Filetype rules not working

Carinus Carelse carinus.carelse at MRC.AC.ZA
Tue Feb 22 06:21:15 GMT 2005


I am trying to setup a filter for filetype rules but they don't seem to
be working.  I am attaching my files can  anyone see what i doing wrong.



CArinus


------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!

    [ Part 2: "Attached Text" ]

From:           user at domain.com               %rules-dir%/filename.zipok.rules.conf
FromOrTo:       user1 at domain.com                        %rules-dir%/filename.zipok.rules.conf
FromOrTo:       default                         %etc-dir%/filename.rules.conf

------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!

    [ Part 3: "Attached Text" ]

#
# NOTE: Fields are separated by TAB characters --- Important!
#
# Syntax is allow/deny/deny+delete, then regular expression, then log text,
#           then user report text.
#

# Due to a bug in Outlook Express, you can make the 2nd from last extension
# be what is used to run the file. So very long filenames must be denied,
# regardless of the final extension.
deny    .{150,}                 Very long filename, possible OE attack                                          Very long filenames are good signs of attacks against Microsoft e-mail packages

# JKF 04/01/2005 More Microsoft security vulnerabilities
deny    \.bmp$                  Windows bitmap file security vulnerability                                      Possible buffer overflow in Windows
deny    \.ico$                  Windows icon file security vulnerability                                        Possible buffer overflow in Windows
deny    \.ani$                  Windows animated cursor file security vulnerability                             Possible buffer overflow in Windows
deny    \.cur$                  Windows cursor file security vulnerability                                      Possible buffer overflow in Windows
deny    \.hlp$                  Windows help file security vulnerability                                        Possible buffer overflow in Windows

# These 4 are well known viruses.
deny    pretty\s+park\.exe$     "Pretty Park" virus                                                             "Pretty Park" virus
deny    happy99\.exe$           "Happy" virus                                                                   "Happy" virus
deny    \.ceo$          WinEvar virus attachment                                                        Often used by the WinEvar virus
deny    webpage\.rar$   I-Worm.Yanker virus attachment                                                  Often used by the I-Worm.Yanker virus

# These are known to be mostly harmless.
allow   \.jpg$                  -       -
allow   \.gif$                  -       -
# .url is arguably dangerous, but I can't just ban it...
allow   \.url$                  -       -
allow   \.vcf$                  -       -
allow   \.txt$                  -       -
allow   \.zip$                  -       -
allow   \.t?gz$                 -       -
allow   \.bz2$                  -       -
allow   \.Z$                    -       -
allow   \.rpm$                  -       -
# PGP and GPG
allow   \.gpg$                  -       -
allow   \.pgp$                  -       -
allow   \.sit$                  -       -
allow   \.asc$                  -       -
# Macintosh archives
allow   \.hqx$                  -       -
allow   \.sit.bin$              -       -
allow   \.sea$                  -       -

# These are known to be dangerous in almost all cases.
deny    \.reg$          Possible Windows registry attack                                                Windows registry entries are very dangerous in email
deny    \.chm$          Possible compiled Help file-based virus                                         Compiled help files are very dangerous in email
# See http://office.microsoft.com/2000/articles/Out2ksecFAQ.htm for more info.
deny    \.cnf$          Possible SpeedDial attack                                                       SpeedDials are very dangerous in email
deny    \.hta$          Possible Microsoft HTML archive attack                                          HTML archives are very dangerous in email
deny    \.ins$          Possible Microsoft Internet Comm. Settings attack                               Windows Internet Settings are dangerous in email
deny    \.jse?$         Possible Microsoft JScript attack                                               JScript Scripts are dangerous in email
deny    \.job$          Possible Microsoft Task Scheduler attack                                        Task Scheduler requests are dangerous in email
deny    \.lnk$          Possible Eudora *.lnk security hole attack                                      Eudora *.lnk security hole attack
deny    \.ma[dfgmqrstvw]$       Possible Microsoft Access Shortcut attack                               Microsoft Access Shortcuts are dangerous in email
deny    \.pif$          Possible MS-Dos program shortcut attack                                         Shortcuts to MS-Dos programs are very dangerous in email
deny    \.scf$          Possible Windows Explorer Command attack                                        Windows Explorer Commands are dangerous in email
deny    \.sct$          Possible Microsoft Windows Script Component attack                              Windows Script Components are dangerous in email
deny    \.shb$          Possible document shortcut attack                                               Shortcuts Into Documents are very dangerous in email
deny    \.shs$          Possible Shell Scrap Object attack                                              Shell Scrap Objects are very dangerous in email
deny    \.vb[es]$       Possible Microsoft Visual Basic script attack                                   Visual Basic Scripts are dangerous in email
deny    \.ws[cfh]$      Possible Microsoft Windows Script Host attack                                   Windows Script Host files are dangerous in email
deny    \.xnk$          Possible Microsoft Exchange Shortcut attack                                     Microsoft Exchange Shortcuts are dangerous in email

