp_syncookies=1
-
-# Uncomment the next line to enable packet forwarding for IPv4
-#net.ipv4.ip_forward=1
-
-# Uncomment the next line to enable packet forwarding for IPv6
-#net.ipv6.conf.all.forwarding=1
-
-
-###################################################################
-# Additional settings - these settings can improve the network
-# security of the host and prevent against some network attacks
-# including spoofing attacks and man in the middle attacks through
-# redirection. Some network environments, however, require that these
-# settings are disabled so review and enable them as needed.
-#
-# Ignore ICMP broadcasts
-#net.ipv4.icmp_echo_ignore_broadcasts = 1
-#
-# Ignore bogus ICMP errors
-#net.ipv4.icmp_ignore_bogus_error_responses = 1
-#
-# Do not accept ICMP redirects (prevent MITM attacks)
-#net.ipv4.conf.all.accept_redirects = 0
-#net.ipv6.conf.all.accept_redirects = 0
-# _or_
-# Accept ICMP redirects only for gateways listed in our default
-# gateway list (enabled by default)
-# net.ipv4.conf.all.secure_redirects = 1
-#
-# Do not send ICMP redirects (we are not a router)
-#net.ipv4.conf.all.send_redirects = 0
-#
-# Do not accept IP source route packets (we are not a router)
-#net.ipv4.conf.all.accept_source_route = 0
-#net.ipv6.conf.all.accept_source_route = 0
-#
-# Log Martian Packets
-#net.ipv4.conf.all.log_martians = 1
-#
-# The contents of /proc/<pid>/maps and smaps files are only visible to
-# readers that are allowed to ptrace() the process
-# kernel.maps_protect = 1
# go into a certain directory.
dirmessage_enable=YES
#
+# If enabled, vsftpd will display directory listings with the time
+# in your local time zone. The default is to display GMT. The
+# times returned by the MDTM FTP command are also affected by this
+# option.
+use_localtime=YES
+#
# Activate logging of uploads/downloads.
xferlog_enable=YES
#
# below.
#xferlog_file=/var/log/vsftpd.log
#
-# If you want, you can have your log file in standard ftpd xferlog format
+# If you want, you can have your log file in standard ftpd xferlog format.
+# Note that the default log file location is /var/log/xferlog in this case.
#xferlog_std_format=YES
#
# You may change the default value for timing out an idle session.
# You may specify an explicit list of local users to chroot() to their home
# directory. If chroot_local_user is YES, then this list becomes a list of
# users to NOT chroot().
+#chroot_local_user=YES
#chroot_list_enable=YES
# (default follows)
#chroot_list_file=/etc/vsftpd.chroot_list
# the presence of the "-R" option, so there is a strong case for enabling it.
#ls_recurse_enable=YES
#
-#
# Debian customization
#
# Some of vsftpd's settings don't fit the Debian filesystem layout by
# directory should not be writable by the ftp user. This directory is used
# as a secure chroot() jail at times vsftpd does not require filesystem
# access.
-secure_chroot_dir=/var/run/vsftpd
+secure_chroot_dir=/var/run/vsftpd/empty
#
# This string is the name of the PAM service vsftpd will use.
pam_service_name=vsftpd
#
# This option specifies the location of the RSA certificate to use for SSL
# encrypted connections.
-rsa_cert_file=/etc/ssl/certs/vsftpd.pem
+rsa_cert_file=/etc/ssl/private/vsftpd.pem
# go into a certain directory.
dirmessage_enable=YES
#
+# If enabled, vsftpd will display directory listings with the time
+# in your local time zone. The default is to display GMT. The
+# times returned by the MDTM FTP command are also affected by this
+# option.
+use_localtime=YES
+#
# Activate logging of uploads/downloads.
xferlog_enable=YES
#
# below.
#xferlog_file=/var/log/vsftpd.log
#
-# If you want, you can have your log file in standard ftpd xferlog format
+# If you want, you can have your log file in standard ftpd xferlog format.
+# Note that the default log file location is /var/log/xferlog in this case.
#xferlog_std_format=YES
#
# You may change the default value for timing out an idle session.
# You may specify an explicit list of local users to chroot() to their home
# directory. If chroot_local_user is YES, then this list becomes a list of
# users to NOT chroot().
+#chroot_local_user=YES
#chroot_list_enable=YES
# (default follows)
#chroot_list_file=/etc/vsftpd.chroot_list
# the presence of the "-R" option, so there is a strong case for enabling it.
#ls_recurse_enable=YES
#
-#
# Debian customization
#
# Some of vsftpd's settings don't fit the Debian filesystem layout by
# directory should not be writable by the ftp user. This directory is used
# as a secure chroot() jail at times vsftpd does not require filesystem
# access.
-secure_chroot_dir=/var/run/vsftpd
+secure_chroot_dir=/var/run/vsftpd/empty
#
# This string is the name of the PAM service vsftpd will use.
pam_service_name=vsftpd
#
# This option specifies the location of the RSA certificate to use for SSL
# encrypted connections.
-rsa_cert_file=/etc/ssl/certs/vsftpd.pem
+rsa_cert_file=/etc/ssl/private/vsftpd.pem
--- /dev/null
+<!-- @(#) $Id$
+ - Example of local rules for OSSEC.
