http://bugzilla.spamassassin.org/show_bug.cgi?id=3917
[EMAIL PROTECTED] changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2513 is|0 |1
obsolete| |
------- Additional Comments From [EMAIL PROTECTED] 2004-11-19 14:51 -------
Created an attachment (id=2530)
--> (http://bugzilla.spamassassin.org/attachment.cgi?id=2530&action=view)
even simpler server that demonstrates the problem
I've attached a simpler server program that demonstrates the problem without
requiring spamc in the test and without a lot of data being sent from the
client to the server. Run this under Cygwin. It will run with -w and -T
options. It takes two optional command line arguments. The first is the ip
address to listen on, defaulting to 127.0.0.1. The second argument is the port
number, defaulting to 783.
This server waits for a client to send something on the port, then it sends
back a 68013 byte message with headers that allow it to work with spamc as the
client. So you can test it by running it and then running spamc -x -l
repeatedly, looking at the return code and error messages from spamc. You can
also use telnet as a client. The message that the server sends back consists of
1000 identical lines prefixed with line numbers 000 to 999 followed by a line
that says END OF TEST. That makes it easy to see how the data receivfed from
teh server is trucated. Just use telnet locahost 783 and type the Enter key
when you get a connection to the server.
This test consistently for me truncates the received data after 49152 bytes.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.