# These are new dangerous attachment types according to Microsoft in
# http://support.microsoft.com/?kbid=883260
deny    \.cer$          Dangerous Security Certificate (according to Microsoft)                         Dangerous attachment according to Microsoft Q883260
deny    \.its$          Dangerous Internet Document Set (according to Microsoft)                        Dangerous attachment according to Microsoft Q883260
deny    \.mau$          Dangerous attachment type (according to Microsoft)                              Dangerous attachment according to Microsoft Q883260
deny    \.md[az]$       Dangerous attachment type (according to Microsoft)                              Dangerous attachment according to Microsoft Q883260
deny    \.prf$          Dangerous Outlook Profile Settings (according to Microsoft)                     Dangerous attachment according to Microsoft Q883260
deny    \.pst$          Dangerous Office Data File (according to Microsoft)                             Dangerous attachment according to Microsoft Q883260
deny    \.tmp$          Dangerous Temporary File (according to Microsoft)                               Dangerous attachment according to Microsoft Q883260
deny    \.vsmacros$     Dangerous Visual Studio Macros (according to Microsoft)                         Dangerous attachment according to Microsoft Q883260
deny    \.vs[stw]$      Dangerous attachment type (according to Microsoft)                              Dangerous attachment according to Microsoft Q883260
deny    \.ws$           Dangerous Windows Script (according to Microsoft)                               Dangerous attachment according to Microsoft Q883260


# These 2 added by popular demand - Very often used by viruses
deny    \.com$          Windows/DOS Executable                                                          Executable DOS/Windows programs are dangerous in email
deny    \.exe$          Windows/DOS Executable                                                          Executable DOS/Windows programs are dangerous in email

# These are very dangerous and have been used to hide viruses
deny    \.scr$          Possible virus hidden in a screensaver                                          Windows Screensavers are often used to hide viruses
deny    \.bat$          Possible malicious batch file script                                            Batch files are often malicious
deny    \.cmd$          Possible malicious batch file script                                            Batch files are often malicious
deny    \.cpl$          Possible malicious control panel item                                           Control panel items are often used to hide viruses
deny    \.mhtml$        Possible Eudora meta-refresh attack                                             MHTML files can be used in an attack against Eudora

# Deny filenames ending with CLSID's
deny    \{[a-hA-H0-9-]{25,}\}   Filename trying to hide its real type                           Files containing  CLSID's are trying to hide their real type

# Deny filenames with lots of contiguous white space in them.
deny    \s{10,}         Filename contains lots of white space                                           A long gap in a name is often used to hide part of it

# Allow repeated file extension, e.g. blah.zip.zip
allow   (\.[a-z0-9]{3})\1$      -       -

# Deny all other double file extensions. This catches any hidden filenames.
deny    \.[a-z][a-z0-9]{2,3}\s*\.[a-z0-9]{3}$   Found possible filename hiding                          Attempt to hide real filename extension


------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!

    [ Part 4: "Attached Text" ]

From:           user at domain.com                 %rules-dir%/filetype.zipok.rules.conf
From:           user1 at domain.com                      %rules-dir%/filetype.zipok.rules.conf
FromOrTo:       default                         %etc-dir%/filetype.rules.conf

------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!

    [ Part 5: "Attached Text" ]

#
# NOTE: Fields are separated by TAB characters --- Important!
#
# Syntax is allow/deny/deny+delete, then regular expression, then log text,
#           then user report text.
#

allow   text            -                       -
allow   script          -                       -
allow   archive         -                       -
deny    self-extract    No self-extracting archives     No self-extracting archives allowed
deny    ELF             No executables          No programs allowed
deny    executable      No executables          No programs allowed
deny    MPEG            No MPEG movies          No MPEG movies allowed
deny    AVI             No AVI movies           No AVI movies allowed
deny    MNG             No MNG/PNG movies       No MNG movies allowed
deny    QuickTime       No QuickTime movies     No QuickTime movies allowed
deny    ASF             No Windows media        No Windows media files allowed
deny    Registry        No Windows Registry entries     No Windows Registry files allowed


------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!



More information about the MailScanner mailing list