[Mimedefang] Re: Mimedefang sending huge return via socketmap

Steffen Kaiser skmimedefang at smail.inf.fh-bonn-rhein-sieg.de
Fri Apr 25 05:22:57 EDT 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Fri, 25 Apr 2008, Michiel Brandenburg wrote:

> Have you been able to learn more about this problem or solved it in another 
> way ?  I look forward to hearing your experiences on the problem.

Unfortunately not. On the other hand, I have now implemented another demon 
(in Perl), which is probably better than to spread it over several 
instances of MIMEDefang slaves, as it would hook much memory. The downside 
is that I got the impression that the server slowed down sendmail because 
it does not react as fast as the mimedefang multiplexor / perl combo.

The MIMEDefang-way also ahs the very advantage that there is already a 
nice framework for re-start the server and overcome memory leaks by 
killing the slaves now and then.

I never got a response from Dave at roaring pengiun looking into the issue.

Regards,

- -- 
Steffen Kaiser
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIEaLy5ThHZhj8SBwRAjgHAJ4jWBhrqU2tt+857fT6Hsud9RHuoQCdHP7w
/ofDYCacG9PUI1A2Y+ML+n4=
=+IFh
-----END PGP SIGNATURE-----



More information about the MIMEDefang mailing list