Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security The Internet

Best Antivirus Options for a Mailserver? 91

CSIP asks: "I am setting up a small mailserver, with ~500 users, across 80 domains. I'm planning to use qmail-scanner and an antivirus scanner to block incoming viruses. I would prefer to use ClamAV, however I've read conflicting reports on its effectiveness. The commercial scanners appear to detect 99.X% however they are licensed per-user, which at 500+ users becomes quite the annual bill. What is everyone's experience with ClamAV? Are their other commercial scanners that allow you to license on a per-server basis?" The best indicator of quality for a virus scanner is the information in its virus database. How do ClamAV's virus definitions compare to commercial scanners, like McAfee's?
This discussion has been archived. No new comments can be posted.

Best Antivirus Options for a Mailserver?

Comments Filter:
  • ClamAV (Score:1, Interesting)

    by Anonymous Coward on Wednesday March 03, 2004 @05:56PM (#8456536)
    I have been using ClamAV for about 6 months, and so far its blocked a few viruses. So far so good.
  • Clam (Score:5, Interesting)

    by ADRA ( 37398 ) on Wednesday March 03, 2004 @06:10PM (#8456668)
    I don't know how many virus signatures it detects, but I can say that our company of only 30 ppl has yet to receive a virus through Clam.

    We did have Norton AV/Exchange running when we used exchange as a front line server. It was also pretty good about viruses except for the first day of CodeRed I believe where it was 1/2 after the first emails showed up. We only paid once and the updates never seemed to discontinue after the year, so maybe its just support/assurance that you're paying for. Consult the contract if in doubt.
  • by richie2000 ( 159732 ) <rickard.olsson@gmail.com> on Wednesday March 03, 2004 @06:10PM (#8456673) Homepage Journal
    Most viruses spread so quickly that the AV tools' databases are inevitably out of date and ineffective.

    That wasn't really true until just a week ago when I had to manually update my f-prot twice in one day to catch the new Neksky variants. I had it set at once a day for the longest time, set it for twice a day a month ago and it's now at every four hours. The updated db got them right away, the delay (in my case) was me doing the update in the first place.

    F-prot and SpamAssassin with Courier-MTA [gentoo.org], BTW.

  • ClamAV (Score:5, Interesting)

    by Evanrude ( 21624 ) <david.fattyco@org> on Wednesday March 03, 2004 @06:21PM (#8456791) Homepage Journal
    The ClamAV client is great for scanning email, but it is best used with another scan engine, such as amavis-ng [sourceforge.net].

    I own a company that uses the ClamAV+Amavis-ng configuration internally and implements the solution for clients. We've never seen a virus come through the system yet.

    When you combine these tools with SpamAssassin you have a fairlyy "safe" email system.
  • Re:Clam (Score:3, Interesting)

    by RedHat Rocky ( 94208 ) on Wednesday March 03, 2004 @06:23PM (#8456808)
    Used to use Sophos to scan email coming into a qmail server. Switched to ClamAV a couple of months ago and have never regretted it.

    I do think they deserve some support from the community, I'm considering what to do in my workplace. A mirror would be possible but the mirror terms are a little out of the ordinary.
  • Chain Solutions (Score:3, Interesting)

    by 4of12 ( 97621 ) on Wednesday March 03, 2004 @06:26PM (#8456841) Homepage Journal

    Not recommending anything in particular, but you can chain together different tools to filter more completely than a single line of defense both against viruses and against spam.

    IIRC, at MyCorp, Exchange servers are insulated from the outside by both PerlMX [perl.com] and Tumbleweed [dmoz.org].

  • by Gaima ( 174551 ) on Wednesday March 03, 2004 @06:31PM (#8456953)
    I also run a mailserver, but for a company of 50ish, over a dozen or so domains.
    At first I converted it from exim to qmail with qmail-scanner, then replaced qmail-smtpd with qpsmtpd.
    As we already have licencing for f-prot I used that, but it soon failed to pick up a variant of Swen. So I simple added the clamav plugin and stopped the variant (gibe) dead.

    I probably should build some stats on which scanner detects what, but we've only had a few netsky variants before one or the other updated.
    With at least the first and second netsky variants it was f-prot which updated first.
  • Here's an idea... (Score:5, Interesting)

    by gklinger ( 571901 ) on Wednesday March 03, 2004 @06:34PM (#8457004)
    It would take a bit of server side scripting but it shouldn't be that hard to implement. If someone gets a piece of email with an attachement, any binary attachment, strip it out and save it out somewhere (~/mail/attachments or ~/public_html/mail/attachments, wherever is easiest given your system's configuration) and in its place include a text attachment that says something like, "This email came with an attachment. This could be a virus. We recommend you exercise caution when dealing attachments. You may download/view the attachment at [give URL pointing to wherever you saved it]."

    If it's a picture or a word document from a friend or colleague then they'll probably end up viewing it in their browser and if it's a binary, provided it came from a trusted source, they can download it (make sure to give them an option to delete it if they'll feel it isn't benign). If it's something they don't recognize and/or from someone they don't recognize, they're going to be a bit more cautious. The idea is that the extra step prevents people who open all attachements without thinking or, worse yet, run email clients which allow attachments to rape their computer without their knowing, from harming themselves.

    If anyone complains, tell them this is the email version of "Are you sure you want to delete that file?" -- it's a pause that forces reflection that may end up saving them grief. They'll learn to live with the added step and eventually, they'll be glad it's there to protect them.

  • by BrookHarty ( 9119 ) on Wednesday March 03, 2004 @06:52PM (#8457252) Journal
    F-prot does indeed rock, for a home user, you can setup a linux box, use postfix,fetchmail,f-prot, procmail and spam assassin. Top it off with Mozilla Mail or Thunderbird, and spam/viruses are so much easier to deal with.
    F-prot catchs most viruses, the rest seem to be on a blocked list, so I'm pretty happy with f-prot. In fact, I use f-prot to scan all the file-systems also, not just for email. F-prot has to be the easiest command line scanner out.

    And if you want, you can use procmail/fetchmail and hotpop to grab your webbased emails and scan them for viruses. Little time to setup, but worth every minute.
  • Vexira Antivirus (Score:3, Interesting)

    by PinkX ( 607183 ) on Wednesday March 03, 2004 @06:53PM (#8457262) Homepage
    It has a very similar licencing scheme to what RAV used to offer (before they were bought out by The Evil Empire [microsoft.com]. They license by domain, with a maximum of 3000 users.

    It integrates easily with any MTA (works as a proxy), including my favorite qmail. Runs over Linux and various *BSD's. I've succesfully installed it over Debian (even thought only RPM packages are provided - they can be easily converted to .deb or whatever other package format your distro uses with the help of Alien). And you could always use it together with ClamAV, to doule-check your mail messages for viruses.

    They also offer an antivirus solution for Samba servers, which provides real-time scanning and blocking of files when opened/closed from the network. It comes with a fixed price for server with an unlimited number of users and shares to protect.

    The recomendation may com from a little closer - my company is a Vexira Reseller. But all in all it's a good solution and IMHO it has the most convenient licencing scheme.

    For more info visit: Vexira Website [centralcommand.com].

    Regards,

  • by darken9999 ( 460645 ) on Wednesday March 03, 2004 @07:00PM (#8457356)

    The biggest reason I have to use ClamAV is because almost no one else supports OS X. I didn't find any besides ClamAV that weren't a all-in-one mail server, which I'm not going to bother with.

    If Vexira would have supported OS X when I was looking, I would have bought it.

  • by j-turkey ( 187775 ) on Wednesday March 03, 2004 @07:38PM (#8457825) Homepage

    I've had reasonably good luck with ClamAV. I've found that effectiveness tends to depend on configuration (which I'll get back to).

    Some people say that the ironclad test of an A/V app is the number of virus definitions listed. In ClamAV's case (per FreshClam's log output), there are 20372 signatures in the DB. IMO, the number of definitions doesn't really mean much. In my experience, the most important stuff to protect against are the recent outbreaks -- where mail servers are inundated with worm-laiden email. In this case, it's really a matter of how soon the definitions are updated. Generally, I tend to see definitions updated within 12-48 hours of a reported outbreak. Combine this with your update frequency to figure out your expopsure period.

    There will be an exposure period regardless of which A/V software you run. Some will have greater average periods than others. Don't rely on marketing information to figure this out. It's a bunch of crap. Real world experience is what counts here -- if you've got lots of experience with these, great. If not, try to find someone who knows their stuff who can give you a good idea for what's what with different apps. I haven't used a ton of these, so I can't give you any ironclad data.

    Your configuration will tend to be your greatest asset/worst enemy in terms of finding the best A/V setup for your particular needs. For example -- I automatically block certain types of attachments via qmail-scanner. There's no reason for them -- and they're not worth the risk. I block any attachment with the following extensions (I'm sure that this is not perfect, but whatever): .vbs, lnk, scr, wsh, hta, pif, exe, bat, com, sct, chm, cmd, crt, hlp, hta, isp, pcd, reg, shs, and js. These attachments are all allowed inside of an archive (which ClamAV scan), but I'm willing to roll the dice on exposure to those, since screwing up and opening the attachment is no longer as simple as a single mouseclick.

    Finally, I also run client-side A/V. These just aren't as reliable as server-side protection -- users always find wonky things to do with/to their computers...but I like to think of this is a last line of defense. Furthermore, users also tend to check their personal email from work. If you have the hardware to handle it, it might be worth your while to have your users forward their personal email through your service to cover your butt (or enact a policy forbidding users from checking personal email at work)...just be careful about discoverability of their personal email if it comes through your work email (IANAL).

    Overall, I'm satisfied with ClamAV/Qmail-Scanner. I'm running it on a system designed for 1000 users (in its current hardware/software configuration) -- scalable to up to about 3000 users. Currently, we're running with around 150 users...in about 2 months, we'll have our new HR/payroll system up which will allow us to add accounts for the rest of our 750 employees (long story). We'll see how good it is once I have a larger userbase to work with. However, my favorite part about ClamAV (and this is the real selling point) is the lack of per-seat fees associated with most commercial AV products. This is the same reason we chose not to use Exchange...those fees are hefty!

  • by caseih ( 160668 ) on Wednesday March 03, 2004 @07:54PM (#8458021)
    No server based AV solution I know of will stop the latest wave of random password zip viruses. That is because the AV program cannot scan inside the zip file. I've posted a patch to the clamav-users mailing list that marks all password-encrypted zip files as suspect and thus can be quarantined for manual extaction and scanning if desired.

    Right now I'm quarantining (with mimedefang and the patched clamav) all encrypted zip files. So far it's 100% hit rate, with no false positives. Unfortunately, ClamAV developers haven't said how they plan to deal with these password zip files.

    Overall, once I patched clamav, I was more than pleased. Over the last 2 months Clamav working through mimedefang has saved us from almost all the viruses coming into our server. Updates are daily or more and I have a cron auto-updating them on the hour.

    The beauty of having an open source AV was made clear to me today as I modified ClamAV to detect the encrypted zip files. Even though this is more of a stop-gap measure, with any other closed-source program I would have been completely at the vendor/developer's mercy.

    That said, using clamav in conjunction with other AV programs in a stack fashion would give you even more coverage if you were worried.
  • Mostly works. (Score:1, Interesting)

    by Anonymous Coward on Wednesday March 03, 2004 @07:55PM (#8458028)
    I use 0.65 with a patch with success. There are times when a mal-formed email will crash the daemon and then viruses can get through when the milters start timing out. One must be diligent to catch those situations. It can't be easily debugged because the offending email is long gone by the time the problem is noticed. Attempts to beg the developers for a less catastrophic failure mode (or at least a failure mode that leaves enough bits lying around to reproduce the crash for later debugging) have not resulted in anything useful, yet.
  • by great_snoopy ( 736076 ) on Wednesday March 03, 2004 @08:23PM (#8458345)
    Even if you use pine, you still get tons of junk mail generated by viruses. All those messages must be manually deleted. Depending on various factors, you can get more or less junk virmail, and it's frustrating to delete them by hand. Better let the AV do that for you.
  • From a user's POV (Score:3, Interesting)

    by Mr. Piddle ( 567882 ) on Wednesday March 03, 2004 @08:24PM (#8458350)

    Please don't use a scanner that "quarantines" e-mails that require admin intervention to get back. One of my prior employers created such a beast for their e-mail system, and it would even quarantine e-mails I send to co-workers. The admins of course have slow turn-around times. It ended up easier to use the telephone or FTP, defeating the original convenience and usefulness of e-mail. Even further, it would quarantine totally legitimate stuff from mailing lists. Really crappy stuff.

    IMO, it is better to have suspicious e-mail diverted to a "Dangerous, Be Careful" folder with a big Skull-and-Bones air about it, so I can ignore the virus scanner altogether to get at important e-mails.

    Also, don't use Windows. Of course, you already knew that, right?

  • by 5.11Climber ( 578513 ) on Wednesday March 03, 2004 @08:53PM (#8458650)
    We use a Fortinet FG-60 [fortinet.com] to scan for viruses at the network layer. This has the advantage of also scanning HTTP, VPN, POP3, IMAP, SMTP and FTP traffic and strips the viruses from those streams before it hits your network!

    These devices provide VPN support as well as full firewall features. The Fortinet devices start at $500 USD and go all the way up to data center class devices costing >$40,000 USD. Very easy configuration. Worth the cost.

  • ClamAV concerns (Score:3, Interesting)

    by menscher ( 597856 ) <menscher+slashdotNO@SPAMuiuc.edu> on Wednesday March 03, 2004 @10:44PM (#8459518) Homepage Journal
    I've been considering implementing ClamAV on our mailserver (sendmail for 800+ users), since procmail filtering is proving to be less than effective with the latest wave of viruses. But I have two concerns to resolve first:
    • How do virus definitions get into the database? Yes, they depend on community support. But what stops someone from submitting a fake virus signature that will block legitimate email?
    • There's the disturbing use of strcpy and strcat in the ClamAV source code. I don't like running software that uses such constructs as root.
    Any information on these two issues would be greatly appreciated.
  • by arcade ( 16638 ) on Thursday March 04, 2004 @03:14AM (#8460887) Homepage
    I'm not sure if this is a good solution for 500+ usres, but at the company I work for, we use SuSE OpenExchange in combination with Antivir (www.antivir.de) . We've only got about 25-30 users, though.

    SuSE OpenExchange's default spamassassin rules are really, really good. I had to make a minor adjustment to one of the rules - and after that it has had zero false positives in addition to taking care of over 99% of the spam we receive. The last month it has blocked about 1500 spam messages to me alone - and not let a single one through. With *zero* false positives. Other employees have the same experience.

    I'm not sure if I would recomend using qmail anymore. I tended to love qmail, and has set up qmail based solutions for five different companies. qmail doensn't reject mail to invalid addresses in-smtp-session though (at least not by default), and insteads returns the message afterwards. With all the spoofed mail from:'s, with guessed mail to:'s -- this creates far too many bounce messages in todays virus-ladden environment.

  • by ncr53c8xx ( 262643 ) on Thursday March 04, 2004 @03:03PM (#8466362) Homepage
    No server based AV solution I know of will stop the latest wave of random password zip viruses. That is because the AV program cannot scan inside the zip file.

    The password is in the text of the email. How difficult would it be to try all the different words in the mail as passwords? The mails have less than 50 words, so it should run pretty fast.

The one day you'd sell your soul for something, souls are a glut.

Working...