[IRCServices] /ns ghost exploit
Andrew Church
achurch at achurch.org
Thu Mar 14 10:43:00 PST 2002
Services does not use SVSKILL in the first place, and does not allow
GHOST anyway without a password unless the calling user is on the access
list of the target nick _and_ the nick does not have the SECURE option set.
Have you modified Services?
--Andrew Church
achurch at achurch.org
http://achurch.org/
>Something I recently became aware of was users "abusing" the ghost command.
>
>When the ghost command is issued, Services will SVSKILL the user from the
>network. However, the new trend appears to be setting up a notify script,
>which will automatically ghost any user trying to use a given nickname.
>This quickly became popular. How this came to my attention is that a new
>user was trying to access the network but was repeatedly killed by the
>ghost command.
>
>Use of "kill immediate" should be sufficient for those users who do not
>want people using their nicknames and can be handled by services with a
>nick change so I do not see use of the command in this manner as
>beneficial.
>
>One way to remove this exploit which seems the least complex to actually
>manage is to only trigger the ghost if the target is currently identified.
>
>This would mean that in the event a user got disconnected before they were
>able to identify, they would be unable to remove a real 'ghost' on
>reconnect with the ghost command, but they could use 'recover'
>and 'release' instead. I believe that the 'recover' will "guest" a user
>where NSForceNickChange is enabled.
>
>--
>Mark.
>
>
>------------------------------------------------------------------
>To unsubscribe or change your subscription options, visit:
>http://www.ircservices.za.net/mailman/listinfo/ircservices