Package: clamav-milter
Version: 0.91.2-3

These issues were originally reported under Ubuntu here:
https://bugs.launchpad.net/bugs/151850

I've noted several problems running the clamav-milter installation with the
default chrooted postfix package.

- The postfix default given in /etc/defaults/clamav-milter is a directory
name rather than a socket file name:
#SOCKET=local:/var/spool/postfix/clamav/

- The clamav-milter daemon does not have permission to create a socket file
under the postfix chroot.  I fix this by using the socket path given above,
then manually creating the 'clamav' sub-directory on the first run, and
giving it the same permissions as the socket file (clamav/postfix, 775).
This could be automated by the init script.

- There is a race condition in the init script that prevents the chmod g+w
from being applied on startup.  The socket file isn't created immediately by
clamav-milter, so the chmod tends to fail silently.

- The clamav-milter creates the socket file writable by clamav.  You need to
chgrp the socket to 'postfix' (the postfix group) prior to doing the chmod
g+w, or the postfix daemon won't be able to write to it. 

I personally solve the latter two problems by doing the following with the
current init script.  It's rather crude, but it does work:


if [ $ret = 0 ] && [ "$USE_POSTFIX" = 'yes' ]; then
  while [ ! -e "$SOCKET_PATH" ]; do
    sleep 2
  done
  chgrp postfix $SOCKET_PATH
  chmod g+w $SOCKET_PATH
fi




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to