indeed, but seems the filter is looking for .com anywhere in the filename
string, rather than at the end... I say bad design.

in DMARC filenames end up with .xml, .zip or .gzip

On Tue, Aug 25, 2015 at 11:05 AM, Dave Warren via dmarc-discuss <
dmarc-discuss@dmarc.org> wrote:

> On 2015-08-25 09:56, John Levine via dmarc-discuss wrote:
>
>> As is standard settings in lot of AV mailscanners to not allow
>>> attachments as example with a .com in it.
>>> Therefore it is not a good idea that google is sending attachments DMARC
>>> with these filename !google.com!domain.comgjdsadg6777.zip   bacause of
>>> the .com names in it these are rejected in lot of AVscanners standard
>>> server settings for them, see also directadmin forum for that rejects
>>> frozen mail queu and so on.
>>> Please dont put a dotcom in the filenames attachment.
>>>
>> The format of DMARC reports has been unchanged for several years, and
>> there is software that expects the filenames the way they are now.
>>
>> Honestly, any AV scanner that depends on the filename is pretty
>> useless, since malware can and does trivially avoid it by using a
>> different name.  I'd suggest first arranging to send your DMARC
>> reports to an address with no content filters so your automated
>> anaylsis software can handle it, and look for more modern AV software.
>>
>
>
> I'd disagree about content filtering completely. There are some file
> extensions that are inherently dangerous in the Windows world and .COM is
> one of them. .COM is possibly the worst of the lot because of the one-two
> punch that users don't associate it with executable code (it's only
> supported for legacy reasons), and because users do associate it with the
> web in general. It's half a technical attack and half a social attack, so
> no, malware cannot simply use a different name to get the same result.
>
> Malware detection and blocking is really more of an art than a science,
> but looking for suspicious names is actually one of the things that has
> stood the test of time vs many other techniques simply because there is a
> limited set of extensions that are treated as executable code by Windows,
> and there are very few cases when sending executable code by email is a
> good idea.
>
> At the same time, I'd expect someone at the postmaster level to be able to
> configure exceptions so that they can receive abuse reports at appropriate
> abuse@ and postmaster@ addresses which may include "bad" content of a
> variety of types, and similarly, I'd expect DMARC addresses to be treated
> similarly, so even if globally changing the filenames were possible, I
> wouldn't actually recommend doing it.
>
> --
> Dave Warren
> http://www.hireahit.com/
> http://ca.linkedin.com/in/davejwarren
>
>
>
> _______________________________________________
> dmarc-discuss mailing list
> dmarc-discuss@dmarc.org
> http://www.dmarc.org/mailman/listinfo/dmarc-discuss
>
> NOTE: Participating in this list means you agree to the DMARC Note Well
> terms (http://www.dmarc.org/note_well.html)
>
_______________________________________________
dmarc-discuss mailing list
dmarc-discuss@dmarc.org
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to