Chris, thanks for posting this script.
I've set it up and it works great!
I don't have the perl skills to do it myself, so really appreciate
that you've shared your knowledge.
Thanks also to Steve Basford for making the phish.ndb file.
James.
On 25/04/2006, at 6:18 AM, Christopher X.
On Monday 24 April 2006 3:18 pm, Christopher X. Candreva wrote:
On Mon, 24 Apr 2006, Steve Basford wrote:
The file you need is: http://www.sanesecurity.com/clamav/phish.ndb.gz
I've atached my updated Perl script. It will now check the compressed
archive, and if it is updated download and
On Wed, 26 Apr 2006, Chris wrote:
A 500 status code is an internal server error. Nothing to do with the
script.
99% of all problems under Unix are permissions
Aside from it being under cron, what else is different. UserID, evnironment,
shell, PWD, etc ?
On Wednesday 26 April 2006 9:08 pm, Christopher X. Candreva wrote:
On Wed, 26 Apr 2006, Chris wrote:
A 500 status code is an internal server error. Nothing to do with the
script.
99% of all problems under Unix are permissions
Aside from it being under cron, what else is different. UserID,
On Monday 24 Apr 2006 22:35, Steve Basford wrote:
Christopher X. Candreva wrote:
I've atached my updated Perl script. It will now check the compressed
archive, and if it is updated download and upcompress it.
Thank you!
I'll sort out the website tomorrow hopefully, with some of sample
Hi everbody,
I setup proftpd with ClamAV, build during is everything OK,
But, when I run proftpd , I see as following in clamd.log :
Apr 25 12:52:22 trade proftpd[2170]: localhost.localdomain (xx.xx.xx.xxx) -
TP session opened.
Apr 25 12:52:24 trade proftpd[2172]: localhost.localdomain
On Monday 24 Apr 2006 22:35, Steve Basford wrote:
Steve, is it your intention to name the file inside the .gz phishc.ndb,
consistently, so I can script on that basis?
Arghhh... sorry that really should have been phish.ndb, I've now
corrected the script
using -N saves the original,
On Tue, 25 Apr 2006, Bob Hutchinson wrote:
On Monday 24 Apr 2006 22:35, Steve Basford wrote:
using the --stdout method results in a new timestamp. For me that is
confounding.
Yes. Unfortunately I didn't see any other way to keep the original .gz file
intact. The LWP mirror library needs
On Tuesday 25 Apr 2006 11:07, Steve Basford wrote:
On Monday 24 Apr 2006 22:35, Steve Basford wrote:
Steve, is it your intention to name the file inside the .gz phishc.ndb,
consistently, so I can script on that basis?
Arghhh... sorry that really should have been phish.ndb, I've now
On Tuesday 25 Apr 2006 12:07, Christopher X. Candreva wrote:
On Tue, 25 Apr 2006, Bob Hutchinson wrote:
On Monday 24 Apr 2006 22:35, Steve Basford wrote:
using the --stdout method results in a new timestamp. For me that is
confounding.
Yes. Unfortunately I didn't see any other way to
On Tue, Apr 25, 2006 at 07:07:03AM -0400, Christopher X. Candreva wrote:
If you know a gunzip option that will NOT delete the compresed file,
that would be the prefered method.
- you could user 'tar czf' / 'tar xzf' instead of 'gzip' / 'gunzip'.
- or maybe 'touch -r' could help?
--
On Tue, 25 Apr 2006, Bob Hutchinson wrote:
The trouble with perl system() calls is that you don't get any result
codes, I might experiment with backticks instead.
Someone suggested touch, here's the simple way:
if ($result == 200) {
system gunzip -v --stdout $file $dbfile;
my
Bob Hutchinson wrote:
The trouble with perl system() calls is that you don't get any result codes...
% perldoc -f system
system LIST
system PROGRAM LIST
...
You can check all the failure possibilities by inspecting $?
like this:
if ($? == -1) {
On Tuesday 25 Apr 2006 16:04, Tom Metro wrote:
Bob Hutchinson wrote:
The trouble with perl system() calls is that you don't get any result
codes...
% perldoc -f system
system LIST
system PROGRAM LIST
...
You can check all the failure possibilities by inspecting $?
On Monday 24 April 2006 3:18 pm, Christopher X. Candreva wrote:
On Mon, 24 Apr 2006, Steve Basford wrote:
The file you need is: http://www.sanesecurity.com/clamav/phish.ndb.gz
I've atached my updated Perl script. It will now check the compressed
archive, and if it is updated download and
On Tue, 25 Apr 2006, Chris wrote:
phish.ndb.gz500
as a guess does this mean there was no new file to download?
A 500 status code is an internal server error. Nothing to do with the
script.
==
Chris Candreva -- [EMAIL PROTECTED]
Hi All,
In order to optimize the use of my bandwidth for the unofficial phishing
signatures, I want to put up a few
example scripts on the main page of my site that users should use to
download the phish.ndb file.
The reason is that I've got quite a few users, downloading every 15
mins, the
On Mon, 24 Apr 2006, Steve Basford wrote:
Could anyone come up with some good wget/curl scripts, with wget,
I guess it's using the -N option to only download changes and only
download hourly (eg. 15:00, 16:00, 17:15, 18:15) etc.
I am running this script once a day, modified appropriately
On Mon, 24 Apr 2006, Steve Basford wrote:
Could anyone come up with some good wget/curl scripts, with wget, I guess it's
using the -N option to only download changes and only download hourly (eg.
