Subj : Session Password recovery To : Wilfred van Velzen From : Vincent Coen Date : Wed Nov 13 2024 08:39 pm Hello Wilfred! 13 Nov 24 15:55, you wrote to me: It is 2:301/1 > Hi Vincent, > On 2024-11-13 14:10:33, you wrote to All: VC>> I have a node that polls here every minute 24/7 with an unknown VC>> password. VC>> In order to satisfy their poll I need to set up the system here VC>> with the password used but cannot find out how to show it in the VC>> logs, but wsa able in an earlier version some how. VC>> Can anyone provide what I need to do setup wise etc to recover VC>> this password which if I can do this might stop this annoying VC>> behaviour. > If done correctly in the binkp protocol, the password is never send > accross the line, only checksums that are generated with the password > (I think that is what the OPT CRAM-MD5 is supposed to do). So you > can't recover the password from the session. > If you have no other way of communicating with the nodes sysop, I > would block them on the firewall, maybe they notice that at some point > in the future. Or perhaps an other node that has no session password > set with this node, can deliver a crashmail for you? > Btw: I have communicated with a number of the nodes in net 250 in the > past regarding AmigaNet links, so maybe if this regards a node in net > 250 I have an email address for you, if you can tell me their name in > that case? > Bye, Wilfred. Vincent --- Mageia Linux v9 X64/Mbse v1.1.0/GoldED+/LNX 1.1.5-b20240309 * Origin: Air Applewood, The Linux Gateway to the UK & Eire (2:250/1) .