Re: [clamav-users] Inquire about clamav latest stable version -

2022-07-28 Thread G.W. Haywood via clamav-users

Hi there,

On Thu, 28 Jul 2022, Paul Kosinski via clamav-users wrote:

On Thu, 28 Jul 2022, I wrote:


At the moment three versions are officially supported by Cisco's Talos, the 
authors of the software.


Cisco's Talos are the *current* authors of the software. ...


Gladly I stand corrected.

--

73,
Ged.
___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat


Re: [clamav-users] Inquire about clamav latest stable version -

2022-07-28 Thread Micah Snyder (micasnyd) via clamav-users
Hi Ged, Jiayi,

> I don't know what will happen
> if a serious vulnerability is found before the stated end of support
> for 0.104.x in the support matrix and I doubt that Talos does either.
> My guess is that support would be withdrawn immediately rather than as
> stated in the support matrix.

As per the EOL policy (https://docs.clamav.net/faq/faq-eol.html) the ClamAV 
0.104 release would continue to get security patch versions until 4 months 
after 0.105 is released, or until the next feature release (1.0) is published. 
We're getting close to 3 months since 0.105.0 was published.  Vulnerability 
reports generally have a 90 day non-disclosure window from the moment they're 
reported, and we often use all that time to craft/review/test fixes before 
publishing a release. Unless a critical vulnerability is publicly disclosed 
without giving us a non-disclosure window in which to fix the issue, it is 
highly unlikely that we'll have to publish security fixes before 0.104 exceeds 
that end-of-life. For this reason, the release announcement includes a notice 
to prepare users still on 0.104 for a move to 0.105.

> > I guess that's the reason why we release new major version 105 and
> > patch release versions for 103 and 104 together?
>
> Your guess is as good as mine. :)

We published patch versions for 0.103 and 0.104 at the same time as 0.105.0 was 
published because we had critical security fixes for all supported versions.  
We could have published 0.105.0 a few weeks before, and then published 0.105.1 
with the patch versions for 0.103/0.104 for the security fixes almost immediate 
afterwards, but that would have been more work for everyone. So, we delayed 
0.105.0 to align it with the security patch release.

Sorry about the "0.104.1" in the blog (and copy-pasted announcement) title.  
The typo was missed by me and by the reviewer.  I've corrected the typo in the 
blog.

Best regards,
Micah

Micah Snyder
ClamAV Development
Talos
Cisco Systems, Inc.


From: clamav-users  on behalf of G.W. 
Haywood via clamav-users 
Sent: Thursday, July 28, 2022 12:29 AM
To: Yang, Jiayi via clamav-users 
Cc: G.W. Haywood 
Subject: Re: [clamav-users] Inquire about clamav latest stable version -

Hi Jiayi,

Thanks for the extra information.  To answer your questions:

On Wed, 27 Jul 2022, Yang, Jiayi via clamav-users wrote:

> 1. If we use a relatively older version, for example, 0.103.6, which
> is supported by "RedHat & Fedora" and "Fedora & EPEL" package
> distribution currently. I will expect some new features and changes
> added to version 105 don't exist in version 103.

You are correct that new developments will take place in versions
which began their lives later in time, but supported versions are kept
patched for security vulnerabilities.

ClamAV versions are made up entirely of digits and dots but they
aren't really numbers because they have two dots.  The digit after the
second dot can be considered the 'patch level'.  At the moment three
versions are officially supported by Cisco's Talos, the authors of the
software.  The latest patch versions are 0.103.7, 0.104.4 and 0.105.1,
as you can see at

https://blog.clamav.net/

Unfortunately headlines in the announcements to the mailing list and
in the blog are wrong, stating that version 0.104.1 was released on
July 26th, but as you can see from the text it is really 0.104.4 which
was actually released.  At the time I write the version support matrix

https://docs.clamav.net/faq/faq-eol.html#version-support-matrix

is out of date - it does not show the latest released versions.  The
quality control at Talos leaves something to be desired which I have
mentioned on more than one occasion on this list.

Version 0.103.x source code uses the 'autotools' build system.  It is
the last version which will use autotools.  Versions 0.104.x, 0.105.x
and later use 'cmake'.  Support for 0.104.x will probably end soon, as
in the release announcements it's stated that 0.104.4 will be the last
patch version for the 0.104.x series.  I don't know what will happen
if a serious vulnerability is found before the stated end of support
for 0.104.x in the support matrix and I doubt that Talos does either.
My guess is that support would be withdrawn immediately rather than as
stated in the support matrix.

> While could I still assume version 103 is still supported (new
> patches will be added)

The version is 0.103 not 103 but yes, that is the 'Long Term Support'
version which will be supported until September 2023 according to the
version support matrix.

> and could still give decent malware scanning results?

I would never recommend that anyone rely on one single defence.

Every installation has particular sensitivities and will reside in a
different threat landscape, you'll need to make your own assessments
of the performance based on your own experience.  Mine are on record
in the archives of this mailing list, but bear in mind that we do not
scan 

Re: [clamav-users] Inquire about clamav latest stable version -

2022-07-28 Thread Joel Esler via clamav-users
ClamAV is a Cisco project.  There’s no arguing that. 

All of the original team are observed here: https://www.clamav.net/about

So, not sure what you’re getting at.  

— 
Sent from my  iPhone

> On Jul 28, 2022, at 16:56, Paul Kosinski via clamav-users 
>  wrote:
> 
> 
>> 
>> At the moment three versions are officially supported by Cisco's Talos, the 
>> authors of the software.
> 
> Cisco's Talos are the *current* authors of the software.
> 
> ClamAV was started in 2001 by Tomasz Kojm and a group of Open Source 
> enthusiasts. In 2007, they sold the software to Sourcefire (of Snort fame), 
> and the principal developers joined Sourcefire as employees.
> 
> Cisco acquired Sourcefire in 2013. Since the original software was covered by 
> the GPLv2 license, Cisco has kept the source code open (as they must), 
> including the many improvements they have made.
> 
> 
> The Wikipedia article on ClamAV barely mentions its origin, but it does have 
> two links:
> 
>  
> https://web.archive.org/web/20120206053729/http://www.emailbattles.com/2005/08/31/virus_aabejfhaib_ag/
>  
>  (Tomasz Kojm interview)
> 
>  https://web.archive.org/web/20080828173858/http://www.clamav.net/about/
> 
> The latter in turn links to the original developer team:
> 
>  https://web.archive.org/web/20080828173858/http://www.clamav.net/about/team/
> 
> 
> Disclaimer: I have never been associated with the development of ClamAV, but 
> I have used it since well before the Sourcefire acquisition. (I even have a 
> copy of the 0.88.4 source code from 2006!) 
> 
> In any case, I think the originators of ClamAV should get proper credit.
> ___
> 
> clamav-users mailing list
> clamav-users@lists.clamav.net
> https://lists.clamav.net/mailman/listinfo/clamav-users
> 
> 
> Help us build a comprehensive ClamAV guide:
> https://github.com/Cisco-Talos/clamav-documentation
> 
> https://docs.clamav.net/#mailing-lists-and-chat
___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat


Re: [clamav-users] Inquire about clamav latest stable version -

2022-07-28 Thread Paul Kosinski via clamav-users
> At the moment three versions are officially supported by Cisco's Talos, the 
> authors of the software.

Cisco's Talos are the *current* authors of the software.

ClamAV was started in 2001 by Tomasz Kojm and a group of Open Source 
enthusiasts. In 2007, they sold the software to Sourcefire (of Snort fame), and 
the principal developers joined Sourcefire as employees.

Cisco acquired Sourcefire in 2013. Since the original software was covered by 
the GPLv2 license, Cisco has kept the source code open (as they must), 
including the many improvements they have made.


The Wikipedia article on ClamAV barely mentions its origin, but it does have 
two links:

  
https://web.archive.org/web/20120206053729/http://www.emailbattles.com/2005/08/31/virus_aabejfhaib_ag/
 
  (Tomasz Kojm interview)

  https://web.archive.org/web/20080828173858/http://www.clamav.net/about/

The latter in turn links to the original developer team:

  https://web.archive.org/web/20080828173858/http://www.clamav.net/about/team/


Disclaimer: I have never been associated with the development of ClamAV, but I 
have used it since well before the Sourcefire acquisition. (I even have a copy 
of the 0.88.4 source code from 2006!) 

In any case, I think the originators of ClamAV should get proper credit.
___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat


Re: [clamav-users] Inquire about clamav latest stable version -

2022-07-28 Thread G.W. Haywood via clamav-users

Hi Jiayi,

Thanks for the extra information.  To answer your questions:

On Wed, 27 Jul 2022, Yang, Jiayi via clamav-users wrote:


1. If we use a relatively older version, for example, 0.103.6, which
is supported by "RedHat & Fedora" and "Fedora & EPEL" package
distribution currently. I will expect some new features and changes
added to version 105 don't exist in version 103.


You are correct that new developments will take place in versions
which began their lives later in time, but supported versions are kept
patched for security vulnerabilities.

ClamAV versions are made up entirely of digits and dots but they
aren't really numbers because they have two dots.  The digit after the
second dot can be considered the 'patch level'.  At the moment three
versions are officially supported by Cisco's Talos, the authors of the
software.  The latest patch versions are 0.103.7, 0.104.4 and 0.105.1,
as you can see at

https://blog.clamav.net/

Unfortunately headlines in the announcements to the mailing list and
in the blog are wrong, stating that version 0.104.1 was released on
July 26th, but as you can see from the text it is really 0.104.4 which
was actually released.  At the time I write the version support matrix

https://docs.clamav.net/faq/faq-eol.html#version-support-matrix

is out of date - it does not show the latest released versions.  The
quality control at Talos leaves something to be desired which I have
mentioned on more than one occasion on this list.

Version 0.103.x source code uses the 'autotools' build system.  It is
the last version which will use autotools.  Versions 0.104.x, 0.105.x
and later use 'cmake'.  Support for 0.104.x will probably end soon, as
in the release announcements it's stated that 0.104.4 will be the last
patch version for the 0.104.x series.  I don't know what will happen
if a serious vulnerability is found before the stated end of support
for 0.104.x in the support matrix and I doubt that Talos does either.
My guess is that support would be withdrawn immediately rather than as
stated in the support matrix.


While could I still assume version 103 is still supported (new
patches will be added)


The version is 0.103 not 103 but yes, that is the 'Long Term Support'
version which will be supported until September 2023 according to the
version support matrix.


and could still give decent malware scanning results?


I would never recommend that anyone rely on one single defence.

Every installation has particular sensitivities and will reside in a
different threat landscape, you'll need to make your own assessments
of the performance based on your own experience.  Mine are on record
in the archives of this mailing list, but bear in mind that we do not
scan machines for viruses, we only scan mail.  Primarily we scan for
spam, and incidentally for threats like viruses which are of little
concern to us here because of the very defensive way that we operate.


2. If we already use older versions (like version 103), upgrading it
to a minor version with patch release(like 103.6) will install the
bug fixes and give us a better using experience. While upgrading it
to a new major version(like 105) may require more extra work, such
as rust toolchain setup which is mentioned in the release note.


Correct, but (1) the toolchain setup is a once-only thing, and (2) if
you use a major Linux distribution and a reasonably well-supported
architecture you should have little difficulty installing the tools.
I did it on a Raspberry Pi just to see if it could be done.  It could,
but it took four hours to build it the first time.


I guess that's the reason why we release new major version 105 and
patch release versions for 103 and 104 together?


Your guess is as good as mine. :)


Sorry I may have some misunderstanding before. ...


No need for apologies. :)

--

73,
Ged.
___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat