Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread John Rudd
Eric Rostetter wrote:
 Quoting John Rudd [EMAIL PROTECTED]:
 
 Tilman Schmidt wrote:

 So why am I dissecting that list like this? Just to show that blocking
 or not blocking certain unusal characters in mail addresses is indeed a
 policy decision which should not be forced by a piece of software, 
 but at
 most offered as a configurable option.

 Absolutely agree.
 
 I disagree in this case (read on).
 
 It is not ClamAV's place to make policy decisions for
 me.
 
 And ClamAV does not.  The milter is.  And the milter is designed to
 work with sendmail.  And if leaving this enabled by default produces
 an exploitable sendmail, then it is wrong.

It does not.  What leaves an exploitable sendmail is a poorly configured 
sendmail.  The problem is already fixed, and properly fixed, in 
sendmail's own configs.  This makes it the wrong tool for the job.

Adding this to the milter is adding code to fix something that isn't 
broken.

It is never good to be the wrong tool for the job, nor fixing 
something that isn't broken.  And, therefore, it is doubly bad to be both.

Further, it imposes this fix upon mailers that don't have a 
vulnerability (keeping in mind that other MTAs can use milters now). 
That's three strikes*.


(* yes, I know most of the readers here might not be in the US, nor 
familiar with baseball metaphors, but hopefully they'll get that three 
strikes is a threshold of disqualification)


 I'm not saying it can't be configurable, but whether it is or not, it
 must be disabled by default, IIF it is known to make sendmail or the
 milter itself exploitable.

That would be true if and only if the proper fix didn't already exist 
within sendmail itself. (and I don't recall if it's the default in 
sendmail, or not ... but that doesn't matter, because the PROPER FIX is 
to use the sendmail config which stops the exploit ... that proper fix 
might be as simple as do nothing, if it IS the default)


 At most, it
 should offer me policy options, but only _options_.
 
 You would rather it allows you to become exploitable?  I wouldn't...

Nice strawman.

No, I wouldn't like to be exploitable.  And, without this feature, I 
wouldn't be (not even if I was running sendmail), because the fix 
already exists within its proper location (within sendmail itself).


 IMHO, the proper thing to do is to document this in the milter docs.
 Whether it becomes a configurable option or not, it should certainly
 be documented that the default is to block such addresses.

No, the proper thing to do is not fix things that aren't broken.  This 
is already fixed in the proper place.  At the most, the ClamAV team, 
and/or the clamav-milter team, should provide a STRONG recommendation 
that the sendmail config should use its existing technique for fixing 
the problem (which may be as simple as do nothing except don't overide 
the default).


 BUT, the point of my email is ClamAV is an anti-virus program,  its jobs
 is to match patterns and report the match. clamav-milter is a separate
 program, a milter for sendmail.  A milter is by definition a filter.  It's
 job IS to filter (see: https://www.sendmail.org/milter/), even though many
 people use them in a non-filtering way...  Don't confuse the two programs,
 or their functions.

Close, but not correct.

Milters in general exist to provide general filtering capability.  The 
clamav-milter is not a general milter.  It's a specific milter, whose 
specific purpose is to provide ClamAV capability via the milter interface.

Your argument here would be valid if the clamav-milter were a general 
purpose milter, such as MIME-Defang.  Or if it were a special purpose 
milter whose special purpose wasn't specifically providing ClamAV via 
the milter interface.

Again, it is providing a fix in the wrong location, and fixing something 
that isn't broken.


 It would be irresponsible for a milter to knowingly allow a security hole
 by default.

Incorrect.  It is irresponsible for a milter to allow a security hole IN 
THE AREA THAT THE MILTER ADDRESSES.  The clamav-milter isn't a general 
security tool, it is a _ClamAV_ milter.  By your logic, EVERY milter on 
the planet should waste its time doing EVERY security check known in 
order to be sure that not only is sendmail not mis-configured, but 
neither is every other milter in use.  That's wasteful, poorly 
conceived, and just a plain bad idea.

Use the right tool for the job.  Fix the problem where the problem exists.

The right tool for the job is the existing sendmail fix for the problem.

The proper location of the fix is within the sendmail configuration.

Not in EVERY milter on the system.  Not in ANY milter on the system.


 Protecting against such a hole is the only reasonable thing
 to do.  How to best protect that hole is still a subject of debate.

No, it is not.  The best protection for that hole already exists within 
sendmail.  Fixing it within the clamav-milter is _STUPID_.
___
Help us 

Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Tilman Schmidt

Eric Rostetter schrieb:

Quoting John Rudd [EMAIL PROTECTED]:


It is not ClamAV's place to make policy decisions for
me.


And ClamAV does not.  The milter is.


That distinction is immaterial. The milter comes as part of the ClamAV
package. s/ClamAV/clamav-milter/ throughout my posting if you want, it
doesn't change my argument in any way.


And the milter is designed to
work with sendmail.  And if leaving this enabled by default produces
an exploitable sendmail, then it is wrong.


The premise of this implication is false, therefore the conclusion
doesn't follow. Passing E-mail addresses containing shell metacharacters
does not produce an exploitable sendmail.


It is ClamAV's place to match email messages to signatures.


Yes, but this is _not_ the function of the milter, it is the function
of ClamAV, and ClamAV is not the thing causing the issue, the milter is.


Ok, since a simple s/ClamAV/clamav-milter/ probably won't cut it in this
case, I'll rephrase that statement:

It is clamav-milter's place to pass messages to clamd for matching them
to signatures.


At most, it
should offer me policy options, but only _options_.


You would rather it allows you to become exploitable?  I wouldn't...


Most programs allow you to become exploitable. It is always up to you
to configure them so that this doesn't happen.

Programs that *make* you exploitable are the problem, but a hypothetical
clamav-milter that wouldn't block mail addresses containing vertical bar
or semicolon characters does not fall into that category.


