Package: p3scan
Version: 2:2.3.2-7
Severity: important

            hy,

if I try to start p3scan it dies:



r...@fw-1:[/etc/p3scan] > /etc/init.d/p3scan start
Starting transparent pop3 virus- and spam-scanner: p3scan.
r...@fw-1:[/etc/p3scan] > *** glibc detected *** /usr/sbin/p3scan: corrupted 
double-linked list: 0x080bf2d0 ***
======= Backtrace: =========
/lib/i686/cmov/libc.so.6[0xb7d3bbe9]
/lib/i686/cmov/libc.so.6[0xb7d3d76d]
/lib/i686/cmov/libc.so.6(__libc_calloc+0xef)[0xb7d3f2cf]
/lib/i686/cmov/libc.so.6(open_memstream+0x5d)[0xb7d3358d]
/lib/i686/cmov/libc.so.6(__vsyslog_chk+0x78)[0xb7dab0c8]
/lib/i686/cmov/libc.so.6(syslog+0x27)[0xb7dab677]
/usr/sbin/p3scan[0x804c74b]
/usr/sbin/p3scan[0x8057f29]
/usr/sbin/p3scan[0x8054a20]
/lib/i686/cmov/libc.so.6(__libc_start_main+0xe5)[0xb7ce2775]
/usr/sbin/p3scan[0x804a421]
======= Memory map: ========
08048000-08078000 r-xp 00000000 09:00 3918033    /usr/sbin/p3scan
08078000-08079000 rw-p 0002f000 09:00 3918033    /usr/sbin/p3scan
08079000-080de000 rw-p 08079000 00:00 0          [heap]
b7b00000-b7b21000 rw-p b7b00000 00:00 0 
b7b21000-b7c00000 ---p b7b21000 00:00 0 
b7c4d000-b7c78000 r-xp 00000000 09:00 6135955    /lib/libgcc_s.so.1
b7c78000-b7c79000 rw-p 0002a000 09:00 6135955    /lib/libgcc_s.so.1
b7c79000-b7c83000 r-xp 00000000 09:00 6135821    
/lib/i686/cmov/libnss_files-2.9.so
b7c83000-b7c84000 r--p 00009000 09:00 6135821    
/lib/i686/cmov/libnss_files-2.9.so
b7c84000-b7c85000 rw-p 0000a000 09:00 6135821    
/lib/i686/cmov/libnss_files-2.9.so
b7c85000-b7c8e000 r-xp 00000000 09:00 6135829    
/lib/i686/cmov/libnss_nis-2.9.so
b7c8e000-b7c8f000 r--p 00008000 09:00 6135829    
/lib/i686/cmov/libnss_nis-2.9.so
b7c8f000-b7c90000 rw-p 00009000 09:00 6135829    
/lib/i686/cmov/libnss_nis-2.9.so
b7c90000-b7ca5000 r-xp 00000000 09:00 6135818    /lib/i686/cmov/libnsl-2.9.so
b7ca5000-b7ca6000 r--p 00014000 09:00 6135818    /lib/i686/cmov/libnsl-2.9.so
b7ca6000-b7ca7000 rw-p 00015000 09:00 6135818    /lib/i686/cmov/libnsl-2.9.so
b7ca7000-b7ca9000 rw-p b7ca7000 00:00 0 
b7ca9000-b7cb0000 r-xp 00000000 09:00 6135822    
/lib/i686/cmov/libnss_compat-2.9.so
b7cb0000-b7cb1000 r--p 00006000 09:00 6135822    
/lib/i686/cmov/libnss_compat-2.9.so
b7cb1000-b7cb2000 rw-p 00007000 09:00 6135822    
/lib/i686/cmov/libnss_compat-2.9.so
b7cb2000-b7cb3000 rw-p b7cb2000 00:00 0 
b7cb3000-b7cc7000 r-xp 00000000 09:00 3941818    /usr/lib/libz.so.1.2.3.3
b7cc7000-b7cc8000 rw-p 00013000 09:00 3941818    /usr/lib/libz.so.1.2.3.3
b7cc8000-b7cca000 r-xp 00000000 09:00 6135843    /lib/i686/cmov/libdl-2.9.so
b7cca000-b7ccb000 r--p 00001000 09:00 6135843    /lib/i686/cmov/libdl-2.9.so
b7ccb000-b7ccc000 rw-p 00002000 09:00 6135843    /lib/i686/cmov/libdl-2.9.so
b7ccc000-b7e26000 r-xp 00000000 09:00 6135838    /lib/i686/cmov/libc-2.9.so
b7e26000-b7e27000 ---p 0015a000 09:00 6135838    /lib/i686/cmov/libc-2.9.so
b7e27000-b7e29000 r--p 0015a000 09:00 6135838    /lib/i686/cmov/libc-2.9.so
b7e29000-b7e2a000 rw-p 0015c000 09:00 6135838    /lib/i686/cmov/libc-2.9.so
b7e2a000-b7e2d000 rw-p b7e2a000 00:00 0 
b7e2d000-b7f67000 r-xp 00000000 09:00 3940667    
/usr/lib/i686/cmov/libcrypto.so.0.9.8
b7f67000-b7f7d000 rw-p 0013a000 09:00 3940667    
/usr/lib/i686/cmov/libcrypto.so.0.9.8
b7f7d000-b7f81000 rw-p b7f7d000 00:00 0 
b7f81000-b7fc3000 r-xp 00000000 09:00 3940666    
/usr/lib/i686/cmov/libssl.so.0.9.8
b7fc3000-b7fc7000 rw-p 00042000 09:00 3940666    
/usr/lib/i686/cmov/libssl.so.0.9.8
b7fc7000-b7ff7000 r-xp 00000000 09:00 3940739    /usr/lib/libpcre.so.3.12.1
b7ff7000-b7ff8000 rw-p 0002f000 09:00 3940739    /usr/lib/libpcre.so.3.12.1
b7ffb000-b7ffd000 rw-p b7ffb000 00:00 0 
b7ffd000-b8019000 r-xp 00000000 09:00 6135968    /lib/ld-2.9.so
b8019000-b801a000 r--p 0001b000 09:00 6135968    /lib/ld-2.9.so
b801a000-b801b000 rw-p 0001c000 09:00 6135968    /lib/ld-2.9.so
bff06000-bff1b000 rw-p bffeb000 00:00 0          [stack]
ffffe000-fffff000 r-xp 00000000 00:00 0          [vdso]


The p3scan.conf is attached


                Ruben


-- 
Ruben Puettmann
ru...@puettmann.net
http://www.puettmann.net
##########################################################################
#                                                                        #
#                         P3Scan Version 2.3.2                           #
#                                                                        #
#                       default configuration file                       #
#                      all params are set to default                     #
#                                                                        #
##########################################################################

#
# PID File
#
#   where to write a pid-file
#
#   default: /var/run/p3scan/p3scan.pid
#
pidfile = /var/run/p3scan/p3scan.pid

#
# Max Child's
#
#   The maximum number of connections we will handle at once. Any further
#   connections will be dropped. Keep in mind that a number of 10 also
#   means that 10 viruscanners can run at once.
#
#   default: 10
#
maxchilds = 10

#
# IP Address
#
#   The IP Address we listen on default: 0.0.0.0 (any address)
#
ip = 127.0.0.1 

#
# Port
#
#   The tcp port on we should listen. If you need a privileged port you
#   need to start p3scan as root (but don't set username to root,
#   that's not necessary, because first after opening the port we will
#   switch to that user).
#
#   default: 8110
#
port = 8110

#
# TargetIP, TargetPort
#
#   targetip and targetport are the ip and port to connect -
#   default is 0.0.0.0 (transparent proxy mode) and 8110 respectively
#
#   default: targetport is ignored in transparent proxy mode
#
# targetip = 0.0.0.0
# targetport = 8110

#
# Useurl
#
#   Parse username for destination url vice using iptables redirection.
#
#   To use this you should have your email clients replace the username
#   in the email client username field with "username#destinationurl:port"
#   and replace the destination url/port with the url/port of p3scan.
#
# Example:
# From:
# username: laitcg                     host: pop.gmail.com             port: 110
# To:
# username: laitcg#pop.gmail.com:110   host: <url of p3scan machine>   port: 
8110
#
# default: <none>
#
# useurl

#
# Email (SMTP) Port
#
#   The port we should listen on to scan outgoing email messages.
#
#   default: 25
#
# emailport = 25

#
# Username
#
#   The username the daemon should run as. Takes no effect when you
#   start as a non-root user.
#
#   default: mail
#
user = p3scan

#
# Notify Directory
#
#   Create notification mails in <DIR>. Also used for temporary storage.
#
#  default: /var/spool/p3scan/notify
notifydir = /var/spool/p3scan/notify

#
# Virus Directory
#
#   The directory in which infected mails will be stored.  It is also
#   used for temporary storing. Ensure that the above specified user is
#   allowed to write into!
#
#   default: /var/spool/p3scan
#
virusdir = /var/spool/p3scan

#
# Just Delete
#
#  Instead of keeping an infected message in the Virus Directory, delete
#  it after reporting it to the user.
#
#  default: Keep infected messages in Virus Directory
#
# justdelete

#
# Extra Notification Recipient
#
#  When an infection message is sent to the client, send a copy of the
#  message to the address(s) specified here, separated by a space.
#
#  NOTE: If there is a file named "p3scan.extra" it will be treated just
#  like p3scan.mail (see "template") and sent to the recipients listed here.
#  For example:
#                 /etc/p3scan/p3scan.mail -> /etc/p3scan/p3scan-en.mail
#                 /etc/p3scan/p3scan.extra -> /etc/p3scan/p3scan-ru.mail
#
#  default: Do not notify anyone else
#
# extra = r...@localhost postmas...@localhost

#
# Extra Notification Recipient mail program
#
#  Use this program to send Extra Notification.
#
#  default: /bin/mail
#
# xmail =

#
# Bytes Free
#
#  The number of KB's there must be free before processing any mail.
#  If there is less than this amount, p3scan will notify the emergency
#  contact address and then terminate itself.
#
#  NOTE: p3scan could need (2 * msgsize) * children disk space free.
#        Being this is dynamic (not all space is needed all the time),
#        you should ensure you have more than enough disk space.
#
#  default: bytesfree = 10000 (10MB)
# Sample: If you want to ensure 100MB are free
# bytesfree = 100000

#
# Emergency Contact
#
#  In the event p3scan encounters a catastrophic problem and has to terminate,
#  it will send an email to these email addresses just before setting up to
#  close down on the next iteration of a child process.
#
#  default: r...@localhost postmas...@localhost
#
# emergcon =

#
# Scanner Type
#
#   Select here which type of scanner you want to use.
#
#   Basic:
#
#     This is the default. The configured executable (set in variable
#     "scanner") will be invoked. You can also specify parameters (we are
#     using /bin/sh).  At the end the path to the mail and a "2>&1" is
#     appended.  The program can tell us if it's a virus returning Scanner
#     Returncode (see below) or exit code 0 means, with all ok, all
#     others are reported to syslog, but mails will be delivered unless
#     justdelete is enabled above. The output is scanned using a regular
#     expression which describes where the virusname can be found
#     (see virusregexp).
#
#     If demime is not set 'path to mail' is the full filename to the
#     rfc822 message, which you MUST NOT DELETE or MODIFY (except if you know
#     how to modify)! If your scanner can not handle rfc822 messages (e.g.
#     McAfee uvscan) set demime and 'path to mail' is a directory which
#     contains all MIME-Parts splitted into separate files. That files are
#     not needed after scanning, so p3scan deletes them.
#
#     You will find a sample-configuration for McAfee's uvscan
#     (http://www.mcafee.com/) in the below sections.
#
#
#   AVPD:
#
#     AVPD is a frontend to 'Kaspersky Anti-Virus for Linux'
#     (http://www.kaspersky.com/) , which provides a daemon named
#     'kavdaemon'. Once the daemon has been started we connect to
#     kavdaemons socket and tell what files to scan.  This gives a rapid
#     speed increase since the virus-definitions and other
#     scanner-initialization has only to be done once! Here a result from
#     a speedtest which I've made: Running kavdaemon, quallcomms qpopper
#     and p3scan on an Intel P1 with 133MHz and 64MB RAM a client using
#     Netscape-Mail was able to fetch 500 mails (including POP3- UIDL-
#     setting) in 62 seconds (each mail sized 2kByte)!
#
#     We just need to know in which directory your kavdaemon writes the
#     socket 'AvpCtl' and file 'AvpPid', default is '/var/run', which is
#     ok using AVP-default installation, leave in that case the below
#     variable scanner commented, otherwise set there the path. Parameter
#     viruscode and virusregexp will not be used.
#
#     Actual versions of avpd can't handle rcf822, so set demime (this is
#     not standard, it's possible that Kaspersky Labs includes rfc822
#     checking in further releases).
#
#     Important note about using kavdaemon:
#
#     Ensure that virusdir (/var/spool/p3scan) is included in AVPs
#     'enabled path list', otherwise the mails will not be scanned, but
#     kavdaemon returns ok (I've found no way to check if the mail has
#     been scanned or not). Mail yourself the eicar.com testvirus (from
#     http://www.eicar.com ) to check it!). The 'enabled path' can be set
#     in /opt/AVP/defUnix.prf in the 'Names' line (add
#     ';*/var/spool/p3scan'). Also check if there is a config file in
#     /root/.AVP/ which has higher precedence (if kavdaemon runs a root,
#     otherwise check that users $HOME/.AVP ).
#     scannertype = avpd
#
#     If you are using version 5, then instead of scannertype = avpd, use
#     scannertype = avpd_new
#
#   TROPHIE:
#
#     Trophie is an OpenSource Anti-Virus Daemon, which uses the
#     virus-scanengine and database from Trend Antivirus. Trophie can be
#     found at http://www.vanja.com/tools/trophie/ . Configuration is very
#     simple, just set scannertype to 'trophie' and it should work. If you
#     don't use trophies standard-config  you have to set scanner to the
#     trophie socket.
#     scannertype = trophie
#
#   FRISK F-Prot Antivirus: http://www.f-prot.com
#
#     Un-comment appropriate options below.
#     Use default scannertype = basic

