AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to BBS Support/Help/Discussion <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
Sean Dennis | All | BBS Security |
September 18, 2017 11:54 AM * |
|||
Hello All, I've decided on a different way of stoping problems in their tracks concerning script kiddies. I'm going to DMZ my server off of my parents' router and use ufw to manipulate iptables. I've configured fail2ban to monitor SSH, telnet, and ProFTPd. I'm using "built-in" filters for SSH and ProFTPd. I wrote my own for telnet. I'll give it a few days and we'll see what happens since the BBS is still covered by my parents' router's firewall. If fail2ban works as it should, I'll install ufw, get that set up, then DMZ the BBS. It'd be a lot easier than having to set up a separate pfSense box at this time. In case anyone's wondering, here's the telnet filter I wrote (this is Slackware-specific): [INCLUDES] before = paths-slackware.conf [Definition] failregex = in.*:\s+connect from\s+<HOST> Short but sweet. Later, Sean --- GoldED+/LNX 1.1.5-b20170303 * Origin: Outpost BBS * Limestone, TN, USA (618:618/1) |
||||||
|
Previous Message | Next Message | Back to BBS Support/Help/Discussion <-- <--- | Return to Home Page |
Execution Time: 0.0173 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |