Received: with ECARTIS (v1.0.0; list gopher); Mon, 11 Sep 2006 15:38:55 -0500 (CDT) Received: from gatekeeper.excelhustler.com ([69.44.136.67] helo=excelhustler.com) by glockenspiel.complete.org with esmtps (with TLS-1.0:RSA_AES_256_CBC_SHA:32) (No TLS peer certificate) (Exim 4.50) id 1GMsYN-0006mn-Ao; Mon, 11 Sep 2006 15:38:55 -0500 Received: from jgoerzen by wile.internal.excelhustler.com with local (Exim 4.62) (envelope-from ) id 1GMsYT-0006vW-8i; Mon, 11 Sep 2006 15:38:57 -0500 Date: Mon, 11 Sep 2006 15:38:57 -0500 From: John Goerzen To: gopher@complete.org Subject: [gopher] Re: pygopherd 2.0.16 released Message-ID: <20060911203857.GB26453@excelhustler.com> References: <20060911142920.GA27793@katherina.lan.complete.org> <37041.69.21.205.10.1158006499.squirrel@69.21.205.10> MIME-Version: 1.0 Content-type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <37041.69.21.205.10.1158006499.squirrel@69.21.205.10> User-Agent: Mutt/1.5.12-2006-07-14 X-Spam-Status: No (score 0.0): AWL=0.028 X-Virus-Scanned: by Exiscan on glockenspiel.complete.org at Mon, 11 Sep 2006 15:38:55 -0500 Content-Transfer-Encoding: 8bit X-archive-position: 1388 X-ecartis-version: Ecartis v1.0.0 Sender: gopher-bounce@complete.org Errors-to: gopher-bounce@complete.org X-original-sender: jgoerzen@complete.org Precedence: bulk Reply-to: gopher@complete.org List-help: List-unsubscribe: List-software: Ecartis version 1.0.0 List-Id: Gopher X-List-ID: Gopher List-subscribe: List-owner: List-post: List-archive: X-list: gopher On Mon, Sep 11, 2006 at 03:28:19PM -0500, Benn Newman wrote: > John Goerzen said: > > This is a long-standing need and should address the memory leaking > > that some have noticed with PyGopherd, which was caused by clients -- > > oftem spambots -- that simply die in the middle of a conversation. > Spam bots? Bots that are accessing the server over HTTP trying to find email addresses to spam. They generally seem to be quite ill-behaved. I am suspicious that people are writing malware to do the downloads for these bots. The new timeout code seems to be highly effective in combating them. -- John