TIP: Click on subject to list as thread! ANSI
echo: linux_bbs
to: j b l
from: Joe Bruchis
date: 2017-06-12 09:59:30
subject: Unwanted connections to port 23.

j b l wrote in a message to mark lewis:

 jbl>  Re: Unwanted connections to port 23.
 jbl>  By: mark lewis to Ignatius on Mon Jun 12 2017 04:35 am


 ML> intrusion detection systems are the only things i've seen that
 ML> come close
 ML> but the connection and attempted login still has to take place... the
 ML> *ONLY* other option is to get off of port 23 and the other few
 ML> that MIRAI
 ML> specifically targets... that includes the default SSH port as well...

 jbl> I've just come across a utility, called "PSAD", it is a port
 jbl> scanning utility.. if the "danger level" meets a certain
 jbl> threshold, it will automatically block the offending IP address.
 jbl> Pretty cool. I'm still testing it out at the moment, but this may
 jbl> be what i've been looking for.

I have minimized these attempts with the following entries in sbbs.ini:

LoginAttemptDelay = 50000
LoginAttemptThrottle = 50000
LoginAttemptHackThreshold = 3
LoginAttemptBanThreshold = 3

Assume a bot attempts a login as Root. Root does not exist in the user
files. The 50000 value will pause the next login prompt 45 seconds before
another login name can be entered. This is usually enough time for the bot
to move on to its next victim. The downside is, if a real user accidentally
places a typo in their login name, they will have to wait 45 seconds before
they are prompted for their login name again. That can be remedied with a
warning screen prior to the login prompt, letting your users know that
because of automated hacking bots, failed login attempts will be paused 45
seconds before the next login attempt will be accepted.

It works well here.

Regards,

 Joe 
--- timEd/386 1.10+
* Origin: Fire on the Bayou BBS - bayouflames.ddns.net (1:3828/12)
SEEN-BY: 103/705 120/544 138/146 140/1 153/7715 154/10 201/0 203/0 210 221/0 1
SEEN-BY: 221/6 360 227/51 230/0 240/1661 5832 249/303 261/38 266/404 512
SEEN-BY: 275/100 280/464 5003 292/854 310/31 320/219 342/17 77 423/81 120
SEEN-BY: 633/267 280 712/848 770/1 2320/100 3634/12 3828/7 12 5020/715
@PATH: 3828/12 7 140/1 221/0 1 203/0 280/464 712/848 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.