home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   BINKD      Support for the Internet BinKD mailer      8,958 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 6,594 of 8,958   
   Dan Cross to Tony Langdon   
   Re: binkd error   
   30 Jan 20 15:55:06   
   
   TID: Mystic BBS 1.12 A43   
   MSGID: 3:770/100 0b39533b   
   REPLY: 1485.fido-binkd@3:633/410 229768e2   
   TZUTC: 1300   
   On 30 Jan 2020 at 11:07a, Tony Langdon pondered and said...   
       
    TL>  DC> I've sent a pull request to fix it upstream.   
    TL>  DC> https://github.com/pgul/binkd/pull/16   
    TL>    
    TL> Hopefully I can get hold of the fixed source.  I've had to take a number   
    TL> of measures like restricting callouts to the affected node to IPv4 only,   
    TL> and also hardcoding the IPv4 IP in the node entry, because DNS lookups   
    TL> were also problematic for the affected node..   
      
   With luck, the upstream maintainer will address the pull request quickly,   
   either by applying my patches or coming up with another fix.  If you need   
   this quickly, however, you could clone my fork   
   (https://github.com/fat-dragon/binkd.git) and build from source.   
      
    TL> A second link running over ZeroTier started showing similar issues   
    TL> recently, but switching that link to connect directly across the open   
    TL> Internet was enough to get that link working.   
    TL>    
    TL> It's odd that it only affects some links.     
      
   The code path with the use-after-free was dependent on the source of   
   the information.  If you used the default port, the pointer in question   
   would end up pointing to memory that wasn't free()'d; if you used a   
   non-standard port in your configuration file (e.g., `agency.bbs.bz:24556`),   
   you'd tickle the bug; hence why it doesn't show up everyhwere.   
      
    TL> My system is a fairly busy Pi that's running 2 BBSs, which may explain   
    TL> why malloc() is being a bit aggressive. :)   
      
   A memory-intensive workload will likely put pressure on the operating   
   system's virtual memory subsystem (note, VM in the general sense, not   
   specific to e.g. swap space), but is unlikely to significantly affect   
   malloc().  While some malloc() implementations do go to pains to work   
   with the VM system to return memory to the OS under pressure, this is   
   necessarily on a page boundary and it's likely other short strings had   
   been allocated on that same page (at least, this was what I observed   
   on my system).   
      
   Rather the aggressiveness I mentioned with respect to free()'d memory   
   has to do with the malloc() implementation writing garbage into the   
   free()'d region of memory, precisely to detect these sorts of   
   use-after-free issues.   
      
   --- Mystic BBS v1.12 A43 2019/03/03 (Windows/32)   
    * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (3:770/100)   
   SEEN-BY: 1/123 57/0 90/1 103/705 153/250 154/10 203/0 220/70 221/0   
   SEEN-BY: 227/114 229/101 200 426 1014 240/5832 249/307 317 267/800   
   SEEN-BY: 280/464 5003 5555 288/100 292/854 310/31 317/3 340/1000 342/200   
   SEEN-BY: 396/45 423/120 712/848 770/0 1 100 340 772/0 1 210 500 2452/250   
   PATH: 770/100 1 280/464 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca