TIP: Click on subject to list as thread! ANSI
echo: binkd
to: All
from: Paul Hayton
date: 2021-05-20 19:59:00
subject: Rejecting an incoming con

Hi guys

As some of you may know I run an othernet in Zone 21 and have a /999 test AKA
that nodes who which to test their polling setup to my HUB can use when first
setting up and before they apply and get their own node number.

The problem I have at present is that someone has set up their BBS and is
polling the HUB every 2 minutes using the test AKA. This is way too frequent,
has been going on for weeks, and despite a netmail to that test system asking
for the sysop to contact me to arrange their own node number, there's been no
reply and no let up in polling frequency.

I'm looking for a way for BinkD to reject the incoming connection based on
something like SYS or ZYZ info presented. Is such a thing possible using a
perl script or similar? 

Note I am not a perl guru so any suggested fix you have I'd appreciate a bit
of hand holding to implement it.

Also of note, setting such a block up is not my preferred choice but I have
exhausted options to contact the unknown sysop and want to ensure the test
AKA is available for others to send/recieve packets from also...  with a
polling frequency of 2 mins the offending system gives no one else a look in.

Thanks for your thoughts / guidance.

Best, Paul

--- Mystic BBS v1.12 A46 2020/08/26 (Windows/32)
                                                                 
* Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (3:770/100)

SOURCE: echomail via QWK@pharcyde.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.