Danke, das ist die Ursache. Manuell angepasst habe ich nichts. Das gibt mir erstmal die Sicherheit, dass es sinnlos ist, weiter an den Parametern von Rspamd zu spielen, um dies wegzubekommen.
Der Zusatz ist bei mir bisher nur " ***UNCHECKED*** ", d.h. doch, dass der Virustest versagt hat.
Ich habe nochmal im Papierkorb nachgeguckt. Da habe ich diese Ergänzung bei:
- den russischen Domain Reports ( Anhang .xml.gz )
- einmal bei einem Domain Report von Google ( Anhang .zip )
- zweimal bei Hetzner Rechnungen ( Anhang .pdf ) gefunden.
Bei anderen .pdf habe ich das bisher nicht beobachtet.
Hier noch der russische Domain Report von heute im rspamd.log
Code: Select all
2025-01-27 04:08:44 #1774(rspamd_proxy) <a9f63e>; proxy; proxy_accept_socket: accepted milter connection from ::1 port 49576
2025-01-27 04:08:45 #1774(rspamd_proxy) <a9f63e>; milter; rspamd_milter_process_command: got connection from 89.221.237.233:45634
2025-01-27 04:08:45 #1776(normal) <851171>; task; rspamd_worker_body_handler: accepted connection from 127.0.0.1 port 33104, task ptr: 00007F15DBF59898
2025-01-27 04:08:45 #1776(normal) <6612A3>; task; rspamd_message_parse: loaded message; id: <dmarc-1737947323@corp.mail.ru>; queue-id: <6612A3EEEA>; size: 4456; checksum: <2d1026e50e49223bd2aec561b2cc7083>
2025-01-27 04:08:45 #1776(normal) <6612A3>; task; dkim_module_key_handler: stored DKIM key for mail4._domainkey.corp.mail.ru in LRU cache for 3081 seconds, 114/2000 elements in the cache
2025-01-27 04:08:45 #1776(normal) <6612A3>; task; rspamd_spf_record_postprocess: increasing ttl from 227 to 300 as it lower than a limit
2025-01-27 04:08:45 #1776(normal) <6612A3>; task; rspamd_spf_maybe_return: stored SPF record for corp.mail.ru (0x1bdad551b69c2340) in LRU cache for 300 seconds, 53/2000 elements in the cache
2025-01-27 04:08:45 #1776(normal) <6612A3>; lua; clamav.lua:117: clamav: failed to scan, maximum retransmits exceed
2025-01-27 04:08:45 #1776(normal) <6612A3>; lua; common.lua:113: clamav: result - FAILED with error: "failed to scan and retransmits exceed - score: 0"
2025-01-27 04:08:45 #1776(normal) <6612A3>; task; rspamd_add_passthrough_result: <dmarc-1737947323@corp.mail.ru>: set pre-result to 'rewrite subject' (no score): 'unknown reason' from force_actions(0)
2025-01-27 04:08:46 #1776(normal) <6612A3>; task; rspamd_task_write_log: id: <dmarc-1737947323@corp.mail.ru>, qid: <6612A3EEEA>, ip: 89.221.237.233, from: <noreply-dmarc-reporting@corp.mail.ru>, (default: T (rewrite subject): [0.40/15.00] [MIME_BASE64_TEXT_BOGUS(1.00){},DMARC_POLICY_ALLOW(-0.50){corp.mail.ru;reject;},FORGED_SENDER(0.30){dmarc_support@corp.mail.ru;noreply-dmarc-reporting@corp.mail.ru;},R_DKIM_ALLOW(-0.20){corp.mail.ru:s=mail4;},R_SPF_ALLOW(-0.20){+ip4:89.221.237.128/25;},MIME_BASE64_TEXT(0.10){},MIME_GOOD(-0.10){multipart/mixed;text/plain;},ARC_NA(0.00){},ASN(0.00){asn:47764, ipnet:89.221.236.0/22, country:RU;},CLAM_VIRUS_FAIL(0.00){failed to scan and retransmits exceed;},DKIM_TRACE(0.00){corp.mail.ru:+;},FORCE_ACTION_VIRUS_FAIL(0.00){rewrite subject;},FROM_NEQ_ENVFROM(0.00){dmarc_support@corp.mail.ru;noreply-dmarc-reporting@corp.mail.ru;},FROM_NO_DN(0.00){},HAS_ATTACHMENT(0.00){},MID_RHS_MATCH_FROM(0.00){},MIME_TRACE(0.00){0:+;1:+;2:~;},MISSING_XM_UA(0.00){},RCPT_COUNT_ONE(0.00){1;},RCVD_COUNT_ONE(0.00){1;},RCVD_TLS_LAST(0.00){},RCVD_VIA_SMTP_AUTH(0.00){},TO_DN_NONE(0.00){},TO_MATCH_ENVRCPT_ALL(0.00){}]), len: 4456, time: 596.204ms, dns req: 24, digest: <2d1026e50e49223bd2aec561b2cc7083>, rcpts: <rua.aggregated@abcdef.com>, mime_rcpts: <rua.aggregated@abcdef.com>, forced: rewrite subject "unknown reason"; score=nan (set by force_actions)
2025-01-27 04:08:46 #1776(normal) <6612A3>; task; rspamd_protocol_http_reply: regexp statistics: 0 pcre regexps scanned, 2 regexps matched, 179 regexps total, 61 regexps cached, 0B scanned using pcre, 1.10KiB scanned total
2025-01-27 04:08:46 #1774(rspamd_proxy) <c716d9>; proxy; proxy_milter_finish_handler: finished milter connection