Why to kick or ban 66x clients: A compilation of several DC++ develope
 

News:

29 December 2022 - PtokaX 0.5.3.0 (20th anniversary edition) released...
11 April 2017 - PtokaX 0.5.2.2 released...
8 April 2015 Anti child and anti pedo pr0n scripts are not allowed anymore on this board!
28 September 2015 - PtokaX 0.5.2.1 for Windows 10 IoT released...
3 September 2015 - PtokaX 0.5.2.1 released...
16 August 2015 - PtokaX 0.5.2.0 released...
1 August 2015 - Crowdfunding for ADC protocol support in PtokaX ended. Clearly nobody want ADC support...
30 June 2015 - PtokaX 0.5.1.0 released...
30 April 2015 Crowdfunding for ADC protocol support in PtokaX
26 April 2015 New support hub!
20 February 2015 - PtokaX 0.5.0.3 released...
13 April 2014 - PtokaX 0.5.0.2 released...
23 March 2014 - PtokaX testing version 0.5.0.1 build 454 is available.
04 March 2014 - PtokaX.org sites were temporary down because of DDOS attacks and issues with hosting service provider.

Main Menu

Why to kick or ban 66x clients: A compilation of several DC++ develope

Started by Ruri_Ruri, 06 February, 2005, 19:21:01

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Ruri_Ruri

ok, i came across this... anybody know more of what its about?

If you received a warning from SNAIL, please know that in all likelyhood, "I" did not warn you.
It is more likely that my client warned you. My client is what is called an OPs Client, and it has automatic security features.
"I am sorry about all the added effort, but it comes much in part to the fact that

DC Dev has gone off the fucking deep-end.

They are now releasing hacked clients and dangerous ones as well.
In most likelyhood, you have been warned about a recent hacked client. If so, read below.
It is unclear why, but the fact is, those who work to maintain a safe DC world,

will not tolerate these "official" hacks.

Because many of these hacks are cloaking as regular DC++ clients,
and because many users are unwittingly being pawns in this fiascal,
new coding has been made to sniff out, and handle the problem.

This doesn't come without cost, as it means a rough update,
and many users will get punished just for trying to keep up to date.

Affected clients include all 4021-4026, 4031-4035 and especially 666.

Most hubs are recommending users go to sourceforge and get a 401, 402 or 403 version (known to be safe).

http://prdownloads.sourceforge.net/dcplusplus/DCPlusPlus-0.401.zip?download
http://prdownloads.sourceforge.net/dcplusplus/DCPlusPlus-0.402.zip?download
http://prdownloads.sourceforge.net/dcplusplus/DCPlusPlus-0.403.zip?download
Note that 304 was the last very stable Win9x build.
You can find it here: http://prdownloads.sourceforge.net/dcplusplus/DCPlusPlus-0.304.zip?download"




UPDATE

DC++ 667 is out now.
While this release has removed the RPC attack exploit thus making it no longer a high risk client,
it is still a problematic hacked OPs client that contains issues with list blocking and
bandwidth throttling.
These poorly hacked clients are released as unstable and should be treated as such.
Further, they still reflect bad on DC Dev who are supposed to set the bar.


Why not 668?
Okay, let me explain this.
Recently 668 was released and called "stable".

I am still not allowing this client.
I want to explain this position.
I am not the only one who is taking this stand against DC Dev.

As only one among many DC++ client developers,
I stand with those as well as the security persons,
who feel that the public should not be allowed to use the 66x clients.

DC Dev, for reasons they refuse to explain, took the czDC++ core, modified it, added all sorts of bugs
and released it as an unstable test only build.
(One can only assume this was done as czDC is a more stable build then their own core.)

This version and those to follow, should have never been allowed into public hands.
Further, those people who build their clients using the DC Dev core, should have never used an unstable build.

The 668 builds still suffer from burried code and OP only features of the czDC++ OPs only client.
People would do better to use the actual czDC++ 403 (at the time of this writing).

Finally, while DC Dev claims 668 to be a stable release, they have not maintained continuity.
If 668 is to represent the next in stable releases,
it should be 404 or 405 (depending on how one views middle builds).
To close on this matter, I stand with those who feel the same.
The 66x clients are not to used by the general public.
I apologies to those afflicted by this decision and suggest you complain to DC Dev.



Highest Priority Warning!

The DC++ client ReverseConnect 0.668a comes bundled with spyware!!!
Ever since DC++ went to the 66x builds, they have released all sorts of RPC
and bugged software, suggesting the high probability of goverment intrusion
into the project.
(*More below.)



Upon installation and first run, rcDC 0.668a attempts to connect to these tracking services:

"Global Crossing, bossofthesauce.com[CWS], spider, " ( 146.82.218.137 ) [protocol: TCP - src: 1502 / dst: 80]

(Attempts to locate user via port open on most systems and firewalls.)

"Manitoba Telephone System, LAZURAS AKCOOP SERVER, " ( 142.161.49.96 ) [protocol: TCP - src: 1064 / dst: 411]

(Attempts to silently connect to a HUBbot data collection service.)

"M-WEB, proxy, BSA.co.za AP2P" ( 196.2.147.80 ) [protocol: TCP - src: 3076 / dst: 25]

(Attempts to silently email personal information to the BSA Anti Peer to Peer agency, a division of the DCMA and associate to the RIAA.)

BAN THIS CLIENT EVERYWHERE!!!

Addendum-

I have tried the rcDC++ 403d (which is actually 4032, a bad core known already) and it too is infected!
"Responsys, Inc. Tory Blue, Exodus IDC - SV/SC8 IP " ( 66.35.250.210 ) [protocol: TCP - src: 2511 / dst: 80]

Going back to rcDC++ 402 (prior to DC Dev pulling all this recent shit), and it is clean.


Jan 1, 2005
Updates...

Report on the DC++ client, fulDC-6.58
External build reports as 0.667
Internal build reports as 0.668
Infected with spyware code to "Global Crossing Spider Data Collection Agency" dst: 80
*Exploited with Sourceforge version tracker.


*Note:
that an in depth tracking report has revealed a severe security risk to ALL DC++ users.
Many of the DC++ version and hublist databases have been taken over by government/media-Nazi groups.
Any DC++ client that automatically checks for updates or public hub lists is at risk of exploiting the user.
Further, newer clients are being built without options to disable these features.


any thoughts or points.

p.s if this is in the wrong place, plz move it to the right place :P
Darkness beyond twilight
Crimson beyond blood that flows
Buried in the stream of time is where your power grows
I pledge myself to conquer all the foes who stand against the mighty gift bestowed in my unworthy hands
Become one with my body
And let us walk the path of destruction together


SMF spam blocked by CleanTalk