Re: [Clamav-users] Script updated: clamav-unofficial-sigs.sh (v3.7)

2010-01-25 Thread John Rudd
 MSRBL (as it's no longer being updated)

And here's the answer from the actual project:

http://msrbl.blogspot.com/2010/01/msrbl-status-update-as-some-of-you-have.html

It's amazing what information you get when you actually talk to people.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Script updated: clamav-unofficial-sigs.sh (v3.7)

2010-01-24 Thread John Rudd
 removes MSRBL (as it's no longer being updated)

 Did they declare themselves to be defunct, or are you declaring it for
 them (without any actual announcement from them)?

 Do you have any indication that MSRBL is still alive and that the
 signature databases are being actively updated?

What do you mean by active?  within the last 6 months?  Yes.  And I
don't recall them having been a high volume of updates data source
before that.

 Or are you just trolling?

No, just trying to determine the credibility of the statement,
considering you've made unqualified announcements, about other
people's projects, in the past.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Script updated: clamav-unofficial-sigs.sh (v3.7)

2010-01-24 Thread John Rudd
 Then you don't have a clue and are obviously not qualified to make a
 judgment call on this matter.

They used to routinely have some signatures that would go weeks, even
months, without updates.  I used tolook at their signatures and see
that they were a month or two old ...   and a few months later, it was
still only a month or two old (so, clearly, they updated in the mean
time).  Most recent update from them was 3 months ago.  Two others
were 6 months ago.  Definitely pushing the envelope of their past
pattern, but it's more recent than a year ago, by a factor of 2x or
4x (depending on which signatures you look at).

 Only your orphaned botnet project.

Still not orphaned, still not in need of a new version, and you're
still not qualified to make that declaration.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Script updated: clamav-unofficial-sigs.sh (v3.7)

2010-01-24 Thread John Rudd
 Most recent update from them was 3 months ago.

 rsync rsync://rsync.mirror.msrbl.com/msrbl/MSRBL-SPAM.ndb
 -rw-r--r-- 244643 2009/07/27 01:21:23 MSRBL-SPAM.ndb

 rsync rsync://rsync.mirror.msrbl.com/msrbl/MSRBL-Images.hdb
 -rw-r--r-- 181337 2009/07/24 03:40:17 MSRBL-Images.hdb

rsync rsync://rsync.mirror.msrbl.com/msrbl/MSRBL-Images-FULL-SoN.hdb
-rw-r--r--19030813 2009/10/07 15:50:05 MSRBL-Images-FULL-SoN.hdb

3 months ago.

 Only your orphaned botnet project.

 Still not orphaned, still not in need of a new version, and you're
 still not qualified to make that declaration.

 Strange that others must provide patches for your project them, since
 you haven't provided an update in nearly 3 years.

Only a very few sites seem to need it, making it, as far as I've
observed, an edge condition.  Not a general need.  There hasn't been
any OTHER reason to make changes to it.  If there was something
critical and wide-spread, sure.  If there was a new feature to
incorporate, sure.  Neither of those are true.  And, as I've said
before, and you're well aware, the direction that the given patch goes
isn't the direction I want to go with botnet.

The change doesn't need to be in the general dist.  The change doesn't
fit the direction I want to go with the package.  There aren't any
other reasons to update it.  So there hasn't been a need to update it
in 3 years.  That doesn't make it orphaned.  It makes it not in need
of new releases.  If one of those needs comes up, if the plugin API
changes, or if I see the need for a new feature, it will get
addressed.

All of which gets back to: you have no business making announcements
about projects for which you aren't a spokesperson.  So, when you do
make those announcements, it's perfectly reasonable for someone to ask
you back up your statement ... because your statements lack
credibility.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Script updated: clamav-unofficial-sigs.sh (v3.7)

2010-01-24 Thread John Rudd
 rsync rsync://rsync.mirror.msrbl.com/msrbl/MSRBL-Images-FULL-SoN.hdb
 -rw-r--r--    19030813 2009/10/07 15:50:05 MSRBL-Images-FULL-SoN.hdb

 Only the clueless would use that database.

Which is irrelevant to the point.  The point isn't is it a
reasonable/accurate/etc. database, the point is it is/was still
active within the last few months, exactly within the behavior I
described.  Which goes back to the main point: your claims about other
people's projects aren't credible.

 Final thoughts: It's my script, if I want to remove a database (with or
 without justification), my prerogative.

No one said otherwise.  I didn't say you can't remove them.  I asked
about the source of your claim that they're no longer providing
updates, when they're still within the larger scope of their past
behaviors.  Given that you make unqualified claims about other
people's projects, I was asking for the source of your claim, so that
I could judge if it was real (and react accordingly in my own clamav
signature update script), or another assertion without credibility on
your part.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Script updated: clamav-unofficial-sigs.sh (v3.7)

2010-01-23 Thread John Rudd
 removes MSRBL (as it's no longer being updated)

Did they declare themselves to be defunct, or are you declaring it for
them (without any actual announcement from them)?
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


[Clamav-users] APER

2009-10-22 Thread John Rudd
Hope I haven't missed this one being discussed... but ...

APER is a project hosted at Google Code (Anti-Phishing Email Reply)
that tracks From, Reply-to, and Body URLs that match known phishing
attacks.  There are a few examples for how to use it ... but I was
wondering:

Has anyone turned this into a regularly updated set of ClamAV signatures?

I've been tasked with implementing it, and I'd love to be able to just
plug it into my existing regiment of ClamAV signatures (I currently
use MBL, MSRBL, and some (but not all) of the signatures hosted at
Sane Security).
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] APER

2009-10-22 Thread John Rudd
Check out Julian Field's ScamNailer:

http://www.scamnailer.info/

18/10/2009 - New scamnailer.ndb ClamAV signature database is now
available from http://www.mailscanner.eu/scamnailer.ndb. This is updated
very frequently. Do not download it more than once per hour!

Cheers,

Phil

While I have a lot of respect for Julian's work (I used to use
mailscanner), and it's great to see more anti-phishing resources ... I
don't see anything in the descriptions that says it's based on APER.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] APER

2009-10-22 Thread John Rudd
I have to ask however. You mentioned it contains phish urls as well.
I have not been able to find that. However, we track phish
urls/domains in winnow_phish_complete.ndb

Tom

When you download their distribution, you get 4 files:

phishing_cleared_addresses
phishing_from_addresses
phishing_links
phishing_reply_addresses


The file phishing_links is what I was referring to.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] APER

2009-10-22 Thread John Rudd
Firstly, spear.ndb generated from the APER feed and has been for a while now:

http://sanesecurity.co.uk/databases.htm

I didn't realize spear.ndb includes APER.  That's great news (as we
already use spear.ndb) ... looks like implementing APER is pretty
straight forward (and low effort) for me :-)

is spear using all 3 parts (from, reply, and links)?  Just want to be
sure, when our director asks.

Secondly, I've two more databases coming online soon based on their
feeds... watch this space, as they say ;)

Great!  I look forward to hearing more :-)

Cheers,

Steve
Sanesecurity


Thanks!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


[Clamav-users] Microsoft Power Point and Zip Files

2009-08-05 Thread John Rudd
(sorry if this has come up and I missed it)

Apparently, the later/latest versions of Power Point actually write
out zip files that are merely named .ppt (or something like that).
Internally, it's apparently representing the slides and images as
sub-files within the zip archive.  This means that large Power Point
presentations might have HUGE numbers of files in them, that might
exceed the ClamAV archive file format.  In fact, we've had some
reports that look just like that.

a) are other people seeing this problem? (was it fixed in a clamav
version during the last 12-18 months?)

b) has anyone solved it by just increasing the archive file limit?  If
so, what reasonable number have you come up with?

Other thoughts of conclusions about all of this? (other than don't
use MS Office -- that's outside the scope of my powers)


John
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] test for SafeBrowsing?

2009-03-18 Thread John Rudd
On Wed, Mar 18, 2009 at 05:55, Dennis Peterson denni...@inetnw.com wrote:
 Moray Henderson (ICT) wrote:
 From: Török Edwin [mailto:edwinto...@gmail.com]
 Try using a href=... for the URL.

 Is that a requirement? If so we should get the spammers on board because
 some of
 them may not know this :).
 No, there are more places from where URLs can be extracted, but a
 href is one that must work.

 With modern email clients helpfully presenting text that looks like a URL 
 as a real URL at the client end, SafeBrowsing really ought to check the 
 plain text, not just within html tags.  http://pastebin.com/m13232c54 may be 
 just plain text when transmitted and scanned, but it's an a href by the 
 time I read it: underlined, blue, and turns my cursor to a pointy finger 
 with a pop-up box saying Click to follow link.

 I don't imagine the world's premier spammers are sitting at their laptop in
 their shorts sending out thousands of spams with Thunderbird. There are 
 purpose
 built products for this and can format the mail any way they wish.


Whether or not they're sending using Thunderbird isn't relevant.

What's relevant is whether or not they know that the receiving mail
clients will try to turn plain text URL's into clickable links.  I'm
pretty sure that, no matter what sending tool they're using, they're
aware of this feature of modern mail clients.  And I'm also very sure,
from having seen it in the wild, that they exploit it.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] TROLL NEST (was Non-Windows Malware)

2008-12-10 Thread John Rudd
I think that was the point Dennis and I were making, with varying
degrees of subtlety and manners. :-)

On Wed, Dec 10, 2008 at 11:10, Jim Preston [EMAIL PROTECTED] wrote:

 Derek sed with a straight face:

 # Of course not. The arrogance of certain # dysfunctional clowns on this #
 list is outrageous. I never run into this # rubbish except at troll # dens,
 which apparently this is.

 It's a very recent problem - it started just a few days ago. Unfortunately
 you got here right at the beginning. Hopefully things will return to normal
 soon.

 Dp

 Actually, I think it was derek who started it..

 Best, Jim

 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://www.clamav.net/support/ml

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Non-Windows Malware

2008-12-09 Thread John Rudd
On Mon, Dec 8, 2008 at 19:25, Derek Currie [EMAIL PROTECTED] wrote:

 This list is incredible. Rudeness deluxe. Forgettable.

I don't suppose you've considered that you're the common element in
all of that.  Probably not.  Easier to blame the list (that had
extremely few problems with rudeness before you got here), or other
list members ... rather than looking inward at your own part of the
exchange.

You reap the crop you sow.  When you reap something a lot, you should
ask yourself what you've been sowing.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Announcing ClamAV 0.94.1 RC1

2008-10-17 Thread John Rudd
Tomasz Kojm wrote:
 On Thu, 16 Oct 2008 17:41:50 -0700
 John Rudd [EMAIL PROTECTED] wrote:
 
 Do you have any thoughts about how we can get the stats to you, so that 
 you can use them, without bypassing our mechanism for ensuring 
 consistent and safe updating of our virus signatures?
 
 You could just run
 freshclam --submit-stats=/path/to/clamd.conf
 on the hosts that get real traffic. Would that work for you? 

It would if I was using clamd... which I don't.

I use the clamav libraries via perl.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Announcing ClamAV 0.94.1 RC1

2008-10-16 Thread John Rudd
Tomasz Kojm wrote:
 
 Freshclam also submits information about detections with 3rd party signatures.
 


We only have one host in our environment that does freshclam (or any of 
the other virus signature update mechanisms).  It verifies the validity 
of the data (makes sure nothing will die as a result, etc.), and then 
pushes the new data out into a shared data space for the other hosts to 
pick up.  This is done both for our own internal safety/sanity check AND 
to ensure all of our production hosts get the same data at the same 
time.  It also means that no matter how many production hosts we have, 
we only impact each signature site with one database refresh per update 
cycle.

The host in question doesn't get much (if any) traffic, except when 
we're running tests.  So, even then, it only gets synthetic traffic, not 
real traffic.  Meanwhile, the hosts that get real traffic don't run 
freshclam at all.  Nor do we want those hosts to ever run freshclam (at 
least, we don't want them to ever run freshclam for the purpose of 
receiving new virus signatures).

Do you have any thoughts about how we can get the stats to you, so that 
you can use them, without bypassing our mechanism for ensuring 
consistent and safe updating of our virus signatures?

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] [0.0] Re: Stop it!

2008-10-07 Thread John Rudd
Jerry wrote:

 It is not the operating systems job to stop the user from shooting
 himself in the foot, but rather to deliver the bullet as
 efficiently and expeditiously as possible.

If that were true, we wouldn't have things like protected memory, chroot 
jails, etc. in our operating systems, as those all interfere with all 
sorts of bullets.

What you're describing is the caveman approach to providing systems 
and services.  And, over time, the discipline has evolved to understand 
that that's actually a rather counter-productive mindset.

Every level of the computing infrastructure provides safe guards to 
prevent people from doing exactly what you've said: shooting themselves 
in the foot.  The idea that the OS shouldn't be participating in that is 
outdated, and ignorant.

The idea that each application developer doesn't also have a role to 
play in those protections is of a similarly out-of-date and out-of-touch 
mindset.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Stop it!

2008-10-07 Thread John Rudd
Bowie Bailey wrote:

 However, doesn't this already exist with the upgrade notes?  Take a look
 here:
 https://wiki.clamav.net/Main/UpgradeNotes093
 
 I don't know if they are this detailed on all of the releases (the notes
 for 0.94 don't say much), but this looks like exactly what John was
 asking for.

That one is a GREAT example of what I'd like to see for every release 
that affects the config file.  And, you'll notice that the other 
Upgrade Notes pages make no mention of such changes.

If that's all there was, those Upgrade Notes pages, and they were 
consistently annotated with these sort of changes (in every release), 
and the location was well advertised, I'd be happy with it.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Stop it!

2008-10-07 Thread John Rudd
Dennis Peterson wrote:

 
 With the tools we have available to us today there is no reason a failed 
 process should remain a secret.
 

Which does not explain the push-back on having the 
applications/services/daemons provide better documentation and triggers 
for helping that effort, instead of immediately attacking the OP as 
though they're an inadequate sysadmin for having requested that higher 
level of participation from the application/service/daemon authors.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Stop it!

2008-10-04 Thread John Rudd

At the very least, when the config file and options change, the ClamAV 
team should post a notice which explicitly lists (and only lists):

1) new config items
2) removed config items
3) config items whose syntax, semantics, or options changed, and how
4) supported but deprecated items, and what, if anything, replaced them

This shouldn't just be buried in release notes, a read me file, or a 
change log.  It should be in those places _TOO_, but it should also 
exist as its own stand-alone statement that any one of us can easily see 
and find.


And what they REALLY ought to do is supply a tool which reads old config 
files, and does something like a lint check.  With multiple verbosity 
level options, it should read the existing config file, and say things 
like which lines have errors, what's wrong with this line, what 
parts of that line are no longer supported, and if possible give the 
new/current syntax for the line in question.  In the most trivial case, 
you should be able to invoke:

clamavcfgcompiler -o oldconfigfile -n newconfigfile

and it will generate the new config if there are no errors, generate 
STDERR reports for deprecated options that aren't show-stoppers, and 
generate STDERR reports and not generate a new config file if there are 
show-stopping errors.


For those who say as a sysadmin you should follow best practice X to 
prevent these problems... the same is easily leveled at the clamav 
developers.  They have best practices they should follow as well, with 
regard to supplying software that is commonly, widely known to be, and 
intended to be, used in such critical roles.

And, really, they no loner get to hide behind it being a community 
project, it's now owned by a company.  If they want to maintain the 
integrity of a company image that provides software that is reliable, 
especially reliable in mission critical roles, then they need to address 
this ASAP.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Stop it!

2008-10-04 Thread John Rudd
Jerry wrote:

 
 The sad part is that they will continue to blame others for their
 lackadaisical approach.

So, let me attempt to summarize your side of this here (and do correct 
me if my summary is wrong, as I'm not trying to build a strawman argument).

You're justifying the laziness of the developers by accusing the 
users/sysadmins of being lazy?  Seems a little hypocritical, doesn't it?


I'll put forward two counter-arguments to this:

1) No one is advocating laziness on the part of the user/sysadmin, we're 
requesting at least better information, and better organized 
information, from the developers so as to better support the 
users/sysadmins.  And, ideally, better tools to help their consumers as 
they change the infrastructure they provide.  Not so that their 
consumers can be lazy, but because every bit of due diligence on 
_everyone's_ part is good for the whole ecosystem.


2) The proper mantra of computing, due to the constant trend of 
providing computing resources becoming cheaper over time (and thus 
always becoming more cheap than the price of time of the consumer) is: 
it is the burden of the provider to leverage their resources so as to 
lessen the workload of their consumers.

I can go on and on about how this relates to the cost of a developer 
hour vs the cost of 100's of user hours, or the cost of a task in CPU 
dollars vs the cost of that task in human dollars, and how these always 
change in favor of the humans being more expensive than the 
computers/developers/sysadmins.  Or how this all feeds into each layer 
making their downstream consumers more productive and effective by 
automating the tasks, or bolstering the infrastructure, of their 
downstream consumers, freeing them up to take on bigger and more 
important/productive tasks.  But what it boils down to is:

- it is the burden of sysadmins to take on more work so as to lessen the 
workload of their users. (hopefully taking on this work by providing 
better streamlined services, and more effective and comprehensive 
infrastructure for their users to leverage)

- it is the burden of developers* to take on more work/tasks so as to 
lessen the workload of the sysadmins, users, and other (down stream) 
developers who are consuming what they're developing.

(* whether they are developing hardware, OSes, or applications)

(the burden of the user, incidentally, is to not rest more as their 
tasks become more automated, but to use the freeing up of their effort 
as a resource to apply in being more productive and effective, making 
society as a whole more productive and effective; thus, the role of 
computing in general is to support the advancement and productivity of 
society as a whole)

(and, while that may sound like a workers paradise, 
recreation/entertainment is an appropriate form of productivity in 
this sense, where that type of productivity is part of improving the 
enjoyment of our lives, so this applies equally well to computer games, 
computer supporting movie makers and other artists, etc.,  or making 
both our society and or lives better by making us much more productive 
during the work day, lessening the time spent working on our private 
lives, and thus letting us get out of do more basic forms of enjoyment 
with the rest of our time)


Anyone in the computing ecosystem who isn't embracing this is dead 
weight in the ecosystem, and thus dead weight to society, and should be 
treated as such.


The point of that lecture: lazy developers, who are doing things that 
get in the way of their customers being more productive by making it 
harder, instead of easier, to find information about important or 
critical changes in their software, are not playing their proper role in 
computing.  Thus, they are leaning toward being dead weight, and should 
be treated as such.

The fact that this is being pointed out to those developers doesn't mean 
that the sysadmins/users are trying to be lazy.  For those ignorant 
among you who are taking this point of view, the purpose of the request, 
instead, serves making those sysadmins have more time to empower their 
users, and making those users have more time to improve society.

Suggesting that it is just sysadmin laziness is at best specious and 
ignorant, and at worst being willfully obtuse.  Either way, it's 
counter-productive to the software ecosystem as a whole.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] Stop it!

2008-10-04 Thread John Rudd
Jerry wrote:
 On Sat, 04 Oct 2008 14:04:22 -0700
 John Rudd [EMAIL PROTECTED] wrote:
 
 Jerry wrote:

 The sad part is that they will continue to blame others for their
 lackadaisical approach.  
 So, let me attempt to summarize your side of this here (and do correct 
 me if my summary is wrong, as I'm not trying to build a strawman
 argument).

 You're justifying the laziness of the developers by accusing the 
 users/sysadmins of being lazy?  Seems a little hypocritical, doesn't
 it?
 
 So now you are accusing the developers of being a group of lazy
 bastards. I am sure that, that will encourage them to hasten a fix
 (which assumes something is broken, and I am not of that frame of mind)
 for your problem(s).

I never said bastards.  Thanks for conflating things, and continuing to 
show you're just taking the point of hypocrisy and willfully being 
obtuse.  Did you take lessons in de-railing discussions from Karl Rove? 
  I'm going to guess that next you're going to accuse me of having an 
interracial lovechild out of wedlock...

And, no, I'm not accusing the actual ClamAV developers as being lazy, 
I'm characterizing/summarizing the resistance argument (to the original 
request(s)) by the naysayers.

Nice attempt at a strawman, though.


 On a serious note, if you are so unhappy, and your tone definitely
 indicates that you are, the solution is easily within your grasp.

I'm not unhappy with ClamAV.  I'm unhappy with the naysayer arguments 
being given (by you and Dennis in particular).  They're childish, 
misleading, and counter productive to the overall software ecosystem 
(and ClamAV in particular).

ClamAV, in general, is a gem with rough edges.  A few of us are 
suggesting a means of refining a few of those rough edges.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread John Rudd
Eric Rostetter wrote:
 Quoting John Rudd [EMAIL PROTECTED]:
 
 Tilman Schmidt wrote:

 So why am I dissecting that list like this? Just to show that blocking
 or not blocking certain unusal characters in mail addresses is indeed a
 policy decision which should not be forced by a piece of software, 
 but at
 most offered as a configurable option.

 Absolutely agree.
 
 I disagree in this case (read on).
 
 It is not ClamAV's place to make policy decisions for
 me.
 
 And ClamAV does not.  The milter is.  And the milter is designed to
 work with sendmail.  And if leaving this enabled by default produces
 an exploitable sendmail, then it is wrong.

It does not.  What leaves an exploitable sendmail is a poorly configured 
sendmail.  The problem is already fixed, and properly fixed, in 
sendmail's own configs.  This makes it the wrong tool for the job.

Adding this to the milter is adding code to fix something that isn't 
broken.

It is never good to be the wrong tool for the job, nor fixing 
something that isn't broken.  And, therefore, it is doubly bad to be both.

Further, it imposes this fix upon mailers that don't have a 
vulnerability (keeping in mind that other MTAs can use milters now). 
That's three strikes*.


(* yes, I know most of the readers here might not be in the US, nor 
familiar with baseball metaphors, but hopefully they'll get that three 
strikes is a threshold of disqualification)


 I'm not saying it can't be configurable, but whether it is or not, it
 must be disabled by default, IIF it is known to make sendmail or the
 milter itself exploitable.

That would be true if and only if the proper fix didn't already exist 
within sendmail itself. (and I don't recall if it's the default in 
sendmail, or not ... but that doesn't matter, because the PROPER FIX is 
to use the sendmail config which stops the exploit ... that proper fix 
might be as simple as do nothing, if it IS the default)


 At most, it
 should offer me policy options, but only _options_.
 
 You would rather it allows you to become exploitable?  I wouldn't...

Nice strawman.

No, I wouldn't like to be exploitable.  And, without this feature, I 
wouldn't be (not even if I was running sendmail), because the fix 
already exists within its proper location (within sendmail itself).


 IMHO, the proper thing to do is to document this in the milter docs.
 Whether it becomes a configurable option or not, it should certainly
 be documented that the default is to block such addresses.

No, the proper thing to do is not fix things that aren't broken.  This 
is already fixed in the proper place.  At the most, the ClamAV team, 
and/or the clamav-milter team, should provide a STRONG recommendation 
that the sendmail config should use its existing technique for fixing 
the problem (which may be as simple as do nothing except don't overide 
the default).


 BUT, the point of my email is ClamAV is an anti-virus program,  its jobs
 is to match patterns and report the match. clamav-milter is a separate
 program, a milter for sendmail.  A milter is by definition a filter.  It's
 job IS to filter (see: https://www.sendmail.org/milter/), even though many
 people use them in a non-filtering way...  Don't confuse the two programs,
 or their functions.

Close, but not correct.

Milters in general exist to provide general filtering capability.  The 
clamav-milter is not a general milter.  It's a specific milter, whose 
specific purpose is to provide ClamAV capability via the milter interface.

Your argument here would be valid if the clamav-milter were a general 
purpose milter, such as MIME-Defang.  Or if it were a special purpose 
milter whose special purpose wasn't specifically providing ClamAV via 
the milter interface.

Again, it is providing a fix in the wrong location, and fixing something 
that isn't broken.


 It would be irresponsible for a milter to knowingly allow a security hole
 by default.

Incorrect.  It is irresponsible for a milter to allow a security hole IN 
THE AREA THAT THE MILTER ADDRESSES.  The clamav-milter isn't a general 
security tool, it is a _ClamAV_ milter.  By your logic, EVERY milter on 
the planet should waste its time doing EVERY security check known in 
order to be sure that not only is sendmail not mis-configured, but 
neither is every other milter in use.  That's wasteful, poorly 
conceived, and just a plain bad idea.

Use the right tool for the job.  Fix the problem where the problem exists.

The right tool for the job is the existing sendmail fix for the problem.

The proper location of the fix is within the sendmail configuration.

Not in EVERY milter on the system.  Not in ANY milter on the system.


 Protecting against such a hole is the only reasonable thing
 to do.  How to best protect that hole is still a subject of debate.

No, it is not.  The best protection for that hole already exists within 
sendmail.  Fixing it within the clamav-milter is _STUPID_.
___
Help us

Re: [Clamav-users] US-CERT alert regarding ClamAV

2008-04-17 Thread John Rudd
James Brown wrote:
 
 On 16/04/2008, at 4:33 AM, fchan wrote:
 
 This part of clamav-0.92 and new fix of a bug. 
 https://wwws.clamav.net/bugzilla/show_bug.cgi?id=613

 And in short we need to get gcc4.1.1 or newer to get this work on 
 Macintosh 10.4.11 and xcode 2.5 which only has an gcc 4.0.1. However 
 Apple hasn't released gcc 4.1.1 or newer for the Mac 10.4.11 so we are 
 left to use this an workaround for this an Japanese clamav user found 
 this and here is the workaround:
 export CFLAGS='-g'
 -g means debug mode building. Then configure and make as you have 
 done before.

