Don't know post back to list and maybe Jason H. might know. You could alsoO.K., I have find suid perl in /usr/bin/ !
post the config process output.
This is my configure option and output .... ./configure --admin virusadmin --domain mizasol.com --scanners clamscan,verbose_spamassassin --debug yes --lang it_IT --install
Building Qmail-Scanner 1.22...
This script will search your system for the virus scanners it knows about, and will ensure that all external programs qmail-scanner-queue.pl uses are explicitly pathed for performance reasons.
Continue? ([Y]/N) y
/usr/bin/uudecode works as expected on system...
Found tnef on your system! That means we'll be able to decode stupid M$ attachments :-)
The following binaries and scanners were found on your system:
mimeunpacker=/usr/bin/reformime uudecode=/usr/bin/uudecode unzip=/usr/bin/unzip tnef=/usr/local/bin/tnef
Content/Virus Scanners installed on your System
clamscan=/usr/bin/clamscan verbose_spamassassin=/usr/bin/spamc
Qmail-Scanner details.
log-details=0 fix-mime=2 ignore-eol-check=0 debug=1 notify=psender,nmlvadm redundant-scanning=no [EMAIL PROTECTED] local-domains='mizasol.com' silent-viruses='klez','bugbear','hybris','yaha','braid','nimda','tanatos','sobig','winevar','palyh','fizzer','gibe','cailont','lovelorn','swen','dumaru','sober','hawawi','holar-i','mimail','poffer','bagle','worm.galil','mydoom','worm.sco','tanx','novarg','[EMAIL PROTECTED]' scanners="clamscan_scanner","verbose_spamassassin"
If that looks correct, I will now generate qmail-scanner-queue.pl for your system... Continue? ([Y]/N) y Testing suid nature of /usr/bin/perl... Looks OK... Hit RETURN to create initial directory structure under /var/spool/qmailscan, and install qmail-scanner-queue.pl under /var/qmail/bin: perlscanner: generate new DB file from /var/spool/qmailscan/quarantine-attachments.txt perlscanner: total of 9 entries.
Finished installation of initial directory structure for Qmail-Scanner under /var/spool/qmailscan and qmail-scanner-queue.pl under /var/qmail/bin.
Finished. Please read README(.html) and then go over the script (/var/qmail/bin/qmail-scanner-queue.pl) to check paths/etc.
"/var/qmail/bin/qmail-scanner-queue.pl -r" should return some well-known virus definitions to show that the internal perlscanner component is working.
That's it!
****** FINAL TEST ******
Please log into an unpriviledged account and run /var/qmail/bin/qmail-scanner-queue.pl -g
If you see the error "Can't do setuid", or "Permission denied", then refer to the FAQ.
(e.g. "setuidgid qmaild /var/qmail/bin/qmail-scanner-queue.pl -g")
That's it! To report success:
% (echo 'First M. Last'; cat SYSDEF)|mail [EMAIL PROTECTED] Replace First M. Last with your name.
-------------------------------------------------------
This SF.Net email is sponsored by Sleepycat Software
Learn developer strategies Cisco, Motorola, Ericsson & Lucent use to deliver higher performing products faster, at low TCO.
http://www.sleepycat.com/telcomwpreg.php?From=osdnemail3
_______________________________________________
Qmail-scanner-general mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/qmail-scanner-general