Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    BBBS.ENGLISH    |    The International BBBS Support Echo    |    2,762 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,321 of 2,762    |
|    mark lewis to Jeff Smith    |
|    All nodes busy?    |
|    16 Feb 20 15:05:18    |
      TZUTC: -0500       MSGID: 272.fido-bbbsengl@1:3634/12 22aed78e       REPLY: 1:282/1031.0 66cd3fa3       PID: Synchronet 3.17c-Linux Feb 14 2020 GCC 7.4.0       TID: SBBSecho 3.10-Linux r3.151 Feb 14 2020 GCC 7.4.0       CHRS: ASCII 1       NOTE: FSEditor.js v1.103        Re: All nodes busy?        By: Jeff Smith to All/kim Heino on Sun Feb 16 2020 02:03:06                      JS> I currently have the 22 node version of BBBS Toy-4. Since upgrading        JS> to the current version I have noticed that I frequently (At least        JS> once a day) run out of available nodes. I don't recall noticing        JS> this issue with previous versions of BBBS. I use iptables to help        JS> manage port access. Recently I have reconfigured bbbsd to run        JS> using all non-standard ports to see if that would affect my bust        JS> port issue. It didn't seem to make a difference. Is there        JS> something I am missing? Has anyone else had a problem with busy        JS> nodes with BBBS?              there is a new wave of bots attempting to recruit buggy routers into their       botnet(s)... just ask my IDS/IPS* about it ;)              but seriously, can you shorten your timeout on login for inactivity? if they       don't know what to do, they will sit at the login prompt until they or you       time out... the faster you can time them out, the faster you can get your       nodes freed back up for real users...              another thing you might be able to do is to drop/block IPs that connect more       than X times in Y seconds... some BBSes have this capability and i use it in       my IDS/IPS as well... for example, this rule from my IDS/IPS detects 5 TCP       SYNs within 60 seconds and raises an alert which triggers a block of the       connecting IP...              alert tcp $EXTERNAL_NET any -> $HOME_NET 23 (msg:"Rapid TELNET \        Inbound - Possible Brute Force Attack"; flags: S; \        detection_filter: track by_src, count 5, seconds 60; \        classtype:unsuccesful-user; sid:100000020; rev:3;)              i highly recommend running an IDS/IPS package on one's perimeter firewall if       they can... it takes some time to tune it for one's network traffic but once       that is done, there's little to do other than sit back, watch the nefarious       trash on the outside beat on the door trying to get in, and laugh at them... i       should also note that our setup does not use any database logging/monitoring       techniques with our IDS/IPS... doing this does allow for deeper analysis of       alerted network traffic but in our case, we haven't seen a need for such in       our case...                     * https://en.wikipedia.org/wiki/Intrusion_detection_system                     )\/(ark       --- SBBSecho 3.10-Linux        * Origin: SouthEast Star Mail HUB - SESTAR (1:3634/12)       SEEN-BY: 1/120 123 14/6 18/0 90/1 103/705 116/116 123/0 25 50 150       SEEN-BY: 123/170 755 135/300 153/7715 154/10 30 40 700 203/0 221/0       SEEN-BY: 221/6 227/114 201 400 229/426 452 1014 240/5832 249/206 317       SEEN-BY: 261/38 280/464 5003 292/854 300/4 317/3 322/757 342/200 396/45       SEEN-BY: 423/120 712/848 770/1 2452/250 3634/0 12 15 27 50 119       PATH: 3634/12 154/10 280/464 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca