Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread G.W. Haywood
Hi there,

On Fri, 8 Aug 2008 jef moskot wrote:

Re: simplest replacement for ancient amavis-perl

 Currently, we accept all infected mail, and quietly quarantine it.

May I suggest that you quarantine it, BUT STILL REJECT IT after it
has been read (and recorded) in its entirety?  You're making a rod
for your own back if you accept bad mail.  The sender will sell the
recipients' addresses to all his spammer friends and you'll just get
more of it.

 We don't refuse it at SMTP connect, although I might be able to be
 convinced that that's a better idea.

You can reject it all the way up to the last dot (er, period).

 ... I was looking at clamav-milter, which looks simple and also
 comes with the benefit of a community I'm comfortable with.

Many of us here have been using it for years with no problems.
I'll second that about the community.

 I can't find any decent documentation on it, however, (if I'm missing
 something obvious, please point me at it!)

There's quite a lot on the Web but when you download and extract the
source tarball you should have all you need.

 ... and it seems to jam mail at SMTP connection time rather than
 accepting and scanning later.

SMTP conversation, not connection, but that's the best place really.
There are other ways to use it of course.  You can just insert a mail
header as a flag and pass it through, leaving e.g YetanOtherMilter or
something like SpamAssassin to decide.  Personally, I like mail that
will be rejected to be rejected at the earliest possible opportunity
so that it doesn't waste everybody's money.

 I've found references to using it to quarantine messages, which
 would be perfect, but I haven't seen the docs to explain how to do
 that.

After you install it, you can do

man clamav-milter

[snip]
  -A, --advisory
When in advisory mode, clamav-milter flags emails with viruses but
still forwards them. The default option is to stop viruses.  This
mode is incompatible with --quarantine and --quarantine-dir.
[snip]

and

man clamd.conf

etc. etc.

(SEE ALSO
clamd(8), clamdscan(1), clamav-milter(8), clamscan(1), freshclam(1), sigtool(1))

If you want to look at those before installing them they're in the docs/man
directory after extracting the tarball, just do

man docs/man/clamav-milter.8

or whatever.

 Also I've found some explanations of how to compile clam to get the
 milter, but those were in connection with FreeBSD ports, and I don't like
 to have to wait until an update has been bundled before I can deploy it.

You can just grab the source tarball and compile and install it like
you would for any almost other Open Source tool.  The instructions are
in the tarball itself.  Granted there's a slight chicken-and-egg thing
there if you're not used to doing this:

mail4:~$  tar tzvf [...]/clamav-0.93.3.tar.gz | grep 
'clamav-0.93.3/\(README\|INSTALL\)'
-rw-r--r-- 1000/1000 73422 2008-07-07 18:38:08 clamav-0.93.3/README
-rw-r--r-- 1000/1000  9416 2008-03-06 18:41:14 clamav-0.93.3/INSTALL

Just extract the tarball to some convenient place beneath your home
directory.  Then there's quite a lot to read in the docs directory:

mail4:~$  ls -l [...]/clamav-0.93.3/docs/*pdf
total 2044
[snip]
-rw-r--r--  1 ged users   82058 2008-03-06 18:41 clamav-mirror-howto.pdf
-rw-r--r--  1 ged users  240788 2008-07-07 18:41 clamdoc.pdf
-rw-r--r--  1 ged users  102697 2008-03-06 18:41 phishsigs_howto.pdf
-rw-r--r--  1 ged users   27199 2008-04-02 21:17 signatures.pdf

Plus more HTML than you can shake a stick at in the same place.

--

73,
Ged.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
G.W. Haywood wrote:

 Currently, we accept all infected mail, and quietly quarantine it.

 May I suggest that you quarantine it, BUT STILL REJECT IT after it
 has been read (and recorded) in its entirety?

No, please don't do that for viruses.  If they are being transmitted
by a real SMTP client, you'll generate annoying backscatter.

 You're making a rod
 for your own back if you accept bad mail.  The sender will sell the
 recipients' addresses to all his spammer friends and you'll just get
 more of it.

That is not true, in my experience.  We see countless attempts by spammers
to send to invalid addresses, years after those addresses cease to be valid.

In my experience, spammers do not bother cleaning their address lists.  It's
so cheap to spam with a zombie network that the effort required to clean
the list is not worth it.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
David F. Skoll wrote:
 G.W. Haywood wrote:
 
 Currently, we accept all infected mail, and quietly quarantine it.
 
 May I suggest that you quarantine it, BUT STILL REJECT IT after it
 has been read (and recorded) in its entirety?
 
 No, please don't do that for viruses.  If they are being transmitted
 by a real SMTP client, you'll generate annoying backscatter.
 

If done during the SMTP conversation the only thing that is going to
see backscatter is the thing that sent it.  Which really isn't
backscatter.  I am under the opinion that a message should never
be silently blackholed.

Steven



___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
[EMAIL PROTECTED] wrote:

 If done during the SMTP conversation the only thing that is going to
 see backscatter is the thing that sent it.

Which is why I qualified my reply with if the sending relay is a valid
SMTP client.

 I am under the opinion that a message should never
 be silently blackholed.

I used to share that opinion, but no longer do for viruses.  If you
turn off Clam's dubious Phishing options, the odds of a false-positive
from Clam are very low.  In that situation, there is no point in rejecting;
it's better to silently discard.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Parveen Malik
Hi all,

I need to open ports for Clamav database update, but since yesterday it
seems that IP address are changing every hour.. Can you guys please let
me know what should I do to resolve this issue.
Sending you ping output.
[EMAIL PROTECTED] root]# ping db.us.clamav.net
PING db.us.rr.clamav.net (199.184.215.2) 56(84) bytes of data.

--- db.us.rr.clamav.net ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 2014ms

[EMAIL PROTECTED] root]# ping db.us.clamav.net
PING db.us.rr.clamav.net (208.67.80.27) 56(84) bytes of data.

--- db.us.rr.clamav.net ping statistics ---
5 packets transmitted, 0 received, 100% packet loss, time 4018ms

[EMAIL PROTECTED] root]# ping db.us.clamav.net
PING db.us.rr.clamav.net (64.142.100.50) 56(84) bytes of data.

--- db.us.rr.clamav.net ping statistics ---
7 packets transmitted, 0 received, 100% packet loss, time 6016ms

You have new mail in /var/spool/mail/root

Thanks,
Parveen


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of David F.
Skoll
Sent: Thursday, August 07, 2008 2:28 PM
To: ClamAV users ML
Subject: Re: [Clamav-users] simplest replacement for ancient amavis-perl

jef moskot wrote:

 I didn't mean to spark a milter fight, but as the Subject line says,
we're
 looking for the simplest thing out there.  I'm replacing a simplistic
perl
 script that just broke a message down, clamscanned it, and either
passed
 it on for delivery or quarantined and notified.  That's it.

Here is a complete MIMEDefang filter to do just that:

#=
$Features{'Virus:CLAMD'} = '/full/path/to/clamd';
$ClamdSock = '/full/path/to/clamd.sock';
$Features{'Virus:CLAMAV'} = '/full/path/to/clamscan'
$AdminAddress = '[EMAIL PROTECTED]';

sub filter_end
{
my ($code, $category, $action) = message_contains_virus();
if ($action eq 'quarantine') {
send_quarantine_notifications();
action_discard();
}
}
#=

It'll quarantine the virus and sent a notification to $AdminAddress.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

**

This email may contain proprietary and confidential information and is sent for 
the intended recipient(s) only. If by an addressing or transmission error this 
email has been delivered to you, you are requested to delete it immediately. 
You are also hereby notified that any use, any form of reproduction, 
dissemination, copying, disclosure, modification, distribution and/or 
publication of this e-mail message, contents or its attachment(s) other than by 
its intended recipient(s) is strictly prohibited. All rights reserved 
ikaSystems CorporationR.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Erwan David
On Fri, Aug 08, 2008 at 03:20:01PM CEST, [EMAIL PROTECTED] said:
 David F. Skoll wrote:
  G.W. Haywood wrote:
  
  Currently, we accept all infected mail, and quietly quarantine it.
  
  May I suggest that you quarantine it, BUT STILL REJECT IT after it
  has been read (and recorded) in its entirety?
  
  No, please don't do that for viruses.  If they are being transmitted
  by a real SMTP client, you'll generate annoying backscatter.
  
 
 If done during the SMTP conversation the only thing that is going to
 see backscatter is the thing that sent it.  Which really isn't
 backscatter.  I am under the opinion that a message should never
 be silently blackholed.

This mean your MTA must call clamav after the DATA end, but before
answering it.

-- 
Erwan
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Jan Pieter Cornet
On Fri, Aug 08, 2008 at 09:25:19AM -0400, David F. Skoll wrote:
  I am under the opinion that a message should never
  be silently blackholed.
 
 I used to share that opinion, but no longer do for viruses.  If you
 turn off Clam's dubious Phishing options, the odds of a false-positive
 from Clam are very low.  In that situation, there is no point in rejecting;
 it's better to silently discard.

I agree with David: it's better to discard a virus, than reject it
just because the sending server has a slightly worse virus scanner,
or hasn't received the signature updates yet.

But I'm more paranoid: We only discard when _2_ independant scanners
say it's a virus.

Otherwise, we used to tempfail, but nowadays it's not worth the bother,
and we just reject for single virus scanner hits. That's a measly few
percent of the already insignificant amount of email viruses (we don't
count phishes as a virus, they add to the score in SA).

-- 
Jan-Pieter Cornet [EMAIL PROTECTED]
!! Disclamer: The addressee of this email is not the intended recipient. !!
!! This is only a test of the echelon and data retention systems. Please !!
!! archive this message indefinitely to allow verification of the logs.  !!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Darren G Pifer
Hi Steve,

The site is interesting and will help with general cases but lately the
school is getting phishing specific to the university, which does not
help us.  For an example, the latest phishing we got had a Subject: ODU
Network and in the body of the message contained:

The reason for this message is because of the Email Scams  Phishing
going on the ODU Network. We have decided to contact all our students and
staffs to provide their password so that we can confirm the active
users and to de-activate the inactive user. We regret the inconveniences 
this might have cost you.

Please provide us with the below details.

Username:
Password:

So, the e-mail team and security staff need to be able to create 
signatures so
that clamd can detect this spam, and similar phishing, and need to get the
database updated in a short time frame.  I do not think submitting these 
to the
ClamAV database maintainers or other signature maintainers to update the
databases and get the databases downloaded is going to suffice.

Regards, Darren

Steve Basford wrote:
 Hi Darron,

 You could try and use my add-on clamav sigs here:

 http://www.sanesecurity.co.uk/clamav/usage.htm
 http://www.sanesecurity.co.uk/clamav/downloads.htm

 If your find the samples you have still are being missed:

 http://www.sanesecurity.co.uk/clamav/feedback.htm

 I'll see if I can create a signature for you, which may also help others.

 Also, extra docs (a little outdated here):

 http://www.sanesecurity.co.uk/clamav/docs.htm

 Cheers,

 Steve
 Sanesecurity



 --
 BEGIN-ANTISPAM-VOTING-LINKS
 --

 Teach CanIt if this mail (ID 98963468) is spam:
 Spam:https://www.spamtrap.odu.edu/b.php?c=si=98963468m=3736acdb8e69
 Not spam:https://www.spamtrap.odu.edu/b.php?c=ni=98963468m=3736acdb8e69
 Forget vote: https://www.spamtrap.odu.edu/b.php?c=fi=98963468m=3736acdb8e69
 --
 END-ANTISPAM-VOTING-LINKS

   

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
David F. Skoll wrote:
 [EMAIL PROTECTED] wrote:
 
 If done during the SMTP conversation the only thing that is going to
 see backscatter is the thing that sent it.
 
 Which is why I qualified my reply with if the sending relay is a valid
 SMTP client.

Maybe we are just arguing semantics but anything that connects to
my mail server and speaks RFC821 is valid.  I might not like what
it feeds me but that is what ClamAV/SpamAssassin is for. :)

 
 I am under the opinion that a message should never
 be silently blackholed.
 
 I used to share that opinion, but no longer do for viruses.  If you
 turn off Clam's dubious Phishing options, the odds of a false-positive
 from Clam are very low.  In that situation, there is no point in rejecting;
 it's better to silently discard.

Returning a 5xx message is neither hard or resource intensive.  Then even
in the unlikely event of a false positive the sender knows.

Steven

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Gerard
On Fri, 8 Aug 2008 13:31:24 +0100 (BST)
G.W. Haywood [EMAIL PROTECTED] wrote:

 Currently, we accept all infected mail, and quietly quarantine it.  

May I suggest that you quarantine it, BUT STILL REJECT IT after it
has been read (and recorded) in its entirety?  You're making a rod
for your own back if you accept bad mail.  The sender will sell the
recipients' addresses to all his spammer friends and you'll just get
more of it.

Unless I am incorrectly interpreting this, you are implying that he can
accept the mail and then reject it later. That would cause 'backscatter'
that will inevitable end up getting him blacklisted.

-- 
Gerard
[EMAIL PROTECTED]

Marriage is the waste-paper basket of the emotions.


signature.asc
Description: PGP signature
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Chambers, Phil
Take a look at

  http://iserv.rs-hilter.de/doc/clamav-0.91.2/signatures.pdf

Which I found very useful for exactly this situation.

Phil.

Phil Chambers
Postmaster
University of Exeter
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
Parveen Malik wrote:
 Hi all,
 
 I need to open ports for Clamav database update, but since yesterday it
 seems that IP address are changing every hour.. Can you guys please let
 me know what should I do to resolve this issue.
 Sending you ping output.
 [EMAIL PROTECTED] root]# ping db.us.clamav.net
 PING db.us.rr.clamav.net (199.184.215.2) 56(84) bytes of data.
 
 --- db.us.rr.clamav.net ping statistics ---
 3 packets transmitted, 0 received, 100% packet loss, time 2014ms
 
 [EMAIL PROTECTED] root]# ping db.us.clamav.net
 PING db.us.rr.clamav.net (208.67.80.27) 56(84) bytes of data.
 
 --- db.us.rr.clamav.net ping statistics ---
 5 packets transmitted, 0 received, 100% packet loss, time 4018ms
 
 [EMAIL PROTECTED] root]# ping db.us.clamav.net
 PING db.us.rr.clamav.net (64.142.100.50) 56(84) bytes of data.
 
 --- db.us.rr.clamav.net ping statistics ---
 7 packets transmitted, 0 received, 100% packet loss, time 6016ms
 

Can't you just have your firewall keep state on all outgoing connections?

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
[EMAIL PROTECTED] wrote:

 Which is why I qualified my reply with if the sending relay is a valid
 SMTP client.

 Maybe we are just arguing semantics but anything that connects to
 my mail server and speaks RFC821 is valid.  I might not like what
 it feeds me but that is what ClamAV/SpamAssassin is for. :)

OK, let me be precise:  By valid SMTP client, I mean one that
generates a DSN in response to a 5xx status code.

 Returning a 5xx message is neither hard or resource intensive.

I'm not arguing that.  I'm just disagreeing with the statement that
it's a good idea.

 Then even in the unlikely event of a false positive the sender
 knows.

This is so unlikely that the backscatter risk outweighs the benefit.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread jef moskot
On Fri, 8 Aug 2008, David F. Skoll wrote:
 G.W. Haywood wrote:
  You're making a rod for your own back if you accept bad mail.  The
  sender will sell the recipients' addresses to all his spammer friends
  and you'll just get more of it.

 In my experience, spammers do not bother cleaning their address lists.

My thought process has been that if we give feedback as to which messages
made it past our defenses, we're essentially telling the spammers how to
construct better spam.

Then again, maybe no one is there to see the 550s these days and since (I
agree with David) spammers don't seem to care if addresses are valid, they
probably don't care if the spam gets there or not.

As for why we quarantine in the first place, we roll our own clam
signatures, some of which are a little dicey, so we like to be able to dig
ourselves out of the problems we create for ourselves.  As long as the
volume isn't out of control (it isn't yet), it's better for us to accept
the responsibility than to place it on the users who somehow managed to
construct sentences that read like Mab Libs but are nonetheless valid.

Perhaps clam is the wrong tool for that kind of thing, but it's just so
convenient, that it's going to be hard to choose another method.

Jeffrey Moskot
System Administrator
[EMAIL PROTECTED]
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Darren G Pifer
Chambers, Phil wrote:
 Take a look at

   http://iserv.rs-hilter.de/doc/clamav-0.91.2/signatures.pdf
   
I have seen this document but it does not show how to add signatures
to a database OR for clamd to detect the phishing e-mail.  I was able
to create the signature (a .hbd file) and clamscan detects the phishing
but clamd does not.  Maybe I am missing something.

Darren
ODU

 Which I found very useful for exactly this situation.

 Phil.
 
 Phil Chambers
 Postmaster
 University of Exeter
 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://www.clamav.net/support/ml


 --
 BEGIN-ANTISPAM-VOTING-LINKS
 --

 Teach CanIt if this mail (ID 99007033) is spam:
 Spam:https://www.spamtrap.odu.edu/b.php?c=si=99007033m=c2eab1b7b6c8
 Not spam:https://www.spamtrap.odu.edu/b.php?c=ni=99007033m=c2eab1b7b6c8
 Forget vote: https://www.spamtrap.odu.edu/b.php?c=fi=99007033m=c2eab1b7b6c8
 --
 END-ANTISPAM-VOTING-LINKS

   

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
David F. Skoll wrote:
 [EMAIL PROTECTED] wrote:
 
 Which is why I qualified my reply with if the sending relay is a valid
 SMTP client.
 
 Maybe we are just arguing semantics but anything that connects to
 my mail server and speaks RFC821 is valid.  I might not like what
 it feeds me but that is what ClamAV/SpamAssassin is for. :)
 
 OK, let me be precise:  By valid SMTP client, I mean one that
 generates a DSN in response to a 5xx status code.

Fair enough.

 Then even in the unlikely event of a false positive the sender
 knows.
 
 This is so unlikely that the backscatter risk outweighs the benefit.

I have had it happen.  When messages mysteriously go missing
and people call me asking where it went I can be rest assured
saying that if something was rejected somewhere they should have
received a bounce.  It makes things easier to debug when there
is feedback.

What backscatter?  If done at SMTP the only person that should be
notified is the sender.  If that sender goes and does something
stupid with my rejection then that is the senders problem.
Otherwise there is zero backscatter.

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
[EMAIL PROTECTED] wrote:

[...]

 What backscatter?  If done at SMTP the only person that should be
 notified is the sender.

I see.  And it's impossible for a virus to forge MAIL FROM:, is it?

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Parveen Malik
Steven,

I have a secured environment which governed by HIPAA regulatory, so I
can't keep open everything.

Thanks,
Parveen

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, August 08, 2008 9:56 AM
To: ClamAV users ML
Subject: Re: [Clamav-users] simplest replacement for ancient amavis-perl

Parveen Malik wrote:
 Hi all,
 
 I need to open ports for Clamav database update, but since yesterday
it
 seems that IP address are changing every hour.. Can you guys please
let
 me know what should I do to resolve this issue.
 Sending you ping output.
 [EMAIL PROTECTED] root]# ping db.us.clamav.net
 PING db.us.rr.clamav.net (199.184.215.2) 56(84) bytes of data.
 
 --- db.us.rr.clamav.net ping statistics ---
 3 packets transmitted, 0 received, 100% packet loss, time 2014ms
 
 [EMAIL PROTECTED] root]# ping db.us.clamav.net
 PING db.us.rr.clamav.net (208.67.80.27) 56(84) bytes of data.
 
 --- db.us.rr.clamav.net ping statistics ---
 5 packets transmitted, 0 received, 100% packet loss, time 4018ms
 
 [EMAIL PROTECTED] root]# ping db.us.clamav.net
 PING db.us.rr.clamav.net (64.142.100.50) 56(84) bytes of data.
 
 --- db.us.rr.clamav.net ping statistics ---
 7 packets transmitted, 0 received, 100% packet loss, time 6016ms
 

Can't you just have your firewall keep state on all outgoing
connections?

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

**

This email may contain proprietary and confidential information and is sent for 
the intended recipient(s) only. If by an addressing or transmission error this 
email has been delivered to you, you are requested to delete it immediately. 
You are also hereby notified that any use, any form of reproduction, 
dissemination, copying, disclosure, modification, distribution and/or 
publication of this e-mail message, contents or its attachment(s) other than by 
its intended recipient(s) is strictly prohibited. All rights reserved 
ikaSystems CorporationR.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Jan Pieter Cornet
On Fri, Aug 08, 2008 at 09:44:11AM -0400, Darren G Pifer wrote:
 Hi Steve,
 
 The site is interesting and will help with general cases but lately the
 school is getting phishing specific to the university, which does not
 help us. 

Have you considered using a regular-expression based filtering
mechanism, say, SpamAssassin?

I use it to block directed phishes (for the ISP I work for), and it
works pretty well. Unfortunately, it looks like, for directed phishes,
the phishing mails are first tried out, likely via compromised accounts,
until they pass the filter. At least, some do, it seems.

-- 
Jan-Pieter Cornet [EMAIL PROTECTED]
!! Disclamer: The addressee of this email is not the intended recipient. !!
!! This is only a test of the echelon and data retention systems. Please !!
!! archive this message indefinitely to allow verification of the logs.  !!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Chambers, Phil

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Darren G Pifer
 Sent: Fri 08 August 2008 15:09
 To: ClamAV users ML
 Subject: Re: [Clamav-users] Clamav phishing sigs
 
 Chambers, Phil wrote:
  Take a look at
 
http://iserv.rs-hilter.de/doc/clamav-0.91.2/signatures.pdf

 I have seen this document but it does not show how to add 
 signatures to a database OR for clamd to detect the phishing 
 e-mail.  I was able to create the signature (a .hbd file) and 
 clamscan detects the phishing but clamd does not.  Maybe I am 
 missing something.
 
 Darren
 ODU

It appears that you need to wait until clamd sees that the signature
files in the database directory have changed.  I think the default is
for clamd to check every 3 hours.  It will also check if freshclam
downloads updates because freshclam tells clamd to check.

What I have done is to lift the bit of code from freshclam which
notifies clamd and put it into a script called clamdreload.pl.  If I put
a new signature in my local list I then run that script to make clamd
read it.

You should see the reload in the clamd log.

Phil.

Phil Chambers
Postmaster
University of Exeter
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
[EMAIL PROTECTED] wrote:

 No, is is trivial for anyone to forge mail from headers but that is
 irrelevant when virus filtering is done at the SMTP level.  You don't
 send the rejection to the address in the mail from.  You send the
 rejection to the server/client that sent you the message because the
 SMTP conversation is still going on and you know exactly who is trying
 to feed it to you.

:-)

I see.  So you actually do believe it's impossible to forge SMTP envelope
information?  See, I have this bridge for sale...

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
David F. Skoll wrote:
 [EMAIL PROTECTED] wrote:
 
 No, is is trivial for anyone to forge mail from headers but that is
 irrelevant when virus filtering is done at the SMTP level.  You don't
 send the rejection to the address in the mail from.  You send the
 rejection to the server/client that sent you the message because the
 SMTP conversation is still going on and you know exactly who is trying
 to feed it to you.
 
 :-)
 
 I see.  So you actually do believe it's impossible to forge SMTP envelope
 information?  See, I have this bridge for sale...

No, I did not say that.  I said it was trivial.  I am just pointing out that
it is irrelevant while the SMTP conversation is still going on.  It is
impossible(mostly) to forge the IP the message is being sent from if there
is a live SMTP conversation going on and while that conversation is going
on you know exactly what is sending you the garbage and you know exactly
what to tell you don't want it.  There is zero backscatter.

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
[EMAIL PROTECTED] wrote:

 No, I did not say that.  I said it was trivial.  I am just pointing out that
 it is irrelevant while the SMTP conversation is still going on.  It is
 impossible(mostly) to forge the IP the message is being sent from if there
 is a live SMTP conversation going on and while that conversation is going
 on you know exactly what is sending you the garbage and you know exactly
 what to tell you don't want it.  There is zero backscatter.

You obviously misunderstand SMTP.  Please reread RFC 2821 and 2822.
If you have further questions, let's take them off-list because this
thread is likely boring to SMTP veterans.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
David F. Skoll wrote:
 [EMAIL PROTECTED] wrote:
 
 No, I did not say that.  I said it was trivial.  I am just pointing out that
 it is irrelevant while the SMTP conversation is still going on.  It is
 impossible(mostly) to forge the IP the message is being sent from if there
 is a live SMTP conversation going on and while that conversation is going
 on you know exactly what is sending you the garbage and you know exactly
 what to tell you don't want it.  There is zero backscatter.
 
 You obviously misunderstand SMTP.  Please reread RFC 2821 and 2822.
 If you have further questions, let's take them off-list because this
 thread is likely boring to SMTP veterans.
 

No need to be condescending about it.  I have no problem taking it off
list and explaining how you are mistaken.

Steven

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
[EMAIL PROTECTED] wrote:

 No need to be condescending about it.  I have no problem taking it off
 list and explaining how you are mistaken.

OK, look.  I guess I need to spell it out for you.

End-user PC has virus.  Virus does this:

telnet isps-smtp-server 25
HELO bogus
MAIL FROM:[EMAIL PROTECTED]
RCPT TO:[EMAIL PROTECTED]
DATA
.

Then ISP's mail server does this:

telnet victims-smtp-server 25
HELO isps-smtp-server
MAIL FROM:[EMAIL PROTECTED]
RCPT TO:[EMAIL PROTECTED]
DATA
.

If victim's SMTP server fails the DATA with a 5xx code, then
backscatter goes [EMAIL PROTECTED]

Understand now?

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
David F. Skoll wrote:
 [EMAIL PROTECTED] wrote:
 
 No need to be condescending about it.  I have no problem taking it off
 list and explaining how you are mistaken.
 
 OK, look.  I guess I need to spell it out for you.
 
 End-user PC has virus.  Virus does this:
 
 telnet isps-smtp-server 25
 HELO bogus
 MAIL FROM:[EMAIL PROTECTED]
 RCPT TO:[EMAIL PROTECTED]
 DATA
 .
 
 Then ISP's mail server does this:
 
 telnet victims-smtp-server 25
 HELO isps-smtp-server
 MAIL FROM:[EMAIL PROTECTED]
 RCPT TO:[EMAIL PROTECTED]
 DATA
 .
 
 If victim's SMTP server fails the DATA with a 5xx code, then
 backscatter goes [EMAIL PROTECTED]
 
 Understand now?

I understand that but it is not my problem what the ISP's mail server
does with it after I send a 5xx.  It is the ISP's problem.  I don't
need random ISP's making their problems my problems.  If anything
it encourages the ISP to virus filter their users and take care of abuse
problems rather then silently sweeping them under the rug.

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread rick pim
David F. Skoll writes:
  [EMAIL PROTECTED] wrote:

i'm far from an expert but at some level i believe that you're both
right. the real question boils down (i think) to who is trying to deliver
this piece of unwanted email?

if it's a Real MTA, then kicking back a 550 will -- probably -- have the
MTA trying to return the message to the sender. there will probably
be backscatter.

if it's NOT a real MTA -- if it's a spam proxy or a virus trying to send
the message -- then kicking back a 550 will -- probably -- have the message
dropped on the floor. there will probably not be backscatter.

so i think you're both right, more or less.

rp

rick pim   [EMAIL PROTECTED]
information technology services  (613) 533-2242
queen's university, kingston   
---
Hmm hmm hmmm Reality stinks. That's why I try to improve on it 
whenever I can.
-- The Flash (TV)
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
rick pim wrote:
 David F. Skoll writes:
   [EMAIL PROTECTED] wrote:
 
 i'm far from an expert but at some level i believe that you're both
 right. the real question boils down (i think) to who is trying to deliver
 this piece of unwanted email?
 
 if it's a Real MTA, then kicking back a 550 will -- probably -- have the
 MTA trying to return the message to the sender. there will probably
 be backscatter.
 
 if it's NOT a real MTA -- if it's a spam proxy or a virus trying to send
 the message -- then kicking back a 550 will -- probably -- have the message
 dropped on the floor. there will probably not be backscatter.
 
 so i think you're both right, more or less.

I think you are right.  Sending a 5xx and silently quarantining both have their
advantages and disadvantages.  Who can say whether one is better than the other.

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Tilman Schmidt

David F. Skoll schrieb:


OK, look.  I guess I need to spell it out for you.

End-user PC has virus.  Virus does this:

telnet isps-smtp-server 25


In my experience that's very unusual behaviour for a virus.
The vast majority try to connect directly to the recipient's MX.

--
Tilman Schmidt
Phoenix Software GmbH
Bonn, Germany



signature.asc
Description: OpenPGP digital signature
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Gerard
On Fri, 8 Aug 2008 11:20:54 -0400
rick pim [EMAIL PROTECTED] wrote:

David F. Skoll writes:
  [EMAIL PROTECTED] wrote:

i'm far from an expert but at some level i believe that you're both
right. the real question boils down (i think) to who is trying to
deliver this piece of unwanted email?

if it's a Real MTA, then kicking back a 550 will -- probably -- have
the MTA trying to return the message to the sender. there will
probably be backscatter.

if it's NOT a real MTA -- if it's a spam proxy or a virus trying to
send the message -- then kicking back a 550 will -- probably -- have
the message dropped on the floor. there will probably not be
backscatter.

so i think you're both right, more or less.

Employing 'greylisting' would vastly improve the chances of eliminating
the acceptance of SPAM at the MTA level.


-- 
Gerard
[EMAIL PROTECTED]

The tree of research must from time to time
be refreshed with the blood of bean counters.

Alan Kay


signature.asc
Description: PGP signature
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Dennis Peterson
David F. Skoll wrote:
 [EMAIL PROTECTED] wrote:
 
 [...]
 
 What backscatter?  If done at SMTP the only person that should be
 notified is the sender.
 
 I see.  And it's impossible for a virus to forge MAIL FROM:, is it?
 

That is the concern of the connecting system - they will suffer any 
consequences of accepting the responsibility of forwarding bad mail and 
I really don't care if that happens.

dp
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Dennis Peterson
David F. Skoll wrote:
 [EMAIL PROTECTED] wrote:
 
 No need to be condescending about it.  I have no problem taking it off
 list and explaining how you are mistaken.
 
 OK, look.  I guess I need to spell it out for you.
 
 End-user PC has virus.  Virus does this:
 
 telnet isps-smtp-server 25
 HELO bogus
 MAIL FROM:[EMAIL PROTECTED]
 RCPT TO:[EMAIL PROTECTED]
 DATA
 .
 
 Then ISP's mail server does this:
 
 telnet victims-smtp-server 25
 HELO isps-smtp-server
 MAIL FROM:[EMAIL PROTECTED]
 RCPT TO:[EMAIL PROTECTED]
 DATA
 .
 
 If victim's SMTP server fails the DATA with a 5xx code, then
 backscatter goes [EMAIL PROTECTED]
 
 Understand now?
 

Sounds like the isps-smtp-server operator has a problem of accepting 
responsibility to forward mail that may be undeliverable.

dp
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread rick pim
Gerard writes:
  Employing 'greylisting' would vastly improve the chances of eliminating
  the acceptance of SPAM at the MTA level.

it certainly does. unfortunately, in practice, one of the
prime advantages of greylisting -- the fact that it will never
block 'real' mail -- turns out, um, not to be true. there are so many
standards-noncompliant MTAs out there that greylisting does block
real mail. (this is one of the things that makes me crazy.)

