Spamd
RW
rwmaillists at googlemail.com
Thu Apr 3 13:16:51 UTC 2014
On Thu, 03 Apr 2014 14:48:25 +0200
Jos Chrispijn wrote:
>
> Sergey V. Dyatko:
> > use `sockstat -l4 -p783` instead. It show you what user-command-pid
> > listen that port
>
> USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN
> ADDRESS root perl 1404 5 tcp4 127.0.0.1:783 *:*
> root perl 1403 5 tcp4 127.0.0.1:783 *:*
> root perl 1402 5 tcp4 127.0.0.1:783 *:*
>
> Is this Perl itself or is this a program that uses Perl for this port?
It'll be the spamassassin master process and default of two children.
By the look of it the rc.d script couldn't find a spamassassin perl
process that matched the PID in the pid file so couldn't shut the old
version down before starting the new. This is commonly because the pid
file isn't writeable, but using port 783 implies that it started as
root.
Check that the current pid file contains a correct value.
More information about the freebsd-ports
mailing list