💾 Archived View for rawtext.club › ~sloum › geminilist › 002498.gmi captured on 2020-09-24 at 03:04:40. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2020-09-24)
-=-=-=-=-=-=-
Öppen tva at fastmail.se
Tue Aug 25 12:20:25 BST 2020
- - - - - - - - - - - - - - - - - - -
Thanks Kevin, and yes, something is afoot with some addresses. The client torture test at gemini://gemini.conman.org/test/torture/ used to render fine, but in later builds it's failing. I'll investigate for the next release.
On Tue, 25 Aug 2020, at 12:16 PM, Kevin Sangeelee wrote:
This is looking really nice, aesthetics are great and it's really fast.
Curiously, I noticed that it fails when fetching many CGI-generated
URLs, all mine yield a blank screen, other sites have missing data.
I did a little checking, and it seems that (at least some) servers
don't properly signal their intention to close the TLS session when
sending the output of CGI scripts.
I wonder if your client picks up this error and abandons the response
(which in fact was received correctly)? If so, perhaps it could instead
flush any input buffers and keep the response.
I have put a few notes below in case it's of use to you.
Kevin
---------------------------------------
# Example URL that fails in Två:
gemini://gemini.susa.net/cgi-bin/twitter
# Response is received, but with an error.
kevin at kakapo:~/gemini/content$ echo -ne
"gemini://gemini.susa.net/cgi-bin/twitter\r\n
<http://gemini.susa.net/cgi-bin/twitter/r/n>"|gnutls-cli
--no-ca-verification --port=1965 gemini.susa.net
Processed 151 CA certificate(s).
Resolving 'gemini.susa.net:1965'...
Connecting to '78.46.186.193:1965'...
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
- subject `CN=*.susa.net', issuer `CN=*.susa.net', serial
0x00af7f3177de559661, RSA key 4096 bits, signed using RSA-SHA256,
activated `2020-07-10 21:47:06 UTC', expires `2030-07-08 21:47:06 UTC',
pin-sha256="kUjkK2Oa2yhHsyFHokB3df7DqbTxgIwzah2bLzZFAjw="
Public Key ID:
sha1:c6b2cce3070eba096a2ddede1b65d8684bb04ff1
sha256:9148e42b639adb2847b32147a2407775fec3a9b4f1808c336a1d9b2f3645023c
Public Key PIN:
pin-sha256:kUjkK2Oa2yhHsyFHokB3df7DqbTxgIwzah2bLzZFAjw=
- Successfully sent 0 certificate(s) to server.
- Description: (TLS1.2-X.509)-(ECDHE-X25519)-(RSA-SHA512)-(AES-256-GCM)
- Session ID:
10:69:F0:70:F3:B6:9B:B2:9E:DA:A3:7E:02:99:B4:86:BE:54:9E:94:FB:30:1F:66:C6:B8:61:20:88:21:F8:FF
- Options: extended master secret, safe renegotiation,
- Handshake was completed
- Simple Client Mode:
20 text/gemini
#The Twitter Oracle spake thus, the words spoken were:
```
Fr u hoes WEAK is u serious‼️
```
Just a tiny sample of what you're missing out on - refresh for more!***
Fatal error: Error in the pull function.
*** Server has terminated the connection abnormally.
On Mon, 24 Aug 2020 at 14:42, Öppen <tva at fastmail.se> wrote:
Hi all, I've been working on this in my spare time for the last week or two, still lots to do and it's buggy in places (especially tabs, and some pages aren't rendering (that _did_ work previously)) but it's shaping up nicely.
Download, more info, links to source etc: https://www.oppenlab.net/pr/tva/