Re: Virus protection: WAS: [Clamav-users] virus submission problem

2004-09-29 Thread Matt
Steffen Heil wrote:

> I cannot prevent such things. I have no way to tell my customers: "you
> may not send each other executables or html-files with frames." They
> would go somewhere else immediately.

 Just shifted the reply to this thread, Steffen. The iframe exploit, you
are already discriminating against, as it is in the Clam database as:

 Exploit.IFrame.Gen

 I never meant to imply that you use draconian methods on any broad areas
of email communication, but as you can see from the above, there are
specific portions of a laden email which can only point to one designated
purpose.

 I disagree, however, with ISP's or companies who use lax restrictions on
email content, just to keep customers or staff happy. At the end of the
day, maintaining a proper, healthy, and most of all, sociable system takes
precedence over peoples whims. It is the same in any business. You do your
best to meet your customers needs, but you never allow customers to
dictate poor practice.

 If you generalise areas, then you are theoretically arguing against AV
interception altogether. The 'html-files with frames' bit above is
generalising. A specific combination is what you protect against, not a
general range.


> For the same reason, excessive header line lengths need to work.

 Long header lines are fine, but when they are above the maximum laid down
in the RFC's? Why should someone send an email which violates the specs,
and expect for it to be accepted without further ado?

 With regards to greylisting and SAV, and other such components, they
are purely a business or preference decision. They do work, but at an
offset cost. They are an extra line of defence, they are not compulsory.

All the best,

Matt













---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


AW: [Clamav-users] virus submission problem

2004-09-29 Thread Steffen Heil
Hi

> The main types of checks that should be done are regarding the composition
of the emails. For example, the ones you mention above, clsid and boundary
checks, will stop a proportional amount of virus mails from getting any
further.

Okay... already doing so.

> Then there are others, like iframe, executable extensions, certain aspects
of html content, excessive header line lengths, to name but a few.

I cannot prevent such things. I have no way to tell my customers: "you may
not send each other executables or html-files with frames." They would go
somewhere else immediately.

Also greylisting is no option, since it slows down email traffic and some of
my customers use robots, which rely on these mails. For the same reason,
excessive header line lengths need to work.

Altogether, the point is, I may not drop or slow down legitimate mail.
So I "simply" scan for viri.

Regards,
  Steffen


smime.p7s
Description: S/MIME cryptographic signature


Virus protection: WAS: [Clamav-users] virus submission problem

2004-09-29 Thread Matt
Joe Maimon wrote:

> I may be in the minority here but I strenuously object to the "banned
> extensions" methodology. Especialy when implementing outside of the SMTP
> layer.

> For a service provider its a hassle for their customers. An internal 
> corp. may be able to inflict such abuse on its users, but not an SP.


 Thought I would change this to a new thread to stop the thread purists
becoming annoyed ;)

 Must admit, I couldn't agree more on that part. I do, however, block
quite a few attachment types. When was the last time you saw a valid .scr
or .pif in an email :)

 As Stephen Gran mentioned in his reply, greylisting is also very
effective at dissuading the one shot wonder attempts, as they tend to try
once or change the sender address each time, thereby never gaining a valid
triplet, and it only causes a slight delay in mail delivery times.

 That is the point, however, that I am trying to make. There are a
shedload of solutions that can whittle down the amount of virii that
ever reach the filtering/scanning stage of an email system, and once the
remaining few, (few in relative terms), reach the filtering scripts, you
can whittle them down, by various methods, to an even smaller proportion,
before they ever need to be virus scanned. A cascade of various options,
applied in the correct sequence, can make a fairly good barrier to the
virus ingress. Virii evolve, and are created more quickly, and in more
variation, than exploits or workarounds are found for existing software
and access enforcement methods.
 Thereby, filtering on the variables that change at a slower rate of pace,
whether it be by greylisting, extension type, or software vulnerabilities,
will generate a larger blockage rate than allowing the virii to get to a
line of defence which has to be kept constantly upto date to catch the
rapidly evolving nature of the problem.

 Blocking on the constants first, then variations, and then morphs last,
will yield a greater blockage rate.


Matt


---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Joe Maimon

Matt wrote:
Steffen Heil wrote:
 

For example, I DO have dnsblacklists, helo string checking, mime checks,
clsid extension checks, empty and to large boundary checks, verify
sender domain and soon some callout-checks in front of clamav.
However, some mail should get delivered and those should be checked,
right?
   


The helo checks, blacklists and other sender/client checks are just
generalisations for any type of junk email. They are not the ones that I
was including in that assessment.
The main types of checks that should be done are regarding the
composition of the emails. For example, the ones you mention above, clsid
and boundary checks, will stop a proportional amount of virus mails from
getting any further. Then there are others, like iframe, executabl
I may be in the minority here but I strenuously object to the "banned 
extensions" methodology. Especialy when implementing outside of the SMTP 
layer.

For a service provider its a hassle for their customers. An internal 
corp. may be able to inflict such abuse on its users, but not an SP.

For that matter, thanks to MS new outlooks "You cant open this 
attachement if your life depended on it (except if you hack the reg for 
each and every one -- but if you trash your machine your sol)" security 
misfeature, is now a pain in the neck to email anything usefull to a 
windows/outlook user. You send it, you go on your merry way, you (maybe) 
hear back "I cant open it" "Send it again" "What are you talking about". 

Just wait till zips become a banned extension.
What are we going to do when users become accustomed to renaming 
attachments back to the proper form? Make them click an extra ok button?
And for those who say "but they wont do that?" -- password protected zips?

Aggressive blacklisting is the answer. People who send you viruses 
should get blacklisted semi-automatically.
Now you dont even have to enter the DATA stage when they come knocking 
again.

Joe

 


---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Damian Menscher
On Wed, 29 Sep 2004, Trog wrote:
On Wed, 2004-09-29 at 11:21, Paul Boven wrote:
BogusBaw Brandys wrote:
Damian Menscher wrote [inserted attribution for myself]:
This is not an isolated case.  The virus submission page must be
changed to run the latest RELEASED version of clamav.
Seconded. I run an up-to-date release version of ClamAV (0.75), there
are virusses getting trough, but I can't submit them because 0.80rc3
would have recognised them. And we know clamav 0.75 would be able to
detect these given specific examples.
Your clairvoyance astounds me.
You are free to add your own signatures to spot your samples. They
almost certainly wouldn't catch any other samples of the same virus
though.
Same virus, or same exploit?  We're asking for protection against 
viruses, not against exploits (we'd happily upgrade to 0.80rc3 for 
that).  Or are you saying this virus is polymorphic?  I asked that in my 
original email that started this thread, and got no response.

Sounds like the webpage needs to be improved in the way another poster 
suggested: have it tell you which versins of clamav can catch the file. 
And developers should review the submissions for the current stable 
release just in case its possible to create a specific signature.

Damian Menscher
--
-=#| Physics Grad Student & SysAdmin @ U Illinois Urbana-Champaign |#=-
-=#| 488 LLP, 1110 W. Green St, Urbana, IL 61801 Ofc:(217)333-0038 |#=-
-=#| 4602 Beckman, VMIL/MS, Imaging Technology Group:(217)244-3074 |#=-
-=#| <[EMAIL PROTECTED]> www.uiuc.edu/~menscher/ Fax:(217)333-9819 |#=-
-=#| The above opinions are not necessarily those of my employers. |#=-
---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Stephen Gran
On Wed, Sep 29, 2004 at 03:17:08PM +0200, Steffen Heil said:
> Hi
> 
> > There are a significant amount of other methods that will generally detect
> an infected email. Approximately 3.8% of infected emails ever reach the
> stage where the virus scanners I use get called into action, and Clam hasn't
> missed one of those yet. Check for other email exploits before checking for
> virii.
> 
> So tell use, our preacher, how you do that?
> 
> For example, I DO have dnsblacklists, helo string checking, mime checks,
> clsid extension checks, empty and to large boundary checks, verify sender
> domain and soon some callout-checks in front of clamav.
> However, some mail should get delivered and those should be checked, right?

I also use greylisting on top of all of the methods you have above, and
clam now catches single digits of viruses/week (granted, this mx only
handles about 800-1000 emails/day, but scale appropriately).  The only
viruses hitting my MX are coming in from forwarding services.  All
direct to MX viruses have stopped.
-- 
 --
|  Stephen Gran  | Tallulah Bankhead barged down the Nile  |
|  [EMAIL PROTECTED] | last night as Cleopatra and sank.   --  |
|  http://www.lobefin.net/~steve | John Mason Brown, drama critic  |
 --


pgp1OPVHdd40E.pgp
Description: PGP signature


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Matt
Steffen Heil wrote:

> For example, I DO have dnsblacklists, helo string checking, mime checks,
> clsid extension checks, empty and to large boundary checks, verify
> sender domain and soon some callout-checks in front of clamav.
> However, some mail should get delivered and those should be checked,
> right?


 The helo checks, blacklists and other sender/client checks are just
generalisations for any type of junk email. They are not the ones that I
was including in that assessment.

