head 1.1; access; symbols OPENPKG_E1_MP_HEAD:1.1 OPENPKG_E1_MP:1.1 OPENPKG_E1_MP_2_STABLE:1.1.2.2 OPENPKG_E1_FP:1.1.2.2 OPENPKG_2_STABLE_MP:1.1 OPENPKG_2_STABLE_20061018:1.1.2.2 OPENPKG_2_STABLE:1.1.0.2 OPENPKG_CW_FP:1.1; locks; strict; comment @# @; 1.1 date 2003.08.05.13.00.35; author cs; state Exp; branches 1.1.2.1; next ; 1.1.2.1 date 2003.08.05.13.00.35; author rse; state dead; branches; next 1.1.2.2; commitid iZxwRSmmWscPXUQr; 1.1.2.2 date 2006.10.16.14.56.36; author rse; state Exp; branches; next ; commitid iZxwRSmmWscPXUQr; desc @@ 1.1 log @new package: sophie 3.03 (Sophie Anti-Virus Scanner Daemon) @ text @## ## @@l_prefix@@/etc/sophie/sophie.cfg ## ############################################################################# # Group options automatically activate/deactivate all options that belong # # to the group. You'll have to figure out what belongs where, sorry :) # # # # If you want to deactivate certain feature from a group, just set it to 0 # # but make sure group definitions do remain at the top of this file # ############################################################################# # Executable files GrpExecutable: 1 # All archive and compressed archive file formats (e.g. ZIP, UUE, etc) GrpArchiveUnpack: 1 # File formats that contain an executable stub that automatically decompresses # the body of the file GrpSelfExtract: 1 # File formats commonly in use on the internet GrpInternet: 1 # Microsoft Office file formats GrpMSOffice: 1 # File formats that do not fall into any of the above categories GrpMisc: 1 # Any option that is part of a group is also included in this group # (NOTE: I have no idea what this really means :) GrpSuper: 0 # Enables or disables disinfection of all files for which disinfection is # supported GrpDisinfect: 0 ######################### # # # Configuration options # # # ######################### # Controls handling of Macintosh resounce and data fork files (on platforms # where these are supported). Settings are: # # 0 = Disabled # 1 = SOPHOS_DOS_FILES (enable scanning for Mac viruses) # 2 = SOPHOS_MAC_FILES (scan data fork files for DOS viruses) # 3 = SOPHOS_DOS_AND_MAC_FILES (mix :) #NamespaceSupport: 0 # Enables full sweeping, which performs extensive fixed pattern matching as # well as the standard intelligent virus search. Turning on this option # might have severe performance implications. #FullSweep: 0 # Controls the ability to scan inside supported types of dynamically # compressed executables. #DynamicDecompression: 1 # Enables a fallback mechanism that has been deployed in the past when new # file structures are encountered. Sophos recommends that you keep this # option turned off. #FullMacroSweep: 0 # Enables the intelligent scanning of OLE2 (Microsoft Office) format # documents. Sophos recommends that this option should be turned on. #OLE2Handling: 1 # Microsoft Office documents that contain executable macros will usually have # a single bit in the file header set to 1 to indicate the presence of # executable code. Under normal circumstances macros contained in a file that # does not have this bit set are not able to execute. If this option is # turned off, the Virus Engine will scan only files with this template bit # set to 1. Sophos recommends that you keep this option turned on. #IgnoreTemplateBit: 1 # This option enables the scanning of Microsoft Visual Basic for Applications # embedded in supported file types, like Office and Visio documents. #VBA3Handling: 1 # This option enables the scanning of Microsoft Visual Basic for Applications # embedded in supported file types, like Office and Visio documents. #VBA5Handling: 1 # Password-protected Office 95 documents are encrypted with a very simple # algorithm. Enabling this option causes the virus engine to break this # encryption to search for viruses. #OF95DecryptHandling: 0 # Enables checking for files embedded in Mirosoft Help files. #HelpHandling: 1 # Decompresses the text part of a VBA5 project before scanning. This area is # often corrupted, but can help positive identification of some viruses. #DecompressVBA5: 1 # Enables the 16-bit x86 emulation engine, which assists in the detection of # polymorphic executable file viruses. Sophos recommends this option should be # turned on. #Emulation: 1 # Enables the intelligent scanning of Win32/PE format files. This is the # standard format for Windows executable binaries such as .exe and .dll. #PEHandling: 1 # Enables scanning of Excel formulas for known formula viruses. Formulas # occupy cells on the worksheet and should not be confused with macros. #ExcelFormulaHandling: 1 # Enables the scanning of macros in PowerPoint