ruby_clamdscan 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,801 @@
1
+ ##
2
+ ## Example config file for the Clam AV daemon
3
+ ## Please read the clamd.conf(5) manual before editing this file.
4
+ ##
5
+
6
+
7
+ # Comment or remove the line below.
8
+ # Example
9
+
10
+ # Uncomment this option to enable logging.
11
+ # LogFile must be writable for the user running daemon.
12
+ # A full path is required.
13
+ # Default: disabled
14
+ LogFile /var/log/clamav/clamd.log
15
+
16
+ # By default the log file is locked for writing - the lock protects against
17
+ # running clamd multiple times (if want to run another clamd, please
18
+ # copy the configuration file, change the LogFile variable, and run
19
+ # the daemon with --config-file option).
20
+ # This option disables log file locking.
21
+ # Default: no
22
+ #LogFileUnlock yes
23
+
24
+ # Maximum size of the log file.
25
+ # Value of 0 disables the limit.
26
+ # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
27
+ # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
28
+ # in bytes just don't use modifiers. If LogFileMaxSize is enabled, log
29
+ # rotation (the LogRotate option) will always be enabled.
30
+ # Default: 1M
31
+ #LogFileMaxSize 2M
32
+
33
+ # Log time with each message.
34
+ # Default: no
35
+ LogTime yes
36
+
37
+ # Also log clean files. Useful in debugging but drastically increases the
38
+ # log size.
39
+ # Default: no
40
+ #LogClean yes
41
+
42
+ # Use system logger (can work together with LogFile).
43
+ # Default: no
44
+ #LogSyslog yes
45
+
46
+ # Specify the type of syslog messages - please refer to 'man syslog'
47
+ # for facility names.
48
+ # Default: LOG_LOCAL6
49
+ #LogFacility LOG_MAIL
50
+
51
+ # Enable verbose logging.
52
+ # Default: no
53
+ #LogVerbose yes
54
+
55
+ # Enable log rotation. Always enabled when LogFileMaxSize is enabled.
56
+ # Default: no
57
+ #LogRotate yes
58
+
59
+ # Enable Prelude output.
60
+ # Default: no
61
+ #PreludeEnable yes
62
+ #
63
+ # Set the name of the analyzer used by prelude-admin.
64
+ # Default: ClamAV
65
+ #PreludeAnalyzerName ClamAV
66
+
67
+ # Log additional information about the infected file, such as its
68
+ # size and hash, together with the virus name.
69
+ #ExtendedDetectionInfo yes
70
+
71
+ # This option allows you to save a process identifier of the listening
72
+ # daemon (main thread).
73
+ # This file will be owned by root, as long as clamd was started by root.
74
+ # It is recommended that the directory where this file is stored is
75
+ # also owned by root to keep other users from tampering with it.
76
+ # Default: disabled
77
+ PidFile /tmp/clamd.pid
78
+
79
+ # Optional path to the global temporary directory.
80
+ # Default: system specific (usually /tmp or /var/tmp).
81
+ #TemporaryDirectory /var/tmp
82
+
83
+ # Path to the database directory.
84
+ # Default: hardcoded (depends on installation options)
85
+ #DatabaseDirectory /var/lib/clamav
86
+
87
+ # Only load the official signatures published by the ClamAV project.
88
+ # Default: no
89
+ #OfficialDatabaseOnly no
90
+
91
+ # The daemon can work in local mode, network mode or both.
92
+ # Due to security reasons we recommend the local mode.
93
+
94
+ # Path to a local socket file the daemon will listen on.
95
+ # Default: disabled (must be specified by a user)
96
+ LocalSocket /tmp/clamd.sock
97
+
98
+ # Sets the group ownership on the unix socket.
99
+ # Default: disabled (the primary group of the user running clamd)
100
+ #LocalSocketGroup virusgroup
101
+
102
+ # Sets the permissions on the unix socket to the specified mode.
103
+ # Default: disabled (socket is world accessible)
104
+ #LocalSocketMode 660
105
+
106
+ # Remove stale socket after unclean shutdown.
107
+ # Default: yes
108
+ #FixStaleSocket yes
109
+
110
+ # TCP port address.
