Hi Ian,

Sorry about the delayed response. It looks like no one else got back to you.  
I'll try to answer inline, best I can...

Micah

On 10/11/19, 11:46 AM, "clamav-users on behalf of Ian via clamav-users" 
<clamav-users-boun...@lists.clamav.net on behalf of 
clamav-users@lists.clamav.net> wrote:

>  1) Does OnAccessPrevention mean that it blocks access to files when they are 
> in the queue, while scanned, and forevermore if detected as malicious, or is 
> it a subset of this?  Conversely, if OnAccessPrevention is disabled, can I 
> expect a performance boost since there should be no blocking at any point in 
> the processing pipeline?

I believe you're correct in your initial guess.  If Prevention is enabled, it 
would block access while in queue, while scanned, and forevermore if detected 
as malicious.  Yes, there is a notable performance boost if monitoring very 
active directories if prevention is disabled - In my own testing it was 
particularly noticable in 0.102 with clamonacc + clamd.  In less active 
directories, the on-access prevention blocking isn't really noticeable.

>  2) I’ve seen log entries like this when OnAccessPrevention is disabled, but 
> it’s not clear if this was a file clamd would have temporarily blocked access 
> to had it been able to get a lock on the file before it was removed?
>  
>  ScanOnAccess: /tmp/MLbtUsOc (deleted): (null) FOUND
>  
>  I assume linux doesn’t provide a means where clamd can easily hook into 
> kernel file create events to do something like create additional hard links 
> to transient files so that it can leisurely scan them while letting the 
> originating app think it has deleted the file and move on?

I don't know if it's possible to use the same feature that Prevention uses to 
temporarily block access just long enough to make a hard link so the file isn't 
deleted before it is scanned.  That seems like a clever idea.  I'll see if we 
can look into it.    

>  3) Is OnAccessPrevention global?  There are directories where I’d like to 
> know about findings but not otherwise act on, however I would prefer to 
> enable prevention for other areas of the system.
>  
>  Related, is it possible to have different actions depending on different 
> types/families of malicious files?  For instance if I’m running a linux 
> system, I may be more concerned with native binaries than Windows executables.

Prevention is global.  In 0.102 you can run multiple clamonacc clients, and use 
the clamonacc --config-file=FILE command line option to specify different 
configs to get this effect.   Regarding different actions, I don't think there 
is a way to do different actions by file type.  

>  4) LeaveTemporaryFiles — is there a version of this but only when a 
> detection is found?  Or a LeaveHardlinks for found items that I can later 
> investigate myself?

LeaveTemporaryFiles will only leave behind stuff that is extracted in the 
course of a scan (normalized file content, archive contents, etc).  It's useful 
for analysts to investigate file contents, and write signatures - but probably 
less useful for investigating a detection.  The clamonacc --copy=DIRECTORY 
command line should provide that functionality.

>  Thanks and sorry for the grouping of questions — I didn’t want to spam the 
> list with different threads.
    
    


_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to