Mark Martinec wrote:
> Perhaps m...@customer.tld has bypass_virus_checks while o...@mailbox.tld
> does not? Elevated log level would tell. (but see further on)

No, that's what we immediately verified - as it's the most obvious
explaination.

> Having qr'^MAIL$' in @keep_decoded_original_maps seems reasonable
> to me too. If the 'Phishing.Heuristics.Email.SpoofedDomain' test
> in ClamAV checks a mail header section, the absence of qr'^MAIL$'
> would explain what you are seing.
> 
>> But as run_av does not even be called for the decoded MIME parts
>> that's probably not the issue here.
> 
> What is your log level? The "run_av (ClamAV-clamd): ..." log entry
> is reported at log level 2 when infected, but at log level 3 when clean.

That's it! Log level is 2 - and as I didn't know this detail the
posted log lines confused me. qr'^MAIL$' would have been the solution
if the log line has been there - but is wasn't. But with this infor-
mation the whole thing changes, it IS the solution.

Thank you very much Mark! Thank you for your immediate and precise
reply - and for all the great work you're doing for this project!
Can't wait to drink some beer with you in Berlin ;-)

Cheers,
Thomas


------------------------------------------------------------------------------
Crystal Reports - New Free Runtime and 30 Day Trial
Check out the new simplified licensing option that enables unlimited
royalty-free distribution of the report engine for externally facing 
server and web deployment.
http://p.sf.net/sfu/businessobjects
_______________________________________________
AMaViS-user mailing list
AMaViS-user@lists.sourceforge.net 
https://lists.sourceforge.net/lists/listinfo/amavis-user 
 AMaViS-FAQ:http://www.amavis.org/amavis-faq.php3 
 AMaViS-HowTos:http://www.amavis.org/howto/ 

Reply via email to