Forgot to respond to this earlier - this can happen if an update begins before a previous update finishes. And this can happen if you have multiple scripts fetching signatures from multiple vendors. Some scripts have a built in random delay that attempts to prevent every user from updating on the hour, for example, but because these scripts are not aware of each other the opportunity exists that there will be overlap.

The tools communicate with the clamd daemon via a unix or tcp socket and sent the word "PING". The daemon should respond with "PONG" and it will unless it is busy. That can cause the connection to timeout without a response and that produces the error message you see.

There is probably a more elegant way of handling this short of a serializing layer, but since the purpose of the script is to request a reload and not be part of a service monitoring tool, I think the correct response is to give up quietly and not obsess. Delaying until the previous reload is completed then launching another reload simply extends the time the service is unavailable.

Summary: For the rare occasion that multiple vendors have new signatures available at the same time, the possibility exists that the fetching processes will result in an overlap of reload requests. The clamd daemon becomes disfunctional during a reload so it is in everyone's interest to minimize the number of this these are called. This suggests the reload request should be isolated from the fetch process so that excessive reloads are not requested - a simple serializing process can manage this to avoid a self-induced DOS. Especially problematic on Solaris SPARC systems and systems with memory/cpu limitations.

dp
On 2/22/16 12:48 PM, Alex wrote:
Hi,

On Mon, Feb 22, 2016 at 1:57 PM, Joel Esler (jesler) <jes...@cisco.com> wrote:
Gentlemen.  We get the point.  We’re working on it.  I had a conversation with 
the malware lead
last week to see what we can do here.
Can you help with my original question about:

clamd server '/var/run/clamd.amavisd/clamd.sock' gave '' response

Is this expected, when clamav-notify-servers is run while clamd is
re-reading the databases?

Can someone tell me if this happens on their system too? It was a bug
a long time ago, but thought it was fixed. It's just started again.

On Feb 22, 2016, at 12:06 PM, Groach 
<groachmail-stopspammin...@yahoo.com<mailto:groachmail-stopspammin...@yahoo.com>>
 wrote:

I dont think there is any 'cause' to be had (that the unofficial signatures 
found threats and that the official ones didnt) other than ClamAV signatures 
are too few, too ineffective and more importantly too late.
I never saw this message. Was this posted to the list?

I've found the sanesecurity rules to work well. The securiteinfo rules
are horrible. I'd never expect to only use the default clamav rules.

Thanks,
Alex
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to