-----Original Message-----
From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Darin Cox
Sent: Sunday, May 29, 2005
4:43 PM
To: [email protected]
Subject: Re: [Declude.Virus]
EXITSCANONVIRUS
Sounds good to me. I tend to think of both virus
and spam detection in the same breath, since I think they're stronger together
than separate... but you certainly have a valid point about moving code to
Junkmail...and it would seem more useful there as well.
I haven't seen the false positives you've seen with
the Outlook Boundary Space Gap vulnerability, but it may be due to a variation
in customer base. I'll check the logs and let you know what we've seen
over a similar timeframe.
Happy Memorial Day weekend! Don't forget to
spend some time with the fam.
----- Original Message -----
Sent: Sunday, May 29,
2005 5:35 PM
Subject: Re:
[Declude.Virus] EXITSCANONVIRUS
Darin,
My list was really only in respect to my feelings on Declude Virus and not
JunkMail. In this perspective of both however, maybe a modification where
#2 includes the potential of adding it as a test to JunkMail if it would be
beneficial, and a clarification on #3 like so:
1) Active Vulnerabilities
- Default to ON, and patch known exceptions that could be triggered by standard
E-mail clients. I would expect that such things would stay in this
category for at least a year following a patch being released for the affected
E-mail clients.
2) Inactive Vulnerabilities -
Default to OFF, don't necessarily patch issues when found (judgment
call). Add code to Declude JunkMail if useful for blocking spam.
I would expect that this category would include things that were between 1 and
3 years following a patch being issued for the affected E-mail clients.
3) Removal - Remove the code from
the Declude
Virus part of the executable. Depending on the
conditions related to the vulnerability; i.e. commonality in exploit, potential
for false positives, seriousness of flaw, etc., it would be prudent to remove
the code that detects such things after 2 or more years. Note that some
of these vulnerabilities have never been actively exploited by viruses.
Being conservative about leaving the code in for long periods I think is fine
because they would give people peace of mind and choice, but there is always
going to be a legitimate extent to which being conservative about things reach.
I think this reflects what you have said, and in
essence this is what I was indicating in the paragraph that followed.
I would definitely like to see the Outlook CR Vulnerability added to Declude
JunkMail as a scoreable test since it does hit on a good deal of spam, but I
won't use it in Declude Virus since I can only chose to block or pass and it
has daily issues with false positives for my customer base.
Other present vulnerabilities might not justify keeping the code however.
The Outlook Boundary Space Gap vulnerability trapped a total of 8 messages that
weren't otherwise detected as viruses on my system in a two week period of
time, covering over 1 million scanned messages. Of these 8 messages, all
8 were legitimate personal E-mails generated by Microsoft's own E-mail
clients. I think we could agree that if this is the long-term trend, this
code would be best removed or fixed instead of being added to JunkMail.
Alternatively, if this is still a threat with this one vulnerability (I don't
know), then the detection should be fixed. The false positives were all
the result of an error in Declude where the following header was properly
'folded', but Declude seemingly experienced an error in de-folding the headers
which led it to believe that there were spaces within the boundary. The 4
spaces at the beginning of the second line in this case is part of proper
header folding
Content-Type: multipart/alternative; boundary=
"----_=_NextPart_001_01C55D5F.F2B051DD"
This vulnerability is designed to detect spaces or
tabs within message boundaries, and apparently could be exploited to package
attachments which Outlook clients would read. The above example is not an
example of exploitable code.
RFC 2912 - http://www.faqs.org/rfcs/rfc2912.html
3.1 Whitespace and folding long headers
In some circumstances, media feature expressions can be very long.
According to "A Syntax for Describing Media Feature Sets" [1],
whitespace is allowed between lexical elements of a media feature
_expression_. Further, RFC822/MIME [4,5] allows folding of long
headers at points where whitespace appears to avoid line length
restrictions.
Therefore, it is recommended that whitespace is included as
permitted, especially in long media feature expressions, to
facilitate the folding of headers by agents that do not otherwise
understand the syntax of this field.
For this to have been the vulnerability, the
whitespace would have needed to have been within the quotes that defined the
boundary and not before it.
Matt
Darin Cox wrote:
I think most of us always consider the "greater
good" before making requests... and by their nature, most requests from
one person have benefit to many others.
I think the recommendation you outlined below is
fairly good...but again, I would not like to see potentially valuable tests
removed. Defaulting to off is good, but removing doesn't make sense when
there's value in the test. Other than an occasional Partial
vulnerability, I see no false positives with vulnerabilities from our user
base.
I do think your point about moving the code from
Virus over to Junkmail is a good one when it is no longer an
active vulnerability. I would just hate to see a valuable test
removed, and again, we see a decent amount of spam caught by Virus that doesn't
get caught by our Junkmail config.
Code can easily be broken in moving from one place to
another (Virus to Junkmail), so this may be a maintenance problem that it is
desirable to avoid. However, deprecated vulnerabilities could
potentially be more valuable there for use in weighting or combo tests to
identify particular spammers and assist with detecting their payloads.
I think this all falls under the "The more info
we have about a message, the better we can classify it"
category. Indeed, one of the main reasons we haven't migrated to
SmarterMail is the unavailability of the CMDSPACE test. We find much of
the strength in Declude is due to the variety of special tests Scott was
able to come up with.
So, with the caveat of not performing Item 3 in your
list (Removal), it sounds very good to me.
It's nowhere near #1 on my list either...just didn't
want anything useful to disappear.
----- Original Message -----
Sent: Sunday, May 29,
2005 4:22 PM
Subject: Re:
[Declude.Virus] EXITSCANONVIRUS
Darin,
I think there are many different ways to define "retire" in this
context.
Personally, I have already 'retired' the functionality on my system where I
feel that it appropriate, but when I share my opinions and recommendations, I
am often thinking of the greater good. I tend to not ask for things from
Declude that would not also be of benefit to a good number of it's users.
While having the switch alone might be good enough for the majority of us on
these lists, the majority of Declude's customers don't pay attention to the lists,
release notes, or many other things...they tend to run default configurations
with very little in the way of tweaks. These people are most in need of a
solution, though they probably mostly don't recognize the issue, and likewise
wouldn't recognize the solution. By Declude providing this functionality
and not working it into the overall approach for the best standard config and
practices, it really only serves the few of us that are paying very close
attention.
So in this perspective, the best global approach in my opinion would be to
establish a system for depricating such functionality. I would suggest
the following:
1) Active Vulnerabilities
- Default to ON, and patch known exceptions that could be triggered by standard
E-mail clients. I would expect that such things would stay in this
category for at least a year following a patch being released for the affected
E-mail clients.
2) Inactive Vulnerabilities -
Default to OFF, don't necessarily patch issues when found (judgment
call). I would expect that this category would include things that were
between 1 and 3 years following a patch being issued for the affected E-mail
clients.
3) Removal - Remove the code from
the executable. Depending on the conditions related to the vulnerability;
i.e. commonality in exploit, potential for false positives, seriousness of
flaw, etc., it would be prudent to remove the code that detects such things
after 2 or more years. Note that some of these vulnerabilities have never
been actively exploited by viruses. Being conservative about leaving the
code in for long periods I think is fine because they would give people peace
of mind and choice, but there is always going to be a legitimate extent to
which being conservative about things reach.
Regarding their use in blocking some spam, I
personally would rather Declude JunkMail tag such things, that way we could
handle this as spam, as well as the potential false positives, within the
systems that we have built to handle spam instead of the one built to handle viruses.
Active Vulnerabilities are a different story, but I wouldn't object to seeing
code added to BADHEADERS/SPAMHEADERS or another built-in test to show that
something failed a depricated check within the context of Declude
JunkMail. Some of these vulnerabilities are presently less than 90%
accurate on my system in judging between spam and ham, though the viruses
associated with them might well be deleted if they do exist and were detected
by one of my scanners (I've based this on a review of the spam folder and I
delete viruses on my system). The Outlook CR Vulnerability blocks the
most spam, but it also has the highest number of false positives by far.
Web mail generated messages from Comcast, Excite, 126.com/263.com (Chinese
equivalent of Hotmail) will all fail Outlook CR in Declude.
Does that sound reasonable? Would it provide for all of what you desire
in this respect? I do get that the folks at Declude do read this stuff
and they seem to be embracing our logic and popular opinion on the lists lately,
so I would guess that what you think does count for something. Personally
this isn't by far my #1 issue since I have already solved it with other new
functionality, but I think the process is just as if not more important as the
functionality to the product and the customer base as a whole.
Matt
--
=====================================================
MailPure custom filters for Declude JunkMail Pro.
http://www.mailpure.com/software/
=====================================================