On Thu, 2009-09-03 at 18:36 +0100, gyre wrote: > I've used wireshark to capture an example session of this happening when 2 > spam messages arrive, in the hope that somebody wiser than I can work out > what is going wrong, and where.
Was this captured between client <-> spampal or spampal <-> dovecot? I'd guess the first? It looks like spampal breaks the traffic: * 1158 FETCH (UID 1160 FLAGS (\Seen)) * 1159 FETCH (U ID 1161 FLAGS (\Seen)) * 1160 FETCH (UID 1162 FLAGS (\Seen)) It inserts an extra linefeed in the middle of FETCH responses. Another bug in it is that it ends all lines with CR+CR+LF instead of CR+LF.
signature.asc
Description: This is a digitally signed message part