👾 Antivirus app for Nextcloud Files
Перейти к файлу
Nextcloud bot 2c16990944
Fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2024-08-24 00:42:51 +00:00
.github ci: Add resuse check 2024-07-05 11:29:01 +02:00
.tx
LICENSES ci: Add resuse check 2024-07-05 11:29:01 +02:00
appinfo Merge pull request #356 from nextcloud/chore/noid/spdx 2024-07-26 17:17:06 +02:00
css chore: Add SPDX header 2024-07-05 11:24:04 +02:00
img chore: Add SPDX header 2024-07-05 11:24:04 +02:00
js chore: Add SPDX header 2024-07-05 11:24:04 +02:00
l10n Fix(l10n): Update translations from Transifex 2024-08-24 00:42:51 +00:00
lib moves the stream check 2024-08-02 07:29:29 +00:00
screenshots chore: Add SPDX header 2024-07-05 11:24:04 +02:00
templates chore: Add SPDX header 2024-07-05 11:24:04 +02:00
tests test: update stubs 2024-08-12 19:54:33 +02:00
.gitignore chore: Add SPDX header 2024-07-05 11:24:04 +02:00
.nextcloudignore chore: Add SPDX header 2024-07-05 11:24:04 +02:00
.php-cs-fixer.dist.php chore: Add SPDX header 2024-07-05 11:24:04 +02:00
.scrutinizer.yml chore: Add SPDX header 2024-07-05 11:24:04 +02:00
AUTHORS.md chore: Add SPDX header 2024-07-05 11:24:04 +02:00
CHANGELOG.md chore: Add SPDX header 2024-07-05 11:24:04 +02:00
LICENSE
README.md docs: Add reuse compliance status badge 2024-07-05 11:37:28 +02:00
REUSE.toml chore: Add SPDX header 2024-07-05 11:24:04 +02:00
composer.json
composer.lock
krankerl.toml chore: Add SPDX header 2024-07-05 11:24:04 +02:00
psalm.xml chore: Add SPDX header 2024-07-05 11:24:04 +02:00

README.md

Nextcloud Antivirus for Files

REUSE status Build Status Scrutinizer Code Quality Code Coverage

files_antivirus is an antivirus app for Nextcloud using ClamAV or Kaspersky.

Features

  • 🐿️ When the user uploads a file, it's checked
  • ☣️ Infected files will be deleted and a notification will be shown and/or sent via email
  • 🔎 It runs a background job to scan all files
  • 🦺 It will block all uploads if the file cannot be checked to ensure all files are getting scanned.

Requirements

One of

  • ClamAV as binaries on the Nextcloud server
  • ClamAV running in daemon mode
  • Kaspersky Scan Engine running in HTTP mode
  • Any virus scanner supporting ICAP (ClamAV and Kaspersky are tested, others should work)

Install

Documentation about installing ClamAV and this app can be found in our documentation.

ClamAV Details

This app can be configured to work with the executable or the daemon mode (recommended ❤️) of ClamAV. If this is used in daemon mode, it can connect through network or local file-socket. In daemon mode, it sends files to a remote/local server using the INSTREAM command.

Kaspersky HTTP Details

When running Kaspersky in HTTP mode the SessionTimeout will need to be set to a value higher than default, a value of 10 minutes (600000 millisecond) or higher is recommended to properly deal with larger uploads

ICAP (version 5.0 and later)

The app support the ICAP protocol which is a standard supported by various antivirus software products.

Some additional configuration is required depending on the antivirus software used:

  • ICAP service: The name of the service the antivirus software expects
  • ICAP virus response header: The name of the header the antivirus software send the details of the detected virus in

ClamAV ICAP

  • ICAP service: avscan
  • ICAP virus response header: X-Infection-Found

Kaspersky ICAP

  • ICAP service: req
  • ICAP virus response header: X-Virus-ID

Additionally, the Kaspersky scan engine needs some additional configuration:

TLS Encryption

Using TLS encryption for the ICAP connection is supported, this requires the ICAP server to use a valid certificate. If the certificate isn't signed by a trusted certificate authority, you can import the certificate into Nextcloud's certificate bundle using

occ security:certificates:import /path/to/certificate