IMHO, the proper thing to do is to document this in the milter docs.
Whether it becomes a configurable option or not, it should certainly
be documented that the default is to block such addresses.


That would have been the minimum. But it is still wrong for a milter
whose advertised purpose is to pass messages to a virus scanner, to
start blocking messages based on unrelated criteria like allegedly
illegal characters in addresses.


BUT, the point of my email is ClamAV is an anti-virus program,  its jobs
is to match patterns and report the match. clamav-milter is a separate
program, a milter for sendmail.  A milter is by definition a filter.  It's
job IS to filter (see: https://www.sendmail.org/milter/), even though many
people use them in a non-filtering way...  Don't confuse the two programs,
or their functions.


Ok, point taken. Consider them unconfused. Now please let us discuss
the clamav-milter program, distributed with ClamAV but separate from it,
and how it should behave with respect to the recipient addresses of the
mails it processes. My position is still that checking the legality of
those is not its job and it should leave them alone.


It would be irresponsible for a milter to knowingly allow a security hole
by default.  Protecting against such a hole is the only reasonable thing
to do.  How to best protect that hole is still a subject of debate.


Clamav-milter cannot protect my mail server against all possible
security holes, and shouldn't even try. It has a precise job, which is
to check mails for known viruses by passing them to ClamAV, and block
their delivery if the check comes back positive. Other security risks
must be covered by other means.

Thanks,
Tilman



signature.asc
Description: OpenPGP digital signature
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread David F. Skoll
John Rudd wrote:

 It is never good to be the wrong tool for the job, nor fixing 
 something that isn't broken.  And, therefore, it is doubly bad to be both.

In general:

DO NOT HARDCODE POLICY

Otherwise, your tool becomes irritating or possibly even harmful.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Eric Rostetter
Quoting John Rudd [EMAIL PROTECTED]:

 And ClamAV does not.  The milter is.  And the milter is designed to
 work with sendmail.  And if leaving this enabled by default produces
 an exploitable sendmail, then it is wrong.

 It does not.  What leaves an exploitable sendmail is a poorly  
 configured sendmail.  The problem is already fixed, and properly  
 fixed, in sendmail's own configs.  This makes it the wrong tool for  
 the job.

I don't know the history of this expliot, etc.  So I can't comment on
whether the fix should stay or not.  It would depend on the default
settings for sendmail, how long the fix has been in sendmail, how widely
available the patched sendmail is today, etc.

 Adding this to the milter is adding code to fix something that  
 isn't broken.

I would assume it was added at a time when it was broken (or was broken
in the default install, etc).  You might argue that it is no longer needed
and should be removed, but that is a different argument, and as stated above
it depends on knowledge of the history of the problems, history which I don't
know so I can't make an informed decision on the matter.

 Further, it imposes this fix upon mailers that don't have a  
 vulnerability (keeping in mind that other MTAs can use milters now).

If the milter is designed for sendmail (this one was, as all older ones
were) then their first duty is to sendmail, not to others who later
decide to use them...  Also, there may be other mailers who use milters who
are also vulnerable besides sendmail, etc.  So I see this point as moot.

 I'm not saying it can't be configurable, but whether it is or not, it
 must be disabled by default, IIF it is known to make sendmail or the
 milter itself exploitable.

 That would be true if and only if the proper fix didn't already  
 exist within sendmail itself.

But, is it widely deployed?  If not, then the removal now might be
premature (though making it configurable would certainly be within
reason in that case).  There is a reason I used IIF and it is
because I don't know the history well enough to make absolute statements
the way you do (without anything but your opinions to back them up).

 (and I don't recall if it's the default in sendmail, or not ... but  
 that doesn't matter, because the PROPER FIX is to use the sendmail  
 config which stops the exploit ... that proper fix might be as  
 simple as do nothing, if it IS the default)

I beg to differ.   If it isn't secure by default in sendmail, then it
is reasonable for the milter to enforce it.  (It is also reasonable
for the milter to make it conditional, and/or for the milter to simply
document the problem and warn users to fix their sendmail configurations).
What is done it up to the author, not a particular end-user.  (Though
the author may find he has more end-users if he listens to their advice...)

 At most, it
 should offer me policy options, but only _options_.

 You would rather it allows you to become exploitable?  I wouldn't...

 Nice strawman.

Why thanks! :)

 No, I wouldn't like to be exploitable.  And, without this feature, I  
 wouldn't be (not even if I was running sendmail), because the fix  
 already exists within its proper location (within sendmail itself).

But only if it is implemented in sendmail, etc...  And while you may be
the perfect admin, many admins are not, and might overlook the problem
and be exploitable because it.  Or the fix in the milter might even
have pre-dated the fix in sendmail, or the documentation in the sendmail
docs on how to properly secure it, which would leave people vulnerable.
Again, I don't know the history, so...

 At the most, the ClamAV team, and/or the clamav-milter team, should  
 provide a STRONG recommendation that the sendmail config should use  
 its existing technique for fixing the problem (which may be as  
 simple as do nothing except don't overide the default).

I agree that the above is a suitable thing to do (document the issue).
But that assumes that it was fixed in sendmail before the code was added,
and that if it was fixed later the team knew this and had time to go
back and remove it and fix the docs, etc.  Again, I don't know the
history, so...

 Milters in general exist to provide general filtering capability.   
 The clamav-milter is not a general milter.  It's a specific  
 milter, whose specific purpose is to provide ClamAV capability via  
 the milter interface.

Clamav-milter is a filter for sendmail(1) mail server. It uses a mail
scanning engine built into clamd(8).

Read into that what you like...

 Again, it is providing a fix in the wrong location, and fixing  
 something that isn't broken.

Again, I don't know the history, so I can't comment.

 It would be irresponsible for a milter to knowingly allow a security hole
 by default.

 Incorrect.  It is irresponsible for a milter to allow a security  
 hole IN THE AREA THAT THE MILTER ADDRESSES.

I disagree.  The keyword of course is knowingly.  Your opinion may vary.

 The 

Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Eric Rostetter
Quoting Tilman Schmidt [EMAIL PROTECTED]:

 That distinction is immaterial. The milter comes as part of the ClamAV
 package. s/ClamAV/clamav-milter/ throughout my posting if you want, it
 doesn't change my argument in any way.

I think it completely changes your argument.  Had you done that
in the first place, I never would have replied in fact.

 And the milter is designed to
 work with sendmail.  And if leaving this enabled by default produces
 an exploitable sendmail, then it is wrong.

 The premise of this implication is false, therefore the conclusion
 doesn't follow. Passing E-mail addresses containing shell metacharacters
 does not produce an exploitable sendmail.

Okay, so poor wording on my part.  Sorry.

 It is clamav-milter's place to pass messages to clamd for matching them
 to signatures.

How about:

It is clamav-milter's place to pass messages to clamd for matching them
to signatures in a safe and secure manor.

 Most programs allow you to become exploitable. It is always up to you
 to configure them so that this doesn't happen.

And if it is not possible to configure it to do so?

 IMHO, the proper thing to do is to document this in the milter docs.
 Whether it becomes a configurable option or not, it should certainly
 be documented that the default is to block such addresses.

 That would have been the minimum.

Yes, I can agree with that.

 But it is still wrong for a milter
 whose advertised purpose is to pass messages to a virus scanner, to
 start blocking messages based on unrelated criteria like allegedly
 illegal characters in addresses.

In that case, most all of the milters I have used or considered for
use are wrong.  So clamav-milter is at least in good company. :)

 Ok, point taken. Consider them unconfused. Now please let us discuss
 the clamav-milter program, distributed with ClamAV but separate from it,
 and how it should behave with respect to the recipient addresses of the
 mails it processes. My position is still that checking the legality of
 those is not its job and it should leave them alone.

My opionion is that if possible, without causing harm, it should do as you
say.  If doing so causes harm, then it must work to remedy that somehow.

 It would be irresponsible for a milter to knowingly allow a security hole
 by default.  Protecting against such a hole is the only reasonable thing
 to do.  How to best protect that hole is still a subject of debate.

 Clamav-milter cannot protect my mail server against all possible
 security holes, and shouldn't even try.

I only think there is an obligation if the problem is a known problem,
and there is no other known fix.

 It has a precise job, which is
 to check mails for known viruses by passing them to ClamAV, and block
 their delivery if the check comes back positive. Other security risks
 must be covered by other means.

Well, we disagree on that point.  It is a security tool, and as such
has an even greater burden to try to be as secure as possible. Even
without that, all programs should strive to be as safe as possible,
and to avoid known security issues.  That is all they were trying to
do: avoid a known security issue.  Did they do that the best way possible?
Probably not.  But should they not have done anything at all?  Certainly
not!

 Thanks,
 Tilman

-- 
Eric Rostetter
The Department of Physics
The University of Texas at Austin

Go Longhorns!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Eric Rostetter
Quoting David F. Skoll [EMAIL PROTECTED]:

 In general:

   DO NOT HARDCODE POLICY

 Otherwise, your tool becomes irritating or possibly even harmful.

In general, don't distribute code that allows remote root exploit of systems.

Otherwise, your tool becomes irritating or possibly even harmful.

 Regards,

 David.

-- 
Eric Rostetter
The Department of Physics
The University of Texas at Austin

Go Longhorns!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Sloan
Eric Rostetter wrote:
 Quoting David F. Skoll [EMAIL PROTECTED]:

   
 In general:

  DO NOT HARDCODE POLICY

 Otherwise, your tool becomes irritating or possibly even harmful.
 

 In general, don't distribute code that allows remote root exploit of systems.

 Otherwise, your tool becomes irritating or possibly even harmful.
   
Yikes!

I guess that rules out shipping a c compiler! (and a lot of other 
general purpose tools as well)

Joe

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread SM
At 14:42 17-04-2008, Eric Rostetter wrote:
I don't know the history of this expliot, etc.  So I can't comment on
whether the fix should stay or not.  It would depend on the default
settings for sendmail, how long the fix has been in sendmail, how widely
available the patched sendmail is today, etc.

Do you know which version of sendmail can be used with the 
milter?  If the exploit is prior to that, then the fix may not be applicable.

At 14:54 17-04-2008, Eric Rostetter wrote:
Well, we disagree on that point.  It is a security tool, and as such
has an even greater burden to try to be as secure as possible. Even

If you are using the milter as a security tool, you would have to do 
more filtering than what's currently implemented to prevent problems 
downstream.

Regards,
-sm 

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Eric Rostetter
Quoting SM [EMAIL PROTECTED]:

 At 14:42 17-04-2008, Eric Rostetter wrote:
 I don't know the history of this expliot, etc.

 Do you know which version of sendmail can be used with the
 milter?  If the exploit is prior to that, then the fix may not be applicable.

I never argued otherwise.  And no, as I've said, I don't know the history,
so no I don't know the versions involved.

And yes, I've used poor wording twice now.

For all I know, from what _little_ I know, the problem is in the
popen() call in the milter, and not in the sendmail at the other end
at all.  How would I know?  I have not, and probably will not, take
the time to investigate this.

For the record: I don't agree with the solution either.  But I certainly
don't agree that they should have done nothing!  Don't paint me as a
supporter for the way it was done.  I'd have done it differently.  But
I sure wouldn't leave it exploitable just because I was afraid of forcing
policy on someone.  (Yes, I would have documented it, but I wouldn't have
just ignored the problem...)


-- 
Eric Rostetter
The Department of Physics
The University of Texas at Austin

Go Longhorns!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread David F. Skoll
Eric Rostetter wrote:

 In general, don't distribute code that allows remote root exploit of 
 systems.

