Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 251  |
|  Wilfred van Velzen to Rob Swindell  |
|  Re: Packet password case insensitive or   |
|  22 Apr 20 09:52:47  |
 TID: FMail-lnx64 2.1.0.18-B20170815 RFC-X-No-Archive: Yes TZUTC: 0200 CHRS: UTF-8 2 PID: GED+LNX 1.1.5-b20161221 MSGID: 2:280/464 5e9ff915 REPLY: 796.net_dev@1:103/705 2304b6e3 Hi Rob, On 2020-04-21 16:12:07, you wrote to me: RS> SBBSecho has always treated packet passwords case-INsensitively. It is RS> unfortuate that so many of the fido specifications were so badly RS> written to begin with and the resulting ambiguities and contradictions RS> have never been sufficiently addressed by the FTSC. There is no ambiguity for packet password case sensitivity. It's just not specified, so anything goes... RS> Luckily, with password-protected mail sessions the norm these days, RS> packet passwords are kind of moot and probably should just be RS> deprecated. Doubt that'll happen though. I don't agree here. Packet passwords provide an extra layer of security. For instance without it, anyone can drop a .pkt file in your insecure inbound with a falsified source address and echomail in it. If you process .pkt files from your inbound automatically, it will get tossed, if there is no packet password agreeded upon for the falsified source... Bye, Wilfred. --- FMail-lnx64 2.1.0.18-B20170815 * Origin: FMail development HQ (2:280/464) SEEN-BY: 1/123 18/200 90/1 103/705 120/340 601 154/10 203/0 221/0 SEEN-BY: 226/30 227/114 229/426 1014 240/5832 249/206 317 280/464 SEEN-BY: 280/5003 288/100 292/854 8125 310/31 317/3 322/757 342/200 SEEN-BY: 396/45 423/120 633/280 712/848 770/1 PATH: 280/464 229/426 |
[ << oldest | < older | list | newer > | newest >> ]