>> FWIW, clamav is enabled: >> >> dspam --version | grep clam >> Configuration parameters: '--host=i686-pc-linux-gnu' >> '--build=i686-pc-linux-gnu' '--program-prefix=' '--prefix=/usr' >> '--exec-prefix=/usr' '--bindir=/usr/bin' '--sbindir=/usr/sbin' >> '--datadir=/usr/share' '--includedir=/usr/include' '--libdir=/usr/lib' >> '--libexecdir=/usr/libexec' '--localstatedir=/var' >> '--sharedstatedir=/var/lib' '--mandir=/usr/share/man' >> '--infodir=/usr/share/info' '--enable-long-usernames' '--enable-syslog' >> '--enable-large-scale' '--disable-domain-scale' '--disable-homedir' >> '--enable-virtual-users' '--enable-preferences-extension' >> '--enable-daemon' '--enable-external-lookup' >> '--with-storage-driver=hash_drv,sqlite3_drv' >> '--with-dspam-home=/var/lib/dspam' '--with-dspam-owner=dspam' >> '--with-dspam-group=mail' '--with-dspam-home-group=mail' >> '--with-dspam-mode=2511' '--with-logdir=/var/log/dspam' >> '--sysconfdir=/etc' '--enable-clamav' 'build_alias=i686-pc-linux-gnu' >> 'host_alias=i686-pc-linux-gnu' 'CFLAGS=-O2 -g -march=i386 -mtune=i686' >> >> Also, if I use clamscan, it picks up the virus in the email in the inbox.
I'd verify that clamd is indeed listening on port 3310, I recall some installs (mostly Debian IIRC) that clamd is by default listening on a unix socket only. netstat -napt|grep 3310 should tell you. Regards, D. ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d _______________________________________________ Dspam-user mailing list Dspam-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/dspam-user