Hello Avon,
I have 153/757 and 21:4/106 listening over TLS for binkps. :)
I have successfully polled 153/757 from 153/757.2, I haven't yet managed
a successfull outbound poll but I have more nodes to test against so I think I'll just move on to some of that and get back to 153/757.2
All the node and nodelist details are the same, just the port is 24553. See Oli's post to me earlier today in the BINKD area to see how he's
done it.
All the node and nodelist details are the same, just the port
is 24553. See Oli's post to me earlier today in the BINKD area
to see how he's done it.
Can you forward that here so we have a record.
I'm debating on what to put my focus on next playing with all of
this, of which I am very interested in getting working... or doing
some work on NET 2 to move it along from it's current setup..
You're running a Linux system right? Might I need to move to that
OS first before I can really play with all of this?
All the node and nodelist details are the same, just the port is
24553. See Oli's post to me earlier today in the BINKD area to
see how he's done it.
Can you forward that here so we have a record.
I posted several messages with different options how to do it (in
fidonet and fsxnet). If you have some specific questions, I'm
happy to help.
I saw some posts by you and others but I got lost in the ports,
stunnels and proxy's.
Can you give me an example to..
A. Have binkd listen on port 24553 for binkps/TLS?
B. Poll a binkps node listening for binkps/TLS polls?
I have 153/757 and 21:4/106 listening over TLS for binkps. :)
nginx.conf:
The Mystic BBS can be configured to listen on multiple ports with the BINKP server. That means what could be done is to setup several BINKP server listening on localhost. E.g. 24554, 24555, 24556, 24557, 24558. Then You can have 5 concurrent connections from the proxy server. The nginx can load-balance and this is how it could be done:
That's about it. Correct me if I'm wrong.
than one node concurrently. The ip address is not forwarded through the proxy and You basically connect from localhost. That means when You
The Mystic BBS can be configured to listen on multiple ports with
the BINKP server. That means what could be done is to setup several
BINKP server listening on localhost. E.g. 24554, 24555, 24556,
24557, 24558. Then You can have 5 concurrent connections from the
proxy server. The nginx can load-balance and this is how it could
be done:
In my case I am using binkd. nginx is listening on port 24553 and if the tls handshake is successful it passes the connection to my running binkd
on the standard port.
That's not what I would call the right way to do it.
disadvantages). I'm doing this with https and xmpps asThat's not what I would call the right way to do it.It's also not the wrong way to do it and it has some advantages (and a few
well, even if the servers support TLS by themselves.
Hello Al,
nginx.conf:
From that setup where You use nginx for the stream proxy of ssl binkps I would have a small comment. That's the trouble when You connect with more than one node concurrently. The ip address is not forwarded through the proxy and You basically connect from localhost. That means when You
connect with more than one node You got the Duplicate I.P. message. I'm uncertain if this cannot be configured otherwise. But there a solution on how to connect with more than one node at once.
The Mystic BBS can be configured to listen on multiple ports with the
BINKP server. That means what could be done is to setup several BINKP server listening on localhost. E.g. 24554, 24555, 24556, 24557, 24558.
Then You can have 5 concurrent connections from the proxy server. The
nginx can load-balance and this is how it could be done:
TLS support in binkd would be nice, but for incoming connections I would still use nginx or haproxy for TLS termination.
--- ENiGMA 1/2 v0.0.11-beta (linux; x64; 12.13.1)NuSkooler
Xibalba BBS @ xibalba.l33t.codes / 44510(telnet) 44511(ssh)
ENiGMA 1/2 BBS WHQ | Phenom | 67 | iMPURE | ACiDic
On Saturday, April 11th Oli muttered...
TLS support in binkd would be nice, but for incoming connections I
would still use nginx or haproxy for TLS termination.
+1 for TLS termination. nginx/HAProxy/Caddy/etc. are all heavily peer reviewed in terms of security. Various BBS packages are not. I had to enable some older cipher suites and lessen security just to allow some paritcular BBS terminals to connect to my b
..just kind of jumping in
here. What did the "binkps" proto end up looking like? Just bink proxied over TLS?
I'd like to get this set up (I'll be TLS terminating with Caddy
personally)
What did the "binkps" proto end up looking like? Just bink
proxied over TLS? I'd like to get this set up (I'll be TLS terminating with Caddy personally)
Can you put localhost in a whitelist of some sort?
here. What did the "binkps" proto end up looking like? Just bink proxied over TLS? I'd like to get this set up (I'll be TLS terminating with Caddy personally)
Sysop: | digital man |
---|---|
Location: | Riverside County, California |
Users: | 1,043 |
Nodes: | 16 (0 / 16) |
Uptime: | 92:02:41 |
Calls: | 500,956 |
Calls today: | 5 |
Files: | 109,377 |
D/L today: |
1,380 files (255M bytes) |
Messages: | 304,709 |
Posted today: | 1 |