 The main types of checks that should be done are regarding the
composition of the emails. For example, the ones you mention above, clsid
and boundary checks, will stop a proportional amount of virus mails from
getting any further. Then there are others, like iframe, executable
extensions, certain aspects of html content, excessive header line
lengths, to name but a few. A lot of the virus emails, as well as
containing the virii themselves, also rely upon exploits or failings in
the targeted MUA software to actually execute or mask the content until it
is executed. That is why there are such a raft of 'mime sanitising'
programmes available, Anomy and MimeDefang being prime examples. The
scripts I use are homemade, building up gradually, (over the last few
months), in finesse and precision. It isn't perfect, granted, but it is
getting closer. The few it does tend to miss due to exploits or
invalid/dubious composition are then subjected to virus scanning.

 It literally boils down to the fact that if some content/composition in
an email is not encountered in legitimate emails, then the assumption of
its contents not being legitimate and safe are ninety something percent.

 Any type of defensive system is built upon layers. The order of the
layers is down to personal preference, but there should always be a
minimum of two layers of defense for any given attack vector.

( If my posts get any longer, they'll be in pocket book format soon :)

All the best,

Matt


---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


RE: [Clamav-users] virus submission problem

2004-09-29 Thread Thomas Kinghorn
Lol @ preacher

-Original Message-
From: Matt [mailto:[EMAIL PROTECTED] 
Sent: 29 September 2004 14:45
To: [EMAIL PROTECTED]
Subject: Re: [Clamav-users] virus submission problem

Paul Boven wrote:

> >>>> This is not an isolated case.  The virus submission page must be 
> >>>> changed to run the latest RELEASED version of clamav.
> 
> Seconded. I run an up-to-date release version of ClamAV (0.75), there 
> are virusses getting trough, but I can't submit them because 0.80rc3 
> would have recognised them. And we know clamav 0.75 would be able to 
> detect these given specific examples.


 Why doesn't someone offer to create and host such a page, if it is that
important?

 If I've said it once, I've said it a thousand times, a virus scanner
should be the last line of defence in any given email scanning system.
There are multiple ways to stop most infected emails before they ever even
reach the virus scanner(s). No one should be wholly reliant upon a virus
scanning solution to protect their email integrity. If people are having
problems with infected emails slipping through, your parsing/scanning
scripts are either misconfigured or just useless crap.

 There are a significant amount of other methods that will generally
detect an infected email. Approximately 3.8% of infected emails ever
reach the stage where the virus scanners I use get called into action, and
Clam hasn't missed one of those yet. Check for other email exploits before
checking for virii.

( I really should have been a preacher :)

Matt


---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


AW: [Clamav-users] virus submission problem

2004-09-29 Thread Steffen Heil
Hi

> There are a significant amount of other methods that will generally detect
an infected email. Approximately 3.8% of infected emails ever reach the
stage where the virus scanners I use get called into action, and Clam hasn't
missed one of those yet. Check for other email exploits before checking for
virii.

So tell use, our preacher, how you do that?

For example, I DO have dnsblacklists, helo string checking, mime checks,
clsid extension checks, empty and to large boundary checks, verify sender
domain and soon some callout-checks in front of clamav.
However, some mail should get delivered and those should be checked, right?

Regards,
  Steffen


smime.p7s
Description: S/MIME cryptographic signature


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Trog
On Wed, 2004-09-29 at 12:42, Bill Maidment wrote:
> Trog wrote:
> 
> > 
> > The current stable version is 0.75.1
> > 
> > 
> 
> The stable webpage points me to 0.80rc3 as the latest!!!
> 

No it doesn't. It takes you to a page containing a number of links and
information, one such link is to clamav-0.80rc3.tar.gz another such link
is clamav-0.75.1.tar.gz.

The page states this:

"Before downloading, you may want to read Release Notes and ChangeLog"

The README with 0.80rc3 clearly states it is a "release candidate".

-trog



signature.asc
Description: This is a digitally signed message part


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Matt
Paul Boven wrote:

>  This is not an isolated case.  The virus submission page must be 
>  changed to run the latest RELEASED version of clamav.
> 
> Seconded. I run an up-to-date release version of ClamAV (0.75), there 
> are virusses getting trough, but I can't submit them because 0.80rc3 
> would have recognised them. And we know clamav 0.75 would be able to 
> detect these given specific examples.


 Why doesn't someone offer to create and host such a page, if it is that
important?

 If I've said it once, I've said it a thousand times, a virus scanner
should be the last line of defence in any given email scanning system.
There are multiple ways to stop most infected emails before they ever even
reach the virus scanner(s). No one should be wholly reliant upon a virus
scanning solution to protect their email integrity. If people are having
problems with infected emails slipping through, your parsing/scanning
scripts are either misconfigured or just useless crap.

