TIP: Click on subject to list as thread! ANSI
echo: binkley
to: Scot Woodward
from: Andrew Leary
date: 1996-08-09 22:45:48
subject: packet passwords

Hello Scot!

Tuesday August 06 1996 07:43, Scot Woodward wrote to All:

 SW> It seems that whenever I get an uncompressed packet (BLAH.PKT) from my
 SW> uplink, the packet password turns out to be the session password.  My
 SW> uplink says that everything seems fine on his end, and nothing gets
 SW> run in between Binkley and Squish (which complains about the
 SW> password), so my guess is that Binkley is doing it.

I doubt that, since Binkley doesn't do anything with packet files except
send and receive them.  Does your uplink use FrontDoor or InterMail?  These
mailers use the session password for the packet password in any NetMail
packets they create.

 SW> Compressed packets always have the proper password.

Then your uplink's mail processor is configured properly.

 SW> Does anyone have any insight regarding this problem?

If your uplink is using FD or IM, then these are most likely NetMail
packets, since these packages don't allow you to select the packet password
to use.

If your uplink uses Binkley, then he should look at whatever he uses to
pack his NetMail.

Andrew

--- GEcho/2 1.20/beta+

* Origin: Bits & Bytes BBS * H16/V34 * (860)535-4284 (1:320/119)
SEEN-BY: 50/99 157/534 620/243 622/419 623/630 625/100 626/660 665 667 668
SEEN-BY: 626/670 633/2 640/820 711/401 409 410 413 416 430 501 808 809 934
SEEN-BY: 711/955 712/515 713/888 714/906 800/1
@PATH: 320/119 270/101 396/1 157/110 534 626/660 711/401 808 934

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.