 I hope this helps.
 Frank

 John Rudd wrote:
 Oh, and, while we're on the subject, what about 0.88.6?  is that 
 version
 vulnerable? (don't tell me to upgrade -- I haven't been able to get
 newer versions to compile on Mac OS X 10.4.x)
 
 Frank  John, I've used ./configure --enable-experimental CFLAGS=-O0 
 to get ClamAV (including 0.93 yesterday) to compile on Intel Macs (as 
 have others).

I'll check to see if it works on a PPC mac (I don't have a Intel Mac).
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-16 Thread John Rudd
Dave Warren wrote:
 In message [EMAIL PROTECTED] Stephen Gran
 [EMAIL PROTECTED] wrote:
 
 On Mon, Apr 14, 2008 at 05:22:56PM +0200, Bas van Rooijen said:
 postfix would accept all three forms even
 and why not ??
 I assume you haven't looked at sendmail's security record.  
 
 I, for one, have made it a point to not care.
 
 This has
 been a pretty standard thing to do for a long time, and with even more
 characters than the milter currently uses.
 
 Can we get any email address banned in clamav just because at least one
 software package has an associated exploit?

Especially when that exploit is easily, and MORE APPROPRIATELY, plugged 
in the software package itself, instead of acting as a potential 
bloating-agent in ClamAV?


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] US-CERT alert regarding ClamAV

2008-04-15 Thread John Rudd
Nigel Horne wrote:
 Roberto Ullfig wrote:
 Nigel Horne wrote:
 A vulnerability was identified by Secunia in 0.92.1 relating to the 
 PE module.
 We immediately disabled this module about a month ago. Since then we 
 have been
 working on, and produced, a fix which is included in 0.93. 0.93 is 
 due for release
 very soon, and all users are advised to update to this release with 
 immediate effect.
 0.93RC1 does not include the fix.

 Regards,


 By disabling the module do you mean to say that 0.92.1 is not 
 vulnerable? Why does CERT say otherwise?
 
 As soon as we found out about the vulnerability we issued a dconf update
 to switch off the affected module, upack. All 0.92.1 users are advised to
 upgrade to 0.93 immediately.

So, are 0.92.1 users temporarily safe due to the [freshclam?] update 
which turned off the module?  Or not?

By throwing in the trailing statement, you're confusing things.  Just 
answer the question about 0.92.1 being vulnerable, without repeating 
whether or not people need to upgrade.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] US-CERT alert regarding ClamAV

2008-04-15 Thread John Rudd
Nigel Horne wrote:
 Roberto Ullfig wrote:
 Nigel Horne wrote:
 A vulnerability was identified by Secunia in 0.92.1 relating to the 
 PE module.
 We immediately disabled this module about a month ago. Since then we 
 have been
 working on, and produced, a fix which is included in 0.93. 0.93 is 
 due for release
 very soon, and all users are advised to update to this release with 
 immediate effect.
 0.93RC1 does not include the fix.

 Regards,


 By disabling the module do you mean to say that 0.92.1 is not 
 vulnerable? Why does CERT say otherwise?
 
 As soon as we found out about the vulnerability we issued a dconf update
 to switch off the affected module, upack. All 0.92.1 users are advised to
 upgrade to 0.93 immediately.

Oh, and, while we're on the subject, what about 0.88.6?  is that version 
vulnerable? (don't tell me to upgrade -- I haven't been able to get 
newer versions to compile on Mac OS X 10.4.x)

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] US-CERT alert regarding ClamAV

2008-04-15 Thread John Rudd
John Rudd wrote:
 Nigel Horne wrote:
 Roberto Ullfig wrote:
 Nigel Horne wrote:
 A vulnerability was identified by Secunia in 0.92.1 relating to the 
 PE module.
 We immediately disabled this module about a month ago. Since then we 
 have been
 working on, and produced, a fix which is included in 0.93. 0.93 is 
 due for release
 very soon, and all users are advised to update to this release with 
 immediate effect.
 0.93RC1 does not include the fix.

 Regards,


 By disabling the module do you mean to say that 0.92.1 is not 
 vulnerable? Why does CERT say otherwise?

 As soon as we found out about the vulnerability we issued a dconf 
 update
 to switch off the affected module, upack. All 0.92.1 users are advised to
 upgrade to 0.93 immediately.
 
 Oh, and, while we're on the subject, what about 0.88.6?  is that version 
 vulnerable? (don't tell me to upgrade -- I haven't been able to get 
 newer versions to compile on Mac OS X 10.4.x)
 
 

er.. Sorry, I'm using 0.91.2, not 0.88.6, on my Macs.

(using 0.92.1 on my Solaris boxes)



___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-15 Thread John Rudd
Tilman Schmidt wrote:

 So why am I dissecting that list like this? Just to show that blocking
 or not blocking certain unusal characters in mail addresses is indeed a
 policy decision which should not be forced by a piece of software, but at
 most offered as a configurable option.

Absolutely agree.  It is not ClamAV's place to make policy decisions for 
me.  It is ClamAV's place to match email messages to signatures.  It is 
up to me what to do with messages that match signatures.  At most, it 
should offer me policy options, but only _options_.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread John Rudd
Török Edwin wrote:
 [EMAIL PROTECTED] wrote:
 Bas van Rooijen wrote:
   
 Thanks for the replies so far;

 however please note I already know the problem is ClamAV (hence i'm writing 
 to this list..)

 Is there anyone who can answer my actual questions?

 
 Comment out the check in the source and recompile?
 
 That check was added to prevent an exploit when run in black-hole mode.
 

Then maybe it should only be active when run in black-hole mode? (maybe 
it is, I don't know if that applies to the OP).

At the very least, shouldn't it have a config switch?
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread John Rudd
David F. Skoll wrote:
 Stephen Gran wrote:
 
 I assume you haven't looked at sendmail's security record.  This has
 been a pretty standard thing to do for a long time, and with even more
 characters than the milter currently uses.
 
 That may be true, but filtering suspicious recipient addresses is beyond
 the scope of a virus-scanner, IMO.  Much like my complaints about the
 PhishingScanURLs setting, I believe ClamAV should stick to the basics and
 leave other policy decisions alone.

Or at least leave them off by default, and make them things you can 
easily switch on and off.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Memory usage for clamd is huge

2008-03-31 Thread John Rudd
rick pim wrote:
 Dennis Peterson writes:
   But we know from the volumes of spam and viruses now approaching 
   if not exeeding 90% that you are the exception, not the norm.
 
 
 spam yes, viruses. not so much. our experience has been that
 email-borne viruses are way, way down: yesterday's logs from one of
 our mail gateways said there were about 15 viruses caught in something
 more than half-a-million email messages.
 
 phishing is up, of course, but viruses (i'm one of those folks that
 mentally files phishing under 'spam') are way down. 
 

Same observation here.

90-95% of my traffic is some sort of crap (spam, phishing/fraud, 
viruses, attachments with dangerous filenames), yes.

But a very very small percentage of that is detected viruses and 
attachments with dangerous filenames (we reject both during SMTP).  The 
VAST majority of what we're rejecting with ClamAV these days is 
phishing/fraud stuff.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Memory usage for clamd is huge

2008-03-31 Thread John Rudd
Dennis Peterson wrote:
 And to follow up on the earlier 
 point about Windows systems not being the sole source of spam/virus 
 distribution, 


The idea that any platform (windows, unix/linux, etc.) attached to the 
net cannot be subverted into being a spam/virus zombie is, at best, 
naive.  And a naive sysadmin is a danger to us all.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Memory usage for clamd is huge

2008-03-31 Thread John Rudd
Joe Sloan wrote:
 John Rudd wrote:
 Dennis Peterson wrote:
 And to follow up on the earlier 
 point about Windows systems not being the sole source of spam/virus 
 distribution, 

 The idea that any platform (windows, unix/linux, etc.) attached to the 
 net cannot be subverted into being a spam/virus zombie is, at best, 
 naive.  And a naive sysadmin is a danger to us all.
 
 I don't think anybody on this list has ever said windows can't be 
 subverted. The swarms of compromised xp boxes that are rented out in 
 blocks of 1000 or 1 for sending spam are proof enough of that.

 From reading the quotes, someone was suggesting that they're immune to 
compromises because they're not running windows.  That statement is 
covered by my assertion of that idea is naive.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Memory usage for clamd is huge

2008-03-31 Thread John Rudd
Joe Sloan wrote:
 John Rudd wrote:
 Joe Sloan wrote:
 John Rudd wrote:
 Dennis Peterson wrote:
 And to follow up on the earlier 
 point about Windows systems not being the sole source of spam/virus 
 distribution, 
 The idea that any platform (windows, unix/linux, etc.) attached to the 
 net cannot be subverted into being a spam/virus zombie is, at best, 
 naive.  And a naive sysadmin is a danger to us all.
 I don't think anybody on this list has ever said windows can't be 
 subverted. The swarms of compromised xp boxes that are rented out in 
 blocks of 1000 or 1 for sending spam are proof enough of that.
  From reading the quotes, someone was suggesting that they're immune to 
 compromises because they're not running windows.  That statement is 
 covered by my assertion of that idea is naive.
 
 I don't think they said they were immune to compromises, but that there 
 was no compelling case for the added expense of virus scanning all 
 outgoing mail in a non-windows environment.

That's not significantly different.

Just because they're in a non-windows environment doesn't mean they 
can't possibly be sending out viruses.  The person who expressed that 
is, as I said, being naive.  And, irresponsible.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] What's this? I can't believe it!

2008-01-21 Thread John Rudd
Gerard wrote:
 ... is totally
 unacceptable in any well organized business environment.


well organized business environment??

Is that like a frictionless surface?  or an ideal gas?
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Instability and Modern Anti-Virus Software

2008-01-02 Thread John Rudd
Randal, Phil wrote:
 [EMAIL PROTECTED] wrote:
 There is an article on eWeek.com today concerning instability in AV
 software due to the impossibility of adequately testing updates when
 releasing them as quickly as they are needed
 (www.eweek.com/article2/0,1895,2240656,00.asp?kc=EWKNLINF010208STR3).

 
 Just to force the point home, NcAfee yesterday released datfile 5197
 yesterday which erroneously detected JS/Exploit-BO virus on sites like
 ESPN and Friendster.
 
 They've since released dat 5198 to fix the problem.
 
 The problem of false positives from bad patterns or heuristics is, IMHO,
 a good reason for never doing on-demand full scans of filesystems.
 

No where near as good as Kaspersky identifying Internet Explorer as a 
virus, last month.  When I was walking my friend through fixing it, and 
trying to keep her from bursting out into tears over and over again (she 
thought she lost her novel), it was all I could do to balance concern 
for her vs a desire to burst out in laughter that some AV source had 
finally done the right thing :-)

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Email viruses almost non-existent?

2007-12-27 Thread John Rudd
Luis Miguel R. wrote:
 El Monday, 24 December del 2007 a las 10:55:51AM, Dennis Peterson escribió:
 Paul Kosinski wrote:
 In December 2006, we were running ClamAV 0.88.7, and there were still
 a fair number of real viruses being detected in inbound email. Now
 running 0.91.2 and 0.92, there seem to be only phishing attempts, and
 not even very many of them. In fact it seems that our log file shows
 almost as many (hourly) signature update messages as phish detections
 (much less real virus detections).

 Have other ClamAV users experienced a similar decline in email
 attacks?
 
 Yes.
 
 And this can be considered bad news for clamav integrators :).

Most of the viruses that I used to get are blocked by my 
bad-attachment-filename blocker.   Block the really inappropriate stuff 
(.exe, .com, .bat, .pif, and a list of about 20-30 others), and the 
number of viruses that trickle through to clamav is amazingly small.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Xandros infringing GPL and ClamAV copyrights

2007-11-24 Thread John Rudd

I'll throw in some cash toward legal fees in pursuing the case.  Let me 
know if it comes up, how much you need from general user contributions, 
and I'll see what I can contribute.  Hopefully others feel the same.



Stan Cunningham wrote:
 Hi,
 
 I'd like to inform you that Xandros has been selling a
 proprietary, closed source anti-virus application that
 is nothing more than a pretty shell to ClamAV.
 Importantly, the so-called Xandros Anti-Virus links
 to ClamAV headers, uses ClamAV resources and is a
 clear derivative work of ClamAV. The Xandros
 Anti-Virus application should therefore be licensed
 under the GPL. Nonetheless, the sources are nowhere to
 be found.
 
 I urge you to uphold your copyrights as ClamAV
 developers against this parasite company that has
 given nothing back to ClamAV or to the Linux/open
 source community.
 
 For more information on how to uphold your rights,
 please go to:
 
 http://gpl-violations.org/
 
 http://www.gnu.org/licenses/gpl-violation.html
 
 Thanks,
 Stan
 
 PS: Not only is Xandros a GPL-violator when it comes
 to multiple FOSS projects, but they also bought into
 M$'s patent protection racket.
 
 
   
 
 Get easy, one-click access to your favorites. 
 Make Yahoo! your homepage.
 http://www.yahoo.com/r/hs 
 
 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://lurker.clamav.net/list/clamav-users.html
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] ClamAV Vulnerability

2007-11-21 Thread John Rudd
G.W. Haywood wrote:

 
 Please either make a
 positive contribution or find another list on which to make trouble.


