Hi

> I have a serious issue with the current way virus samples are submitted.
Right now, many viruses, such as the currently-spreading jpeg virus (see
http://www.easynews.com/virus.txt) are detected by 0.80rc# or by some CVS
version.  But we can't be expected to run those on production servers.
> Yes, I understand that 0.7x can't do a heuristic check for the jpeg
exploit.  However, it *can* look for this particular file (get your free
copy from  http://easynews.com/virus/virus-jpeg.zip), and a signature should
be released.
> This is not an isolated case.  The virus submission page must be changed
to run the latest RELEASED version of clamav.

I totally agree.
It is great to know, that some soon coming version will detect things better
and can detect generic problems instead of single viri only.
However I have somehow the feeling, that right now our servers are under
attack and we are left in the rain alone.

Maybe, development could be split into two parts: engine and program host.
Then updates to the engine (to accomodate new virus signature types) could
be added, while the program can be developed more slowly.

I like clam-av very much, but knowing, that I got a virus that was happily
detected by McAfee some weeks ago and that I tried to submit to the clamav
team, is still not detected by my server and may still hit my customers is a
nightmare.

Regards,
  Steffen

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to