• FTN connections

    From Skuz@21:1/105 to Hawk on Sun Dec 30 14:39:30 2018
    My log shows 1 network working and fidonet NOT working. So were half way there

    + 2018.12.30 11:29:23 BINKP 1-Authenticating 1:135/369@fidonet by CRAM-MD5
    + 2018.12.30 11:29:23 BINKP 1-Bad password for 1:135/369@fidonet
    + 2018.12.30 11:29:23 BINKP 1-Authenticating 9:91/17@survnet by CRAM-MD5
    + 2018.12.30 11:29:23 BINKP 1-S: OK secure
    + 2018.12.30 11:29:23 BINKP 1-Created BUSY file: Exists=True (c:\mystic\echomail\out\survnet.009\005b0011.bsy)
    + 2018.12.30 11:29:23 BINKP 1-Queued 2 files for 9:91/17@survnet
    + 2018.12.30 11:29:23 BINKP 1-Bad password for 1:135/369@fidonet
    + 2018.12.30 11:29:23 BINKP 1-Before Frame State R:WaitFile T:NextFile Have:False Need:True
    + 2018.12.30 11:29:23 BINKP 1-Sending: 0000fff0.su0 (279,564 bytes)
    + 2018.12.30 11:29:23 BINKP 1-S: FILE 0000fff0.su0 279564 1546168824 0
    + 2018.12.30 11:29:23 BINKP 1-Before Frame State R:WaitFile T:SendData Have:False Need:True
    + 2018.12.30 11:29:23 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:24 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:24 BINKP 1-New frame detected
    + 2018.12.30 11:29:24 BINKP 1-Begin receive command frame: EOB (Size=0)
    + 2018.12.30 11:29:24 BINKP 1-R: EOB
    + 2018.12.30 11:29:24 BINKP 1-After Frame State R:WaitFile T:SendData Have:True Need:False
    + 2018.12.30 11:29:24 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:24 BINKP 1-Before Frame State R:Done T:SendData
    Have:False Need:True
    + 2018.12.30 11:29:24 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:24 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:24 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:24 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:24 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (16384): 16,384
    + 2018.12.30 11:29:25 BINKP 1-Sent Data Frame (1036): 1,036
    + 2018.12.30 11:29:25 BINKP 1-Before Frame State R:Done T:GetEOF Have:False Need:True
    + 2018.12.30 11:29:26 BINKP 1-New frame detected
    + 2018.12.30 11:29:26 BINKP 1-Begin receive command frame: GOT (Size=30)
    + 2018.12.30 11:29:26 BINKP 1-R: GOT 0000fff0.su0 279564 1546168824
    + 2018.12.30 11:29:26 BINKP 1-After Frame State R:Done T:GetEOF Have:True Need:False
    + 2018.12.30 11:29:26 BINKP 1-Before Frame State R:Done T:NextFile
    Have:False Need:True
    + 2018.12.30 11:29:26 BINKP 1-Sending: 1220c0b9.pkt (281 bytes)
    + 2018.12.30 11:29:26 BINKP 1-S: FILE 1220c0b9.pkt 281 1546168824 0
    + 2018.12.30 11:29:26 BINKP 1-Before Frame State R:Done T:SendData
    Have:False Need:True
    + 2018.12.30 11:29:26 BINKP 1-Sent Data Frame (281): 281
    + 2018.12.30 11:29:26 BINKP 1-Before Frame State R:Done T:GetEOF Have:False Need:True
    + 2018.12.30 11:29:26 BINKP 1-New frame detected
    + 2018.12.30 11:29:26 BINKP 1-Begin receive command frame: GOT (Size=27)
    + 2018.12.30 11:29:26 BINKP 1-R: GOT 1220c0b9.pkt 281 1546168824
    + 2018.12.30 11:29:26 BINKP 1-After Frame State R:Done T:GetEOF Have:True Need:False
    + 2018.12.30 11:29:26 BINKP 1-Before Frame State R:Done T:NextFile
    Have:False Need:True
    + 2018.12.30 11:29:26 BINKP 1-S: EOB
    + 2018.12.30 11:29:26 BINKP 1-Session ended (2 sent, 0 rcvd, 0 skip)

    I've also upgrade my prealpha A42, I think we should use the same passwords
    for both networks and see if that helps the issue.

    --- Mystic BBS v1.12 A42 2018/12/30 (Windows/32)
    * Origin: flupH | fluph.araknet.xyz (21:1/105)