RE: [Coder-Com] RFD: Secondary links

2002-04-11 Thread Alocin

If i may... there is another problem i see coming...

What about a network where there is many 1-2 sec lag between servers (an
example). If, let say, 3 or 4 servers decide to 'jump' at the same time... I
wont list all problem that could occur, but there is a need for a pre-jump
(to the network and some sort of aknolegment after that) command telling
other servers to wait a little before their jump and maybe reconsider after
the fist one (via the secondary link of course, and propaging to all servers
and secondary link and coming back the same way to say 'oki', but not being
stopped if there is no answer at all... (blah)).

There is also the problem that secondary server would be fine for leaf
servers, but what about hubs? It's for the hub that it would be the more
usefull, but it is also where problems begins: We have to be carefull to
avoid some sort of long term netbreak if 1 hub decide to jump to an other
hub but creating 2 seperate groups that way... There must be a checking
mecanism ;p

I don't know it this if this is 'clear' but if you play with a sheet of
paper, some dots and line, wou'll see what i mean :o)


- Alocin




> -Message d'origine-
> De : [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]De la part de Kev
> Envoyé : Le jeudi 11 avril 2002 12:57
> À : [EMAIL PROTECTED]
> Objet : [Coder-Com] RFD: Secondary links
>
>
> The idea is to allow servers to establish a secondary network link.  No
> messages (except PINGs) would go across the secondary link unless the
> primary link was broken.  This is still a long way from a mesh-linked
> network, but might be an interesting enhancement.
>
> We would introduce a new command for unregistered connections to server
> ports--SECONDARY.  We would also introduce a new server<->server command
> with the token SC.  SC would be prefixed by the introducing server and
> would contain the same fields as a SERVER command--lag could lead to some
> servers receiving the SECONDARY command before the SERVER command.  We
> need to discuss how to represent destruction of a secondary link--is a
> SQUIT command enough, or must we introduce another command?  We must also
> discuss how the fall-back is to occur--if more than one SECONDARY link
> has been established, how do we select which one to fall back to?
>
> My idea for this is that each link--both the primary and secondaries--
> have an associated timestamp.  If the primary is lost, the secondary
> with the oldest timestamp is promoted to the primary.
>
> I can think of three more problems that must be solved.  The first is
> what to do with en-route messages: messages that cross with the SQUIT.
> The parser drops messages that are going the wrong direction.  We should
> then remove this restriction, but that leads to potentially infinite
> message loops under certain types of desynchronization.  The second
> problem is what to do with messages waiting in the sendq for the primary
> link--they should be resent to the secondary, but might that require
> re-parsing them?  The third problem is what to do about certain global
> messages required for maintaining network synchronization--some could get
> lost during the transition from the primary to the secondary, but we
> can't simply have the server deal with multiple copies of the same change
> to the database.
>
> So.  Discuss :)
> --
> Kevin L. Mitchell <[EMAIL PROTECTED]>
>




RE: [Coder-Com] RFD: Secondary links

2002-04-11 Thread Alocin

(snip)
> > There is also the problem that secondary server would be fine for leaf
> > servers, but what about hubs? It's for the hub that it would be the more
> > usefull, but it is also where problems begins: We have to be carefull to
> > avoid some sort of long term netbreak if 1 hub decide to jump
> to an other
> > hub but creating 2 seperate groups that way... There must be a checking
> > mecanism ;p
> >
> > I don't know it this if this is 'clear' but if you play with a sheet of
> > paper, some dots and line, wou'll see what i mean :o)
>
> My intent is to fail over to the secondaries only if a primary link falls
> over, so I'm not sure if this problem is still there...
> --
> Kevin L. Mitchell <[EMAIL PROTECTED]>
>

L L
| |
L   C~E   L
|  /   \  |
Servers:  L-A-B G-H-L
|  \   /  |
L   D F   L
| |
L L

C is connected to E
C have F as a secondary
F is connected to G
F have D as a secondary
C-E becomes too slow...
C switch from E to F
F-G becomes too slow...
F switch from G to D

L L
| |
L   C E   L
|  / \ \  |
Servers:  L-A-B   | G-H-L
|  \  |   |
L   D-F   L
| |
L L

Well, you could say that F will not be able to link to D because D will
reject it as already in the network... but since it will always be the case
with the use of secondaries... D would not have the rigth to refuse the
connection.. all it could do is send a command to force the break on the
other side... somewhere most likely between ... C and F!

