Thank you very much for the very thorough response.
Lots of helpful info.

The link you provided was very helpful.
There was a post to this link that I was able to use to get CalmAV working.

https://www.adminsys.ch/2015/08/21/installing-clamav-epel-centosred-hat-7-nightmare/


On Thu, Jul 28, 2016 at 1:13 PM, G.W. Haywood <cla...@jubileegroup.co.uk>
wrote:

> Hi there,
>
> On Thu, 28 Jul 2016, Freddy Allen wrote:
>
> Sorry I'm a total newbie ...
>>
>
> You said.  Don't be sorry, we were all there at one time or another.
> To be honest sometimes I wish I was back there, but that's well OT. :)
>
> ... attempting to install ClamAV version 0.99.2 onto a CentOS 7 ...
>>
>
> Have you seen anything like this?
>
> https://linux-audit.com/install-clamav-on-centos-7-using-freshclam/
>
> The system will mostly be used by multiple users for internet,
>> email, and word processing.  Maybe games too.
>>
>
> That doesn't quite tell us all we need.  Can we take it that the email
> service will be hosted on some third party server somewhere like gmail?
> The reason for the question is that many of us use ClamAV primarily on
> mail servers to scan mail as it passes through the MTAs (Mail Transfer
> Agent) running on the mail servers, and not to scan files on disc (or
> whatever passes for disc thesedays).  You can have a 'daemon' running
> on any server, which will listen for data which comes to it down some
> sort of pipe and scan it.  Or it can listen for paths in a filesystem
> of what for now I'll call files, and scan them if it can access them.
> Or you can start a proccess and tell it 'go scan this lot'.  These
> different ways of doing things are all possible with ClamAV.  To me,
> it doesn't sound like you'll be hosting a mail server anytime soon,
> and you'll probably be in the 'go scan this lot' camp.
>
> My confusion starts with ... installing on a 'shell account'.  It
>> mentions an assumption of home directory '/home/gary'.  That makes
>> me think that particular installation method would only be for a
>> system with one user account (in their example 'gary').
>>
>
> Not at all.  There are essentially two kinds of user account on your
> Operating System (OS).  The two are 'privileged' and 'not privileged'.
> It is normal procedure on such systems to BUILD software from source
> using any 'not privileged' account and then to INSTALL the resulting
> code (binaries, configuration files etc.) using a privileged account.
> You are installing onto the system, not onto any particular account.
> The code BUILD process is done using storage allocated to some random
> user such as 'gary' in your example and then 'root' (privileged user)
> will INSTALL it into system areas.  The 'root' user will then likely
> also RUN the software if it needs to access things which gary can't.
> So for example root might start a daemon which can read any file on
> the system, and the daemon might then be told by another user (which
> has limited filesystem access) to scan the entire filesystem.  Or a
> privileged process might hand data to an unprivileged daemon so that
> the daemon can scan it, even though the daemon can't directly access
> the data being scanned.
>
> Incidentally it's also normal procedure to USE the system for almost
> everything you do (Web browsing, email, word processing, games...) as
> a 'not privileged' user, which all your five user accounts should be.
>
> ... the last line ends with 'Don't forget to lock access to the
>> account!' then provides no assistance as to how ...
>>
>
> A system might also want to run some processes which don't need to
> have privileged system access.  In that case it's common to create
> a user specifically for this purpose, such as the 'clamav' user in
> this case.  One would normally not permit this what-you-might-call
> dummy user to have a login shell or password.  That's usually done
> at the point of creation of the user account, by running a script
> provided by your OS distribution such as 'adduser' which interacts
> with you while you create the user account and asks things like if
> the account should have a login shell.  Anyway, locking access to
> the account would generally mean not giving the account a shell in
> (probably) /etc/password or a password in (probably) /etc/shadow.
> That's right, passwords aren't stored in /etc/password.  History. :)
> The clamav user can have a /home/ directory where stuff is stored
> that may be interesting or not, depending on your point of view.
>
> However if you use 'packages' which are provided by your distribution,
> I would expect all of this to be taken care of for you when you simply
> install the package(s) provided.
>
> If I install on a shell account, will the software ...
>>
>
> You aren't installing "on a shell account".
>
> A shell is a tool.  There are several in common use, like 'bash' which
> I use all the time and 'tcsh' (which my wife favours, bless her).  You
> should avoid 'gnash' like the plague, but I digress.
>
> When I log in, I like to see a prompt from a shell on the screen and
> nothing else.  Younger people seem to prefer to see some sort of
> graphical thing.  It's up to you but both of these scenarios are of
> users logging into computers to do stuff.  Both can run a shell if
> they so desire, the younger person will probably do so in an 'xterm'.
> I usually have a few shells running at any one time, and I'd be lost
> without them.  A lot of people don't run a shell from one week to the
> next, perhaps only to do './configure ; make ; su - ; make install'
> which are broadly speaking the four steps to build and install almost
> anything from source on a Unix/Linux/BSD or similiar system.  But if
> they want to they can all fire up a shell when they feel the need.
>
> If not, and I need to install as a new clamav user, how do I
>> securely set that up?
>>
>
> You'd be better off using packages from your distribution if they
> exist for whatever you want to do.  You clearly aren't yet in a
> position to make informed choices and securely set up a server,
> and it's quite a long and somewhat tedious learning process to
> get there - assuming it's even possible!  To begin with you could
> perhaps do worse than find a couple of beginner guides to Unix or
> similar operating systems which will deal with accounts generally,
> filesystems, their organization, processes, ... it's a long list.
>
> Above all else I recommend that you don't lose any sleep over this.
> Although it's possible to compromise almost any computer system, you
> don't have to worry about viruses attacking CentOS like you do with,
> er, some operating systems I could mention.  You _do_ have to worry
> about getting something from a compromised computer and then passing
> a copy of it to someone who is using a vulnerable computer - even if
> your computer isn't vulnerable - but that's pretty unlikely if you
> behave sensibly.
>
> --
>
> 73,
> Ged.
>
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to