TIP: Click on subject to list as thread! ANSI
echo: bbs_carnival
to: Marc Lewis
from: Matt Bedynek
date: 2015-07-05 01:21:34
subject: BBS Documentary 1/2

Hello Marc!

04 Jul 15 22:55, Marc Lewis wrote to Matt Bedynek:

 ML> This system takes many hundreds of "hits" per day on port
23. Bombing 
 ML> runs trying to get to "root" access... Dead ended by OS/2
and VModem 
 ML> that answers port 23.  I look at the bombers and sometimes end up 
 ML> putting an entire /24 or /16 into the firewall config, depending on 
 ML> where they're coming from. The config on the BBS machine itself is 
 ML> now over 300 rules long.  It's astounding to watch some moron hitting 
 ML> the port over and over and over and over trying to break into the 
 ML> system... And then jumping to a different IP and starting the same 
 ML> nonsense all over again.  Idiots.  ;-\  Very annoying but ultimately 
 ML> harmless because of the system itself.  

One will always see such behavior when running popular services on standard
ports (i.e. 21(ftp), 22(ssh), 23(telnet), and ect).  The best way to avoid
it is to change your port (i.e. 2222, 2323) because those running search
mechanisms typically confine their searches to ports less than 1024
(priviledged ports).  This reduces scan overhead when they are scanning
tens of thousands of addresses.   Most such attaches are not directed and
are only looking for low hanging fruit.  Systems running easily exploitable
services with weak passwords.   I suspect when they encounter a bbs they
have the slightest idea what to do.   When I ran my SSH service on port 22
I would see the step further (tens of thousands of login attempts per day).
 Most were directed at the root user which was disabled.  Once I changed
the port these dropped to near zero.

IPv6 will actually solve much of this even if services remain listening on
their default ports.  IPv6 address space is so large that it takes
considerable time to conduct a simple uphost scan.

 ML> Same stupidity with the POP3 server on a different machine (also 
 ML> OS/2) with thousands of user name and password attempts.  What they 
 ML> don't realise is the way it's set up, even if they could somehow 
 ML> guess a user name and come up with that user's password, they'd still 
 ML> be "up the creek without a paddle in a sinking canoe." 
Not too many 
 ML> e-mail clients can negotiate APOP, so let'm try and crack the 20 
 ML> some-odd character random character passwords plus the salt.
 ML> It's amazing to look at the log file.

It is like fishing.  Cast a line in the water and eventually you get a
bite.  For these dictionaries are used to crack passwords.  The only
guessing is in the username.  Believe it or not these work quite well when
the work is distributed among hundreds of compromised zombie hosts.   If
you can change your pop server port it is recommended to close that hole
entirely.

Regards,

Matt

---
* Origin: The Byte Museum - ftn.bytemuseum.org (IPV6 capable) (1:19/10)
SEEN-BY: 18/200 19/33 34/999 90/1 116/18 120/331 123/500 128/187 135/364 140/1
SEEN-BY: 218/700 222/2 226/0 160 230/150 240/1120 249/303 261/38 100 266/404
SEEN-BY: 267/155 280/1027 282/1031 1056 292/907 908 320/119 340/400 393/68
SEEN-BY: 396/45 633/267 280 640/384 712/620 848 770/1 801/161 2320/105 303
@PATH: 19/10 396/45 261/38 712/848 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.