config_echomail_nodes
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
config_echomail_nodes [2019/03/16 17:55] – added ssl/tls for echomail nodes avon | config_echomail_nodes [2022/09/26 01:31] – adding 'uplink' content avon | ||
---|---|---|---|
Line 70: | Line 70: | ||
| | ||
Route Info │ 21:* | Route Info │ 21:* | ||
+ | | ||
Max PKT Size │ 512 | Max PKT Size │ 512 | ||
Max ARC Size │ 2048 | Max ARC Size │ 2048 | ||
Line 156: | Line 157: | ||
the Route Info. | the Route Info. | ||
- | If there is no direct match, Mystic will then look at the Route Info for each Echomail | + | If there is no direct match, Mystic will then look at the Route Info for each Echomail |
+ | |||
+ | === Uplink === | ||
+ | |||
+ | This flag can either be set to Yes or No for each Echomail Node. It works in tandem with MIS POLL UPLINK and is similar to the MIS POLL FORCED command, but instead will only force a poll of Echomail Nodes with the Uplink flag set to Yes. | ||
=== Max PKT Size === | === Max PKT Size === | ||
Line 265: | Line 270: | ||
=== Echomail Node Security ==== | === Echomail Node Security ==== | ||
- | The beginnings of Echomail node security is here! The easiest way to think about how this system works is to relate an Echomail node to the way security works for a user in your BBS. Each node will have a security | + | Echomail node security is here! The easiest way to think about how this system works is to relate an Echomail node to the way security works for a user in your BBS. Each node will have a security |
Different functions throughout the echomail system will eventually have "Echo ACS" strings which work just like the [[access_control|user ACS strings that we're familiar with]]. | Different functions throughout the echomail system will eventually have "Echo ACS" strings which work just like the [[access_control|user ACS strings that we're familiar with]]. | ||
Line 272: | Line 277: | ||
The above would say that any echomail node that is a member of Echomail group 2, OR any node that has a security level of 255 OR any Echomail node that has flag H can hatch files to that file base. The Echomail node with the ID of #10 can also hatch. | The above would say that any echomail node that is a member of Echomail group 2, OR any node that has a security level of 255 OR any Echomail node that has flag H can hatch files to that file base. The Echomail node with the ID of #10 can also hatch. | ||
+ | |||
+ | The following commands are available within EACS: | ||
+ | |||
+ | s< | ||
+ | equal to < | ||
+ | g< | ||
+ | to < | ||
+ | f< | ||
+ | between A to Z. | ||
+ | u< | ||
+ | allows security to be applied to specific nodes (ID is | ||
+ | shown in echomail node editor). | ||
+ | |||
+ | Just like user ACS, Echomail ACS can also use parenthesis and boolean evaulation. | ||
+ | |||
+ | Echomail ACS has been activated for message base subscribing/ | ||
+ | |||
+ | Hubs can still manually link a base to a node regardless of security, so for example if you wanted to force nodes to always carry a specific echo area, you would give them the base and then set the "List EACS" to an access they do not have (or even use % which is " | ||
This is a very powerful system for managing an Echomail network, and EACS strings will be added to various functions in the future as seen fit. | This is a very powerful system for managing an Echomail network, and EACS strings will be added to various functions in the future as seen fit. |
config_echomail_nodes.txt · Last modified: 2023/01/03 01:49 by avon