Sendmail doesn't allow remote exploit due to recipient addresses with
funny characters in them.  It certainly hasn't since Milter has been
around, so fixing the problem in a milter is dumb.

 Otherwise, your tool becomes irritating or possibly even harmful.

Using one tool to fix the deficiencies in another tool is bad security...
oh... wait a minute... that's the basis of the entire virus-scanning
industry. :-(

How sad.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread David F. Skoll
Eric Rostetter wrote:

 For all I know, from what _little_ I know, the problem is in the
 popen() call in the milter,

Yikes popen()

In a piece of SECURITY software???

I'm very glad I've never used Clam's milter.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread David F. Skoll
Eric Rostetter wrote:

 Well, we disagree on that point.  It is a security tool, and as such
 has an even greater burden to try to be as secure as possible.

In order for a security tool to be as secure as possible, it first of
all needs to adhere to this basic principle:

The tool behaves as advertised.

Unless the behaviour with weird recipient addresses was prominently advertised,
then it's surprising behaviour, and surprising behaviour is the enemy of
security.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Eric Rostetter
Quoting David F. Skoll [EMAIL PROTECTED]:

 Unless the behaviour with weird recipient addresses was prominently  
 advertised,
 then it's surprising behaviour, and surprising behaviour is the enemy of
 security.

As I said in almost every message so far, yes, it should have been
documented.

Couldn't agree more...

-- 
Eric Rostetter
The Department of Physics
The University of Texas at Austin

Go Longhorns!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Eric Rostetter
Quoting David F. Skoll [EMAIL PROTECTED]:

 Sendmail doesn't allow remote exploit due to recipient addresses with
 funny characters in them.  It certainly hasn't since Milter has been
 around, so fixing the problem in a milter is dumb.

Not if the problem is in the milter, or in the shell between the milter
and sendmail via popen(), or not fixable in some other way...

But certainly if the milter is rejecting valid email addresses, that
should be documented prominately at a minimum.  I'd say no excuse for
that...

 Otherwise, your tool becomes irritating or possibly even harmful.

 Using one tool to fix the deficiencies in another tool is bad security...
 oh... wait a minute... that's the basis of the entire virus-scanning
 industry. :-(

Finally, a reply to my messages that I can appreciate. :)

-- 
Eric Rostetter
The Department of Physics
The University of Texas at Austin

Go Longhorns!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-17 Thread Henrik K
On Thu, Apr 17, 2008 at 09:10:45PM -0400, David F. Skoll wrote:
 Eric Rostetter wrote:
 
  For all I know, from what _little_ I know, the problem is in the
  popen() call in the milter,
 
 Yikes popen()
 
 In a piece of SECURITY software???
 
 I'm very glad I've never used Clam's milter.

Not directly meant at David, but could you all please stop this crap and
open a bug. Continue there please. Thank you.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-16 Thread John Rudd
Dave Warren wrote:
 In message [EMAIL PROTECTED] Stephen Gran
 [EMAIL PROTECTED] wrote:
 
 On Mon, Apr 14, 2008 at 05:22:56PM +0200, Bas van Rooijen said:
 postfix would accept all three forms even
 and why not ??
 I assume you haven't looked at sendmail's security record.  
 
 I, for one, have made it a point to not care.
 
 This has
 been a pretty standard thing to do for a long time, and with even more
 characters than the milter currently uses.
 
 Can we get any email address banned in clamav just because at least one
 software package has an associated exploit?

Especially when that exploit is easily, and MORE APPROPRIATELY, plugged 
in the software package itself, instead of acting as a potential 
bloating-agent in ClamAV?


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-16 Thread John W. Baxter
On 4/15/08 5:09 PM, John Rudd [EMAIL PROTECTED] wrote:

 Tilman Schmidt wrote:
 
 So why am I dissecting that list like this? Just to show that blocking
 or not blocking certain unusal characters in mail addresses is indeed a
 policy decision which should not be forced by a piece of software, but at
 most offered as a configurable option.
 
 Absolutely agree.  It is not ClamAV's place to make policy decisions for
 me.  It is ClamAV's place to match email messages to signatures.  It is
 up to me what to do with messages that match signatures.  At most, it
 should offer me policy options, but only _options_.

Also agree.  It seems to me that this sort of policy is better placed
outside the virus scanner (unless the scanner is protecting itself).

Just as another data point, Exim (as of 4.69) ships with these rules in the
default configuration.  There is considerably more discussion of the
reasons, including noting that most of the characters are indeed legal in
addresses.  Oddly, the sequence .. Is not allowed per RFC although Exim
allows it because Philip encountered it, but he did then do extra work to
block /../

1.  For incoming mail (addressed to an address local to the installation)

  # The rule  blocks
  # local parts that begin with a dot or contain @ % ! / or |. If you have
  # local accounts that include these characters, you will have to modify
  # this rule.

(And indeed when the listed characters except leading dot were blocked for
all messages in an earlier Exim version, we had to remove the % for
submissions as one of our users needed to send to such an address.)

2.  For outgoing mail

  # This rule allows your own users to send outgoing
  # messages to sites that use slashes and vertical bars in their local
  # parts.  It blocks local parts that begin with a dot, slash, or vertical
  # bar, but allows these characters within the local part. However, the
  # sequence /../ is barred. The use of @ % and ! is blocked, as before.
  # The motivation here is to prevent your users (or your users' viruses)
  # from mounting certain kinds of attack on remote sites.

  --John



___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-16 Thread Eric Rostetter
Quoting John Rudd [EMAIL PROTECTED]:

 Tilman Schmidt wrote:

 So why am I dissecting that list like this? Just to show that blocking
 or not blocking certain unusal characters in mail addresses is indeed a
 policy decision which should not be forced by a piece of software, but at
 most offered as a configurable option.

 Absolutely agree.

I disagree in this case (read on).

 It is not ClamAV's place to make policy decisions for
 me.

