• This is what I saw for my first [link](http) test in

    From August Abolins@2:460/256 to All on Sun May 23 15:54:20 2021
    Hi All,
    ...Greets from my Telegram app!

    This is what I saw for my first [link](http) test in FIDOTEST https://brorabbit.g0x.ru/pic/60aa507a.jpg


    Ciao!
    /|ug (https://t.me/aabolins)

    ... Searchable Help for OXP https://openxp.kolico.ca
    --- Want fido for iOS/MacOS/Android/Win/Linux? Info=https://shrtco.de/tpJ9yV
    * Origin: Fido by Telegram BBS from Stas Mishchenkov (2:460/256)
  • From Brother Rabbit@2:460/58.10 to August Abolins on Sun May 23 18:25:42 2021
    Hi, August!

    23 ¬ © 21 15:54, August Abolins -> All:

    This is what I saw for my first [link](http) test in FIDOTEST https://brorabbit.g0x.ru/pic/60aa507a.jpg

    This is a *good* reason to abandon the program in which the message was created. First, it inserted a character that _isn't_ there; secondly, it inserted a character that _shouldn't_ _be_ in the Fido messages. I mean the character 0x0A (you see %0A).

    Have nice nights.
    Brother Rabbit.

    --- ‚ ᯮॠ¬ã¦ç¨­ë á ¦¥­é¨­®© ­¥ â®â ¯à ¢ ªâ® ¯à ¢,   â®â ªâ® ¢á¥£¤  ¯à ¢ .
    * Origin: Lame Users Breeding. Simferopol, Crimea. (2:460/58.10)
  • From August Abolins@2:221/1.58 to Brother Rabbit on Sun May 23 13:14:00 2021
    Hello Brother Rabbit!

    ** On Sunday 23.05.21 - 18:25, Brother Rabbit wrote to August Abolins:

    This is a *good* reason to abandon the program in which
    the message was created.

    Heheh! That's a good one. Made me laugh! :D


    First, it inserted a character that _isn't_ there;
    secondly, it inserted a character that _shouldn't_ _be_ in
    the Fido messages. I mean the character 0x0A (you see
    %0A).

    The x0A is legit. It's the same as a hard CR when this system
    prepares a message for which I've configured a maximum of 63
    chars per line.

    What I think your bot/tosser logic algorithm could do is look
    for illegal chars in the string of the (http....) part, and
    simply take them out.

    IOW, if it detects a [ and ] and ( and ) as consecutive pairs,
    then assume it is markup for a link, and then only allow valid
    chars inbetween the round braces.

    ?

    --
    ../|ug

    --- OpenXP 5.0.50
    * Origin: tg_bbs-> https://t.me/joinchat/TWCQfOZqwwOmweR1 (2:221/1.58)
  • From Brother Rabbit@2:460/58.10 to August Abolins on Mon May 24 12:04:10 2021
    Hi, August!

    23 ¬ © 21 13:14, August Abolins -> Brother Rabbit:

    This is a *good* reason to abandon the program in which
    the message was created.

    Heheh! That's a good one. Made me laugh! :D

    Nothing funny at all. The program behaves inadequately.

    First, it inserted a character that _isn't_ there;
    secondly, it inserted a character that _shouldn't_ _be_ in
    the Fido messages. I mean the character 0x0A (you see
    %0A).

    The x0A is legit. It's the same as a hard CR when this system
    prepares a message for which I've configured a maximum of 63
    chars per line.

    By the way, this is a violation of the standard. The 0x0A symbol *MUST* not be in the message at all. The 0x0D symbol should not appear where the author of the message did not put it with his own hands.

    What I think your bot/tosser logic algorithm could do is look
    for illegal chars in the string of the (http....) part, and
    simply take them out.

    Although, the standard says that when processing messages, the 0x0A character must be ignored.

    IOW, if it detects a [ and ] and ( and ) as consecutive pairs,
    then assume it is markup for a link, and then only allow valid
    chars inbetween the round braces.

    Yes. I can put such a spike, but it will mean that formally I will have to change the message, which in itself is not entirely good.

    Have nice nights.
    Brother Rabbit.

    --- Š®£¤  ï ¥¬ - ï £«ãå ¨ ­¥¬. Š®£¤  ï ¯ìî - ï £®à §¤® ª®¬¬ã­¨ª ¡¥«ì­¥©.
    * Origin: Lame Users Breeding. Simferopol, Crimea. (2:460/58.10)
  • From August Abolins@2:221/1.58 to Brother Rabbit on Mon May 24 08:28:00 2021
    Hello Brother Rabbit!

    ** On Monday 24.05.21 - 12:04, Brother Rabbit wrote to August Abolins:

    First, it inserted a character that _isn't_ there;
    secondly, it inserted a character that _shouldn't_ _be_
    in the Fido messages. I mean the character 0x0A (you see
    %0A).

    The x0A is legit. It's the same as a hard CR when this
    system prepares a message for which I've configured a
    maximum of 63 chars per line.

    By the way, this is a violation of the standard. The 0x0A
    symbol *MUST* not be in the message at all. The 0x0D
    symbol should not appear where the author of the message
    did not put it with his own hands.

    Hmmm.. in retrospect.. something indeed may be amiss. The 0x0A
    only revealed itself at the part were the line-break occurred
    for that link AFTER it showed up on your system. I don't think
    it was in the outbound packet leaving my system. If my system
    is the problem, then we should be seeing x0A at every
    linebreak, even in this message.

    What I think your bot/tosser logic algorithm could do is
    look for illegal chars in the string of the (http....)
    part, and simply take them out.

    Although, the standard says that when processing messages,
    the 0x0A character must be ignored.

    Doesn't that just apply to the header/control parts, and not
    the body/message?

    Anyway.. if an illegal char appeared in an https:// line posted
    in a message (high ansi?) I don't see anything wrong "cleaning"
    it up.

    https://f°i°d°o°n°e°t.org


    IOW, if it detects a [ and ] and ( and ) as consecutive
    pairs, then assume it is markup for a link, and then only
    allow valid chars inbetween the round braces.

    Yes. I can put such a spike, but it will mean that
    formally I will have to change the message, which in
    itself is not entirely good.

    But you're already changing the message when the marked up
    version goes through the Fido2telebot tosser on it's way to
    Telegram. No?
    --
    ../|ug

    --- OpenXP 5.0.50
    * Origin: tg_bbs-> https://t.me/joinchat/TWCQfOZqwwOmweR1 (2:221/1.58)