A few curious things I found though:
Recompiling the old dmb that worked, made it stop working. The back and forth has been changed since I created it, the reply sent from the Python script is no longer valid to move the process forward.
The process WAS: BYOND sends the packet to the remote server, the remote replies with its own packet that validates and tells the BYOND world it's acceptable, the socket is established and held. If the reply packet doesn't come in a timely manner or it's invalid, the socket is dropped.
I'm guessing at some point between then and now the reply packet needed to validate was changed or the overall process changed.
After a long chat with SP we came to the conclusion that it's probably best not to have the ability to disable the security between BYOND worlds, as it's there for a reason, but to expand on Export().
As it is now, Export() can take byond:// or http:// protocols, which dictate how Export() validates the remote server, http:// is obviously not secured and one-off.
What I suggested to SP to expand on their Feature Request with is a new protocol, that will dictate a new type of connection, it would be unsecure like http:// but allow for persistence like byond://.
world.Export("unsecured://[ip]:[port]?data",1)
Or something along those lines, I'm horrible at naming things.
Since the code already exists on BYOND's end for checking the protocol and differing functionality based on it, this would be the ideal route.
It would require world/Topic() be able to tell whether the incoming packet was from a BYOND world or not, as it stands the Addr argument doesn't include the protocol (never had a reason to), it could either be expanded to include that, or include something unique for non-BYOND packets, or add a new argument to Topic() outright that'd be true for non-BYOND packets.
Seems like that would be the route to take, it would be the easiest for Lummox to deal with, keep compatibility with old code, and provide the developers pure socket connections where they'd be responsible for security.
Its also encrypted, we had a long chat about it.
What we propose is adding a new protocol, something like byond-unsafe, that when world.Exported it opens an unencrypted channel of communication for use with external applications.