On 5 Sep 2011, at 15:18, Matus UHLAR - fantomas wrote:
> Hello,
>
> I'm trying to distinguish between phishing and other signatures on a mail
> server - phishing reports should be passed to our abuse@ account, but not
> elsewhere.
>
> Therefore, it's not possible to play with options to disable phishing
> signatures detection ClamAV or use multiple clamav daemons - I just need to
> distinguish them from viruses and possibly other unwanted content.
>
> Do you have an idea how should I detect if a mail is a phish, or any other
> content (which?) that should our abuse@ teram know about?
You can use an ACL to set a message variable, which will probably use something
vaguely like this untested
warn
malware = *
set acl_m_phish = true
condition = eq{${substr{0}{15}{$malware_name}}{Email.Phishing.}
Then, in your subsequent ACLs, you can exempt this email from rejection (or to
use, control=fakereject). And in your routers, you can test $acl_m_phish to get
the email delivered to the right place.
An alternative approach is to use control=freeze - then you have manual control
over what to do with the message.
Oh, and I would consider directing the email to a different email address, so
that your abuse team can distinguish the mail from stuff that really was
addressed to abuse@. And, add a header so that they can see who the original
recipients were.
> I currently exempt ^HTML., ^Email. and .Phishing from being rejected.
>
--
Ian Eiloart
Postmaster, University of Sussex
+44 (0) 1273 87-3148
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml