From owner-freebsd-ports Tue Jun 18 3:50:56 2002 Delivered-To: freebsd-ports@hub.freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id CA05D37B40F for ; Tue, 18 Jun 2002 03:50:02 -0700 (PDT) Received: (from gnats@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g5IAo2U90725; Tue, 18 Jun 2002 03:50:02 -0700 (PDT) (envelope-from gnats) Received: from neva.vlink.ru (neva.vlink.ru [195.239.222.8]) by hub.freebsd.org (Postfix) with ESMTP id 8508637B407 for ; Tue, 18 Jun 2002 03:46:54 -0700 (PDT) Received: from neva.vlink.ru (localhost [127.0.0.1]) by neva.vlink.ru (8.12.3/8.12.3) with ESMTP id g5IAkkXD010127 for ; Tue, 18 Jun 2002 14:46:49 +0400 (MSD) (envelope-from dsh@neva.vlink.ru) Received: (from dsh@localhost) by neva.vlink.ru (8.12.3/8.12.3/Submit) id g5IAkkFw010126; Tue, 18 Jun 2002 14:46:46 +0400 (MSD) Message-Id: <200206181046.g5IAkkFw010126@neva.vlink.ru> Date: Tue, 18 Jun 2002 14:46:46 +0400 (MSD) From: Denis Shaposhnikov Reply-To: Denis Shaposhnikov To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Subject: ports/39461: new FreeBSD port mail/avcheck Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org >Number: 39461 >Category: ports >Synopsis: new FreeBSD port mail/avcheck >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Tue Jun 18 03:50:02 PDT 2002 >Closed-Date: >Last-Modified: >Originator: Denis Shaposhnikov >Release: FreeBSD 4.6-RC i386 >Organization: >Environment: System: FreeBSD neva.vlink.ru 4.6-RC FreeBSD 4.6-RC #5: Mon Jun 10 14:25:55 MSD 2002 dsh@neva.vlink.ru:/var/FreeBSD/src/sys/compile/NEVA i386 >Description: Avcheck is a simple program that allows you to call an antivirus software in order to check mail messages for viruses before actual delivery from within a Mail Transfer Agent, or MTA. Avcheck itself isn't a virusscanner, nor it is an MTA. It sits between the MTA and a real antivirus software. Most MTAs available today can call an external program for every mail message in order to perform various tasks, including virus scanning and content filtering. Avcheck can be used as that external program. Avcheck will receive a mail message from a mail system, pass it to an antivirus software, and, depending on the presence of a virus in that message, will either allow the message to be delivered or take appropriate actions to handle infected mail. Avcheck does nothing with a mail message contents -- it's task is to prepare file with a mail message and feed it to an antivirus progra. It's an antivirus task to decode MIME structure, handle embedded archives and so on. Many but not all antivirus products today have this ability. Avcheck consists of two basic parts that works together. One of them, a small executable called avcheck, used to perform all necessary actions to determine if a given message is infected (with a call to an antivirus engine). This program has built-in small SMTP client, to be able to inject mail for further delivery faster. Second component, infected program (usually a shell script), called to handle any mail message that is infected by a virus. This program will not be called often (you don't have many infected mail coming via your mail server, do you?). This second component should do all the required work to do something with an infected mail message -- this is very site-specific. Thus, it is easy to write your own handler that will suit your needs best. There are two ready-to-run examples of such a handler provided in the distribution, one of them have translations to many different languages. Initially, Avcheck was written as a little hack that allows to use an excellent MTA -- Postfix -- together with AVP antivirus daemon. Later, it was developed into a more general system that can be used with different antivirus engines and different MTAs, with flexible configurable actions to infected mails, while still remaining very simple. WWW: http://www.corpit.ru/avcheck/ >How-To-Repeat: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # avcheck/ # avcheck/Makefile # avcheck/pkg-plist # avcheck/distinfo # avcheck/pkg-comment # avcheck/pkg-descr # echo c - avcheck/ mkdir -p avcheck/ > /dev/null 2>&1 echo x - avcheck/Makefile sed 's/^X//' >avcheck/Makefile << 'END-of-avcheck/Makefile' X# New ports collection makefile for: avcheck X# Date created: Fri Jun 14 14:31:42 MSD 2002 X# Whom: dsh@vlink.ru X# X# $FreeBSD$ X# X XPORTNAME= avcheck XPORTVERSION= 0.8 XCATEGORIES= mail XMASTER_SITES= http://www.corpit.ru/ftp/avcheck/ X XMAINTAINER= dsh@vlink.ru X XMAN1= avcheck.1 X XAVCHECK_DOCS= README.AVP README.AVP.de README.DrWeb README.Exim \ X README.Postfix README.Postfix.de README.Sendmail eicar.msg \ X eicar.txt XAVCHECK_SBINS= avcheck uchroot X Xdo-install: X.for i in ${AVCHECK_SBINS} X ${INSTALL_PROGRAM} ${WRKSRC}/${i} ${PREFIX}/sbin/ X.endfor X X.for i in ${MAN1} X ${INSTALL_MAN} ${WRKSRC}/${i} ${MANPREFIX}/man/man1/ X.endfor X X.if !defined(NOPORTSDOC) X ${MKDIR} ${PREFIX}/share/doc/${PORTNAME} X.for i in ${AVCHECK_DOCS} X ${INSTALL_DATA} ${WRKSRC}/${i} ${PREFIX}/share/doc/${PORTNAME}/ X.endfor X.endif X X.include END-of-avcheck/Makefile echo x - avcheck/pkg-plist sed 's/^X//' >avcheck/pkg-plist << 'END-of-avcheck/pkg-plist' Xsbin/avcheck Xsbin/uchroot X%%PORTDOCS%%share/doc/avcheck/README.AVP X%%PORTDOCS%%share/doc/avcheck/README.AVP.de X%%PORTDOCS%%share/doc/avcheck/README.DrWeb X%%PORTDOCS%%share/doc/avcheck/README.Exim X%%PORTDOCS%%share/doc/avcheck/README.Postfix X%%PORTDOCS%%share/doc/avcheck/README.Postfix.de X%%PORTDOCS%%share/doc/avcheck/README.Sendmail X%%PORTDOCS%%share/doc/avcheck/eicar.msg X%%PORTDOCS%%share/doc/avcheck/eicar.txt X%%PORTDOCS%%@dirrm share/doc/avcheck END-of-avcheck/pkg-plist echo x - avcheck/distinfo sed 's/^X//' >avcheck/distinfo << 'END-of-avcheck/distinfo' XMD5 (avcheck-0.8.tar.gz) = 951963d4eee44c23c862087ace984a23 END-of-avcheck/distinfo echo x - avcheck/pkg-comment sed 's/^X//' >avcheck/pkg-comment << 'END-of-avcheck/pkg-comment' XA simple antivirus solution for a mail system. END-of-avcheck/pkg-comment echo x - avcheck/pkg-descr sed 's/^X//' >avcheck/pkg-descr << 'END-of-avcheck/pkg-descr' XAvcheck is a simple program that allows you to call an antivirus Xsoftware in order to check mail messages for viruses before actual Xdelivery from within a Mail Transfer Agent, or MTA. X XAvcheck itself isn't a virusscanner, nor it is an MTA. It sits between Xthe MTA and a real antivirus software. Most MTAs available today can Xcall an external program for every mail message in order to perform Xvarious tasks, including virus scanning and content filtering. Avcheck Xcan be used as that external program. X XAvcheck will receive a mail message from a mail system, pass it to an Xantivirus software, and, depending on the presence of a virus in that Xmessage, will either allow the message to be delivered or take Xappropriate actions to handle infected mail. X XAvcheck does nothing with a mail message contents -- it's task is to Xprepare file with a mail message and feed it to an antivirus Xprogra. It's an antivirus task to decode MIME structure, handle Xembedded archives and so on. Many but not all antivirus products today Xhave this ability. X XAvcheck consists of two basic parts that works together. One of them, Xa small executable called avcheck, used to perform all necessary Xactions to determine if a given message is infected (with a call to an Xantivirus engine). This program has built-in small SMTP client, to be Xable to inject mail for further delivery faster. Second component, Xinfected program (usually a shell script), called to handle any mail Xmessage that is infected by a virus. This program will not be called Xoften (you don't have many infected mail coming via your mail server, Xdo you?). This second component should do all the required work to do Xsomething with an infected mail message -- this is very Xsite-specific. Thus, it is easy to write your own handler that will Xsuit your needs best. There are two ready-to-run examples of such a Xhandler provided in the distribution, one of them have translations to Xmany different languages. X XInitially, Avcheck was written as a little hack that allows to use an Xexcellent MTA -- Postfix -- together with AVP antivirus daemon. Later, Xit was developed into a more general system that can be used with Xdifferent antivirus engines and different MTAs, with flexible Xconfigurable actions to infected mails, while still remaining very Xsimple. X XWWW: http://www.corpit.ru/avcheck/ END-of-avcheck/pkg-descr exit >Fix: >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message