• Re: Mr. Test

    From Jay Harris@1:229/664 to August Abolins on Tue Jan 12 09:44:19 2021
    Let me know if this one has any password lurking inside.

    Still came through as bad:

    + Jan 11 21:20:59 Process: Importing EchoMail
    + Jan 11 21:20:59 Waiting for BUSY nodes
    + Jan 11 21:20:59 Importing 11212059.PKT (2:221/1.58 to 618:500/23)
    ! Jan 11 21:20:59 No echomail node configured for 2:221/1.58
    ! Jan 11 21:20:59 Moving /home/pi/mystic/echomail/in/unsecure/11212059.PKT to /home/pi/mystic/echomail/bad/11212059.PKT
    + Jan 11 21:20:59 Results: 0 echo, 0 net, 0 dupes, 0 tossed in 0.10s


    And a password is set & visible:

    pktview V1.1, Copyright WvV 1998, 2016

    Dest. Node addr: 618:500/23.0
    Orig. Node addr: 2:221/1.58
    QDest Zone : 618
    QOrig Zone : 2
    Aux Net : 0
    Date : 2021/01/11
    Time : 00:00:00
    Baud : 0
    Pkt Type : 2
    ProdCode : 233
    Revision Major : 3
    Revision Minor : 20
    Password : (hidden)
    Capability Word: 0001
    Capability Val.: 0001
    Product data : 00000000

    Date Time To From Subject Area ----------------------------------------------------------------------------- 11 Jan 21 21:20:00 Jay Harris Mr.TEST testing for pk

    1 messages in this .pkt file.


    Jay

    --- Mystic BBS v1.12 A47 2021/01/05 (Raspberry Pi/32)
    * Origin: Northern Realms (1:229/664)
  • From Tommi Koivula@2:221/1.2 to Jay Harris on Tue Jan 12 17:23:00 2021
    Let me know if this one has any password lurking inside.

    Still came through as bad:

    + Jan 11 21:20:59 Process: Importing EchoMail
    + Jan 11 21:20:59 Waiting for BUSY nodes
    + Jan 11 21:20:59 Importing 11212059.PKT (2:221/1.58 to 618:500/23)
    ! Jan 11 21:20:59 No echomail node configured for 2:221/1.58
    ! Jan 11 21:20:59 Moving /home/pi/mystic/echomail/in/unsecure/11212059.PK T to /home/pi/mystic/echomail/bad/11212059.PKT + Jan 11 21:20:59 Results: 0 echo, 0 net, 0 dupes, 0 tossed in 0.10s

    So the difference to my netmail was that my .pkt did not contain password.

    I'll send you one more crashmail, with pkt.password 12345678.

    'Tommi

    --- OpenXP 5.0.48
    * Origin: -----> (2:221/1.2)
  • From Jay Harris@1:229/664 to Tommi Koivula on Tue Jan 12 10:55:13 2021
    On 12 Jan 2021, Tommi Koivula said the following...

    So the difference to my netmail was that my .pkt did not contain
    password.

    I'll send you one more crashmail, with pkt.password 12345678.

    Bingo! This one failed:


    + Jan 12 10:24:21 Process: Importing EchoMail
    + Jan 12 10:24:21 Waiting for BUSY nodes
    + Jan 12 10:24:21 Importing 12172411.PKT (2:221/1.2 to 1:229/664)
    ! Jan 12 10:24:21 No echomail node configured for 2:221/1.2
    ! Jan 12 10:24:21 Moving /home/pi/mystic/echomail/in/unsecure/12172411.PKT to /home/pi/mystic/echomail/bad/12172411.PKT
    + Jan 12 10:24:21 Results: 0 echo, 0 net, 0 dupes, 0 tossed in 0.09s


    pktview V1.1, Copyright WvV 1998, 2016

    Dest. Node addr: 1:229/664.0
    Orig. Node addr: 2:221/1.2
    QDest Zone : 1
    QOrig Zone : 2
    Aux Net : 0
    Date : 2021/01/12
    Time : 00:00:00
    Baud : 0
    Pkt Type : 2
    ProdCode : 26
    Revision Major : 3
    Revision Minor : 20
    Password : 12345678
    Capability Word: 0001
    Capability Val.: 0001
    Product data : 00000000

    Date Time To From Subject Area ----------------------------------------------------------------------------- 12 Jan 21 17:24:00 Jay Harris Tommi Koivula Re: Mr. Test

    1 messages in this .pkt file.


    Jay

    --- Mystic BBS v1.12 A47 2021/01/05 (Raspberry Pi/32)
    * Origin: Northern Realms (1:229/664)
  • From Tommi Koivula@2:221/1.1 to Jay Harris on Tue Jan 12 18:53:16 2021
    * Originally in points
    * Crossposted in mystic

    Hi Jay.

    So the difference to my netmail was that my .pkt did not contain
    password.

    I'll send you one more crashmail, with pkt.password 12345678.

    Bingo! This one failed:

    So it seems that Mystic doesn't like .pkt's with password in unsecure inbound. It is not necessarily a bad thing. :)

    + Jan 12 10:24:21 Process: Importing EchoMail
    + Jan 12 10:24:21 Waiting for BUSY nodes
    + Jan 12 10:24:21 Importing 12172411.PKT (2:221/1.2 to 1:229/664)
    ! Jan 12 10:24:21 No echomail node configured for 2:221/1.2
    ! Jan 12 10:24:21 Moving
    /home/pi/mystic/echomail/in/unsecure/12172411.PKT to
    /home/pi/mystic/echomail/bad/12172411.PKT + Jan 12 10:24:21 Results: 0
    echo, 0 net, 0 dupes, 0 tossed
    in 0.09s

    'Tommi

    ---
    * Origin: IPv6 Point at [2001:470:1f15:cb0:2:221:1:1] (2:221/1.1)
  • From August Abolins@1:153/757.2 to Tommi Koivula on Wed Jan 13 07:55:57 2021
    So the difference to my netmail was that my .pkt did not contain
    password.

    I'll send you one more crashmail, with pkt.password 12345678.

    Bingo! This one failed:

    So it seems that Mystic doesn't like .pkt's with password in unsecure inbound. It is not necessarily a bad thing. :)

    :D It only means that all the systems that I crashmailed or freq'd in the last
    2 years had a chance to see what our session password was.
    --- SBBSecho 3.12-Linux
    * Origin: The Rusty MailBox - Penticton, BC Canada (1:153/757.2)