Maybe OT - but its a decent interim fix so people can continue sending
large(r) Zips.
SO - not sure if this is OT or what, but if you use procmail as the
delivery agent on your system, this rule below will catch the ZIPs under
250k in size and having 'password:' somewhere in the body.
Not
At 09:22 PM 3/2/04 +0100, Tomasz Papszun wrote:
On Tue, 02 Mar 2004 at 11:18:25 -0700, Support ePaxsys/FRWS wrote:
Maybe OT - but its a decent interim fix so people can continue sending
large(r) Zips.
SO - not sure if this is OT or what, but if you use procmail as the
delivery agent on your
What is the Worm.YoursID virus/worm?
This is one virus/worm that has become active since last night. Any clue
what it may be? Google searches, archived list searches and searches
anywhere I can think of failed to find any record of the name. Is it just
hitting this one instead of maybe Klez or
Greetings folks!
Been reading my clam-update.log (since previous posts raised my curiousity)
and noticed:
SECURITY WARNING: NO SUPPORT FOR DIGITAL SIGNATURES
A quick run through the docs, and a couple grep's on the source tree show
nothing I should look for with the build. The ./configure
At 06:39 PM 9/19/03 -0400, Rick Macdougall wrote:
Hi,
Thomas Lamy wrote:
when was the db updated for Worm.Gibe.F? I had it slip through 2
independant servers, one of them updates every hour...
As far as I know, a couple of days ago. I'm not seeing anything get
through here, running 0.60 here.
Had/have the same problem.
Switch to MailScanner from http://www.mailscanner.info until they can get
that found and fixed. Seriously.
We want to use the Milter also but cannot.
JP
At 11:23 AM 8/25/03 -0500, you wrote:
I'm having a problem with clamd and clamav-milter.
We just implemented a
Hey folks
Love the ClamAV system - 25000+ Sobig.F viruses blocked across 6 servers in
3 days. *whew*
But begs the question:
As PostMaster of these servers we are blessed with bounces, re-mails and
the like WITH the viruses in them in a lot of cases.
I have most of these file types blocked by
I thought they updated late last week, our versions of the DB catch it as:
Report: message.zip contains Trojan.Dropper.C
And we have caught about 30 since late last night using ClamAV. Is there
another version its not catching yet?
Uh oh...
JPP
At 07:24 AM 8/4/03 -0700, you wrote:
Hi,
Its something in the Milter for sure.
I solved the problem using MailScanner (which someone suggested). But I
do not like PERL scripts in the middle of the all the mail processes we
spawn. Especially just for Virus Scanning.
So I await a Milter that behaves well with ClamAV. The day will come!
Hi again
To add to this thread.
It seems to hang on quite a few (not all) Session TimeOuts and ALL
'WARNING: ScanStream: Size exceeded' events
That may help.
Jerome
At 02:57 PM 7/10/03 -0600, you wrote:
Hey all!
Maybe someone here can help out with a curious problem. Its happening on
at
Hey all!
Maybe someone here can help out with a curious problem. Its happening on at
least 2 servers running RedHat 7.2 and 7.3 with patched Kernels... etc etc
They are both running:
Sendmail-8.12.9
OpenWebmail
SASL for user auth
And both have the latest and greatest Clamd and Clamav-Milter
False alarm.
[EMAIL PROTECTED] is caught just fine.
*goes back to checking installation*
Regards
Jerome the humbled
ePaxsys, Inc.
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
Good day
Just installed Clamav and it appears to not catch [EMAIL PROTECTED]
I caught it in my Antivirus/File blocking procmail filters, which is how I
know it got through.
The signature I use for this one is simple, I just look for:
CSmtpMsgPart123X456_000
It shows as:
13 matches
Mail list logo