Problem with tika

2020-03-06 Thread Arjen Heidinga
Hello all,

For some time now we've bin using solr as a search engine (working
great). I have added tika for searching inside documents, however it
keeps crashing when indexing. When just indexing mails that arrive works
good, but a reindex on all mail constantly crashes with below stacktrace.

When I observe the packets with wireshark I see a HTTP-flow going to
tika and suddenly, midway a document dovecot (or the server) sends a
RST. Sometimes after thousands of documents, sometimes after a few.
Usually after a few hundred.

It appears there are less errors using http than https.



Relevant config:

OS: CentOS6, fully updated

plugin {
  fts = solr
  batch_size = 1
  fts_solr =
url=https://username:passw...@solr-01.vevida.net:443/solr/dovecot/
  #fts_tika = https://solr-01.vevida.net:443/tika/
  batch_size = 1000
  fts_autoindex=yes
  soft_commit=no
}

# dovecot --version
2.3.9.3 (9f41b88fa)

# Configure options:

    --docdir=%{_docdir}/dovecot  \
    --disable-static \
    --with-nss   \
    --with-shadow    \
    --with-pam   \
    --with-gssapi=plugin \
    --with-ldap=plugin   \
    --with-sql=plugin    \
    --with-pgsql \
    --with-sqlite    \
    --with-zlib  \
    --with-bzlib \
    --with-lzma  \
    --with-libcap    \
    --with-ssl=openssl   \
    --with-ssldir=%{ssldir}  \
    --with-solr  \
    --with-docs

# It is compiled agains the latest openssl

# Tika and Solr: Both latest versions.

#Stacktrace:

doveadm(i...@samenmetrenske.nl): Info: Sent: Caching mails seq=1..161

doveadm(i...@samenmetrenske.nl): Panic: file http-client-request.c: line
1173 (http_client_request_send_more): assertion failed:
(req->payload_input != NULL)

doveadm(info@xxx.x): Error: Raw backtrace:
/usr/lib64/dovecot/libdovecot.so.0(backtrace_append+0x2f)
[0x7f95d805acbf] ->
/usr/lib64/dovecot/libdovecot.so.0(backtrace_get+0x26) [0x7f95d805add6]
-> /usr/lib64/dovecot/libdovecot.so.0(+0xe90ba) [0x7f95d80660ba] ->
/usr/lib64/dovecot/libdovecot.so.0(+0xe9161) [0x7f95d8066161] ->
/usr/lib64/dovecot/libdovecot.so.0(+0x41158) [0x7f95d7fbe158] ->
/usr/lib64/dovecot/libdovecot.so.0(http_client_request_send_more+0x424)
[0x7f95d8005094] ->
/usr/lib64/dovecot/libdovecot.so.0(http_client_connection_output+0x11a)
[0x7f95d800a24a] ->
/usr/lib64/dovecot/libssl_iostream_openssl.so(+0x8f6a) [0x7f95d57a2f6a]
-> /usr/lib64/dovecot/libdovecot.so.0(+0x114483) [0x7f95d8091483] ->
/usr/lib64/dovecot/libdovecot.so.0(io_loop_call_io+0x61)
[0x7f95d807e581] ->
/usr/lib64/dovecot/libdovecot.so.0(io_loop_handler_run_internal+0xdc)
[0x7f95d808076c] ->
/usr/lib64/dovecot/libdovecot.so.0(io_loop_handler_run+0x5c)
[0x7f95d807e67c] -> /usr/lib64/dovecot/libdovecot.so.0(io_loop_run+0x38)
[0x7f95d807e8c8] -> /usr/lib64/dovecot/libdovecot.so.0(+0x89105)
[0x7f95d8006105] ->
/usr/lib64/dovecot/libdovecot.so.0(http_client_request_send_payload+0x1f)
[0x7f95d80063cf] -> /usr/lib64/dovecot/lib20_fts_plugin.so(+0xd31d)
[0x7f95d6ad931d] ->
/usr/lib64/dovecot/lib20_fts_plugin.so(fts_parser_more+0x1a)
[0x7f95d6ad83ca] ->
/usr/lib64/dovecot/lib20_fts_plugin.so(fts_build_mail+0x761)
[0x7f95d6ad6401] -> /usr/lib64/dovecot/lib20_fts_plugin.so(+0x114ca)
[0x7f95d6add4ca] ->
/usr/lib64/dovecot/libdovecot-storage.so.0(mail_precache+0x2a)
[0x7f95d835ab4a] -> doveadm(+0x31e75) [0x55e7c1052e75] ->
doveadm(+0x321fb) [0x55e7c10531fb] -> doveadm(+0x2c321) [0x55e7c104d321]
-> doveadm(+0x2c577) [0x55e7c104d577] ->
doveadm(doveadm_cmd_ver2_to_mail_cmd_wrapper+0x1e8) [0x55e7c104ec38] ->
doveadm(doveadm_cmd_run_ver2+0x52e) [0x55e7c105fafe] ->
doveadm(doveadm_cmd_try_run_ver2+0x37) [0x55e7c105fb97] ->
doveadm(main+0x21a) [0x55e7c1062aca] ->
/lib64/libc.so.6(__libc_start_main+0x100) [0x7f95d7983d20] ->
doveadm(+0x1c479) [0x55e7c103d479]



