>zip:*@encr.ourdomain.org => good-out => .*|crypt\-zip 

yes


>
exe\-bin|:MSOM|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|xlsm|(exe\-bin|:MSOM|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|xlsm).zip


- :MSOM should be defined only one time
- (....).zip makes IMHO no sense - but if used, it should be defined as 
(...)\.zip

same here
~~StdBlockRule => block ~StdBlockExts|(~StdBlockExts).zip
~~StdBlockRule => block ~StdBlockExts|(~StdBlockExts)\.zip

notice: brackets used with templates will not work in the current build! - 
the next release will support this
notice: a bug in the current version causes errors, if uppercase letters 
are used in the template or rule names - the next release will fix this

>zip:* => block => ~StdBlockExts|--bin    <-- is that the right way to 
have an exception for bin files inside of a zip?

yes

j...@ourdomain.com => block => ~StdBlockExts|:MSOM    <-- adding an :MSOM 
exception, correct syntax?

yes

>j...@ourdomain.com => ~~StdBlockRule|:MSOM  <-- exception to a RULE?  
does that work?

no, the definition where :MSOM should be used is missing

j...@ourdomain.com => ~~StdBlockRule|block => :MSOM would be right

>zip:*@encr.ourdomain.org => good-out => .*|crypt\-zip    

yes

>jspdfsen...@externaldomain.com => ~~StdBlockRule|:JSPDF    <-- does this 
work??

no - see above

> ??  would I need to set a good rule here or soemthing instead?  I'm 
worried that the *@* line, which I didn't have before trying the 
templates, will still be matched for the recipient and still block jspdf

If a "good" rule is defined, the attachment has to match. If a "good" rule 
is not defined, the attachment will be not checked for "good". 

*@* matches every recipient and sender - and will be used, if there is not 
no a more exact match found
*@* => ~~StdBlockRule
will block for all senders and recipients according to the StdBlockRule ( 
if not anything better is found)
remember - the rule found for the recipient and the sender will be 
combined at runtime!!!


if you want a setup for your local domains only, you may use

*@ld1.com|*@ld2.com|*@ld3.com => .....

Thomas






Von:    "K Post" <nntp.p...@gmail.com>
An:     "ASSP development mailing list" <assp-test@lists.sourceforge.net>
Datum:  18.10.2017 17:56
Betreff:        [Assp-test] UserAttach template review request




I'm having an issue with certain very annoying outside vendors sending pdf 
files with javascript in them.  I need to put in exceptions for these 
senders, so I figured now might be a good time to implement templates in 
UserAttach.

I'd apprecite a quick review of my plan to make sure that I've got the 
logic correct.  There's some nuance that I'm not sure I've got right, like 
excepting MSOM from a rule that includes a template that includes exe-\bin

Here's what I am doing now without templates.  
In general, for all users, I want to block, in both directions:
exe\-bin|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|docm|xlsm|pptm

and any of those exetensions with a .zip on the end
and any zip file that contains any of those extensions
and any encrypted zip

This works fine with my current setup.  Individual exceptions are a pain, 
since I need to edit them all any time I make an extension change.  (see 
the john example below). Thomas saves the day with Templates and rules!! 


The current non-template solution involves:
Level 1 as 
exe\-bin|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|docm|xlsm|pptm

Level 2 as 
(exe\-bin|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|docm|xlsm|pptm).zip

everyone is set to Level 2

In UserAttach I have:

# look in zips for these bad files too    
#  bin type removed to allow formatted excel with printer settings 
through    
zip:* => block => 
exe\-bin|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|docm|xlsm|pptm
          
# for al...@ourdomain.org and monitor@, special alert mailboxs, allow any 
type of file through
# also need to put them in noscan config so javascript isn't stripped
al...@ourdomain.org => good => .*
moni...@ourdomain.org => good => .*

# john gets MSOM exception to allow a bunch of annoying vendors to email 
attachments with them
j...@ourdomain.org => block => 
exe\-bin|:MSOM|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|xlsm|(exe\-bin|:MSOM|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|xlsm).zip

# anyone in the encr.ourdomain.org subdomain need to be able to send 
encrypted zips  
# * says anything in a zip, crypt-zip says encrypted okay
zip:*@encr.ourdoamin.org => good-out => .*|crypt\-zip
 

I'm planning to replace the above UserAttach with:
 
# Template for all of our bad extensions
~StdBlockExts => 
exe\-bin|url|ade|adp|asx|bas|bat|dot|dotx|xlt|xlts|bin|chm|cmd|com|cpl|crt|dbx|dll|exe|hlp|hta|htb|inf|ifs|isp|js|jse|lnk|mda|mdb|mde|mdz|mht|msc|msi|msp|mst|nch|pcd|pif|prf|ps1|reg|scf|scr|sct|shb|shs|vb|vbe|vbs|vba|wms|wsc|wsh|rar|dotm|docm|xlsm|pptm

# Rule that blocks bad extensions and zip files with the bad exts inside
~~StdBlockRule => block ~StdBlockExts|(~StdBlockExts).zip

# all users by default have the StdBlockRuleApplied
# this would be overridden by a longer user part of the definition
# longest userpart wins.  NO inheritance
*@* => ~~StdBlockRule

# for all users look inside zips for these bad files too    
# bin type is here removed to allow formatted excel with printer settings 
through which are in bin files inside of zips    
zip:* => block => ~StdBlockExts|--bin    <-- is that the right way to have 
an exception for bin files inside of a zip?

# for al...@ourdomain.org and monitor@, special alert mailboxs, allow any 
type of file through
# also need to put them in noscan config so javascript isn't stripped
al...@ourdomain.org => good => .*
moni...@ourdomain.org => good => .*

# john gets MSOM exception to allow office macros through
j...@ourdomain.com => block => ~StdBlockExts|:MSOM    <-- adding an :MSOM 
exception, correct syntax?

or could I do
j...@ourdomain.com => ~~StdBlockRule|:MSOM  <-- exception to a RULE?  does 
that work?


# our users in the @encr.ourdomain.org subdomain need to be able to send 
encrypted zips  
# * says anything in a zip, 
# special definition crypt-zip says encrypted okay
zip:*@encr.ourdomain.org => good-out => .*|crypt\-zip    

jspdfsen...@externaldomain.com => ~~StdBlockRule|:JSPDF    <-- does this 
work??
 ??  would I need to set a good rule here or soemthing instead?  I'm 
worried that the *@* line, which I didn't have before trying the 
templates, will still be matched for the recipient and still block jspdf
          


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test





DISCLAIMER:
*******************************************************
This email and any files transmitted with it may be confidential, legally 
privileged and protected in law and are intended solely for the use of the 

individual to whom it is addressed.
This email was multiple times scanned for viruses. There should be no 
known virus in this email!
*******************************************************

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to