Добро пожаловать, Гость. Пожалуйста авторизуйтесь здесь.
FGHIGate на GaNJa NeTWoRK ST@Ti0N - Просмотр сообщения в эхоконференции FTSC_PUBLIC
Введите FGHI ссылку:


Присутствуют сообщения из эхоконференции FTSC_PUBLIC с датами от 13 Sep 13 18:57:24 до 15 Nov 24 00:30:01, всего сообщений: 7128
Ответить на сообщение К списку сообщений Предыдущее сообщение Следующее сообщение
= Сообщение: 1297 из 7128 ====================================== FTSC_PUBLIC =
От   : Alexey Vissarionov               2:5020/545         09 Oct 14 05:20:00
Кому : Janis Kracht                                        09 Oct 14 05:20:00
Тема : FTSC-5001 question
FGHI : area://FTSC_PUBLIC?msgid=2:5020/545+5435e5e0
На   : area://FTSC_PUBLIC?msgid=1:261/38+79df89f7
= Кодировка сообщения определена как: CP866 ==================================
Ответ: area://FTSC_PUBLIC?msgid=1:261/38+78084e72
Ответ: area://FTSC_PUBLIC?msgid=1:261/38+9a84c05a
==============================================================================
Good ${greeting_time}, Janis!

09 Oct 2014 00:20:00, you wrote to me:

>>>>> Some mailers offer telnet as a method of transferring
>>>>> messages/files, kind of like binkp does.
>>>> ITN means "ifcico with Telnet-style connection control"
>>> Yes, BBBS provides a telnet mailer interface which operates as
>>> Nick and you mention. It is a mailer interface, not for users,
>> Does it really use Telnet-style connection control?
>> If yes, I'd like to see the full session recording (with `tcpdump`).
JK> Yes, it uses telnet connections via mailer:
JK> 75.117.66.119.23 > 72.43.242.234.52263: Flags [P.], cksum 0xf087
JK> (correct), seq 795:797, ack 441, win 33600
JK> 0x0000: 4500 0036 814b 0000 2c06 4475 4b75 4277
JK> 0x0010: 482b f2ea 0017 cc27 64f2 602d 8629 f872
JK> 0x0020: 8018 8340 f087 0000 0101 080a 0000 9fdf
JK> 0x0030: 10e6 29d9 4f4f

Here I see just a TCP header of a connection from 72.43.242.234:52263 to 75.117.66.119:23, but no transferred data (with or without Telnet-style connection control codes).

JK> I hope this clip is enough to see it..

TCP connection to the port 23 doesn't make it Telnet.
Any port may be used for any purpose... for example. I use port 443 for both binkp and ssh to circumvent stupid proxies configured by stupid people.

JK> I saved the whole connection session though if you want to see it all
JK> - there were a number of other connections via binkp with other nodes
JK> at the time.

`tcpdump -s 2048 -nlvvvX tcp and host 75.117.66.119` would record what you actually want to show.

JK> This is a pw protected session with 1:3634/12's telnet node.

Could you perform unprotected empty session?

JK> I don't usually use this tool so at the moment the results mean
JK> nothing to me <g>

I do use it. And the results will tell me everything :-)


--
Alexey V. Vissarionov aka Gremlin from Kremlin
gremlin.ru!gremlin; +vii-cmiii-ccxxix-lxxix-xlii

... :wq!
--- /bin/vi
* Origin: http://openwall.com/Owl (2:5020/545)

К главной странице гейта
Powered by NoSFeRaTU`s FGHIGate
Открытие страницы: 0.063830 секунды