My point about letting two IP addresses through our firewall was that
it was also a hack that might eventually fail (according to Joel, if
"cloudflare drastically changes things"). In other words I put in a
hack to work around a external problem that was beyond my ability to
fix (having no clout with Cloudflare).


On Tue, 5 May 2020 19:02:20 +0100 (BST)
"G.W. Haywood via clamav-users" <clamav-users@lists.clamav.net> wrote:

> Hi there,
> 
> On Tue, 5 May 2020, Paul Kosinski via clamav-users wrote:
> 
> >>> To try to solve this issue, i have added this line in my /etc/hosts file :
> >>>
> >>>  * 104.16.218.84 database.clamav.net  
> >>
> >> Don't do things like that.  Sooner or later it will break, and you'll
> >> find yourself back here again asking why.  
> >
> > Our firewall blocks our mail server from issuing requests via ports 80
> > and 443, but, after our failure to set up a private mirror that worked
> > reliably after the switch to Cloudflare (their BOS mirror was usually
> > behind the DNS TXT reported version, as detailed in many previous
> > posts), I had to add exceptions for 104.16.218.84 and 104.16.219.84 ...  
> 
> I'm not sure that I understand your point.  Mine was that hacks like
> tweaking resolv.conf to try to get round a broken name service instead
> of fixing the service are bound to come back and bite you.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to