Thomas Harold wrote:
On 12/3/2009 10:32 PM, Dennis Peterson wrote:

I quoted viruses above because much of what is found is actually
blacklisted URL's, scams, spam, etc. Very few true viruses show up anymore.


That seems to be true if you're doing DNSBLs that block the dynamic address ranges. I see a steady trickle of true viruses (well, trojans) constantly hitting ClamAV. But when you look closely at the host names, I'd bet that nearly all of them would be blocked by some sort of dynamic DNSBL.

True - and it's cheaper than scanning for viruses, in terms of system usage. I've focused on defeating the bastids before scanning with scanning as a last resort. Any sources of viruses get added to my DNSBL or URLBL bind tables.


(We're not currently using a DNSBL at SMTP time.)

It would probably be a lot worse for us, except that we don't accept hostnames that aren't valid, aren't FQDNs, and don't resolve back to a DNS A or MX record. Out of all of our SMTP time rejects, the FQDN check is responsible for over half. There's a lot of bots out there that just use a 6-10 random letter host identifier that can't get past the FQDN test.

Ditto here, too. I'm just handling mail for my home and a small hosting and mail list business I run now but you'd think I was defending fortress Earth with all the blocking tools that are in place.

dp
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to