Multiple infections not passed to amavis
Levente Birta
blevi.linux at gmail.com
Thu Feb 2 10:17:21 CET 2017
Hi
I use amavisd 2.10 and clamav 0.99 with sanesecurity.
in the amavisd.conf:
@virus_name_to_spam_score_maps =
(new_RE( # the order matters!
[ qr`^Structured\.(SSN|CreditCardNumber)\b` => 0.1 ],
[ qr`^(Heuristics\.)?Phishing\.` => 0.1 ],
[ qr`’^(Email|HTML)\.Phishing\.(?!.*Sanesecurity)` => 0.1 ],
[ qr`^Sanesecurity\.(Malware|Badmacro|Foxhole|Rogue|Trojan)\.`
=> undef ],# keep as infected
[ qr`^Sanesecurity\.` => 0.1 ],
[ qr`^Sanesecurity.TestSig_` => 0 ],
[ qr`^Email\.Spam\.Bounce(\.[^., ]*)*\.Sanesecurity\.` => 0 ],
[ qr`^BofhlandMW\.` => undef
],# keep as infected
[ qr`^Bofhland\.Malware\.` => undef
],# keep as infected
[ qr`^Bofhland\.` => 0.1 ],
[ qr`^winnow.malware\.` => undef
],# keep as infected
[ qr`^winnow\_` => 0.1 ],
[ qr`^PhishTank\.Phishing\.` => 0.1 ],
[ qr`^Porcupine\.Malware\.` => undef
],# keep as infected
[ qr`^Porcupine\.` => 0.1 ],
[ qr`^Email\.Spammail\b` => 0.1 ],
[ qr`^Safebrowsing\.` => 0.1 ],
[ qr`^winnow\.(phish|spam)\.` => 0.1 ],
[ qr`^ScamNailer\.` => 0.1 ],
[ qr`SecuriteInfo\.com\.Spam\-720` => 1.5 ],
));
If the mail is detected as infected by clamav with one single infection
the above map is working.
Here is the log:
Feb 2 10:00:51 wsrv clamd[18232]: Received POLLIN|POLLHUP on fd 4
Feb 2 10:00:51 wsrv clamd[18232]: Got new connection, FD 9
Feb 2 10:00:51 wsrv clamd[18232]: Received POLLIN|POLLHUP on fd 5
Feb 2 10:00:51 wsrv clamd[18232]: fds_poll_recv: timeout after 5 seconds
Feb 2 10:00:51 wsrv clamd[18232]: Received POLLIN|POLLHUP on fd 9
Feb 2 10:00:51 wsrv clamd[18232]: got command CONTSCAN
/var/spool/amavisd/tmp/amavis-20170202T100051-18468-zTSdo6K6/parts (75,
7), argument:
/var/spool/amavisd/tmp/amavis-20170202T100051-18468-zTSdo6K6/parts
Feb 2 10:00:51 wsrv clamd[18232]: mode -> MODE_WAITREPLY
Feb 2 10:00:51 wsrv clamd[18232]: Breaking command loop, mode is no
longer MODE_COMMAND
Feb 2 10:00:51 wsrv clamd[18232]: Consumed entire command
Feb 2 10:00:51 wsrv clamd[18232]: Number of file descriptors polled: 1 fds
Feb 2 10:00:51 wsrv clamd[18232]: fds_poll_recv: timeout after 600 seconds
Feb 2 10:00:51 wsrv clamd[18232]: THRMGR: queue (single) crossed low
threshold -> signaling
Feb 2 10:00:51 wsrv clamd[18232]: THRMGR: queue (bulk) crossed low
threshold -> signaling
Feb 2 10:00:51 wsrv clamd[18232]:
/var/spool/amavisd/tmp/amavis-20170202T100051-18468-zTSdo6K6/parts/p004:
SecuriteInfo.com.Spam-720.UNOFFICIAL(5906f52c03b1982c4aed88c3778801d4:36917)
FOUND
Feb 2 10:00:51 wsrv clamd[18232]:
/var/spool/amavisd/tmp/amavis-20170202T100051-18468-zTSdo6K6/parts/p001: OK
Feb 2 10:00:51 wsrv clamd[18232]: Finished scanthread
Feb 2 10:00:51 wsrv clamd[18232]: Scanthread: connection shut down (FD 9)
Feb 2 10:00:51 wsrv clamd[18232]: THRMGR: queue (single) crossed low
threshold -> signaling
Feb 2 10:00:51 wsrv clamd[18232]: THRMGR: queue (bulk) crossed low
threshold -> signaling
Feb 2 10:00:51 wsrv amavis/pickup[18468]: (18468-01) run_av
(ClamAV-clamd):
/var/spool/amavisd/tmp/amavis-20170202T100051-18468-zTSdo6K6/parts
INFECTED: SecuriteInfo.com.Spam-720.UNOFFICIAL
Feb 2 10:00:51 wsrv amavis/pickup[18468]: (18468-01) Turning AV
infection into a spam report: score=1.5,
AV:SecuriteInfo.com.Spam-720.UNOFFICIAL=1.5
But I have one mail with multiple infection like this:
Virus scanner output:
p004: Sanesecurity.Blurl.b4e48a.UNOFFICIAL FOUND
p002: Sanesecurity.Blurl.fcc3c3.UNOFFICIAL FOUND
and the log
Feb 2 10:01:35 wsrv clamd[18232]: Received POLLIN|POLLHUP on fd 4
Feb 2 10:01:35 wsrv clamd[18232]: Got new connection, FD 9
Feb 2 10:01:35 wsrv clamd[18232]: Received POLLIN|POLLHUP on fd 5
Feb 2 10:01:35 wsrv clamd[18232]: fds_poll_recv: timeout after 5 seconds
Feb 2 10:01:35 wsrv clamd[18232]: Received POLLIN|POLLHUP on fd 9
Feb 2 10:01:35 wsrv clamd[18232]: got command CONTSCAN
/var/spool/amavisd/tmp/amavis-20170202T100135-18469-4Hmcgoej/parts (75,
7), argument:
/var/spool/amavisd/tmp/amavis-20170202T100135-18469-4Hmcgoej/parts
Feb 2 10:01:35 wsrv clamd[18232]: mode -> MODE_WAITREPLY
Feb 2 10:01:35 wsrv clamd[18232]: Breaking command loop, mode is no
longer MODE_COMMAND
Feb 2 10:01:35 wsrv clamd[18232]: Consumed entire command
Feb 2 10:01:35 wsrv clamd[18232]: Number of file descriptors polled: 1 fds
Feb 2 10:01:35 wsrv clamd[18232]: fds_poll_recv: timeout after 600 seconds
Feb 2 10:01:35 wsrv clamd[18232]: THRMGR: queue (single) crossed low
threshold -> signaling
Feb 2 10:01:35 wsrv clamd[18232]: THRMGR: queue (bulk) crossed low
threshold -> signaling
Feb 2 10:01:35 wsrv clamd[18232]:
/var/spool/amavisd/tmp/amavis-20170202T100135-18469-4Hmcgoej/parts/p004:
Sanesecurity.Blurl.b4e48a.UNOFFICIAL(f7555a23bbf9551c86212d6acd54ef8f:67128)
FOUND
Feb 2 10:01:35 wsrv clamd[18232]:
/var/spool/amavisd/tmp/amavis-20170202T100135-18469-4Hmcgoej/parts/p001: OK
Feb 2 10:01:35 wsrv clamd[18232]:
/var/spool/amavisd/tmp/amavis-20170202T100135-18469-4Hmcgoej/parts/p002:
Sanesecurity.Blurl.fcc3c3.UNOFFICIAL(644a611c09aa304f053d15a0cc8c3460:41020)
FOUND
Feb 2 10:01:35 wsrv clamd[18232]: Finished scanthread
Feb 2 10:01:35 wsrv clamd[18232]: Scanthread: connection shut down (FD 9)
Feb 2 10:01:35 wsrv clamd[18232]: THRMGR: queue (single) crossed low
threshold -> signaling
Feb 2 10:01:35 wsrv clamd[18232]: THRMGR: queue (bulk) crossed low
threshold -> signaling
Feb 2 10:01:35 wsrv amavis/pickup[18469]: (18469-01) run_av
(ClamAV-clamd):
/var/spool/amavisd/tmp/amavis-20170202T100135-18469-4Hmcgoej/parts INFECTED:
Feb 2 10:01:35 wsrv amavis/pickup[18469]: (18469-01) virus_scan: (),
detected by 1 scanners: ClamAV-clamd
I see in the logs that the virus names apparently are not passed to
amavis and the @virus_name_to_spam_score_maps not work in this multiple
infection case
What I'm missing?
Thanks
--
Levi
More information about the amavis-users
mailing list