Subversion Repositories configs

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
5 - 1
##
2
## Example config file for the Clam AV daemon
3
## Please read the clamd.conf(5) manual before editing this file.
4
##
5
 
6
 
7
# Comment or remove the line below.
8
Example
9
 
10
# Uncomment this option to enable logging.
11
# LogFile must be writable for the user running daemon.
12
# A full path is required.
13
# Default: disabled
14
#LogFile /tmp/clamd.log
15
 
16
# By default the log file is locked for writing - the lock protects against
17
# running clamd multiple times (if want to run another clamd, please
18
# copy the configuration file, change the LogFile variable, and run
19
# the daemon with --config-file option).
20
# This option disables log file locking.
21
# Default: no
22
#LogFileUnlock yes
23
 
24
# Maximum size of the log file.
25
# Value of 0 disables the limit.
26
# You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
27
# and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
28
# in bytes just don't use modifiers. If LogFileMaxSize is enabled, log
29
# rotation (the LogRotate option) will always be enabled.
30
# Default: 1M
31
#LogFileMaxSize 2M
32
 
33
# Log time with each message.
34
# Default: no
35
#LogTime yes
36
 
37
# Also log clean files. Useful in debugging but drastically increases the
38
# log size.
39
# Default: no
40
#LogClean yes
41
 
42
# Use system logger (can work together with LogFile).
43
# Default: no
44
#LogSyslog yes
45
 
46
# Specify the type of syslog messages - please refer to 'man syslog'
47
# for facility names.
48
# Default: LOG_LOCAL6
49
#LogFacility LOG_MAIL
50
 
51
# Enable verbose logging.
52
# Default: no
53
#LogVerbose yes
54
 
55
# Enable log rotation. Always enabled when LogFileMaxSize is enabled.
56
# Default: no
57
#LogRotate yes
58
 
59
# Log additional information about the infected file, such as its
60
# size and hash, together with the virus name.
61
#ExtendedDetectionInfo yes
62
 
63
# This option allows you to save a process identifier of the listening
64
# daemon (main thread).
65
# Default: disabled
66
#PidFile /var/run/clamd.pid
67
 
68
# Optional path to the global temporary directory.
69
# Default: system specific (usually /tmp or /var/tmp).
70
#TemporaryDirectory /var/tmp
71
 
72
# Path to the database directory.
73
# Default: hardcoded (depends on installation options)
74
#DatabaseDirectory /var/lib/clamav
75
 
76
# Only load the official signatures published by the ClamAV project.
77
# Default: no
78
#OfficialDatabaseOnly no
79
 
80
# The daemon can work in local mode, network mode or both.
81
# Due to security reasons we recommend the local mode.
82
 
83
# Path to a local socket file the daemon will listen on.
84
# Default: disabled (must be specified by a user)
85
#LocalSocket /tmp/clamd.socket
86
 
87
# Sets the group ownership on the unix socket.
88
# Default: disabled (the primary group of the user running clamd)
89
#LocalSocketGroup virusgroup
90
 
91
# Sets the permissions on the unix socket to the specified mode.
92
# Default: disabled (socket is world accessible)
93
#LocalSocketMode 660
94
 
95
# Remove stale socket after unclean shutdown.
96
# Default: yes
97
#FixStaleSocket yes
98
 
99
# TCP port address.
100
# Default: no
101
#TCPSocket 3310
102
 
103
# TCP address.
104
# By default we bind to INADDR_ANY, probably not wise.
105
# Enable the following to provide some degree of protection
106
# from the outside world. This option can be specified multiple
107
# times if you want to listen on multiple IPs. IPv6 is now supported.
108
# Default: no
109
#TCPAddr 127.0.0.1
110
 
111
# Maximum length the queue of pending connections may grow to.
112
# Default: 200
113
#MaxConnectionQueueLength 30
114
 
115
# Clamd uses FTP-like protocol to receive data from remote clients.
116
# If you are using clamav-milter to balance load between remote clamd daemons
117
# on firewall servers you may need to tune the options below.
118
 
119
# Close the connection when the data size limit is exceeded.
120
# The value should match your MTA's limit for a maximum attachment size.
121
# Default: 25M
122
#StreamMaxLength 10M
123
 
