Skip to content
Snippets Groups Projects
  1. Apr 24, 2018
  2. Apr 01, 2018
  3. Feb 03, 2018
  4. Jan 22, 2018
  5. Oct 06, 2016
  6. Dec 19, 2015
  7. Dec 16, 2015
    • rswindell's avatar
      Fix bug reported by KenDB3: · 2d9f13ba
      rswindell authored
      The JS-modeled user object's ip_address and host_name property values did not
      reflect the current connection during logon events (JS modules executed during
      logon, e.g. logon.js). Moved the initialization of the current user
      (sbbs_t::useron) ipaddr and comp field to sbbs_t::logon() rather than when
      control returns to sbbs_t::answer(). Removed the (now) redundant saves of these
      user fields from answer().
      2d9f13ba
  8. Dec 03, 2015
  9. Aug 27, 2015
  10. Aug 23, 2015
  11. Aug 20, 2015
    • deuce's avatar
      Update to 3.17a · dbbfabf1
      deuce authored
      New Features:
      - Multiple bindings for each service
        Use comma-separated interfaces on Interface= lines in the ini file.
        Default is now "0.0.0.0,::"
      - IPv6 support
      - TLS support for the webserver and (non-static) services
        New TLS option in services.ini (ie: Options=TLS)
      - Decrease LEN_SCAN_CMD to 35 chars, increase the CID field to 45 chars,
        and rename the MAIL_CMD string to IPADDR.  I think this frees up the
        note field for SysOp use.
      dbbfabf1
  12. Jan 19, 2015
  13. Oct 29, 2014
    • rswindell's avatar
      Bug-fix: when SSH or RLogin supplied username is not a valid user, the new user · 01ea9701
      rswindell authored
      signup process would be started without the current client IP address being
      added to the 'failed login attempt' list. This means that brute force login
      attempts using SSH or RLogin would usually not be subject to the loginAttempt
      delays and logging/filtering settings (in sbbs.ini), since the usernames
      attempted (e.g. root, admin) are usually not valid usernames.
      
      More:
      - Log failed password attempts before calling badlogin() -which can delay.
      - Stop RLogin and SSH password prompt loop immediately if disconnected.
      - Log RLogin and SSH passwords used for invalid usernames (when password
        logging is enabled in SCFG).
      - Log attempted usernames in quotes (so prepenned or trailing whitespace is more
        obvious)
      01ea9701
  14. Oct 28, 2014
    • rswindell's avatar
      Fix node hang (infinite loop) possible when input_thread() is terminated before · f18856a8
      rswindell authored
      answer() set online to ON_REMOTE. This should resolve the issue with SSH brute
      force password attackers hanging nodes in "new user applying for access".
      The actual fix was to remove the set of the online variable to ON_REMOTE
      in answer() (it's initialized to this value in the sbbs_t constructor), the
      check in getkey() is just for extra paranoia and should not be necessary.
      f18856a8
  15. Mar 08, 2014
  16. Mar 07, 2014
    • rswindell's avatar
      * Eliminated the sbbs.ini [BBS] Options flag: USE_2ND_RLOGIN · b45af31d
      rswindell authored
      - this option has been a default option flag for 10 years
      - this option was introduced *before* the RLogin password capability
      - Synchronet now always expects the login-ID (alias) to be the 2nd string
      received during RLogin connections (called 'server-user-name' in RFC 1282.
      * Now storing the complete terminal type/speed string received during RLogin
      connection in the bbs.rlogin_terminal property (sbbs_t.rlogin_term in C++).
      * bbs.rlogin_gate() is over-hauled:
      - arguments are: address, client-user-name, server-user-name, terminal, mode
      - if existing JS module assumes this to be: address, server-user-name, password
        those scripts will need to be updated to reflect the correct argument order
      - all arguments beyond the first are now optional
      - the terminal string can now be passed-in
      * Deprecated the telnet gateway option: TG_SENDPASS (the 'password' if desired
      to be sent as the 'client-user-name' can be specified as an argument and this
      option sent the password as the *second* RLogin string ('server-user-name'),
      which was always wrong.
      * sbbs_t::telnet() can now accept the terminal string as an optional argument.
      b45af31d
  17. Feb 28, 2014
  18. Jun 19, 2012
  19. Jun 13, 2012
  20. Feb 08, 2012
  21. Oct 19, 2011
    • rswindell's avatar
      Resolve warning: · 5d80e1fc
      rswindell authored
      answer.cpp:271:15: warning: "/*" within comment
      and restore "normal" attributes during ANSI detection (unintentionally
      removed by Deuce in rev 1.69). Oh, and -Wall is good. :-)
      5d80e1fc
  22. Sep 14, 2011
  23. Sep 08, 2011
  24. Mar 01, 2011
  25. Mar 27, 2010
  26. Nov 09, 2009
  27. Feb 19, 2009
  28. Feb 18, 2009
  29. Feb 16, 2009
    • rswindell's avatar
      Major over-haul of smb_util.c and most everything that uses it: · 17ab641b
      rswindell authored
      Constified the arguments.
      Created exascii_to_ascii_char().
      Created ctrl_a_to_ascii_char().
      strip_ctrl() and prep_file_desc() now takes 2 args.
      strip_ctrl(), strip_exascii() and prep_file_desc() now strdup() the input
      string and if the dest arg is NULL, returns the allocated and modified copy.
      sbbs_t::bputs() now handles ^AZ.
      Change Ctrl-A code message network exporting:
      1. ^AL, ^A<, ^A[, and ^A] are always translated to ASCII equivalents.
      2. ^AZ will terminate the message body prematurely if found.
      3. Ex-ASCII (CP437) chars will be translated to ASCII equivalents (rather than
      '*') for "ASCII Only" subs.
      For import, don't allow Ctrl-AP or Ctrl-AL.
      For SBBSecho:
      Added support for specifying a link's address on the command-line (e.g. for
      use with -h).
      Mail server now strips Ctrl-A codes from message bodies for sending via POP3
      or SMTP.
      17ab641b
  30. Jan 16, 2009
  31. Jul 30, 2007
  32. Jul 27, 2007
  33. Jul 13, 2007
  34. May 09, 2007
Loading