Support for empty passwords was implemented. Editing of remote files was enabled. The ncftpls program can now filter and find files. New command aliases "mv" and "ll" were added. Resuming of ASCII mode transfers is now possible. Opening a site with a bookmark no longer assumes identical server configuration, making this more tolerant to server changes. Tildes in paths are handled better. Terminal handling was improved. Many other fixes and small improvements were made.
内部getline()と期間()ライブラリ関数()とFTPDuration gl_getlineに改称された()で名前空間の衝突を避けるために、およびMac OS Xのライブラリのglibc。サイトばutimeから追加のエラー応答コードが認識されます。場合は、サーバーMDTMのタイムスタンプを設定する、1つの試行が行わサポートしていません。ヌル文字は、CRなどの制御文字とLFはもはやFTPのURLでコマンドインジェクションを避けるために許可されています。問題は、タイムアウト転送が検出されている可能性がありますが、このプロセスをロックされて修正されました。小互換性の修正はMac OS Xは、Solaris 10、およびLinuxのために作られた。
タグ:
Minor bugfixes
The internal getline() and Duration() library functions were renamed to gl_getline() and FTPDuration() to avoid namespace collisions with glibc and Mac OS X libraries. Additional error response codes from SITE UTIME are now recognized. If the server does not support setting timestamps in MDTM, only one attempt is made. Control characters such as NUL, CR, and LF are no longer allowed in FTP URLs to avoid command injection. A problem where a timed-out transfer may have been detected but still locked up the process was fixed. Small compatibility fixes were made for Mac OS X, Solaris 10, and Linux.
This release fixes several small bugs, such as problems with proftpd 1.2.9 and IBM mainframes, recursive upload, and looping in ncftpbatch. Furthermore, the ncftp tools now try not to display account information in "ps" process info. The utilities accept config info from stdin.
This release has better compatibility with Serv-U and WS_FTP servers, support for GCC 3.4 precompiled headers, and a fix for an important bug that was causing socket leaks on Windows.
Firewall fixes for logins, compatibility fixes for C++ and Linux, and a fix for the ncftpbatch bug which caused an infinite loop or long sleeps. A security issue with proxy PORT connections and hijacking was identified.