111
+ # Default: no
112
+ TCPSocket 3310
113
+
114
+ # TCP address.
115
+ # By default we bind to INADDR_ANY, probably not wise.
116
+ # Enable the following to provide some degree of protection
117
+ # from the outside world. This option can be specified multiple
118
+ # times if you want to listen on multiple IPs. IPv6 is now supported.
119
+ # Default: no
120
+ TCPAddr 0.0.0.0
121
+
122
+ # Maximum length the queue of pending connections may grow to.
123
+ # Default: 200
124
+ #MaxConnectionQueueLength 30
125
+
126
+ # Clamd uses FTP-like protocol to receive data from remote clients.
127
+ # If you are using clamav-milter to balance load between remote clamd daemons
128
+ # on firewall servers you may need to tune the options below.
129
+
130
+ # Close the connection when the data size limit is exceeded.
131
+ # The value should match your MTA's limit for a maximum attachment size.
132
+ # Default: 100M
133
+ #StreamMaxLength 25M
134
+
135
+ # Limit port range.
136
+ # Default: 1024
137
+ #StreamMinPort 30000
138
+ # Default: 2048
139
+ #StreamMaxPort 32000
140
+
141
+ # Maximum number of threads running at the same time.
142
+ # Default: 10
143
+ #MaxThreads 20
144
+
145
+ # Waiting for data from a client socket will timeout after this time (seconds).
146
+ # Default: 120
147
+ #ReadTimeout 300
148
+
149
+ # This option specifies the time (in seconds) after which clamd should
150
+ # timeout if a client doesn't provide any initial command after connecting.
151
+ # Default: 30
152
+ #CommandReadTimeout 30
153
+
154
+ # This option specifies how long to wait (in milliseconds) if the send buffer
155
+ # is full.
156
+ # Keep this value low to prevent clamd hanging.
157
+ #
158
+ # Default: 500
159
+ #SendBufTimeout 200
160
+
161
+ # Maximum number of queued items (including those being processed by
162
+ # MaxThreads threads).
163
+ # It is recommended to have this value at least twice MaxThreads if possible.
164
+ # WARNING: you shouldn't increase this too much to avoid running out of file
165
+ # descriptors, the following condition should hold:
166
+ # MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual
167
+ # max is 1024).
168
+ #
169
+ # Default: 100
170
+ #MaxQueue 200
171
+
172
+ # Waiting for a new job will timeout after this time (seconds).
173
+ # Default: 30
174
+ #IdleTimeout 60
175
+
176
+ # Don't scan files and directories matching regex
177
+ # This directive can be used multiple times
178
+ # Default: scan all
179
+ #ExcludePath ^/proc/
180
+ #ExcludePath ^/sys/
181
+
182
+ # Maximum depth directories are scanned at.
183
+ # Default: 15
184
+ #MaxDirectoryRecursion 20
185
+
186
+ # Follow directory symlinks.
187
+ # Default: no
188
+ #FollowDirectorySymlinks yes
189
+
190
+ # Follow regular file symlinks.
191
+ # Default: no
192
+ #FollowFileSymlinks yes
193
+
194
+ # Scan files and directories on other filesystems.
195
+ # Default: yes
196
+ #CrossFilesystems yes
197
+
198
+ # Perform a database check.
199
+ # Default: 600 (10 min)
200
+ #SelfCheck 600
201
+
202
+ # Enable non-blocking (multi-threaded/concurrent) database reloads.
203
+ # This feature will temporarily load a second scanning engine while scanning
204
+ # continues using the first engine. Once loaded, the new engine takes over.
205
+ # The old engine is removed as soon as all scans using the old engine have
206
+ # completed.
207
+ # This feature requires more RAM, so this option is provided in case users are
208
+ # willing to block scans during reload in exchange for lower RAM requirements.
209
+ # Default: yes
210
+ #ConcurrentDatabaseReload no
211
+
212
+ # Execute a command when virus is found. In the command string %v will
213
+ # be replaced with the virus name and %f will be replaced with the file name.
214
+ # Additionally, two environment variables will be defined: $CLAM_VIRUSEVENT_FILENAME
215
+ # and $CLAM_VIRUSEVENT_VIRUSNAME.
216
+ # Default: no
217
+ #VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v in %f"
218
+
219
+ # Run as another user (clamd must be started by root for this option to work)
220
+ # Default: don't drop privileges
221
+ User clamav
222
+
223
+ # Stop daemon when libclamav reports out of memory condition.
224
+ #ExitOnOOM yes
225
+
226
+ # Don't fork into background.
227
+ # Default: no
228
+ #Foreground yes
229
+
230
+ # Enable debug messages in libclamav.
231
+ # Default: no
232
+ #Debug yes
233
+
234
+ # Do not remove temporary files (for debug purposes).
235
+ # Default: no
236
+ #LeaveTemporaryFiles yes
237
+
238
+ # Record metadata about the file being scanned.
239
+ # Scan metadata is useful for file analysis purposes and for debugging scan behavior.
240
+ # The JSON metadata will be printed after the scan is complete if Debug is enabled.
241
+ # A metadata.json file will be written to the scan temp directory if LeaveTemporaryFiles is enabled.
242
+ # Default: no
243
+ #GenerateMetadataJson yes
244
+
245
+ # Permit use of the ALLMATCHSCAN command. If set to no, clamd will reject
246
+ # any ALLMATCHSCAN command as invalid.
247
+ # Default: yes
248
+ #AllowAllMatchScan no
249
+
250
+ # Detect Possibly Unwanted Applications.
251
+ # Default: no
252
+ #DetectPUA yes
253
+
254
+ # Exclude a specific PUA category. This directive can be used multiple times.
255
+ # See https://github.com/vrtadmin/clamav-faq/blob/master/faq/faq-pua.md for
256
+ # the complete list of PUA categories.
257
+ # Default: Load all categories (if DetectPUA is activated)
258
+ #ExcludePUA NetTool
259
+ #ExcludePUA PWTool
260
+
261
+ # Only include a specific PUA category. This directive can be used multiple
262
+ # times.
263
+ # Default: Load all categories (if DetectPUA is activated)
264
+ #IncludePUA Spy
265
+ #IncludePUA Scanner
266
+ #IncludePUA RAT
267
+
268
+ # This option causes memory or nested map scans to dump the content to disk.
269
+ # If you turn on this option, more data is written to disk and is available
270
+ # when the LeaveTemporaryFiles option is enabled.
271
+ #ForceToDisk yes
272
+
273
+ # This option allows you to disable the caching feature of the engine. By
274
+ # default, the engine will store an MD5 in a cache of any files that are
275
+ # not flagged as virus or that hit limits checks. Disabling the cache will
276
+ # have a negative performance impact on large scans.
277
+ # Default: no
278
+ #DisableCache yes
279
+
280
+ # In some cases (eg. complex malware, exploits in graphic files, and others),
281
+ # ClamAV uses special algorithms to detect abnormal patterns and behaviors that
282
+ # may be malicious. This option enables alerting on such heuristically
283
+ # detected potential threats.
284
+ # Default: yes
285
+ #HeuristicAlerts yes
286
+
287
+ # Allow heuristic alerts to take precedence.
288
+ # When enabled, if a heuristic scan (such as phishingScan) detects
289
+ # a possible virus/phish it will stop scan immediately. Recommended, saves CPU
290
+ # scan-time.
291
+ # When disabled, virus/phish detected by heuristic scans will be reported only
292
+ # at the end of a scan. If an archive contains both a heuristically detected
293
+ # virus/phish, and a real malware, the real malware will be reported
294
+ #
295
+ # Keep this disabled if you intend to handle "Heuristics.*" viruses
296
+ # differently from "real" malware.
297
+ # If a non-heuristically-detected virus (signature-based) is found first,
298
+ # the scan is interrupted immediately, regardless of this config option.
299
+ #
300
+ # Default: no
301
+ #HeuristicScanPrecedence yes
302
+
303
+
304
+ ##
305
+ ## Heuristic Alerts
306
+ ##
307
+
308
+ # With this option clamav will try to detect broken executables (both PE and
309
+ # ELF) and alert on them with the Broken.Executable heuristic signature.
