If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Rate Thread | Display Modes |
#1
|
|||
|
|||
Expand all has stopped working today!
Only on Windows-10 NG, Is it just me or everyone?
No little + marks either. Rene |
Ads |
#2
|
|||
|
|||
Expand all has stopped working today!
On 07/21/2018 10:31 PM, Rene Lamontagne wrote:
Only on Windows-10 NG, Is it just me or everyone? Â*No little + marks either. Rene Should be Expand all threads. Rene |
#3
|
|||
|
|||
Expand all has stopped working today!
Rene Lamontagne wrote:
On 07/21/2018 10:31 PM, Rene Lamontagne wrote: Only on Windows-10 NG, Is it just me or everyone? No little + marks either. Rene Should be Expand all threads. Rene I'm seeing some sort of reposted/injected splatter from "wildcat.uuhec.net" . Are you sure the messages you're looking at, aren't coming from that server instead of from the original poster ? If you scroll up your screen a bit, above the 450+ splatter messages so far, maybe it will be working right up there. Paul |
#4
|
|||
|
|||
Expand all has stopped working today!
Boris wrote:
Rene Lamontagne wrote in news:fricb9F5025U2 @mid.individual.net: On 07/21/2018 10:31 PM, Rene Lamontagne wrote: Only on Windows-10 NG, Is it just me or everyone? Â No little + marks either. Rene Should be Expand all threads. Rene Well, as you can see, I'm running Xnews. Expand all threads is working fine for me. But, for this newsgroup only, I get the entire thread contained in a folder (as it should be), and in addition, I get each reply as it's own post, without reriginal post description: https://postimg.cc/image/vjp725sq3/ This is occurring only in this newsgroup, but on both the eternal- september news server bcak to 7/11/2018 and the aioe news server back to 7/17/2018. Someone has mis-configured a server which is flooding old posts. Look at the email address in the headers to see how that server is re-posting stuff, but with modified headers. That's how you can tell the "flood" posts from any real posts. Now would be a good time to install a filter for w i l d c a t . u u h e c . n e t Sample MID. http://al.howardknight.net/msgid.cgi...t.uuhec.net%3E It modifies the sender email address and changes the domain to its own. HTH, Paul |
#5
|
|||
|
|||
Expand all has stopped working today!
On 07/22/2018 12:53 AM, Paul wrote:
Boris wrote: Rene Lamontagne wrote in news:fricb9F5025U2 @mid.individual.net: On 07/21/2018 10:31 PM, Rene Lamontagne wrote: Only on Windows-10 NG, Is it just me or everyone? Â*Â No little + marks either. Rene Should be Expand all threads. Rene Well, as you can see, I'm running Xnews.Â* Expand all threads is working fine for me. But, for this newsgroup only,Â* I get the entire thread contained in a folder (as it should be), and in addition, I get each reply as it's own post, without reriginal post description: https://postimg.cc/image/vjp725sq3/ This is occurring only in this newsgroup, but on both the eternal- september news server bcak to 7/11/2018Â* and the aioe news server back to 7/17/2018. Someone has mis-configured a server which is flooding old posts. Look at the email address in the headers to see how that server is re-posting stuff, but with modified headers. That's how you can tell the "flood" posts from any real posts. Now would be a good time to install a filter for Â*Â* w i l d c a t . u u h e c . n e t Sample MID. http://al.howardknight.net/msgid.cgi...t.uuhec.net%3E It modifies the sender email address and changes the domain to its own. HTH, Â*Â*Â* Paul Thanks Paul and all others, I installed the wildcat.uuhec.net filter and now all seems normal again for now. Rene |
#6
|
|||
|
|||
Expand all has stopped working today!
Paul wrote:
Rene Lamontagne wrote: Rene Lamontagne wrote: Only on Windows-10 NG, Is it just me or everyone? No little + marks either. Should be Expand all threads. I'm seeing some sort of reposted/injected splatter from "wildcat.uuhec.net" . An injection node named ´wildcat¡ from uuhec.net (see the injection node in the PATH header) has resubmitted all previous articles and somehow eliminated the originals. This splattered duplicates removed the References header (added by the posters' clients) that allows for threading of the articles. This smacks of the old Hipcrime attack that superceded or cancelled old articles. An example of a superceded article that originated from wildcat that duplicates one of my prior posts has the following headers: Path: ...!newsfeed.xs3.de!io.xs3.de!b4gate.uuhec.net!wil dcat!vanguardlh From: (Vanguardlh) Message-ID: Organization: Neptune's Lair II Distribution: world I post only through individual.net, so the injection node in the Path header should point at individual.net, not ´b4gate.uuhec.net!wildcat¡. The following headers have been falsified (from the now missing original article) in the duplicate bogus copy: Path The injection node is NOT through individual.net which is the only Usenet provider through which I submit. From Should be ´VanguardLH " Message-ID The right-token should be individual.net since that is through whom I submit my posts. Distribution: world I donÿt add this header and have never seen individual.net or any other Usenet provider add this header. Organization I use ´Usenet Elder¡, not ´Neptuneÿs Lair II¡. I alerted individual.net regarding the superceded articles (that had References stripped and bogus headers) or that the originals got cancelled (and not by the original posters) and substitute new posts were injected by uuhec.net. Looks like uuhec.net got hacked and submitted duplicates of prior articles but with References stripped and falsified headers. However, seems odd that someone at uuhec.net managed to issue supercedes or cancels that were effected over at individual.net. Some Usenet providers still honor cancels. http://individual.net/faq.php#1.12 "In general, our server does not execute Cancels and Supersedes." Well, someone managed to cancel the original articles or supercede them and that wasn't from the original posters. http://www.uuhec.net/ UUHECNET now gated to HECnet via MOIRA AS a bonus, MOIRA can route mail between the two networks, using hybrid UUCP/Mail-11 addresses, e.g: ..!b4gate!moira!CHIMPY::SAMPSA So uuhec allows submissions to modify the Path header. This is one of the reasons I filter out altopia's (alt.net) posts: they allow their posters to modify the Path header. They state the poster is supposed to follow their injection node in the Path header with alt.net to show the post originated there but they do NOT check nor block any violation. The result is posters through Altopia can lie regarding from where an article got injected. Seems we have another asshole doing the same for its users. Plus it looks like this might be a remailer service due to the mention of [e]mail. I filter out remailers, too. B4GATE now de facto UUHECNET hub Also any new applicants will be given access to B4GATE, and almost any system on UUHECNET can be reached through it.. Looks like an injection node to Usenet that should get banned by other Usenet providers. http://www.uuhec.net/about/ UUHEC.NET was launched in June 2010 to provide UUCP connections over the Internet to interested retrotechnology hobbyists. Doesn't sound like anything that should get peered to Usenet. Let them play with themselves in their own jerk-off world. |
#7
|
|||
|
|||
Expand all has stopped working today!
On 07/22/2018 07:54 PM, VanguardLH wrote:
An injection node named ´wildcat¡ from uuhec.net (see the injection node in the PATH header) has resubmitted all previous articles and somehow eliminated the originals. This splattered duplicates removed the References header (added by the posters' clients) that allows for threading of the articles. NO! Our Tribal Knowledge Archive is ruined!!! |
#8
|
|||
|
|||
Expand all has stopped working today!
Individual.net has, so far, responded that they won't block uuhec.net
because the original articles are still on the server despite having to find them in a flood of forged duplicates (where Path, From, and Message-ID have been altered and References has been stripped). They figure it is a misconfigured e-mail-to-NNTP gateway and the screwup is probably not deliberately malicious; however, that doesn't change the malicious effect whether accidental or deliberate. I'm still trying to convince them that this constitutes abuse by altering the original articles to pretend they originated from their server (Path header), falsifying the poster's identify (From header), and destroying article ID and tracking (Message-ID header). uuhec.net is spewing forgeries. I am notifying uuhec.net of their screwup just in case it was accidental although malicious in effect. For those who use NNTP client capable of regex filtering, I've defined the following filters to clean up this newsgroup (and any others that uuhec.net might touch): - For their alteration of the Path header (to pretend articles were submitted through them), and to eliminate not only when they pretend they are the injection node but also whenever any articles are peered through them (i.e., don't just test on just the injection node but on any node in Path being them) and under the presumption you are not using uuhec.net (which would have just the one uuhec.net node in the Path you see): ^Path: \S+!(\w+\.)?uuhec.net! - For their destruction of the poster's ID in the From header: ^From: \s*\( - For their corruption of the Message-ID header used for article identification and tracking: ^Message-ID: How you apply the regex filters depends on your NNTP client. Mine supports From and Message-ID, so "^From: " and "^Message-ID: " are not specified in the regex string; however, Path is a non-overview header, so I must use a generic header filter by specifying the header name in the filter. Once I applied those filters, this newsgroup was cleaned of uuhec.net's faked duplicates. They are NOT peering the original articles through their gateway. They are spewing fakes aka forgeries. |
Thread Tools | |
Display Modes | Rate This Thread |
|
|