From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: AS16276 37.59.0.0/16 X-Spam-Status: No, score=-2.2 required=3.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NEUTRAL shortcircuit=no autolearn=no autolearn_force=no version=3.4.2 Received: from denver.dinauz.org (denver.dinauz.org [37.59.56.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by dcvr.yhbt.net (Postfix) with ESMTPS id 380021F4B6 for ; Mon, 15 Jul 2019 20:19:08 +0000 (UTC) Received: from localhost (localhost.localdomain [127.0.0.1]) by denver.dinauz.org (Postfix) with ESMTP id 7AC5860481; Mon, 15 Jul 2019 22:19:05 +0200 (CEST) Received: from denver.dinauz.org ([127.0.0.1]) by localhost (denver.dinauz.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id maGVbMzWkdKu; Mon, 15 Jul 2019 22:19:05 +0200 (CEST) Received: from macbook-pro-de-julien-elie.home (amontsouris-655-1-193-139.w90-46.abo.wanadoo.fr [90.46.60.139]) by denver.dinauz.org (Postfix) with ESMTPSA id 1EB156047C; Mon, 15 Jul 2019 22:19:05 +0200 (CEST) Subject: Re: NNTP COMPRESS clients? RFC 8054 To: Eric Wong , inn-workers@lists.isc.org, meta@public-inbox.org References: <20190706044942.wmgjwbfy4vwntogu@dcvr> <20190715012546.ljpdiavoesixy3sp@whir> From: =?UTF-8?Q?Julien_=c3=89LIE?= Organization: TrigoFACILE -- http://www.trigofacile.com/ Message-ID: <4a50b21c-bd8f-a0c6-a1f9-3ff23a30328b@trigofacile.com> Date: Mon, 15 Jul 2019 22:17:49 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190715012546.ljpdiavoesixy3sp@whir> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit List-Id: Hi Eric, > git clone https://80x24.org/perl-libnet.git > (nntp-compress branch) https://80x24.org/perl-libnet.git/commit/?h=nntp-compress&id=6f1c2c717f6e2858e5d62073c47efe11e597e067 "sysread may call SSL_read, and SSL_read may buffer extra data in userspace which can be returned via sysread without making another read(2) syscall. This makes it it possible for select() to block indefinitely since select() only knows about buffers in the kernel, not userspace." Nice catch! Hopefully it will be fixed in Net::NNTP. For your information, INN also suffered from that annoying bug in earlier 2.4.x versions. That was why we finally by-passed the use of select() because it generated dead connections. And also implemented a timeout alarm signal around SSL_read(). https://inn.eyrie.org/trac/changeset/7755 https://inn.eyrie.org/trac/changeset/7836 https://80x24.org/perl-libnet.git/commit/?h=nntp-compress&id=0ab5c363a69702e586b7ef06be3ebff3e78656b7 + croak("NNTP connection already compressed ($comp)") if $comp; + croak("$alg not supported (only 'DEFLATE')") if $alg ne 'DEFLATE'; Note that these messages have different response codes: 502 for the first one, 503 for the last one. + can_deflate() or die $nodeflate_warn; and + $err == Z_OK or die "Inflate->new failed: $err\n"; and + $err == Z_OK or die "Deflate->new failed: $err\n"; It should be a 403 response code, and then the connections goes on uncompressed (same remark found in your patch against public-inbox-nntpd). > My plan is to keep public-inbox-nntpd read-only; since (AFAIK) > NNTP lacks good spam filtering Isn't Cleanfeed good enough for your needs? http://www.mixmin.net/cleanfeed/ I am also aware of a use of SpamAssassin with INN. Maybe it would better fit your expectations? Installation guide in French: https://usenet-fr.redatomik.org/index.php/Installer_et_configurer_un_serveur_de_nouvelles#Filtrer_le_spam_avec_SpamAssassin > and most news->mail gateways get shut down because of that. Too bad :-( > I also don't want to hassle him or anybody at perl.org with > migrating, given how little load it sees: > > http://nntp.perl.org/group/perl.perl5.porters/255487 I see... Too bad too :-( -- Julien ÉLIE « Ta remise sur pied lui a fait perdre la tête ! » (Astérix)