On Thu, 2009-09-03 at 18:36 +0100, gyre wrote:
> I've used wireshark to capture an example session of this happening when 2
> spam messages arrive, in the hope that somebody wiser than I can work out
> what is going wrong, and where.

Was this captured between client <-> spampal or spampal <-> dovecot? I'd
guess the first? It looks like spampal breaks the traffic:

* 1158 FETCH (UID 1160 FLAGS (\Seen))
* 1159 FETCH (U
ID 1161 FLAGS (\Seen))
* 1160 FETCH (UID 1162 FLAGS (\Seen))

It inserts an extra linefeed in the middle of FETCH responses. Another
bug in it is that it ends all lines with CR+CR+LF instead of CR+LF.

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to