Hi there,

On Fri, 24 Aug 2012, Mark Foster wrote:

First time poster, please indulge me as I get to grips with how
this group works....

Read all the docs that you can find, especially

http://www.clamav.net/doc/latest/clamdoc.pdf

and

http://www.clamav.net/doc/latest/signatures.pdf

although you could be forgiven for not finding the latter. :)

... I submitted this as a false positive several days ago but it
appears to still trigger, so i've been forced to have a bypass for
Clam worked in for this customer (less than ideal).

Interested in others exposure to circumstances like this, wonder if
i'm alone in seeing this behavior (or similar) and what the best
method of moving forward is?

You haven't told us what mail software you're using so it's difficult
to give specific advice but systems with sufficient flexibility exist.
If you use the .ign2 method as described in the signatures document it
means that all your customers' mail will be treated in the same way,
which might not be quite what you/they want.  One approach could be to
have clamav-milter flag all 'suspicious' mail such as this by adding a
header, but not reject the mail outright, and then have something like
milter-regex filter out the suspicious encrypted mail unless addressed
to particular customers who want to receive it.  This assumes that you
are using milters, but there are other ways of achieving the objective.

Of course if my customers insisted on accepting encrypted mail, I
should ask them to confirm in writing that they understand that such
mail can't be scanned effectively for threats.

--

73,
Ged.
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to