Back
[03:54:42] <lilo> [Global Notice] Hi all. If you've been affected by the DCC exploit, which just surfaced in the last day or so, the problem is with your netgear router. The symptom is that you get knocked off line; it may require a router reset to recover. Please message me if this has happened to you and let me know what model router you're using. Thanks!
[04:02:50] <lilo> [Global Notice] This is what we have so far on that new exploit:
http://tinyurl.com/qah9z .... thanks
[04:06:23] <lilo> [Global Notice] To summarize, since my blog is now overloaded, if you are running a Netgear WGR614 or WGT624, and probably other models, and probably Netgear routers relabeled by ISP's, you are vulnerable to a new exploit which can be used to knock you off IRC, and probably other places. Thanks.
[08:16:36] <lilo> [Global Notice] Hi all. It appears likely that you can prevent the DCC exploit from working by connecting to us via port 8001 rather than port 6667 .... please try it if you've been getting caught by the DCC exploit .... please try it and let me or freenode first level support (
http://freenode.net/faq.shtml#gettinghelp ) know how it works.
[08:18:02] <lilo> [Global Notice] Also, to those of you who have been using the keylogger or DCC exploits: it's extremely annoying to the people on the channels you do it on. This is freenode, folks, we really do expect better from you. Please remember.
[18:57:43] <SWPadnos> SWPadnos is now known as SWP_Away
[19:45:52] <alex_joni> latest TESTING as tarball (
http://solaris.cs.utt.ro/~emc/emc2-testing-2006-03-02.tar.gz)
[21:20:02] <lilo> [Global Notice] Hi all. If you're having problems with the Netgear/Linksys router exploit, please try connecting to freenode on port 8001 instead of port 6667 .... more info:
http://tinyurl.com/op26n (bandwidth limited, apologies in advance)