TIP: Click on subject to list as thread! ANSI
echo: win95
to: G00R00
from: ACCESS DENIED
date: 2019-01-31 19:20:24
subject: Re: CrashMail

Hello g00r00,

On 06 Sep 14 12:27, g00r00 wrote to Avon:

 gr> BINKP has an unsecure inbound directory, where all files received from
 gr> an unknown source are saved.  Then there is an option in MUTIL to toss
 gr> unsecured packets and a second option to process unsecure TIC files.
 gr> If these are on, it fully processes them as if they were secure.

 gr> However, as AD recommended, it should never toss echomail or TIC; only
 gr> netmail for the automatic unsecure.  So this leaves me with two
 gr> options:

 gr> 1) Add an option to say "only toss netmail" or
 gr> 2) Remove the ability to process unsecure TIC/echomail all together.

 gr> Not sure which one to do, and I am open to suggestions.

My suggestion would be to only toss netmail, and leave the rest untouched in 
the unsecure directory. All a sysop would need to do if they wished to process 
that tic and file and/or echomail, would be to move them to the secure inbound 
directory.

 gr> Tossing the ONLY netmail from unsecure but keeping the echomail is a
 gr> challenge, because then Mystic would have to completely rebuild all of
 gr> the packets that come in so that they no longer contain the Netmail
 gr> messages that have already been processed.

 gr> I wonder how tossers handle this and what options they have today?

Very good point. Then again, quite a few (except maybe D'Bridge) mail/file 
tossers are completely separate from each other as well. I do know Htick has a 
"toss bad tics" command line option, but I don't think that has
anything to do 
with unsecure, just TIC files that weren't processed correctly the first time 
and moved to the bad folder.

HPT also has an option to toss mail from the BAD area, but I don't see anything
 
in regards to the unsecure folder. That being said, it would seem as though 
both of those leave it completely up to the sysop to move the contents of the 
unsecure inbound over to the secure inbound manually, which then they can 
process it.

That being said, once it's processed, it would probably end up in the BAD 
folder anyways, because if it was unsecure, it was probably not from a defined 
link, unless you were connecting someone new and they didn't have the proper 
authorization via the mailer.

I'm not completely sure with where to go with this. It would be *nice* to be 
able to process any netmail. Just recently there were instances where netmail 
ended up in someone's unsecure folder, and they didn't find it there for more 
than a week until someone mentioned sending something to that person. But like 
you said, if it's only that, and echomail/tics stayed in the unsecure folder 
for manual processing.. it would be a pain in the ass to search all echomail 
bundles/packets for any netmail that may be in them. :(

It may just be better to leave it as you have it, and let the sysop do any of 
it manually. If other tossers aren't doing it I'm sure it's probably for the 
same reasons you've already covered. That would give the sysop a chance to (if 
they were so inclined) to break apart any bundles to see what the contents are 
(netmail or echomail) before making the decision to process it.

Heh. Thanks for making me think it over, too! :)

Regards,
Nick

--- GoldED+/LNX 1.1.5-b20130910
 þ Synchronet þ thePharcyde_ >> telnet://bbs.pharcyde.org (Wisconsin)
* Origin: thePharcyde_ telnet://bbs.pharcyde.org (Wisconsin) (46:1/701)
SEEN-BY: 19/33 103/705 124/5013 5014 5015 5016 130/803 154/10 203/0 221/0
SEEN-BY: 229/275 426 261/38 280/464 5003 292/624 396/40 45 423/120 633/267 280
SEEN-BY: 640/1384 712/132 620 848 770/1 31999/99
@PATH: 124/5013 5014 396/45 280/464 712/848 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.