It shouldn't be doing that. You sound like you have the wrong configuration
option for clamscan npm package.
You need to be using the clamdscan configuration option. It sounds like you're
using the clamscan option.
Clamdscan uses the already running Daemon (only loads the database once).
Clams
Thanks for sharing this ,
I am currently using clamscan within my app, but the problem with clamscan has
to load the entire virus database and initialize the scanning engine from
scratch.
Scanning a file with few kb took what a mb file would need for scanning around
20 to 30s
_
If I'm understanding your use case correctly you may want to use this tool:
https://www.npmjs.com/package/clamscan
Create an express app and run the daemon locally on the same server. The
express app is essentially a glorified local proxy.
On Jul 5, 2024, 4:46 PM -0400, Khodor Barakat via clamav
Thanks Paul,
This was something i was looking into, like building an ssh tunnel , but it is
a burden as tunnel failure would broke the entire process ,
I might reconsider running clamdscan locally while tunning the config and using
systemd unit param to limit the resources used by clamdscan ser
On Fri, 5 Jul 2024, Khodor Barakat wrote:
What i am trying to implement is to avoid running clamd as daemon
locally and want to use a dedicated server for the scan that will be
used by multiple server the scan will be done within the intranet so
traffic is not exposed , but wanted to see if ther
I don't think there is anything builtin to clamd, but you might consider
setting up a secure tunnel(s) from the client machine(s) to the scanning
machine.
For example, each client machine has a little daemon that listens on a UNIX
socket and is connected securely (SSH, OpenVPN etc.) to the scan
Thanks for the reply ,
What i am trying to implement is to avoid running clamd as daemon locally and
want to use a dedicated server for the scan that will be used by multiple
server the scan will be done within the intranet so traffic is not exposed ,
but wanted to see if there is a way that i
On Tue, 2 Jul 2024, Khodor Barakat via clamav-users wrote:
Hi, everyone
I am writing to inquire about the security measures implemented when
using ClamAV's clamdscan for remote scanning, particularly when
streaming to port 3310.
clamdscan -c /etc/clamd.d/remote-scan.conf --fdpass --stream /tm
Anyone has encountered this, i can see the transfer is not encrypted and secure
when doing a remote scan ,
I captured the packet on the remote server and i can see the data as clear text
,
[Timestamps]
[Time since first frame in this TCP stream: 0.000209756 seconds]
[Time sinc