IRC

From Noisebridge
(Difference between revisions)
Jump to: navigation, search
Line 121: Line 121:
 
== Abuse Contacts ==
 
== Abuse Contacts ==
  
It's important to report trolls to the ISP hosting the abuser.  Most ISPs have an acceptable use policy which prohibits antisocial behavior, and having everyone affected by the troll report the abuser will help limit the troll's resources.  Here's a list of AUPs and contacts for various ISPs.
+
It's important to report trolls to the ISP hosting the abuser.  Most ISPs have an acceptable use policy which prohibits antisocial behavior, and having everyone affected by the troll report the abuser will help limit the troll's resources.  Here's a list of AUPs and contacts for various ISPs. You should also get the output of the following CTCP requests to help fingerprint the user BEFORE you kick them from the channel:
 +
 
 +
* FINGER - Returns the user's full name, and idle time.
 +
* VERSION - The version and type of the client.
 +
* SOURCE - Where to obtain a copy of a client.
 +
* USERINFO - A string set by the user (never the client coder)
 +
* CLIENTINFO - Dynamic master index of what a client knows.
 +
* PING - Used to measure the delay of the IRC network
 +
* TIME - Gets the local date and time from other clients.
 +
 
  
 
{|border="1"
 
{|border="1"

Revision as of 11:13, 30 March 2011

TROLL WARNING -- many people have reported way unexcellent behavior on our IRC Channel.

We use an IRC channel that's on freenode. Feel free to join. The needed information is as follows:

irc://chat.freenode.net 
#noisebridge

We have a helpful bot in the channel by the name of noisebot run by dr_jesus.

Contents

Etiquette and fun

  • It's impolite to store logs of this channel. Please disable logging before joining #noisebridge.
  • It is not impolite, however, to add funny quotes to the quotes page.
  • There are trolls on the IRC channel. Please don't feed them.

Unfamiliar with IRC?

Here's some good general documentation about IRC and Freenode.

For those who are not familiar with getting on IRC, here's what Mitch did:

  • For Windows: Download and install Pidgin (free IM chat software for Windows -- there's plenty of other free software to choose from for Windows and other OSs).
  • For Macs - Colloquy (that also supports SILC) is Free Software Colloquy.
  • For those who run Ubuntu and are not familiar with IRC (unlikely?): $ sudo aptitude install xchat

Then (using Pidgin on Windows):

  1. create an IRC account on Pidgin (good documentation for this step)
    1. Go to Accounts (I got to Accounts by right-clicking on the icon in the system tray)
    2. Click the Add button
    3. For the Protocal, choose: IRC
    4. For the Server: irc.freenode.net
    5. If you have a Screen name (a “nick”), type it in as your Username (If you don’t own one yet, make one up)
    6. Click on the Advanced tab, and fill in the Real name field
    7. Check the Use SSL box, if you like
    8. Click the Save button
  2. join channel: #noisebridge:
    1. In the "freenode-connect" tab that appeared in Pidgin, type: '/j ##noisebridge' (without the quotes)
  3. So that no one else can use your nick, you can register your nickname at freenode.net

Hacking on IRC

Some members only want IRC to be used to discuss hacking. To satisfy this we have developed a system to ensure that all discussions are about hacking.

  1. Say, "I am wondering about (topic)"
  2. Then say, "Can we do some (topic) hacking?"

For example, "Wow, can you believe that (recent drama) happened in the space" is not correct. The correct approach would be, "We really need to do some drama hacking. Can you believe that (recent drama) happened in the space?"

Congratulations, you have just been excellent to other members by only talking about hacking in the IRC channel.


Channel Defense

Occasionally, people and programs may generate traffic in the #noisebridge IRC channel with the intent of provoking negative emotional responses. If you currently have operator status in the IRC channel when this happens, use the guidelines for each trollcon level to determine what channel mode to use.

Other things to consider if you're in a hurry:

  • Do not op users if they have not authenticated with NickServ. Check if a user is authenticated with NickServ by sending NickServ the command info <user> in a private message.
  • Consider setting +r (only allow users registered with NickServ) and +t (only ops can change the topic) on the channel.
  • Consider using +q (channel-level ignore) instead of +b to silence the provoking users. This allows for users who were mistakenly caught with a hostmask that was too broad to still join the channel and find an op to help troubleshoot.
  • Remember that the motivation of the provoking users is to generate emotional responses. If they do not see any, they will move on to a more responsive channel. It is important to avoid talking about them.

Defense Procedures

There is an inherent conflict between allowing free speech in #noisebridge and restricting the ability of trolls to disrupt the exchange of ideas. Any restrictions on speech must be temporary. Remember to undo any changes you make within about 24 hours.

Some tips on creating hostmasks:

  • Around trollcon 2, trolls may start joining from multiple domain names. Make sure to reverse lookup the names to see if they're in the same network block. If they are, set a mask for the whole block. For example, morb (an actual troll) has control of several machines in 208.122.47.88/29. Two of the machines are named failure.mysqrl.com and variance.misentropic.com. Looking up these names shows that they're in the same network block:
 $ dig +short variance.misentropic.com
 208.122.47.88
 $ dig +short failure.mysqrl.com
 208.122.47.95

Setting a mask of *!*@208.122.47.* will catch all computers in the surrounding /24 without having to enter masks for each one individually. For more precise information on what network block the addresses are in, try using a referral-following whois tools like whois.domaintools.com.

  • Don't bother with username masks (*!username@host.com) unless you know that a troll is on a shared vhost they don't have root on (such as chef.nerp.net). It is common for trolls to be able to spoof ident replies.
  • Note that afraid.org provides a large pool of domains which can have reverse DNS entries added by arbitrary members of the public. Subdomains under a domain hosted by afraid.org may be entirely legitimate, although you should report offensive subdomains to dnsadmin at afraid dot org for TOS/AUP violations.

Trollcon 0

Recommended channel mode: +Cn

People are chatting about their business as usual, occasional frustrated ranting by someone.

Trollcon 1

Recommended channel mode: +Cnpt

Troll present and attempting to provoke an emotional response.

Procedure: Set +q on the troll.

Trollcon 2

Recommended channel mode: +Cnptj 1:60 and possibly +q $~a to quiet unregistered users, or even +r to prevent unregistered users from joining at all.

Multiple trolls incoming and spamming the channel.

Procedure: Set +j 1:60 on the channel to throttle joins and buy a little time, then start setting +q on the trolls. If the trolls are coming through a web gateway or an IRC bounce host like xzibition, then use a forwarding ban similar to this:

 +b *!*@gateway/web/cgi-irc/irc.wikia.com/*$##overflow

If the spam makes it hard to see or cut and paste names to create hostmasks, then quiet all nonregistered users temporarily:

 +q $~a

Trollcon 3

Recomended channel mode: You're boned. If possible, use a kickban everyone script to buy time.

Channel takeover, troll(s) have ops, spambot(s) spewing text into the channel.

Procedure: Get a hold of radii, Syzygy-, or Valkyrie` to override ops and reclaim the channel. "/msg chanserv access #noisebridge list" will give you the current list of registered channel operators.

It's not guaranteed, but Freenode staff may show up and help deal with it, as they claim to have a mechanism for detecting these kinds of problems.

Abuse Contacts

It's important to report trolls to the ISP hosting the abuser. Most ISPs have an acceptable use policy which prohibits antisocial behavior, and having everyone affected by the troll report the abuser will help limit the troll's resources. Here's a list of AUPs and contacts for various ISPs. You should also get the output of the following CTCP requests to help fingerprint the user BEFORE you kick them from the channel:

  • FINGER - Returns the user's full name, and idle time.
  • VERSION - The version and type of the client.
  • SOURCE - Where to obtain a copy of a client.
  • USERINFO - A string set by the user (never the client coder)
  • CLIENTINFO - Dynamic master index of what a client knows.
  • PING - Used to measure the delay of the IRC network
  • TIME - Gets the local date and time from other clients.


Domain AUP Sections likely violated Contact email address
covad.net Acceptable Use Policy Illegal use prohibited (iv), Abuse use prohibited (ii), (v) abuse@covad.net
Personal tools