(we still use it, of course.)

rp

rick pim   [EMAIL PROTECTED]
information technology services  (613) 533-2242
queen's university, kingston   
---
You call this a *trial*?!  This is nothing but a *kangaroo* *court* 
without the hoppy, furry guy!
--  The Flash (TV)
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Malformed database problem

2008-08-08 Thread Sarocet
Chambers, Phil wrote:
 I have looked at the source code and there are numerous places where it
 detects problems with signature, but they all generate the same failure
 message: Malformed database.

 It is going to take me a very long time to patch the code to make it
 generate different error messages for each case where a signature can be
 malformed, so that I can diagnose my problem, but I see no alternative.
   
Search text Malformed database replace all ocucrrences by File  
__FILE__  encountered a malformed database on line  STRINGIFY(__LINE__)

And globally define this:
  #define STRINGIFY2(x) #x
  #define STRINGIFY(x) STRINGIFY2(x)

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Charles Gregory
On Fri, 8 Aug 2008 [EMAIL PROTECTED] wrote:
  telnet isps-server 25 ... HELO bogus ... MAIL FROM:[EMAIL PROTECTED]
  telnet victims-server 25 ... HELO isps-server ... MAIL FROM
  If victim's SMTP server fails the DATA with a 5xx code, then
  backscatter goes [EMAIL PROTECTED]
  it is not my problem what the ISP's mail server
 does with it after I send a 5xx.

Well, first of all, yes it IS. It's *everyone's* problem. That forged
address could be on *your* server, and *you* get the backscatter from some
other victim system that also doesn't care what the ISP does with it...

That being said, I agree that the number of viruses that still try to find
and use an infected PC's SMTP server is very small... In which case the
odds of hitting a false positive via a mail relay are greater than hitting
a virus via a mail relay. Now that you make me think about it, the only
time I ever see backscatter from a virus is when someone uses a virus
checker that generates its own DSN rather than issue SMTP 5xx rejections.
I am so *very* glad that ClamAV is just a *reporting* tool! :)

 If anything it encourages the ISP to virus filter their users and take
 care of abuse problems rather then silently sweeping them under the
 rug.

Begging pardon, but just because someone uses a standard postfix config
and follows the standard 'recommended' practice of listing dial-up IP's as
'trusted clients' does not mean they are 'sweeping' anything under their
'rug'. It is just a choice made to minimize the performance hit of
scanning and filtering mail that is 99.99+% valid.

BUT this practice of not scanning mail from trusted clients is only
'safe' if virus checking is done post-SMTP, in procmail. Otherwise, there
is the risk that mail from one user of a system to another will not be
virus checked at *all*, permitting the spread of viruses within a given
user base. 

So my closing thought is that I will want to do two things with my new
Mail Avenger setup:
  1) I will want to run clamav on *all* messages, regardless of source.
 This will prevent intra-system viruses and also cut down on
 backscatter by preventing my server from relaying an outgoing virus.
  2) I will want to check in procmail to see whether an intra-system 
 message passed through my SMTP or was directly delivered via LDA, and
 in the latter case I will need to run clamav from procmail.

So thank you all, for stirring up some good serious thoughts!

- Charles, HWCN

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
Tilman Schmidt wrote:

 telnet isps-smtp-server 25

 In my experience that's very unusual behaviour for a virus.
 The vast majority try to connect directly to the recipient's MX.

I see both.  I see malware that connects directly from end-user PCs,
and more sophisticated malware that actually breaks CAPTCHAs on
Hotmail/GMail/etc.  and sends via those services.  I've also seen malware
that checks the user's Outlook settings and sends via the configured SMTP
server (though that case is admittedly the rarest.)

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread rick pim


On Fri, 8 Aug 2008, Charles Gregory wrote:
 Well, first of all, yes it IS. It's *everyone's* problem. That forged
 address could be on *your* server, and *you* get the backscatter from some
 other victim system that also doesn't care what the ISP does with it...

what he said: we have two accounts/addresses that get, between them,
about 200,000 bounces a day; this has been going on for something more
than 8 months.

(that said, there's something to be said for bouncing mail: one of our 
vendors is occasionally silently blocking my email to them. clearly
SOMETHING about my messages are triggering their spam filters. it sure
would be nice if i got the bounces for those)


rp

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Dennis Peterson
Noel Jones wrote:
 Darren G Pifer wrote:
 Chambers, Phil wrote:
 Take a look at

   http://iserv.rs-hilter.de/doc/clamav-0.91.2/signatures.pdf
   
 I have seen this document but it does not show how to add signatures
 to a database OR for clamd to detect the phishing e-mail.  I was able
 to create the signature (a .hbd file) and clamscan detects the phishing
 but clamd does not.  Maybe I am missing something.

 
 If the sig works with clamscan, it will also work with clamdscan.
 Clamd must be stopped and restarted to recognize new signature 
 files.
 
 Make sure you have the latest version of clamav.
 
 

I think there are times when a milter might pull an incoming message 
apart and submit it in pieces to clamd that creates a different 
situation than scanning a message that is whole, and stored as a disk 
file. In this case two entirely different objects are being scanned, and 
depending on the way the signature was defined, there can be differences 
in the results.

dp
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread David F. Skoll
rick pim wrote:

 (that said, there's something to be said for bouncing mail: one of our 
 vendors is occasionally silently blocking my email to them. clearly
 SOMETHING about my messages are triggering their spam filters. it sure
 would be nice if i got the bounces for those)

I discard viruses, but reject (with 5xx) spam, because spam-detectors
have a much higher false-positive rate than virus-detectors.

Regards,

David
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
Charles Gregory wrote:
 On Fri, 8 Aug 2008 [EMAIL PROTECTED] wrote:
 telnet isps-server 25 ... HELO bogus ... MAIL FROM:[EMAIL PROTECTED]
 telnet victims-server 25 ... HELO isps-server ... MAIL FROM
 If victim's SMTP server fails the DATA with a 5xx code, then
 backscatter goes [EMAIL PROTECTED]
  it is not my problem what the ISP's mail server
 does with it after I send a 5xx.
 
 Well, first of all, yes it IS. It's *everyone's* problem. That forged
 address could be on *your* server, and *you* get the backscatter from some
 other victim system that also doesn't care what the ISP does with it...
 

Heh, everyone is entitled to their opinion.  Mine just happens to differ
from yours.  I have been at the other end of backscatter and it is by
no means fun but when it happens I am fully capable of taking measures
against as I would any other spam/virus source.  This is where RBLs come
in handy.

 If anything it encourages the ISP to virus filter their users and take
 care of abuse problems rather then silently sweeping them under the
 rug.
 
 Begging pardon, but just because someone uses a standard postfix config
 and follows the standard 'recommended' practice of listing dial-up IP's as
 'trusted clients' does not mean they are 'sweeping' anything under their
 'rug'. It is just a choice made to minimize the performance hit of
 scanning and filtering mail that is 99.99+% valid.

I meant to imply that when the ISP does not virus filter and the
recipient silently drops the message the problem never gets resolved
because nobody is made aware of it.  The ISP customer will continue
to be infected and continue to send out garbage.  I suppose this
is all based on the assumption that the ISP even cares.  Cause as
everyone knows *all* ISPs care.  Right? ;)

 So thank you all, for stirring up some good serious thoughts!

It has been entertaining.

Steven

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Dennis Peterson
rick pim wrote:
 
 On Fri, 8 Aug 2008, Charles Gregory wrote:
 Well, first of all, yes it IS. It's *everyone's* problem. That forged
 address could be on *your* server, and *you* get the backscatter from some
 other victim system that also doesn't care what the ISP does with it...
 
 what he said: we have two accounts/addresses that get, between them,
 about 200,000 bounces a day; this has been going on for something more
 than 8 months.

If the bulk of thoses is coming from infected PC's there is no harm in 
rejecting them with a 5xx - the PC is going to ignore that anyway - it 
is certainly not going to bounce the message back to the sender. If it 
is coming from a legitimate system it would be useful to provide 
feedback to that system's operator that they are handling dirty mail. In 
that case a 5xx error is appropriate. If they then bounce the message to 
some unsuspecting victim then they will get additional feedback. I don't 
see where dropping those messages is helpful but do see all manor of 
advantages of rejecting with 5xx. My 5xx rejects, which are in the 
thousands, are 10 to one generated by DNSBL or dictionary attempts (user 
unknown), not ClamAV hits.

 
 (that said, there's something to be said for bouncing mail: one of our 
 vendors is occasionally silently blocking my email to them. clearly
 SOMETHING about my messages are triggering their spam filters. it sure
 would be nice if i got the bounces for those)


Can't have it both ways - although you could ask to be whitelisted. I do 
that for all our regular customers and contacts, and also whitelist any 
mail lists our users are on. I'm very happy to expect connecting systems 
to be well run or to suffer the consequences. In fact I feel that way 
about my systems. If I make a mistake I expect to pay for it.

dp
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
Charles Gregory wrote:
 On Fri, 8 Aug 2008 [EMAIL PROTECTED] wrote:
 telnet isps-server 25 ... HELO bogus ... MAIL FROM:[EMAIL PROTECTED]
 telnet victims-server 25 ... HELO isps-server ... MAIL FROM
 If victim's SMTP server fails the DATA with a 5xx code, then
 backscatter goes [EMAIL PROTECTED]
  it is not my problem what the ISP's mail server
 does with it after I send a 5xx.
 
 Well, first of all, yes it IS. It's *everyone's* problem. That forged
 address could be on *your* server, and *you* get the backscatter from some
 other victim system that also doesn't care what the ISP does with it...
 
 That being said, I agree that the number of viruses that still try to find
 and use an infected PC's SMTP server is very small... In which case the
 odds of hitting a false positive via a mail relay are greater than hitting
 a virus via a mail relay. Now that you make me think about it, the only
 time I ever see backscatter from a virus is when someone uses a virus
 checker that generates its own DSN rather than issue SMTP 5xx rejections.
 I am so *very* glad that ClamAV is just a *reporting* tool! :)
 
 If anything it encourages the ISP to virus filter their users and take
 care of abuse problems rather then silently sweeping them under the
 rug.
 
 Begging pardon, but just because someone uses a standard postfix config
 and follows the standard 'recommended' practice of listing dial-up IP's as
 'trusted clients' does not mean they are 'sweeping' anything under their
 'rug'. It is just a choice made to minimize the performance hit of
 scanning and filtering mail that is 99.99+% valid.
 
 BUT this practice of not scanning mail from trusted clients is only
 'safe' if virus checking is done post-SMTP, in procmail. Otherwise, there
 is the risk that mail from one user of a system to another will not be
 virus checked at *all*, permitting the spread of viruses within a given
 user base. 
 
 So my closing thought is that I will want to do two things with my new
 Mail Avenger setup:
   1) I will want to run clamav on *all* messages, regardless of source.
  This will prevent intra-system viruses and also cut down on
  backscatter by preventing my server from relaying an outgoing virus.
   2) I will want to check in procmail to see whether an intra-system 
  message passed through my SMTP or was directly delivered via LDA, and
  in the latter case I will need to run clamav from procmail.
 
 So thank you all, for stirring up some good serious thoughts!
 
 - Charles, HWCN
 
 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://www.clamav.net/support/ml
 
 

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Noel Jones
Dennis Peterson wrote:
 Noel Jones wrote:
 Darren G Pifer wrote:
 Chambers, Phil wrote:
 Take a look at

   http://iserv.rs-hilter.de/doc/clamav-0.91.2/signatures.pdf
   
 I have seen this document but it does not show how to add signatures
 to a database OR for clamd to detect the phishing e-mail.  I was able
 to create the signature (a .hbd file) and clamscan detects the phishing
 but clamd does not.  Maybe I am missing something.

 If the sig works with clamscan, it will also work with clamdscan.
 Clamd must be stopped and restarted to recognize new signature 
 files.

 Make sure you have the latest version of clamav.


 
 I think there are times when a milter might pull an incoming message 
 apart and submit it in pieces to clamd that creates a different 
 situation than scanning a message that is whole, and stored as a disk 
 file. In this case two entirely different objects are being scanned, and 
 depending on the way the signature was defined, there can be differences 
 in the results.
 
 dp

That's true.  There are some milters and such that try to be 
helpful and unpack/demime mail into its component parts, 
causing signatures designed to scan the complete mail to not 
work.

However, there was a time not too long ago (maybe 0.93.1) that 
some signatures worked with clamscan but were silently ignored 
by clamdscan.  This was seen with command-line file scanning 
of a static file, no milter/filter/whatever involved.  There 
was discussion here about it at the time.

So make sure you have the latest version, which is never bad 
advice when dealing with (seemingly) inconsistent behavior.

-- 
Noel Jones
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
[EMAIL PROTECTED] wrote:
 Charles Gregory wrote:
 On Fri, 8 Aug 2008 [EMAIL PROTECTED] wrote:
 telnet isps-server 25 ... HELO bogus ... MAIL FROM:[EMAIL PROTECTED]
 telnet victims-server 25 ... HELO isps-server ... MAIL FROM
 If victim's SMTP server fails the DATA with a 5xx code, then
 backscatter goes [EMAIL PROTECTED]
  it is not my problem what the ISP's mail server
 does with it after I send a 5xx.
 Well, first of all, yes it IS. It's *everyone's* problem. That forged
 address could be on *your* server, and *you* get the backscatter from some
 other victim system that also doesn't care what the ISP does with it...

 That being said, I agree that the number of viruses that still try to find
 and use an infected PC's SMTP server is very small... In which case the
 odds of hitting a false positive via a mail relay are greater than hitting
 a virus via a mail relay. Now that you make me think about it, the only
 time I ever see backscatter from a virus is when someone uses a virus
 checker that generates its own DSN rather than issue SMTP 5xx rejections.
 I am so *very* glad that ClamAV is just a *reporting* tool! :)

 If anything it encourages the ISP to virus filter their users and take
 care of abuse problems rather then silently sweeping them under the
 rug.
 Begging pardon, but just because someone uses a standard postfix config
 and follows the standard 'recommended' practice of listing dial-up IP's as
 'trusted clients' does not mean they are 'sweeping' anything under their
 'rug'. It is just a choice made to minimize the performance hit of
 scanning and filtering mail that is 99.99+% valid.

 BUT this practice of not scanning mail from trusted clients is only
 'safe' if virus checking is done post-SMTP, in procmail. Otherwise, there
 is the risk that mail from one user of a system to another will not be
 virus checked at *all*, permitting the spread of viruses within a given
 user base. 

 So my closing thought is that I will want to do two things with my new
 Mail Avenger setup:
   1) I will want to run clamav on *all* messages, regardless of source.
  This will prevent intra-system viruses and also cut down on
  backscatter by preventing my server from relaying an outgoing virus.
   2) I will want to check in procmail to see whether an intra-system 
  message passed through my SMTP or was directly delivered via LDA, and
  in the latter case I will need to run clamav from procmail.

 So thank you all, for stirring up some good serious thoughts!

 - Charles, HWCN

Doh, sorry about this.  To many windows open at the same time...

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] simplest replacement for ancient amavis-perl

2008-08-08 Thread Dennis Peterson
[EMAIL PROTECTED] wrote:

 
 I meant to imply that when the ISP does not virus filter and the
 recipient silently drops the message the problem never gets resolved
 because nobody is made aware of it.  The ISP customer will continue
 to be infected and continue to send out garbage.  I suppose this
 is all based on the assumption that the ISP even cares.  Cause as
 everyone knows *all* ISPs care.  Right? ;)

http://www.spam-site.com/isp-doing-business-with-spammers.shtml

Oh, sure :)

dp
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] [0.3] Re: simplest replacement for ancient amavis-perl

2008-08-08 Thread Charles Gregory
On Fri, 8 Aug 2008 [EMAIL PROTECTED] wrote:
 I have been at the other end of backscatter and it is by no means fun
 but when it happens I am fully capable of taking measures against as I
 would any other spam/virus source.  This is where RBLs come in handy.

How would an RBL help? Backscatter comes from otherwise legitimate
servers that would not be listed. (or if they are I wouldn't trust
those RBL's with my mail!)

 I meant to imply that when the ISP does not virus filter and the
 recipient silently drops the message the problem never gets resolved
 because nobody is made aware of it.

(nod) Then, strictly, speaking, that is the *recipient* sweeping it under
the rug, at which point we agree. I much prefer to get the rejections
(even if my server then generates backscatter for them), because they
stand out in my logs and I can quickly spot and eliminate a problem.

 The ISP customer will continue to be infected and continue to send out
 garbage.  I suppose this is all based on the assumption that the ISP
 even cares.  Cause as everyone knows *all* ISPs care.  Right? ;)

Inverse square ratio - size to caring. :-P

- Charles

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] [0.3] Re: simplest replacement for ancient amavis-perl

2008-08-08 Thread kwijibo
Charles Gregory wrote:
 On Fri, 8 Aug 2008 [EMAIL PROTECTED] wrote:
 I have been at the other end of backscatter and it is by no means fun
 but when it happens I am fully capable of taking measures against as I
 would any other spam/virus source.  This is where RBLs come in handy.
 
 How would an RBL help? Backscatter comes from otherwise legitimate
 servers that would not be listed. (or if they are I wouldn't trust
 those RBL's with my mail!)

Private RBLs.

Steven
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Darren G Pifer
Steve Basford wrote:
 Darren G Pifer wrote:
   
 So, the e-mail team and security staff need to be able to create
 signatures so
 that clamd can detect this spam, and similar phishing, and need to get
 the
 database updated in a short time frame.  I do not think submitting
 these to the
 ClamAV database maintainers or other signature maintainers to update the
 databases and get the databases downloaded is going to suffice.

 
 Totally understand I have been adding some of these seemingly
 targeted ones into the database, as most of the time,
 the body of the email is the same... all they do is change the name of
 the university... for example, does this one look
 like the same thing you've been seeing:

 http://gwblogspot.blogspot.com/2008/07/email-scam.html
 http://technews.ucdavis.edu/news2.cfm?id=1666

 The offer is there... if you have any samples you want me to add, to
 benefit other uni's too... just sent them to: [EMAIL PROTECTED]
   
Looks the same to me, except for the name of the uni.  I will do as you 
suggest,
that is, send ODU specific e-mail to the above address.

I will also take a look at the link sent earlier to see if we can make 
our own signatures.

Darren
ODU
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Clamav phishing sigs

2008-08-08 Thread Gerard
On Fri, 08 Aug 2008 13:26:23 -0500
Noel Jones [EMAIL PROTECTED] wrote:

If the sig works with clamscan, it will also work with clamdscan.
Clamd must be stopped and restarted to recognize new signature 
files.


You can use something like:

pidof clamd # Get the pid of clamd

kill -USR2 clamd pid  # place the pid found
# above here sans quotation marks.

You could place the whole thing in a small script file if you are going
to use it repeatedly.

-- 
Gerard
[EMAIL PROTECTED]

One man's theology is another man's belly laugh.


signature.asc
Description: PGP signature
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml