I can see this being exploited. I'll give you an example. You have A who is trying to hijack B's DCC to C who is a bot. A dcc chat's B. (he gets the port that that B uses. And gives that to his hijack program which will then go thorough the next 150 ports or so over and over) A asks B if he is able to DCC chat the bot C. And asks B to try. When B tries to dcc the bot, guess who is right there ready to connect to B and give him a "Enter your password." prompt? This is not meant to be a guide for script kiddies, but I do believe this is certainly a problem, and the only sure fix is to check the hostname of the person connecting or use a password that is given during the DCC request for authentication. Since the latter would involve changing the IRC protocol, I'd say irc clients are just going to have to verify that the right person is connecting. With that, the worst thing that could happen is that somebody could keep connecting and the irc client would keep rejecting him, possibly causing a DOS. ---------------------------------- E-Mail: YounGoat <youngoatat_private> Date: 22-Dec-98 Time: 13:39:09 This message was sent by XFMail ---------------------------------- On 23-Dec-98 mikey wrote: > Yes, this might help. But why worry? they would need to port scan, and > find the port quicker than the other client can connect. Do you think they > can do this all the time? Or Barely ever? So this is not a problem, I > don't understand why anyone even got jumpy over it. I could do the same > with ftp, ftp opens ports waiting to recieve files. Do you see people > making patches for that? > > On Sun, 18 Oct 1998, Alessio Orlandi wrote: > >> Hi all, >> as recently discovered, with a simple port scan you can hijack some >> of the BitchX dcc >> connections. This due to the port assigning on the requesting client. >> Here follows a really short patch that will fix the problem. The problem >> is here: >> BitchX when creates a DCC connection (listening socket) uses the >> functions >> connect_by_number (defined in network.c file). Passing as port 0 >> This means that the OS will determine the port. Now.. for mental order.. >> the ports will be quiet consecutive. Bad.. Bad... So.. let's add a >> random value to the port returned by the system. All is now fixed. >> Patch follows >> ----------------------------------------------------------------------------- >> ------------ >> >> Regards >> Alessio >> "NaiL^d0d@ircnet/ircity" Orlandi >> Thanks to: hackers@ircity Litos (you one of my best friend), Nervous, >> awgn (hehe), >> Lordfelix (salam), Raptor, >> BlackJam, kasko, antirez >> and hackers.it@ircnet Soren, NaiF, Bonjo >> ----------------------------------------------------------------------------- >> ----------- >> >> >>
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:25:54 PDT