From Oli@2:280/464.47 to All on Tue May 25 07:34:03 2021
Why is this happening?
- 07:02 [1045] VER binkd/1.1a-112/Linux binkp/1.1
[...]
+ 07:02 [1045] Remote has 0b of mail and 0b of files for us
- 07:02 [1045] OPT EXTCMD GZ BZ2
+ 07:02 [1045] Remote supports EXTCMD mode
+ 07:02 [1045] Remote supports GZ mode
+ 07:02 [1045] Remote supports BZ2 mode
? 07:02 [1045] Warning: remote set UNSECURE session
‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
+ 07:02 [1045] pwd protected session (MD5)
? 07:02 [1045] aborted by Perl after_handshake(): CRYPT mode is required. Disconnecting ...
[...]
What I understand from the log is that it's a password protected session, but the remote binkd does not offer CRYPT. I tried to reproduce this behaviour with another binkd instance for testing, but I'm unable to get this warning. I tried the -r parameter, but it seems to do nothing.
I'm also confused what UNSECURE means in that context. Without encryption? Or unsecure / non-secure as in session without a password (but it clearly says "pwd protected session (MD5)").
The warning is in protocol.c:
if (state->state == P_SECURE && strcmp(w, "non-secure") == 0)
{
state->crypt_flag=NO_CRYPT;
/* some development binkd versions send OPT CRYPT with unsecure session */
Log (1, "Warning: remote set UNSECURE session");
state->state_ext = P_REMOTE_NONSECURE;
}
I still don't understand what's going on there.
---
* Origin: . (2:280/464.47)
Who's Online
Recent Visitors
Guest
Thu Jan 30 15:56:01 2025
from
/bin/busybox Cat /proc/self/ex
via
Raw
Guest
Thu Jan 30 14:32:05 2025
from
/bin/busybox Cat /proc/self/ex
via
Raw
Guest
Thu Jan 30 13:05:51 2025
from
/bin/busybox Cat /proc/self/ex
via
Raw
Gretchiie
Thu Jan 30 07:38:59 2025
from
Derry, Nh
via
Telnet
Lonewolf
Thu Jan 30 02:00:21 2025
from
Little Flock, Ar
via
Telnet
Keyop
Wed Jan 29 23:50:37 2025
from
Huddersfield, West Yorkshire
via
SSH
Bob Worm
Wed Jan 29 21:46:11 2025
from
Wales, Uk
via
Telnet
Daniel Garrod
Wed Jan 29 18:41:27 2025
from
Cambridge, Uk
via
Telnet