Re: [clamav-users] clam av Red Hat installation

2013-12-24 Thread Ned Slider

On 24/12/13 07:22, Joshua Soulwin Malayappan wrote:

Hi Dennis,

When I tried to install I got the message

It is not a valid rpm.

Can you suggest perhaps a link to zlib/zlib-dlevel rpms.

Thanks,
Josh



Josh,

You should use yum, the package manager within RHEL, as this will 
automatically resolve package dependencies for you. zlib/zlib-devel 
packages are part of the distro and will be automatically installed as 
required when you install clamav.


For example, after setting up the repoforge repository which contains 
the clamav packages, all you need is:


yum --enablerepo=repoforge install clamav

and yum will take care of all the dependencies for you.


___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml


Re: [clamav-users] ClamAV+exim: scanner finds not a single malware

2016-05-29 Thread Ned Slider



On 29/05/16 10:22, Groach wrote:


On 29/05/2016 10:19, kristen R wrote:

It should be obvious although not mentioned that everyone who uses
clamav is your fan club. I am a fan.

I also believe that clamav is an open source project? So if someone
doesn't like this product then they might submit a patch for improve
features or functionality?

If this is true, then bitching is unproductive. Else put your code
where your mouth is.

Kristen

I agree.  So, all you people that dont like the product and it features
of ClamAV, come on and put your hands up, stop bitching and submit your
own patches. (Although the slight flaw in the statement is the
assumption that all users have the ability to code and fix the product.
If everyone that drives a car had the ability to fix them too, there
wouldnt be any service garages would there. And not being skilled enough
to fix the car themselves doesnt mean they have to accept the
ineffective brakes 'as a feature'.  In reality, of course, most people
are simply too busy running an IT department or mail server to learn
such new skills and leaves coding to CODERS.)

And, army of disgruntled coders, whilst youre at it, maybe you can also
help to solve the REAL PROBLEM of the signatures out too (effectivity
and frequency).  Then the rest of us that like Clam (for its opportunity
to employ more useful 3rd party signature) can also benefit.  After all,
of Sane security can make effective signatures, as a one man unfunded
operation, then why oh why cant a CISCO-backed 'company' with its code
open to the worlds programmers not do the same?  (Irony, anyone?)



I don't normally respond to this type of thread but felt compelled to 
add my 2p worth of experience.


I love open source software and have run ClamAV on my own mail server 
for as long as I care to remember. I was also an active member of the 
anti-malware research community for a considerable time.


IMHO anti-virus products lost the battle a long time ago - it is simply 
not realistic to expect ANY company, commercial or open source, to be 
able to produce signatures for the number of new virus samples that 
emerge in a timely fashion. It has been this way for a long time. The 
numbers bear this out. A new paradigm is needed. I once hoped heuristic 
detection might have been the way forward but this doesn't seem to have 
produced the required results either.


This led me to conclude that all anti-virus products are essentially 
ineffective. Submitting samples I collect that hit my mail server spam 
traps to Virus Total support this conclusion (YMMV). Detection rates are 
abysmal at the time I collect the samples.


For me, as for others who have posted in this thread, the solution is 
simple - I simply do not permit executable code to pass through my mail 
servers. I can not think of a case where allowing executable code to be 
distributed by email outweighs the risks. Where is does, and the user 
can make a genuine risk-assessed case, it is easy enough to add case by 
case exceptions for individual users. Problem solved, at least from the 
mail server prospective.


Admittedly I am operating at the lower end of the market where it is 
easy for me to impose such unilateral policies, but I would make the 
same case all the way up to large corporates and ISPs. No reason an ISP 
can't operate the same default policy and provide a mechanism to allow 
users to opt out if they find the need to send executable code by email 
(some large ISPs block outbound tcp25 connections to address spam issues 
so they can do it when they want to). And given the numerous recent 
examples of large corporations suffering costly data leaks, even they 
should now be willing to take security concerns more seriously rather 
than scoffing at IT departments always trying to impose more restrictive 
(paranoid) working practices.


Where ClamAV should (or could) have an advantage over it's closed source 
relatives is in the sheer number of volunteers the project has the 
potential to mobilise. The ClamAV Project has the potential to mobilise 
a huge army of open source volunteers, all writing and sharing community 
signatures for the samples they collect. The framework to do this 
already exists. Would this be enough to represent timely and efficient 
detection of threats, who knows, but it is a potential resource that is 
simply not available to commercial AV companies. The samples are there, 
everyone is willing to share them, but no one company has the resources 
to protect their users from all of them due to the sheer volume. So the 
industry needs to develop a new way of working or it will die - either 
it collaborates (a concept already embraced by the Open Source 
community) or it comes up with a new way to protect it's users (e.g, 
heuristics), or people will stop paying an annual fee for a product that 
fails to protect them (I would rather spend that money of user education 
than an ineffective AV product).


