- 15 Mar, 2018 7 commits
-
-
deuce authored
-
deuce authored
bytes have been sent!
-
deuce authored
"Sometimes" the write timeout value is used for read timeouts. Since we use a read timeout of zero, and a mutex, this can cause some serious delays in SSH processing. As a workaround, we set the write timeout to zero. However, a flush failure has historically been fatal. So, we now change the write timeout to one second just before a flush, and have a flush timeout not be fatal anymore... we set it back to zero after the flush. The fiddling with the write timouts will be removed once the bug is fixed, but the flush timout not being fatal may stay forever... add some comments to remind us to remove the hack in the future.
-
rswindell authored
-
deuce authored
attempt.
-
rswindell authored
"unique" login attempt (e.g. hack attempt).
-
deuce authored
code merely introduced a 5 second delay in the Node 0 thread.
-
- 14 Mar, 2018 15 commits
-
-
deuce authored
the challenge length is set and add a TODO comment there.
-
deuce authored
-
deuce authored
matches, send an M_ERR to the remote and leave the address list empty.
-
deuce authored
expect the Seen flags to be coherent across them... support this by leaving the users IMAP status file open, and holding a lock on the first byte. We now need to flush changes to the status file more often, and we need to call file.flush() before unlocking.
-
rswindell authored
nomd5 means "plain-text passwords are okay" (AllowPlainPasswords=true)
-
deuce authored
The *first* packet from the answering side *must* be an M_NUL "OPT TLS". If this is the case, the originating size responds with an M_NUL "OPT TLS". After this, the answering system performs a server TLS handshake, and the originating system performs a client TLS handshake. OPT CRYPT is not used in this case (ie: not crypt over TLS)
-
rswindell authored
-
rswindell authored
"user@" prefix.
-
rswindell authored
(import netmail) command along with the '-n' option to set the recipient net address (and network type). Previously, only Internet or QWK netmail was supported.
-
deuce authored
bad login.
-
deuce authored
-
deuce authored
-
deuce authored
-
deuce authored
-
deuce authored
-
- 13 Mar, 2018 11 commits
-
-
rswindell authored
inbound Mystic sessions are failing (e.g. with Al@TRMB's BinkIt mailer).
-
deuce authored
with Synchronet.
-
rswindell authored
(.sid file), don't divide the fread() results (it's already in number of records read). This could cause msgbase maintenance to not take place or corruption of a msg base.
-
deuce authored
my jsexec includes debug output... and this is super-normal.
-
deuce authored
Also, change READTIMEOUT back to zero since that issue is fixed now.
-
rswindell authored
log messages.
-
deuce authored
SSLv3 (!) and even SSLv2(!!) clients still in the wild. Sysops aren't expected to be able to fix other peoples ancient broken stuff.
-
deuce authored
the SSH session. Also, do an INFO level log entry to indicate what happened to your socket.
-
deuce authored
-
deuce authored
missing "SSH" when logging channel use errors.
-
deuce authored
sends would cause MAC errors.
-
- 12 Mar, 2018 7 commits
-
-
deuce authored
so support that.
-
deuce authored
for a match... which caused a memory leak. Thanks scan-build!
-
deuce authored
So, we really should initialize sock to INVALID_SOCKET before calling it. This should fix the "random descriptors are closed" issue.
-
deuce authored
-
deuce authored
-
deuce authored
-
deuce authored
to zero again. Unfortunately, there appears to be a related bug where the TX timeout is sometimes used for RX... that's OK, we'll just set them both to zero. Also, deal with secondary channels (ie: forwarded ports). For now, we just close these channels any time we get data on them. In the future, we can do scp/sftp pretty easily now... though neither is likely to ever work with the sysop account due to the system password requirement. This change ABSOLUTELY REQUIRES an updated cryptlib. Windows guys don't update until DigitalMan commits cl.lib or whatever it's called.
-