Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 May 2004 14:59:01 +0200 (CEST)
From:      Jan-Peter Koopmann <j.koopmann@seceidos.de>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/67216: [MAINTAINER] mail/MailScanner-devel: update to 4.31.3
Message-ID:  <200405261259.i4QCx19u081760@services.intern.seceidos.de>
Resent-Message-ID: <200405261300.i4QD0a9h000256@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         67216
>Category:       ports
>Synopsis:       [MAINTAINER] mail/MailScanner-devel: update to 4.31.3
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Wed May 26 06:00:36 PDT 2004
>Closed-Date:
>Last-Modified:
>Originator:     Jan-Peter Koopmann
>Release:        FreeBSD 4.9-STABLE i386
>Organization:
>Environment:
System: FreeBSD services.intern.seceidos.de 4.9-STABLE FreeBSD 4.9-STABLE #0: Mon Jan  5 10:56:46 CET
>Description:
- Update to 4.31.3

6/5/2004 New in Version 4.31.3
===============================
* New Features and Improvements *
- Added install.sh script for tar distribution which builds all Perl modules,
  tnef decoder and MailScanner automatically.
- Added support for Vexira virus scanner.
- Implemented support for F-Secure 4.61.
- Implemented support for Nod32 2.01. If you are still running 1.99, you
  will need to edit /etc/MailScanner/virus.scanners.conf.
- Reports can now contain %variables% such as %org-name%.
- Changed default installation location of Bitdefender to /opt/bdc.
- Upgraded tnef to latest release from sourceforge.
- Moved ExtUtils::MakeMaker into list of normal perl modules to install.
- Linux distributions now auto-detect MTA setting in /etc/sysconfig/MailScanner.
- Can now detect very small images in a message, that may be "web bugs" to
  track you. These can be disarmed if you want.
- Changed documentation to just list single-instance version of Postfix.
- Changed init.d scripts to work well with both single and double instance of
  Postfix.

* Fixes *
- Forced AVG to run in English.
- Corrected problem with negative failure counts from RBLs and SA.
- Fixed bug in LDAP ruleset handling.
- Sendmail code now auto-detects the correct lock type to use, flock or posix.
- Sendmail qf files no longer have to define an IP address.
- Corrected report when archive is nested too deeply.
- ZMailer forwarding fix provided by Mariano.
- Fixed Postfix message corruption on recent Postfixes on some architectures.

Generated with FreeBSD Port Tools 0.50

>How-To-Repeat:
>Fix:

--- MailScanner-devel-4.31.3.patch begins here ---
diff -ruN --exclude=CVS /server-root/ports/mail/mailscanner-devel.orig/Makefile /server-root/ports/mail/mailscanner-devel/Makefile
--- /server-root/ports/mail/mailscanner-devel.orig/Makefile	Wed Mar 31 17:57:12 2004
+++ /server-root/ports/mail/mailscanner-devel/Makefile	Wed May 26 14:41:16 2004
@@ -6,11 +6,11 @@
 #
 
 PORTNAME=	MailScanner
-PORTVERSION=	4.29.5
+PORTVERSION=	4.31.3
 CATEGORIES=	mail
 MASTER_SITES=	http://www.sng.ecs.soton.ac.uk/mailscanner/files/4/tar/
 PKGNAMESUFFIX=	-devel
-DISTNAME=	${PORTNAME}-${PORTVERSION}-${PATCHLEVEL}
+DISTNAME=	${PORTNAME}-install-${PORTVERSION}-${PATCHLEVEL}
 
 MAINTAINER=	j.koopmann@seceidos.de
 COMMENT=	Powerful virus/spam scanning framework for mail gateways
@@ -40,7 +40,7 @@
 
 USE_PERL5=	yes
 
-WRKSRC=		${WRKDIR}/${PORTNAME}-${PORTVERSION}
+WRKSRC=		${WRKDIR}/${PORTNAME}-install-${PORTVERSION}
 PKGMESSAGE=	${WRKDIR}/pkg-message
 
 MAN8=		MailScanner.8
@@ -65,6 +65,9 @@
 		kavdaemonclient-wrapper mcafee-autoupdate \
 		nod32-autoupdate rav-autoupdate \
 		rav-wrapper sophos-autoupdate
+
+post-extract:
+	cd ${WRKSRC} && tar xvzf perl-tar/MailScanner-${PORTVERSION}-${PATCHLEVEL}.tar.gz > /dev/null && ${MV} MailScanner-${PORTVERSION}/* .
 
 do-build:
 	${PERL} -pi -e \
diff -ruN --exclude=CVS /server-root/ports/mail/mailscanner-devel.orig/distinfo /server-root/ports/mail/mailscanner-devel/distinfo
--- /server-root/ports/mail/mailscanner-devel.orig/distinfo	Wed Mar 31 17:57:12 2004
+++ /server-root/ports/mail/mailscanner-devel/distinfo	Wed May 26 13:35:00 2004
@@ -1,2 +1,2 @@
-MD5 (MailScanner-4.29.5-1.tar.gz) = 44cb5971ce7611be52a95b919385da90
-SIZE (MailScanner-4.29.5-1.tar.gz) = 978263
+MD5 (MailScanner-install-4.31.3-1.tar.gz) = b85e31c6bbc906f6d282274f3f04b010
+SIZE (MailScanner-install-4.31.3-1.tar.gz) = 5789871
diff -ruN --exclude=CVS /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.8 /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.8
--- /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.8	Wed Mar 31 17:57:12 2004
+++ /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.8	Wed May 26 14:34:23 2004
@@ -1,8 +1,8 @@
---- ../MailScanner-4.29.5.orig/docs/man/MailScanner.8	Tue Mar 23 14:41:54 2004
-+++ docs/man/MailScanner.8	Tue Mar 23 14:42:11 2004
+--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.8	Wed May 26 14:32:21 2004
++++ docs/man/MailScanner.8	Wed May 26 14:34:02 2004
 @@ -1,4 +1,4 @@
--.TH "MailScanner" "8" "4.28.5" "Julian Field" "Mail"
-+.TH "MailScanner" "8" "4.29.5" "Julian Field" "Mail"
+-.TH "MailScanner" "8" "4.29.5" "Julian Field" "Mail"
++.TH "MailScanner" "8" "4.31.4" "Julian Field" "Mail"
  .SH "NAME"
  .LP 
  MailScanner \- Virus/Spam Scanner for Sendmail, Exim and Postfix
diff -ruN --exclude=CVS /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.8.html /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.8.html
--- /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.8.html	Wed Mar 31 17:57:12 2004
+++ /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.8.html	Wed May 26 14:34:23 2004
@@ -1,9 +1,9 @@
---- ../MailScanner-4.29.5.orig/docs/man/MailScanner.8.html	Tue Mar 23 14:41:54 2004
-+++ docs/man/MailScanner.8.html	Tue Mar 23 14:42:14 2004
+--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.8.html	Wed May 26 14:32:21 2004
++++ docs/man/MailScanner.8.html	Wed May 26 14:34:05 2004
 @@ -1,5 +1,5 @@
  <!-- Creator     : groff version 1.19 -->
--<!-- CreationDate: Mon Mar  8 10:33:07 2004 -->
-+<!-- CreationDate: Tue Mar 23 14:41:26 2004 -->
+-<!-- CreationDate: Tue Mar 23 14:41:26 2004 -->
++<!-- CreationDate: Wed May 26 14:33:45 2004 -->
  <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
  "http://www.w3.org/TR/html4/loose.dtd">;
  <html>
diff -ruN --exclude=CVS /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.conf.5 /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.conf.5
--- /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.conf.5	Wed Mar 31 17:57:12 2004
+++ /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.conf.5	Wed May 26 14:40:19 2004
@@ -1,25 +1,411 @@
---- ../MailScanner-4.29.5.orig/docs/man/MailScanner.conf.5	Tue Mar 23 14:41:54 2004
-+++ docs/man/MailScanner.conf.5	Tue Mar 23 14:42:19 2004
+--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.conf.5	Wed May 26 14:39:41 2004
++++ docs/man/MailScanner.conf.5	Wed May 26 14:40:02 2004
 @@ -1,4 +1,4 @@
--.TH "MailScanner.conf" "5" "4.28.5" "Julian Field" "Mail"
-+.TH "MailScanner.conf" "5" "4.29.5" "Julian Field" "Mail"
+-.TH "MailScanner.conf" "5" "4.30.1" "Julian Field" "Mail"
++.TH "MailScanner.conf" "5" "4.31.4" "Julian Field" "Mail"
  .SH "NAME"
  .LP 
  MailScanner.conf \- Main configuration for MailScanner
-@@ -1739,6 +1739,16 @@
+@@ -117,16 +117,20 @@
+ Directory in which MailScanner should find e\-mail messages for scanning. This can be any of the following:
+ .br 
+ 
++.RS 7
++.IP  1. 4
++a directory name. 
++.br 
++Example: /var/spool/mqueue.in
++.IP  2. 4
++a wildcard giving directory names. 
++.br 
++Example: /var/spool/mqueue.in/*
++.IP  3. 4
++the name of a file containing a list of directory names, which can in turn contain wildcards. 
+ .br 
+-1. a directory name. Example: /var/spool/mqueue.in
+-.br 
+-
+-.br 
+-2. a wildcard giving directory names. Example: /var/spool/mqueue.in/*
+-.br 
+-
+-.br 
+-3. the name of a file containing a list of directory names, which can in turn contain wildcards. Example: /usr/local/etc/MailScanner/mqueue.in.list.conf
++Example: /usr/local/etc/MailScanner/mqueue.in.list.conf
++.RE
+ 
+ .TP 
+ \fBOutgoing Queue Dir\fR
+@@ -481,7 +485,7 @@
+ .br 
+ 
+ .br 
+-Which Virus Scanning package to use. Possible choices are sophos, sophossavi, mcafee, command, kaspersky, kaspersky\-4.5, kavdaemonclient, inoculate, inoculan, onoculan, nod32, nod32\-1.99, f\-secure, f\-prot, panda, rav, antivir, clamav, clamavmodule, css, trend, bitdefender, none (no virus scanning at all)
++Which Virus Scanning package to use. Possible choices are sophos, sophossavi, mcafee, command, bitdefender, kaspersky, kaspersky\-4.5, kavdaemonclient, inoculate, inoculan, nod32, nod32\-1.99, f\-secure, f\-prot, panda, rav, antivir, clamav, clamavmodule, css, trend, norman, avg, vexira, none (no virus scanning at all)
+ .br 
+ 
+ .br 
+@@ -515,17 +519,18 @@
+ .br 
+ Messages whose virus reports contain any of the words listed here will be treated as "silent" viruses. No messages will be sent back to the senders of these viruses, and the delivery to the recipient of the message can be controlled by the next option "Still Deliver Silent Viruses". This is primarily designed for viruses such as "Klez" and "Bugbear" which put fake addresses on messages they send, so there is no point informing the sender of the message, as it won't actually be them who sent it anyway. Other words that can be put in this list are the 5 special keywords
+ .br 
++.RS 7
++.IP  \(bu 4
+ HTML\-IFrame: inserting this will stop senders being warned about HTML Iframe tags, when they are not allowed.
+-.br 
++.IP  \(bu 4
+ HTML\-Codebase: inserting this will stop senders being warned about HTML Object Codebase tags, when they are not allowed.
+-.br 
++.IP  \(bu 4
+ Zip\-Password: inserting this will stop senders being warned about password\-protected zip files when they are not allowd. This keyword is not needed if you include All\-Viruses.
+-.br 
++.IP  \(bu 4
+ All\-Viruses: inserting this will stop senders being warned about any virus, while still allowing you to warn senders about HTML\-based attacks. This includes Zip\-Password so you don't need to include both.
+ .br 
+-
+-.br 
+ The default of "All\-Viruses" means that no senders of viruses will be notified (as the sender address is always forged these days anyway), but anyone who sends a message that is blocked for other reasons will still be notified.
++.RE
+ 
+ 
+ .TP 
+@@ -580,17 +585,16 @@
+ .br 
+ 
+ .br 
+-Do you want to allow HTML <IFrame> tags in email messages? This is not a good idea as it allows various Microsoft Outlook security vulnerabilities to go unprotected, but if you have a load of mailing lists sending them, then you will want to allow them to keep your users happy. Possible Values:
+-.br 
+-
++Do you want to allow HTML <IFrame> tags in email messages? This is not a good idea as it allows various Microsoft Outlook security vulnerabilities to go unprotected, but if you have a load of mailing lists sending them, then you will want to allow them to keep your users happy. This can also be the filename of a ruleset, so you can allow them from known mailing lists but ban them from everywhere else. Possible Values:
+ .br 
++.RS 7
++.IP  \(bu 4
+ yes    => Allow these tags to be in the message
++.IP  \(bu 4
+ no     => Ban messages containing these tags
++.IP  \(bu 4
+ disarm => Allow these tags, but stop these tags from working
+-.br 
+-
+-.br 
+-This can also be the filename of a ruleset, so you can allow them from known mailing lists but ban them from everywhere else.
++.RE
  
+ .TP 
+ \fBLog IFrame Tags\fR
+@@ -606,13 +610,50 @@
  .br 
- This is the directory in which lock files are placed to stop the virus scanners used while they are in the middle of updating themselves with new virus definitions. If you change this at all, you will need to edit the "autoupdate" scripts for all your virus scanners. 
+ 
+ .br 
+-Do you want to allow <Form> tags in email messages? This is a bad idea as these are used as scams to pursuade people to part with credit card information and other personal data. This can also be the filename of a ruleset. Possible values:
++Do you want to allow <Form> tags in email messages? This is a bad idea as these are used as scams to persuade people to part with credit card information and other personal data. This can also be the filename of a ruleset. Possible values:
++.br 
++.RS 7
++.IP  \(bu 4
++yes    => Allow these tags to be in the message
++.IP  \(bu 4
++no     => Ban messages containing these tags
++.IP  \(bu 4
++disarm => Allow these tags, but stop these tags from working
++.RE
++
++.TP 
++\fBAllow Script Tags\fR
++Default: no
++.br 
++
++.br 
++Do you want to allow <Script> tags in email messages? This is a bad idea as these are used to exploit vulnerabilities in email applications and web browsers. This can also be the filename of a ruleset. Possible values:
++.br 
++.RS 7
++.IP  \(bu 4
++yes    => Allow these tags to be in the message
++.IP  \(bu 4
++no     => Ban messages containing these tags
++.IP  \(bu 4
++disarm => Allow these tags, but stop these tags from working
++.RE
 +
 +.TP 
-+\fBCustom Functions Dir\fR
-+Default: /opt/MailScanner/lib/MailScanner/CustomFunctions
++\fBAllow WebBugs\fR
++Default: disarm
+ .br 
+ 
+ .br 
++Do you want to allow <Img> tags with very small images in email messages? This is a bad idea as these are used as 'web bugs' to find out if a message has been read. It is not dangerous, it is just used to make you give away information. This can also be the filename of a ruleset. Possible values:
 +.br 
-+Default FreeBSD: /usr/local/lib/MailScanner/MailScanner/CustomFunctions
++.RS 7
++.IP  \(bu 4
+ yes    => Allow these tags to be in the message
++.IP  \(bu 4
+ no     => Ban messages containing these tags
++.IP  \(bu 4
+ disarm => Allow these tags, but stop these tags from working
++.RE
+ 
+ .TP 
+ \fBAllow Object Codebase Tags\fR
+@@ -622,11 +663,14 @@
+ .br 
+ Do you want to allow <Object Codebase=...> tags in email messages? This is a bad idea as it leaves you unprotected against various Microsoft\-specific security vulnerabilities. But if your users demand it, you can do it. This can also be the filename of a ruleset. Possible values:
+ .br 
+-
+-.br 
++.RS 7
++.IP  \(bu 4
+ yes    => Allow these tags to be in the message
++.IP  \(bu 4
+ no     => Ban messages containing these tags
++.IP  \(bu 4
+ disarm => Allow these tags, but stop these tags from working
++.RE
+ 
+ .TP 
+ \fBConvert Dangerous HTML To Text\fR
+@@ -701,6 +745,14 @@
+ Set this to store infected / dangerous attachments in directories created under the quarantine directory. Without this, they will be deleted. Due to laws on privacy and data protection in your country, you may be forced to set this to "no". 
+ 
+ .TP 
++\fBQuarantine Silent Viruses\fR
++Default: yes
 +.br 
 +
 +.br 
-+Where to put the code for your "Custom Functions". No code in this directory should be over\-written by the installation or upgrade process. All files starting with "." or ending with ".rpmnew" will be ignored, all other files will be compiled and may be used with Custom Functions.
++There is no point quarantining most viruses these days, so if you set this to "no" then no infections listed in your "Silent Viruses" setting will be quarantined, even if you have chosen to quarantine infections in general. This is currently set to "yes" so the behaviour is the same as it was in in previous versions. This can also be the filename of a ruleset.
++
++.TP 
+ \fBQuarantine Whole Message\fR
+ Default: no
+ .br 
+@@ -1348,6 +1400,14 @@
+ If a "Spam List" lookup times out for this many consecutive checks without ever succeeding, then the particular "Spam List" entry will not be used any more, as it appears to be unreachable. When MailScanner restarts itself after a few hours, MailScanner will try to use the entry again, in case service has resumed properly. 
  
  .TP 
- \fBLock Type\fR
++\fBSpam List Timeouts History\fR
++Default: 10
++.br 
++
++.br 
++The total number of Spam List attempts during which "Max Spam List Timeouts" will cause the spam list fo be marked as "unavailable". See the previous comment for more information. The default values of 5 and 10 mean that 5 timeouts in any sequence of 10 attempts will cause the list to be marked as "unavailable" until the next periodic restart (see "Restart Every").
++
++.TP 
+ \fBIs Definitely Not Spam\fR
+ Default: %rules\-dir%/spam.whitelist.rules
+ .br 
+@@ -1371,6 +1431,14 @@
+ .br 
+ Setting this to yes means that spam found in the blacklist is treated as "High Scoring Spam" in the "Spam Actions" section below. Setting it to no means that it will be treated as "normal" spam. This can also be the filename of a ruleset.
+ 
++
++.TP 
++\fBIgnore Spam Whitelist If Recipients Exceed\fR
++Default: 20
++.br 
++
++.br 
++Spammers have learnt that they can get their message through by sending a message with lots of recipients, one of which chooses to whitelist everything coming to them, including the spammer. So if a message arrives with more than this number of recipients, ignore the "Is Definitely Not Spam" whitelist.
+ .SH "SpamAssassin"
+ .TP 
+ \fBUse SpamAssassin\fR
+@@ -1420,11 +1488,7 @@
+ 
+ .TP 
+ \fBSpamAssassin Prefs File\fR
+-Default: /opt/MailScanner/etc/spam.assassin.prefs.conf
+-.br 
+-Default Linux: /etc/MailScanner/spam.assassin.prefs.conf
+-.br 
+-Default FreeBSD: /usr/local/etc/MailScanner/spam.assassin.prefs.conf
++Default: %etc\-dir%/spam.assassin.prefs.conf
+ .br 
+ 
+ .br 
+@@ -1447,6 +1511,14 @@
+ If several consecutive calls to SpamAssassin time out, then MailScanner decides that there is something stopping SpamAssassin from working properly. It will therefore be disabled for the next few hours until MailScanner restarts itself, at which point it will be tried again. 
+ 
+ .TP 
++\fBSpamAssassin Timeouts History\fR
++Default: 30
++.br 
++
++.br 
++The total number of SpamAssassin attempts during which "Max SpamAssassin Timeouts" will cause SpamAssassin to be marked as "unavailable". See the previous comment for more information. The default values of 10 and 20 mean that 10 timeouts in any sequence of 20 attempts will trigger the behaviour described above, until the next periodic restart (see "Restart Every").
++
++.TP 
+ \fBCheck SpamAssassin If On Spam List\fR
+ Default: yes
+ .br 
+@@ -1462,7 +1534,6 @@
+ .br 
+ If this option is set, then the "Spam Header" will be included in the header of every message, so its presence cannot be used to filter out spam by your users' e\-mail applications. 
+ 
+-
+ .TP 
+ \fBSpam Score\fR
+ Default: yes
+@@ -1480,7 +1551,6 @@
+ .br 
+ If you are using the Bayesian statistics engine on a busy server, you may well need to force a Bayesian database rebuild and expiry at regular intervals. This is measures in seconds. 24 hours = 86400 seconds. To disable this feature set this to 0.
+ 
+-
+ .TP 
+ \fBWait During Bayes Rebuild\fR
+ Default: no
+@@ -1502,35 +1572,25 @@
+ .br 
+ This can be any combination of 1 or more of the following keywords, and these actions are applied to any message which is spam. 
+ .br 
+-
+-.br 
++.RS 7
++.IP  \(bu 4
+ "deliver" \- the message is delivered to the recipient as normal 
+-.br 
+-
+-.br 
++.IP  \(bu 4
+ "delete" \- the message is deleted 
+-.br 
+-
+-.br 
++.IP  \(bu 4
+ "store" \- the message is stored in the quarantine 
+-.br 
+ 
+-.br 
++.IP  \(bu 4
+ "forward" \- an email address is supplied, to which the message is forwarded 
+-.br 
+-
+-.br 
++.IP  \(bu 4
+ "notify" \- Send the recipients a short notification that spam addressed to them was not delivered. They can then take action to request retrieval of the orginal message if they think it was not spam.
+-.br 
+-
+-.br 
++.IP  \(bu 4
+ "striphtml" \- convert all in\-line HTML content in the message to be stripped to plain text, which removes all images and scripts and so can be used to protect your users from offensive spam. Note that using this action on its own does not imply that the message will be delivered, you will need to specify "deliver" or "forward" to actually deliver the message. 
+-
+-.br 
++.IP  \(bu 4
+ "attachment" \- Convert the original message into an attachment of the message. This means the user has to take an extra step to open the spam, and stops "web bugs" very effectively.
+-
+-.br 
++.IP  \(bu 4
+ "bounce" \- bounce the spam message. This option should not be used and must be enabled with the "Enable Spam Bounce" option first.
++.RE
+ 
+ .TP 
+ \fBHigh Scoring Spam Actions\fR
+@@ -1654,10 +1714,12 @@
+ 
+ .br 
+ The per\-user files (bayes, auto\-whitelist, user_prefs) are looked for here and in ~/.spamassassin/. Note the files are mutable. If this is unset then no extra places are searched for. If using Postfix, you probably want to set this to /var/spool/MailScanner/spamassassin and do
+-.br  
+-	mkdir /var/spool/MailScanner/spamassassin
++
++.RS 10
++mkdir /var/spool/MailScanner/spamassassin
+ .br 
+-	chown postfix.postfix /var/spool/MailScanner/spamassassin
++chown postfix.postfix /var/spool/MailScanner/spamassassin
++.RE
+ 
+ .TP 
+ \fBSpamAssassin Install Prefix\fR
+@@ -1673,7 +1735,21 @@
+ .br 
+ 
+ .br 
+-The site\-local rules are searched for here, and in prefix /etc/spamassassin, prefix/etc/mail/spamassassin, /usr/local/etc/spamassassin, /etc/spamassassin, /etc/mail/spamassassin, and maybe others. If this is set then it adds to the list of places that are searched; otherwise it has no effect.
++This tells MailScanner where to look for the site\-local rules. If this is set it adds to the list of places that are searched. MailScanner will always look at the following places (even if this option is not set):
++.RS 7
++.IP  \(bu 4
++prefix/etc/spamassassin
++.IP  \(bu 4
++prefix/etc/mail/spamassassin
++.IP  \(bu 4
++/usr/local/etc/spamassassin
++.IP  \(bu 4
++/etc/spamassassin
++.IP  \(bu 4
++/etc/mail/spamassassin
++.IP  \(bu 4
++maybe others as well
++.RE
+ 
+ .TP 
+ \fBSpamAssassin Default Rules Dir\fR
+@@ -1681,7 +1757,17 @@
+ .br 
+ 
+ .br 
+-The default rules are searched for here, and in prefix/share/spamassassin, /usr/local/share/spamassassin, /usr/share/spamassassin, and maybe others. If this is set then it adds to the list of places that are searched; otherwise it has no effect.
++This tells MailScanner where to look for the default rules. If this is set it adds to the list of places that are searched. MailScanner will always look at the following places (even if this option is not set):
++.RS 7
++.IP  \(bu 4
++prefix/share/spamassassin
++.IP  \(bu 4
++/usr/local/share/spamassassin
++.IP  \(bu 4
++/usr/share/spamassassin
++.IP  \(bu 4
++maybe others as well
++.RE
+ .SH "Advanced Settings"
+ .TP 
+ \fBDebug\fR
+@@ -1768,8 +1854,20 @@
+ .br 
+ 
+ .br 
+-Some of the virus scanners are not supported by the authors of MailScanner, and they may use code contributed by another user. If this option is set to the wrong value for your virus scanners, then you will get an error message in your maillog (syslog) telling you tha# Are you using Exim with split spool directories? If you don't understand # this, the answer is probably "no". Refer to the Exim documentation for # more information about split spool directories.
+-Split Exim Spool = yes
++Minimum acceptable code stability status \-\- if we come across code that's not at least as stable as this, we barf. This is currently only used to check that you don't end up using untested virus scanner support code without realising it. Don't even *think* about setting this to anything other than "beta" or "supported" on a system that receives real mail until you have tested it yourself and are happy that it is all working as you expect it to. Don't set it to anything other than "supported" on a system that could ever receive important mail. Levels used are:
++
++.RS 7
++.IP  \(bu 4
++none \- there may not even be any code.
++.IP  \(bu 4
++unsupported \- code may be completely untested, a contributed dirty hack, anything, really.
++.IP  \(bu 4
++alpha \- code is pretty well untested. Don't assume it will work.
++.IP  \(bu 4
++beta \- code is tested a bit. It should work.
++.IP  \(bu 4
++supported \- code *should* be reliable.
++.RE
+ 
+ .TP 
+ \fBSplit Exim Spool\fR
+@@ -1785,20 +1883,17 @@
+ .br 
+ 
+ .br 
+-When trying to work out the value of configuration parameters which are using a ruleset, this controls the behaviour when a rule is checking the  "To:" addresses.  If this option is set to "yes", then the following happens when checking the ruleset:
+-.br 
+-
+-.br 
+-a) 1 recipient. Same behaviour as normal.
++When trying to work out the value of configuration parameters which are using a ruleset, this controls the behaviour when a rule is checking the  "To:" addresses.  If this option is set to "no", then some rules will use the result they get from the first matching rule for any of the recipients of a message, so the exact value cannot be predicted for messages with more than 1 recipient. This value *cannot* be the filename of a ruleset. 
+ .br 
+-b) Several recipients, but all in the same domain (domain.com for example). The rules are checked for one that matches the string "*@domain.com".
+-.br 
+-c) Several recipients, not all in the same domain. The rules are checked for one that matches the string "*@*".
+-.br 
+-
+-.br 
+-If this option is set to "no", then some rules will use the result they get from the first matching rule for any of the recipients of a message, so the exact value cannot be predicted for messages with more than 1 recipient. This value *cannot* be the filename of a ruleset.
+-
++If this option is set to "yes", then the following happens when checking the ruleset:
++.RS 7
++.IP  a) 4
++1 recipient. Same behaviour as normal.
++.IP  b) 4
++Several recipients, but all in the same domain (domain.com for example). The rules are checked for one that matches the string "*@domain.com".
++.IP  c) 4
++Several recipients, not all in the same domain. The rules are checked for one that matches the string "*@*".