15:00, 16:00, 17:15, 18:15) etc.
I use the following bit of perl. If you have access to your own
On Monday 24 Apr 2006 07:04, Steve Basford wrote:
Hi All,
In order to optimize the use of my bandwidth for the unofficial phishing
signatures, I want to put up a few
example scripts on the main page of my site that users should use to
download the phish.ndb file.
The reason is that I've
Steve Basford escreveu:
In order to optimize the use of my bandwidth for the unofficial
phishing signatures, I want to put up a few
example scripts on the main page of my site that users should use to
download the phish.ndb file.
I know this is a silly suggestion, but why not
On Monday 24 Apr 2006 13:26, Leonardo Rodrigues Magalhães wrote:
Steve Basford escreveu:
In order to optimize the use of my bandwidth for the unofficial
phishing signatures, I want to put up a few
example scripts on the main page of my site that users should use to
download the phish.ndb
On Sun, April 23, 2006 11:04 pm, Steve Basford wrote:
In order to optimize the use of my bandwidth for the unofficial
phishing signatures, I want to put up a few example scripts on the
main page of my site that users should use to download the phish.ndb
file.
The reason is that I've got
Hi All,
Could anyone come up with some good wget/curl scripts, with wget, I
guess it's using the -N option to only download changes and only
download hourly (eg. 15:00, 16:00, 17:15, 18:15) etc.
Wget seems to have a miserable bug with the -N and -O options that causes
it to always
- Original Message -
From: Dennis Peterson [EMAIL PROTECTED]
Hi All,
Could anyone come up with some good wget/curl scripts, with wget, I
guess it's using the -N option to only download changes and only
download hourly (eg. 15:00, 16:00, 17:15, 18:15) etc.
Wget seems to have a
Wget seems to have a miserable bug with the -N and -O
options that causes
it to always download the selected file. This is not the
case with curl.
wget -N -O phish.ndb http://[fqdn]/phish.ndb does not work
as expected.
I verified this again this am.
In this case the -O option is
Bob Hutchinson escreveu:
or rsync?
compression as part of the protocol, and only transfers the diffs ;-)
sanesecurity.com would need rsync daemon running.
Sure it will work. But is it rsync really needed for syncinc a
single file that bzip/gzipped will hardly get over 300k ??
Wget seems to have a miserable bug with the -N and -O options that causes
it to always download the selected file. This is not the case with curl.
wget -N -O phish.ndb http://[fqdn]/phish.ndb does not work as expected.
I verified this again this am.
I'd recommend rsync with
Leonardo Rodrigues Magalhães wrote:
sanesecurity.com would need rsync daemon running.
Sure it will work. But is it rsync really needed for syncinc a
single file that bzip/gzipped will hardly get over 300k ??
Hi All,
Firstly, I just wanted to say a big thank you for everybody's
On Mon, 24 Apr 2006, Steve Basford wrote:
a) phish.ndb.gz
Definately.
==
Chris Candreva -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/
Steve Basford escreveu:
I'm going to upload both compressed and un-compressed versions for
quite a while...but before I pull all this
together... should the filename be:
a) phish.ndb.gz
b) phish.gz
I think a) myself... but feedback welcome ;)
phish.ndb.gz .. just add the .gz
- Original Message -
From: Christopher X. Candreva [EMAIL PROTECTED]
On Mon, 24 Apr 2006, Steve Basford wrote:
a) phish.ndb.gz
Definately.
I agree.
Bill
___
http://lurker.clamav.net/list/clamav-users.html
At 01:59 PM 4/24/2006, Steve Basford wrote:
... should the filename be:
a) phish.ndb.gz
definitely.
--
Noel Jones
___
http://lurker.clamav.net/list/clamav-users.html
Bill Landry wrote:
a) phish.ndb.gz
Definately.
I agree.
Okay folks, I've put together a dos script to create the phish.ndb.gz
file and have just updated both the compressed
and un-compressed versions.
The file you need is: http://www.sanesecurity.com/clamav/phish.ndb.gz
I'll pop back
Steve Basford escreveu:
Okay folks, I've put together a dos script to create the phish.ndb.gz
file and have just updated both the compressed
and un-compressed versions.
The file you need is: http://www.sanesecurity.com/clamav/phish.ndb.gz
It would be too much if I ask some
On Mon, 24 Apr 2006, Steve Basford wrote:
The file you need is: http://www.sanesecurity.com/clamav/phish.ndb.gz
I've atached my updated Perl script. It will now check the compressed
archive, and if it is updated download and upcompress it.
Christopher X. Candreva wrote:
I've atached my updated Perl script. It will now check the compressed
archive, and if it is updated download and upcompress it.
Thank you!
I'll sort out the website tomorrow hopefully, with some of sample
recommended scripts.
Cheers,
Steve
At 03:12 PM 4/24/2006, Leonardo Rodrigues Magalhães wrote:
It would be too much if I ask some
instructions on how to use your phishing database ?? :)
Use the little perl script that Chris Candreva
posted earlier in this thread.
Update the $file and $dbfile variables with the
full path of
At 03:18 PM 4/24/2006, you wrote:
I've atached my updated Perl script. It will now check the
compressed
archive, and if it is updated download and upcompress it.
Nice and simple.
To do:
- Send a RELOAD command to the clamd socket
- check file permission/owner
--
Noel Jones
39 matches
Mail list logo