He IS trying to make a positive contribution.  He's trying to establish 
a best practice that fits for any production environment where the 
sysadmins care about their quality of service, and stability of 
features.  And he's arguing for the right things.

I'm certainly more interested in hearing from David, than hearing your 
useless prattle.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Phishing feature defaults, naming, and 0.92

2007-11-16 Thread John Rudd
rick pim wrote:
 who on earth upgrades
 from one beta to another and uses the same configfile???

Who on earth uses clamav in a way that requires a config file!?  how 
barbaric!

Any solution which only solves this problem via config file and/or 
command line switches is an unacceptable solution.



___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Accurate subjects (was Re: PhishingScanURLs is dreadfully slow/CPU-intensive)

2007-11-12 Thread John Rudd
Gerard Seibert wrote:
 On Monday November 12, 2007 at 01:29:41 (PM) David F. Skoll wrote:
 
 A request: When replying to an e-mail, please change the subject if it
 no longer reflects the thread topic.  I've been eagerly awaiting word
 on my complaings about PhishingScanURLs from Clam developers and the
 misleading subjects are giving me false hope that this problem will
 actually be addressed...
 
 That is not going to do a lot of good. The message will still be threaded 
 with all
 the other messages in that discussion. A new message should be constructed
 to start a new discussion when the subject changes.
 
 Out of curiosity, what is so difficult about setting 'PhishingScanURLs off' in
 the 'clamd.conf' file? Since the developers made that feature configurable,
 they have in fact addressed the issue.
 
 

What if you're not accessing clamav via clamd?

I don't need it to be off by default, but it'd be nice to be able to set 
the default setting as an argument to 'configure', since the method I 
use for accessing clamav doesn't let me turn it on and off (the perl 
module).

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Accurate subjects (was Re: PhishingScanURLs is dreadfully slow/CPU-intensive)

2007-11-12 Thread John Rudd
David F. Skoll wrote:
 
 Really?  All posters on this thread who gave an opinion wanted
 PhishingScanURLs off by default.  I invite users who want
 PhishingScanURLs to be on by default to come forward; I'll happily go
 with the majority decision.


If I have to choose between on vs off, then I go with off by default.

But, as I stated in another email, my true preference is default 
behavior set by 'configure'.  And I'm agnostic about what the default 
for 'configure' is if you don't tell it one way or the other.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] PhishingScanURLs is dreadfully slow/CPU-intensive

2007-11-09 Thread John Rudd
Tilman Schmidt wrote:

 (Remember the viruses ClamAV checks for
 are *Windows* viruses. A unixoid OS doesn't run ClamAV for its own
 protection but for the protection of Windows clients.)

OpenOffice isn't vulnerable to Office Macro viruses?

(I honestly don't know, just asking)
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] PhishingScanURLs is dreadfully slow/CPU-intensive

2007-10-30 Thread John Rudd
Daniel T. Staal wrote:
 On Tue, October 30, 2007 10:15 am, David F. Skoll said:
 
 (Our customers, in fact, always run ClamAV in conjunction with an
 anti-spam scanner, so it's no benefit to them to have Clam try to do
 anti-spam.)
 
 I usually find it a detriment: ClamAV is nowhere _near_ as good at
 distinguishing spam/phish emails as a most spam filters, and is much more
 prone to false-positives in particular.  So a 'spam' match from ClamAV
 means 'examine this file manually' whereas a spam match from a spam filter
 goes in the spambucket where it can be safely be ignored/deleted unless
 there is a reason to check it.

In general, the difference between AV and AS systems tends to be that AV 
systems are signature based, where Spam Assassin like AS systems are 
heuristic based.  Signature based AS systems tend to be rather accurate 
in terms of not having false positives, but tend to also have the 
vulnerability that they never catch new spam (they have to be trained 
for each variant of a given spam form).  Signature based software, IME, 
also tends to be faster than heuristic based software.  Heuristic 
software tends to be slower, but is able to detect new spam strains 
more effectively.

IMO: it's good to have both approaches to AS in your inventory.  First 
do signature based checks, because they're faster and should only 
eliminate known spam.  If the signature system flags the message, then 
don't submit it to the heuristic system ... thus lightening the CPU 
overhead and average message latency imposed by the heuristic system.

The problem I see with the Anti-Spam material in ClamAV is that it's not 
purely signature based.  It tries to be a little more speculative, and 
in the process gives up some of the advantages of a signature based 
scanning method: it loses some speed (in some cases, a lot of speed), 
and some accuracy.  But I don't see a problem with the approach in 
general ... I just think that if you're going to do AS work in ClamAV, 
you should limit it to signature based AS work, and not attempt to be 
heuristic about it.



As for what I do when ClamAV finds spam... I have code in my ClamAV 
module that does this:

1) If it's spam or phishing signature, accept the message, add a header 
identifying the message as spam and indicating which signature was 
triggered.  Better consistency of naming schemes for spam/phishing rules 
among the different signature sources could have made that easier, though.

2) If it's any other signature, reject the message during SMTP with a 
message indicating which signature was triggered.


In practice, I haven't found the need to actually turn on #1, but the 
code is there.  We did have one recent false positive, though (out of 
millions of messages scanned, even using the third party signature 
sources).  We're discussing whether or not to turn that feature on.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] PhishingScanURLs is dreadfully slow/CPU-intensive

2007-10-29 Thread John Rudd
David F. Skoll wrote:
 Hello,
 
 A client of ours had a bunch of machines whose CPUs were maxed out
 at 100% because of clam.  Changing PhishingScanURLs to no from the
 default yes dropped the load average from 70+ to about 3, and the
 CPU usage from 100% to under 50%.  This is under Linux, so it's not
 the broken Solaris regex library at fault.
 
 I have two questions, a practical one and a philosophical one:
 
 The practical one: Do others observe the very poor behaviour
 of PhishingScanURLs?  Is it perhaps hitting pathological cases of regex
 evaluation?
 
 The philosophical one: Do heuristics like PhishingScanURLs belong in a
 virus scanner?  I realize that once the engine is in place, it's
 tempting to add features, but I'm not convinced such things belong in
 a virus scanner.  I think they are more in the domain of anti-spam
 software, especially since it's good for security to keep your
 virus-scanner small, fast and secure and do more complex text analysis
 in a language other than C.  I guess I would vote for PhishingScanURLs
 to be no by default rather than yes.

I'm having a similar problem here.  Except I can't turn it off (I'm 
calling clamav via perl Mail::ClamAV).  But I can reliably take a 
message that was clogging my mail server, scan it with clamscan, and 
either have it completely hang without any arguments ... or have it 
finish almost instantly if I turn that off with a CLI argument.

I would be happy to either have it off by default ... or to have the 
option for turning it off added to Mail::ClamAV (tried to email the 
maintainer, but haven't had a response).

However, I _am_ experiencing this on Solaris (10, x86, on Sun Opteron 
boxes).

I can produce 2 examples of messages that cause the problem, in RFC822 
format, for anyone who wants to experiment with them.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] PhishingScanURLs is dreadfully slow/CPU-intensive

2007-10-29 Thread John Rudd
John Rudd wrote:

 I can produce 2 examples of messages that cause the problem, in RFC822 
 format, for anyone who wants to experiment with them.

I decided I'd just go ahead and make them available:

http://people.ucsc.edu/~jrudd/ClamAV/318642.mbox

http://people.ucsc.edu/~jrudd/ClamAV/318715.mbox

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] PhishingScanURLs is dreadfully slow/CPU-intensive

2007-10-29 Thread John Rudd
Steve Holdoway wrote:
 On Mon, 29 Oct 2007 19:25:14 -0700
 Dennis Peterson [EMAIL PROTECTED] wrote:

 I don't see where Linux is unique in this regard. I also don't see why the 
 success of 
 Linux is particularly important vs BSD, Solaris, Windows, etc. But I suppose 
 that 
 discussion is for another forum.

 dp
 
 I think the OP may beconsidering linux as a desktop. Personally, I've no 
 problems with security in a server environment.

I don't think that was dp's point.  I think dp's point was that we 
aren't a linux forum, so a linux needs X in order to forge ahead 
agenda might have _some_ followers here, but it'll also get lots of 
yawns here.  From myself included.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Does clamav protect against rootkits?

2007-10-14 Thread John Rudd
Rob MacGregor wrote:
 On 10/14/07, Aniruddha [EMAIL PROTECTED] wrote:
 Thanks for the answers, does anyone know this for sure?
 
 Quoting the ClamAV home page:
 
 ...designed especially for e-mail scanning on mail gateways.
 
 So no, it's not designed to detect rootkits.
 

Though, it might be interesting if someone came up with a set of 
signatures that matched known rootkits on various platforms.  It would 
probably turn out to be kind of a large signature database, though, just 
because it will have to use unique signatures for each OSxProcessor (and 
possibly xCompiler, and possibly x2 for static vs dynamic linking).

It's not going to be something someone throws together over night, but 
probably would be useful to the security community in general.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Error downloading Malware sigs

2007-09-27 Thread John Rudd
Gerard wrote:
 Has anyone other than me been having problems download the Malware
 signature files for the past 24 hours?
 
 http://www.malware.com.br/cgi/submit?action=list_clamav

I'm getting the errors too, both on my home machines and my work machines.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Missing Freshclam after upgrade to clamav-0.90.3-1.fc7

2007-09-15 Thread John Rudd
Steve Holdoway wrote:


 I think that you're falling into the all too common trap that sysadmin
 work is really tedious, so the top priority is to use the solution that
 takes the minimum time to implement, regardless of it's inherent quality.
 I reckon that package management is *NOT* the solution for a production
  server.

I would modify what you've said only in that, internally generated 
packages are good time savers and consistency builders for a sysadmin. 
But, by that, I mean you build the software from source, and then build 
the pkg/rpm yourself, and distribute the package to yourservers 
yourself.  That means you put into production the same package, built 
exactly the way you need it, built exactly the way you built on your dev 
machines, and tested on your test machines.

But, for a professional sysadmin, dealing with mission critical servers, 
blindly depending upon other people's packages isn't such a great idea.


 Obviously this is just my opinion, and I know it's not that popular -
 but it's the distillation of what I have learnt the hard way over more
 than 23 years ( just checked my CV! ) of relevant experience.

Yeah, one of the worst aspects of the open source community at large is 
upgrade upgrade upgrade upgrade.  Just because you can, and it's 
free, you should.   upgrade early, and upgrade often.

A good sysadmin knows that that's the path of fools.

Introduce new versions into your dev environment.  Make sure it 
functions the way you want, does what you want, etc.  Then package it up 
and install it on your test machines.  Let your test machines run with 
it for a good solid long time (weeks).  Enough to _prove_ it does what 
you want/need it to when under load, etc..  Then you have to wait for a 
window when you can make a change to your production service environment 
without it undermining your service.

For me, that window happens at the end of each academic quarter (after 
finals, after grades are due the following Tuesday, THEN I can make 
changes).  So, if a new version of software comes out in September, I 
wont be deploying it until December.  Chances are, if a new version 
comes out in late November or early December, I wont put it into 
production until late March (spring break) ... because late November 
isn't enough time for me to put it through its paces and deploy it in 
mid/late December.  (as a non-strict rule of thumb, I would estimate 
that for me to deploy in December, it would have to be released no later 
than October)

So, I see people who upgrade production mission critical systems to new 
versions of a software package within 2 days as just being quite a bit 
insane and reckless.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Missing Freshclam after upgrade to clamav-0.90.3-1.fc7

2007-09-14 Thread John Rudd
Graeme Nichols wrote:

 
 Anyone any ideas please?

Build and install from source?

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] signature names

2007-09-12 Thread John Rudd

(to the developers, not in answer to Burnie)

See, the current name scheme needs to be fixed.  And no one responded at 
all to my proposed scheme from a month or two ago.


Burnie wrote:
 Just a bit curious - what classification is this signature?
 I can't find this naming scheme mentioned somewhere.
 
 
 ClamAV database updated (11 Sep 2007 19-32 +): daily.cvd
 Version: 4244
 
 Submission-ID: 1710033
 Sender: rafael
 Added: Email.Foolball-2
 -
 
 The reason I'm asking is that I have to distinguish between 
 spam/pishing and viruses and are doing this by the signature name.
 
 A prefix of 'Email' just won't give any clues, I already knew 
 it was an email :)
 
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] signature names

2007-09-12 Thread John Rudd
Andy Fiddaman wrote:
 On Wed, 12 Sep 2007, Karsten Bräckelmann wrote:
 
 ; On Wed, 2007-09-12 at 07:28 -0700, John Rudd wrote:
 ;  (to the developers, not in answer to Burnie)
 ; 
 ;  See, the current name scheme needs to be fixed.  And no one responded at
 ;  all to my proposed scheme from a month or two ago.
 ;
 ; Coincidentally, my very first question on this list years ago was about
 ; naming conventions (or the lack thereof), too. :)
 
 It's not just core Clam signatures either, SaneSecurity recently changed
 the capitalisation on some of their sigs which caused me a few issues (I'm
 checking case-insensitively now!) The same thing happened when
 Phishing.Email changed to Phishing.Heuristics.Email on 29/6.
 
