Hallo.

Cág wrote in <20180927225715.iv3ds%c...@bitmessage.ch>:
 |Steffen Nurpmeso wrote:
 |> I cannot reproduce it at a glance via AlpineLinux:
 |> [...]
 |> It seems i have to boot my NetBSD 8 VM, it could be that the fix
 |> takes until tomorrow, thus.  (Very slow, dependent on how weird it
 |> is...)
 |
 |I forgot to mention that I use s-nail with torify, but the same seems

You happen to use tor via *socks-proxy*?  That is pretty cool,
i still have not tried to use tor at all, even though i am
tracking the announcements and the source code (since "Import
v0.3.0.7, 2017-05-26", but the heck!, just cannot find any time).
I have tested *socks-proxy* only via ssh(1)...

 |to happen without it. Also it's not the same all the time: I reconnected
 |with `dhclient -r`, then the usual wpa_supplicant+dhclient thing, s-nail
 |just hanged after "G":

Yeah, as i wrote in the other mail, set *verbose* to see the
progress ticks.  I will change that and activate them in
interactive mode automatically.

 |--
 |^C
 |Interrupting this operation may turn the DNS resolver unusable
 |^Cs-nail interrupted

Uh!!!  This is hard :).

 |Interrupt
 |There are new messages in the error [...]
 |[...]
 |ERROR# ? q
 |Held messages in [my inbox]
 |[1] Segmentation fault (core dumped) s-nail

I am very sorry Cág, but until v15 this codebase uses
siglongjmp(), and except for libjp(e???)g each and every library
i know will occasionally just break after such a longjmp.  There
is nothing that can be done here, but it is all my fault, i should
have set back in 2012 and refrain from working with the nail
codebase as such, instead i should have taken the OpenBSD Mail and
develop from there on, and all this signal mess would simply not
exist.  This is v15, with SysV signal handling.  Until then the
above can happen.  This is actually stated in the manual sections
CAVEATS.

 |Maybe make flags should be noted [shameless stolen from the APKBUILD]:
 |VAL_IDNA=idn
 |VAL_RANDOM="libgetrandom sysgetrandom urandom builtin"

Hmm.  Likely better to not use such things at all unless you want
a fixed configuration; NetBSD has arc4random:

 . VAL_RANDOM: arc4random(3) ... yes

but forcing usage of the system OpenSSL may be an option

  VAL_RANDOM=tls,arc4

Not to talk about the unscientific builtin arc4, but well,
needless, needless...

 |There are patches also used, I am attaching them, though they don't seem
 |to be related to the issue, and they don't exist in aports. Should I
 |remove them?

Yes! Yes!! Yes!!!  How could you apply them to v14.9.11????

I would nonetheless be interested in the NYD, i think i will try
and see what i can do to make this better on NetBSD.  That we
crash in non-network code after such an interruption, that is very
very bad!

 |Thanks, Steffen!

A nice weekend, Dohle!

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

Reply via email to