On one of my bbs's (mystic) I use hpt/binkd for the mailer.
I have had points off of that system before in the past and set it up like any other downlink. I decided to try aftershock (android app) and while hptpacks mail for that point and I can pick it up from the phone, everything composed on the phone never makes it back to the echo's. So I tried a areafix message, it went to the bbs responded "your an unknown system" ???
So I figured (like maybe your are) this aftershock program must be the culprit.
So on my laptop I setup a hpt/binkd/golded point, and I get the exact same behavior. I get no error messages in either hpt or binkd that I can find.
Would love some guesses!
----
Regards,
Rick Smith (Nitro)
... recipes..........The bumper stickers of BBSing
* Forwarded from area 'FIDOSOFT.HUSKY'
On one of my bbs's (mystic) I use hpt/binkd for the mailer.
So hpt is your tosser and binkd is your mailer and Mystic (mutil) is
not being used?
Your issue seems to originate on the boss side of it. Turn up your loglevel on hpt so it will (hopefully) give a clear indication of why
it thinks this is an "unknown system".
* Forwarded from area 'FIDOSOFT.HUSKY'
On one of my bbs's (mystic) I use hpt/binkd for the mailer.
So hpt is your tosser and binkd is your mailer and Mystic (mutil) is
not being used?
^^^^^^^^^^^^^^^^^^On one of my bbs's (mystic) I use hpt/binkd for the mailer.
So hpt is your tosser and binkd is your mailer and Mystic (mutil)
is not being used?
so far I see only these errors
pkt: /mystic/tmp.in/64383eeb.tos No Link for 1:105/10.1, processing
only Netmail
although I have the point in my links file
7 20:08:36 pkt: /mystic/echomail/in/64386143.tos [1:105/10.1]
A 20:08:36 pkt: /mystic/echomail/in/64386143.tos No Link for
1:105/10.1, processing only Netmail
8 20:08:37 areafix: Security violation from 1:105/10.1
Likely explains the "unknown system" However I do not know why this^^^^^^^^^^^^^^^
error is happening... I will post my links entry below.
Link Fido point
aka 1:105/10.1
ouraka 1:105/10
password ******
areafixpwd ******
pktpwd *******
EchoMailFlavour Hold
fileEchoFlavour Hold
NetMailFlavour Crash
packer Zip
LinkGrp F
----
Regards,
Rick Smith (Nitro)
... Taglines: the <real< reason for BBSing.
--- GoldED+/LNX 1.1.5-b20220504
* Origin: ----> Abacus BBS! --->>>>bbs.abon.us:2323 (1:105/10)
* Forwarded from area 'FIDOSOFT.HUSKY'
Hello Rick,
Monday April 24 2023, Rick Smith wrote to Alan Ianson:
On one of my bbs's (mystic) I use hpt/binkd for the mailer.
So hpt is your tosser and binkd is your mailer and Mystic
(mutil) is not being used?
so far I see only these errors
pkt: /mystic/tmp.in/64383eeb.tos No Link for 1:105/10.1,
processing only Netmail
although I have the point in my links file
7 20:08:36 pkt: /mystic/echomail/in/64386143.tos [1:105/10.1]^^^^^^^^^^^^^^^^^^
A 20:08:36 pkt: /mystic/echomail/in/64386143.tos No Link for
1:105/10.1, processing only Netmail
8 20:08:37 areafix: Security violation from 1:105/10.1
Likely explains the "unknown system" However I do not know why
this error is happening... I will post my links entry below.
Link Fido point^^^^^^^^^^^^^^^
aka 1:105/10.1
ouraka 1:105/10
password ******
Try to comment this out.
although I have the point in my links file
A 20:08:36 pkt: /mystic/echomail/in/64386143.tos No Link for
1:105/10.1,
Link Fido point
Hello Rick!
24 Apr 23, Rick Smith wrote to Alan Ianson:
although I have the point in my links file
A 20:08:36 pkt: /mystic/echomail/in/64386143.tos No Link for
1:105/10.1,
Remove/comment the link definition, see if log changes.
Rebuild the link config line per line.
Link Fido point
Are spaces allowed there?
I found the packets that got renamed to .sec and put in unsecure folded so I ran pktinfo on them and here are the results..
PktInfo/lnx 1.9 2023-01-07
A 08:41:35 Invalid pkt version 272!
47e8bc00.sec: Corrupt packet
rick@abacus:/mystic/echomail/in/unsecure$ pktinfo 0069000a.sec
PktInfo/lnx 1.9 2023-01-07
This is a problem. I just joined this area from my own AfterShock setup so I'll post a message from there is a few minutes and we'll see if it makes the trip.
I found the packets that got renamed to .sec and put in unsecure folded so I ran pktinfo on them and here are the results..
PktInfo/lnx 1.9 2023-01-07
A 08:41:35 Invalid pkt version 272!
47e8bc00.sec: Corrupt packet
rick@abacus:/mystic/echomail/in/unsecure$ pktinfo 0069000a.sec
PktInfo/lnx 1.9 2023-01-07
I found the packets that got renamed to .sec and put in unsecure[...]
folded so I ran pktinfo on them and here are the results..
PktInfo/lnx 1.9 2023-01-07
A 08:42:05 Invalid pkt version 325!
46d19900.sec: Corrupt packet
* Forwarded from area 'FIDOSOFT.HUSKY'
I found the packets that got renamed to .sec and put in unsecure
folded so I ran pktinfo on them and here are the results..
PktInfo/lnx 1.9 2023-01-07
A 08:41:35 Invalid pkt version 272!
47e8bc00.sec: Corrupt packet
rick@abacus:/mystic/echomail/in/unsecure$ pktinfo 0069000a.sec
PktInfo/lnx 1.9 2023-01-07
I don't see that here. Here is what pktinfo says about a packet
created at my point..
* Forwarded from area 'FIDOSOFT.HUSKY'
I found the packets that got renamed to .sec and put in unsecure
folded so I ran pktinfo on them and here are the results..
PktInfo/lnx 1.9 2023-01-07
A 08:41:35 Invalid pkt version 272!
47e8bc00.sec: Corrupt packet
rick@abacus:/mystic/echomail/in/unsecure$ pktinfo 0069000a.sec
PktInfo/lnx 1.9 2023-01-07
I don't see that here. Here is what pktinfo says about a packet
A 08:41:35 Invalid pkt version 272!
47e8bc00.sec: Corrupt packet
rick@abacus:/mystic/echomail/in/unsecure$ pktinfo 0069000a.sec
PktInfo/lnx 1.9 2023-01-07
I don't see that here. Here is what pktinfo says about a packet
Now I have no idea, I tried a new point on synchronet and I get the same behavior...
* Forwarded from area 'FIDOSOFT.HUSKY'
A 08:41:35 Invalid pkt version 272!
47e8bc00.sec: Corrupt packet
rick@abacus:/mystic/echomail/in/unsecure$ pktinfo 0069000a.sec
PktInfo/lnx 1.9 2023-01-07
I would check that that 0069000a.sec is a plain packet and not a compressed mail bundle as Carlos suggested. If it is a mail bundle you
may need to decompress it.
I don't see that here. Here is what pktinfo says about a packet
Now I have no idea, I tried a new point on synchronet and I get the
same behavior...
I would suggest that you grab fresh husky source from github and
rebuild just to be sure your husky tools are up to date.
I think that it is something to do with archivers perhaps? On the mystic system I unzipped all the .sec files and they were indeed pkt's and hpt tossed them just fine.
On the synchronet test it renames them to .bad and I am unable to unarchive those to test.
* Forwarded from area 'FIDOSOFT.HUSKY'
I think that it is something to do with archivers perhaps? On the
mystic system I unzipped all the .sec files and they were indeed
pkt's and hpt tossed them just fine.
Good, I saw your test messages in the aftershock area.
It may be your archiver setup that is causing the issue so have a look
at that.
On the synchronet test it renames them to .bad and I am unable to
unarchive those to test.
Those might be plain packets already, so check the log and see if
there is a different issue with those. A missing or unexpected
password perhaps.
ok aftershock is working on the sbbs bbs, so the culprit must be my mystic/hpt/binkd setup..
Hello Alan!
Saturday April 29 2023 18:28, you wrote to me:
* Forwarded from area 'FIDOSOFT.HUSKY'
A 08:41:35 Invalid pkt version 272!
47e8bc00.sec: Corrupt packet
rick@abacus:/mystic/echomail/in/unsecure$ pktinfo 0069000a.sec
PktInfo/lnx 1.9 2023-01-07
I would check that that 0069000a.sec is a plain packet and not a compressed mail bundle as Carlos suggested. If it is a mail bundle you may need to decompress it.
I don't see that here. Here is what pktinfo says about a packet
Now I have no idea, I tried a new point on synchronet and I get the
same behavior...
I would suggest that you grab fresh husky source from github and rebuild just to be sure your husky tools are up to date.
I think that it is something to do with archivers perhaps? On the mystic system I unzipped all the .sec files and they were indeed pkt's and hpt tossed them just fine. On the synchronet test it renames them to .bad and I am unable to unarchive those to test.
* Forwarded from area 'FIDOSOFT.HUSKY'
ok aftershock is working on the sbbs bbs, so the culprit must be my
mystic/hpt/binkd setup..
I think so yes.
Don't lose sight of the actual problem. Why are those packets not
tossed as expected?
* Forwarded from area 'FIDOSOFT.HUSKY'
Re: point system
By: Rick Smith to Alan Ianson on Sun Apr 30 2023 07:57 am
Hello Alan!
Saturday April 29 2023 18:28, you wrote to me:
The latest builds of SBBSecho can include the *reason* a packet is bad when renaming it (configured in echocfg). Or you can just search the sbbsecho.log for "Bad packet detected" and the log lines before that
msg will say *why* the packet file was considered bad.
Don't lose sight of the actual problem. Why are those packets not
tossed as expected?
The laptop setup is back pointing at mystic setup to try and sort this out.. sent a netmail to areafix from laptop point which is also hpt/binkd/golded, on the mystic system in binkd log I see the netmail received it all looks normal with this exception;
? 30 Apr 18:00:41 [12766] unexpected password digest from the remote
However there is nothing in the hpt log indicating it ever tossed or processed the netmail. I am trying to find where the the packet went.
* Forwarded from area 'FIDOSOFT.HUSKY'
Don't lose sight of the actual problem. Why are those packets not
tossed as expected?
The laptop setup is back pointing at mystic setup to try and sort
this out.. sent a netmail to areafix from laptop point which is also
hpt/binkd/golded, on the mystic system in binkd log I see the
netmail received it all looks normal with this exception;
? 30 Apr 18:00:41 [12766] unexpected password digest from the remote
I think that is a password error in binkd. That would explain why the packets/bundles are renamed to .sec since the session is insecure.
However there is nothing in the hpt log indicating it ever tossed or
processed the netmail. I am trying to find where the the packet
went.
If I am right (I might not be) that happened when binkd received the
file so check your binkd log. Session passwords are case sensitive so "password", "Password" and "PassWord" are all different. Be sure the
same password is being used at both ends of the link.
? 30 Apr 18:00:41 [12766] unexpected password digest from the remote
I think that is a password error in binkd. That would explain why the
packets/bundles are renamed to .sec since the session is insecure.
However there is nothing in the hpt log indicating it ever tossed or
processed the netmail. I am trying to find where the the packet
went.
If I am right (I might not be) that happened when binkd received the
file so check your binkd log. Session passwords are case sensitive so
"password", "Password" and "PassWord" are all different. Be sure the
same password is being used at both ends of the link.
All passwords match, this is getting more weird tho...
If I poll the mystic system from point I can deliver mail which I just found is in the bad area of golded stating I was not active for that area ( I checked my point is active i that area) if I poll the point from mystic machine it delivers mail normally and it gets tossed and auto adds areas not in fidoconfig etc?
This is a real head scratcher...
Sysop: | digital man |
---|---|
Location: | Riverside County, California |
Users: | 1,063 |
Nodes: | 17 (1 / 16) |
Uptime: | 17:08:13 |
Calls: | 501,348 |
Calls today: | 4 |
Files: | 109,427 |
D/L today: |
4,990 files (510M bytes) |
Messages: | 302,310 |