Bonjour
Got an official E-mail from network solution
which was detected as phishing.Heuristics.Email.SSL-Spoof.
I know I can set the configuration flag Off, but my concern
is more about the Phishing SSL-Spoof detection, either
clamav is code is "wrong" or Network solution is "Wrong"
Unfortunately I can't provide the e-mail contents (mail
was rejected), here are the local logs..
22:52:37 MENID: XXXXXXXXXXXXXX-20785dc642507
+00 Clip: [205.178.190.228]/<mrelay2.networksolutions.com>
+00 M-From: <[EMAIL PROTECTED]>
+00 MRCPT: 250 XXXXXXXXXXXXXXXXXXXXXXX
Address Accepted
+00 E-From: [EMAIL PROTECTED]
+00 Subject: Reset Password Request
+00 Message-Id: [EMAIL PROTECTED]
+00 VIRUS=<Phishing.Heuristics.Email.SSL-Spoof>
+01 Spam-lvl: 0.2
+01 MsgInf: size=5912,n_error=0
+01 RCPT: Rejected XXXXXXXXXXXXXXXXXXXX
Is there somebody else getting the same problem?, will
the spoofing detection code "fixed"? (if it can?)
Thanks...
--
A bientôt
==========================================================================
Jean-Marc Pigeon Internet: [EMAIL PROTECTED]
SAFE Inc. Phone: (514) 493-4280
Fax: (514) 493-1946
Clement, 'a kiss solution' to get rid of SPAM (at last)
Clement' Home base <"http://www.clement.safe.ca">
==========================================================================
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html