Skip to content
Snippets Groups Projects
  1. Feb 17, 2021
  2. Feb 16, 2021
  3. Feb 15, 2021
    • Deucе's avatar
      Less tired. · 0a5d7f7b
      Deucе authored
      0a5d7f7b
    • Deucе's avatar
      Less tired. · 7b82202f
      Deucе authored
      7b82202f
    • Deucе's avatar
      Parse redirects the easy way. · ae6c104e
      Deucе authored
      I'm not sure what echicken was trying here, but apparently it doesn't
      work for nelgin.
      
      Likely fixes #220.
      ae6c104e
    • Deucе's avatar
      Parse redirects the easy way. · 45fd834a
      Deucе authored
      I'm not sure what echicken was trying here, but apparently it doesn't
      work for nelgin.
      
      Likely fixes #220.
      45fd834a
    • Rob Swindell's avatar
      Merge branch 'mlong/xtrnfeb2' into 'master' · b39fe502
      Rob Swindell authored
      3rd party external doors - exitilus, jibben, jns
      
      See merge request !110
      b39fe502
    • Rob Swindell's avatar
      Merge branch 'mlong/xtrnfeb2' into 'master' · 6d07aa75
      Rob Swindell authored
      3rd party external doors - exitilus, jibben, jns
      
      See merge request !110
      6d07aa75
    • Kayz's avatar
      3rd party external doors - exitilus, jibben, jns · e9d27708
      Kayz authored and Rob Swindell's avatar Rob Swindell committed
      e9d27708
    • Kayz's avatar
      3rd party external doors - exitilus, jibben, jns · 82de1ba1
      Kayz authored and Rob Swindell's avatar Rob Swindell committed
      82de1ba1
    • Rob Swindell's avatar
      If finger doesn't return a valid JSON object, log the returned string(s) · 8b8b699f
      Rob Swindell authored
      ... instead of the JSON parse exception as reported via IRC:
      <matjam> !finger ?bbs:Stupendous BBS@vert.synchro.net result: SyntaxError: JSON.parse
      8b8b699f
    • Rob Swindell's avatar
      If finger doesn't return a valid JSON object, log the returned string(s) · 56faa80d
      Rob Swindell authored
      ... instead of the JSON parse exception as reported via IRC:
      <matjam> !finger ?bbs:Stupendous BBS@vert.synchro.net result: SyntaxError: JSON.parse
      56faa80d
    • Rob Swindell's avatar
      Document new [ftp] ALLOW_BOUNCE option · 3b67f826
      Rob Swindell authored
      3b67f826
    • Rob Swindell's avatar
      Document new [ftp] ALLOW_BOUNCE option · 26875019
      Rob Swindell authored
      26875019
    • Rob Swindell's avatar
      Disable FTP Bounce (FXP) support by default · f803b7bc
      Rob Swindell authored
      The Synchronet FTP server has (since 2001) disallowed PORT/EPRT/LPRT commands with a "reserved" port number (i.e. < 1024) as recommended by RFC2577 and when attempted, would log a "SUSPECTED FTP BOUNCE HACK ATTEMPT" in the data/hack.log file.
      
      However, as Karloch (HISPAMSX) pointed out recently, an FTP Bounce Attack to other TCP ports was still possible (and detected/reported by some security scans as a potential vulnerability).
      
      So, reject all PORT/EPRT/LPRT commands that specify an IP address other than that used for the control TCP connection unless the sysop specifically enables the new "ALLOW_BOUNCE" option flag (in the [ftp] section of sbbs.ini) and the user is an authenticated non-guest/anonymous user. And as before, log the attempt as a suspected hack attempt.
      
      This change also removes the "Directory File Access" checkbox from the Synchronet Control Panel for Windows as that feature is "going away" soon (or at least, it won't be an FTP-specific option/feature if it remains).
      f803b7bc
    • Rob Swindell's avatar
      Disable FTP Bounce (FXP) support by default · 883ea5b8
      Rob Swindell authored
      The Synchronet FTP server has (since 2001) disallowed PORT/EPRT/LPRT commands with a "reserved" port number (i.e. < 1024) as recommended by RFC2577 and when attempted, would log a "SUSPECTED FTP BOUNCE HACK ATTEMPT" in the data/hack.log file.
      
      However, as Karloch (HISPAMSX) pointed out recently, an FTP Bounce Attack to other TCP ports was still possible (and detected/reported by some security scans as a potential vulnerability).
      
      So, reject all PORT/EPRT/LPRT commands that specify an IP address other than that used for the control TCP connection unless the sysop specifically enables the new "ALLOW_BOUNCE" option flag (in the [ftp] section of sbbs.ini) and the user is an authenticated non-guest/anonymous user. And as before, log the attempt as a suspected hack attempt.
      
      This change also removes the "Directory File Access" checkbox from the Synchronet Control Panel for Windows as that feature is "going away" soon (or at least, it won't be an FTP-specific option/feature if it remains).
      883ea5b8
    • Rob Swindell's avatar
      Address more Coverity issues · 141e01bf
      Rob Swindell authored
      Reverted the SAFECOPY() NULL source-pointer magic "(null)" string thing as that caused a different Coverity issue. Explicitly check for NULL at the call-sites instead.
      141e01bf
    • Rob Swindell's avatar
      Address more Coverity issues · dd000f6e
      Rob Swindell authored
      Reverted the SAFECOPY() NULL source-pointer magic "(null)" string thing as that caused a different Coverity issue. Explicitly check for NULL at the call-sites instead.
      dd000f6e
Loading