124
# Limit port range.
125
# Default: 1024
126
#StreamMinPort 30000
127
# Default: 2048
128
#StreamMaxPort 32000
129
 
130
# Maximum number of threads running at the same time.
131
# Default: 10
132
#MaxThreads 20
133
 
134
# Waiting for data from a client socket will timeout after this time (seconds).
135
# Default: 120
136
#ReadTimeout 300
137
 
138
# This option specifies the time (in seconds) after which clamd should
139
# timeout if a client doesn't provide any initial command after connecting.
140
# Default: 5
141
#CommandReadTimeout 5
142
 
143
# This option specifies how long to wait (in miliseconds) if the send buffer is full.
144
# Keep this value low to prevent clamd hanging
145
#
146
# Default: 500
147
#SendBufTimeout 200
148
 
149
# Maximum number of queued items (including those being processed by MaxThreads threads)
150
# It is recommended to have this value at least twice MaxThreads if possible.
151
# WARNING: you shouldn't increase this too much to avoid running out  of file descriptors,
152
# the following condition should hold:
153
# MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual max is 1024)
154
#
155
# Default: 100
156
#MaxQueue 200
157
 
158
# Waiting for a new job will timeout after this time (seconds).
159
# Default: 30
160
#IdleTimeout 60
161
 
162
# Don't scan files and directories matching regex
163
# This directive can be used multiple times
164
# Default: scan all
165
#ExcludePath ^/proc/
166
#ExcludePath ^/sys/
167
 
168
# Maximum depth directories are scanned at.
169
# Default: 15
170
#MaxDirectoryRecursion 20
171
 
172
# Follow directory symlinks.
173
# Default: no
174
#FollowDirectorySymlinks yes
175
 
176
# Follow regular file symlinks.
177
# Default: no
178
#FollowFileSymlinks yes
179
 
180
# Scan files and directories on other filesystems.
181
# Default: yes
182
#CrossFilesystems yes
183
 
184
# Perform a database check.
185
# Default: 600 (10 min)
186
#SelfCheck 600
187
 
188
# Execute a command when virus is found. In the command string %v will
189
# be replaced with the virus name.
190
# Default: no
191
#VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v"
192
 
193
# Run as another user (clamd must be started by root for this option to work)
194
# Default: don't drop privileges
195
#User clamav
196
 
197
# Initialize supplementary group access (clamd must be started by root).
198
# Default: no
199
#AllowSupplementaryGroups no
200
 
201
# Stop daemon when libclamav reports out of memory condition.
202
#ExitOnOOM yes
203
 
204
# Don't fork into background.
205
# Default: no
206
#Foreground yes
207
 
208
# Enable debug messages in libclamav.
209
# Default: no
210
#Debug yes
211
 
212
# Do not remove temporary files (for debug purposes).
213
# Default: no
214
#LeaveTemporaryFiles yes
215
 
216
# Permit use of the ALLMATCHSCAN command. If set to no, clamd will reject
217
# any ALLMATCHSCAN command as invalid.
218
# Default: yes
219
#AllowAllMatchScan no
220
 
221
# Detect Possibly Unwanted Applications.
222
# Default: no
223
#DetectPUA yes
224
 
225
# Exclude a specific PUA category. This directive can be used multiple times.
226
# See https://github.com/vrtadmin/clamav-faq/blob/master/faq/faq-pua.md for
227
# the complete list of PUA categories.
228
# Default: Load all categories (if DetectPUA is activated)
229
#ExcludePUA NetTool
230
#ExcludePUA PWTool
231
 
232
# Only include a specific PUA category. This directive can be used multiple
233
# times.
234
# Default: Load all categories (if DetectPUA is activated)
235
#IncludePUA Spy
236
#IncludePUA Scanner
237
#IncludePUA RAT
238
 
239
# In some cases (eg. complex malware, exploits in graphic files, and others),
240
# ClamAV uses special algorithms to provide accurate detection. This option
241
# controls the algorithmic detection.
242
# Default: yes
243
#AlgorithmicDetection yes
244
 
245
# This option causes memory or nested map scans to dump the content to disk.
246
# If you turn on this option, more data is written to disk and is available
247
# when the LeaveTemporaryFiles option is enabled.
248
#ForceToDisk yes
249
 
250
# This option allows you to disable the caching feature of the engine. By
251
# default, the engine will store an MD5 in a cache of any files that are
252
# not flagged as virus or that hit limits checks. Disabling the cache will
253
# have a negative performance impact on large scans.
254
# Default: no
255
#DisableCache yes
256
 
257
##
258
## Executable files
259
##
260
 
261
# PE stands for Portable Executable - it's an executable file format used
262
# in all 32 and 64-bit versions of Windows operating systems. This option allows
263
# ClamAV to perform a deeper analysis of executable files and it's also
264
# required for decompression of popular executable packers such as UPX, FSG,
265
# and Petite. If you turn off this option, the original files will still be
266
# scanned, but without additional processing.
267
# Default: yes
268
#ScanPE yes
269
 
270
# Certain PE files contain an authenticode signature. By default, we check
271
# the signature chain in the PE file against a database of trusted and
272
# revoked certificates if the file being scanned is marked as a virus.
273
# If any certificate in the chain validates against any trusted root, but
274
# does not match any revoked certificate, the file is marked as whitelisted.
275
# If the file does match a revoked certificate, the file is marked as virus.
276
# The following setting completely turns off authenticode verification.
277
# Default: no
278
#DisableCertCheck yes
279
 
280
# Executable and Linking Format is a standard format for UN*X executables.
281
# This option allows you to control the scanning of ELF files.
282
# If you turn off this option, the original files will still be scanned, but
283
# without additional processing.
284
# Default: yes
285
#ScanELF yes
286
 
287
# With this option clamav will try to detect broken executables (both PE and
288
# ELF) and mark them as Broken.Executable.
289
# Default: no
290
#DetectBrokenExecutables yes
291
 
292
 
293
##
294
## Documents
295
##
296
 
297
# This option enables scanning of OLE2 files, such as Microsoft Office
298
# documents and .msi files.
299
# If you turn off this option, the original files will still be scanned, but
300
# without additional processing.
301
# Default: yes
302
#ScanOLE2 yes
303
 
304
# With this option enabled OLE2 files with VBA macros, which were not
305
# detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
306
# Default: no
307
#OLE2BlockMacros no
308
 
309
# This option enables scanning within PDF files.
310
# If you turn off this option, the original files will still be scanned, but
311
# without decoding and additional processing.
312
# Default: yes
313
#ScanPDF yes
314
 
315
# This option enables scanning within SWF files.
316
# If you turn off this option, the original files will still be scanned, but
317
# without decoding and additional processing.
318
# Default: yes
319
#ScanSWF yes
320
 
321
 
322
##
323
## Mail files
324
##
325
 
326
# Enable internal e-mail scanner.
327
# If you turn off this option, the original files will still be scanned, but
328
# without parsing individual messages/attachments.
329
# Default: yes
330
#ScanMail yes
331
 
332
# Scan RFC1341 messages split over many emails.
333
# You will need to periodically clean up $TemporaryDirectory/clamav-partial directory.
334
# WARNING: This option may open your system to a DoS attack.
335
#	   Never use it on loaded servers.
336
# Default: no
337
#ScanPartialMessages yes
338
 
339
# With this option enabled ClamAV will try to detect phishing attempts by using
340
# signatures.
341
# Default: yes
342
#PhishingSignatures yes
343
 
344
# Scan URLs found in mails for phishing attempts using heuristics.
345
# Default: yes
346
#PhishingScanURLs yes
347
 
348
# Always block SSL mismatches in URLs, even if the URL isn't in the database.
349
# This can lead to false positives.
350
#
351
# Default: no
352
#PhishingAlwaysBlockSSLMismatch no
353
 
354
# Always block cloaked URLs, even if URL isn't in database.
355
# This can lead to false positives.
356
#
357
# Default: no
358
#PhishingAlwaysBlockCloak no
359
 
360
# Detect partition intersections in raw disk images using heuristics.
361
# Default: no
362
#PartitionIntersection no
363
 
364
# Allow heuristic match to take precedence.
365
# When enabled, if a heuristic scan (such as phishingScan) detects
366
# a possible virus/phish it will stop scan immediately. Recommended, saves CPU
367
# scan-time.
368
# When disabled, virus/phish detected by heuristic scans will be reported only at
369
# the end of a scan. If an archive contains both a heuristically detected
370
# virus/phish, and a real malware, the real malware will be reported
371
#
372
# Keep this disabled if you intend to handle "*.Heuristics.*" viruses
373
# differently from "real" malware.
374
# If a non-heuristically-detected virus (signature-based) is found first,
375
# the scan is interrupted immediately, regardless of this config option.
376
#
377
# Default: no
378
#HeuristicScanPrecedence yes
379
 
380
 
381
##
382
## Data Loss Prevention (DLP)
383
##
384
 
385
# Enable the DLP module
386
# Default: No
387
#StructuredDataDetection yes
388
 
389
# This option sets the lowest number of Credit Card numbers found in a file
390
# to generate a detect.
391
# Default: 3
392
#StructuredMinCreditCardCount 5
393
 
394
# This option sets the lowest number of Social Security Numbers found
395
# in a file to generate a detect.
396
# Default: 3
397
#StructuredMinSSNCount 5
398
 
399
# With this option enabled the DLP module will search for valid
400
# SSNs formatted as xxx-yy-zzzz
401
# Default: yes
402
#StructuredSSNFormatNormal yes
403
 
404
# With this option enabled the DLP module will search for valid
405
# SSNs formatted as xxxyyzzzz
406
# Default: no
407
#StructuredSSNFormatStripped yes
408
 
409
 
410
##
411
## HTML
412
##
413
 
414
# Perform HTML normalisation and decryption of MS Script Encoder code.
415
# Default: yes
416
# If you turn off this option, the original files will still be scanned, but
417
# without additional processing.
418
#ScanHTML yes
419
 
420
 
421
##
422
## Archives
423
##
424
 
425
# ClamAV can scan within archives and compressed files.
426
# If you turn off this option, the original files will still be scanned, but
427
# without unpacking and additional processing.
428
# Default: yes
429
#ScanArchive yes
430
 
431
# Mark encrypted archives as viruses (Encrypted.Zip, Encrypted.RAR).
432
# Default: no
433
#ArchiveBlockEncrypted no
434
 
435
 
436
##
437
## Limits
438
##
439
 
440
# The options below protect your system against Denial of Service attacks
441
# using archive bombs.
442
 
443
# This option sets the maximum amount of data to be scanned for each input file.
444
# Archives and other containers are recursively extracted and scanned up to this
445
# value.
446
# Value of 0 disables the limit
447
# Note: disabling this limit or setting it too high may result in severe damage
448
# to the system.
449
# Default: 100M
450
#MaxScanSize 150M
451
 
452
# Files larger than this limit won't be scanned. Affects the input file itself
453
# as well as files contained inside it (when the input file is an archive, a
454
# document or some other kind of container).
455
# Value of 0 disables the limit.
456
# Note: disabling this limit or setting it too high may result in severe damage
457
# to the system.
458
# Default: 25M
459
#MaxFileSize 30M
460
 
461
# Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
462
# file, all files within it will also be scanned. This options specifies how
463
# deeply the process should be continued.
464
# Note: setting this limit too high may result in severe damage to the system.
465
# Default: 16
466
#MaxRecursion 10
467
 
468
# Number of files to be scanned within an archive, a document, or any other
469
# container file.
470
# Value of 0 disables the limit.
471
# Note: disabling this limit or setting it too high may result in severe damage
472
# to the system.
473
# Default: 10000
474
#MaxFiles 15000
475
 
476
# Maximum size of a file to check for embedded PE. Files larger than this value
477
# will skip the additional analysis step.
478
# Note: disabling this limit or setting it too high may result in severe damage
479
# to the system.
480
# Default: 10M
481
#MaxEmbeddedPE 10M
482
 
483
# Maximum size of a HTML file to normalize. HTML files larger than this value
484
# will not be normalized or scanned.
485
# Note: disabling this limit or setting it too high may result in severe damage
486
# to the system.
487
# Default: 10M
488
#MaxHTMLNormalize 10M
489
 
