====== Ubuntu - Anti Virus - Install ClamAV ====== **clamav** is an anti-virus application. The clamav-daemon package creates a 'clamav' user; in order to allow ClamAV to scan system files, such as your mail spool, you can add clamav to the group that owns the files. ---- ===== Install ClamAV ===== First, update the package repository: sudo apt update Now install the clamav scanner, the daemon and the database updater. sudo apt install clamav clamav-daemon clamav-freshclam **NOTE:** You can also install the **clamav-data** package, but the clamav-freshclam package is another (easier) way to update your virus definitions. On RHEL, CentOS or Scientific Linux, you only need to install the clamav package: yum install clamav ---- ===== Update the database ===== The below two commands will restart the freshclam daemon (which auto updates the database) and then does a manual update of the definitions. sudo /etc/init.d/clamav-freshclam restart sudo /usr/bin/freshclam ---- ===== Scan for a virus ===== clamscan -r -i /home/peter where * **-r** - Scan directories recursively. * **-i** - Show only infected files. * **/home/peter** - Directory of scanning. ---- ===== The daily scan ===== The below cronjob will run a virus database definition update (so that the scan always has the most recent definitions) and afterwards run a full scan which will only report when there are infected files on the system. It also does not remove the infected files automatically, you have to do this manually. This way you make sure that it does not delete **/bin/bash** by accident. ## This should be a root cronjob. 30 01 * * * /usr/bin/freshclam --quiet; /usr/bin/clamscan --recursive --no-summary --infected / 2>/dev/null **NOTE:** The **2>/dev/null** options keeps the **/proc** and such access denied errors out of the report. The infected files however are still found and reported. Also make sure that your cron is configured so that it mails you the output of the cronjobs. The manual page will help you with that. This is how a sample email looks if you have an infection: /tmp/eicar.zip: Eicar-Test-Signature FOUND /tmp/eicar.com: Eicar-Test-Signature FOUND ---- ===== Extra: the targeted scan ===== The below cronjob is an example and you should adapt it as required. * It updates the virus definitions and scans the folder /var/www/sites/uploader.com/public-html/uploads/ two times per hour, and if it found any files it removes them. ## This should be a root cronjob. */29 * * * * /usr/bin/freshclam --quiet; /usr/bin/clamscan --recursive --no-summary --infected --remove /var/www/sites/uploader.com/public-html/uploads 2>/dev/null This is how a sample email might look like: /var/www/sites/uploader.com/public-html/uploads/eicar.zip: Eicar-Test-Signature FOUND /var/www/sites/uploader.com/public-html/uploads/eicar.zip: Removed. /var/www/sites/uploader.com/public-html/uploads/eicar.com: Eicar-Test-Signature FOUND /var/www/sites/uploader.com/public-html/uploads/eicar.com: Removed. ---- ===== Possible finds ===== The scan can detect these "viruses": * PUA.Script.Packed-1 FOUND * PUA.Script.Packed-2 FOUND In fact, this is not a virus. * PUA - Possibly Unwanted Applications. * Script.Packed - The script is packed (archived). To disable detection of PUA use an additional parameter: --detect-pua=no And to enable detection of PUA: --detect-pua=yes Example: sudo clamscan -r -i --detect-pua=yes / ---- ===== Possible errors ===== ==== ERROR 1 ==== When you update the virus signature database, it can return this error message: freshclam returns: ERROR: Can't open /var/log/clamav/freshclam.log in append mode (check permissions!). ERROR: Problem with internal logger (UpdateLogFile = /var/log/clamav/freshclam.log). This is because the user was running freshclam without certain rights. This is solved by running freshclam with sudo: sudo freshclam ---- ==== ERROR 2 ==== Scanning can return this error message: LibClamAV Warning: fmap_readpage: pread fail: asked for 4085 bytes @ offset 11, got 0 LibClamAV Warning: fmap_readpage: pread fail: asked for 4091 bytes @ offset 5, got 0 LibClamAV Warning: fmap_readpage: pread fail: asked for 4094 bytes @ offset 2, got 0 LibClamAV Error: fmap_readpage: pread error: Input/output error For this to not happen, you must to exclude from scanning several directories, like so: sudo clamscan -ir --exclude-dir=^/sys --exclude-dir=^/dev --exclude-dir=^/proc /