Zitat von Gary Stainburn <[email protected]>:
On the clam server I then got log entries appearing (I had already turned on
LogClean)
Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1506): OK
Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1928): OK
Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1218): OK
Mon Jul 27 12:30:46 2015 -> stream(10.5.1.3@1608): OK
Mon Jul 27 12:30:48 2015 -> stream(10.5.1.3@1402): OK
Mon Jul 27 12:31:53 2015 -> stream(10.5.1.3@1432): OK
Mon Jul 27 12:32:01 2015 -> stream(10.5.1.3@1175): OK
Mon Jul 27 12:32:01 2015 -> stream(10.5.1.3@1784): OK
All looked fine until I then tried testing the mail server using the web page
at
http://www.aleph-tec.com/eicar/
I continued to get 'OK' log entries and the emails passed through.
Can anyone suggest where I look to see why Clam didn't detect the virus?
Hi!
I had this problem in the past...
ClamAV works like FTP, so that it use TWO Ports! 3310 is "fix" and
then it open another port "dynamically" to receive the E-Mail.
If there is a Firewall between the to Servers, you have to open the
second, dynamic, port...
As I had the problem (the problem was not a Firewall, but a
LoadBalancer) I solved with a Wrapper running on the Exim-Server and
always send data to the same ClamAV-Server that got the initial
packets...
Maybe it helps you to find your solutions...
Regards
Luca Bertoncello
([email protected])
--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/