debug 9 -o /cygdrive/C/SrvData/Eh.Bot/tmp/Homespun-SPiRiT.log
set ftp:passive-mode off
set mirror:parallel-transfer-count 1
set mirror:set-permissions
set net:max-retries 0
set net:persist-retries 0
set net:socket-buffer 65535
set ftp:ssl-allow false
open XXX.XXX.XXX:XXXX
user X X
lcd /cygdrive/C/Downloads/Pending/Homespun-SPiRiT
cd /APPS/Homespun-SPiRiT
mirror --continue --only-missing --dereference --loop
bye
---> SIZE CD1
<--- 213 323476455
---> MDTM CD1
<--- 213 20100802144644.312
---> PORT 208,94,246,54,18,36
<--- 200 Command okay
---> RETR CD1
<--- 550 Not a plain file
---- Closing data socket
I've tested this on 2 DrFTPD servers and not sure if this is just
related to the DrFTPD or all servers
Spam detection software, running on the system "univ.uniyar.ac.ru", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: debug 9 -o /cygdrive/C/SrvData/Eh.Bot/tmp/Homespun-SPiRiT.log
set ftp:passive-mode off set mirror:parallel-transfer-count 1 set
mirror:set-permissions
set net:max-retries 0 set net:persist-retries 0 set net:socket-buffer 65535
set ftp:ssl-allow false open XXX.XXX.XXX:XXXX user X X lcd
/cygdrive/C/Downloads/Pending/Homespun-SPiRiT
cd /APPS/Homespun-SPiRiT mirror --continue --only-missing --dereference
--loop
bye [...]
Content analysis details: (4.0 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
-0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay
domain
4.0 BAYES_50 BODY: Bayes spam probability is 40 to 60%
[score: 0.4962]