I see others have had this error when bringing up the web interface,
but I have not found the fix.
Any ideas how to resolve this? Running 2.1 on Centos 6.5 / Apache URL: BARUWA MAILFW has detected a possible fraud attempt from "relay-4.lctn.org" claiming to be http://host.domain/jsi18n.js
Module weberror.errormiddleware:162
in
__call__ <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
app_iter = self.application(environ, sr_checker)
Module repoze.who.middleware:107
in
__call__ <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
app_iter = app(environ, wrapper.wrap_start_response)
Module beaker.middleware:155
in
__call__ <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
return self.wrap_app(environ, session_start_response)
Module routes.middleware:131
in
__call__ <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
response = self.app(environ, start_response)
Module pylons.wsgiapp:103
in
__call__ <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
response = self.dispatch(controller, environ, start_response)
Module pylons.wsgiapp:313
in
dispatch <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
return controller(environ, start_response)
Module baruwa.lib.base:93
in
__call__ <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
return WSGIController.__call__(self,
environ, start_response)
Module pylons.controllers.core:214
in
__call__ <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
response = self._dispatch_call()
Module pylons.controllers.core:164
in
_dispatch_call <a
onclick="return switch_source(this, 'short')"
class="switch_source"
href="imap://admin%40lctn%2Eorg@mail.lctn.org:143/fetch%3EUID%3E/INBOX%3E1000783#">>>
response = self._inspect_call(func)
-- Raymond Norton LCTN 952.955.7766 _______________________________________________ http://pledgie.com/campaigns/12056 |
I patched mine by defining a static path to the .js. Have to pull my patch up when I get back to the office.
-- Jeremy McSpadden Flux Labs | http://www.fluxlabs.net | Endless Solutions Office : <a href="tel:850-250-5590;501">850-250-5590x501 | Cell : <a href="tel:850-890-2543">850-890-2543 | Fax : <a href="tel:850-254-2955">850-254-2955
_______________________________________________ http://pledgie.com/campaigns/12056 |
Find the patch?
On 12/11/2014 03:26 PM, Jeremy
McSpadden wrote:
_______________________________________________ http://pledgie.com/campaigns/12056 |
Jeremy, can you be of any help with this issue?
Much appreciated. On 12/12/2014 07:48 AM, Raymond Norton
wrote:
Find the patch? -- Raymond Norton LCTN 952.955.7766 _______________________________________________ http://pledgie.com/campaigns/12056 |
Free forum by Nabble | Edit this page |