- Mar 04, 2018
-
-
deuce authored
Support STARTTLS in SMTP and STLS in POP3. This includes the sendmail thread. Clients can now be configured to use STARTTLS with Synchronet mail services, and Synchronet will attempt to deliver securely when possible (though it will fall back to plain text delivery when necessary.) This touches a *lot* of mail server stuff, so some instability is not unlikely. Of course, RFC8314 (Jan, 2018) officially recommends implicit TLS on the TLS ports now, so support for that should be next.
-
- Mar 03, 2018
-
-
rswindell authored
-
deuce authored
TLS servers without all of them needing to separately load the ssl certificate. It's destroyed in free_scfg(), and the config *must* be prepped both to destroy the certificate and to load it. This is because the "no cert" value is -1, not 0, so the prepped flag is all we really have to indicate if it's zero because it's a valid certificate or zero because no certificate has been loaded.
-
deuce authored
-
- Mar 02, 2018
-
-
rswindell authored
-
rswindell authored
saving changes.
-
rswindell authored
Nov-28-2017 (don't save .ini files with every change of log-levels), it was quite easy for the visible log level controls and the actual log level (in the startup structures) to get out-of-sync. I'm pondering saving the selected log-level when recycling or something else, but for now at least the visible controls match the real log level.
-
- Mar 01, 2018
- Feb 28, 2018
- Feb 27, 2018
- Feb 26, 2018
-
-
deuce authored
-
- Feb 25, 2018
- Feb 24, 2018
-
-
rswindell authored
-
rswindell authored
-
deuce authored
This allows disabling authentication after a higher level specifies an AccessRequirements value, eliminating the last reason to keep access.ars around.
-
deuce authored
Also, allow signing unrecognized attributes. These changes allow getting a Let's Encrypt certificate covering multiple domain names.
-
deuce authored
attribute_get/set[_string|_time]? interface. This is way easier than a bunch of tiny getter/setter functions, and most of these certificate extensions aren't actually going to be used anyway. Also, surface the attribte cursor constants for more advanced certificate parsing/creation.
-
rswindell authored
time.
-
rswindell authored
the default/all target. So a single "make" command in src/sbbs3 should build these nested targets as well. Caveat: "make clean" does not clean these sub-make targets.
-
- Feb 23, 2018
-
-
rswindell authored
uedit.c:1475:5: warning: this 'if' clause does not guard... if(uifc.changes)
-
deuce authored
but it's parsed as a number. Use the JS Date type for the values.
-
deuce authored
-
deuce authored
-
deuce authored
-
rswindell authored
we are always freeing the pointer that was asigned the text.dat list and things will crash (thanks for the report, Rastus).
-
deuce authored
-
deuce authored
-
deuce authored
-
deuce authored
Also add add_public_key() and get_public_key() methods to CryptKeyset. Not tested yet, but this should be everything we need to finish up LetSyncrypt.
-
deuce authored
-
deuce authored
-
deuce authored
-
deuce authored
-
deuce authored
This class allows saving and loading private keys. It doesn't currently allow saving or loading *public* keys, since they require certificate support which we don't yet have in our JavaScript Object Model. I'll fix the JSDocs build in a minute.
-