- Mar 05, 2018
-
-
rswindell authored
created so graciously by Deuce, or as I like to call him: Mr. Crypto.
-
rswindell authored
mail.sid corruption approximately around midnight (when delmail()) is called as part of the "DAILY:" mail maintenance, I'm suspicious of this function and while I haven't found any bugs, I did find (and now fixed) lack of error checking in calls to smb_fsetlength() and smb_fwrite().
-
rswindell authored
status.total_msgs value: if they don't match, don't add header & index to the message base, it's apparently corrupted and we're only going to make things worse as smb_putmsgidx() will fail (after we've stored the hdr) with an "invalid index offset" error.
-
- Mar 04, 2018
-
-
rswindell authored
If caller doesn't zero-initialize smb_t, then the 'lock' member could've been non-zero (garbage) and some functions would then not lock the SMB header, used for protecting against corruption from multiple process or thread modification of the same base.
-
rswindell authored
for new TLS-related settings: SubmissionsPort -> TLSSubmissionPort POP3SPort -> TLSPOP3Port USE_TLS_SUBMISSIONS_PORT -> TLS_SUBMISSION USE_POP3S_PORT -> TLS_POP3 There was actuall a typo in the "USE_POP3S_PORT" string anyway. <shrug>
-
rswindell authored
so that the smb_unlock() in main() doesn't fail and display the harmless error: Error -207 (smb_unlock 2 'No such file or directory' removing mail.lock) unlocking mail
-
deuce authored
section: POP3SPort=995 SubmissionsPort=465 And two new mail options: USE_SUBMISSIONS_PORT USE_POP3SS_PORT These are the last of the two option bits for the mail server.
-
deuce authored
-
deuce authored
Support STARTTLS in SMTP and STLS in POP3. This includes the sendmail thread. Clients can now be configured to use STARTTLS with Synchronet mail services, and Synchronet will attempt to deliver securely when possible (though it will fall back to plain text delivery when necessary.) This touches a *lot* of mail server stuff, so some instability is not unlikely. Of course, RFC8314 (Jan, 2018) officially recommends implicit TLS on the TLS ports now, so support for that should be next.
-
rswindell authored
-
- Mar 03, 2018
-
-
rswindell authored
-
deuce authored
TLS servers without all of them needing to separately load the ssl certificate. It's destroyed in free_scfg(), and the config *must* be prepped both to destroy the certificate and to load it. This is because the "no cert" value is -1, not 0, so the prepped flag is all we really have to indicate if it's zero because it's a valid certificate or zero because no certificate has been loaded.
-
deuce authored
-
- Mar 02, 2018
-
-
rswindell authored
-
rswindell authored
saving changes.
-
rswindell authored
Nov-28-2017 (don't save .ini files with every change of log-levels), it was quite easy for the visible log level controls and the actual log level (in the startup structures) to get out-of-sync. I'm pondering saving the selected log-level when recycling or something else, but for now at least the visible controls match the real log level.
-
- Mar 01, 2018
- Feb 28, 2018
- Feb 27, 2018
- Feb 26, 2018
- Feb 25, 2018
- Feb 24, 2018
-
-
rswindell authored
-
rswindell authored
-
deuce authored
This allows disabling authentication after a higher level specifies an AccessRequirements value, eliminating the last reason to keep access.ars around.
-
deuce authored
Also, allow signing unrecognized attributes. These changes allow getting a Let's Encrypt certificate covering multiple domain names.
-
deuce authored
attribute_get/set[_string|_time]? interface. This is way easier than a bunch of tiny getter/setter functions, and most of these certificate extensions aren't actually going to be used anyway. Also, surface the attribte cursor constants for more advanced certificate parsing/creation.
-
rswindell authored
time.
-