You can do it now, without any scripting too.
(DD) Exec Door "echo %4 >><path to whitelist>"
You can do it now, without any scripting too.
(DD) Exec Door "echo %4 >><path to whitelist>"
Oh shit, I'm totally gonna package this up as a mod with a proper file_id.diz and release it :P
Would it be possible, upon sysop login, to trigger some sort of dialog
to add the detected IP to the IP whitelist?
This would avoid me accidentally locking myself out when traveling. :)
Here is what I am thinking at the moment: A login settings option that
is "Auto Whitelist: Yes/Per User" and if its set to Yes it will
whitelist everyone that logs in, if its set to Per User it will only whitelist if the user flag is set.
Here is what I am thinking at the moment: A login settings option tha is "Auto Whitelist: Yes/Per User" and if its set to Yes it will whitelist everyone that logs in, if its set to Per User it will only whitelist if the user flag is set.
What would remove the whitelist entries? If one is in the habit of traveling a lot eventually your whitelist is going to get pretty long. Maybe you could track the IP that was last used, and if it is different unwhitelist the previous entry and whitelist the new?
But it also means that the IP would be removed when maybe its an IP you wanted to keep in there, like your home IP would be removed because that was your last login prior to your travel. Or your work IP is removed because it was your last login location. I am trying to think of any downsides to doing it this way.
I honestly don't really use the whitelist much I have only had 1 user get blocked and it was because they were using SSH directly and didn't know
On 02-18-20 04:58, ryan wrote to g00r00 <=-
Hey g00r00,
Would it be possible, upon sysop login, to trigger some sort of dialog
to add the detected IP to the IP whitelist?
This would avoid me accidentally locking myself out when traveling. :)
On 02-18-20 07:30, roovis wrote to ryan <=-
You can do it now, without any scripting too.
(DD) Exec Door "echo %4 >><path to whitelist>"
If you want the Yes/No prompt, just add that in above it and put it
your logon menu script. Be sure to set acs to s255 so no one else gets
the question, or if you're generous, let all your users
self-whitelist... ;)
Hows that sound? Or do you have other ideas of how it should be done?
whitelist.txt is a godsend.
I simply login over ZeroTier. Gives me a static IP, better security and NAT timeouts don't nuke my SSH session unexpectedly. :)
whitelist.txt is a godsend.
What about auto-whitelisting IPs associated with FTN connections?
What about auto-whitelisting IPs associated with FTN connections?
What about auto-whitelisting IPs associated with FTN connections?
That is a great idea. If an IP successfully authenticates via binkp it would be whitelisted.
I'd tweak that just a bit by setting up a whitelist lease. The whitelist is good for 30 days after a successful authentication. If you don't connect for 30 days, the whitelist goes. This would autoclean the whitelist in case of dynamic IP addresses.
I'd tweak that just a bit by setting up a whitelist lease. The whitelist is good for 30 days after a successful authentication. If you don't connect for 30 days, the whitelist goes. This would autoclean the whitelist in case of dynamic IP addresses.
On 02-18-20 22:28, ryan wrote to Vk3jed <=-
I simply login over ZeroTier. Gives me a static IP, better security and NAT timeouts don't nuke my SSH session unexpectedly. :)
I can't have zerotier on my work laptop which is what I take when traveling :)
On 02-19-20 11:37, StackFault wrote to Netsurge <=-
What about auto-whitelisting IPs associated with FTN connections?
That is a great idea. If an IP successfully authenticates via binkp it would be whitelisted.
I'd tweak that just a bit by setting up a whitelist lease. The
whitelist is good for 30 days after a successful authentication. If you don't connect for 30 days, the whitelist goes. This would autoclean the whitelist in case of dynamic IP addresses.
On 02-19-20 11:05, roovis wrote to StackFault <=-
I'd tweak that just a bit by setting up a whitelist lease. The whitelist is good for 30 days after a successful authentication. If you don't connect for 30 days, the whitelist goes. This would autoclean the whitelist in case of dynamic IP addresses.
I was thinking of something similar for auto-banned ip addresses. Let
them decay and increase in length of permanence as repeat violations accrue.
To be honest it's not something I'll likely use much for the BBS but to
be able to manually put in connections who have static IP addressees
into a Mystic system running as a HUB is something I do a lot of. It
helps the node a lot and saves a few lockouts.
To be honest it's not something I'll likely use much for the BBS but be able to manually put in connections who have static IP addressees into a Mystic system running as a HUB is something I do a lot of. It helps the node a lot and saves a few lockouts.
It doesn't work for the BINKP but I certainly can expand it to do so!
I'll make a note of it.
is good for 30 days after a successful authentication. If you don't connect for 30 days, the whitelist goes. This would autoclean the whitelist in case of dynamic IP addresses.
2020.20.02 20:33:30 MYSTIC 001 Cannot write to c:\bbs\mystic\data\chat1.dat. Code=2, PID=118280
I'd tweak that just a bit by setting up a whitelist lease. The whitel is good for 30 days after a successful authentication. If you don't connect for 30 days, the whitelist goes. This would autoclean the whitelist in case of dynamic IP addresses.
It would but it would also remove IP addresses that you actually want to manually whitelist too. I am not sure that would even really be a
problem though if you're using automatic whitelist but if you're not it certainly would.
It would also require me to change the format of the whitelist out of a single line text file to something that you couldn't manage easily
because it'd have to be associated with (probably) a Unix time stamp value.
Sysop: | Eric Oulashin |
---|---|
Location: | Beaverton, Oregon, USA |
Users: | 96 |
Nodes: | 16 (0 / 16) |
Uptime: | 02:37:56 |
Calls: | 4,608 |
Calls today: | 2 |
Files: | 8,491 |
Messages: | 349,600 |