- Sep 09, 2003
-
-
rswindell authored
is currently locked (for packing).
-
- Sep 05, 2003
-
-
rswindell authored
Fixed bug in dns_blacklisted() - can't use SAFECOPY on char*. Resets DNSBL-lookup result between messages if IP was found in received hdr. Beginning to implement QWKnet routing upstream (through QWKnet hub).
-
deuce authored
DNSBL_CHECK_ALL
-
rswindell authored
messages for received SMTP mail (for all users).
-
- Sep 04, 2003
- Sep 02, 2003
-
-
deuce authored
to track down the issue, I finally gave up... as a result, there is a new feature! Linux will no longer completely drop it's root privs (It never really did anyways, and you couldn't possibly make it... but now it does so even less) As a result, Linux can now recycle all servers when running as non-root. From a security standpoint, doing this is more secure than running as root, but less secure than the behaviour on POSIX.4 compliant pthreads. Running the BBS as root means that if a user can create a file with the name of his choice, or pass *any* command through to a shell, that user will get root access to the machine. Using the new behaviour, the user would need to trick the Synchronet binary itself into executing arbitrary and specially crafted code... probobly using the dreaded buffer overflow... of which there are probobly some in the web server code. :-) If the user can do this much more tricky feat, then the user gets root privs. If not, the user will have to find something else to exploit on your system. Knowing that some *BSD users (surely not OpenBSD users though) will want to trade security for convenience, I stole a page out of the Sendmail book and implemented a "DONT_BLAME_SYNCHRONET" make option. Compiling like this: gmake DONT_BLAME_SYNCHRONET=1 Will implement this same behaviour on non-Linux platforms. Allowing this partial security feature.
-
- Aug 30, 2003
- Aug 20, 2003
- Aug 12, 2003
-
-
rswindell authored
tagging, ignoring, or reporting "bad user". (DNSBL-based "session refusal" occurs before SMTP authentication can take place)
-
- Jul 30, 2003
-
-
rswindell authored
-
- Jul 25, 2003
- Jul 21, 2003
-
-
rswindell authored
-
- Jul 13, 2003
-
-
rswindell authored
-
- Jul 12, 2003
-
-
rswindell authored
Updated spam.log entry for spam bait captures.
-
- Jul 10, 2003
-
-
rswindell authored
-
- Jul 09, 2003
- Jun 13, 2003
-
-
rswindell authored
spammer technique involves embedding a carriage return character in the MAIL FROM address.
-
- Jun 12, 2003
-
-
rswindell authored
-
- Jun 07, 2003
-
-
rswindell authored
destruction.
-
rswindell authored
-
rswindell authored
Added semaphore file check frequency (sem_chk_freq) element to all server startup structures (previously hard-coded to 2 seconds in most cases), defaults to 5 seconds. New SemFileCheckFrequency value in .ini file (both global and per-server).
-
- May 17, 2003
-
-
rswindell authored
there's a malloc error. smb_copymsgmem() now checks the total_dfields and total_hfields values before attempting to malloc 0-bytes (corrupted message header). smb_copymsgmem() now mallocs an extra byte for a NULL terminator for header field data (hfield_dat), and initializes to 0.
-
- May 09, 2003
- May 07, 2003
-
-
deuce authored
-
- Apr 30, 2003
-
-
rswindell authored
-
- Apr 29, 2003
-
-
rswindell authored
-
- Apr 28, 2003
-
-
rswindell authored
-
- Apr 14, 2003
- Apr 09, 2003
-
-
rswindell authored
any base64 encode/decode.
-