/etc/dansguardian/contentscanners/commandlinescan.conf is in dansguardian 2.10.1.1-5.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 | plugname = 'commandlinescan'
# Standard lists of file types & websites not to scan
exceptionvirusmimetypelist = '/etc/dansguardian/lists/contentscanners/exceptionvirusmimetypelist'
exceptionvirusextensionlist = '/etc/dansguardian/lists/contentscanners/exceptionvirusextensionlist'
exceptionvirussitelist = '/etc/dansguardian/lists/contentscanners/exceptionvirussitelist'
exceptionvirusurllist = '/etc/dansguardian/lists/contentscanners/exceptionvirusurllist'
# Program to run & initial arguments - filename for scanning will be appended
#progname = /path/to/scanner
# At least one of the following three options must be defined!
# They are checked in the following order, with the first match determining
# the scan result:
# virusregexp - regular expression for extracting virus names from
# the scanner's output
# cleancodes - program return code(s), as a comma-separated list, for
# uninfected files
# infectedcodes - program return code(s), as a comma-separated list, for
# infected files
#virusregexp = (someregexp)
# Which submatch of the above contains the virus name? (0 = all matched text)
#submatch = 1
# cleancodes = 0
# infectedcodes = 1,2,3
# Default result when none of the other options triggers a match
# Valid values are "infected" and "clean"
#defaultresult = infected
#
# Example configuration for clamdscan
#
## Path to binary
#progname = '/usr/bin/clamdscan'
## Program returns 0 for clean files (for an easy out)
#cleancodes = 0
## Regular expression for virus names
#virusregexp = : ([ -/a-zA-Z0-9\.]+) FOUND
#submatch = 1
## Default scan result when the above don't match
#defaultresult = infected
|