Matt [EMAIL PROTECTED] wrote:
> Julian Mehnle wrote:
> > How can I configure ClamAV not to try to detect phishing and other
> > social engineering attacks?
>
> Why? Your prerogative, obviously, but I am just curious.

For three reasons:

 1. I consider filtering technically harmful messages for my users
    acceptable, but I think filtering social engineering to be censorship.
    I would rather educate my users.

 2. While recognizing technical engineering (viruses, worms, other
    malware) automatically has proven to be feasible, I _generally_ do not
    believe in recognizing social engineering (scams, phishing, etc.)
    automatically.  Technical state of the art is far from doing that
    reliably.  Without machines being able to understand the meaning of
    text, any heuristics can only be a crook.  I am using reputation
    systems (AKA DNS blacklists) instead.

 3. I am using the SpamCop reporting tool[1] to file complaints to ISPs
    about spam (which specifically includes phishing attacks) that I
    receive.  SpamCop requires spam samples to be manually checked for
    spamminess before being reported.  Thus I _do_ want to receive social
    engineering messages and classify them manually in order to report
    them to SpamCop.

Tomasz Kojm [EMAIL PROTECTED] wrote:
> Julian Mehnle <[EMAIL PROTECTED]> wrote:
> > How can I configure ClamAV not to try to detect phishing and other
> > social engineering attacks?
>
> Modify your mail scanner to pass "HTML.Phishing.*" through.

Yes, I can do that.  Is there an authoritative hierarchy of signature
names from which I can see what hierarchy branches ("HTML.Phishing.*",
etc.) I would have to whitelist?

Besides there's oviously a fundamental difference between technical
malware and social engineering malware, so there should be a way to
configure what to detect and what not.

References:
 1. http://www.spamcop.net/anonsignup.shtml

_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users

Reply via email to