I
Ian Kenefick
That's something. My memory is rarely very accurate when going back that
far...
Well there ya go! Don't underestimate yourself
Regards,
Ian Kenefick
http://www.ik-cs.com
That's something. My memory is rarely very accurate when going back that
far...
Julian said:Agreed, but I don't think how well a product performs should determine
what it is allowed to be called, either. There have always been good and
bad anti-virus products.
kurt said:ok, it is an anti-virus that lacks most of the sophisticated scanning
technologies present in commercial anti-virus products and therefore
lacks the ability to handle the viruses those sophisticated
technologies were designed to cope with...
That's one way of putting it, but it's a pretty negative way. I don't
see the need to go out of one's way to deride something that a bunch of
public spirited people have put a lot of time and effort into developing
so that they can give it away free.
It seems to do a good enough job of detecting the viruses that are
around today, enough so that lots of people use it to scan the emails
that arrive on their servers. So it isn't all bad.
Julian said:That's one way of putting it, but it's a pretty negative way.
I don't
see the need to go out of one's way to deride something that a bunch of
public spirited people have put a lot of time and effort into developing
so that they can give it away free.
It seems to do a good enough job of detecting the viruses that are
around today,
enough so that lots of people use it to scan the emails
that arrive on their servers. So it isn't all bad.
(don't know if there are any .NET viruses yet.)
Julian said:There seems to be a renewal of interest in the idea of using ClamAV as a
general purpose virus scanner for Windows. ...
... Boguslaw Brandys of Bransoft
(www.bransoft.com) has developed a pure Windows port of ClamAV (one that
doesn't require Cygwin) and has used it to develop a very nice mail
scanning POP3 proxy. He is apparently considering developing this into a
complete anti-virus package.
I have been thinking about converting my Tech-Protect GUI shell for
F-Prot for DOS to use ClamAV, due to the problems that the F-Prot DOS
scanner has with NTFS filenames and its inability to scan .NET
executables, so I thought I'd do a bit of testing to see how well (or
badly) it would work. I've posted the results on my website. Here's the
link: http://www.tech-pro.net/clamav.html .
Julian said:I'm sure you're right, but I think it's a pity that those with the
skills to do so aren't more supportive of the effort and don't help to
improve it. ...
... If there was a completely free anti-virus, new computers
could come with it already installed. It seems to me, most new computer
buyers, who never read magazines or visit technical forums. don't get an
antivirus until *after* the first time they get infected.
Yes, me too.
kurt wismer said:only because the current crop of replicative malware is relatively
unsophisticated, and that can quickly change... it hasn't always been
so unsophisticated and it probably won't stay that way...
just because a number of people use it doesn't mean it's any good... a
lot of people used msav, too...
Nick said:But much worse is that, once all the low-hanging fruit has been picked by
today's crop of simplistically naive malware, it is just those sites that
have settled on AV products with totally inadequate technological bases,
such as Clam-based Email gateway scanners, that will be blitzed by the
next wave of "more complex" malware.
_THAT_ is why setting up folk to use grivously inadequate technology
that seems to work today is so bad. Doing so actively cultivates the
next field for attack...
ClamAV is _utterly_ useless at detcting macro viruses as the Clam engine
developers have no idea what macro viruses look like, how to handle the
fiddly internal (and undocumented) file format structures in which the
macro code resides, and so on.
Julian said:Nick,
Thank you for your input. I think, actually, the crap has been pretty
much filtered out of my collection having been scanned in the past by
many different scanners during the course of my doing reviews for
magazines. Anything that didn't get reliably detected by respected
products like F-Prot, Sophos etc. got tossed out long ago.
I accept the fact that any test I carried out in a few hours one
afternoon without access to better virus test suites may have flaws,
but I still feel that it has some value as an attempt to quantitatively
assess the performance of the ClamAV scanner because as far as I know,
no-one with greater authority has published tests on it. Therefore, the
only indication of its abilities are aniecdotal comments from people
like yourself who, for all I know, may have some hidden aganda or axe to
grind over it.
The internet is full of people happy to criticize the work of others
without ever producing anything of value themselves. At least I made an
honest attempt to evaluate the performance of this scanner objectively
whereas you simply make statements like "the engine is shite" and "It is
a tooy with some amusing foibles" with no supporting evidence whatsoever.
kurt said:which basically tells us you have no clue... scanners are great crap
detectors precisely because magazine reviews use crap in their detection
tests and it's the only way those scanners can hope to be viewed
positively in that context...
One time, I was interested to know why a sample hadn't been detected,
because a highly respected scanner had failed to detect one of my ITW
virus samples. I sent it to their laboratory, they analyzed it, and said
that the reason it wasn't detected is because it was not a genuine
replicant. The sample had something like 15 null bytes on the end,
possibly as a result of being downloaded using some protocol like xmodem.
So in their view, my sample was "crap". I beg to differ. The ability of
this sample to replicate was in no way affected by these 15 null bytes
on the end.
*My* definition of a virus is a program that will replicate.
If someone can download an infected file and have it pass by a virus
check simply because the download protocol they used doesn't set the
file size correctly, then in my view that is a failure of the virus
scanner.
Roger said:Your definition falls short of the mark, besides - when that sample was
replicated, did the offspring also have the null bytes?
Julian said:You're wrong there. Indeed, I can recall several long conversations with
AV company personnel who were concerned that I was not using "crap"
non-viruses in my tests because their scanners wouldn't detect them.
One time, I was interested to know why a sample hadn't been detected,
because a highly respected scanner had failed to detect one of my ITW
virus samples. I sent it to their laboratory, they analyzed it, and said
that the reason it wasn't detected is because it was not a genuine
replicant. The sample had something like 15 null bytes on the end,
possibly as a result of being downloaded using some protocol like xmodem.
So in their view, my sample was "crap". I beg to differ. The ability of
this sample to replicate was in no way affected by these 15 null bytes
on the end. *My* definition of a virus is a program that will replicate.
If someone can download an infected file and have it pass by a virus
check simply because the download protocol they used doesn't set the
file size correctly, then in my view that is a failure of the virus
scanner.
You're entitled to disagree, but please don't insult me my
saying I "have no clue."
Anyway, that's all history now. These days magazines don't ask me to do
AV reviews. They get youngsters fresh out of media studies courses with
no technical knowledge at all to do 500 word reviews of AV products
based on no testing whatever, so the one that gets recommended is the
one that has the prettiest interface and the most bells and whistles.
Julian said:No. The bytes were added to the end of the original file by the
communications protocol, because it didn't know the exact file length.
It's a bit academic, as I doubt anyone uses the xmodem protocol now, but
I don't agree that it was not a valid sample.
Suppose I'm just an
ordinary guy who downloaded an infected file from a BBS using xmodem: I
would expect my AV to detect it right away, not after I'd run it and it
had infected something else and created some genuine replicants.
Consider: since the AV isn't detecting the original file that caused the
infection, I could have the virus keep coming back unless I figure out
where it must have come from.
that doesn't change the fact that scanners have been forced to detect
crud by brain-dead magazine reviewers who use crud in their tests and
therefore scanners cannot be used to weed out crud...
lets look at this a little more analytically, shall we? it wasn't
detected because it had been modified... at best it was a new variant
(did they add detection?) but more likely it was damaged... in any
case, modifications have a habit of making a virus not match it's
signature anymore...
you say the null bytes didn't affect it's ability to replicate - do you
know this for a fact? were you able to get 2nd generation offspring
from it?
if they said "it's not a virus anymore" and you got 2nd generation
offspring from it then it's your duty to name and shame, otherwise
you're blowing smoke...