Jason Haar wrote:

> Jesse Guardiani wrote:
> 
>>I'm eager to hear what Jason Haar has to say about this. I don't know
>>how error codes are generated in q-s so I can't really comment on the
>>usability of the above code, but in concept it looks like what I'm
>>suggesting.
>>  
>>
> I'm afraid I really don't like this. This issue is as old as the trees.

No it isn't. It's brand new, because before the psender functionality was
added (which is great functionality, BTW) most people were sending notifications
for EVERYTHING. Now, most people don't send notifications, so false positives
become more of a problem.


> As anyone who has been on any Qmail lists for any length of time knows,
> issues to do with patch-clashes/etc are routine. Personally I think DJB
> made a bad mistake in not allowing output from the qmail-queue process
> to flow back to qmail-smtpd. If he had, then we could EASILY do what
> you  ask - in fact - that was originally what I wanted to do with
> Qmail-Scanner!
> 
> But instead, as qmail-smtpd error msgs are static, Q-S has to generate
> it's own error e-mails. There's no way I'd want Q-S to generate a perm
> error - because otherwise all the sending SMTP server sees is "5xxx perm
> fail" - not exactly useful. Obviously patching Qmail to have more error
> msgs would fix this particular issue, but read on...
> 
> Let's think this through.
> 
> 1. I am an infected Windows PC. I use SMTP to send the virus to my
> default SMTP gateway, it rejects the message (due to virus) at the SMTP
> layer. The virus doesn't report that SMTP error to the end user - so
> they are unaware they are infected.

Right. This is absolutely fine. No harm done.


> 2. I am an infected Windows PC. I use SMTP to send the virus to my
> default SMTP gateway, it doesn't do virus scanning so it just passes it
> on to the next SMTP gateway. Eventually it meets a gateway that rejects
> the message at the SMTP layer. The SMTP failure generates a bounce that
> goes to the "MAIL FROM" address - which isn't the infected user - so
> they are unaware they are infected.
> 
> 3. I am an infected Windows PC. I use SMTP to send the virus to my
> default SMTP gateway, it doesn't do virus scanning so it just passes it
> on to the next SMTP gateway. Eventually it meets Qmail-Scanner (set to
> send alerts always) that accepts the message, scans it and then sends an
> alert that goes to the "MAIL FROM" address - which isn't the infected
> user - so they are unaware they are infected (i.e identical to "2."
> except it has a much better error message).

No, the q-s error message is still confusing and unwanted. Before q-s introduced
the psender functionality I was sending two or three explanations to various
individuals across the internet each day. People hated the q-s message because
it claimed that they had a virus when they didn't.

#3 is much worse than #2 because a notification is ALWAYS sent. I think the
vast majority of viruses are sent directly to the recipient's mail server,
so #2 would be much less of an issue. Most mail servers are configured to
NOT be open relays these days.


> 4. I am an infected Windows PC. I use SMTP to send the virus to my
> default SMTP gateway, it doesn't do virus scanning so it just passes it
> on to the next SMTP gateway. Eventually it meets Qmail-Scanner (set to
> default of not notifying sender) that accepts the message, scans it and
> then exits. Real sender still unaware they are infected.
> 
> 
> Which one is best?
> 
> Now let's look at your actual issue. False Positives. Apparently you
> have some broken AV that is claiming clean files are infected.
> Apparently you still want to use that AV! You think Q-S should be
> rewritten to compensate for your broken AV system...

Yes, let's look at my actual issue:

4. I am a business customer, and I rely on email to do business. I send
a word doc or a zipped binary attachment that just happens to contain
a signature that looks an awful lot like a virus to a business associate's
ISP. The remote mail server silently drops the email and because my email
looks like it contains a virus. I am NOT a customer of this remote ISP, so
they do NOT send me any kind of notification whatsoever. The email is lost
and I don't realize that it didn't reach it's destination until it is too
late. Is this the sort of thing that law suites are made of? I don't know.

And here is the proposed solution:

5.) I am a business customer, and I rely on email to do business. I send
a word doc or a zipped binary attachment that just happens to contain
a signature that looks an awful lot like a virus to a business associate's
ISP. The remote mail server kills my SMTP connection with a 5xx error code
and my mail client displays an error notifying me of the problem. Even if
the returned error message is cryptic, like "qq error", I at least know
that my message did not make it to the intended recipient. I can now contact
the intended recipient via other means, or contact the ISP directly.

CONS? Yes, there are some that you've described already. If the computer
on the other end of qmail-scanner's SMTP session is NOT equiped with a
virus scanner AND is relaying the virus for someone else then someone will
receive a very cryptic bounce message. Maybe this will happen more often
than I anticipate. So what? That remote mail server should be running AV
software anyway. At least we don't have to worry about false positives
anymore. Also, I think the sting of this can be lessened if we include a
qmail patch in the contrib directory that will allow us to return more
informative bounce messages.


> Seriously, Q-S defaults to not sending alerts for messages that an AV
> says are infected. If you use quantine-attachments.txt to do "Policy
> blocks", those WILL GENERATE ALERTS. So if you block "*.doc"
> attachments, the sender of a clean *.doc file will get an e-mail telling
> them their message was blocked. As they are not a virus, the email will
> reach the actual sender. Everyone is happy.

I don't see how the above paragraph is pertinent to the discussion at hand.


> If your AV is blocking clean files as being viral, complain or change AV.

I use ClamAV, and as far as I can tell it hasn't blocked any false positives.
But I watch the virus database changelogs, and false positives are submitted
all the time. The possibility is real, and if you think your particular AV
software is immune then you're not being honest with yourself.

I'm not suggesting that we make this change the default behavior. I'm simply
suggesting that we make it an option.

-- 
Jesse Guardiani, Systems Administrator
WingNET Internet Services,
P.O. Box 2605 // Cleveland, TN 37320-2605
423-559-LINK (v)  423-559-5145 (f)
http://www.wingnet.net




-------------------------------------------------------
This SF.Net email is sponsored by Sleepycat Software
Learn developer strategies Cisco, Motorola, Ericsson & Lucent use to 
deliver higher performing products faster, at low TCO.
http://www.sleepycat.com/telcomwpreg.php?From=osdnemail3
_______________________________________________
Qmail-scanner-general mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/qmail-scanner-general

Reply via email to