#scannertype = basic


#
#   Clam Anti-Virus: http://www.clamav.net
#
#     This program must run as the same user as p3scan is running so that
#     it can access the mail files for scanning. Either compile with the
#     options --with-user=mail --with-group=mail (if p3scan is using the
#     the default user/group of "mail") or change "User" in clamav.conf
#     to the user p3scan is running as. If you get a return code other
#     than a 0 or 1, see the clamav documentation for the reason.
#
#     Un-comment "ScanMail" in clamav.conf/clamd.conf as we are scanning mail
#     files so demime does not need to be set below.
#
#     You should start clamd before starting p3scan.
#
#     Un-comment appropriate options below.
#     Use default scannertype = basic
#
#     If using the tcp/ip mode of clamd, then use scannertype = clamd
#     This will allow using the clamav scanner even when it is not running on
#     the same server as p3scan.
#
#   Bash
#
#     This scanner type allows you to do whatever you want with the
#     variables passed to it and can also allow you to call multiple
#     scanners, etc... See p3scan.sh for an example of all the variables.
#     scannertype = bash
#
#  default: basic
#
# scannertype = avpd
# scannertype = avpd_new
# scannertype = bash
# scannertype = basic
scannertype = clamd
# scannertype = trophie

# Virusscanner
#
#   Depends on scannertype. Read the above section of that scannertype
#   you're going to use and you do not need to ask what to fill in here.
#
#   default: depending on scannertype:
#     basic   : <no default>
#     bash:   : /path/to/filename
#     avpd    : /var/run/
#     avpd_new: /var/run/
#     trophie : /var/run/trophie
#     clamd   : tcp/ip connection
#
#
# Sample: scannertype basic using McAfee UVSCAN:
# scanner = /usr/local/uvscan/uvscan
# Sample: scannertype basic using FRISK F-Prot Antivirus:
# scanner = /usr/local/bin/f-prot -archive=5 -ai
# Sample: scannertype basic using ClamAV:
# scanner = /usr/bin/clamdscan --no-summary
# Sample: scannertype clamd using ClamAV in TCPSocket mode:
# scanner = 127.0.0.1:3310
# Sample: scannertype bash using p3scan.sh for testing:
# scanner = /usr/local/sbin/p3scan.sh
#scanner = /usr/bin/clamdscan --no-summary


#
# Scanner Returncode
#
#   Specify the returncode(s) which the scanner returns when the mail is
#   infected. P3Scan does its part (sending the notification and not the
#   infected mail) only when it gets the specified returncode(s).
#   A returncode value of 0 from the scanner is assumed to mean that the
#   message is clean. Any other unspecified value will add warning lines
#   to your logfiles but THE MESSAGE WILL BE DELIVERED!
#
#   Only used from scannertype 'basic'.
#
#   default: 1
#
# Sample: scannertype basic using McAfee UVSCAN:
# viruscode = 13
# Sample: scannertype basic using FRISK F-Prot Antivirus:
# viruscode = 3,8

#
# Good Scanner return codes
#
#   Some scanners can report more than good or infected. Place valid return
#   codes here that will enable the message to be delivered without a
#   warning. For example, Kaspersky Anti-Virus reports code 10 for an
#   encrypted .zip file.
#
#   default: none
#   Sample: goodcode = 10
#   goodcode =

#
# Regular Expression for Virusname
#
#   Specify here a regular expression which describes where the name of the
#   virus can be found. If not specified, the first substring is used;
#   specify it appending '/' and the substring number (1-9) at the end.
#   PerlCompatibleRegularExpressions are used, case sensitive and the
#   ungreedy option. Only used by scannertype 'basic'.
#
#   default: <none>
#
# Sample: McAfee UVSCAN
# virusregexp = ^[[:space:]]*Found( 
the|:)[[:space:]]*(.*)[[:space:]]*(|virus[^a-z.]*)$/2
# Sample: FRISK F-Prot Antivirus
# virusregexp = (?=Infection\:)[[:space:]]*(.*)$
# Sample: ClamAV
#virusregexp = .*: (.*) FOUND

#
# deMIME Setting
#
#   Uncomment this if we should parse all MIME-sections instead of passing
#   the message as-is to the scanner. This is used for viruscanners that cannot
#   natively handle email attachments.
#
#   default: <no demime>
#demime

#
# Broken email clients
#
#   Some email clients may require special processing. If this
#   option is enabled the client will receive whole lines (vice
#   single characters) while processing a large email message.
#
#   The reason for leaving two types of large email processing
#   is that when this option is disabled, the possibility exists
#   that the client will not see any "X-P3Scan: Due to an
#   extremely large attachment you see this message line." in
#   the received message header.
#
#   Note: As of the introduction of this parameter, only some
#   instances of the use of the Outlook/Outlook Express clients
#   warrent enabling of this feature.
#
#   default: send characters during large message processing.
# broken

#
# Timeout
#
#   Change the default timeout for sending characters/lines to the
#   client while processing a message.
#
#   default: 30 seconds
timeout = 30

#
# ISP Spam
#
#   This option allows you to set the string your ISP uses if
#   it processes your email for SPAM. If this string is found
#   in the subject line of the incoming message, it will not
#   perform any spam processing so that the message gets to
#   the client faster.
#
#   default: <none>
# Sample for cox.net:
# ispspam = -- Spam --
#
# ispspam =

# Enable Spam checking
#
#  If set, will scan for Spam before scanning for a virus.
#
#  P3scan has been tested with both dspam-3.0.0-rc2 and
#  Mail::SpamAssassin v2.6.
#
#  The DSPAM implementation uses the virtual-users capability
#  of the mysql backend to dspam. Mysql is the recommended
#  interface due to speed and stability (and in our case, the
#  virtual-users interface).
#
#  P3scan and SpamAssassin uses the interface spamd/spamc.
#  You should start spamd before running p3scan. For example:
#  "spamd -L -d" (run in local mode only, daemonize)
#  man spamd for more information.
#
#  default: no checking of spam
# checkspam

#
# Mail::SpamAssassin
#
#  Where to find spamc, the link to the Mail::SpamAssassin daemon spamd.
#
# spamcheck = /usr/bin/spamc

#
# DSPAM
#
#  This line gives SpamAssassin like functionality to dspam. All
#  users mail is scanned against a single database of "mail".
#spamcheck = /usr/bin/dspam --user mail --mode=teft --stdout 
--deliver=innocent,spam --feature=ch,no,wh
#
#  This line enables each virtual user to have their own database
#  of message traffic 'tokens' and is much more accurate than the
#  procedure above after training. The user 'dspamuser' will be
#  replaced by the actual user calling p3scan.
#spamcheck = /usr/bin/dspam --user dspamuser --mode=teft --stdout 
--deliver=innocent,spam --feature=ch,no,wh
#
#  Of course change the options in the above lines to your preferences.

#
# Rename Attachments
#
#  If renattach is installed and this option is un-commented, we
#  will execute renattach to rename dangerous attachments.
#  (See README for more information)
#
#  default: none
#
#renattach = /usr/bin/renattach

#
# Overwrite (disable) HTML
#
#  If a person views an HTML message, not only can the client
#  download pictures automatically, it enables someone viewing
#  the remote log file to confirm the email address is valid,
#  making it "worth" keeping/selling, etc...
#
#  p3scan comes with a separate program p3pmail that can be
#  installed for this purpose.
#
#  default: do not disable HTML
#
# overwrite = /usr/bin/p3pmail

#
# Quiet
#
#   Disable reporting of normal operating messages. Only report errors
#   or critical information.
#
# default: display all less debug info
#
# quiet

#
# Template
#
#   Where to look for an email-template when our own mail has to be send
#   instead of an infected mail. That file has to be exist, otherwise
#   p3scan will send an RFC unconform -ERR and closes the connections.
#   The email-template should start after the header with the content-type, and
#   so on. Also the leading dot is necessary (just a dot and return, no more in
#   the last line). You can use some key- words which will be replaced
#   when sending, e.g. %MAILDATE%. See the existing p3scan-en.mail for examples
#   of keywords.
#
#   p3scan.mail is normally a sym-link to your default language email template.
#   You can of course just put the actual name of your template here.
#
#   default: /etc/p3scan/p3scan.mail
#
# template = /etc/p3scan/p3scan.mail

#
# Alternate virus notification email
#
#   In the event you wish to modify the virus notification email on the
#   fly, as in using the bash scanner, uncomment this to allow a copy of the
#   p3scan.mail virus template to be placed in:
#   $virusdir/<pid>/vnmsg or /var/spool/p3scan/children/<pid>/vnmsg
#
# default: use template defined in template= w/out modification.
#
# altvnmsg

#
# Subject
#
#   This option can be used to change the default subject line when reporting
#   a virus infected message. In the default below, everything between the 
quotes
#   can be changed and are not part of the actual default subject line and
#   <virus name> will be replaced by the actual name of the detected virus.
#
#   default: Subject: "[Virus] found in a mail to you:" <virus name>
#
# subject =

#
# Notify
#
#   This option can be used to change the default file deleted notification that
#   is displayed in the virus notification message when the "justdelete" option
#   is used.
#
# default: Per instruction, the message has been deleted.
#
# notify =

#
# SMTP Reject
#
#   This option can be used to change the default SMTP Reject message that is 
sent
#   to the client in the event a message is rejected due to a virus.
#   The error message will have a prefix of "554".
#
# default: Virus detected! P3scan rejected message!
#
# smtprset =

#
# Check SMTP size
#
#   This option can be used to set the maximum message size (in KBytes) that
#   p3scan will use to determine if it should scan an smtp submission. If a
#   message is greater than this size, it will not be scanned to help alleviate
#   smtp timeouts.
#
# default: none
#
# checksize =

#
# SSL/POP3S messages
#
#   Check for SSL/POP3S protocol on a different port.
#
# default: 995
#
# sslport =

#
# Insert SMTP message virus scanner information.
#
#   This option is used to add the virus definition info from your scanner
#   to an smtp message. It will only be added as a footer if the message
#   is not signed cryptographically and is only a text message.
# 
#   It is used in conjunction with the file /etc/p3scan/p3scan.footer in the
#   following fashion:
#
#   /etc/p3scan/p3scan.footer:
#
#   1) If file does not exist and "footer" is defined:
#      No footer information will added to outgoing messages, but the p3scan
#      version and scanner info will be added to the header.
#
#   2) If file exists but blank and "footer" is defined:
#      P3Scan version/host info and scanner info will be added to end of
#      message and header.
#
#   3) If file contains information and "footer" is defined:
#      All lines of this file will be added to the end of the smtp message and
#      then p3scan version/host info and scanner info will be appended.
#
#   4) If file does not exist and "footer" is not defined:
#      P3Scan will only insert p3scan version info into the header.
#
# Sample: FRISK F-Prot Antivirus:
# footer = /usr/local/bin/f-prot -verno
# Sample: ClamAV:
# footer = /usr/bin/clamdscan -V

#
# TOP command processing
#
#   This command may cause p3scan to hang when the client does not
#   disconnect after using the TOP command. It is now disabled by
#   default. If it was working for you in the past, then go ahead
#   and enable it below.
#
#   NOTE: This command will be removed in the future as it is only
#         a work-around until the problem can be resolved.
#
# enabletop

# END of configuration

Attachment: signature.asc
Description: Digital signature

Reply via email to