Already fixed in CVS:
Tue Nov 23 23:23:45 CET 2004 (tk)
-
* clamscan: --move: preserve original access and modification times
(requested by Tomasz Papszun); optimise
Out of hopeful curiousity, will this also be the case for the upcoming
Out of hopeful curiousity, will this also be the case for the upcoming
addition of --move to clamdscan? :)
Done.
Mon Nov 29 00:23:55 CET 2004 (tk)
-
* clamdscan: added support for --move and --remove options
Thank you very much, Tomasz. It's greatly
# ls -l /usr/ccs/bin/ar
-r-xr-xr-x 1 root bin30140 May 10 2004 /usr/ccs/bin/ar
OK.
# echo $PATH
/usr/bin:/usr/sbin:/usr/bin:/usr/openwin/bin:/bin:/usr/ucb:/usr/dt/bin:/usr/openwin/bin:/usr/ccs/bin
OK again. What does 'which ar' say?
--
Fry cracked corn, and I don't care,
Could someone offer me some assistance so I can find out where this is
breaking for me?
I use the unofficial port, and it works great.
I had to do some pthread and lib fiddling to get it to build natively
on my 3.6 machines.
Benny
--
... i want to be a farting burping maniac.
Hey folks,
I'm working on a new server, and things are running beautifully. I
did, however, notice something I thought was a little odd...
I wrote a pair of shell scripts that will email me an alert when
freshclam updates the database successfully, and also if it fails. I
tested, and it
This is the way I do it:
OnUpdateExecute BASH_ENV=~clamav/.bashrc HOME=~clamav
/usr/local/bin/propagate_bd_clamav.sh | mail [EMAIL PROTECTED] -s Freshclam
update $HOSTNAME
OnErrorExecute tail /var/log/clamav/freshclam.log | mail [EMAIL PROTECTED] -s
Freshclam error $HOSTNAME
I'm running OpenBSD 3.1 and have ClamAV 0.60 - should have upgraded long
ago...
Yes. Both ClamAV _and_ the OS. They're working on 3.7 now. ;)
I can't get ClamAV 0.80 to compile with the following error:
gcc -DHAVE_CONFIG_H -I. -I. -I.. -I.. -I./zziplib -I./mspack -g -O2 -c
mbox.c
The libclamav build step gets linked with -lpthread, which should then
get built into clamscan as well.
All I can suggest at the moment is you try and link it by hand, with
something like:
cd clamscan
gcc -g -O2 -o clamscan output.o getopt.o memory.o cfgparser.o misc.o
clamscan.o
Ok, so its not a virus, and its not spam. So neither product should
detect it your saying? How about both products detect it, we have
overlap, and users are happy cause they dont have to deal with this crap
in their inbox.
Personally, I'd love to have it as a config option in clamd.conf.
./configure --disable-clamav --enable-dependency-tracking
--disable-clamuko --enable-bigstack \
--with-user=_clamav --with-group=_clamav --disable-cr
--with-dbdir=/usr/local/share/clamav \
--disable-gethostbyname_r --prefix=/usr/local --sysconfdir=/etc
--disable-zlib-vcheck
and get the
How about you guys checking Jerome LOYET's page? I think he maintains
OBSD ports, somehow.
Of late I believe he's on sabbatical from this list ;)
Check it now. :)
He's passed the port on to Marc Balmer, and Marc is not going to release
packages for 3.5 and 3.6 -STABLE like Jerome did. Marc
Same here, three servers. Had this happen a few weeks ago on one of
those servers, but I thought it was an isolated incident..
Well, on the opposite end of the spectrum, all four of my OpenBSD
servers running 0.90.1 got the update just fine, and none of them
died. I saw a few complaints in
Hey folks,
Yesterday's yum update to the latest version of ClamAV on my
mailserver doesn't seem to be doing real great for me... clamd
is dying every now and again (I don't know that it's lasted more
than a few hours so far):
clone(Process 20592 attached
child_stack=0x40f56250,
0.93.2 had a pretty serious bug dealing with older definitions I believe.
From the log, it looks like that is what your problem is. Try upgrading to
0.93.3.
I absolutely will; it's just not available via my channels yet.
Thanks,
Benny
--
If I could drop dead right now, I'd be the
See http://lurker.clamav.net/message/20100507.110656.573e90d7.en.html
Interesting. My OpenBSD-CURRENT-ish (32-bit) system loaded the flawed
update, but did not have issues. It's running 0.95.3 for the moment.
Fri May 7 03:27:19 2010 - Trying host db.us.clamav.net (213.165.80.159)...
Fri May
On 10.08.10 06:35, Steve Thompson wrote:
Clamav-milter is used to check incoming e-mail. There are many examples
that are passed as clean and delivered, with these headers inserted:
X-Virus-Scanned: clamav-milter 0.96.1 at mail server
X-Virus-Status: Clean
However, a clamscan of the
Hey folks,
I ran into an interesting situation just a bit ago while building
a new mail server. I did not have my firewall rules ready yet, so
freshclam was not able to retrieve the databases. Unfortunately,
though, it did not fail gracefully:
[r...@host ~]# head -3 /var/log/freshclam.log
This is already fixed for the upcoming 0.96.5:
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2389
Fantastic. Thanks, Edwin!
Benny
--
No matter how many shorts we have in the system, my guards will
be instructed to treat every surveillance camera malfunction as a
full-scale emergency.
Hey folks,
So, I can't seem to find an SRPM for RHEL that actually matches
its checksum, which makes me a bit .. uneasy, given the nature
of the software.
The RPMforge one fails its MD5 sum check. The second site listed
on clamav.net doesn't even have it that I could find.
Are there
On 2011-08-23 21:48, C. Bensend wrote:
Hey folks,
So, I can't seem to find an SRPM for RHEL that actually matches
its checksum, which makes me a bit .. uneasy, given the nature
of the software.
The RPMforge one fails its MD5 sum check. The second site listed
on clamav.net doesn't
On 2011-08-23 22:27, C. Bensend wrote:
On 2011-08-23 21:48, C. Bensend wrote:
Hey folks,
So, I can't seem to find an SRPM for RHEL that actually matches
its checksum, which makes me a bit .. uneasy, given the nature
of the software.
The RPMforge one fails its MD5 sum check
I'll made a port for 3.6-STABLE. I can't do it thoses days because I'm
very
busy. I'll try to do it early last week.
That is very much appreciated, Jerome. Thank you. :)
Benny
--
I'm on the Zoloft to keep from killing y'all.
-- Mike
No such file as /etc/ld.so.conf. I checked on gmp.h, and did find it
in /usr/local/include, so I assume I'm OK on that front. I even went
so far as to install the OpenBSD package (similar to an RPM) for GMP
v4.1.2 (I had originally compiled source for 4.1.3) and it still
didn't work.
If
Seriously though, why don't you just make a small script which
contains the settings and use that every time?
This is exactly what I do on my OpenBSD systems. I have a script
called 'reconfig' that simply does a ./configure with the options
that I prefer.
A new version is released, I do a
Thanks for this alternative, but I've tried this option as well. But
after a successful installation, the binary 'clamd' was missing on the
system.
What I normally do with my OpenBSD servers, is manually apply the
patches from the official port to the new source. They usually
apply cleanly,
Hey folks,
So, my Samba server did its weekly scan this morning, and
imagine my surprise when it tagged Google's video player
installer as Trojan.Clicker.Small-100.
I looked this up in the database, and it didn't give a lot
of information, really. Of all the companies out there that I'd
The signature was removed a couple of days ago:
http://lurker.clamav.net/message/20060219.164618.4a9cd08f.en.html
Ah, thank you for the replies, everyone. I appreciate it. :)
Benny
--
A computer lets you make more mistakes faster than any invention
in human history, with the possible
Okay I did that and still the same warning message.
snip
# cd /usr/local/share/clamav
# ls -l
total 4544
-rw-r--r-- 1 clamav clamav 641509 May 19 08:48 daily.cvd
-rw-r--r-- 1 clamav clamav 3950054 Apr 22 01:11 main.cvd
# date
Fri May 19 08:55:13 PDT 2006
# freshclam
Hi, I use the 0.88.2 but I don't understood if the database is updated or
no
!...in mail from 'Content-filter at mail' there is writes:
The message WAS NOT delivered to:
[EMAIL PROTECTED]:
250 2.7.1 Ok, discarded, id=01254-03 - VIRUS: Worm.Nyxem.E, Worm.VB-9
Virus scanner output:
29 matches
Mail list logo