literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().
In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
constructions that parse out to [ -z "$foo" ] && foo=""
These are bad examples that get copied and pasted into new code, so the
hope is that with less bad examples there will be less need for me to
bring this up in review.
In a few of these files all that were changed were comments so that next
time I search for these patterns I won't trip on the file for no reason.
In a few places, add $FreeBSD$
No functional changes, so no PORTREVISION bumps
propogated by copy and paste.
1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).
No PORTREVISION bumps because all of these changes are noops.
is faster and less cpu intensive than other interperative based solutions.
It blocks spam using the following methods;
* Configurable Realtime DNS Blacklists
* Sender Address verification
* Configurable Black and White lists
* Invalid MTA hostname verfication
* Basic Virus/Worm file attachment rejection for files ending
in .pif, .scr, etc.. via MsExtChk filter
* SPF via libspf
Also;
* Realtime firewall blocking of MTA hosts with invalid host names via
MtaHostIpfw filter
* Realtime rate limited connection blocking via firewall rule injection
All actions are logged via syslog with both the sender and the recipient.
From this, report generation and notification to recipients showing
activity becomes extremely simple.
WWW: http://www.wanlink.com/spamilter/index.php