On Fri, 23 Apr 2010, Török Edwin wrote:
Try writing a shell script that invokes clamscan and redirects stderr as
above, then in mimedefang invoke your script (don't forget to chmod +x it).

OK, I tried this 0.95.3 first, because it's working properly now and I don't want to introduce yet another variable. I just want to see if I can get the debug info written out somewhere.

Shell script:
---
#!/bin/csh
/usr/local/bin/clamscan --phishing-scan-urls=no --debug 2>/tmp/clamscan-debug $1
---

Output in /tmp/clamscan-debug:
---

----------- SCAN SUMMARY -----------
Known viruses: 841232
Engine version: 0.95.3
Scanned directories: 0
Scanned files: 0
Infected files: 0
Data scanned: 0.00 MB
Data read: 0.00 MB (ratio 0.00:1)
Time: 3.389 sec (0 m 3 s)
---

Hmm.  Something went wrong...from maillog:
---
Apr 24 00:16:27 servername mimedefang.pl[16487]: Problem running virus scanner: 
code=56, category=swerr, action=tempfail
Apr 24 00:16:31 servername sm-mta[16486]: o3O4GOa1016486: Milter: data, 
reject=451 4.3.0 Problem running virus-scanner
---

man clamscan, code 56 says:
---
Can't stat input file / directory.
---

Maybe it has something to do with the order of parameter passing? Anyway, didn't make any progress there.

Got some other things to try.  Will report back.

Jeffrey Moskot
System Administrator
j...@math.miami.edu
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to