Zitat von Gary Stainburn <[email protected]>:

On the clam server I then got log entries appearing (I had already turned on
LogClean)

Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1506): OK
Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1928): OK
Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1218): OK
Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1608): OK
Mon Jul 27 12:30:48 2015 -> stream(10.5.1.3@1402): OK
Mon Jul 27 12:31:53 2015 -> stream(10.5.1.3@1432): OK
Mon Jul 27 12:32:01 2015 -> stream(10.5.1.3@1175): OK
Mon Jul 27 12:32:01 2015 -> stream(10.5.1.3@1784): OK

All looked fine until I then tried testing the mail server using the web page
at

http://www.aleph-tec.com/eicar/

I continued to get 'OK' log entries and the emails passed through.

Can anyone suggest where I look to see why Clam didn't detect the virus?

Hi!

I had this problem in the past...
ClamAV works like FTP, so that it use TWO Ports! 3310 is "fix" and then it open another port "dynamically" to receive the E-Mail. If there is a Firewall between the to Servers, you have to open the second, dynamic, port... As I had the problem (the problem was not a Firewall, but a LoadBalancer) I solved with a Wrapper running on the Exim-Server and always send data to the same ClamAV-Server that got the initial packets...

Maybe it helps you to find your solutions...

Regards
Luca Bertoncello
([email protected])


--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to