You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@bugzilla.spamassassin.org on 2004/06/30 16:52:20 UTC
[Bug 3556] New: spamc shuts down socket too early, ISA server
http://bugzilla.spamassassin.org/show_bug.cgi?id=3556
Summary: spamc shuts down socket too early, ISA server
Product: Spamassassin
Version: SVN Trunk (Latest Devel Version)
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P5
Component: spamc/spamd
AssignedTo: spamassassin-dev@incubator.apache.org
ReportedBy: jbrunette@excel.net
spamc clients are on public network, spamd is on private network behind an ISA
server. This part of libspamc.c (line 912):
/* Send to spamd */
if (flags & SPAMC_USE_SSL) {
#ifdef SPAMC_SSL
SSL_write(ssl, buf, len);
SSL_write(ssl, m->msg, m->msg_len);
#endif
}
else {
full_write(sock, 0, buf, len);
full_write(sock, 0, m->msg, m->msg_len);
shutdown(sock, SHUT_WR);
}
...gives our ISA server grief because the shutdown() call typically causes the
FIN packet received by the spamd server to be ACK'd prior to spamd replying with
the modified message. The ISA server thinks the connection is now closed and,
when spamd attempts to send the modified message, returns RST to spamd and the
packet is never received by the spamc client.
Is there a reason why spamc closes the socket in this fashion so early?
Commenting out that shutdown() call allows spamc/spamd communication to work
while having no obvious negative side effects.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.