Re: softlabs
2004-03-04 05:37:53
At 10:46 2004-03-04 +0100, Robert Allerstorfer wrote:
it seems some still don't understand me. As explained before, I have
written the procmail AV filter for use, of course, on Unix, in the
purpose to isolate viruses for windows.
You need to discreetly extinguish that thing you're smoking and re-read my
post. Absolutely NOWHERE in it did I may any reference to what platform
your stuff was running on (though being procmail-invoked, it seems rather
likely that it'd be on *nix), or that somehow I was under the mistaken
impression that your filter failed to match several encrypted files.
I have only *tested* how a common AV program would be in sync to the
results my Unix tool gave. Of course, this can only be done on the target
platform, so on Windows.
Yea, and the point was that you were claiming that some "unnamed" app
didn't isolate these. No need to NOT name it - go ahead, it's useful
information for anyone wanting to check the data for themselves. While
you're at it, you might identify the version/date of the virus definitions
used.
And, what is intersting for me is, that the Windows AV program did NOT
find the viruses my tool DID on Unix, OK?
When did I even so much as imply otherwise? OK?
> Uhm, if they were encrypted zipfiles, how'd you pull off that trick? Or is
> it static?
Why not just having a look inside it? All the files can be browsed
directly online.
I searched your posts to obtain a URL. The first one you posted, at the
end of January (a hair over a month ago),
http://softlabs.at/_tmp/Mydoom-Virus.zip
doesn't answer requests. Even the base domain. Tack a www in front of the
base domain, and something is there, but not your stuff.
A month later, you've posted a different domain entirely (with some irony,
I note that it is under a tld which someone was just today suggested should
be vaporised as spam):
http://www.softlabs.info/antivirus/
Well, I looked, and saw no comments regarding encryption, which leads me to
believe that the flagging is simply based on the fact that the zip contains
an EXE (from the directory), not that it is recognized as
malware. Further, the code I saw (at least as I interpreted it), seems to
have _zero_ effect for dealing with zips containing html which contains
HTTP content-type headers to cause flaky browsers to reinterpret as an
executable.
No offence, but it seems suspiciously like your script "identifies" these
files as infected merely because they contain executables, not because they
are actually _infected_ executables.
Of course, perhaps I missed something - but that's why I asked how it is
you're actually dealing with encrypted files. Pointing me to your code
provides no additional insight on the encryption question.
I'm sort of wondering why not produce MD5 sums of suspect files (content,
not the ZIP itself). Or, to permit reaching into ZIPs (even if encrypted),
use CRC32 and size data.
This data could very easily be propogated via a DNSBL zone.
- Sean (quite happy the procmail list isn't reflected to google groups, or
we'd all be getting even more spam as a result)
---
Sean B. Straw / Professional Software Engineering
Procmail disclaimer: <http://www.professional.org/procmail/disclaimer.html>
Please DO NOT carbon me on list replies. I'll get my copy from the list.
_______________________________________________
procmail mailing list
procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail
|
|