OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

IW8PGT

[Mendicino(CS)-Italy]

 Login: GUEST





  
VE4KLM > JNOS     07.06.21 03:06l 36 Lines 1237 Bytes #999 (0) @ WW
BID : A0I8P_VE4KLM
Read: GUEST
Subj: nntpserv stability fix
Path: IW8PGT<IZ3LSV<DB0ERF<DB0RES<ON0AR<GB7CIP<N7HPX<W9GM<N2NOV<VE4KLM
Sent: 210607/0149z @:VE4KLM.#WPG.MB.CAN.NOAM [Winnipeg] $:A0I8P_VE4KLM

>From ve4klm%ve4klm.#wpg.mb.can.noam@n2nov.ampr.org Sun Jun  6 22:05:07 2021
Received: from n2nov.ampr.org by n2nov.ampr.org (JNOS2.0m.5G) with SMTP
	id AA211500 ; Sun, 06 Jun 2021 22:05:07 EDT
Message-Id: <A0I8P_VE4KLM@VE4KLM.bbs>
>From: ve4klm@ve4klm.#wpg.mb.can.noam
X-JNOS-User-Port: Uplink   (VE4KLM on port axipv)  -> Sending message

A test file for anyone running NNTP services, look under rsync, new file :

    nntpserv_stability_fix.c

Or grab it from www.langelaar.net/jnos2/nntpserv.c using wget :

     wget www.langelaar.net/jnos2/nntpserv.c --no-check-certificates

Copy it to your nntpserv.c, and 'make' ..

Protects (from crashing) when nntpserv gets newnews, and there might
be questionable entries' in history file and / or remote group strings.

This 'should' also allow you to access as many groups from the remote
string as they can send (if that makes any sense). The limit was hardcoded
before and JNOS would crash if the remote sent too many of them. The hard
coded string length was just over 500 bytes. It's dynamic now, so no limit.

I'll move it over to nntpserv.c at some point, but if anyone wants to 
test it.

Feel free to submit JNOS logfile entries if you see anything ...

Thanks.

Maiko / VE4KLM




Read previous mail | Read next mail


 23.12.2024 08:21:26lGo back Go up