TIP: Click on subject to list as thread! ANSI
echo: mystic
to: Todd Yatzook
from: Bradley D. Thornton
date: 2019-09-05 13:18:22
subject: Re: Has anyone received one of these?

Re: Re: Has anyone received one of these?
  By: Todd Yatzook to Bradley D. Thornton on Thu Sep 05 2019 10:55 am

 >
 >  BD> It was kind of a shocker. I've had customers who were bad
actors before and had to whack their services and accounts, but I've never
gotten
 >  BD> something that pretty much insists that I close an open port on one of
 >  BD> my machines.
 >
 > I'd suggest that they review what a BBS is, and point them to various sites
 > of BBS-related material on the internet, showing that while telnet is
*techincally* a way for people to acquire passwords and such, it's a medium
that
 > also relies on closed systems and "security through obscurity".
 >

That's kind of what I was thinking. I mean, it would be unreasonable to
actually demand that someone close this port just because of an assumption
that it's running Telnet, because it may not be, and further, it's actually
in /etc/services, assigned by IANA as a valid, allocated port for
legitimate services.

 > access to one computer running a BBS wouldn't be worth it.
 >

Yes, a BBS is some seriously low hanging fruit that has a net worth of zero
for the aggregation of a botnet lol.

 > Just sounds like you got caught up in a sweep that checks for open
port vulnerabilites, with an automated response. I'd still follow up on a
 > response, though.

I read it over about three times, looking for an actual threat, and didn't
see one, so perhaps an explantion, as you suggest, will make their emails
stop. On the other hand, If push comes to shove, I'll need to consider
moving to another port - which makes little sense to me, considering that
it isn't the port on any given system that is vulnerable, but rather, the
particular service itself.
--- SBBSecho 3.09-Linux
* Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)
SEEN-BY: 103/705 154/10 203/0 218/700 221/0 1 6 242 360 229/101 426 230/0
SEEN-BY: 240/5832 280/464 5003 292/854 320/219 396/45 633/0 267 280 281 410
SEEN-BY: 633/412 509 640/1321 1384 712/848 2452/250
@PATH: 103/705 280/464 221/1 640/1384 633/280 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.