ruby_clamdscan 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,801 @@
1
+ ##
2
+ ## Example config file for the Clam AV daemon
3
+ ## Please read the clamd.conf(5) manual before editing this file.
4
+ ##
5
+
6
+
7
+ # Comment or remove the line below.
8
+ # Example
9
+
10
+ # Uncomment this option to enable logging.
11
+ # LogFile must be writable for the user running daemon.
12
+ # A full path is required.
13
+ # Default: disabled
14
+ LogFile /var/log/clamav/clamd.log
15
+
16
+ # By default the log file is locked for writing - the lock protects against
17
+ # running clamd multiple times (if want to run another clamd, please
18
+ # copy the configuration file, change the LogFile variable, and run
19
+ # the daemon with --config-file option).
20
+ # This option disables log file locking.
21
+ # Default: no
22
+ #LogFileUnlock yes
23
+
24
+ # Maximum size of the log file.
25
+ # Value of 0 disables the limit.
26
+ # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
27
+ # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
28
+ # in bytes just don't use modifiers. If LogFileMaxSize is enabled, log
29
+ # rotation (the LogRotate option) will always be enabled.
30
+ # Default: 1M
31
+ #LogFileMaxSize 2M
32
+
33
+ # Log time with each message.
34
+ # Default: no
35
+ LogTime yes
36
+
37
+ # Also log clean files. Useful in debugging but drastically increases the
38
+ # log size.
39
+ # Default: no
40
+ #LogClean yes
41
+
42
+ # Use system logger (can work together with LogFile).
43
+ # Default: no
44
+ #LogSyslog yes
45
+
46
+ # Specify the type of syslog messages - please refer to 'man syslog'
47
+ # for facility names.
48
+ # Default: LOG_LOCAL6
49
+ #LogFacility LOG_MAIL
50
+
51
+ # Enable verbose logging.
52
+ # Default: no
53
+ #LogVerbose yes
54
+
55
+ # Enable log rotation. Always enabled when LogFileMaxSize is enabled.
56
+ # Default: no
57
+ #LogRotate yes
58
+
59
+ # Enable Prelude output.
60
+ # Default: no
61
+ #PreludeEnable yes
62
+ #
63
+ # Set the name of the analyzer used by prelude-admin.
64
+ # Default: ClamAV
65
+ #PreludeAnalyzerName ClamAV
66
+
67
+ # Log additional information about the infected file, such as its
68
+ # size and hash, together with the virus name.
69
+ #ExtendedDetectionInfo yes
70
+
71
+ # This option allows you to save a process identifier of the listening
72
+ # daemon (main thread).
73
+ # This file will be owned by root, as long as clamd was started by root.
74
+ # It is recommended that the directory where this file is stored is
75
+ # also owned by root to keep other users from tampering with it.
76
+ # Default: disabled
77
+ PidFile /tmp/clamd.pid
78
+
79
+ # Optional path to the global temporary directory.
80
+ # Default: system specific (usually /tmp or /var/tmp).
81
+ #TemporaryDirectory /var/tmp
82
+
83
+ # Path to the database directory.
84
+ # Default: hardcoded (depends on installation options)
85
+ #DatabaseDirectory /var/lib/clamav
86
+
87
+ # Only load the official signatures published by the ClamAV project.
88
+ # Default: no
89
+ #OfficialDatabaseOnly no
90
+
91
+ # The daemon can work in local mode, network mode or both.
92
+ # Due to security reasons we recommend the local mode.
93
+
94
+ # Path to a local socket file the daemon will listen on.
95
+ # Default: disabled (must be specified by a user)
96
+ LocalSocket /tmp/clamd.sock
97
+
98
+ # Sets the group ownership on the unix socket.
99
+ # Default: disabled (the primary group of the user running clamd)
100
+ #LocalSocketGroup virusgroup
101
+
102
+ # Sets the permissions on the unix socket to the specified mode.
103
+ # Default: disabled (socket is world accessible)
104
+ #LocalSocketMode 660
105
+
106
+ # Remove stale socket after unclean shutdown.
107
+ # Default: yes
108
+ #FixStaleSocket yes
109
+
110
+ # TCP port address.
111
+ # Default: no
112
+ TCPSocket 3310
113
+
114
+ # TCP address.
115
+ # By default we bind to INADDR_ANY, probably not wise.
116
+ # Enable the following to provide some degree of protection
117
+ # from the outside world. This option can be specified multiple
118
+ # times if you want to listen on multiple IPs. IPv6 is now supported.
119
+ # Default: no
120
+ TCPAddr 0.0.0.0
121
+
122
+ # Maximum length the queue of pending connections may grow to.
123
+ # Default: 200
124
+ #MaxConnectionQueueLength 30
125
+
126
+ # Clamd uses FTP-like protocol to receive data from remote clients.
127
+ # If you are using clamav-milter to balance load between remote clamd daemons
128
+ # on firewall servers you may need to tune the options below.
129
+
130
+ # Close the connection when the data size limit is exceeded.
131
+ # The value should match your MTA's limit for a maximum attachment size.
132
+ # Default: 100M
133
+ #StreamMaxLength 25M
134
+
135
+ # Limit port range.
136
+ # Default: 1024
137
+ #StreamMinPort 30000
138
+ # Default: 2048
139
+ #StreamMaxPort 32000
140
+
141
+ # Maximum number of threads running at the same time.
142
+ # Default: 10
143
+ #MaxThreads 20
144
+
145
+ # Waiting for data from a client socket will timeout after this time (seconds).
146
+ # Default: 120
147
+ #ReadTimeout 300
148
+
149
+ # This option specifies the time (in seconds) after which clamd should
150
+ # timeout if a client doesn't provide any initial command after connecting.
151
+ # Default: 30
152
+ #CommandReadTimeout 30
153
+
154
+ # This option specifies how long to wait (in milliseconds) if the send buffer
155
+ # is full.
156
+ # Keep this value low to prevent clamd hanging.
157
+ #
158
+ # Default: 500
159
+ #SendBufTimeout 200
160
+
161
+ # Maximum number of queued items (including those being processed by
162
+ # MaxThreads threads).
163
+ # It is recommended to have this value at least twice MaxThreads if possible.
164
+ # WARNING: you shouldn't increase this too much to avoid running out of file
165
+ # descriptors, the following condition should hold:
166
+ # MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual
167
+ # max is 1024).
168
+ #
169
+ # Default: 100
170
+ #MaxQueue 200
171
+
172
+ # Waiting for a new job will timeout after this time (seconds).
173
+ # Default: 30
174
+ #IdleTimeout 60
175
+
176
+ # Don't scan files and directories matching regex
177
+ # This directive can be used multiple times
178
+ # Default: scan all
179
+ #ExcludePath ^/proc/
180
+ #ExcludePath ^/sys/
181
+
182
+ # Maximum depth directories are scanned at.
183
+ # Default: 15
184
+ #MaxDirectoryRecursion 20
185
+
186
+ # Follow directory symlinks.
187
+ # Default: no
188
+ #FollowDirectorySymlinks yes
189
+
190
+ # Follow regular file symlinks.
191
+ # Default: no
192
+ #FollowFileSymlinks yes
193
+
194
+ # Scan files and directories on other filesystems.
195
+ # Default: yes
196
+ #CrossFilesystems yes
197
+
198
+ # Perform a database check.
199
+ # Default: 600 (10 min)
200
+ #SelfCheck 600
201
+
202
+ # Enable non-blocking (multi-threaded/concurrent) database reloads.
203
+ # This feature will temporarily load a second scanning engine while scanning
204
+ # continues using the first engine. Once loaded, the new engine takes over.
205
+ # The old engine is removed as soon as all scans using the old engine have
206
+ # completed.
207
+ # This feature requires more RAM, so this option is provided in case users are
208
+ # willing to block scans during reload in exchange for lower RAM requirements.
209
+ # Default: yes
210
+ #ConcurrentDatabaseReload no
211
+
212
+ # Execute a command when virus is found. In the command string %v will
213
+ # be replaced with the virus name and %f will be replaced with the file name.
214
+ # Additionally, two environment variables will be defined: $CLAM_VIRUSEVENT_FILENAME
215
+ # and $CLAM_VIRUSEVENT_VIRUSNAME.