490
# Maximum size of a normalized HTML file to scan. HTML files larger than this
491
# value after normalization will not be scanned.
492
# Note: disabling this limit or setting it too high may result in severe damage
493
# to the system.
494
# Default: 2M
495
#MaxHTMLNoTags 2M
496
 
497
# Maximum size of a script file to normalize. Script content larger than this
498
# value will not be normalized or scanned.
499
# Note: disabling this limit or setting it too high may result in severe damage
500
# to the system.
501
# Default: 5M
502
#MaxScriptNormalize 5M
503
 
504
# Maximum size of a ZIP file to reanalyze type recognition. ZIP files larger
505
# than this value will skip the step to potentially reanalyze as PE.
506
# Note: disabling this limit or setting it too high may result in severe damage
507
# to the system.
508
# Default: 1M
509
#MaxZipTypeRcg 1M
510
 
511
# This option sets the maximum number of partitions of a raw disk image to be scanned.
512
# Raw disk images with more partitions than this value will have up to the value number
513
# partitions scanned. Negative values are not allowed.
514
# Note: setting this limit too high may result in severe damage or impact performance.
515
# Default: 50
516
#MaxPartitions 128
517
 
518
# This option sets the maximum number of icons within a PE to be scanned.
519
# PE files with more icons than this value will have up to the value number icons scanned.
520
# Negative values are not allowed.
521
# WARNING: setting this limit too high may result in severe damage or impact performance.
522
# Default: 100
523
#MaxIconsPE 200
524
 
525
##
526
## On-access Scan Settings
527
##
528
 
529
# Enable on-access scanning. Currently, this is supported via fanotify.
530
# Clamuko/Dazuko support has been deprecated.
531
# Default: no
532
#ScanOnAccess yes
533
 
534
# Don't scan files larger than OnAccessMaxFileSize
535
# Value of 0 disables the limit.
536
# Default: 5M
537
#OnAccessMaxFileSize 10M
538
 
539
# Set the include paths (all files inside them will be scanned). You can have
540
# multiple OnAccessIncludePath directives but each directory must be added
541
# in a separate line. (On-access scan only)
542
# Default: disabled
543
#OnAccessIncludePath /home
544
#OnAccessIncludePath /students
545
 
546
# Set the exclude paths. All subdirectories are also excluded.
547
# (On-access scan only)
548
# Default: disabled
549
#OnAccessExcludePath /home/bofh
550
 
551
# With this option you can whitelist specific UIDs. Processes with these UIDs
552
# will be able to access all files.
553
# This option can be used multiple times (one per line).
554
# Default: disabled
555
#OnAccessExcludeUID 0
556
 
557
 
558
##
559
## Bytecode
560
##
561
 
562
# With this option enabled ClamAV will load bytecode from the database.
563
# It is highly recommended you keep this option on, otherwise you'll miss detections for many new viruses.
564
# Default: yes
565
#Bytecode yes
566
 
567
# Set bytecode security level.
568
# Possible values:
569
#       None - no security at all, meant for debugging. DO NOT USE THIS ON PRODUCTION SYSTEMS
570
#         This value is only available if clamav was built with --enable-debug!
571
#       TrustSigned - trust bytecode loaded from signed .c[lv]d files,
572
#                insert runtime safety checks for bytecode loaded from other sources
573
#       Paranoid - don't trust any bytecode, insert runtime checks for all
574
# Recommended: TrustSigned, because bytecode in .cvd files already has these checks
575
# Note that by default only signed bytecode is loaded, currently you can only
576
# load unsigned bytecode in --enable-debug mode.
577
#
578
# Default: TrustSigned
579
#BytecodeSecurity TrustSigned
580
 
581
# Set bytecode timeout in miliseconds.
582
#
583
# Default: 5000
584
# BytecodeTimeout 1000
585
 
586
##
587
## Statistics gathering and submitting
588
##
589
 
590
# Enable statistical reporting.
591
# Default: no
592
#StatsEnabled yes
593
 
594
# Disable submission of individual PE sections for files flagged as malware.
595
# Default: no
596
#StatsPEDisabled yes
597
 
598
# HostID in the form of an UUID to use when submitting statistical information.
599
# Default: auto
600
#StatsHostID auto
601
 
602
# Time in seconds to wait for the stats server to come back with a response
603
# Default: 10
604
#StatsTimeout 10