Well, I can prove the failure for

        root # /usr/clamav/sbin/clamd --version
        clamd / ClamAV version 20030806

selfbuilt with exim/exiscan 4.21.

one thread goes defunct, the master thread idles around and the third is
stuck in an empty event loop.

Exim connections pile up to (in this case: 777) connections and the mail
exchanger grinds down.

After killing clamd

  stop)
    pkill -9 -P 1 clamd && sleep 1 && echo 'Clam anti virus daemon stopped'

and waiting some additional time(!!!) it can be restarted

  start)
    rm -f /var/clamav/run/clamd
    clamd && echo 'Clam anti virus daemon started'

Note the manual deletion of the socket. Bad bad bad bunny!

What exactly do You mean with "more robust against mail bodies"? There
should be no way to break the scanner with "bad mail". It should *protect*
other systems, not being exploitable(?) itself.

So, which version *is* stable?

You know:

- not leaking threads
- not leaking memory
- not leaking zombies
- not segfaulting...
- reliably restartable.

You want to know when You start to scan some million emails per day, what we
do here :-)

Yours sincerely

- Marian Eichholz


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to