I just received a report from a customer about a legitimate Amazon.ca order confirmation that tripped the Phishing.Heuristics.Email.SpoofedDomain code in Clamav (0.95.3 from Debian lenny volatile).

I'm not sure what this heuristic test looks for, but after inspecting the message source I'm pretty sure it triggered on amazon.ca in a URL associated with an image retrieved from amazon.com.

I don't want to just add Amazon's sender address and name to the customer's whitelist due to the spoof emails floating around. I'm contacting him to see if I can release the message for analysis.

Are there any finer-grained controls on how this test works other than PhishingScanURLs?

Any suggestions on how to allow Amazon.ca order email through without blowing big holes in our filtering?

-kgd
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to