Seven or eight years ago, I decided to finally dump all the individual antivirus packages around here and go with a centralized system. I wasn't sure what I wanted, but I knew what I didn't want - Symantec. I knew they were the evil empire.
After going through two different vendors, this year I finally decided to try Symantec Endpoint Protection Small Business Edition, v. 12. I'm a convert. Incredibly lightweight, responsive, and... cost effective. As in, under $15 a seat cost effective. I love it.
Never bothered with their Linux version, even though it was included with my purchase. ClamAV has been doing just fine for us for years, thank you.
Until last month. For some reason - I assume the definition file - ClamAV is now taking forever to make a scan:
Data scanned: 803.16 MB
Data read: 240.92 MB (ratio 3.33:1)
Time: 8035.814 sec (133 m 55 s)
100K a second? Let's see, to scan our home directory would take... about a week.
So, easy solution - I've got plenty of SEP licences left; it runs on Linux; it's very easy to administer on Windows - I'll just install SEP on my Linux boxes!
Well, as easy as the Windows install/administration was, the Linux install is that complex. First of all, the Linux download is hard to find. Once I had it I wanted to set up a local LiveUpdate server on the Windows box. Easy enough. Then, I had to point the Linux server towards the LiveUpdate server. That's when things got crazy.
The docs say that you should change the server name in /etc/liveupdate.conf, but there are at least two documented ways of doing so. In addition, they changed the port from 8080 to 7070 in the most recent LiveUpdate Administration release. So I got all of that sorted out in the file, ran liveupdate... and nothing happened.
Well, something happened, actually:
Command failed: Failure in pre processing of micro definitions before update.
Unable to perform update
and the /etc/liveupdate.conf file was nulled out.
After a couple of days of back-and-forth with Symantec (Linux? What's that?), I finally found someone who gave me this link:
http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2008050713154648
Cause:
Once executed, JLU reads the contents of the unencrypted liveupdate.conf file, runs LiveUpdate, and then encrypts the liveupdate.conf file to prevent tampering. The encryption level used is above the maximum encryption level allowed by default in Sun Java. JLU requires the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files be applied to the version of Java being used to execute JLU.
Solution:
To allow JLU to properly encrypt the liveupdate.conf file, you must apply the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files to the installation of Java being used to execute JLU.
Ah. I need super-secret crypto, available only to true believers. So I went to Sun, eventually found the
Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files, downloaded them and replaced the on my system. It consists of two files, local_policy.jar and US_export_policy.jar. Replaced the files on my system with those, made a mental note not to ever let these machines leave the country, and...
Still didn't work. Crud.
OK, one more tech request. They sent me to this link on 'Configuring JavaLiveUpdate':
http://service1.symantec.com/support/ent-security.nsf/docid/2006021007250213
which was wrong in an interesting way. The table it's got is off by one row - the 'Parameter' column lines up with the 'Description' of the row above it.
But it did give me a hint - it pointed me to a Liveupdt.hst file. I'd seen this before on the Windows side; the LiveUpdate Administration docs told me how to generate this file, but not what to do with it. This seemed to imply that I pointed 'hostfile=' to it. So I generated it on the Windows side (Configure/Client Settings/Export Java Settings), moved it over, and put it into my /etc/liveupdate.conf file, which now reads:
hostfile=/opt/Symantec/symantec_antivirus/liveupdt.hst
logfile=/var/log/symantec/liveupdt.log
Hah! That worked!
And it's slightly faster. That 133-minute clamav scan finished in just under 8 minutes.
Sheesh. But worth it, I think.