Skip to content
Snippets Groups Projects
  1. Feb 28, 2021
  2. Feb 22, 2021
  3. Feb 21, 2021
  4. Feb 20, 2021
  5. Feb 19, 2021
    • Rob Swindell's avatar
      Correct the parse_mail_address() argument order · ba5f06d0
      Rob Swindell authored
      Issue introduced in previous commit to this file. The name arg(s) comes before the address arg(s).
      ba5f06d0
    • Deucе's avatar
      96e80b1c
    • Deucе's avatar
      Fix CIDs 174500 and 174471 · 6fcd8fad
      Deucе authored
      6fcd8fad
    • Rob Swindell's avatar
      Automatically route in-transit mail to points to boss nodes · 7bd42e56
      Rob Swindell authored
      If the destination point node is not a linked node (does not exist in sbbsecho.ini), but the boss node is linked, automatically route to the boss node. The log entries look like this when this happens:
      "Routing packet (%s) to boss-node %s"
      "Routing NetMail (%s) to boss-node %s"
      
      For poindexter FORTRAN (REALITY) - test results appreciated.
      
      Incremented SBBSecho version to 3.13.
      7bd42e56
    • Rob Swindell's avatar
      Recognize DNB blacklist exempted email addresses in From fields · fda59d76
      Rob Swindell authored
      Previously, any DNS blacklist-exempt email addresses (in ctrl/dnsbl_exempt.cfg) had to be used in the mail-envelope (the "MAIL FROM:" address) - that doesn't work for all senders that use re-mailers or whatever where you end-up with some *bounce* address as the envelope-sender.
      
      So now, clear the DNSBL results when the From header field is parsed and the sender was in fact an exempt sender. Note: the Subject line will still contain the SPAM tag if the subject was parsed first (came earlier in the message header). May need to address this limitation in the future if it turns out to be a problem (!).
      
      Lowercase the [smtp|smtps]spy.txt log file.
      fda59d76
  6. Feb 18, 2021
  7. Feb 17, 2021
  8. Feb 16, 2021
    • Rob Swindell's avatar
      Optional cap on TLS log message severity level · f5a0fbd9
      Rob Swindell authored
      Are you tired of getting TLS-related error log messages that you can't do anything about? e.g.
      web  0139 TLS ERROR 'Received TLS alert message: Unexpected message' (-15) setting session active
      
      The new sbbs.ini [web] TLSErrorLevel option (defaults to 0 / "Emergency") allows the sysop to set a cap (maximum severity) on TLS-related log messages in the web server (e.g. TLSErrorLevel=Warning).
      f5a0fbd9
    • Deucе's avatar
      Only patch I looked at in 13ab06ea was wrong. · 299201e1
      Deucе authored
      x points to the terminating NUL in x64.  free()ing it would do wild
      and crazy things depending on how paranoid the free() implementation
      is.
      
      free(x64) instead... at least Coverity was happy though!
      299201e1
    • Rob Swindell's avatar
      Fix apparent memory leak in js_listening_socket_constructor() · eae4103e
      Rob Swindell authored
      The socket set allocated by xpms_create() was never freed. Found by Coverity.
      eae4103e
Loading