Hi there,

On Mon, 25 Mar 2019, J.R. wrote:

... I've seen an increasing amount of people posting about their
non-windows platforms that are scanning their *entire* system ...

People have been doing that kind of thing for years, I'm not sure how
much it's increasing.  Most of the time it seems to me they don't know
why they're doing it nor even, if there is something in there to find,
how likely it is that a ClamAV scan will find it.  You often see scans
of /proc/, /dev/ and the like - which is only going to cause problems,
not solve them.  If for example you're hosting files for Windows hosts
on non-windows platforms there's certainly a case for scanning shared
data areas, but I don't know how representative that is of the typical
ClamAV user.  Although we share files with Windows platforms we really
only use ClamAV to scan mail.  I guess we're as untypical of a ClamAV
user as you'll get.  The main reason we use ClamAV is for third-party
databases such as the excellent set produced by Steve at Sanesecurity
(once again, thanks, Steve).  Even so, ever since we took to rejecting
mail based on things like geography it really is just the occasional
catch.  With an average incoming rate of mail of ca. 1200 attempts per
day(*), since January 2018 I've seen one genuine catch by ClamAV.  As
it happens it was a malicious Word document, cunningly disguised as a
statement of account from a local hotel.  As it happens we don't have
an account with that hotel - and we don't use Word, nor even Windows.

(*) After firewalling, 15 percent actually get to connect to port 25.

I'm wondering if it is just a waste of CPU cycles, or if there are
actual signatures that could detect anything on those platforms
(that are not windows related)?

People do all sorts of daft things.  A lot of what they do wastes CPU
(and the associated energy, which I think thesedays is more important)
but one can't really deny that there might be the occasional surprise.
Very occasional indeed, however, in the case of most *nix boxes, and I
can't remember the last time I scanned a Linux box using ClamAV or any
other package.  At the time I didn't expect to find anything, I think
it was an experiment just to see how many false positives it gave and
how long it took.

It's a while since I looked at this, so I did a few 'grep's on 'daily':

mail6:/etc/mail/clamav# >>> wc daily.cld
1531682   1534564 117369856 daily.cld
mail6:/etc/mail/clamav# >>> grep -ai Win daily.cld | wc
 853283  853326 66772035
mail6:/etc/mail/clamav# >>> grep -ai Andr daily.cld | wc
 255329  255329 18510754
mail6:/etc/mail/clamav# >>> grep -ai doc daily.cld | wc
 154521  154584 11340974
mail6:/etc/mail/clamav# >>> grep -ai unix daily.cld | wc
  86435   86437 6496632
mail6:/etc/mail/clamav# >>> grep -ai java daily.cld | wc
  38254   38260 2686509
mail6:/etc/mail/clamav# >>> grep -ai OSX daily.cld | wc
  35652   35652 2531765
mail6:/etc/mail/clamav# >>> grep -ai PDF daily.cld | wc
  11133   11147  801891
mail6:/etc/mail/clamav# >>> grep -ai xls daily.cld | wc
  10227   10227  748439
mail6:/etc/mail/clamav# >>> grep -ai Phish daily.cld | wc
   3257    3257 1348569
mail6:/etc/mail/clamav# >>> grep -ai linux daily.cld | wc
      2       2     296

All right, I ran that last one as a bit of a joke but you can see
where the biggest problems are.

--

73,
Ged.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to