Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- use strict;
- $MYHOME = '/var/amavis'; # (default is '/var/amavis'), -H
- $mydomain = 'echosnetwork.com'; # (no useful default)
- $myhostname = 'server.echosnetwork.com'; # fqdn of this host, default by uname(3)
- $daemon_user = 'amavis'; # (no default; customary: vscan or amavis), -u
- $daemon_group = 'amavis'; # (no default; customary: vscan or amavis), -g
- $TEMPBASE = "$MYHOME/tmp"; # prefer to keep home dir /var/amavis clean?
- $ENV{TMPDIR} = $TEMPBASE; # used for SA temporary files, by some decoders, etc.
- $enable_db = 1; # enable use of BerkeleyDB/libdb (SNMP and nanny)
- $enable_global_cache = 1; # enable use of libdb-based cache if $enable_db=1
- $enable_dkim_verification = 0; # enable DKIM signatures verification
- $enable_dkim_signing = 0; # load DKIM signing code, keys defined by dkim_key
- $forward_method = 'smtp:[127.0.0.1]:10025'; # where to forward checked mail
- $notify_method = $forward_method; # where to submit notifications
- $max_servers = 15; # num of pre-forked children (2..30 is common), -m
- $max_requests = 20; # retire a child after that many accepts (default 20)
- $child_timeout=5*60; # abort child if it does not complete its processing in
- # approximately n seconds (default: 8*60 seconds)
- $smtpd_timeout = 120; # disconnect session if client is idle for too long
- # (default: 8*60 seconds); should be higher than a
- # Postfix setting max_idle (default 100s)
- @bypass_spam_checks_maps = (1); # controls running of anti-spam code
- @local_domains_maps = ( [".$mydomain"] ); # $mydomain and its subdomains
- $insert_received_line = 0; # behave like MTA: insert 'Received:' header
- # (does not apply to sendmail/milter)
- # (default is true)
- $unix_socketname = "$MYHOME/amavisd.sock"; # amavis helper protocol socket
- # (default is undef, i.e. disabled)
- # (usual setting is $MYHOME/amavisd.sock)
- $inet_socket_port = 10024; # accept SMTP on this local TCP port
- # (default is undef, i.e. disabled)
- $inet_socket_bind = '127.0.0.1'; # limit socket bind to loopback interface
- # (default is '127.0.0.1')
- @inet_acl = qw(127.0.0.1 [::1]); # allow SMTP access only from localhost IP
- # (default is qw(127.0.0.1 [::1]) )
- $DO_SYSLOG = 1; # (defaults to 0)
- $syslog_ident = 'amavis'; # Syslog ident string (defaults to 'amavis')
- $syslog_facility = 'mail'; # Syslog facility as a string
- # e.g.: mail, daemon, user, local0, ... local7, ...
- $syslog_priority = 'debug'; # Syslog base (minimal) priority as a string,
- # choose from: emerg, alert, crit, err, warning, notice, info, debug
- $LOGFILE = "$MYHOME/amavis.log"; # (defaults to empty, no log)
- $log_level = 5; # (defaults to 0), -d
- $log_recip_templ = undef; # undef disables by-recipient level-0 log entries
- $hdr_encoding = 'iso-8859-1'; # MIME charset (default: 'iso-8859-1')
- $hdr_encoding_qb = 'Q'; # MIME encoding: quoted-printable (default)
- $hdr_encoding_qb = 'B'; # MIME encoding: base64
- $bdy_encoding = 'iso-8859-1'; # (default: 'iso-8859-1')
- %final_destiny_by_ccat = (
- CC_VIRUS, D_DISCARD,
- CC_BANNED, D_BOUNCE,
- CC_UNCHECKED, D_PASS,
- CC_SPAM, D_DISCARD,
- CC_BADH, D_PASS,
- CC_OVERSIZED, D_BOUNCE,
- CC_CLEAN, D_PASS,
- CC_CATCHALL, D_PASS,
- );
- @viruses_that_fake_sender_maps = (new_RE(
- qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i,
- qr'tanatos|lentin|bridex|mimail|trojan\.dropper|dumaru|parite|spaces'i,
- qr'dloader|galil|gibe|swen|netwatch|bics|sbrowse|sober|rox|val(hal)?la'i,
- qr'frethem|sircam|be?agle|tanx|mydoom|novarg|shimg|netsky|somefool|moodown'i,
- qr'@mm|@MM', # mass mailing viruses as labeled by f-prot and uvscan
- qr'Worm'i, # worms as labeled by ClamAV, Kaspersky, etc
- [qr/^/ => 1], # true by default (remove or comment-out if undesired)
- ));
- $virus_admin = "meat\@$mydomain";
- $spam_admin = undef; # do not send spam admin notifications (default)
- $mailfrom_notify_admin = "amavis\@$mydomain";
- $mailfrom_notify_recip = "amavis\@$mydomain";
- $mailfrom_notify_spamadmin = "spam\@$mydomain";
- $mailfrom_to_quarantine = ' '; # override sender address with null return path
- $QUARANTINEDIR = "$MYHOME/quarantine";
- $quarantine_subdir_levels = 1; # add level of subdirs to disperse quarantine
- $virus_quarantine_method = 'sql'; # default
- $spam_quarantine_method = 'sql'; # default
- $banned_files_quarantine_method = 'sql'; # default
- $bad_header_quarantine_method = 'sql'; # default
- $virus_quarantine_to = 'virus-quarantine'; # traditional local quarantine
- $banned_quarantine_to = 'banned-quarantine'; # local quarantine
- $bad_header_quarantine_to = 'bad-header-quarantine'; # local quarantine
- $spam_quarantine_to = 'spam-quarantine'; # local quarantine
- $sa_quarantine_cutoff_level = 50; # dflt: undef, which disables this feature
- $X_HEADER_TAG = 'X-ClamAV-Scanned'; # (default: 'X-Virus-Scanned')
- $undecipherable_subject_tag = '***ENCRYPTED*** '; # undef disables it
- $defang_virus = 1; # default is false: don't modify mail body
- $defang_banned = 1; # default is false: don't modify mail body
- $remove_existing_x_scanned_headers = 1; # leave existing X-Virus-Scanned alone
- # (defaults to false)
- $remove_existing_spam_headers = 1; # remove existing spam headers if
- # spam scanning is enabled (default)
- $allow_fixing_improper_header_folding = 1; # (default is true)
- @keep_decoded_original_maps = (new_RE(
- qr'^MAIL-UNDECIPHERABLE$', # retain full mail if it contains undecipherables
- qr'^(ASCII(?! cpio)|text|uuencoded|xxencoded|binhex)'i,
- ));
- $banned_filename_re = new_RE(
- qr'^\.(exe-ms|dll)$', # banned file(1) types, rudimentary
- [ qr'^\.(rpm|cpio|tar)$' => 0 ], # allow any in Unix-type archives
- qr'.\.(pif|scr)$'i, # banned extensions - rudimentary
- qr'^application/x-msdownload$'i, # block these MIME types
- qr'^application/x-msdos-program$'i,
- qr'^application/hta$'i,
- # block certain double extensions in filenames
- qr'\.[^./]*[A-Za-z][^./]*\.\s*(exe|vbs|pif|scr|bat|cmd|com|cpl|dll)[.\s]*$'i,
- qr'.\.(exe|vbs|pif|scr|cpl)$'i, # banned extension - basic
- );
- $banned_namepath_re = new_RE(
- qr'(?# BLOCK Microsoft EXECUTABLES and DLL )
- ^ (.*\t)? T=(exe-ms|dll) (\t.*)? $'xm, # banned file(1) types, rudimentary
- # within traditional Unix archives allow any name and type
- [ qr'(?#rule-4) ^ (.*\t)? T=(tar|rpm|cpio) (\t.*)? $'xmi => 0 ], # allow
- # banned filename extensions (in declared names) anywhere - rudimentary
- qr'(?# BLOCK COMMON NAME EXENSIONS )
- ^ (.*\t)? N= [^\t\n]* \. (pif|scr) (\t.*)? $'xmi,
- # block these MIME types
- qr'(?#NO X-MSDOWNLOAD) ^(.*\t)? M=application/x-msdownload (\t.*)? $'xmi,
- qr'(?#NO X-MSDOS-PROGRAM)^(.*\t)? M=application/x-msdos-program(\t.*)? $'xmi,
- qr'(?#NO HTA) ^(.*\t)? M=application/hta (\t.*)? $'xmi,
- # block certain double extensions in filenames
- qr'(?# BLOCK DOUBLE-EXTENSIONS )
- ^ (.*\t)? N= [^\t\n]* \. [^./\t\n]* [A-Za-z] [^./\t\n]* \. \ *
- (exe|vbs|pif|scr|bat|cmd|com|cpl|dll) [. ]* (\t.*)? $'xmi,
- [ qr'(?# BLOCK EMPTY MIME PART APPLICATION/OCTET-STREAM )
- ^ (.*\t)? M=application/(octet-stream|x-msdownload|x-msdos-program)
- \t(.*\t)* T=empty (\t.*)? $'xmi
- => 'DISCARD' ],
- # banned filename extensions (in suggested names) anywhere - basic
- qr'(?# BLOCK COMMON NAME EXENSIONS )
- ^ (.*\t)? N= [^\t\n]* \. (exe|vbs|pif|scr|cpl) (\t.*)? $'xmi,
- );
- $banned_namepath_re = undef; # to disable new-style
- %banned_rules = (
- 'MYNETS-DEFAULT' => new_RE( # permissive set of rules for internal hosts
- [ qr'^\.(rpm|cpio|tar)$' => 0 ], # allow any name/type in Unix archives
- qr'.\.(vbs|pif|scr)$'i, # banned extension - rudimentary
- ),
- 'DEFAULT' => $banned_filename_re,
- );
- @bypass_spam_checks_maps = (1);
- @storage_sql_dsn = ( ['DBI:mysql:amavis:localhost', 'amavis', 'PASSWORD'] ) ; # none, same, or separate database
- $sql_select_white_black_list = undef; # undef disables SQL white/blacklisting
- $localpart_is_case_sensitive = 0; # (default is false)
- @score_sender_maps = ({ # a by-recipient hash lookup table
- # site-wide opinions about senders (the '.' matches any recipient)
- '.' => [ # the _first_ matching sender determines the score boost
- new_RE( # regexp-type lookup table, just happens to be all soft-blacklist
- [qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou)@'i => 5.0],
- [qr'^(greatcasino|investments|lose_weight_today|market\.alert)@'i=> 5.0],
- [qr'^(money2you|MyGreenCard|new\.tld\.registry|opt-out|opt-in)@'i=> 5.0],
- [qr'^(optin|saveonlsmoking2002k|specialoffer|specialoffers)@'i => 5.0],
- [qr'^(stockalert|stopsnoring|wantsome|workathome|yesitsfree)@'i => 5.0],
- [qr'^(your_friend|greatoffers)@'i => 5.0],
- [qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i => 5.0],
- ),
- { # a hash-type lookup table (associative array)
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- 'securityfocus.com' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]'=> -3.0,
- '[email protected]' => -3.0,
- 'spamassassin.apache.org' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -3.0,
- '[email protected]' => -5.0,
- '[email protected]' => -3.0,
- 'returns.groups.yahoo.com' => -3.0,
- '[email protected]' => -3.0,
- lc('[email protected]') => -3.0,
- lc('[email protected]') => -5.0,
- # soft-blacklisting (positive score)
- '[email protected]' => 3.0,
- '.example.net' => 1.0,
- },
- ], # end of site-wide tables
- });
- @blacklist_sender_maps = ( new_RE(
- qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou|greatcasino)@'i,
- qr'^(investments|lose_weight_today|market\.alert|money2you|MyGreenCard)@'i,
- qr'^(new\.tld\.registry|opt-out|opt-in|optin|saveonlsmoking2002k)@'i,
- qr'^(specialoffer|specialoffers|stockalert|stopsnoring|wantsome)@'i,
