- Apr 16, 2018
-
-
rswindell authored
-
rswindell authored
1: Wrap SSH cryptDestroySession() calls in a wrapper that tracks the number of open sessions and logs errors upon failure (and remaining session count). This is how I found the SSH session leak in sbbs_t::hangup(). Also found multiple cals to SSH_END() which were invalid (no session to destroy) and removed them. 2: If errors are detected when unpacking a REP packet, save the .rep file (in data/file/<filename.rep>.<timestamp>.bad) for later inspection. Also added some VOTING.DAT debug output (to be removed later). Trying to the get to the bottom of the "smb_addvote thread_back field missing" errors.
-
rswindell authored
pause and CLS after.
-
- Apr 15, 2018
-
-
echicken authored
@DigitalMan | It'd be nice if home/end keys moved to first/last avatars in a collection when viewing a collection
-
echicken authored
@DigitalMan | JavaScript s:\sbbs\exec\avatar_chooser.js line 775: TypeError: state.opt_out_item is null uh, this oughta do away with that, I guess
-
echicken authored
revisit some of this.
-
echicken authored
(Not the best fix, but it'll do for now.)
-
- Apr 13, 2018
-
-
rswindell authored
REP unpacking).
-
rswindell authored
'Resource/space exhausted' errors in TLS and SSH: The wrong ssh_session is being passed to cryptDestroySession() in sbbs_t::hangup() (introduced in rev 1.615), this call to cryptDestorySession() fails (returns -1, bad param) thus leaving the actual ssh_session never destroyed (leaked).
-
- Apr 12, 2018
-
-
rswindell authored
chars for Bill McGarrity @ tequilamockingbirdonline.net :-) Doesn't seem to break anything (except backwards compatibility with SBL v3).
-
- Apr 09, 2018
- Apr 07, 2018
-
-
rswindell authored
cast from pointer to integer of different size
-
rswindell authored
format not a string literal and no format arguments [-Wformat-security]
-
rswindell authored
emusetup.bat). It was generating an (easy to fix) GCC 5.4.0 warning: format not a string literal and no format arguments [-Wformat-security] But the line was not needed, so just removed it.
-
rswindell authored
format not a string literal and no format arguments [-Wformat-security]
-
- Apr 06, 2018
-
-
rswindell authored
warning: format not a string literal and no format arguments [-Wformat-security]
-
rswindell authored
warning: format not a string literal and no format arguments [-Wformat-security] sockprintf(sock,sess,(char*)resp); sockprintf(socket,session,sys_error);
-
rswindell authored
-
rswindell authored
of lprintf() misuse.
-
rswindell authored
unused variable 'p' comparison between signed and unsigned integer expressions
-
rswindell authored
in expansion of macro 'JS_ARGS_OFFSET': unsigned long is the same size as a pointer (rather than unsigned int) on the supported target platforms/tool-chains.
-
rswindell authored
::lprintf() usage.
-
rswindell authored
fix the resulting warnings.
-
rswindell authored
and resolve the resulting warnings.
-
rswindell authored
resolve the resulting warnings.
-
rswindell authored
and send_mlsx(). Fix numerous printf-style argument bugs, many in the TLS and MLSx support.
-
rswindell authored
Put "TLS" in the failure log messages rather than repeating "FTP".
-
rswindell authored
Was this pasted from somewhere else?
-
rswindell authored
-
rswindell authored
-
rswindell authored
- Since rev 1.556, mailproc_to_match[] would only ever contain one mail processor (index) value, even if the RCPT TO address matched multiple mail processor "To" keys in mailproc.ini, so only the first-matching mail processor (with a "To" key) would be executed for the msg. - mailproc_match, meaning the destination was a non-passthrough external mail processor, in which case the destination (RCPT TO) address may *not* match a valid local user account, would be set for *passthru* mail processors potentially resulting in the following error (and an undelivered mail message): !SMTP can't deliver mail to user #0 only set mailproc_match to a valid mail proc index if the recipient matches a non-passthru mail processor.
-
- Apr 05, 2018
- Apr 04, 2018
-
-
rswindell authored
not known/available (e.g. certain types of SSH login failures).
-
rswindell authored
-
rswindell authored
to use this function in bbs_thread() for SSH failed login attempts and thus enable the perm-IP-filtering (LoginAttemptFilterThreshold) functionality. Right now, it's only a "bad login" if the "Getting channel type" doesn't return "session", but we could (and likely will) use it for more SSH login failure modes which indicate a likely hack-attempt.
-
rswindell authored
had a "replace" option that did something differnet (enabled parsing of the REPLACES verb) - don't want to confuse sysops now. :-)
-