+ -
+ - Copyright (C) 2009 Trend Micro Inc.
+ - All rights reserved.
+ -
+ - This program is a free software; you can redistribute it
+ - and/or modify it under the terms of the GNU General Public
+ - License (version 2) as published by the FSF - Free Software
+ - Foundation.
+ -
+ - License details: http://www.ossec.net/en/licensing.html
+ -->
+
+
+<!-- Modify it at your will. -->
+
+<group name="local,syslog,">
+
+ <!-- Note that rule id 5711 is defined at the ssh_rules file
+ - as a ssh failed login. This is just an example
+ - since ip 1.1.1.1 shouldn't be used anywhere.
+ - Level 0 means ignore.
+ -->
+ <rule id="100001" level="0">
+ <if_sid>5711</if_sid>
+ <srcip>1.1.1.1</srcip>
+ <description>Example of rule that will ignore sshd </description>
+ <description>failed logins from IP 1.1.1.1.</description>
+ </rule>
+
+
+ <!-- This example will ignore ssh failed logins for the user name XYZABC.
+ -->
+ <!--
+ <rule id="100020" level="0">
+ <if_sid>5711</if_sid>
+ <user>XYZABC</user>
+ <description>Example of rule that will ignore sshd </description>
+ <description>failed logins for user XYZABC.</description>
+ </rule>
+ -->
+
+
+ <!-- Specify here a list of rules to ignore. -->
+ <!--
+ <rule id="100030" level="0">
+ <if_sid>12345, 23456, xyz, abc</if_sid>
+ <description>List of rules to be ignored.</description>
+ </rule>
+ -->
+
+</group> <!-- SYSLOG,LOCAL -->
+
+
+<!-- EOF -->
+<!-- Begin update by CARNet package ossec-hids-cn -- DO NOT DELETE THIS LINE!-->
+<group name="local">
+ <rule id="100031" level="0">
+ <if_sid>1002</if_sid>
+ <match>rsync</match>
+ <description>Events ignored</description>
+ </rule>
+
+ <rule id="100032" level="0">
+ <if_sid>1002</if_sid>
+ <program_name>^sophie|^smartd</program_name>
+ <description>Ignore Sophie/SMARTd</description>
+ </rule>
+
+ <rule id="100033" level="0">
+ <if_sid>3303</if_sid>
+ <description>Events ignored</description>
+ </rule>
+
+ <rule id="100034" level="0">
+ <if_sid>3356</if_sid>
+ <description>Ignore blacklisted mail</description>
+ </rule>
+
+ <rule id="100035" level="0">
+ <if_sid>1002</if_sid>
+ <match>cache</match>
+ <program_name>^named</program_name>
+ <description>Ignore BIND cache warnings</description>
+ </rule>
+
+ <rule id="100036" level="0">
+ <if_sid>2933</if_sid>
+ <match>Updated timestamp for job</match>
+ <program_name>^anacron</program_name>
+ <description>Ignore Anacron warnings</description>
+ </rule>
+</group>
+<!-- End update by CARNet package ossec-hids-cn -- DO NOT DELETE THIS LINE!-->
--- /dev/null
+<!-- @(#) $Id$
+ - Example of local rules for OSSEC.
+ -
+ - Copyright (C) 2009 Trend Micro Inc.
+ - All rights reserved.
+ -
+ - This program is a free software; you can redistribute it
+ - and/or modify it under the terms of the GNU General Public
+ - License (version 2) as published by the FSF - Free Software
+ - Foundation.
+ -
+ - License details: http://www.ossec.net/en/licensing.html
+ -->
+
+
+<!-- Modify it at your will. -->
+
+<group name="local,syslog,">
+
+ <!-- Note that rule id 5711 is defined at the ssh_rules file
+ - as a ssh failed login. This is just an example
+ - since ip 1.1.1.1 shouldn't be used anywhere.
+ - Level 0 means ignore.
+ -->
+ <rule id="100001" level="0">
+ <if_sid>5711</if_sid>
+ <srcip>1.1.1.1</srcip>
+ <description>Example of rule that will ignore sshd </description>
+ <description>failed logins from IP 1.1.1.1.</description>
+ </rule>
+
+
+ <!-- This example will ignore ssh failed logins for the user name XYZABC.
+ -->
+ <!--
+ <rule id="100020" level="0">
+ <if_sid>5711</if_sid>
+ <user>XYZABC</user>
+ <description>Example of rule that will ignore sshd </description>
+ <description>failed logins for user XYZABC.</description>
+ </rule>
+ -->
+
+
+ <!-- Specify here a list of rules to ignore. -->
+ <!--
+ <rule id="100030" level="0">
+ <if_sid>12345, 23456, xyz, abc</if_sid>
+ <description>List of rules to be ignored.</description>
+ </rule>
+ -->
+
+</group> <!-- SYSLOG,LOCAL -->
+
+
+<!-- EOF -->
local hostname domain config_new memtotal memlimit
# restore simple configs
- if pkg ntp-cn && pkg ntp lt 1:4.2.6.p2+dfsg-1+b1; then
+ if pkg ntp-cn && pkg ntp lt 1:4.2.6.p5+dfsg-2; then
if restore_file /etc/ntp.conf; then
postupgrade_reconfigure ntp-cn
fi
fi
- if pkg kernel-2.6-cn && pkg procps lt 1:3.2.8-9; then
- if restore_file /etc/sysctl.conf; then
- postupgrade_reconfigure kernel-2.6-cn
- fi
- fi
-
- if pkg kernel-2.6-cn && pkg libpam-modules lt 1.1.1-6.1; then
- if restore_file /etc/security/limits.conf; then
- postupgrade_reconfigure kernel-2.6-cn
- fi
- fi
-
- if pkg vsftpd-cn && pkg vsftpd lt 2.3.2-3+squeeze2; then
+ if pkg vsftpd-cn && pkg vsftpd lt 2.3.5-3; then
if restore_file /etc/vsftpd.conf; then
postupgrade_reconfigure vsftpd-cn
fi
fi
- if pkg squirrelmail-cn && pkg squirrelmail lt 2:1.4.21-2; then
- if restore_file /etc/squirrelmail/apache.conf; then
- postupgrade_reconfigure squirrelmail-cn
+ if pkg amavisd-cn && pkg amavisd-new lt 1:2.7.1-2; then
+ if restore_file /etc/cron.d/amavisd-new; then
+ rm -f /etc/cron.d/amavisd-new.$backup_ext
+ postupgrade_reconfigure amavisd-cn
fi
fi
- if pkg spamassassin-cn && pkg spamassassin lt 3.3.1-1; then
- if restore_file /etc/spamassassin/v310.pre; then
- postupgrade_reconfigure spamassassin-cn
+ if pkg ossec-hids lt 2.7-1; then
+ if restore_file /var/ossec/rules/local_rules.xml; then
+ postupgrade_reconfigure ossec-hids-cn
fi
fi
- if pkg amavisd-cn && pkg amavisd-new lt 1:2.6.4-3; then
- if restore_file /etc/cron.daily/amavisd-new; then
- rm -f /etc/cron.daily/amavisd-new.$backup_ext
- postupgrade_reconfigure amavisd-cn
+ if pkg sasl2-bin lt 2.1.25.dfsg1-6+deb7u1; then
+ if restore_file /etc/default/saslauthd; then
+ postupgrade_reconfigure postfix-cn
fi
-
- if restore_file /etc/amavis/conf.d/15-av_scanners; then
- rm -f /etc/amavis/conf.d/15-av_scanners.$backup_ext
- postupgrade_reconfigure amavisd-cn
- fi
- fi
-
- if pkg amavisd-cn lt 3:2.6.5; then
- restore_file /etc/init.d/amavisd-cn
- rm -f /etc/init.d/amavisd-cn.$backup_ext
- fi
-
- if pkg console-tools lt 1:0.2.3dbs-69.1; then
- restore_file /etc/console-tools/config
fi
- if pkg base-files lt 6.0squeeze2; then
+ if pkg base-files lt 7.1wheezy2; then
restore_file /etc/issue
restore_file /etc/issue.net
fi
- if pkg slapd lt 2.4.23-7.2; then
- restore_file /etc/default/slapd
- fi
-
- # dovecot won't start with these options
- if pkg dovecot-cn && pkg dovecot-common lt 1:1.2.15-7; then
- sed -i 's/^\( *\)\(sieve\(_storage\)\?=.*\)/\1#\2/' \
- /etc/dovecot/dovecot.conf
- fi
-
# check if monitrc is template based
if [ -e /etc/monit/monitrc ]; then # monit is removed at this point
# regenerate config from template