On 05/15/16, Roger Nelson said the following...
What happens if you connect to a system that doesn't have a packet password for you and your system is looking for one?
I'm not certain what would happen with mystic. All my links that
use packet passwords are configured so and those that don't are
blank.
I'm going to go arrange a test and see what it does with an
unexpected password, and also the lack of a password when it is
expected.
Hey!
In case some of you were wondering, and judging by the lack of help
Joe and I have received, you haven't, we solved the packet password by ourselves.
On 23 May 16 15:41, Roger Nelson wrote to All:
Hey!
In case some of you were wondering, and judging by the lack of help NB>RN> Joe and I have received, you haven't, we solved the packet password by NB>RN> ourselves.
So what was the outcome?
I offered to help on more than one occasion with no response. That's
about all I can do.
So what was the outcome?
I offered to help on more than one occasion with no response.
That's about all I can do.
Sorry. I must have missed your postings. What did you offer, if you don't mind restating again?
On 24 May 16 06:04, Roger Nelson wrote to Nicholas Boel:
I offered to help on more than one occasion with no response.
That's about all I can do.
Sorry. I must have missed your postings. What did you offer, if you NB>RN> don't mind restating again?
I offered up my "othernet" as a testing suite for any DB users that were currently members (including Nick, who is a member) where I would've intercepted any *.bad echomail packets in order to look in them for
answers as well as share them here.
That obviously wasn't necessary, so what was the outcome?
I offered up my "othernet" as a testing suite for any DB users
that were currently members (including Nick, who is a member)
where I would've intercepted any *.bad echomail packets in order
to look in them for answers as well as share them here.
That was a very nice offer, but it had to be solved one of two places
-- here in the echo where everyone including Nick Andre would be aware
of the problem or just between Joe Delahaye and I. I think we finally have a solution, but will wait a reasonable amount of time before publishing the findings here because while I was sure last week
wherein the problem lay, I'm not so sure today.
That obviously wasn't necessary, so what was the outcome?
See above. I really appreciate the offer Nick, and can't thank you enough.
Sorry. I must have missed your postings. What did you offer,if you don't mind restating again?
While I have limited ways to look at this unless I load DB up in dosemu,
I suppose it's easy enough to ask. Is there by chance a "Session
password" setting in the echomail section of DB's config as well as a "Session password" setting in the BinkD config section?
On 25 May 16 18:10, Roger Nelson wrote to Nicholas Boel:
Sorry. I must have missed your postings. What did you offer, NB>NB>> if you don't mind restating again?
By the way, I just ran into another DB user that *just now* got the
issue, even though we've been transferring echomail/netmail packets as
well as door game packets for quite some time.
While I have limited ways to look at this unless I load DB up in dosemu,
I suppose it's easy enough to ask. Is there by chance a "Session
password" setting in the echomail section of DB's config as well as a "Session password" setting in the BinkD config section?
Reason I ask, is because when I noticed his mail (and even door game packets) coming in with a packet password just starting yesterday or
today, I asked the guy "Did you recently change something?" He only responded with "I noticed your system was looking for a session password, so I added one". This is all in light of everything working just fine before he added it.
There is only one location in the DB config for session password. It is located under "Advanced/Misc Security".
There is a separate location for a "Packet Password" that is located
under "Packet/Mail Control".
I have verified that I only have "Session Passwords" setup with no
"Packet Passwords". The Packet Password field is totally blank - never
has been used.
I can also verify that my hub instance is sending echomail with a packet password - using what I have setup under "Session Password".
I'm assuming that packet passwords were previously ignored in both Synchronet and Mystic. That's an assumption, but I have no other explanation as to why we just recently started noticing this issue.
The solution was simple. I just asked my uplinks to add a Packet
Password to match our session password.
While I have limited ways to look at this unless I load DB up in
dosemu, I suppose it's easy enough to ask. Is there by chance a
"Session password" setting in the echomail section of DB's config
as well as a "Session password" setting in the BinkD config
section?
There is only one location in the DB config for session password. It
is located under "Advanced/Misc Security".
There is a separate location for a "Packet Password" that is located
under "Packet/Mail Control".
I have verified that I only have "Session Passwords" setup with no
"Packet Passwords". The Packet Password field is totally blank -
never has been used.
I can also verify that my hub instance is sending echomail with a
packet password - using what I have setup under "Session Password".
I'm assuming that packet passwords were previously ignored in both Synchronet and Mystic. That's an assumption, but I have no other explanation as to why we just recently started noticing this issue.
The solution was simple. I just asked my uplinks to add a Packet
Password to match our session password.
While I have limited ways to look at this unless I load DB up in
dosemu, I suppose it's easy enough to ask. Is there by chance a
"Session password" setting in the echomail section of DB's config
as well as a "Session password" setting in the BinkD config
section?
The packet password setting is in Packet/mail control, while the
session password setting is in another section under Security
settings. Both areas are accesible from the main screen via the Esc
key for the pull-down menus.
I don't blame you for doing that, but I'd like to know what happened.
I want to know if my mailer is doing that, but I don't think it is.
Joe and I tested this by removing the session password and so
everything began working again. Once a session password in placed, however, the problem begins anew. I have never had a packet password
for him and many others, whom, I might add, do not have this problem.
I don't blame you for doing that, but I'd like to know what happened.
I want to know if my mailer is doing that, but I don't think it is.
Joe and I tested this by removing the session password and so
everything began working again. Once a session password in placed,
however, the problem begins anew. I have never had a packet password
for him and many others, whom, I might add, do not have this problem.
It wouldn't be your mailer doing that. It would be the editor or
tosser stuffing the password into the echomail header. The mailer
itself doesn't modify the contents of echomail/netmail.
On 28 May 16 05:50, Roger Nelson wrote to Nicholas Boel:
While I have limited ways to look at this unless I load DB up in
dosemu, I suppose it's easy enough to ask. Is there by chance a
"Session password" setting in the echomail section of DB's config
as well as a "Session password" setting in the BinkD config
section?
The packet password setting is in Packet/mail control, while the
session password setting is in another section under Security
settings. Both areas are accesible from the main screen via the Esc
key for the pull-down menus.
My only question (and I asked Mark the same) is if there is any
other binkd specific settings under that Security settings along
with the session password?
A session password should only be handled by the mailer. So is
there a way in DB to edit specific binkd commands (like the actual
"node" line where the session password should be placed) in DB?
28 May 16 07:45, you wrote to Roger Nelson:
I don't blame you for doing that, but I'd like to know what happened.
I want to know if my mailer is doing that, but I don't think it is.
Joe and I tested this by removing the session password and so
everything began working again. Once a session password in placed,
however, the problem begins anew. I have never had a packet password
for him and many others, whom, I might add, do not have this problem.
It wouldn't be your mailer doing that. It would be the editor or
tosser stuffing the password into the echomail header. The mailer
itself doesn't modify the contents of echomail/netmail.
it can't be the editor as they do not do anything with PKTs...
tossers assemble and disassemble PKTs while mailers send and
receive them ;)
Does the "Advanced/Misc Security" section have any other binkd specific settings? The session password should only be used during binkd's handshake, and not in echomail itself.
From what Rob tells me, there was a certain configuration with the old sbbsecho (which I apparantly used) where it ignored packet passwords.
This has been fixed in the new version.
That's definitely a simple "workaround", but not really a solution if we want to help get the issue found and fixed. :)
Is a "packet password" like having a password on an archive (zipped
file)? I get the feeling it isn't.
Sysop: | digital man |
---|---|
Location: | Riverside County, California |
Users: | 1,042 |
Nodes: | 16 (0 / 16) |
Uptime: | 00:00:35 |
Calls: | 500,919 |
Calls today: | 6 |
Files: | 109,372 |
D/L today: |
14,002 files (2,257M bytes) |
Messages: | 305,042 |
Posted today: | 6 |