| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Unsecured connection |
On 09/24/14, Avon said the following... Av> The feedback from his end is: Av> Av> This is what my Radius reports during connects to your Mystic... Av> Av> : 23-Sep-2014 16:35:55 Mailer : Mystic/1.10 binkp/1.0 Av> Av> Then, when there was trouble... Av> Av> 23-Sep-2014 16:35:55 Aborting due to carrier loss Av> Av> Which is what the BinkD FAQ states is caused by some shifty encryption Av> attempt by a Radius mailer. it isn't really "shifty" but simply mis-coded such that radius/argus assumes that the other side can handle it... as the FAQ states, it should check the other side's capabilities first and then not use it OR send an M_ERR block stating why the session is being aborted... i suspect that they were going to try to get the method added to binkd but never got that far due to problems around those times... i can't help but to wonder if Taurus fixed this problem since it comes from the same code and has many fixes and improvements... --- Mystic BBS v1.10 A52 (Windows) þ Synchronet þ thePharcyde_ >> telnet://bbs.pharcyde.org (Wisconsin)* Origin: (46:1/132) SEEN-BY: 19/33 103/705 124/5013 5014 5015 5016 130/803 154/10 203/0 221/0 SEEN-BY: 229/275 426 261/38 280/464 5003 292/624 396/40 45 423/120 633/267 280 SEEN-BY: 640/1384 712/132 620 848 770/1 31999/99 @PATH: 124/5013 5014 396/45 280/464 712/848 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.