they indeed do not fire with "clamdscan"
these mails which are *not phishings* and are the reason why i
configured as second clamd and disabled that idiotic stuff in the
milter-instance
http://lists.clamav.net/pipermail/clamav-users/2016-July/003113.html
-100 USER_IN_SPF_WHITELIST From: address is in the user's SPF whitelist
-0.0 SHORTCIRCUIT Not all rules were run, due to a
shortcircuited rule
-0.0 CUST_SHORTCIRCUIT1 Skip tests for whitelists and local relays
Am 15.02.2017 um 17:49 schrieb outre...@epsilon.com:
Dear all,
Please see the two source files attached for the English and German versions of
the email.
Many thanks for your help,
Anne-Sophie
-----Original Message-----
From: clamav-users [mailto:clamav-users-boun...@lists.clamav.net] On Behalf Of
Steven Morgan
Sent: 15 February 2017 16:33
To: ClamAV users ML <clamav-users@lists.clamav.net>
Subject: Re: [clamav-users] clamdscan mail file
Hi,
Can you try 'clamscan --phishing-scan-urls'?
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/contact.html#ml