个人工具
登录
查看“UbuntuHelp:FixDCCExploit”的源代码 - Ubuntu中文
UbuntuHelp
讨论
查看源代码
历史
搜索
导航
首页
最近更改
随机页面
页面分类
帮助
编辑
编辑指南
沙盒
新闻动态
字词处理
工具
链入页面
相关更改
特殊页面
页面信息
查看“UbuntuHelp:FixDCCExploit”的源代码
来自Ubuntu中文
←
UbuntuHelp:FixDCCExploit
跳转至:
导航
,
搜索
因为以下原因,你没有权限编辑本页:
您所请求的操作仅限于该用户组的用户使用:
用户
您可以查看与复制此页面的源代码。
{{From|https://help.ubuntu.com/community/FixDCCExploit}} {{Languages|php5}} == Introduction == On IRC there are a small group of abusive users that find it funny to send invalid DCC commands causing certain vulnerable users to disconnect. This causes a somewhat large spamming of disconnect and reconnect messages and is generally disruptive to the chat room. If you have been sent here you are most likely vulnerable to this particular attack. You will find instructions on how to fix this issue to follow. == Fix 1: Change Port == The easiest way to fix this issue is to change the port through which you connect to freenode. Most clients automatically connect to port 6667 when using an IRC server, but freenode also offers the ability to connect to port 8001. This will prevent this particular exploit from effecting you. '''X-chat''' users can change this by going to X-chat -> Server List, selecting Ubuntu Servers, clicking Edit, and <code><nowiki>changing irc.freenode.net</nowiki></code> to <code><nowiki>chat.freenode.net/8001</nowiki></code>. '''X-chat-GNOME''' users can change this by going to Edit -> Preferences. Then select ''Networks'' on the side. Double-click on ''Freenode'' on the right, click the servers tab, and then change <code><nowiki>irc.freenode.net</nowiki></code> to <code><nowiki>irc.freenode.net/8001</nowiki></code>. '''Konversation''' users can go to File -> Server list -> Edit, click on the server name (e.g. irc.ubuntu.com), click on Edit, and change the port from 6667 to 8001. '''Gaim''' users can go to Tools -> Accounts, choose your chat.freenode.net account, -> Modify -> Show more options, and change the port from 6667 to 8001, -> Save. '''Irssi''' users can type <code><nowiki>/connect irc.freenode.org 8001</nowiki></code> every time they connect or, as a long term solution, edit ''~/.irssi/config'' (<code><nowiki>nano ~/.irssi/config</nowiki></code>) and add the following line to "servers": <code><nowiki>{ address == "irc.freenode.net"; chatnet == "Freenode"; port = "8001"; </nowiki></code>} '''weechat''' users should edit ''~/.weechat/weechat.rc'' (<code><nowiki>nano ~/.weechat.weechat.rc</nowiki></code>), and, in the <code><nowiki>[server]</nowiki></code> section, change <code><nowiki>server_port == 6667</nowiki></code> to <code><nowiki>server_port == 8001</nowiki></code> and save the changes. The procedure for other IRC clients is similar, but the syntax is slightly different. Most other IRC clients use <code><nowiki>chat.freenode.net:8001</nowiki></code> to specify port 8001. == Fix 2: Updating Firmware == Most router manufacturers have provided an updated firmware for their router that fix this particular exploit. Please check with their website for upgrades and installation instructions. == Further notes == Upon fixing this issue you will NOT automatically be allowed to rejoin #ubuntu if you have been temporarly forwarded to #ubuntu-ops. You will need to alert an op to the situation and they will assist you in rejoining #ubuntu. == Why you can't auto rejoin == This action is an attempt to make it less attractive for anyone to do the exploit, when it first happened there were lots of disconnections. Now it is usually less than 10 at a time. ---- [[category:UbuntuHelp]]
该页面使用的模板:
模板:From
(
查看源代码
)
模板:Languages
(
查看源代码
)(受保护)
模板:Languages/Lang
(
查看源代码
)(受保护)
返回至
UbuntuHelp:FixDCCExploit
。