diff --git a/evomalware.sh b/evomalware.sh index 732acaf..7e1f12d 100644 --- a/evomalware.sh +++ b/evomalware.sh @@ -8,6 +8,7 @@ wwwpath=/home # URL to download patterns and filenames. databaseURL="http://antispam00.evolix.org/evomalware" databasePATH=/var/lib/evomalware +whitelistLocal="${databasePATH}/evomalware.whitelist.local" # Tools. find="ionice -c3 find -O3" grep="nice -n 19 grep" @@ -39,6 +40,7 @@ fi mkdir -p $databasePATH mkdir -p $tmpPATH cd $tmpPATH +[ -f $whitelistLocal ] || touch $whitelistLocal for file in evomalware.filenames evomalware.patterns evomalware.whitelist evomalware.suspect; do $wget ${databaseURL}/${file} $wget ${databaseURL}/${file}.md5 @@ -51,7 +53,7 @@ for file in evomalware.filenames evomalware.patterns evomalware.whitelist evomal done filenames=$(cat ${databasePATH}/evomalware.filenames | tr -d '\n') patterns=$(cat ${databasePATH}/evomalware.patterns | tr -d '\n') -whitelist=$(cat ${databasePATH}/evomalware.whitelist | tr -d '\n') +whitelist=$(cat ${databasePATH}/evomalware.whitelist $whitelistLocal | tr -d '\n') suspect=$(cat ${databasePATH}/evomalware.suspect | tr -d '\n') # Search for .php files (less than 1M).