 Standardising prefixes would be excellent for those of us who make
 decisions based on what's coming back.

Yup.  Caused me an issue too.  Suddenly I had an unexpected source of 
virus signatures in my metrics.  I didn't appreciate that at all.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] signature names

2007-09-12 Thread John Rudd
Dennis Peterson wrote:
 Karsten Bräckelmann wrote:
 On Wed, 2007-09-12 at 07:28 -0700, John Rudd wrote:
 (to the developers, not in answer to Burnie)

 See, the current name scheme needs to be fixed.  And no one responded at 
 all to my proposed scheme from a month or two ago.
 Coincidentally, my very first question on this list years ago was about
 naming conventions (or the lack thereof), too. :)

   karsten


 
 That probably means names are really not all that important in the big 
 picture.

...

 There are much more important things to be concerned with than what a 
 virus is called. 

You're awfully cavalier about what's important to other people's email. 
  The fact that they're not important to you does not mean that they are 
unimportant.

For example, under my proposed scheme, I could easily decide to:

1) reject viruses during SMTP
2) accept, but hold in quarantine, messages matching phishing sigs
3) accept, but mark as possible spam, messages matching spam sigs
(and possibly even rating the likelihood of spam based upon a
false-positive reputation score for the given signature source)

But, without a coherent and explicit name convention, the rules for 
doing so would be so complex as to be not be worth the effort in writing 
them.  In some cases, it's even ambiguous as to which of the above 
categories a given message falls in to.

The only people dismissing the name convention as unimportant are 
people who aren't paying attention to the bigger picture (in that 
they're only looking at what's important in their own part of the picture).

I'll even volunteer some of my time to help develop the name scheme 
(I've already put one such scheme forward), and to help re-organize the 
signatures that are already out there.  I'm not just complaining, I'm 
offering to be part of the solution.

Yet, all I've gotten on this, until today, is total silence.





___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] signature names

2007-09-12 Thread John Rudd
Kelson wrote:
 John Rudd wrote:
 But, without a coherent and explicit name convention, the rules for 
 doing so would be so complex as to be not be worth the effort in writing 
 them.  In some cases, it's even ambiguous as to which of the above 
 categories a given message falls in to.
 
 Or, alternatively, a piece of metadata associated with each signature 
 that indicates its category, which is returned as part of the results.
 
 Advantage: conceptually cleaner than messing with the name.
 Disadvantage: need to change calling methods to handle another return 
 field; need to decide on categories; will eventually need to add categories.
 

I would be fine with a metadata solution, but part of that information 
is clearly already being put into the virus name; if you start to put it 
into metadata, then the virus name might as well just be a number.

And, the infrastructure for getting that metadata should be very easy to 
work with (a well documented argument to clamscan/clamdscan, a well 
documented set of calls into libclamav, and a well documented set of 
calls into the various scripting interfaces to clamav).


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] MBL?

2007-09-11 Thread John Rudd

Did something happen to the MBL signature source?  yesterday my 
automated script got all errors for the download content, and today it's 
complaining about it not existing.

Is it as simple as the URL changing?  or did it go away entirely?




___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] clamd load spikes

2007-08-28 Thread John Rudd

Is anyone seeing a surge clamd loads today?  Or has everyone upgraded 
from 0.88.6 and 0.91.2 doesn't have the problem anymore?


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] As soon as Sourcefire starts charging for virus updates,

2007-08-27 Thread John Rudd
Sergei Lavrov wrote:
 people will stop contributing signatures, right ?


Or they'll start contributing more to the 3rd party signature databases, 
instead (MSRBL, MBL, SaneSecurity, etc.).

If the engine is free, but the signatures aren't, you don't need to go 
to Sourcefire for your signatures.

If the engine stops being free, then we can all fork off a free version 
of the engine based upon the last open-source version.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] clamav 0.91.2 is out. Don't use it.

2007-08-21 Thread John Rudd

It has a dangerous (lack of) value for CL_SCAN_STDOPT.  You're better 
off not upgrading until they fix it.

(filed as bug 631, but it's nothing new: CL_SCAN_STDOPT still doesn't 
include CL_SCAN_PHISHING_DOMAINLIST; that omission can cause crashing 
and hanging on certain platforms ... the clamav team already knows about 
this problem, and they even enable that option as a default in clamscan, 
just not in the CL_SCAN_STDOPT defined value ... my suggestion is to not 
upgrade until they release a version that fixes this problem)

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] clamav 0.91.2 is out. Don't use it.

2007-08-21 Thread John Rudd
Tilman Schmidt wrote:
 John Rudd schrieb:
 (filed as bug 631, but it's nothing new: CL_SCAN_STDOPT still doesn't 
 include CL_SCAN_PHISHING_DOMAINLIST; that omission can cause crashing 
 and hanging on certain platforms ... the clamav team already knows about 
 this problem, and they even enable that option as a default in clamscan, 
 just not in the CL_SCAN_STDOPT defined value ... my suggestion is to not 
 upgrade until they release a version that fixes this problem)
 
 Browsing the source, I see that clamd also sets this by default, and
 would even emit a log message:
 
 Phishing: Checking all URLs, regardless of domain (FP prone).\n
 
 if overridden by the PhishingScanURLs option in clamd.conf.
 
 So am I correct in assuming that clamd isn't vulnerable as long as that
 warning message does not appear in the log, and that users of either
 clamd or clamscan can upgrade without fear?
 

Let me clarify.

My statement to not upgrade isn't mainly on the point of safety.  My 
statement is because the clamav team have known about this problem for a 
while, and continue to do nothing about it.  I'm saying don't upgrade 
until they fix this easy to fix, but very troublesome, issue.

Some specifics:

- the problem is in using libclamav, not in using clamd nor clamscan. 
For example, if you're using the Mail::ClamAV perl module, you've got to 
worry about this problem.

- the platform _I_ have experienced the problem with is solaris 10 x86, 
but when I was figuring out the source of the crashing, it was pointed 
out to me by someone else, and the inference was that this happens on 
more than just my platform.  Though, I can also state that I haven't 
seen the problem on Mac OS X on PowerPC, where I use the exact same code 
base.

- the problem would be trivial for them to fix, it's just a one line 
change in clamav.h  ... all that has to be done is a simple change to 
include CL_SCAN_PHISHING_DOMAINLIST in the definition of CL_SCAN_STDOPT

- there's also the simple issue of orthogonality (as in orthogonal 
instruction set) in the feature set.  The default behaviors should be 
the same across the spectrum of interfaces to the clamav functionality.
- clamscan: the default behavior implies CL_SCAN_PHISHING_DOMAINLIST
- clamd: the default behavior implies CL_SCAN_PHISHING_DOMAINLIST
- libclamav: the default does NOT imply CL_SCAN_PHISHING_DOMAINLIST

Thus, the choices for accessing clamav's virus detection 
functionality are NOT orthogonal.  This is, IMO, a design flaw.  And, as 
I said, an easy to fix design flaw.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Sourcefire acquires ClamAV

2007-08-17 Thread John Rudd
James Kosin wrote:
 Tomasz Kojm wrote:
 Ed Kasky wrote:
 Tomasz Kojm wrote:

 lead the advancement of ClamAV and the CVD as employees of Sourcefire.
 Both the ClamAV engine and the signature database will remain under GPL.

 Until they start charging for current updates, etc. like they do with
 Snort...

 you should rest assured that the virus database will stay GPL and will be
 distributed the same way as so far, Sourcefire has no intention of changing
 this.
 
 I'm complaining now...  because the virus database is not the source
 to build the binaries.  If hey are only saying the virus database is
 the ONLY part to stay GPL we may have to pay through the nose for the
 source to build the compiled binaries!
 
 I'm HOPING this hasn't happened and you mis-typed your reply.

The original email said that BOTH would remain under the GPL.

However, there's nothing about the GPL that prevents them from charging 
money.  GPL is free as in speech, not free as in beer or lunch.  After 
all, I made a nice chunk of change working for a company that made free 
software expensive (Cygnus with gcc/gdb).

On the other hand, if sourcefire starts to charge money, there's nothing 
that would prevent the community from starting a new distribution of the 
codebase, either.


I don't exactly blame the ClamAV team for doing this.  It's entirely 
within their rights, and it has been nice that they've had ClamAV out 
there in the form it has been for all of this time ... but it was also 
nice to have a non-corporate driven AV solution out there, especially 
one that had the solid reputation of ClamAV.  No matter what sourcefire 
does with the project, completely free or subscription driven, etc., the 
fact is that ClamAV isn't the same starting today.  It's now just 
another AV product, instead of a community project.  That's kind of sad.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Sourcefire acquires ClamAV

2007-08-17 Thread John Rudd
Mike Guiterman wrote:

 
 Q.  When will Sourcefire begin to integrate ClamAV technology into its 
 products?
 A.  Sourcefire intends to offer support and training services to ClamAV 
 users beginning in Q4 2007.   We anticipate offering products based on 
 ClamAV as a part of our Enterprise Threat Management product family in 
 the latter half of 2008.

So, it may take the MIMEDefang approach?

Where Can-IT is a commercial product that includes MIMEDefang at its 
core, and MIMEDefang is, and remains, a free (both speech and 
beer/lunch) project?  (I hope David, who is also on this list, doesn't 
mind me using him as an example)

That would be very encouraging.  I wouldn't mind that at all.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] phishing header matches

2007-08-10 Thread John Rudd
Scott Beck wrote:
 Hi,
 
 Another note on this issue. Someone just reported that without the
 CL_SCAN_PHISHING_DOMAINLIST option set they are seeing libclamav hang.
 Please consider adding this to CL_SCAN_STDOPT or remove the option and
 turn it on internally always or reverse the option and have something
 like CL_SCAN_PHISHING_NODOMAINLIST.

Yup.  That'd be me.

(thanks for re-reporting it here, Scott; and thanks for your help 
figuring it out)

On the one hand, tracking this down helped me learn a lot more about 
ClamAV, and the various options... I was able to refine and streamline 
my code quite a bit, and eliminate various things I didn't actually need 
to do.  But ... for all that I value learning experiences, I would like 
to strongly make one statement:

The default behavior of clamscan should match the standard options. 
If clamscan/clamdscan, by default, does CL_SCAN_PHISHING_DOMAINLIST, 
then that should be in CL_SCAN_STDOPT.  Anything else that 
clamscan/clamdscan do by default should also be in CL_SCAN_STDOPT. 
Anything that clamscan/clamdscan don't do by default should NOT be in 
CL_SCAN_STDOPT (though I don't think anything falls into that category).

If you're going to not add CL_SCAN_PHISHING_DOMAINLIST to 
CL_SCAN_STDOPT, then stop having clamscan/clamdscan use it by default. 
Make it a command-line option.

(though, my recommendation is: add CL_SCAN_PHISHING_DOMAINLIST to 
CL_SCAN_STDOPT ... I agree with Scott that it's a useful and necessary 
function)




___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] (not-exactly-a-Feature) Request

2007-08-04 Thread John Rudd

Identifying the exact nature of a signature, just from the name, is a 
major pain.  Especially when you throw in the 3rd party signatures.  The 
location in the signature name of the authority it came from varies from 
group to group (and isn't present in the ClamAV signatures at all). 
Whether it's virus/malware/trojan/worm or just a phishing/fraud or spam 
signature is handled differently by each authority.  It's just a _MESS_, 
on the part of _ALL_ of the signature authorities, including ClamAV's 
official signatures.


I'd like to see better organization on this front.  My suggestion is:

A signature name is a dot separated 4-tuple or 5-tuple, with the 
following fields:

   - the first field is the signature source:
  ClamAV, Sanesecurity, MBL, MSRBL, etc.

   - the second field is the signature category:
  Virus, Worm, Malware, Trojan, Exploit, Scam or Fraud or Phishing,
  Spam, Archive, etc.

   - the third field is the platform/mechanism abused:
  Win32, MacOSX-x86, MacOSX-ppc, Linux-x86, Solaris-x86,
  Solaris-Sparc, FreeBSD-x86, NetBSD-x86, NetBSD-all,
  Image, PDF, MS-Macro, HTML, Zip, etc.

   - the optional fourth field is a signature sub-category
  Stock, Spyware, virus-family-name, etc.

   - the last field is an exact signature ID


Further, the first 3 fields would need to be universally agreed upon 
(dictated by ClamAV, IMO).

So, this: Email.Stk.Gen588.Sanesecurity.07071604.pdf
  becomes: Sanesecurity.Spam.PDF.Stock.Gen588-07071604

This: Worm.Mydoom.M
  becomes: ClamAV.Worm.Win32.Mydoom.M

This: HTML.Phishing.Bank-3
  becomes: ClamAV.Fraud.HTML.Bank.3
   or: ClamAV.Phishing.HTML.Bank.3

This: Zip.ExceededFilesLimit
  becomes: ClamAV.Archive.Zip.Exceeded.FilesLimit

  (which might also mean there'd be ClamAV.Archive.Zip.Exceeded.Size 
ClamAV.Archive.Zip.Encrypted or even ClamAV.Archive.Rar.NotAllowed, if 
all rar files are blocked)




This would make it a LOT easier to decide how to handle a given match in 
a programmatic manner.  For example, if I have a sendmail-milter and I 
want to reject viruses, worms, and malware, but I want to merely mark a 
header for things like Phishing/Fraud Scams or Spam, I could do 
something like:


if ($virusname =~ /\.(Scam|Fraud|Spam)\./) {
add_a_header_and_accept();
}
else {
send_smtp_5xx_response();
}


Or, perhaps I want to do it by signature authority, because I've heard 
some signature authorities might have false positives:

if ($virusname =~ /^ClamAV\./) {
send_smtp_5xx_response();
}
elsif ($virusname =~ /^Sanesecurity\./) {
do_sanesecurity_action();
}
elsif ($virusname =~ /^MBL\./) {
do_mbl_action();
}
elsif ($virusname =~ /^MSRBL\.) {
do_msrbl_action();
}
else { # some new signature authority I haven't specifically handled yet
add_a_header_and_accept();
}


The point is, whether you go with my suggestion or some other idea, 
imposing _SOME_ kind of structure on the signature names is, IMO, 
necessary.  It needs to be formalized, and required of all signature 
authorities.  When someone wants to add a new possibly value to the 
first 3 fields of the tuple, I'd suggest that it have to be blessed by 
some group (the clamav developers?  a side-group with some of the clamav 
developers and some of the other authority members, whatever).



___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Greeting Card virus

2007-07-19 Thread John Rudd
Jeff Thurston wrote:
 Jeff Thurston wrote:
 I thought ClamAV was able to catch these Greeting Cards from family
 member, our domain keeps getting these emails in large quantities even
 after upgrading to ClamAV 0.90.3 recently.

 Do I need to upgrade again to .91?? I'm hesitant to do this so soon as
 it
 was a bit of a hassle going from 0.88.4 to 0.90.3, not to mention at the
 time I did the upgrade the website front page said that ClamAV was one
 of 4
 scanners able to detect the virus.

 Did I misunderstand that statement thinking it meant both the downloaded
 payload as well as the email its self? What can I do with ClamAV to stop
 the
 emails in the first place?

 Thanks.

 Get the highly regarded sane signatures:

 http://sanesecurity.co.uk/clamav/

 Look under Usage for download scripts.

 MrC
 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://lurker.clamav.net/list/clamav-users.html
 
 Thanks, done this, tested it, still getting greeting cards, enabled URL
 scanning, still getting them, checked my main database version, it's
 reporting
 
 ClamAV 0.90.3/3700/Thu Jul 19 06:13:47 2007
 
 main.cvd is up to date (version: 43, sigs: 104500, f-level: 14, builder:
 sven)
 daily.inc is up to date (version: 3700, sigs: 34427, f-level: 16, builder:
 ccordes) main.cvd is up to date (version: 43, sigs: 104500, f-level: 14,
 builder: sven)
 daily.inc is up to date (version: 3700, sigs: 34427, f-level: 16, builder:
 ccordes)

That report doesn't include the sane security files.

Where did you put phish.ndb and scam.ndb?

You didn't leave them gzipped, did you?

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] automated response

2007-07-19 Thread John Rudd
Christopher Checca wrote:
 I will be on vacation until July 30, 2007.


Think his house is unoccupied?  Maybe we can throw a party ...
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] Third party signature databases

2007-07-12 Thread John Rudd

 From past discussion on this list, it was discussed how easy it would 
be to throw together a script to check validity before putting a message 
into production.  But I don't recall anyone ever actually offering up 
their script.   Earlier today, someone had posted something to the 
SpamAssassin list that showed they weren't properly handling downloaded 
signature databases, and it just so happens that I just got around to 
writing such a script the other day.

So I thought I'd post it here for review/criticism/distribution.

One note: the reason I use the %destdirs hash, even though they're all 
the same destination, is that I plan in the future to use multiple 
instances of Mail::ClamAV running from different directories, each with 
a different source of signatures.  Right now it's 1 clamd running with 
all of the sigs, though, so it's all 1 destination.


Also, be careful of line wraps caused by email... I'll try to put this 
up on a web page in the nearish future.


---


Here's the script I use for importing from MSRBL and Sanesecurity.  I
run it out of cron with -all, on the hour.  You'll probably need to
modify some bits of the first few lines (down to the rsync binary location):

#!/usr/local/bin/perl

my $chmod = /bin/chmod;
my $mv = /bin/mv;
my $gunzip = /usr/bin/gunzip;
my $clamscan = /usr/local/bin/clamscan;
my $testfile = /bin/sh;
my $diff = /usr/bin/diff;

my %methods =
(http  = /usr/local/bin/wget -q,
 rsync = /usr/bin/rsync -q);

my %urls =
(msrbl-spam = rsync://rsync.mirror.msrbl.com/msrbl/MSRBL-SPAM.ndb,
 msrbl-imgs =
rsync://rsync.mirror.msrbl.com/msrbl/MSRBL-Images.hdb,
 sane-phish =
http://www.sanesecurity.com/clamav/phishsigs/phish.ndb.gz;,
 sane-scam  =
http://www.sanesecurity.com/clamav/scamsigs/scam.ndb.gz;);

my %tmpdirs =
(msrbl-spam = /tmp/msrbl,
 msrbl-imgs = /tmp/msrbl,
 sane-phish = /tmp/sanecomputing,
 sane-scam  = /tmp/sanecomputing);


my %destdirs =
(msrbl-spam = /var/lib/clamav,
 msrbl-imgs = /var/lib/clamav,
 sane-phish = /var/lib/clamav,
 sane-scam  = /var/lib/clamav);


my $getall = 0;
my (@distros, $dist, $tmpdir, $proto, $method, $file, $retcode);
my ($ufile, $diffout, $destdir);

if ($ARGV[0] =~ --?al?l?) {
$getall = 1;
@distros = keys(%urls);
}
else {
@distros = @ARGV;
}

foreach $dist (sort (@distros)) {
$tmpdir = $tmpdirs{$dist};
$destdir = $destdirs{$dist};
$url = $urls{$dist};
$proto = $url; $proto =~ s/:.*$//;
$method = $methods{$proto};
$file = $url; $file =~ s^.*/([^/]*)$$1;
$ufile = $file; $ufile =~ s/\.gz$//;

if ((-e $tmpdir)  (!(-d $tmpdir))) {
   rename ($tmpdir, ($tmpdir . .bad))
  || die tmpdir $tmpdir isn't a directory, can't rename it;
   mkdir ($tmpdir) || die can't make tmpdir $tmpdir;
   }
elsif (! (-e $tmpdir)) {
   mkdir ($tmpdir) || die can't make tmpdir $tmpdir;
   }
system ($chmod 700 $tmpdir);

if ((-e $destdir)  (!(-d $destdir))) {
   rename ($destdir, ($destdir . .bad))
  || die destdir $destdir isn't a directory, can't rename it;
   mkdir ($destdir) || die can't make destdir $destdir;
   }
elsif (! (-e $destdir)) {
   mkdir ($destdir) || die can't make destdir $tmpdir;
   }
system ($chmod 775 $destdir);

chdir ($tmpdir);

if (-e $file) {
   unlink ($file);
   }

if (-e $ufile) {
   unlink ($ufile);
   }

# download the file
if ($proto eq rsync) {
   system($method $url $file);
   }
elsif ($proto eq http) {
   system($method $url);
   }

unless (-e $file) {
   printdidn't get download file $file\n;
   last;
   }

if ($file =~ /\.gz$/) {
   system($gunzip $file);
   $file = $ufile;
   }

# test against clamav
$retcode =
   system($clamscan --database=$tmpdir $testfile  /dev/null 21)
/ 256;

if ($retcode == 0) {
   # clamscan of testfile worked and didn't find a virus
   # lets see if it's the same file we already have/had
   $diffout = (system($diff --brief --speed-large-files
$tmpdir/$file $destdir/$file  /dev/null 2/dev/null)) / 256;
   if ($diffout == 0) {
  # file hasn't changed
  unlink ($file);
  }
   else {
  print$file appears to have changed, moving to destination\n;
  system($mv $tmpdir/$file $destdir/$file);
  system($chmod 644 $destdir/$file);
  }
   }
elsif ($retcode == 1) {
   printfound a virus in $testfile while testing $dist\n;
   }
else {
   printnew $dist download appears to be corrupt\n;
   }
}
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Third party signature databases

2007-07-12 Thread John Rudd
Noel Jones wrote:
 At 12:59 PM 7/12/2007, John Rudd wrote:
 
  From past discussion on this list, it was discussed how easy it would
 be to throw together a script to check validity before putting a message
 into production.  But I don't recall anyone ever actually offering up
 their script.   Earlier today, someone had posted something to the
 SpamAssassin list that showed they weren't properly handling downloaded
 signature databases, and it just so happens that I just got around to
 writing such a script the other day.
 
 You must not be following the list very closely.  Such scripts have 
 been posted frequently and several good ones are available from 
 http://sanesecurity.co.uk/clamav/usage.htm

The last time I saw it come up on this list, I didn't see a script come 
back within a few days.  If it took longer than that, I probably was 
only skimming the list by then (my degree of intently reading vs 
skimming the list varies over time, but when there's a thread I 
consider important I try to keep up with it until it looks like the 
thread has petered out ... and the download script with verification 
that the database is usable by clamav is an important topic to me).

I saw the supporting material on sanesecurity's downloads page, but it 
looked like it was almost all windows oriented (ie. useless to me). 
Plus, I want one thing that I can apply to all 3rd parties, and I 
(perhaps incorrectly) assumed sanesecurity's stuff would be oriented 
just around their own stuff.


 Also, if you check the Sanesecurity usage page, you will note 
 download signatures only when there have been changes, which your 
 script seems to ignore.   Use the wget -N option.
 
 Also, it looks as if you are removing your tmp files every time the 
 script runs.  This causes rsync to download the whole file rather 
 than checking for changes, and makes it impossible for wget -N to work.

Yes, I am/was aware that I'm undermining rsync's bandwidth savings.  I 
just hadn't figured out the best way to address that.  I don't think 
that leaving it in /tmp/{something} works well for that.  I had been 
thinking about doing the scratch space in 
/usr/local/share/{something}/tmp, but wasn't sure if that would be 
standard enough.

I suppose I could put it under {clamavdbdir}/{source}/tmp


And, it was this types of reason I wanted to open it up for public scrutiny.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Third party signature databases

2007-07-12 Thread John Rudd
Noel Jones wrote:
 At 02:02 PM 7/12/2007, John Rudd wrote:
 Such scripts have
 been posted frequently and several good ones are available from
 http://sanesecurity.co.uk/clamav/usage.htm
 I saw the supporting material on sanesecurity's downloads page, but it
 looked like it was almost all windows oriented (ie. useless to me).
 
 There are 5 scripts on the page, only the last one is labeled as a 
 windows script.
 
 Plus, I want one thing that I can apply to all 3rd parties, and I
 (perhaps incorrectly) assumed sanesecurity's stuff would be oriented
 just around their own stuff.
 
 All those scripts are clearly labeled as working with MSRBL.


Like I said, what I looked at was their downloads page.

Their downloads page has:

1) their phishing signatures
2) their scam signatures
3) a windows installer for their phishing signatures
4) a windows installer for their scam signatures
5) a build of clamav for windows
6) a signature updater that doesn't give a platform, but is from the 
same source as #5
7) rsync for windows
89) references to MSRBL signatures

So, as I said: the only specifics of the page I looked at, before you 
made me aware of their usage page, were windows specific, and the 
installers were also highly specific.


 
 Yes, I am/was aware that I'm undermining rsync's bandwidth savings.  I
 just hadn't figured out the best way to address that.  I don't think
 that leaving it in /tmp/{something} works well for that.  I had been
 thinking about doing the scratch space in
 /usr/local/share/{something}/tmp, but wasn't sure if that would be
 standard enough.
 
 Consensus seems to be that /var/tmp/clamdb or similar is an 
 appropriate place to hold the scratch/work files.
 
 checking for updates every hour is wasteful, every 4 hours is more reasonable.

noted.

 
 Here's a perl one-liner you might want to integrate in your script 
 - it signals clamd to reload the database.  Only run this if one of 
 the databases has changed.
 