216
+ # Default: no
217
+ #VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v in %f"
218
+
219
+ # Run as another user (clamd must be started by root for this option to work)
220
+ # Default: don't drop privileges
221
+ User clamav
222
+
223
+ # Stop daemon when libclamav reports out of memory condition.
224
+ #ExitOnOOM yes
225
+
226
+ # Don't fork into background.
227
+ # Default: no
228
+ #Foreground yes
229
+
230
+ # Enable debug messages in libclamav.
231
+ # Default: no
232
+ #Debug yes
233
+
234
+ # Do not remove temporary files (for debug purposes).
235
+ # Default: no
236
+ #LeaveTemporaryFiles yes
237
+
238
+ # Record metadata about the file being scanned.
239
+ # Scan metadata is useful for file analysis purposes and for debugging scan behavior.
240
+ # The JSON metadata will be printed after the scan is complete if Debug is enabled.
241
+ # A metadata.json file will be written to the scan temp directory if LeaveTemporaryFiles is enabled.
242
+ # Default: no
243
+ #GenerateMetadataJson yes
244
+
245
+ # Permit use of the ALLMATCHSCAN command. If set to no, clamd will reject
246
+ # any ALLMATCHSCAN command as invalid.
247
+ # Default: yes
248
+ #AllowAllMatchScan no
249
+
250
+ # Detect Possibly Unwanted Applications.
251
+ # Default: no
252
+ #DetectPUA yes
253
+
254
+ # Exclude a specific PUA category. This directive can be used multiple times.
255
+ # See https://github.com/vrtadmin/clamav-faq/blob/master/faq/faq-pua.md for
256
+ # the complete list of PUA categories.
257
+ # Default: Load all categories (if DetectPUA is activated)
258
+ #ExcludePUA NetTool
259
+ #ExcludePUA PWTool
260
+
261
+ # Only include a specific PUA category. This directive can be used multiple
262
+ # times.
263
+ # Default: Load all categories (if DetectPUA is activated)
264
+ #IncludePUA Spy
265
+ #IncludePUA Scanner
266
+ #IncludePUA RAT
267
+
268
+ # This option causes memory or nested map scans to dump the content to disk.
269
+ # If you turn on this option, more data is written to disk and is available
270
+ # when the LeaveTemporaryFiles option is enabled.
271
+ #ForceToDisk yes
272
+
273
+ # This option allows you to disable the caching feature of the engine. By
274
+ # default, the engine will store an MD5 in a cache of any files that are
275
+ # not flagged as virus or that hit limits checks. Disabling the cache will
276
+ # have a negative performance impact on large scans.
277
+ # Default: no
278
+ #DisableCache yes
279
+
280
+ # In some cases (eg. complex malware, exploits in graphic files, and others),
281
+ # ClamAV uses special algorithms to detect abnormal patterns and behaviors that
282
+ # may be malicious. This option enables alerting on such heuristically
283
+ # detected potential threats.
284
+ # Default: yes
285
+ #HeuristicAlerts yes
286
+
287
+ # Allow heuristic alerts to take precedence.
288
+ # When enabled, if a heuristic scan (such as phishingScan) detects
289
+ # a possible virus/phish it will stop scan immediately. Recommended, saves CPU
290
+ # scan-time.
291
+ # When disabled, virus/phish detected by heuristic scans will be reported only
292
+ # at the end of a scan. If an archive contains both a heuristically detected
293
+ # virus/phish, and a real malware, the real malware will be reported
294
+ #
295
+ # Keep this disabled if you intend to handle "Heuristics.*" viruses
296
+ # differently from "real" malware.
297
+ # If a non-heuristically-detected virus (signature-based) is found first,
298
+ # the scan is interrupted immediately, regardless of this config option.
299
+ #
300
+ # Default: no
301
+ #HeuristicScanPrecedence yes
302
+
303
+
304
+ ##
305
+ ## Heuristic Alerts
306
+ ##
307
+
308
+ # With this option clamav will try to detect broken executables (both PE and
309
+ # ELF) and alert on them with the Broken.Executable heuristic signature.
