TIP: Click on subject to list as thread! ANSI
echo: aviation
to: ELVIS HARGROVE
from: CHRIS ANDERSON
date: 1997-08-23 13:17:00
subject: COMMENT 16/08/97 11:37

 > Tony, My NEC has suggested that I send a message to all nodes in the
 > AVIATION echo who are still being attacked, to USE SESSION PASSWORDS
 > with ALL links in and out of their system.  THis will STOP (Drasticly
 > curtail anyway) them getting bales more of the rammed messages.
Wish I could agree, Elvis, but it looks as though we have one mailer out here 
that doesn't properly segregate *packets* received without session password 
into a safe directory that the unpacker software won't see/use.  Net104's hub 
system certainly is protected by session passwords.  Intermail apparantly has 
some real problems.
Problem: The inbound archive files received without session password are 
parked safely away as they should be, but not the packets.  We have found a 
workaround to that, but can only apologize for discovering that the mailer we 
have been using (and is in reasonably common use elsewhere, unfortunately) 
works poorly.  If we'd left well enough alone and still been using eSoft 
TIMS/FLAME to handle our mail processing here, we wouldn't have had this 
problem.  It takes nearly no effort at all to create a bulletproof system 
with this software.  Unfortunately, a prior administration insisted on 
changing over to other software (and more hardware) to do the same job we'd 
been doing reliably here for years on a single machine, primarily because 
they didn't want to take the time to understand what had been inherited.
--- FLAME v1.1
---------------
* Origin: The Dinosaur Board [Niwot, CO] (1:104/114)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.