I don't suppose there is a patch for the patch?  That would be too easy.

It looks like after running unshunt, the same thing happens.  I do not see
anything that appears to be a pattern among the shunted messages.  Are there
any suggestions as to how I might fix this?  I am not too familiar with the
Mailman set up on this machine, but I would like to get it fixed.  Thank
you.

-Jeff

On Dec 3, 2007 7:06 PM, Mark Sapiro <[EMAIL PROTECTED]> wrote:

> Jeffrey Hugo wrote:
> >
> >The machine is running Ubuntu 6.06 (Dapper Drake), Mailman 2.1.5installed
> >with apt-get, and Postfix.  Any help would be appreciated.
> >
> >-Jeff
> >
> >Dec 03 18:09:53 2007 (4532) Uncaught runner exception: (104, 'Connection
> >reset by peer')
> >Dec 03 18:09:53 2007 (4532) Traceback (most recent call last):
> >  File "/usr/lib/mailman/Mailman/Queue/Runner.py", line 111, in _oneloop
> >    self._onefile(msg, msgdata)
> >  File "/usr/lib/mailman/Mailman/Queue/Runner.py", line 167, in _onefile
> >    keepqueued = self._dispose(mlist, msg, msgdata)
> >  File "/usr/lib/mailman/Mailman/Queue/IncomingRunner.py", line 130, in
> >_dispose
> >    more = self._dopipeline(mlist, msg, msgdata, pipeline)
> >  File "/usr/lib/mailman/Mailman/Queue/IncomingRunner.py", line 153, in
> >_dopipeline
> >    sys.modules[modname].process(mlist, msg, msgdata)
> >  File "/usr/lib/mailman/Mailman/Handlers/SpamAssassin.py", line 76, in
> >process
> >    score, symbols = check_message(mlist, str(msg))
> >  File "/usr/lib/mailman/Mailman/Handlers/SpamAssassin.py", line 62, in
> >check_message
> >    res = connection.check(spamd.SYMBOLS, message)
> >  File "/usr/lib/mailman/Mailman/Handlers/spamd.py", line 122, in check
> >    response = fp.readline()
> >  File "/usr/lib/python2.4/socket.py", line 332, in readline
> >    data = self._sock.recv(self._rbufsize)
> >error: (104, 'Connection reset by peer')
>
>
> Someone has apparently patched your Mailman with
> <
> https://sourceforge.net/tracker/?func=detail&atid=300103&aid=534577&group_id=103
> >.
> The spamd.py handler's SpamdConnection.check() method doesn't catch
> socket exceptions that occur while reading from the socket. Thus if
> something happens to the connection between the spamd.py handler and
> the spamd daemon, an uncaught exception like the above occurs.
>
> This may be transient glitches or they may depend on message content or
> there may be some more fundamental problem with spamd.py.
>
>
> >Dec 03 18:09:54 2007 (4532) SHUNTING:
> >1195172718.109622+5f2a18798e1a2c35cac4085a04731996cdb017d9
>
>
> You could try running bin/unshunt to reprocess these shunted messages
> and see if they work a second time. However, I recommend first running
> 'bin/show_qfiles qfiles/shunt/*' and removing any entries you don't
> actually want.
>
> --
> Mark Sapiro <[EMAIL PROTECTED]>        The highway is for gamblers,
> San Francisco Bay Area, California    better use your sense - B. Dylan
>
>
------------------------------------------------------
Mailman-Users mailing list
Mailman-Users@python.org
http://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Security Policy: 
http://www.python.org/cgi-bin/faqw-mm.py?req=show&amp;file=faq01.027.htp

Reply via email to