| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Packet passwords |
Hello Roger, On 25 May 16 18:10, Roger Nelson wrote to Nicholas Boel: NB>> I offered up my "othernet" as a testing suite for any DB users NB>> that were currently members (including Nick, who is a member) NB>> where I would've intercepted any *.bad echomail packets in order NB>> to look in them for answers as well as share them here. RN> That was a very nice offer, but it had to be solved one of two places RN> -- here in the echo where everyone including Nick Andre would be aware RN> of the problem or just between Joe Delahaye and I. I think we finally RN> have a solution, but will wait a reasonable amount of time before RN> publishing the findings here because while I was sure last week RN> wherein the problem lay, I'm not so sure today. The offer was made directly to Nick Andre (and then secondly to anyone else in that network that wanted to test out their setup), since he is a longstanding member of Agoranet (the othernet I host). That test echomail would have went directly from his system to mine (DBridge to Synchronet - where the problem seems to lie along with Mystic). I could have produced the logs as well as the packet with proof there is indeed a packet password included in it. If it wouldn't have been in *his* test.. then it could have been narrowed down to something specific to some (if not all) DB user's configurations, etc. Or if it indeed was password protected, he would then have absolute proof to look further into the matter. NB>> That obviously wasn't necessary, so what was the outcome? RN> See above. I really appreciate the offer Nick, and can't thank you RN> enough. No problem. Keep us (or at the very least, me!) posted with your findings. DB is one of the few (and probably one out of two closed source) softwares I keep my eye on and interest in when it comes to updates and future plans! Regards, Nick --- GoldED+/LNX 1.1.5-b20160322* Origin: thePharcyde_ telnet://bbs.pharcyde.org (Wisconsin) (1:154/10) SEEN-BY: 14/5 19/33 34/999 90/1 116/18 120/331 123/500 128/187 140/1 218/700 SEEN-BY: 222/2 230/150 240/1120 249/303 250/1 261/38 100 266/404 267/155 SEEN-BY: 280/1027 282/1056 292/907 908 320/119 219 340/400 393/68 396/45 SEEN-BY: 633/267 280 640/384 712/620 848 770/1 801/161 189 @PATH: 154/10 123/500 261/38 712/848 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.