On Jul 18, 2016, at 1:03 PM, Reindl Harald <h.rei...@thelounge.net> wrote: >> For that specific case, check that OLE2BlockMacros is set to no. > > the point is this should be independent
Well, it currently isn't. >>> it makes no sense that you can't disable specific heuristics >> >> This is a reasonable point. One should be able to use the ign2 whitelist to >> disable specific heuristics, as well as having more fine-grained control >> within clamd.conf. > > fine-grained control would be difficult given you have a mix of 3rd party > signatures to know which affects what That's why being able to list the exact signatures to ignore rather than having fixed categories in clamd.conf would be a better option. > i am really shocked that ign2 whitelists don't work in a simple way that > whatever is triggered due the scan is compared agianst the whitelist and just > skipped as it was never there Yes. >> In the meantime, however, if you want to have PhishingScanURLs or PUA >> categories enabled, then you should use any matches returned under >> Heuristics.* or Phishing.Heuristics.* as a soft fail and use it for scoring >> purposes rather than as a hard fail. > > running as milter that's not possible and when you run clamd only as > spamassassin plugin any whitelisting would skip the complete virus scan what > is the reason to have the milter as second instance with different signatures The milter approach is less flexible. With a scoring mechanism, you can rate actual viruses sufficiently negative that the scoring algorithm will always reject them. >>> such false positives are *unacceptable* in case of the monthly account >>> overview and frankly i have not seen any hit which was not very likely a >>> false positive (as example newsletters from payment companies over services >>> like mailchimp) >> [ ... ] >>> Jul 8 14:42:10 mail-gw postfix/cleanup[19493]: 3rmDds0LjczB44: >>> milter-reject: END-OF-MESSAGE from mta106b.pmx1.epsl1.com[142.54.244.106]: >>> 5.7.1 Virus found or dangerous attachment: >>> "Heuristics.Phishing.Email.SpoofedDomain"; >>> from=<bounce-hp2v200000155ca866916a7a126f4bbe5c7c0...@mail.paypal.at> >>> to=<*****> proto=ESMTP helo=<mta106b.pmx1.epsl1.com> >> >> While I'd agree that it should be unacceptable for financial institutions to >> use third parties for email distribution of sensitive content, I suspect >> that wasn't your intended point. > > they use SPF and until clamav can't do a SPF test it must not run phising > tests unconditionally while the real problem is that "PhishingScanURLs no" > also disabled google safe browing signatures ClamAV is a virus scanner; it is not its job to perform SPF lookups. Whatever is calling ClamAV to process mail, whether it be a milter interface, amavisd, etc is the software that should be handling SPF checks. >> I also believe that it should not be acceptable for financial institutions-- >> or anyone who values their reputation-- to send emails containing HTML links >> where the domain of the link text shown to the user does not match the >> domain of the actual A href attribute. > > frankly i am sorry that i can't play police for every institution out there > and explain them how to handle email :-) You have no general obligation to police the entire internet, but one should care about the institutions that you or your userbase interacts with. >> Have you contacted PalPal and asked them to investigate why they are sending >> emails which look like phishing attempts via epsl1.com domain > > since i am mailadmin and don't have access to my users email no > however - "epsl1.com" is *not* the sending domain > you confuse hostnames and sender address Perhaps English isn't your native language? I spoke precisely; I did not say that epsl1.com was the sending domain. Your logs demonstrate that it, or more precisely mta106b.pmx1.epsl1.com was the MTA sending the message to your mailserver and that mail.paypal.at was the SMTP "Mail from" domain. >> which domain not only doesn't appear in the SPF records for paypal.com / >> paypal.at, but also doesn't appear to have any published MX records at all >> (per "dig -t mx epsl1.com.")...? > > sorry but you don't understand SPF really good and since when have MX records > something to do with outbound mail > > mail.paypal.at. 3600 IN TXT "v=spf1 ip4:142.54.244.96/27 > ip4:142.54.244.128/29 -all" > > 142.54.244.106 is the sending IP Two points: 1) I got different SPF results here, although hitting a third-party website to lookup the SPF records for mail.paypal.at does give the result you've shown. (I'm travelling and using someone else's network at the moment, so it's possible that they/their ISP is swizzling DNS lookups.) 2) In the absence of MX records stating otherwise, I expect that any mailserver which sends outbound email should be willing to accept inbound mail for the same domains it terminates or relays email on behalf of. >> I did. And I have since stopped using PayPal entirely after they failed to >> improve their practices. The more people who contact them via >> <sp...@paypal.com> both for phishing attempts and for supposedly genuine >> mail from PayPal which triggers AV phishing warnings, the better. > > again: i am a mailadmin and can't babysit every communication between > customers and their communication channels, i can only look at the SPF which > was correct and so say it is a false-positive and in that case the fault of > clamav Well, I've been a mail admin myself since 1990 or so. Someone with an interest in Usenet archeology could probably find on the order of 7000 posts to comp.mail.sendmail by me. ClamAV rejected the message with Heuristics.Phishing.Email.SpoofedDomain; one can run clamscan --debug against the mail (assuming you have a copy kept around in quarantine) to see exactly what is happening. It is extremely likely that the email contained misleading HTML links, presumably intended as a click-through for tracking / marketing campaign purposes. For an example, see: http://lists.clamav.net/pipermail/clamav-users/2015-August/001857.html ...although I'll quote the relevant portion: > LibClamAV debug: Looking up hash > 5E5978396FC0F81B1032CDA256B95D0D65EA0605DBE0643E89231C049A337640 for > urldefense. > proofpoint.com/(26)v2/url?u=http-3A__www.bankofamerica.com_emaildisclaimer&d=AwMFAg&c=ewHkv9vLloTwhsKn5d4bTdoqsmB > fyfooQX5O7EQLv5TtBZ1CwcvjU063xndfqI8U&r=2aYd0Z__pii05laLdA-SVeMDDGgKztEldmYeWZkrEInUKhhOQFnXGHbtYgd15gmS&m=1gyane > 8UIsmcsdK0OgwckCpz8Guf1pgeNHHmOLXQn5Y&s=XYG3vPf_ZUZQe7myUa6pQ8SUpYmn9GNeGK33YzupujA&e=(293) > LibClamAV debug: Phishcheck:URL after cleanup: > https://urldefense.proofpoint.com->http://www.bankofamerica.com Those sort of links are dangerous because phishing attempts try to do exactly the same sort of thing. SPF isn't relevant to ClamAV, since AFAIK ClamAV doesn't perform SPF lookups at all. Regards, -- -Chuck _______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml