>> FWIW, clamav is enabled:
>>
>> dspam --version | grep clam
>> Configuration parameters:  '--host=i686-pc-linux-gnu'
>> '--build=i686-pc-linux-gnu' '--program-prefix=' '--prefix=/usr'
>> '--exec-prefix=/usr' '--bindir=/usr/bin' '--sbindir=/usr/sbin'
>> '--datadir=/usr/share' '--includedir=/usr/include' '--libdir=/usr/lib'
>> '--libexecdir=/usr/libexec' '--localstatedir=/var'
>> '--sharedstatedir=/var/lib' '--mandir=/usr/share/man'
>> '--infodir=/usr/share/info' '--enable-long-usernames' '--enable-syslog'
>> '--enable-large-scale' '--disable-domain-scale' '--disable-homedir'
>> '--enable-virtual-users' '--enable-preferences-extension'
>> '--enable-daemon' '--enable-external-lookup'
>> '--with-storage-driver=hash_drv,sqlite3_drv'
>> '--with-dspam-home=/var/lib/dspam' '--with-dspam-owner=dspam'
>> '--with-dspam-group=mail' '--with-dspam-home-group=mail'
>> '--with-dspam-mode=2511' '--with-logdir=/var/log/dspam'
>> '--sysconfdir=/etc' '--enable-clamav' 'build_alias=i686-pc-linux-gnu'
>> 'host_alias=i686-pc-linux-gnu' 'CFLAGS=-O2 -g -march=i386 -mtune=i686'
>>
>> Also, if I use clamscan, it picks up the virus in the email in the inbox.

I'd verify that clamd is indeed listening on port 3310, I recall some installs 
(mostly Debian IIRC) that clamd is by default listening on a unix socket only.

netstat -napt|grep 3310 should tell you.

Regards,

D.

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Dspam-user mailing list
Dspam-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-user

Reply via email to