- Feb 22, 2021
-
-
Rob Swindell authored
Appear to have been possible (to crash) by using a malformed text.dat file.
-
Rob Swindell authored
-
Rob Swindell authored
-
Rob Swindell authored
Nobody's checking the return values anyway.
-
Rob Swindell authored
Caught by GCC.
-
Rob Swindell authored
-
Rob Swindell authored
-
Rob Swindell authored
Caught by Coverity.
-
Rob Swindell authored
Check return value from read().
-
- Feb 21, 2021
-
-
Rob Swindell authored
-
Rob Swindell authored
Mostly in error-paths.
-
Deucе authored
-
Deucе authored
-
Rob Swindell authored
Add the "two or three lines" that Deuce said were needed to restore this functionality. Also got rid of some now unnecessary (void) protected_*int* return value ignoring warning-suppressors.
-
Rob Swindell authored
for better errors/warnings from the compiler when misued.
-
- Feb 20, 2021
-
-
Rob Swindell authored
Interesting, this is how this code worked back in 2005, but was changed without a good description of why: http://cvs.synchro.net/cgi-bin/viewcvs.cgi/src/sbbs3/xmodem.c?r1=1.15&r2=1.16 This addresses the anonymous SyncTERM bug report: https://sourceforge.net/p/syncterm/tickets/46/ Thanks, whoever that was. :-)
-
Deucе authored
Fixes last commit, which could cause infinite hangs on certain requests.
-
- Feb 19, 2021
-
-
Rob Swindell authored
Issue introduced in previous commit to this file. The name arg(s) comes before the address arg(s).
-
Deucе authored
-
Deucе authored
-
Rob Swindell authored
If the destination point node is not a linked node (does not exist in sbbsecho.ini), but the boss node is linked, automatically route to the boss node. The log entries look like this when this happens: "Routing packet (%s) to boss-node %s" "Routing NetMail (%s) to boss-node %s" For poindexter FORTRAN (REALITY) - test results appreciated. Incremented SBBSecho version to 3.13.
-
Rob Swindell authored
Previously, any DNS blacklist-exempt email addresses (in ctrl/dnsbl_exempt.cfg) had to be used in the mail-envelope (the "MAIL FROM:" address) - that doesn't work for all senders that use re-mailers or whatever where you end-up with some *bounce* address as the envelope-sender. So now, clear the DNSBL results when the From header field is parsed and the sender was in fact an exempt sender. Note: the Subject line will still contain the SPAM tag if the subject was parsed first (came earlier in the message header). May need to address this limitation in the future if it turns out to be a problem (!). Lowercase the [smtp|smtps]spy.txt log file.
-
- Feb 18, 2021
-
-
Deucе authored
protected_*_adjust() only adjusts now.
-
Rob Swindell authored
Deal with the resulting warnings (using (void)). Deal with the incorrect integer to protected_int* assignment in services.c (just don't support server.clients property reading in service scripts). Also, the strcpy()->SAFECOPY() change in ftpsrvr.c was wrong, caught by GCC warning - oops.
-
Deucе authored
-
Deucе authored
-
Deucе authored
-
Deucе authored
Also, fix things that incorrectly reach into the protected_*_t to incorrectly access values.
-
Rob Swindell authored
This reverts commit ced63e12. Didn't work for .cpp files: stdatomic.h:40:9: error: ‘_Atomic’ does not name a type typedef _Atomic _Bool atomic_bool
-
Rob Swindell authored
-
Deucе authored
-
Rob Swindell authored
-
- Feb 17, 2021
-
-
Deucе authored
Previously, 403 was only returned if they existed, and 404 if they didn't.
-
Deucе authored
No need to get time() here since it's never checked. Resolves CID 174292
-
Deucе authored
Have free_paragraphs() explicitly allow paragraphs to be NULL and have everything use the fail_return which now free()s ret.
-
Deucе authored
-
Deucе authored
Previously, more than 999 arguments would overrun a buffer and break things. Fixes CID 33313
-
- Feb 16, 2021
-
-
Rob Swindell authored
Are you tired of getting TLS-related error log messages that you can't do anything about? e.g. web 0139 TLS ERROR 'Received TLS alert message: Unexpected message' (-15) setting session active The new sbbs.ini [web] TLSErrorLevel option (defaults to 0 / "Emergency") allows the sysop to set a cap (maximum severity) on TLS-related log messages in the web server (e.g. TLSErrorLevel=Warning).
-
Deucе authored
-