Not with SA, but in proccmail, I use a canned recipe fetched off the net:

In .procmailrc:

#
# eliminate virus mail.
#
MYVIRUS=virus-trap
INCLUDERC=/etc/mail/procmail/virussnag.rc

In virussnag.rc is located here:
http://www.spamless.us/pub/procmail/virussnag.rc

Leading comments:

######################### Virus Snaggers, ver. 1.31
##########################
##################### by Dallman Ross <[EMAIL PROTECTED]>
#####################
#################### Copyright (c) 9/2003, by the author
#####################
########## MAY BE USED WITH ATTRIBUTION & INTACT COPYRIGHT NOTICE;
###########
##################### PLEASE COMMENT ANY CHANGES AS YOURS
####################
###################### NO WARRANTIES, EXPRESS OR IMPLIED
#####################
####################### Tech Support Available for Fee
#######################

# Virus Snaggers is intended to be run under procmail -- www.procmail.org

# Place this file in its entirety somewhere reasonable.  Then run it from
# your .procmailrc with a line like this (remove the leading comment char):
#
#  INCLUDERC = /somewhere/reasonable/virussnag.rc

# Caught mail is saved by default to a file called "VIRUS".  You can run
# as-is or pre-set $MYVIRUS to something other than the default.  Or set
# it to /dev/null if you're feeling macho.  E.g.,
#
#  MYVIRUS = /dev/null  # optional line in your .procmailrc to change
default
#  INCLUDERC = /somewhere/reasonable/virussnag.rc
#
# Other options include saving only virus headers (see "$h" variable);
# or declining filewrites from inside this file (see "$NONDEL") while
# nonetheless allowing viruses to be flagged ("$VIR_A", "$VIR_B") for
# custom handling later.  See Variables Section for details.



> From: Kang, Joseph S.
> Sent: Friday, January 09, 2004 6:56 AM
>
> > We're being hit by MS security update emails.  I know they're
> > not spam,
> > but rather  more accurately described as virii or worms.
> >
> > However, I'm wondering if anyone has a good rule that will mark these?
>
> That's a good question.  I got a few of those yesterday (day
> before?), too.
> I was freaking out trying to figure out how they got through until I
> remembered that they were over the 256K size limit for e-mails
> and bypassed
> SA.  :)






-------------------------------------------------------
This SF.net email is sponsored by: Perforce Software.
Perforce is the Fast Software Configuration Management System offering
advanced branching capabilities and atomic changes on 50+ platforms.
Free Eval! http://www.perforce.com/perforce/loadprog.html
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to