"Jim Maul" <[EMAIL PROTECTED]> wrote on 18/03/2004 08:55:05:

> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] Behalf Of Thomas
> > Lamy
> > Sent: Wednesday, March 17, 2004 3:43 PM
> > To: [EMAIL PROTECTED]
> > Subject: Re: [Clamav-users] testvirus.org eicar tests failing w/ 
ClamAV
> > version devel-20040316 on OSX+CGPro
> >
> >
> > Sorry, but IMHO a virus scanner on a Mac that doesn't handle BinHex is 
a
> > piece of scrap.
> > Clamav has a BinHex decoder, and it works.
> >
> 
> Is this enabled by default?  I have been unable to find any way to 
enable
> clamav to decode binhex attachments.  Both binhex attachments from
> testvirus.org get through my system so i made the assumption that binhex
> support was lacking.
I have clamav 0.67 called by amavisd-new called by postfix on my Fedora 
gateway, and it detected everything except Fragment and CLSID from 
www.testvirus.org.
So that setup at least will decode BinHex attachments.
However, when I tested devel-20040317 built on my 10.3.3 client machine, 
it failed to detect any .hqx encoded files. It detected AppleSingle and 
MacBinary encoded viruses, but not UUEncoded or BinHexed. I also tested on 
clamav 0.67 on the Fedora gateway, and it failed to detect binhex or 
uuencoded viruses either. I assume that is because amavisd-new is taking 
care of the decoding and only passing the decoded files onto clamav. There 
does seem to be some internal code to decode uu and hqx, but I can't get 
it to work.
Here is the output of my scan testing on MacOS X 10.3.3.
All files are the same, just encoded. .as is AppleSingle, .bin is 
MacBinary, .hqx is BinHex, .uu is UUEncoded.

[white-dwarf:~/Incoming] jtrott% clamscan --detect-encrypted --recursive 
-v --debug doc
LibClamAV debug: Loading databases from /sw/share/clamav
LibClamAV debug: Loading /sw/share/clamav/daily.cvd
LibClamAV debug: /sw/share/clamav/daily.cvd: CVD file detected
LibClamAV debug: in cli_cvdload()
LibClamAV debug: MD5(.tar.gz) = 849c211f23b8e3d9a5cbdf48dc9b2bc8
LibClamAV debug: in cli_untgz()
LibClamAV debug: Unpacking /var/tmp//1bbd438c777f4a9c/COPYING
LibClamAV debug: Unpacking /var/tmp//1bbd438c777f4a9c/viruses.db2
LibClamAV debug: Loading databases from /var/tmp//1bbd438c777f4a9c
LibClamAV debug: Loading /var/tmp//1bbd438c777f4a9c/viruses.db2
LibClamAV debug: Initializing trie.
LibClamAV debug: Loading /sw/share/clamav/main.cvd
LibClamAV debug: /sw/share/clamav/main.cvd: CVD file detected
LibClamAV debug: in cli_cvdload()
LibClamAV debug: MD5(.tar.gz) = a20b254aa5f6b97dcafc115a63c8af4e
LibClamAV debug: in cli_untgz()
LibClamAV debug: Unpacking /var/tmp//947c0ebe75b407b5/COPYING
LibClamAV debug: Unpacking /var/tmp//947c0ebe75b407b5/viruses.db
LibClamAV debug: Loading databases from /var/tmp//947c0ebe75b407b5
LibClamAV debug: Loading /var/tmp//947c0ebe75b407b5/viruses.db
LibClamAV debug: Worm.Mydoom.F virus found in descriptor 5.
doc/doc.scr: Worm.Mydoom.F FOUND
LibClamAV debug: Worm.Mydoom.F virus found in descriptor 5.
doc/doc.scr.as: Worm.Mydoom.F FOUND
LibClamAV debug: Worm.Mydoom.F virus found in descriptor 5.
doc/doc.scr.bin: Worm.Mydoom.F FOUND
doc/doc.scr.hqx: OK
doc/doc.scr.uu: OK

----------- SCAN SUMMARY -----------
Known viruses: 20486
Scanned directories: 1
Scanned files: 5
Infected files: 3
Data scanned: 0.18 MB
I/O buffer size: 131072 bytes
Time: 2.410 sec (0 m 2 s)

> Jim
Jim, probably your best bet at this stage is to install amavisd-new and 
get CG to use that instead of calling clamav directly. Email me if you 
need more info on how to do that.
Thanks,
JT


-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to