Hello,

I would like to keep emails detected as virus by ClamAV on the filesystem, in 
order to be able to retrieve false-positive when users asks for them. After a 
few days, a simple cronjob would remove them.

So I though that "VirusEvent" could be an appropriate way to do it. (Is there 
any better way?)

I set the "VirusEvent" in the configuration file to :
  VirusEvent /bin/run-parts --lsbsysinit /etc/clamav/virusevent.d/

While I am only debugging for the moment, the script `/etc/clamav/
virusevent.d/test.sh` (chmod'ed +s) contains this:
  #!/bin/bash
  echo "$(date) ClamAV found $CLAM_VIRUSEVENT_VIRUSNAME into 
$CLAM_VIRUSEVENT_FILENAME" >> /tmp/clamav-found_virus.log

I also tried directly with this:
  VirusEvent echo "%v" >> /tmp/clamav-found_virus.log

But all my tests fails. The /tmp.clamav-found_virus.log doesn't get anything, 
while the logs only tells:

```
/var/spool/exim4/scan/1cO7Nt-0005Y4-A5/1cO7Nt-0005Y4-A5.eml: 
Heuristics.Phishing.Email.SSL-Spoof(6ed8d5db7b0e9651be9a6d42befc69cb:46580) 
FOUND
ERROR: VirusEvent: fork failed.
```

Do you have any idea why it doesn't work?

Best regards,
-- 
Mathieu


_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to