I've noticed that occasionally clamav-milter (from my perspective) misses
some viruses, although subsequently decoding (base64) the file and then
running clamscan on the .zip does successfully find the virus. My
understanding of the clamav package is that clamav-milter passes the
information to clamd, gets the result from clamd, and then subsequently
passes the result code back to sendmail.

The last time this happened (about two weeks ago), it passed about 30
viruses through (although it still caught the other 90%).  Rebooting the
machine immediately fixed the problem.  This time, it's only passed 2
instances (of SCO.A) through, but still is catching the other 99% of SCO.A.
I'd like to try troubleshooting this problem while the machine is in it's
current state, so I can try to figure out if the problem is with the
specific data stream or if the problem is perhaps with the machine (or
clamd/clamav-milter).  (I do have two more lines of defense, so I'm OK with
a degraded state for now.)

Is there any way to easily pass these files to spamass-milter to be checked
again (to see if the problem is randomly occurring)?

Thanks
-ron

I'm running the feb 20 snapshot-- yes, I know I can and should upgrade. If I
can make the problem happen on demand, and then upgrade and have the problem
go away, then I'll be more comfortable.


-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to