Török Edwin wrote:
> On 2009-03-19 23:38, Bill Landry wrote:
>> Török Edwin wrote:
>>   
>>> On 2009-03-19 22:54, Bill Landry wrote:
>>>     
>>>> Along the same vein as my last question, again, clamd.log reports:
>>>>
>>>>    Database correctly reloaded (1159852 signatures)
>>>>
>>>> However, "sigtool --list-sigs" only lists 696491 signatures.  It looks
>>>> to me like it is listing a combination of Official and Unofficial
>>>> signatures, but obviously not listing ALL signatures.  Which signatures
>>>> does sigtool not list in its output?
>>>>   
>>>>       
>>> The signatures from safebrowsing.c[vl]d don't have individual names,
>>> they are called either
>>> Safebrowsing.Suspected-malware_safebrowsing.clamav.net or
>>> Safebrowsing.Suspected-phishing_safebrowsing.clamav.net.
>>>
>>> $ sigtool -i /usr/local/share/clamav/safebrowsing.cld | grep Signatures
>>> Signatures: 463108
>>>     
>> So then there is no way to bypass a false positive (local.ign) from the
>> SafeBrowsing signatures?
> 
> They can be whitelisted by using .wdb entries [1], which allows you to
> use a POSIX regular expressions to whitelist any URL.
> (the original URL, not the hash).
> 
> Since the entries in safebrowsing.cld change often whitelisting based on
> position in the .cld wouldn't work.
> If you need some local.ign-like whitelisting of specific entries, I
> think that could be implemented too.

That would be great, please do that!

> The  clamscan --debug output reports both the URL and the hash that
> caused the detection, and adding the hash to a local.wdb file could
> whitelist that particular hash.
> Perhaps we could distribute a script in contrib/ that would generate a
> whitelist entry given a sample. Would that work for you?

A script would be nice, as whitelisting a hash would be much preferred
to trying to write a regex that would be specific enough to only
whitelist a single URL, especially when you have no way of determining
what other URLs are included within the SafeBrowsing signatures.

> P.S.:
> If you report a false positive to on the clamav.net/sendvirus page, it
> can be solved by simply dropping the corresponding entry with the next
> .cld update.

As experience has shown, that can take awhile sometimes.  But a script
or some other mechanism of whitelisting SafeBrowsing signatures would be
a very good thing.

Thanks,

Bill

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to