
CHAPTER 6
193
Administering F-Secure Anti-Virus for Internet Mail
Examples of Malformed Messages
Malformed mail headers can include, for example: Multiple Content-Type,
Content-Disposition and/or Content-Transfer Encoding headers, multiple
“name” parameters in Content-Type headers, or multiple “filename”
parameters in Content-Disposition headers.
In the example below, there are multiple "Content-Transfer-Encoding"
headers with different values (base64 and the other quoted-printable):
This is a multi-part message in MIME format.
--SHNJUU7CST-=-1AEAS11JMG-CUT-HERE-YRVJUFHDDE-=-ASN1DH889T
Content-Type: application/octet-stream
Content-Transfer-Encoding: base64
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
filename="ghost.exe"
Action on mails with
long lines
Select the action to take if an e-mail message
contains lines exceeding the maximum length of
995 characters (not including <CRLF>).
Reject
- The e-mail is rejected.
Wrap
- The product accepts the e-mail message
and splits long lines (as soon as they are
encountered during receiving) into multiple lines,
each of them shorter or equal to 995 characters.
When wrapping long lines, lines over 995
characters are split with a carriage return, line
feed and tab. This means that the first line starts
from the beginning, but each additional wrapped
line is indented with a tab. This is done to avoid
breaking the MIME headers.
Accept
- The e-mail is accepted with the long
lines unmodified. This may cause problems with
downstream mail servers.
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...