Matt [EMAIL PROTECTED] wrote: > Julian Mehnle wrote: > > How can I configure ClamAV not to try to detect phishing and other > > social engineering attacks? > > Why? Your prerogative, obviously, but I am just curious.
For three reasons: 1. I consider filtering technically harmful messages for my users acceptable, but I think filtering social engineering to be censorship. I would rather educate my users. 2. While recognizing technical engineering (viruses, worms, other malware) automatically has proven to be feasible, I _generally_ do not believe in recognizing social engineering (scams, phishing, etc.) automatically. Technical state of the art is far from doing that reliably. Without machines being able to understand the meaning of text, any heuristics can only be a crook. I am using reputation systems (AKA DNS blacklists) instead. 3. I am using the SpamCop reporting tool[1] to file complaints to ISPs about spam (which specifically includes phishing attacks) that I receive. SpamCop requires spam samples to be manually checked for spamminess before being reported. Thus I _do_ want to receive social engineering messages and classify them manually in order to report them to SpamCop. Tomasz Kojm [EMAIL PROTECTED] wrote: > Julian Mehnle <[EMAIL PROTECTED]> wrote: > > How can I configure ClamAV not to try to detect phishing and other > > social engineering attacks? > > Modify your mail scanner to pass "HTML.Phishing.*" through. Yes, I can do that. Is there an authoritative hierarchy of signature names from which I can see what hierarchy branches ("HTML.Phishing.*", etc.) I would have to whitelist? Besides there's oviously a fundamental difference between technical malware and social engineering malware, so there should be a way to configure what to detect and what not. References: 1. http://www.spamcop.net/anonsignup.shtml _______________________________________________ http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users