comparison dblist.8.in @ 0:c7f6b056b673

First import of vendor version
author Peter Gervai <grin@grin.hu>
date Tue, 10 Mar 2009 13:49:58 +0100
parents
children
comparison
equal deleted inserted replaced
-1:000000000000 0:c7f6b056b673
1 .\" Copyright (c) 2008 by Rhyolite Software, LLC
2 .\"
3 .\" This agreement is not applicable to any entity which sells anti-spam
4 .\" solutions to others or provides an anti-spam solution as part of a
5 .\" security solution sold to other entities, or to a private network
6 .\" which employs the DCC or uses data provided by operation of the DCC
7 .\" but does not provide corresponding data to other users.
8 .\"
9 .\" Permission to use, copy, modify, and distribute this software without
10 .\" changes for any purpose with or without fee is hereby granted, provided
11 .\" that the above copyright notice and this permission notice appear in all
12 .\" copies and any distributed versions or copies are either unchanged
13 .\" or not called anything similar to "DCC" or "Distributed Checksum
14 .\" Clearinghouse".
15 .\"
16 .\" Parties not eligible to receive a license under this agreement can
17 .\" obtain a commercial license to use DCC by contacting Rhyolite Software
18 .\" at sales@rhyolite.com.
19 .\"
20 .\" A commercial license would be for Distributed Checksum and Reputation
21 .\" Clearinghouse software. That software includes additional features. This
22 .\" free license for Distributed ChecksumClearinghouse Software does not in any
23 .\" way grant permision to use Distributed Checksum and Reputation Clearinghouse
24 .\" software
25 .\"
26 .\" THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE, LLC DISCLAIMS ALL
27 .\" WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
28 .\" OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE, LLC
29 .\" BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES
30 .\" OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
31 .\" WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
32 .\" ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
33 .\" SOFTWARE.
34 .\"
35 .\" Rhyolite Software DCC 1.3.103-1.39 $Revision$
36 .\"
37 .Dd February 26, 2009
38 .ds volume-ds-DCC Distributed Checksum Clearinghouse
39 .Dt dblist 8 DCC
40 .Os " "
41 .Sh NAME
42 .Nm dblist
43 .Nd Database List Distributed Checksum Clearinghouse
44 .Sh SYNOPSIS
45 .Nm dblist
46 .Op Fl vVHD
47 .Op Fl G Ar on | off
48 .Op Fl h Ar homedir
49 .br
50 .Oo
51 .Fl s Xo
52 .Sm off
53 .Op Ar server-ID
54 .Op Ar ,server-addr
55 .Op Ar ,server-port
56 .Xc
57 .Sm on
58 .Oc
59 .br
60 .Op Fl C Ar 'type h1 h2 h3 h4'
61 .Op Fl I Ar server-ID
62 .Op Fl A Ar dbaddr
63 .Op Fl L Ar pathlen
64 .br
65 .Op Fl P Ar pages
66 .Op Fl T Ar timestamp
67 .Op Ar file1 file2 ...
68 .Sh DESCRIPTION
69 .Nm Dblist
70 lists the contents of a DCC database as it does some consistency
71 checking.
72 .Bl -tag -width 3n
73 .It Fl v
74 lists more of the database.
75 Additional information is produced with additional
76 .Fl v
77 arguments.
78 .It Fl V
79 displays the version of the DCC database lister.
80 .It Fl H
81 turns off the listing of the hash table as well as the analysis
82 of the hash table.
83 Determining the worst case and average lengths of chains in the
84 hash table can take a long time for a large database on a small computer.
85 .It Fl D
86 turns off the listing of the data or checksum records.
87 .It Fl G Ar on
88 lists a greylist database.
89 .It Fl h Ar homedir
90 overrides the default DCC home directory,
91 .Pa @prefix@ .
92 .It Fl s Xo
93 .Sm off
94 .Op Ar server-ID
95 .Op Ar ,server-addr
96 .Op Ar ,server-port
97 .Sm on
98 .Xc
99 somewhat quiets the DCC server process,
100 .Xr dccd 8 ,
101 to get somewhat more consistent results.
102 .Ar server-ID
103 must be in the
104 .Pa ids
105 file.
106 .Ar server-addr
107 and
108 .Ar server-port
109 are the IP address and UDP port at which the server process listens.
110 .It Fl C Ar 'type h1 h2 h3 h4'
111 limits the listing to records containing that checksum or one of
112 the other checksums specified with
113 .Fl C .
114 If the four hexadecimal values
115 .Ar h1 h2 h3 h4
116 are absent,
117 records with the matching
118 .Ar type
119 will be listed.
120 If
121 .Ar type
122 is absent, any checksum with the four hexadecimal values will be listed.
123 As many as 16 checksums can be specified.
124 .It Fl I Ar server-ID
125 limits the listing to records with that server-ID or one of the other
126 server-IDs specified with
127 .Fl I .
128 As many as 16 server-IDs can be specified.
129 .It Fl A Ar dbaddr
130 excludes database records before
131 .Ar dbaddr .
132 .It Fl L Ar pathlen
133 excludes records with path lengths shorter than
134 .Ar pathlen .
135 .It Fl P Ar pages
136 ignores all but the last
137 .Ar pages
138 of the database.
139 .It Fl T Ar timetamp
140 excludes records with other timestamps.
141 A timestamp with a missing microsecond value matches
142 any record with that second.
143 As many as 16
144 timestamps can be specified.
145 .It Ar file1 file2 ...
146 are names of databases to be listed.
147 The default is
148 .Pa dcc_db
149 and its companion,
150 .Pa dcc_db.hash
151 in the DCC home directory.
152 .El
153 .Pp
154 By default, the sizes of the main file and the hash table as well
155 as how much they contain and values related to the performance of
156 the hash are displayed.
157 .Pp
158 With a single
159 .Fl v ,
160 most of the mail database file and the contents of memory
161 mapped server flooding positions in the
162 .Pa flod.map
163 file are listed.
164 The listing starts with the serial number of the database file
165 which is when old entries were last removed from it by
166 .Xr dbclean 8
167 That is followed by similar lines showing the oldest timestamp
168 of checksums not expired by dbclean
169 and of mail that is not "spam."
170 .Pp
171 The flooding positions from the
172 .Pa flod.map
173 file are record offsets or addresses in the main database file.
174 .Pp
175 A typical record in the main database file looks like:
176 .Bd -literal -offset 2
177 02/07/02 20:25:12.497032 5 auth 1601 2fe5b94
178 path: 103<-101<-1601
179 Body 6 e2d3f96a c65aea01 3fece361 edff9ecf 2f21364 772d2
180 Fuz1 many 6ff56fe8 ffc312d7 a5fe8f13 12a537ae 2f21364 200a9
181 Fuz2 many fac882b8 03eea34f bd792c40 2fe6fd54 2f21364 72816
182 .Ed
183 .Pp
184 That example
185 was received by a DCC server with server-ID
186 .Em 1601
187 at about 8:25 UTC on the evening of February 7, 2000.
188 The report was about a mail message set to
189 .Em 5
190 addressees.
191 The report was from a client that presented a client-ID and matching
192 password that the server recognized or authenticated.
193 The report was then sent or
194 .Sq flooded
195 to the server with server-ID
196 .Em 101
197 which in turn sent it to a server with server-ID
198 .Em 103 .
199 That server sent it to the local DCC server.
200 The record is at the address
201 .Em 0x2fe5b94
202 in the database.
203 The record contains 3 checksums.
204 The simple checksum of the body of the message was
205 .Em e2d3f96a c65aea01 3fece361 edff9ecf
206 The total number of recipients of messages with this body checksum
207 known in the database is
208 .Em 6 ,
209 which implies this checksum had been previously reported with a target
210 count of 1.
211 The previous report in the database of a message with this body checksum
212 is at
213 .Em 0x2f21364 .
214 The hash table entry for this body checksum is at
215 .Em 0x772d2 .
216 This report included two fuzzy checksums.
217 Both have been previously reported as having been sent to
218 .Em many
219 targets.
220 .Pp
221 An asterisk (*) before the name of the checksum
222 would indicate that a later record in the database makes this
223 checksum redundant.
224 A report of
225 .Em many
226 addressees makes all preceding reports redundant.
227 .Pp
228 The string
229 .Em trimmed
230 after the server-ID
231 marks older reports that have had uninteresting checksums removed.
232 The string
233 .Em compressed
234 after the server-ID
235 would indicate that this older report has been trimmed and compressed with
236 older reports.
237 .Pp
238 With two
239 .Fl v
240 arguments,
241 records added to the database by
242 .Xr dbclean 8
243 from the server whitelist are also displayed.
244 .Pp
245 Three
246 .Fl v
247 arguments cause the hash table to be displayed.
248 Three typical hash table entries look like:
249 .Bd -literal -offset 2
250 19b8: 19ee 19b7
251 19b9: 19c0 0 90120 Fuz1
252 19ba: 0 0 1b72300 Fuz1
253 .Ed
254 .Pp
255 The entry in slot number
256 .Em 0x19b8
257 is unused or free.
258 Slot number
259 .Em 0x19b9
260 is the start of a chain of collisions or entries
261 with the same hash value of 0x19b9.
262 The next slot in this chain is at
263 .Em 0x19c0 .
264 The corresponding
265 .Em Fuz1
266 checksum is at
267 .Em 0x9012
268 in the database.
269 The third slot at
270 .Em 0x19ba
271 is also that of a
272 .Em Fuz1
273 checksum,
274 but it is not part of a hash chain and its database record
275 is at
276 .Em 0x1b72300 .
277 .Sh FILES
278 .Bl -tag -width dcc_db.hash -compact
279 .It Pa @prefix@
280 is the DCC home directory containing data and control files.
281 .It Pa dcc_db grey_dcc_db
282 main file of checksums.
283 .It Pa dcc_db.hash grey_dcc_db.hash
284 database hash table.
285 .It Pa flod.map grey_flod.map
286 memory mapped flooding positions.
287 .El
288 .Sh SEE ALSO
289 .Xr cdcc 8 ,
290 .Xr dcc 8 ,
291 .Xr dbclean 8 ,
292 .Xr dccd 8 ,
293 .Xr dccifd 8 ,
294 .Xr dccm 8 ,
295 .Xr dccproc 8 .
296 .Sh HISTORY
297 Implementation of
298 .Nm
299 was started at Rhyolite Software, in 2000.
300 This document describes version 1.3.103.