This is the new home of the egghelp.org community forum.
All data has been migrated (including user logins/passwords) to a new phpBB version.


For more information, see this announcement post. Click the X in the top right-corner of this box to dismiss this message.

Detect *actual* hostmask

Old posts that have not been replied to for several years.
Locked
g
galaxyboy

Post by galaxyboy »

Hi,

Is there anyway I can add a feature to eggdrop such that the eggdrop will automatically scan the user hostmask when the user joins a specific channel? Let's say if the user IP is spoofed (behind a firewall or BNC), it can detect the actual (ISP) hostmask.

If it is possible, what are the solutions?
I'll be grateful if anyone has any ideas or solutions :smile:

Regards,
galaxyboy
L
Leonhart

Post by Leonhart »

As far as I know, It is almost impossible to detect the real ISP hostmask behind a spoofed IP on IRC.
Correct me if I'm wrong, I like to know how to trace it :wink:


p/s: This is the 1000th post on this forum :smile:

<font size=-1>[ This Message was edited by: Leonhart on 2001-11-26 08:52 ]</font>
p
ppslim
Revered One
Posts: 3914
Joined: Sun Sep 23, 2001 8:00 pm
Location: Liverpool, England

Post by ppslim »

This is true, it is 100% impossible to detect a host that is connecting through a BNC or proxy.

If you had admin privliges (if the software provides them) to the proxy, there may be a command to see who is connected, but other wise there is no other way.
P
Petersen
Owner
Posts: 685
Joined: Thu Sep 27, 2001 8:00 pm
Location: Blackpool, UK

Post by Petersen »

Well, there is one way, which relies on them having dcc auto-get enabled. However, seting up a bot to dcc someone on join just to get their ip is most likely just to either 1) get you klined, or 2) packeted (or both)
g
galaxyboy

Post by galaxyboy »

Hmm, okie

What about when someone (a flagged) user /dcc chat to the bot? Is there anyway the eggdrop can detect the actual hostmask despite the user is behind a firewall or BNC? I've seen logs like when a user is behind a firewall, the eggdrop was able to detect the actual host.

Any Ideas?

Thanks :smile:
p
ppslim
Revered One
Posts: 3914
Joined: Sun Sep 23, 2001 8:00 pm
Location: Liverpool, England

Post by ppslim »

yes, the code
proc getdcchost {hand} {
set uh [lindex [lindex [dcclist chat] [set idx [lsearch -glob [dcclist chat] "* $hand *"]] 2]
if {$idx < 0} { return -1 }
return "${hand}!${uh}"
}
Should extract the host out of the dcc information.

Note, if they are using a BNC that extracts and converts the CTCP information, and tunnels the DCC connection for them, then this will only give you the host of the BNC.
Locked