Subj : Rejecting an incoming connection To : All From : Paul Hayton Date : Thu May 20 2021 07:59 pm Hi guys As some of you may know I run an othernet in Zone 21 and have a /999 test AKA that nodes who which to test their polling setup to my HUB can use when first setting up and before they apply and get their own node number. The problem I have at present is that someone has set up their BBS and is polling the HUB every 2 minutes using the test AKA. This is way too frequent, has been going on for weeks, and despite a netmail to that test system asking for the sysop to contact me to arrange their own node number, there's been no reply and no let up in polling frequency. I'm looking for a way for BinkD to reject the incoming connection based on something like SYS or ZYZ info presented. Is such a thing possible using a perl script or similar? Note I am not a perl guru so any suggested fix you have I'd appreciate a bit of hand holding to implement it. Also of note, setting such a block up is not my preferred choice but I have exhausted options to contact the unknown sysop and want to ensure the test AKA is available for others to send/recieve packets from also... with a polling frequency of 2 mins the offending system gives no one else a look in. Thanks for your thoughts / guidance. Best, Paul --- Mystic BBS v1.12 A46 2020/08/26 (Windows/32) * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (3:770/100) .