You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@bugzilla.spamassassin.org on 2004/04/27 20:04:25 UTC

[Bug 3301] received header parsing fails

http://bugzilla.spamassassin.org/show_bug.cgi?id=3301

jon@latchkey.com changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
            Summary|multiple processes - killing|received header parsing
                   |parent doesn't kill the     |fails
                   |children                    |



------- Additional Comments From jon@latchkey.com  2004-04-27 11:04 -------
chaging the summary now that this issue has gone through several different
titles. =)

yup. 100% confirmed that it is crashing every single time it tries to parse the
received header. for whatever reason, this doesn't always happen so some of the
spam gets caught.

here is another one...(un)luckily this small little server processes about 10k
messages a day that are spam...

Apr 27 10:57:38 takahe spamd[10206]: logmsg: connection from localhost
[127.0.0.1] at port 57064 
Apr 27 10:57:38 takahe spamd[10206]: connection from localhost [127.0.0.1] at
port 57064 
Apr 27 10:57:38 takahe spamd[10206]: logmsg: info: setuid to zeremy succeeded 
Apr 27 10:57:38 takahe spamd[10206]: info: setuid to zeremy succeeded 
Apr 27 10:57:38 takahe spamd[10206]: debug: user has changed 
Apr 27 10:57:38 takahe spamd[10206]: debug: bayes: 10206 tie-ing to DB file R/O
/Users/zeremy/.spamassassin/bayes_toks 
Apr 27 10:57:38 takahe spamd[10206]: debug: bayes: 10206 tie-ing to DB file R/O
/Users/zeremy/.spamassassin/bayes_seen 
Apr 27 10:57:38 takahe spamd[10206]: debug: bayes: found bayes db version 2 
Apr 27 10:57:38 takahe spamd[10206]: debug: Score set 3 chosen. 
Apr 27 10:57:38 takahe spamd[10206]: logmsg: processing message
<34...@us1-mail16.pcle.com> for zeremy:1011. 
Apr 27 10:57:38 takahe spamd[10206]: processing message
<34...@us1-mail16.pcle.com> for zeremy:1011. 
Apr 27 10:57:38 takahe spamd[10206]: debug: ---- MIME PARSER START ---- 
Apr 27 10:57:38 takahe spamd[10206]: debug: main message type: text/plain 
Apr 27 10:57:38 takahe spamd[10206]: debug: parsing normal part 
Apr 27 10:57:38 takahe spamd[10206]: debug: added part, type: text/plain 
Apr 27 10:57:38 takahe spamd[10206]: debug: ---- MIME PARSER END ---- 
Apr 27 10:57:38 takahe spamd[10206]: debug: received-header: parsed as [
ip=131.161.246.241 rdns=feynman.cliq.org helo=feynman.cliq.com
by=takahe.whichever.com ident= envfrom= intl=0 id=9718DF7B2E6 ] 
Apr 27 10:57:38 takahe spamd[10206]: debug: received-header: parsed as [
ip=209.237.226.90 rdns=taz3.hyperreal.org helo=hyperreal.org by=feynman.cliq.com
ident= envfrom= intl=0 id=i3RI2lZr021350 ] 
Apr 27 10:57:38 takahe spamd[9982]: logmsg: server hit by SIGCHLD, pid 10206 
Apr 27 10:57:38 takahe spamd[9982]: server hit by SIGCHLD, pid 10206 


it would be nice if it was possible to have each child report that it crashed.
one can have a protocol of start session/end session to make sure that if it
doesn't end properly, it is reported as a crash with a stack trace or something
useful for debugging.

also, how do i turn off received header parsing for now?

also, let me know when you want me to try a new version.



------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.