>>>> Yes, BBBS provides a telnet mailer interface which operates as >>>> Nick and you mention. It is a mailer interface, not for users, >>> Does it really use Telnet-style connection control? >>> If yes, I'd like to see the full session recording (with `tcpdump`). >> Yes, it uses telnet connections via mailer: >> 75.117.66.119.23 > 72.43.242.234.52263: Flags [P.], cksum 0xf087 >> (correct), seq 795:797, ack 441, win 33600 [...]
> Here I see just a TCP header of a connection from 72.43.242.234:52263 to > 75.117.66.119:23, but no transferred data (with or without Telnet-style > connection control codes).
>> I hope this clip is enough to see it..
> TCP connection to the port 23 doesn't make it Telnet. > Any port may be used for any purpose... for example. I use port 443 for both > binkp and ssh to circumvent stupid proxies configured by stupid people.
Geez, Alexey, why would anyone try to "fool" someone with this? My log itself shows TELNET. I'd bet Mark's does as well.
>> I saved the whole connection session though if you want to see it all >> - there were a number of other connections via binkp with other nodes >> at the time.
> `tcpdump -s 2048 -nlvvvX tcp and host 75.117.66.119` would record what you > actually want to show.
Well not with that IP.. <g>. I can get a good session with this command:
# tcpdump -s 2048 -nlvvvX tcp and host 71.30.81.243
That's Mark's IP there, not what you posted.
>> This is a pw protected session with 1:3634/12's telnet node.
> Could you perform unprotected empty session?
I will try, but I wonder if FD will even let us connect on Mark's side since he has a PW for my system?
>> I don't usually use this tool so at the moment the results mean >> nothing to me <g>
> I do use it. And the results will tell me everything :-)