On 2013/04/08 22:51, Stuart Henderson wrote:
> These ports provide a framework to provide ICAP services, and modules
> using this framework to provide virus scanning (via libclamav) and
> url filtering.
> 
> ICAP is a standard protocol used by web proxies (including squid 3)
> and content inspection software.
> 
> (There will be an additional squidclamav port, using clamd rather than
> libclamav, to follow once I've worked out how to get it working ;)
> 
> OK to import?

btw: here's an example of how you can test it using the clamav test
file [http://junkpile.org/clam.exe]

$ c-icap-client -s 'antivirus_module' -d 10 -v -f /tmp/clam.exe
OK done with options!
ICAP server:localhost, ip:127.0.0.1, port:1344

Preview:1024 keepalive:1,allow204:0
OK allocating request going to send request
Allocate a new entity of type 1
Allocate a new entity of type 3
Preview response was with status: 200 
Get entity from trash....
Get entity from trash....
OK reading headers, going to read body
<html>
 <head>
   <title>VIRUS FOUND</title>
</head>

<body>
<h1>VIRUS FOUND</h1>


You tried to upload/download a file that contains the virus: 
   <b> ClamAV-Test-File </b>
<br>
The Http location is: 
<b>  - </b>

<p>
  For more information contact your system administrator

<hr>
<p>
This message generated by C-ICAP service: <b> antivirus_module </b>
<br>Clamav antivirus engine: <b> 0977/16978 </b>

</p>

</body>
</html>

ICAP HEADERS:
        ICAP/1.0 200 OK:
        Server:C-ICAP/0.2.5
        Connection:keep-alive
        ISTag:CI0001-000-0977-6816978
        X-Infection-Found:Type=0; Resolution=2; Threat=ClamAV-Test-File;
        Encapsulated:res-hdr=0, res-body=184

RESPMOD HEADERS:
        HTTP/1.0 403 Forbidden:
        Server:C-ICAP
        Connection:close
        Content-Type:text/html
        Content-Language:en
        Via:ICAP/1.0 wc2-pl7.xxxx (C-ICAP/0.2.5 Clamav/Antivirus service )

Done

Reply via email to