Let me know if this one has any password lurking inside.
Still came through as bad:
+ Jan 11 21:20:59 Process: Importing EchoMail
+ Jan 11 21:20:59 Waiting for BUSY nodes
+ Jan 11 21:20:59 Importing 11212059.PKT (2:221/1.58 to 618:500/23)
! Jan 11 21:20:59 No echomail node configured for 2:221/1.58
! Jan 11 21:20:59 Moving /home/pi/mystic/echomail/in/unsecure/11212059.PKT to /home/pi/mystic/echomail/bad/11212059.PKT
+ Jan 11 21:20:59 Results: 0 echo, 0 net, 0 dupes, 0 tossed in 0.10s
And a password is set & visible:
pktview V1.1, Copyright WvV 1998, 2016
Dest. Node addr: 618:500/23.0
Orig. Node addr: 2:221/1.58
QDest Zone : 618
QOrig Zone : 2
Aux Net : 0
Date : 2021/01/11
Time : 00:00:00
Baud : 0
Pkt Type : 2
ProdCode : 233
Revision Major : 3
Revision Minor : 20
Password : (hidden)
Capability Word: 0001
Capability Val.: 0001
Product data : 00000000
Date Time To From Subject Area ----------------------------------------------------------------------------- 11 Jan 21 21:20:00 Jay Harris Mr.TEST testing for pk
1 messages in this .pkt file.
Jay
--- Mystic BBS v1.12 A47 2021/01/05 (Raspberry Pi/32)
* Origin: Northern Realms (1:229/664)