Skip to content
Snippets Groups Projects
  1. May 15, 2021
  2. Apr 12, 2021
  3. Apr 04, 2021
    • Rob Swindell's avatar
      A poll() failure with EINTR does not mean a socket is closed. · 925e3b0a
      Rob Swindell authored
      This won't impact Synchronet as it has a separate signal handling
      thread, but we still need to behave properly for processes that
      don't.  I'm also saying that ENOMEM does not indicate a disconnection,
      though it may be better to pretend it was disconnected...
      925e3b0a
  4. Mar 30, 2021
  5. Mar 21, 2021
  6. Mar 20, 2021
    • Deucе's avatar
      Add support for MinGW-w64 · 31c717f9
      Deucе authored
      MinGW32 is getting long in the tooth and is missing a lot of modern
      Windows features as well as having broken headers.  Most people will
      be using MinGW-w64 at this point, so add support for it.  Once I
      ensure SyncTERM works properly with it, MinGW32 support will be
      discontinued.
      
      I suspect this will impact exactly zero people since the reason this
      exists is to build the Win32 versions of SyncTERM on FreeBSD.
      
      Changes:
      - Explicitly request 32-bit Windows output
      - Detect the string "mingw32" anywhere in the hardware description
      - Explicitly link with libuuid
      - Add a terrible hack to syncterm.c to block wincrypt.h
      31c717f9
  7. Mar 16, 2021
    • Deucе's avatar
      Add support for the SSH "none" auth method. · 0c6d0425
      Deucе authored
      This is used by some BBSs to enable encryption without needing to
      integrate the BBS user base into their SSH server (and presumably
      so they don't need to run multiple SSH servers).  All users log in
      with the same username (ie: "bbs") and no password is requested or
      required.
      
      Once the BBS starts, it prompts for the BBS user name and password
      as normal.
      
      In SyncTERM, the user/password/syspass fields are redefined as
      SSHuser/BBSuser/BBSpassword and they are moved around when you
      change the connection type.  This means that if you change a listing
      that has a syspass to SSH (no auth) and back, the syspass is lost.
      
      I'm not sure if I plan to fix this or not.
      0c6d0425
    • Deucе's avatar
      Fix indentation warning from Clang in JS header · aed2ed2a
      Deucе authored
      It would be fine if this only warned while building JS, we're used
      to ignoring that, but this bugger warns while building Synchronet
      stuff.
      aed2ed2a
  8. Mar 15, 2021
  9. Mar 14, 2021
  10. Mar 13, 2021
  11. Jan 26, 2021
    • Deucе's avatar
      Allow PKCS#12 import/export. · 4aeda52d
      Deucе authored
      While PKCS#12 export likely works "fine", PKCS#12 import almost
      certainly doesn't.  Cryptlib supports a basic strict PKCS#12 read,
      while OpenSSL used wild and crazy extensions.
      4aeda52d
  12. Jan 24, 2021
  13. Dec 19, 2020
  14. Oct 03, 2020
  15. Aug 16, 2020
  16. May 02, 2020
  17. May 01, 2020
  18. Apr 29, 2020
  19. Apr 15, 2020
    • rswindell's avatar
      Updated patched v3.4.5 Cryptlib for Win32: · 762cb2b5
      rswindell authored
      So Deuce spent a lot of effort creating patches to the original Cryptlib v3.4.5
      source files to tune cipher-suite selections/priorities to make modern SSH
      clients (e.g. OpenSSH v7.6) and HTTPS/TLS browsers or security-checking
      software happy. See the current list of 3rdp/build/cl-*.patch files for details.
      762cb2b5
  20. Apr 14, 2020
  21. Apr 02, 2020
  22. Mar 31, 2020
  23. Feb 17, 2020
    • deuce's avatar
      Disable TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 again, there's more issues · b3a09056
      deuce authored
      here, and it's not really needed.
      b3a09056
    • deuce's avatar
      Fix incorrect AES blocksizes. · 7e13901c
      deuce authored
      The block sizes for TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 were incorrect in the suite
      definitions.
      
      This is the root cause befind the old cl-suites.patch which disabled
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (no great loss).  This patch also
      fixes the TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 suite, which may be what
      new Apple phones were negotiating for pop3s connections.
      7e13901c
  24. Feb 14, 2020
  25. Feb 13, 2020
  26. Jan 24, 2020
  27. Jan 23, 2020
Loading