 # perl -MIO::Socket::UNIX -we 'my $s = IO::Socket::UNIX-new (shift); 
 $s-print(RELOAD); print $s-getline; $s-close' 
 /var/run/clamav/clamd.socket
 

When I switch to the Mail::ClamAV method, it has a means of detecting 
and reloading as necessary.  I'm doing that this week.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] clamscan extremly slow

2007-06-18 Thread John Rudd
Jan-Pieter Cornet wrote:
 On Mon, Jun 18, 2007 at 09:39:23AM -0400, Christopher X. Candreva wrote:
 On Mon, 18 Jun 2007, Peter Boosten wrote:

 I had some problems running clamd on one of the machines a long time
 ago, and with mimedefang running clamscan is the second option (which
 had worked until sometime ago). So I configured mimedefang for clamscan.
 Maybe it's time to ask the mimedefang people to either remove the clamscam 
 option, or put a big NOT FOR PRODUCTION - FOR TESTING ONLY on it.
 
 clamscan has a purpose. As others have also said - YMMV. A very lightly
 loaded mailserver (~100 msgs/day) shouldn't have a lot of problems with
 clamscan. At least not with the 0.88.x version.
 

That, or mail servers that scan their email in bulk batches (like those 
using mailscanner), where the latency of starting clamscan is MUCH 
smaller than the latency in going through clamd (I've timed both under 
mailscanner and mimedefang; under mimedefang, using clamd is a HUGE win, 
as everyone here expects ... under mailscanner, using clamd is a HUGE loss).


Though, the fastest method, for mailscanner, is using the ClamAV perl 
module for directly processing the messages.  This wasn't much of a win 
under mimedefang though.


So the real answer here is, as with any non-trivial discussion: it 
depends.  It depends on what you're doing, and how you're doing it. 
Batching: look toward clamscan or the ClamAV perl module and away from 
clamd.  Interactive/live (such as a milter): look toward clamd. 
Ultimately, if it _REALLY_ matters to you, don't listen to other 
people's dogma, actually develop a test suite to figure out which one is 
truly faster or slower for your situation.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] clamscan extremly slow

2007-06-18 Thread John Rudd
Henrik Krohns wrote:
 On Mon, Jun 18, 2007 at 10:45:30PM -0500, Eric Rostetter wrote:
 if you have sufficient system resources,  and are willing to
 tolerate slow delivery times (up to 4 minutes on my system, with clamscan
 on 0.90.3 for example).
 
 I'm just amazed by all the nitpicking in this thread. If you worked here and
 delayed the mail for 4 minutes just because clamscan works fine, I would
 fire you. :D Nothing personal ofcourse.
 

heh.  Nitpicking indeed.

If I were working somewhere that was so clueless about how email works 
that 4 minutes delay was considered unacceptable*, then I'd quit. 
Nothing personal, I just don't feel it's worth my time to work for 
people who don't understand how email works.



(* questionable?  not idea?  sure.. unacceptable to the point of 
firing someone?  that's incompetent management)

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] error stops clamd

2007-04-11 Thread John Rudd

 
 As more users upgrade from 0.8 to 0.9, this problem will disappear with
 future updates. Version 0.9 only transfers the difference between CVDs
 instead of the files in full.
 


Which isn't going to happen, at least for me, until 0.9 runs on mac os x 
10.3.9.

Right now, it wont compile.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] error stops clamd

2007-04-11 Thread John Rudd
Dennis Peterson wrote:

 
 You need to have better monitoring and notification, and a mail system 
 that delivers mail even if there is a fatal error in the AV tool. This 
 is hardly a ClamAV problem.

Depends on what your goals are.

For me, a reliable email system does not just mean mail gets 
delivered.  It also means that we reliably reject detectable viruses. 
  If we're letting viruses through because our pants are down (because 
our AV tool has failed), then that's not a reliable email system. 
That's a dysfunctional email system.

better monitoring and notification: yes, good.

letting potentially virus laden email through because your AV tool is 
down: very bad.


It's like using condoms.  Just because you run out of condoms doesn't 
make unprotected sex suddenly safe.  Accepting email from the world 
without your AV tool processing it is as irresponsible as having 
unprotected sex with the entire world.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] error stops clamd

2007-04-11 Thread John Rudd
Dennis Peterson wrote:
 John Rudd wrote:
 Dennis Peterson wrote:

 You need to have better monitoring and notification, and a mail system 
 that delivers mail even if there is a fatal error in the AV tool. This 
 is hardly a ClamAV problem.
 Depends on what your goals are.

 For me, a reliable email system does not just mean mail gets 
 delivered.  It also means that we reliably reject detectable viruses. 
   If we're letting viruses through because our pants are down (because 
 our AV tool has failed), then that's not a reliable email system. 
 That's a dysfunctional email system.

 better monitoring and notification: yes, good.

 letting potentially virus laden email through because your AV tool is 
 down: very bad.
 
 Send it to your next AV tool. You don't rely on a single tool for this, 
 do you?

A single virus detecting program? No.
A single decision point about deliver vs reject vs tempfail?  Yes.

(and, AV tool to me means all of these programs collectively (sophos, 
clamav, and/or mcaffee as the detection programs, and mailscanner or 
mimedefang or some other milter as the decision maker)

If, at the point of making the decision of should I deliver? I have 
not gotten a definitive answer to is this message clean? then it would 
be very bad to go with deliver.  There is no next tool to pass the 
decision on to, because at that point all of the available detection 
programs have answered.

So, when you say You need to have a mail system that delivers even if 
there is a fatal error in the AV tool, I say: no.  A fatal error means 
that the collective tool hasn't been able to determine whether or not 
the message contains a known infection (no matter how many detection 
programs I'm running).  Therefore, we tempfail it.  I do not see any 
other available and acceptable outcome.



___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Does clamav have any certificate?

2007-03-27 Thread John Rudd

Randal, Phil wrote:

Does clamav have any certificate of any labs like www.icsalabs.com?


And how does that make it a better product, exactly?



Who said anything about a better product?


Certification doesn't indicate a better product.  It indicates either 
that someone has shown that it has compliance with a given standard OR 
that some agent has done some assessing reliability/accuracy/etc. of the 
product and put their name/reputation forward as an assurance of that 
assessment.


The reason why the latter might be useful is when doing due diligence in 
designing a project, so that the sponsors/customers of the project know 
that the elements of the project aren't being taken on a whim.  It may 
also allow you to offload liability, to some degree, on some outside agent.


Obviously, it's better to get your certifications from reputable agents 
than not, since the value of the certification is based upon the 
reputation of the certification agent.


Not very useful to hobbyists or computer scientists (where due diligence 
takes a back seat to more technical issues), but very useful to 
professionals and engineers (where due diligence should be a high priority).


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Compiling 0.90.1 on Mac OS X Server 10.3

2007-03-15 Thread John Rudd

Dana Kashubeck wrote:
I am not able to compile the latest stable version on Mac OS X Server 
10.3.  There are a few different warnings here and there, most of them 
are shown while compiling unrar.c:


...


The compile ends with:
/usr/bin/libtool: no library created (no object files in input files)
make[1]: *** [libclamav.la] Error 1
make: *** [check-recursive] Error 1


Is anyone else having problems on Panther?



Yup, same exact problem.


I notice no one replied to your question.  Did you get it resolved?

Seems like, from reading this list, so far ClamAV 0.90.* is pretty much 
a disaster.  I don't think I'm aware of anyone having a smooth 
experience with it.


Can anyone out there contradict that?  Especially on Mac OS X 10.3.9 
and/or Solaris 8?


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] [Fwd: [clamassassin-announce] Problems with ClamAV 0.90 and clamassassin 1.2.3]

2007-02-21 Thread John Rudd

Tomasz Kojm wrote:

On Wed, 21 Feb 2007 12:16:02 -0500 (EST)
Daniel T. Staal [EMAIL PROTECTED] wrote:


Dear clamassassin users,

There is a compatibility problem when using clamassassin 1.2.3 with
the new ClamAV 0.90 release.  The new ClamAV release has changed some of 
the command line options, and one of these changes makes clamassassin  not

work correctly when using clamscan.  However, using clamassassin  with
clamdscan doesn't seem to have any problems.




Now clamscan can scan email messages without any special options


This was the case already in 0.8x, in fact --mbox was being ignored since
2004:


The difference is that in 0.9 it's not ignored.  It's rejected.  --mbox 
produces an error.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] automatic version update

2007-01-14 Thread John Rudd

Dennis Peterson wrote:

Erez Epstein wrote:

Hello,


I see that about every month, there is new version,

what does one do when it has about 30 servers, that need to be updated?
is there an automatic way?
all servers have compiled versions of clamav.


I use Cfengine. All updates happen within 30 minutes regardless of how 
many systems you have to update.




cfengine has a built in script for downloading only the most recent 
clamav (and not re-downloading an existing one), building it, and 
installing it?


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] automatic version update

2007-01-14 Thread John Rudd

Dennis Peterson wrote:

John Rudd wrote:

Dennis Peterson wrote:

Erez Epstein wrote:

Hello,


I see that about every month, there is new version,

what does one do when it has about 30 servers, that need to be updated?
is there an automatic way?
all servers have compiled versions of clamav.


I use Cfengine. All updates happen within 30 minutes regardless of 
how many systems you have to update.




cfengine has a built in script for downloading only the most recent 
clamav (and not re-downloading an existing one), building it, and 
installing it?


Cfengine will do what ever you tell it to do. It is a framework but you 
fill in the details. There are no turnkey solutions for solving 
arbitrary data center needs - only tools. Cfengine is one such tool. One 
could also write a script to do this, but Cfengine is already running 
here so why not use it?


Yes, I know what cfengine is, and what it does.  My point was simply 
saying I use cfengine doesn't answer the question being asked UNLESS 
it comes with the full solution ready to go.


It is like being asked Does anyone here know where to get a 5 cheese 
lasagna?, and you answered I eat food.  Great ... but not really a 
useful answer.




At this point I've not installed anything myself [...]


While I wasn't the original poster, the need I see in this arena isn't 
really filled by what you've described.  And I disagree that you haven't 
installed anything yourself.  You installed it in the cfengine 
repository.  The fact that that isn't the final destination for the 
binary is splitting hairs about what it means to install the software.



What I'm looking for is pretty much what I mentioned:

I want something that will check if there's a new source distribution 
(tar, not rpm), download it, config it against some set parameters, 
build it, and run some post-build scripts (which may or may not include: 
test it against some known routines, inform me that a new binary is 
built and ready, and/or go ahead and install it on my non-production 
servers).


I could write some of it, but the fact that there isn't a simple and 
consistent http://some.site.net/some/path/clamav-current.tar.gz; url 
makes that a lot more complex.  The url includes the version number, 
which means you need to know what the next version number will be before 
you look to see if its there (and simple incrementation may or may not 
work ... for example, if I'm on 0.88.7 ... then the program may be 
looking for 0.88.8 to come out ... but it looks like the next version 
will be 0.90 ... so the program is going to sit there looking for 
something that never arrives).



The easiest thing would be if clamav always had a clamav-current to 
download.  Writing the rest would be easy.  And then there would be a 
simple answer to Is there an automatic version update utility, because 
I use cfengine is not that answer.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] automatic version update

2007-01-14 Thread John Rudd

Dennis Peterson wrote:

 Any tool anyone can suggest comes with the
implication that some local effort is going to be required. Nobody has 
yet written the magic.sh script that can run autonomously, scan your 
network, and decide on it's own what needs to be done. 


Sticking to talking about a magic.sh that installs the latest version 
of an anti-virus engine ...


There is in fact such a tool for Sophos (through mailscanner). 
mailscanner comes with sophos-autoupdate (which is the same idea as 
freshclam)... but then there's an add on called MajorSophos.sh, which 
downloads and installs the current engine.


I have it run against my test server a 10 days before I have it run on 
my production servers.  It throws out any warnings, I get 10 days to 
hear if anyone else has a problem with the new version (20 really, since 
they tend to come out on the 1st, and cron runs the script on the 10th). 
 And at any time I can stop the update from running on the production 
servers.



And that's basically the setup I want to have with ClamAV.  I want a 
MajorFreshclam that has:


A) exploration mode (to be run on a test server, via cron)

  1) check on the state of what the current version of clamav is,
  2) if there's a new stable release: shut down the current one, 
download it, config it, build it, try to reconcile config files (take 
known settings from the old config file and put them into the new config 
file, report on new/unexpected config file items), install it on the 
test servers
  3) optionally forcibly re-installs (from downloading to local, or via 
CPAN) the current/newest perl module

  4) run tests
  5) mail me the output of 1-4

B) blessing mode (to be run on the test server, manually)

  - have a command line option for pushing the new executables and 
config files into whatever my central distribution mechanism is.  A 
single step 'install' from build location to repository.


C) production mode (run on production servers, via cfengine or cron)

  1) looks in a local distribution point for a new version
  2) halts the old version, installs the new version, starts the new 
version
  3) optionally forcibly re-installs the current/newest perl module 
(from local distribution point, or from CPAN -- configurable)


D) a less safe mode that basically combines A and C, and skips B.  But 
include lots of warnings about using this mode.



And, I'm happy to _write_ such a beast.  I'm not just requesting it from 
someone else.  I'm just saying, that's what the OP's request brings to 
my mind.  The main thing that keeps me from writing it is: that lack of 
a -current copy of the download archive.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] automatic version update

2007-01-14 Thread John Rudd

Fajar A. Nugraha wrote:

John Rudd wrote:
And, I'm happy to _write_ such a beast.  

Very good!

I'm not just requesting it from someone else.  I'm just saying, that's
what the OP's request brings to my mind.  The main thing that keeps me
from writing it is: that lack of a -current copy of the download
archive.

Assuming what you mean is something like
http://some.site.net/some/path/clamav-current.tar.gz;, as you said in
the previous post, there's :
- http://www.clamav.net/snapshot/clamav-devel-latest.tar.gz, for the
development version
- The DNS record current.cvd.clamav.net, for stable version.

What I did for stable version is use something like this :
VERSION=`host -t txt current.cvd.clamav.net | gawk -F \ '{print $2}' |
gawk -F \: '{print $1}'`
wget
http://optusnet.dl.sourceforge.net/sourceforge/clamav/clamav-$VERSION.tar.gz

Choose your favorite SF mirror, of course.
There are some configuration file (clamd.conf, mostly) syntax change in
0.88 - 0.90, so the above example might not be useful for such
transition. It would be useful for 0.88.7 - 0.88.8 (should it ever come
out) and 0.90 - 0.90.1 (in the future)



ooh!  That is a good resource.  Thank you!

Do you know what the other fields in the TXT record mean?


Thanks!


John
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Why does clam die on a malformed database ?

2006-12-30 Thread John Rudd

Christopher X. Candreva wrote:

On Sat, 30 Dec 2006, Sander Holthaus wrote:






There is no point in using a malformed database and could even spell
disaster. (Imagine it starts generating FP's en masse, which could be
a side effect of a corrupted database).


Having clam die spells disaster. If you've set your system to tempfail on 
clam failure, you can't receive mail until it is fixed.  If you accept mail 
unscanned, you could infect your users, start spreading viruses, and have a 
big clean-up job.


For a mission critical environment, it seems like the better behavior 
would be:


1) keep the previous db
2) download the new db
3) if the new db is bad, throw an error in the logs/stdout, and keep 
functioning propperly on the old db
4) if the new db is good, move it over to the old db's location and 
start using it.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Why does clam die on a malformed database ?

2006-12-30 Thread John Rudd

Sander Holthaus wrote:


A tempfail is not a disaster in most scenarios. You may not be able to
receive mail until it is fixed, but you still get the mail after it is
fixed.


I think that attitude works fine in trivially small email environments.

I don't think it works at all in environments where you've got an 
enterprise email system in a mission critical environment, where having 
an email delayed significantly can have financial implications.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Why does clam die on a malformed database ?

2006-12-30 Thread John Rudd

Sander Holthaus wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
John Rudd wrote:

Sander Holthaus wrote:


A tempfail is not a disaster in most scenarios. You may not be
able to receive mail until it is fixed, but you still get the
mail after it is fixed.

I think that attitude works fine in trivially small email
environments.

I don't think it works at all in environments where you've got an
enterprise email system in a mission critical environment, where
having an email delayed significantly can have financial
implications.


A mission critial envirorement where having an email delayed
significantly can have financial implications will not rely on one
single virusscanner, but has two or three backups and never needs to
throw a hard or tempfail when just clamav fails. And they are likely
to employ much more scrutiny in using and updating non-standard db's.



All of those things are true, but they're not a license for lax 
standards in how a process handles failures.  We can handle error 
conditions poorly, because if it matters, they probably spent money on a 
second line of defense is bad coding discipline.


There's no good reason for a process to die quietly because it's _new_ 
data is bad.  That's a reason to not use the new data.  It is not a 
reason to die (esp. not in a quiet manner).

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Re: Why does clam die on a malformed database ?

2006-12-30 Thread John Rudd

Dave Warren wrote:

In message [EMAIL PROTECTED] John Rudd [EMAIL PROTECTED] wrote:


Sander Holthaus wrote:


A tempfail is not a disaster in most scenarios. You may not be able to
receive mail until it is fixed, but you still get the mail after it is
fixed.

I think that attitude works fine in trivially small email environments.

I don't think it works at all in environments where you've got an 
enterprise email system in a mission critical environment, where having 
an email delayed significantly can have financial implications.


If having an email delayed causes significant financial implications,
you've got more serious underlying issues.  SMTP is a best-effort
process, there is absolutely no guarantee of delivery at all, let alone
timely delivery.


While I agree with you, the fact is I don't make policies.  I can't 
_stop_ people from sending grants applications through email.  I can't 
stop them from doing business transaction confirmations through email. 
And I can't force the top level management (most of whom are faculty who 
have done those two things in the past) to recognize the reality of what 
SMTP is, and was designed for.


It's hard enough to just get them to accept that email is not an instant 
communication mechanism.


(and, really, I wouldn't need to do virus scanning at all if I could get 
them to listen to technical realities, because they wouldn't be trying 
to use email as a file transfer mechanism, and I could block all of that 
traffic)


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Re: Why does clam die on a malformed database ?

2006-12-30 Thread John Rudd

Sander Holthaus wrote:

 
Dennis Peterson wrote:



This is a very naive or at least uninformed position to take on the
 monetary significance of email. 



The issue is that email never was designed to be used in that
particular fashion.


No offense, but Dennis is right.  You're being naive.  The issue is not 
how it was designed to be used.  The issue is how it is actually 
used.  The latter carries FAR more weight, outside of purely academic 
discussions, than the former.


Even though I work at a university, I do not live in an academic world. 
 I live in the real world.  And in the real world, email is used that 
way, and it is a mission critical service that has financial 
repercussions.  Arguing about how it was designed to be used is just 
picking nits.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Freshclam stability as a daemon [was: DB Update email before actual update available?]

2006-12-29 Thread John Rudd

Per Jessen wrote:

Dennis Peterson wrote:





And as an old school Unix admin who still believes in the mentoring
responsibility of my position, I will make recommendations from time
to time regarding best practices and I recommend if you run freshclam
as a daemon that you monitor it and restart it if needed. 


Do you do that for ALL your daemon processes?  As an old school
mainframe sysprog, I don't monitor any of my daemon processes. (apart
from *some* status-monitoring via SNMP).



Throwing my 2c in,

I have a cron job that runs every couple hours and just reports on the 
status of various daemons.  It tells me if any of them are missing, 
basically.


But, it doesn't try to restart them (bad idea, IMO; for most daemons, 
it's better for a human to go look at why the process isn't running and 
try to solve it, instead of just blindly/programatically trying to 
restart it).  It's just warning me that something that _should_ be 
running is not.


In the 2 years I've been running clamav, I haven't had freshclam come up 
missing.


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Clamscan on HP-UX

2006-11-18 Thread John Rudd

Fajar A. Nugraha wrote:

Dennis Peterson wrote:

Fajar A. Nugraha wrote:
Database objects can include blobs (binary large objects). These can
be files including executables, documents, other databases. They can
have viruses. In some instances the blob in an internal representation
and can be difficult to get to without sql. In other cases blobs can
be external storage objects (file system files) and easy to get at.
Regardless, there are many reasons one would wish to scan them for
viruses.


Yes, but (suppose) clamscan finds a virus on file oradata01.dbf. Would
you REALLY spend your time examining which record on what table has the
BLOB?



Seems like that would be a bad method for scanning a database for 
infected BLOBs.


A better mechanism might be to write a process which looks through the 
database (via the database's normal access mechanisms, and doing queries 
on the tables which contain blobs), and then submitting the individual 
blobs to a virus scanner (any virus scanner) for individual checking.


What you do from there depends on individual goals, but the choices 
might include:


a) sending a report to relevant parties about which records (by record 
ID, or whatever) contain infected blobs


b) deleting the records which contain infected blobs

c) replacing the infected blob with a disinfected version of said blob

d) replacing the blob with a notice indicating that the the blob had 
been infected and removed, possibly placing the blob into a quarantine 
area (or deleting the blob).


e) combine approaches: send a report that says which records were 
infected, place the original blob in a quarantine and replace it with 
either a notice or a disinfected blob (depending on whether or not the 
disinfection was possible/successful).


___
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Cherishing my ignorance - An appeal to package rs

2006-11-10 Thread John Rudd

James Kosin wrote:


Like Dennis said Bringing it all together is what the admin is for.




I disagree.  There are some things which are the admin's job, but they 
are not the catch-all for all unresolved burdens (bringing it all 
together).


Pardon my lecture, but lets review the root of our discipline:


The purpose of computers is to shift the workload of as many tasks as 
possible away from the human and toward automation, freeing up the human 
to address more sophisticated problems they were previously unable to 
address due to those workloads.



This is the mantra of the entirety of computing.  If you are working 
with computers, and this isn't the focus of what you're doing, even 
indirectly, then you're not contributing to the domains of computer 
science and/or computer engineering. Period.  No ifs ands nor buts. 
Even with games: the more sophisticated problem is having more 
complex/sophisticated environments for recreation.


Notice that I did NOT say users, I said humans.  This applies across 
the entire scope of computing, and not just at the level of what do we 
provide to the end user?


For the hardware developer (whether it's chip developers or platform 
developers), their burden is to reduce the workload of everyone by 
increasing the overall capacity of the systems ... but more directly, 
they should also be reducing the workload of the system engineer.


The system engineer has three groups whose workload they need to reduce: 
system administrators, application developers, and users.


Application developers have two groups (depending upon the scope of the 
application): other application devleopers, system administrators, and 
users.


System administrators have two groups they need to address: application 
developers and users.


Users also have groups they need to address: themselves (if they're not 
going to leverage the tool to allow them to accomplish tasks that their 
previous drudgery was preventing them from addressing, then what's the 
point?), and non-computer users that are their customers (the bank 
teller who can not give you more information than they used to, because 
the information is all now at their finger tips ... before computers at 
the bank teller, they couldn't do that).




ClamAV is an application.  Its target audience is all three of the ones 
I mentioned for application developers.  Therefore, the developers of 
ClamAV have the burden of reducing the workload of system 
administrators, users, and other application developers.  The obvious 
manner in which they address this is making it easier to identify 
viruses so that the user or sysadmin can eliminate the virus from their 
environment, or so that other applications may leverage this 
identification process for automated deletion/interception of viruses.


But, that is not the only manner in which application developers should 
reduce burdens (at the level of the problem being solved).  They should 
also reduce other burdens where they can, such as reducing the ergonomic 
burden of the user (ie. better user interface design).  And they should 
reduce the burden of the system administrator by making the application 
easier to maintain at the system administration level.  That means doing 
things like using standard installation locations, using standard 
configuration tools, etc.


It also means using easier and more reliable packaging and 
installation/removal mechanisms.  Reduce the burden of the system 
administrator by making the installation task more streamlined, more 
reliable, and easier.



So, to get back to the original quote:

Bringing it all together is what the admin is for.

No.  You do not get to simply dump this burden upon the sysadmin.  That 
burden is shared across the entire domain of computing.  Each person is 
responsible for bringing it together for the community to which they 
are providing an automation.


You might say but this subject is the responsibility, within 
'Application Development' of the release engineer, and ClamAV doesn't 
have enough release engineering volunteers to address more sophisticated 
release engineering processes.  OK, that's a reasonable response.  But 
that's saying we don't have enough resources to address one of our 
burdens.  That means the request was valid, but we can't address it.


That is ENTIRELY different from a response of the request is 
unreasonable/invalid because our consumer should just be willing to do 
more work (effectively what the OP's detractors have been saying). 
BZZT.  That response directly contradicts the central purpose of 
computing.  Therefore, that response is inherently wrong and inappropriate.

___
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Cherishing my ignorance - An appeal to package rs

2006-11-09 Thread John Rudd

tBB wrote:


I'm sorry for the probably arrogant and insulting tone but you're
literally asking for it.




Perhaps he is asking for it, but he's also right.


___
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Cherishing my ignorance - An appeal to package rs

2006-11-07 Thread John Rudd

Dennis Peterson wrote:

My not-so-automated update process looks like this:

wget (link to current clamav-XXX.tar.gz)
tar xzf clamav-XXX.tar.gz
cd clamav-XXX
configure --disable-zlib-vcheck
make
su
make install
service clamav restart
service freshclam restart



You would be wise to uninstall the previous installation so that you don't
end up with split versions. The man pages have not always been consistent
nor have library names, and uninstall (make uninstall) helps prevent this.




It would be nice, though, if there was a clamav-current.tar.gz to 
download, so that such automated processes could be done more ... automated.


___
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Cherishing my ignorance - An appeal to package rs

2006-11-07 Thread John Rudd

Dennis Peterson wrote:

Bowie,

The obvious observation that while this might work for you it's not a 
general solution, so now everyone needs to create a script.


F'chrissake... It is trivial to do this. Less than 10 minutes, start
to stop. I wrote the script I use 3 years and it took just minutes. I have
10 mail servers in 5 timezones and three continents. They are all updated
within 30 minutes of a new drop. This is not rocket science - in fact this
is very simple stuff. If you are challenged by *any* of this you are in the
wrong business.




Care to share your script?

(and, hopefully its written in a fashion that is portable, instead of 
being linux specific ... or worse yet, specific to a given linux distro)

___
http://lurker.clamav.net/list/clamav-users.html