they indeed do not fire with "clamdscan"

these mails which are *not phishings* and are the reason why i configured as second clamd and disabled that idiotic stuff in the milter-instance

http://lists.clamav.net/pipermail/clamav-users/2016-July/003113.html

-100 USER_IN_SPF_WHITELIST  From: address is in the user's SPF whitelist
-0.0 SHORTCIRCUIT Not all rules were run, due to a shortcircuited rule
-0.0 CUST_SHORTCIRCUIT1     Skip tests for whitelists and local relays

Am 15.02.2017 um 17:49 schrieb outre...@epsilon.com:
Dear all,

Please see the two source files attached for the English and German versions of 
the email.

Many thanks for your help,

Anne-Sophie

-----Original Message-----
From: clamav-users [mailto:clamav-users-boun...@lists.clamav.net] On Behalf Of 
Steven Morgan
Sent: 15 February 2017 16:33
To: ClamAV users ML <clamav-users@lists.clamav.net>
Subject: Re: [clamav-users] clamdscan mail file

Hi,

Can you try 'clamscan --phishing-scan-urls'?
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to