And this is not all... what if both 'jumps' occur at the same time? It would
be even more problematic because no travelling command could be use to avoid
the situation...


anyway... some puzzle to solve :)


- Alocin





RE: [Coder-Com] Ban/Kill with fingerprint

2002-04-18 Thread Alocin

>   OK, I see what you're talking about now, but how would you go
> about generating a fingerprint?  Baring in mind that we have no access to
> their local system to use details such as CPU ID...and we likely never
> will have either (I'm not sure I'd want that information from the users).
>
>   The only way I can see of doing it would involve a Client <->
> Server protocol change to allow the sending of a FINGERPRINT : hash> during the connection phase...but this would be so easy to fake
> (you could just generate a random fingerprint) that it would be
> totaly useless.
>
> > Chojin

I'm curious... Theoricaly.. would there be a way to retreive the mac
address?

Because if it could be done.. -that- would be ideal... to get something
like:

[EMAIL PROTECTED]

where is.com would be the real isp ending... (from ppp123.bla.isp.com, we
could keep all except the the first part and replace this one by the
'something')

and where 'something' would be the resultant of a simple equation on the mac
address to get something like 'n789u6nf'...

(this letting possible to ban a simpel person, a whole isp, protecting users
against DoS, etc...) ...


Is that possible?


- Alocin




RE: [Coder-Com] username in /whois?? please remove!

2002-04-19 Thread Alocin

Just a question, not really on X behavior, but on the new way the servers
will hide the username...

Will there be a way (a command) to choose not to set it?

I mean if i log into X but doesn't want my host to look like
[EMAIL PROTECTED] ... will there be a
'/restoremyhostname' or so?

Or better then that, as it will have major consequences on littles bots,
scripts, and all those things using the hostname as an authentification for
some channel utilities... Maybe X could simply advertize a command to hide
your host as soon as you log in...

/msg x login myuser mypass
-X- Authentification successfull (...)
-X- You could now use /hide to hide your hostname

Anyway... i don't even know if this is already done... my question is 'how
do you intend to make the hiding of the hostname work?'

Tanks,


- Alocin




RE: [Coder-Com] username in /whois?? please remove!

2002-04-19 Thread Alocin

> Just a question, not really on X behavior, but on the new way the servers
> will hide the username...

i meant the hostname ;p



RE: [Coder-Com] username in /whois?? please remove!

2002-04-19 Thread Alocin

ah!.. that's the part i didn't know

tanks for the info

but the idea to advertize it as soon as you login to X remain :o)

tanks again,


- Alocin


> -Message d'origine-
> De : nighty [mailto:[EMAIL PROTECTED]]
> Envoye : Le vendredi 19 avril 2002 12:03
> A : Alocin; Undernet Coder Comitee
> Objet : RE: [Coder-Com] username in /whois?? please remove!
>
>
> At 11:18 19/04/2002 -0400, Alocin wrote:
> >Just a question, not really on X behavior, but on the new way the servers
> >will hide the username...
> >
> >Will there be a way (a command) to choose not to set it?
> >
> >I mean if i log into X but doesn't want my host to look like
> >[EMAIL PROTECTED] ... will there be a
> >'/restoremyhostname' or so?
> >
> >Or better then that, as it will have major consequences on littles bots,
> >scripts, and all those things using the hostname as an
> authentification for
> >some channel utilities... Maybe X could simply advertize a
> command to hide
> >your host as soon as you log in...
> >
> >/msg x login myuser mypass
> >-X- Authentification successfull (...)
> >-X- You could now use /hide to hide your hostname
> >
> >Anyway... i don't even know if this is already done... my
> question is 'how
> >do you intend to make the hiding of the hostname work?'
> >
> >Tanks,
>
> Hi,
>
> As far as i know when you
> /msg [EMAIL PROTECTED] login my_login my_pass
> -X- AUTHENTICATION SUCESSFULL AS my_login
>
> you keep exactly the host you had .. but you need to
>
> /mode your_nick +x
>
> to enable the "host faking" (@my_login.users.undernet.org)
> Note: to avoid breaking clients, setting (or unsetting afaik) this mode
> will make you PART
> any channel you joined in the meanwhile.
>
> regards,
>
>
>
>
> >- Alocin
>
>
> --nighty / [EMAIL PROTECTED] - Paris.Fr.Eu.Undernet.Org
> --web: http://nighty.roots.org/
>
>
>




