In case of subject longer then allowed 71 + NUL bytes HPT send the
whole PKT with the incorrect message to bads.
Would it be more practical to be more error tolerant and just cut it
to the allowed limit, or it's considered as modification of messages
and forbidden by some document?
fromIn case of subject longer then allowed 71 + NUL bytes HPT send the
whole PKT with the incorrect message to bads.
Would it be more practical to be more error tolerant and just cut
it to the allowed limit, or it's considered as modification of
messages and forbidden by some document?
Fidonet Policy v.4.07
========= Here the quote begins ===========
2.1.5 No Alteration of Routed Mail
You may not modify, other than as required for routing or other technical purposes, any message, netmail or echomail, passing through the system
one FidoNet node to another.
========= Here it ends =============
In case of subject longer then allowed 71 + NUL bytes HPT
send the whole PKT with the incorrect message to bads.
In case of subject longer then allowed 71 + NUL bytes HPT send
the whole PKT with the incorrect message to bads.
Would it be more practical to be more error tolerant and just
cut it to the allowed limit, or it's considered as modification
of messages and forbidden by some document?
2.1.5 No Alteration of Routed Mail
You may not modify, other than as required for routing or other
technical purposes, any message, netmail or echomail, passing
Isn't it an "other technical purpose"? ;)
In case of subject longer then allowed 71 + NUL bytes HPT send the
whole PKT with the incorrect message to bads.
Would it be more practical to be more error tolerant and just cut
it to the allowed limit, or it's considered as modification of
messages and forbidden by some document?
Fidonet Policy v.4.07
========= Here the quote begins ===========
2.1.5 No Alteration of Routed Mail
You may not modify, other than as required for routing or other technical
purposes, any message, netmail or echomail, passing through the system
from one FidoNet node to another.
========= Here it ends =============
Isn't it an "other technical purpose"? ;)
In case of subject longer then allowed 71 + NUL bytes HPT
send the whole PKT with the incorrect message to bads.
what FTN software is creating and/or passing on messages with
subject lines longer than the spec for packed messages allows???
whichever software that is needs to be fixed to stop the defective
pkts from being generated and sent out in the first place...
In case of subject longer then allowed 71 + NUL bytes HPT send
the whole PKT with the incorrect message to bads.
Would it be more practical to be more error tolerant and just
cut it to the allowed limit, or it's considered as modification
of messages and forbidden by some document?
No. If you work around the bugs of others you will build a pile of
shards.
2.1.5 No Alteration of Routed Mail
You may not modify, other than as required for routing or other
technical purposes, any message, netmail or echomail, passing
Isn't it an "other technical purpose"? ;)
Work around a "standard violation" should never become a technical purpose.
Fix the source of the problem. If it can't be fixed don't allow the
broken to enter. That's straight, clear and simple.
In case of subject longer then allowed 71 + NUL bytes HPT send
the whole PKT with the incorrect message to bads.
Would it be more practical to be more error tolerant and just
cut it to the allowed limit, or it's considered as modification
of messages and forbidden by some document?
Fidonet Policy v.4.07
========= Here the quote begins ===========
2.1.5 No Alteration of Routed Mail
You may not modify, other than as required for routing or other technical
purposes, any message, netmail or echomail, passing through the system
from one FidoNet node to another.
========= Here it ends =============
Isn't it an "other technical purpose"? ;)
It depends who you ask. ;)
I made a quick test: I set my terminal to 132x45 and entered a
message to JAM base with GoldED with subject of 100 chars. It
stayed there until "hpt scan" when it was cut to 72 chars. However
this happened in my msgbase, not in transit mail.
So it would be best to fix fidogate (?) not to send out illegal
pkt's.
2.1.5 No Alteration of Routed MailEchomail is not routed nowadays. It is a sort of _direct_ mail from echo uplink to echo downlink. :)
You may not modify ... echomail
- is it ok to handle the situation without failing the pkt?
- is it ok to make the pkt standard complied?
purpose.Isn't it an "other technical purpose"? ;)
Work around a "standard violation" should never become a technical
Fix the source of the problem. If it can't be fixed don't allow the brokento enter. That's straight, clear and simple.
As usual, FPD contradicts with itself. :)
someName(n) - Null terminated string allocated n chars (incl Null)
someName{max} - Null terminated string of up to max chars (incl Null)
Isn't it an "other technical purpose"? ;)
Work around a "standard violation" should never become a technical
purpose.
Fix the source of the problem. If it can't be fixed don't allow
the broken to enter. That's straight, clear and simple.
keeping in mind my previous message on this, i also highly agree
with this and still look to the caveat i listed in that previous message...
ew (TINW) really need to know the name of this defective software
creating pkts with too long subject lines... it is possible there's
a newer/older version that doesn't have this defect and the
originating system can be pointed to this version to replace their defective one...
Fix the source of the problem. If it can't be fixed don't allow the
broken to enter. That's straight, clear and simple.
But software may have bugs and it's sad to lose otherwise valid data because of that.
BTW, in RFC world it's pretty different. Ex.: rfc2045
Well, in general in the world there are other opinions:
https://tools.ietf.org/html/rfc1122
- is it ok to handle the situation without failing the pkt?
- is it ok to make the pkt standard complied?
in my personal and professional opinion, the answer to both questions
is a resounding "yes" but with at least the following caveat...
1. HPT is the first FTN processor to handle the defective pkt
after the flawed (gating?) software has created it...
once the defective pkts are already in the distribution stream,
meaning another FTN tosser has processed it, then no... mark them as
bad and set them aside with a proper logged reason...
or some such... possibly also record the identity of the processor
that created the defective packet if that's not already being done...
one might also want to log the above when the processor repairs such
a defective message and log an additional message stating the repair decision... logging bad pkts is generally already done and adding
logging that the repair of message #xxx is being done is trivial...
others may or may not feel the same way...
i fully agree that this is a technical problem which is allowed for
by current fidonet policy
basically mean a setting per FTN... possibly something like
Repair defective pkts: yes/no
ew (TINW) really need to know the name of this defective software
creating pkts with too long subject lines... it is possible there's a newer/older version that doesn't have this defect and the originating system can be pointed to this version to replace their defective
one...
There is no problem there (anymore). It was some newly written
software and the author is aware of it and has fixed it AFAIU.
Fix the source of the problem. If it can't be fixed don't allow
the broken to enter. That's straight, clear and simple.
Maybe we should block all PKTs generated by Mystic BBS then?
And also PKTs from hpt itself? (which doesn't set the JAM OADDRESS and rewrites the message date for Squish messages.
Fix the source of the problem. If it can't be fixed don't allow
the broken to enter. That's straight, clear and simple.
Maybe we should block all PKTs generated by Mystic BBS then?
Well, i'm emotionally affected so i'm the wrong person for judgement.
If you would start a seriously vote i would mark the YES field. But
thats because some mails from that software crash my terminal output
to unreadable. I have to quit my editor then, do a terminal reset and start again carefully skipping the broken mail. That is very annoying sometimes.
And also PKTs from hpt itself? (which doesn't set the JAM OADDRESS
and rewrites the message date for Squish messages.
Actually i have no clue if msgbase formats are part of the FTS. I
never noticed the msgbase format of incoming mails. I can't see if you
use JAM or squish. Anyway your mail is stored in squish on my system. That's why i can't see a reason to drop a bug report.
And also PKTs from hpt itself? (which doesn't set the JAM
OADDRESS and rewrites the message date for Squish messages.
As far as I understand it from the documentation hpt always does import/export in one pass, is that correct? But What about echoareas
that get rescanned? Around 50% of the mails (or a little bit less)
will have a modified timestamp (DOS time format with 2 second granularity). To be clear, Squish message base format has a field for storing the original FTN time field, it is just not used by hpt (if I understand the C sources correctly).
And also PKTs from hpt itself? (which doesn't set the
JAM OADDRESS and rewrites the message date for Squish
messages.
As far as I understand it from the documentation hpt
always does import/export in one pass, is that correct?
But What about echoareas that get rescanned? Around 50%
of the mails (or a little bit less) will have a modified
timestamp (DOS time format with 2 second granularity). To
be clear, Squish message base format has a field for
storing the original FTN time field, it is just not used
by hpt (if I understand the C sources correctly).
Could you please send me a bug report with full
description of actions to reproduce the error with an
example of the message base and pkt taking part in the
actions. I am very busy at the moment but I'll try to
investigate it when time permits.
a squish tosser should write the date string to the __ftsc_date field
when importing mails and should use the __ftsc_date field (if it is
not empty) on export. see the squish spec. smapi seems to support that field, but hpt doesn't use it.
the JAM problem:
it was mentioned in some other echoarea that hpt doesn't set the
OADDRESS for echomail and that the origin address is missing on
rescans. i also couldn't find a place in the sources where the
OADDRESS is set.
jammnntpd even has a workaround for missing OADDRESS fields.
I'm not using hpt and I cannot provide example files, but the problem is simple:on
a squish tosser should write the date string to the __ftsc_date field when importing mails and should use the __ftsc_date field (if it is not empty)
export. see the squish spec. smapi seems to support that field, but hptdoesn't
use it.
a squish tosser should write the date string to the
__ftsc_date field when importing mails and should use the
__ftsc_date field (if it is not empty) on export. see the
squish spec. smapi seems to support that field, but hpt
doesn't use it.
Which field is that? Can I see it in GoldED hexdump
pressing "i" ?
These date's are found in your message in my squish base,
tossed by hpt.
=== Cut ===
DateTime : 14 Jan 20 15:12:47
OrigAddr : 2:280/464.47
DestAddr : 2:221/1.0
See : 92, 0, 0, 0, 0, 0, 0, 0, 0
Attr : 00020000h
(00000000000000100000000000000000b)
DateWritten : 2020-01-14 15:12:46 (7997502Eh)
DateArrived : 2020-01-14 16:13:52 (81BA502Eh)
UTC-Offset : 0
=== Cut ===
if you use JAM or squish. Anyway your mail is stored in squish on
my system. That's why i can't see a reason to drop a bug report.
As far as I understand it from the documentation hpt always does import/export in one pass, is that correct?
But What about echoareas that get rescanned? Around 50% of the mails
(or a little bit less) will have a modified timestamp (DOS time format
with 2 second granularity).
Sysop: | Coz |
---|---|
Location: | Anoka, MN |
Users: | 2 |
Nodes: | 4 (0 / 4) |
Uptime: | 146:12:14 |
Calls: | 328 |
Files: | 5,823 |
Messages: | 228,150 |