banning by mac address
 

News:

29 December 2022 - PtokaX 0.5.3.0 (20th anniversary edition) released...
11 April 2017 - PtokaX 0.5.2.2 released...
8 April 2015 Anti child and anti pedo pr0n scripts are not allowed anymore on this board!
28 September 2015 - PtokaX 0.5.2.1 for Windows 10 IoT released...
3 September 2015 - PtokaX 0.5.2.1 released...
16 August 2015 - PtokaX 0.5.2.0 released...
1 August 2015 - Crowdfunding for ADC protocol support in PtokaX ended. Clearly nobody want ADC support...
30 June 2015 - PtokaX 0.5.1.0 released...
30 April 2015 Crowdfunding for ADC protocol support in PtokaX
26 April 2015 New support hub!
20 February 2015 - PtokaX 0.5.0.3 released...
13 April 2014 - PtokaX 0.5.0.2 released...
23 March 2014 - PtokaX testing version 0.5.0.1 build 454 is available.
04 March 2014 - PtokaX.org sites were temporary down because of DDOS attacks and issues with hosting service provider.

Main Menu

banning by mac address

Started by dummyparameter, 03 July, 2005, 15:47:06

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

dummyparameter

i need to know the administrator command for banning any user by mac address.
plzzzzzzz help . ?(

Ubikk

Are you sure it's possible? :)
I would be interested in that also, because lots of users from my hub have a dinamic IP

Markitos

QuoteOriginally posted by Ubikk
Are you sure it's possible? :)
I would be interested in that also, because lots of users from my hub have a dinamic IP

I doubt so...

Dessamator

nope , not possible !
Ignorance is Bliss.

Quattro

I thought so too because mac address won't go outside internal network so it would only work if you run a lan-hub
quattro-place.no-ip.com:1418
PtokaX DC Hub 0.3.3.0 build 17.09 Not Running :(
wdp10.no-ip.info:1412
DCH++ v1.0-Release (Plugin API v1.0) Special Quattro? Build
For DCH scripting and plugins

Ubikk

The  hub I run is made only for my LAN. Is there any chance for me to bann MAC's? :)

Dessamator

hmm indeed it might be possible depending on how ur network is set up!(im unsure though)
Ignorance is Bliss.

plop

QuoteOriginally posted by Ubikk
The  hub I run is made only for my LAN. Is there any chance for me to bann MAC's? :)

use a real firewall 2 do this.
for example visnetic firewall.
the moment there is a router in the network between the hub and the client it isn't possible anymore.

plop
http://www.plop.nl lua scripts/howto\'s.
http://www.thegoldenangel.net
http://www.vikingshub.com
http://www.lua.org

>>----> he who fights hatred with hatred, drives the spreading of hatred <----<<

dummyparameter

atleast give the command.It can be used for intra-lan.

for the router stuff , is it not possible to look into a particular packet and get the mac add. of the actual originating machine. If possible , then we can get the script for mac bans.

else i got a solution : lets agree upon a DC client that especially sends the mac address along with the nick identification. then the hub can use scripts for mac ban.
for mac faking , i suggest we can make the client to send a key that is cryption of mac , processor serial. Now for this particular ip , when the admin. notifies , the hub can keep a log of this key. And ban this key at the ask of admin. .
though faking this would need changes at software level(in dc client). but a good encryption should keep 90% of the fakers away. A very good encryption can be one in which the hub provides a encryption key. that is only after receipt of a key from the hub the client can use it for making a key of its own and then enter the hub.
admin. can vary the hub-key as he wishes. The hub soft. will accordingly change the logs too.
(above makes the hub-logs independent of ip adds. + identifies the absolute combo of a processor serial and mac + the keys can be varied by admin. and fakers would be troubled each next time hub-key is changed)

but above can be applied only in the agreement of use of this particular client.

Dessamator

interesting idea, but as u so eloquently put it :

can be applied only in the agreement of use of this particular client.
Ignorance is Bliss.

dummyparameter

for a start big hubs can shift the entrance to this particular client.   :]  

i guess when the problem is at root , cutting branches wont help.     :D

plop

QuoteOriginally posted by dummyparameter
atleast give the command.It can be used for intra-lan.

for the router stuff , is it not possible to look into a particular packet and get the mac add. of the actual originating machine. If possible , then we can get the script for mac bans.

else i got a solution : lets agree upon a DC client that especially sends the mac address along with the nick identification. then the hub can use scripts for mac ban.
for mac faking , i suggest we can make the client to send a key that is cryption of mac , processor serial. Now for this particular ip , when the admin. notifies , the hub can keep a log of this key. And ban this key at the ask of admin. .
though faking this would need changes at software level(in dc client). but a good encryption should keep 90% of the fakers away. A very good encryption can be one in which the hub provides a encryption key. that is only after receipt of a key from the hub the client can use it for making a key of its own and then enter the hub.
admin. can vary the hub-key as he wishes. The hub soft. will accordingly change the logs too.
(above makes the hub-logs independent of ip adds. + identifies the absolute combo of a processor serial and mac + the keys can be varied by admin. and fakers would be troubled each next time hub-key is changed)

but above can be applied only in the agreement of use of this particular client.

1) there is no sutch command.
2) the router replaces the mac for it's own sending mac.
this might make you think that it would be possible, but the internet is full of routers.
3) this can be bypased by altering the source, so it won't stop fakers (hence dc stealth).

plop
http://www.plop.nl lua scripts/howto\'s.
http://www.thegoldenangel.net
http://www.vikingshub.com
http://www.lua.org

>>----> he who fights hatred with hatred, drives the spreading of hatred <----<<

SMF spam blocked by CleanTalk