I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request
on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
On 14/03/2021 21.07, John Smith wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request
on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
Certainly.
For example, with an ssh tunnel, run on B:
ssh -L 127.0.0.01:60000:192.168.1.16:80 -N user@A.mylan
A is on 192.168.1.16 in the example.
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request
on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
On 14/03/2021 23.02, Richard Kettlewell wrote:
"Carlos E.R." <robin_listas@es.invalid> writes:
On 14/03/2021 21.07, John Smith wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the >>>> fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request >>>> on port B, the connection is silently and transparently forwarded to A? >>>> That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
I used to use the iptables DNAT and SNAT targets to achieve this.
Certainly.
For example, with an ssh tunnel, run on B:
ssh -L 127.0.0.01:60000:192.168.1.16:80 -N user@A.mylan
A is on 192.168.1.16 in the example.
With this approach, the server on A will see the wrong source address,
not very transparent.
You can change the options as needed. I basically pasted what I use.
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request
on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
I have a Linux system A in my network where a TCP server is running at
port P. The details of this server are irrelevant beyond the fact that
it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection
request on port B, the connection is silently and transparently
forwarded to A? That is, my goal is for B to act as man-in-the-middle, totally transparent as far as B is concerned.
Can this be done?
"Carlos E.R." <robin_listas@es.invalid> writes:
On 14/03/2021 21.07, John Smith wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request >>> on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
I used to use the iptables DNAT and SNAT targets to achieve this.
Certainly.
For example, with an ssh tunnel, run on B:
ssh -L 127.0.0.01:60000:192.168.1.16:80 -N user@A.mylan
A is on 192.168.1.16 in the example.
With this approach, the server on A will see the wrong source address,
not very transparent.
On Sun, 14 Mar 2021 16:07:04 -0400, John Smith<12345@whatismyemailaddress.xyz> wrote:
requestI have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection
on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
It's called network address translation.
iptables -t nat -A PREROUTING -p tcp --dport 2222 \
-j DNAT --to-destination 1.2.3.4:8888
Do you not control the router that's sending the packet to B in thefirst place?
On my lan, the router forwards packets for some ports to one lancomputer, and
packets for some other packets to another one.as logging.
Or do you intend to have B do additional things with the packet, such
On Sun, 14 Mar 2021 20:07:04 +0000, John Smith wrote:
I have a Linux system A in my network where a TCP server is running at
port P. The details of this server are irrelevant beyond the fact that
it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection
request on port B, the connection is silently and transparently
forwarded to A? That is, my goal is for B to act as man-in-the-middle,
totally transparent as far as B is concerned.
Can this be done?
Actually, I found out how to do it with iptables. Assuming that
the internal network is the 192.168.0 network, one can create the following IP tables rules in B:
iptables -t nat -A PREROUTING -i <nic> -p tcp --dport <port> -j DNAT --to-destination <A-ip-address>:<port>
iptables -A FORWARD -i <nic> -d <A-ip-address> -p tcp --dport <port> -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d <A-ip-address> -p tcp --dport <port> -j SNAT --to-source <B-ip-address>
iptables -t nat -A POSTROUTING -o <nic> -d <A-ip-address> -p tcp --dport <port> -j SNAT --to-source <B-ip-address>
where
<nic>: The appropriate network interface in B.
<port>: The port number.
<A-ip-address>: The IP address of A.
<B-ip-address>: The IP address of B.
After doing this, when some other system in my network attempts to contact B at port P, the connection gets transparently forwarded to A at port P.
This does look quite complicated for what it does. The thing is, I tried with simpler suggestions that I came across online, and couldn't get them to work. If anybody has a simpler set of rules that works, I'd be happy to learn about it.
Actually, I found out how to do it with iptables. Assuming that
the internal network is the 192.168.0 network, one can create the following IP tables rules in B:
iptables -t nat -A PREROUTING -i <nic> -p tcp --dport <port> -j DNAT --to-destination <A-ip-address>:<port>
iptables -A FORWARD -i <nic> -d <A-ip-address> -p tcp --dport <port> -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d <A-ip-address> -p tcp --dport <port> -j SNAT --to-source <B-ip-address>
iptables -t nat -A POSTROUTING -o <nic> -d <A-ip-address> -p tcp --dport <port> -j SNAT --to-source <B-ip-address>
"Carlos E.R." <robin_listas@es.invalid> writes:
On 14/03/2021 21.07, John Smith wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request >>> on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
I used to use the iptables DNAT and SNAT targets to achieve this.
For example, with an ssh tunnel, run on B:
With this approach, the server on A will see the wrong source address,
not very transparent.
Le 15/03/2021 à 00:13, John Smith a écrit :
Actually, I found out how to do it with iptables. Assuming that
the internal network is the 192.168.0 network, one can create the
following IP tables rules in B:
iptables -t nat -A PREROUTING -i <nic> -p tcp --dport <port> -j
DNAT --to-destination <A-ip-address>:<port>
iptables -A FORWARD -i <nic> -d <A-ip-address> -p tcp --dport
<port> -j ACCEPT
This rule is useless if the FORWARD chain ACCEPTs all traffic by
default.
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d <A-ip-address>
-p tcp --dport <port> -j SNAT --to-source <B-ip-address>
iptables -t nat -A POSTROUTING -o <nic> -d <A-ip-address> -p tcp
--dport <port> -j SNAT --to-source <B-ip-address>
These two rules are redundant with each other.
Can this be done?
It's called network address translation.
iptables -t nat -A PREROUTING -p tcp --dport 2222 \
-j DNAT --to-destination 1.2.3.4:8888
Do you not control the router that's sending the packet to B in the first place?
On my lan, the router forwards packets for some ports to one lan computer, and
packets for some other packets to another one.
Or do you intend to have B do additional things with the packet, such as logging.
Regards, Dave Hodgins
En 33 lignes David W. Hodgins a écrit
dans news:op.0z9k5pu0a3w0dxdave@hodgins.homeip.net
le dimanche, 14 mars 2021 à 22:40:27 :
It seems to me that somehow A & B are directly connected to eachCan this be done?
It's called network address translation.
iptables -t nat -A PREROUTING -p tcp --dport 2222 \
-j DNAT --to-destination 1.2.3.4:8888
Do you not control the router that's sending the packet to B in the first place?
On my lan, the router forwards packets for some ports to one lan computer, and
packets for some other packets to another one.
Or do you intend to have B do additional things with the packet, such as logging.
Regards, Dave Hodgins
other through and eth cable or something, in a LAN all machines go
through the router and the router can send packets to another machine
with a set of simple rules, for this, checking out the router, if
any, might be a good idea.
dyrmak
On Mon, 15 Mar 2021 09:48:26 +0100, Pascal Hambourg wrote:
Le 15/03/2021 à 00:13, John Smith a écrit :
Actually, I found out how to do it with iptables. Assuming that
the internal network is the 192.168.0 network, one can create the
following IP tables rules in B:
iptables -t nat -A PREROUTING -i <nic> -p tcp --dport <port> -j
DNAT --to-destination <A-ip-address>:<port>
iptables -A FORWARD -i <nic> -d <A-ip-address> -p tcp --dport
<port> -j ACCEPT
This rule is useless if the FORWARD chain ACCEPTs all traffic by
default.
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d <A-ip-address>
-p tcp --dport <port> -j SNAT --to-source <B-ip-address>
iptables -t nat -A POSTROUTING -o <nic> -d <A-ip-address> -p tcp
--dport <port> -j SNAT --to-source <B-ip-address>
These two rules are redundant with each other.
Well, this works, which is what matters to me. I am of course
open to simplifications. Please suggest some.
Le 15/03/2021 à 14:44, John Smith a écrit :
On Mon, 15 Mar 2021 09:48:26 +0100, Pascal Hambourg wrote:
Le 15/03/2021 à 00:13, John Smith a écrit :
Actually, I found out how to do it with iptables. Assuming that
the internal network is the 192.168.0 network, one can create the
following IP tables rules in B:
iptables -t nat -A PREROUTING -i <nic> -p tcp --dport <port> -j
DNAT --to-destination <A-ip-address>:<port>
iptables -A FORWARD -i <nic> -d <A-ip-address> -p tcp --dport
<port> -j ACCEPT
This rule is useless if the FORWARD chain ACCEPTs all traffic by
default.
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d
<A-ip-address>
-p tcp --dport <port> -j SNAT --to-source <B-ip-address>
iptables -t nat -A POSTROUTING -o <nic> -d <A-ip-address> -p tcp
--dport <port> -j SNAT --to-source <B-ip-address>
These two rules are redundant with each other.
Well, this works, which is what matters to me. I am of course
open to simplifications. Please suggest some.
I thought it was obvious.
Remove the FORWARD rule if ACCEPT is the default.
Remove either POSTROUTING rule.
En 33 lignes David W. Hodgins a écrit
dans news:op.0z9k5pu0a3w0dxdave@hodgins.homeip.net
le dimanche, 14 mars 2021 à 22:40:27 :
Can this be done?
It's called network address translation.
iptables -t nat -A PREROUTING -p tcp --dport 2222 \
-j DNAT --to-destination 1.2.3.4:8888
Do you not control the router that's sending the packet to B in the first place?
On my lan, the router forwards packets for some ports to one lan computer, and
packets for some other packets to another one.
Or do you intend to have B do additional things with the packet, such as logging.
It seems to me that somehow A & B are directly connected to each
other through and eth cable or something, in a LAN all machines go
through the router and the router can send packets to another machine
with a set of simple rules, for this, checking out the router, if
any, might be a good idea.
On 15/03/2021 18.49, dyrmak wrote:
En 33 lignes David W. Hodgins a écrit
dans news:op.0z9k5pu0a3w0dxdave@hodgins.homeip.net
le dimanche, 14 mars 2021 à 22:40:27 :
Can this be done?
It's called network address translation.
iptables -t nat -A PREROUTING -p tcp --dport 2222 \
-j DNAT --to-destination 1.2.3.4:8888
Do you not control the router that's sending the packet to B in the first place?
On my lan, the router forwards packets for some ports to one lan computer, and
packets for some other packets to another one.
Or do you intend to have B do additional things with the packet, such as logging.
It seems to me that somehow A & B are directly connected to each
other through and eth cable or something, in a LAN all machines go
through the router and the router can send packets to another machine
with a set of simple rules, for this, checking out the router, if
any, might be a good idea.
Home routers are not actually "routing" the LAN. The LAN is connected to
a switch in the "router" box. The router part of the "router" does not intervene in that traffic.
On Mon, 2021-03-15, Carlos E.R. wrote:
It seems to me that somehow A & B are directly connected to each
other through and eth cable or something, in a LAN all machines go
through the router and the router can send packets to another machine
with a set of simple rules, for this, checking out the router, if
any, might be a good idea.
Home routers are not actually "routing" the LAN. The LAN is connected to
a switch in the "router" box. The router part of the "router" does not
intervene in that traffic.
And meanwhile, boxes called "managed switches" seem to be, amongst
other things, routers. Then if you pay a lot more, they are called
"routers" again. The terminology is terribly confused.
/Jorgen
On Mon, 2021-03-15, Carlos E.R. wrote:
On 15/03/2021 18.49, dyrmak wrote:
En 33 lignes David W. Hodgins a écrit
dans news:op.0z9k5pu0a3w0dxdave@hodgins.homeip.net
le dimanche, 14 mars 2021 à 22:40:27 :
Can this be done?
It's called network address translation.
iptables -t nat -A PREROUTING -p tcp --dport 2222 \
-j DNAT --to-destination 1.2.3.4:8888
Do you not control the router that's sending the packet to B in the first place?
On my lan, the router forwards packets for some ports to one lan computer, and
packets for some other packets to another one.
Or do you intend to have B do additional things with the packet, such as logging.
It seems to me that somehow A & B are directly connected to each
other through and eth cable or something, in a LAN all machines go
through the router and the router can send packets to another machine >>> with a set of simple rules, for this, checking out the router, if
any, might be a good idea.
Home routers are not actually "routing" the LAN. The LAN is connected to
a switch in the "router" box. The router part of the "router" does not
intervene in that traffic.
And meanwhile, boxes called "managed switches" seem to be, amongst
other things, routers. Then if you pay a lot more, they are called
"routers" again. The terminology is terribly confused.
/Jorgen
On Mon, 2021-03-15, Carlos E.R. wrote:
On 15/03/2021 18.49, dyrmak wrote:
En 33 lignes David W. Hodgins a écrit
dans news:op.0z9k5pu0a3w0dxdave@hodgins.homeip.net
le dimanche, 14 mars 2021 à 22:40:27 :
Can this be done?
It's called network address translation.
iptables -t nat -A PREROUTING -p tcp --dport 2222 \
-j DNAT --to-destination 1.2.3.4:8888
Do you not control the router that's sending the packet to B in the first place?
On my lan, the router forwards packets for some ports to one lan computer, and
packets for some other packets to another one.
Or do you intend to have B do additional things with the packet, such as logging.
It seems to me that somehow A & B are directly connected to each
other through and eth cable or something, in a LAN all machines go
through the router and the router can send packets to another machine >>> with a set of simple rules, for this, checking out the router, if
any, might be a good idea.
Home routers are not actually "routing" the LAN. The LAN is connected to
a switch in the "router" box. The router part of the "router" does not
intervene in that traffic.
And meanwhile, boxes called "managed switches" seem to be, amongst
other things, routers. Then if you pay a lot more, they are called
"routers" again. The terminology is terribly confused.
A proper managed switch works based on the connectors the traffic
comes in or goes out, and on the Ethernet MAC addresses. The connectors
are called ports in switch parlance, and they must not be confused with
the TCP and UDP ports, which are software-defined mailboxes in protocol.
The managed switches may group ports in groups called VLANs, virtual
LANs. In principle, the ports in different VLANs do not connect to
each other. However, a port may be designated a trunk port carrying
the traffic of several VLANs at the same time. Even there the different
VLANs are kept separate by a special identification tag in the Ethernet header.
Some operating systems can handle tagged traffic. In Linux, the VLANs
are seen as separate interfaces, marked with a dot and the VLAN number,
e.g. eth0.3 for VLAN id 3 on eth0. The home routers seem to use this
to provide several separate networks for external and internal nets,
using only one Ethernet interface on the processor.
There are bastard cross-overs between managed switches and routers,
peeking into the IP traffic, but otherwise behaving like switches.
A pure switch does not care about the payload protocols riding on
the switched Ethernet.
Home routers are not actually "routing" the LAN. The LAN is connected to
a switch in the "router" box. The router part of the "router" does not
intervene in that traffic.
And meanwhile, boxes called "managed switches" seem to be, amongst
other things, routers.
Then if you pay a lot more, they are called
"routers" again. The terminology is terribly confused.
On Sun, 14 Mar 2021 16:07:04 -0400, John Smith <12345@whatismyemailaddress.xyz> wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request
on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
It's called network address translation.
On 3/14/21 2:40 PM, David W. Hodgins wrote:
On Sun, 14 Mar 2021 16:07:04 -0400, John Smith
<12345@whatismyemailaddress.xyz> wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the
fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection request >>> on port B, the connection is silently and transparently forwarded to A?
That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
It's called network address translation.
Actually, that's PORT FORWARDING.
Port forwarding is just a kind of NAT.
Le 25/03/2021 à 15:35, Tauno Voipio a écrit :
Port forwarding is just a kind of NAT.
Not always. As already mentioned in this thread, it may also be a kind
of proxy/relay performed by programs such as socat or ssh.
On 25.3.21 21.03, Pascal Hambourg wrote:
Le 25/03/2021 à 15:35, Tauno Voipio a écrit :
Port forwarding is just a kind of NAT.
Not always. As already mentioned in this thread, it may also be a kind
of proxy/relay performed by programs such as socat or ssh.
In my vocabulary, proxies are special servers which
are endpoints of the original connections.
SSH forwarding is actaully a kind of VPN tunnel.
In my vocabulary, proxies are special servers which
are endpoints of the original connections.
On 25.3.21 4.30, Johann Beretta wrote:
On 3/14/21 2:40 PM, David W. Hodgins wrote:
On Sun, 14 Mar 2021 16:07:04 -0400, John Smith
<12345@whatismyemailaddress.xyz> wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the >>>> fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be
possible to configure B so that when be receives a TCP connection
request
on port B, the connection is silently and transparently forwarded to A? >>>> That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
It's called network address translation.
Actually, that's PORT FORWARDING.
Port forwarding is just a kind of NAT.
On 3/25/21 7:35 AM, Tauno Voipio wrote:
On 25.3.21 4.30, Johann Beretta wrote:No it's not. There's no translation done. The connection is forwarded to
On 3/14/21 2:40 PM, David W. Hodgins wrote:
On Sun, 14 Mar 2021 16:07:04 -0400, John Smith
<12345@whatismyemailaddress.xyz> wrote:
I have a Linux system A in my network where a TCP server is
running at port P. The details of this server are irrelevant beyond the >>>>> fact that it is a TCP server.
What I would like to do is the following;
I have another Linux system B in the same network. Would it be >>>>> possible to configure B so that when be receives a TCP connection
request
on port B, the connection is silently and transparently forwarded to A? >>>>> That is, my goal is for B to act as man-in-the-middle, totally
transparent as far as B is concerned.
Can this be done?
It's called network address translation.
Actually, that's PORT FORWARDING.
Port forwarding is just a kind of NAT.
the same device always, if the connection comes in on a specific port.
NAT will forward a connection on a given port to whatever computer is associated with that particular TCP connection at a given time.
Maybe you could argue that PORT FORWARDING is a subset or related to
NAT, but when we talk about these things in the industry we use specific terms for a reason.
terms for a reason.
Are you telling that the destination IP of a forwarded
IP packet is not changed?
On 3/30/21 10:26 AM, Tauno Voipio wrote:
terms for a reason.
Are you telling that the destination IP of a forwarded
IP packet is not changed?
No. But keep at it. Keep insisting that Port Forwarding and NAT are the
same thing...
We have two definitions for two reasons. One is for one thing and the
other is for another thing.
They may be related but they are different.
Home routers are not actually "routing" the LAN. The LAN is connected to >>> a switch in the "router" box. The router part of the "router" does not
intervene in that traffic.
And meanwhile, boxes called "managed switches" seem to be, amongst
other things, routers.
No they are not. A router, in Internet parlance, transfers IP packets
from one IP subnetwork to another.
Home routers are not actually "routing" the LAN. The LAN is connected to
a switch in the "router" box. The router part of the "router" does not intervene in that traffic.
I think what he's trying to say, and what is quite accurate, are that
many "managed switches" have routing functions in them.
I've got a Mikrotik Cloud Core Switch and it absolutely does have the
ability to route.
Neither do enterprise routers. As far as I know, every modern non-internet-only router connects local traffic to a switch.
On 5/28/21 2:15 PM, Johann Beretta wrote:
Neither do enterprise routers. As far as I know, every modern
non-internet-only router connects local traffic to a switch.
It depends on what the router is and how it's built.
It's possible to combine ports on some routers into a logical switch,
which will use software to switch the traffic between the ports.
This is very much akin to bridging under Linux. Add two or more ports
to a bridge and use kernel software to do switching.
The Bridge - Switch - Router terminology has been fully usurped by marketdroids in the last two decades.
All one can say at the moment, if it's called router, it probably
has not enough ports, and if it's called l3-switch, it's actually a
router with a lot of ports that can route packets really fast.
A router proper with no switching capability would not be able to
have multiple ports in a single network segment / VLAN.
On 5/29/21 10:42 AM, Marc Haber wrote:
A router proper with no switching capability would not be able to
have multiple ports in a single network segment / VLAN.
Sure it can. Cisco calls this a "Bridge Virtual Interface" or a "Switch >Virtual Interface" (depending on the router in question). It uses
software and the CPU to join multiple nominally independent interfaces
into a broadcast domain.
That is a router with added switching capability.
Thanks for proving my point and for unnecessarily taking this
conversation into a market segment that probably 1 % of people
(including the two of us) will ever see.
On 5/30/21 4:08 AM, Marc Haber wrote:
That is a router with added switching capability.
What is "switching capability"? Is it hardware as in a switch on a chip
that many SOHO routers have? Or is it some sort of higher end ASIC that
gets into the data path? Or is it software a la bridging on Linux?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 294 |
Nodes: | 16 (2 / 14) |
Uptime: | 246:38:13 |
Calls: | 6,626 |
Calls today: | 2 |
Files: | 12,175 |
Messages: | 5,320,793 |