Subj : Incoming Netmail from non defined nodes landing in "inbound-nonsecure" To : Fermin Sanchez From : Oli Date : Mon May 10 2021 12:37 pm Fermin wrote (2021-05-10): FS> Noob question, probably - how do others deal with mail FS> arricing in the "inbound-nonsecure" folder? Just copy them manually into FS> the normal inbound to be processed? Have there been malicious attacks FS> with manipulated .pkt files that would warrant such a distinction between FS> normal and non-secure inbound mail? Have a look in the example binkd.cfg: # # Run an external program. # The "*S" macro in command line substed with S.R.I.F., see !SRIF.TXT # The "!" before program pathname means immediate program execution # after receiving the file. # *** win32 only: # The "@" before program pathname means execute program in separate console # The "@@" before program pathname means execute program in hidden console # *** # Macros: *F - complete name of received file, # *A0..*A9 - first 10 AKA of remote system, # *A*, *A@ - list of all remote AKA separated by spaces # *P - password protected [0|1], # *L - listed system [0|1] # *H - remote hostname or IP, # *N - short file name (win32 only). # something like: exec "mv *F /ftn/inbound/secure" /ftn/inbound/non-secure/*.[pP][kK][tT] (on unix) --- * Origin: . (2:280/464.47) .