Am 28.11.2011 15:22, schrieb sean darcy:
 > On 11/28/2011 12:37 AM, Dudi Goldenberg wrote:
 >> -napt|grep 3310
 >
 > Thanks for the suggestion, but:
 >
 > netstat -napt|grep 3310
 > tcp        0      0 127.0.0.1:3310              0.0.0.0:*
 >       LISTEN      3270/clamd.clamd-ma
 >
 > clamav is listening.
 >
 > Any other thoughts?
 >

You may want to check /var/log/clamav/clamav.log (or wherever your 
clamav logs to). Here are a few representative lines from a working 
installation:

Mon Nov 21 11:15:12 2011 -> Accepted connection from 127.0.0.1 on port 
1919, fd 10
Mon Nov 21 11:24:42 2011 -> SelfCheck: Database status OK.
Mon Nov 21 11:24:42 2011 -> Accepted connection from 127.0.0.1 on port 
1795, fd 10
Mon Nov 21 11:26:49 2011 -> Accepted connection from 127.0.0.1 on port 
1111, fd 10
Mon Nov 21 11:30:42 2011 -> Accepted connection from 127.0.0.1 on port 
1734, fd 10
Mon Nov 21 11:37:24 2011 -> Accepted connection from 127.0.0.1 on port 
1767, fd 10
Mon Nov 21 11:55:48 2011 -> Accepted connection from 127.0.0.1 on port 
1124, fd 10
Mon Nov 21 11:56:53 2011 -> Accepted connection from 127.0.0.1 on port 
1803, fd 10
Mon Nov 21 11:56:58 2011 -> Accepted connection from 127.0.0.1 on port 
1210, fd 10
Mon Nov 21 11:56:58 2011 -> stream(127.0.0.1@1210): 
Sanesecurity.Phishing.Bank.17009.UNOFFICIAL(dbfbdc668a29117bcd94e683d1cfcba3:11176)
 
FOUND
Mon Nov 21 12:01:55 2011 -> Accepted connection from 127.0.0.1 on port 
1086, fd 10
Mon Nov 21 12:07:19 2011 -> Accepted connection from 127.0.0.1 on port 
1404, fd 10
Mon Nov 21 12:09:36 2011 -> Accepted connection from 127.0.0.1 on port 
1076, fd 10
Mon Nov 21 12:19:03 2011 -> Reading databases from /var/lib/clamav
Mon Nov 21 12:19:07 2011 -> Database correctly reloaded (1288744 signatures)

In the worst case, check whether there actually is any communication on 
port 3310:

root@bender:~# tcpdump -i lo -nX -s 1000 tcp port 3310
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on lo, link-type EN10MB (Ethernet), capture size 1000 bytes
15:34:40.649785 IP 127.0.0.1.49063 > 127.0.0.1.3310: Flags [S], seq 
4245782264, win 32792, options [mss 16396,sackOK,TS val 1184189240 ecr 
0,nop,wscale 7], length 0
     0x0000:  4500 003c 35c0 4000 4006 06fa 7f00 0001  E..<5.@.@.......
     0x0010:  7f00 0001 bfa7 0cee fd11 7ef8 0000 0000  ..........~.....
     0x0020:  a002 8018 b51f 0000 0204 400c 0402 080a  ..........@.....
     0x0030:  4695 4b38 0000 0000 0103 0307            F.K8........
15:34:40.649835 IP 127.0.0.1.3310 > 127.0.0.1.49063: Flags [S.], seq 
4253107702, ack 4245782265, win 32768, options [mss 16396,sackOK,TS val 
1184189240 ecr 1184189240,nop,wscale 7], length 0

You don't have to make sense of the output -- but there should be 
something happening while mail is being virus-checked... otherwise this 
would indicate that for some reason, dspam is not communicating with clamav.

HTH
Chris


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Dspam-user mailing list
Dspam-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-user

Reply via email to