> ClamAV is designed to protect against viruses. While their > anti-phishing function works well, phishes and spam are not > viruses. They probably felt the need to do something because > the phishing threat is pretty serious, or can be if people > get tricked by them, but we've had a SURBL phishing list for > about a year:
> SURBLs are designed to check message body URIs, which is what > spammers and phishers are usually trying to direct victims > with, therefore our tool is a much better fit for the problem > than a virus tool, IMO. Whatever works most reliably is the best. (And that may be a combination.) In ClamAV's case, they have designed it to catch some proportion of phish and an appeal to "ClamAV is designed..." to restrict it to some limited category just doesn't past muster -- it does what it was designed to do -- catch (most) virus and catch many phish. Also, with a simple blacklist you don't have logic built in for things like people mentioning the URIBL on a list like this so recourse to whitelists, and the program logic of SpamAssassin or some other "meta evaulation" method. Presumably -- now you have me interested so I am going to check -- ClamAV does more than a naive pattern match on the URI and apparently they even have (had) endless debates in the ClamAV newsgroups/lists on this subject. It's sort of like Tastes Great -- Less Filling. Silly argument when what we really want is great taste without getting fat. <grin> (Or pick one: revolvers vs. automatics, Macs vs. PCs, blonds vs. redheads, etc....) Whatever works -- works. And by the way: I REALLY appreciate your SURBL lists and hard work even if I think other tools supplement and help make your stuff even better. My security principles include (but are not limited to): 1) Stop as much as possible at the outer perimeter (earlier the better) 2) Defense in depth For us, the virus scanning happens before the Spam tests; early is good. -- Herb Martin