>[оверквотинг удален]
> Шас новые появились, снес и заного поставил clamav.
> postfix/smtp[9678]: fatal: valid hostname or network address required in server description:
> 10023
> postfix/qmgr[9542]: warning: private/clamsmtpd socket: malformed response
> postfix/qmgr[9542]: warning: transport clamsmtpd failure -- see a previous warning/fatal
> /panic logfile record for the problem descript$
> postfix/master[9539]: warning: process /usr/lib/postfix/smtp pid 9678 exit status 1
> postfix/master[9539]: warning: /usr/lib/postfix/smtp: bad command startup -- throttling
> postfix/qmgr[9814]: warning: connect to transport private/avscan: Connection refused
> Последняя ошибка что и была((( Не пойму чче у тебя за проблема.
Clam юзай через СlamSMTP,а SA через ProxSMTP.
Ща скину свои конфиги, а по ним подправь свои.
clamcmtpd.conf
# ------------------------------------------------------------------------------
# SAMPLE CLAMSMTPD CONFIG FILE
# ------------------------------------------------------------------------------
#
# - Comments are a line that starts with a #
# - All the options are found below with sample settings
# The address to send scanned mail to.
# This option is required unless TransparentProxy is enabled
OutAddress: 10026
-------------
proxsmtpd.conf
# ------------------------------------------------------------------------------
# SAMPLE PROXSMTPD CONFIG FILE
# ------------------------------------------------------------------------------
#
# - Comments are a line that starts with a #
# - All the options are found below with sample settings
# The address to send scanned mail to.
# This option is required unless TransparentProxy is enabled
OutAddress: 10029
# The Filter Command run for each email. See 'man proxsmtpd' for details
# The following command is a simple which just creates temp files.
#FilterCommand: tee `mktemp -t sample-filter.XXXXXX`
FilterCommand: cat | /usr/local/bin/spamc -u spamd --socket=/var/run/spamd/spamd.sock
# The amount of time to wait for data from FilterCommand
#FilterTimeout: 10
# The type of filter ('pipe' to pipe data through filter,
# or 'file' to pass a file to the filter)
#FilterType: pipe
# The maximum number of connection allowed at once.
# Be sure that clamd can also handle this many connections
#MaxConnections: 64
MaxConnections: 200
# Amount of time (in seconds) to wait on network IO
#TimeOut: 180
# A header to add to all scanned email
Header: X-Life: Antispam!
# Keep Alives (ie: NOOP's to server)
#KeepAlives: 0
# Send XCLIENT commands to receiving server
#XClient: off
# Address to listen on (defaults to all local addresses on port 10025)
Listen: 127.0.0.1:10028
# Directory for temporary files
TempDirectory: /var/tmp
# Enable transparent proxy support
#TransparentProxy: off
# User to switch to
#User: nobody
User: spamd
# The maximum number of connection allowed at once.
# Be sure that clamd can also handle this many connections
MaxConnections: 200
# Amount of time (in seconds) to wait on network IO
#TimeOut: 180
# Keep Alives (ie: NOOP's to server)
#KeepAlives: 0
# Send XCLIENT commands to receiving server
#XClient: off
# Address to listen on (defaults to all local addresses on port 10025)
Listen: 127.0.0.1:10025
# The address clamd is listening on
ClamAddress: /var/run/clamav/clamd.sock
# A header to add to all scanned email
Header: X-Life: Life is great!
# Directory for temporary files
TempDirectory: /tmp
# What to do when we see a virus (use 'bounce' or 'pass' or 'drop'
Action: drop
# Whether or not to keep virus files
Quarantine: off
# Enable transparent proxy support
#TransparentProxy: off
# User to switch to
User: clamav
# Virus actions: There's an option to run a script every time a virus is found.
# !IMPORTANT! This can open a hole in your server's security big enough to drive
# farm vehicles through. Be sure you know what you're doing. !IMPORTANT!
VirusAction: usr/local/etc/virus.sh
---------
В main.cf
### ANTIVIRUS & ANTISPAM
content_filter=filter:[127.0.0.1]:10025
recieve_ovveride_options=no_address_mapping
--------
В master.cf
### ClamSMTPd-ClamAV
scan unix - - - - 16 smtp
-o smtp_send_xforward_command=yes
-o smtp_tls_security_level=none
-o disable_mime_output_conversion=yes
-o smtp_generic_maps=
127.0.0.1:10026 inet n - - - 16 smtpd
-o content_filter=filter:127.0.0.1:10028
#-o content_filter=
-o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
-o smtpd_helo_restrictions=
-o smtpd_client_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o mynetworks_style=host
-o mynetworks=127.0.0.0/8
-o smtpd_authorized_xforward_hosts=127.0.0.0/8
### ProsSMTP-SpamAssassin
filter unix - - - - 16 smtp
-o smtp_send_xforward_command=yes
-o smtp_tls_security_level=none
127.0.0.1:10029 inet n - - - 16 smtpd
-o content_filter=
-o receive_override_options=no_unknown_recipient_checks,no_header_body_checks
-o smtpd_helo_restrictions=
-o smtpd_client_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o mynetworks_style=host
-o mynetworks=127.0.0.0/8
-o smtpd_authorized_xforward_hosts=127.0.0.0/8
В /etc/rc.conf добавь флаги для SA
spamd_enable="YES"
spamd_flags="-d -c -H /var/spool/spamd -u spamd --socketpath=/var/run/spamd/spamd.sock"
И внимательно проследи "точки" взаимодействия демонов - инет и юникс-сокеты.