Hi, I had a spate of reports about an FP in the SaneSecurity SpearL list. It included a URL that’s attached by MessaageLabs when it scans outbound mail from the University of Brighton (which is just over the road from us).
However, the reports that came in referred variously to Sanesecurity.SpearL.448.UNOFFICIAL and Sanesecurity.SpearL.447.UNOFFICIAL I went to http://sane.mxuptime.com/s.aspx?id=Sanesecurity.SpearL.448.UNOFFICIAL to identify the offending string, but when I go there now, I see a different string. That makes it very difficult to track down FPs that have been reported a few days after the fact. Also, it means that whitelisting a pattern by name doesn’t work properly. Some questions arise: 1. Am I seeing codes re-used as the source for the signatures changes? 2. Does this happen with other types of signature? 3. If 'yes' to either, is it possible to prevent this in order to make it easier to investigate problems? 4. Otherwise, what am I doing wrong? BTW: note to self, decode patterns in spearl.hdb with for n in ` cut -d: -f4 spearl.ndb ` ; do ( echo $n |xxd -r -p );echo; done -- Ian Eiloart Postmaster, University of Sussex +44 (0) 1273 87-3148 _______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml