Integration with External Applications

Top  Previous  Next

The interface—that emulates the one of the clamd anti-virus daemon (included in ClamAV)—allows Dr.Web ClamD to communicate with any external application that is capable of connecting to this anti-virus daemon.

The table below shows examples of applications that can use clamd for anti-virus scans:

Product

Integration

HTTP services

HTTP proxy server
Squid

Use of clamd:

Scanning of files received from the Internet.

Integration requirements:

Using squidclamav or HAVP as an intermediate component.

Links to documentation:

Squid documentation: http://www.squid-cache.org/Doc/

Description and source code files of squidclamav: http://squidclamav.darold.net/

HTTP proxy server which can perform anti-virus scans
HAVP

Use of clamd:

Scanning of files received from the Internet.

Integration requirements:

Configuring HAVP to use clamd for anti-virus scanning configuration:

ENABLECLAMD true
CLAMDSOCKET <path_to_clamd_UNIX_socket>

or (if TCP connection is used instead of a UNIX socket):

ENABLECLAMD true
CLAMDSERVER <IP>
CLAMDPORT <port>

where <path_to_clamd_UNIX_socket> or the <IP>:<port> pair corresponds to the socket of a connection point (endpoint) configured in Dr.Web ClamD.

Links to documentation:

HAVP documentation: http://www.server-side.de/documentation.htm

In the settings of the external software component that communicates directly with Dr.Web ClamD as with the clamd anti-virus daemon, specify an address for connecting to clamd as a path to a UNIX socket or as a TCP socket listened to by Dr.Web ClamD at one of its connection points (endpoint) set up in its configuration.

Example of how to connect HAVP to Dr.Web ClamD:

1.Configuring Dr.Web ClamD:

[ClamD]
Start = yes

[ClamD.Endpoint.proxy]
ClamdSocket = /var/run/drweb.clamd

2.Configuring HAVP:

ENABLECLAMD true
CLAMDSOCKET /var/run/drweb.clamd

Settings that configure connections to any other anti-virus products ( ENABLE* parameters) must be set to false.