And ClamAV does not.  The milter is.  And the milter is designed to
work with sendmail.  And if leaving this enabled by default produces
an exploitable sendmail, then it is wrong.

I'm not saying it can't be configurable, but whether it is or not, it
must be disabled by default, IIF it is known to make sendmail or the
milter itself exploitable.

 It is ClamAV's place to match email messages to signatures.

Yes, but this is _not_ the function of the milter, it is the function
of ClamAV, and ClamAV is not the thing causing the issue, the milter is.

 It is
 up to me what to do with messages that match signatures.

Correct, and not of any concern to the actual discussion, despite the
fact that some people believe it is.

 At most, it
 should offer me policy options, but only _options_.

You would rather it allows you to become exploitable?  I wouldn't...

IMHO, the proper thing to do is to document this in the milter docs.
Whether it becomes a configurable option or not, it should certainly
be documented that the default is to block such addresses.

BUT, the point of my email is ClamAV is an anti-virus program,  its jobs
is to match patterns and report the match. clamav-milter is a separate
program, a milter for sendmail.  A milter is by definition a filter.  It's
job IS to filter (see: https://www.sendmail.org/milter/), even though many
people use them in a non-filtering way...  Don't confuse the two programs,
or their functions.

It would be irresponsible for a milter to knowingly allow a security hole
by default.  Protecting against such a hole is the only reasonable thing
to do.  How to best protect that hole is still a subject of debate.

-- 
Eric Rostetter
The Department of Physics
The University of Texas at Austin

Go Longhorns!
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-15 Thread Tilman Schmidt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Am 14.04.2008 16:30 schrieb Michael Brown:
 The | character is not allowed in any e-mail address because it's a Unix 
 shell reserved character.

RFC 2822 disagrees with you. To begin with, there's no reason reserved
characters of any Unix shell or other program should be disallowed in
E-mail addresses.

 Here's a list right off the top of my head that are usually 
 blocked/disabled by just about every MTA out there.
 
1. Control Characters
   23. DEL

Ok. These are indeed illegal by the RFCs.

2. Space

Not true. Valid E-mail addresses containing spaces do exist, although
their owners may have a hard time getting mails from some parts of
the 'net.

3. !
   16. 
   17.  
   18. @ (when used more than once)
   19. [
   20. \
   21. ]

Ok in a way. These are special characters for the mail transport itself
(as opposed to some application program or shell) - though only
historically in the case of the exclamation mark - and are therefore
better avoided. Mail addresses containing one of these in the local
part (ie. before the last @) will indeed rarely go through.

4. 

Not true. In fact, any mail server I know of accepts mail addresses
whose local part is enclosed in double quotes just fine.

5. #
6. $
7. %
8. 
   12. ,
   13. /
   14. :
   15. ;

Not true. I have already seen every one of these characters in valid
E-mail addresses in the wild, and blocking them does generate complaints.
(btdt)

9. (
   10. )
   11. *
   22. |

Not true either. While these are indeed rare, and may cause problems with
buggy and/or misconfigured mail software, they are legal by RFC 2822, and
blocking them is a policy decision which is far from unanimity. There are
many mailservers which will indeed accept these.

So why am I dissecting that list like this? Just to show that blocking
or not blocking certain unusal characters in mail addresses is indeed a
policy decision which should not be forced by a piece of software, but at
most offered as a configurable option.

HTH
T.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3rc1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIBTZlQ3+did9BuFsRAghXAKCYhBT45TH06hR8DWrB46WnzjDLpACglrgK
MF3dKKZBUSnc+AmkDSg78z0=
=BX/w
-END PGP SIGNATURE-
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-15 Thread Michael Brown
Your dissecting my personal experience which makes all your points, 
while valid, moot for my experience. :-)


Tilman Schmidt wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Am 14.04.2008 16:30 schrieb Michael Brown:
   
 The | character is not allowed in any e-mail address because it's a Unix 
 shell reserved character.
 

 RFC 2822 disagrees with you. To begin with, there's no reason reserved
 characters of any Unix shell or other program should be disallowed in
 E-mail addresses.

   
 Here's a list right off the top of my head that are usually 
 blocked/disabled by just about every MTA out there.

1. Control Characters
   23. DEL
 

 Ok. These are indeed illegal by the RFCs.

   
2. Space
 

 Not true. Valid E-mail addresses containing spaces do exist, although
 their owners may have a hard time getting mails from some parts of
 the 'net.

   
3. !
   16. 
   17.  
   18. @ (when used more than once)
   19. [
   20. \
   21. ]
 

 Ok in a way. These are special characters for the mail transport itself
 (as opposed to some application program or shell) - though only
 historically in the case of the exclamation mark - and are therefore
 better avoided. Mail addresses containing one of these in the local
 part (ie. before the last @) will indeed rarely go through.

   
4. 
 

 Not true. In fact, any mail server I know of accepts mail addresses
 whose local part is enclosed in double quotes just fine.

   
5. #
6. $
7. %
8. 
   12. ,
   13. /
   14. :
   15. ;
 

 Not true. I have already seen every one of these characters in valid
 E-mail addresses in the wild, and blocking them does generate complaints.
 (btdt)

   
9. (
   10. )
   11. *
   22. |
 

 Not true either. While these are indeed rare, and may cause problems with
 buggy and/or misconfigured mail software, they are legal by RFC 2822, and
 blocking them is a policy decision which is far from unanimity. There are
 many mailservers which will indeed accept these.

 So why am I dissecting that list like this? Just to show that blocking
 or not blocking certain unusal characters in mail addresses is indeed a
 policy decision which should not be forced by a piece of software, but at
 most offered as a configurable option.

