> Well, I can prove the failure for
>       root # /usr/clamav/sbin/clamd --version
>       clamd / ClamAV version 20030806
> selfbuilt with exim/exiscan 4.21.
> one thread goes defunct, the master thread idles around and the third is
> stuck in an empty event loop.
> Exim connections pile up to (in this case: 777) connections and the mail
> exchanger grinds down.
> After killing clamd
>   stop)
>     pkill -9 -P 1 clamd && sleep 1 && echo 'Clam anti virus daemon stopped'
> and waiting some additional time(!!!) it can be restarted
>   start)
>     rm -f /var/clamav/run/clamd
>     clamd && echo 'Clam anti virus daemon started'
> Note the manual deletion of the socket. Bad bad bad bunny!

Yes, this is all exactly what we experience.

> What exactly do You mean with "more robust against mail bodies"? There
> should be no way to break the scanner with "bad mail". It should *protect*
> other systems, not being exploitable(?) itself.

Theoretically your right,  but it does take time to develope software
that meets that high criteria.  CLAMAV is relatively young.

> So, which version *is* stable?

Apparently, for the milter work, none.  It probably will be some day,
for now we'll go find something else and check back later (since
20030806 isn't stable either).



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to