On 07/23/2011 07:03 AM, Nathan Gibbs wrote:
Does clamd support tcpwrappers?
It looks like clamav-milter does, but not clamd itself.
H'mm, for now it looks like firewalls are the only defense when you bind
clamd to an IP address.
I think that a very simple way of limiting which machines
On 07/23/2011 05:40 AM, Steve Fatula wrote:
It would appear that sighup, in clamav 0.97.1, should re-open the log files
when it receives a sighup. In our case, it simply ends clamav-milter, no
message logged anywhere I can find.
Do I read this correctly, that is what SHOULD happen
I can restart the service. I just don't like the impact of anything that
happens to be using the milter when it is being restarted. Sounds like the best
I can do though.
Steve
___
Help us build a comprehensive ClamAV guide: visit
Hi there,
On Sat, 23 Jul 2011 Steve Fatula wrote:
...I can restart the service. I just don't like the impact of
anything that happens to be using the milter when it is being
restarted. Sounds like the best I can do though.
Log via syslog?
--
73,
Ged.
On 7/23/2011 3:32 AM, Török Edwin wrote:
I think that a very simple way of limiting which machines have access to
clamd is via an SSH tunnel.
You bind clamd to localhost on the server, and each client does SSH port
forwarding to get access:
autossh -fN -M 4 -L
A tool for enumerating, stress testing, and/or shutting down instances
of the Clam Antivirus service on a network.
Download Freely.
Enjoy thoroughly.
Use Responsibly.
http://www.cmpublishers.com/oss/#clambake
--
Sincerely,
Nathan Gibbs
Systems Administrator
Christ Media
http://www.cmpublishers.com/oss/#clues
Enjoy.
--
Sincerely,
Nathan Gibbs
Systems Administrator
Christ Media
http://www.cmpublishers.com
signature.asc
Description: OpenPGP digital signature
___
Help us build a comprehensive ClamAV guide: visit
Looking for the correct way to handle this. I've been receiving a lot of
infected email lately supposedly bounced messages infected with the
MyDoom worm or Suspect.DoubleExtension-zippwd-9. What is the correct way
to report these to the offending ISP? I can find who the admin and tech
contacts are
On 7/23/11 5:07 PM, Chris cpoll...@embarqmail.com wrote:
Looking for the correct way to handle this. I've been receiving a lot of
infected email lately supposedly bounced messages infected with the
MyDoom worm or Suspect.DoubleExtension-zippwd-9. What is the correct way
to report these to the
On Sat, 2011-07-23 at 19:43 -0700, Al Varnell wrote:
On 7/23/11 5:07 PM, Chris cpoll...@embarqmail.com wrote:
Looking for the correct way to handle this. I've been receiving a lot of
infected email lately supposedly bounced messages infected with the
MyDoom worm or
10 matches
Mail list logo