Ltning wrote to All <=-
So last night I opened the floodgates to my BBS, but soon after I
had to close down the access - my nodes kept being hammered by
drive-by network scans hitting port 23. Running on an old
386-class machine, this obviously wasn't healthy..
Other than moving the inbound port to something else than the
Telnet default (23), are there any other clever ways of dealing
with this? Some kind of proxy which can perform some initial
challenge, for example?
In short, I'd much rather have one extra step prior to login
(textmode captcha?) than move the service to a different port.
Suggestions welcome!
þ Synchronet þ bbs.anduin.net
Other than moving the inbound port to something else than the Telnet default (23), are there any other clever ways of dealing with this? Some kind of proxy which can perform some initial challenge, for example?
With haproxy in front, you could "slow down" the spammers (multiple connection
from the same address, repeated connections from the same address within a tim
period, etc) - but it wont stop them. (You dont need to stop them, they're har
ess really - but SBBS has additional measures it can enforce as well...)
What haproxy settings are you using to "slow down" telnet and ssh traffic?
Other than moving the inbound port to something else than theWell, there is this:
Telnet default (23), are there any other clever ways of dealing
with this? Some kind of proxy which can perform some initial
challenge, for example?
https://wiki.synchro.net/howto:block-hackers
This hostname doesn't even resolve, FYI...
RE: Avoiding Telnet spam
BY: Gamgee to Ltning on Mon Mar 11 2024 16:29:00
Other than moving the inbound port to something else than theWell, there is this:
Telnet default (23), are there any other clever ways of dealing
with this? Some kind of proxy which can perform some initial challenge, for example?
https://wiki.synchro.net/howto:block-hackers
This one isn't helpful to SBBS 2.x, since it all assumes SBBS is doing Telne itself. I'm thinking about some kind of TCP proxy that can output a simple m challenge or similar, and then pass the input and output to a new connection the actual BBS..
This hostname doesn't even resolve, FYI...
Yeah, I'm not quite ready to post in Advertisements yet - but you can connec to floppy.museum:2323 for now :)
Hola!
So last night I opened the floodgates to my BBS, but soon after I had to close
down the access - my nodes kept being hammered by drive-by network scans hitting port 23. Running on an old 386-class machine, this obviously wasn't healthy..
Other than moving the inbound port to something else than the Telnet default (23), are there any other clever ways of dealing with this? Some kind of proxy
which can perform some initial challenge, for example?
In short, I'd much rather have one extra step prior to login (textmode captcha?) than move the service to a different port.
Suggestions welcome!
Thanks,
- Ltning
---
� Synchronet � bbs.anduin.net
What haproxy settings are you using to "slow down" telnet and ssh traffic?
This is how my haproxy is configured (in a frontend definition block):
Alo!
I recommend fail2ban on linux.
I'll post the code snippet here or wherever it's appropriate, if anyone is interested - once I'm done with the details.
Re: Avoiding Telnet spam
By: Ltning to Ragnarok on Fri Mar 15 2024 07:33 pm
I'll post the code snippet here or wherever it's appropriate, if anyone i interested - once I'm done with the details.
This sounds nice. Definitely post, please.
Happy to provide more info, but I think I've added a fair amount of comments it should be enough to get you started.
Do you think there's a way of displaying a different message if the max_conn is reached? Like a "Busy, try again later" kind of thing?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 371 |
Nodes: | 16 (2 / 14) |
Uptime: | 174:39:29 |
Calls: | 7,915 |
Files: | 12,983 |
Messages: | 5,797,649 |