Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 276  |
|  Andrew Leary to Tommi Koivula  |
|  equalateral triangle  |
|  07 Jul 19 20:18:17  |
 REPLY: 2:221/360 5d22223e MSGID: 1:320/219@fidonet 5d228e95 CHRS: CP437 2 TZUTC: -0400 TID: MBSE-FIDO 1.0.7.12 (GNU/Linux-x86_64) Hello Tommi! 07 Jul 19 19:46, you wrote to me: AL>> FastEcho also has a problem with the .PKT forwarding function. TK> Oh? Can you tell more about this? Basically, if you receive a .PKT file destined for one of your downlinks, it should be placed unaltered in the temporary outbound, to be archived for the destination along with any other mail you are tossing. However, it appears from my testing that certain .PKT header fields (including the .PKT password) are overwritten with the password you have defined for that downlink. Of course, this causes an issue if the originating node has a different password defined for the destination. There is also a minor issue with .PKT endings, as the forwarded .PKTs end up with an extra 2 NUL bytes tacked onto the end. AL>> I sent details to Tobias Burchhardt a few months back, but he AL>> wasn't hopeful that he would be able to fix it. TK> :( It's too bad, because other than the cross-zone SEEN-BY stripping and these issues with forwarding .PKTs, the software is virtually bullet-proof. Andrew --- GoldED+/LNX 1.1.5-b20180707 * Origin: Phoenix BBS * phoenix.bnbbbs.net (1:320/219) SEEN-BY: 1/19 123 15/2 16/0 103/705 120/544 123/130 131 154/10 203/0 SEEN-BY: 203/124 221/0 1 226/17 227/114 229/354 426 1014 230/0 240/5832 SEEN-BY: 249/206 317 400 261/38 280/464 310/31 317/3 320/119 219 322/0 SEEN-BY: 322/757 342/200 396/45 423/81 120 712/848 770/1 PATH: 320/219 203/0 280/464 229/426 |
[ << oldest | < older | list | newer > | newest >> ]