[Mimedefang] Re: Mimedefang sending huge return via socketmap
Steffen Kaiser
skmimedefang at smail.inf.fh-bonn-rhein-sieg.de
Fri Apr 25 05:22:57 EDT 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Fri, 25 Apr 2008, Michiel Brandenburg wrote:
> Have you been able to learn more about this problem or solved it in another
> way ? I look forward to hearing your experiences on the problem.
Unfortunately not. On the other hand, I have now implemented another demon
(in Perl), which is probably better than to spread it over several
instances of MIMEDefang slaves, as it would hook much memory. The downside
is that I got the impression that the server slowed down sendmail because
it does not react as fast as the mimedefang multiplexor / perl combo.
The MIMEDefang-way also ahs the very advantage that there is already a
nice framework for re-start the server and overcome memory leaks by
killing the slaves now and then.
I never got a response from Dave at roaring pengiun looking into the issue.
Regards,
- --
Steffen Kaiser
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFIEaLy5ThHZhj8SBwRAjgHAJ4jWBhrqU2tt+857fT6Hsud9RHuoQCdHP7w
/ofDYCacG9PUI1A2Y+ML+n4=
=+IFh
-----END PGP SIGNATURE-----
More information about the MIMEDefang
mailing list