310
+ # Default: no
311
+ #AlertBrokenExecutables yes
312
+
313
+ # With this option clamav will try to detect broken media file (JPEG,
314
+ # TIFF, PNG, GIF) and alert on them with a Broken.Media heuristic signature.
315
+ # Default: no
316
+ #AlertBrokenMedia yes
317
+
318
+ # Alert on encrypted archives _and_ documents with heuristic signature
319
+ # (encrypted .zip, .7zip, .rar, .pdf).
320
+ # Default: no
321
+ #AlertEncrypted yes
322
+
323
+ # Alert on encrypted archives with heuristic signature (encrypted .zip, .7zip,
324
+ # .rar).
325
+ # Default: no
326
+ #AlertEncryptedArchive yes
327
+
328
+ # Alert on encrypted archives with heuristic signature (encrypted .pdf).
329
+ # Default: no
330
+ #AlertEncryptedDoc yes
331
+
332
+ # With this option enabled OLE2 files containing VBA macros, which were not
333
+ # detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
334
+ # Default: no
335
+ #AlertOLE2Macros yes
336
+
337
+ # Alert on SSL mismatches in URLs, even if the URL isn't in the database.
338
+ # This can lead to false positives.
339
+ # Default: no
340
+ #AlertPhishingSSLMismatch yes
341
+
342
+ # Alert on cloaked URLs, even if URL isn't in database.
343
+ # This can lead to false positives.
344
+ # Default: no
345
+ #AlertPhishingCloak yes
346
+
347
+ # Alert on raw DMG image files containing partition intersections
348
+ # Default: no
349
+ #AlertPartitionIntersection yes
350
+
351
+
352
+ ##
353
+ ## Executable files
354
+ ##
355
+
356
+ # PE stands for Portable Executable - it's an executable file format used
357
+ # in all 32 and 64-bit versions of Windows operating systems. This option
358
+ # allows ClamAV to perform a deeper analysis of executable files and it's also
359
+ # required for decompression of popular executable packers such as UPX, FSG,
360
+ # and Petite. If you turn off this option, the original files will still be
361
+ # scanned, but without additional processing.
362
+ # Default: yes
363
+ #ScanPE yes
364
+
365
+ # Certain PE files contain an authenticode signature. By default, we check
366
+ # the signature chain in the PE file against a database of trusted and
367
+ # revoked certificates if the file being scanned is marked as a virus.
368
+ # If any certificate in the chain validates against any trusted root, but
369
+ # does not match any revoked certificate, the file is marked as trusted.
370
+ # If the file does match a revoked certificate, the file is marked as virus.
371
+ # The following setting completely turns off authenticode verification.
372
+ # Default: no
373
+ #DisableCertCheck yes
374
+
375
+ # Executable and Linking Format is a standard format for UN*X executables.
376
+ # This option allows you to control the scanning of ELF files.
377
+ # If you turn off this option, the original files will still be scanned, but
378
+ # without additional processing.
379
+ # Default: yes
380
+ #ScanELF yes
381
+
382
+
383
+ ##
384
+ ## Documents
385
+ ##
386
+
387
+ # This option enables scanning of OLE2 files, such as Microsoft Office
388
+ # documents and .msi files.
389
+ # If you turn off this option, the original files will still be scanned, but
390
+ # without additional processing.
391
+ # Default: yes
392
+ #ScanOLE2 yes
393
+
394
+ # This option enables scanning within PDF files.
395
+ # If you turn off this option, the original files will still be scanned, but
396
+ # without decoding and additional processing.
397
+ # Default: yes
398
+ #ScanPDF yes
399
+
400
+ # This option enables scanning within SWF files.
401
+ # If you turn off this option, the original files will still be scanned, but
402
+ # without decoding and additional processing.
403
+ # Default: yes
404
+ #ScanSWF yes
405
+
406
+ # This option enables scanning xml-based document files supported by libclamav.
407
+ # If you turn off this option, the original files will still be scanned, but
408
+ # without additional processing.
409
+ # Default: yes
410
+ #ScanXMLDOCS yes
411
+
412
+ # This option enables scanning of HWP3 files.
413
+ # If you turn off this option, the original files will still be scanned, but
414
+ # without additional processing.
415
+ # Default: yes
416
+ #ScanHWP3 yes
417
+
418
+
419
+ ##
420
+ ## Mail files
421
+ ##
422
+
423
+ # Enable internal e-mail scanner.
424
+ # If you turn off this option, the original files will still be scanned, but
425
+ # without parsing individual messages/attachments.
426
+ # Default: yes
427
+ #ScanMail yes
428
+
429
+ # Scan RFC1341 messages split over many emails.
430
+ # You will need to periodically clean up $TemporaryDirectory/clamav-partial
431
+ # directory.
432
+ # WARNING: This option may open your system to a DoS attack.
433
+ # Never use it on loaded servers.
434
+ # Default: no
435
+ #ScanPartialMessages yes
436
+
437
+ # With this option enabled ClamAV will try to detect phishing attempts by using
438
+ # HTML.Phishing and Email.Phishing NDB signatures.
439
+ # Default: yes
440
+ #PhishingSignatures no
441
+
442
+ # With this option enabled ClamAV will try to detect phishing attempts by
443
+ # analyzing URLs found in emails using WDB and PDB signature databases.
444
+ # Default: yes
445
+ #PhishingScanURLs no
446
+
447
+
448
+ ##
449
+ ## Data Loss Prevention (DLP)
450
+ ##
451
+
452
+ # Enable the DLP module
453
+ # Default: No
454
+ #StructuredDataDetection yes
455
+
456
+ # This option sets the lowest number of Credit Card numbers found in a file
457
+ # to generate a detect.
458
+ # Default: 3
459
+ #StructuredMinCreditCardCount 5
460
+
461
+ # With this option enabled the DLP module will search for valid Credit Card
462
+ # numbers only. Debit and Private Label cards will not be searched.
463
+ # Default: no
464
+ #StructuredCCOnly yes
465
+
466
+ # This option sets the lowest number of Social Security Numbers found
467
+ # in a file to generate a detect.
468
+ # Default: 3
469
+ #StructuredMinSSNCount 5
470
+
471
+ # With this option enabled the DLP module will search for valid
472
+ # SSNs formatted as xxx-yy-zzzz
473
+ # Default: yes
474
+ #StructuredSSNFormatNormal yes
475
+
476
+ # With this option enabled the DLP module will search for valid
477
+ # SSNs formatted as xxxyyzzzz
478
+ # Default: no
479
+ #StructuredSSNFormatStripped yes
480
+
481
+
482
+ ##
483
+ ## HTML
484
+ ##
485
+
486
+ # Perform HTML normalisation and decryption of MS Script Encoder code.
487
+ # Default: yes
488
+ # If you turn off this option, the original files will still be scanned, but
489
+ # without additional processing.
490
+ #ScanHTML yes
491
+
492
+
493
+ ##
494
+ ## Archives
495
+ ##
496
+
497
+ # ClamAV can scan within archives and compressed files.
498
+ # If you turn off this option, the original files will still be scanned, but
499
+ # without unpacking and additional processing.
500
+ # Default: yes
501
+ #ScanArchive yes
502
+
503
+
504
+ ##
505
+ ## Limits
506
+ ##
507
+
508
+ # The options below protect your system against Denial of Service attacks
509
+ # using archive bombs.
510
+
511
+ # This option sets the maximum amount of time to a scan may take.
512
+ # In this version, this field only affects the scan time of ZIP archives.
513
+ # Value of 0 disables the limit.
514
+ # Note: disabling this limit or setting it too high may result allow scanning
515
+ # of certain files to lock up the scanning process/threads resulting in a
516
+ # Denial of Service.
517
+ # Time is in milliseconds.
518
+ # Default: 120000
519
+ #MaxScanTime 300000
520
+
521
+ # This option sets the maximum amount of data to be scanned for each input
522
+ # file. Archives and other containers are recursively extracted and scanned
523
+ # up to this value.
524
+ # Value of 0 disables the limit
525
+ # Note: disabling this limit or setting it too high may result in severe damage
526
+ # to the system.
527
+ # Default: 400M
528
+ #MaxScanSize 1000M
529
+
530
+ # Files larger than this limit won't be scanned. Affects the input file itself
531
+ # as well as files contained inside it (when the input file is an archive, a
532
+ # document or some other kind of container).
533
+ # Value of 0 disables the limit.
534
+ # Note: disabling this limit or setting it too high may result in severe damage
535
+ # to the system.
536
+ # Technical design limitations prevent ClamAV from scanning files greater than
537
+ # 2 GB at this time.
538
+ # Default: 100M
539
+ #MaxFileSize 400M
540
+
541
+ # Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
542
+ # file, all files within it will also be scanned. This options specifies how
543
+ # deeply the process should be continued.
544
+ # Note: setting this limit too high may result in severe damage to the system.
545
+ # Default: 17
546
+ #MaxRecursion 10
547
+
548
+ # Number of files to be scanned within an archive, a document, or any other
549
+ # container file.
550
+ # Value of 0 disables the limit.
551
+ # Note: disabling this limit or setting it too high may result in severe damage
552
+ # to the system.
553
+ # Default: 10000
554
+ #MaxFiles 15000
555
+
556
+ # Maximum size of a file to check for embedded PE. Files larger than this value
557
+ # will skip the additional analysis step.
558
+ # Note: disabling this limit or setting it too high may result in severe damage
559
+ # to the system.
560
+ # Default: 40M
561
+ #MaxEmbeddedPE 100M
562
+
563
+ # Maximum size of a HTML file to normalize. HTML files larger than this value
564
+ # will not be normalized or scanned.
565
+ # Note: disabling this limit or setting it too high may result in severe damage
566
+ # to the system.
567
+ # Default: 40M
568
+ #MaxHTMLNormalize 100M
569
+
570
+ # Maximum size of a normalized HTML file to scan. HTML files larger than this
571
+ # value after normalization will not be scanned.
572
+ # Note: disabling this limit or setting it too high may result in severe damage
573
+ # to the system.
574
+ # Default: 8M
575
+ #MaxHTMLNoTags 16M
576
+
577
+ # Maximum size of a script file to normalize. Script content larger than this
578
+ # value will not be normalized or scanned.
579
+ # Note: disabling this limit or setting it too high may result in severe damage
580
+ # to the system.
581
+ # Default: 20M
582
+ #MaxScriptNormalize 50M
583
+
584
+ # Maximum size of a ZIP file to reanalyze type recognition. ZIP files larger
585
+ # than this value will skip the step to potentially reanalyze as PE.
586
+ # Note: disabling this limit or setting it too high may result in severe damage
587
+ # to the system.
588
+ # Default: 1M
589
+ #MaxZipTypeRcg 1M
590
+
591
+ # This option sets the maximum number of partitions of a raw disk image to be
592
+ # scanned.
593
+ # Raw disk images with more partitions than this value will have up to
594
+ # the value number partitions scanned. Negative values are not allowed.
595
+ # Note: setting this limit too high may result in severe damage or impact
596
+ # performance.
597
+ # Default: 50
598
+ #MaxPartitions 128
599
+
600
+ # This option sets the maximum number of icons within a PE to be scanned.
601
+ # PE files with more icons than this value will have up to the value number
602
+ # icons scanned.
603
+ # Negative values are not allowed.
604
+ # WARNING: setting this limit too high may result in severe damage or impact
605
+ # performance.
606
+ # Default: 100
607
+ #MaxIconsPE 200
608
+
609
+ # This option sets the maximum recursive calls for HWP3 parsing during
610
+ # scanning. HWP3 files using more than this limit will be terminated and
611
+ # alert the user.
612
+ # Scans will be unable to scan any HWP3 attachments if the recursive limit
613
+ # is reached.
614
+ # Negative values are not allowed.
615
+ # WARNING: setting this limit too high may result in severe damage or impact
616
+ # performance.
617
+ # Default: 16
618
+ #MaxRecHWP3 16
619
+
620
+ # This option sets the maximum calls to the PCRE match function during
621
+ # an instance of regex matching.
622
+ # Instances using more than this limit will be terminated and alert the user
623
+ # but the scan will continue.
624
+ # For more information on match_limit, see the PCRE documentation.
625
+ # Negative values are not allowed.
626
+ # WARNING: setting this limit too high may severely impact performance.
627
+ # Default: 100000
628
+ #PCREMatchLimit 20000
629
+
630
+ # This option sets the maximum recursive calls to the PCRE match function
631
+ # during an instance of regex matching.
632
+ # Instances using more than this limit will be terminated and alert the user
633
+ # but the scan will continue.
634
+ # For more information on match_limit_recursion, see the PCRE documentation.
635
+ # Negative values are not allowed and values > PCREMatchLimit are superfluous.
636
+ # WARNING: setting this limit too high may severely impact performance.
637
+ # Default: 2000
638
+ #PCRERecMatchLimit 10000
639
+
640
+ # This option sets the maximum filesize for which PCRE subsigs will be
641
+ # executed. Files exceeding this limit will not have PCRE subsigs executed
642
+ # unless a subsig is encompassed to a smaller buffer.
643
+ # Negative values are not allowed.
644
+ # Setting this value to zero disables the limit.
645
+ # WARNING: setting this limit too high or disabling it may severely impact
646
+ # performance.
647
+ # Default: 100M
648
+ #PCREMaxFileSize 400M
649
+
650
+ # When AlertExceedsMax is set, files exceeding the MaxFileSize, MaxScanSize, or
651
+ # MaxRecursion limit will be flagged with the virus name starting with
652
+ # "Heuristics.Limits.Exceeded".
653
+ # Default: no
654
+ #AlertExceedsMax yes
655
+
656
+ ##
657
+ ## On-access Scan Settings
658
+ ##
659
+
660
+ # Don't scan files larger than OnAccessMaxFileSize
661
+ # Value of 0 disables the limit.
662
+ # Default: 5M
663
+ #OnAccessMaxFileSize 10M
664
+
665
+ # Max number of scanning threads to allocate to the OnAccess thread pool at
666
+ # startup. These threads are the ones responsible for creating a connection
667
+ # with the daemon and kicking off scanning after an event has been processed.
668
+ # To prevent clamonacc from consuming all clamd's resources keep this lower
669
+ # than clamd's max threads.
670
+ # Default: 5
671
+ #OnAccessMaxThreads 10
672
+
673
+ # Max amount of time (in milliseconds) that the OnAccess client should spend
674
+ # for every connect, send, and recieve attempt when communicating with clamd
675
+ # via curl.
676
+ # Default: 5000 (5 seconds)
677
+ # OnAccessCurlTimeout 10000
678
+
679
+ # Toggles dynamic directory determination. Allows for recursively watching
680
+ # include paths.
681
+ # Default: no
682
+ #OnAccessDisableDDD yes
683
+
684
+ # Set the include paths (all files inside them will be scanned). You can have
685
+ # multiple OnAccessIncludePath directives but each directory must be added
686
+ # in a separate line.
687
+ # Default: disabled
688
+ #OnAccessIncludePath /home
689
+ #OnAccessIncludePath /students
690
+
691
+ # Set the exclude paths. All subdirectories are also excluded.
692
+ # Default: disabled
693
+ #OnAccessExcludePath /home/user
694
+
695
+ # Modifies fanotify blocking behaviour when handling permission events.
696
+ # If off, fanotify will only notify if the file scanned is a virus,
697
+ # and not perform any blocking.
698
+ # Default: no
699
+ #OnAccessPrevention yes
700
+
701
+ # When using prevention, if this option is turned on, any errors that occur
702
+ # during scanning will result in the event attempt being denied. This could
703
+ # potentially lead to unwanted system behaviour with certain configurations,
704
+ # so the client defaults this to off and prefers allowing access events in
705
+ # case of scan or connection error.
706
+ # Default: no
707
+ #OnAccessDenyOnError yes
708
+
709
+ # Toggles extra scanning and notifications when a file or directory is
710
+ # created or moved.
711
+ # Requires the DDD system to kick-off extra scans.
712
+ # Default: no
713
+ #OnAccessExtraScanning yes
714
+
715
+ # Set the mount point to be scanned. The mount point specified, or the mount
716
+ # point containing the specified directory will be watched. If any directories
717
+ # are specified, this option will preempt (disable and ignore all options
718
+ # related to) the DDD system. This option will result in verdicts only.
