[Info-vax] TCPIP tying up system

Jan-Erik Soderholm jan-erik.soderholm at telia.com
Sun Nov 28 11:39:38 EST 2010


On 2010-11-28 17:26, JF Mezei wrote:
> Richard B. Gilbert wrote:
>
>>>> 24060604 TCPIP$SMT_BG416 COM     11      152   0 00:00:18.90      3233    240  N
>
>> It would be a lot of work, but you could identify the addresses sending
>> the junk and block them.  Or, you might try using an ISP such as Comcast
>> that blocks 99.44% of the crud.
>
> I do not think that the SMTP receiver creates processes with the above
> names. But I am not sure.
>
> I had my smtp service limit set to 3.
>
> BTW, one way to find out is to
>
> SHOW PROC/CONT/ID=24060604  This will give you the image being executed.
>
>

SHOW SYSTEM/IAMGES will get you all currently executing images in
one listing, at least on a 8.2/8.3 system. I've no idea if that
is/was available on 7.x.

On my system, receving a mail creates :

0000165C TCPIP$S_BG43319 LEF  8  392 0 00:00:00.14   991  543  N
          DSA10:[SYS0.SYSCOMMON.][SYSEXE]TCPIP$SMTP_RECEIVER.EXE

So, yes, I think the TCPIP$SMT_BG416 above at least *can* be
a SMTP process.

The length of the "S" or "SMT" part is probably depending on
the length of the BG416 or BG43319 part.





More information about the Info-vax mailing list