Mercurial > notdcc
diff dblist.8.in @ 0:c7f6b056b673
First import of vendor version
author | Peter Gervai <grin@grin.hu> |
---|---|
date | Tue, 10 Mar 2009 13:49:58 +0100 |
parents | |
children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/dblist.8.in Tue Mar 10 13:49:58 2009 +0100 @@ -0,0 +1,300 @@ +.\" Copyright (c) 2008 by Rhyolite Software, LLC +.\" +.\" This agreement is not applicable to any entity which sells anti-spam +.\" solutions to others or provides an anti-spam solution as part of a +.\" security solution sold to other entities, or to a private network +.\" which employs the DCC or uses data provided by operation of the DCC +.\" but does not provide corresponding data to other users. +.\" +.\" Permission to use, copy, modify, and distribute this software without +.\" changes for any purpose with or without fee is hereby granted, provided +.\" that the above copyright notice and this permission notice appear in all +.\" copies and any distributed versions or copies are either unchanged +.\" or not called anything similar to "DCC" or "Distributed Checksum +.\" Clearinghouse". +.\" +.\" Parties not eligible to receive a license under this agreement can +.\" obtain a commercial license to use DCC by contacting Rhyolite Software +.\" at sales@rhyolite.com. +.\" +.\" A commercial license would be for Distributed Checksum and Reputation +.\" Clearinghouse software. That software includes additional features. This +.\" free license for Distributed ChecksumClearinghouse Software does not in any +.\" way grant permision to use Distributed Checksum and Reputation Clearinghouse +.\" software +.\" +.\" THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE, LLC DISCLAIMS ALL +.\" WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES +.\" OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE, LLC +.\" BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES +.\" OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, +.\" WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, +.\" ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS +.\" SOFTWARE. +.\" +.\" Rhyolite Software DCC 1.3.103-1.39 $Revision$ +.\" +.Dd February 26, 2009 +.ds volume-ds-DCC Distributed Checksum Clearinghouse +.Dt dblist 8 DCC +.Os " " +.Sh NAME +.Nm dblist +.Nd Database List Distributed Checksum Clearinghouse +.Sh SYNOPSIS +.Nm dblist +.Op Fl vVHD +.Op Fl G Ar on | off +.Op Fl h Ar homedir +.br +.Oo +.Fl s Xo +.Sm off +.Op Ar server-ID +.Op Ar ,server-addr +.Op Ar ,server-port +.Xc +.Sm on +.Oc +.br +.Op Fl C Ar 'type h1 h2 h3 h4' +.Op Fl I Ar server-ID +.Op Fl A Ar dbaddr +.Op Fl L Ar pathlen +.br +.Op Fl P Ar pages +.Op Fl T Ar timestamp +.Op Ar file1 file2 ... +.Sh DESCRIPTION +.Nm Dblist +lists the contents of a DCC database as it does some consistency +checking. +.Bl -tag -width 3n +.It Fl v +lists more of the database. +Additional information is produced with additional +.Fl v +arguments. +.It Fl V +displays the version of the DCC database lister. +.It Fl H +turns off the listing of the hash table as well as the analysis +of the hash table. +Determining the worst case and average lengths of chains in the +hash table can take a long time for a large database on a small computer. +.It Fl D +turns off the listing of the data or checksum records. +.It Fl G Ar on +lists a greylist database. +.It Fl h Ar homedir +overrides the default DCC home directory, +.Pa @prefix@ . +.It Fl s Xo +.Sm off +.Op Ar server-ID +.Op Ar ,server-addr +.Op Ar ,server-port +.Sm on +.Xc +somewhat quiets the DCC server process, +.Xr dccd 8 , +to get somewhat more consistent results. +.Ar server-ID +must be in the +.Pa ids +file. +.Ar server-addr +and +.Ar server-port +are the IP address and UDP port at which the server process listens. +.It Fl C Ar 'type h1 h2 h3 h4' +limits the listing to records containing that checksum or one of +the other checksums specified with +.Fl C . +If the four hexadecimal values +.Ar h1 h2 h3 h4 +are absent, +records with the matching +.Ar type +will be listed. +If +.Ar type +is absent, any checksum with the four hexadecimal values will be listed. +As many as 16 checksums can be specified. +.It Fl I Ar server-ID +limits the listing to records with that server-ID or one of the other +server-IDs specified with +.Fl I . +As many as 16 server-IDs can be specified. +.It Fl A Ar dbaddr +excludes database records before +.Ar dbaddr . +.It Fl L Ar pathlen +excludes records with path lengths shorter than +.Ar pathlen . +.It Fl P Ar pages +ignores all but the last +.Ar pages +of the database. +.It Fl T Ar timetamp +excludes records with other timestamps. +A timestamp with a missing microsecond value matches +any record with that second. +As many as 16 +timestamps can be specified. +.It Ar file1 file2 ... +are names of databases to be listed. +The default is +.Pa dcc_db +and its companion, +.Pa dcc_db.hash +in the DCC home directory. +.El +.Pp +By default, the sizes of the main file and the hash table as well +as how much they contain and values related to the performance of +the hash are displayed. +.Pp +With a single +.Fl v , +most of the mail database file and the contents of memory +mapped server flooding positions in the +.Pa flod.map +file are listed. +The listing starts with the serial number of the database file +which is when old entries were last removed from it by +.Xr dbclean 8 +That is followed by similar lines showing the oldest timestamp +of checksums not expired by dbclean +and of mail that is not "spam." +.Pp +The flooding positions from the +.Pa flod.map +file are record offsets or addresses in the main database file. +.Pp +A typical record in the main database file looks like: +.Bd -literal -offset 2 +02/07/02 20:25:12.497032 5 auth 1601 2fe5b94 + path: 103<-101<-1601 + Body 6 e2d3f96a c65aea01 3fece361 edff9ecf 2f21364 772d2 + Fuz1 many 6ff56fe8 ffc312d7 a5fe8f13 12a537ae 2f21364 200a9 + Fuz2 many fac882b8 03eea34f bd792c40 2fe6fd54 2f21364 72816 +.Ed +.Pp +That example +was received by a DCC server with server-ID +.Em 1601 +at about 8:25 UTC on the evening of February 7, 2000. +The report was about a mail message set to +.Em 5 +addressees. +The report was from a client that presented a client-ID and matching +password that the server recognized or authenticated. +The report was then sent or +.Sq flooded +to the server with server-ID +.Em 101 +which in turn sent it to a server with server-ID +.Em 103 . +That server sent it to the local DCC server. +The record is at the address +.Em 0x2fe5b94 +in the database. +The record contains 3 checksums. +The simple checksum of the body of the message was +.Em e2d3f96a c65aea01 3fece361 edff9ecf +The total number of recipients of messages with this body checksum +known in the database is +.Em 6 , +which implies this checksum had been previously reported with a target +count of 1. +The previous report in the database of a message with this body checksum +is at +.Em 0x2f21364 . +The hash table entry for this body checksum is at +.Em 0x772d2 . +This report included two fuzzy checksums. +Both have been previously reported as having been sent to +.Em many +targets. +.Pp +An asterisk (*) before the name of the checksum +would indicate that a later record in the database makes this +checksum redundant. +A report of +.Em many +addressees makes all preceding reports redundant. +.Pp +The string +.Em trimmed +after the server-ID +marks older reports that have had uninteresting checksums removed. +The string +.Em compressed +after the server-ID +would indicate that this older report has been trimmed and compressed with +older reports. +.Pp +With two +.Fl v +arguments, +records added to the database by +.Xr dbclean 8 +from the server whitelist are also displayed. +.Pp +Three +.Fl v +arguments cause the hash table to be displayed. +Three typical hash table entries look like: +.Bd -literal -offset 2 + 19b8: 19ee 19b7 + 19b9: 19c0 0 90120 Fuz1 + 19ba: 0 0 1b72300 Fuz1 +.Ed +.Pp +The entry in slot number +.Em 0x19b8 +is unused or free. +Slot number +.Em 0x19b9 +is the start of a chain of collisions or entries +with the same hash value of 0x19b9. +The next slot in this chain is at +.Em 0x19c0 . +The corresponding +.Em Fuz1 + checksum is at +.Em 0x9012 +in the database. +The third slot at +.Em 0x19ba +is also that of a +.Em Fuz1 +checksum, +but it is not part of a hash chain and its database record +is at +.Em 0x1b72300 . +.Sh FILES +.Bl -tag -width dcc_db.hash -compact +.It Pa @prefix@ +is the DCC home directory containing data and control files. +.It Pa dcc_db grey_dcc_db +main file of checksums. +.It Pa dcc_db.hash grey_dcc_db.hash +database hash table. +.It Pa flod.map grey_flod.map +memory mapped flooding positions. +.El +.Sh SEE ALSO +.Xr cdcc 8 , +.Xr dcc 8 , +.Xr dbclean 8 , +.Xr dccd 8 , +.Xr dccifd 8 , +.Xr dccm 8 , +.Xr dccproc 8 . +.Sh HISTORY +Implementation of +.Nm +was started at Rhyolite Software, in 2000. +This document describes version 1.3.103.