Daily sigs: 4054; main 44.  ClamAv 0.91.2-1

Installed on CentOS-4.5 from Dag's packages.  Freshly updated via the
packages from the ancient 0.90-2 (also Dag's).

Called via pyclamav (rebuilt to matching libclamav) in our own code.

One sample:  what looks like a proper Netflix shipping notice, which reached
us from an IP that Netflix claims in their SPF record.  Reported as
Phishing.Heuristics.Email.SpoofedDomain

I'll go through the other quarantined messages shortly, matching virus name
with message.  It's not quite trivial to turn our quarantined messages into
plain text for submission--I'll do so as soon as I become convinced that I
am seeing an actual problem.

For the moment, I'm turning what should be the quite valuable option
PhishingScanURLs
off.

1.  Have others with similar setups noticed this seeming problem?
 
2.  Have I in fact found the right switch to turn off the scanning which
produces Phishing.Heuristics.Email.SpoofedDomain

Thanks

  --John (who was watching carefully while running some mail through the
newly-upgraded server, or he wouldn't have spotted this)


_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to