The community-maintained documentation platform of IPFire

User Tools

Site Tools



ClamAV (Clam AntiVirus) is GNU free software. It is signature-based virus scanner and a phishing-filter.

In IPFire ClamAV is automatically configured, but to make advanced configuration changes files need to be manually edited using the console or an SSH session.


Use PakFire (or the Console) to install both the “clamav” and “squidclamav” packages.


After the installation clamav activates itself automatically, which can be verified under status -> Services.

ClamAV is now installed, so activate the “squidclamav” in the proxy settings. If “squidclamav” does not show up here, verifiy that you installed both packages.


Important: ClamAV requires more Squid proxy filter processes (when enabled it increases the number of Squid proxy processes by 10). This in turn leads to a more memory being used. If your IPFire box has a small amount of memory (< 512MB) you should seek advice in IPFire chat.


Testing and Optimisation

To test the security of your ClamAV installation, download the standard Anti-Malware test file from the EICAR organisation using HTTP (not HTTPS!). This is not an actual virus and should do no damage to your system.

If working correctly, ClamAV should automatically prevent you from downloading the file and show the following message:

Manual virus signature update

You can manually update your virus signatures with the following command over the Console:

/usr/bin/freshclam --quiet 

Fix for streaming media (flash)

If have problems with streaming media, like Youtube, you can stop Adobe Flash applications and videos from being scanned.

1. Add the following line should be added to your /etc/squidclamav.conf.

abortcontenti ^.*application\/x-shockwave-flash.*$

It must be added before the line containing:

content ^.*application\/.*$

2. Restart the proxy so that ClamAV is restarted and re-reads its configuration.

Translations of this page?:
en/addons/clamav/start.txt · Last modified: 2014/08/09 09:23 by dnl