I still have difficulties about the concept of considering the idea of showing IPs to ops on a channel a security breach, but i heard some interesting ideas in the few last days...
Some were talking about complaining to Undernet autorities so they would be able to retrace who's who and contact ISPs. That's nice in theory... but sincerely, i don't think this could work. First of all, i'm not sure there opers that have that much time to offer... And he would need to act during the attack, fact that is quite problematic since the pples who are attacked aren't online at the moment of the attack. (peer or timeout casualties) But if you want to try it i'll try this. Some talked about a dedicated channel, but this is also unpracticle, it would very likely be submerged, attacked, etc etc. (and none 'officialy exist' for this purpose yet... About /Gen comment. We do not have any op of flood problem, the problem is the DDoS one and since you admit that a user cannot directly act upon this, at least when we contacted responsible ISP, those computers wheren't use anymore to flood us. Yes this could seem pointless since attackers will find new one... I know... but ifnobody complains to ISP, if this does not became suffisently annoying, ISP will not take seriously the problem, law suit will not force them to be carefull about security, etc. Anyway, maybe i am the only one, but in my little world, since there isn't real securiy in TCP/IP and that i know it, i decided a long time ago to inform by one mail each and every ISP that are being used for DDoS or illegal activities that they were. Hoping (maybe i'm simply stupid but i don't see an other way to make internet work) that someday this movement will have some level of impact. My sole point is that Undernet is now trying to help their users and that's nice, but they are misguided by bloking any trace option on abuser. (My humble and respectfull opinion) For Chris Crowther [[EMAIL PROTECTED]] argument stating that "That's a specious argument, if law enforcment want information, they'll just ask for it.". Can i simply say that your quite right, but that your comment is purely a theoric one? If i go to the police station stating that DuDe123 on the undernet network was attacking my internet connexion (from 100 proxies but that he was claiming it) and that i do not know his ISP, IP or anything about him else than the fact that he is using alternatively username1 username2 or username3 on undernet this won'T go very far? Maybe after a while they'll contact the Undernet administrators ang get the email that was use to register those mails... maybe they'll go back until they stop on a free emaila ccount somewhere in Tombouctoo. This will not help very much... anyway not as much as a solid IP+timestamp would. But you know what, i promise i will try this also... we'll see :o) About X command for complaining.. this could ad least give us a tool for complaining... But i have an even better suggestion for you... That would work simply and still cover the privacy of anyone... By a simple procedure, you could create a forwarding email address for every account in real time... - This would be triggered when a email would be sent to [EMAIL PROTECTED] or when a person would enter text and a username into a form into http://ISPabuse.undernet.org. - The mail would be sent to abuse@ for the ISP of the online person who is using the username, using a simple rule of 'the 2 last sections of any domain name unless the 2 last sections are 2 letters each and then use a tree section domain name'... I know this is not an universal solution... - You could preface the mail by a warning from the undernet stanting how the email was sent and why (...). I think this could be use to contact over 80% of the ISPs... helping a lot and giving the choice to ISP of how or if they want to disclose their IPs (...) by responding to the email... All without giving away the identity of the person behind the username. About a special channel mode. I see one way of doing it that wouldn't be too hard to create... - Assume that the mode is +h (i don't have a list of used channel mode for all networks...) - When a +x person try to join a +h channel, do 3 things. 1- issue a msg, something like: BW WARNED: if you join this channel, your real hostname will be seen by all channel operators. 2- stop the person from joining the channel 3- issue an invite on the nickname One last comment... About those who say that we could maybe manage with a channel for reporting abuse, or sending emails to [EMAIL PROTECTED] Do you realise that there is no proof on the undernet side of such an abuse? What i mean is that if SomeIdiot come to my channel saying 'You shouldn't have banned me, see what happened?' and i send this to an oper or [EMAIL PROTECTED], will you take me seriously? I can as well provide a server log showing 100 IPs DDoS-ing ... but the probability of the IP of SomeIdiot being into that log is about 0. So.. is that case, will oper act anyway? What about forged logs? Don't forget that at least ISP can see in their log if the user was contacting the IPs used for the DDoS. Yes there could be some other level proxies, but at least then can give along the informating to the other ISP(?). What can an oper do... will they send the complaint to the ISP automaticaly stating the original complaint without regard to the nature of the proofs? Those questions will maybe seem trivials but i must state that the last times i contacted [EMAIL PROTECTED] i received either no answer or some comment asking for solid proof, such thing aren't possible... about all logs can be forged :-I Well, on this point also i promise i'll try it again before anything else. Don't worry, i'm not making a point to create too long mails :o), i'm just trying to be torough. I try to avoid answering to each mail by sending a complete mail responding to each objections. Regards, - Alocin