 There are a significant amount of other methods that will generally
detect an infected email. Approximately 3.8% of infected emails ever
reach the stage where the virus scanners I use get called into action, and
Clam hasn't missed one of those yet. Check for other email exploits before
checking for virii.

( I really should have been a preacher :)

Matt


---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Bill Maidment
Trog wrote:
The current stable version is 0.75.1

The stable webpage points me to 0.80rc3 as the latest!!!

--
 _/_/_/_/  _/  _/
_/_/  _/  _/  _/
   _/_/_/_/  _/
  _/_/  _/  _/  _/
 _/_/_/_/  _/  _/  _/
Bill Maidment
Maidment Enterprises Pty Ltd
Unless you are named "Alfred E. Newman", you may read only the "odd 
numbered words" (every other word beginning with the first) of the 
message above. If you have violated that, then you hereby owe the sender 
AU$10 for each even numbered word you have read.
Adapted from "Stupid Email Disclaimers" (see 
http://www.goldmark.org/jeff/stupid-disclaimers/)


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Trog
On Wed, 2004-09-29 at 11:21, Paul Boven wrote:
> Hi everyone,
> 
> Bogusław Brandys wrote:
> 
>  This is not an isolated case.  The virus submission page must be 
>  changed to run the latest RELEASED version of clamav.
> 
> Seconded. I run an up-to-date release version of ClamAV (0.75), there 

The current stable version is 0.75.1

> are virusses getting trough, but I can't submit them because 0.80rc3 
> would have recognised them. And we know clamav 0.75 would be able to 
> detect these given specific examples.

Your clairvoyance astounds me.

You are free to add your own signatures to spot your samples. They
almost certainly wouldn't catch any other samples of the same virus
though.

-trog



signature.asc
Description: This is a digitally signed message part


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Paul Boven
Hi everyone,
BogusÅaw Brandys wrote:
This is not an isolated case.  The virus submission page must be 
changed to run the latest RELEASED version of clamav.
Seconded. I run an up-to-date release version of ClamAV (0.75), there 
are virusses getting trough, but I can't submit them because 0.80rc3 
would have recognised them. And we know clamav 0.75 would be able to 
detect these given specific examples.

Regards, Paul Boven.
---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


Re: AW: [Clamav-users] virus submission problem

2004-09-29 Thread Trog
On Tue, 2004-09-28 at 21:35, Steffen Heil wrote:
> Hi
> 
> > I have a serious issue with the current way virus samples are submitted.
> Right now, many viruses, such as the currently-spreading jpeg virus (see
> http://www.easynews.com/virus.txt) are detected by 0.80rc# or by some CVS
> version.  But we can't be expected to run those on production servers.
> > Yes, I understand that 0.7x can't do a heuristic check for the jpeg
> exploit.  However, it *can* look for this particular file (get your free
> copy from  http://easynews.com/virus/virus-jpeg.zip), and a signature should
> be released.
> > This is not an isolated case.  The virus submission page must be changed
> to run the latest RELEASED version of clamav.
> 
> I totally agree.
> It is great to know, that some soon coming version will detect things better
> and can detect generic problems instead of single viri only.
> However I have somehow the feeling, that right now our servers are under
> attack and we are left in the rain alone.

One of the major advantages of ClamAV over commercial products is that
you are able to add your own signatures. Signatures for the JPEG exploit
for non-80rc versions have been posted to the list.

The only signatures in the new format in the current db are there
because old style signatures would either produce false positives, or
are not possible to create. There are less than 10 of them.

The main advantage of the 0.80 version is the new unpackers and file
type support. As such it is able to spot existing signatures in more
file types. It does not inherently support a huge number of new
signatures.

The ClamAV team have very limited resources, and our time is better
spent creating new signatures for unknown viruses, rather than wading
through old viruses we already have signatures for, just because they
happen to be in some archive type that old versions of clam don't know
about.

> 
> Maybe, development could be split into two parts: engine and program host.
> Then updates to the engine (to accomodate new virus signature types) could
> be added, while the program can be developed more slowly.

Are you volunteering to build 'engine' binaries for every platform that
every user would conceivably use ClamAV on in order to support this?

> 
> I like clam-av very much, but knowing, that I got a virus that was happily
> detected by McAfee some weeks ago and that I tried to submit to the clamav
> team, is still not detected by my server and may still hit my customers is a
> nightmare.

I've said this before, and I'll say it again. Thats a business decision
on your part. You have to way up the pro and cons of the options and
make a decision based on those. You can do things to mitigate the
perceived risks of deploying the 0.80rc3 version, like doing internal
testing, having an warm backup of your production system with which to
continually test CVS versions (and supply feedback), re-configure your
system to use clamscan rather than clamdscan, etc.

Personally, I chucked 15GB of customer email through CVS versions prior
to 0.80rc in order to check it's integrity. And continued to do so until
I was happy with the results. As such I have confidence in it's
stability.

-trog



signature.asc
Description: This is a digitally signed message part


Re: [Clamav-users] virus submission problem

2004-09-29 Thread Bogusław Brandys
Hello,
Mitch (WebCob) wrote:
This is not an isolated case.  The virus submission page must be changed
to run the latest RELEASED version of clamav.

Haven't looked in a while, but I think it should:
Display result using latest RELEASE
Display result using latest CVS
Display IDENTITY of the virus
Display config of the online scanner (in case this affects the result)
Indicate time / date of the addition of this sig.
This would eliminate confusion, and all the "it says detected but not what
it is" etc.
I volunteered to look at making changes like this as did a few others iirc,
but for some reason this "tool" is not "open" :(
Hopefully if enough people second the motion, the changes can at least be
implemented.
This could be done by writing PHP code to clamscan or better libclamav 
or clamd. Anyone knows how to write PHP extension ?
For clamscan it could be a simple script invoking clamscan for scanning 
file stored in /tmp but it is quite dangerous.

Regards
Boguslaw Brandys
---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


RE: [Clamav-users] virus submission problem

2004-09-28 Thread Mitch \(WebCob\)
> > This is not an isolated case.  The virus submission page must be changed
> to run the latest RELEASED version of clamav.
>

Haven't looked in a while, but I think it should:

Display result using latest RELEASE
Display result using latest CVS
Display IDENTITY of the virus
Display config of the online scanner (in case this affects the result)
Indicate time / date of the addition of this sig.

This would eliminate confusion, and all the "it says detected but not what
it is" etc.

I volunteered to look at making changes like this as did a few others iirc,
but for some reason this "tool" is not "open" :(

Hopefully if enough people second the motion, the changes can at least be
implemented.

Thanks.

m/



---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users


AW: [Clamav-users] virus submission problem

2004-09-28 Thread Steffen Heil
Hi

> I have a serious issue with the current way virus samples are submitted.
Right now, many viruses, such as the currently-spreading jpeg virus (see
http://www.easynews.com/virus.txt) are detected by 0.80rc# or by some CVS
version.  But we can't be expected to run those on production servers.
> Yes, I understand that 0.7x can't do a heuristic check for the jpeg
exploit.  However, it *can* look for this particular file (get your free
copy from  http://easynews.com/virus/virus-jpeg.zip), and a signature should
be released.
> This is not an isolated case.  The virus submission page must be changed
to run the latest RELEASED version of clamav.

I totally agree.
It is great to know, that some soon coming version will detect things better
and can detect generic problems instead of single viri only.
However I have somehow the feeling, that right now our servers are under
attack and we are left in the rain alone.

Maybe, development could be split into two parts: engine and program host.
Then updates to the engine (to accomodate new virus signature types) could
be added, while the program can be developed more slowly.

I like clam-av very much, but knowing, that I got a virus that was happily
detected by McAfee some weeks ago and that I tried to submit to the clamav
team, is still not detected by my server and may still hit my customers is a
nightmare.

Regards,
  Steffen


smime.p7s
Description: S/MIME cryptographic signature


[Clamav-users] virus submission problem

2004-09-28 Thread Damian Menscher
I have a serious issue with the current way virus samples are submitted. 
Right now, many viruses, such as the currently-spreading jpeg virus (see 
http://www.easynews.com/virus.txt) are detected by 0.80rc# or by some 
CVS version.  But we can't be expected to run those on production 
servers.

Yes, I understand that 0.7x can't do a heuristic check for the jpeg 
exploit.  However, it *can* look for this particular file (get your free 
copy from http://easynews.com/virus/virus-jpeg.zip), and a signature 
should be released.

This is not an isolated case.  The virus submission page must be changed 
to run the latest RELEASED version of clamav.

Damian Menscher
--
-=#| Physics Grad Student & SysAdmin @ U Illinois Urbana-Champaign |#=-
-=#| 488 LLP, 1110 W. Green St, Urbana, IL 61801 Ofc:(217)333-0038 |#=-
-=#| 4602 Beckman, VMIL/MS, Imaging Technology Group:(217)244-3074 |#=-
-=#| <[EMAIL PROTECTED]> www.uiuc.edu/~menscher/ Fax:(217)333-9819 |#=-
-=#| The above opinions are not necessarily those of my employers. |#=-
---
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
___
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users