https://www.eternal-september.org/index.php?showpage=techinfo
Server name:
news.eternal-september.org
Port : 119 (NNTP)
Port : 563 (encrypted connection NNTPS)
Servername:
reader80.eternal-september.org
Port : 80
Servername:
reader443.eternal-september.org
Port : 443 (encrypted connection NNTPS)
*****
On the old machine:
1) Alter the setting to use port 119, instead of 563.
2) Fire up wireshark.
3) With "always request authentication" set on the old setup
(you should not need to change this, because it was working),
the wireshark trace of the USER and PASS packets on port 119
will show you your account name and password.
And this is why, in a "snooping" world we live in, you don't
use port 119 if you want to keep your USER and PASS shielded
from prying eyes.
I've selected a few bits out of the Wireshark trace, to
show what your user and pass would look like. The actual user
and pass have been replaced with ***. Notice how the client
"submits" the user, without being asked. Authentication is
a "push protocol" in this case, not a "pull protocol" like
a telnet session maybe. The AUTHINFO says "oh, by the way,
this is my user account detail". That kicks off the (optional)
authentication sequence.
11 NNTP 164 Response: 200
reader02.eternal-september.org
InterNetNews NNRP server INN 2.7.0
(20190513 snapshot) ready (posting ok)
12 NNTP 67 Request: MODE READER
14 NNTP 164 Response: 200
reader02.eternal-september.org
InterNetNews NNRP server INN 2.7.0
(20190513 snapshot) ready (posting ok)
15 NNTP ** Request: AUTHINFO user ***
16 NNTP 74 Response: 381 Enter password
17 NNTP ** Request: AUTHINFO pass ***
Wireshark is an awful pain in the ass, the first time
you use it. The hard part, is getting it to start a trace.
And you never really know whether the WinPCAP promiscuous
Ethernet capturing bit is working properly. It likely
needs to run as administrator, so it can abuse the NIC,
and that can be a challenge to get right.
https://en.wikipedia.org/wiki/Wireshark
When attempts to authenticate with E-S have failed in the past,
I've used Wireshark to verify the sequence is going in properly.
Once you have the details in hand, you can switch any softwares
back to port 563 if you want.
You may have an archived email sitting in your email tool,
with the details of your new password, when you applied for
an E-S account.
Paul