++.RE
+ .SH "RULESETS"
+ .LP 
+ Ruleset files should all be put in /opt/MailScanner/etc/rules (FreeBSD: /usr/local/etc/MailScanner/rules) and their filename should end in ".rules" wherever possible.
diff -ruN --exclude=CVS /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.conf.5.html /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.conf.5.html
--- /server-root/ports/mail/mailscanner-devel.orig/files/patch-docs:man:MailScanner.conf.5.html	Wed Mar 31 17:57:12 2004
+++ /server-root/ports/mail/mailscanner-devel/files/patch-docs:man:MailScanner.conf.5.html	Wed May 26 14:40:19 2004
@@ -1,16 +1,341 @@
---- ../MailScanner-4.29.5.orig/docs/man/MailScanner.conf.5.html	Tue Mar 23 14:41:54 2004
-+++ docs/man/MailScanner.conf.5.html	Tue Mar 23 14:42:22 2004
+--- ../MailScanner-install-4.31.3.orig/docs/man/MailScanner.conf.5.html	Wed May 26 14:39:42 2004
++++ docs/man/MailScanner.conf.5.html	Wed May 26 14:40:05 2004
 @@ -1,5 +1,5 @@
  <!-- Creator     : groff version 1.19 -->
--<!-- CreationDate: Mon Mar  8 10:33:06 2004 -->
-+<!-- CreationDate: Tue Mar 23 14:41:26 2004 -->
+-<!-- CreationDate: Fri Apr  2 12:23:58 2004 -->
++<!-- CreationDate: Wed May 26 14:39:52 2004 -->
  <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
  "http://www.w3.org/TR/html4/loose.dtd">;
  <html>
-@@ -4701,6 +4701,33 @@
- change this at all, you will need to edit the
- &quot;autoupdate&quot; scripts for all your virus
- scanners.</p>
+@@ -331,21 +331,89 @@
+ <!-- INDENTATION -->
+ <p>Directory in which MailScanner should find e&minus;mail
+ messages for scanning. This can be any of the following:</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="5" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="3%">
++
++<p>1.</p>
++</td>
++<td width="3%"></td>
++<td width="26%">
++
++<p>a directory name.</p>
++</td>
++<td width="46%">
++</td>
++</table>
+ <!-- INDENTATION -->
+-<p>1. a directory name. Example: /var/spool/mqueue.in</p>
+-<!-- INDENTATION -->
+-<p>2. a wildcard giving directory names. Example:
+-/var/spool/mqueue.in/*</p>
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
++<p>Example: /var/spool/mqueue.in</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="5" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="3%">
++
++<p>2.</p>
++</td>
++<td width="3%"></td>
++<td width="52%">
++
++<p>a wildcard giving directory names.</p>
++</td>
++<td width="20%">
++</td>
++</table>
+ <!-- INDENTATION -->
+-<p>3. the name of a file containing a list of directory
+-names, which can in turn contain wildcards. Example:
+-/usr/local/etc/MailScanner/mqueue.in.list.conf</p>
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
++<p>Example: /var/spool/mqueue.in/*</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="3%">
++
++<p>3.</p>
++</td>
++<td width="3%"></td>
++<td width="72%">
++
++<p>the name of a file containing a list of directory names,
++which can in turn contain wildcards.</p>
+ </td>
+ </table>
+ <!-- INDENTATION -->
+ <table width="100%" border=0 rules="none" frame="void"
+        cols="2" cellspacing="0" cellpadding="0">
+ <tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
++<p>Example:
++/usr/local/etc/MailScanner/mqueue.in.list.conf</p></td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="89%">
+ <p><b>Outgoing Queue Dir</b></p></td>
+@@ -1317,11 +1385,11 @@
+ <p>Default: none</p>
+ <!-- INDENTATION -->
+ <p>Which Virus Scanning package to use. Possible choices are
+-sophos, sophossavi, mcafee, command, kaspersky,
++sophos, sophossavi, mcafee, command, bitdefender, kaspersky,
+ kaspersky&minus;4.5, kavdaemonclient, inoculate, inoculan,
+-onoculan, nod32, nod32&minus;1.99, f&minus;secure,
+-f&minus;prot, panda, rav, antivir, clamav, clamavmodule,
+-css, trend, bitdefender, none (no virus scanning at all)</p>
++nod32, nod32&minus;1.99, f&minus;secure, f&minus;prot,
++panda, rav, antivir, clamav, clamavmodule, css, trend,
++norman, avg, vexira, none (no virus scanning at all)</p>
+ <!-- INDENTATION -->
+ <p>Note for McAfee users: Do NOT use any symlinks with
+ McAfee at all. It is very strange but McAfee may not detect
+@@ -1403,29 +1471,79 @@
+ fake addresses on messages they send, so there is no point
+ informing the sender of the message, as it won&rsquo;t
+ actually be them who sent it anyway. Other words that can be
+-put in this list are the 5 special keywords<br>
+-HTML&minus;IFrame: inserting this will stop senders being
+-warned about HTML Iframe tags, when they are not
+-allowed.<br>
+-HTML&minus;Codebase: inserting this will stop senders being
+-warned about HTML Object Codebase tags, when they are not
+-allowed.<br>
+-Zip&minus;Password: inserting this will stop senders being
+-warned about password&minus;protected zip files when they
+-are not allowd. This keyword is not needed if you include
+-All&minus;Viruses.<br>
+-All&minus;Viruses: inserting this will stop senders being
+-warned about any virus, while still allowing you to warn
+-senders about HTML&minus;based attacks. This includes
++put in this list are the 5 special keywords</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>HTML&minus;IFrame: inserting this will stop senders
++being warned about HTML Iframe tags, when they are not
++allowed.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>HTML&minus;Codebase: inserting this will stop senders
++being warned about HTML Object Codebase tags, when they are
++not allowed.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>Zip&minus;Password: inserting this will stop senders
++being warned about password&minus;protected zip files when
++they are not allowd. This keyword is not needed if you
++include All&minus;Viruses.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>All&minus;Viruses: inserting this will stop senders
++being warned about any virus, while still allowing you to
++warn senders about HTML&minus;based attacks. This includes
+ Zip&minus;Password so you don&rsquo;t need to include
+ both.</p>
++</td>
++</table>
+ <!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
+ <p>The default of &quot;All&minus;Viruses&quot; means that
+ no senders of viruses will be notified (as the sender
+ address is always forged these days anyway), but anyone who
+ sends a message that is blocked for other reasons will still
+-be notified.</p>
+-</td>
++be notified.</p></td>
+ </table>
+ <!-- INDENTATION -->
+ <table width="100%" border=0 rules="none" frame="void"
+@@ -1590,15 +1708,47 @@
+ Microsoft Outlook security vulnerabilities to go
+ unprotected, but if you have a load of mailing lists sending
+ them, then you will want to allow them to keep your users
+-happy. Possible Values:</p>
+-<!-- INDENTATION -->
+-<p>yes =&gt; Allow these tags to be in the message no =&gt;
+-Ban messages containing these tags disarm =&gt; Allow these
+-tags, but stop these tags from working</p>
+-<!-- INDENTATION -->
+-<p>This can also be the filename of a ruleset, so you can
+-allow them from known mailing lists but ban them from
+-everywhere else.</p>
++happy. This can also be the filename of a ruleset, so you
++can allow them from known mailing lists but ban them from
++everywhere else. Possible Values:</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>yes =&gt; Allow these tags to be in the message</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>no =&gt; Ban messages containing these tags</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>disarm =&gt; Allow these tags, but stop these tags from
++working</p>
+ </td>
+ </table>
+ <!-- INDENTATION -->
+@@ -1615,8 +1765,14 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default: no</p>
++<p>Default: no</p></td>
++</table>
+ <!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
+ <p>You may receive complaints from your users that HTML
+ mailing lists they subscribe to have been stopped by the
+ &quot;Allow IFrame Tags&quot; option above. So before you
+@@ -1645,14 +1801,181 @@
+ <p>Default: disarm</p>
+ <!-- INDENTATION -->
+ <p>Do you want to allow &lt;Form&gt; tags in email messages?
+-This is a bad idea as these are used as scams to pursuade
++This is a bad idea as these are used as scams to persuade
+ people to part with credit card information and other
+ personal data. This can also be the filename of a ruleset.
