I've just had a look at my working clamav 0.60/q-s 1.20rc3 server and
clamd seems to be running as root by default. this is not the case on
the new server using clamav 0.65, clamd runs as clamav by default now.
which is the less insecure method, running clamd as root or chmodding
/var/spool/qmai
Hi,
I had a similar problem and the advice I got was:
chmod 777 /var/spool/qmailscan -R
That error went away after that. Clamav is giving me other errors now that I'll
have to deal with later.
I hope this helps
Bob
Kieran ([EMAIL PROTECTED]) wrote:
>
>I've been trying to fix this for most of tod
I've been trying to fix this for most of today and don't seem to be
getting anywhere. Using netqmail-1.04, qmail-scanner 1.20 and clamav
0.65. Virus
laden messages are being let through because clamdscan can't read the
files within /var/spool/qmailscan/tmp/
scanloop: starting scan of directory