signature.asc
Description: OpenPGP digital signature


Dovecot v2.3.10 Released

2020-03-06 Thread Aki Tuomi
We are pleased to release v2.3.10 of Dovecot. Please find it from
locations below:

https://dovecot.org/releases/2.3/dovecot-2.3.10.tar.gz
https://dovecot.org/releases/2.3/dovecot-2.3.10.tar.gz.sig
Binary packages in https://repo.dovecot.org/
Docker images in https://hub.docker.com/r/dovecot/dovecot

Aki Tuomi
Open-Xchange oy

---

* Disable retpoline migitations by default. These can cause severe
  performance regressions, so they should be only enabled when
  applicable.
* IMAP MOVE now commits transactions in batches of 1000 mails. This
  helps especially with lazy_expunge when moving a lot of mails. It
  mainly avoids situations where multiple IMAP sessions are running the
  same MOVE command and duplicating the mails in the lazy_expunge folder.
  With this change there can still be some duplication, but the MOVE
  always progresses forward. Also if the MOVE fails at some point, the
  changes up to the last 1000 mails are still committed instead of
  rolled back. Note that the COPY command behavior hasn't changed,
  because it is required by IMAP standard to be an atomic operation.
* IMAP EXPUNGE and CLOSE now expunges mails in batches of 1000 mails.
  This helps especially with lazy_expunge when expunging a lot of mails
  (e.g. millions) to make sure that the progress always moves forward
  even if the process is killed.
* Autoexpunging now expunges mails in batches of 1000 mails. This helps
  especially with lazy_expunge when expunging a lot of mails
  (e.g. millions) to make sure that the progress always moves forward
  even if the process is killed.
+ Add tool for generating sysreport called dovecot-sysreport.
  This generates a bundle of information usually needed for support
  requests.
+ Add support for the new IMAP \Important SPECIAL-USE flag (RFC 8457).
+ Add metric { group_by } setting. This allows automatically creating
  new metrics based on the fields you want to group statistics by.
  NOTE: This feature is considered experimental and syntax is subject
  to change in future release.
+ auth: Support SCRAM-SHA-256 authentication mechanism.
+ imap: Support the new IMAP STATUS=SIZE extension.
+ Use TCP_QUICKACK to reduce latency for some TCP connections.
+ quota-status: Made the service more robust against erroneous use with
  Postfix ACL policies other than smtpd_recipient_restrictions.
+ Add "revision" field support to imap_id_send setting. Using
  "revision *" will send in IMAP ID command response the short commit
  hash of the Dovecot git source tree HEAD (same as in dovecot --version).
+ IMAP ENVELOPE includes now all addresses when there are multiple
  headers (From, To, Cc, etc.) The standard way of having multiple
  addresses is to just list them all in a single header. It's
  non-standard to have multiple headers. However, since MTAs allow these
  mails to pass through and different software may handle them in
  different ways, it's better from security point of view to show all
  the addresses.
+ Event filters now support using "field_name=" to match a field that
  doesn't exist or has an empty value. For example use "error=" to match
  only events that didn't fail.
- acl: INBOX ACLs shouldn't apply for IMAP GETMETADATA/SETMETADATA
  commands.
