Well I found a solution using telnet 127.0.0.1 3310 (STREAM) to get the actual communication port, and in issuing a telnet 127.0.0.1 <RETURNED PORT> (paste data followed by the required EOF) and it appears to work.
-- Dale
Telnet to that port and type in:
SCAN (or RAWSCAN) /path_to_file_or_directory
e.g. RAWSCAN /tmp/suspect_file.exe
If you provide the full path to the test directory in the source distribution you will be rewarded with a few virus hits found in the various files there.
The docs html directory provides a list of commands you can type into the daemon including:
* PING Check daemon state (should reply with "PONG").
* VERSION Print program and database versions.
* RELOAD Reload databases.
* SHUTDOWN Perform a clean exit.
* SCAN file/directory Scan file or directory (recursively) with archive support enabled (a full path is required).
* RAWSCAN file/directory Scan file or directory (recursively) with archive support disabled (a full path is required).
* CONTSCAN file/directory Scan file or directory (recursively) with archive support enabled and do not stop scanning if virus is found.
* STREAM Scan stream: clamd will return a new port number you should connect to and send data to scan.
* SESSION, END Start/end a clamd session - you can do multiple commands per TCP session (WARNING: due to the clamd implementation the RELOAD command will break the session).
dp _______________________________________________ http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users