Spamd

RW rwmaillists at googlemail.com
Thu Apr 3 13:16:51 UTC 2014


On Thu, 03 Apr 2014 14:48:25 +0200
Jos Chrispijn wrote:

> 
> Sergey V. Dyatko:
> > use `sockstat -l4 -p783` instead. It show you what user-command-pid 
> > listen that port
> 
> USER     COMMAND    PID   FD PROTO  LOCAL ADDRESS         FOREIGN
> ADDRESS root     perl       1404  5  tcp4   127.0.0.1:783         *:*
> root     perl       1403  5  tcp4   127.0.0.1:783         *:*
> root     perl       1402  5  tcp4   127.0.0.1:783         *:*
> 
> Is this Perl itself or is this a program that uses Perl for this port?

It'll be  the spamassassin master process and default of two children.

By the look of it the rc.d script couldn't find a spamassassin perl
process that matched the PID in the pid file so couldn't shut the old
version down before starting the new. This is commonly because the pid
file isn't writeable, but using port 783 implies that it started as
root.

Check that the current pid file contains a correct value.  


More information about the freebsd-ports mailing list