- qr'^(workathome|yesitsfree|your_friend|greatoffers)@'i,
- qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i,
- ));
- $MAXLEVELS = 20; # (default is undef, no limit)
- $MAXFILES = 1500; # (default is undef, no limit)
- $MIN_EXPANSION_QUOTA = 100*1024; # bytes (default undef, not enforced)
- $MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes (default undef, not enforced)
- $MIN_EXPANSION_FACTOR = 5; # times original mail size (default is 5)
- $MAX_EXPANSION_FACTOR = 500; # times original mail size (default is 500)
- $virus_check_negative_ttl= 3*60; # time to remember that mail was not infected
- $virus_check_positive_ttl= 30*60; # time to remember that mail was infected
- $spam_check_negative_ttl = 10*60; # time to remember that mail was not spam
- $spam_check_positive_ttl = 30*60; # time to remember that mail was spam
- $path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin:/opt/bin';
- $file = 'file'; # file(1) utility; use 3.41 or later to avoid vulnerability
- $dspam = 'dspam';
- @decoders = (
- ['mail', \&do_mime_decode],
- ['asc', \&do_ascii],
- ['uue', \&do_ascii],
- ['hqx', \&do_ascii],
- ['ync', \&do_ascii],
- ['F', \&do_uncompress, ['unfreeze','freeze -d','melt','fcat'] ],
- ['Z', \&do_uncompress, ['uncompress','gzip -d','zcat'] ],
- ['gz', \&do_uncompress, 'gzip -d'],
- ['gz', \&do_gunzip],
- ['bz2', \&do_uncompress, 'bzip2 -d'],
- ['lzo', \&do_uncompress, 'lzop -d'],
- ['rpm', \&do_uncompress, ['rpm2cpio.pl','rpm2cpio'] ],
- ['cpio', \&do_pax_cpio, ['pax','gcpio','cpio'] ],
- ['tar', \&do_pax_cpio, ['pax','gcpio','cpio'] ],
- ['deb', \&do_ar, 'ar'],
- ['zip', \&do_unzip],
- ['7z', \&do_7zip, ['7zr','7za','7z'] ],
- ['rar', \&do_unrar, ['rar','unrar'] ],
- ['arj', \&do_unarj, ['arj','unarj'] ],
- ['arc', \&do_arc, ['nomarch','arc'] ],
- ['zoo', \&do_zoo, ['zoo','unzoo'] ],
- ['lha', \&do_lha, 'lha'],
- ['cab', \&do_cabextract, 'cabextract'],
- ['tnef', \&do_tnef_ext, 'tnef'],
- ['tnef', \&do_tnef],
- ['exe', \&do_executable, ['rar','unrar'], 'lha', ['arj','unarj'] ],
- );
- $sa_local_tests_only = 0; # only tests which do not require internet access?
- # for SA 3.0, its cf option is use_auto_whitelist)
- $sa_mail_body_size_limit = 400*1024; # don't waste time on SA if mail is larger
- # (less than 1% of spam is > 64k)
- # default: undef, no limitations
- $sa_tag_level_deflt = 2.0; # add spam info headers if at, or above that level;
- # undef is interpreted as lower than any spam level
- $sa_tag2_level_deflt = 6.31;# add 'spam detected' headers at that level to
- # passed mail, adding address extensions;
- $sa_kill_level_deflt = $sa_tag2_level_deflt; # triggers spam evasive actions
- # at or above that level: bounce/reject/drop,
- # quarantine
- $sa_dsn_cutoff_level = 9; # spam level beyond which a DSN is not sent,
- # effectively turning D_BOUNCE into D_DISCARD;
- # undef disables this feature and is a default;
- # when sender is known to have previously received mail from our
- # local user from this mail system; zero or undef disables penpals
- # lookups in SQL; default: undef
- # penpal bonus is halved for each halflife period from the last mail
- # sent by a local user to a current mail's sender; default: 7 days
- # bounce killer needs operational SQL logging (pen pals) !
