TIP: Click on subject to list as thread! ANSI
echo: mystic
to: Bradley D. Thornton
from: Todd Yatzook
date: 2019-09-05 10:55:56
subject: Re: Has anyone received one of these?

On 05 Sep 2019, Bradley D. Thornton said the following...
 
 BD> It was kind of a shocker. I've had customers who were bad actors before
 BD> and had to whack their services and accounts, but I've never gotten
 BD> something that pretty much insists that I close an open port on one of
 BD> my machines.

I'd suggest that they review what a BBS is, and point them to various sites
of BBS-related material on the internet, showing that while telnet is
*techincally* a way for people to acquire passwords and such, it's a medium
that also relies on closed systems and "security through obscurity".

In all the years that telnet has been available for BBSes, I have yet to hear
about anyone's system being compromised in any fashion. The only way I could
see it happening is if someone were to get the account of a sysop, drop to
DOS (if it's even available on that particular BBS), and *maybe* install some
malware. Which wouldn't even make sense. People looking to exploit systems
are trying to do it on a wide scale, and the effort needed to just gain
access to one computer running a BBS wouldn't be worth it.

Just sounds like you got caught up in a sweep that checks for open port
vulnerabilites, with an automated response. I'd still follow up on a
response, though.

--- Mystic BBS v1.12 A43 2019/03/02 (Linux/64)
* Origin: http://www.throwbackbbs.com -\- meriden, ct -\- (1:142/799)
SEEN-BY: 1/19 16/0 120/544 123/130 131 142/799 203/0 221/0 1 6 242 360 229/426
SEEN-BY: 230/0 240/5832 261/38 280/464 5003 292/854 320/119 219 322/0 633/0
SEEN-BY: 633/267 280 281 410 412 509 640/1321 1384 712/848
@PATH: 142/799 320/219 221/1 640/1384 633/280 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.