I'm looking for a way for BinkD to reject the incoming connection based
on something like SYS or ZYZ info presented. Is such a thing possible using a perl script or similar?
As some of you may know I run an othernet in Zone 21 and have a /999
test AKA that nodes who which to test their polling setup to my HUB
can use when first setting up and before they apply and get their own
node number.
The problem I have at present is that someone has set up their BBS and
is polling the HUB every 2 minutes using the test AKA. This is way too frequent, has been going on for weeks, and despite a netmail to that
test system asking for the sysop to contact me to arrange their own
node number, there's been no reply and no let up in polling frequency.
I'm looking for a way for BinkD to reject the incoming connection
based on something like SYS or ZYZ info presented. Is such a thing possible using a perl script or similar?
Note I am not a perl guru so any suggested fix you have I'd appreciate
a bit of hand holding to implement it.
Also of note, setting such a block up is not my preferred choice but I have exhausted options to contact the unknown sysop and want to ensure
the test AKA is available for others to send/recieve packets from
also... with a polling frequency of 2 mins the offending system gives
no one else a look in.
Why not just block his IP (range) in your firewall? That would be the
easy sollution...
I see in the binkD FAQ that there is a way to block a known IP. Check
out the distro .CFG file. Good luck.
Also of note, setting such a block up is not my preferred choice but I have exhausted options to contact the unknown sysop and want to ensure
the test AKA is available for others to send/recieve packets from
also... with a polling frequency of 2 mins the offending system gives
no one else a look in.
Why not just block his IP (range) in your firewall? That would be the
easy sollution...
because I don't really know it, and I suspect other nodes may be part of that range...
I'm looking for a way for BinkD to reject the incoming connection based on something like SYS or ZYZ info presented. Is such a thing possible using a perl script or similar?
Note I am not a perl guru so any suggested fix you have I'd appreciate a bit of hand holding to implement it.
If your system can suffer from DoS because of a single person making single connection once in 2 minutes, imagine what happens, if someone
Works:
? 13:06 [2106] aborted by Perl after_handshake(): Get lost!
+ 13:06 [2106] done (to 4095:1/2@testnet, failed, S/R: 0/0 (0/0 bytes))
Have you built binkd with perl support?
Sysop: | Coz |
---|---|
Location: | Anoka, MN |
Users: | 2 |
Nodes: | 4 (0 / 4) |
Uptime: | 16:54:32 |
Calls: | 294 |
Files: | 5,623 |
Messages: | 226,901 |