Send inn-workers mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.isc.org/mailman/listinfo/inn-workers
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of inn-workers digest..."
Today's Topics:
1. Re: NNTP COMPRESS clients? RFC 8054 (Julien ?LIE)
----------------------------------------------------------------------
Message: 1
Date: Mon, 15 Jul 2019 22:17:49 +0200
From: Julien ?LIE <[email protected]>
To: Eric Wong <[email protected]>, [email protected],
[email protected]
Subject: Re: NNTP COMPRESS clients? RFC 8054
Message-ID: <[email protected]>
Content-Type: text/plain; charset=utf-8; format=flowed
Hi Eric,
> git clone https://80x24.org/perl-libnet.git
> (nntp-compress branch)
https://80x24.org/perl-libnet.git/commit/?h=nntp-compress&id=6f1c2c717f6e2858e5d62073c47efe11e597e067
"sysread may call SSL_read, and SSL_read may buffer extra
data in userspace which can be returned via sysread without
making another read(2) syscall. This makes it it possible for
select() to block indefinitely since select() only knows about
buffers in the kernel, not userspace."
Nice catch! Hopefully it will be fixed in Net::NNTP.
For your information, INN also suffered from that annoying bug in
earlier 2.4.x versions. That was why we finally by-passed the use of
select() because it generated dead connections. And also implemented a
timeout alarm signal around SSL_read().
https://inn.eyrie.org/trac/changeset/7755
https://inn.eyrie.org/trac/changeset/7836
https://80x24.org/perl-libnet.git/commit/?h=nntp-compress&id=0ab5c363a69702e586b7ef06be3ebff3e78656b7
+ croak("NNTP connection already compressed ($comp)") if $comp;
+ croak("$alg not supported (only 'DEFLATE')") if $alg ne 'DEFLATE';
Note that these messages have different response codes: 502 for the
first one, 503 for the last one.
+ can_deflate() or die $nodeflate_warn;
and
+ $err == Z_OK or die "Inflate->new failed: $err\n";
and
+ $err == Z_OK or die "Deflate->new failed: $err\n";
It should be a 403 response code, and then the connections goes on
uncompressed (same remark found in your patch against public-inbox-nntpd).
> My plan is to keep public-inbox-nntpd read-only; since (AFAIK)
> NNTP lacks good spam filtering
Isn't Cleanfeed good enough for your needs?
http://www.mixmin.net/cleanfeed/
I am also aware of a use of SpamAssassin with INN. Maybe it would
better fit your expectations?
Installation guide in French:
https://usenet-fr.redatomik.org/index.php/Installer_et_configurer_un_serveur_de_nouvelles#Filtrer_le_spam_avec_SpamAssassin
> and most news->mail gateways get shut down because of that.
Too bad :-(
> I also don't want to hassle him or anybody at perl.org with
> migrating, given how little load it sees:
>
> http://nntp.perl.org/group/perl.perl5.porters/255487
I see... Too bad too :-(
--
Julien ?LIE
??Ta remise sur pied lui a fait perdre la t?te?!?? (Ast?rix)
------------------------------
Subject: Digest Footer
_______________________________________________
inn-workers mailing list
[email protected]
https://lists.isc.org/mailman/listinfo/inn-workers
------------------------------
End of inn-workers Digest, Vol 114, Issue 5
*******************************************