+ Possible values:</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>yes =&gt; Allow these tags to be in the message</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>no =&gt; Ban messages containing these tags</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>disarm =&gt; Allow these tags, but stop these tags from
++working</p>
 +</td>
 +</table>
 +<!-- INDENTATION -->
@@ -19,7 +344,7 @@
 +<tr valign="top" align="left">
 +<td width="11%"></td>
 +<td width="89%">
-+<p><b>Custom Functions Dir</b></p></td>
++<p><b>Allow Script Tags</b></p></td>
 +</table>
 +<!-- INDENTATION -->
 +<table width="100%" border=0 rules="none" frame="void"
@@ -27,17 +352,915 @@
 +<tr valign="top" align="left">
 +<td width="22%"></td>
 +<td width="78%">
-+<p>Default:
-+/opt/MailScanner/lib/MailScanner/CustomFunctions<br>
-+Default FreeBSD:
-+/usr/local/lib/MailScanner/MailScanner/CustomFunctions</p>
++<p>Default: no</p></td>
++</table>
 +<!-- INDENTATION -->
-+<p>Where to put the code for your &quot;Custom
-+Functions&quot;. No code in this directory should be
-+over&minus;written by the installation or upgrade process.
-+All files starting with &quot;.&quot; or ending with
-+&quot;.rpmnew&quot; will be ignored, all other files will be
-+compiled and may be used with Custom Functions.</p>
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
++<p>Do you want to allow &lt;Script&gt; tags in email
++messages? This is a bad idea as these are used to exploit
++vulnerabilities in email applications and web browsers. This
++can also be the filename of a ruleset. Possible
++values:</p></td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>yes =&gt; Allow these tags to be in the message</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>no =&gt; Ban messages containing these tags</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>disarm =&gt; Allow these tags, but stop these tags from
++working</p>
++</td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="11%"></td>
++<td width="89%">
++<p><b>Allow WebBugs</b></p></td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="78%">
++<p>Default: disarm</p></td>
++</table>
+ <!-- INDENTATION -->
+-<p>yes =&gt; Allow these tags to be in the message no =&gt;
+-Ban messages containing these tags disarm =&gt; Allow these
+-tags, but stop these tags from working</p>
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
++<p>Do you want to allow &lt;Img&gt; tags with very small
++images in email messages? This is a bad idea as these are
++used as &rsquo;web bugs&rsquo; to find out if a message has
++been read. It is not dangerous, it is just used to make you
++give away information. This can also be the filename of a
++ruleset. Possible values:</p></td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>yes =&gt; Allow these tags to be in the message</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>no =&gt; Ban messages containing these tags</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>disarm =&gt; Allow these tags, but stop these tags from
++working</p>
  </td>
  </table>
  <!-- INDENTATION -->
+@@ -1669,18 +1992,57 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default: no</p>
++<p>Default: no</p></td>
++</table>
+ <!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
+ <p>Do you want to allow &lt;Object Codebase=...&gt; tags in
+ email messages? This is a bad idea as it leaves you
+ unprotected against various Microsoft&minus;specific
+ security vulnerabilities. But if your users demand it, you
+ can do it. This can also be the filename of a ruleset.
+-Possible values:</p>
+-<!-- INDENTATION -->
+-<p>yes =&gt; Allow these tags to be in the message no =&gt;
+-Ban messages containing these tags disarm =&gt; Allow these
+-tags, but stop these tags from working</p>
++Possible values:</p></td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>yes =&gt; Allow these tags to be in the message</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>no =&gt; Ban messages containing these tags</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>disarm =&gt; Allow these tags, but stop these tags from
++working</p>
+ </td>
+ </table>
+ <!-- INDENTATION -->
+@@ -1697,8 +2059,14 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default: no</p>
++<p>Default: no</p></td>
++</table>
+ <!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
+ <p>This option interacts with the &quot;Allow ... Tags&quot;
+ options above like this:</p>
+ <!-- INDENTATION -->
+@@ -1852,7 +2220,7 @@
+ <tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="89%">
+-<p><b>Quarantine Whole Message</b></p></td>
++<p><b>Quarantine Silent Viruses</b></p></td>
+ </table>
+ <!-- INDENTATION -->
+ <table width="100%" border=0 rules="none" frame="void"
+@@ -1860,11 +2228,16 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default: no</p>
++<p>Default: yes</p>
+ <!-- INDENTATION -->
+-<p>When an infected message is stored in the quarantine, a
+-copy of the entire message will be saved, in addition to
+-copies of the infected attachments.</p>
++<p>There is no point quarantining most viruses these days,
++so if you set this to &quot;no&quot; then no infections
++listed in your &quot;Silent Viruses&quot; setting will be
++quarantined, even if you have chosen to quarantine
++infections in general. This is currently set to
++&quot;yes&quot; so the behaviour is the same as it was in in
++previous versions. This can also be the filename of a
++ruleset.</p>
+ </td>
+ </table>
+ <!-- INDENTATION -->
+@@ -1873,7 +2246,7 @@
+ <tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="89%">
+-<p><b>Quarantine Whole Messages As Queue Files</b></p></td>
++<p><b>Quarantine Whole Message</b></p></td>
+ </table>
+ <!-- INDENTATION -->
+ <table width="100%" border=0 rules="none" frame="void"
+@@ -1883,9 +2256,30 @@
+ <td width="78%">
+ <p>Default: no</p>
+ <!-- INDENTATION -->
+-<p>When an entire message is saved in the quarantine for any
+-reason, do you want to save it as the raw data files out of
+-the mail queue (which can be processed with the df2mbox
++<p>When an infected message is stored in the quarantine, a
++copy of the entire message will be saved, in addition to
++copies of the infected attachments.</p>
++</td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="11%"></td>
++<td width="89%">
++<p><b>Quarantine Whole Messages As Queue Files</b></p></td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="78%">
++<p>Default: no</p>
++<!-- INDENTATION -->
++<p>When an entire message is saved in the quarantine for any
++reason, do you want to save it as the raw data files out of
++the mail queue (which can be processed with the df2mbox
+ script, and which is easier to send to its original
+ recipients), or do you want a conventional message file
+ consisting of the header followed by the body of the
+@@ -3670,6 +4064,32 @@
+ <tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="89%">
++<p><b>Spam List Timeouts History</b></p></td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="78%">
++<p>Default: 10</p>
++<!-- INDENTATION -->
++<p>The total number of Spam List attempts during which
++&quot;Max Spam List Timeouts&quot; will cause the spam list
++fo be marked as &quot;unavailable&quot;. See the previous
++comment for more information. The default values of 5 and 10
++mean that 5 timeouts in any sequence of 10 attempts will
++cause the list to be marked as &quot;unavailable&quot; until
++the next periodic restart (see &quot;Restart
++Every&quot;).</p>
++</td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="11%"></td>
++<td width="89%">
+ <p><b>Is Definitely Not Spam</b></p></td>
+ </table>
+ <!-- INDENTATION -->
+@@ -3733,6 +4153,31 @@
+ This can also be the filename of a ruleset.</p>
+ </td>
+ </table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="11%"></td>
++<td width="89%">
++<p><b>Ignore Spam Whitelist If Recipients
++Exceed</b></p></td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="78%">
++<p>Default: 20</p>
++<!-- INDENTATION -->
++<p>Spammers have learnt that they can get their message
++through by sending a message with lots of recipients, one of
++which chooses to whitelist everything coming to them,
++including the spammer. So if a message arrives with more
++than this number of recipients, ignore the &quot;Is
++Definitely Not Spam&quot; whitelist.</p>
++</td>
++</table>
+ <a name="SpamAssassin"></a>
+ <h2>SpamAssassin</h2>
+ <!-- INDENTATION -->
+@@ -3868,11 +4313,7 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default:
+-/opt/MailScanner/etc/spam.assassin.prefs.conf<br>
+-Default Linux: /etc/MailScanner/spam.assassin.prefs.conf<br>
+-Default FreeBSD:
+-/usr/local/etc/MailScanner/spam.assassin.prefs.conf</p>
++<p>Default: %etc&minus;dir%/spam.assassin.prefs.conf</p>
+ <!-- INDENTATION -->
+ <p>SpamAssassin uses a &quot;user preferences&quot; file
+ which can be used to set the values of various SpamAssassin
+@@ -3934,6 +4375,32 @@
+ <tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="89%">
++<p><b>SpamAssassin Timeouts History</b></p></td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="78%">
++<p>Default: 30</p>
++<!-- INDENTATION -->
++<p>The total number of SpamAssassin attempts during which
++&quot;Max SpamAssassin Timeouts&quot; will cause
++SpamAssassin to be marked as &quot;unavailable&quot;. See
++the previous comment for more information. The default
++values of 10 and 20 mean that 10 timeouts in any sequence of
++20 attempts will trigger the behaviour described above,
++until the next periodic restart (see &quot;Restart
++Every&quot;).</p>
++</td>
++</table>
++<!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="11%"></td>
++<td width="89%">
+ <p><b>Check SpamAssassin If On Spam List</b></p></td>
+ </table>
+ <!-- INDENTATION -->
+@@ -4063,23 +4530,81 @@
+ <p>This can be any combination of 1 or more of the following
+ keywords, and these actions are applied to any message which
+ is spam.</p>
+-<!-- INDENTATION -->
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
+ <p>&quot;deliver&quot; &minus; the message is delivered to
+ the recipient as normal</p>
+-<!-- INDENTATION -->
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
+ <p>&quot;delete&quot; &minus; the message is deleted</p>
+-<!-- INDENTATION -->
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
+ <p>&quot;store&quot; &minus; the message is stored in the
+ quarantine</p>
+-<!-- INDENTATION -->
+-<p>&quot;forward&quot; &minus; an email address is supplied,
+-to which the message is forwarded</p>
+-<!-- INDENTATION -->
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>&quot;forward&quot; &minus; an email address is
++supplied, to which the message is forwarded</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
+ <p>&quot;notify&quot; &minus; Send the recipients a short
+ notification that spam addressed to them was not delivered.
+ They can then take action to request retrieval of the
+ orginal message if they think it was not spam.</p>
+-<!-- INDENTATION -->
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
+ <p>&quot;striphtml&quot; &minus; convert all in&minus;line
+ HTML content in the message to be stripped to plain text,
+ which removes all images and scripts and so can be used to
+@@ -4087,12 +4612,30 @@
+ action on its own does not imply that the message will be
+ delivered, you will need to specify &quot;deliver&quot; or
+ &quot;forward&quot; to actually deliver the message.</p>
+-<!-- INDENTATION -->
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
+ <p>&quot;attachment&quot; &minus; Convert the original
+ message into an attachment of the message. This means the
+ user has to take an extra step to open the spam, and stops
+ &quot;web bugs&quot; very effectively.</p>
+-<!-- INDENTATION -->
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
+ <p>&quot;bounce&quot; &minus; bounce the spam message. This
+ option should not be used and must be enabled with the
+ &quot;Enable Spam Bounce&quot; option first.</p>
+@@ -4112,8 +4655,14 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default: deliver</p>
++<p>Default: deliver</p></td>
++</table>
+ <!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
+ <p>This is the same as the &quot;Spam Actions&quot; option
+ above, but it gives the actions to apply to any message
+ whose SpamAssassin score is above the &quot;High
+@@ -4452,24 +5001,18 @@
+ Note the files are mutable. If this is unset then no extra
+ places are searched for. If using Postfix, you probably want
+ to set this to /var/spool/MailScanner/spamassassin and
+-do</p></td>
++do</p>
++</td>
+ </table>
+-<!-- TABS -->
++<!-- INDENTATION -->
+ <table width="100%" border=0 rules="none" frame="void"
+        cols="2" cellspacing="0" cellpadding="0">
+ <tr valign="top" align="left">
+-<td width="29%"></td>
+-<td width="71%">
+-
+-<p>mkdir /var/spool/MailScanner/spamassassin</p>
+-</td>
+-<tr valign="top" align="left">
+-<td width="29%"></td>
+-<td width="71%">
+-
+-<p>chown postfix.postfix
+-/var/spool/MailScanner/spamassassin</p>
+-</td>
++<td width="26%"></td>
++<td width="74%">
++<p>mkdir /var/spool/MailScanner/spamassassin<br>
++chown postfix.postfix
++/var/spool/MailScanner/spamassassin</p></td>
+ </table>
+ <!-- INDENTATION -->
+ <table width="100%" border=0 rules="none" frame="void"
+@@ -4511,12 +5054,92 @@
+ <td width="78%">
+ <p>Default:</p>
+ <!-- INDENTATION -->
+-<p>The site&minus;local rules are searched for here, and in
+-prefix /etc/spamassassin, prefix/etc/mail/spamassassin,
+-/usr/local/etc/spamassassin, /etc/spamassassin,
+-/etc/mail/spamassassin, and maybe others. If this is set
+-then it adds to the list of places that are searched;
+-otherwise it has no effect.</p>
++<p>This tells MailScanner where to look for the
++site&minus;local rules. If this is set it adds to the list
++of places that are searched. MailScanner will always look at
++the following places (even if this option is not set):</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="5" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="43%">
++
++<p>prefix/etc/spamassassin</p>
++</td>
++<td width="29%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="43%">
++
++<p>prefix/etc/mail/spamassassin</p>
++</td>
++<td width="29%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="43%">
++
++<p>/usr/local/etc/spamassassin</p>
++</td>
++<td width="29%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="43%">
++
++<p>/etc/spamassassin</p>
++</td>
++<td width="29%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="43%">
++
++<p>/etc/mail/spamassassin</p>
++</td>
++<td width="29%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="43%">
++
++<p>maybe others as well</p>
++</td>
++<td width="29%">
+ </td>
+ </table>
+ <!-- INDENTATION -->
+@@ -4533,13 +5156,73 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default:</p>
++<p>Default:</p></td>
++</table>
+ <!-- INDENTATION -->
+-<p>The default rules are searched for here, and in
+-prefix/share/spamassassin, /usr/local/share/spamassassin,