RE: [Coder-Com] level 500 command proposal

2002-05-18 Thread Alocin

> >Then of course you can do:
> > *!*@*.??
> > *!*@*.com
> > *!*@*.net
> > *!*@*.org
> > *!*@*.info
>
> I think is enough to add something only for host/IP.
> If the banned
> host/IP doesn't contain a character a-z, A-Z or a
> digit 0-9 then the
> banmask to be a wrong one. A ban on *!*@*.c* won't
> make X to kick all
> users in that channel (only if all of them have a "c"
> in their hostname).

Well, i'm not sure many persons on a channel would still be there if you ban
*!*@*e* from X ;-p


To the others... May i suggest that if you intend to continue this
discussion, at least specify if you're talking about a ban trough X or as a
channel mode, it's very funny to see so many persons arguing but not talking
of the same thing at all ;-p


- Alocin




[Coder-Com] /msg x help set KEYWORDS

2002-12-01 Thread Alocin
/msg x help set KEYWORDS


[00:38] -X- /msg X set <#channel> 

should be

[00:38] -X- /msg X set <#channel> keywords 

isn't? :o)


- Alocin



[Coder-Com] suggestion of a WHOIS modification

2003-01-01 Thread Alocin
About the *.user.undernet.org and the fact that it is nice to protect
yourself against attacks, it is also a pain for channel ops to find out who
is doing what and to find out to whom they should complain if they want to
inform an ISP (...)

The fact that a ban is still usefull for banning a person even if they
masquerade their host is nice... if you can find that true host!  And with
the fact that flooders will register 30 false login it is a real pain to
live with ...

Anyway, my point is:

why not put a privilege on the whois request done by a op on a user on his
channel?

It would reduce the abuse on multiregistering because there would be many
less use for it AND it would let users act upon flooders if they join the
channel where they are op by maybe contacting the ISP (...)

The fact that a person decide to join a channel is still his own choice, so
it will not impact on the desire to protect a user privacy or security... If
they join a channel they accept to obey by the rules of the channel and to
allow acces to their true host to the ops, nothing bad in that.

So, to be clear, what i am suggesting is:

For everyone, the whois of Someone would still look like

SomeUser is [EMAIL PROTECTED] * something
SomeUser on #chan1 #chan2
SomeUser using *.undernet.org The Undernet Underworld
SomeUser End of /WHOIS list.

Except for ops on #chan1 or #chan2 that would see:

SomeUser is [EMAIL PROTECTED] * something
SomeUser on #chan1 #chan2
SomeUser using *.undernet.org The Undernet Underworld
SomeUser End of /WHOIS list.


I will also add that this would not compromise CPU usage very much... Or if
this is something you absolutly want to avoid, use the same principle that
was use for cprivmsg... i dislike the idea of having to use a new command,
but even that would at least help me free the channels where i am op of
those
«kiddies-that-didn't-got-their-x-box-for-christmas-so-the-world-must-suffer»
type of users...


Tank you for your interest.. reply/suggestions welcome :o)


- Alocin


p.s.: There is other possibilities, like adding a 'join comment' stating the
host to the ops only... (there is already a 'part comment' so the syntax is
already in place) and that would eventualy reduce the need for client to use
secondary commands to generate an internal user list. Or/and the WHO could
be modified in the same way...





Re: [Coder-Com] suggestion of a WHOIS modification

2003-01-02 Thread alocin
> The hidden +x host was created with a reason: To protect users
> and Undernet
>
> staff.  If I run a ddos/botchan, and an oper walks in to gline
> them, or a cservice admin join and removes my X bot, I really
> think I shouldn't be able
>
> to see his IP, even if I'm a chanop.
>
> Spike

This is not an issue, if you want to protect an oper going into the channel for this, 
you just have to pub an additional check for the status of the user joining the 
channel before giving away his IP... Anyway you put it it wouldn't be hard to code.

