debug 9 -o /cygdrive/C/SrvData/Eh.Bot/tmp/Homespun-SPiRiT.log
set ftp:passive-mode off
set mirror:parallel-transfer-count 1
set mirror:set-permissions
set net:max-retries 0
set net:persist-retries 0
set net:socket-buffer 65535
set ftp:ssl-allow false
open XXX.XXX.XXX:XXXX
user X X
lcd /cygdrive/C/Downloads/Pending/Homespun-SPiRiT
cd /APPS/Homespun-SPiRiT
mirror --continue --only-missing --dereference --loop
bye

---> SIZE CD1
<--- 213 323476455
---> MDTM CD1
<--- 213 20100802144644.312
---> PORT 208,94,246,54,18,36
<--- 200 Command okay
---> RETR CD1
<--- 550 Not a plain file
---- Closing data socket

I've tested this on 2 DrFTPD servers and not sure if this is just related to the DrFTPD or all servers
Spam detection software, running on the system "univ.uniyar.ac.ru", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.

Content preview:  debug 9 -o /cygdrive/C/SrvData/Eh.Bot/tmp/Homespun-SPiRiT.log
   set ftp:passive-mode off set mirror:parallel-transfer-count 1 set 
mirror:set-permissions
   set net:max-retries 0 set net:persist-retries 0 set net:socket-buffer 65535
   set ftp:ssl-allow false open XXX.XXX.XXX:XXXX user X X lcd 
/cygdrive/C/Downloads/Pending/Homespun-SPiRiT
   cd /APPS/Homespun-SPiRiT mirror --continue --only-missing --dereference 
--loop
   bye [...] 

Content analysis details:   (4.0 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
-0.0 T_RP_MATCHES_RCVD      Envelope sender domain matches handover relay
                            domain
 4.0 BAYES_50               BODY: Bayes spam probability is 40 to 60%
                            [score: 0.4962]


Reply via email to