- cassandra: CASS_ERROR_SERVER_WRITE_FAILURE error should also be
  treated as "uncertain write failure".
- dict-redis: Using quota_clone configured with dict-redis could have
  crashed when Redis responded slowly.
- imap-hibernate: Communication trouble with imap-master leads to
  segfault.
- imap-hibernate: Unhibernation retrying wasn't working.
- imap: Fixed auth lookup privilege problem when imap process was reused
  and user was being un-hibernated.
- Fix potential crash when copying/moving mails within the same folder.
  This happened only when there were a lot of fields in dovecot.index.cache.
- lib-index: Recreating dovecot.index.cache file could have crashed when
  merging bitmask fields.
- lib-index: Using public/shared folders with INDEXPVT configured to use
  private \Seen flags, trying to search seen/unseen in an empty folder
  crashes with segfault.
- lib-mail: Large base64-encoded mails weren't decoded properly.
  This could have affected searching/indexing mails and message snippet
  generation.
- lib-mail: Message with only quoted text could have caused message
  snippet to ignore its 200 character limit and return the entire
  message. This was added also to dovecot.index.cache file, which
  increased disk space and memory usage unnecessarily.
  v2.3.9.2 regression (previous versions cached the quoted snippet as
  empty). In a large mail quoted text could have become wrongly added
  to the snippet, possibly mixed together with non-quoted text.
- lib-smtp: client could have assert-crashed if STARTTLS handshake
  finished earlier than usually.
- lib-ssl-iostream: remove -static flag for lib-ssl-iostream linking to
  prevent a compile issue.
- lib-storage: Mailbox synchronization may have assert-crashed in some
  rare situations.

Pigeonhole v0.5.10 Released

2020-03-06 Thread Aki Tuomi
We are doing a pigeonhole 0.5.10 release to maintain version number
parity with dovecot.
You can download it from locations below:

https://pigeonhole.dovecot.org/releases/2.3/dovecot-2.3-pigeonhole-0.5.10.tar.gz
https://pigeonhole.dovecot.org/releases/2.3/dovecot-2.3-pigeonhole-0.5.10.tar.gz.sig
Binary packages in https://repo.dovecot.org/
Docker images in https://hub.docker.com/r/dovecot/dovecot

There are no other changes than version number.

---

Aki Tuomi
Open-Xchange oy



signature.asc
Description: OpenPGP digital signature


Re: Dovecot - spam training through Outlook

2020-03-06 Thread Claudius
On 05.03.2020 17:50, Jerry wrote:
> Again, these are obsoleted versions of MS Outlook. The latest official
> release is the 2019 version. I am actually using the beta version, but
> I doubt that it would make much difference. I would highly recommend
> updating to the latest version and then retrying the script. If it still
> fails, then file a bug report.
>
> I actually read the posts in the link you supplied. The last post was
> in regards to Outlook 2013, and it is nearly three years old.
> Complaining about the the operation of an old version is like beating a
> dead horse.
>
Did you verify that the issue is gone in the new version or are you just
pitching Outlook to me?

As I said we don't use it anymore. Last I saw this issue hasn't been
resolved in any recent Outlook version.

Also Outlook 2013 is still supported until 2023 so I don't know what you
are complaining about people complaining.

>Good luck.

Thanks, same to you.




Re: Dovecot v2.3.10 Released

2020-03-06 Thread Aki Tuomi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256


> On 06/03/2020 12:53 Aki Tuomi  wrote:
>
>
> We are pleased to release v2.3.10 of Dovecot. Please find it from
> locations below:
>
> https://dovecot.org/releases/2.3/dovecot-2.3.10.tar.gz
> https://dovecot.org/releases/2.3/dovecot-2.3.10.tar.gz.sig
> Binary packages in https://repo.dovecot.org/
> Docker images in https://hub.docker.com/r/dovecot/dovecot
>
> Aki Tuomi
> Open-Xchange oy
>
> ---
>

We forgot this from the NEWS:

- fts-solr: The XML response parser fails to parse large/chunked responses 
correctly. This leads to spurious parse errors, most notably: "Error: fts_solr: 
received invalid uid '0'".

Aki

-BEGIN PGP SIGNATURE-
Version: BCPG v1.62

iQEcBAABCgAGBQJeYmbVAAoJEBk7Y2OzREIGY8kH/0IaPC6r2X0WK8SgFE68q+Ti
8fyrXnJCNUguKO6xfU9oDfPswJ/ylzhIarMRR/A9OsC+o6C0uV9LQcRhXEz3qdVh
F8afqiJB7pF6sq8G166ol8pGSPEBx21+r99SW33vwJdzFpHYQRod6iqomPZoaNCT
y6Rrx+O/9PK849j7SiM+Fhs+f7mbmA2dpZow0A4bG9VQ8fgieI39raJwx3KMeHgh
Jq7vfOvacD114dPv8vI+p9BafjmfO81oRoVsxz+hDTiL5TW7AvNy2Q+kBlI4W/mf
2eYUNS5Yjoxv3TfnzlkIRJ7P+dKBEArfDm3wE3JTZUKY7BQpMJmvvKIVf/1mIow=
=rTq6
-END PGP SIGNATURE-


Updated Roadmap for Dovecot?

2020-03-06 Thread Tanstaafl
Hello,

Just wanted to go take a peek at the latest Roadmap for dovecot, and
note that the current wiki page is flagged as obsolete:

https://wiki.dovecot.org/Roadmap

Is there an updated version somewhere?

I'm interested in the list of new features being worked on - especially
JMAP support - and a rough idea of when said features might be expected
to make it into a release.

Thanks!


Re: Dovecot - spam training through Outlook

2020-03-06 Thread Jerry
On Fri, 6 Mar 2020 14:23:09 +0100, Claudius stated:
>On 05.03.2020 17:50, Jerry wrote:
>> Again, these are obsoleted versions of MS Outlook. The latest
>> official release is the 2019 version. I am actually using the beta
>> version, but I doubt that it would make much difference. I would
>> highly recommend updating to the latest version and then retrying
>> the script. If it still fails, then file a bug report.
>>
>> I actually read the posts in the link you supplied. The last post was
>> in regards to Outlook 2013, and it is nearly three years old.
>> Complaining about the the operation of an old version is like
>> beating a dead horse.
>>  
>Did you verify that the issue is gone in the new version or are you
>just pitching Outlook to me?

Actually, I have the beta version of Outlook. However, since I don't
use it in the same manner as you do, I obviously have not proof either
way as 6to its behavior.

Microsoft maintains several chat forums that offer advice. I have used
several of them myself. Your question might best be asked, and hopefully
answered there.

>As I said we don't use it anymore. Last I saw this issue hasn't been
>resolved in any recent Outlook version.
>
>Also Outlook 2013 is still supported until 2023 so I don't know what
>you are complaining about people complaining.

I am not complaining, just pointing out that it is by no means current.
Microsoft, as well as many other software authors, rarely back-ports a
non-security feature unless it is a real show-stopper. This obviously
is not.

>>Good luck.  
>
>Thanks, same to you.

-- 
Jerry




pgpGUC95BLB_p.pgp
Description: OpenPGP digital signature