Fermin wrote (2021-05-10):
Noob question, probably - how do others deal with mail
arricing in the "inbound-nonsecure" folder? Just copy them manually into the normal inbound to be processed? Have there been malicious attacks
with manipulated .pkt files that would warrant such a distinction between normal and non-secure inbound mail?
Have a look in the example binkd.cfg:
#
# Run an external program.
# The "*S" macro in command line substed with S.R.I.F., see !SRIF.TXT
# The "!" before program pathname means immediate program execution
# after receiving the file.
# *** win32 only:
# The "@" before program pathname means execute program in separate console
# The "@@" before program pathname means execute program in hidden console
# ***
# Macros: *F - complete name of received file,
# *A0..*A9 - first 10 AKA of remote system,
# *A*, *A@ - list of all remote AKA separated by spaces
# *P - password protected [0|1],
# *L - listed system [0|1]
# *H - remote hostname or IP,
# *N - short file name (win32 only).
#
something like:
exec "mv *F /ftn/inbound/secure" /ftn/inbound/non-secure/*.[pP][kK][tT]
(on unix)
---
* Origin: . (2:280/464.47)