 HTH
 T.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.3rc1 (MingW32)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

 iD8DBQFIBTZlQ3+did9BuFsRAghXAKCYhBT45TH06hR8DWrB46WnzjDLpACglrgK
 MF3dKKZBUSnc+AmkDSg78z0=
 =BX/w
 -END PGP SIGNATURE-
 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://lurker.clamav.net/list/clamav-users.html

   
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-15 Thread John Rudd
Tilman Schmidt wrote:

 So why am I dissecting that list like this? Just to show that blocking
 or not blocking certain unusal characters in mail addresses is indeed a
 policy decision which should not be forced by a piece of software, but at
 most offered as a configurable option.

Absolutely agree.  It is not ClamAV's place to make policy decisions for 
me.  It is ClamAV's place to match email messages to signatures.  It is 
up to me what to do with messages that match signatures.  At most, it 
should offer me policy options, but only _options_.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-15 Thread Dave Warren
In message [EMAIL PROTECTED] Stephen Gran
[EMAIL PROTECTED] wrote:

On Mon, Apr 14, 2008 at 05:22:56PM +0200, Bas van Rooijen said:
 postfix would accept all three forms even
 and why not ??

I assume you haven't looked at sendmail's security record.  

I, for one, have made it a point to not care.

This has
been a pretty standard thing to do for a long time, and with even more
characters than the milter currently uses.

Can we get any email address banned in clamav just because at least one
software package has an associated exploit?
-- 
Dave Warren,  [EMAIL PROTECTED]
Office: (403) 775-1700   /   (888) 300-3480

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Rob MacGregor
On Mon, Apr 14, 2008 at 11:09 AM, Bas van Rooijen
[EMAIL PROTECTED] wrote:

  ClamAV is rejecting messages where the recipient address contains a | (pipe 
 character)..

  Why is this? Is | a virus now?

  Can this behaviour be disabled?

  Are you planning on blocking other random characters from appearing in the 
 recipient adres?

Are you certain that clamav is behind this?  What other software are
you using with your mailserver and exactly what is the error message?

-- 
 Please keep list traffic on the list.

Rob MacGregor
 Whoever fights monsters should see to it that in the process he
 doesn't become a monster. Friedrich Nietzsche
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bas van Rooijen

ClamAV is rejecting messages where the recipient address contains a | (pipe 
character)..

Why is this? Is | a virus now?

Can this behaviour be disabled?

Are you planning on blocking other random characters from appearing in the 
recipient adres?

thanks,
bvr.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bas van Rooijen
Rob MacGregor wrote:
 On Mon, Apr 14, 2008 at 11:09 AM, Bas van Rooijen
 [EMAIL PROTECTED] wrote:
  ClamAV is rejecting messages where the recipient address contains a | (pipe 
 character)..

  Why is this? Is | a virus now?

  Can this behaviour be disabled?

  Are you planning on blocking other random characters from appearing in the 
 recipient adres?
 
 Are you certain that clamav is behind this?  What other software are
 you using with your mailserver and exactly what is the error message?
 

Yes. I'm certain ClamAV is behind it; we're using postfix with ClamAV-milter,

- the message immediately rejected with the same error message,
- the message is also written to the clamav.log, 
- if you google for the error a short discussion will come up from this lists' 
archive
- you can check it easily by trying to send a message with a recipient 
containing | through a clamav server of choice

the error message is exactly 'WARNING: Suspicious recipient address blocked: ' 
followed by the address in question,
i've tried a number of addresses manually but anything containing | has the 
same problem.

PS. this behaviour didn't occur with the debian-stable version 
(0.90.1dfsg-3etch10) which has other problems,
this problem started appearing when we upgraded to the debian-volatile version 
(0.92.1~dfsg-1volatile1)



___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Ralf Hildebrandt
* Bas van Rooijen [EMAIL PROTECTED]:

 Yes. I'm certain ClamAV is behind it; we're using postfix with ClamAV-milter,
 
 - the message immediately rejected with the same error message,
 - the message is also written to the clamav.log, 
 - if you google for the error a short discussion will come up from this 
 lists' archive
 - you can check it easily by trying to send a message with a recipient 
 containing | through a clamav server of choice
 
 the error message is exactly 'WARNING: Suspicious recipient address blocked: 
 ' followed by the address in question,
 i've tried a number of addresses manually but anything containing | has the 
 same problem.

Please do show the logs.

-- 
Ralf Hildebrandt (i.A. des IT-Zentrums) [EMAIL PROTECTED]
Charite - Universitätsmedizin BerlinTel.  +49 (0)30-450 570-155
Gemeinsame Einrichtung von FU- und HU-BerlinFax.  +49 (0)30-450 570-962
IT-Zentrum Standort CBF send no mail to [EMAIL PROTECTED]
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Henrik K
On Mon, Apr 14, 2008 at 11:55:08AM +0100, Rob MacGregor wrote:
 On Mon, Apr 14, 2008 at 11:09 AM, Bas van Rooijen
 [EMAIL PROTECTED] wrote:
 
   ClamAV is rejecting messages where the recipient address contains a | 
  (pipe character)..
 
   Why is this? Is | a virus now?
 
   Can this behaviour be disabled?
 
   Are you planning on blocking other random characters from appearing in the 
  recipient adres?
 
 Are you certain that clamav is behind this?  What other software are
 you using with your mailserver and exactly what is the error message?

It took 2 seconds to grep ClamAV sources..

clamav-milter.c

if(strchr(|;, *ptr) != NULL) {
smfi_setreply(ctx, 554, 5.7.1, _(Suspicious recipient address blocked));
 
Yes it seems | and ; are blocked.

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bas van Rooijen

Mon Apr 14 13:07:57 2008 - WARNING: Suspicious recipient address blocked: 
'test|[EMAIL PROTECTED]'

Ralf Hildebrandt wrote:
 * Bas van Rooijen [EMAIL PROTECTED]:
 
 Yes. I'm certain ClamAV is behind it; we're using postfix with ClamAV-milter,

 - the message immediately rejected with the same error message,
 - the message is also written to the clamav.log, 
 - if you google for the error a short discussion will come up from this 
 lists' archive
 - you can check it easily by trying to send a message with a recipient 
 containing | through a clamav server of choice

 the error message is exactly 'WARNING: Suspicious recipient address blocked: 
 ' followed by the address in question,
 i've tried a number of addresses manually but anything containing | has the 
 same problem.
 
 Please do show the logs.
 

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bas van Rooijen
 On Mon, Apr 14, 2008 at 11:09 AM, Bas van Rooijen
 [EMAIL PROTECTED] wrote:
  ClamAV is rejecting messages where the recipient address contains a | (pipe 
 character)..

  Why is this? Is | a virus now?

  Can this behaviour be disabled?

  Are you planning on blocking other random characters from appearing in the 
 recipient adres?

Thanks for the replies so far;

however please note I already know the problem is ClamAV (hence i'm writing to 
this list..)

Is there anyone who can answer my actual questions?

greets,
bvr.


 Are you certain that clamav is behind this?  What other software are
 you using with your mailserver and exactly what is the error message?

 
 Please do show the logs.
 

  
 Yes it seems | and ; are blocked.
 

 

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread kwijibo
Bas van Rooijen wrote:
 Thanks for the replies so far;
 
 however please note I already know the problem is ClamAV (hence i'm writing 
 to this list..)
 
 Is there anyone who can answer my actual questions?
 

Comment out the check in the source and recompile?
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Török Edwin
[EMAIL PROTECTED] wrote:
 Bas van Rooijen wrote:
   
 Thanks for the replies so far;

 however please note I already know the problem is ClamAV (hence i'm writing 
 to this list..)

 Is there anyone who can answer my actual questions?

 

 Comment out the check in the source and recompile?

That check was added to prevent an exploit when run in black-hole mode.

Best regards,
--Edwin
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread John Rudd
Török Edwin wrote:
 [EMAIL PROTECTED] wrote:
 Bas van Rooijen wrote:
   
 Thanks for the replies so far;

 however please note I already know the problem is ClamAV (hence i'm writing 
 to this list..)

 Is there anyone who can answer my actual questions?

 
 Comment out the check in the source and recompile?
 
 That check was added to prevent an exploit when run in black-hole mode.
 

Then maybe it should only be active when run in black-hole mode? (maybe 
it is, I don't know if that applies to the OP).

At the very least, shouldn't it have a config switch?
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Török Edwin
John Rudd wrote:
 Török Edwin wrote:
   
 [EMAIL PROTECTED] wrote:
 
 Bas van Rooijen wrote:
   
   
 Thanks for the replies so far;

 however please note I already know the problem is ClamAV (hence i'm 
 writing to this list..)

 Is there anyone who can answer my actual questions?

 
 
 Comment out the check in the source and recompile?
   
 That check was added to prevent an exploit when run in black-hole mode.

 

 Then maybe it should only be active when run in black-hole mode? (maybe 
 it is, I don't know if that applies to the OP).

 At the very least, shouldn't it have a config switch?

Please open a bugreport if you need to accept email with |.

--Edwin

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bas van Rooijen
John Rudd wrote:
 Török Edwin wrote:
 [EMAIL PROTECTED] wrote:
 Bas van Rooijen wrote:
   
 Thanks for the replies so far;

 however please note I already know the problem is ClamAV (hence i'm 
 writing to this list..)

 Is there anyone who can answer my actual questions?

 
 Comment out the check in the source and recompile?
 That check was added to prevent an exploit when run in black-hole mode.

does this mean you can still exploit these by using other meta characters? like 
 and  ?

wouldn't it make more sense to properly escape the recipient where it is 
actually passed to sendmail?


 
 Then maybe it should only be active when run in black-hole mode? (maybe 
 it is, I don't know if that applies to the OP).
 
 At the very least, shouldn't it have a config switch?
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bryan Bradsby
 It took 2 seconds to grep ClamAV sources..

 clamav-milter.c

 if(strchr(|;, *ptr) != NULL) {
 smfi_setreply(ctx, 554, 5.7.1, _(Suspicious recipient address blocked));

 Yes it seems | and ; are blocked.

The | character might be used to expolit SMTP servers. It has no valid place
in an email address.

It is not a virus, probably spam, and/or an attempt to compromise the SMTP
server.

At your service,
-bryan bradsby

Postmaster
Texas State Government Net
NOC: 512-475-2432  877-472-4848

If user education worked, it would have worked by now
   - Peter Gutmann, the Psychology of Insecurity


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Michael Brown
The | character is not allowed in any e-mail address because it's a Unix 
shell reserved character.

Here's a list right off the top of my head that are usually 
blocked/disabled by just about every MTA out there.

   1. Control Characters
   2. Space
   3. !
   4. 
   5. #
   6. $
   7. %
   8. 
   9. (
  10. )
  11. *
  12. ,
  13. /
  14. :
  15. ;
  16. 
  17.  
  18. @ (when used more than once)
  19. [
  20. \
  21. ]
  22. |
  23. DEL


Bas van Rooijen wrote:
 ClamAV is rejecting messages where the recipient address contains a | (pipe 
 character)..

 Why is this? Is | a virus now?

 Can this behaviour be disabled?

 Are you planning on blocking other random characters from appearing in the 
 recipient adres?

 thanks,
 bvr.

 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://lurker.clamav.net/list/clamav-users.html

   
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Alan Stern
On Mon, 14 Apr 2008, Michael Brown wrote:

 The | character is not allowed in any e-mail address because it's a Unix 
 shell reserved character.
 
 Here's a list right off the top of my head that are usually 
 blocked/disabled by just about every MTA out there.
 