presentations. #PowerPointMacroHandling: 1 # Enables the scanning of files embedded within PowerPoint presentations. #PowerPointEmbeddedHandling: 1 # Enables the scanning of VBA macros in Microsoft Project. #ProjectHandling: 1 # Enables scanning inside ZIP archives. #ZipDecompression: 1 # Enables decompression of Arj archives. #ArjDecompression: 1 # Enables decompression of RAR archives. #RarDecompression: 1 # Enables the virus engine to decode EEUncoded files. The UUEncode portion # must start within the first 4k of the document. #UueDecompression: 1 # Enables decompression of Gzipped archives. #GZipDecompression: 1 # Enables scanning inside UNIX tar archives. #TarDecompression: 1 # Enables decompression of Cmz archives. #CmzDecompression: 1 # Contols the ability to extract files from BinHex archives. #HqxDecompression: 1 # Controls the ability to look inside MacBinary archives. #MbinDecompression: 1 # Controls SAVI's ability to scan inside certain types of container file. # Sophos recommends that this options should be turned on. #LoopBackEnabled: 1 # Contols the maximum number of times the engine will recurse into archives # when they are found (e.g. when a zip file is compressed within another zip # file). The maximum value is 100, but SAVI internally has some extra levels # of recursion to cover internal data streams found within some file types. #MaxRecursionDepth: 16 # Enables decompression of Lha archives. #Lha: 1 # Enables the virus engine to search in supported types of self-extracting # archive. #SfxArchives: 1 # Enables decoding of files encoded with the Microsoft TNEF format, used by # some mail client applications. #TnefAttachmentHandling: 1 # Controls the ability to scan inside files compressed with the Microsoft # compression utility. #MSCompress: 1 # Enables decompression of Microsoft Cabinet files (.cab) (Partial files at # the beginning and end of multi-part cabinet files will not be fully # scanned #MSCabinet: 1 # Applies to Microsoft Office and other OLE2 format files. When this option is # enabled, calls to DisinfectFile() all macros present in the document are # deleted, regardless of whether or not they are viral. #DeleteAllMacros: 0 # Enables the scanning of encoded VBScript files. #Vbe: 1 # Some executable file viruses can be removed from files fairly safely. This # option enables that process. Sophos recommends that infected executables are # replaced from the original installation disks as soon as possible. #ExecFileDisinfection: 0 # Enables the scanning of Microsoft Visio files. #VisioFileHandling: 1 # Enables decoding and scanning inside a MIME encoded message block. #Mime: 1 # Enables the detection of macro viruses within Microsoft Office documents # saved in ActiveMime document format. #ActiveMimeHandling: 1 # Causes the entire project containing any viral macros to be removed during # disinfection. #DelVBA5Project: 0 # Enables the handling of scrap objects that are used in the transfer of data # between certain applications. #ScrapObjectHandling: 1 # Deals with another type of data within Office documents. #SrpStreamHandling: 1 # Controls the ability of the engine to understand Microsoft Office 2001 # files (Macintosh only) #Office2001Handling: 1 # Enables scanning inside UPX-compressed self-extracting executable archives. #Upx: 1 # Enables the scanning of Palm Pilot format files (.prc). #PalmPilotHandling: 1 # Controls the PDF file interpretation module. #Pdf: 1 # Enables scanning for objects that may be embedded inside Rich Text FOrmat # files. #Rtf: 1 # Controls the module that optimises scanning in HTML files. #Html: 1 # Controls the module that interprets ELF binary files. This format is used # for many Linux and FreeBSD executable files. #Elf: 1 # Enables the scanning of WordBasic. #WordB: 1 # Enables scanning of files contained within Outlook Express mailboxes. #OutlookExpress: 1 # FIXME: Well, I have some idea... #Java: 1 # FIXME: Well, I have some idea... #Access: 1 # FIXME: No idea what this is used for #AppleSingle: 0 # FIXME: No idea what this is used for #VbFiltering: 1 ####################################################### # # # DO NO SET/USE ANY OF THESE CONFIGURATION OPTIONS!!! # # # ####################################################### # The passed string defines the full path name of the directory in which the # main virus data file is located. The name should not have a trailing # directory separator character. #VirusDataDir: # The passed string defines the name of the virus data file. This name should # not include a directory component (this is defined by the VirusDataDir # setting) or a file extension. For example, if the main virus data file name # is vdl.dat then this string should be passed as vdl. #VirusDataName: # The passed string defines the full path name of the directory in which SAVI # should search for IDE files. #IdeDir: @ 1.1.2.1 log @file sophie.savi was added on branch OPENPKG_2_STABLE on 2006-10-16 14:56:36 +0000 @ text @d1 277 @ 1.1.2.2 log @Mass merge from CURRENT to 2-STABLE (all packages except those of JUNK class) @ text @a0 277 ## ## @@l_prefix@@/etc/sophie/sophie.cfg ## ############################################################################# # Group options automatically activate/deactivate all options that belong # # to the group. You'll have to figure out what belongs where, sorry :) # # # # If you want to deactivate certain feature from a group, just set it to 0 # # but make sure group definitions do remain at the top of this file # ############################################################################# # Executable files GrpExecutable: 1 # All archive and compressed archive file formats (e.g. ZIP, UUE, etc) GrpArchiveUnpack: 1 # File formats that contain an executable stub that automatically decompresses # the body of the file GrpSelfExtract: 1 # File formats commonly in use on the internet GrpInternet: 1 # Microsoft Office file formats GrpMSOffice: 1 # File formats that do not fall into any of the above categories GrpMisc: 1 # Any option that is part of a group is also included in this group # (NOTE: I have no idea what this really means :) GrpSuper: 0 # Enables or disables disinfection of all files for which disinfection is # supported GrpDisinfect: 0 ######################### # # # Configuration options # # # ######################### # Controls handling of Macintosh resounce and data fork files (on platforms # where these are supported). Settings are: # # 0 = Disabled # 1 = SOPHOS_DOS_FILES (enable scanning for Mac viruses) # 2 = SOPHOS_MAC_FILES (scan data fork files for DOS viruses) # 3 = SOPHOS_DOS_AND_MAC_FILES (mix :) #NamespaceSupport: 0 # Enables full sweeping, which performs extensive fixed pattern matching as # well as the standard intelligent virus search. Turning on this option # might have severe performance implications. #FullSweep: 0 # Controls the ability to scan inside supported types of dynamically # compressed executables. #DynamicDecompression: 1 # Enables a fallback mechanism that has been deployed in the past when new # file structures are encountered. Sophos recommends that you keep this # option turned off. #FullMacroSweep: 0 # Enables the intelligent scanning of OLE2 (Microsoft Office) format # documents. Sophos recommends that this option should be turned on. #OLE2Handling: 1 # Microsoft Office documents that contain executable macros will usually have # a single bit in the file header set to 1 to indicate the presence of # executable code. Under normal circumstances macros contained in a file that # does not have this bit set are not able to execute. If this option is # turned off, the Virus Engine will scan only files with this template bit # set to 1. Sophos recommends that you keep this option turned on. #IgnoreTemplateBit: 1 # This option enables the scanning of Microsoft Visual Basic for Applications # embedded in supported file types, like Office and Visio documents. #VBA3Handling: 1 # This option enables the scanning of Microsoft Visual Basic for Applications # embedded in supported file types, like Office and Visio documents. #VBA5Handling: 1 # Password-protected Office 95 documents are encrypted with a very simple # algorithm. Enabling this option causes the virus engine to break this # encryption to search for viruses. #OF95DecryptHandling: 0 # Enables checking for files embedded in Mirosoft Help files. #HelpHandling: 1 # Decompresses the text part of a VBA5 project before scanning. This area is # often corrupted, but can help positive identification of some viruses. #DecompressVBA5: 1 # Enables the 16-bit x86 emulation engine, which assists in the detection of # polymorphic executable file viruses. Sophos recommends this option should be # turned on. #Emulation: 1 # Enables the intelligent scanning of Win32/PE format files. This is the # standard format for Windows executable binaries such as .exe and .dll. #PEHandling: 1 # Enables scanning of Excel formulas for known formula viruses. Formulas # occupy cells on the worksheet and should not be confused with macros. #ExcelFormulaHandling: 1 # Enables the scanning of macros in PowerPoint presentations. #PowerPointMacroHandling: 1 # Enables the scanning of files embedded within PowerPoint presentations. #PowerPointEmbeddedHandling: 1 # Enables the scanning of VBA macros in Microsoft Project. #ProjectHandling: 1 # Enables scanning inside ZIP archives. #ZipDecompression: 1 # Enables decompression of Arj archives. #ArjDecompression: 1 # Enables decompression of RAR archives. #RarDecompression: 1 # Enables the virus engine to decode EEUncoded files. The UUEncode portion # must start within the first 4k of the document. #UueDecompression: 1 # Enables decompression of Gzipped archives. #GZipDecompression: 1 # Enables scanning inside UNIX tar archives. #TarDecompression: 1 # Enables decompression of Cmz archives. #CmzDecompression: 1 # Contols the ability to extract files from BinHex archives. #HqxDecompression: 1 # Controls the ability to look inside MacBinary archives. #MbinDecompression: 1 # Controls SAVI's ability to scan inside certain types of container file. # Sophos recommends that this options should be turned on. #LoopBackEnabled: 1 # Contols the maximum number of times the engine will recurse into archives # when they are found (e.g. when a zip file is compressed within another zip # file). The maximum value is 100, but SAVI internally has some extra levels # of recursion to cover internal data streams found within some file types. #MaxRecursionDepth: 16 # Enables decompression of Lha archives. #Lha: 1 # Enables the virus engine to search in supported types of self-extracting # archive. #SfxArchives: 1 # Enables decoding of files encoded with the Microsoft TNEF format, used by # some mail client applications. #TnefAttachmentHandling: 1 # Controls the ability to scan inside files compressed with the Microsoft # compression utility. #MSCompress: 1 # Enables decompression of Microsoft Cabinet files (.cab) (Partial files at # the beginning and end of multi-part cabinet files will not be fully # scanned #MSCabinet: 1 # Applies to Microsoft Office and other OLE2 format files. When this option is # enabled, calls to DisinfectFile() all macros present in the document are # deleted, regardless of whether or not they are viral. #DeleteAllMacros: 0 # Enables the scanning of encoded VBScript files. #Vbe: 1 # Some executable file viruses can be removed from files fairly safely. This # option enables that process. Sophos recommends that infected executables are # replaced from the original installation disks as soon as possible. #ExecFileDisinfection: 0 # Enables the scanning of Microsoft Visio files. #VisioFileHandling: 1 # Enables decoding and scanning inside a MIME encoded message block. #Mime: 1 # Enables the detection of macro viruses within Microsoft Office documents # saved in ActiveMime document format. #ActiveMimeHandling: 1 # Causes the entire project containing any viral macros to be removed during # disinfection. #DelVBA5Project: 0 # Enables the handling of scrap objects that are used in the transfer of data # between certain applications. #ScrapObjectHandling: 1 # Deals with another type of data within Office documents. #SrpStreamHandling: 1 # Controls the ability of the engine to understand Microsoft Office 2001 # files (Macintosh only) #Office2001Handling: 1 # Enables scanning inside UPX-compressed self-extracting executable archives. #Upx: 1 # Enables the scanning of Palm Pilot format files (.prc). #PalmPilotHandling: 1 # Controls the PDF file interpretation module. #Pdf: 1 # Enables scanning for objects that may be embedded inside Rich Text FOrmat # files. #Rtf: 1 # Controls the module that optimises scanning in HTML files. #Html: 1 # Controls the module that interprets ELF binary files. This format is used # for many Linux and FreeBSD executable files. #Elf: 1 # Enables the scanning of WordBasic. #WordB: 1 # Enables scanning of files contained within Outlook Express mailboxes. #OutlookExpress: 1 # FIXME: Well, I have some idea... #Java: 1 # FIXME: Well, I have some idea... #Access: 1 # FIXME: No idea what this is used for #AppleSingle: 0 # FIXME: No idea what this is used for #VbFiltering: 1 ####################################################### # # # DO NO SET/USE ANY OF THESE CONFIGURATION OPTIONS!!! # # # ####################################################### # The passed string defines the full path name of the directory in which the # main virus data file is located. The name should not have a trailing # directory separator character. #VirusDataDir: # The passed string defines the name of the virus data file. This name should # not include a directory component (this is defined by the VirusDataDir # setting) or a file extension. For example, if the main virus data file name # is vdl.dat then this string should be passed as vdl. #VirusDataName: # The passed string defines the full path name of the directory in which SAVI # should search for IDE files. #IdeDir: @