310
+ # Default: no
311
+ #AlertBrokenExecutables yes
312
+
313
+ # With this option clamav will try to detect broken media file (JPEG,
314
+ # TIFF, PNG, GIF) and alert on them with a Broken.Media heuristic signature.
315
+ # Default: no
316
+ #AlertBrokenMedia yes
317
+
318
+ # Alert on encrypted archives _and_ documents with heuristic signature
319
+ # (encrypted .zip, .7zip, .rar, .pdf).
320
+ # Default: no
321
+ #AlertEncrypted yes
322
+
323
+ # Alert on encrypted archives with heuristic signature (encrypted .zip, .7zip,
324
+ # .rar).
325
+ # Default: no
326
+ #AlertEncryptedArchive yes
327
+
328
+ # Alert on encrypted archives with heuristic signature (encrypted .pdf).
329
+ # Default: no
330
+ #AlertEncryptedDoc yes
331
+
332
+ # With this option enabled OLE2 files containing VBA macros, which were not
333
+ # detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
334
+ # Default: no
335
+ #AlertOLE2Macros yes
336
+
337
+ # Alert on SSL mismatches in URLs, even if the URL isn't in the database.
338
+ # This can lead to false positives.
339
+ # Default: no
340
+ #AlertPhishingSSLMismatch yes
341
+
342
+ # Alert on cloaked URLs, even if URL isn't in database.
343
+ # This can lead to false positives.
344
+ # Default: no
345
+ #AlertPhishingCloak yes
346
+
347
+ # Alert on raw DMG image files containing partition intersections
348
+ # Default: no
349
+ #AlertPartitionIntersection yes
350
+
351
+
352
+ ##
353
+ ## Executable files
354
+ ##
355
+
356
+ # PE stands for Portable Executable - it's an executable file format used
357
+ # in all 32 and 64-bit versions of Windows operating systems. This option
358
+ # allows ClamAV to perform a deeper analysis of executable files and it's also
359
+ # required for decompression of popular executable packers such as UPX, FSG,
360
+ # and Petite. If you turn off this option, the original files will still be
361
+ # scanned, but without additional processing.
362
+ # Default: yes
363
+ #ScanPE yes
364
+
365
+ # Certain PE files contain an authenticode signature. By default, we check
366
+ # the signature chain in the PE file against a database of trusted and
367
+ # revoked certificates if the file being scanned is marked as a virus.
368
+ # If any certificate in the chain validates against any trusted root, but
369
+ # does not match any revoked certificate, the file is marked as trusted.
370
+ # If the file does match a revoked certificate, the file is marked as virus.
371
+ # The following setting completely turns off authenticode verification.
372
+ # Default: no
373
+ #DisableCertCheck yes
374
+
375
+ # Executable and Linking Format is a standard format for UN*X executables.
376
+ # This option allows you to control the scanning of ELF files.
377
+ # If you turn off this option, the original files will still be scanned, but
378
+ # without additional processing.
379
+ # Default: yes
380
+ #ScanELF yes
381
+
382
+
383
+ ##
384
+ ## Documents
385
+ ##
386
+
387
+ # This option enables scanning of OLE2 files, such as Microsoft Office
388
+ # documents and .msi files.
389
+ # If you turn off this option, the original files will still be scanned, but
390
+ # without additional processing.
391
+ # Default: yes
392
+ #ScanOLE2 yes
393
+
394
+ # This option enables scanning within PDF files.
395
+ # If you turn off this option, the original files will still be scanned, but
396
+ # without decoding and additional processing.
397
+ # Default: yes
398
+ #ScanPDF yes
399
+
400
+ # This option enables scanning within SWF files.
401
+ # If you turn off this option, the original files will still be scanned, but
402
+ # without decoding and additional processing.
403
+ # Default: yes
404
+ #ScanSWF yes
405
+
406
+ # This option enables scanning xml-based document files supported by libclamav.
407
+ # If you turn off this option, the original files will still be scanned, but
408
+ # without additional processing.
409
+ # Default: yes
410
+ #ScanXMLDOCS yes
411
+
412
+ # This option enables scanning of HWP3 files.
