|
Oh man...I feel your pain! Happened
to us mid-April. Fortunately it was just after midnight on a Friday,
so we had everything back up before morning and no one noticed the interruption
in service.
Was it Windows mirroring or hardware
level?
Darin. ----- Original Message -----
From: John Tolmachoff (Lists)
Sent: Monday, May 30, 2005 3:30 AM
Subject: RE: [Declude.Virus] EXITSCANONVIRUS Off the topic, but it interrupted my work on my mail server.
Any one ever loose both mirrored OS drives at the same time?
FUN FUN FUN
NOT!
At least Ghost is able to read the master.
John T eServices For You
-----Original
Message-----
Thanks! The grass is cut and the friends are
already on the way over with beer and stuff to burn
:) Sounds good to me. I tend to think of both virus and spam detection in the same breath, since I think they're stronger together than separate... but you certainly have a valid point about moving code to Junkmail...and it would seem more useful there as well.
I haven't seen the false positives you've seen with the Outlook Boundary Space Gap vulnerability, but it may be due to a variation in customer base. I'll check the logs and let you know what we've seen over a similar timeframe.
Happy Memorial Day weekend! Don't forget to spend some time with the fam.
----- Original Message ----- From: Matt Sent: Sunday, May 29, 2005 5:35 PM Subject: Re: [Declude.Virus] EXITSCANONVIRUS
Darin, 1) Active
Vulnerabilities - Default to ON, and patch known exceptions
that could be triggered by standard E-mail clients. I would expect that
such things would stay in this category for at least a year following a patch
being released for the affected E-mail clients. I think this reflects what you have said, and in essence
this is what I was indicating in the paragraph that followed. Content-Type: multipart/alternative;
boundary= This vulnerability is designed to detect spaces or tabs within message boundaries, and apparently could be exploited to package attachments which Outlook clients would read. The above example is not an example of exploitable code. RFC 2912 - http://www.faqs.org/rfcs/rfc2912.html 3.1 Whitespace and folding long headers In some circumstances, media feature expressions can be very long. According to "A Syntax for Describing Media Feature Sets" [1], whitespace is allowed between lexical elements of a media feature _expression_. Further, RFC822/MIME [4,5] allows folding of long headers at points where whitespace appears to avoid line length restrictions. Therefore, it is recommended that whitespace is included as permitted, especially in long media feature expressions, to facilitate the folding of headers by agents that do not otherwise understand the syntax of this field.
For this to have been the vulnerability, the whitespace
would have needed to have been within the quotes that defined the boundary and
not before it. Hi Matt,
I think most of us always consider the "greater good" before making requests... and by their nature, most requests from one person have benefit to many others.
I think the recommendation you outlined below is fairly good...but again, I would not like to see potentially valuable tests removed. Defaulting to off is good, but removing doesn't make sense when there's value in the test. Other than an occasional Partial vulnerability, I see no false positives with vulnerabilities from our user base.
I do think your point about moving the code from Virus over to Junkmail is a good one when it is no longer an active vulnerability. I would just hate to see a valuable test removed, and again, we see a decent amount of spam caught by Virus that doesn't get caught by our Junkmail config.
Code can easily be broken in moving from one place to another (Virus to Junkmail), so this may be a maintenance problem that it is desirable to avoid. However, deprecated vulnerabilities could potentially be more valuable there for use in weighting or combo tests to identify particular spammers and assist with detecting their payloads.
I think this all falls under the "The more info we have about a message, the better we can classify it" category. Indeed, one of the main reasons we haven't migrated to SmarterMail is the unavailability of the CMDSPACE test. We find much of the strength in Declude is due to the variety of special tests Scott was able to come up with.
So, with the caveat of not performing Item 3 in your list (Removal), it sounds very good to me.
It's nowhere near #1 on my list either...just didn't want anything useful to disappear.
----- Original Message ----- From: Matt Sent: Sunday, May 29, 2005 4:22 PM Subject: Re: [Declude.Virus] EXITSCANONVIRUS
Darin, 1) Active
Vulnerabilities - Default to ON, and patch known exceptions
that could be triggered by standard E-mail clients. I would expect that
such things would stay in this category for at least a year following a patch
being released for the affected E-mail clients. Regarding their use in blocking some spam, I personally
would rather Declude JunkMail tag such things, that way we could handle this as
spam, as well as the potential false positives, within the systems that we have
built to handle spam instead of the one built to handle viruses. Active
Vulnerabilities are a different story, but I wouldn't object to seeing code
added to BADHEADERS/SPAMHEADERS or another built-in test to show that something
failed a depricated check within the context of Declude JunkMail. Some of
these vulnerabilities are presently less than 90% accurate on my system in
judging between spam and ham, though the viruses associated with them might well
be deleted if they do exist and were detected by one of my scanners (I've based
this on a review of the spam folder and I delete viruses on my system).
The Outlook CR Vulnerability blocks the most spam, but it also has the highest
number of false positives by far. Web mail generated messages from
Comcast, Excite, 126.com/263.com (Chinese equivalent of Hotmail) will all fail
Outlook CR in Declude.
-- =====================================================MailPure custom filters for Declude JunkMail Pro.http://www.mailpure.com/software/=====================================================
-- =====================================================MailPure custom filters for Declude JunkMail Pro.http://www.mailpure.com/software/===================================================== |
- Re: [Declude.Virus] EXITSC... Darin Cox
- Re: [Declude.Virus] EXITSCANONVIRUS Scott Fisher
- RE: [Declude.Virus] EXITSCANONVIRUS Colbeck, Andrew
- Re: [Declude.Virus] EXITSCANONVIRUS Darin Cox
- Re: [Declude.Virus] EXITSCANONVIRUS Matt
- Re: [Declude.Virus] EXITSCANONVIRUS Matt
- Re: [Declude.Virus] EXITSCANONVIRUS Darin Cox
- Re: [Declude.Virus] EXITSCANONVIRUS Matt
- RE: [Declude.Virus] EXITSCANONV... John Tolmachoff \(Lists\)
- RE: [Declude.Virus] EXITSC... Darin Cox
- RE: [Declude.Virus] EX... John Tolmachoff \(Lists\)
- RE: [Declude.Virus] EX... Markus Gufler
- RE: [Declude.Virus] EXITSC... Marc Catuogno
- Re: [Declude.Virus] EX... Jim Matuska
- RE: [Declude.Virus] EXITSCANONVIRUS John Tolmachoff \(Lists\)
- RE: [Declude.Virus] EXITSCANONVIRUS Colbeck, Andrew
- RE: [Declude.Virus] EXITSCANONVIRUS Andy Schmidt
- RE: [Declude.Virus] EXITSCANONVIRUS John Tolmachoff \(Lists\)
