OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

DB0FHN

[JN59NK Nuernberg]

 Login: GUEST





  
VK5ASF > BAYBOX   01.10.07 05:04l 43 Lines 1489 Bytes #999 (0) @ WW
BID : 52222_VK5ASF
Read: GUEST DF3VI DL8BO DB3RH DG4IAD
Subj: RE: TU5EX BBS QRT
Path: DB0FHN<DB0RGB<DB0SL<DB0FSG<DB0MRW<DK0WUE<7M3TJZ<F6KMO<F4BWT<F5KCK<
      F6BVP<VK2TV<VK5ZAR<VK5SPG<VK5BBS<VK5ASF<VK5ASF
Sent: 070930/0133Z @:VK5ASF.#ADL.#SA.AUS.OC LNXFORWARD $:52222_VK5ASF

Didier wrote: 

>I am very sad to announce, that, resulting an Hacker's war in my server, and
>after 15 years running in Packet, PACTOR and TCPIP (Xnet) network, the BBS
>TU5EX and all ham services (APRS, Node, DxCluster, etc...) is now definitvly
>closed.
>
>I will be closed tomorrow my fixed IP (217.128.196.84) with my provider, caus
e
>a big DOS attaqu. (150 stations simultanously connect to my IP ???)
>
It is very sad to see this Didier, as we need all the active systems we
can get.

However, I note your list looks like:

Unknown	0	192.168.1.15	2053	65.55.251.22	25	TIME_WAIT		
Unknown	0	192.168.1.15	2044	193.17.41.44	25	TIME_WAIT		
Unknown	0	192.168.1.15	2028	63.193.154.130	25	TIME_WAIT	
Unknown	0	192.168.1.15	2959	65.55.251.22	25	TIME_WAIT	
Unknown	0	192.168.1.15	2950	222.231.35.24	25	TIME_WAIT		
Unknown	0	192.168.1.15	2947	62.209.45.169	25	TIME_WAIT		
Unknown	0	192.168.1.15	2938	213.199.154.22	25	TIME_WAIT	

(etc)

Since all of these are to port 25, and you dont list SMTP as a service
you provide, why not just firewall or tune off your mail service? The 
problem will then go away.

Even if you do need to run mail, it may be possible to configure it with a
maximum number of permitted connections, implement grey listing etc. All these
 
can counter the problem.

I suspect that some spammer is trying to use your system as a relay, rather
than a true Denial of Service attack.

Dont let the bad guys win!

Steve
Message generated by LNXFORWARD VER 1.30 Web system


Read previous mail | Read next mail


 26.05.2025 02:46:09lGo back Go up