From ArchWiki
Revision as of 01:51, 8 September 2011 by Thestinger (talk | contribs) (cat)
Jump to: navigation, search

This template has only maintenance purposes. For linking to local translations please use interlanguage links, see Help:i18n#Interlanguage links.

Local languages: Català – Dansk – English – Español – Esperanto – Hrvatski – Indonesia – Italiano – Lietuviškai – Magyar – Nederlands – Norsk Bokmål – Polski – Português – Slovenský – Česky – Ελληνικά – Български – Русский – Српски – Українська – עברית – العربية – ไทย – 日本語 – 正體中文 – 简体中文 – 한국어

External languages (all articles in these languages should be moved to the external wiki): Deutsch – Français – Română – Suomi – Svenska – Tiếng Việt – Türkçe – فارسی

Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates. Because ClamAV's main use is on file/mail servers for Windows desktops it primarily detects Windows viruses and malware.


Install with pacman by:

# pacman -S clamav


Whether you are going to use clamav as a daemon or use it as a simple file checker you need to comment out the line that contains the word Example, usually it is found at the beginning of Template:Filename and Template:Filename files.

Start the daemon

If you want to use the daemon, you can start it with:

# /etc/rc.d/clamav start

To start it automatically at boot you should edit the daemons array in Template:Filename:

DAEMONS=(... clamav ...)

Update Database

Update the virus definitions with:

# freshclam

The database files are saved in:


Server setup

To run as a server edit Template:Filename and Template:Filename and comment out the Example flag. In Template:Filename change the start options from "no" to "yes".

# change these to "yes" to start

Scan for Viruses

Template:Codeline can be used to scan certain files, home directory, or an entire system:

$ clamscan myfile
$ clamscan -r -i /home
$ clamscan -r -i --exclude-dir=^/sys\|^/proc\|^/dev /

If you would like Template:Codeline to remove the infected file use the Template:Codeline option in the command.


If you get the following messages after running freshclam:

WARNING: Clamd was NOT notified: Cannot connect to clamd through 
/var/lib/clamav/clamd.sock connect(): No such file or directory

Add a sock file for clamav:

# touch /var/lib/clamav/clamd.sock
# chown clamav:clamav /var/lib/clamav/clamd.sock

Then, edit /etc/clamav/clamd.conf

Uncomment this line: #LocalSocket /var/lib/clamav/clamd.sock

Save the file and restart the daemon (/etc/rc.d/clamav stop; /etc/rc.d/clamav start)

If you get the next error when starting the daemon:

LibClamAV Error: cli_loaddb(): No supported database files found
in /var/lib/clamav ERROR: Not supported data format

Run freshclam as root:

# freshclam -v

If you get a:

# can't create temporary directory

error, along with a 'HINT' containing a UID and a GID number.

Do the following:

# chown UID:GID /var/lib/clamav & chmod 755 /var/lib/clamav 
# ex: chown 64:64