1. Control Characters
2. Space
3. !
4. 
5. #
6. $
7. %
8. 
9. (
   10. )
   11. *
   12. ,
   13. /
   14. :
   15. ;
   16. 
   17.  
   18. @ (when used more than once)
   19. [
   20. \
   21. ]
   22. |
   23. DEL

There's certainly something wrong here.  The open and close bracket 
characters ('[' and ']', items 19 and 21) can indeed be part of a valid 
email address.  For example:  [EMAIL PROTECTED]

Alan Stern

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Randal Hicks
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On Apr 14, 2008, at 10:30 AM, Michael Brown wrote:
 The | character is not allowed in any e-mail address because it's a  
 Unix
 shell reserved character.

 Here's a list right off the top of my head that are usually
 blocked/disabled by just about every MTA out there.

1. Control Characters
2. Space
3. !
4. 
5. #
6. $
7. %
8. 
9. (
   10. )
   11. *
   12. ,
   13. /
   14. :
   15. ;
   16. 
   17.  
   18. @ (when used more than once)
   19. [
   20. \
   21. ]
   22. |
   23. DEL

That explains why my emails to slashdot go unanswered -- everytime I  
go to their website I see that they have hacked my box and displaying  
my files for everone to see...

just kiddin'
Randal


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (Darwin)

iEYEARECAAYFAkgDckIACgkQHXnD0tz+/vw35wCfatMgrMFEcfRXc0QVZwTD1fmr
b7kAoIq5OcR8V+AvFxuDUOKDcZHV4G14
=4SfP
-END PGP SIGNATURE-
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bit Fuzzy
Alan Stern wrote:
 There's certainly something wrong here.  The open and close bracket 
 characters ('[' and ']', items 19 and 21) can indeed be part of a valid 
 email address.  For example:  [EMAIL PROTECTED]
   

There's a difference between [EMAIL PROTECTED] which would 
be invalid and [EMAIL PROTECTED] which should be translated via DNS.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Bas van Rooijen
Bit Fuzzy wrote:
 Alan Stern wrote:
 There's certainly something wrong here.  The open and close bracket 
 characters ('[' and ']', items 19 and 21) can indeed be part of a valid 
 email address.  For example:  [EMAIL PROTECTED]
   
 
 There's a difference between [EMAIL PROTECTED] which would 
 be invalid and [EMAIL PROTECTED] which should be translated via DNS.

[EMAIL PROTECTED] may be invalid

but user[bogart]@somedomain.com isn't,

and neither is user|bogarrt@somedomain.com 

postfix would accept all three forms even

and why not ??

http://www.ietf.org/rfc/rfc2822.txt


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Stephen Gran
On Mon, Apr 14, 2008 at 05:22:56PM +0200, Bas van Rooijen said:
 postfix would accept all three forms even
 and why not ??

I assume you haven't looked at sendmail's security record.  This has
been a pretty standard thing to do for a long time, and with even more
characters than the milter currently uses.
-- 
 --
|  Stephen Gran  | The most hopelessly stupid man is he|
|  [EMAIL PROTECTED] | who is not aware that he is wise.   |
|  http://www.lobefin.net/~steve | |
 --


signature.asc
Description: Digital signature
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread David F. Skoll
Stephen Gran wrote:

 I assume you haven't looked at sendmail's security record.  This has
 been a pretty standard thing to do for a long time, and with even more
 characters than the milter currently uses.

That may be true, but filtering suspicious recipient addresses is beyond
the scope of a virus-scanner, IMO.  Much like my complaints about the
PhishingScanURLs setting, I believe ClamAV should stick to the basics and
leave other policy decisions alone.

Regards,

David.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Stephen Gran
On Mon, Apr 14, 2008 at 12:05:05PM -0400, David F. Skoll said:
 Stephen Gran wrote:
 
  I assume you haven't looked at sendmail's security record.  This has
  been a pretty standard thing to do for a long time, and with even more
  characters than the milter currently uses.
 
 That may be true, but filtering suspicious recipient addresses is beyond
 the scope of a virus-scanner, IMO.  Much like my complaints about the
 PhishingScanURLs setting, I believe ClamAV should stick to the basics and
 leave other policy decisions alone.

I actually tend to agree with you on that, but the milter went far
beyond that quite a long time ago.
-- 
 --
|  Stephen Gran  | He played the king as if afraid someone |
|  [EMAIL PROTECTED] | else would play the ace.   -- John  |
|  http://www.lobefin.net/~steve | Mason Brown, drama critic   |
 --


signature.asc
Description: Digital signature
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread Sarocet
Michael Brown wrote:
 The | character is not allowed in any e-mail address because it's a Unix 
 shell reserved character.

 Here's a list right off the top of my head that are usually 
 blocked/disabled by just about every MTA out there.

1. Control Characters
2. Space
3. !
4. 
5. #
6. $
7. %
8. 
9. (
   10. )
   11. *
   12. ,
   13. /
   14. :
   15. ;
   16. 
   17.  
   18. @ (when used more than once)
   19. [
   20. \
   21. ]
   22. |
   23. DEL

The characters was passed to apopen call, thus to be escaped for a shell.

The application shall quote the following characters if they are to 
represent themselves:

|;  (  )  $  `  \'  space  tab  newline


and the following may need to be quoted under certain circumstances. 
*   ?   [   #   ˜   =   %

It's then up to $SENDMAIL_BIN to reject the address for having an embedded 
newline :)

  


___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WARNING: Suspicious recipient address blocked

2008-04-14 Thread John Rudd
David F. Skoll wrote:
 Stephen Gran wrote:
 
 I assume you haven't looked at sendmail's security record.  This has
 been a pretty standard thing to do for a long time, and with even more
 characters than the milter currently uses.
 
 That may be true, but filtering suspicious recipient addresses is beyond
 the scope of a virus-scanner, IMO.  Much like my complaints about the
 PhishingScanURLs setting, I believe ClamAV should stick to the basics and
 leave other policy decisions alone.

Or at least leave them off by default, and make them things you can 
easily switch on and off.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html