The problem has been around forever but is only becoming a serious problem 
now that we have so many people trying to get guests to give them their 
passwords.  I have sent the problem over to the network coders with an 
explanation as to why it is a problem and what the severity level is.  I'll 
stay on top of it until resolved.

Bob

At 02:10 AM 3/12/2002 -0500, Py Fivestones wrote:
>This came to cservice, and I know this topic has come up before. Is there 
>a hard code fix for this? Could and should there be? Yes this is primarily 
>a problem with Mirc users but it's a common "exploit" of Undernet's 
>services. It seems people have now found a new use for this, spamming to 
>get innocent channels in trouble with cservice and IRCops.
>stoney`
>
>>From: "Brian Gonzalez" <[EMAIL PROTECTED]>
>>To: <[EMAIL PROTECTED]>
>>Subject: [Cservice] Channel spoofing ability
>>Date: Tue, 12 Mar 2002 02:20:13 -0500
>>X-Mailer: Microsoft Outlook, Build 10.0.2616
>>Importance: Normal
>>Sender: [EMAIL PROTECTED]
>>Reply-To: "Brian Gonzalez" <[EMAIL PROTECTED]>
>>
>>Greetings,
>>
>>
>>
>>I would like to submit a suggestion about the Channel creating abilities 
>>of the Undernet network. It appears that there has been user who have 
>>discovered the ability to include format codes into the channel names for 
>>instance A channel that looks like #Cservice can be created by typing 
>>/join #(ctrl-k)Cservice and the person appears to be a channel op in the 
>>channel #Cservice. Which in reality it is a new channel the user just 
>>formed. Our channel has had some users perpetrating to be ops in our 
>>channel by performing this method. And then going around and Spamming 
>>other channels.
>>
>>Which ofcourse creates a lot of angry channel ops/managers. If  this 
>>could be disabled it would be a great benefit to help cut down on some of 
>>the malicious activity that has be going on throughout the Undernet IRC 
>>Network.
>>
>>
>>
>>Best Regards,
>>
>>
>>
>>Concerned Cservice user. (TomyBoy)
>
>Py Fivestones
>[EMAIL PROTECTED]
>


Reply via email to