You can have her send something to me. e...@shubes.net
My setup (current QMT) appears to be pretty close to yours.
-- 
-Eric 'shubes'

On 06/09/2011 11:09 AM, ron wrote:
> Does anyone else have a spamdyke setup? I can try to get her to send an
> email to see if there
> are the same issues as what I am getting?
>
> *Ron Olds *
> *National Service Information *
> 145 Baker St
> Marion, Ohio 43302
> _ron@nsii.net_
> 800-235-0337 X122
>
>
> On 6/9/2011 11:45 AM, Sam Clippinger wrote:
>> Remember that the "softlimit" program only limits the maximum amount of
>> memory a process can use; it doesn't dictate how much it *will* use.  It
>> was written as a last resort for stopping processes that were out of
>> control and leaking memory.  It's big flaw is that you never get a
>> simple "out of memory" error -- all you see are inexplicable bugs like
>> the one Ron has been battling because (in this case) OpenSSL can't
>> allocate a buffer or whatever.  Given the number of problems it seems to
>> create, I'd vote for simply removing it.
>>
>> -- Sam Clippinger
>>
>> On 6/9/11 10:28 AM, Eric Shubert wrote:
>>> Ron,
>>>
>>> Can you do a little testing and see what's adequate? I expect that 128M
>>> is a bit overkill. We'll need to get the QMT defaults bumped up a bit
>>> depending on your results.
>>>
>>> Thanks.
>>>
>>> On 06/09/2011 07:42 AM, ron wrote:
>>>
>>>> Ok, That seems to have done the trick. I received an email from the client.
>>>> I bumped it up to 128M.
>>>>
>>>> Thanks
>>>> Ron
>>>>
>>>> On 6/9/2011 10:12 AM, Sam Clippinger wrote:
>>>>
>>>>> 20M seems kinda low for "softlimit".  Try increasing the number to see
>>>>> if that makes a difference -- for example, add another zero (200M) and
>>>>> retest.  On my own server, "softlimit" is set to 80M.
>>>>>
>>>>> Don't forget to restart the service after making the change. :)
>>>>>
>>>>> -- Sam Clippinger
>>>>>
>>>>> On 6/9/11 7:13 AM, ron wrote:
>>>>>
>>>>>> OS is Centos 5.6
>>>>>> Linux kernel is 2.6.18-238.9.1.el5
>>>>>> Server is a DL380 G4
>>>>>> Centos runs under VMWare ESXi 4.0
>>>>>>
>>>>>> Here is the "run" file.
>>>>>>
>>>>>> #!/bin/sh
>>>>>> QMAILDUID=`id -u vpopmail`
>>>>>> NOFILESGID=`id -g vpopmail`
>>>>>> MAXSMTPD=`cat /var/qmail/control/concurrencyincoming`
>>>>>> SPAMDYKE="/usr/local/bin/spamdyke"
>>>>>> SPAMDYKE_CONF="/etc/spamdyke/spamdyke.conf"
>>>>>> SMTPD="/var/qmail/bin/qmail-smtpd"
>>>>>> TCP_CDB="/etc/tcprules.d/tcp.smtp.cdb"
>>>>>> HOSTNAME=`hostname`
>>>>>> VCHKPW="/home/vpopmail/bin/vchkpw"
>>>>>> REQUIRE_AUTH=0
>>>>>>
>>>>>> exec /usr/bin/softlimit -m 20000000 \
>>>>>>            /usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c 
>>>>>> "$MAXSMTPD" \
>>>>>>            -u "$QMAILDUID" -g "$NOFILESGID" 0 smtp \
>>>>>>            $SPAMDYKE --config-file $SPAMDYKE_CONF \
>>>>>>            $SMTPD $VCHKPW /bin/true 2>&1
>>>>>>
>>>>>> On 6/8/2011 4:50 PM, Sam Clippinger wrote:
>>>>>>
>>>>>>
>>>>>>> OK, I'll try to run back through this thread and respond to the various
>>>>>>> questions in one email...
>>>>>>>
>>>>>>> To turn off TLS in spamdyke, you can do one of several things.  You can
>>>>>>> prohibit both spamdyke and qmail from using TLS by using this option:
>>>>>>>            tls-level=none
>>>>>>> Or you can simply remove/comment out the tls-certificate-file option to
>>>>>>> allow spamdyke to pass encrypted traffic through to qmail.  That will
>>>>>>> bypass some of spamdyke's filters but would allow you to continue to
>>>>>>> receive encrypted email.
>>>>>>>
>>>>>>> spamdyke does not implement TLS or SSL on its own, it just calls the
>>>>>>> installed OpenSSL library for encryption/decryption as needed.  The
>>>>>>> version you have installed looks fine to me (my own server has 0.9.7f
>>>>>>> installed) and since TLS works with qmail, it should work with
>>>>>>> spamdyke.  From the headers you sent, it looks like the remote server is
>>>>>>> running Windows Server 2003, probably with Exchange 2003.  I correspond
>>>>>>> regularly with clients on that same setup (as you did before installing
>>>>>>> spamdyke), so I doubt the remote server is at fault.
>>>>>>>
>>>>>>> By default, spamdyke specifies the cipher list as "DEFAULT" (unless you
>>>>>>> override that with the "tls-cipher-list" option).  The meaning of
>>>>>>> "DEFAULT" depends on your version of OpenSSL and the way it was
>>>>>>> compiled.  Typically, it includes all of the usable ciphers that aren't
>>>>>>> known to be too weak or too computationally expensive.  See this page
>>>>>>> for more details:
>>>>>>>            http://www.openssl.org/docs/apps/ciphers.html#CIPHER_STRINGS
>>>>>>>
>>>>>>> Overall, I don't see anything wrong with your configuration file.  I'm
>>>>>>> curious to know what OS, version and architecture you're using.  My #1
>>>>>>> suspicion is that spamdyke is running out of memory.  Can you check your
>>>>>>> "run" file where the spamdyke command line is located and look for the
>>>>>>> "softlimit" command?  Try doubling/tripling that number and see if this
>>>>>>> problem persists (don't forget to restart tcpserver after you change the
>>>>>>> "run" file).
>>>>>>>            http://www.spamdyke.org/documentation/FAQ.html#TROUBLE9
>>>>>>>
>>>>>>> -- Sam Clippinger
>>>>>>>
>>>>>>> On 6/8/11 3:03 PM, Eric Shubert wrote:
>>>>>>>
>>>>>>>
>>>>>>>> The first cipher listed is the same one that qmail used with a
>>>>>>>> successful transmission.
>>>>>>>>
>>>>>>>> Looks to me from all of this that there is a bug in spamdyke with
>>>>>>>> regards to that particular remote server software and TLS.
>>>>>>>>
>>>>>>>> I think this is the point where Sam can best continue helping to debug
>>>>>>>> this situation.
>>>>>>>>
>>>>>>>> Sam?
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> spamdyke-users mailing list
>>>>>>> spamdyke-users@spamdyke.org
>>>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>> _______________________________________________
>>>>>> spamdyke-users mailing list
>>>>>> spamdyke-users@spamdyke.org
>>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>>
>>>>>>
>>>>> _______________________________________________
>>>>> spamdyke-users mailing list
>>>>> spamdyke-users@spamdyke.org
>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>
>>>>>
>>>>>
>>>
>> _______________________________________________
>> spamdyke-users mailing list
>> spamdyke-users@spamdyke.org
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>
>>
>
>
> _______________________________________________
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users


_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to