413
+ # If you turn off this option, the original files will still be scanned, but
414
+ # without additional processing.
415
+ # Default: yes
416
+ #ScanHWP3 yes
417
+
418
+
419
+ ##
420
+ ## Mail files
421
+ ##
422
+
423
+ # Enable internal e-mail scanner.
424
+ # If you turn off this option, the original files will still be scanned, but
425
+ # without parsing individual messages/attachments.
426
+ # Default: yes
427
+ #ScanMail yes
428
+
429
+ # Scan RFC1341 messages split over many emails.
430
+ # You will need to periodically clean up $TemporaryDirectory/clamav-partial
431
+ # directory.
432
+ # WARNING: This option may open your system to a DoS attack.
433
+ # Never use it on loaded servers.
434
+ # Default: no
435
+ #ScanPartialMessages yes
436
+
437
+ # With this option enabled ClamAV will try to detect phishing attempts by using
438
+ # HTML.Phishing and Email.Phishing NDB signatures.
439
+ # Default: yes
440
+ #PhishingSignatures no
441
+
442
+ # With this option enabled ClamAV will try to detect phishing attempts by
443
+ # analyzing URLs found in emails using WDB and PDB signature databases.
444
+ # Default: yes
445
+ #PhishingScanURLs no
446
+
447
+
448
+ ##
449
+ ## Data Loss Prevention (DLP)
450
+ ##
451
+
452
+ # Enable the DLP module
453
+ # Default: No
454
+ #StructuredDataDetection yes
455
+
456
+ # This option sets the lowest number of Credit Card numbers found in a file
457
+ # to generate a detect.
458
+ # Default: 3
459
+ #StructuredMinCreditCardCount 5
460
+
461
+ # With this option enabled the DLP module will search for valid Credit Card
462
+ # numbers only. Debit and Private Label cards will not be searched.
463
+ # Default: no
464
+ #StructuredCCOnly yes
465
+
466
+ # This option sets the lowest number of Social Security Numbers found
467
+ # in a file to generate a detect.
468
+ # Default: 3
469
+ #StructuredMinSSNCount 5
470
+
471
+ # With this option enabled the DLP module will search for valid
472
+ # SSNs formatted as xxx-yy-zzzz
473
+ # Default: yes
474
+ #StructuredSSNFormatNormal yes
475
+
476
+ # With this option enabled the DLP module will search for valid
477
+ # SSNs formatted as xxxyyzzzz
478
+ # Default: no
479
+ #StructuredSSNFormatStripped yes
480
+
481
+
482
+ ##
483
+ ## HTML
484
+ ##
485
+
486
+ # Perform HTML normalisation and decryption of MS Script Encoder code.
487
+ # Default: yes
488
+ # If you turn off this option, the original files will still be scanned, but
489
+ # without additional processing.
490
+ #ScanHTML yes
491
+
492
+
493
+ ##
494
+ ## Archives
495
+ ##
496
+
497
+ # ClamAV can scan within archives and compressed files.
498
+ # If you turn off this option, the original files will still be scanned, but
499
+ # without unpacking and additional processing.
500
+ # Default: yes
501
+ #ScanArchive yes
502
+
503
+
504
+ ##
505
+ ## Limits
506
+ ##
507
+
508
+ # The options below protect your system against Denial of Service attacks
509
+ # using archive bombs.
510
+
511
+ # This option sets the maximum amount of time to a scan may take.
512
+ # In this version, this field only affects the scan time of ZIP archives.
513
+ # Value of 0 disables the limit.
514
+ # Note: disabling this limit or setting it too high may result allow scanning
515
+ # of certain files to lock up the scanning process/threads resulting in a
516
+ # Denial of Service.
517
+ # Time is in milliseconds.
518
+ # Default: 120000
519
+ #MaxScanTime 300000
520
+
521
+ # This option sets the maximum amount of data to be scanned for each input
522
+ # file. Archives and other containers are recursively extracted and scanned
523
+ # up to this value.
524
+ # Value of 0 disables the limit
525
+ # Note: disabling this limit or setting it too high may result in severe damage
526
+ # to the system.
527
+ # Default: 400M
528
+ #MaxScanSize 1000M
529
+
530
+ # Files larger than this limit won't be scanned. Affects the input file itself
531
+ # as well as files contained inside it (when the input file is an archive, a
532
+ # document or some other kind of container).
533
+ # Value of 0 disables the limit.
534
+ # Note: disabling this limit or setting it too high may result in severe damage
535
+ # to the system.
536
+ # Technical design limitations prevent ClamAV from scanning files greater than
537
+ # 2 GB at this time.
538
+ # Default: 100M
539
+ #MaxFileSize 400M
540
+
541
+ # Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
542
+ # file, all files within it will also be scanned. This options specifies how
543
+ # deeply the process should be continued.
544
+ # Note: setting this limit too high may result in severe damage to the system.
545
+ # Default: 17
546
+ #MaxRecursion 10
547
+
548
+ # Number of files to be scanned within an archive, a document, or any other
549
+ # container file.
550
+ # Value of 0 disables the limit.
551
+ # Note: disabling this limit or setting it too high may result in severe damage
552
+ # to the system.
553
+ # Default: 10000
554
+ #MaxFiles 15000
555
+
556
+ # Maximum size of a file to check for embedded PE. Files larger than this value
557
+ # will skip the additional analysis step.
558
+ # Note: disabling this limit or setting it too high may result in severe damage
559
+ # to the system.
560
+ # Default: 40M
561
+ #MaxEmbeddedPE 100M
562
+
563
+ # Maximum size of a HTML file to normalize. HTML files larger than this value
564
+ # will not be normalized or scanned.
565
+ # Note: disabling this limit or setting it too high may result in severe damage
566
+ # to the system.
567
+ # Default: 40M
568
+ #MaxHTMLNormalize 100M
569
+
570
+ # Maximum size of a normalized HTML file to scan. HTML files larger than this
571
+ # value after normalization will not be scanned.
572
+ # Note: disabling this limit or setting it too high may result in severe damage
573
+ # to the system.
574
+ # Default: 8M
575
+ #MaxHTMLNoTags 16M
576
+
577
+ # Maximum size of a script file to normalize. Script content larger than this
578
+ # value will not be normalized or scanned.
579
+ # Note: disabling this limit or setting it too high may result in severe damage
580
+ # to the system.
581
+ # Default: 20M
582
+ #MaxScriptNormalize 50M
583
+
584
+ # Maximum size of a ZIP file to reanalyze type recognition. ZIP files larger
585
+ # than this value will skip the step to potentially reanalyze as PE.
586
+ # Note: disabling this limit or setting it too high may result in severe damage
587
+ # to the system.
588
+ # Default: 1M
589
+ #MaxZipTypeRcg 1M
590
+
591
+ # This option sets the maximum number of partitions of a raw disk image to be
592
+ # scanned.
593
+ # Raw disk images with more partitions than this value will have up to
594
+ # the value number partitions scanned. Negative values are not allowed.
595
+ # Note: setting this limit too high may result in severe damage or impact
596
+ # performance.
597
+ # Default: 50
598
+ #MaxPartitions 128
599
+
600
+ # This option sets the maximum number of icons within a PE to be scanned.
601
+ # PE files with more icons than this value will have up to the value number
602
+ # icons scanned.
603
+ # Negative values are not allowed.
604
+ # WARNING: setting this limit too high may result in severe damage or impact
605
+ # performance.
606
+ # Default: 100
607
+ #MaxIconsPE 200
608
+
609
+ # This option sets the maximum recursive calls for HWP3 parsing during
610
+ # scanning. HWP3 files using more than this limit will be terminated and
611
+ # alert the user.
612
+ # Scans will be unable to scan any HWP3 attachments if the recursive limit
613
+ # is reached.
614
+ # Negative values are not allowed.
615
+ # WARNING: setting this limit too high may result in severe damage or impact
616
+ # performance.
617
+ # Default: 16
618
+ #MaxRecHWP3 16
619
+
620
+ # This option sets the maximum calls to the PCRE match function during
621
+ # an instance of regex matching.
622
+ # Instances using more than this limit will be terminated and alert the user
623
+ # but the scan will continue.
624
+ # For more information on match_limit, see the PCRE documentation.
625
+ # Negative values are not allowed.
626
+ # WARNING: setting this limit too high may severely impact performance.
627
+ # Default: 100000
628
+ #PCREMatchLimit 20000
629
+
630
+ # This option sets the maximum recursive calls to the PCRE match function
631
+ # during an instance of regex matching.
632
+ # Instances using more than this limit will be terminated and alert the user
633
+ # but the scan will continue.
634
+ # For more information on match_limit_recursion, see the PCRE documentation.
635
+ # Negative values are not allowed and values > PCREMatchLimit are superfluous.
636
+ # WARNING: setting this limit too high may severely impact performance.
637
+ # Default: 2000
638
+ #PCRERecMatchLimit 10000
639
+
640
+ # This option sets the maximum filesize for which PCRE subsigs will be
641
+ # executed. Files exceeding this limit will not have PCRE subsigs executed
642
+ # unless a subsig is encompassed to a smaller buffer.
643
+ # Negative values are not allowed.
644
+ # Setting this value to zero disables the limit.
645
+ # WARNING: setting this limit too high or disabling it may severely impact
646
+ # performance.
647
+ # Default: 100M
648
+ #PCREMaxFileSize 400M
649
+
650
+ # When AlertExceedsMax is set, files exceeding the MaxFileSize, MaxScanSize, or
651
+ # MaxRecursion limit will be flagged with the virus name starting with
652
+ # "Heuristics.Limits.Exceeded".
653
+ # Default: no
654
+ #AlertExceedsMax yes
655
+
656
+ ##
657
+ ## On-access Scan Settings
658
+ ##
659
+
660
+ # Don't scan files larger than OnAccessMaxFileSize
661
+ # Value of 0 disables the limit.
662
+ # Default: 5M
663
+ #OnAccessMaxFileSize 10M
664
+
665
+ # Max number of scanning threads to allocate to the OnAccess thread pool at
666
+ # startup. These threads are the ones responsible for creating a connection
667
+ # with the daemon and kicking off scanning after an event has been processed.
668
+ # To prevent clamonacc from consuming all clamd's resources keep this lower
669
+ # than clamd's max threads.
670
+ # Default: 5
671
+ #OnAccessMaxThreads 10
672
+
673
+ # Max amount of time (in milliseconds) that the OnAccess client should spend
674
+ # for every connect, send, and recieve attempt when communicating with clamd
675
+ # via curl.
676
+ # Default: 5000 (5 seconds)
677
+ # OnAccessCurlTimeout 10000
678
+
679
+ # Toggles dynamic directory determination. Allows for recursively watching
680
+ # include paths.
681
+ # Default: no
682
+ #OnAccessDisableDDD yes
683
+
684
+ # Set the include paths (all files inside them will be scanned). You can have
685
+ # multiple OnAccessIncludePath directives but each directory must be added
686
+ # in a separate line.
687
+ # Default: disabled
688
+ #OnAccessIncludePath /home
689
+ #OnAccessIncludePath /students
690
+
691
+ # Set the exclude paths. All subdirectories are also excluded.
692
+ # Default: disabled
693
+ #OnAccessExcludePath /home/user
694
+
695
+ # Modifies fanotify blocking behaviour when handling permission events.
696
+ # If off, fanotify will only notify if the file scanned is a virus,
697
+ # and not perform any blocking.
698
+ # Default: no
699
+ #OnAccessPrevention yes
700
+
701
+ # When using prevention, if this option is turned on, any errors that occur
702
+ # during scanning will result in the event attempt being denied. This could
703
+ # potentially lead to unwanted system behaviour with certain configurations,
704
+ # so the client defaults this to off and prefers allowing access events in
705
+ # case of scan or connection error.
706
+ # Default: no
707
+ #OnAccessDenyOnError yes
708
+
709
+ # Toggles extra scanning and notifications when a file or directory is
710
+ # created or moved.
711
+ # Requires the DDD system to kick-off extra scans.
712
+ # Default: no
713
+ #OnAccessExtraScanning yes
714
+
715
+ # Set the mount point to be scanned. The mount point specified, or the mount
716
+ # point containing the specified directory will be watched. If any directories
717
+ # are specified, this option will preempt (disable and ignore all options
718
+ # related to) the DDD system. This option will result in verdicts only.
719
+ # Note that prevention is explicitly disallowed to prevent common, fatal
720
+ # misconfigurations. (e.g. watching "/" with prevention on and no exclusions
721
+ # made on vital system directories)
722
+ # It can be used multiple times.
723
+ # Default: disabled
724
+ #OnAccessMountPath /
725
+ #OnAccessMountPath /home/user
726
+
727
+ # With this option you can exclude the root UID (0). Processes run under
728
+ # root with be able to access all files without triggering scans or
729
+ # permission denied events.
730
+ # Note that if clamd cannot check the uid of the process that generated an
731
+ # on-access scan event (e.g., because OnAccessPrevention was not enabled, and
732
+ # the process already exited), clamd will perform a scan. Thus, setting
733
+ # OnAccessExcludeRootUID is not *guaranteed* to prevent every access by the
734
+ # root user from triggering a scan (unless OnAccessPrevention is enabled).
735
+ # Default: no
736
+ #OnAccessExcludeRootUID no
737
+
738
+ # With this option you can exclude specific UIDs. Processes with these UIDs
739
+ # will be able to access all files without triggering scans or permission
740
+ # denied events.
741
+ # This option can be used multiple times (one per line).
742
+ # Using a value of 0 on any line will disable this option entirely.
743
+ # To exclude the root UID (0) please enable the OnAccessExcludeRootUID
744
+ # option.
745
+ # Also note that if clamd cannot check the uid of the process that generated an
746
+ # on-access scan event (e.g., because OnAccessPrevention was not enabled, and
747
+ # the process already exited), clamd will perform a scan. Thus, setting
748
+ # OnAccessExcludeUID is not *guaranteed* to prevent every access by the
749
+ # specified uid from triggering a scan (unless OnAccessPrevention is enabled).
750
+ # Default: disabled
751
+ #OnAccessExcludeUID -1
752
+
753
+ # This option allows exclusions via user names when using the on-access
754
+ # scanning client. It can be used multiple times.
755
+ # It has the same potential race condition limitations of the
756
+ # OnAccessExcludeUID option.
757
+ # Default: disabled
758
+ #OnAccessExcludeUname clamav
759
+
760
+ # Number of times the OnAccess client will retry a failed scan due to
761
+ # connection problems (or other issues).
762
+ # Default: 0
763
+ #OnAccessRetryAttempts 3
764
+
765
+ ##
766
+ ## Bytecode
767
+ ##
768
+
769
+ # With this option enabled ClamAV will load bytecode from the database.
770
+ # It is highly recommended you keep this option on, otherwise you'll miss
771
+ # detections for many new viruses.
772
+ # Default: yes
773
+ #Bytecode yes
774
+
775
+ # Set bytecode security level.
776
+ # Possible values:
777
+ # None - No security at all, meant for debugging.
778
+ # DO NOT USE THIS ON PRODUCTION SYSTEMS.
779
+ # This value is only available if clamav was built
780
+ # with --enable-debug!
781
+ # TrustSigned - Trust bytecode loaded from signed .c[lv]d files, insert
782
+ # runtime safety checks for bytecode loaded from other sources.
783
+ # Paranoid - Don't trust any bytecode, insert runtime checks for all.
784
+ # Recommended: TrustSigned, because bytecode in .cvd files already has these
785
+ # checks.
786
+ # Note that by default only signed bytecode is loaded, currently you can only
787
+ # load unsigned bytecode in --enable-debug mode.
788
+ #
789
+ # Default: TrustSigned
790
+ #BytecodeSecurity TrustSigned
791
+
792
+ # Allow loading bytecode from outside digitally signed .c[lv]d files.
793
+ # **Caution**: You should NEVER run bytecode signatures from untrusted sources.
794
+ # Doing so may result in arbitrary code execution.
795
+ # Default: no
796
+ #BytecodeUnsigned yes
797
+
798
+ # Set bytecode timeout in milliseconds.
799
+ #
800
+ # Default: 10000
801
+ # BytecodeTimeout 1000