719
+ # Note that prevention is explicitly disallowed to prevent common, fatal
720
+ # misconfigurations. (e.g. watching "/" with prevention on and no exclusions
721
+ # made on vital system directories)
722
+ # It can be used multiple times.
723
+ # Default: disabled
724
+ #OnAccessMountPath /
725
+ #OnAccessMountPath /home/user
726
+
727
+ # With this option you can exclude the root UID (0). Processes run under
728
+ # root with be able to access all files without triggering scans or
729
+ # permission denied events.
730
+ # Note that if clamd cannot check the uid of the process that generated an
731
+ # on-access scan event (e.g., because OnAccessPrevention was not enabled, and
732
+ # the process already exited), clamd will perform a scan. Thus, setting
733
+ # OnAccessExcludeRootUID is not *guaranteed* to prevent every access by the
734
+ # root user from triggering a scan (unless OnAccessPrevention is enabled).
735
+ # Default: no
736
+ #OnAccessExcludeRootUID no
737
+
738
+ # With this option you can exclude specific UIDs. Processes with these UIDs
739
+ # will be able to access all files without triggering scans or permission
740
+ # denied events.
741
+ # This option can be used multiple times (one per line).
742
+ # Using a value of 0 on any line will disable this option entirely.
743
+ # To exclude the root UID (0) please enable the OnAccessExcludeRootUID
744
+ # option.
745
+ # Also note that if clamd cannot check the uid of the process that generated an
746
+ # on-access scan event (e.g., because OnAccessPrevention was not enabled, and
747
+ # the process already exited), clamd will perform a scan. Thus, setting
748
+ # OnAccessExcludeUID is not *guaranteed* to prevent every access by the
749
+ # specified uid from triggering a scan (unless OnAccessPrevention is enabled).
750
+ # Default: disabled
751
+ #OnAccessExcludeUID -1
752
+
753
+ # This option allows exclusions via user names when using the on-access
754
+ # scanning client. It can be used multiple times.
755
+ # It has the same potential race condition limitations of the
756
+ # OnAccessExcludeUID option.
757
+ # Default: disabled
758
+ #OnAccessExcludeUname clamav
759
+
760
+ # Number of times the OnAccess client will retry a failed scan due to
761
+ # connection problems (or other issues).
762
+ # Default: 0
763
+ #OnAccessRetryAttempts 3
764
+
765
+ ##
766
+ ## Bytecode
767
+ ##
768
+
769
+ # With this option enabled ClamAV will load bytecode from the database.
770
+ # It is highly recommended you keep this option on, otherwise you'll miss
771
+ # detections for many new viruses.
772
+ # Default: yes
773
+ #Bytecode yes
774
+
775
+ # Set bytecode security level.
776
+ # Possible values:
777
+ # None - No security at all, meant for debugging.
778
+ # DO NOT USE THIS ON PRODUCTION SYSTEMS.
779
+ # This value is only available if clamav was built
780
+ # with --enable-debug!
781
+ # TrustSigned - Trust bytecode loaded from signed .c[lv]d files, insert
782
+ # runtime safety checks for bytecode loaded from other sources.
783
+ # Paranoid - Don't trust any bytecode, insert runtime checks for all.
784
+ # Recommended: TrustSigned, because bytecode in .cvd files already has these
785
+ # checks.
786
+ # Note that by default only signed bytecode is loaded, currently you can only
787
+ # load unsigned bytecode in --enable-debug mode.
788
+ #
789
+ # Default: TrustSigned
790
+ #BytecodeSecurity TrustSigned
791
+
792
+ # Allow loading bytecode from outside digitally signed .c[lv]d files.
793
+ # **Caution**: You should NEVER run bytecode signatures from untrusted sources.
794
+ # Doing so may result in arbitrary code execution.
795
+ # Default: no
796
+ #BytecodeUnsigned yes
797
+
798
+ # Set bytecode timeout in milliseconds.
799
+ #
800
+ # Default: 10000
801
+ # BytecodeTimeout 1000