[Pkg-clamav-commits] [SCM] Debian repository for ClamAV branch, debian/unstable, updated. 99ae9353f6834da0cb73f59f4b32d1f0ae1263fa

Stephen Gran steve at lobefin.net
Thu Sep 4 12:36:34 UTC 2008


The following commit has been merged in the debian/unstable branch:
commit 18c2635c4f5bc22c911d9af68172ef89be955862
Author: Stephen Gran <steve at lobefin.net>
Date:   Thu Sep 4 13:25:02 2008 +0100

    Revert "Revert "Add milter --no-check-cf patch and enable it by default""
    
    This reverts commit 48f6e661cc476e003b36a4ca0b72f3476f06a5d9.

diff --git a/clamav-milter/clamav-milter.c b/clamav-milter/clamav-milter.c
index e768ac9..aef3b98 100644
--- a/clamav-milter/clamav-milter.c
+++ b/clamav-milter/clamav-milter.c
@@ -542,6 +542,7 @@ static	const	char	*whitelistFile;	/*
 					 */
 static	const	char	*sendmailCF;	/* location of sendmail.cf to verify */
 static	const	char	*pidfile;
+static	int nocheckCF = 0;
 static	int	black_hole_mode; /*
 				 * Since sendmail calls its milters before it
 				 * looks in /etc/aliases we can spend time
@@ -637,6 +638,7 @@ help(void)
 	puts(_("\t--quarantine-dir=DIR\t-U DIR\tDirectory to store infected emails."));
 	puts(_("\t--server=SERVER\t\t-s SERVER\tHostname/IP address of server(s) running clamd (when using TCPsocket)."));
 	puts(_("\t--sendmail-cf=FILE\t\tLocation of the sendmail.cf file to verify"));
+	puts(_("\t--no-check-cf\t\tSkip verification of sendmail.cf"));
 	puts(_("\t--sign\t\t\t-S\tAdd a hard-coded signature to each scanned message."));
 	puts(_("\t--signature-file=FILE\t-F FILE\tLocation of signature file."));
 	puts(_("\t--template-file=FILE\t-t FILE\tLocation of e-mail template file."));
@@ -840,6 +842,9 @@ main(int argc, char **argv)
 				"freshclam-monitor", 1, NULL, 'M'
 			},
 			{
+				"no-check-cf", 0, NULL, 'z'
+			},
+			{
 				"sendmail-cf", 1, NULL, '0'
 			},
 			{
@@ -1045,6 +1050,9 @@ main(int argc, char **argv)
 				debug_level = atoi(optarg);
 				break;
 #endif
+			case 'z':
+				nocheckCF = 1;
+				break;
 			default:
 #ifdef	CL_DEBUG
 				fprintf(stderr, "Usage: %s [-b] [-c FILE] [-F FILE] [--max-children=num] [-e] [-l] [-o] [-p address] [-P] [-q] [-Q USER] [-s SERVER] [-S] [-x#] [-U PATH] [-M#] socket-addr\n", argv[0]);
@@ -5965,6 +5973,9 @@ verifyIncomingSocketName(const char *sockName)
 		 */
 		return 1;
 
+	if (nocheckCF) 
+		return 1;
+
 	if(sendmailCF)
 		fd = open(sendmailCF, O_RDONLY);
 	else {
diff --git a/debian/clamav-milter.default b/debian/clamav-milter.default
index 1912174..47e725e 100644
--- a/debian/clamav-milter.default
+++ b/debian/clamav-milter.default
@@ -1,5 +1,5 @@
 # Default options: 2 children max and scan outgoing and local messages
-OPTIONS="--max-children=2 -ol"
+OPTIONS="--max-children=2 -ol --no-check-cf"
 #
 # If you want to set an alternate pidfile (why?) please do it here:
 #
diff --git a/docs/man/clamav-milter.8.in b/docs/man/clamav-milter.8.in
index b3eedac..020bddb 100644
--- a/docs/man/clamav-milter.8.in
+++ b/docs/man/clamav-milter.8.in
@@ -296,6 +296,9 @@ When starting, clamav\-milter runs some sanity checks against the sendmail.cf
 file, usually in /etc/sendmail.cf or /etc/mail/sendmail.cf. This directive
 tells clamav\-milter where to find the sendmail.cf file.
 .TP
+\fB\-\-no\-check\-cf\fR
+Skip the above check.
+.TP
 \fB\-\-black-hole-mode\fR
 Since \fIsendmail\fR calls its milters before it looks in its alias and virtuser
 tables, clamav-milter can spend time looking for malware that's going to be

-- 
Debian repository for ClamAV



More information about the Pkg-clamav-commits mailing list