In reality the AV industry died

Re: [clamav-users] Daily 23161 broke Clam

2017-03-04 Thread Ned Slider

On 03/03/17 23:53, Scott Kitterman wrote:

As far as I can tell, pcre 7 came out before 2008.  I think a decade is enough
time to insist people upgrade.

Scott K



Red Hat typically now supports each release of RHEL for at least a 
decade, and that's not including any additional extended support periods 
one may purchase from Red Hat in addition to the standard production 
lifespan, so in a Red Hat world, I would say a decade is the *minimum* 
period one should support dependent libs if you want your software used 
on that platform.


RHEL5 may reach end of production on 31 March 2017 but extended 
life-cycle support continues until 30 Nov 2020, so preferably support 
for pcre-6 should continue until then.


https://access.redhat.com/support/policy/updates/errata#Life_Cycle_Dates

A huge number of mail admins want to install a RH mail server and forget 
about it for 10+ years knowing it is supported and will just work, and 
that things aren't going to continually break with each and every 
update. I'm currently in the process of installing a new mail server to 
replace a RHEL5 server, initially set up in 2007, and only because RHEL5 
is EOL. The same hardware (touch wood) is still going strong and hasn't 
missed a beat in 10 years. If I could afford the extended support from 
RH I'd probably let it run for another 3 years.


So your opinion on this will be influenced by your perspective. I would 
argue that RHEL has a large enough installed userbase to warrant 
supporting it for at least it's 10 year production life-cycle.




On Friday, March 03, 2017 11:21:30 PM Joel Esler wrote:

If we required pcre 7, it would allow us to publish this kind of sig in the
future of 99.3 and high versions by requiring a certain "flevel".

--
Sent from my iPhone


On Mar 3, 2017, at 18:18, Chris Conn  wrote:

Hello,

Looks like my off-list email went on the list LOL.  So much for not making
noise.  Woops.

If the 0.99.3 or whatever later version where this would be implemented
requires PCRE 7, would that break database updates for versions that have
not upgraded if this pcre format is re-used in the future, or would it
simply disable pcre support in previous version of clamd that have not
been upgraded?

Thanks,

Chris


On 3/3/2017 6:13 PM, Joel Esler (jesler) wrote:
A new daily with the Sig dropped.

Probably what we will do to prevent this from happening again, is to have
0.99.3 (the upcoming version) require pcre 7.

How does that sound?

--
Sent from my iPhone


On Mar 3, 2017, at 18:08, Chris Conn  wrote:

Hello,

I hope you don't mind my contact off-list, I don't want to make noise on
it for all.  Apologies.

This new build, are we talking about a daily.cvd (23162?) or a new build
of clam/pcre?

Thanks again in advance for your help,

Chris


On 3/3/2017 4:00 PM, Alain Zidouemba wrote:
We are coming to the same conclusions.

The issue seem to isolated to using pcre libraries older than 7.0. I
does
not affect users of newer versions of pcre or users of pcre2.

A new build with the fix is in progress now.

Apologies for the impact this has caused.

Alain

On Fri, Mar 3, 2017 at 2:34 PM, Steve Basford <

steveb_cla...@sanesecurity.com> wrote:

On Fri, March 3, 2017 7:20 pm, Alain Zidouemba wrote:
We're pulling the signature causing the issue now, while we
investigate
the cause.

- Alain


Hi Alain,

I think the fix is... Replace ? with ?P  when the PCRE library is old

ie.  ?< to ?P<

On...

Doc.Macro.GenericHeuristic-5901772-0
Doc.Macro.GenericHeuristic-5931846-1


--
Cheers,

Steve
Twitter: @sanesecurity



___
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


Re: [clamav-users] Daily 23161 broke Clam

2017-03-05 Thread Ned Slider

On 04/03/17 22:54, Joel Esler (jesler) wrote:

We cannot be tied to distribution support problems.



That's fine Joel. You obviously know your own target audience. If it's 
not me I can look elsewhere for solutions :-)




On Mar 4, 2017, at 17:44, Benny Pedersen  wrote:

Leonardo Rodrigues skrev den 2017-03-04 23:12:

is clamav a redhat product ?!?! I don't think so. That being said, i
see absolutely no point at all on saying clamav should do this because
redhat does that.


good point


Anyone wishing to be updated with a 10+ years rhel install, should
call redhat for that :)


any rpm builded systems are buggy


my 0.02 cents ...


anymore left ?

i just wish 0.99.3 have clamav-milter supporting OnUnOfficiaLsignature 
accept|quarantine|reject

that will save me to have need for 2 clamd and 2 clamav-milters

just my one bitcoin :)

clamav-owner please stop breaking dkim
___
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

___
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml



___
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml