Vandalism and the Dying off of AW (Community)

Vandalism and the Dying off of AW // Community

1  |  

linn ironhead@digitalpassage(dot)com

Feb 12, 2003, 5:53pm
good ideas but tourists still need free reign as we all know its tourists
AND cits as tourists so it cant be stopped just cleaned up in a timely
fashion

[View Quote]

joeman

Feb 12, 2003, 10:49pm
Since you arent aware of how AW handles the computers "ID" and IP, I wouldnt
start talking about it as if you build the damn thing. First off, the
computer "ID" is just part of the computers MAC address, which is non
existant for dialup users. Also, these dialup users get new IP addresses
every time they connect to the internet. So, no static IP, and no MAC,
means no ban. Also, dont post a ton of pictures.

-Joe

[View Quote]

rowey

Feb 13, 2003, 5:15am
Perhaps I explained it wrong the first time, so you mis-understood with the
program they use, they can change their ip to well beyond the range of their
isp, Im sure you know what the ranges mean, also, the ip they can use are of
their choice, with this, they can log in using the ip address of any number
and range they choose eg 128.9.1.1 212.0.0.4 whatever they want, except
127.0.0.1 etc Id guess. So dial up does have nothing to do with it, since it
can only change within their isp's range. Its a program they are using. As
for the computer ID, that information is what was told to me by a caretaker,
so yeah.
This message had an attachment, was your choice was to click it. Thanks for
your interest.

[View Quote]

andras

Feb 13, 2003, 8:34am
Inline....

[View Quote] There is no such program which can masquarade the IP address in a communication where it has to receive an answer from the server. It is a bogus rumour! Anyone with a very little knowledge of the TCP protocol will laugh on that idea :)
To get _very_ different IPs is possible through several dialup service where the provider has multiple broad range of IP addresses but you can always track down who is the provider at http://ws.arin.net/cgi-bin/whois.pl .


> As for the computer ID, that information is what was told to me by a caretaker,
> so yeah.

.... yeah ...

> This message had an attachment, was your choice was to click it.

Unfortunately the attachments are downloaded when the message is retrieved. Next time post a URL pointing to them somewhere on your website. Thanks.

> Thanks for
> your interest.
>

--
Andras
"It's MY computer" (tm Steve Gibson)

defiance

Feb 13, 2003, 9:11am
23:53:38 "Confederate" = ip 212.62.203.74
[View Quote]

defiance

Feb 13, 2003, 9:13am
23:53:38 "Confederate" = ip 212.62.203.74
23:56:06 "Confederate" = ip 203.43.5.66
02:24:51 "Confederate" = ip 61.9.8.10
17:38:07 "Confederate" = ip 196.3.101.1
20:23:38 "Confederate" = ip 209.88.8.42
00:31:29 "Confederate" = ip 199.224.74.183
20:30:07 "Confederate" = ip 168.95.19.4

explain this!


[View Quote]

joeman

Feb 13, 2003, 2:56pm
h74.racos.com.203.62.212.in-addr.arpa
203.43.5.66
61.9.8.10
196.3.101.1
209.88.8.42
svcr-199-224-74-183.ppp.svcr.epix.net
kh-cs4.hinet.net

Some are dialup connections, some may be proxy servers, I really dont care
to figure out which are which. But, I can tell you he is on dialup, so he
wont have a computer ID. Really, will you *please* know what evidance is
before you pull it out. Your "evidance" just supports my arguement that hes
on dialup. Really, do some reading up on TCP/IP, and trust me when I tell
you how this cant be done with AW, I possiably know more about the
innerworkings of the software than most people here.

-Joe


[View Quote]

defiance

Feb 13, 2003, 3:46pm
So what? Tell me a way to successfully ban him or don't reply if you don't
know how.

[View Quote]

binarybud

Feb 13, 2003, 3:58pm
I'll reply....cause it seems you cannot hear what Joeman is saying there IS NO WAY to do it. Not by Joeman not by you not by me....NO WAY. Now maybe you see the problem. AW needs a core re-write in this area.(security)

IMHO
Leo :)


[View Quote]

andras

Feb 13, 2003, 4:30pm
[View Quote] 4 are dialup addresses while the rest is probably proxies or hacked machines (very unlikely someone is using AW in Mozambique, tho it is possible. More likely one of the machines at the university is acting as a proxy.)

But, I can tell you he is on dialup, so he
> wont have a computer ID.

That is not true any longer. Roland changed the way the computer ID calculated and it doesn't depend on the MAC address.

Really, will you *please* know what evidance is
> before you pull it out. Your "evidance" just supports my arguement that hes
> on dialup. Really, do some reading up on TCP/IP, and trust me when I tell
> you how this cant be done with AW, I possiably know more about the
> innerworkings of the software than most people here.
>
> -Joe

agree :)

--
Andras
"It's MY computer" (tm Steve Gibson)

joeman

Feb 13, 2003, 11:21pm
The computer ID is the MAC address still... Dont worry. And through
proxies, well, I dont think that'd work because of the new universe
authentication code, but, I havent fooled around with the Proxy or Tunnel
functions of AW.

-Joe

[View Quote]

equin0x

Feb 14, 2003, 3:34am
Try buying a book you lot.

[View Quote]

rowey

Feb 15, 2003, 11:20am
I find it most amusing that you ask all find it necessary to argue a fact of
what we have seen, Yes, it seems illogical or improbable that someone can
use an ip that is not their own and not inside the range of their ISP, and
until you have seen it happen before your eyes, Id argue the fact it cant
happen either, but I have seen it, others have seen it, you dont need proof,
how do we prove something you won't consider being possible. As I said in my
origional message, I consulted my Network Engineer Teacher, and he said it
cant happen either, but it does, this person(s) is able to manipulate their
IP beyond its normal capabilities, we can read books till we're blue in the
face, the simple fact is, its possible, yet beyond explanation from us.

Some of you argueing its illigitamacy,some of you probably have no capacity
nor interest in worlds, you come here, build chat, thats you done, others,
have technical logs and monitor exactly what goes on in these worlds, around
the clock, we cant explain it, thats why I mentioned it here, figured we
might get some kind of responce, but all you seem to want to do is prove the
point wrong, its very petty. Without trying to compair what your money paid
for in your university degree, how about you listen to whats being said,
instead of argueing it. A solution is required, not all your pissy attempts
to prove what you do or dont know. I dont claim to know anything more than
the next person, but I know what I witnessed, so please contribute solutions
not arguements.

As for andras, should I post again I will use hyperlinks for pictures, i
didnt consider 100kb of documentation and pics would create such a stir.

[View Quote]

joeman

Feb 15, 2003, 2:38pm
Who says their not using multipul ISPs and proxys?

Oh, and I claim to know just as much about the AW Protocol and
inner-workings as any AWCom developer. I dont see you claiming the same.
As eep would say, "Drive though".

-Joe

[View Quote]

defiance

Feb 15, 2003, 3:19pm
He has access to ISPs in Venezuela, USA, Australia, Phillipines,
Taiwan....yeah riiiiiiiiiiiiiiiiiiiiiight, dream on.

[View Quote]

joeman

Feb 15, 2003, 4:30pm
Its called a proxy, dream on. Next.

-Joe

[View Quote]

baron

Feb 15, 2003, 8:41pm
In article <3e4e76ac at server1.Activeworlds.com>, Defiance at micro$oft.com says...
> He has access to ISPs in Venezuela, USA, Australia, Phillipines,
> Taiwan....yeah riiiiiiiiiiiiiiiiiiiiiight, dream on.
>

The users you see changing IPs like that are doing what is often referred to as "open proxy rape".
Especially in countries like Korea, Brazil, Taiwan and China "admins" often fail to secure their
networks and properly authenticate their users thus providing free, unlimited, anonymous access to
their resources; this is very much appreciated by the scum of the universe, e-mail "marketers"
aka spammers. The only way to deal with this is to script/code a bot which will boot based on an
IP list, the concept is similar to black hole lists used for spammers.

Perhaps it would be a good idea for AWI to feed a list like ORDB or Openrbl to the router's or
firewall's deny list, most of these proxies are in these lists because of spam relay; I can't
imagine a legit customer raping an open proxy anyway.

--
Baron

1  |  
Awportals.com is a privately held community resource website dedicated to Active Worlds.
Copyright (c) Mark Randall 2006 - 2024. All Rights Reserved.
Awportals.com   ·   ProLibraries Live   ·   Twitter   ·   LinkedIn