On Tue, May 23, 2006 at 02:06:05PM -0600, Alex Georgopoulos wrote:
> Tons maybe a little exaggerated but like Kelson said the users keep retrying
> cause they don't get any notification that it is getting blocked so the send
> it again.  Removing the def from the cvd file is an option but would be

They don't get any notification that it is blocked? That sounds like
a problem on their end. Or does your mailserver generate a tempfail (4xx
error code) when it finds a virus?

> anoying to maintain over time.  I would really like to know why this is
> happening and get it fixed from the source and not a work around that we'll
> have to maintain.  (Trend, Symantic and Mcafee all said there wasn't
> anything wrong with the file)  I even took the file converted it to ODF
> format then back to Excel and it still gave me a false positvie.  I stripped
> out he macros too and it still doesn't like it.  My hunch is that there is a
> problem with the way that particular def works.

And you might be right. Please recall that ClamAV comes with a full
money back guarantee if it's not performing the way God intended it.

Seriously, though: the workaround (removing the sig by extracting the .cvd)
might only be necessary once or for a single day. Your customer would be
happy, file would get sent (unless the receiving end also uses clamav!),
and the problematic sig might be removed/updated from the distribution
by one of the next database updates. It's likely however your customer
won't hit the same FP twice in short succession (at least - in my
experience. FPs are still quite rare).

-- 
Jan-Pieter Cornet <[EMAIL PROTECTED]>
!! Disc lamer: The addressee of this email is not the intended recipient. !!
!! This is only a test of the echelon and data retention systems. Please  !!
!! archive this message indefinitely to allow verification of the logs.   !!
_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to