[clamav-users] Fwd: Fwd: freshclam incremental update

G.W. Haywood clamav at jubileegroup.co.uk
Tue Sep 3 10:20:58 UTC 2019


Hi there,

On Tue, 3 Sep 2019, Birger Birger via clamav-users wrote:

> Sep  3 10:43:22 zentyal kernel: [266193.080510] zentyal-firewall drop IN= OUT=eth0 SRC=192.168.1.30 DST=104.16.218.84 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=52480 DF PROTO=TCP SPT=51666 DPT=80 WINDOW=9057 RES=0x00 ACK FIN URGP=0 MARK=0x1

That's a Cloudflare destination IP.  You see it in your freshclam log.
Cloudflare delivers the ClamAV data and you're dropping packets sent
to it from 192.168.1.30.  I guess that's your immediate problem.

Another question about "Ubuntu Syslog".

> Sep  3 10:41:17 zentyal kernel: [266068.432972] zentyal-firewall drop IN=eth0 OUT= MAC=00:0c:29:be:5d:f2:00:1d:aa:69:86:78:08:00 SRC=112.85.42.229 DST=192.168.1.30 LEN=67 TOS=0x00 PREC=0x00 TTL=46 ID=58277 DF PROTO=TCP SPT=14305 DPT=22 WINDOW=229 RES=0x00 ACK PSH UR$

The IP address 112.85.42.229 appears to be in Shanghai, and it appears
that it's trying to make SSH connections to 192.168.1.30.  If that were
my router, I would not let these attempts through it.

I repeat that I sugggest you upgrade ClamAV to the latest version.

-- 

73,
Ged.



More information about the clamav-users mailing list