Subj : Re: Rejecting an incoming connection To : Paul Hayton From : Wilfred van Velzen Date : Thu May 20 2021 10:29 am Hi Paul, On 2021-05-20 19:59:44, you wrote to All: PH> As some of you may know I run an othernet in Zone 21 and have a /999 PH> test AKA that nodes who which to test their polling setup to my HUB PH> can use when first setting up and before they apply and get their own PH> node number. PH> The problem I have at present is that someone has set up their BBS and PH> is polling the HUB every 2 minutes using the test AKA. This is way too PH> frequent, has been going on for weeks, and despite a netmail to that PH> test system asking for the sysop to contact me to arrange their own PH> node number, there's been no reply and no let up in polling frequency. PH> I'm looking for a way for BinkD to reject the incoming connection PH> based on something like SYS or ZYZ info presented. Is such a thing PH> possible using a perl script or similar? PH> Note I am not a perl guru so any suggested fix you have I'd appreciate PH> a bit of hand holding to implement it. PH> Also of note, setting such a block up is not my preferred choice but I PH> have exhausted options to contact the unknown sysop and want to ensure PH> the test AKA is available for others to send/recieve packets from PH> also... with a polling frequency of 2 mins the offending system gives PH> no one else a look in. Why not just block his IP (range) in your firewall? That would be the easy sollution... Bye, Wilfred. --- FMail-lnx64 2.1.0.18-B20170815 * Origin: FMail development HQ (2:280/464) .