On 5 Sep 2011, at 15:18, Matus UHLAR - fantomas wrote:

> Hello,
> 
> I'm trying to distinguish between phishing and other signatures on a mail 
> server - phishing reports should be passed to our abuse@ account, but not 
> elsewhere.
> 
> Therefore, it's not possible to play with options to disable phishing 
> signatures detection ClamAV or use multiple clamav daemons - I just need to 
> distinguish them from viruses and possibly other unwanted content.
> 
> Do you have an idea how should I detect if a mail is a phish, or any other 
> content (which?) that should our abuse@ teram know about?

You can use an ACL to set a message variable, which will probably use something 
vaguely like this untested

warn
        malware = * 
        set acl_m_phish = true
        condition = eq{${substr{0}{15}{$malware_name}}{Email.Phishing.}

Then, in your subsequent ACLs, you can exempt this email from rejection (or to 
use, control=fakereject). And in your routers, you can test $acl_m_phish to get 
the email delivered to the right place.

An alternative approach is to use control=freeze - then you have manual control 
over what to do with the message. 

Oh, and I would consider directing the email to a different email address, so 
that your abuse team can distinguish the mail from stuff that really was 
addressed to abuse@. And, add a header so that they can see who the original 
recipients were.

> I currently exempt ^HTML., ^Email. and .Phishing from being rejected.
> 

-- 
Ian Eiloart
Postmaster, University of Sussex
+44 (0) 1273 87-3148

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to