Mercurial > notdcc
view dblist.8.in @ 0:c7f6b056b673
First import of vendor version
author | Peter Gervai <grin@grin.hu> |
---|---|
date | Tue, 10 Mar 2009 13:49:58 +0100 |
parents | |
children |
line wrap: on
line source
.\" Copyright (c) 2008 by Rhyolite Software, LLC .\" .\" This agreement is not applicable to any entity which sells anti-spam .\" solutions to others or provides an anti-spam solution as part of a .\" security solution sold to other entities, or to a private network .\" which employs the DCC or uses data provided by operation of the DCC .\" but does not provide corresponding data to other users. .\" .\" Permission to use, copy, modify, and distribute this software without .\" changes for any purpose with or without fee is hereby granted, provided .\" that the above copyright notice and this permission notice appear in all .\" copies and any distributed versions or copies are either unchanged .\" or not called anything similar to "DCC" or "Distributed Checksum .\" Clearinghouse". .\" .\" Parties not eligible to receive a license under this agreement can .\" obtain a commercial license to use DCC by contacting Rhyolite Software .\" at sales@rhyolite.com. .\" .\" A commercial license would be for Distributed Checksum and Reputation .\" Clearinghouse software. That software includes additional features. This .\" free license for Distributed ChecksumClearinghouse Software does not in any .\" way grant permision to use Distributed Checksum and Reputation Clearinghouse .\" software .\" .\" THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE, LLC DISCLAIMS ALL .\" WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES .\" OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE, LLC .\" BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES .\" OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, .\" WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, .\" ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS .\" SOFTWARE. .\" .\" Rhyolite Software DCC 1.3.103-1.39 $Revision$ .\" .Dd February 26, 2009 .ds volume-ds-DCC Distributed Checksum Clearinghouse .Dt dblist 8 DCC .Os " " .Sh NAME .Nm dblist .Nd Database List Distributed Checksum Clearinghouse .Sh SYNOPSIS .Nm dblist .Op Fl vVHD .Op Fl G Ar on | off .Op Fl h Ar homedir .br .Oo .Fl s Xo .Sm off .Op Ar server-ID .Op Ar ,server-addr .Op Ar ,server-port .Xc .Sm on .Oc .br .Op Fl C Ar 'type h1 h2 h3 h4' .Op Fl I Ar server-ID .Op Fl A Ar dbaddr .Op Fl L Ar pathlen .br .Op Fl P Ar pages .Op Fl T Ar timestamp .Op Ar file1 file2 ... .Sh DESCRIPTION .Nm Dblist lists the contents of a DCC database as it does some consistency checking. .Bl -tag -width 3n .It Fl v lists more of the database. Additional information is produced with additional .Fl v arguments. .It Fl V displays the version of the DCC database lister. .It Fl H turns off the listing of the hash table as well as the analysis of the hash table. Determining the worst case and average lengths of chains in the hash table can take a long time for a large database on a small computer. .It Fl D turns off the listing of the data or checksum records. .It Fl G Ar on lists a greylist database. .It Fl h Ar homedir overrides the default DCC home directory, .Pa @prefix@ . .It Fl s Xo .Sm off .Op Ar server-ID .Op Ar ,server-addr .Op Ar ,server-port .Sm on .Xc somewhat quiets the DCC server process, .Xr dccd 8 , to get somewhat more consistent results. .Ar server-ID must be in the .Pa ids file. .Ar server-addr and .Ar server-port are the IP address and UDP port at which the server process listens. .It Fl C Ar 'type h1 h2 h3 h4' limits the listing to records containing that checksum or one of the other checksums specified with .Fl C . If the four hexadecimal values .Ar h1 h2 h3 h4 are absent, records with the matching .Ar type will be listed. If .Ar type is absent, any checksum with the four hexadecimal values will be listed. As many as 16 checksums can be specified. .It Fl I Ar server-ID limits the listing to records with that server-ID or one of the other server-IDs specified with .Fl I . As many as 16 server-IDs can be specified. .It Fl A Ar dbaddr excludes database records before .Ar dbaddr . .It Fl L Ar pathlen excludes records with path lengths shorter than .Ar pathlen . .It Fl P Ar pages ignores all but the last .Ar pages of the database. .It Fl T Ar timetamp excludes records with other timestamps. A timestamp with a missing microsecond value matches any record with that second. As many as 16 timestamps can be specified. .It Ar file1 file2 ... are names of databases to be listed. The default is .Pa dcc_db and its companion, .Pa dcc_db.hash in the DCC home directory. .El .Pp By default, the sizes of the main file and the hash table as well as how much they contain and values related to the performance of the hash are displayed. .Pp With a single .Fl v , most of the mail database file and the contents of memory mapped server flooding positions in the .Pa flod.map file are listed. The listing starts with the serial number of the database file which is when old entries were last removed from it by .Xr dbclean 8 That is followed by similar lines showing the oldest timestamp of checksums not expired by dbclean and of mail that is not "spam." .Pp The flooding positions from the .Pa flod.map file are record offsets or addresses in the main database file. .Pp A typical record in the main database file looks like: .Bd -literal -offset 2 02/07/02 20:25:12.497032 5 auth 1601 2fe5b94 path: 103<-101<-1601 Body 6 e2d3f96a c65aea01 3fece361 edff9ecf 2f21364 772d2 Fuz1 many 6ff56fe8 ffc312d7 a5fe8f13 12a537ae 2f21364 200a9 Fuz2 many fac882b8 03eea34f bd792c40 2fe6fd54 2f21364 72816 .Ed .Pp That example was received by a DCC server with server-ID .Em 1601 at about 8:25 UTC on the evening of February 7, 2000. The report was about a mail message set to .Em 5 addressees. The report was from a client that presented a client-ID and matching password that the server recognized or authenticated. The report was then sent or .Sq flooded to the server with server-ID .Em 101 which in turn sent it to a server with server-ID .Em 103 . That server sent it to the local DCC server. The record is at the address .Em 0x2fe5b94 in the database. The record contains 3 checksums. The simple checksum of the body of the message was .Em e2d3f96a c65aea01 3fece361 edff9ecf The total number of recipients of messages with this body checksum known in the database is .Em 6 , which implies this checksum had been previously reported with a target count of 1. The previous report in the database of a message with this body checksum is at .Em 0x2f21364 . The hash table entry for this body checksum is at .Em 0x772d2 . This report included two fuzzy checksums. Both have been previously reported as having been sent to .Em many targets. .Pp An asterisk (*) before the name of the checksum would indicate that a later record in the database makes this checksum redundant. A report of .Em many addressees makes all preceding reports redundant. .Pp The string .Em trimmed after the server-ID marks older reports that have had uninteresting checksums removed. The string .Em compressed after the server-ID would indicate that this older report has been trimmed and compressed with older reports. .Pp With two .Fl v arguments, records added to the database by .Xr dbclean 8 from the server whitelist are also displayed. .Pp Three .Fl v arguments cause the hash table to be displayed. Three typical hash table entries look like: .Bd -literal -offset 2 19b8: 19ee 19b7 19b9: 19c0 0 90120 Fuz1 19ba: 0 0 1b72300 Fuz1 .Ed .Pp The entry in slot number .Em 0x19b8 is unused or free. Slot number .Em 0x19b9 is the start of a chain of collisions or entries with the same hash value of 0x19b9. The next slot in this chain is at .Em 0x19c0 . The corresponding .Em Fuz1 checksum is at .Em 0x9012 in the database. The third slot at .Em 0x19ba is also that of a .Em Fuz1 checksum, but it is not part of a hash chain and its database record is at .Em 0x1b72300 . .Sh FILES .Bl -tag -width dcc_db.hash -compact .It Pa @prefix@ is the DCC home directory containing data and control files. .It Pa dcc_db grey_dcc_db main file of checksums. .It Pa dcc_db.hash grey_dcc_db.hash database hash table. .It Pa flod.map grey_flod.map memory mapped flooding positions. .El .Sh SEE ALSO .Xr cdcc 8 , .Xr dcc 8 , .Xr dbclean 8 , .Xr dccd 8 , .Xr dccifd 8 , .Xr dccm 8 , .Xr dccproc 8 . .Sh HISTORY Implementation of .Nm was started at Rhyolite Software, in 2000. This document describes version 1.3.103.