Skip to content

Dockerfile for building an ICAP enabled antivirus server based on c-icap, clamav and Apline Linux.

Notifications You must be signed in to change notification settings

nkapashi/c_icapClamav

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Dockerfile for building an image of ICAP enabled Antivirus server that is based on c-icap, clamav and Alpine Linux.

As this is for testing, researching and demonstration purposes only, the clamav antivirus database does not contain any valid virus signatures, thus it will not detect any viruses. Again for the same purpose one may want to simulate a file being blocked by the antivirus engine. For that a custom antivirus signature is added that will recognize a particular and well known good file as a virus. That file is putty.exe. So if you want to test/demonstrate a file blocked by ICAP just transfer your putty.exe to the server.

Freshclam is also available to download actual antivirus definition files in case they are needed.

Build Instructions

docker build -t {imageName} .

Example: docker build -t icap .

Note: the '.' specifies the path to the Dockerfile. Docker and the container will need to have access to the Internet in order to download the needed packages.

The Dockerfile does most of the commands in a single run so the number of image layers is kept to a minimum.

Usage

Start the container:

docker run --name icap -it icap

Note: depending on your Docker setup you may need to forward port 1344.

Example:

docker run -p my_Ip_address:1344 --name icap -it icap

After all services are started the container will give a shell access. All scan activity is under the /var/log/c-icap/access.log.

About

Dockerfile for building an ICAP enabled antivirus server based on c-icap, clamav and Apline Linux.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published