On Mon, Jan 26, 2015 at 12:49:38PM +0100, Nico Golde wrote:
> Hi,
> * Markus Teich [2015-01-22 14:30]:
> > younix wrote:
> > > I don't get the point with an additional git branch!? What would be the
> > > advantage of it, instead of a diff on the website? How would it look
> > > like if
> > > y
Hi,
I would like to organize an assembly for the suckless community at the
32C3. If you want to attend this to this assembly, reply on this mail.
Unlike the last year, I won't organize an empty assembly. I will orga-
nize one, if at least five people (including myself) promise to attend.
In my o
:52:19 -0500
> Greg Reagle wrote:
>
> > Great, thanks. Is there any code for "Simple Jabber - Divide And Conquer
> > XMPP, Jan Klemkow"?
>
> http://klemkow.net/sj.html
>
> code: https://github.com/younix/sj
>
> --
> FRIGN
pgpm1X_KrD5gi.pgp
Description: PGP signature
Thanks for that advice. Done!
On Thu, Nov 19, 2015 at 01:13:36PM +0800, Pickfire wrote:
> Hi, I think it is better to add http://klemkow.net/sj.html link to the
> github repository.
pgp9CCc3W083L.pgp
Description: PGP signature
Hi,
Thanks for testing my jabber client and sorry for its inconvenience.
yes, STARTTLS is not implemented at the moment. I use jabber.ccc.de for
testing, cause they use the Port 5223 for TLS which is not recommend. I
will implement STARTSSL in the near future, stay tuned.
sslc(1) is the legacy
arguments behind
the tlsc ones. So tlsc does the tls handshake and starts sj as it was
stated before.
Could you test the new state with your use cases?
Thanks for reporting,
Jan
On Fri, Nov 20, 2015 at 10:28:08AM +0100, Jan Klemkow wrote:
> Hi,
>
> Thanks for testing my jabber client and
On Sun, Nov 22, 2015 at 02:20:51AM -0500, Matthew of Boswell wrote:
> On Sun, 22 Nov 2015 03:21:12 +0100
> Jan Klemkow wrote:
> > I implemented STARTTLS. But there is a hard coded hack, that there is
> > no certificate verification at the moment. I have to find a way to give
&
On Mon, Nov 23, 2015 at 10:52:24AM -0500, Greg Reagle wrote:
> I did build thusly:
>
> installed version 1:0.88-3 of ucspi-tcp:
> http://packages.ubuntu.com/trusty/ucspi-tcp
>
> built and installed https://github.com/libressl-portable/portable
>
> cloned https://github.com/younix/ucspi, then com
On Mon, Nov 23, 2015 at 11:40:35AM -0500, Greg Reagle wrote:
> On 11/23/2015 11:34 AM, Jan Klemkow wrote:
> >The tls certificate verification failed. Turn it off with the following
> >environment variable:
> >
> >export TLSC_NO_VERIFICATION=1
>
> That preve
Hi Greg,
Sorry for the late answer, but I was busy the last days.
On Tue, Dec 01, 2015 at 10:37:44AM -0500, Greg Reagle wrote:
> Thanks to the recent updates to sj[1] and ucspi-tools[2], sj is now easier
> to build.
>
> The man page for sj has this
>
> EXAMPLES
> tcpclient example.org 5223
On Thu, Dec 03, 2015 at 03:23:16PM -0500, Matthew of Boswell wrote:
> On Tue, 1 Dec 2015 10:37:44 -0500
> Greg Reagle wrote:
>
> > but that doesn't work for me. I have to omit tlsc. It seems to be
> > called automatically. Am I doing something wrong or does the man page
> > need to be correc
On Tue, Dec 01, 2015 at 11:35:46AM -0500, Greg Reagle wrote:
> On 12/01/2015 10:55 AM, Greg Reagle wrote:
> >I don't experience any bugs in sj, but I would like to see the raw XML
> >messages that are sent back and forth via sj, messaged, iqd, and
> >presenced, in order to be able to understand bet
On Fri, Dec 04, 2015 at 11:21:17AM -0500, Greg Reagle wrote:
> On 12/04/2015 12:57 AM, Jan Klemkow wrote:
> >I wrote ucspi-tee[1] to do this job for me. But I think there is a
> >similar tool of djb's tool chain, that does it, too.
>
> Okay yes I can compile and run yo
Hi Greg,
presenced was the last daemon I wrote just before the slcon2. Its just
a short hack, that I didn't check to run correctly in real usage :-)
Thanks for the diffs. I'll have a look at them tonight. Because I am
busy now. But it looks good, beside of a few stylistic things.
bye,
Jan
O
I committed your diff for presenced with a following clean up. But
maybe, I will change the presenced semantic a bit.
But for the moment I fixes the daemon in a very good way.
Thanks for your help!
bye,
Jan
On Tue, Dec 08, 2015 at 01:57:26PM -0500, Greg Reagle wrote:
> In this message, I point
I don't know if it is production ready, but a former the former OpenBSD
developer mickey@ has written an own static linker, which he uses for
his OpenBSD fork AErieBSD.
The AErieBSD-Project is dead, but his linker is at github:
https://github.com/McIkye/tools
bye,
Jan
On Tue, Aug 04, 2015 at 10:
Hi,
I am programming on front-end and back-end tools for ii for several
years now. For the back-end I use UCSPI[0] (Unix Client Server Program
Interface). But there is no name for the front-end of tools like ii[1],
ratox[2], sj[3] or jj[4]. I used the term "ii-like" in my talk at the
slcon3, be
Hi,
this path applies action command support to ii. It was developed at the
slcon4, but I was to lazy. So, I sent it now.
Any comments or questions?
Bye,
Jan
>From 1ddd9265ff3601cc07181d3fc79d33296c77adaf Mon Sep 17 00:00:00 2001
From: Jan Klemkow
Date: Thu, 7 Sep 2017 22:00:29 +0
Hi Nihal,
On Sun, Jul 05, 2020 at 04:19:13PM -0500, Nihal Jere wrote:
> I wrote a very simple TLS reverse proxy which can be used as a companion
> to quark. Essentially, it just turns quark's HTTP into HTTPS. It depends
> only on libtls (from LibreSSL) and libbsd (for strlcpy).
>
> You can read m
On Fri, Jan 15, 2021 at 01:42:43AM -0800, Spenser Truex wrote:
> Has anyone a working setup for ii->sasl->tor?
I use ii with ucspi-patch[1] and ucspi-tools[2] to connect to IRC
servers via Tor and with SSL for certificate-user-authentication.
[1]: https://tools.suckless.org/ii/patches/ucspi/
[2]:
Hello community,
scroll is now tagged 0.1 as release and available as a tarball. I want
to thank all people who made patch contributions to make scroll better.
scroll-0.1: https://dl.suckless.org/tools/scroll-0.1.tar.gz
Further information under https://tools.suckless.org/scroll/
bye,
Jan
On Wed, Jul 07, 2021 at 08:55:07AM +0800, Patrick wrote:
> What's a good minimal sshd?
> Or should we just run stunnel + telnetd?
Telnet + TLS or rsh + TLS is also a possible solution. stunnel is not
enough. If you want to have a serious minimal replacement for ssh, you
will need key-based authe
Hi Fernando and Hiltjo,
On Sat, Oct 29, 2022 at 08:18:22PM +0200, Hiltjo Posthuma wrote:
> On Sat, Oct 29, 2022 at 11:38:10AM -0500, fernandoreyesavila3 wrote:
> > I am hosting an ergo irc server with self signed certificates.
> > Connecting to any public irc server works as expected. ii prints th
Hi Fernando,
On Sat, Oct 29, 2022 at 11:38:10AM -0500, fernandoreyesavila3 wrote:
> I am hosting an ergo irc server with self signed certificates.
> Connecting to any public irc server works as expected. ii prints the
> following when I try to connect to my server.
>
> $ ii -s servername.com -p 6
On Wed, 19 Jul 2023 16:42:58 +0200 (CEST), Sagar Acharya wrote:
> Please let us know authoritative and recursive DNS servers.
I also use unbound and nsd in official setups, because its OpenBSD
default and I need to serve more than A and records.
In testing setups I like dnsmasq, because it
25 matches
Mail list logo