- @spam_dsn_cutoff_level_bysender_maps = (
- { # an associative array (hash) lookup table, use lowercase keys
- 'virgilio.it' => 7, 'mail.ru' => 7, '0451.com' => 7,
- 'yahoo.co.uk' => 7, 'yahoo.co.jp' => 7, 'nobody@' => 7,
- 'noreply@' => 0, 'no-reply@' => 0, 'donotreply@' => 0,
- 'opt-in@' => 0, 'opt-out@' => 0, 'yahoo-dev-null@' => 0,
- '.optin-out.com' => 0, '[email protected]' => 0,
- '[email protected]'=> 7, # Sophos PureMessage spam bounces
- },
- \$sa_dsn_cutoff_level, # catchall default value
- );
- $sa_spam_subject_tag = '***SPAM*** '; # (defaults to undef, disabled)
- # (only seen when spam is passed and recipient is
- # in local_domains*)
- @spam_subject_tag_maps = ('[possible-spam:_SCORE_] ');
- @spam_subject_tag2_maps = ('***SPAM*** _SCORE_ (_REQD_) ');
- @spam_subject_tag3_maps = ('***BLATANT*SPAM**** _SCORE_ (_REQD_) ');
- $sa_spam_modifies_subj = 1; # in @spam_modifies_subj_maps, default is true
- # undef or empty disables inserting X-Spam-Level
- $first_infected_stops_scan = 1; # default is false, all scanners in a section
- # are called
- @av_scanners = (
- ['ClamAV-clamd',
- \&ask_daemon, ["CONTSCAN {}\n", "/var/amavis/clamd.sock"],
- qr/\bOK$/m, qr/\bFOUND$/m,
- qr/^.*?: (?!Infected Archive)(.*) FOUND$/m ],
- ### http://www.kaspersky.com/ (kav4mailservers)
- ['KasperskyLab AVP - aveclient',
- ['/usr/local/kav/bin/aveclient','/usr/local/share/kav/bin/aveclient',
- '/opt/kav/5.5/kav4mailservers/bin/aveclient','aveclient'],
- '-p /var/run/aveserver -s {}/*',
- [0,3,6,8], qr/\b(INFECTED|SUSPICION|SUSPICIOUS)\b/m,
- qr/(?:INFECTED|WARNING|SUSPICION|SUSPICIOUS) (.+)/m,
- ],
- # NOTE: one may prefer [0],[2,3,4,5], depending on how suspicious,
- # currupted or protected archives are to be handled
- ### http://www.kaspersky.com/
- ['KasperskyLab AntiViral Toolkit Pro (AVP)', ['avp'],
- '-* -P -B -Y -O- {}', [0,3,6,8], [2,4], # any use for -A -K ?
- qr/infected: (.+)/m,
- sub {chdir('/opt/AVP') or die "Can't chdir to AVP: $!"},
- sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
- ],
- ### The kavdaemon and AVPDaemonClient have been removed from Kasperky
- ### products and replaced by aveserver and aveclient
- ['KasperskyLab AVPDaemonClient',
- [ '/opt/AVP/kavdaemon', 'kavdaemon',
- '/opt/AVP/AvpDaemonClient', 'AvpDaemonClient',
- '/opt/AVP/AvpTeamDream', 'AvpTeamDream',
- '/opt/AVP/avpdc', 'avpdc' ],
- "-f=$TEMPBASE {}", [0,8], [3,4,5,6], qr/infected: ([^\r\n]+)/m ],
- # change the startup-script in /etc/init.d/kavd to:
- # DPARMS="-* -Y -dl -f=/var/amavis /var/amavis"
- # (or perhaps: DPARMS="-I0 -Y -* /var/amavis" )
- # adjusting /var/amavis above to match your $TEMPBASE.
- # The '-f=/var/amavis' is needed if not running it as root, so it
- # can find, read, and write its pid file, etc., see 'man kavdaemon'.
- # defUnix.prf: there must be an entry "*/var/amavis" (or whatever
- # directory $TEMPBASE specifies) in the 'Names=' section.
- # cd /opt/AVP/DaemonClients; configure; cd Sample; make
- # cp AvpDaemonClient /opt/AVP/
- # su - vscan -c "${PREFIX}/kavdaemon ${DPARMS}"
- ### http://www.centralcommand.com/
- ['CentralCommand Vexira (new) vascan',
- ['vascan','/usr/lib/Vexira/vascan'],
- "-a s --timeout=60 --temp=$TEMPBASE -y $QUARANTINEDIR ".
- "--log=/var/log/vascan.log {}",
- [0,3], [1,2,5],
- qr/(?x)^\s* (?:virus|iworm|macro|mutant|sequence|trojan)\ found:\ ( [^\]\s']+ )\ \.\.\.\ /m ],
- # Adjust the path of the binary and the virus database as needed.
- # 'vascan' does not allow to have the temp directory to be the same as
- # the quarantine directory, and the quarantine option can not be disabled.
- # If $QUARANTINEDIR is not used, then another directory must be specified
- # to appease 'vascan'. Move status 3 to the second list if password
- # protected files are to be considered infected.
- ### http://www.avira.com/
- ### Avira AntiVir (formerly H+BEDV) or (old) CentralCommand Vexira Antivirus
- ['Avira AntiVir', ['antivir','vexira'],
- '--allfiles -noboot -nombr -rs -s -z {}', [0], qr/ALERT:|VIRUS:/m,
- qr/(?x)^\s* (?: ALERT: \s* (?: \[ | [^']* ' ) |
- (?i) VIRUS:\ .*?\ virus\ '?) ( [^\]\s']+ )/m ],
- # NOTE: if you only have a demo version, remove -z and add 214, as in:
- # '--allfiles -noboot -nombr -rs -s {}', [0,214], qr/ALERT:|VIRUS:/,
- ### http://www.commandsoftware.com/
- ['Command AntiVirus for Linux', 'csav',
- '-all -archive -packed {}', [50], [51,52,53],
- qr/Infection: (.+)/m ],
- ### http://www.symantec.com/
- ['Symantec CarrierScan via Symantec CommandLineScanner',
- 'cscmdline', '-a scan -i 1 -v -s 127.0.0.1:7777 {}',
- qr/^Files Infected:\s+0$/m, qr/^Infected\b/m,
- qr/^(?:Info|Virus Name):\s+(.+)/m ],
- ### http://www.symantec.com/
- ['Symantec AntiVirus Scan Engine',
- 'savsecls', '-server 127.0.0.1:7777 -mode scanrepair -details -verbose {}',
- [0], qr/^Infected\b/m,
- qr/^(?:Info|Virus Name):\s+(.+)/m ],
- # NOTE: check options and patterns to see which entry better applies
- ### http://www.f-secure.com/products/anti-virus/ version 5.52
- ['F-Secure Antivirus for Linux servers',
- ['/opt/f-secure/fsav/bin/fsav', 'fsav'],
- '--virus-action1=report --archive=yes --auto=yes '.
- '--dumb=yes --list=no --mime=yes {}', [0], [3,4,6,8],
- qr/(?:infection|Infected|Suspected|Riskware): (.+)/m ],
- # NOTE: internal archive handling may be switched off by '--archive=no'
- # to prevent fsav from exiting with status 9 on broken archives
- ['CAI InoculateIT', 'inocucmd', # retired product
- '-sec -nex {}', [0], [100],
- qr/was infected by virus (.+)/m ],
- # see: http://www.flatmtn.com/computer/Linux-Antivirus_CAI.html
- ### http://www3.ca.com/Solutions/Product.asp?ID=156 (ex InoculateIT)
- ['CAI eTrust Antivirus', 'etrust-wrapper',
- '-arc -nex -spm h {}', [0], [101],
- qr/is infected by virus: (.+)/m ],
- # NOTE: requires suid wrapper around inocmd32; consider flag: -mod reviewer
- # see http://marc.theaimsgroup.com/?l=amavis-user&m=109229779912783
- ### http://mks.com.pl/english.html
- ['MkS_Vir for Linux (beta)', ['mks32','mks'],
- '-s {}/*', [0], [1,2],
- qr/--[ \t]*(.+)/m ],
- ### http://mks.com.pl/english.html
- ['MkS_Vir daemon', 'mksscan',
- '-s -q {}', [0], [1..7],
- qr/^... (\S+)/m ],
- ### http://www.eset.com/, version 3.0
- ['ESET Software ESETS Command Line Interface',
- ['/usr/bin/esets_cli', 'esets_cli'],
- '--subdir {}', [0], [1,2,3],
- qr/:\s*action="(?!accepted)[^"]*"\n.*:\s*virus="([^"]*)"/m ],
- ## http://www.nod32.com/, NOD32LFS version 2.5 and above
- ['ESET NOD32 for Linux File servers',
- ['/opt/eset/nod32/sbin/nod32','nod32'],
- '--files -z --mail --sfx --rtp --adware --unsafe --pattern --heur '.
- '-w -a --action=1 -b {}',
- [0], [1,10], qr/^object=.*, virus="(.*?)",/m ],
- ### http://www.norman.com/products_nvc.shtml
- ['Norman Virus Control v5 / Linux', 'nvcc',
- '-c -l:0 -s -u -temp:$TEMPBASE {}', [0,10,11], [1,2,14],
- qr/(?i).* virus in .* -> \'(.+)\'/m ],
- ### http://www.pandasoftware.com/
- ['Panda CommandLineSecure 9 for Linux',
- ['/opt/pavcl/usr/bin/pavcl','pavcl'],
- '-auto -aex -heu -cmp -nbr -nor -nos -eng -nob {}',
- qr/Number of files infected[ .]*: 0+(?!\d)/m,
- qr/Number of files infected[ .]*: 0*[1-9]/m,
- qr/Found virus :\s*(\S+)/m ],
- # NOTE: for efficiency, start the Panda in resident mode with 'pavcl -tsr'
- # before starting amavisd - the bases are then loaded only once at startup.
- # To reload bases in a signature update script:
- # /opt/pavcl/usr/bin/pavcl -tsr -ulr; /opt/pavcl/usr/bin/pavcl -tsr
- # Please review other options of pavcl, for example:
- # -nomalw, -nojoke, -nodial, -nohackt, -nospyw, -nocookies
- ### http://www.nai.com/
- ['NAI McAfee AntiVirus (uvscan)', 'uvscan',
- '--secure -rv --mime --summary --noboot --mailbox --program --timeout 180 - {}', [0], [13],
- qr/(?x) Found (?:
- \ the\ (.+)\ (?:virus|trojan) |
- \ (?:virus|trojan)\ or\ variant\ ([^ ]+) |
- :\ (.+)\ NOT\ a\ virus)/m,
- # sub {$ENV{LD_PRELOAD}='/lib/libc.so.6'},
- # sub {delete $ENV{LD_PRELOAD}},
- ],
- # NOTE1: with RH9: force the dynamic linker to look at /lib/libc.so.6 before
- # anything else by setting environment variable LD_PRELOAD=/lib/libc.so.6
- # and then clear it when finished to avoid confusing anything else.
- # NOTE2: to treat encrypted files as viruses replace the [13] with:
- # qr/^\s{5,}(Found|is password-protected|.*(virus|trojan))/
- ### http://www.virusbuster.hu/en/
- ['VirusBuster', ['vbuster', 'vbengcl'],
- "{} -ss -i '*' -log=$MYHOME/vbuster.log", [0], [1],
- qr/: '(.*)' - Virus/m ],
- # VirusBuster Ltd. does not support the daemon version for the workstation
- # engine (vbuster-eng-1.12-linux-i386-libc6.tgz) any longer. The names of
- # binaries, some parameters AND return codes have changed (from 3 to 1).
- # See also the new Vexira entry 'vascan' which is possibly related.
- ### http://www.cyber.com/
- ['CyberSoft VFind', 'vfind',
- '--vexit {}/*', [0], [23], qr/##==>>>> VIRUS ID: CVDL (.+)/m,
- # sub {$ENV{VSTK_HOME}='/usr/lib/vstk'},
- ],
- ### http://www.avast.com/
- ['avast! Antivirus', ['/usr/bin/avastcmd','avastcmd'],
- '-a -i -n -t=A {}', [0], [1], qr/\binfected by:\s+([^ \t\n\[\]]+)/m ],
- ### http://www.ikarus-software.com/
- ['Ikarus AntiVirus for Linux', 'ikarus',
- '{}', [0], [40], qr/Signature (.+) found/m ],
- ### http://www.bitdefender.com/
- ['BitDefender', 'bdscan', # new version
- '--action=ignore --no-list {}', qr/^Infected files *:0+(?!\d)/m,
- qr/^(?:Infected files|Identified viruses|Suspect files) *:0*[1-9]/m,
- qr/(?:suspected|infected): (.*)(?:\033|$)/m ],
- ### http://www.bitdefender.com/
- ['BitDefender', 'bdc', # old version
- '--arc --mail {}', qr/^Infected files *:0+(?!\d)/m,
- qr/^(?:Infected files|Identified viruses|Suspect files) *:0*[1-9]/m,
- qr/(?:suspected|infected): (.*)(?:\033|$)/m ],
- # consider also: --all --nowarn --alev=15 --flev=15. The --all argument may
- # not apply to your version of bdc, check documentation and see 'bdc --help'
- ### ArcaVir for Linux and Unix http://www.arcabit.pl/
- ['ArcaVir for Linux', ['arcacmd','arcacmd.static'],
- '-v 1 -summary 0 -s {}', [0], [1,2],
- qr/(?:VIR|WIR):[ \t]*(.+)/m ],
- );
- @av_scanners_backup = (
- ### http://www.clamav.net/ - backs up clamd or Mail::ClamAV
- ['ClamAV-clamscan', 'clamscan',
- "--stdout --no-summary -r --tempdir=$TEMPBASE {}",
- [0], qr/:.*\sFOUND$/m, qr/^.*?: (?!Infected Archive)(.*) FOUND$/m ],
- ### http://www.f-prot.com/ - backs up F-Prot Daemon, V6
- ['F-PROT Antivirus for UNIX', ['fpscan'],
- '--report --mount --adware {}', # consider: --applications -s 4 -u 3 -z 10
- [0,8,64], [1,2,3, 4+1,4+2,4+3, 8+1,8+2,8+3, 12+1,12+2,12+3],
- qr/^\[Found\s+[^\]]*\]\s+<([^ \t(>]*)/m ],
- ### http://www.f-prot.com/ - backs up F-Prot Daemon (old)
- ['FRISK F-Prot Antivirus', ['f-prot','f-prot.sh'],
- '-dumb -ai -archive -packed -server {}', [0,8], [3,6], # or: [0], [3,6,8],
- qr/(?:Infection:|security risk named) (.+)|\s+contains\s+(.+)$/m ],
- ### http://www.trendmicro.com/ - backs up Trophie
- ['Trend Micro FileScanner', ['/etc/iscan/vscan','vscan'],
- '-za -a {}', [0], qr/Found virus/m, qr/Found virus (.+) in/m ],
- ### http://www.sald.com/, http://drweb.imshop.de/ - backs up DrWebD
- ['drweb - DrWeb Antivirus', # security LHA hole in Dr.Web 4.33 and earlier
- ['/usr/local/drweb/drweb', '/opt/drweb/drweb', 'drweb'],
- '-path={} -al -go -ot -cn -upn -ok-',
- [0,32], [1,9,33], qr' infected (?:with|by)(?: virus)? (.*)$'m ],
- ### http://www.kaspersky.com/
- ['Kaspersky Antivirus v5.5',
- ['/opt/kaspersky/kav4fs/bin/kav4fs-kavscanner',
- '/opt/kav/5.5/kav4unix/bin/kavscanner',
- '/opt/kav/5.5/kav4mailservers/bin/kavscanner', 'kavscanner'],
- '-i0 -xn -xp -mn -R -ePASBME {}/*', [0,10,15], [5,20,21,25],
- qr/(?:INFECTED|WARNING|SUSPICION|SUSPICIOUS) (.*)/m,
- ],
- );
- 1; # insure a defined return value
- ]0;root@echosnetwork:/etc[01;31mechosnetwork[01;34m etc #[00m [K
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement