Jump to content

donjon56

Members
  • Posts

    5
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

donjon56's Achievements

Refugee

Refugee (1/15)

1

Reputation

  1. Agreed, other than implementing TLS or SSL... That falls more under host/IT for reverse proxy or VPN tunnel
  2. Agreed, other than implementing TLS or SSL... That falls more under host/IT for reverse proxy or VPN tunnel
  3. This was 6+ months ago. Suspicious is that i had 16+ character random password that was not shared with anyone, nor had I actually connected to it yet. Within 5 days there was an open connection on it. Granted, there was no record of any activity other than holding open the connection. If brute forced, that seemed oddly quick, plus there were not any login failures in the logs. This occurred three times with different passwords. I disabled after that. It was not from the same ip range While nothing came of these connections. Given a large number of open tenet sessions. A coordinated attack could be staged against the hosting company.
  4. This was 6+ months ago. Suspicious is that i had 16+ character random password that was not shared with anyone, nor had I actually connected to it yet. Within 5 days there was an open connection on it. Granted, there was no record of any activity other than holding open the connection. If brute forced, that seemed oddly quick, plus there were not any login failures in the logs. This occurred three times with different passwords. I disabled after that. It was not from the same ip range While nothing came of these connections. Given a large number of open tenet sessions. A coordinated attack could be staged against the hosting company.
  5. At the moment I was not using any modifications or tools. I was just testing the features with telnet and web console. Since Server Blend did not have any reverse proxy or tunnels for securing it, I was not planning to have it on long term. Server was set for Public with a different Password for users to join. Telnet and Web Console had different 16 char fully randomized passwords.
  6. At the moment I was not using any modifications or tools. I was just testing the features with telnet and web console. Since Server Blend did not have any reverse proxy or tunnels for securing it, I was not planning to have it on long term. Server was set for Public with a different Password for users to join. Telnet and Web Console had different 16 char fully randomized passwords.
  7. Game Version: (A18 b155 / A18.1 bxxx / etc) Platform: (PC / Mac) OS/Version: (Windows / Linux / Mac) CPU Model: (Intel i5 9600K / AMD Ryzen 7 1800x / etc) System Memory: (4 GB / 8 GB / 16 GB / etc) GPU Model and VRAM: (nVidia GTX 1060 4 GB / AMD RX 580 8 GB / etc) Screen Resolution: (width and height) Video Settings: (Low / Medium / High / Ultra / Custom (Custom has many combinations, so just list the settings you think are relevant to the bug if any)) Game mode: (MP host / MP client / SP / Client on dedi, RWG or NAV) Server 2022-01-29T15:32:23 0.840 INF Version: Alpha 20 (b238) Compatibility Version: Alpha 20, Build: Windows 64 Bit 2022-01-29T15:32:23 0.840 INF System information: 2022-01-29T15:32:23 0.841 INF OS: Windows 10 (10.0.14393) 64bit 2022-01-29T15:32:23 0.841 INF CPU: AMD Ryzen 9 3950X 16-Core Processor (cores: 32) 2022-01-29T15:32:23 0.841 INF RAM: 131001 MB 2022-01-29T15:32:23 0.841 INF GPU: Null Device (128 MB) 2022-01-29T15:32:23 0.842 INF Graphics API: NULL 1.0 [1.0] (shader level 5.0) Did you wipe old saves? (Yes/No) N/A Did you start a new game? (Yes/No) N/A Did you validate your files? (Yes/No) N/A Are you using any mods? (Yes/No) No EAC on or off? Off Status: NEW Bug Description: I am seeing unusual telnet activity on my server. I had it enabled for several weeks testing a feature, but it seems someone discovered/brute forced my 16 char random password. I am providing this report to provide you a view in to what someone is attempting to do with your telnet client / session. (I will just disable the feature for the time being) https://pastebin.com/Yu4LVGrw Detailed steps to reproduce the bug: 1) N/A Actual result: (description of what is occurring) Expected result: (what you expect to occur)
×
×
  • Create New...