A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Windows 10 » Windows 10 Help Forum
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Expand all has stopped working today!



 
 
Thread Tools Rate Thread Display Modes
  #1  
Old July 22nd 18, 04:31 AM posted to alt.comp.os.windows-10
Rene Lamontagne
external usenet poster
 
Posts: 2,549
Default Expand all has stopped working today!

Only on Windows-10 NG, Is it just me or everyone?
No little + marks either.

Rene

Ads
  #2  
Old July 22nd 18, 04:35 AM posted to alt.comp.os.windows-10
Rene Lamontagne
external usenet poster
 
Posts: 2,549
Default Expand all has stopped working today!

On 07/21/2018 10:31 PM, Rene Lamontagne wrote:
Only on Windows-10 NG, Is it just me or everyone?
Â*No little + marks either.

Rene


Should be Expand all threads.

Rene
  #3  
Old July 22nd 18, 04:38 AM posted to alt.comp.os.windows-10
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default Expand all has stopped working today!

Rene Lamontagne wrote:
On 07/21/2018 10:31 PM, Rene Lamontagne wrote:
Only on Windows-10 NG, Is it just me or everyone?
No little + marks either.

Rene


Should be Expand all threads.

Rene


I'm seeing some sort of reposted/injected splatter
from "wildcat.uuhec.net" .

Are you sure the messages you're looking at, aren't
coming from that server instead of from the original poster ?
If you scroll up your screen a bit, above the 450+
splatter messages so far, maybe it will be working
right up there.

Paul
  #4  
Old July 22nd 18, 06:53 AM posted to alt.comp.os.windows-10
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default Expand all has stopped working today!

Boris wrote:
Rene Lamontagne wrote in news:fricb9F5025U2
@mid.individual.net:

On 07/21/2018 10:31 PM, Rene Lamontagne wrote:
Only on Windows-10 NG, Is it just me or everyone?
 No little + marks either.

Rene

Should be Expand all threads.

Rene


Well, as you can see, I'm running Xnews. Expand all threads is working
fine for me.

But, for this newsgroup only, I get the entire thread contained in a
folder (as it should be), and in addition, I get each reply as it's own
post, without reriginal post description:

https://postimg.cc/image/vjp725sq3/

This is occurring only in this newsgroup, but on both the eternal-
september news server bcak to 7/11/2018 and the aioe news server back to
7/17/2018.


Someone has mis-configured a server which is flooding
old posts. Look at the email address in the headers
to see how that server is re-posting stuff, but with
modified headers. That's how you can tell the "flood"
posts from any real posts.

Now would be a good time to install a filter for

w i l d c a t . u u h e c . n e t

Sample MID.



http://al.howardknight.net/msgid.cgi...t.uuhec.net%3E

It modifies the sender email address and changes the
domain to its own.

HTH,
Paul
  #5  
Old July 22nd 18, 03:24 PM posted to alt.comp.os.windows-10
Rene Lamontagne
external usenet poster
 
Posts: 2,549
Default Expand all has stopped working today!

On 07/22/2018 12:53 AM, Paul wrote:
Boris wrote:
Rene Lamontagne wrote in news:fricb9F5025U2
@mid.individual.net:

On 07/21/2018 10:31 PM, Rene Lamontagne wrote:
Only on Windows-10 NG, Is it just me or everyone?
Â*Â No little + marks either.

Rene

Should be Expand all threads.

Rene


Well, as you can see, I'm running Xnews.Â* Expand all threads is
working fine for me.

But, for this newsgroup only,Â* I get the entire thread contained in a
folder (as it should be), and in addition, I get each reply as it's
own post, without reriginal post description:

https://postimg.cc/image/vjp725sq3/

This is occurring only in this newsgroup, but on both the eternal-
september news server bcak to 7/11/2018Â* and the aioe news server back
to 7/17/2018.


Someone has mis-configured a server which is flooding
old posts. Look at the email address in the headers
to see how that server is re-posting stuff, but with
modified headers. That's how you can tell the "flood"
posts from any real posts.

Now would be a good time to install a filter for

Â*Â* w i l d c a t . u u h e c . n e t

Sample MID.



http://al.howardknight.net/msgid.cgi...t.uuhec.net%3E


It modifies the sender email address and changes the
domain to its own.

HTH,
Â*Â*Â* Paul


Thanks Paul and all others, I installed the wildcat.uuhec.net filter
and now all seems normal again for now.

Rene

  #6  
Old July 23rd 18, 03:54 AM posted to alt.comp.os.windows-10
VanguardLH[_2_]
external usenet poster
 
Posts: 10,881
Default Expand all has stopped working today!

Paul wrote:

Rene Lamontagne wrote:

Rene Lamontagne wrote:

Only on Windows-10 NG, Is it just me or everyone?
No little + marks either.


Should be Expand all threads.


I'm seeing some sort of reposted/injected splatter
from "wildcat.uuhec.net" .


An injection node named ´wildcat¡ from uuhec.net (see the injection node
in the PATH header) has resubmitted all previous articles and somehow
eliminated the originals. This splattered duplicates removed the
References header (added by the posters' clients) that allows for
threading of the articles. This smacks of the old Hipcrime attack that
superceded or cancelled old articles.

An example of a superceded article that originated from wildcat that
duplicates one of my prior posts has the following headers:

Path: ...!newsfeed.xs3.de!io.xs3.de!b4gate.uuhec.net!wil dcat!vanguardlh
From: (Vanguardlh)
Message-ID:
Organization: Neptune's Lair II
Distribution: world

I post only through individual.net, so the injection node in the Path
header should point at individual.net, not ´b4gate.uuhec.net!wildcat¡.
The following headers have been falsified (from the now missing original
article) in the duplicate bogus copy:

Path
The injection node is NOT through individual.net which is the only
Usenet provider through which I submit.
From
Should be ´VanguardLH "
Message-ID
The right-token should be individual.net since that is through whom I
submit my posts.
Distribution: world
I donÿt add this header and have never seen individual.net or any
other Usenet provider add this header.
Organization
I use ´Usenet Elder¡, not ´Neptuneÿs Lair II¡.

I alerted individual.net regarding the superceded articles (that had
References stripped and bogus headers) or that the originals got
cancelled (and not by the original posters) and substitute new posts
were injected by uuhec.net.

Looks like uuhec.net got hacked and submitted duplicates of prior
articles but with References stripped and falsified headers. However,
seems odd that someone at uuhec.net managed to issue supercedes or
cancels that were effected over at individual.net. Some Usenet
providers still honor cancels.

http://individual.net/faq.php#1.12
"In general, our server does not execute Cancels and Supersedes."

Well, someone managed to cancel the original articles or supercede them
and that wasn't from the original posters.

http://www.uuhec.net/
UUHECNET now gated to HECnet via MOIRA
AS a bonus, MOIRA can route mail between the two networks, using
hybrid UUCP/Mail-11 addresses, e.g:
..!b4gate!moira!CHIMPY::SAMPSA

So uuhec allows submissions to modify the Path header. This is one of
the reasons I filter out altopia's (alt.net) posts: they allow their
posters to modify the Path header. They state the poster is supposed to
follow their injection node in the Path header with alt.net to show the
post originated there but they do NOT check nor block any violation.
The result is posters through Altopia can lie regarding from where an
article got injected. Seems we have another asshole doing the same for
its users. Plus it looks like this might be a remailer service due to
the mention of [e]mail. I filter out remailers, too.

B4GATE now de facto UUHECNET hub
Also any new applicants will be given access to B4GATE, and almost any
system on UUHECNET can be reached through it..

Looks like an injection node to Usenet that should get banned by other
Usenet providers.

http://www.uuhec.net/about/
UUHEC.NET was launched in June 2010 to provide UUCP connections over
the Internet to interested retrotechnology hobbyists.

Doesn't sound like anything that should get peered to Usenet. Let them
play with themselves in their own jerk-off world.
  #7  
Old July 23rd 18, 07:15 AM posted to alt.comp.os.windows-10
Cows Are Nice
external usenet poster
 
Posts: 4
Default Expand all has stopped working today!

On 07/22/2018 07:54 PM, VanguardLH wrote:
An injection node named ´wildcat¡ from uuhec.net (see the injection node
in the PATH header) has resubmitted all previous articles and somehow
eliminated the originals. This splattered duplicates removed the
References header (added by the posters' clients) that allows for
threading of the articles.


NO! Our Tribal Knowledge Archive is ruined!!!

  #8  
Old July 23rd 18, 07:12 PM posted to alt.comp.os.windows-10
VanguardLH[_2_]
external usenet poster
 
Posts: 10,881
Default Expand all has stopped working today!

Individual.net has, so far, responded that they won't block uuhec.net
because the original articles are still on the server despite having to
find them in a flood of forged duplicates (where Path, From, and
Message-ID have been altered and References has been stripped). They
figure it is a misconfigured e-mail-to-NNTP gateway and the screwup is
probably not deliberately malicious; however, that doesn't change the
malicious effect whether accidental or deliberate. I'm still trying to
convince them that this constitutes abuse by altering the original
articles to pretend they originated from their server (Path header),
falsifying the poster's identify (From header), and destroying article
ID and tracking (Message-ID header). uuhec.net is spewing forgeries.

I am notifying uuhec.net of their screwup just in case it was accidental
although malicious in effect.

For those who use NNTP client capable of regex filtering, I've defined
the following filters to clean up this newsgroup (and any others that
uuhec.net might touch):

- For their alteration of the Path header (to pretend articles were
submitted through them), and to eliminate not only when they pretend
they are the injection node but also whenever any articles are peered
through them (i.e., don't just test on just the injection node but on
any node in Path being them) and under the presumption you are not
using uuhec.net (which would have just the one uuhec.net node in the
Path you see):

^Path: \S+!(\w+\.)?uuhec.net!

- For their destruction of the poster's ID in the From header:

^From: \s*\(

- For their corruption of the Message-ID header used for article
identification and tracking:

^Message-ID:

How you apply the regex filters depends on your NNTP client. Mine
supports From and Message-ID, so "^From: " and "^Message-ID: " are not
specified in the regex string; however, Path is a non-overview header,
so I must use a generic header filter by specifying the header name in
the filter.

Once I applied those filters, this newsgroup was cleaned of uuhec.net's
faked duplicates. They are NOT peering the original articles through
their gateway. They are spewing fakes aka forgeries.
 




Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off






All times are GMT +1. The time now is 10:57 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.