On 09/02/15 15:48, Martin Gregorie wrote:
On Wed, 2015-09-02 at 14:12 +0200, Axb wrote:

afaik, there is no code freely available to [recode the Malware
Patrol rules], on server or  client side.

...the translation is easy to do with a simple awk script. Something
like this:

#!/bin/bash
awk '
/body/  { url = substr($3,2);
           gsub(/\\/,"",url);
           n=length(url);
           url=substr(url,1,n-2);
         }
/score/ { if ($3 < 3.5) {code=1} else {code=2};
           printf("%s IN A 127.0.0.%s\n",url,code);
         }
' <$1

There may be a more elegant way of doing it, but this works and, like
all awk scripts, runs fast.



Didn't mean "recode the MP rules".
I meant to feed a rbldnsd zone from trap traffic, for example.

Still, I'd love to hear that those rules have a ton of hits, but I'm not holding my breath.

Reply via email to