To the other objections on the privacy basis... I really don't understand your point 
and clearly you don't understand mine.

Everything on this network is based upon the idea of protecting users from attackers 
and this is nice, but now, the way it is working it also help attackers who want to 
exploit this.

Let be more practicle on an everyday example:

#afunchannel, having the habitual limit of 45 bans have to deal with 
#wewilldestroyyou, a channel from where SomeIdiot is member of a fun team of 'you will 
not ban me from your chan even if i'm an asshole'.
Nom, SomeIdiot have 10 buddies on #wewilldestroyyou that decide that SomeOp had a bad 
idea when he banned SomeIdiot from #afunchannel.

In the past, there was 2 choices:
1- they join #afunchannel with 30 clones, flooding and so, and were banned one by one 
or by groups and the ops could trace the drones and contact the ISP if they want (or 
nuke them i admit) but when SomeIdiot did came back to SomeOp and told him 'see what 
happen', at least SomeOp was able to trace SomeIdiot and contact the ISP (or nuke him 
i admit).
2- they simply nuke the connexion of SomeOp (or everyone on the channel...)

Today, what we have is:
1- they can't flood the connexion of SomeOp, but they will, from time to time, nuke 
everybody else on the channel who isn't using +x (...)
2- they come with 100 drones to the channel, much of them +x. You can't trace them so 
their ISP cannot be contacted (or nuked, i know). But it rapidly become impossible to 
manage the flood with bans so the only choice reside in banning *.users.undernet.org. 
(and now we go back to the old way, and get the same set of problems!!) And worst of 
all, when SomeIdiot come to claim 'you should know better than to ban me' there is not 
a thing you can do about it!

If only ops could see real IPs:
1- flood of +x drones would be stoppable with much less bans. ISP could be contacted 
(or nuked i know).
2- SomeIdiot couln't claim his glory, since he would be tracable (log of a past join 
prior to the first ban) and so if a flood began 2 minutes after a ban, you would know 
what ISP to contact (or nuke i know!!)

The difference between those cases?

On the fisrt one, everybody can and will eventualy be nuked (arg)
On the second, attackers are perfectly protected and untracable if they are a bit 
carefull, but the peoples on a target channel are still vulnerable! Non +x will still 
get DoS, and eventualy it is easy to force the issue and force ops to use +ban 
*.users.undernet.org and go back to the even less secure #1 state.

The way i propose would simply turn the balance in the favor of ops by letting them 
act (hopefuly responsably) and be able to resolv a channel attack without having to 
revert to state #1.

To the peoples who are suggesting that this would deprive sormal users of their 
protection, let remember some things:
1- It will always be a choice to join or not a channel. auto-join on invite are not an 
issue, this is a client matter. Want to try to solve the old game of #prison on the 
server side too? (auto-invite on part from this channel was giving a hard time to some 
mirc users)
2- If you want, you could put supplementary information on the topic... (mode +x or 
login to x sending a warning telling that their host will NOT be hidden from ops...)
3- you can even imagine (i dont like it) other ways, like putting a channel mode that 
would void this detection, then a client script could check if the channel have the 
mode set before joining.

Anyway, i hope some lights will go on with this, try to imagine being in the position 
of the ops of a big channel.. or a support channel for a small isp that is seeing his 
connexion flooded simply because someone doens't appreciate besoin banned! (or worse 
doesn't want to give free access!)

And to finish with this, choose an everyday example.. you always have the choice to 
enter in a store that would request that you give you name as a club member before 
going in. You then decide if this is acceptable for you before going in, even if it is 
possible that you will receive unwanted publicity afteward.

Anyways, a good day (and a good year to come!) to everyone who's taking the time to 
think about this.

Regards,


- Alocin.







Re: [Coder-Com] suggestion of a WHOIS modification

2003-01-02 Thread alocin
> While I am sure there are users that abuse multiregistering to X
> from a
> single IP, there are also multiple users employing single IP's
> in the many
> household and small business LAN's utilizing various forms of
> shared connections.
> 
> I wonder if the loss of utility for these users might not
> outweigh the types of abuse that can perpetrated with X.
> 
> William Van Wyck
> pzl

If this is what worries you, remember that ops on the channel have the hability to 
think! They could choose to ban only by the undernet host if they want to! The thing 
is that they need to have that choice.. this is their channel!

And when i talk about multiregistering, what i am talking about is when someone, with 
a buch of emails that are pointing in fact to the same place is registering 50 
usernames and, with them go online with drones coming from compromised connexions 
(trojan, wingates, etc). And then is using them to flood a channel.. there is no way 
of tracig them to informe the ISP of the compromised ips... And more important, you 
cannot pinpoint the source, the person who was abnned or feeled suffisently insulted 
to attack your channel or your connexion. You cannot informe his ISP to check his 
activities and eventualy make him stop.

You also give the perfect rpotection to pples wanting to do any illegal activities at 
all...


Regards,


- Alocin







[Coder-Com] WHOIS ...

2003-01-05 Thread Alocin
sly? I can as well provide a
server log showing 100 IPs DDoS-ing ... but the probability of the IP of
SomeIdiot being into that log is about 0. So.. is that case, will oper act
anyway? What about forged logs? Don't forget that at least ISP can see in
their log if the user was contacting the IPs used for the DDoS. Yes there
could be some other level proxies, but at least then can give along the
informating to the other ISP(?). What can an oper do... will they send the
complaint to the ISP automaticaly stating the original complaint without
regard to the nature of the proofs? Those questions will maybe seem trivials
but i must state that the last times i contacted [EMAIL PROTECTED] i
received either no answer or some comment asking for solid proof, such thing
aren't possible... about all logs can be forged :-I Well, on this point also
i promise i'll try it again before anything else.


Don't worry, i'm not making a point to create too long mails :o), i'm just
trying to be torough. I try to avoid answering to each mail by sending a
complete mail responding to each objections.


Regards,



- Alocin




RE: [Coder-Com] Spam

2003-02-17 Thread Alocin
Having a closed list accepting automaticaly emails from subscribed users but
needing an approval if not subscribed could be done i think...

Or, if this needs too much human intervention, an automatic response for
pples not subscribed to the list and sending an email, stating 2 choices:

1- subscribe (how-to) and resubmit
or
2- use the http://blah webform to submit the question/request/etc.

The form would have a signature email accepted by majordomo... and would
have also the benefit of making it clear for everybody if the mail need to
have a CC to the sender included or not :o)

Regards,


- Alocin


> -Message d'origine-
> De : [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]De la part de Stacy Brown Thellend
> Envoye : 17 fevrier, 2003 16:05
> A : s gibinski
> Cc : [EMAIL PROTECTED]
> Objet : Re: [Coder-Com] Spam
>
>
> I don't think this can be done with majordomo.
>
> On Mon, 17 Feb 2003, s gibinski wrote:
>
> > Would it be possible to have the person making the submission
> self-approve
> > the posting to the list (rather than the moderator)?
> >
> > Sorry, I'm not familiar with major domo, but here is what I am thinking:
> > 1.  Members would post directly to the list.
> > 2.  In the event that the posting comes from a non-member, the user that
> > made the post would be sent an e-mail telling them that their
> authorization
> > is required to allow the posting to be forwarded to the rest of
> the list.
> > 3.  The user would then provide the actual approval to post.
> >
> > If possible, the user might also be told that HTML should not
> be used in the
> > submission, etc.
> >
> > I am guessing that this type of verification would catch most
> of the spam?
> > Anyone have any ideas on how difficult this might be to accomplish or
> > reasons that this might not work?
> >
> > -stephen
> >
> >
> > >From: Thomas Helvey <[EMAIL PROTECTED]>
> > >Subject: [Coder-Com] Spam
> > >Date: Sat, 15 Feb 2003 11:26:03 -0800
> > >
> > >The spam to post ratio on this list seems to have gotten a lot worse
> > >lately. Perhaps it's time to to consider limiting posters to
> subscribers.
> > >Discussion?
> > >
> > >Thanks,
> > >--Bleep
> >
> >
> > _
> > Tired of spam? Get advanced junk mail protection with MSN 8.
> > http://join.msn.com/?page=features/junkmail
> >
>
>
> Stacy Brown Thellend <[EMAIL PROTECTED]>  http://pfft.net/stacy
> --
> ---
> Famous last words: I can get a world record for doing this.
>