• Bad packets.

    From deon@3:633/509 to Stephen Walsh on Sun Jan 8 22:42:45 2023
    Howdy,

    I've noticed over the last coupe of months, I get quite a few bad packets from you. (2-3 each week).

    Just before Christmas I cleaned out my bad packets and then checked today and I have 4 more (3 in the last week).

    Havent looked at them in detail - but might be worthy to see if you have a link that is sending you bad stuff (that hpt seems to happily forward on?). I can send you the packets - or look at them in more detail to see if there is a common cause... (and you are interested to figure it out).

    (I've noticed the random bad packet on Hub 3 FSX - but its less often then what I'm getting from you...)


    ...лоеп
    --- SBBSecho 3.15-Linux
    * Origin: I'm playing with ANSI+videotex - wanna play too? (3:633/509)
  • From Stephen Walsh@3:633/280 to deon on Tue Jan 10 10:52:36 2023

    Hello deon!

    08 Jan 23 22:42, you wrote to me:

    I've noticed over the last coupe of months, I get quite a few bad
    packets from you. (2-3 each week).

    [...]

    Havent looked at them in detail - but might be worthy to see if you
    have a link that is sending you bad stuff (that hpt seems to happily forward on?). I can send you the packets - or look at them in more

    Oh! I have five links for the echo's, besides feeding net633.

    I've just pulled the latest code and re-comiled HPT.

    Is there a config option to set to catch bad packets? (I'm not seeing it myself), but anyway check your inbound for "ftnmail.zip" it contains the
    last three day's worth of mail from all links.




    Stephen


    --- GoldED+/LNX 1.1.5-b20220409
    * Origin: Dragon's Lair BBS, Telnet: dragon.vk3heg.net (3:633/280)
  • From deon@3:633/509 to Stephen Walsh on Tue Jan 10 23:33:38 2023
    Re: Bad packets.
    By: Stephen Walsh to deon on Tue Jan 10 2023 10:52 am

    I've just pulled the latest code and re-comiled HPT.

    Is there a config option to set to catch bad packets? (I'm not seeing it myself), but anyway check your inbound for "ftnmail.zip" it contains the last three day's worth of mail from all links.

    I have the packet in question (and a couple of others) - and here is where the problem is:

    00000a30 38 20 36 33 33 2f 32 38 30 0d 00 02 00 18 01 fd |8 633/280.......| 00000a40 01 79 02 79 02 01 00 00 00 20 20 20 20 31 20 4b |.y.y..... 1 K| 00000a50 62 0d 0d 00 2e 41 30 36 0d 0d 20 2d 2d 2d 2d 2d |b....A06.. -----| 00000a60 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d |----------------| 00000a70 2d 2d 2d 2d 2d 2d 2d 00 0d 20 52 65 70 6c 61 63 |-------.. Replac| 00000a80 65 73 20 20 20 20 20 20 20 2d 3d 3a 3d 2d 20 20 |es -=:=- | 00000a90 20 20 20 20 4e 4f 44 45 44 49 46 00 2d 2d 2d 2d | NODEDIF.----|

    0xaa is the end of the previous message (0x00), and the start of the next one is jibberish (its part of a message).

    The end of that partial message is:

    00006a40 6b 79 20 48 50 54 20 50 6f 77 65 72 65 64 21 20 |ky HPT Powered! | 00006a50 28 31 3a 33 31 37 2f 33 29 0d 53 45 45 4e 2d 42 |(1:317/3).SEEN-B| 00006a60 59 3a 20 31 2f 31 32 33 20 31 35 2f 30 20 31 38 |Y: 1/123 15/0 18| 00006a70 2f 32 30 30 20 39 30 2f 31 20 31 30 35 2f 38 31 |/200 90/1 105/81| ...
    00006bc0 2f 31 0d 01 50 41 54 48 3a 20 33 31 37 2f 33 20 |/1..PATH: 317/3 | 00006bd0 32 32 39 2f 34 32 36 20 37 31 32 2f 38 34 38 20 |229/426 712/848 | 00006be0 36 33 33 2f 32 38 30 0d 00 00 00 |633/280....|

    IE: It came from 1:317/3 and it's path is shown.

    (The other two messages in the packet are from 1:229/700)

    From that zip file you gave me it looks like it came in with packet 09/63bbfe06.pkt - and that packet has the same bad packet and messages:

    000009c0 54 48 3a 20 32 32 39 2f 37 30 30 20 34 32 36 20 |TH: 229/700 426 | 000009d0 37 31 32 2f 38 34 38 0d 00 02 00 50 03 18 01 c8 |712/848....P....| 000009e0 02 79 02 01 00 00 00 20 20 20 20 31 20 4b 62 0d |.y..... 1 Kb.| 000009f0 0d 00 2e 41 30 36 0d 0d 20 2d 2d 2d 2d 2d 2d 2d |...A06.. -------| 00000a00 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d |----------------| 00000a10 2d 2d 2d 2d 2d 00 0d 20 52 65 70 6c 61 63 65 73 |-----.. Replaces|

    0x9d8 is the end of the previous message, and starting at 0x9d9 is the same jibberish.

    It looks like that packet came from 1:229/700 (by the first 2 messages in it).


    ...лоеп
    --- SBBSecho 3.15-Linux
    * Origin: I'm playing with ANSI+videotex - wanna play too? (3:633/509)
  • From deon@3:633/509 to Stephen Walsh on Tue Jan 10 23:36:40 2023
    Re: Bad packets.
    By: deon to Stephen Walsh on Tue Jan 10 2023 11:33 pm

    It looks like that packet came from 1:229/700 (by the first 2 messages in it).

    Actually it would also be good to know if your hpt log happily processed the message (it should have complained and skipped it).

    Perhaps the husky team should know?


    ...лоеп
    --- SBBSecho 3.15-Linux
    * Origin: I'm playing with ANSI+videotex - wanna play too? (3:633/509)
  • From Stephen Walsh@3:633/280 to deon on Wed Jan 11 10:34:18 2023

    Hello deon!

    10 Jan 23 23:33, you wrote to me:

    It looks like that packet came from 1:229/700 (by the first 2 messages
    in it).

    In both cases they came through Nick Andre's system at 1:229/426, then Scott Little's system at 3:712/848.

    So Dbridge, HPT (Scott's running a old hpt version).

    I don't have any bad packet's in my inbound, witch is strange.




    Stephen


    --- GoldED+/LNX 1.1.5-b20220409
    * Origin: Dragon's Lair BBS, Telnet: dragon.vk3heg.net (3:633/280)
  • From Stephen Walsh@3:633/280 to deon on Wed Jan 11 10:40:02 2023

    Hello deon!

    10 Jan 23 23:36, you wrote to me:

    It looks like that packet came from 1:229/700 (by the first 2
    messages in it).

    Actually it would also be good to know if your hpt log happily
    processed the message (it should have complained and skipped it).


    Humm, These are the log level's I've got set....

    LogLevels 1234567890ABCDEF
    LogEchoToScreen

    fido-req is on passthough here.... Did this bad packet's start recently or have they been goin on for a long time?

    I did change that area to passthrough recently, but can't remember when...


    ---------- Mon 09 Jan 2023, hpt/lnx 1.9 2023-01-07
    1 22:46:23 Start
    1 22:46:23 Start tossing...
    7 22:46:23 pkt: /opt/husky/inbound.sec/63bbfe06.tos [3:712/848]
    2 22:46:23 Reading dupes of fido-req
    4 22:46:23 Statistics:
    4 22:46:23 arc: 0 netMail: 0 echoMail: 3 CC: 0 4 22:46:23 pkt's: 1 dupe: 0 passthru: 3 exported: 21 4 22:46:23 msgs: 3 bad: 0 saved: 0 empty: 0 4 22:46:23 Input: 250.00 mails/sec Output: 1750.00 mails/sec
    4 22:46:23 2237.06 kb/sec
    4 22:46:23 26.84 kb total, processed in 0.012 seconds
    4 22:46:23 Areas summary:
    4 22:46:23 echo area fido-req - 3 msgs





    Stephen


    --- GoldED+/LNX 1.1.5-b20220409
    * Origin: Dragon's Lair BBS, Telnet: dragon.vk3heg.net (3:633/280)
  • From Stephen Walsh@3:633/280 to deon on Wed Jan 11 11:17:38 2023

    Hello deon!

    Scott's hpt:


    hpt/w32-mvcdll 1.9.0-cur 04-11-15



    Stephen


    --- GoldED+/LNX 1.1.5-b20220409
    * Origin: Dragon's Lair BBS, Telnet: dragon.vk3heg.net (3:633/280)
  • From deon@3:633/509 to Stephen Walsh on Wed Jan 11 11:27:53 2023
    Re: Bad packets.
    By: Stephen Walsh to deon on Wed Jan 11 2023 10:40 am

    fido-req is on passthough here.... Did this bad packet's start recently or have they been goin on for a long time?

    I think it's been going on a long time - I would guess since October-ish...

    I havent checked the other packets to see if it is the same echo/system.


    ...лоеп
    --- SBBSecho 3.15-Linux
    * Origin: I'm playing with ANSI+videotex - wanna play too? (3:633/509)
  • From deon@3:633/509 to Stephen Walsh on Wed Jan 11 11:32:07 2023
    Re: Bad packets.
    By: Stephen Walsh to deon on Wed Jan 11 2023 10:34 am

    I don't have any bad packet's in my inbound, witch is strange.

    I'm thinking, that because hpt happily forward them on, it doesnt know their bad.

    It was my SBBS board that catches them.


    ...лоеп
    --- SBBSecho 3.15-Linux
    * Origin: I'm playing with ANSI+videotex - wanna play too? (3:633/509)
  • From Stephen Walsh@3:633/280 to deon on Thu Jan 12 15:21:28 2023

    Hello deon!

    11 Jan 23 11:27, you wrote to me:

    fido-req is on passthough here.... Did this bad packet's start
    recently or have they been goin on for a long time?

    I think it's been going on a long time - I would guess since October-ish...

    That would be about when I changed fido-req to passthrough.

    I've now put it back to using a message base...

    Let me know if that are is still playing up.




    Stephen


    --- GoldED+/LNX 1.1.5-b20220409
    * Origin: Dragon's Lair BBS, Telnet: dragon.vk3heg.net (3:633/280)
  • From Stephen Walsh@3:633/280 to deon on Wed Jan 25 09:14:56 2023

    Hello deon!

    Did Ward send you a routed test netmail?

    I haven't gone looking at log files to see if he did.

    Just wanting to know if it worked! #-)


    Stephen


    --- GoldED+/LNX 1.1.5-b20220409
    * Origin: Dragon's Lair BBS, Telnet: dragon.vk3heg.net (3:633/280)
  • From deon@3:633/509 to Stephen Walsh on Wed Jan 25 10:09:59 2023
    Re: Netmail
    By: Stephen Walsh to deon on Wed Jan 25 2023 09:14 am

    Howdy,

    Did Ward send you a routed test netmail?

    I haven't gone looking at log files to see if he did.

    Just wanting to know if it worked! #-)

    No, he's been dropping them to me direct.

    Seems Synchronet ignores the packed message header infavour of the INTL kludge as well :)

    Strangly, it looks like Scott is running hpt like Paul - but Scott uses Windows (and an old version I'm guessing)... so it seems hpt changed..?



    ...лоеп
    --- SBBSecho 3.15-Linux
    * Origin: I'm playing with ANSI+videotex - wanna play too? (3:633/509)
  • From Stephen Walsh@3:633/280 to deon on Wed Jan 25 15:02:32 2023

    Hello deon!

    25 Jan 23 10:09, you wrote to me:

    Strangly, it looks like Scott is running hpt like Paul - but Scott
    uses Windows (and an old version I'm guessing)... so it seems hpt changed..?

    Scott's hpt:

    hpt/w32-mvcdll 1.9.0-cur 04-11-15


    So yes a very old version.


    Stephen


    --- GoldED+/LNX 1.1.5-b20220409
    * Origin: Dragon's Lair BBS, Telnet: dragon.vk3heg.net (3:633/280)
  • From deon@3:633/509 to Stephen Walsh on Sun Jan 29 09:17:28 2023
    Re: Bad packets.
    By: Stephen Walsh to deon on Thu Jan 12 2023 03:21 pm

    I think it's been going on a long time - I would guess since October-ish...

    That would be about when I changed fido-req to passthrough.

    I've now put it back to using a message base...

    Looks like I'm not getting them anymore...

    I'm guessing you are though? :)


    ...лоеп
    --- SBBSecho 3.15-Linux
    * Origin: I'm playing with ANSI+videotex - wanna play too? (3:633/509)