|
HB2PMS > JNOS 02.01.21 13:03l 283 Lines 10538 Bytes #999 (0) @ WW
BID : 7360HB2PMS
Read: GAST
Subj: Jnos v2.0m.5F
Path: DBO595<DBX320<DBX233<VB1BOX<NL3VKL<NL3PRC<HB1BBS
Sent: 210102/1031Z 14205@HB1BBS.ZL.NLD.EU BPQ6.0.19
Message from: HB2PMS@HB1BBS
differences between 2.0m.5F and 2.0m.4 - December 24, 2020
----------------------------------------------------------
1) Updated latest document project (also included in rsync area) :
https://www.langelaar.net/jnos2/documents/j2addendum.txt
2) The BID for messages from 'our host' is now in BASE36 format, giving us
a much bigger range of several million numbers, instead of the original
range of 99999 and then start over again.
If you use an email client (like thunderbird) to send messages to your
JNOS system, you'll notice this version no longer uses a portion of the
long message-id present in the email header to generate the BID, rather
it will just create another BASE36 BID from JNOS sequence number pool.
I figure it is perfectly fine to do this now, since BASE36 extends the
range of the BID to several million. The original message-id is still
preserved in the message header anyways, so nothing is lost here.
3) This update sees the addition of DUPE protection for concurrent
forwarding
sessions from multiple remote hosts, where messages having the same BID
are
coming in from multiple sources, seconds of each other, even within
minutes
of each other in some cases. It should be noted that up till now, JNOS
has
always been vunerable to this, resulting in posting of duplicate
messages,
which in turn get forwarded to other systems, which is just not good.
The solution up till now has been to stagger forwards with remote
partners,
such that only one partner is forwarding at any particular time. With
this
new feature, we can loosen things up a bit more, and not worry about it.
Excess messages get deferred (not refused), since we might need them
later.
4) New Robust Packet Interface (KISS over TCP/IP) to WinRPR Software
Actually starting playing with this on November 3, after getting a packet
message from Jan (PA3GJX) saying it was available - and is very exciting.
Had it working literally the same day, just a stripped down version of my
AGWPE interface code. What is really important to realize here is that
the
new interface is a full blown AX.25 port, so you can do full packet stuff
on it - just like HF packet.
For basic configuration and notes, please check :
https://www.langelaar.net/jnos2/robustpacket
For the WinRPR software download, please visit :
https://www.hamradio.me/graphs/WinRPR_Alpha_Software/
Post note : I started using WinRPR with NOSaprs shortly after releasing
the
new WinRPR interface. And so my system now igates APRS robust packet
traffic
heard on 30 meters, to the APRS internet system. At some point I would
like
to use WinRPR to do message forwarding with other BBS systems, we'll see.
5) Very basic implementation of Multi Factor Authentication (MFA) - why not
?
(note this is very much a prototype, and needs to evolve over time)
6) Important changes to the JNOS httpvnc (web based user BBS) service
Now using POST instead of GET in the form submission, so you won't be
seeing any user credentials and commands in the URL anywmore, it's all
hidden in the message body now. The original version had user callsign
and password exposed in the URL which was just bad, but my knowledge of
HTTP programming was quite limited at the time I wrote the original
prototype, so really it is a huge security improvment.
NOTE : Data is still cleartext over your network since this is HTTP ...
This version also quickly shuts down those annoying and bandwidth
consuming
favicon http requests that firefox likes to send out in huge volumes,
yeah.
Added a CTRL-A checkbox so a user can abort any SEND (SP, SR, SB)
commands.
Made adjustments to timeout values in the code, removed some pwait()
calls
which didn't seem necessary anymore, and now setting the 'Server:' field
in
the HTTP response header to reflect the more recent JNOS version 2.0m
...
Cleaned up debugging and general logging to the JNOS logfile.
7) Important changes to the SID Capture feature.
The original prototype was written more to help me debug stuff at the
time,
but I figured it might come in handy for others, but the last
enhancements
actually were not really great. In the interest of getting more
information
about the hosts connecting to us, the focus on the connecting callsign
was
lost, the information displayed was confusing, you had no idea who the
call
was in many cases, and it turns out in the end that I introduced bugs
into
the code, so the information at times was even wrong here and there.
This new version has a much better user friendly layout, being more in
line
with what I originally wanted to do way back then. Now you get the
callsign,
the time of connect, the full SID sent to us, and connection details, as
in
was this a netrom connect, a radio port, a wormhole, telnet connect, etc
?
For example, on the JNOS console of my development system :
jnos> mbox sid > /tmp/sid8.txt
Then from the linux prompt, I can retrieve the content as follows :
root@slackware:/jnos/src/dev_2.0m.4# more /tmp/sid8.txt
[FBB-7.0.10-AB1FHMRX
gb7cip 20:06:02 GB7CIP @ GB7CIP
[JNOS-2.0.6.URO.C-B1FHIM
ve3cgh 11:37:17 ve3cgh.ampr.org
[TNOS-3.00-FHIMW
ve2har 18:57:57 VE2HAR-8 @ VE2HAR-9
[FBB-7.05G-AB1FHM
ve2pkt 17:47:34 VE2PKT @ VE2PKT
[OPENBCM-1.08-5-G2F4A-AB1D1FHMRW
i0ojj 20:15:10 host-79-52-228-200.retail.telecomitalia.it
[JNOS-2.0M-B1FHIM
ve3tok 20:24:55 port.ve3mch.ampr.org
[JNOS-2.0M.5C-B1FHIM
n2nov 20:25:21 N2NOV-4 on port newyork
ve3cgr 17:58:20 jnos.ve3cgr.ampr.org
aa6hf 20:24:03 AA6HF-8 on port cal
i0ojj 20:13:19 i0ojj.ampr.org
[BPQ-6.0.20.10-B1FIHJM
va3tok 20:14:05 linux.ve3mch.ampr.org
[JNOS-2.0M.5B-B1FHIM
n2nov 18:09:25 1d N2NOV-4 on port newyork
[FBB-7.07-AB1FHM
ve3tok 20:11:25 linux.ve3mch.ampr.org
[WL2K-5.0-B2FWIHJM
wl2k 03:39:54 1d winlink-lb-628697408.us-east-
1.elb.amazonaws.com
8) Security - make sure you configure users in ftpusers with BBS
permissions
only for stations you have authorized incoming forwarding with. This
will
protect against rogue or ignorant incoming connects from any stations
who
could then proceed to send a SID, possibly followed by illegal 3rd party
forwarding or forwarding of malicious messages.
for BBS permissions OR 0x02000 - so 0x0407f in ftpusers becomes 0x0607f
Up till now, JNOS has always allowed this, but now JNOS will send a
terse
message to the 'offending' station first, instead of the SID, disrupting
the message flow - it might require some refinement, let me know please.
These events are also logged to the JNOS logfile.
IF this feature causes you grief, then disable it in config.h with :
#define J2_DONT_ENFORCE_BBS_USER
9) Added EHLO support to SMTP server. I discovered this by accident when my
android email app refused to talk to my JNOS, so tcpdump showed me
exactly
the problem, easy enough to add the command. Quite honestly, I thought
it
was there already, oops :|
A) Instead of hardcoding NETROM parameters, I know several folks have had
it
done, please consider using the following NEW commands in autoexec.nos :
netrom obsoinit <value> default is 6, for NEDA use 5
netrom obsominbc <value> default is 5, for NEDA use 3
Same with acktime, use the EXISTING command instead of hardcoding it :
netrom acktime <value> default is 3000, for NEDA (?)
B) Couple of 'stability' mods to netrom code.
C) Better error logging during saving of the BID to the history file.
D) Removed first column (gateway ip address) from the 'genencaptxt' file.
(now it matches the exact same format as a real encap.txt)
E) If you are running two systems with the same Call Sign
Please consider staggering your sequence numbers, since the sequence
number
pool is now into the several million range, not constrained to the old 1
to
99999 and back. For example, in my /jnos/spool/mqueue/sequence.seq, I
reset
the value to 16801420, which starts my base36 bid at ANNNN, way ahead.
If anyone sees a flaw in this, please talk to me :]
Not so sure one should be running multi BBS with same callsigns, but ...
F) How to update your JNOS 2.0m.4 system (or just compile fresh)
WARNING : only apply this update on 2.0m.4 systems, nothing earlier !
Run rsync on your source tree like you usually would, for example :
cd <your JNOS source>
rsync -av www.langelaar.net::jnos2 .
Note the following new possibilities for your config.h file :
#define WINRPR /* kiss over tcp/ip interface to WinRPR */
#define J2MFA /* prototoype multi factor authentication */
#define TNODE /* Brian's TNODE mods */
#define J2_DONT_ENFORCE_BBS_USER /* use only if it gives you grief
*/
Compile as usual :
make clean
./configure
make
G) No more patch files, all moved into a patches subdirectory again ...
(the README files in some of them might come in handy, who knows)
73 Henk.
(Message sent with Sally 7.2.044)
======================================================================
_ _ ____ __ ____ ____ _____
| | | | _ \/_ | _ \| _ \ / ____| SYS: Henk (hb1nos@hb1bbs.com)
| |__| | |_) || | |_) | |_) | (___ QTH: Ouwerkerk - JO11XO
| __ | _ < | | _ <| _ < \___ \ BBS: HB1BBS.ZLD.NLD.EU
| | | | |_) || | |_) | |_) |____) | QRV: 27.235 MHz (FM 1200bps)
|_| |_|____/ |_|____/|____/|_____/ WEB: www.hb1bbs.com
======================================================================
AXUDP : HB1BBS.NET UDP 93
APRS : APRS.HB1BBS.COM (51.37.48N : 003.59.01E)
TELNET: HB1BBS.NET 23
** Netrom/Node HB7NOD::HB7NOS (Jnos)
** Netrom/Node HB8NOD::HB8NOS (Bpq32)
** Netrom/Node HB9NOD::HB9NOS (LinBpq)
======================================================================
** This message is generated with Sally 7.2.044
----------------------------------------------------------------------
** Timed zaterdag 02 januari 2021 11:28 West-Europa (standaardtijd)
** BBS HB2PMS@HB1BBS
Lese vorherige Mail | Lese naechste Mail
| |