Skip to content
Snippets Groups Projects
  1. Mar 19, 2004
  2. Feb 22, 2004
  3. Dec 13, 2003
  4. Dec 07, 2003
  5. Dec 06, 2003
  6. Dec 04, 2003
  7. Nov 26, 2003
  8. Nov 25, 2003
  9. Oct 21, 2003
    • rswindell's avatar
      Added configurable JavaScript heap/context size startup parameters. · b7e3ee46
      rswindell authored
      Added support for JavaScript mail processors configured in mailproc.cfg
      with "?scriptname". See ctrl/mailproc.cfg and exec/mailproc_example.js for
      details.
      Some cosemtic changes to log entries.
      Bugfix: if a mail processor rejected a message, the server could segfault if
      the sending server reset the session or attempted another message. Also,
      temp files (recipient list and msg text) would be orphaned in the data_dir.
      b7e3ee46
  10. Oct 20, 2003
  11. Oct 16, 2003
  12. Oct 11, 2003
  13. Oct 09, 2003
  14. Oct 03, 2003
  15. Sep 26, 2003
    • rswindell's avatar
      Server startup structures now include a private data pointer which is passed · ab579610
      rswindell authored
      back to callback functions (e.g. lputs, thread_up, etc). This allows servers
      to share the same callback functions, eliminating many nearly-identical
      functions. This was able to shave quite a bit of redundant code from ntsvcs.c.
      This feature is not utilized in sbbs (sbbscon.c) or sbbsctrl (mainformunit.cpp).
      ab579610
  16. Sep 25, 2003
  17. Sep 17, 2003
  18. Sep 16, 2003
  19. Sep 09, 2003
  20. Sep 05, 2003
  21. Sep 04, 2003
  22. Sep 02, 2003
    • deuce's avatar
      Linux will now (sort of) run as a non-root user. After hours of trying · 772ac0b2
      deuce authored
      to track down the issue, I finally gave up... as a result, there is a new
      feature!
      
      Linux will no longer completely drop it's root privs (It never really did
      anyways, and you couldn't possibly make it... but now it does so even less)
      
      As a result, Linux can now recycle all servers when running as non-root.
      
      From a security standpoint, doing this is more secure than running as root,
      but less secure than the behaviour on POSIX.4 compliant pthreads.  Running
      the BBS as root means that if a user can create a file with the name of his
      choice, or pass *any* command through to a shell, that user will get root
      access to the machine.  Using the new behaviour, the user would need to
      trick the Synchronet binary itself into executing arbitrary and specially
      crafted code... probobly using the dreaded buffer overflow... of which
      there are probobly some in the web server code.  :-)  If the user can do
      this much more tricky feat, then the user gets root privs.  If not, the
      user will have to find something else to exploit on your system.
      
      Knowing that some *BSD users (surely not OpenBSD users though) will want to
      trade security for convenience, I stole a page out of the Sendmail book and
      implemented a "DONT_BLAME_SYNCHRONET" make option.  Compiling like this:
      gmake DONT_BLAME_SYNCHRONET=1
      
      Will implement this same behaviour on non-Linux platforms.  Allowing this
      partial security feature.
      772ac0b2
  23. Aug 30, 2003
  24. Aug 20, 2003
Loading