Subj : Mironet To : Alan Ianson From : Oli Date : Sat Feb 11 2023 06:50 pm Alan wrote (2023-02-11): >>> ? 11 Feb 00:00:36 [78274] Warning: remote set UNSECURE session >>> + 11 Feb 00:00:36 [78274] pwd protected session (MD5) >> This means your system is sending a session password, but the remote >> session has no password set for incoming connections and returns M_OK >> 'non-secure', which gets logged as "Warning: remote set UNSECURE >> session". (a wrong password should return an error) >> It is not a password protected or encrypted session, even if binkd >> tells you so. It is a security flaw of binkd though. AI> Is that a misconfiguration at the remote end, there is no (or an AI> incorrect) password set? See http://ftsc.org/docs/fts-1026.001 * M_OK "non-secure" report to remote about normal password unprotected session; usually used for empty password; I think an incorrect password should return an M_ERR and close the connection. But it depends on the server. A man in the middle, a compromised server or a weird implementation could just ignore the password and send back M_OK "secure". AI> Binkd should not log "pwd protected session (MD5)" in that case. I always use the -md option (require CRAM-MD5) for the node and check for CRYPT in the perl hook script. A CRYPT session works only if both parties use the same password. --- * Origin: War is Peace. Freedom is Slavery. Ignorance is Strength. (2:280/464.47) .