Subj : Re: Packet passwords
To : Roger Nelson
From : Nicholas Boel
Date : Thu May 26 2016 03:34 pm
Hello Roger,
On 25 May 16 18:10, Roger Nelson wrote to Nicholas Boel:
NB>> I offered up my "othernet" as a testing suite for any DB users
NB>> that were currently members (including Nick, who is a member)
NB>> where I would've intercepted any *.bad echomail packets in order
NB>> to look in them for answers as well as share them here.
RN> That was a very nice offer, but it had to be solved one of two places
RN> -- here in the echo where everyone including Nick Andre would be aware
RN> of the problem or just between Joe Delahaye and I. I think we finally
RN> have a solution, but will wait a reasonable amount of time before
RN> publishing the findings here because while I was sure last week
RN> wherein the problem lay, I'm not so sure today.
The offer was made directly to Nick Andre (and then secondly to anyone else in
that network that wanted to test out their setup), since he is a longstanding
member of Agoranet (the othernet I host). That test echomail would have went
directly from his system to mine (DBridge to Synchronet - where the problem
seems to lie along with Mystic). I could have produced the logs as well as the
packet with proof there is indeed a packet password included in it. If it
wouldn't have been in *his* test.. then it could have been narrowed down to
something specific to some (if not all) DB user's configurations, etc. Or if it
indeed was password protected, he would then have absolute proof to look
further into the matter.
NB>> That obviously wasn't necessary, so what was the outcome?
RN> See above. I really appreciate the offer Nick, and can't thank you
RN> enough.
No problem. Keep us (or at the very least, me!) posted with your findings. DB
is one of the few (and probably one out of two closed source) softwares I keep
my eye on and interest in when it comes to updates and future plans!