| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Processing Mail Files? |
Hello mark. 13 Dec 15 10:31, you wrote to me: ml> 11 Dec 15 22:33, you wrote to All: JS>> bundle c:\Radius\inbound\ca2f6c6c.fr1: renaming to .tos JS>> bundle c:\Radius\inbound\ca2f6c6c.tos: tossing in unsecure JS>> inbound, security violation Renaming pkt/arc to .sec JS>> If I manually unzip the .PKT files then call HPT the .PKT files JS>> toss fine. ZIP is the agreed upon archiver. ml> *how* is your link zipping them? what is their zip command in their ml> tosser? what are the first 8 bytes (in hex please) of the file they ml> are sending you? I will ask Janis and get back to you. JS>> I have tried both the internal Unzip support as well as an JS>> external Unzip program to no avail. My command lines appear to be the very close to yours: Unpack "unzip -joLqq $a -d $p" 0 504b0304 Pack zip "zip -9 -jgq $a $f" ml> what is your unzip command? here's both of mine and the spacing on the ml> two lines had to be like shown for some reason... ml> Unpack "unzip -j -Loqq $a $f -d $p" 0 504b0304 ml> Pack zip "zip -9 -j -q $a $f" ml> i should note that this system connects to only one other system and ml> no packer is defined for that system so we are sending raw PKTs to ml> each other... this day in time, there's no real reason to be bundling ml> up PKTs... especially when the available protocols can compress on the ml> fly during transmission just like a web server... We have already agreed to use uncompressed PKT's when tranfering mail in the future. JS>> I am not sure where the "Security Violation" determination is JS>> coming from. ml> probably because it cannot determine the originating system and/or the ml> pkt format... The wierd part is that if I use the same command line that HPT uses with the exception of replacing the $a and the $p with the actual data in a "DOS" window. The command unpack the mail bundle ok. I was looking at unpacking the mail bundles via a batch file prior to calling HPT but ran into batch file limitations when using wildcards in filenames. ml> )\/(ark Jeff --- GoldED+/W32-MINGW 1.1.5-b20070503* Origin: Region 14 IP Server - ftn.region14.org (1:14/5) SEEN-BY: 11/201 14/5 34/999 90/1 116/18 120/331 123/500 128/187 140/1 218/700 SEEN-BY: 222/2 226/0 160 230/150 240/1120 249/303 250/1 261/38 100 266/404 SEEN-BY: 267/155 280/464 1027 282/1031 1056 292/907 908 320/219 340/400 393/68 SEEN-BY: 396/45 633/267 280 640/384 712/550 848 770/1 801/161 @PATH: 14/5 261/38 712/848 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.