Subj : Re: Rejecting an incoming connection
To   : Paul Hayton
From : Wilfred van Velzen
Date : Thu May 20 2021 10:29 am

Hi Paul,

On 2021-05-20 19:59:44, you wrote to All:

PH> As some of you may know I run an othernet in Zone 21 and have a /999
PH> test AKA that nodes who which to test their polling setup to my HUB
PH> can use when first setting up and before they apply and get their own
PH> node number.

PH> The problem I have at present is that someone has set up their BBS and
PH> is polling the HUB every 2 minutes using the test AKA. This is way too
PH> frequent, has been going on for weeks, and despite a netmail to that
PH> test system asking for the sysop to contact me to arrange their own
PH> node number, there's been no reply and no let up in polling frequency.

PH> I'm looking for a way for BinkD to reject the incoming connection
PH> based on something like SYS or ZYZ info presented. Is such a thing
PH> possible using a perl script or similar?

PH> Note I am not a perl guru so any suggested fix you have I'd appreciate
PH> a bit of hand holding to implement it.

PH> Also of note, setting such a block up is not my preferred choice but I
PH> have exhausted options to contact the unknown sysop and want to ensure
PH> the test AKA is available for others to send/recieve packets from
PH> also...  with a polling frequency of 2 mins the offending system gives
PH> no one else a look in.

Why not just block his IP (range) in your firewall? That would be the easy sollution...


Bye, Wilfred.

--- FMail-lnx64 2.1.0.18-B20170815
* Origin: FMail development HQ (2:280/464)