home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 341 
 Marc Lewis to All 
 Re: Follow-up on: .pkt received without  
 23 Jul 20 14:37:27 
 
MSGID: 1:396/45.0 f19e4ba4
REPLY: 2:280/464 5f193943
CHRS: IBMPC 2
* Copied (from: MYMAIL) by Marc Lewis using timEd/2 1.10.y2k+.

All:

This is a copy of an ongoing conversation with Wilfred van Velsen about a .pkt
I transmitted to his system (I transmit uncompressed to him) that was missing
the packet password and contained 2 routed NetMails to someone in Zone 2.
Normally there are no problems between our two systems with either my NetMail
or EchoMail to him.  This time the two messages seem to have circumvented
*everything*.

Needless to day, I'm running the last (latest) version of Squish/2.

Any ideas on how or why and how to prevent this will be appreciated.

Best,
Marc

-o-o-o-o-o-o-o-o-CUT-o-o-o-o-o-o-o-o-o-

Hello Wilfred!



 ML> [snip]
 WvV>> This pkt file contained 2 routed netmails. I never see this on pkt
 WvV>> files coming from your system, containing echomail...?

 ML>> Strange. I've looked at my "saved" directory of routed NetMails and
 ML>> I found nothing going to 2:280/464.  To whom are they addressed or
 ML>> what do they contain? I simply can't see how anyone could get the
 ML>> stuff into your system without knowing our somewhat lengthy session
 ML>> password.  Any clue in the .pkts as to the tosser?  I am at a loss.
 ML>> I am going to try and get squish to give me a log of outbound .pkt
 ML>> files via the log analyser, but at the moment I am mystified.

 ML> Okay - I do see where that .pkt was transmitted to you on 21 JUL
 ML> 20@21:31:25 US Central time.  It will take me a while to run the squish
 ML> analyser to try and find out what that packet contained

 WvV> See my other netmail.

 ML> and how squish could have sent it without the .pkt password prepended
 ML> to the .pkt body... I don't know how that would be possible. (!?)

 WvV> Your own netmails, like this one get processes fine. So the pkt
 WvV> file must be containing the correct password. ;)

 WvV> Maybe it's somehow just related to routed netmails?

Perhaps I have uncovered a squish bug. *Normally* a routed NetMail shows up in
my "saved" NetMail folder (which of course is private and I don't normally
read anything in there.)  Somehow, these two messages managed to circumvent
*everything* including the packet level password my system is supposed to
place on every .pkt going to you.  The squish analyzer I have is quite old and
repeatedly returns an error when I ask it for full details - returning nothing
but the error... so I am a bit in the dark on this one.  I think I will post
this in the TUB echo and see if someone comes up with an explanation for this
anomaly of packets coming from me to you containing a routed NetMail ending up
in your unsecured area.  I am at a loss.

Best regards,
Marc

Internet recipients: Your reply in plain-text will be appreciated. 
-+- timEd/2 1.10.y2k+ 
-o-o-o-o-o-o-o-o-CUT-o-o-o-o-o-o-o-o-o-

--- timEd/2 1.10.y2k+
 * Origin: Sursum Corda! BBS-Huntsville,AL-bbs.sursum-corda.com (1:396/45)
SEEN-BY: 1/123 18/200 90/1 120/340 601 123/131 226/30 227/114 702
SEEN-BY: 229/101 424 426 664 1014 240/5832 249/206 317 400 292/854
SEEN-BY: 317/3 322/757 342/200 633/280
PATH: 396/45 280/464 229/101 426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca