TIP: Click on subject to list as thread! ANSI
echo: ftsc_public
to: JANIS KRACHT
from: ALEXEY VISSARIONOV
date: 2014-10-09 05:16:00
subject: FTSC-5001 question

Good ${greeting_time}, Janis!

09 Oct 2014 00:20:00, you wrote to me:

 >>>>> Some mailers offer telnet as a method of transferring
 >>>>> messages/files, kind of like binkp does.
 >>>> ITN means "ifcico with Telnet-style connection control"
 >>> Yes, BBBS provides a telnet mailer interface which operates as
 >>> Nick and you mention. It is a mailer interface, not for users,
 >> Does it really use Telnet-style connection control?
 >> If yes, I'd like to see the full session recording (with `tcpdump`).
 JK> Yes, it uses telnet connections via mailer:
 JK> 75.117.66.119.23 > 72.43.242.234.52263: Flags [P.], cksum 0xf087
 JK> (correct), seq 795:797, ack 441, win 33600
 JK> 0x0000: 4500 0036 814b 0000 2c06 4475 4b75 4277
 JK> 0x0010: 482b f2ea 0017 cc27 64f2 602d 8629 f872
 JK> 0x0020: 8018 8340 f087 0000 0101 080a 0000 9fdf
 JK> 0x0030: 10e6 29d9 4f4f

Here I see just a TCP header of a connection from 72.43.242.234:52263 to
75.117.66.119:23, but no transferred data (with or without Telnet-style
connection control codes).

 JK> I hope this clip is enough to see it..

TCP connection to the port 23 doesn't make it Telnet.
Any port may be used for any purpose... for example. I use port 443 for both
binkp and ssh to circumvent stupid proxies configured by stupid people.

 JK> I saved the whole connection session though if you want to see it all
 JK> - there were a number of other connections via binkp with other nodes
 JK> at the time.

`tcpdump -s 2048 -nlvvvX tcp and host 75.117.66.119` would record what you
actually want to show.

 JK> This is a pw protected session with 1:3634/12's telnet node.

Could you perform unprotected empty session?

 JK> I don't usually use this tool so at the moment the results mean
 JK> nothing to me 

I do use it. And the results will tell me everything :-)


--
Alexey V. Vissarionov aka Gremlin from Kremlin
gremlin.ru!gremlin; +vii-cmiii-ccxxix-lxxix-xlii

... :wq!
--- /bin/vi
* Origin: http://openwall.com/Owl (2:5020/545)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.