| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | packet passwords |
Hello Scot! Tuesday August 06 1996 07:43, Scot Woodward wrote to All: SW> It seems that whenever I get an uncompressed packet (BLAH.PKT) from my SW> uplink, the packet password turns out to be the session password. My SW> uplink says that everything seems fine on his end, and nothing gets SW> run in between Binkley and Squish (which complains about the SW> password), so my guess is that Binkley is doing it. I doubt that, since Binkley doesn't do anything with packet files except send and receive them. Does your uplink use FrontDoor or InterMail? These mailers use the session password for the packet password in any NetMail packets they create. SW> Compressed packets always have the proper password. Then your uplink's mail processor is configured properly. SW> Does anyone have any insight regarding this problem? If your uplink is using FD or IM, then these are most likely NetMail packets, since these packages don't allow you to select the packet password to use. If your uplink uses Binkley, then he should look at whatever he uses to pack his NetMail. Andrew --- GEcho/2 1.20/beta+* Origin: Bits & Bytes BBS * H16/V34 * (860)535-4284 (1:320/119) SEEN-BY: 50/99 157/534 620/243 622/419 623/630 625/100 626/660 665 667 668 SEEN-BY: 626/670 633/2 640/820 711/401 409 410 413 416 430 501 808 809 934 SEEN-BY: 711/955 712/515 713/888 714/906 800/1 @PATH: 320/119 270/101 396/1 157/110 534 626/660 711/401 808 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.