- Dec 21, 2023
-
-
Rob Swindell authored
From: Carlos Navarro (2:341/234.1) Messages that use CHRS: LATIN-1 are not displayed properly in newsreaders (Synchronet's NNTP server renders them with the default charset=IBM437). This fix may work: edit exec/load/newsutil.js, at line 77 insert case "LATIN-1 2": charset = "ISO-8859-1"; break; If you want to test: ßΘφ≤· ± (accented aeiou, n with tilde)
-
Rob Swindell authored
-
Rob Swindell authored
... for server configuration dialogs
-
Rob Swindell authored
-
Rob Swindell authored
-
Rob Swindell authored
I'm doing this manually with String.replace() because the "built-in" strip_ctrl_a() function doesn't expand ^A/ (conditional line-break) as it would need to.
-
Rob Swindell authored
DDMsgReader: Copy-paste fix for section(s) of code for editing a local user account while reading See merge request !378
-
Eric Oulashin authored
-
- Dec 20, 2023
-
-
Deucе authored
-
Deucе authored
-
Deucе authored
-
Deucе authored
-
Deucе authored
-
Deucе authored
-
Deucе authored
-
Deucе authored
Private key objects in cryptlib are not copied into sessions when they're added, only the refcount is incremented. These objects contain a bignum context, which therefore ends up shared across all instances of the private key. Unfortunately, the locking is on the session context, not the private key objects, so shared bignum contexts can cause memory corruption. Further, even if the locking issue was fixed, the performance handbrake would still exists... activating sessions that use the same private key would be serialized, with the results we've been seeing lately. With this, each session gets a unique private key, which is loaded from the file. When a session is finished with the key, it is cached in a list with an epoch, so when the date on the key file changes, old private keys will be eliminated. While this solves a lot of issues, logging of certificate generation and loading issues has regressed to the point where it's effectively not done at all. Logging was previously passed back to the caller, but given the much longer call chain to get to where a cert is created, the extra parameters was just too much. Something better should be done here at some point.
-
echicken authored
02:23:11 <DigitalMan> maybe a button/link to expand/collapse all the extended comments? Would make text searching easier
-
Rob Swindell authored
We need to get the NextItem *before* we delete the current one. I'm not sure why this was in there, but removed it as appears to have no effect: if(ListView->Selected == NULL) break;
-
echicken authored
-
echicken authored
Only change cursor if desc td has div child; exit desc click handler if no extdesc div; only add div child to desc td if extdesc present;
-
echicken authored
-
echicken authored
Top-align cell contents; cursor: pointer on description hover; show extended description if any on description click.
-
Rob Swindell authored
whitespace changes, durations (e.g. for timeouts)
-
Rob Swindell authored
Include the time-span of the login attempts in the reason string.
-
Rob Swindell authored
Interestingly, qwk_timeout was already read (but not set) as a duration. Add "NO_CGI" to the default Web Server options.
-
Rob Swindell authored
It is almost 2024 after all. :-)
-
Rob Swindell authored
Every server should have *some* limit to protect against DOS attacks. Every connected client consumes a socket, a thread, some memory, none of which are infinite resources.
-
echicken authored
-
echicken authored
-
echicken authored
Put th row inside a thead as is proper. Put td rows inside a tbody as is proper. Close td elements even if not strictly necessary. Good form. Use a subjectively nicer font. Use a subjectively more readable date format. Put some space and border between table elements. Stripe rows for better visual indicator of separate data. Make the header row sticky so we always know which column's what. Add dark mode colors if browser prefers-color-scheme dark.
-
Rob Swindell authored
... unless the full path was specified.
-
- Dec 19, 2023
-
-
Deucе authored
-
Deucе authored
Also, expand the lock in websrvr to the correct scope.
-
Deucе authored
If this solves the issue, it means that all certs for a specific scfg will share the same compliance level. For the mail server, this level is OBLIVIOUS, so if it smells like a cert, it's considered valid. If this doesn't solve the issue, it needs to be backed out.
-
Deucе authored
May help nail down issue with keys.
-
Deucе authored
We'll hold a reader lock under the session is established, which should prevent blocking other threads unless something is beating on get_ssl_cert() (which would be a different bug). This still needs to be figured out, but at least this should fix the immediate issue.
-
Rob Swindell authored
-
Rob Swindell authored
-
Rob Swindell authored
Asked for a way to expand list of recipients for a specified user
-
Deucе authored
-