I noticed that eFa does not use the default MailScanner phishing.bad.sites.conf and phishing.safe.sites.conf.
That itself is not a problem but the phishing.bad.sites.conf has invalid or not working entries.
Most of the entries go like this:
Code: Select all
bad.url.com
Code: Select all
bad.url.com,http:
It is only marked as possible fraud, but when it is in this file it should be definitive.
Even the current online file has these faults: http://dl.efa-project.org/MailScanner/p ... sites.conf
For now I fixed the issue in rewriting the EFA-MA-Update script and adding:
Code: Select all
sed -i 's/,http://g' phishing.bad.sites.conf
Thanks and regards