Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 32900  |
|  Deucе to GitLab issue in main/sbbs  |
|  The Clans bad handling of duplicate IBBS  |
|  12 Dec 25 10:02:09  |
 TZUTC: -0800 MSGID: 59039.sync_sys@1:103/705 2da27540 PID: Synchronet 3.21a-Linux master/88b423313 Sep 29 2025 GCC 12.2.0 TID: SBBSecho 3.32-Linux master/6bb344da2 Dec 08 2025 GCC 12.2.0 BBSID: VERT CHRS: UTF-8 4 FORMAT: flowed open https://gitlab.synchro.net/main/sbbs/-/issues/1029 If the same Attack packet is delivered multiple times, The Clans will parse it multiple times, which generates multiple Attack Result packets, which can not only perform the attack multiple times, but also has multiple armies return. This trivially leads to large numbers of followers and high rewards. IBBS processing should use a small sliding window on "next" packet allowance, and absolutely not allow the same packet to be processed multiple times in a row. --- SBBSecho 3.32-Linux * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705) SEEN-BY: 103/13 705 105/81 106/201 124/5016 128/187 129/14 153/757 SEEN-BY: 153/7715 154/10 30 110 203/0 218/700 221/0 226/30 227/114 SEEN-BY: 229/110 112 134 206 317 400 426 428 470 700 705 240/1120 SEEN-BY: 240/5832 263/1 266/512 280/464 5003 5006 291/111 292/8125 SEEN-BY: 301/1 320/219 322/757 341/66 234 342/200 396/45 423/120 460/58 SEEN-BY: 633/267 280 384 410 414 418 420 422 2744 712/848 770/1 902/26 SEEN-BY: 5020/400 5075/35 PATH: 103/705 280/464 633/280 229/426 |
[ << oldest | < older | list | newer > | newest >> ]