+-/usr/share/spamassassin, and maybe others. If this is set
+-then it adds to the list of places that are searched;
+-otherwise it has no effect.</p>
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
++<p>This tells MailScanner where to look for the default
++rules. If this is set it adds to the list of places that are
++searched. MailScanner will always look at the following
++places (even if this option is not set):</p></td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="5" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="44%">
++
++<p>prefix/share/spamassassin</p>
++</td>
++<td width="28%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="44%">
++
++<p>/usr/local/share/spamassassin</p>
++</td>
++<td width="28%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="44%">
++
++<p>/usr/share/spamassassin</p>
++</td>
++<td width="28%">
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="44%">
++
++<p>maybe others as well</p>
++</td>
++<td width="28%">
+ </td>
+ </table>
+ <a name="Advanced Settings"></a>
+@@ -4797,15 +5480,78 @@
+ <td width="78%">
+ <p>Default: supported</p>
+ <!-- INDENTATION -->
+-<p>Some of the virus scanners are not supported by the
+-authors of MailScanner, and they may use code contributed by
+-another user. If this option is set to the wrong value for
+-your virus scanners, then you will get an error message in
+-your maillog (syslog) telling you tha# Are you using Exim
+-with split spool directories? If you don&rsquo;t understand
+-# this, the answer is probably &quot;no&quot;. Refer to the
+-Exim documentation for # more information about split spool
+-directories. Split Exim Spool = yes</p>
++<p>Minimum acceptable code stability status &minus;&minus;
++if we come across code that&rsquo;s not at least as stable
++as this, we barf. This is currently only used to check that
++you don&rsquo;t end up using untested virus scanner support
++code without realising it. Don&rsquo;t even *think* about
++setting this to anything other than &quot;beta&quot; or
++&quot;supported&quot; on a system that receives real mail
++until you have tested it yourself and are happy that it is
++all working as you expect it to. Don&rsquo;t set it to
++anything other than &quot;supported&quot; on a system that
++could ever receive important mail. Levels used are:</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>none &minus; there may not even be any code.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>unsupported &minus; code may be completely untested, a
++contributed dirty hack, anything, really.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>alpha &minus; code is pretty well untested. Don&rsquo;t
++assume it will work.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>beta &minus; code is tested a bit. It should work.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="1%">
++
++<p>&bull;</p>
++</td>
++<td width="5%"></td>
++<td width="72%">
++
++<p>supported &minus; code *should* be reliable.</p>
+ </td>
+ </table>
+ <!-- INDENTATION -->
+@@ -4822,8 +5568,14 @@
+ <tr valign="top" align="left">
+ <td width="22%"></td>
+ <td width="78%">
+-<p>Default: yes</p>
++<p>Default: yes</p></td>
++</table>
+ <!-- INDENTATION -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="2" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="28%"></td>
++<td width="72%">
+ <p>Are you using Exim with split spool directories? If you
+ don&rsquo;t understand this, the answer is probably
+ &quot;no&quot;. Refer to the Exim documentation for more
+@@ -4850,22 +5602,55 @@
+ <p>When trying to work out the value of configuration
+ parameters which are using a ruleset, this controls the
+ behaviour when a rule is checking the &quot;To:&quot;
+-addresses. If this option is set to &quot;yes&quot;, then
+-the following happens when checking the ruleset:</p>
+-<!-- INDENTATION -->
+-<p>a) 1 recipient. Same behaviour as normal.<br>
+-b) Several recipients, but all in the same domain
++addresses. If this option is set to &quot;no&quot;, then
++some rules will use the result they get from the first
++matching rule for any of the recipients of a message, so the
++exact value cannot be predicted for messages with more than
++1 recipient. This value *cannot* be the filename of a
++ruleset.<br>
++If this option is set to &quot;yes&quot;, then the following
++happens when checking the ruleset:</p>
++</td>
++</table>
++<!-- TABS -->
++<table width="100%" border=0 rules="none" frame="void"
++       cols="4" cellspacing="0" cellpadding="0">
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="3%">
++
++<p>a)</p>
++</td>
++<td width="3%"></td>
++<td width="72%">
++
++<p>1 recipient. Same behaviour as normal.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="3%">
++
++<p>b)</p>
++</td>
++<td width="3%"></td>
++<td width="72%">
++
++<p>Several recipients, but all in the same domain
+ (domain.com for example). The rules are checked for one that
+-matches the string &quot;*@domain.com&quot;.<br>
+-c) Several recipients, not all in the same domain. The rules
+-are checked for one that matches the string
++matches the string &quot;*@domain.com&quot;.</p>
++</td>
++<tr valign="top" align="left">
++<td width="22%"></td>
++<td width="3%">
++
++<p>c)</p>
++</td>
++<td width="3%"></td>
++<td width="72%">
++
++<p>Several recipients, not all in the same domain. The
++rules are checked for one that matches the string
+ &quot;*@*&quot;.</p>
+-<!-- INDENTATION -->
+-<p>If this option is set to &quot;no&quot;, then some rules
+-will use the result they get from the first matching rule
+-for any of the recipients of a message, so the exact value
+-cannot be predicted for messages with more than 1 recipient.
+-This value *cannot* be the filename of a ruleset.</p>
+ </td>
+ </table>
+ <a name="RULESETS"></a>
diff -ruN --exclude=CVS /server-root/ports/mail/mailscanner-devel.orig/pkg-plist /server-root/ports/mail/mailscanner-devel/pkg-plist
--- /server-root/ports/mail/mailscanner-devel.orig/pkg-plist	Wed Mar 31 17:57:12 2004
+++ /server-root/ports/mail/mailscanner-devel/pkg-plist	Wed May 26 14:53:11 2004
@@ -47,6 +47,8 @@
 libexec/MailScanner/MailScanner
 libexec/MailScanner/antivir-autoupdate.sample
 libexec/MailScanner/antivir-wrapper.sample
+libexec/MailScanner/avg-autoupdate.sample
+libexec/MailScanner/avg-wrapper.sample
 libexec/MailScanner/bitdefender-autoupdate.sample
 libexec/MailScanner/bitdefender-wrapper.sample
 libexec/MailScanner/clamav-autoupdate.sample
@@ -80,6 +82,8 @@
 libexec/MailScanner/sophos-wrapper.sample
 libexec/MailScanner/trend-autoupdate.sample
 libexec/MailScanner/trend-wrapper.sample
+libexec/MailScanner/vexira-wrapper.sample
+libexec/MailScanner/vexira-autoupdate.sample
 libexec/MailScanner/update_virus_scanners
 %%DATADIR%%/reports/ca/deleted.filename.message.txt.sample
 %%DATADIR%%/reports/ca/deleted.virus.message.txt.sample
@@ -443,6 +447,7 @@
 %%PORTDOCS%%%%DOCSDIR%%/donations.shtml
 %%PORTDOCS%%%%DOCSDIR%%/downloadgraphs.shtml
 %%PORTDOCS%%%%DOCSDIR%%/downloads.shtml
+%%PORTDOCS%%%%DOCSDIR%%/ellen2.jpg
 %%PORTDOCS%%%%DOCSDIR%%/ecs.css
 %%PORTDOCS%%%%DOCSDIR%%/faq.shtml
 %%PORTDOCS%%%%DOCSDIR%%/images/JulianField1_small.jpg
@@ -536,6 +541,7 @@
 @dirrm %%DATADIR%%/reports/de
 @dirrm %%DATADIR%%/reports/cz
 @dirrm %%DATADIR%%/reports/cy+en
+@dirrm %%DATADIR%%/reports/cat
 @dirrm %%DATADIR%%/reports/ca
 @dirrm %%DATADIR%%/reports
 @dirrm %%DATADIR%%
--- MailScanner-devel-4.31.3.patch ends here ---

>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200405261259.i4QCx19u081760>