Добро пожаловать, Гость. Пожалуйста авторизуйтесь здесь.
FGHIGate на GaNJa NeTWoRK ST@Ti0N - Просмотр сообщения в эхоконференции FTSC_PUBLIC
Введите FGHI ссылку:


Присутствуют сообщения из эхоконференции FTSC_PUBLIC с датами от 13 Sep 13 18:57:24 до 15 Nov 24 00:30:01, всего сообщений: 7128
Ответить на сообщение К списку сообщений Предыдущее сообщение Следующее сообщение
= Сообщение: 1299 из 7128 ====================================== FTSC_PUBLIC =
От   : Janis Kracht                     1:261/38           09 Oct 14 11:21:54
Кому : Alexey Vissarionov                                  09 Oct 14 11:21:54
Тема : FTSC-5001 question
FGHI : area://FTSC_PUBLIC?msgid=1:261/38+78084e72
На   : area://FTSC_PUBLIC?msgid=2:5020/545+5435e5e0
= Кодировка сообщения определена как: CP866 ==================================
Ответ: area://FTSC_PUBLIC?msgid=1:3634/12.71+436cee51
==============================================================================
Hi Alexey,

>>>> Yes, BBBS provides a telnet mailer interface which operates as
>>>> Nick and you mention. It is a mailer interface, not for users,
>>> Does it really use Telnet-style connection control?
>>> If yes, I'd like to see the full session recording (with `tcpdump`).
>> Yes, it uses telnet connections via mailer:
>> 75.117.66.119.23 > 72.43.242.234.52263: Flags [P.], cksum 0xf087
>> (correct), seq 795:797, ack 441, win 33600
[...]

> Here I see just a TCP header of a connection from 72.43.242.234:52263 to
> 75.117.66.119:23, but no transferred data (with or without Telnet-style
> connection control codes).

>> I hope this clip is enough to see it..

> TCP connection to the port 23 doesn't make it Telnet.
> Any port may be used for any purpose... for example. I use port 443 for both
> binkp and ssh to circumvent stupid proxies configured by stupid people.

Geez, Alexey, why would anyone try to "fool" someone with this?  My log itself shows TELNET.  I'd bet Mark's does as well.

141009 10:56 CONNECT 38400/TELNET
141009 10:56 EMSI mail session
141009 10:56 Waldo's Place USA - Node 11, 1:3634/12.0
141009 10:56   AKA: 1:3634/0.0
141009 10:56   AKA: 1:3634/1.0
141009 10:56   AKA: 1:3634/12.1
141009 10:56   AKA: 1:3634/1000.0
141009 10:56   AKA: 1:3634/3000.0
141009 10:56   AKA: 1:1/120.0
141009 10:56   AKA: 1:18/1.0
141009 10:56   AKA: 2547:2547/0.0
141009 10:56   AKA: 2547:1000/0.0
141009 10:56   AKA: 2547:1000/12.0
141009 10:56 SysOp: waldo kitty
141009 10:56  From: RemoteAccess Support, NC USA
141009 10:56 Using: FrontDoor 2.33.mL.b2/AE000066
141009 10:56 Flags: CM,XA,V32B,V42B,V34,ITN,IVM
141009 10:56 Phone: bbs.wpusa.dynip.com
141009 10:56 Speed: 57600
141009 10:56 Password protected mail session
141009 10:56 Sent: /home/bbbs/outbound/8a305508.pkt (Zmodem, 1kB, 1753cps)
141009 10:56 Mail session completed

>> I saved the whole connection session though if you want to see it all
>> - there were a number of other connections via binkp with other nodes
>> at the time.

> `tcpdump -s 2048 -nlvvvX tcp and host 75.117.66.119` would record what you
> actually want to show.

Well not with that IP.. <g>.  I can get a good session with this command:

#  tcpdump -s 2048 -nlvvvX tcp and host 71.30.81.243

That's Mark's IP there, not what you posted.

>> This is a pw protected session with 1:3634/12's telnet node.

> Could you perform unprotected empty session?

I will try, but I wonder if FD will even let us connect on Mark's side since he has a PW for my system?

>> I don't usually use this tool so at the moment the results mean
>> nothing to me <g>

> I do use it. And the results will tell me everything :-)

I'll try it but like I said...

Take care,
Janis

--- BBBS/Li6 v4.10 Dada-1
* Origin: Prism bbs (1:261/38)

К главной странице гейта
Powered by NoSFeRaTU`s FGHIGate
Открытие страницы: 0.072047 секунды