http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5388


[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID




------- Additional Comments From [EMAIL PROTECTED]  2007-03-24 23:32 -------
Figured out the issue with the ipv4 version - I have an additional local
loopback address that is part of an LVS/keepalived scheme, and that address was
accept()ing connections on tcp783 every second as part of LVS' tcpcheck.  At the
initiation of these connections, the socket object returns a null ->peername()
in peer_info_from_socket(), which causes the error messages I listed above.  As
a workaround, we will configure LVS/keepalived to perform health status checks
via the correct interface at both ends, but also teach it to ping spamd with a
proper ping header.
I have not tested it, but I assume the ipv6 version error messages are caused
similarly.
I would also like to take this opportunity to request an additional flag for
spamd (--bind-ipv4-only) that would override/condition the eval{} in the second
BEGIN{}, since in our case, I would like to keep the debian package
libio-socket-inet6-perl installed, but still force spamd to bind to ipv4 only.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to