John Rudd wrote:

> http://people.ucsc.edu/~jrudd/ClamAV/318642.mbox
> http://people.ucsc.edu/~jrudd/ClamAV/318715.mbox

Those scanned pretty quickly for me.  I don't believe I'm seeing
really bad behaviour on any particular message; I just see way more
overhead on all messages.

On my customer's system, the heuristic caught about 30 e-mails out of
a daily volume over 2 million (and they most likely would have been caught
anyway by the anti-spam filter.)  So I don't know what the Clam guys are
doing wrong, but the huge overhead simply isn't worth the benefit IMO.
Once again, I ask the developers to reconsider this feature, or at
least make it off-by-default.

Just for kicks, I scanned John Rudd's files with and without phishing URLs:

With phishing URLS:

real    0m1.925s
user    0m1.820s
sys     0m0.100s

Without phishing URLS:

real    0m1.761s
user    0m1.630s
sys     0m0.140s

Since most of that time is probably to load signatures, it's a fairly
significant overhead.  Repeated runs show a consistent 200ms user-time
overhead for doing the phishing URL scans.  An "strace" reveals that indeed
most of the time is spent loading signatures, so the actual impact
on scanning time is huge.

Regards,

David.
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to