Hi folks, 

  

I have another problem with following feature: 

„spamdyke silently helps mail clients avoid this error by inserting a carriage 
return before any bare line feed characters it sees.” (Spamdyke Documentation) 

  

Using zarafa ( www.zarafa.com ), all outgoing email gets bounced back with 
exactly the message which should be prevented by that feature: 

possible qmail-smtpd exited by timeout, reset connection or with "See 
http://pobox.com/~djb/docs/smtplf.html ." (qmail log file) 

And it definitely isn’t because of timeout (log message appears instantly when 
tailing the logfile) or connection reset. 

  

My wild guess is that zarafa does not implement the SMT protocol correctly and 
sends LineFeeds where none should be. Qmail just ignored them, and now spamdyke 
changes those LineFeeds to CarriageReturn-LineFeed which get interpreted by 
qmail and cause this error. 

  

Can anyone tell me, in which c file and what line spamdyke replaces the LF 
character with CR LF? I then could comment this out and test if that works. 

  

Kind regards, 

  

Chris 

  

  

Anyway, here is an smtp log of the message of spamdyke (highest log level) 

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 34 bytes 

220 myserver.de ESMTP 

  

01/04/2009 22:26:53 FROM REMOTE TO CHILD: 29 bytes 

EHLO myserver.de 

  

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 28 bytes 

250-myserver.de 

  

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 14 bytes 

250-STARTTLS 

  

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 16 bytes 

250-PIPELINING 

  

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 14 bytes 

250-8BITMIME 

  

01/04/2009 22:26:53 FROM SPAMDYKE TO REMOTE: 3 bytes 

250 

01/04/2009 22:26:53 FROM SPAMDYKE TO REMOTE: 1 bytes 

  

01/04/2009 22:26:53 FROM SPAMDYKE TO REMOTE: 27 bytes 

AUTH LOGIN PLAIN CRAM-MD5 

  

01/04/2009 22:26:53 FROM REMOTE TO CHILD: 39 bytes 

MAIL FROM: <[email protected]> 

  

01/04/2009 22:26:53 LOG OUTPUT 

DEBUG(filter_sender_whitelist()@filter.c:1747): searching sender whitelist(s); 
sender: [email protected] 

DEBUG(filter_sender_blacklist()@filter.c:1881): searching sender blacklist(s); 
sender: [email protected] 

  

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 8 bytes 

250 ok 

  

01/04/2009 22:26:53 FROM REMOTE TO CHILD: 29 bytes 

RCPT TO: <[email protected]> 

  

01/04/2009 22:26:53 LOG OUTPUT 

DEBUG(filter_recipient_relay()@filter.c:2183): checking relaying; relay-level: 
0 recipient: [email protected] ip: 127.0.0.1 rdns: localhost local_recipient: 
false relaying_allowed: true 

DEBUG(filter_recipient_local()@filter.c:2154): checking for unqualified 
recipient; recipient: [email protected] 

DEBUG(filter_recipient_blacklist()@filter.c:2278): searching recipient 
blacklist(s); recipient: [email protected] 

DEBUG(filter_recipient_graylist()@filter.c:2342): checking graylist; recipient: 
[email protected] sender: [email protected] 

  

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 8 bytes 

250 ok 

  

01/04/2009 22:26:53 LOG OUTPUT 

ALLOWED from: [email protected] to: [email protected] origin_ip: 127.0.0.1 
origin_rdns: localhost auth: (unknown) 

  

01/04/2009 22:26:53 FROM REMOTE TO CHILD: 6 bytes 

DATA 

  

01/04/2009 22:26:53 FROM CHILD TO REMOTE: 14 bytes 

354 go ahead 

  

01/04/2009 22:26:53 FROM REMOTE TO CHILD: 6 bytes 

QUIT 

  

01/04/2009 22:26:53 CLOSED 

  

_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to