Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 296  |
|  Rob Swindell to Sean Dennis  |
|  Re: Packet password case  |
|  25 Apr 20 23:40:22  |
 
TZUTC: -0700
MSGID: 850.net_dev@1:103/705 230a6628
REPLY: 1:18/200.0 5ea50b32
PID: Synchronet 3.18a-Win32 Apr 25 2020 MSC 1925
TID: SBBSecho 3.10-Linux r3.160 Apr 24 2020 GCC 6.3.0
COLS: 80
CHRS: CP437 2
NOTE: FSEditor.js v1.103
Re: Re: Packet password case
By: Sean Dennis to Rob Swindell on Sat Apr 25 2020 11:16 pm
> Hi Rob,
>
> RS> NetMail from insecure inbound, sure. I was talking about EchoMail.
>
> That's what I get for responding to mail when I'm half-asleep. Yes, you're
> right: tossing unsecure echomail is just asking for problems. Though I
> don't think I've seen any, uhm, issues with that since the late 90s when
> there were certain people in a certain mail network that were causing
> issues.
Oh, we were all young trouble-makers at some point, weren't we? :-)
Someone else did point out that if you had 2 authenticated links sending files
into a shared secure inbound, one could impersonate the other very easily
unless packet passwords were used. That's one case where the use of inboxes
could provide more security.
digital man
Synchronet/BBS Terminology Definition #29:
FOSSIL = Fido/Opus/SEAdog Standard Interface Layer
Norco, CA WX: 72.1øF, 52.0% humidity, 0 mph SSW wind, 0.00 inches rain/24hrs
--- SBBSecho 3.10-Linux
* Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)
SEEN-BY: 1/123 18/200 90/1 103/705 9999 120/340 601 154/10 203/0 218/700
SEEN-BY: 221/0 226/30 227/114 229/426 1014 240/5832 249/206 317 280/464
SEEN-BY: 280/5003 288/100 292/854 8125 310/31 317/3 322/757 342/200
SEEN-BY: 396/45 423/120 633/280 712/848 770/1
PATH: 103/705 280/464 229/426
|
[ << oldest | < older | list | newer > | newest >> ]