your.local.ndb file:
        "signame.1:4:*:" . bin2hex("http://bad.domain.com/path";) . "\n";
        "signame.2:5:*:" . bin2hex("http://bad.domain.com/path";) . "\n";

On Mar 30, 2015, at 2:34 PM, Dave McMurtrie <[email protected]> wrote:

> Hi,
> 
> Hopefully someone here can steer me in the right direction.  I'm looking for 
> a simple way to be able to create a local signature such that when we become 
> aware of a phishing message targeting our users that contains a malicious 
> URL, I can quickly respond by configuring ClamAV to identify them so we can 
> block them.
> 
> After reading the phishsigs_howto, it looks like adding entries to a 
> local.gdb file would accomplish what I want, but thus far that isn't working 
> for me.  I'm fairly certain that I have the format correct because clamdscan 
> is properly detecting messages with URLs that I put in my local.gdb file.  
> However, clamd is not detecting the URLs when our milter code connects to the 
> clamd socket.  The difference seems to be whether it's in the context of 
> scanning a file or a mail message, since debug output shows me that it's 
> taking a different code path.  I posted to the list earlier with more 
> specific questions about this, but never did track it down.
> 
> My questions:
> 
> 1) Is the local.gdb file even intended for this purpose?
> 
> 2) Is there a better way to accomplish this?
> 
> Thanks!
> 
> Dave
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
> 
> http://www.clamav.net/contact.html#ml

_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to