| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: CrashMail |
Hello g00r00, On 06 Sep 14 12:27, g00r00 wrote to Avon: gr> BINKP has an unsecure inbound directory, where all files received from gr> an unknown source are saved. Then there is an option in MUTIL to toss gr> unsecured packets and a second option to process unsecure TIC files. gr> If these are on, it fully processes them as if they were secure. gr> However, as AD recommended, it should never toss echomail or TIC; only gr> netmail for the automatic unsecure. So this leaves me with two gr> options: gr> 1) Add an option to say "only toss netmail" or gr> 2) Remove the ability to process unsecure TIC/echomail all together. gr> Not sure which one to do, and I am open to suggestions. My suggestion would be to only toss netmail, and leave the rest untouched in the unsecure directory. All a sysop would need to do if they wished to process that tic and file and/or echomail, would be to move them to the secure inbound directory. gr> Tossing the ONLY netmail from unsecure but keeping the echomail is a gr> challenge, because then Mystic would have to completely rebuild all of gr> the packets that come in so that they no longer contain the Netmail gr> messages that have already been processed. gr> I wonder how tossers handle this and what options they have today? Very good point. Then again, quite a few (except maybe D'Bridge) mail/file tossers are completely separate from each other as well. I do know Htick has a "toss bad tics" command line option, but I don't think that has anything to do with unsecure, just TIC files that weren't processed correctly the first time and moved to the bad folder. HPT also has an option to toss mail from the BAD area, but I don't see anything in regards to the unsecure folder. That being said, it would seem as though both of those leave it completely up to the sysop to move the contents of the unsecure inbound over to the secure inbound manually, which then they can process it. That being said, once it's processed, it would probably end up in the BAD folder anyways, because if it was unsecure, it was probably not from a defined link, unless you were connecting someone new and they didn't have the proper authorization via the mailer. I'm not completely sure with where to go with this. It would be *nice* to be able to process any netmail. Just recently there were instances where netmail ended up in someone's unsecure folder, and they didn't find it there for more than a week until someone mentioned sending something to that person. But like you said, if it's only that, and echomail/tics stayed in the unsecure folder for manual processing.. it would be a pain in the ass to search all echomail bundles/packets for any netmail that may be in them. :( It may just be better to leave it as you have it, and let the sysop do any of it manually. If other tossers aren't doing it I'm sure it's probably for the same reasons you've already covered. That would give the sysop a chance to (if they were so inclined) to break apart any bundles to see what the contents are (netmail or echomail) before making the decision to process it. Heh. Thanks for making me think it over, too! :) Regards, Nick --- GoldED+/LNX 1.1.5-b20130910 þ Synchronet þ thePharcyde_ >> telnet://bbs.pharcyde.org (Wisconsin)* Origin: thePharcyde_ telnet://bbs.pharcyde.org (Wisconsin) (46:1/701) SEEN-BY: 19/33 103/705 124/5013 5014 5015 5016 130/803 154/10 203/0 221/0 SEEN-BY: 229/275 426 261/38 280/464 5003 292/624 396/40 45 423/120 633/267 280 SEEN-BY: 640/1384 712/132 620 848 770/1 31999/99 @PATH: 124/5013 5014 396/45 280/464 712/848 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.