1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245
|
.\" Copyright (c) 2005 by Rhyolite Software
.\"
.\" Permission to use, copy, modify, and distribute this software for any
.\" purpose with or without fee is hereby granted, provided that the above
.\" copyright notice and this permission notice appear in all copies.
.\"
.\" THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE DISCLAIMS ALL
.\" WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
.\" OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE
.\" BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES
.\" OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
.\" WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
.\" ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
.\" SOFTWARE.
.\"
.\" Rhyolite Software DCC 1.2.74-1.27 $Revision$
.\"
.Dd 2005/02/11 20:45:04
.ds volume-ds-DCC Distributed Checksum Clearinghouse
.Dt dblist DCC
.Sh NAME
.Nm dblist
.Nd Database List Distributed Checksum Clearinghouse
.Sh SYNOPSIS
.Nm dblist
.Op Fl vVHD
.Op Fl G Ar on | off
.Op Fl h Ar homedir
.Op Fl C Ar 'type h1 h2 h3 h4'
.br
.Op Fl I Ar server-ID
.Op Fl A Ar dbaddr
.Op Fl L Ar pathlen
.Op Fl P Ar pages
.Op Fl T Ar timestamp
.br
.Op Ar file1 file2 ...
.Sh DESCRIPTION
.Nm Dblist
lists the contents of a DCC database as it does some consistency
checking.
.Bl -tag -width 3n
.It Fl v
lists more of the database.
Additional information is produced with additional
.Fl v
arguments.
.It Fl V
displays the version of the DCC database lister.
.It Fl H
turns off the listing of the hash table as well as the analysis
of the hash table.
Determining the worst case and average lengths of chains in the
hash table can take a long time for a large database on a small computer.
.It Fl D
turns off the listing of the data or checksum records.
.It Fl G Ar on
lists a greylist database.
.It Fl h Ar homedir
overrides the default DCC home directory, which is often /var/dcc.
.It Fl C Ar 'type h1 h2 h3 h4'
limits the listing to records containing that checksum or one of
the other checksums specified with
.Fl C
or server-IDs specified with
.Fl I.
As many as 16 checksums can be specified.
.It Fl I Ar server-ID
limits the listing to records with that server-ID or one of the other
server-IDs specified with
.Fl I
or checksums specified with
.Fl C .
As many as 16 server-IDs can be specified.
.It Fl A Ar dbaddr
excludes database records before
.Ar dbaddr .
.It Fl L Ar pathlen
excludes records with path lengths shorter than
.Ar pathlen .
.It Fl P Ar pages
ignores all but the last
.Ar pages
of the database.
.It Fl T Ar timetamp
excludes records with other timestamps.
As many as 16
timestamps can be specified.
.It Ar file1 file2 ...
are names of databases to be listed.
The default is
.Pa dcc_db
and its companion,
.Pa dcc_db.hash
in the DCC home directory.
.El
.Pp
By default, the sizes of the main file and the hash table as well
as how much they contain and values related to the performance of
the hash are displayed.
.Pp
With a single
.Fl v ,
most of the mail database file and the contents of memory
mapped server flooding positions in the
.Pa flod.map
file are listed.
The listing starts with the serial number of the database file
which is when old entries were last removed from it by
.Xr dbclean 8
That is followed by similar lines showing the oldest timestamp
of checksums not expired by dbclean
and of mail that is not "spam."
.Pp
The flooding positions from the
.Pa flod.map
file are record offsets or addresses in the main database file.
.Pp
A typical record in the main database file looks like:
.Bd -literal -offset 2
02/07/02 20:25:12.497032 5 auth 1601 2fe5b94
path: 103<-101<-1601
Body 6 e2d3f96a c65aea01 3fece361 edff9ecf 2f21364 772d2
Fuz1 many 6ff56fe8 ffc312d7 a5fe8f13 12a537ae 2f21364 200a9
Fuz2 many fac882b8 03eea34f bd792c40 2fe6fd54 2f21364 72816
.Ed
.Pp
That example
was received by a DCC server with server-ID
.Em 1601
at about 8:25 GMT on the evening of February 7, 2000.
The report was about a mail message set to
.Em 5
addressees.
The report was from a client that presented a client-ID and matching
password that the server recognized or authenticated.
The report was then sent or
.Sq flooded
to the server with server-ID
.Em 101
which in turn sent it to a server with server-ID
.Em 103 .
That server sent it to the local DCC server.
The record is at the address
.Em 0x2fe5b94
in the database.
The record contains 3 checksums.
The simple checksum of the body of the message was
.Em e2d3f96a c65aea01 3fece361 edff9ecf
The total number of recipients of messages with this body checksum
known in the database is
.Em 6 ,
which implies this checksum had been previously reported with a target
count of 1.
The previous report in the database of a message with this body checksum
is at
.Em 0x2f21364 .
The hash table entry for this body checksum is at
.Em 0x772d2 .
This report included two fuzzy checksums.
Both have been previously reported as having been sent to
.Em many
targets.
.Pp
An asterisk (*) before the name of the checksum
would indicate that a later record in the database makes this
checksum redundant.
A report of
.Em many
addressees makes all preceding reports redundant.
.Pp
The string
.Em trimmed
after the server-ID
marks older reports that have had uninteresting checksums removed.
The string
.Em compressed
after the server-ID
would indicate that this older report has been trimmed and compressed with
older reports.
.Pp
With two
.Fl v
arguments,
records added to the database by
.Xr dbclean 8
from the server whitelist are also displayed.
.Pp
Three
.Fl v
arguments cause the hash table to be displayed.
Three typical hash table entries look like:
.Bd -literal -offset 2
19b8: 19ee 19b7
19b9: 19c0 0 90120 Fuz1
19ba: 0 0 1b72300 Fuz1
.Ed
.Pp
The entry in slot number
.Em 0x19b8
is unused or free.
Slot number
.Em 0x19b9
is the start of a chain of collisions or entries
with the same hash value of 0x19b9.
The next slot in this chain is at
.Em 0x19c0 .
The corresponding
.Em Fuz1
checksum is at
.Em 0x9012
in the database.
The third slot at
.Em 0x19ba
is also that of a
.Em Fuz1
checksum,
but it is not part of a hash chain and its database record
is at
.Em 0x1b72300 .
.Sh FILES
.Bl -tag -width dcc_db.hash -compact
.It Pa /var/dcc
is the DCC home directory containing data and control files.
.It Pa dcc_db grey_dcc_db
main file of checksums.
.It Pa dcc_db.hash grey_dcc_db.hash
database hash table.
.It Pa flod.map grey_flod.map
memory mapped flooding positions.
.El
.Sh SEE ALSO
.Xr cdcc 8 ,
.Xr dcc 8 ,
.Xr dbclean 8 ,
.Xr dccd 8 ,
.Xr dccifd 8 ,
.Xr dccm 8 ,
.Xr dccproc 8 .
.Sh HISTORY
Implementation of
.Nm
was started at Rhyolite Software in 2000.
This describes version 1.2.74.
.\" LocalWords: dbclean
|